Sökresultat:
1555 Uppsatser om Security risks - Sida 34 av 104
Axellagring till Klasserare
GE Healthcare wants to investigate whether additive manufacturing would be an alternative method in their workshops in the Umea? plant. Additive manufacturing is called 3D printing in everyday language and manufactures details by building them up layer by layer in an automated machine. The purpose of this work is therefore to investigate how mature additive manufacturing methods are and how they could be used at GE.The work has been divided into three parts. The first section investigates how additive manufacturing would work in the production workshop at GE.
CSR i sociala medier - Möjligheter och risker med att kommunicera CSR i sociala medier
This B.Sc. Thesis examines how Swedish Large Cap companies communicate CSR in social media. We describe the current state of CSR communication in four different social media channels, Twitter, Youtube, Facebook, and blogs. This research, supported by interviews with stakeholders and a quantitative survey, analyses the potential risks and benefits from communicating CSR via social media and provides concrete advice on the development of a CSR communication strategy for social media. Although some benefits have been realized, many companies have failed to truly reap the potential benefits from an effective social media strategy for CSR.
Fastighetsanalys för Södra Cell Tofte
This paper aims to derive the Black-Scholes equation for readers without advanced knowledge in finance and mathematics. To succeed, this paper contains a theoretical chapter in which concepts such as options, interest rate, differential equations and stochastic variable are explained. This paper also presents the theory of stochastic processes such as the Wiener process and Ito process. In the chapter on the Black-Scholes model the Ito process is used to describe price of shares and with the help of Ito's lemma Black-Scholes equation can be derived. In the paper, assumptions are listed that apply to the Black-Scholes model and then uses the Black-Scholes equation to calculate the price of a European call option.
Additiv tillverkning : Ett nytt alternativ inom tillverkningsteknik
GE Healthcare wants to investigate whether additive manufacturing would be an alternative method in their workshops in the Umea? plant. Additive manufacturing is called 3D printing in everyday language and manufactures details by building them up layer by layer in an automated machine. The purpose of this work is therefore to investigate how mature additive manufacturing methods are and how they could be used at GE.The work has been divided into three parts. The first section investigates how additive manufacturing would work in the production workshop at GE.
Cykelparkering i stadsmiljö : en redogörelse för cykelparkeringens komponenter
In recent years many cities have seen an increase in bicycle traffic. This is a development that benefits both the environment and the individual cyclist. When the need for bicycle parking is not met several problems arise such as an increase in bicycle thefts, jammed sidewalks and a decreased interest in using bicycles. My aim with this paper has been to answer the question of how to create parking facilities in an urban environment based on cyclists' needs. Through a literature survey, following the method "Trattmodellen" (the funnel model) the question has been answered and divided under the headings cyclist, bike, bicycle racks, bicycle garage and bicycle operators and hosts.
Ungdomar och datorn : Vilken roll spelar datorn i ungdomars liv?
How does the computer influence teenagers' lives. I interviewed five young people, and gave a questionnaire to another 47, about this.What I found was that they were aware of and handled well the risks with the Internet and the computer, but had problems with the computer taking too much of their time. They wanted more time for their families and outdoor activities. It was mainly the Internet that seemed to have an influence on the teenagers, not the computer as a machine. They told me that there was a rough climate on the Internet, partly because of the possibility of being anonymous.
Osäkerheter vid riskanalyser i samband med transport av farligt gods
Risk analysis in connection with transportation of dangerous goods is associated with great uncertainty. In addition there are a number of specific problems that the risk analyst faces when risks associated with transportation of dangerous goods are to be analysed. In this report those problems and uncertainties are described.One of the most important conclusions in this report is that uncertainty analysis within risk analysis in connection to transportation of dangerous goods has to be made more effective..
Black-Scholes : En prissättningsmodell för optioner
This paper aims to derive the Black-Scholes equation for readers without advanced knowledge in finance and mathematics. To succeed, this paper contains a theoretical chapter in which concepts such as options, interest rate, differential equations and stochastic variable are explained. This paper also presents the theory of stochastic processes such as the Wiener process and Ito process. In the chapter on the Black-Scholes model the Ito process is used to describe price of shares and with the help of Ito's lemma Black-Scholes equation can be derived. In the paper, assumptions are listed that apply to the Black-Scholes model and then uses the Black-Scholes equation to calculate the price of a European call option.
Rättssäkerhet i barnavårdsutredningar : BBIC - ett nytt sätt att arbeta i socialtjänsten
AbstractThe Swedish National Board of Health and Welfare has since a year or so started to introduce a new way to work with childcare investigations within the social services. This new concept, BBIC, is meant to put the child?s needs in the first room rather than the grownup?s as it used to be before. This study is about to examine how BBIC affects the legal security of the children within these childcare investigations.BBIC was first developed in England after a massive criticism against the way that the foster home- and institutional care was handled. In Sweden, BBIC was first tested and developed into Swedish conditions in a few project municipalities for about five years but is now being introduced all over the country.
Design comparison between HiperLAN/2 and IEEE802.11a services
This paper is a study and comparison between the two Wireless LAN (WLAN) standards HiperLAN/2 and IEEE 802.11a. WLANs are used instead or together with ordinary LANs to increase mobility in for example an office. HiperLAN/2 is an European standard developed by ETSI and the IEEEs standard is American. A WLAN-card consists roughly of a Medium Access Control (MAC), Physichal layer (PHY) and an antenna. The antenna is the same for the different standards.
Threats and opportunities for the survival of the Yangtze finless porpoise
The Yangtze finless porpoise (Neophocaena phocaenoides asiaorientalis), is a small freshwater cetacean which has recently fallen dramatically in number. It is an endemic species for the Yangtze River and unless drastic action is taken, it risks the same fate as the now functionally extinct Yangtze river dolphin (Lipotes vexillifer). Threats to the porpoise are diverse but they have in common that they are caused by man. Development of the river has been made to supply a growing human population with food, hydropower, and to reduce the risk of flooding. These changes have resulted in a degraded habitat for the porpoise.
Skadlig kod och sårbarheter i Windows : En studie i virusens historia och nutidens olika säkerhetsrisker
I dag kan man oftast läsa om olika säkerhetshot och risker en datoranvändare måste tänka på för att inte ge någon utomstående möjlighet att komma åt känslig och/eller privat information. Här talas det om nya virus och nya typer av trojaner som sprids som epidemier över Internet, och i bland handlar det om ett spionprogram som följer med en nedladdad fil. Det är svårt att hålla reda på alla typer av skadlig kod som nämns fast med ökad förståelse ökar också chanserna för att klara sig från smitta. Det har visat sig att utvecklingen av skadlig kod är lika stark som den inom kommersiella mjukvaror. Från persondatorns uppkomst i början av 80-talet och fram till i dag, har utveckling skett i alla områden av den skadliga kod det handlar om strategi, syfte och framförallt ren kodkomplexitet.Dagens ledande leverantör av operativsystem och webbläsare, Microsoft, lovar allt mer sofistikerade säkerhetslösningar varje gång en ny version av ett program släpps.
Strategiska Allianser: En studie av inledningsprocessen
The purpose of the essay has been to clarify why and how small companies, whose major resource is knowledge, establish strategic alliances and which opportunities it brings. We have increased our understanding for the concept of strategic alliances through empirical search and through well-known scientist work. The method, which has been used in the essay, is principally qualitative interviews and gathering secondary data from articles from well-known authors. Our study has given that we have found that entering strategic alliances can make growth and by that way create competitive advantages for the company in question. We also found that there are risks with strategic alliances and the company can protect themselves by legal actions.
Risksäkra liv : i skuggan av systemkollaps
The thesis is based on a case study of a Swedish discussion forum where survivalism and prepping is the main focus. The awareness of an abrupt and immanent breakdown together with a full and thorough preparation for any conceivable threat posed by that breakdown is what legitimizes survivalism and prepping. This preparation, or risk-proofing is 1) grounded in an isolation of the body and its predispositions from perceived risks, and 2) actualized through artefacts, theoretical and practical knowledge and awareness. Stories of the embodied survivalist are also stories of masculine and heterosexual subjects and ?the others?.
Hur revisorn skapar trygghet och säkerställer oberoendet
Purpose: The purpose of this study is to seek understanding, describe and analyse how auditors practically reassure and maintain their independence towards clients.Methodology: The study is conducted with a qualitative method with a deductive approach. The study is based on interviews with both experienced and recently graduated auditors.Conclusion: Our empirical results show that there are economical incentives that contradict the requirements to fulfil the auditor?s independence. The conclusion is that the media view is narrow and biased. Furthermore the auditors agree that an acceptable level of comfort is achieved by offering a high value, being a part of a large network of professionals and the ability to set materiality and evaluate risks. .