Sök:

Sökresultat:

8986 Uppsatser om Policy network theory - Sida 16 av 600

Diskurser kring kvinnor i alkoholpolitiska styrdokument 1974 - 2005

The aim of this paper was to examine which discourses of women that could be found in Swedish policy documents concerning alcohol from the seventies until today. The questions asked were in which ways women?s drinking was described and how these descriptions could be analyzed and understood by critical discourse analysis and gender theory. The results indicated two main discourses, one replacing the other over time. According to the first discourse, most clearly expressed in the official report from the seventies, women were not consumers of alcohol to the same extent as men.

Vikten av säkra nätverk

The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network.

USA:s m?ngfacetterade strategi i Myanmar En komparativ analys av liberalism och realism i amerikansk utrikespolitik

This thesis examines the USA?s response to the military coup in Myanmar 2021 through a comparative analysis of the two dominant international relations theories: realism and liberalism. The study uses a qualitative text analysis of the US Burma act of 2021 to test the explanatory power of the theories in the formulation of US policy. The results shows that liberal theory has the greater explanatory power, as the US response was systematically motivated by a normative desire to restore democracy in Myanmar. However, some realist tendencies could be observed, especially through exception clauses preserving US national security interest and the mention of China?s support for the military junta in Myanmar.

Att Införa IPv6 i ett IPv4-nätverk

Internet is growing every day and this is leading to an address depletion of the current IPv4 addresses. A new version of IPv4, called IPv6, is the protocol for addressing computers that will deal with this problem. IPv4 and IPv6 are unfortunately not compatible with each other. IPv4 and IPv6 have to co-exist for a long time until IPv6 will be the dominant protocol.The purpose of this thesis is to examine how a transition could be done or more correctly, how to deploy IPv6 in an already existing IPv4 network. After that part of the report a case study at the local Internet service provider Junet AB will be conducted.

Att minnas det förflutna : Historieskrivning i strävan efter ett gemensamt Sydafrika

This thesis is intended to respond to the extent to which South African textbooks on the subject of history is linked to the governmental policy documents and whether they are producing and reproducing national identity. The two textbooks are aimed at students in grade 10. Both books were produced in 2008 but published by different publishers.The essay is based on Norman Faircloughs critical discourse theory which has been supplemented by Michael Billings theory Banal Nationalism, which assumes that it is the national words that remind us daily of our homeland that is producing and reproducing national identity.  The survey shows that both textbooks are closely tied to the government policy document for the teaching of history. The textbooks refer to the policy, both explicitly and implicitly. The two textbooks reproduce a common national identity in South Africa based on the discussions taking place in society.

How Venture Capitalists can use their Network in order to reduce the Information Asymmetries between themselves and the Venture Management Team

The purpose of this study is to increase the understanding of how venture capitalists can use their network in order to reduce information asymmetries between themselves and the venture management team. A qualitative approach with semi-structured interviews, consisting of open questions, have been used to receive gradate information in order to reach our explorative purpose. Our theoretical framework consists of relevant studies made on the dynamics of networks and the problems that can arise in the complex relationship between a principal and an agent. We have been interviewing two venture capital firms and therepresentatives from two business angel networks. We also made an additional interview with an influential financial actor in order to try to verify our conclusions Our conclusions are that an extensive network can be used by venture capitalists in order to; verify ventures? technologies, complement the competences in the venture management team, and arrange co-investments, resulting in reduced information asymmetries between themselves and the venture management team.

Inkluderad på lika villkor : En retorisk analys av Socialdemokraternas invandringspolitik 1990 och 2013

The purpose of my study is to study Social Democrats immigration policy over the period 1990 and 2013. My material consists of party programs and motions that social democracy has raised in Parliament. As a research method I used McGee´s ideograph theory. I use a cluster analysis inspired by Kenneth Burke to analyze the meaning of those found ideographs. I also present and use Bitzers rhetorical situation in my analyzeWith help of Burke´s rhetorical situation I could see how the Social Democrats' rhetorical approach to immigration policy in the different periods in society.My investigation of the Social Democratic Party program and motions / propositions revealed the following ideographs: Democracy, solidarity, equality and freedom.

Analys av datakommunikationssäkerhet för VoIP-protokoll

Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..

Direktdemokrati och representativ demokrati : En jämförande analys mellan två demokratimodeller och en definierad idealtyp

The essay?s main focus has been to investigate and analyze the political actions behind the 2015?s grade compromise; an agreement to introduce grades from the fourth year in primary school. Through a game-theory analysis, mainly based in Leif Lewin?s and Jörgen Herman's research on rationality in politics, this study examined the grade debate  during a fifteen year period. The primary task has thereby been to explain the grade compromise through game-theory.

EN KONTINENT I KRIS ? MIGRATION, INTEGRATION OCH INKLUDERING- En j?mf?rande studie av kommissionens handlingsplaner f?r integration i Europa

When migration to a country increases, the integration of the migrants becomes extra important for the host country?s society, economy and culture. In the last decade, Europe has faced several crises, such as the refugee crisis and the covid-19 pandemic, which has affected both migration and integration policy. The challenges that have characterized European society in recent years makes it interesting to study how the measures highlighted by the European Commission to integrate migrants has developed. Therefore, the paper aims to compare the Commission?s action plans for integration published in 2016 and 2020 based on the threat theory and the contact theory to see how both perspectives can contribute to understanding the differences between the years and which theory is best suited to understand the Commission?s current visions of integration.

Tillförlitlighet i Stockholms elnät : En analys med hjälp av Tekla NIS

Outages in the electric grid can be costly for society. Because of this, reliability is one of the parameters used to regulate network companies. Reliability in electrical grids can be measured with SAIDI, system average interruption duration index, which for Fortum Distribution has increased in Stockholm?s distribution network (11 kV) in the early 2000?s.By using outage data for Stockholm from 2011-2013, sets of parameters to be used for reliability calculations in the network information program Tekla NIS were derived. Two different options for investment were then analysed: changing old cables with high fault frequencies, and installing automatic switching in distribution substations.

Vägen mot säkerhet - får alla gå med? En kritisk, feministisk analys av det traditionella säkerhetsbegreppet.

In this essay I analyze the concepts security and security policy from a critical, feministic point of view. The traditional way of thinking security is state-centred and narrow with its military oriented threatening pictures and solutions.I advocate that the two concepts need a more feministic and holistic approach to be able to cope with the threats of our time and include the security for women explicitly.To suggest how this can be done I introduce a model; security-sphere, which should be seen as a way to constructively connect my objections to the existing research with a new approach to security problems. The security-sphere is based on two analytical parts; the private security sub-sphere and the public security sub-sphere, in order to make new images of security problems visible.It is a fact that most of the threats against women specifically, take place in the private sphere where no traditional analytical tools reach in - these threats have not been seen as 'real' security problems. My aim is therefore to integrate these issues into the agenda of security policy..

Tillbaka till framtiden : Fyra scenarier för EU:s framtid efter eurokrisen

The starting point of this study is theories of European integration, which are used to formulate different scenarios about the future of the European Union. This is made in regards to the eurocrisis which has intensified the discussion about how to change the construction of the euro to overcome the economic difficulties that has arisen. In this study, four different scenarios are presented: "An updated Europe", "A new Europe", "The death of the euro" and "Goodbye Greece". The first two scenarios takes its starting point in the neofunctionalist theory of European integration and describes how the EU might increase its level of integration in different ways. We can either see a development where the EU tries to improve the implementation of the rules that are meant to coordinate the member states? economic policy, or we might encounter a more advanced integration where fiscal policy competences are transferred to the EU-level.The latter scenarios, however, takes another theory in to account, liberal intergovernmentalism, and describes how the eurozone might be fragmented in different ways due to conflicts of interest between lenders and countries that has to receive loan-packages.

IT-relaterade hot - professionella IT-tjänstemäns farhågor och möjligheter

The objective of this thesis was firstly to examine the possibilities of creating a universal tool for evaluating IT-security. When all the material was gathered we saw that we had strayed away from our subject and that our focus was on IT-threats and IT-professionals apprehensions and possibilities on the subject. The purpose of this thesis was there after to find and identify threats and counter measures in publications and later discuss these with IT-professionals. We found and identified several threats that the professionals encountered in their work. These threats ranged from techniques used by hackers to threats that can arise when the users on the network are poorly educated.

Integrerad Kommunikation för att stärka ett Nation Brand

The aim of this paper is to explain how the European Union?s common strategy for theCommon Foreign- and Security Policy (CFSP) will change with the implementation of the Treaty of Lisbon. A comparative case study and qualitative method is used. On the basis of Smith?s theory of institutionalization we will analyze two member states: France and Denmark.

<- Föregående sida 16 Nästa sida ->