Sök:

Sökresultat:

1771 Uppsatser om Security engineering - Sida 11 av 119

Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd

How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.

Bestämning av lägsta luminans för utrymningsskyltar

This report is based upon an experimental study of exit sign luminescence in different environments. The purpose is to evaluate the lowest luminescence of an exit sign, based upon Swedish regulations. Scientific experiments have been conducted in a controlled environment, where exit sign luminescence was graded by an evaluation group. The results of these have been verified by similar experiments that took place in two department stores. The final result of the study is guidelines for appropriate exit sign luminescence in different environments..

Den militära flygplatsräddningstjänstens taktik - En studie, analys och rekommendationer

This report describes the tactics used by the Swedish Air Force rescue services against crashed military aeroplanes and helicopters. The aim of the report is to study and analyze the tactics used by the different Air Force bases, standards, regulations and equipment. The report also discusses the different work environment problems and hazards around military ARFF. Much of the information gathered for the report comes from interviews with personnel working in and with the military rescue services. The overall conclusion is that the basic conditions for a good ARFF tactic are there, but a lot needs to be improved and optimized..

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

Establishing in China?s ?good-enough? market - - A benchmarking study on Scandinavian engineering industries? further establishment in China

Title: Establishing in China?s ?good-enough? market - A benchmarking study on Scandinavian engineering industries? further establishment in China. Problem discussion: The Chinese market is gaining importance for Scandinavian engineering industries and is by many considered a crucial market to be successful in. These companies have a tradition of producing premium products for premium customers. However, in China many are currently experiencing the threat from local competitors producing products of somewhat less quality aimed at the vast Chinese middle market - the good-enough market.

Förstudie till införandet av centralt loggsystem hos Försvarsmakten

Modern IT systems tend to become more and more complex, while the number of active systems in companies increases. Furthermore, the number of security-related incidents is at an all-time high. These new conditions impose new demands on organizations. For example, it is no longer possible to manually collect and examine the systems log messages.The purpose of this thesis has been to make a comprehensive study of solutions for automated collecting and managing of log messages, analyze the Swedish Armed Forces specification for solutions for central log collection and management, and evaluating exis- ting solutions. The work consisted primarily of literature studies and evaluations of two of the Swedish Armed Forces of selected products: NetIQ Security Manager and Splunk.

Ett anpassat ledningssystem för informationssäkerhet : - Hur gör en liten organisation med hög personalomsättning?

This paper aims to find out how to implement an information security management (ISMS) system that is based on ISO/IEC 27001-standard into a small organization with high employee turnover. The standard employs the PDCA-method as a course of action for implementing the standard. The reason for implementing such a system is to introduce information security to the organization and to maintain it despite the changes in management. The paper based it?s survey on a case study of a student nation in Uppsala, Sweden.

Tillförlitlighet för automatiska sprinkleranläggningar - en analys av befintlig statistik

In this report statistics concerning the reliability of sprinkler systems from seven countries has been analysed. The objective of the report has been to determine the reliability of sprinkler systems in Sweden and to present suggestions on measures to increase the reliability. The main conclusion that has been drawn is that the reliability of sprinkler systems in Sweden is 92 percent according to the analysis of Swedish statistics, and that this figure finds support in statistics from other countries. Further results are that the quality of design, installation, maintenance and inspection of sprinkler has to be improved and that the Swedish incident report has to be revised..

Hotet från de kriminella MC-gängen - en normativ studie av värdekonflikten mellan den personliga integriteten och statens säkerhet

The aim of this essay is to illustrate a fundamental question; what is a democracy allowed to do to protect itself from enemies? I´ve chosen to analyze the conflict between the two values; individual integrity and state´s security. The individual integrity refers to every person's right to have a protected sphere, and the stat´s security refers to its right to protect itself, and these two positions are often time incompatible. This conflict of value is shown in a normative analysis, where depending on which perspective or normative logic is seen as primate, it gives different conclusions to what a democracy should do to defend itself.To demonstrate how severe the threats are against the society, I choose to examine a specific part of the organized crime, the outlaw motorcycle gangs. They have a special position in affecting the legal system because they have an explicit aim to influence the judicial system with scaremongering and threats.

Anbudskalkyl mer användbar i byggprocessen

This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.

Återuppbyggnad av en kollapsad stat - En fallstudie av återuppbyggnaden av staten Afghanistan

The purpose of this thesis is to explore and analyze the processes and efforts involved in rebuilding the war-torn state of Afghanistan. The examined period span from the fall of the Taliban regime in 2001, to the elections in 2005. This period, commonly known as the Bonn-process, sets out the initial time for the reconstruction of the state.A theoretical framework, which considers the necessary mechanisms for successful state-building, will be used to analyze Afghanistan's re-building process. The mechanisms include the prerequisite of a stable security environment, emerging from a cease-fire, together with the development of a well-functioning economy, re-introduction of rule of law and rejuvenating civil society.The failure to establish a secure environment has had a devastating impact on all analyzed aspects of the re-building process. It is therefore crucial that the international society continuing to assists the Afghan government in its efforts to strengthen its capacity, in order to improve the security situation.

Förändrad syn på svensk militär alliansfrihet? : En studie om svensk neutralitetspolitik mellan 1990-2008

Abstract: The purpose of this study is to examine how the Swedish policy of neutrality has changed between the years 1990-2008. The research method used for this essay has been comparative case study, which strives to answer four research questions. Two of these questions are: Which specific occurrences have been fundamental in changing the Swedish policy of neutrality? How have the Swedish policy of neutrality and the policy of non-alignment changed between the years 1990-2008? The theoretical frame work of this study consists of Europeanization as a comprehensive theoretical perspective. In order to explain the Swedish act regarding the policy of neutrality, Logic of Consequences and Logic of appropriateness are used.

Med Säkerhetsrådets resolution 1325 (2000) som utgångspunkt : En komparativ studie av två handlingsplaner

Security Council resolution 1325 (2000) is about women, peace and security. Since the resolution was adopted several countries has made their own National Action Plan for implementation of the resolution.Sweden and Denmark are two of these countries. Resolution 1325 is one of the documents that each countries armed force has to relate to in international work.These countries can get to work together in international operations within the framework of the Nordic Defense Cooperation, NORDEFCO. This study is done by looking at similarities and differences in the action plans and whether they can be an obstacle for the countries to cooperate in an international operation.In this paper a comparative analysis of Sweden and Denmark's plans for the Security Council resolution 1325 will be done. The comparison is made based on the clauses of the resolution relating to the member states actions.In this paper, a qualitative text analysis to be carried out with sections of Resolution 1325 as a model for the comparison..

KBE I PRODUKTUTVECKLING PÅ SCANIA : En undersökning av potentialen i CATIA Knowledgeware

Övergången från CATIA V4 till CATIA V5 innebär nya möjligheter för konstruktörerna på Scania att arbeta med Knowledge Based Engineering, KBE, för att effektivisera och kvalitets-säkra sitt arbete. Då CATIA V5 är en ny plattform som innehåller verktyg med samlingsnamnet knowledgware, för att bygga in kunskap i modeller ville Scania undersöka potentialen i att arbeta med KBE, och hur detta skulle kunna ske på Scania. Vid traditionell produktutveckling tas en helt ny artikel fram vid behov och ofta innebär detta att arbete som tidigare utförts, görs om igen. Syftet med arbetet är därför att undersöka huruvida KBE i CATIA V5 kan erbjuda möjligheter att återanvända kunskap från tidigare arbete och samtidigt kvalitetssäkra denna, samt utreda vilka knowledgewarelicenser som i så fall kan vara lämpliga för Scania.För att göra detta har en litteraturstudie genomförts för att undersöka vad som har gjorts inom området, och även en intervjustudie har utförts inom R&D på Scania. Vidare har sakkunniga på Linköpings Universitet och Tekniska Högskolan i Jönköping intervjuats.

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

<- Föregående sida 11 Nästa sida ->