Sök:

Sökresultat:

2291 Uppsatser om Security and trusting relations - Sida 4 av 153

Mänsklig säkerhet i Sudan- För vem och mot vad?

The concept of security is a contested one. The United Nations definition in UNDPs Development report of 1994 is the most authoritive and commonly cited. The civil war in Sudan has led to 2 million deaths and over 5.5 million refugees. In a resolution from 2005, the UN decided that the war in Sudan was a threat to international security and peace. The 10th of January UN decided that a peace commission ought to be send with 10 000 military and civil men including 700 policemen.The main purpose of this thesis is to improve our knowledge of those factors which can cause an increased risk of conflict within a state, and how that can affect the social conditions for individuals.

Mellan säkerhet och mänskliga rättigheter : en studie av den svenska officiella migrationsdiskursen

This paper focuses on the Swedish migration discourse and investigates if and to what extent it is dominated by a security perspective. Analysing a number of official texts and documents I want to show how the discourse describes migrants and what implications this carries with it for the migrants and for the Swedish migration politics. Through discourse analysis I have analysed whose security that is prioritised, the Swedish or the refugees, who is the refugee and the asylum seeker, and who is the illegal migrant in the Swedish official migration discourse. As a theoretical frame for the analysis I have used theories on migration and security. These include theories on the securitisation of politics, the globalisation and the creation of political identity from the nation state perspective and theories on the connection between migration and security.My results show that a security discourse is dominating the Swedish official migration discourse and is therefore defining our reality and the identities of refugees, asylum seekers and illegal migrants.

Solidaritet möter säkerhet - Vad 'immigranterna' får representera i immigrationspolitisk diskurs

This essay concerns the notion of how immigration politics, defined as a political discursive structure that explains and justifies how and why the movement of people into a state's territory is restricted and controlled, has come to present its purpose not as solidarity with the 'immigrants' wanting to enter the state but as a protective measure for the state's citizens. By using discourse theory combined with theories from the International Relations field I attempt to explain why and how such a discourse positions 'immigrants' as a threat to the state.First, I concentrate on why an immigration politics discourse would position 'immigrants' as a threat. I argue that in order for people to construct their identity, the 'outside' what they "are not" has to be repressed. In the same way, the state has to dislocate the "outside" and create threats to uphold its supremacy. These boundaries are set to create a feeling of predictability and security, and ultimately they are a way of making peoples' "world" coherent.

Är handdatorer säkra nog för hälso- och sjukvården?

The aim of this report is to discuss computer security in handheld computers and to find out the appropriate security level that must be implemented to be able to use handheld computers within the Swedish healthcare system. Most healthcare centers are using some kind of electronic journals for their patient´s data today, but there are still a number of clinics that are usingthe old paper-system. On a few places in Sweden the use of handheld computers at the clinics has already started, but in the United States the use of handheld computers in the medical area is already widespread and from this we can see a lot of different situations where it is useful and effective to work with handheld computers. The security demands on patient´s journals are high and regulated in both Swedish law and regulations from the National Swedish Board of Health and Welfare. The law does not have any substantial demands, but states that there should be an adequate security level based on the nature of the information and the costs.

Motivationsfaktorer : - Vad påverkar motivationsnivån hos telefonförsäljare?

Through an examination on a Telemarketing company this paper aim to investigate which relations there is between the level of motivation and performance and how these are related to the factors that are included in Herzbergs two-factor-theory.In this essay we have been using a questionnaire and interview. We have also been able to collect statistics on employees from the Telemarketing company we examine. On the basis of these data we have analyzed which relations there is.The examination shows on relations who mean that the factors Performance and Acknowledgement are the ones that affect the motivation the most, and therefore the level of Performance. The rest of the Motivation factors don?t show any clear relations.

Stuxnet-attacken mot Iran : Strukturell realism i informationsrevolutionens tidsålder

This study aims to explain the Stuxnet-attack against Iran in 2009-2010 by using the IR-theory of structural realism. By doing so the theory also faces the challenge of the impact of the information revolution on security and international relations. The structural realism that is at hand is that of Kenneth Waltz and his Theory of International Politics from 1979.The study reaches the conclusion that Waltzs focus on the structure of the international system and the distribution of capabilities applies well to the case of Stuxnet as a cyber attack. The creators of the sophisticated Stuxnet, USA and Israel, also indicates that when it comes to this certain aspect of the information revolution and IR, states seem to still be the main actor. Finally the character of one of the major features of the Stuxnet-attack; the internet, is shown to have an anarchic structure that fits well as an extension of the realist view of the international system..

Säkerhetsutvärdering certifikatserver i stället för aktiva kort

Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware.

Säkra kommunikationskanaler i en distribuerad heterogen miljö

The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a secure manner.

Ga?r det att ma?ta transparens i e-handelsklimat? Finns det ett samband mellan fo?rtroende och uppfattad transparens?

Denna empiriska studie underso?ker om det ga?r att finna ett samband mellan fo?rtroende och uppfattad transparens i e-handelsklimat. Fo?r att ma?ta fo?rtroende tar studien ha?nsyn till Harrison McKnights fo?rtroendekonstruktion fo?r e-handel (Trusting beliefs) tillga?nglig i hans studie (McKnight, Choudhury & Kacmar, 2002) Fo?r att ma?ta transparens har en transparenskonstruktion utformats (Perceived transparency). Begreppet transparens i studien har sitt ursprung i egen tolkning med tillho?rande modell och konstruktion.

Säkerhetsklassificering av IT-system på Fläkt Woods AB

This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.

Dagens Nyheters tryckeri: En jämförande tvåfallsstudie av företaget och makten

This study is an institutional analysis of the firm both as it is theoretically conceptualized and how it takes shape and changes. The role of power relations between manage¬ment and employees is especially examined with the aim of evaluating pos¬sible connections between the firm as an institution and power relations within it. Based on a comparison of two cases (two selected periods of the same organization) it asks ?How closely does each case match the conceptual characteristics of the firm??; ?What are the power relations between management and employees in each case??; and finally ?What factors account for the resulting differences??. It is found that there is a negative correlation between employee power and proximity to the firm as a concept.

Människohandel som en säkerhetsfråga

The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.

PATIENTENS DELAKTIGHET : En förutsättning för god vård

Today patients are more aware of their rights regarding their own care. They are more informed, more engaged and have more and individual requirements, which leads to increased demands for information and participation increases. The Health Act sets out the patients´ right to participation. Participation increases patient satisfaction with care, promotes healing and increases adherence to health care advise. The patient doesn´t always experience participation in their own care to the extent they wish, which suggests that nurse?s does not always succeed in getting the patient involved.

Framtagning av en informationssäkerhetspolicy

This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.

WLAN : Oskyddad och okontrollerad datakommunikation

This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.

<- Föregående sida 4 Nästa sida ->