Sök:

Sökresultat:

1407 Uppsatser om Security of employment - Sida 12 av 94

Den levande policyn

In today's changing environment, an increasing number of companies are realizing thebenefits of analyzing business information and thereby stay competitive. By making use ofdecision support systems, known as Business Intelligence (BI), organizations are expected tocollect and process business data and thus get more out of their business.Nowadays it is not enough for organizations to have access to corporate data inside officewalls, they must also be able to bring the information "on the go", which has been thefoundation for the progress of mobile BI solutions. As the mobility increases and thecorporate data leaves the office, new risks arise, which is one reason as to why manycompanies hesitate at the idea of introducing mobile BI solutions.In this paper we explore two security aspects in the area of mobile BI solutions. Our researchquestion is as follows: How does security aspects affect a company's decision to acquiremobile BI solutions? The survey was conducted through interviews in cooperation with thefirm Optivasys, exclusively dedicated to the BI solution QlikView.A significant part of the theory we studied describes security as critical; however, ourresearch suggests a solution on how companies can manage the security aspects.

Utrikespolitiskt beslutsfattande : En studie om hur en militär intervention kunde godkännas av FN

This study in political science examines the UN adopted resolution 1970 (2011) andresolution 1973 (2011) on the basis of foreign policy decision-making. The study aims toexplain how the UN principle of Responsibility to Protect came to be legitimized for the firsttime by the UN Security Council in the Libya conflict in 2011. By a poliheuristic perspectivethe study attempt to explain Russia and China?s acting in the voting of resolution 1970 andresolution 1973. The background to the conflict in Libya 2011 is presented in the study aswell as the Security Council?s actions during the conflict, from the beginning of the conflictuntil the adoption of resolution 1973.

Vilka statsfinansiella effekter erhålls vid ökad produktion av förnybar energi?

BackgroundThis paper is based on an issue raised by the organization Energigas Sverige, which together with the Ministry of Finance has posed the question about the fiscal impact of an increase in biogas production. Since the fiscal effects of an increased biogas production are both positive and negative, due to reduced use of fossil fuels, we want to investigate this further.PurposeThe purpose is to describe and explain the obtained fiscal impacts of an increased biogas production and based on our problem: ?What are the obtained fiscal effects caused by an increase in biogas production?? we could see the following fiscal effects: positive impact on employment, increased revenues of social security contributions and income taxes, reduced unemployment costs and reduced tax revenues on fossil fuels. These effects are summarized in a negative tax revenue of 2,6 billion SEK. Along the summarized negative effect we also accepted one of the two prepared hypotheses, which stated that an increase in biogas production leads to a negative fiscal impact. Design/Methodology/ApproachWe have chosen to work from an Anglo-Saxon scientific tradition and furthermore, we have a positivistic approach when we want to explain the relationship between cause and effect of an increase in biogas production and the following fiscal impacts.

peer2peer - hur dyrt är gratis?

Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas spyware alternativt adware, misstänks för att samla in personlig information, så som e-mailadresser och lösenord. Det föreligger en risk att informationen sedan säljs vidare eller används för att exempelvis rikta reklam....

Den europeiska arresteringsordern : ett rättssäkert förfarande?

The European union started as an area of economic cooperation, but has developed into an area of cooperation in many legal fields. There are these days even cooperation when it comes to dealing with criminals. There is a new procedure called the European arrest warrant which goal is to make the extradition of criminals between the different member states in the European union more efficient. Sometimes when a state receives a European arrest warrant they have to extradite the person in question without doing any investigation of their own. The procedure is based on the principle of mutual recognition.

Bristfällig säkerhet inom trådlösa routrar med fokus på WPS

I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner..

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

Pensionärspooler : Pensionär med fortsatt anställning efter ett yrkesverksamt liv

A qualitative survey has been carried out in a manning company whose business concept was to employ pensioners. Six pensioners have been interviewed regarding their views on resumed employment. The results of these interviews have been analysed supported by analytic induc-tion. Areas investigated cover: promotion of better health through work, motivation factors, groupings and control, experience and learning, work and spare time and finally strategies that appeal to an older workforce.The purpose of the survey was to investigate whether the manning company utilizes pension-ers? experience and work skills from their former working life.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Övergång av verksamhet : En avtalsrättslig tolkning av vad det arbetsrättsligt innebär att enligt 6 b § LAS ta ställning till fortsatt anställning

The swedish law of contract is fundamental within several civil law areas, among others labour law. The labour law contains more explicit legislation specificly adapted to the relation between employers and employees. Sometimes the labour law needs to rely on more general regulations, such as the law of contract. When the situation contains a specific contract relation dilemma it is logical to use the law of contract, when for example the law of employee protection does not reach an acceptabel solution.Transfer of undertaking is a situation were the employee protection is disregarded. The Euro directive 2001/23/EG prescribes, by its implemented rules in the law of employee protection, that rights and duties, such as employement agreements, passes on to the earner of the business.

Privilegierad mobilitet? : Flygplatser, resande och säkerhet

Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

"Att göra saker rätt" : -En studie av gräsrotsbyråkraters handlingsutrymme

AbstractEssay in political science, C-level, by Line Säll, spring semester 2007.Tutor: Susan Marton.?To do things by the rule of law -A study in the discretion of front-line bureaucrats?This essay has it´s starting-point in the theoretical problem of social science to unite democracy and bureaucracy. The purpose is to illustrate the problems with the discretion of front-line bureaucrats in a democratic state. The theoretical approach is front-line bureaucracy-theory. Certain characteristics of the work of street-level bureaucrats makes it impossible to severly reduce discretion.

Mot mer flexicurity?

Since the 2006 election, the debate surrounding the Swedish labour market policy has intensified. There has been a discussion about a need for change towards a more flexible labour market. An example of this is on the other side of the strait, in neighbouring Denmark. Their flexicurity model, ?the golden triangle?, is characterized by a flexible labour market, generous unemployment benefits and active labour market policies.

Frontlinjebyråkraternas handlingsutrymme vid övergången till Etableringsreformen

Title: [Frontline bureaucrats discretion in the transition to Establishment Reform]This essay aims to study discretion among frontline bureaucrats as an important factor in the integration of immigrants. In contrast to other studies of discretion this essays has its focus on a new establishment reform that has been recently legislated. The theoretical frame is based on the concept of frontline bureaucracy developed by M. Lipsky (2010). In the analysis of the discretion in this specific area I have been inspired by I.

<- Föregående sida 12 Nästa sida ->