Sök:

Sökresultat:

2114 Uppsatser om Security measures - Sida 4 av 141

Mellan säkerhet och mänskliga rättigheter : en studie av den svenska officiella migrationsdiskursen

This paper focuses on the Swedish migration discourse and investigates if and to what extent it is dominated by a security perspective. Analysing a number of official texts and documents I want to show how the discourse describes migrants and what implications this carries with it for the migrants and for the Swedish migration politics. Through discourse analysis I have analysed whose security that is prioritised, the Swedish or the refugees, who is the refugee and the asylum seeker, and who is the illegal migrant in the Swedish official migration discourse. As a theoretical frame for the analysis I have used theories on migration and security. These include theories on the securitisation of politics, the globalisation and the creation of political identity from the nation state perspective and theories on the connection between migration and security.My results show that a security discourse is dominating the Swedish official migration discourse and is therefore defining our reality and the identities of refugees, asylum seekers and illegal migrants.

Stölder och förebyggande åtgärder : en studie hos Holmen skogs entreprenörer och egna maskinlag

This master thesis was performed as a mission from Holmen Skog with the purpose to investigate to which extent their own machine teams and engaged contractors were exposed to theft and vandalism, and most common preventive measures used. With the help of collected data the study should lead to proposals of preventive measures that can help the machine teams in their struggle to minimise theft and vandalism. Theft and vandalism are a big problem for Swedish forest contractors. In a scarce economic situation thefts and vandalism rapidly decrease the profit for the contractors. However, the last years have resulted in a positive awareness of thefts, and more and better preventive measures have been developed. With the initiative of this master thesis, Holmen Skog show that they are aware of the situation and that they wish to take control of the problem. A total amount of 108 questionnaires was sent out to Holmen?s own machine teams and engaged contractors.

Är handdatorer säkra nog för hälso- och sjukvården?

The aim of this report is to discuss computer security in handheld computers and to find out the appropriate security level that must be implemented to be able to use handheld computers within the Swedish healthcare system. Most healthcare centers are using some kind of electronic journals for their patient´s data today, but there are still a number of clinics that are usingthe old paper-system. On a few places in Sweden the use of handheld computers at the clinics has already started, but in the United States the use of handheld computers in the medical area is already widespread and from this we can see a lot of different situations where it is useful and effective to work with handheld computers. The security demands on patient´s journals are high and regulated in both Swedish law and regulations from the National Swedish Board of Health and Welfare. The law does not have any substantial demands, but states that there should be an adequate security level based on the nature of the information and the costs.

Säkerhetsutvärdering certifikatserver i stället för aktiva kort

Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware.

Säkra kommunikationskanaler i en distribuerad heterogen miljö

The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a secure manner.

Container Security Initiative - En diskursanalys utifrån teorier om det il/legala

Container Security Initiative was launched in 2002 by the US Customs and Border Patrol in order to secure the global flow of containers destined for USA. This thesis attempts to analyze Container Security Initiative in relation to a possible future scenario made by the weapons industry where the state's global traderoutes are being subject to militarization. A development which is partly based on the threat posed by global illegal trade. The latter is discussed and defined based on current research made by Carolyn Nordstrom, Moíses Naím and theories on the cosmopolitan perspective made by Ulrich Beck. Strategy documents concerning Container Security Initiative are then analyzed in terms of discourse to try to say something about what the program indicates.

MSBs respons p? cyberhot: En empirisk underso?kning av MSB:s framst?llning av ?kad cyberhotniv? efter invasionen i Ukraina.

This thesis aims to study how cybersecurity is managed and framed in the context of the growing threat landscape as a result of the Ukraine Invasion. The war in Ukraine is one of the first conflicts involving extensive cyber operations, furthermore this study is interested in how Sweden, more specifically MSB, considers global security challenges and if they can learn from the conflict in Ukraine. Through a qualitative text analysis, focusing on two reports published by MSB, the study, using securitization and framing as theoretical frameworks, seeks to answer the research question ?How has MSB changed its representation of the threat and adapted its security strategy to address the increasing threat to cybersecurity following the invasion of Ukraine??. The analysis is based on five operationalization questions to clarify whether there are indications of securitization and framing in the reports. The study also aims to identify if there is a more clear threat formulated to cybersecurity.

Altruism i familjeföretag - effekter och åtgärder

In family firms altruistic effects can arise in order to preserve the ownership of the firm within the family. The family firm may chose to carry or take measures against these effects. Regardless, it will lead to different agent costs. Therefore, the aims of the study were to explain how altruistic effects in family firms exert an influence on the administrative systems and possible counter measures.In order to explain the origin of altruistic effects, we built a theory which showed that the altruistic effects were followed by agent costs. The family can take measures to counteract these original effects.

Människohandel som en säkerhetsfråga

The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.

Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling

The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.

Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv

The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.

A comparison of two certification schemes for dairy cow welfare in relation to resource-based, management-based and animal-based measures

Traditionally risk-based measures have been used to assess animal welfare in legislation and certification schemes. With increased knowledge and research, debate today tends to focus on and advocate the use of animal-based measures. However this is not a panacea for welfare and the most sound conclusion should be that assessment of animal welfare needs both. The aim of this thesis is to identify the points that need to be taken into consideration to find the optimal balance in the use of input and outcome measures according to the aim of the assessment and how these should be applied when designing a certification scheme? To answer this, a comparison of the use of resource-based, management-based and animal-based measures in two certification schemes for dairy cow welfare, Freedom Food (UK) and Svenskt Sigill (SWE), was made.

Vinstmått: En jämförelse av marknadens definitioner och antaganden rörande vinst

This thesis investigates whether it is accordance between the different profit measures in the financial market. The first aim of the thesis is to examine if it exists a difference between the profit measures that companies publish in their fourth quarter interim report and the measures that they state in their annual report, issued some months later. The second aim is to examine whether there is a divergence in definitions and the assumption regarding the risk of bankruptcy between profit measures published by companies and analysts. The study focuses on Swedish companies listed on the OMX Stockholm Large Cap and concerns the years of 2006 and 2007. The analysts interviewed are working in Sweden with listed Swedish companies.

En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall. These major tests were divided into five smaller semi­ tests. The first semi­test without a firewall suffered from a virus or worm attack resulting in loss of data and log files.

Betalningssätt via webben : En studie om konsumenters ansedda kunskap angående olika betalningssätt via webben och deras säkerhet

The e-commerce in Sweden has increased each year for the past several years, but still just over half of all the consumers feels worry about payment security. This could be the reason why over half of the consumers just shopped about one time on the Internet during the whole year of 2009. Another reason could be that the many consumers have a lack of trust to the different payment methods that are available during payment on the Internet, because they might don't possess enough knowledge regarding the payment methods and their security. If the consumers were to gain more knowledge about the payment methods and their security, it may lead to that the they would feel more comfortable when shopping online, and do it more frequently. It is this that will be investigated in this paper.The purpose of the paper  is to research if consumers believed knowledge concerning the different payment methods available on the web and their security influence the consumers trust in the payment methods.

<- Föregående sida 4 Nästa sida ->