Sök:

Sökresultat:

2985 Uppsatser om Regional security-complex - Sida 14 av 199

Att färdas i symbios : ett gång -och cykelstråk anpassat efter trafikanternas rörelsemönster och behov

The aim of this paper is to examine the layout of public spaces and its effect on human behavior with focus on the relation between pedestrians and cyclists movement patterns in a specific path. The study emanates from the security aspect of pedestrians and cyclists, and builds upon previous theories and empirical studies about perception, security, information design, environmental psychology and behavior. The result shows that individual behavior and movement pattern differs with age, purpose, physical- and other conditions, and layout of the surroundings. A design proposal for improved layout of a path and a node between different oncoming paths has been developed to aid the users? needs, where a separation of walkways and bike lanes forms zones of security for the purpose of better orientation and a better flow between the users..

Värmländska kommuner globala aktörer? : En jämförande studie av fyra värmländska kommuner

This study is mostly based on previous research, which includes Sub-national actor?s attitudes and regional action towards the European Union. The purpose of the study is to investigate if four Swedish municipalities in Värmland operate internationally towards the European Union and deepen an understanding of their actions. The main research question is: - How can we increase our understanding of municipal action against the European Union? The research questions of this study are answered through qualitative method and semi-structured interviews were conducted.

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

Ny stamstation i Yttermalung för anslutning av vindkraft : Nätstudie av olika utföranden i normal- och reservdrift

Since 2004, wind power has had the largest installation of new capacity compared to other energy sources in Sweden. Accommodating new wind power may require strengthening or rebuilding of the existing grid in areas where the grid is already loaded to maximum capacity. This master thesis examine the possibility of a new 400/130 kV substation in Yttermalung, Sweden, with a connection to the two neighboring regional grids in Dalarna and Värmland owned by Fortum. This substation would provide a new connection point to the Swedish transmission system as well as an interconnection of the two, currently separated, regional grids. Different expansion scenarios where a substation with and without series compensation or a phase shifting transformer (PST) to control active power flow were studied.

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik

The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.

Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd

How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.

Att skapa en attraktiv och konkurrenskraftig region-spelar evenemang någon roll? : En studie kring Björneborg Jazzmusikfestival, i regionen Satakunta, Finland

Uppsatsens syfte är att analysera om det finns en medvetenhet om regional identitet och image inom regionen Satakunta, samt om åsikterna om utformningen av den regionala identiteten och imagen är konkretiserade, eller inte. Utifrån en studie av Jazzmusikfestivalen i Björneborg undersöks detta. I och med det diskuterar författaren huruvida evenemang har en roll i skapandet av en attraktiv och konkurrenskraftig region. Syftet är också att undersöka om det finns samarbeten i regionen för att göra den attraktiv och konkurrenskraftig. För att få svar på syftet har författaren använt sig av primärdata i form av intervjuer med representanter från Björneborgs stad, Björneborg turistbyrå, Landskapsförbundet, Satakunta Tourist och Björneborg Jazzmusikfestival.

Lokal identitet : En studie av hur lokal identitet kan utläsas ur fyra förhistoriska utställningar i Skåne.

Uppsatsen handlar om att det går att urskilja en lokal identitet på fyra skånska museer ochäven se om det finns någon regional identitet. Undersökningen sker genom studiebesök pårespektive museum och sedan en beskrivning av utställningarna. Sedan följer en analys avmaterialet som finns i utställningarna för att försöka se en lokal identitet i dem. Resultatet avuppsatsen är att jag enkelt kunnat se en lokal identitet på varje museums utställning men jaghar inte lyckats hitta en skånsk regional identitet..

Samverkan mellan regional och kommunal prim?rv?rd avseende v?rden av personer med diabetes typ 2 ? Sjuksk?terskors erfarenheter

Bakgrund: Antalet ?ldre multisjuka ?kar vilket st?ller kompetenskrav p? personal som v?rdar dessa personer. M?nga har insatser av kommunal prim?rv?rd vilket inneb?r att samverkan mellan regional och kommunal prim?rv?rd ?r central f?r god, s?ker och personcentrerad v?rd, vilket uppn?s bl.a. genom uppr?ttande av individuell v?rdplan.

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

A spaghetti bowl of preferences? : om preferentiella handelsavtals påverkan på WTO

The aim of this thesis is to clarify the affect that preferential and regional trade agreements have on the World Trade Organization (WTO), as being establisher of the international trading regime. The essay is an explanatory literature study, which strives to answer the following questions:Are regional and preferential trade agreements a threat or a complement to the WTO?Is an undermining of the MFN principle weakening the WTO?How do regional trade agreements made by the EU affect the future of the WTO?The empirical material is to be analyzed using an explanatory framework, which is based on neo-liberal instutionalism, theories on regime changes and a game theoretical approach, using prisoner?s dilemma. I will employ the EU-ACP relation, the Cotonou agreement to exemplify how an agreement of this kind can have an influence on multilateral trade. The result shows that preferential agreements do have an impact on the WTO, one that is fairly negative in scope.

Smarta Textilier : kvinnor, teknik och regional utveckling i Borås

This thesis focuses on the mass media cover of ?Smart textiles?. The Swedish?smart? textiles are developed in Borås and are a mix of ordinary textile and new technology.  I analyse the article with a text analysis method, looking at themes and the language?s propositions in focus. Context and the actors in the articles are also important in the analysis.Many women occur as developers of the new smart technical product, a field often knowed as a typical male subject.

Ett anpassat ledningssystem för informationssäkerhet : - Hur gör en liten organisation med hög personalomsättning?

This paper aims to find out how to implement an information security management (ISMS) system that is based on ISO/IEC 27001-standard into a small organization with high employee turnover. The standard employs the PDCA-method as a course of action for implementing the standard. The reason for implementing such a system is to introduce information security to the organization and to maintain it despite the changes in management. The paper based it?s survey on a case study of a student nation in Uppsala, Sweden.

<- Föregående sida 14 Nästa sida ->