Sök:

Sökresultat:

1934 Uppsatser om Network security - Sida 3 av 129

Human Security in Serbia: A Case Study of the Economic and Personal Security of Internally Displaced Persons

The aim of this study was twofold; firstly it sought to describe the human security situation of Roma IDPs and IDPs living in collective centers, secondly it tried to create an understanding for how the human security situation can affect IDPs capabilities to develop. The findings of the study were mainly based on a field study conducted in Belgrade, Serbia for two months. The results of the study were that IDPs in collective centers have a poor human security situation regarding basic income, employment, adequate housing and experienced personal security. Roma IDPs suffer from the same insecurities, but in addition also has poor human security in basic education and personal safety. Their stagnant human security situation proved to be the result of the inability to help IDPs by the actors involved in the relief work.

Säkerhetsansvarigas syn på supportrars beteende och dess inverkan på ishockeyevenemang : En kvalitativ studie om hur säkerhetsansvariga ser på supportrars beteende och dess inverkan på ishockeyevenemang

Are icehockey supporters a big problem in todays society? Is security required during icehockey events, and how is it implemented? This study was aimed to investigate the people at security positions and their view on fan behavior and it?s impact on icehockey events. It was a qualitative study were six interviews were made with people in charge of the security at different hockey clubs. The results showed that security managers overall saw a good fan culture, and that it created a wonderful atmosphere. Security managers worked a lot with dialogue with the supporters and they thought it had a good effect.

"Att bygga broar över murar" : en studie av ett kvinnligt ekumeniskt nätverk

The purpose of this master`s thesis is to examine how the contemporary changes in society display itself in the network Ecumenical Forum of European Christian Women EFECW and to increase the understanding of networks. My main questions are: What does the networks structure look like? What does the networks relationships look like? How is identity created in the network and what types of identities is created? The objectives are reached by using two methods, qualitative inquiries and document analysis. The inquiries were carried out to nine members in the network of different countries. The theoretical framework of the thesis is Manuel Castells theories of the network society, and the study is also placed in context by a presentation of previous research on the field.

Anbudskalkyl mer användbar i byggprocessen

This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.

Från neutralitet till öppenhet? : En studie av säkerhetspolitikens utveckling i Sverige efter kalla krigets slut

Abstract  Title: Från neutralitet till öppenhet? ? En studie av säkerhetspolitikens utveckling i Sverige efter kalla krigets slutAuthor: Jens KindhSupervisor: Patric LindgrenLinnaeus UniversityDepartment of Political ScienceSpring term 2012 When the Cold War ended, a new security situation was unfolded in Sweden. The purpose of this thesis is to describe and compare how the Swedish security policy is organized and how it has changed since the Cold War ended. To do that, I?m going to try answer the following questions:How is the Swedish security policy organized?What defence resolutions have affected the Swedish security policy after the Cold War ended?How has different political actions made its impact on the Swedish security policy after the Cold War ended?My theory is to try explain how the Swedish security policy has changed after the Cold War through a realism security perspective called traditional security, which refers to a realistic construct of the states security policy.

The Co-Creative Network

The purpose of this thesis is to explore the co-creation process and how value is created based on a service orientation using a network perspective. The thesis is studied from a social-constructionist philosophy, using a qualitative approach of data collection and the theoretical framework includes network theories, theories of service-orientation and co-creation. We have conducted semi-structured interviews with a small firm and its network, which consists of a customer, a supplier and a partner. We found that Håkansson?s ARA framework combined with Ballantyne and Varey?s triangulation of value-creating activities help to acquire an understanding of the actors? bonds, the resources? ties and the activity links that exist in a network.

En kvalitativ studie om svenska städers förväntningar och agerande i nätverket Eurotowns

Some researchers claim that we are witnessing the advancement of becoming a network society, and in spite of the different problems associated with the network form of organization, many cities still choose to engage in different types of networks. On account of that the aim of the study is to examine which expectations Swedish member cities of the network Eurotowns might have, and if their actions in the initial period of engagement in Eurotowns mainly could be explained by ?Logic of Consequentiality? or ?Logic of Appropriateness?.A qualitative research method was used and a major part of the empirical material consists of the information given by the interviewees.Regarding the expectations Swedish member cities have on Eurotowns, the result showed that five main areas could be identified mutual resource exchange, activities, breadth, security and meeting place. The results also showed that the actions of Swedish member cities may vary between ?Logic of Consequentiality?, ?Logic of Appropriateness? or a combination of the both logics.Furthermore the study also provides empirical evidence supporting the previously theoretical criticism expressed regarding the central assumption that the strategic actions of an actor can be regarded as a direct consequence of the mutual resource dependency..

En känsla av trygghet : Patienters perspektiv inom palliativ vård

Background: Every year 56 million people die around the world and it is estimated that 60% of these people are in need of palliative care. It has been shown that patients in the palliative care experienced their situation as uncertain. When life no longer was certain, the patients tried to live their life day by day and make the best of it. Problem: When patients were diagnosed with an incurable disease the future became unsure, because their life would come to an end. Therefore patients with a palliative diagnosis could be in need of experiencing feelings of security.

Utvärdering av den upplevda användbarheten hos CySeMoL och EAAT med hjälp av ramverk för ändamålet och ISO/IEC 25010:2011

This report describes a study aimed at uncovering flaws and finding potential improvements from when the modelling tool EAAT is used in conjunction with the modelling language CySeMoL. The study was performed by developing a framework and applying it on CySeMoL and EAAT in real life context networks.The framework was developed in order to increase the number of flaws uncovered as well as gather potential improvements to both EAAT and CySeMoL. The basis of the framework is a modified version of the Quality in use model from ISO/IEC 25010:2011 standard. Upon the characteristics and sub characteristics of this modified model different values for measuring usability where attached. The purpose of these values is to measure usability from the perspectives of both creating and interpreting models.

IT-säkerhetspolicy ? efterlevs den av anställda?

ABSTRACT The main purpose of IT security policies is to protect companies against intrusion and unwanted spread of information. Statistics show that IT related crimes tend to increase and because of that it is important, from the company?s side of view, to be well prepared. The IT security policy is an important part of that preparation. A lot of the crimes related to IT can be deduced indirectly to employees at the companies where the crime takes place.

Sårbarhetsanalys av ett infrastrukturnätverk - Användning av nätverksteorier för sårbarhetsanalys av komplexa nätverk

The aim of this report is to examine the possibilities to use network theories to perform vulnerability analysis on complex networks. The scoop of this work is also to improve the possibilities to chart, analyze and present the vulnerability in a power grid. In this report it has been, using power outage statistics, possible to verify, that network theories can be used to evaluate the vulnerability of an infrastructure network. However further studies to establish values on how vulnerable a network is are needed..

Diskussioner om trygghet i planeringssammanhang :

This is a bachelor?s essay in the landscape architect programme in Alnarp. The purpose of the essay is to describe discussions about security in planning contexts in Sweden. Written material from three levels of the discussions has been studied: Swedish research, governmental directives and practisers. I have tried to obtain a variation in types of material.

Säkerhet till varje pris : En jämförande studie om utvecklingen av privat säkerhet från Kuwaitkriget till Irakkriget

The purpose of this essay is to examine the development of the use of private securitycontractors in Iraq. The reason is that there has been a considerable increase of the number ofprivate security firms operating in Iraq during the last couple of years. The legislation in thefield of private military and security is indistinct and my hypothesis is that the lack of nationaland/or international legislation can be connected to the increased globalization. To come toany conclusions about this I have chosen to make a comparative study between the two casesthe Gulf War and the War in Iraq which started in 2003. In this comparison, I ask thefollowing questions: 1) Are there any signs of anarchy in the field of private security duringthe Gulf War respectively the last War in Iraq? 2) In what way has the use of private securitycontractors changed from Case 1 to Case 2 ?According to my research, there were signs of anarchy in the field of private security bothduring the Gulf War and during the latest war in Iraq.

Analytiker och riktkurser: - Varför bry sig?

The purpose of this master thesis is to evaluate how the current share price and market consensus affect security analysts target price and if an investor should pay any attention to it. Empirical data is primarily collected from qualitative interviews with ten security analysts but also from a quantitative e-mail survey. Our main finding is that security analysts are indeed affected by each others earnings forecasts as well as the current share price. This is not strange, it is in several aspects rational. Security analysts has often nothing to gain by standing out too much and not either by spending too much time trying to create their own opinions due to lack of time or the complexity of what is analyzed.

Privata säkerhetsföretag - Våldet som handelsvara

This essay tries, in different levels, to explain and create a deeper understanding for the phenomena ?private security companies?. By using Mary Kaldors theory about new wars, I will come to the conclusion that the insecurity that these wars create is an important part in understanding the emergence of a security need that these private security companies can provide. Later I investigate and explain howthe neoliberal privatization policy that is spreading through the world today has laid ground for development of the private security industry. When I have answered these questions I analyze how the private security companies can affect the state, war and peace both positively and negatively.

<- Föregående sida 3 Nästa sida ->