Sök:

Sökresultat:

1771 Uppsatser om Security engineering - Sida 8 av 119

Brottsförebyggande arbete i Karlskrona Kommun

Theft without break-ins has increased significantly in the last year of swimming, sports and leisure facilities in Karlskrona, more precisely 60%. Vandalism in the shape of graffiti is another common crime. The solutions are divided into social and situational crime prevention. Social crime prevention engage in actions that are based on social causes of crime rather than the opposite situational crime prevention, which instead assumes that discourage with the help of technical solutions and has as primary objective to hinder accessibility for example theft friendly goods. The main purpose of this work is to come up with solutions to prevent these crimes, while also being cost-effective and realistic to implement. The work is important in that it creates safety awareness and promotes a healthy safety culture. Moreover, the future goal is to lower these statistics. The goal of the work is in addition to developing our knowledge of crime subject, was also to provide help and solutions for our clients.

Kampen om ett föränderligt Arktis : En jämförande studie av Rysslands och Kanadas agerande i Arktis och Arktiska rådet.

The Arctic region is rich in natural resources such as oil, gas, minerals and fish. Climate change causes the Arctic ice melt, making resource extraction possible as well as opening up new transport routes through the Northwest Passage and the Northeast Passage. This has led to competition and cross-border strife among the Arctic States. The two largest states in the Arctic are Russia and Canada, which are also members of the Arctic Council. Russia and Canada are at the moment involved in several disputes regarding the Arctic territory where the ownership of the North Pole is one example.

ISIT-modellen - Vägledning för att realisera en verksamhets informationssäkerhetsmål

The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.

Utveckling av Prisjakts butiksomdömessystem

This thesis work is the result of the company Prisjakt?s wish to develop and improve its current system of opinions for online stores. The challenge was to develop a similar system that competitors are using but better. The collection of information is based on purchases and are collected from Web-shops. The purchases can then be monitored in a control panel.

Mot en kravinsamlingsmodell för utveckling av branschanpassade affärssystem

Ett branschanpassat affärssystem är avsett för organisationer verksamma inom samma bransch. Syftet med denna typ av affärssystem är att ge högre passform än standardiserade affärssystem och vara billigare än skräddarsydda affärssystem. Det råder dock brist på kunskap om hur dessa ska utvecklas. Genom vår litteraturstudie presenteras en kravinsamlingsmodell med utgångspunkt i Requirements Engineering som ska ge stöd för utvecklare vid insamling av krav för branschanpassade affärssystem. Utöver det identifierades ett flertal aktiviteter relaterade till modellen.

Ett öppet eller slutet Europa. En diskursanalys av EU:s flykting- och invandringspolitik

This thesis focuses on the perception of immigration and refugees in the commonEuropean refugee and immigration policy. It identifies different discourses andstudies their development and interrelated power structures.Using the discourse theory of Laclau and Mouffe, documents from theEuropean Council, the Commission, the Justice and Home Affairs Council andParliament debates are analysed. The study is defined in the time span of 1999-2006, i.e. from the European Council's first agreement on developing a commonEuropean asylum system, following the period up till today.Four discourses are distinguished, focusing respectively on rights, security,European Union's needs, and cultural identity. I use Sandra Lavenex theory ofrealism and idealism to analyse one of the main points in the thesis: There is afundamental schism between the one rights-based discourse, focusing on universalhuman rights, and the three sharing a particularistic focus on immigration as asecurity concern.

Trygghet och säkerhet i offentlig stadsmiljö :

To thoroughly think with safety and security in mind is an important issue in planning of public city spaces. Spaces intended to be available to all inhabitants of a city should have a welcoming appearance. Unfortu-nately, this is not the situation in many pedestrian walkways, parks and such spaces, possibly due to lack in safety and security. This master thesis intend to examine questions at this issue ? what makes you feel safe and what causes insecurity in public city spaces. The safety aspect treats the human psychological and sociological ways of perceiving her milieu and other humans in it, and how the physical shape of her surroundings can affect the sense of safety.

Vad förvaltningen bör sträva efter : -riksdagspartiernas uppfattningar om de värden som förknippas med förvaltningen

The values politicians relate with public administration are likely to affect the way that they want the public administration to be organised. The purpose of this study is therefore to examine which values Swedish parliamentary parties relate with public administration and more particularly how they emphasise these values.The study is conducted as an analysis of theoretically relevant bills that the government party and the parliamentary parties have introduced to the Riksdag, and reports and statements of opinion from the parliamentary committees. The documents are from the Riksdag´s sessions from 2000/01 to 2005/06. After examining the documents the conclusion can be drawn that the value that is most emphasised during the period is legal security. This might mean that legal security will have more influence on the decisions taken about the organisation of Swedish public administration..

Den levande policyn

In today's changing environment, an increasing number of companies are realizing thebenefits of analyzing business information and thereby stay competitive. By making use ofdecision support systems, known as Business Intelligence (BI), organizations are expected tocollect and process business data and thus get more out of their business.Nowadays it is not enough for organizations to have access to corporate data inside officewalls, they must also be able to bring the information "on the go", which has been thefoundation for the progress of mobile BI solutions. As the mobility increases and thecorporate data leaves the office, new risks arise, which is one reason as to why manycompanies hesitate at the idea of introducing mobile BI solutions.In this paper we explore two security aspects in the area of mobile BI solutions. Our researchquestion is as follows: How does security aspects affect a company's decision to acquiremobile BI solutions? The survey was conducted through interviews in cooperation with thefirm Optivasys, exclusively dedicated to the BI solution QlikView.A significant part of the theory we studied describes security as critical; however, ourresearch suggests a solution on how companies can manage the security aspects.

Utrikespolitiskt beslutsfattande : En studie om hur en militär intervention kunde godkännas av FN

This study in political science examines the UN adopted resolution 1970 (2011) andresolution 1973 (2011) on the basis of foreign policy decision-making. The study aims toexplain how the UN principle of Responsibility to Protect came to be legitimized for the firsttime by the UN Security Council in the Libya conflict in 2011. By a poliheuristic perspectivethe study attempt to explain Russia and China?s acting in the voting of resolution 1970 andresolution 1973. The background to the conflict in Libya 2011 is presented in the study aswell as the Security Council?s actions during the conflict, from the beginning of the conflictuntil the adoption of resolution 1973.

peer2peer - hur dyrt är gratis?

Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas spyware alternativt adware, misstänks för att samla in personlig information, så som e-mailadresser och lösenord. Det föreligger en risk att informationen sedan säljs vidare eller används för att exempelvis rikta reklam....

Den europeiska arresteringsordern : ett rättssäkert förfarande?

The European union started as an area of economic cooperation, but has developed into an area of cooperation in many legal fields. There are these days even cooperation when it comes to dealing with criminals. There is a new procedure called the European arrest warrant which goal is to make the extradition of criminals between the different member states in the European union more efficient. Sometimes when a state receives a European arrest warrant they have to extradite the person in question without doing any investigation of their own. The procedure is based on the principle of mutual recognition.

Bristfällig säkerhet inom trådlösa routrar med fokus på WPS

I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner..

Analys av arbetsmiljö vid kokarpåsvetsning samt förslag till förbättringar.

Denna rapport är ett inledande steg mot att förbättra arbetsmiljön för svetsare vid påsvetsning med Uddcomb Metoden i massakokare. Syftet med rapporten är att analysera problemet med värme och dålig luft samt förklara hur och varför problemet uppstår. I arbetet ingår även att ta fram olika lösningar för att slutligen hitta ett komplett system för ventilation och kylning. Den föreslagna lösningen består av ett integrerat kylsystem och ett koncept med mindre fläktar, kallade torpeder, som monteras på arbetsplanen vilka driver ut varm och smutsig luft snabbare ur kokaren. Den föreslagna lösningen utreds även ur ett ekonomiskt perspektiv.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

<- Föregående sida 8 Nästa sida ->