Sök:

Sökresultat:

1941 Uppsatser om Network security and countermeasures - Sida 5 av 130

Samarbete i nätverk : En studie om hur främjande av samarbete realiseras i ett orkestrerande affärsnätverk

The network with its virtual business structure challenge the established vertical business structure. Part of the network theory that has developed focuses on relationships that forms B2Bnetworks. One way to create a B2B-network is for independent businesses to form a organization promoting co-operation. For co-operation to be successful it requires well thought-out actions, but a lack of how these actions are implemented have been noticed. This study explores how encouragement of co-operation can be done practically.

Lika men ändå olika ? revisorns nätverk i stora byråer

Auditing demands knowledge in many diverse areas. To be able to provide all this knowledge it is necessary for the auditor to have access to persons with special skills. Through these contacts the auditor builds up a business network that brings support in the daily work. Our purpose with this study is to find out how auditor?s network in big auditing firms is organized and to show how they use their network.

Attrahera, främja och behålla kvinnorna i IT-branschen : En studie om det kvinnliga nätverket Geek Girl Meetup

The aim of this study is to examine the conditions for participation in women's networks for the members of the Geek Girl Meetup network, to expose the members' perceptions of the IT industry and to highlight the network's impact on women's situation in the IT industry. The empirical material consists of interviews and a survey. The interviews were carried out with the network leaders for a better understanding of the network structure and why it exists. The survey completed by the members illuminates how the members perceive the networks function in the IT industry and what kind of an impact the network has on the members and if it has any at all. The result of the study shows that participation in networks like Geek Girl Meetup can be a model for promoting gender equality and improving conditions for women in the IT industry.

Fo?rutsa?ttningar fo?r AU som sa?kerhetsgemenskap avseende inomstatliga konflikter med transnationell inblandning

The theory of ?security communities? is generally understood as ?dependable expectations of peaceful change? between groups and whether or not the African Union can be said to meet that criteria has been contested in the research community. One of the central disagreements lie in the nature of the region?s conflicts, of which a majority are intrastate but with tendencies of transnational involvement. This paper seeks to understand how extensive this involvement is and how it affects the possibility of classifying the African Union as a security community.

Reading the Common Foreign and Security Policy of the European Union in terms of the issue of Terrorism : An analysis on the evolution of the CFSP of the EU under the issue of Terrorism

In the post Cold-War era, world politics was transforming itself through its emerging complex issues such as terrorism and influential and interdependent actors such as the European Union. In this new era, the European Union was developing its Common Foreign and Security Policy pillar both to present a coherent and unified EU policy and to prove its political potent in order to become an influential actor on world politics. On the other side, security environment was also transforming its content through emerging actors and issues. As one of the most prominent actors of the world politics, the EU was influenced by the transformation of security environment, whose economic ?soft power? proved necessary but insufficient for being a global power in this emerging security environment.

Lika men ändå olika ? revisorns nätverk i stora byråer

Auditing demands knowledge in many diverse areas. To be able to provide all this knowledge it is necessary for the auditor to have access to persons with special skills. Through these contacts the auditor builds up a business network that brings support in the daily work. Our purpose with this study is to find out how auditor?s network in big auditing firms is organized and to show how they use their network.

IT-relaterade hot - professionella IT-tjänstemäns farhågor och möjligheter

The objective of this thesis was firstly to examine the possibilities of creating a universal tool for evaluating IT-security. When all the material was gathered we saw that we had strayed away from our subject and that our focus was on IT-threats and IT-professionals apprehensions and possibilities on the subject. The purpose of this thesis was there after to find and identify threats and counter measures in publications and later discuss these with IT-professionals. We found and identified several threats that the professionals encountered in their work. These threats ranged from techniques used by hackers to threats that can arise when the users on the network are poorly educated.

Mänsklig säkerhet i Sudan- För vem och mot vad?

The concept of security is a contested one. The United Nations definition in UNDPs Development report of 1994 is the most authoritive and commonly cited. The civil war in Sudan has led to 2 million deaths and over 5.5 million refugees. In a resolution from 2005, the UN decided that the war in Sudan was a threat to international security and peace. The 10th of January UN decided that a peace commission ought to be send with 10 000 military and civil men including 700 policemen.The main purpose of this thesis is to improve our knowledge of those factors which can cause an increased risk of conflict within a state, and how that can affect the social conditions for individuals.

Network Coopetition ? Samarbete mellankonkurrerande aktörer inom hälso- och sjukvården : En fallstudie av vårdkedjan för patienter ibehov av neurokirurgisk vård inom Stockholms län ochGotlands län

Det övergripande syftet med den här avhandlingen var att utreda om network coopetition, samarbete mellan konkurrerande aktörer, kan öka värdeskapandet inom hälso- och sjukvården. Inom hälso- och sjukvården är network coopetition ett ämne som fått liten uppmärksamhet i tidigare studier. För att besvara syftet utvecklades en modell för network coopetition inom hälso- och sjukvården. Modellen applicerades sedan på en del av vårdkedjan för patienter i behov av neurokirurgisk vård.Resultaten från avhandlingen visar att: (1) Förutsättningarna för network coopetition i vårdkedjan för patienter i behov av neurokirurgisk vård är uppfyllda. (2) Det finns exempel på horisontell network coopetition i den studerade vårdkedjan.

BSR Prestandaverktyg / BSR Performance tool : Prestandamätning via diagnosuttag över CAN / Performance measure via diagnostic socket over CAN

 This abstract describes the bachelor degree thesis in computer technology at Växjö University. The company BSR in Växjö has requested an application that can measure a cars performance, with attributes like acceleration times and engine power estimation. The communication between car and computer is via the USB port on the computer and the OBD-II socket on the car with the network protocol CAN, controller area network. Cars from VAG have been the primary focus group and the application has been tested on a Volkswagen Passat CC from 2009. The system is developed in the programming language C# in the environment Visual Studio with the framework .NET.

Artificiell intelligens : Prestanda hos beteendeträd och Hierarchical Task Network

Detta arbete undersöker skillnader i tidseffektivitet mellan beteendeträd ochHierarchical Task Network. En enklare spelprototyp av typen top-down 2D shoot-emup implementerades. Spelprototypen använder två typer av autonom motspelare så kallade botar. En bot för beteendeträd och en bot för Hierarchical Task Network. Spelprototypen mäter körtiden för varje typ av bot i sex olika situationer.

Mellan säkerhet och mänskliga rättigheter : en studie av den svenska officiella migrationsdiskursen

This paper focuses on the Swedish migration discourse and investigates if and to what extent it is dominated by a security perspective. Analysing a number of official texts and documents I want to show how the discourse describes migrants and what implications this carries with it for the migrants and for the Swedish migration politics. Through discourse analysis I have analysed whose security that is prioritised, the Swedish or the refugees, who is the refugee and the asylum seeker, and who is the illegal migrant in the Swedish official migration discourse. As a theoretical frame for the analysis I have used theories on migration and security. These include theories on the securitisation of politics, the globalisation and the creation of political identity from the nation state perspective and theories on the connection between migration and security.My results show that a security discourse is dominating the Swedish official migration discourse and is therefore defining our reality and the identities of refugees, asylum seekers and illegal migrants.

Är handdatorer säkra nog för hälso- och sjukvården?

The aim of this report is to discuss computer security in handheld computers and to find out the appropriate security level that must be implemented to be able to use handheld computers within the Swedish healthcare system. Most healthcare centers are using some kind of electronic journals for their patient´s data today, but there are still a number of clinics that are usingthe old paper-system. On a few places in Sweden the use of handheld computers at the clinics has already started, but in the United States the use of handheld computers in the medical area is already widespread and from this we can see a lot of different situations where it is useful and effective to work with handheld computers. The security demands on patient´s journals are high and regulated in both Swedish law and regulations from the National Swedish Board of Health and Welfare. The law does not have any substantial demands, but states that there should be an adequate security level based on the nature of the information and the costs.

Jakten på en trygg oas i en torr öken : En studie om varför studententreprenörer väljer att delta i självorganiserade företagsnätverk

The aim of this study is to, by developing ideal types, describe why studententrepreneurs participate in self organised business network. The investigation is based on answers from 41 participants in the business network ?Företagare på Lnu?, as well astwo semi-focused groups, which where analysed by using Webers (1978) ideal types.The investigation shows that there are several reasons for student entrepreneurs to participate in self organised business network. For instance some people participate to gather knowledge from other student entrepreneurs for their own future, since they have an idea of soon starting their own business. Others participate just for the fun of knowing what?s going on at the university..

Säkra kommunikationskanaler i en distribuerad heterogen miljö

The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a secure manner.

<- Föregående sida 5 Nästa sida ->