
Sökresultat:
2291 Uppsatser om Security and trusting relations - Sida 10 av 153
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
IR - en förkortad information som ingen förstår? En användbarhetsstudie på Investor relations webbplatser
Titel: IR ? förkortad information som ingen förstår?Författare: Louise Davidson & Johan RoothHandledare: Britt BörjessonSidantal: 49 sidor exklusive bilagorKurs: Examensarbete i medie- och kommunikationsvetenskap, Institutionen för journalistik och masskommunikation, Göteborgs universitetTermin: Vårterminen 2008, period 2Syfte: Syftet är att utvärdera Solbergs kunders IR webbplatser utifrån ett användarperspektiv. Med fokus på innehåll, logik/struktur och tillfredställelseMetod: Kvalitativ metod, användbarhetstester med personliga intervjuerMaterial: Användbarhetstester och efterföljande intervjuer med fem test- och intervjupersonerHuvudresultat: Vårt resultat visar att det största problemet med Investor relations webbplatser inte handlar om strukturen eller logiken på sidan. Det är inte heller något större fel på det innehåll som presenteras. Utan det är förståelsen för Investor relations som bidrar till att sidans effektivitet och tillfredställelse inte är så hög.
Relationen är kunskapens moder. En kvalitativ studie om lärare som kränker elever.
According to reports from the department of education the majority of school children consider school as a place for happiness, security and development. However, one of ten children experience cruelty and abuse on a daily basis and research shows that children are more often violated by their teachers rather than their peers. In year 2006 legislature decided that school children needed to be protected from the harmful abuse and bullying from other children as well as their teachers. Despite the law approximately 50 000 children are the victims of adult abuse in school every year. Meanwhile science also proves that teachers dare not, for different reasons, confront colleagues when witnessing violations of children.
Relationen är kunskapens moder. En kvalitativ studie om lärare som kränker elever.
According to reports from the department of education the majority of school children consider school as a place for happiness, security and development. However, one of ten children experience cruelty and abuse on a daily basis and research shows that children are more often violated by their teachers rather than their peers. In year 2006 legislature decided that school children needed to be protected from the harmful abuse and bullying from other children as well as their teachers. Despite the law approximately 50 000 children are the victims of adult abuse in school every year. Meanwhile science also proves that teachers dare not, for different reasons, confront colleagues when witnessing violations of children.
Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas
Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.
NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan
The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.
Säkerheten i trådlösa nätverk
The number of wireless networks has increased rapidly among both home users and companies in just a few years. That has brought a lot of good things with it, for example the possibility to connect wireless equipment to the network or Internet from an arbitrary position within range of the accesspoint. But since the transmissions take place through the air some new security risks appear. It?s difficult to restrict the signals to a specific space and thereby a lot easier for unauthorized to eavesdrop or disturb the signals compared to a traditional wired network.
USA:s officiella säkerhetsstrategi : Vad ligger bakom?
The purpose of this study is twofold: First, to inquire how the George W. Bush administration plans to keep America safe from external threats and second ? based on the assumption that neoconservatives have influenced the Bush administration ? examine how neoconservative ideas have influenced this strategy to protect America. The research questions are as follows:What is the content of the Bush administration?s security strategy?How are neoconservative ideas reflected in this security strategy?To answer the first question, the main points of two studied documents were summarized.
Ukraina: Realismens återkomst? : En kvalitativ textanalys om hur fred och säkerhet bör skapas i Europa utifrån teorierna realism och liberalism
Ukraine shares a long history with Russia. In the early 21th century, Ukrainians wanted a freer Ukraine. Therefore the orange revolution started in 2004 by the Ukrainians and had a positive outcome. The situation later became worse because of the economic crisis in 2008 and a corrupt president. The pro-western politician Petro Poroshenko was elected to become president in 2014.
Ömsesidigt utbyte av manipulationer - en studie i social kompetens
Social competence is an effective weapon at all costs on today?s market. In many job ads we can see the words to be socially competent. In our report we have studied the subject?s social competence, relations, relationship marketing and personal networks and looked to the connection these subjects have to one another.
Svenskt utrikespolitiskt beslutsfattande : Flernivåanalys av Sveriges beslut att bli en del av den europeiska säkerhets- och försvarspolitiken (ESFP).
In 1998 Sweden accepted the Treaty of Amsterdam which contained a development of the common foreign and security policy (CFSP) towards a European security and defense policy (ESDP). This thesis aims at studying the decision making process behind the Swedish foreign policy decision to further develop its security policy within the European Union. The purpose is to explain which factors and conditions that did affect and influence the Swedish foreign policy decision. The research applies foreign policy analysis, a theoretical perspective that analyzes both domestic and international conditions using different levels of analysis. The research methods being used has been qualitative as well as quantitative, complemented by interviews, since the research is a process tracing case study.The thesis conclusion is that the Swedish decision is explained by several factors.
Faktorer som påverkar sjuksköterskans användande av omvårdnadsplaner : en litteraturstudie
The purpose is to illustrate the phenomenon of self-harm from a social psychological and sociological perspective. The purpose is furthermore to examine the role social relationships play in the individuals´ self- imagine and what role does identification play for anyone who harm themselves? We want to examine in what way social relationships are important and how they function for individuals who harm themselves, both once they have started to harm themselves, and if the relationships in any part caused the cutting to begin with.Questions:How do individuals shape their identity based on self- harm? Which self-image do individuals have who self-harm? Is there anything in the person's previous social relationships that have caused them to begin to hurt themselves?Method:In this paper we have analyzed five autobiographies. We have used open coding from grounded theory as analytical method and subject positions based on discourse analysis.Theory:We have used the Cooley concepts looking glass self, Foucault's theory of power, Giddens' concept of ontological security and existential anxiety.Results and Analysis:We found six different categories that we thought were central. These were negative self-image, guilt, lack of family support, negative experiences of others' views, the protective identity as self- harmer and insecure social relationships in school.Conclusion:The self-harming is a very complex behavior.
Idé, förtroende & utvärdering : En studie om Investor relations hos svenska medicintekniska företag
Syfte: Syftet med denna uppsats är att genomföra en deskriptiv studie och skapa djupare förståelse för hur svenska, nyligen börsnoterade medicinteknikföretag arbetar med Investor relations och hur detta arbete återspeglas i en effektiv aktiemarknad. Samt att undersöka hur de utvärderar effekterna av sin IR-verksamhet.Metod: Genom en kvalitativ studie söker denna uppsats svar i intervjuer med börsnoterade medicintekniska företag, samt i teorier som behandlat möjligheten för rationella investeringar och utformningen av en effektiv marknad.Resultat: Den kapitalkrävande bransch som medicinsk teknik utgör har troligen påverkan på hur kommunikationen och informationsspridningen är utformad då alla respondenterna använder Investor Relations på liknande sätt. Företagen själva anser att det företag som lyckas övertyga investerare om att deras produkter har störst samhällsnytta även kommer att vinna kampen om kapitalet. Trots hård konkurrens om kapital och förståelsen över vikten av Investor Relations görs inga omfattande utvärderingar av arbetet. Anledningen är främst att det tar för mycket tid och att tillvägagångssätten är diffusa.
DDoS : -Vad är det och går det att skydda sig?
This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks..
Media och näringslivet: En studie om hur mediedrev bör hanteras enligt informationschefer och presschefer
Media has power and impact. It is therefore important for managers to be able to handle media storms when they arise. If not, the brand can be affected negatively. It is managers who should learn to handle media storms because the managers constitute an important part of the external face of the company. Because it is managers who should learn to handle media storms it is interesting to study how media storms should be handled from a theoretical management-perspective.