Sökresultat:
2705 Uppsatser om Security strategies - Sida 9 av 181
Den europeiska arresteringsordern : ett rättssäkert förfarande?
The European union started as an area of economic cooperation, but has developed into an area of cooperation in many legal fields. There are these days even cooperation when it comes to dealing with criminals. There is a new procedure called the European arrest warrant which goal is to make the extradition of criminals between the different member states in the European union more efficient. Sometimes when a state receives a European arrest warrant they have to extradite the person in question without doing any investigation of their own. The procedure is based on the principle of mutual recognition.
Bristfällig säkerhet inom trådlösa routrar med fokus på WPS
I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner..
Kontrollsystem för implementering av en samhällsansvarsstrategi - En undersökning av SPP Livförsäkring AB
Corporate responsibility is a popular phenomenon of today. The interest for the subject is extensive and means for implementing corporate responsibility strategies within organizations are demanded. There are studies showing how management control systems can be used in order to implement general strategies into organizations. Still, management control systems designed for the implementation of corporate responsibility strategies, in particular, are not provided by the current academia. The aim of this paper is to contribute to studies within management control systems by studying the management control system specifically designed to implement corporate responsibility strategies.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information.
Much of the information is confidential and should not be read by those not
privileged. To protect the information from unauthorized access cryptography
can be applied. The cryptography algorithms in use today all have their pros
and cons. They are therefore suited for different applications.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..
STRATEGISK KOMMUNIKATION OCH KOMMUNIKATION AV STRATEGIER : en intervjustudie kring en organisations kommunikation gällande strategier och mål
Purpose: Corporate communication strategies have a central role in disseminating and creating meaning to the organizations? visions, strategies and goals. But many employees do not know the organization?s overall strategies and goals, nor how well the organization achieves these. The aim of this study was to investigate and describe perceptions about internal communication, primarily focusing on communication about strategies and goals.
Privilegierad mobilitet? : Flygplatser, resande och säkerhet
Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.
Hur man arbetar för en annan värld : En studie av Attac-medlemmars syn på rörelsens visionsarbete
The thesis discusses new social movements and how they act on the conditions of the late capitalistic society. The purpose is to examine a new social movement trough its own members. What is their view of the movement?s aims and visions? How do they look upon the strategies to achieve these goals? The study is based on eight qualitative interviews with members of Attac Sweden. The results show that the members are highly aware of the movements avowed aims and strategies.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
Europas befolkning åldras -utmaningar och strategier : En studie om EU:s möjligheter att arbeta mot de äldres ohälsa
The aging population is a challenge for Europe and there must be cooperation between EU member states to join the challenge to meet. The purpose of this study is to describe and analyze the EU's ability to influence older people's health, based on experiences from a selection of European officials and on a review of the EU's common strategies. The authors studied and problematize the implementation of the strategies that the EU has negotiated for the work against the elderly poor health, with a view of member countries have different conditions. Using qualitative methods, we have collected and processed statements from targeted interviews and publications by a range of European policies. The material was then analyzed from implementation theory and organizational theory, and based on results of previous research. The result shows that the EU is developing common strategies and coordination methods to the aforementioned challenge to meet. The results also show that the differences existing between Member States causes implementation difficulties of the common strategies. The study states ultimately decide that there should be common strategies to facilitate the work of Member States when it comes to countering the elderly poor health.
HR-utmaningar och strategier för entreprenöriella små- och mikroföretag - En fallstudie på fem svenska företag
Entrepreneurial firms face unique challenges in attracting and acquiring human resources due to difficulties associated with resource constraint and organization legitimacy, often described as liabilities of "smallness" and "newness". The aim of this paper is to examine the "smallness" and "newness" challenges met by small entrepreneurial firms, which strategies they apply to counter these challenges, and if these strategies can be explained by the firm's HR philosophy. Since few studies on Human Resource Management (HRM) in small entrepreneurial firms exist, a framework combining theory from the research fields of HRM, entrepreneurship and small firms has been developed. Employing a qualitative case study design of five small Swedish entrepreneurial firms, our findings demonstrate four "smallness" and "newness" challenges and seven strategies that either counteract or prevent them. Furthermore, results showed that the strategies applied seemed to have no significance with regards to the firm's HR philosophy.
Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas
Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.
NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan
The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.
Utveckling eller avveckling? En intervjustudie av hur folkbibliotek hanterar besparingskrav
The purpose of this masters thesis is to examine how managers in public libraries are managing financial cuts. Questions posed are: What strategies are used by the library manager to handle the cuts and how are the strategies being worked out? What are the consequences of the cuts? How do the managers use their library plans in the work with the cuts and how do the plans change as a consequence of the cuts? Library managers in eleven communities are interviewed about their financial cuts in 2003 and/or 2004. The result shows that cuts are made in different ways. The study analysed the managers statements with a model about strategies created by Oulton.
Säkerheten i trådlösa nätverk
The number of wireless networks has increased rapidly among both home users and companies in just a few years. That has brought a lot of good things with it, for example the possibility to connect wireless equipment to the network or Internet from an arbitrary position within range of the accesspoint. But since the transmissions take place through the air some new security risks appear. It?s difficult to restrict the signals to a specific space and thereby a lot easier for unauthorized to eavesdrop or disturb the signals compared to a traditional wired network.