Sökresultat:
1873 Uppsatser om Online payment security - Sida 26 av 125
Distriktssköterskors dokumentation i omvårdnadsjournal vid telefonrådgivning.
The aim of the study was to describe what district nurses, who work with telephone- advice, document in patient record, to be able to develop their documentation. The Authors have examined 50 patient records. The examination tool is collected from ?Lokal anvisning för hälso- och sjukvården I Södra Älvsborg?. The audit areas was record keeping, review and planning, realization, individual nursing and the patients participation, information, education and agreement.
?Why so serious??? en kvalitativ undersökning av folkbiblioteks användning av Facebook.
The purpose of this bachelor thesis is to describe how Swedish public libraries use the online social network Facebook and its functions. Our focus of this study lies on how the librarians use the network and what experiences they?ve made. The questions we wanted to answer were:? How do the libraries in this study work with Facebook and its services? ? What do the interviewed librarians think about working with Facebook as an instrument?? What pros and cons can be identified from working with Facebook?The methodology used for this study was qualitative interviews.
Fredsengagemang i en os?ker tid: En studie av hur svenska fredsaktivister navigerat sitt fredsengagemang sedan Rysslands fullskaliga invasion av Ukraina
This case study examines how individuals involved in the Swedish peace movement have navigated their peace activism due to the intensified security debate which followed Russia?s full-scale invasion of Ukraine in February 2022. By conducting semi-structured interviews with peace activists involved in the Swedish peace organization Svenska freds- och Skiljedomsf?reningen, the study aims to provide insight into how peace activists, and the peace movement as a whole, can be affected when the security debate intensifies. By applying a theoretical framework consisting of Political Process Theory (PPT) and Discursive Opportunity Structure (DOS), as well as previous studies and literature on social movement organizations and peace movements, the study?s objective is also to apply context to the observations made by the peace activists in the study.
"Att föräldrarna får vara sig själva är den stora vinsten" : en studie med betoning på den kortare inskolningsmodellen i förskolan
I have examined acclimatization models in pre-school. My emphasis is on the shorter acclimatization models. To begin pre-school is a big change, not only for small children, for the whole family as well. It is important to get a good acclimatization in pre-school, and one of the things it takes to achieve that is to interact with the parents. The reason why I chose this subject was because we have not studied much literature about this subject during our education to become pre-school teachers.
Riktlinjer för implementering av ISO 17799
An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field.
Från Lev Tolstoj till Joe Wright : En adaptionsstudie av Anna Karenina
This study focuses on the Nordic model of Extended Collective Licenses (ECL) and how this model can be used in the process of digitalising and publishing archival material such as photos, letters, maps or films. The question that this study aims to deal with is what advantages, and disadvantages, there are for archives and copyright holders when an ECL is being used. To help answering this question the ?theory of the knowledge commons? has been applied. The research question has been answered through a text analysis based on legal texts including Swedish law.
Användargenererad livestreaming, nätgemenskaper & social interaktion : En kvalitativ undersökning gällande interaktion mellan tittare och streamare på plattformen Twitch
The popularity of video games has been boosted by the rise of user-generated live streaming platforms, and the biggest of them all is Twitch. The popularity depends on Twitch alignment of live streamed video games. The stream is created by a player who broadcast and streams the video game online. The video game can then be watched by a viewer that is interested in the video game. In every stream there is an implemented live chat that allows the viewer to interact with the streamer while the stream is online.
Den digitala slöjan : En kvalitativ intervjustudie om Facebook som scen för den svensk-muslimska tjejens framträdande
The purpose of this study is to find out how Swedish Muslim girls use Facebook and its functions in constructing their Muslim identity on the platform. The study is based on a qualitative method which consists of nine interviews with Swedish Muslim girls between the ages 17-23 and who use Facebook daily.The study is based on the view of Facebook as a scene where individuals can perform for an audience. I have used Erving Coffman?s dramaturgical perspective that explains why individuals appear in an appropriate manner to achieve confirmation from their audience. I also used theories about identity construction, community and the theory about how individuals create a social presence online.
Kreativa kreatörer : En studie i hur kreativa metoder används av professionella kreatörer på företag
Internet har blivit na?stintill oumba?rligt i dagens va?rld. Fra?n online-spel till e-handel och fra?n kommunikationskanaler till ett informativt na?t, a?r Internet fo?rmodligen en av de mest framtra?ngande och vitt spridda uppfinningarna av va?r tid. Medan sa?kerheten kring anva?ndandet av Internet har diskuterats vilt sa? har anva?ndbarheten av Internet i olika omra?den inte utforskats till samma grad.
Tryggare kan ingen vara? En studie om den danska flexicurity-modellens lämplighet för Sverige
This paper discuss the possibilities to transfer the Danish labour market policy, called flexicurity, to Sweden. There are two main purposes of this essay. The first purpose is to discuss the reasons why the Danish labour market policy could be interesting for Sweden. The second purpose is to investigate which obstacles that might occur during the transfer. For guidance I have used two startingpoints which highlights the Danish flexicurity's pros and cons.
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
Stadsdelsförnyelse i Norra Björksätra, Sandviken
The housing estates in the outskirts of Sandviken, consist of relatively large scale apartment buildings. This report, that is a B.A. thesis at 10 Swedish university points, aims to investigate and describe the opportunities to improve safety and security for inhabitants in Norra Björksätra. The purpose with this report is to make Norra Björksätra to a more attractive place to live in, by changing the negative trends in the area. Since demolition of at least some of the houses could be of current interest in some years; the purpose is also to investigate whether demolition or renewal of the area is the best solution.
Dolt i det öppna
Communication is a part of everyday life. The more sensitive information we handle, the more interesting the question around security of your information becomes. There are two ways of handling security around the information you want to communicate, either you control the means by which you are communicating. Or you control the way you communicate, making you able to use existing communication channels. Existing methods within cryptography enables two parties to communicate information securely.
Litterära Cirkeln : En studie hur Cirkeln av Mats Strandberg och Sara Bergmark Elfgren diskuterats på bokbloggar i anknytning till nätbokhandlar
The purpose of this bachelor thesis is to examine posts on bookblogs about the book, Cirkeln by Mats Strandberg and Sara Bergmark Elfgren and see how it has distributed amongst readers through social media and reader response. We want through this examine whether bookblogs have a place in the literary society, and in such cases, how this may take place. The Swedish Online bookshops Adlibris and Bokus is being used to find the blogposts to be examined in this thesis. The analysis is being implemented using content analysis and constructed encoding schemes. Interdisciplinary topics, like LIS and sociology of literature may have similar points of contact, which we want to highlight with this thesis.
En studie av zero knowledge-identifikationsprotokoll för smarta kort
Zero knowledge protocols is a lesser known type of protocol that can be used for identification. These protocols are especially designed not to reveal any information during an identification process that can be misused later on, neither by the one who should be convinced of the identity of the user, nor by anyone else that is eavesdropping. Many of these protocols are also especially designed for implementation in smart cards. The more common type of card with a magnetic stripe has during the last few years become more susceptible to attacks since they are easily copied. Smart cards combined with a secure identification protocol has been predicted to be the solution to this problem.