Sök:

Sökresultat:

1934 Uppsatser om Network security - Sida 6 av 129

Samarbete och nätverksbyggande över kommunens gränser : En studie om Norrköpings kommuns medlemskap i Sweden Emilia Romagna Network utifrån ett aktör-nätverksperspektiv

Social networks have increased significantly during the latest decades, but what does the cooperation include and how does the network processes look like? Networks are not specific for communities in the 2000?s or for that matter human organisations, but the ability to build networks and introduce more actors to the organisation have become easier with today?s communication technology. The study is about the Norrköping Municipality membership in the transnational network Sweden Emilia Romagna Network (SERN). It gives an insight into how networking and cooperation can be seen by politicians and officials, based on mission statements and the reason why a municipality choose to participate in transnational networks. The study aims to examine how Norrköping Municipality uses the SERN network and what the network have resulted in since the beginning of the municipality membership in 2005. It is a qualitative study which involves interviews with officials and politicians from the Municipality of Norrköping and textual material from SERN?s strategy documents and policies.

Clemens en August - A Network Perspective

The purpose of the paper is to explore of what importance network relations are to the small fashion company Clemens en August. Clemens en August is a new German fashion label, which has the goal to become established in the high-end segment. The company uses an innovative sales strategy, directly distributing its products to the end costumer. The theories used will serve as a tool to analyze Clemens en August 's strategy from a network perspective. As the Bachelors thesis nr: 12464 ?Clemens en August ? A Network Perspective?, authors; Malin Elmlid, Biancastella De Angelis and Carsten Juldorf, date of approval 2006-01-11, contains delicate data about the studied company we have decided to classify it as secret.

Nätverk i landsbygdsföretag : fallet Mälarlandet

The interest in companies that are based outside the cities has grown, and many of these companies have focused their activities around service. The countryside companies meet some difficulties in marketing and communication with other entrepreneurs. A network with service based companies in the countryside could help the individual companies to promote themselves and also give inspiration and new ideas to develop their business. The aim of this study is to investigate how a countryside network can be organized but also what conditions is needed to make the network function. The theory is based on a literature study of the three major topics "countryside", "networking" and "marketing".

Från soptipp till naturreservat : En studie av makt i Lövsta-Kyrkhamn-Riddersvik genom actor-network theory

This paper investigates, through an actor-network theory perspective, how the recreation area Lo?vsta-Kyrkhamn-Riddersvik northwest of Stockholm has developed from being a dumping site into becoming a nature reserve. This investigation also tries to describe and explain which values that have been promoted in the area by the local voluntary associations and companies. Lo?vsta-Kyrkhamn-Riddersvik has been inhabited for more than 3000 years, originally with farming as the most important business.

Människohandel som en säkerhetsfråga

The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.

Framtagning av en informationssäkerhetspolicy

This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.

Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling

The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.

GPS-­baserad virtuell geografisk inhägnad för mobil enhet

The aim of this paper is to find an algorithm to establish and maintain a virtual enclosure around a mobile unit. The area may take any form and should be scalable up to and including national borders. The enclosure is managed on the mobile unit. The target system is Android. Smartphones, tablets and more recently, cameras is examples of mobile units. A modern mobile unit is part of a computer network.

Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv

The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.

Konsten att styra konst: - styrning av kreativa projekt inom en nätverksorganisation

This paper describes a case study of the largest film production ever conducted in Scandinavia. The study aims at explaining the complex relationships in the network structure in which the project took place. Coordination of creative projects carried out in a network context, includes handling conflicting interest and contradictions. Creativity needs space and freedom while projects need structure and coordination, whereby controlling these projects becomes complex. Adding to the complexity, does the loose form of organization that the network structure represents, without any long term structure.

Att göra nya val - om nätverkets delaktighet i ungdomars väg ut ur ett missbruk

 The aim of this study was to examine how young people, who have been treated for their misuse and/or to learn to handle a parent's misuse, portrayed the network's implication in their wishes about improving their lives, to make new choices. The network included members of nuclear family, relatives, important persons at school/work and friends. The ?professional network? (therapists and social workers) also became a part in the young people's life during a period. The main issues of this study concerned differences in their experiences of the young persons´ network relationships in before, during and after completed treatment.

En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall. These major tests were divided into five smaller semi­ tests. The first semi­test without a firewall suffered from a virus or worm attack resulting in loss of data and log files.

Betalningssätt via webben : En studie om konsumenters ansedda kunskap angående olika betalningssätt via webben och deras säkerhet

The e-commerce in Sweden has increased each year for the past several years, but still just over half of all the consumers feels worry about payment security. This could be the reason why over half of the consumers just shopped about one time on the Internet during the whole year of 2009. Another reason could be that the many consumers have a lack of trust to the different payment methods that are available during payment on the Internet, because they might don't possess enough knowledge regarding the payment methods and their security. If the consumers were to gain more knowledge about the payment methods and their security, it may lead to that the they would feel more comfortable when shopping online, and do it more frequently. It is this that will be investigated in this paper.The purpose of the paper  is to research if consumers believed knowledge concerning the different payment methods available on the web and their security influence the consumers trust in the payment methods.

Det etniska säkerhetsdilemmat-en idealtypsanalys över etniska konflikter

In the world after the Cold War, internal and ethnic conflicts have been predominant. Ethnic conflicts have their own theories on why they erupt and what can be done to solve them. This essay seeks to analyze how the Ethnic Security Dilemma can explain the causes, and possible solutions, of today´s armed ethnic conflicts.By making an ideal types typology over different types of ethnic conflicts, and then analyzing the Ethnic Security Dilemma´s impact on each conflict type.

Säkerhet i smarttelefoner : En jämförelsestudie mellan bärbara datorer och smarttelefoner i verksamheter

Smartphones have become more common as business tools within the workplace. With its many features and great flexibility, the smartphone has stormed the business world and become an alternative or complement to the laptop. As these mobile units' popularity has increased, the interest of businesses to invest in this new technology has increased, but has security kept up with the technology developments?This study aims to conduct a study to see if the companies in the IT industry have the same safety awareness for smart phones to laptops.The study shows that companies have greater safety awareness and higher safety requirements for laptops than smartphones. Meanwhile, both end-users and management are well aware of the risks and threats that the smartphone is facing..

<- Föregående sida 6 Nästa sida ->