Sökresultat:
2724 Uppsatser om Security standard - Sida 10 av 182
Hypoadrenokorticism hos storpudel :
Hypoadrenocorticism (Addison´s disease) results from insufficient production of glucocorticoid and mineralcorticoid hormones from the adrenal glands. The disease is often difficult to diagnose in an early stage because of the multitude of associated vague clinical signs. The standard poodle is one breed presupposed to be at higher risk of developing the disease. The purpose of this study was to give a review of canine hypoadrenocorticism as described in literature, and to characterise Addison´s disease in a population of standard poodles in Sweden. Statistics on incidenceproportions by breed for hypoadrenocorticism from the database of the Swedish insurance company Agria are presented.
Kända Varumärke - Större, Starkare, Säkrare
In todays high-technological society where the Internet plays a central role in our day-to-day life, many e-retailers are not able to attract customers to complete a transaction on their website. In order to succeed, many e-commerce sites must improve several safety aspects regarding online payment, in order to be perceived as a reliable and secured retailer. The purpose of this paper is to investigate if increment in various combinations and aspects in online payment will in fact improve the customer's perception of the e-retailer and result in completed transactions. In order to investigate this aspect, an experiment was conducted to be able to compare eight independent groups, that each had been exposed to a different security scenario on the online payment website of either a known or unknown retailer. Our results clearly prove that perceived security of the retailer's payment website increases willingness to purchase from the retailer.
Folkpartiets syn på svensk säkerhets- och utrikespolitik 1956-1974 : En jämförande analys av Folkpartiets syn på svensk säkerhets- och utrikespolitiska frågor i förhållande till regeringen
The socialdemokrats? long possession of government power from the 1930?s to 1976 gave them the opportunity to put their stamp on Swedish domestic and foreign affairs in the shadow of the cold war. The government policy in security and foreign affairs, therefore, was that of the socialdemokratic party. The stance of the government has been researched, but it lacks focus on the opposition. The purpose of this paper is to analyse Folkpartiet´s view of security and foreign affairs in comparison with government policy.
Libyenkrisen ? en humanitär intervention? : En kvalitativ textanalys som syftar till att förklara motiven bakom NATO:s och FN:s beslut att intervenera Libyen
Humanitarian intervention is a concept that generates several problems in our time. The idea of humanitarian intervention concerns the modern norms of sovereignty and noninterventional principals. It also concerns the conventional norm, which declares that states are not allowed to interfere in other states? internal affairs. The use of military force to implement humanitarian intervention is restricted according to international law.
Att färdas i symbios : ett gång -och cykelstråk anpassat efter trafikanternas rörelsemönster och behov
The aim of this paper is to examine the layout of public spaces and its effect on human behavior with focus on the relation between pedestrians and cyclists movement patterns in a specific path. The study emanates from the security aspect of pedestrians and cyclists, and builds upon previous theories and empirical studies about perception, security, information design, environmental psychology and behavior. The result shows that individual behavior and movement pattern differs with age, purpose, physical- and other conditions, and layout of the surroundings. A design proposal for improved layout of a path and a node between different oncoming paths has been developed to aid the users? needs, where a separation of walkways and bike lanes forms zones of security for the purpose of better orientation and a better flow between the users..
Bluetooth and security
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth
och några allmänt tillgängliga attack verktyg.
Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens
läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta
avstånd. Därför har man valt att implementera det i kommunikationsenheter som
mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert
Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in
i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och
implementationer av dessa, som finns.
Säkerhet och integritet i närfältskommunikation
Context. In today?s society we use smart cards in many areas, NFC is a smart
card technology that allows contactless interaction between a reader and the
tag, the tag is often in the form of a card. NFC can be used for various
payment methods or as access card to a building which makes life easier. In
previous studies, the technique has proven to be weak to attacks using an NFC
reader connected to a computer.
Studie om individers kontrastkänslighet och preferenser för horisontell och vertikal belysningsstyrka
The purpose of this study is to survey and evaluate if the individual contrast sensitivity and preferences for horizontal and vertical lighting level correspond to the values that standard SS-EN 12464-1 recommends for the workplace- and surrounding light levels.This study examines if lighting should be adapted after the individuals? need or if a general value can be found that will cover every individuals? need for a workplace and surrounding light level. This study also examines if parameters like sex, age and/or glasses/lenses have an effect on the amount of lighting that the test subjects need. Lastly we compared the values concerning the relationship between workplace- and surrounding light levels with standard SS-EN 12464-1?s recommendations.The study is carried out with an experimental design that surveys 220 test subjects who were chosen by a selection of convenience.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the
security threats get bigger. A lot more people also have computers that they
carry home from work where they store important information concerning the
company. The information stored on theese computers can be very easy to
retrieve if you have the will and the skill to do it. Very few people have any
knowledge how to protect themselves from theese threats..
Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik
The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.
Implementation of a quality management system in food production
The aim of this study was to investigate how the process of implementing a quality management system for food safety was handled in four different food producing companies in Sweden. The aim was also to analyze what difficulties the companies face and the possibilities that arise when certified. Furthermore, the reason for implementation was discussed as well as the main expectations on the certificate. Implementing a quality management system is a good way of ensuring the quality and hygiene of the food production and it also increases the traceability of food products through the whole food chain. A food safety standard provides a method of preventing problems and crisis and it can also help to handle requirements from authorities, the market and others.
Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd
How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.
Budgetering inom lammproduktion : en jämförelse mellan lammproducenter och Agriwisesstandardkalkyl
For a company to get the best possible profitability, requires financial planning. Budgeting isa common tool in financial planning. For operating lamb producers, a planning program suchas Agriwise is a good tool. Individual lamb producers may change certain standard figureswithin the planning program to better correspond with reality of the individual cases. In thisway, lamb producers may plan according to which revenues and costs they may expect thenext period.
Fria och öppna programvaror inom kommunal verksamhet : Vägen mot öppna standarder?
This report deals with the attitudes within municipalities of open source software and open standards and if open source software may be an option to gain open standards. The aim has been to find out if open source software and open standards would be able to solve the lock-in problems that municipalities have against proprietary software. The study is conducted as an exploratory, inductive and qualitative study with depth interviews of subjectively selected informants as data collection method. A literature review has also been implemented by the relevant books and articles. Some economic determinants of municipalities to make use of open source software have not been considered in this study.
Dominerande affärsmodeller inom området informationssäkerhet
Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.