Sök:

Sökresultat:

1941 Uppsatser om Network security and countermeasures - Sida 17 av 130

Återuppbyggnad av en kollapsad stat - En fallstudie av återuppbyggnaden av staten Afghanistan

The purpose of this thesis is to explore and analyze the processes and efforts involved in rebuilding the war-torn state of Afghanistan. The examined period span from the fall of the Taliban regime in 2001, to the elections in 2005. This period, commonly known as the Bonn-process, sets out the initial time for the reconstruction of the state.A theoretical framework, which considers the necessary mechanisms for successful state-building, will be used to analyze Afghanistan's re-building process. The mechanisms include the prerequisite of a stable security environment, emerging from a cease-fire, together with the development of a well-functioning economy, re-introduction of rule of law and rejuvenating civil society.The failure to establish a secure environment has had a devastating impact on all analyzed aspects of the re-building process. It is therefore crucial that the international society continuing to assists the Afghan government in its efforts to strengthen its capacity, in order to improve the security situation.

Unga vuxnas interaktion med mobila sociala medier i vardagen

This Bachelors exam is about young adults and their use of Mobile Social Network System.The use of mobile social media has become more common in today?s society, ranging fromteenagers, the dominating internet users, to the elderly. The traditional purpose of use inmobile phones, the voice communication from one place to another, has in Sweden beendominated by text communication instead. Along with the development of Smartphones andthe mobile interface, the births of mobile social media have increased in the market.Reports have shown that of all the devices with the possibility to connect to social networks,the one kept closest to our bodies is the mobile phone. One of the advantages of using thephone for mobile social media is that you can easily and smoothly update whenever andwherever, within one arm?s reach.

?Why so serious??? en kvalitativ undersökning av folkbiblioteks användning av Facebook.

The purpose of this bachelor thesis is to describe how Swedish public libraries use the online social network Facebook and its functions. Our focus of this study lies on how the librarians use the network and what experiences they?ve made. The questions we wanted to answer were:? How do the libraries in this study work with Facebook and its services? ? What do the interviewed librarians think about working with Facebook as an instrument?? What pros and cons can be identified from working with Facebook?The methodology used for this study was qualitative interviews.

Förändrad syn på svensk militär alliansfrihet? : En studie om svensk neutralitetspolitik mellan 1990-2008

Abstract: The purpose of this study is to examine how the Swedish policy of neutrality has changed between the years 1990-2008. The research method used for this essay has been comparative case study, which strives to answer four research questions. Two of these questions are: Which specific occurrences have been fundamental in changing the Swedish policy of neutrality? How have the Swedish policy of neutrality and the policy of non-alignment changed between the years 1990-2008? The theoretical frame work of this study consists of Europeanization as a comprehensive theoretical perspective. In order to explain the Swedish act regarding the policy of neutrality, Logic of Consequences and Logic of appropriateness are used.

Med Säkerhetsrådets resolution 1325 (2000) som utgångspunkt : En komparativ studie av två handlingsplaner

Security Council resolution 1325 (2000) is about women, peace and security. Since the resolution was adopted several countries has made their own National Action Plan for implementation of the resolution.Sweden and Denmark are two of these countries. Resolution 1325 is one of the documents that each countries armed force has to relate to in international work.These countries can get to work together in international operations within the framework of the Nordic Defense Cooperation, NORDEFCO. This study is done by looking at similarities and differences in the action plans and whether they can be an obstacle for the countries to cooperate in an international operation.In this paper a comparative analysis of Sweden and Denmark's plans for the Security Council resolution 1325 will be done. The comparison is made based on the clauses of the resolution relating to the member states actions.In this paper, a qualitative text analysis to be carried out with sections of Resolution 1325 as a model for the comparison..

Ipv6 : En empirisk studie i hur Ipv6 protokollet har utvecklats de senaste åren.

Internet grows, so it?s cracking, soon will all IPv4 addresses be allocated and a solution is urgently needed. The new protocol, IPv6 is the solution to this problem. With a size of 128 bits against IPv4s 32 bits gives IPv6 a huge amount of addresses to distribute. The security addition that may be added manually in IPv4 is the standard with the new protocol.

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

Säkerhetsmedvetenhet hos hemanvändare

IT utgör en stor del av majoriteten av folks vardagliga liv. Smartphones och surfplattor har om möjligt ytterligare ökat vår användning av tekniska enheter och prylar på en daglig basis. Arbetet tas med hem i en större grad med hjälp av laptops, VPN och molnmöjligheter. Mail kan tas emot i princip var och närsomhelst på dygnet. Men hur bra är säkerheten? På arbetsplatsen hanteras mycket av IT-säkerheten och ansvaret för den ofta av erfarna och dedikerade anställda, men hur ser det ut hemma där användaren själv har ansvaret för sin IT-säkerhet?I denna studie analyseras och identifieras risker och problem vid hantering av olika aktiviteter relaterade till IT-säkerhet i hemmet.

Behovsanpassad bevakning

The market for security is one filled with great opportunities. The security services companies are numerous and diverse, the Swedish market is dominated by two large companies: Securitas Bevakning AB and Falck Security AB. In this study we have focused on the bigger of the two, Securitas. This report describes and analysis the security service branch and its surroundings in an involved manner. The target group of the result is mainly people within the security branch.

Vi lämnar spår på Internet : Integritet i relation till loggning på UpUnet

This study focuses on the integrity of students at Uppsala University that has used the university?s network, UpUnet. We?ve studied their opinions with the use of questionnaires that cover questions related to privacy and awareness about logging of data traffic.The results showed that more students than our hypothesis suggested were unaware of the surveillance on the network, and the majority of these also had a negative opinion towards logging of data traffic. However, we found that there were several relations between how the students responded on our questionnaire, and we?ve presented these in the analysis chapter towards the end of the essay..

Att plantera LÖK:ar för att undkomma osäkerheten: en studie av myndighetssamverkan kring introduktionen av nyanlända flyktingar och andra invandrare

The purpose of this project was to find an understanding for why public agents working with introduction of immigrants have decided to co-operate and co-ordinate their efforts. Another purpose was to gain insights in what characterizes this co-operation.Seven interviews were made with practitioners working with these questions on national-, regional- and local levels. The material gathered in this process was then analysed using governance theory and more specific the parts dealing with Joined- up government and Whole- of Government. Two analytic tools were used in the analysis: wicked problems and network.The first of these, wicked problems, was made operational by the use of insecurities. Analysing the interviews along these lines proved very useful in explaining why public agents have decided to try to work together.

Demokratins vara eller inte vara i Sydöstra Asien : En fallstudie av Vietnams förutsättningar för demokratisering.

This study aims at examine what kind of interest the European Union (EU) have in promoting a democracy process in Eastern Europe. The study is a descriptive case study where the case Ukraine is used to draw general conclusions. The questions asked to pursue the aim are: why does the EU want to promote a democracy process in Ukraine, what kind of methods does the EU use  and why is Russia trying to prevent the EU-Ukraine development and instead supporting a Russia-Ukraine development. In this study an analytical model is created and used to analyze EU:s way in promoting democracy in Ukraine. The analyze model consists of six steps used to describe the general promotion of a democracy process and it?s applied in the empirical analysis.

Solidaritet möter säkerhet - Vad 'immigranterna' får representera i immigrationspolitisk diskurs

This essay concerns the notion of how immigration politics, defined as a political discursive structure that explains and justifies how and why the movement of people into a state's territory is restricted and controlled, has come to present its purpose not as solidarity with the 'immigrants' wanting to enter the state but as a protective measure for the state's citizens. By using discourse theory combined with theories from the International Relations field I attempt to explain why and how such a discourse positions 'immigrants' as a threat to the state.First, I concentrate on why an immigration politics discourse would position 'immigrants' as a threat. I argue that in order for people to construct their identity, the 'outside' what they "are not" has to be repressed. In the same way, the state has to dislocate the "outside" and create threats to uphold its supremacy. These boundaries are set to create a feeling of predictability and security, and ultimately they are a way of making peoples' "world" coherent.

Från bortskämda monopolbarn till en kamp för överlevnad : En fallstudie om de traditionella flygbolagens omstruktureringar efter lågprisbolagens framväxt

The purpose of this paper is to examine how the traditional airlines' strategies are affected by the low-cost carriers emergence and their business model and in wich ways they can achieve profitability. Furthermore we also want to examine the factors that affect the airlines' efficiency and competitiveness.The results of this study shows that the growth of the low-cost carriers have affected the network airlines' strategies as they, among other things, had to also lower their fares. This has forced them to revise their cost and efficiency in their entire operation. The result has also shown that the network companies can not come down to the same level of low costs as the low-cost carriers, and must therefore examine their ability to increase revenues instead. .

Vem kliar min rygg? : En studie av företagares uppfattning om personliga nätverk

AbstractPeople and organizations that network with one another have during the past decades, at a larger extent than before, replaced classical hierarchies. These networks have become increasingly important, as the globalisation has amplified the pressure for focused and flexibleorganizations. There is a risk of restraining the inventiveness of the firm and force customers and suppliers into cooperation by a too great commitment and dedication to the network. There are two sides to every penny, positive and negative aspects of networking.Concerning the negative approach to networking, there is relatively little theory present. The theory is regarded an emerging theory.

<- Föregående sida 17 Nästa sida ->