Sök:

Sökresultat:

1941 Uppsatser om Network security and countermeasures - Sida 3 av 130

När Arktis isar smälter tinar världen upp? : En kvalitativ analys av det vidgade säkerhetsbegreppet i den svenska strategin för den arktiska regionen

This study is called When the ice of the Arctic melts is the world defrosting? and written by Rebecca Fröling.The purpose of the study is to investigate how the concept ?security? is used in the Swedish arctic strategy and why the concept is described in that way. The debate of the concept ?security? has been going on for years, but the debate is still present today. What we put in to the concept is operative for how we regard and discuss security and security politics.To analyze the strategy I used two theories, one with a traditional approach and one with a critical approach to security: Realism and Copenhagen School.The method that has been applied to the study is qualitative content analysis, to be able to analyze the text on the depth.

Livsmedelssäkerhet, konflikt och hållbar fred - en teoriutvecklande studie om matens makt

In our world, more than two billion people are living under insecure food conditions and more than eight hundred million people are estimated to be starving. The majority of these people live in developing counties which are poor and often subject of civil war. The past fifty years the main subject of security analysis has been the sovereign and rational state and the threats have been viewed in terms of military and weapons of mass destruction. This has come to change over the last decades and security as a concept has broadened, which better represents the reality of today. Within this broader conceptualization of security the main referent of security is the individual, rather than the state, and threats are not only analyzed from a military point of view, but also seen as threats against human rights and freedoms.

Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker

For organizations that handle sensitive information, IT governance and information security are necessities in order to maintain credibility and to conduct its business efficiently. There are several known processes to increase security governance ? which is a fusion of information security and IT governance.This master thesis examines if organizations use recognized processes and if it in that case would lead to higher security. The study is qualitative and conducted in the financial sector and based on Best Practice frameworks of the security governance in Swedish banks. Data collection was done through interviews and surveys that were triangulated to get a gathered picture of the quality of the security governance activities.

Human Security in Serbia: A Case Study of the Economic and Personal Security of Internally Displaced Persons

The aim of this study was twofold; firstly it sought to describe the human security situation of Roma IDPs and IDPs living in collective centers, secondly it tried to create an understanding for how the human security situation can affect IDPs capabilities to develop. The findings of the study were mainly based on a field study conducted in Belgrade, Serbia for two months. The results of the study were that IDPs in collective centers have a poor human security situation regarding basic income, employment, adequate housing and experienced personal security. Roma IDPs suffer from the same insecurities, but in addition also has poor human security in basic education and personal safety. Their stagnant human security situation proved to be the result of the inability to help IDPs by the actors involved in the relief work.

Säkerhetsansvarigas syn på supportrars beteende och dess inverkan på ishockeyevenemang : En kvalitativ studie om hur säkerhetsansvariga ser på supportrars beteende och dess inverkan på ishockeyevenemang

Are icehockey supporters a big problem in todays society? Is security required during icehockey events, and how is it implemented? This study was aimed to investigate the people at security positions and their view on fan behavior and it?s impact on icehockey events. It was a qualitative study were six interviews were made with people in charge of the security at different hockey clubs. The results showed that security managers overall saw a good fan culture, and that it created a wonderful atmosphere. Security managers worked a lot with dialogue with the supporters and they thought it had a good effect.

"Att bygga broar över murar" : en studie av ett kvinnligt ekumeniskt nätverk

The purpose of this master`s thesis is to examine how the contemporary changes in society display itself in the network Ecumenical Forum of European Christian Women EFECW and to increase the understanding of networks. My main questions are: What does the networks structure look like? What does the networks relationships look like? How is identity created in the network and what types of identities is created? The objectives are reached by using two methods, qualitative inquiries and document analysis. The inquiries were carried out to nine members in the network of different countries. The theoretical framework of the thesis is Manuel Castells theories of the network society, and the study is also placed in context by a presentation of previous research on the field.

Anbudskalkyl mer användbar i byggprocessen

This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.

Från neutralitet till öppenhet? : En studie av säkerhetspolitikens utveckling i Sverige efter kalla krigets slut

Abstract  Title: Från neutralitet till öppenhet? ? En studie av säkerhetspolitikens utveckling i Sverige efter kalla krigets slutAuthor: Jens KindhSupervisor: Patric LindgrenLinnaeus UniversityDepartment of Political ScienceSpring term 2012 When the Cold War ended, a new security situation was unfolded in Sweden. The purpose of this thesis is to describe and compare how the Swedish security policy is organized and how it has changed since the Cold War ended. To do that, I?m going to try answer the following questions:How is the Swedish security policy organized?What defence resolutions have affected the Swedish security policy after the Cold War ended?How has different political actions made its impact on the Swedish security policy after the Cold War ended?My theory is to try explain how the Swedish security policy has changed after the Cold War through a realism security perspective called traditional security, which refers to a realistic construct of the states security policy.

The Co-Creative Network

The purpose of this thesis is to explore the co-creation process and how value is created based on a service orientation using a network perspective. The thesis is studied from a social-constructionist philosophy, using a qualitative approach of data collection and the theoretical framework includes network theories, theories of service-orientation and co-creation. We have conducted semi-structured interviews with a small firm and its network, which consists of a customer, a supplier and a partner. We found that Håkansson?s ARA framework combined with Ballantyne and Varey?s triangulation of value-creating activities help to acquire an understanding of the actors? bonds, the resources? ties and the activity links that exist in a network.

En kvalitativ studie om svenska städers förväntningar och agerande i nätverket Eurotowns

Some researchers claim that we are witnessing the advancement of becoming a network society, and in spite of the different problems associated with the network form of organization, many cities still choose to engage in different types of networks. On account of that the aim of the study is to examine which expectations Swedish member cities of the network Eurotowns might have, and if their actions in the initial period of engagement in Eurotowns mainly could be explained by ?Logic of Consequentiality? or ?Logic of Appropriateness?.A qualitative research method was used and a major part of the empirical material consists of the information given by the interviewees.Regarding the expectations Swedish member cities have on Eurotowns, the result showed that five main areas could be identified mutual resource exchange, activities, breadth, security and meeting place. The results also showed that the actions of Swedish member cities may vary between ?Logic of Consequentiality?, ?Logic of Appropriateness? or a combination of the both logics.Furthermore the study also provides empirical evidence supporting the previously theoretical criticism expressed regarding the central assumption that the strategic actions of an actor can be regarded as a direct consequence of the mutual resource dependency..

En känsla av trygghet : Patienters perspektiv inom palliativ vård

Background: Every year 56 million people die around the world and it is estimated that 60% of these people are in need of palliative care. It has been shown that patients in the palliative care experienced their situation as uncertain. When life no longer was certain, the patients tried to live their life day by day and make the best of it. Problem: When patients were diagnosed with an incurable disease the future became unsure, because their life would come to an end. Therefore patients with a palliative diagnosis could be in need of experiencing feelings of security.

Utvärdering av den upplevda användbarheten hos CySeMoL och EAAT med hjälp av ramverk för ändamålet och ISO/IEC 25010:2011

This report describes a study aimed at uncovering flaws and finding potential improvements from when the modelling tool EAAT is used in conjunction with the modelling language CySeMoL. The study was performed by developing a framework and applying it on CySeMoL and EAAT in real life context networks.The framework was developed in order to increase the number of flaws uncovered as well as gather potential improvements to both EAAT and CySeMoL. The basis of the framework is a modified version of the Quality in use model from ISO/IEC 25010:2011 standard. Upon the characteristics and sub characteristics of this modified model different values for measuring usability where attached. The purpose of these values is to measure usability from the perspectives of both creating and interpreting models.

IT-säkerhetspolicy ? efterlevs den av anställda?

ABSTRACT The main purpose of IT security policies is to protect companies against intrusion and unwanted spread of information. Statistics show that IT related crimes tend to increase and because of that it is important, from the company?s side of view, to be well prepared. The IT security policy is an important part of that preparation. A lot of the crimes related to IT can be deduced indirectly to employees at the companies where the crime takes place.

Sårbarhetsanalys av ett infrastrukturnätverk - Användning av nätverksteorier för sårbarhetsanalys av komplexa nätverk

The aim of this report is to examine the possibilities to use network theories to perform vulnerability analysis on complex networks. The scoop of this work is also to improve the possibilities to chart, analyze and present the vulnerability in a power grid. In this report it has been, using power outage statistics, possible to verify, that network theories can be used to evaluate the vulnerability of an infrastructure network. However further studies to establish values on how vulnerable a network is are needed..

Diskussioner om trygghet i planeringssammanhang :

This is a bachelor?s essay in the landscape architect programme in Alnarp. The purpose of the essay is to describe discussions about security in planning contexts in Sweden. Written material from three levels of the discussions has been studied: Swedish research, governmental directives and practisers. I have tried to obtain a variation in types of material.

<- Föregående sida 3 Nästa sida ->