
Sökresultat:
2291 Uppsatser om Security and trusting relations - Sida 29 av 153
Lycka och livskvalitet ? Vägen till välbefinnande : En studie om den subjektiva upplevelsen av psykiskt välbefinnande
The main purpose of this study was to examine how people who have felt mentally bad, describe their subjective experience of what leads to a mental well-being. The overall research questions were; how does the individual define mental well-being, how does the individual describe the turning-point during her tough period, and in what way does the individual consider that her own effort has influenced her well-being? In order to answer these questions, qualitative research interviews were conducted with persons who?ve felt mentally bad and who?ve got some kind of professional help, and who think that they have a mental well-being today. The empirical material was analyzed from a theoretical resilience perspective. The study?s result showed first of all, that there are different ways to define well-being.
"Periodare" hos socialtjänsten? : En undersökning om unga vuxnas behov av försörjningsstöd
The purpose of this study is to find out how social workers in one medium and one smallmunicipality in central Sweden perceive the need of financial support for young adults formore than one year and what the causes might be. To answer our research questions aqualitative research method was used and four social workers were interviewed. The resulthas been analyzed based of social exclusion, stigma, as well as on structural and individuallevel and linked to previous research. Our results show that although young adults are anexception for long duration for financial support, there are those who lack other means ofsupport for a long time. The results also show that young adults often are recurring in thesocial services, and they are long-lasting.
Organisationskultur ur säkerhetsperspektiv ? en fallstudie utifrån Cultural Theory
The aim of this master?s thesis is to identify differences and similarities, regarding security, in two goods terminals in an organisation in the transport and goods sector. In this thesis we use Cultural Theory as an analytical instrument to investigate organizational culture, as seen from a security perspective. Cultural Theory is a theory seen from two perspectives, the stable perspective and the mobile perspective. These two perspectives concentrate on different research areas.
Spelindustrins Paradox : En eventstudie om lansering av tv-spels påverkan på aktiekursen
Purpose: To examine how video-game releases affect the share price, and if video-game reviews have any impact on the share price of gaming corporations. Method: A quantitative deductive research approach is applied with event study methodology used as basis. The investigated companies were the five largest gaming companies listed on the U.S. NASDAQ exchange. A total of 29 video-game launches and 85 reviews where examined. Theory: The study is based on The Efficient Market Hypothesis, Agent Theory, Public Relations Theory, Nextopia and previous research.Results: The result contains 114 observations in five companies.
Möjligheter och hinder inom palliativ vård i hemmet : upplevelser ur ett sjuksköterskeperspektiv
Background: The need for palliative care at home hasincreased in recent years as more people wish to die in their own homes. Toperform good palliative care by addressing patients' needs and desires of lifecare requires a better understanding of how nurses experience palliative careat home. Aim: The aim of the study was todescribe nurses experiences of caring for patients in palliative care in homecare. Method: The method was asystematic literature review and the article search resulted in elevenqualitative articles. An inductive qualitative approach was used where nursesdifferent experiences was identified. Results: Our results are reportedunder two themes:Opportunities and Barriers. Palliative carein home care experiencedby nurses in variousways in which personalgrowth, experience, guidance,trustful communication, cooperation and self-knowledgewas opportunies thatemerged. Barriers experienced by nurseswas ineffective communication,lack of time and abuseof power in palliative care at home.
Säkerhetsservice/Fixartjänst En fallstudie om en implementeringsprocess som befäster de klassiska könsrollerna
Fighting against accidents with elderly involved have come to be one of the west world's greatest challenges together with the climate changes and epidemics, and in order to fight against these accidents SDF Centre, Gothenburg appointed a man to the post as a caretaker.The aim of this master thesis is to analyse whether the implementation process and the systematic work correspond with Vedungs implementation theory and also put forward arguments for and against a masculine entrance into promotion old-age care; if it strengthens or is a take-off from the classical sexual roles.The thesis main theory is Evert Vedungs theory of implementation, which is constituted of eight factors which facilitates an implementation process. In order to theorise the sexual roles I have appropriated a gender perspective, constituted of multiple researchers and authors.The conclusion I have received through the qualitative interviews carried out with actors involved in the implementation process, is that the security services implementation correspond well with Vedungs implementation theory, hence the implementation has proceeded efficiently. The classical sexual roles is on one hand strengthened through a masculine possession of the security service, and on the other hand can the masculine entrance in the old-age care entail that more men apply for promotion old-age care work..
Låst läge? : En fallstudie om ledarskap, kommunikation, relationer och invävnad mellan Assa AB och Assa Abloy Romania
1998 förvärvades företaget Urbis Security i Rumänien. Urbis Security blev sedermera införlivat i dotterbolaget Assa Abloy Romania. Med tiden har problem börjat dyka upp och företaget har fått allt svårare att hävda sig både kvalitets, konkurrens och resultatmässigt. Följden av detta är planer på nedläggning eller förflyttning av vissa delar i tillvekningsenheten av Assa Abloy Romania. Undersökningens syfte är att med hjälp av den framtagna modellens fyra faktorer utvärdera hur dessa påverkade situationen fram till nedskärningarna av vissa delar inom tillverkningsenheten i Assa Abloy Romania.
Värdering av kundrelaterade immateriella tillgångar
For many companies, the Internet has revolutionized the relationship they have with their customers concerning costumer service. The use of Information Technology in regard to Internet as a media has provided companies with the opportunity to build customer databases in order to target their customers individually. The airline industry was one of the first pioneers to use the full potential of Internet to improve customer relations and its profits which we aim to investigate in greater detail in our thesis.Our thesis answers the question on how Scandinavian Airlines' (SAS) Eurobonus department uses their website to create valuable and profitable relationships with SAS loyalty club members through direct marketing. In order to answer our research question, three key informants have been interviewed - each representing different sub departments at Eurobonus; service and support, IT and marketing. Our results were that the Eurobonus department use direct marketing methods by sending customized e-mail offerings to target specific customer, using their customer databases.
Trygghet i stadens offentliga rum : diskurser, makt och möjligheter till förändring
Women experience, in a vaster extent than men, unsafety in urbanpublic spaces. This is a structural phenomenon, based on unequalpower relations. The theoretical starting-point for my thesis is that howwe choose to express ourselves shape the ways we can think about andunderstand society. In my thesis I study depictions of safety in six ofMalmö city?s action plans and guidelines towards increased safety.
En förändrad socialdemokratisk utrikespolitik? : En motivanalys av socialdemokratiska ställningstaganden gällande försvarsavtalet med Saudiarabien mellan år 2005 till år 2015.
In 2005 the Swedish social democratic government settled a defense treaty with Saudi Arabia. Ten years later, a new Social democratic government ends the treaty. This thesis will study the Social democratic party?s motives behind their actions regarding the treaty. Kjell Goldmanns theory regarding the three fields of interest concerning state?s foreign policy, security policy, economy and international values, will serve as the theory and operationalization of this thesis.
Mot överstatlighet? : Den framtida inriktningen på EU:s utrikes- och säkerhetspolitik. En jämförande fallstudie om Frankrike och Danmark
The aim of this paper is to explain how the European Union?s common strategy for theCommon Foreign- and Security Policy (CFSP) will change with the implementation of the Treaty of Lisbon. A comparative case study and qualitative method is used. On the basis of Smith?s theory of institutionalization we will analyze two member states: France and Denmark.
Blogging i PR-branschen : en ny sorts omvärldsbevakning?
ABSTRACTPurpose/aim: To clarify what information is communicated through the PR-firm JKL:s blog, how it is communicated, how it relates to and diverges from the communication theories in point, and what the strategies behind the blogging are. By doing this I hope to contribute to the knowledge on corporate blogging and how it can be used.Material/method: Qualitative textual analysis of ten blog posts published on the JKL Blog and process seeking interview with the person in charge of the same blog.Main results: JKLs? blogging coincides to the most part with business intelligence, with the exception that the information doesn?t relate directly to the company?s? main activities. This is mainly due to that they can?t publish information about their customers or competitors.
En studie om hur ADHD/DAMP skildras i fem barnlitterära verk
The purpose of this study is to find out, explore and see how children with neuropsychiatric problems like ADHD/DAMP are portrayed and treated in five fictional children?s books written by writers who all are related to ADHD issues, except for one writer.I have done a text analysis performed on five children?s books which can be found in libraries in most of the libraries in Sweden. The analysis shows varying results between the five books followed by a general conclusion about how children with concentration problems are being presented in these chosen children's literature. The main problematic of this study is to examine how these characters are being represented and treated within the scopes of school, family relations and how ADHD/DAMP symptoms are portrayed. This study focuses on analysing how the actual ADHD/DAMP behaviour is being reflected and better understanding for the reader to understand the symptoms of ADHD.Another fact is what kind of relations these children with neuropsychiatric dysfunctions are portrayed when facing with other persons, such as family and friends and how ADHD/DAMP is affecting them daily basis.
Våra sociala medvetanden: En diskussion om ett socialt perpektiv angående medvetandet
In this essay a social perspective on the mind is explored and argued for. The essay moves from a discussion of a social collective foundation for the individual mind to a discussion ofthe main alternative ways of describing the shared social world, namely an action-centred perspective and a power-centred perspective. It is shown that these two perspectives are combinable. A combination of the two perspectives is therefore recommended for a more balanced way of describing the shared social world. In this essay it is argued for that the individuals? mind and her identity is dependent on the surrounding community.
Säker grannupptäck i IPv6
The IPv6 protocol offers with some new functions, one of them is auto configuration. With auto configuration it is possible for nodes, i.e. hosts and routers, for automatically associated with IPv6 addresses without manual configuration. Auto configuration it is another protocol as it uses Neighbor Discovery protocol (ND) messages (ND is mandatory in the IPv6 stack). The main purpose of ND is that nodes can discover other nodes on the local link, perform address resolution, check that addresses are unique, and check the reachability with active nodes.There are exactly the same vulnerabilities of IPv6 as IPv4 and is now exception, ND if not properly secured.