Sök:

Sökresultat:

1771 Uppsatser om Security engineering - Sida 7 av 119

"Organisationsförändringen blev räddningen" : En kvalitativ studie om en organisationsförändrings inverkan på personalen

Requirements engineering is a widespread topic in the research field of informatics. However, there is little research regarding lack of requirements documentation and how it is perceived. The same applies for how requirements engineering in retrospect can be implemented. This is a debated issue on blogs and forums but it has not been reflected in the research area.Therefore, this study concerns research questions regarding how the developers, testers and requirements analyst experience the lack of requirements documentation and how requirements engineering in retrospect can be implemented.To answer these questions, data collection has been conducted through qualitative interviews with individuals affected by this problem in their everyday work.This study has provided an explanation of how the problem is perceived and what the consequences are, both direct and indirect. The impacts are divided into three categories and are presented as, emotional consequences, system implications and consequences regarding re source consumption.

Koncern som tillväxtinkubator för småföretag : ? En fallstudie i ett shared service centers möjligheter attstödja entreprenöriella småföretag

???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.

Samverkan bakom eldsvådorna : Ett sociologist perspektiv på samverkan under en kris

Requirements engineering is a widespread topic in the research field of informatics. However, there is little research regarding lack of requirements documentation and how it is perceived. The same applies for how requirements engineering in retrospect can be implemented. This is a debated issue on blogs and forums but it has not been reflected in the research area.Therefore, this study concerns research questions regarding how the developers, testers and requirements analyst experience the lack of requirements documentation and how requirements engineering in retrospect can be implemented.To answer these questions, data collection has been conducted through qualitative interviews with individuals affected by this problem in their everyday work.This study has provided an explanation of how the problem is perceived and what the consequences are, both direct and indirect. The impacts are divided into three categories and are presented as, emotional consequences, system implications and consequences regarding re source consumption.

Veto: En motivanalys av FN:s säkerhetsråds fem permanenta medlemmars agerande i konflikten i Syrien.

Aim: The aim of this study is to analyse the possible motives behind the actions of the five permanent members of the UN Security Council in relation to the conflict in Syria. The background of this aim is the Arab Spring and the protests and violence that have followed the uprising. While, in Libya, the UN Security Council adopted resolutions that allowed sanctions against the Libyan government, no such resolutions have been adopted yet in Syria.Theory: The principal theory of the analysis is Stephen D. Krasner´s theory on sovereignty.Method: I have researched various resolutions and statements done in the Security Council, together with official statements from the actors, through Hadenius´ motive analysis methodology and Gilje & Grimen and Ödmans theories on hermeneutics.Conclusion: The conclusion of the analysis is that there, in the case of Syria and Libya, are two different parties in the Security Council. One that stands for sovereignty and one that stands for intervention.

Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer

Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.

Att tyda tecknen -En alternativ syn på förändringarna av Japans säkerhetspolitik

Japan's foreign and security policy has seen some substantial changes as a result of events like the first Gulf war and 9/11th. This has been taken as proof, by some, that Japan is abandoning its antimilitaristic stance and pursuing a more traditional hard power role through military means. This essay aims to explore if these shifts have coincided with any substantial shifts away from antimilitarism, which has had a strong influence on the country's security policy since the end of WW2.To do this I use constructivist theory, specifically regarding the impact of norms and identities on states security policy and briefly look into the problem of actor designation. The thematic focus is on security policy, from a narrow perspective, and thus I examine areas like the input and output to the Japanese military and the actual applications of this force. State identity is used to explore the prevalence of nationalistic sentiments and support for anti militarism in the public opinion and the political elite.The result of this study points to the further relevance of constructivist theory and especially the application of norms and identity.

Analys och vidareutveckling av hjulupphängning till skogsmaskin

Detta examensarbete är den avslutande delen av utbildningen inom maskinteknik på Linnéuniversitetet i Växjö under våren 2013. Arbetet utfördes i samarbete med Rottne Industri AB där skogsmaskiner utvecklas och tillverkas för skogsbruk. Projektet innefattar utveckling av en hjulupphängningskomponent kallad ?hjularm? tillhörande företagets ledande produkt, skördaren H-8. Resultatet slutade i en ny design av hjularmen med hjälp av CAD-modellering, Systems Engineering och FEM-analysering..

Silverlight på Incordia AB

The purpose of this report is to outline the development of a dynamic Microsoft Silverlight application, which will be able to present products and be administered in a simple manner. The project has been carried out at Incordia AB, a company that specializes in e-commerce, situated in Helsingborg, Sweden. Although the Silverlight application is customized for a particular site, forMicro AB (an ongoing project at Incordia), the template and the classes that are used to manage information, are developed so that they can be used in future projects for Incordia AB..

Utveckling och konstruktion av växellåda för elektroniskt styrda ställdon

The task of constructing a transmission has been provided to us by Digital Engineering, which is a company located in Hovmantorp. After meeting with Digital Engineering we started immediately with the brainstorming to find different ideas with pen and paper. After having presented a number of concepts for the company, we had finally chosen a winner. For the gearbox to be able to work in a good way the tension must never exceed the strain limit of the material. A prototype of the gearbox was produced by TKB Modell.

ISIT-modellen : Vägledning för att realisera en verksamhets informationssäkerhetsmål

The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.

"I en optimal värld skulle det inte se ut som det gör idag" : En kvalitativ fallstudie om vad som ha?nder na?r kravdokumentation inte tas pa? allvar

Requirements engineering is a widespread topic in the research field of informatics. However, there is little research regarding lack of requirements documentation and how it is perceived. The same applies for how requirements engineering in retrospect can be implemented. This is a debated issue on blogs and forums but it has not been reflected in the research area.Therefore, this study concerns research questions regarding how the developers, testers and requirements analyst experience the lack of requirements documentation and how requirements engineering in retrospect can be implemented.To answer these questions, data collection has been conducted through qualitative interviews with individuals affected by this problem in their everyday work.This study has provided an explanation of how the problem is perceived and what the consequences are, both direct and indirect. The impacts are divided into three categories and are presented as, emotional consequences, system implications and consequences regarding re source consumption.

Simulering av kabelbränder i sekundära säkerhetssystem med CFD-koden SMAFS

This report contains CFD-simulations of cable tray fires in nuclear power plant applications with the CFD-code SMAFS. Furthermore the report evaluates the use of CFD-codes within this kind of problems. The assessment of this report is that there is a tendency towards the good use of CFD-codes but before using it solely more research has to be done on the subject..

Snabb och säker roaming i WLAN

This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market. The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative).

Förväntningar på Framtida Mobila Tjänster

Today?s society is very focused around technology and something that is very popular is the usage of mobile devices such as Smartphones or Tablet computers. One of the reasons why these devices are so popular, is because of the large amounts of services or ?apps? that they can provide for the user. They can do a lot of things that makes everyday living easier for the users.The focus of this study is to find out what kinds of mobile services the users of these devices are expecting and/or wishes to see in the future and what is required to be able to develop and use these services in a good way.We started of the study by searching for earlier studies on the same or similar subjects.

Staters förhållningssätt till Human Security i teori och praktik : En jämförande fallstudie om kriterierna för verkställighetshinder till Syrien hos Sveriges och Norges migrationsverk

Den här uppsatsen handlar om staters förhållningssätt till human security i teori och praktik. Syftet med uppsatsen har varit att undersöka om den kanadensiska definitionen av human security används som referensobjekt i policydokument från Norges och Sveriges nuvarande regeringar samt hos ländernas kriterier för verkställighetshinder av syriska medborgare. Uppsatsens metod är en jämförande fallstudie där verkställighetshinder och utvalda policydokument utgör analysenheterna. För att analysera dokument och ställningstaganden används kvalitativ textanalys.Fallstudien visar att båda länderna ser sig själva som föregångsländer inom human security, bland annat genom skapandet av strategier och handlingsplaner. Vidare visar studien att migrationsverken har olika tillvägagångsätt för verkställighetshinder till Syrien.

<- Föregående sida 7 Nästa sida ->