Sök:

Sökresultat:

1177 Uppsatser om Peace and Security - Sida 12 av 79

Libyenkrisen ? en humanitär intervention? : En kvalitativ textanalys som syftar till att förklara motiven bakom NATO:s och FN:s beslut att intervenera Libyen

Humanitarian intervention is a concept that generates several problems in our time. The idea of humanitarian intervention concerns the modern norms of sovereignty and noninterventional principals. It also concerns the conventional norm, which declares that states are not allowed to interfere in other states? internal affairs. The use of military force to implement humanitarian intervention is restricted according to international law.

Att färdas i symbios : ett gång -och cykelstråk anpassat efter trafikanternas rörelsemönster och behov

The aim of this paper is to examine the layout of public spaces and its effect on human behavior with focus on the relation between pedestrians and cyclists movement patterns in a specific path. The study emanates from the security aspect of pedestrians and cyclists, and builds upon previous theories and empirical studies about perception, security, information design, environmental psychology and behavior. The result shows that individual behavior and movement pattern differs with age, purpose, physical- and other conditions, and layout of the surroundings. A design proposal for improved layout of a path and a node between different oncoming paths has been developed to aid the users? needs, where a separation of walkways and bike lanes forms zones of security for the purpose of better orientation and a better flow between the users..

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik

The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.

Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd

How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.

Kim Jong Il - Docka eller dockmakare?

This paper has bearing on the subject of foreign policy analysis and decision-making,but is nonetheless important to peace and conflict studies due to its emphasis onnuclear weapons and deterrence.I have constructed a theoretical framework for the analysis of foreign policydecision-making that I set out to test on a crucial case. The framework iscrosscutting, and takes into consideration four levels of analysis: the system-,regional-, state-, and individual level. It is centred on a key decision maker, andapplies a cognitive approach for determining his or hers belief system through whichthe inputs from the other levels are filtered in order for the decision maker toconstruct a perception of reality, from which the decision is then formulated within.The framework is applied to North Korean and its leader Kim Jong Il. It sets outto explain his behaviour in the matter of their claimed nuclear weapons program, andhis decision to conduct a nuclear weapons-test, getting inside his head trying to figureout why he chose to do it and for what reasons.The conclusion indicates that the basic structure of the framework and its generalapplicability is sound, but that it needs further testing in order to make it perfectly solid..

När goda råd är dyra: En fallstudie av användandet av konsulttjänster i den ideella sektorn

A case study was done of Sthlm Policy Group, a consulting agency that mainly targets NGOs and government agencies in the Peace and Security sector. The goal of the case study was to explore the tendency of NGOs in Sweden to hire commercial consulting companies. The main interest was to see what the key reasons are for NGOs to hire private consulting agencies, but also to explore what problems that might be associated with such relationships. Interviews were carried out with representatives of the consulting agency, with its clients as well as with other NGOs that were identified as potential clients. The interviewed NGOs and government agencies were found to approve of the use of commercial consultants.

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.


Förstudie till införandet av centralt loggsystem hos Försvarsmakten

Modern IT systems tend to become more and more complex, while the number of active systems in companies increases. Furthermore, the number of security-related incidents is at an all-time high. These new conditions impose new demands on organizations. For example, it is no longer possible to manually collect and examine the systems log messages.The purpose of this thesis has been to make a comprehensive study of solutions for automated collecting and managing of log messages, analyze the Swedish Armed Forces specification for solutions for central log collection and management, and evaluating exis- ting solutions. The work consisted primarily of literature studies and evaluations of two of the Swedish Armed Forces of selected products: NetIQ Security Manager and Splunk.

Ett anpassat ledningssystem för informationssäkerhet : - Hur gör en liten organisation med hög personalomsättning?

This paper aims to find out how to implement an information security management (ISMS) system that is based on ISO/IEC 27001-standard into a small organization with high employee turnover. The standard employs the PDCA-method as a course of action for implementing the standard. The reason for implementing such a system is to introduce information security to the organization and to maintain it despite the changes in management. The paper based it?s survey on a case study of a student nation in Uppsala, Sweden.

Hotet från de kriminella MC-gängen - en normativ studie av värdekonflikten mellan den personliga integriteten och statens säkerhet

The aim of this essay is to illustrate a fundamental question; what is a democracy allowed to do to protect itself from enemies? I´ve chosen to analyze the conflict between the two values; individual integrity and state´s security. The individual integrity refers to every person's right to have a protected sphere, and the stat´s security refers to its right to protect itself, and these two positions are often time incompatible. This conflict of value is shown in a normative analysis, where depending on which perspective or normative logic is seen as primate, it gives different conclusions to what a democracy should do to defend itself.To demonstrate how severe the threats are against the society, I choose to examine a specific part of the organized crime, the outlaw motorcycle gangs. They have a special position in affecting the legal system because they have an explicit aim to influence the judicial system with scaremongering and threats.

Anbudskalkyl mer användbar i byggprocessen

This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.

<- Föregående sida 12 Nästa sida ->