Sökresultat:
1555 Uppsatser om Security risks - Sida 8 av 104
Smarta Kort : En del av en intelligent IT-lösning i hälso- och sjukvården?
Background: IT-security is included in the concept of information security, which considers all the security of handling information within an organisation. Good IT-security is about finding the right level of measurement, however, it is hard to implemement new IT-solutions in an organisation, particularly within the health care field, where sensitive information are handled daily. Lately the Swedish government, together with county- and city council, understand the importance of IT and health care. Carelink, an organisation of interest, is working actively for the presumption of benefit by using IT within the health care field. During spring 2006 the Swedish government introduced a national IT-strategy.
IT-säkerhet i små organisationer
IT- och informationssäkerhet är ett ständigt aktuellt ämnesområde. ITsäkerhetsarbetei små organisationer framstår som ett underforskat område. Föratt göra en kartläggning av hur arbete med risk, hot och säkerhet kan se ut i småorganisationer har vi genomfört en explorativ intervjustudie med representanterför små organisationer om deras arbete med IT- och informationssäkerhet. Vihar dessutom genomfört intervjuer med experter på området för att få ettbredare perspektiv. Tolkningen och analysen av intervjusvaren har utförtsgenom att först tolka svaren utifrån Security Controls och därefter analyserasvaren utifrån fem temaområden som vi funnit i materialet.
Finns kvinnor i säkerhetspolitik? : En undersökning av den svenska säkerhetiseringsprocessen avseende svenskt deltagande i den militära insatsen Minusma i Mali utifrån ett feministiskt perspektiv
Scientists argue that gender affects foreign policy and security policy, that ideas of gender are inconstant and that there is a lack of feminist perspectives in International Relations. The changes seen in the global security context may have challenged the way politicians and scientists understand war and its impacts, and led to increased gender awareness.Using securitization theory and feminist international relations theory, the aim is to examine how women and men are being spoken of in the Swedish foreign policy discourse regarding participation in the UN-led stabilization mission Minusma in Mali. By applying a feminist perspective on the securitization process, the intention is to increase the knowledge of whether there is gender awareness in this context.The result shows that there is limited gender awareness. There is minor consideration for the conflict?s different implications on the situation for women and men.
Människan och lärarprofessionen : En livsberättelse
The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.
Koncern som tillväxtinkubator för småföretag : ? En fallstudie i ett shared service centers möjligheter attstödja entreprenöriella småföretag
???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.
Samhällets Sårbarhet för Klimatförändringarna
The effects of the climate changes are expected to generate several substantial direct and indirect consequences on both ecosystems and societies. It is the extent of the negative consequences that determents the vulnerability of the things or the ones exposed. The knowledge of the effects and consequences by a changing climate provides an opportunity to take measures to reduce the vulnerability.Our society?s vulnerability depends on how we choose to act out of the existing knowledge and what measures we choose to take. Karlstad municipality has good knowledge and perception of the increased flood risks the climate changes will generate and the probable consequences that most likely will follow. How the municipality decides to manage the flooding issue is not just affected by the will to mitigate the vulnerability but also by the vision to increase the number of citizens.
Veto: En motivanalys av FN:s säkerhetsråds fem permanenta medlemmars agerande i konflikten i Syrien.
Aim: The aim of this study is to analyse the possible motives behind the actions of the five permanent members of the UN Security Council in relation to the conflict in Syria. The background of this aim is the Arab Spring and the protests and violence that have followed the uprising. While, in Libya, the UN Security Council adopted resolutions that allowed sanctions against the Libyan government, no such resolutions have been adopted yet in Syria.Theory: The principal theory of the analysis is Stephen D. Krasner´s theory on sovereignty.Method: I have researched various resolutions and statements done in the Security Council, together with official statements from the actors, through Hadenius´ motive analysis methodology and Gilje & Grimen and Ödmans theories on hermeneutics.Conclusion: The conclusion of the analysis is that there, in the case of Syria and Libya, are two different parties in the Security Council. One that stands for sovereignty and one that stands for intervention.
?Det feta barnet? : en diskursanalys av dagspressens framställning av barn som bedöms som överviktiga eller feta
The aim of this undergraduate thesis was to examine the media?s portrayal of overweight and obese children and their surroundings, using the first and third dimensions of Fairclough?s three dimensional model for critical discourse analysis. The study addressed the following questions: How does the press, in this study represented by two newspapers, portray overweight and obese children? What discourses regarding overweight and obesity among children are the most prominent in these two newspapers? What risks and negative influences in the child?s surroundings are identified, and how are they described? What social representations can the images of overweight and obese children originate from? The analyzed material consisted of 62 articles from Dagens Nyheter and Aftonbladet, which were analyzed using the earlier mentioned method for discourse analysis, as well as the theory of social representations. The results showed that ?the fat child? and its environment were portrayed exclusively in negative terms, and a discourse linking obesity and ill-health dominated a large part of the material.
Att tyda tecknen -En alternativ syn på förändringarna av Japans säkerhetspolitik
Japan's foreign and security policy has seen some substantial changes as a result of events like the first Gulf war and 9/11th. This has been taken as proof, by some, that Japan is abandoning its antimilitaristic stance and pursuing a more traditional hard power role through military means. This essay aims to explore if these shifts have coincided with any substantial shifts away from antimilitarism, which has had a strong influence on the country's security policy since the end of WW2.To do this I use constructivist theory, specifically regarding the impact of norms and identities on states security policy and briefly look into the problem of actor designation. The thematic focus is on security policy, from a narrow perspective, and thus I examine areas like the input and output to the Japanese military and the actual applications of this force. State identity is used to explore the prevalence of nationalistic sentiments and support for anti militarism in the public opinion and the political elite.The result of this study points to the further relevance of constructivist theory and especially the application of norms and identity.
Validering av designverktyg för organisationsprestanda
In today?s constantly changing market place most organizations need to reorganize. Reorganization carries risks that could jeopardize the organization's well-being and profitability. To minimize these risks, companies need a tool to help them analyze how the reorganization will affect the business before they make major changes. Such tool has now been developed by researchers at KTH.
ISIT-modellen : Vägledning för att realisera en verksamhets informationssäkerhetsmål
The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.
The pros and cons with technology sourcing: A case study of sourcing contracts in the Contract Research &Technology Market
Purpose: The purpose of this thesis is to analyse the process of technology sourcing within firms active in the CRT-market. The primary focus of the study is the motives, risks and problems associated with technology sourcing, to construct key learnings for organisations consider undertaking this way to access research and development or those organisations that are already operating in the CRTmarket. Method: As method has abduction been used. The empiric material of the thesis is based on qualitative research in form of interviews in a conversational manner. For correct interpretation and understanding a hermeneutics approach has been used.
Snabb och säker roaming i WLAN
This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market. The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative).
Går sociala risker att visa på en karta? Social rumslig riskanalys för Göteborgs stad
This essay deals with risk management and social risks, which have received increased attentionin recent years. Methods for dealing with social risks, for example within local Risk andvulnerability assessment (RSA), are currently under development. The purpose of this paper is toexamine if and how social risk can be quantitatively assessed and mapped using GeographicInformation Systems (GIS). The definition of social risk that the essay is based on states: "Theprobability of unwanted events, behaviors or conditions originating in the social conditions thathave a negative impact on the objects that are worth to preserve.? A number of social riskindicators that can be used for a spatial analysis have been operationalized based on thisdefinition.
Förväntningar på Framtida Mobila Tjänster
Today?s society is very focused around technology and something that is very popular is the usage of mobile devices such as Smartphones or Tablet computers. One of the reasons why these devices are so popular, is because of the large amounts of services or ?apps? that they can provide for the user. They can do a lot of things that makes everyday living easier for the users.The focus of this study is to find out what kinds of mobile services the users of these devices are expecting and/or wishes to see in the future and what is required to be able to develop and use these services in a good way.We started of the study by searching for earlier studies on the same or similar subjects.