Sök:

Sökresultat:

1555 Uppsatser om Security risks - Sida 7 av 104

Flygvapnets Transformation : Fallstudie i flygutbildningens omtvistade placering

The transformation among armed forces in Europe is a consequence due to shifted security perspective and the growth of international security actors, such as NATO and the EU. Sweden has played an active role in EU to ensure its influence in forming the security policy for the organisation. Some studies mean it´s because of Sweden?s interest in strengthen EUs roll as a security actor they transformed their own armed forces to be able to take part in international operations. This transformation led to what can be called ?the Swedish defence dismantle? and some studies mean that it has led to the point where Sweden completely lacks the ability to defence themselves.The question is if the ambition to become an active member in these security organisations can explain all the decisions made throughout the Swedish defence-transformation, or if some decisions were made due to other factors?By studying the decision process leading up to the decision to locate the flight education to Malmen in Linköping this study seeks to answer why the decision was made.

Bring Your Own Device : Ur ett säkerhetsperspektiv

Syftet med denna studie är att identifiera hot, risker och konsekvenser kopplade till BYOD samt undersöka hur dessa kan lösas. BYOD är idag något som införs i allt större utsträckning hos olika företag världen över. Många är intresserade av alla möjligheter det kan frambringa, dock blundar allt för många för alla de olika hot och risker det samtidigt kan medföra. Utöver det tar vi i denna studie även upp hur man kan skriva en säkerhetspolicy kopplad till området BYOD. För att komma fram till våra slutsatser har vi förutom den teori vi samlat in fått hjälp av Jan-Olof Andersson en av Sveriges främsta IT-säkerhetsexperter med att skapa en riskanalys och en arkitekturbild.

Betalningsmedel & dess risker

Today you can pay in many different ways. You can for instance use cash, credit cards, internet and now even with your mobile phone. Today we can also see new types of technical payment solutions being developed, such as Near Field Communication (NFC), mobile banking or through the use of QR-codes. We have today many different payment methods; therefore it?s interesting to see which payment method people prefer the most.

Bryr sig företagskunder om leverantörens corporate image? : Betydelsen av leverantörens corporate image vid köp av kunskapsintensiva IT-konsulttjänster.

Background: Critical conditions to become an attractive supplier of knowledge based IT-services in the B2B market are many. Besides the fact of supplying a service of high quality one must as a supplier communicate values which are understandable and desirable for a new buyer. Buying a knowledge based IT-service involves several risks; the consultant might not have sufficient knowledge or have difficulties understanding the corporate culture and collaborating with other staff within the client?s organization. Since services are intangible offers and it can be intricate to put right price level for something which can only be evaluated when the project is finished, puts severe strain on suppliers competing with other companies in the same market when looking for new clients.

Möjligheternas land? En kvalitativ studie om ensamkommande barns upplevelser av att leva i Sverige

This study concerns unaccompanied refugee children and their experiences of living in Sweden and also their thoughts about identity and security. The aim of this study was to find a deeper understanding of these children?s situation. We formulated three research questions in order to obtain this deeper understanding:? What experiences do the informants have of living in Sweden?? What are the informants? views of their identity in their new life situation?? What is security to the informants?This is a qualitative study based on six semi-structured interviews with six youths whom have come to Sweden as unaccompanied refugee children.

Ser ni mer än bara min kropp? -Patienters upplevelser av trygghet under operation

ABSTRACTIntroduction: An increasing number of patients undergo surgery under local anesthesia and are thereforeawake during the procedure. Nursing care that is provided to these patients can differ from those thatreceive general anesthesia. Previous research has focused on patients? general experiences of being awakeintraoperative. But there is no research that focuses on patients perceptions of security.

??Auktorisation och ackreditering inom Försvarsmakten : En studie i nyttan av en standardiserad process för att hantera informationssäkerhet

???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.

Den gemensamma utrikes och säkerhetspolitiken- Ett neo-funktionalistiskt perspektiv

This essay aims to explore the development of the common foreign and security policy within the European Union as well as the recent addition of the post of High representative in the field of the common foreign and security policy. This essay will attempt to achieve this trough exploring the questions; how have the aim of the European foreign policy developed, how the forms of cooperation has within this field developed and finally what impact will the recent addition of a high representative for the common foreign and security have. My aim is to answer these questions with the help of neo-functionalism.The results that came out of this essay point to the direction that the neo- functionalist premise about spill over effects and the notion about increased supranational influence turn out to have some validity in them. The study has shown that during the time the cooperation within the field of foreign and security policy have developed it is possible to see that supranational institutions will gain influence when the scope of integration within a policy area widens and deepens..

FN - i mäktiga staters tjänst En studie av hur FN påverkas av mäktiga stater

The United Nations is an important organization when it comes to international peace and security. Recent events in international politics, however, have brought about a widespread concern about the abilities of the organization. Powerful states have shosen to act outside of the organization to achieve their goals. They have furthermore a disproportionate influence on the decision-making body, the Security Council.The aim of this essay is to examine wheather UN can function productively as keeper of the international peace and security in the political climate of today, and to find out to what extent the powerful states harm the organization. I use a theoretical article, concerning states relations to international organisations, to analyse the acts of powerful states in UN.

Extrema sportutövare : Heroiska äventyrare, naiva idealister eller galna risktagare?

Man has always in one way or another had to take risks in order to survive, but in today's society, voluntary risks increased markedly. It is about both physical and financial risks. The aim of this essay is to problematize what it is for properties that drive people to extreme sports and adventure travel. We want to see how extreme sports performers own picture looks compared to how the media presents them. We have in this essay interviewed two long sailors, a BASE jumper and an ex-mountain climber to see how the performers own picture of reality looks.

Studenters kollektivtrafik : Studenters preferenser och önskemål på ett nytt biljett- och informationssystem inom kollektivtrafiken i Värmland

Abstract Over the years the consciousness of risk has grown. It?s hard to influence risks, therefore there are guidelines stating that significant risk must be included in the annual report. This paper is a case study; the purpose was to examine how four Swedish listed companies chose to disclose their internal and external risks. Risk is initially described in general sense and then it figures to what constitutes an economic risk.Through a case study of four Swedish listed companies? annual reports we have, through qualitative methods found how the companies chose to disclosure their risks.

Hantering av inköpsrisk vid svenska kafferosterier : när smaken får avgöra En studie av hur riskhantering kan integreras i inköpsprocessen

Background: The strategic importance of purchasing departments is increasing, yet supply risks are rather uncharted. The procurement of coffee involves supply risks and the purchaser needs to be able to handle these to enable the roasting-house to produce coffee as specified. Purpose: To chart risks in connection with the procurement of coffee as well as the possibilities of handling these. The thesis also examines if general risk management theories are applicable on the supply risk present within Swedish roasting-houses and can become an integral partof the purchasing process. Method: A qualitative case study of the purchasing process of Swedish roasting- houses.

Risk för spridning av ogräsfrö med rötrester : en litteraturstudie

With an increasing production of biogas follows an increased amount of digestate. This could potentially be a valuable source of fertiliser with the destruction of weed seeds as a possible advantage. However, there have been some concerns regarding the product still containing viable seeds of weed. In this Bsc thesis the results of previous research on the fate of weed seeds in biogas production is summarized. It is also a comparison of research on the effect of similar processes such as silage, compost or animal passage on seeds. The purpose of this is to evaluate risks of spreading viable seeds, potentially problematic species and perhaps to find out how to eliminate the risks. The literature review revealed that previous research mainly indicates low risks regarding many of the tested weed species, but not all studies show the same result, therefore extended research on the subject is desirable.

En undersökning i datasäkerhet för hemanvändare : Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall.

Somaliska pirater - ett mycket litet problem: En undersökning av Sveriges arbete gällande frågan om somaliska pirater under 2009-2010.

During 2009-2010 Sweden participated in an international military operation whose intention, according to the Swedish news media, was to fight Somali pirates. The purpose of this thesis is to study various decisions and documents behind the Swedish efforts, both military and foreign aid, regarding the matter of Somali pirates during the years 2009-2010 and analyze the results using an interpretation of the security-development-nexus-theory. The method used is text analysis based on the hermeneutic idea of understanding and interpretation.The thesis studies the international resolutions and national decisions that lead to the military operations in the Gulf of Aden and also the international strategies and national approaches regarding Sweden's assistance in the development of Somalia. The theoretical section contains an interpretation of the vast security-development-nexus-theory. The concepts of security and development are first presented separately and then collectively in terms of military security, societal security, economic security, regime security and human security.

<- Föregående sida 7 Nästa sida ->