Sökresultat:
1962 Uppsatser om Security awareness - Sida 8 av 131
Ska det framtida Göteborg växa och gro?: En diskursanalys gällande beslutsfattares syn på urbant jordbruk
An increasing global population and a worldwide growing urbanization has raised the questionabout the future food security in cities all over the world. Peak-oil limits the access to cheap fossilfuels which threatens the global food-supply chain. This has resulted in a larger awareness anddiscussion related to urban agriculture. Growing crops and keeping animals within the city-borderscould be one way of creating a more robust and sustainable food supply for city dwellers. However,to enable an expansion of the urban agriculture many theorists argue that policies and institutionalstructures that supports and promotes city farming have to be developed.
Den levande policyn
In today's changing environment, an increasing number of companies are realizing thebenefits of analyzing business information and thereby stay competitive. By making use ofdecision support systems, known as Business Intelligence (BI), organizations are expected tocollect and process business data and thus get more out of their business.Nowadays it is not enough for organizations to have access to corporate data inside officewalls, they must also be able to bring the information "on the go", which has been thefoundation for the progress of mobile BI solutions. As the mobility increases and thecorporate data leaves the office, new risks arise, which is one reason as to why manycompanies hesitate at the idea of introducing mobile BI solutions.In this paper we explore two security aspects in the area of mobile BI solutions. Our researchquestion is as follows: How does security aspects affect a company's decision to acquiremobile BI solutions? The survey was conducted through interviews in cooperation with thefirm Optivasys, exclusively dedicated to the BI solution QlikView.A significant part of the theory we studied describes security as critical; however, ourresearch suggests a solution on how companies can manage the security aspects.
Biblioteket är till för användarna. En studie av folkbibliotekariers syn på bibliotekarieetik
The main purpose of this master thesis is to explore a selection of Swedish librarians view of professional ethics. The latest master thesis written on the subject was published in 1997, which concluded that the Swedish public librarians had a poor awareness concerning professional ethics. We wanted to investigate if something had changed. We interviewed six librarians from five public libraries, asking them questions concerning ethical guidelines, responsibility, censorship and selection, pressure from lobbyists, and ethical problems relating to Internet. The answers we got gave the impression of a divided profession, and the librarian?s awareness of professional ethics can hardly be said to have been improved since 1997.
Utrikespolitiskt beslutsfattande : En studie om hur en militär intervention kunde godkännas av FN
This study in political science examines the UN adopted resolution 1970 (2011) andresolution 1973 (2011) on the basis of foreign policy decision-making. The study aims toexplain how the UN principle of Responsibility to Protect came to be legitimized for the firsttime by the UN Security Council in the Libya conflict in 2011. By a poliheuristic perspectivethe study attempt to explain Russia and China?s acting in the voting of resolution 1970 andresolution 1973. The background to the conflict in Libya 2011 is presented in the study aswell as the Security Council?s actions during the conflict, from the beginning of the conflictuntil the adoption of resolution 1973.
peer2peer - hur dyrt är gratis?
Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas
med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas
spyware alternativt adware, misstänks för att samla in personlig information,
så som e-mailadresser och lösenord. Det föreligger en risk att informationen
sedan säljs vidare eller används för att exempelvis rikta reklam....
Den europeiska arresteringsordern : ett rättssäkert förfarande?
The European union started as an area of economic cooperation, but has developed into an area of cooperation in many legal fields. There are these days even cooperation when it comes to dealing with criminals. There is a new procedure called the European arrest warrant which goal is to make the extradition of criminals between the different member states in the European union more efficient. Sometimes when a state receives a European arrest warrant they have to extradite the person in question without doing any investigation of their own. The procedure is based on the principle of mutual recognition.
Bristfällig säkerhet inom trådlösa routrar med fokus på WPS
I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner..
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information.
Much of the information is confidential and should not be read by those not
privileged. To protect the information from unauthorized access cryptography
can be applied. The cryptography algorithms in use today all have their pros
and cons. They are therefore suited for different applications.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..
Privilegierad mobilitet? : Flygplatser, resande och säkerhet
Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
Oavsiktlig vakenhet under operation - Hur kan riskerna minskas?
Bakgrund:Awareness definieras som när en patient i generell anestesi i efterhand kan minnas händelser eller ha förnimmelser från en operation då han eller hon borde varit medvetslös. Det är en allvarlig anestesiologisk komplikation som kan leda till posttraumatiskt stressyndrom. Av de patienter som genomgår kirurgiska ingrepp i generell anestesi drabbas cirka 0,1 - 0,2 %. Den vanligaste orsaken till awareness är ytlig anestesi, vilket hos särskilda riskpatienter ibland kan vara svårt att förebygga med endast traditionell övervakning. Det finns därför ytterligare metoder att tillgå.
NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan
The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.
USA:s officiella säkerhetsstrategi : Vad ligger bakom?
The purpose of this study is twofold: First, to inquire how the George W. Bush administration plans to keep America safe from external threats and second ? based on the assumption that neoconservatives have influenced the Bush administration ? examine how neoconservative ideas have influenced this strategy to protect America. The research questions are as follows:What is the content of the Bush administration?s security strategy?How are neoconservative ideas reflected in this security strategy?To answer the first question, the main points of two studied documents were summarized.
Ukraina: Realismens återkomst? : En kvalitativ textanalys om hur fred och säkerhet bör skapas i Europa utifrån teorierna realism och liberalism
Ukraine shares a long history with Russia. In the early 21th century, Ukrainians wanted a freer Ukraine. Therefore the orange revolution started in 2004 by the Ukrainians and had a positive outcome. The situation later became worse because of the economic crisis in 2008 and a corrupt president. The pro-western politician Petro Poroshenko was elected to become president in 2014.