Sök:

Sökresultat:

2291 Uppsatser om Security and trusting relations - Sida 9 av 153

Vad förvaltningen bör sträva efter : -riksdagspartiernas uppfattningar om de värden som förknippas med förvaltningen

The values politicians relate with public administration are likely to affect the way that they want the public administration to be organised. The purpose of this study is therefore to examine which values Swedish parliamentary parties relate with public administration and more particularly how they emphasise these values.The study is conducted as an analysis of theoretically relevant bills that the government party and the parliamentary parties have introduced to the Riksdag, and reports and statements of opinion from the parliamentary committees. The documents are from the Riksdag´s sessions from 2000/01 to 2005/06. After examining the documents the conclusion can be drawn that the value that is most emphasised during the period is legal security. This might mean that legal security will have more influence on the decisions taken about the organisation of Swedish public administration..

Den levande policyn

In today's changing environment, an increasing number of companies are realizing thebenefits of analyzing business information and thereby stay competitive. By making use ofdecision support systems, known as Business Intelligence (BI), organizations are expected tocollect and process business data and thus get more out of their business.Nowadays it is not enough for organizations to have access to corporate data inside officewalls, they must also be able to bring the information "on the go", which has been thefoundation for the progress of mobile BI solutions. As the mobility increases and thecorporate data leaves the office, new risks arise, which is one reason as to why manycompanies hesitate at the idea of introducing mobile BI solutions.In this paper we explore two security aspects in the area of mobile BI solutions. Our researchquestion is as follows: How does security aspects affect a company's decision to acquiremobile BI solutions? The survey was conducted through interviews in cooperation with thefirm Optivasys, exclusively dedicated to the BI solution QlikView.A significant part of the theory we studied describes security as critical; however, ourresearch suggests a solution on how companies can manage the security aspects.

Utrikespolitiskt beslutsfattande : En studie om hur en militär intervention kunde godkännas av FN

This study in political science examines the UN adopted resolution 1970 (2011) andresolution 1973 (2011) on the basis of foreign policy decision-making. The study aims toexplain how the UN principle of Responsibility to Protect came to be legitimized for the firsttime by the UN Security Council in the Libya conflict in 2011. By a poliheuristic perspectivethe study attempt to explain Russia and China?s acting in the voting of resolution 1970 andresolution 1973. The background to the conflict in Libya 2011 is presented in the study aswell as the Security Council?s actions during the conflict, from the beginning of the conflictuntil the adoption of resolution 1973.

Barns möten med interaktiva medier

This essay deals with children?s and adolescents? use of interactive media as a tool for doing relations with each other. The purpose is to increase the understanding of the impact interactive media has on pupils? relations and identity development both in school and on their spare time. The school system?s mission is not only to teach formal knowledge and facts but also to train children?s social skills and abilities.

peer2peer - hur dyrt är gratis?

Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas spyware alternativt adware, misstänks för att samla in personlig information, så som e-mailadresser och lösenord. Det föreligger en risk att informationen sedan säljs vidare eller används för att exempelvis rikta reklam....

Den europeiska arresteringsordern : ett rättssäkert förfarande?

The European union started as an area of economic cooperation, but has developed into an area of cooperation in many legal fields. There are these days even cooperation when it comes to dealing with criminals. There is a new procedure called the European arrest warrant which goal is to make the extradition of criminals between the different member states in the European union more efficient. Sometimes when a state receives a European arrest warrant they have to extradite the person in question without doing any investigation of their own. The procedure is based on the principle of mutual recognition.

Interorganisatorisk ekonomistyrning i nära relationer : En fallstudie av relationen mellan ett stort köpande företag och två av dess viktigaste samarbetspartners

Title: Interorganizational accounting in close relations ? A case study of the relation between a big purchasing company and two of their most important cooperation partners Course: Master thesis in Business and Administration within Accounting, 30 ECTS Advisor: Gun Abrahamsson Theoretical framework: This thesis uses theories of business relationships, management information systems and interorganizational accounting. Conclusions: Despite a difference in the relations the interorganizational accounting is designed and used in a similar way. The interorganizational accounting that exists in the two relations has a medium scope, fast timeline, high aggregation and high integration. The information is mainly used for attention directing and for decision making.

Leverantörsrelationer : - i byggbranschen jämfört med ett företag i produktionsbranschen

Study objects: JM, Folkhem and ABB.Purpose: The purpose with this study are to examine how the supplier relations are in the construction branch and compare that result with how the supplier relations are for ABB a production company.Theoretical: The theoretical chapter illustrates important and relevant parts of supplier relations, purchasing and supplier strategies to give good overview. The theoretical review will combine information from different fields to consent with the research problem.Method: A case study has been made on three different companies, one of the companies was active in the production industry the other two were active in the construction industry. Data was mainly collected through semi structured interviews on each of the three companies.Conclusions: The size of the company decided which point of view the company had on purchasing, traditional or modern view. All three companies had a centralized purchasing organization but the construction firms were more decentralized than the production company. The reason was that the construction firms were dependent with more flexibility when every construction project is unique..

Bristfällig säkerhet inom trådlösa routrar med fokus på WPS

I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner..

Sundbybergs stadsbibliotek. PR-arbete under åren 1954-1964.

The purpose of this master's thesis is to describe the expansion of Sundbyberg public library during the decade 1954 to 1964. Our focus of interest is the library?s concentration on public relations in 1954.During the experimental year 1954 a public relations librarian, Bianca Bianchini, was employed. Her task was to introduce thelibrary to the citizens of Sundyberg who were not already using it. As a background to this concentration on public relations we also describe the early development of the public library in Sundbyberg.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

PR-olitik: En fenomenografisk studie av konstruktionen av kunskap och kompetens i gränslandet mellan politik och näringsliv

The Swedish Public Relation industry has gone through a rapid growth in the recent decade. A peculiar, although perhaps not unexpected, development is that former politicians and politically employed individuals to a larger extent have been the subject of recruitment effort from the industry. Simultaneously there has been a public debate concerning the influence on Public Relations and Lobbying over the political agenda. The purpose of this thesis is to widen and deepen the discussion concerning Public Relations consultants. It centers on the individual consultants and takes their competence as the point of departure.

Samverkande, motverkande eller kompletterande? : En uppsats om relationer mellan styrsystem

Title: Co-operative, prevent or complement? - An essay on the relationships between control systems. Authors: Kim Eriksson and Victoria KarlssonPurpose: The essay aims to describe the relations between control systems and how they related to each other, based on an operationalization of the control systems. Research question: What are the control systems relations to each other? With regards whether control systems co-operative, prevents and/or complement each other.Theoretical framework: The essays theoretical framework is based on Malmi and Browns (2008) description of five different control systems and control mechanisms associated with each control system.   Research methodology: The method was based on three different data collection methods. These methods were observations, documentation, and semi-structured interviews.Conclusions: It is concluded that the control systems has comprehensive relations. Control systems have more, than one, relation to each other..

Privilegierad mobilitet? : Flygplatser, resande och säkerhet

Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.

<- Föregående sida 9 Nästa sida ->