Sök:

Sökresultat:

1031 Uppsatser om Ontological security - Sida 3 av 69

EU:s grannskapspolitik i Medelhavsregionen : En säkerhetspolitisk analys av Medelhavssamarbetet

AbstractThe thesis investigates how the European Union promotes stability and security in the Mediterranean region. The aim is to analyse the European Union?s security ambitions with Euro-Mediterranean Partnership, the Barcelona Process. An analytical framework with five sectors (military, political, economic, environmental and societal), based on the Copenhagen School?s theories about security sectors and securitization, is used for the analysis.

Jag vill ju bara vara lycklig! En studie av hur unga vuxna ser på sig själva och sin livssituation i förhållande till det senmoderna samhället.

The purpose of this study was to examine and illustrate how young adults look at themselves and their lifesituation in relation to the late modern society. More specifically its aim was to find out if the respondents have been affected by the ideals and norms of the late modern society in their lifechoises and their view of happiness. This study was based on interviews with eight young adults in the ages between 25 - 33. Out of the eight three were singles, two were married with children and three were in relationships. During the process four themes were identified: The importance and developement of an identity, fullfillment in the respondents lifesituations, the experience of happiness in the respondents lives and how the late modern society have influenced the respondents in their lives.

Fo?rutsa?ttningar fo?r AU som sa?kerhetsgemenskap avseende inomstatliga konflikter med transnationell inblandning

The theory of ?security communities? is generally understood as ?dependable expectations of peaceful change? between groups and whether or not the African Union can be said to meet that criteria has been contested in the research community. One of the central disagreements lie in the nature of the region?s conflicts, of which a majority are intrastate but with tendencies of transnational involvement. This paper seeks to understand how extensive this involvement is and how it affects the possibility of classifying the African Union as a security community.

Reading the Common Foreign and Security Policy of the European Union in terms of the issue of Terrorism : An analysis on the evolution of the CFSP of the EU under the issue of Terrorism

In the post Cold-War era, world politics was transforming itself through its emerging complex issues such as terrorism and influential and interdependent actors such as the European Union. In this new era, the European Union was developing its Common Foreign and Security Policy pillar both to present a coherent and unified EU policy and to prove its political potent in order to become an influential actor on world politics. On the other side, security environment was also transforming its content through emerging actors and issues. As one of the most prominent actors of the world politics, the EU was influenced by the transformation of security environment, whose economic ?soft power? proved necessary but insufficient for being a global power in this emerging security environment.

Mänsklig säkerhet i Sudan- För vem och mot vad?

The concept of security is a contested one. The United Nations definition in UNDPs Development report of 1994 is the most authoritive and commonly cited. The civil war in Sudan has led to 2 million deaths and over 5.5 million refugees. In a resolution from 2005, the UN decided that the war in Sudan was a threat to international security and peace. The 10th of January UN decided that a peace commission ought to be send with 10 000 military and civil men including 700 policemen.The main purpose of this thesis is to improve our knowledge of those factors which can cause an increased risk of conflict within a state, and how that can affect the social conditions for individuals.

Mellan säkerhet och mänskliga rättigheter : en studie av den svenska officiella migrationsdiskursen

This paper focuses on the Swedish migration discourse and investigates if and to what extent it is dominated by a security perspective. Analysing a number of official texts and documents I want to show how the discourse describes migrants and what implications this carries with it for the migrants and for the Swedish migration politics. Through discourse analysis I have analysed whose security that is prioritised, the Swedish or the refugees, who is the refugee and the asylum seeker, and who is the illegal migrant in the Swedish official migration discourse. As a theoretical frame for the analysis I have used theories on migration and security. These include theories on the securitisation of politics, the globalisation and the creation of political identity from the nation state perspective and theories on the connection between migration and security.My results show that a security discourse is dominating the Swedish official migration discourse and is therefore defining our reality and the identities of refugees, asylum seekers and illegal migrants.

Är handdatorer säkra nog för hälso- och sjukvården?

The aim of this report is to discuss computer security in handheld computers and to find out the appropriate security level that must be implemented to be able to use handheld computers within the Swedish healthcare system. Most healthcare centers are using some kind of electronic journals for their patient´s data today, but there are still a number of clinics that are usingthe old paper-system. On a few places in Sweden the use of handheld computers at the clinics has already started, but in the United States the use of handheld computers in the medical area is already widespread and from this we can see a lot of different situations where it is useful and effective to work with handheld computers. The security demands on patient´s journals are high and regulated in both Swedish law and regulations from the National Swedish Board of Health and Welfare. The law does not have any substantial demands, but states that there should be an adequate security level based on the nature of the information and the costs.

Säkerhetsutvärdering certifikatserver i stället för aktiva kort

Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware.

Säkra kommunikationskanaler i en distribuerad heterogen miljö

The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a secure manner.

Container Security Initiative - En diskursanalys utifrån teorier om det il/legala

Container Security Initiative was launched in 2002 by the US Customs and Border Patrol in order to secure the global flow of containers destined for USA. This thesis attempts to analyze Container Security Initiative in relation to a possible future scenario made by the weapons industry where the state's global traderoutes are being subject to militarization. A development which is partly based on the threat posed by global illegal trade. The latter is discussed and defined based on current research made by Carolyn Nordstrom, Moíses Naím and theories on the cosmopolitan perspective made by Ulrich Beck. Strategy documents concerning Container Security Initiative are then analyzed in terms of discourse to try to say something about what the program indicates.

Faktorer som påverkar sjuksköterskans användande av omvårdnadsplaner : en litteraturstudie

The purpose is to illustrate the phenomenon of self-harm from a social psychological and sociological perspective. The purpose is furthermore to examine the role social relationships play in the individuals´ self- imagine and what role does identification play for anyone who harm themselves? We want to examine in what way social relationships are important and how they function for individuals who harm themselves, both once they have started to harm themselves, and if the relationships in any part caused the cutting to begin with.Questions:How do individuals shape their identity based on self- harm? Which self-image do individuals have who self-harm? Is there anything in the person's previous social relationships that have caused them to begin to hurt themselves?Method:In this paper we have analyzed five autobiographies. We have used open coding from grounded theory as analytical method and subject positions based on discourse analysis.Theory:We have used the Cooley concepts looking glass self, Foucault's theory of power, Giddens' concept of Ontological security and existential anxiety.Results and Analysis:We found six different categories that we thought were central. These were negative self-image, guilt, lack of family support, negative experiences of others' views, the protective identity as self- harmer and insecure social relationships in school.Conclusion:The self-harming is a very complex behavior.

Säkerhetsklassificering av IT-system på Fläkt Woods AB

This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.

Självskadebeteende : En studie om identitet och självuppfattning

The purpose is to illustrate the phenomenon of self-harm from a social psychological and sociological perspective. The purpose is furthermore to examine the role social relationships play in the individuals´ self- imagine and what role does identification play for anyone who harm themselves? We want to examine in what way social relationships are important and how they function for individuals who harm themselves, both once they have started to harm themselves, and if the relationships in any part caused the cutting to begin with.Questions:How do individuals shape their identity based on self- harm? Which self-image do individuals have who self-harm? Is there anything in the person's previous social relationships that have caused them to begin to hurt themselves?Method:In this paper we have analyzed five autobiographies. We have used open coding from grounded theory as analytical method and subject positions based on discourse analysis.Theory:We have used the Cooley concepts looking glass self, Foucault's theory of power, Giddens' concept of Ontological security and existential anxiety.Results and Analysis:We found six different categories that we thought were central. These were negative self-image, guilt, lack of family support, negative experiences of others' views, the protective identity as self- harmer and insecure social relationships in school.Conclusion:The self-harming is a very complex behavior.

Människohandel som en säkerhetsfråga

The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.

Framtagning av en informationssäkerhetspolicy

This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.

<- Föregående sida 3 Nästa sida ->