Sök:

Sökresultat:

4243 Uppsatser om Patient security - Sida 11 av 283

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

Vakna lokalbedövade patienters upplevelser

Patients who undergo surgery receive general anaesthesia or any form of conduction anaesthesia during the operation. For most people it is strange, unexpected and for many something completely new to be a patient and undergo surgery. Awake conduction anaesthetic patients? experiences from the intraoperative period were little studied. The purpose of this study was to examine awake conduction anaesthesia patients? experiences.

Nutritionsbehov vid inflammatoriska tarmsjukdomar

Hos patient med inflammatory bowel diseases (IBD) har nutrition en central betydelse. Nutrition ska betraktas som en medicinsk behandling samtidigt som nutrition är ett av sjuksköterskans omvårdnadsansvar. Syftet var att belysa nutritionsbehovet hos patient med inflammatory bowel diseases. Resultatet baseras på 15 vetenskapliga artiklar. Resultatet visar att patient med IBD lider av malnutrition eller ligger i riskzon för att bli malnutrierad.

Förstudie till införandet av centralt loggsystem hos Försvarsmakten

Modern IT systems tend to become more and more complex, while the number of active systems in companies increases. Furthermore, the number of security-related incidents is at an all-time high. These new conditions impose new demands on organizations. For example, it is no longer possible to manually collect and examine the systems log messages.The purpose of this thesis has been to make a comprehensive study of solutions for automated collecting and managing of log messages, analyze the Swedish Armed Forces specification for solutions for central log collection and management, and evaluating exis- ting solutions. The work consisted primarily of literature studies and evaluations of two of the Swedish Armed Forces of selected products: NetIQ Security Manager and Splunk.

Ett anpassat ledningssystem för informationssäkerhet : - Hur gör en liten organisation med hög personalomsättning?

This paper aims to find out how to implement an information security management (ISMS) system that is based on ISO/IEC 27001-standard into a small organization with high employee turnover. The standard employs the PDCA-method as a course of action for implementing the standard. The reason for implementing such a system is to introduce information security to the organization and to maintain it despite the changes in management. The paper based it?s survey on a case study of a student nation in Uppsala, Sweden.

Det perioperativa samtalet-nyexaminerade operationssjuksköterskors uppfattningar

The perioperative nurse's primary responsibility is to care for the patient during the operation?s three phases; before, during and after. The communication between colleagues in the surgical department is increasing opportunities for safe care for the patient and a good dialogue with the patient can alleviate the concerns facing the unknown environment such as an operating theater. The pilot study was to investigate the surgical nurses' perceptions of conversations with the patient one year after graduation. To answer the pilot study's aim a qualitative interview study was chosen with a phenomenographic approach.

Vårdpersonalens uppfattningar om fibromyalgi

Aim Our aim is to highlight perceptions of fibromyalgia among health care personell.MethodsA systematic literature review conducted with a deductive approach.FindingsHealth care personell felt insecure because of a lack of understanding which lead to avoiding contact with these patients. Many felt that the fibromyalgia patient was categorised and that they would have been better served with another name of their disease. There was a great distrust against the diagnosis and its aetiology. The patient was perceived as troublesome, illness-fixated and draining the personell of energy. The paradox that the patient is looking so healthy but bearing so much pain was confusing for the health care personell.Conclusions Communication and an empathic encounter was identified as important elements for patient care.

Hotet från de kriminella MC-gängen - en normativ studie av värdekonflikten mellan den personliga integriteten och statens säkerhet

The aim of this essay is to illustrate a fundamental question; what is a democracy allowed to do to protect itself from enemies? I´ve chosen to analyze the conflict between the two values; individual integrity and state´s security. The individual integrity refers to every person's right to have a protected sphere, and the stat´s security refers to its right to protect itself, and these two positions are often time incompatible. This conflict of value is shown in a normative analysis, where depending on which perspective or normative logic is seen as primate, it gives different conclusions to what a democracy should do to defend itself.To demonstrate how severe the threats are against the society, I choose to examine a specific part of the organized crime, the outlaw motorcycle gangs. They have a special position in affecting the legal system because they have an explicit aim to influence the judicial system with scaremongering and threats.

Anbudskalkyl mer användbar i byggprocessen

This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.

Återuppbyggnad av en kollapsad stat - En fallstudie av återuppbyggnaden av staten Afghanistan

The purpose of this thesis is to explore and analyze the processes and efforts involved in rebuilding the war-torn state of Afghanistan. The examined period span from the fall of the Taliban regime in 2001, to the elections in 2005. This period, commonly known as the Bonn-process, sets out the initial time for the reconstruction of the state.A theoretical framework, which considers the necessary mechanisms for successful state-building, will be used to analyze Afghanistan's re-building process. The mechanisms include the prerequisite of a stable security environment, emerging from a cease-fire, together with the development of a well-functioning economy, re-introduction of rule of law and rejuvenating civil society.The failure to establish a secure environment has had a devastating impact on all analyzed aspects of the re-building process. It is therefore crucial that the international society continuing to assists the Afghan government in its efforts to strengthen its capacity, in order to improve the security situation.

Samordning för barn och ungdomar med frekvent behov av sjukvård

Purpose- The purpose of this project is to contribute to the knowledge of creating customer value through streamlining and coordination of patient flows for children and youth with frequent need of care on child and youth medical clinics.Method- One of the methods used for achieving the project's purpose is a case study on the Child and Youth Medicine Clinic at Länssjukhuset Ryhov in Jönköping. The case study has been used for collecting the empirical data that has been generated through interviews, observations and documents from the Child and Youth Health Clinic. Except the case study the authors also made studies in literature, which the collected empirical data has been anchored and related to. Together this led to the project's analysis and results.Results- When investigating the questions found in chapter one, it was determined standardized work is of great importance to create structure and implement procedures for the patient flows. A weak link in the patient flow has been identified, which is the sub-process coordination and planning.

Patienters upplevelser av ett akutmottagningsbesök

The pressure is getting tougher on Accident and Emergency departments. Therefore it is crucial to study how the patient?s perceive their visit to the Emergency department. Knowledge about this enables improvement of routines, patient participation and patient safety. The purpose of the study was to investigate patient?s experiences of their visit at the Emergency department.A descriptive design was used.

Förändrad syn på svensk militär alliansfrihet? : En studie om svensk neutralitetspolitik mellan 1990-2008

Abstract: The purpose of this study is to examine how the Swedish policy of neutrality has changed between the years 1990-2008. The research method used for this essay has been comparative case study, which strives to answer four research questions. Two of these questions are: Which specific occurrences have been fundamental in changing the Swedish policy of neutrality? How have the Swedish policy of neutrality and the policy of non-alignment changed between the years 1990-2008? The theoretical frame work of this study consists of Europeanization as a comprehensive theoretical perspective. In order to explain the Swedish act regarding the policy of neutrality, Logic of Consequences and Logic of appropriateness are used.

Med Säkerhetsrådets resolution 1325 (2000) som utgångspunkt : En komparativ studie av två handlingsplaner

Security Council resolution 1325 (2000) is about women, peace and security. Since the resolution was adopted several countries has made their own National Action Plan for implementation of the resolution.Sweden and Denmark are two of these countries. Resolution 1325 is one of the documents that each countries armed force has to relate to in international work.These countries can get to work together in international operations within the framework of the Nordic Defense Cooperation, NORDEFCO. This study is done by looking at similarities and differences in the action plans and whether they can be an obstacle for the countries to cooperate in an international operation.In this paper a comparative analysis of Sweden and Denmark's plans for the Security Council resolution 1325 will be done. The comparison is made based on the clauses of the resolution relating to the member states actions.In this paper, a qualitative text analysis to be carried out with sections of Resolution 1325 as a model for the comparison..

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

<- Föregående sida 11 Nästa sida ->