Sök:

Sökresultat:

2207 Uppsatser om Security and defence cooperation - Sida 6 av 148

Container Security Initiative - En diskursanalys utifrån teorier om det il/legala

Container Security Initiative was launched in 2002 by the US Customs and Border Patrol in order to secure the global flow of containers destined for USA. This thesis attempts to analyze Container Security Initiative in relation to a possible future scenario made by the weapons industry where the state's global traderoutes are being subject to militarization. A development which is partly based on the threat posed by global illegal trade. The latter is discussed and defined based on current research made by Carolyn Nordstrom, Moíses Naím and theories on the cosmopolitan perspective made by Ulrich Beck. Strategy documents concerning Container Security Initiative are then analyzed in terms of discourse to try to say something about what the program indicates.

Säkerhetsklassificering av IT-system på Fläkt Woods AB

This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.

Det är mig det handlar om ? en intervjustudie om patienters upplevelse av möjlighet till delaktighet

Background: In Sweden it is a legal right for patients to have the possibility to participate in their own care. Several studies highlight the importance of a good relationship, good communication and good cooperation in order to increase a sense of security and thus the possibility of participation. One way to increase patients' ability to influence and participate can be to adapt person-centered care. This moves the focus from the patient's illness to the patient and his/her resources. Aim: The aim of this study is to describe patients' experiences of the possibility to actively participate in decisions regarding its care and treatment at surgical wards.

Samarbete mellan lantbruksföretag : möjligheter och problem

Nowadays, cooperation is necessary and this study tries to illuminate the possibilities and problems about cooperation in fiction between 7 small/midsize farms in Skåne. Conventional Farming is done with grain and sugarbeets as specialization. Calculation of machine costs have been done and compared in the study, both for the farms in thorough and the fictitious operation companies. Business ratios as depreciation/ha, interest/ha and maintenance/ha have been calculated. In this essay we present a proposal about how a practical implementation can be done. In the proposal there is an example how the distribution of work can be done.

Tower Defence baserad på Derby och HTML5

Vi kommer i denna rapport undersöka hur ramverket Derby kan användas inom spelutveckling tillsammans med HTML5 och CSS3. Derby är ett MVC-ramverk som bygger på Node.js. MVC (Model View Controller) är ettdesignmönster som används inom systemutveckling. Designmönstret separerar presentationslagret och datalagret genom att införa en komponent emellan som kallas controllern. Det Derby framförallt tillför till Node.js är synkronisering av data mellan servern och klienten.

Människohandel som en säkerhetsfråga

The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.

Framtagning av en informationssäkerhetspolicy

This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.

Arbetsprestation, samarbete och sammanhållning i påfrestande arbetsmiljöer: en fallstudie inom beroendevård

Stress is commonly found in society today. This paper aims to examine how work performance, cooperation and team spirit are maintained in demanding work environments. By studying two departments in a public hospital that practises addiction care, our findings suggest the following: If the experienced stress is mainly connected to challenge stressors, it has a positive effect on work performance. By organising work through mechanistic and organic structure, the handling of qualitative and quantitative stress is facilitated. As a consequence, first and foremost cooperation can be maintained, but also work performance and team spirit.

WLAN : Oskyddad och okontrollerad datakommunikation

This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.

Att bli utbildare : En studie av kadetters syn på hur de formas till utbildare

Background: Officers in the Swedish Armed Forces educates their soldiers in various skills and arenas. The Officers get their educational training in officer training courses conducted by the Swedish Armed Forces or the Swedish national defence college. The aim of this study was to find out how the cadets, belive that they are formed into educators, their views on the literature being used in the Swedish armed Forsces, and their views on leadership and educational science.Methods: The data for analysis were collected in spring 2010, by use of a questionnaire among cadets studying the tactical/operational program Ta/Op 07/10 at the Swedish national defence college. The respons rate was 69, 6 %.Results: The majority of the cadets thought that experience was the most important factor in becoming a good educator. Most of the cadets also thought that the literature being used by the Swedish armed forces was good, however, few cadets stated that they will use the material for reflection on their own teaching when working as officers.Conclusions: The Cadets had a positive attitude towards the educational philosphy and literature being used, but few will use the literature in reflecting on themselves as teachers.

Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling

The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.

Bemästra, bistå eller både och? : En kritisk studie av Provincial Reconstruction Teams roll och agerande i Afghanistan

The specific task of this thesis is to illustrate the complexity of a cooperation between civilian and military entities by examining Provincial Reconstruction Teams (PRTs) and their role as an actor among others in the field in a war-torn Afghanistan.By using counterinsurgency strategy as an analytical framework it has been possible to examine the civilian and military contexts closer. Underlying structures concerning the norms and interpretation of reality of the PRTs has been partly revealed. Studies of the PRTs as one significant bearers of "the comprehensive approach", which includes a holistic approach regarding the use of civilian and military capabilities, new conclusions can be drawn on whether a general civil-military approach can be a part of the solution for current and future conflicts. Based on the counterinsurgency strategy, the author has identified three themes as bearing and thus appears through the thesis as a foundation. These are Coordination, Development and Security.

Analys av datakommunikationssäkerhet för VoIP-protokoll

Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..

En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall. These major tests were divided into five smaller semi­ tests. The first semi­test without a firewall suffered from a virus or worm attack resulting in loss of data and log files.

Kommunalt samarbete för att stärka en turistdestination : en studie av turistdestinationen Roslagen

The purpose of the study is to investigate and elucidate how and why municipalities cooperate across municipal boundaries with destination development. To answer the purpose the authors chose two research questions:What are the incentives of cooperation between the municipalities in Roslagen? What are the possibilities and difficulties of cooperation? In order to answer the research questions interviews with local business managers, administrative director, the acting Head of destination and tourist office staff were made. Municipalities have signed a cooperation agreement in October/November 2008, where they will work more formal together to strengthen the destination Roslagen. The result of the study shows that the main motive for municipal cooperation is the sharing of financial resources to promote and develop the destination Roslagen together.

<- Föregående sida 6 Nästa sida ->