Sökresultat:
2705 Uppsatser om Security strategies - Sida 6 av 181
Arbetssituationens och personlighetsdragens påverkan på arbetsrelaterad coping
Fifty employees at a local industrial company answered a questionnaire about coping strategies and personality traits. One purpose of the study was to investigate if officials and public employees used different coping strategies in stressful work situations. Another purpose of the study was to investigate if there was a relationship between the personality traits of the officials and the public employees and their chosen coping strategies. Ten Item Personality Inventory and Brief COPE were used to examine personality traits and coping strategies respectively. The results showed a difference in exhibited personality traits where conscientiousness was higher among the official employees than the public employees.
Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.
En undersökning i datasäkerhet för hemanvändare : Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall.
Innehållsbaserad bildåtervinning med Haar-transformation
The purpose of this thesis is to evaluate 7 different search strategies for content-based image retrieval with respect to retrieval effectiveness. The strategies are based on different levels of resolution implemented by the Haar transformation. The result of the study shows an improvement in both mean average precision and mean recall in strategies based on lower levels of resolution..
Smarta Kort : En del av en intelligent IT-lösning i hälso- och sjukvården?
Background: IT-security is included in the concept of information security, which considers all the security of handling information within an organisation. Good IT-security is about finding the right level of measurement, however, it is hard to implemement new IT-solutions in an organisation, particularly within the health care field, where sensitive information are handled daily. Lately the Swedish government, together with county- and city council, understand the importance of IT and health care. Carelink, an organisation of interest, is working actively for the presumption of benefit by using IT within the health care field. During spring 2006 the Swedish government introduced a national IT-strategy.
IT-säkerhet i små organisationer
IT- och informationssäkerhet är ett ständigt aktuellt ämnesområde. ITsäkerhetsarbetei små organisationer framstår som ett underforskat område. Föratt göra en kartläggning av hur arbete med risk, hot och säkerhet kan se ut i småorganisationer har vi genomfört en explorativ intervjustudie med representanterför små organisationer om deras arbete med IT- och informationssäkerhet. Vihar dessutom genomfört intervjuer med experter på området för att få ettbredare perspektiv. Tolkningen och analysen av intervjusvaren har utförtsgenom att först tolka svaren utifrån Security Controls och därefter analyserasvaren utifrån fem temaområden som vi funnit i materialet.
Lärares använding av formativ bedömning i matematikundervisningen : En observationsstudie av lärare i årskurs 4-6
The aim of this study was to investigate what formative assessment means and get information about how teachers? assessment practice in formative assessment can look like, based on five key strategies. I have observed five teachers in grade 4 to 6 during a week of their mathematics teaching. Formative assessment is assessment for learning and has the purpose to support students? knowledge development.
Finns kvinnor i säkerhetspolitik? : En undersökning av den svenska säkerhetiseringsprocessen avseende svenskt deltagande i den militära insatsen Minusma i Mali utifrån ett feministiskt perspektiv
Scientists argue that gender affects foreign policy and security policy, that ideas of gender are inconstant and that there is a lack of feminist perspectives in International Relations. The changes seen in the global security context may have challenged the way politicians and scientists understand war and its impacts, and led to increased gender awareness.Using securitization theory and feminist international relations theory, the aim is to examine how women and men are being spoken of in the Swedish foreign policy discourse regarding participation in the UN-led stabilization mission Minusma in Mali. By applying a feminist perspective on the securitization process, the intention is to increase the knowledge of whether there is gender awareness in this context.The result shows that there is limited gender awareness. There is minor consideration for the conflict?s different implications on the situation for women and men.
Människan och lärarprofessionen : En livsberättelse
The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.
Organizational Identity Construction - A qualitative study made in three different contextual settings
Our findings show that depending on the contextual setting and what sort of merger an organization goes through, the identity strategies will differ. We see that symbols and values are two objects of relevance in our case companies? identity strategies, but that there are differences in how they are being used. There is consensus around the fact that values are important to have, however their meaning to each organization differs and it has also proven to be dependent on what position you possess in the company. We have developed a four-fielder in order to further illustrate our findings.
Ett effektivt verktyg? Om explicit läsförståelseundervisning
Syftet med denna studie var att undersöka vilka effekter två olika läsförståelsemodeller, Reciprocal Teaching och Transactional Strategies Instruction, har på elevers läsförståelse. Den metod som användes i studien var kvalitativ textanalys som applicerades på 7 forskningsartiklar. Resultatet visar att modellerna gett effekt, i olika åldrar, länder och grupper. Detta resultat visar att Reciprocal Teaching och Transactional Strategies Instruction är effektiva modeller att arbeta med för läsförståelseutveckling..
Multilateral och unilateral säkerhetspolitisk praktik och strategi för hantering av Syrienkonflikten
This security study attempts to explain the dynamics of international conflict management of an intrastate conflict, through a combination of three theoretical frameworks. The conflict in Syria is shown to be managed mainly through strategies using coercive diplomacy, and some main contributions within the research field relating to strategies of coercion are used for guidance, to important factors which could affect coercive international conflict management, as well as to additional theories which could enhance the study?s explanatory power through a combined theoretical framework. The two added theoretical frameworks are Power Balancing and a Multidimensional concept of Power. With the aid of analytical tools derived from this combined framework the conflict management is analysed within both a multilateral and unilateral setting, offering some explanation as to why international conflict management (practiced by UNSC multilaterally and USA unilaterally) has shown so little progress in regard to the conflict, as well as why one significant, though limited, result could be achieved regarding the destruction of the Syrian regime?s chemical weapons arsenal..
Teknisk analys : Är det lönsamt att vara trendig?
Trading based on technical analysis has its roots in the U.S. financial industry where it has long been common practice, in Sweden however the trading style has not had the same impact. Based on the results from the preliminary study we believe this is about to change and that the topic therefore requires further studying. Several online stockbrokers today provide information and tools for technical analysis to their clients. As the list of indicators to use for creating strategies is so immense it is interesting for an investor to know what actually could be the basis for a profitable investment strategy.
Ska man tro på aktie-Nostradamus? : en studie om aktierekommendationers värde för privata investerare
Intro: 80 percent of the Swedish population own shares. This makes Sweden the leading country in private investment in securities. It can be difficult for the private investor to know where, when and which security to invest in. The strategies are as ambivalent as the stock markets fluctuations. If the investor prefers to refrain from investing money himself, there are brokers who carry out these types of services.
Koncern som tillväxtinkubator för småföretag : ? En fallstudie i ett shared service centers möjligheter attstödja entreprenöriella småföretag
???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.