Sök:

Sökresultat:

1407 Uppsatser om Security of employment - Sida 7 av 94

Säkerhetsklassificering av IT-system på Fläkt Woods AB

This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.

Empirisk studie av Indiens tjänstesektor - Vad händer med jobben?

The fast growing economy of India has experienced fundamental structural changes in recentyears. The share of the service sectors output has more than doubled since 1950 and is todayestimated to make up almost 60 percent of India?s total output. In terms of total employmentwe have not yet seen a similar transformation. The observed discrepancy between sectorialshares of employment and output in the service sector raises questions about sustainability.This report aims to investigate the capacity of the Indian service sector in terms ofemployment creation in order to answer the question whether the recent GDP growth withinthe service sector can be considered as ?jobless? or not.

Att vara arbetssökande : Motivation och känslomässiga upplevelser hos arbetssökande individer samt upplevelser utav kontakten med arbetsförmedlaren

Research shows that unemployed´s motivation to seek work affects their health and social life. Employment officer?s motivational work should be based on strengthening the individual's confidence in their abilities. Five motivational theories underpinning the study is Cognitive Theory, Self-determination theory, Expectancy Value Theory, need theory and Goal Theory. The purpose of this study was to investigate individuals' job motivation, and emotional experiences, also in relation to contact with the employment officer.

Att vara arbetssökande - Motivation och känslomässiga upplevelser hos arbetssökande individer samt upplevelser utav kontakten med arbetsförmedlaren

Research shows that unemployed´s motivation to seek work affects their health and social life. Employment officer?s motivational work should be based on strengthening the individual's confidence in their abilities. Five motivational theories underpinning the study is Cognitive Theory, Self-determination theory, Expectancy Value Theory, need theory and Goal Theory. The purpose of this study was to investigate individuals' job motivation, and emotional experiences, also in relation to contact with the employment officer.

Kartläggning av utredningsprocessen vid Arbetsförmedlingen Rehabilitering i Sverige : en pilotstudie

The Swedish National Labour Market Administration wishes to acquire further knowledge about how the evaluation process of vocational rehabilitation at the employment service operates as a part of the quality assurance of this activity. The primary task for vocational rehabilitation at the employment service is to investigate the work capacity of unemployed people, to give them increased knowledge and better understanding of their own capacity concerning work or education. The aim of this study was to survey the evaluation process of vocational rehabilitation at the employment service in Sweden. Data were collected through telephone interviews with 15 occupational therapists employed at the employment service, who were working with vocational rehabilitation. The result shows that the investigation of work capacity can take place in different environments and that the space of time for an investigation can vary.

Människohandel som en säkerhetsfråga

The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.

Framtagning av en informationssäkerhetspolicy

This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.

WLAN : Oskyddad och okontrollerad datakommunikation

This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.

Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling

The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.

Att Dela på HRM : Human Resource Management mellan Bemanningsföretag, Kundorganisation och Konsult

Background and Problem definition: Atypical employment is something that has becomeincreasingly common in recent decades, these are defined as positions where no relationship is of thetraditional type in which the employee has a long term relationship with the employer and where hecarries out his work at the premises of the employer. These atypical employments can take variousforms, it can be fixed term contracts, project work or jobs in employment agencies and so on. Thestaffing sector in Sweden has grown rapidly since the 90s, and since international research shows thatthe three-way relationship arising from the use of staffing agencies may lead to challenges in differentparts of HRM, we have chosen to study this topic.Aim: The purpose of this paper is to describe and understand how HRM is handled in atypicalemployment relationships.Method: The epistemological starting point for this work is hermeneutics, as a result of this theresearch approach is qualitative and inspired by abduction. The authors have chosen to carry out thework as a case study of three primary cases, each one consisting of an employment agency, a clientorganization and an employee. The analysis is based on the hermeneutics principles of interpretationand concentration of meaning.Results: What emerged as central to how HRM is handled are the interdependencies that existbetween the business environment and the strategies of the firm, how they affect different parts ofHRM and how participation and liminality have an impact on the three-way relationship.Keywords: HRM, atypical employment, staffing agencies, three-way relationship and strategy..

Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv

The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.

Mot arbetslivet -  en studie om samverkan mellan Arbetsförmedlingen och gymnasiesärskolornas studie- och yrkesvägledare

The number of students who finished special upper secondary school for pupils with intellectual disabilities without an employment has drastically decreased over the last decades. The purpose of this paper is to increase the knowledge of how career counselors at special upper secondary schools collaborate with the Employment Service, and how the special upper secondary school prepares their pupils for working life. The collection of data started with a national questionnaire survey which was directed to career counselors at schools.The result shows that the collaboration appears foremost in the pupils last year in special upper secondary school, and that the special upper secondary schools do not use the Employment Service's assistance to any great extent. In addition, the collaborative process consists of both inhibiting and promoting factors.The results also indicates that the collaboration between the special upper secondary schools and the local labor market can be developed more for the pupils to gain experience from working life..

Funktionsnedsatta personers förutsättningar på arbetsmarknaden : En studie om exkluderande och inkluderande processer och faktorer

This qualitative study investigates the conditions on the labour market for disabled people by examining which factors and processes contribute to disabled peoples inclusion to, or exclusion from the open labour market. Stigmatisation is also used as an analytical tool to better understand the exclusion of disabled people from the open labour market. The material to this study is drawn from qualitative interviews with the employees of the Swedish Employment Agency which specialises in supporting disabled people to find employment.  In conclusion, disabled people face several barriers which makes them more susceptible to become excluded from the open labour market. Such excluding barriers include a demand for high efficiency and productivity from employers, bigger cooperation?s and public organisations unwillingness to employ disabled people and prejudices from employers, especially against people with psychiatric disabilities. The employees of the Swedish Employment Agency suggest that they would be able to work more efficiently to help disabled people find employment if they had to do less administrative work, and would be able to work with fewer clients per employee.

Analys av datakommunikationssäkerhet för VoIP-protokoll

Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..

En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall. These major tests were divided into five smaller semi­ tests. The first semi­test without a firewall suffered from a virus or worm attack resulting in loss of data and log files.

<- Föregående sida 7 Nästa sida ->