
Sökresultat:
1177 Uppsatser om Peace and Security - Sida 4 av 79
Säkerhet i det trådlösa hemnätverket ? En analys av de vanligaste säkerhetslösningarna
The security solutions used in wireless home networks are examined in this report. Thegrowing number of wireless units have increased the need for reliable security solutions.This report aims to enlighten the reader about the fundamental technology used inwireless security solutions and inform about the existing flaws. A recommendationabout how to achieve a high level of security in the home network is also given to thereader.Several flaws in the security solutions in use have been reported. Of these the mostsevere has been examined in a test network using highly accessible tools to get aperception of how vulnerable the user is.The tests showed that several attacks were efficient and easily carried out. We have alsoseen that several of the home networks in our sample are susceptible to these attacks.Our survey revealed that the Internet service provider's technical support in many caseslacked the knowledge necessary to inform the user about reliable security solutions..
Säkerhetsansvarigas syn på supportrars beteende och dess inverkan på ishockeyevenemang : En kvalitativ studie om hur säkerhetsansvariga ser på supportrars beteende och dess inverkan på ishockeyevenemang
Are icehockey supporters a big problem in todays society? Is security required during icehockey events, and how is it implemented? This study was aimed to investigate the people at security positions and their view on fan behavior and it?s impact on icehockey events. It was a qualitative study were six interviews were made with people in charge of the security at different hockey clubs. The results showed that security managers overall saw a good fan culture, and that it created a wonderful atmosphere. Security managers worked a lot with dialogue with the supporters and they thought it had a good effect.
Från neutralitet till öppenhet? : En studie av säkerhetspolitikens utveckling i Sverige efter kalla krigets slut
Abstract Title: Från neutralitet till öppenhet? ? En studie av säkerhetspolitikens utveckling i Sverige efter kalla krigets slutAuthor: Jens KindhSupervisor: Patric LindgrenLinnaeus UniversityDepartment of Political ScienceSpring term 2012 When the Cold War ended, a new security situation was unfolded in Sweden. The purpose of this thesis is to describe and compare how the Swedish security policy is organized and how it has changed since the Cold War ended. To do that, I?m going to try answer the following questions:How is the Swedish security policy organized?What defence resolutions have affected the Swedish security policy after the Cold War ended?How has different political actions made its impact on the Swedish security policy after the Cold War ended?My theory is to try explain how the Swedish security policy has changed after the Cold War through a realism security perspective called traditional security, which refers to a realistic construct of the states security policy.
Regionala organisationers potential i konfliktlösning - En komparativ fallstudie av ECOWAS och FN:s hantering av inbördeskriget i Sierra Leone
With the end of the Cold War the number of conflicts where the United Nations have intervened has increased dramatically. This has entailed a need for a burden-sharing between the UN and regional organizations regarding management of conflicts. The aim of this study is to make a comparative analysis of the effectiveness and the efficiency in the efforts undertaken by ECOWAS and the UN during the civil war in Sierra Leone, through using theories on conflict resolution and the advantages of regional organizations in conflict resolution.My conclusion is that both ECOWAS and the UN were quite successful in managing the conflict and had an impact on the resolution of the war, although both peace operations suffered from internal problems. ECOWAS was effective in managing the conflict and in its mediating efforts as an insider from the region. The UN was more efficient in managing to attain their goals.
En känsla av trygghet : Patienters perspektiv inom palliativ vård
Background: Every year 56 million people die around the world and it is estimated that 60% of these people are in need of palliative care. It has been shown that patients in the palliative care experienced their situation as uncertain. When life no longer was certain, the patients tried to live their life day by day and make the best of it. Problem: When patients were diagnosed with an incurable disease the future became unsure, because their life would come to an end. Therefore patients with a palliative diagnosis could be in need of experiencing feelings of security.
Upprorsbekämpning i Sierra Leone : Counterinsurgency in Sierra Leone
Peace operations are considered to be hard to solve but Sierra Leone is by many thought to be a success despite major problems during the operations. Solving this conflict involved several dif-ferent actors which all contributed to the creating of peace. The purpose of this essay is to examine whether similarities between the way the conflict in Sierra Leone was solved and the method that Galula presents led to the positive outcome. This will be done by a qualitative textual analysis to demonstrate presence and absence of those parts that Galula claim are crucial to counter an insur-gency. Similarities between the method used at the solving of the conflict in Sierra Leone and Galulas method for counterinsurgency can be found.
IT-säkerhetspolicy ? efterlevs den av anställda?
ABSTRACT The main purpose of IT security policies is to protect companies against intrusion and unwanted spread of information. Statistics show that IT related crimes tend to increase and because of that it is important, from the company?s side of view, to be well prepared. The IT security policy is an important part of that preparation. A lot of the crimes related to IT can be deduced indirectly to employees at the companies where the crime takes place.
UAV/UCAV i fredens tjänst : UAV/UCAV och dess operativa betydelse i framtida Peace Support Operations
Luftstridskrafter har spelat en betydande roll i senare tiders Peace Support Operations (PSO). Obemannade flygande system har varit en del av dessa insatser, hur kommer rollfördelningen att vara i framtiden? Syftet med uppsatsen är att undersöka och göra en bedömning avseende hur obemannade flygsystem kan utnyttjas och ha en roll i framtida Peace Suport Operations. Litteratur- och dokumentstudier, föreläsningar och intervjuer ligger som faktabakgrund för bedömningen av hur en framtida PSO kan se ut samt vilken roll obemannade flygsystem kan ha i en framtida Peace Suport Operation. Jämförelse har skett mellan bemannade och obemannade flygande system varvid fördelar och nackdelar har belysts.
Diskussioner om trygghet i planeringssammanhang :
This is a bachelor?s essay in the landscape architect programme in Alnarp.
The purpose of the essay is to describe discussions about security in planning contexts in Sweden. Written material from three levels of the discussions has been studied: Swedish research, governmental directives and practisers. I have tried to obtain a variation in types of material.
Säkerhet till varje pris : En jämförande studie om utvecklingen av privat säkerhet från Kuwaitkriget till Irakkriget
The purpose of this essay is to examine the development of the use of private securitycontractors in Iraq. The reason is that there has been a considerable increase of the number ofprivate security firms operating in Iraq during the last couple of years. The legislation in thefield of private military and security is indistinct and my hypothesis is that the lack of nationaland/or international legislation can be connected to the increased globalization. To come toany conclusions about this I have chosen to make a comparative study between the two casesthe Gulf War and the War in Iraq which started in 2003. In this comparison, I ask thefollowing questions: 1) Are there any signs of anarchy in the field of private security duringthe Gulf War respectively the last War in Iraq? 2) In what way has the use of private securitycontractors changed from Case 1 to Case 2 ?According to my research, there were signs of anarchy in the field of private security bothduring the Gulf War and during the latest war in Iraq.
Analytiker och riktkurser: - Varför bry sig?
The purpose of this master thesis is to evaluate how the current share price and market consensus affect security analysts target price and if an investor should pay any attention to it. Empirical data is primarily collected from qualitative interviews with ten security analysts but also from a quantitative e-mail survey. Our main finding is that security analysts are indeed affected by each others earnings forecasts as well as the current share price. This is not strange, it is in several aspects rational. Security analysts has often nothing to gain by standing out too much and not either by spending too much time trying to create their own opinions due to lack of time or the complexity of what is analyzed.
Demokrati - skyddar det mot fred? : ? en teoriprövande fallstudie på konflikten mellan Ryssland och Georgien 2008
The aim of the following paper has been to test the democratic peace theory through applying it on the conflict between Russia and Georgia in 2008. This to either falsify the theory or come to the conclusion that the states? democracy was not satisfactory in regards to the definition of liberal democracy. The questions asked are: Was Russia and Georgia democratic states? Is democracy a protection from war? And which aspects of the liberal democratic theory, if any, were not satisfactory in either of the countries? The results show that the democratic peace theory is valid in this case and that neither one of the states were democratic.
Säkerhetstänkande integrerat i systemdesign via formaliserade metoder
Systems development methods mirror different organizational perspectives, and not all methods are formalised, but what they have in common is the purpose of structuring and supporting systems development processes. Which method would be the most suitable may be determined by the systems development context at hand, because every systems development context is unique. Information is a valuable asset in today?s organizations, and it needs to be protected against both internal and external security threats. In our essay we aspired to find and present suggestions as to how systems developers can include security in the very design based on formalised systems development methods to create systems that are better prepared to meet the security challenges of today.
Klimatförändringar som ett säkerhetshot. En studie av internationella organisationers säkerhetisering av klimathoten
International organizations are important actors on the stage of world politics, and how these actors securitize the climate change issue is of importance for how it will be tackled by actors on global and national levels. The purpose of this study is to contribute to research on climate security discourses and how climate change is defined as a security concern amongst different actors. This study, in contrast to previous research, focuses on systematically mapping the definitions made by different international organizations by asking: whose security is at stake; who is responsible for responding to the threat; how is the nature of the threat defined; and what responses are suggested? By analyzing material consisting of a variety of documents and statements from five international organizations, I aim to identify differences between these actors ? in how the climate change issue is conceptualized from a security perspective. The result of the study shows that only one of the organizations shows clear elements of the national/geopolitical security discourse, while all of the other actors primarily use the human security discourse.
IT-säkerhetspolicy ? efterlevs den av anställda?
ABSTRACT
The main purpose of IT security policies is to protect companies against
intrusion and unwanted spread of information. Statistics show that IT related
crimes tend to increase and because of that it is important, from the company?s
side of view, to be well prepared. The IT security policy is an important part
of that preparation.
A lot of the crimes related to IT can be deduced indirectly to employees at the
companies where the crime takes place.