Sök:

Sökresultat:

2114 Uppsatser om Security measures - Sida 2 av 141

"Jag tycker nog att jag bor på Araby, det är nog alla andra som tycker att jag inte gör det." : - En kvalitativ studie om hur distinktioner påverkar tryggheten

This thesis suggests an explanation for how it is possible for individuals living in an unsafe neighborhood to expressa highlevel of security. Araby is the district in Växjö municipality withthe highest level of insecurity. Within the district, there is acategory of individuals in security-measurements showing a high degree of security. Inhabitants living in house in Araby also seem to show a higher level of security than inhabitants in the same accommodation in other neighborhoods in the municipality.The study's purpose is to understand how individuals belonging to an unsafe neighborhood can experience a high degree of security.Qualitative data were collected from an observation in Araby and from interviews with individuals living in house in the district.Previous research has shown that security in the surrounding area depends on several factors, such as disorders, the degree of social control and personal opinions. Thestudy shows how a distinction to places and people in the district can explain the degree of security.

Synen på Säkerhet och Immigration : Finns det ett samband?

The aim of this study is to explore howEuropean changes in the view on securityrelates to the view on immigration and viceversa. The answer to that question is basedupon collected data from three separatetime periods; the 1950s, 1970s and 1990s.These time periods are seen as importanthistoric decades when political changes,assumed to have affected the views onsecurity and immigration, have occurred.According to certain criteria each timeperiod has been labelled in terms ofnarrowed/widened view on security as wellas restrictive/open view on immigration.The hypothesis of the study is that, whencompared, a constant pattern can be seenbetween the historical labels of eachphenomenon, where a narrow view onsecurity goes hand in hand with an openview on immigration and similarly a widesecurity view relates to a restrictive viewon immigration.The conclusion of the study gives supportto the hypothesis. During all three periodsstudied a restrictive view on immigrationrelates to a wider view on security while anopen view on immigration relates to anarrower view on security. Thisrelationship goes both ways..

Uppfölining av naturvårdande skötselåtgärder(NS) i ekopark Storklinten

This study's primary purpose was monitoring of conservancy operation measures. The fixed sections within ekopark Storklinten owned by the forest company Sveaskog. These measures are performed with the purpose of creating and maintaining hardwood forest and mimic natural processes. The sections were divided into different categories depending on the type of measures they were exposed with. The monitoring showed that the purpose of these measures was fulfilled in general.

Internationell fred och säkerhet ur ett genusperspektiv: En diskursiv studie av Säkerhetsrådets resolutioner för kvinnor, fred och säkerhet

The Security Council?s resolution 1325 addressed the major negative impact that armed conflict has on women and children. This in turn complicates the Council?s work on maintaining international peace and security. The resolution therefore highlights women?s rights as participants in peace- and conflict processes.

När Arktis isar smälter tinar världen upp? : En kvalitativ analys av det vidgade säkerhetsbegreppet i den svenska strategin för den arktiska regionen

This study is called When the ice of the Arctic melts is the world defrosting? and written by Rebecca Fröling.The purpose of the study is to investigate how the concept ?security? is used in the Swedish arctic strategy and why the concept is described in that way. The debate of the concept ?security? has been going on for years, but the debate is still present today. What we put in to the concept is operative for how we regard and discuss security and security politics.To analyze the strategy I used two theories, one with a traditional approach and one with a critical approach to security: Realism and Copenhagen School.The method that has been applied to the study is qualitative content analysis, to be able to analyze the text on the depth.

Restinformation i elektroniska textdokument

Some word processing programs save information that not all users of the program are aware of. This information consists of a number of things. Example of that is who the writer of the document is, the time it took to write it and where on the computer the document is saved. Text that has been changed or removedcan also be saved. This information is not shown in the program and the user will therefore not be aware of its existence.

Livsmedelssäkerhet, konflikt och hållbar fred - en teoriutvecklande studie om matens makt

In our world, more than two billion people are living under insecure food conditions and more than eight hundred million people are estimated to be starving. The majority of these people live in developing counties which are poor and often subject of civil war. The past fifty years the main subject of security analysis has been the sovereign and rational state and the threats have been viewed in terms of military and weapons of mass destruction. This has come to change over the last decades and security as a concept has broadened, which better represents the reality of today. Within this broader conceptualization of security the main referent of security is the individual, rather than the state, and threats are not only analyzed from a military point of view, but also seen as threats against human rights and freedoms.

Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker

For organizations that handle sensitive information, IT governance and information security are necessities in order to maintain credibility and to conduct its business efficiently. There are several known processes to increase security governance ? which is a fusion of information security and IT governance.This master thesis examines if organizations use recognized processes and if it in that case would lead to higher security. The study is qualitative and conducted in the financial sector and based on Best Practice frameworks of the security governance in Swedish banks. Data collection was done through interviews and surveys that were triangulated to get a gathered picture of the quality of the security governance activities.

Human Security in Serbia: A Case Study of the Economic and Personal Security of Internally Displaced Persons

The aim of this study was twofold; firstly it sought to describe the human security situation of Roma IDPs and IDPs living in collective centers, secondly it tried to create an understanding for how the human security situation can affect IDPs capabilities to develop. The findings of the study were mainly based on a field study conducted in Belgrade, Serbia for two months. The results of the study were that IDPs in collective centers have a poor human security situation regarding basic income, employment, adequate housing and experienced personal security. Roma IDPs suffer from the same insecurities, but in addition also has poor human security in basic education and personal safety. Their stagnant human security situation proved to be the result of the inability to help IDPs by the actors involved in the relief work.

Säkerhet i det trådlösa hemnätverket ? En analys av de vanligaste säkerhetslösningarna

The security solutions used in wireless home networks are examined in this report. Thegrowing number of wireless units have increased the need for reliable security solutions.This report aims to enlighten the reader about the fundamental technology used inwireless security solutions and inform about the existing flaws. A recommendationabout how to achieve a high level of security in the home network is also given to thereader.Several flaws in the security solutions in use have been reported. Of these the mostsevere has been examined in a test network using highly accessible tools to get aperception of how vulnerable the user is.The tests showed that several attacks were efficient and easily carried out. We have alsoseen that several of the home networks in our sample are susceptible to these attacks.Our survey revealed that the Internet service provider's technical support in many caseslacked the knowledge necessary to inform the user about reliable security solutions..

Säkerhetsansvarigas syn på supportrars beteende och dess inverkan på ishockeyevenemang : En kvalitativ studie om hur säkerhetsansvariga ser på supportrars beteende och dess inverkan på ishockeyevenemang

Are icehockey supporters a big problem in todays society? Is security required during icehockey events, and how is it implemented? This study was aimed to investigate the people at security positions and their view on fan behavior and it?s impact on icehockey events. It was a qualitative study were six interviews were made with people in charge of the security at different hockey clubs. The results showed that security managers overall saw a good fan culture, and that it created a wonderful atmosphere. Security managers worked a lot with dialogue with the supporters and they thought it had a good effect.

Från neutralitet till öppenhet? : En studie av säkerhetspolitikens utveckling i Sverige efter kalla krigets slut

Abstract  Title: Från neutralitet till öppenhet? ? En studie av säkerhetspolitikens utveckling i Sverige efter kalla krigets slutAuthor: Jens KindhSupervisor: Patric LindgrenLinnaeus UniversityDepartment of Political ScienceSpring term 2012 When the Cold War ended, a new security situation was unfolded in Sweden. The purpose of this thesis is to describe and compare how the Swedish security policy is organized and how it has changed since the Cold War ended. To do that, I?m going to try answer the following questions:How is the Swedish security policy organized?What defence resolutions have affected the Swedish security policy after the Cold War ended?How has different political actions made its impact on the Swedish security policy after the Cold War ended?My theory is to try explain how the Swedish security policy has changed after the Cold War through a realism security perspective called traditional security, which refers to a realistic construct of the states security policy.

En känsla av trygghet : Patienters perspektiv inom palliativ vård

Background: Every year 56 million people die around the world and it is estimated that 60% of these people are in need of palliative care. It has been shown that patients in the palliative care experienced their situation as uncertain. When life no longer was certain, the patients tried to live their life day by day and make the best of it. Problem: When patients were diagnosed with an incurable disease the future became unsure, because their life would come to an end. Therefore patients with a palliative diagnosis could be in need of experiencing feelings of security.

The Capital Structure Puzzle of SME's - Evidence from the Swedish Security Industry

The purpose of this thesis is to ascertain the main determinable factors of Swedish SMEs capital structure decisions and to investigate whether existing capital structure theories are applicable on Swedish SME financing. We have used panel data to run regressions of various capital structure determinants on three measures of capital structure; short- term debt, long-term debt and total debt. We found that growth opportunities, profitability and age are the most important capitalstructures determinants for our sample. Firm size shows a small explanatory result but the effective tax rate and the asset tangibility do not seem to explain the capital structure at all. Thematurity matching principle is considered significant..

IT-säkerhetspolicy ? efterlevs den av anställda?

ABSTRACT The main purpose of IT security policies is to protect companies against intrusion and unwanted spread of information. Statistics show that IT related crimes tend to increase and because of that it is important, from the company?s side of view, to be well prepared. The IT security policy is an important part of that preparation. A lot of the crimes related to IT can be deduced indirectly to employees at the companies where the crime takes place.

<- Föregående sida 2 Nästa sida ->