Sök:

Sökresultat:

7127 Uppsatser om Security-development-nexus - Sida 1 av 476

Somaliska pirater - ett mycket litet problem: En undersökning av Sveriges arbete gällande frågan om somaliska pirater under 2009-2010.

During 2009-2010 Sweden participated in an international military operation whose intention, according to the Swedish news media, was to fight Somali pirates. The purpose of this thesis is to study various decisions and documents behind the Swedish efforts, both military and foreign aid, regarding the matter of Somali pirates during the years 2009-2010 and analyze the results using an interpretation of the Security-development-nexus-theory. The method used is text analysis based on the hermeneutic idea of understanding and interpretation.The thesis studies the international resolutions and national decisions that lead to the military operations in the Gulf of Aden and also the international strategies and national approaches regarding Sweden's assistance in the development of Somalia. The theoretical section contains an interpretation of the vast Security-development-nexus-theory. The concepts of security and development are first presented separately and then collectively in terms of military security, societal security, economic security, regime security and human security.

Säkerhetstänkande integrerat i systemdesign via formaliserade metoder

Systems development methods mirror different organizational perspectives, and not all methods are formalised, but what they have in common is the purpose of structuring and supporting systems development processes. Which method would be the most suitable may be determined by the systems development context at hand, because every systems development context is unique. Information is a valuable asset in today?s organizations, and it needs to be protected against both internal and external security threats. In our essay we aspired to find and present suggestions as to how systems developers can include security in the very design based on formalised systems development methods to create systems that are better prepared to meet the security challenges of today.

Vapenhandel : En kontradiktion till EU:s utvecklingspolitik?

Arms trade is a multi-faced issue, it can increase the state's economic revenue; however also endanger the human security. The European Union's member state United Kingdom is one of the five largest arms traders in the world. The EU promotes human security in its work, especially in the union's development policies. These circumstances address the main question of the study: is there a contradiction between the UK's arms trade and the EU development policies. The objective of this study is to research the stately weapon use in three of the UK's trading partners, and how it could affect the EU development policies.

VEMS SÄKERHET? VILKA RÄTTIGHETER? : Om diskursförändringen i svensk migrationspolitisk riksdagsdebatt 1975-2002

Human rights and solidarity, as well as moral and legal responsibilities to protect people in need of refuge, seem to be principles of secondary importance within international migratory policies today. Instead, the predominant view seems to focus more and more on the protection of territorial borders, the welfare state and national identity. This international change in discourse can also be seen in the political trends of individual states. There are reasons to believe that this is a development that is also perceptible in the political rhetoric that is used in parliamentary debates, which constitute the main focus of this thesis. The aim of this study has therefore been to increase the understanding of this change in migratory policies by analyzing Swedish parliamentary debates between 1975 and 2002, using a theoretical framework focused on two different perspectives on security: First, the Copenhagen School and securitization of migration, and second, human security and human rights.

??Auktorisation och ackreditering inom Försvarsmakten : En studie i nyttan av en standardiserad process för att hantera informationssäkerhet

???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.

Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling

The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.

Vägen mot säkerhet - får alla gå med? En kritisk, feministisk analys av det traditionella säkerhetsbegreppet.

In this essay I analyze the concepts security and security policy from a critical, feministic point of view. The traditional way of thinking security is state-centred and narrow with its military oriented threatening pictures and solutions.I advocate that the two concepts need a more feministic and holistic approach to be able to cope with the threats of our time and include the security for women explicitly.To suggest how this can be done I introduce a model; security-sphere, which should be seen as a way to constructively connect my objections to the existing research with a new approach to security problems. The security-sphere is based on two analytical parts; the private security sub-sphere and the public security sub-sphere, in order to make new images of security problems visible.It is a fact that most of the threats against women specifically, take place in the private sphere where no traditional analytical tools reach in - these threats have not been seen as 'real' security problems. My aim is therefore to integrate these issues into the agenda of security policy..

Human Security in Serbia: A Case Study of the Economic and Personal Security of Internally Displaced Persons

The aim of this study was twofold; firstly it sought to describe the human security situation of Roma IDPs and IDPs living in collective centers, secondly it tried to create an understanding for how the human security situation can affect IDPs capabilities to develop. The findings of the study were mainly based on a field study conducted in Belgrade, Serbia for two months. The results of the study were that IDPs in collective centers have a poor human security situation regarding basic income, employment, adequate housing and experienced personal security. Roma IDPs suffer from the same insecurities, but in addition also has poor human security in basic education and personal safety. Their stagnant human security situation proved to be the result of the inability to help IDPs by the actors involved in the relief work.

Webbsäkerhet och vanliga brister : kunskapsläget bland utvecklare

This bachelor thesis looks at developers knowledge about web security both regarding their own view on their knowledge and their actual knowledge about vulnerabilities and how you mitigate against them. Web developers knowledge regarding web security are becoming more and more important as more applications and services moves to the web and more and more items become connected to the internet. We are doing this by conducting a survey among developers that are currently studying in the field or are working in the field to get a grip on how the knowledge is regarding the most common security concepts. What we saw was that the result varies between the different concepts and many lack much of the knowledge in web security that is getting increasingly more important to have..

Privata säkerhetsföretag - Våldet som handelsvara

This essay tries, in different levels, to explain and create a deeper understanding for the phenomena ?private security companies?. By using Mary Kaldors theory about new wars, I will come to the conclusion that the insecurity that these wars create is an important part in understanding the emergence of a security need that these private security companies can provide. Later I investigate and explain howthe neoliberal privatization policy that is spreading through the world today has laid ground for development of the private security industry. When I have answered these questions I analyze how the private security companies can affect the state, war and peace both positively and negatively.

Säkerhet till varje pris : En jämförande studie om utvecklingen av privat säkerhet från Kuwaitkriget till Irakkriget

The purpose of this essay is to examine the development of the use of private securitycontractors in Iraq. The reason is that there has been a considerable increase of the number ofprivate security firms operating in Iraq during the last couple of years. The legislation in thefield of private military and security is indistinct and my hypothesis is that the lack of nationaland/or international legislation can be connected to the increased globalization. To come toany conclusions about this I have chosen to make a comparative study between the two casesthe Gulf War and the War in Iraq which started in 2003. In this comparison, I ask thefollowing questions: 1) Are there any signs of anarchy in the field of private security duringthe Gulf War respectively the last War in Iraq? 2) In what way has the use of private securitycontractors changed from Case 1 to Case 2 ?According to my research, there were signs of anarchy in the field of private security bothduring the Gulf War and during the latest war in Iraq.

Fo?rutsa?ttningar fo?r AU som sa?kerhetsgemenskap avseende inomstatliga konflikter med transnationell inblandning

The theory of ?security communities? is generally understood as ?dependable expectations of peaceful change? between groups and whether or not the African Union can be said to meet that criteria has been contested in the research community. One of the central disagreements lie in the nature of the region?s conflicts, of which a majority are intrastate but with tendencies of transnational involvement. This paper seeks to understand how extensive this involvement is and how it affects the possibility of classifying the African Union as a security community.

Webbsäkerhet och vanliga brister - kunskapsläget bland utvecklare

This bachelor thesis looks at developers knowledge about web security both regarding their own view on their knowledge and their actual knowledge about vulnerabilities and how you mitigate against them. Web developers knowledge regarding web security are becoming more and more important as more applications and services moves to the web and more and more items become connected to the internet. We are doing this by conducting a survey among developers that are currently studying in the field or are working in the field to get a grip on how the knowledge is regarding the most common security concepts. What we saw was that the result varies between the different concepts and many lack much of the knowledge in web security that is getting increasingly more important to have..

Vatten som säkerhetsfråga : Med FN:s konstruktion av vattenfrågan som utgångspunkt

ABSTRACTThe aim of this study is to analyse if the UN today constructs the water issue as a security issue and to argue about in which way the organization in that case does so alternatively why it can be said that the UN doesn?t construct the water issue as a security issue.In order to reach this purpose the following questions will be answered:?Does the UN construct the water issue as a security issue today?-If yes, in which way?-If no, why can it be said that the organisation doesn?t?The methods used are qualitative literature studies of policy documents on water from the UN. The focus is to analyze the ideas about water and to apply my theory on the concept of security, which is Barry Buzan?s framework on security, to these ideas.The main results showed that the UN strongly constructs the water issue as an environmental security issue for environments and species and in relatively strong terms also constructs it as an environmental security issue for civilisations. In rare cases the organisation constructs it as a societal security issue, but the UN doesn?t construct the water issue as a military, political or economic security issue..

Koncern som tillväxtinkubator för småföretag : ? En fallstudie i ett shared service centers möjligheter attstödja entreprenöriella småföretag

???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.

1 Nästa sida ->