Sökresultat:
897 Uppsatser om Risks and threats - Sida 4 av 60
Etiska aspekter av preimplantatorisk genetisk diagnostik och genterapi
The research in the field of biotechnology is rapidly developing all over the world. Modern biotechnology offers unique opportunities, simultaneously as it gives rise to a number of ethical issues. Preimplantation genetic diagnosis (PGD), PGD/HLA (Human Leucocyte Antigen) and germline gene therapy (GLGT) are controversial techniques. PGD gives a possibility to identify a genetic disease prior to the embryo?s implantation in the uterus.
Design av Riskdatabas : En studie för effektivare hantering av risker
Risk management is a key competency that is constantly being researched how it can be improved within project management. The risk management process consists of four major steps: identify risks, assess the risks? significance on the project, evaluate and address the key risks and follow up.The majority of companies seem to neglect certain identified risks, and decide not to mitigate if the risk does not cause adverse effects to the business. To counteract undesirable consequences and help organisations to become more effective at managing risks an initial work has been conducted for a risk repository.The project develops a proposal on the design of a risk repository which aim to effectively support a database implementation. The study includes literature studies which resulted in a relational model for database implementation.
Vägen mot säkerhet - får alla gå med? En kritisk, feministisk analys av det traditionella säkerhetsbegreppet.
In this essay I analyze the concepts security and security policy from a critical, feministic point of view. The traditional way of thinking security is state-centred and narrow with its military oriented threatening pictures and solutions.I advocate that the two concepts need a more feministic and holistic approach to be able to cope with the threats of our time and include the security for women explicitly.To suggest how this can be done I introduce a model; security-sphere, which should be seen as a way to constructively connect my objections to the existing research with a new approach to security problems. The security-sphere is based on two analytical parts; the private security sub-sphere and the public security sub-sphere, in order to make new images of security problems visible.It is a fact that most of the threats against women specifically, take place in the private sphere where no traditional analytical tools reach in - these threats have not been seen as 'real' security problems. My aim is therefore to integrate these issues into the agenda of security policy..
Hot och våld i arbetslivet : - En kvalitativ studie om socialsekreterares utsatthet
The purpose of this study was to investigate how social services workers describe, the risk of being exposed to threats and violence in their profession. Six social services workers were interviewed, four from the Welfare Office in a major city and two from the Child and Family Services in a minor city. Results showed that the majority of social services workers consider themselves exposed in their profession, meaning that they feel there's a risk of a violent or threatening situation occurring in their work situation. All interviewees had experiences from some sort of threat or violence in a work related context and they attested that non-personal assaults, such as threats made through telephone, email and answering machines are more common than verbal assaults made in personal meetings. Being prepared and listening to ones intuition is a way of dealing with exposure when meeting with a client.
Livsmedelssäkerhet, konflikt och hållbar fred - en teoriutvecklande studie om matens makt
In our world, more than two billion people are living under insecure food conditions and more than eight hundred million people are estimated to be starving. The majority of these people live in developing counties which are poor and often subject of civil war. The past fifty years the main subject of security analysis has been the sovereign and rational state and the threats have been viewed in terms of military and weapons of mass destruction. This has come to change over the last decades and security as a concept has broadened, which better represents the reality of today. Within this broader conceptualization of security the main referent of security is the individual, rather than the state, and threats are not only analyzed from a military point of view, but also seen as threats against human rights and freedoms.
Betalningsmedel & dess risker
Today you can pay in many different ways. You can for instance use cash, credit cards, internet and now even with your mobile phone. Today we can also see new types of technical payment solutions being developed, such as Near Field Communication (NFC), mobile banking or through the use of QR-codes. We have today many different payment methods; therefore it?s interesting to see which payment method people prefer the most.
Hot, våld och trakasserier mot lärare - en fenomenografiskt inspirerad studie vad gäller rektorers och lärares uppfattningar
The aim of this study is to describe what teachers and principals experience in schools regarding threats, violence and harassment towards teachers. A phenomenographical inspired approach has been used to describe and analyse the conceptions of five teachers and five principals. The findings of the study indicate that there is no impending risk for teachers to suffer from violence, threats or harassment. However, it does occasionally happen, and the findings of the study indicate that there are some factors that increase the risk. The major three factors are: fear, personality and inexperience.
Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.
Risk- och sårbarhetsanalyser för smarta elnät
The electrical grid needs to be changed in the future in order to manage more distributed and renewable generation and also to make it possible for electricity consumers to be more active and aware of their electricity consumption. This future grid is usually referred to as a smart grid. With the transition to a smart grid, new challenges occur. One method to determine those challenges is to perform risk and vulnerability analyses. InStockholm, the new urban district Stockholm Royal Seaport is built.
Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which
increases the need to stop and assess the risks against users? integrity when
integrating new technology in contemporary systems all the greater. We have
taken two technologies, Near Field Communication and Certified Wireless USB,
whose envisioned area of use is to be integrated into mobile phones, and
evaluated what security threats are revealed for the respective technologies.
The threats against security have been identified through research of the
standards and existing reports for each technology. Practical experiments have
not been conducted on account of us not having access to any equipment to run
such trials.
Extrema sportutövare : Heroiska äventyrare, naiva idealister eller galna risktagare?
Man has always in one way or another had to take risks in order to survive, but in today's society, voluntary risks increased markedly. It is about both physical and financial risks. The aim of this essay is to problematize what it is for properties that drive people to extreme sports and adventure travel. We want to see how extreme sports performers own picture looks compared to how the media presents them. We have in this essay interviewed two long sailors, a BASE jumper and an ex-mountain climber to see how the performers own picture of reality looks.
Studenters kollektivtrafik : Studenters preferenser och önskemål på ett nytt biljett- och informationssystem inom kollektivtrafiken i Värmland
Abstract Over the years the consciousness of risk has grown. It?s hard to influence risks, therefore there are guidelines stating that significant risk must be included in the annual report. This paper is a case study; the purpose was to examine how four Swedish listed companies chose to disclose their internal and external risks. Risk is initially described in general sense and then it figures to what constitutes an economic risk.Through a case study of four Swedish listed companies? annual reports we have, through qualitative methods found how the companies chose to disclosure their risks.
Datasäkerhet : Hur man skyddar sig mot interna hot
As the companies of today are good at protecting themselves against external threats, but are having problems with internal threats, we focused on how information can be protected from ending up in the wrong hands. First and foremost to protect information from employees who might steal it and sell it to another company. Since the security investments needed are connected to the financial costs of implementing them we have tried to create a balance between the investments needed and the cost of implementing them. The different kinds of protection needed are first and foremost protection to make data less accessable, passwords and traceability. While it is hard for us to estimate the amount of money a company lose by the hour when the production stands still, we have not been able to use any of the excising models to calculate the profit of installing countermeasures.
Hantering av inköpsrisk vid svenska kafferosterier : när smaken får avgöra En studie av hur riskhantering kan integreras i inköpsprocessen
Background: The strategic importance of purchasing departments is increasing, yet supply risks are rather uncharted. The procurement of coffee involves supply risks and the purchaser needs to be able to handle these to enable the roasting-house to produce coffee as specified. Purpose: To chart risks in connection with the procurement of coffee as well as the possibilities of handling these. The thesis also examines if general risk management theories are applicable on the supply risk present within Swedish roasting-houses and can become an integral partof the purchasing process. Method: A qualitative case study of the purchasing process of Swedish roasting- houses.
Risk för spridning av ogräsfrö med rötrester : en litteraturstudie
With an increasing production of biogas follows an increased amount of digestate. This could potentially be a valuable source of fertiliser with the destruction of weed seeds as a possible advantage. However, there have been some concerns regarding the product still containing viable seeds of weed.
In this Bsc thesis the results of previous research on the fate of weed seeds in biogas production is summarized. It is also a comparison of research on the effect of similar processes such as silage, compost or animal passage on seeds. The purpose of this is to evaluate risks of spreading viable seeds, potentially problematic species and perhaps to find out how to eliminate the risks.
The literature review revealed that previous research mainly indicates low risks regarding many of the tested weed species, but not all studies show the same result, therefore extended research on the subject is desirable.