Sökresultat:
940 Uppsatser om Secure communications - Sida 14 av 63
"Det internationella kortet": En undersökning av det politiska samtalet kring Ålandsexemplet
Over the past few years the Åland islands have attracted growing internationalattention as an example of how to successfully secure the position of a minorityregion, and in the current situation the government of Åland has an intention toextend the efforts of spreading the example of Åland. The purpose of this essay isto shed light on the political discussion about the example of Åland, andinvestigate the underlying political reasons for emphasizing the example of Ålandinternationally. Through interviews with leading politicians on Åland I analyzeÅland as a norm entrepreneur. The research shows that besides altruism, selfinterestis a factor behind emphasizing the example of Åland. The essay showsthat the theory of norm entrepreneurship also can be applied on an autonomousarea, but instead of influencing international organizations themselves, theautonomous area use norm entrepreneurship as a tool for influencing domesticpolitics..
Mobilitetens möjligheter för bloggen : En studie om mobilt bloggande
In this paper we investigate how the possibility of mobility affects the frequency of blogposts andthe use of pictures in blogs and the content of the pictures. The purpose of this paper is toinvestigate what bloggers do with the possibility of mobility and how it effects the blog. Here weonly focus on smartphones. We focused our theory on communications and what mobility can offerto communication. To investigaste our subject we chose an combination of a qualitative and aquantitative study.
Förbränningslära för bubblandefluidbädd
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Facebook i offentlig sektor : - en kvalitativ intervjustudie med Kriminalvården, Sjöfartsverket, SMHI och Katrineholms kommun om deras närvaro på Facebook.
Abstract: Facebook in the Public Sector - qualitative interviewstudy with The Swedish maritime Administration, the Swedish Meteorological and Hydrological Institute, the Swedish prison and Probation services and the municipality of Katrineholm about their precense on Facebook.In my bachelor?s thesis I have studied how three government authority and one municipality uses or don?t use Facebook in their communication towards the citizens. I have chosen to study four different cases, to see if there are any significant similarities or differences between how the different services are working with their communication. I have chosen to explore my cases through semi-structured qualitative interviews, where I met communications officers of every organisation face to face.I have found out that there is not one right way to communicate through Facebook, every organisations decisions must be based on their own mission, aims and objectives. And I have seen that both the transmitter and the receiver need to mature into the new acting of this new channel - Facebook..
BIM förändrar produktionen
Because society?s demand for quality, efficiency at low cost is constantly increasing, companies are increasingly choosing to invest new methods to achieve these points. Those who manage to find ways to improve their processes are often the companies that have the greatest chance of becoming a winning player in the market. BIM is a new method that can reduce the internal costs while increasing communications between different parties. However there is disagreement about what BIM is and its purpose.
Windbelt
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Att bli framgångsrik musikartist : De karaktäristiska dragen i marknadsföringen av artister
The research this report is based on aims to find out the characteristic features of the marketing tools that are essential for a music artist, and define a successful artist. The thesis arises and discusses how different medias can have an affect on an artists career and on his/hers achievement. To bee seen in the right medias can have an important influence on their career. To be able to answer our aim we have interviewed people who have a solid knowledge about music business, we have also used a qualitative method. The outcome of the research is that there are some indications that show important factors which are essential when it comes to marketing artists.
Windows, RedHat och IPv6 - ett test!
With the huge amount of computers connected to the Internet the IP-addresses
are starting to run out. The Internet Engineering Task Force, IETF, have
decided that it is about time to exchange the old 32 bits Internet protocol,
Ipv4, to a more modern 128 bits protocol called Ipv6.
This thesis explores the possibility to install Ipv6 in different operating
systems. By testing various operating systems and by set up criteria compare
them to each other we give the reader a picture of how the installation is
done. We also show which operating systems to prefer if you want to use IPv6.
Analys av säkerheten av RFID i inpasseringssystem
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Möjligheter, behov och strategi för företagsetableringar inom High Voltage Valley
The structure of the thesis is based on opportunities to attract businesses to the region, the need of establishments in the region and benchmarking with establishment strategies of other cluster initiatives. The identified opportunities are the local business relationship with ABB, the prerequisites of life quality in the region and the availability of financial support. Further on has a number of opportunities to be developed been identified; diversification of the existing businesses, an expansion of the cooperation with universities and to simplify the contact with local authorities. Challenges that HVV is facing is: creating a more dynamic labor market, secure long-term labor supply, spread the image of the brand HVV and finally putting HVVs geographic scope. Two of the identified needs of establishments are strategically important: to establish a third-party logistician and commercializing systems for distributed generation and energy storage.
Hur vuxna med permanent ileostomi upplever sin livskvalitet
Having an ileostomy can affect the quality of life. Quality of life is defined by Siri Naess as being active, relating well to others, having self-esteem and having a basic mood of happiness. The nurse?s task is to focus on the stoma care and work in a holistic way. The aim of the study was to describe how adults with permanent ileostomy experience their quality of life.
Konstruktion av mutterdragare för stora moment
This degree project was conducted in collaboration with Gremo AB located in Ätran.The aim of the project was to develop a solution to secure quality and to help assemblingthe locknut holding the vertical hinge on the harvesters and foresters from Gremo.At this time the nut is assembled manually by the aid of an overhead crane. The nut istightened differently from time to time, and there was no specified torque to which it istightened. Another present problem was the locking washer which sometimes getsdamaged during assembly, when this happens the procedure has to be started over fromthe beginning. The current assembly procedure is very time consuming and lengthy forthe employees.Our task was to design a machine that could tighten the nut to a specified torque with amargin of error of ± 3%. The assembly procedure will be held simple and the timerequired at a minimum.The project started by developing several principle solutions, the one solution that bestmatched our specifications were developed to a primary solution.Today we have started manufacturing and assembling our prototype.
Den virtuella mötesplatsen : Om de ungas användning av datorer och Internet i vardagen
The purpose of this study was to illustrate how children of the "digital generation" used their computers in their everyday practice. The important in the study was children's perspective on computers interactions and communications in a digital arena.An essential item about understanding children's way to think about computers was to let children themselves speak by taking part in the study, because children's voices are seldom heard in public. The empirical material used was interviews with sex children between 13 and 15 years old. My method was qualitative.The main results showed that social relations are very important for children. The Internet gives children access to an arena where they are able to make new contacts with others as well as transcend their biological as their physical identity.An important accepts for the children in the study was the option to be anonymous.
Sjuksköterskors upplevelser av hot och våld inom akutsjukvård
Background: An indisputable right for nurses is to have a safe and secure work environment so they can deliver a high quality care. To bring a clear definition of what threat and violence are, is an important part in the work to prevent threat and violence. One part of the problem is that the experience and understanding of threat and violence can be different from one person to another. Aim: The aim of this quality study was to emphasize Nurses experience of threat and violence at workplace. Method: The method used in this study was qualitative interviews in the sense to bring out the nurses experience.
Testprogram till hårdvara på en viktindikator
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.