Sökresultat:
1962 Uppsatser om Security awareness - Sida 11 av 131
Med Säkerhetsrådets resolution 1325 (2000) som utgångspunkt : En komparativ studie av två handlingsplaner
Security Council resolution 1325 (2000) is about women, peace and security. Since the resolution was adopted several countries has made their own National Action Plan for implementation of the resolution.Sweden and Denmark are two of these countries. Resolution 1325 is one of the documents that each countries armed force has to relate to in international work.These countries can get to work together in international operations within the framework of the Nordic Defense Cooperation, NORDEFCO. This study is done by looking at similarities and differences in the action plans and whether they can be an obstacle for the countries to cooperate in an international operation.In this paper a comparative analysis of Sweden and Denmark's plans for the Security Council resolution 1325 will be done. The comparison is made based on the clauses of the resolution relating to the member states actions.In this paper, a qualitative text analysis to be carried out with sections of Resolution 1325 as a model for the comparison..
Dominerande affärsmodeller inom området informationssäkerhet
Computers together with Internet have been growing enormously, during the last
decade and the area of information technology has been growing in the same
speed. As long as the surrounding environment evolves, the business models must
within the IT-area, keep the same pace. So, how do business corporations handle
this change to attract customers? How do the dominant business models look
like? In many cases, they are apparently much the same. But what differences
can we see and what areas can be improved?
We have showed that the IT area isn?t just one, it consist of several segments.
Ödesstund för Europa : Om de geopolitiska konsekvenserna av Europas beroende av rysk energi
This is a tale about energy and power. It describes the geographer Halford Mackinder?s geopolitical theories and compares them with current views outlined by Zbigniew Brzezinski and Michael T Klare, among others. With a critical approach it also provides a historical account of a Europe that stands in front of an energy struggle so severe that the current world order seems destined to fall. Oil and natural gas, has since the beginning of the 20th century, been used as a geopolitical tool in order to create dependence, control and even sometimes overthrow empires.
?DET ÄR JU MYCKET HUR MAN SKA VARA FÖR ATT PASSA IN SOM TONÅRING, OCH DÅ SPELAR JU NORMERNA I MEDIA ROLL FÖR HUR MAN TYCKER OM SIG SJÄLV? -En studie om Tv´s påverkan för ungdomars identitetsskapande
In this thesis we have examined if some young people's identity is influenced by television programs. We chose to illustrate this from a gender perspective and have made use of social construction theory. We did group interviews with 13 youngsters, in three groups, to find out how much insight they had in what they watch, if they believe that they are affected and how they believe that gender roles in television programs often look. Our questions are: Does young people's identity take influence of the TV program? How? Creates a social construction of gender in the television programs that young people are watching? Is there awareness among young people on what they watch and how is this in this case out? Important to emphasize is that our results are not necessarily representative of youngsters in general when we only had the opportunity to interview a few.
Hur upplever gymnasieelever sin informationssökning? En studie på en skola utan tillgång till skolbibliotek
This masters thesis aims to investigate how upper secondary school pupils experience their information seeking in a school context without access to a school library. It is the pupils own thoughts and opinions about information seeking and criticism of the sources that is the main focus. The literature that has been used consists of material from research concerning youth and different aspects of information seeking such as the information seeking process, information seeking on the web, criticism of the sources and how pupils interact with other people in order to acquire information. The method that has been used is group interviews. Twelve pupils from an independent school without access to a school library have been interviewed in groups of three.
Behovsanpassad bevakning
The market for security is one filled with great opportunities. The security services companies are numerous and diverse, the Swedish market is dominated by two large companies: Securitas Bevakning AB and Falck Security AB. In this study we have focused on the bigger of the two, Securitas. This report describes and analysis the security service branch and its surroundings in an involved manner. The target group of the result is mainly people within the security branch.
Demokratins vara eller inte vara i Sydöstra Asien : En fallstudie av Vietnams förutsättningar för demokratisering.
This study aims at examine what kind of interest the European Union (EU) have in promoting a democracy process in Eastern Europe. The study is a descriptive case study where the case Ukraine is used to draw general conclusions. The questions asked to pursue the aim are: why does the EU want to promote a democracy process in Ukraine, what kind of methods does the EU use and why is Russia trying to prevent the EU-Ukraine development and instead supporting a Russia-Ukraine development. In this study an analytical model is created and used to analyze EU:s way in promoting democracy in Ukraine. The analyze model consists of six steps used to describe the general promotion of a democracy process and it?s applied in the empirical analysis.
Solidaritet möter säkerhet - Vad 'immigranterna' får representera i immigrationspolitisk diskurs
This essay concerns the notion of how immigration politics, defined as a political discursive structure that explains and justifies how and why the movement of people into a state's territory is restricted and controlled, has come to present its purpose not as solidarity with the 'immigrants' wanting to enter the state but as a protective measure for the state's citizens. By using discourse theory combined with theories from the International Relations field I attempt to explain why and how such a discourse positions 'immigrants' as a threat to the state.First, I concentrate on why an immigration politics discourse would position 'immigrants' as a threat. I argue that in order for people to construct their identity, the 'outside' what they "are not" has to be repressed. In the same way, the state has to dislocate the "outside" and create threats to uphold its supremacy. These boundaries are set to create a feeling of predictability and security, and ultimately they are a way of making peoples' "world" coherent.
Nulägesanalys och verifiering av autentiseringsmetoder : En studie på ett konsultbolag i nätverksbranschen
This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.
Grundläggande läs- och skrivinlärning : Är stavelsen en gynnsam arbetseneht?
The aim of this study is to contribute to a better understanding of the syllable as an alternative to the phoneme at the basic reading and writing. This report is based on a qualitative analysis of Håkanstorp school´s approach to the basic reading and writing in class. Their approach to reading and writing is controversial, as it is based on the syllable instead of the phoneme, as usual in the traditional reading and writing. The education result, I have found, is that the syllable leads to a very clear and structured working procedure, which ultimately leads to class teachers being able to work from a diagnostic approach. This structure, with many parts of the course helps educators to clearly follow what level students are at.
EU som internationell aktör för demokratiska värderingar : EN beskrivande fallstudie av Ukrainas demokratiseringsprocess mellan åren 2004-2014
This study aims at examine what kind of interest the European Union (EU) have in promoting a democracy process in Eastern Europe. The study is a descriptive case study where the case Ukraine is used to draw general conclusions. The questions asked to pursue the aim are: why does the EU want to promote a democracy process in Ukraine, what kind of methods does the EU use and why is Russia trying to prevent the EU-Ukraine development and instead supporting a Russia-Ukraine development. In this study an analytical model is created and used to analyze EU:s way in promoting democracy in Ukraine. The analyze model consists of six steps used to describe the general promotion of a democracy process and it?s applied in the empirical analysis.
Elevers motivation : en enkätstudie i år 5 och 6
The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.
Requirement Specification for Information Security to Health Systems, Case Study - IMIS
During 2001-2002 a prototype, IMIS (Integrated Mobile Information System) was
developed at BTH (Blekinge University of Technology) to demonstrate how mobile
IT-systems can be used in healthcare. The prototype was based on the activity
theory of Engeström.
An ongoing project started in spring 2003. The purpose of the project is
further development of IMIS with special focus in the diabetes healthcare.
Participants in the project are scientists and students at BTH, ALMI
Företagspartner, Blekinge FoU-enhet, Barndiabetesförbundet Blekinge, Blekinge
Diabetesförening, Vårdcentralen Ronneby and Vårdcentralen Sölvesborg.
Mezzanine - en efterställd fordring: En utredning av rättsliga förutsättningar vid obestånd för fordringsmezzanine
Mezzanine is a collective term for hybrid instruments on the leverage finance market, offered as an alternative to traditional debt. As a hybrid, mezzanine combines elements of debt and equity financing. Mezzanine appears, in its most common shape, as subordinated to the senior debt, but ranks higher than pure equity. Reminiscent of security interests, the main importance of subordination is upon the default of the borrower. Therefore, the aim of the thesis is partly to investigate the legal prerequisites for a solid subordination of mezzanine financing, and partly to explain the consequences of subordination in a default.
Restinformation i elektroniska textdokument
Some word processing programs save information that not all users of the program are aware of. This information consists of a number of things. Example of that is who the writer of the document is, the time it took to write it and where on the computer the document is saved. Text that has been changed or removedcan also be saved. This information is not shown in the program and the user will therefore not be aware of its existence.