Sök:

Sökresultat:

1934 Uppsatser om Network security - Sida 10 av 129

Finns kvinnor i säkerhetspolitik? : En undersökning av den svenska säkerhetiseringsprocessen avseende svenskt deltagande i den militära insatsen Minusma i Mali utifrån ett feministiskt perspektiv

Scientists argue that gender affects foreign policy and security policy, that ideas of gender are inconstant and that there is a lack of feminist perspectives in International Relations. The changes seen in the global security context may have challenged the way politicians and scientists understand war and its impacts, and led to increased gender awareness.Using securitization theory and feminist international relations theory, the aim is to examine how women and men are being spoken of in the Swedish foreign policy discourse regarding participation in the UN-led stabilization mission Minusma in Mali. By applying a feminist perspective on the securitization process, the intention is to increase the knowledge of whether there is gender awareness in this context.The result shows that there is limited gender awareness. There is minor consideration for the conflict?s different implications on the situation for women and men.

Människan och lärarprofessionen : En livsberättelse

The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.

Koncern som tillväxtinkubator för småföretag : ? En fallstudie i ett shared service centers möjligheter attstödja entreprenöriella småföretag

???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.

Veto: En motivanalys av FN:s säkerhetsråds fem permanenta medlemmars agerande i konflikten i Syrien.

Aim: The aim of this study is to analyse the possible motives behind the actions of the five permanent members of the UN Security Council in relation to the conflict in Syria. The background of this aim is the Arab Spring and the protests and violence that have followed the uprising. While, in Libya, the UN Security Council adopted resolutions that allowed sanctions against the Libyan government, no such resolutions have been adopted yet in Syria.Theory: The principal theory of the analysis is Stephen D. Krasner´s theory on sovereignty.Method: I have researched various resolutions and statements done in the Security Council, together with official statements from the actors, through Hadenius´ motive analysis methodology and Gilje & Grimen and Ödmans theories on hermeneutics.Conclusion: The conclusion of the analysis is that there, in the case of Syria and Libya, are two different parties in the Security Council. One that stands for sovereignty and one that stands for intervention.

Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer

Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.

Att tyda tecknen -En alternativ syn på förändringarna av Japans säkerhetspolitik

Japan's foreign and security policy has seen some substantial changes as a result of events like the first Gulf war and 9/11th. This has been taken as proof, by some, that Japan is abandoning its antimilitaristic stance and pursuing a more traditional hard power role through military means. This essay aims to explore if these shifts have coincided with any substantial shifts away from antimilitarism, which has had a strong influence on the country's security policy since the end of WW2.To do this I use constructivist theory, specifically regarding the impact of norms and identities on states security policy and briefly look into the problem of actor designation. The thematic focus is on security policy, from a narrow perspective, and thus I examine areas like the input and output to the Japanese military and the actual applications of this force. State identity is used to explore the prevalence of nationalistic sentiments and support for anti militarism in the public opinion and the political elite.The result of this study points to the further relevance of constructivist theory and especially the application of norms and identity.

Hörbarhet i praktiken : En Actor Network analys av arbetet kring hörbarhet

Abstrakt  Tv-branschen är en jätteindustri som styrs av ett fåtal stora sändningsnätverk. I Sverige är den största distributören Sveriges Television (SVT) och på grund av detta så är sannolikheten att personer som arbetar inom ljud i Sverige någon gång kommer att arbeta på projekt för dem väldigt hög.I min uppsats har jag utfört en Actor Network-analys av empiriska studier jag utfört på postproduktionsbolaget Europa Sound and Vision. Med hjälp av analysen vill jag undersöka vad begreppet ?god hörbarhet? består av och därmed kunna definiera uttrycket tydligare.Jag jämför sedan SVTs syn på hörbarhet med den jag fått fram genom dessa studier för att till slut ändra på den nuvarande synen och på det regelverk SVT har..

Så designar du användarvänliga interna kommunikationsnätverk

Companys usually have intern communication platforms where employees can gather information and communicate with eachother. These networks are not public which leads to less resources spent on development. If this network is also used as a work tool may inadequate usability decrease work effeciency. Thats why we, by using known design principles, evaluated an already existing network of this kind along with interviews and think out loud tasks for users. Four users had to do some tasks while they explained how they went through step by step to solve those. This report culminates into a couple of guidelines which can be used to create a user friendly network. The problems that prevented users to feel in control when working resulted in the following guidelines: Create shortcuts of frequently used functions.

Athena - En intelligent och flexibel säkerhetslösning för transportbranschen

The project team has chosen to carry out the project itself. This is to be able to work more flexibly in the product development process and not be guided by some guidelines.Every day, we read in the media about a new truck burglary. The problem has become so common that we do not even notice it in the media. Each year the theft of 1 billion of Sweden and the entire 82 billion in Europe in 2008. This is an increase of 10 billion by 2007.

European Union Politics ? en tidskrift och dess invisible college

Author Cocitation Analysis (ACA), multidimensional scaling (MDS) and Social Network Analysis (SNA), has been used to analyze and visualize the invisible college of the journal European Union Politics. The concept invisible college was first introduced in the fifteenth century, through the creation of the ?the Royal Society of London?, and it was reintroduced in the 1960:ies and the 1970:ies by scholars such as Price and Crane. It is said to have been interpreted in as many ways as there are authors who have used it. Here it has been used synonymously with the term citation network.

Föräldraskap och neuropsykiatriskt funktionshinder : upplevelse och påverkan av diagnos

The aim in the study is to search for a deeper understanding of how parents experience a neurological diagnose of the child and how this affects the parenthood. Parenthood was seen in a systemtheoretical perspective as a social construction. The narrative method was used in two lifestory parentinterviews. The analysis was made from parenthood. The result formed stories about parenthood with children having neuropsyciatric functional disability who even came to be a woman?s struggle.

ISIT-modellen : Vägledning för att realisera en verksamhets informationssäkerhetsmål

The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.

?Man bara är en vanlig människa tillsammans med andravanliga människor, och det är väldigt skönt.? : Erfarenheter av det informella sociala nätverket hos personer med en psykosdiagnos

Purpose:mental illness and the effect it has on individuals social network and relationships, and vice versa.The purpose of this study is to shed light on the rarely mentioned subject of severe Method:analysis was performed on a total of 15 interviews, which consists of three individuals with severe mental illness. The focus of the study was the subjects? description of the social network, excluding clinicians and other professionals.This study is inspired and conducted in a Grounded Theory manner. A secondaryFindings:may it be with specific individuals or groups. They describe the importance of surrounding themselves with people who do not judge them and it is through them they get validated.Places have been emphasised as having special meaning for the social interaction and overall wellbeing for the subjects.There is active actions for social interactions/relationships taken by the subjects,Conclusion:their social network.

Snabb och säker roaming i WLAN

This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market. The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative).

Förväntningar på Framtida Mobila Tjänster

Today?s society is very focused around technology and something that is very popular is the usage of mobile devices such as Smartphones or Tablet computers. One of the reasons why these devices are so popular, is because of the large amounts of services or ?apps? that they can provide for the user. They can do a lot of things that makes everyday living easier for the users.The focus of this study is to find out what kinds of mobile services the users of these devices are expecting and/or wishes to see in the future and what is required to be able to develop and use these services in a good way.We started of the study by searching for earlier studies on the same or similar subjects.

<- Föregående sida 10 Nästa sida ->