Sök:

Sökresultat:

1528 Uppsatser om Security features - Sida 9 av 102

Kända Varumärke - Större, Starkare, Säkrare

In todays high-technological society where the Internet plays a central role in our day-to-day life, many e-retailers are not able to attract customers to complete a transaction on their website. In order to succeed, many e-commerce sites must improve several safety aspects regarding online payment, in order to be perceived as a reliable and secured retailer. The purpose of this paper is to investigate if increment in various combinations and aspects in online payment will in fact improve the customer's perception of the e-retailer and result in completed transactions. In order to investigate this aspect, an experiment was conducted to be able to compare eight independent groups, that each had been exposed to a different security scenario on the online payment website of either a known or unknown retailer. Our results clearly prove that perceived security of the retailer's payment website increases willingness to purchase from the retailer.

Folkpartiets syn på svensk säkerhets- och utrikespolitik 1956-1974 : En jämförande analys av Folkpartiets syn på svensk säkerhets- och utrikespolitiska frågor i förhållande till regeringen

The socialdemokrats? long possession of government power from the 1930?s to 1976 gave them the opportunity to put their stamp on Swedish domestic and foreign affairs in the shadow of the cold war. The government policy in security and foreign affairs, therefore, was that of the socialdemokratic party. The stance of the government has been researched, but it lacks focus on the opposition. The purpose of this paper is to analyse Folkpartiet´s view of security and foreign affairs in comparison with government policy.

Libyenkrisen ? en humanitär intervention? : En kvalitativ textanalys som syftar till att förklara motiven bakom NATO:s och FN:s beslut att intervenera Libyen

Humanitarian intervention is a concept that generates several problems in our time. The idea of humanitarian intervention concerns the modern norms of sovereignty and noninterventional principals. It also concerns the conventional norm, which declares that states are not allowed to interfere in other states? internal affairs. The use of military force to implement humanitarian intervention is restricted according to international law.

Online Brand Community in Action. A Constitutive netnography: Advancing a Wholesome Ethnomethodological Perspective on Brand Community

This thesis advances an explicit, consequent, and wholesome ethnomethodological perspective on brand community. It recognizes brand community as a social problem ? something to be continuously solved and achieved. The two main perceivably stable features of the Nikonian community are (1) practical usefulness and (2) the social link. The authors suggest that both features are constantly accomplished through three types of aggregate behaviour (1) lurking, (2) ordinary membership, and (3) community citizenship behaviour (CCB).

Att färdas i symbios : ett gång -och cykelstråk anpassat efter trafikanternas rörelsemönster och behov

The aim of this paper is to examine the layout of public spaces and its effect on human behavior with focus on the relation between pedestrians and cyclists movement patterns in a specific path. The study emanates from the security aspect of pedestrians and cyclists, and builds upon previous theories and empirical studies about perception, security, information design, environmental psychology and behavior. The result shows that individual behavior and movement pattern differs with age, purpose, physical- and other conditions, and layout of the surroundings. A design proposal for improved layout of a path and a node between different oncoming paths has been developed to aid the users? needs, where a separation of walkways and bike lanes forms zones of security for the purpose of better orientation and a better flow between the users..

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

Finns det ?ett gott myndighetsutövande? inom äldreomsorgen ? och påverkas biståndsbedömningen av omsorgsmottagarens kön?

Our aim with this essay is to examine if social work in the care of elderly tends to be salutogenetic or patogenetic oriented. A salutogenetic oriented activity means that the social workers focuses on the elderly peoples individual possibilities, and collaborate with the receiver of care in order to offer him or her aid and resources for meaningful living conditions. A patogenetic oriented activity on the other hand means that the social workers focuses on the elderly peoples most primary needs, their illnesses and to introduce adequate treatment. We also examine if social workers in the care of elderly tend to prefer male or female characteristic features in the receivers of care. Finally we wanted to find out if there were any gender distinctions, if the appraisal of aid were more affected by a male or female receiver of care.

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik

The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.

Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd

How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

Skadlig kod och sårbarheter i Windows : En studie i virusens historia och nutidens olika säkerhetsrisker

I dag kan man oftast läsa om olika säkerhetshot och risker en datoranvändare måste tänka på för att inte ge någon utomstående möjlighet att komma åt känslig och/eller privat information. Här talas det om nya virus och nya typer av trojaner som sprids som epidemier över Internet, och i bland handlar det om ett spionprogram som följer med en nedladdad fil. Det är svårt att hålla reda på alla typer av skadlig kod som nämns fast med ökad förståelse ökar också chanserna för att klara sig från smitta. Det har visat sig att utvecklingen av skadlig kod är lika stark som den inom kommersiella mjukvaror. Från persondatorns uppkomst i början av 80-talet och fram till i dag, har utveckling skett i alla områden av den skadliga kod det handlar om strategi, syfte och framförallt ren kodkomplexitet.Dagens ledande leverantör av operativsystem och webbläsare, Microsoft, lovar allt mer sofistikerade säkerhetslösningar varje gång en ny version av ett program släpps.

Utvärdering av insamlingssystem för hushållens farliga avfall

The collection of hazardous waste from the household around Swedish municipalities varies. 1% of the households waste is hazardous waste. It has hazardous features that can give bad consequences for the nature and human health if we don?t collect it and treat it. Therefore the law controls it, the municipalities have responsibility for the household waste.

Förstudie till införandet av centralt loggsystem hos Försvarsmakten

Modern IT systems tend to become more and more complex, while the number of active systems in companies increases. Furthermore, the number of security-related incidents is at an all-time high. These new conditions impose new demands on organizations. For example, it is no longer possible to manually collect and examine the systems log messages.The purpose of this thesis has been to make a comprehensive study of solutions for automated collecting and managing of log messages, analyze the Swedish Armed Forces specification for solutions for central log collection and management, and evaluating exis- ting solutions. The work consisted primarily of literature studies and evaluations of two of the Swedish Armed Forces of selected products: NetIQ Security Manager and Splunk.

<- Föregående sida 9 Nästa sida ->