Sök:

Sökresultat:

1115 Uppsatser om Security assurance - Sida 18 av 75

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Experimentell spelmekanik - Realtidsaction m oter turbaserad strategi

In the gaming industry, it has long been popular to combine genres with the aim ofcreating games that bring together the best of several worlds. However, there are stillmany unexplored combinations with good potential.This report addresses the planning and development of a game prototype that combinestwo game genres, turn-based and real-time strategy. In addition to presenting the results,the report also discusses the di culties that were encountered and how they were handled.The prototype contains a working combat system and a basic AI. The prototype ismodular, which means that it is easy for an end user to extend the game with extra content.Most elements that were considered important from the two genres were implemented, butthere is still room for improvement and further development.The result is evaluated by means of quality assurance, a process that is commonly usedin the gaming industry. The response has been generally positive, which indicates thatthe combination has potential and should be explored further..

Samverkan eller motverkan? En studie om myndighetssamverkans konsekvenser för rättssäkerheten och barnperspektivet

Children that are taken care of for institutional care by the social services are unprivileged as a group. When society takes over the parenting role, it forces local governments and other accountable authorities to guarantee these children satisfactory support and good care according to each child's needs. The aim of this thesis is to analyze and discuss problems with implementation in policy processes when authorities incorporate. From the normative standpoint of legal security and the United Nations Children's Convention, this thesis investigates the consequences of interaction between two Swedish supervisory authorities for the social services: Socialstyrelsen and länsstyrelserna. To fulfill the aim I will investigate the approach taken by the authorities and the work division between Socialstyrelsen and länsstyrelserna.

"Storebror" kommer till stan? En diskursanalytisk studie av debatten kring kameraövervakning av "Stråket" i Malmö

Social control in different forms has existed in all known societies. This control has taken different shapes and expressions. In older smaller communities there was a collective control among the citizens. In modern societies the state is trying to control the lives of the citizens. These control mechanisms can be seen as both freedom-reducing and freedom inducing depending on which concept of freedom one upholds.

Äldre personers upplevelser från att bo i eget hem till att flytta in på ett äldreboende.

Background:The concept of transition means a change in a person's life where he or she is forced to adapt. There are different phases in life that results in different adaptations. In this essay, transition is described as the physical and mental journey between the home and an elder care facility. The Aim was to describe elderly people's experiences of transition when moving from their previous home into an elder care facility. The Method used was a literature review.

Säkerhet i Wireless Local Area Networks : En studie i säkerhetslösningar utförd på uppdrag av Saab Bofors Dynamics AB.

Saab Bofors Dynamics AB is looking for ways to let the employees work wireless in the future. The security in Wireless Local Area Networks (WLAN) has not been considered very reliable, but new standards and protocols have been developed to enhance the security in WLAN. Since most wireless components soon will have built in support for wireless communication, it is important to have a model to deal with secure wireless communication ready. This is necessary because it is important to protect the company?s information related systems, ensure contingency in the daily work and maintaining the trust of the market and the authorities.

Det (väst-) europeiska samarbetet - från säkerhetsdilemma till stabil fred

In this essay the morphing of the interstate relations in the post-World War II Western Europe is taken in to consideration in discussing how these relations were stabilized and consolidated through community cooperation to achieve a state of stable peace. It concludes that the early 1900's of Western Europe comes close to being conditioned by Herz's security dilemma and then continues to analyze the development from this state to one of stable peace. In this analysis pivotal features of the ECSC, EEC and the EC are being scrutinized through the use of Boulding's Stable Peace theory and developments of the very same, in separate case studies, in order to account for the Communities? influence on the peace process.In doing this, conclusions are drawn that external pressures can be very effective in creating an incentive to move beyond an initial state of conflicting self-images and that a stabilizing process has got to provide a long term solution in order to sustain a trustful relationship. In order to provide this long term solution the community cooperations suggests that locking in through institutionalization, harmonization, and the creation of a state of irrevocable interdependence are highly effective..

Personuppgifteshantering och identifiering inom myndighet, skola och förtag

The authors of this thesis have studied the handling of personal information in various kinds of organizations, because the perception is that the knowledge in this area is weak relative to the weight of the subject.The purpose of this paper has been partly to shed light on how knowledge of this area in the organizations that we have visited during the study but also to answer questions about handling, knowledge and security, and identification of individuals in different systems. What kind of problems the processing of these data creates and why these problems occur.In the beginning of our study we understood the importance of using the correct identifier and therefore chose also to examine what the various identifiers used by the organizations and why they chose these particular identifiers.In the qualitative analysis, Datainspektionen´s general rules and advice has been used as a basis together with the laws applicable to the organizations to get a good picture of how management of personal information is in these organizations.What we have found in this paper is that knowledge about how personal data is handled and what laws and rules are saying is very much dependent on how central the information is to these organization's activities. The police use so many different types of records for their organization to function well and they have very good knowledge of laws and regulations. In contrast, schools that do not handle as much of personal data themselves nor have the same knowledge among staff and do not have enough resources to cope with keeping the same knowledge base as the police. This is something that applies to all types of handling, depending on how important the information is for the organization, the better the security and knowledge in handling the data is..

Myndighetssamverkan i Barnahus : Blir det bättre för barnen?

Many children are being abused by daily basis. Mostely they are abused by a parent or another person that is close to the child. Mostely the child abuse never is reported to the social services or to the police, and even if the perpertrator is known, only a few cases are brought to prosecution. If a case allthough is drawn before the court of law, there are still too many of the perpetrators that are being acquitted. In other words, the legal security for the abused children is way too low.When suspiscions arise that a child is exposed to child abuse there are several inquiries that starts at the same time.

Föräldramedverkan vid utförande av vårdåtgärder i hemmet efter instruktion/utbildning från sjuksköterska : Föräldrars och sjuksköterskors upplevelser

Introduction: Parental involvement is becoming increasingly common in the paediatric health care. Parental participation at home means that parents receive instruction by nursing staff in order to perform a caregiving procedure at home.Aim: To explore parents' feelings about performing caregiving procedures on their child at home, and their experience of instruction about these, and to explore nurses? experiences of their instruction to parents.Method: A descriptive quantitative and qualitative design using questionnaires with statements to be responded by nurses and parents according to scales graded 1-10. The study was carried out during the autumn of 2009 at a pediatric unit in the University Hospital in Uppsala.Results: Ten completed questionnaires from the nursing staff and ten from parents were obtained. The mean assessment of parents' perceived safety and security, and their perception that their questions had been answered ranged between 8,6 and 9,2.

iPad på en byggarbetsplats : Det effektiva och papperslösa sättet att arbeta på

Quality assurance of construction projects and create effective ways of working, is intoday's pressed position, major objectives for building contractor companies. This thesis is an attempt to see if it is possible to achieve these goals with the new modern tool iPad.The author of this thesis has during the latter half of his one year practice work in Uppsala for the Swedish building construction company NCC Construction Sverige AB, conducted a study on the possibility of using the iPad on an construction site. This has been done with active field studies in which applications have been tested and also the supervisors receptive. The usability of the iPad has always been in focus since it is important that the applications are easy to use and easy to learn.The results of the work, as presented in this report, points at opportunities in efficiency if the iPad is introduced and used on construction site. There are many useful applications for the iPad, and with a system that can handle the synchronization between the iPad and the computer, the workflow will be streamlined significantly..

Mobbning i skolan : En studie om elevers relation till mobbning

According to Nosti (2012) banks target youths to find new customers by giving them special offers such as debit cards from a relatively early age. However, Moschis and Churchill (1979) point out that age can affect the level of knowledge in the consumer. Therefore, this essay focuses on youths as consumers. Specifically, youths? awareness of security risks in using bank tools such as debit cards or internet banks was studied.

Äldres berättelser om åldrandet

ABSTRACT Our main objective with this essay is to provide a description of old people?s stories about aging. The essay is based on the empirical source of four qualitative interviews with older people over the age of eighty years young. The main goal is to inquire answers about; their time in the workforce; retirements; healthissues; media/advertisements; adolescence/youthfulness and attitudes. The following main questions have been dealt with: What do the elderly emphasize when they describe ageing? Are healthissues the prime subjects the elderly talk about? Do the elderly experience positive or negative attitudes towards ageing? What is their point of view of younger generations? In what way do they describe their years as workers? In what way do they describe aspects about their retirement? We reserved to consider the opinion of their own, to be the most valuable source in our study.

Bring Your Own Device : Ur ett säkerhetsperspektiv

Syftet med denna studie är att identifiera hot, risker och konsekvenser kopplade till BYOD samt undersöka hur dessa kan lösas. BYOD är idag något som införs i allt större utsträckning hos olika företag världen över. Många är intresserade av alla möjligheter det kan frambringa, dock blundar allt för många för alla de olika hot och risker det samtidigt kan medföra. Utöver det tar vi i denna studie även upp hur man kan skriva en säkerhetspolicy kopplad till området BYOD. För att komma fram till våra slutsatser har vi förutom den teori vi samlat in fått hjälp av Jan-Olof Andersson en av Sveriges främsta IT-säkerhetsexperter med att skapa en riskanalys och en arkitekturbild.

Resolution 1325, lidandet i Liberia och kvinnors rättigheter

AbstractBetween 1989-1996 and 2000-2003 a civil war took place in Liberia. During the war many, many people were killed or were forced to flee. Another of the war's characteristics was the high number of women being sexually abused and beaten by the soldiers. The aim of this thesis is to analyze to what degree the peacekeeping personnel in Liberia, foremost staff working for the UN and agencies related to the UN, have implemented Resolution 1325 in their work. Resolution 1325 was adopted by the members of the United Nations Security Council in year 2000 and aims to increase the efforts made to secure women's rights and security in parts of the world where war and crisis prevail.

<- Föregående sida 18 Nästa sida ->