Sök:

Sökresultat:

1296 Uppsatser om Security Controls - Sida 10 av 87

Behovsanpassad bevakning

The market for security is one filled with great opportunities. The security services companies are numerous and diverse, the Swedish market is dominated by two large companies: Securitas Bevakning AB and Falck Security AB. In this study we have focused on the bigger of the two, Securitas. This report describes and analysis the security service branch and its surroundings in an involved manner. The target group of the result is mainly people within the security branch.

Vägledning för djurskyddskontroll av exotiska smådjur

Exotic small animals that are commonly kept as pets include aquarium fish, cage and aviary birds, rodents, rabbits (Oryctolagus cuniculus), reptiles and amphibians. These different kinds of animals, even species within the same class, may differ markedly from each other regarding physiology and requirements. Although these species are common in both Swedish households and in pet trade, many animal keepers have a lack of knowledge about the origin and requirements of their pets. This is a cause of several health problems seen in animals which are held in captivity. In Sweden, the county administrative boards perform all animal welfare controls.

Tredjemanskontroll - Säker rätt är säkert rättssäker : En studie med utgångspunkt i betänkandet Förbudet mot dubbla förfaranden och andra rättssäkerhetsfrågor i skatteförfarandet (SOU 2013:62)

SKV and Tullverket have several important tools and methods available in each activity to ensure that taxes and fees are paid and charged rightfully. Among other things they use tax or customs surcharges, targeted and general third party injunctions or targeted and general third party audits. The targeted controls, ergo targeted injunctions and audits, are targeted towards specific persons or documents while during the general controls these are not specified. The methods have repeatedly been the subject of discussions and attempts to simplify the tax procedure and increase the Rule of Law for the individual.The government appointed a commission on March 8 of the year 2012 with the assignment to prepare proposals to increase the Rule of Law in the tax procedure. The assignment was therefore to analyze the areas of tax and customs injunctions, reimbursement because of expenses and agents and also third party controls.

Demokratins vara eller inte vara i Sydöstra Asien : En fallstudie av Vietnams förutsättningar för demokratisering.

This study aims at examine what kind of interest the European Union (EU) have in promoting a democracy process in Eastern Europe. The study is a descriptive case study where the case Ukraine is used to draw general conclusions. The questions asked to pursue the aim are: why does the EU want to promote a democracy process in Ukraine, what kind of methods does the EU use  and why is Russia trying to prevent the EU-Ukraine development and instead supporting a Russia-Ukraine development. In this study an analytical model is created and used to analyze EU:s way in promoting democracy in Ukraine. The analyze model consists of six steps used to describe the general promotion of a democracy process and it?s applied in the empirical analysis.

Solidaritet möter säkerhet - Vad 'immigranterna' får representera i immigrationspolitisk diskurs

This essay concerns the notion of how immigration politics, defined as a political discursive structure that explains and justifies how and why the movement of people into a state's territory is restricted and controlled, has come to present its purpose not as solidarity with the 'immigrants' wanting to enter the state but as a protective measure for the state's citizens. By using discourse theory combined with theories from the International Relations field I attempt to explain why and how such a discourse positions 'immigrants' as a threat to the state.First, I concentrate on why an immigration politics discourse would position 'immigrants' as a threat. I argue that in order for people to construct their identity, the 'outside' what they "are not" has to be repressed. In the same way, the state has to dislocate the "outside" and create threats to uphold its supremacy. These boundaries are set to create a feeling of predictability and security, and ultimately they are a way of making peoples' "world" coherent.

Nulägesanalys och verifiering av autentiseringsmetoder : En studie på ett konsultbolag i nätverksbranschen

This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.

EU som internationell aktör för demokratiska värderingar : EN beskrivande fallstudie av Ukrainas demokratiseringsprocess mellan åren 2004-2014

This study aims at examine what kind of interest the European Union (EU) have in promoting a democracy process in Eastern Europe. The study is a descriptive case study where the case Ukraine is used to draw general conclusions. The questions asked to pursue the aim are: why does the EU want to promote a democracy process in Ukraine, what kind of methods does the EU use  and why is Russia trying to prevent the EU-Ukraine development and instead supporting a Russia-Ukraine development. In this study an analytical model is created and used to analyze EU:s way in promoting democracy in Ukraine. The analyze model consists of six steps used to describe the general promotion of a democracy process and it?s applied in the empirical analysis.

Elevers motivation : en enkätstudie i år 5 och 6

The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.

Requirement Specification for Information Security to Health Systems, Case Study - IMIS

During 2001-2002 a prototype, IMIS (Integrated Mobile Information System) was developed at BTH (Blekinge University of Technology) to demonstrate how mobile IT-systems can be used in healthcare. The prototype was based on the activity theory of Engeström. An ongoing project started in spring 2003. The purpose of the project is further development of IMIS with special focus in the diabetes healthcare. Participants in the project are scientists and students at BTH, ALMI Företagspartner, Blekinge FoU-enhet, Barndiabetesförbundet Blekinge, Blekinge Diabetesförening, Vårdcentralen Ronneby and Vårdcentralen Sölvesborg.

Informationskvalitet: informationssökares syn på kvalitet

The aim of this thesis is to examine how different kinds of information seekers are evaluating information quality in the information flow online. To address the problem stated, qualitative interviews were carried out with a librarian as a reference person and a group consisting of journalists and scientists. The result of the study implies that the reference person is well aware of the strategies employed by her in the search process. However, the respondents are not aware of the strategies they are actually using. An explanation is the respondents lack of education in information seeking.

Restinformation i elektroniska textdokument

Some word processing programs save information that not all users of the program are aware of. This information consists of a number of things. Example of that is who the writer of the document is, the time it took to write it and where on the computer the document is saved. Text that has been changed or removedcan also be saved. This information is not shown in the program and the user will therefore not be aware of its existence.

Cloud Computing - A Study of Performance and Security

Cloud Computing är det stora modeordet i IT-världen just nu. Det har blivit mer och mer populärt på senare år men frågor har uppstått om dess prestanda och säkerhet. Hur säkert är det egentligen och är det någon större skillnad i prestanda mellan en lokal server och en molnbaserad server? Detta examensarbete tar upp dessa frågor. En serie prestandatester kombinerat med en litteraturstudie genomfördes för att få fram ett resultatet för detta examensarbete. Denna rapport kan komma att vara till nytta för de som har ett intresse av Cloud Computing men som saknar någon större kunskap om ämnet.

Närståendes upplevelser vid akut kritisk sjukdom

AbstractBackground: When an acute illness or trauma occurs, life becomes disorganised and shattered for the critically ill person and his/her family members. The family members are confronted with thoughts about life and death which can cause stress and anxiety. How the family members cope with the crisis is individual and depending on personality and earlier experiences. Aim: The purpose of this literary review was to illustrate the family members´ experiences when dealing with a critically ill family member. Method: A literary review was made based on fifteen qualitative and quantitative scientific articles and a literary book.

Partnerskapet: trygghet eller en illusion? : En intervjustudie med lesbiska kvinnor som ingått partnerskap

I have critically examined heteronormativity as it permeates our society and questioned ?identities? as designed and constructed, leading to certain identities being seen as normal, while others are regarded as abnormal.I have had a discussion with my informants about love, monogamy, amicable and relationships. Every couple has basically isolated themselves after they became a couple and they feel secure with one another. The partnership is very important for my informants, partly because they see the partnership as a legal and economical security. However, these aspects are not crucial to the decision that they chose to marry, for the main reason is love and the desire to take the relationship one step further.

En studie om ensamkommande barns situation

In this study the semi structured interview method was used to explore what kind of knowledge one In State Authority: The Migration Board, and three Non Governmental Organisations: Red Cross, Save the Children and ISS- International Social Service have about the situation for separated children. Another purpose in this study was to explore if people who are close to the children are working for the best of the children and if their cases were treated with legal security. The result shows that the children?s cases are not treated with legal security and some of the children suffer psychologically from separations from the families and other children need new families because they were maltreated. The result also shows that there are signs that separated children are discriminated compared to children with a Swedish background..

<- Föregående sida 10 Nästa sida ->