Sök:

Sökresultat:

535 Uppsatser om September 11 attacks - Sida 1 av 36

"Ett lugnt hörn när det är kaos i världen" : en studie om varför barnprogrammet Bolibompa ser ut som det gör under och dagarna efter en katastrof

This study intends to examine why the Swedish children?s programme Bolibompa is produced the way it is during a larger catastrophe. Our intention was to find out how the editorial staff, in the children?s department in the public service television of Sweden (SVT),was handling the Estonia disaster, the September 11 attacks and the Asian Tsunami. To accomplish that, we first had to find out how the children?s programme looked during these catastrophes and also understand how the editorial staff was working with children?s programme during ordinary days.To achieve our purpose we have been interviewing five persons from SVT, who was involved in producing the children?s programme during these three catastrophes.

Frihetens kamp mot ondskan. Nationellt meningsskapande i USA efter den 11 september 2001

This is a paper about the process of creating meaning in speeches held by president Bush after the terrorist attacks on September 11th 2001. People need tools to orient and understand the surrounding world. They need to create a meaningful orientation in a chaotic world. Some meaning is favoured due to the prevailing social structures. Thru language discourses are produced that helps us understand how the world is constructed.

Successiv avtalsbundenhet : En beskrivning av modellen och dess närvaro i svensk rättspraxis

Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished?Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means.

Strategisk bombning i cyberspace

Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished?Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means.

Organiserad brottslighet och terrorism : En komparativ diskursanalys av synen på dessa fenomen i svenska riksdagstryck

The aim of this study was to find out if the use of the concepts ?terrorism' and ?organized crime' has changed after the event on 11 September, 2001 when terrorists attacked World Trade Center and Pentagon. In this study I make use of discourse theory in a way which is inspired by the writings of Winther Jorgensen and Phillips. Knowledge acquired through this research has been primarily generated from two Swedish Government Official Reports concerning questions arising from introducing secret police surveillance. In these reports, there are many opinions from authorities whom have given their thoughts on introducing new ways of policing which are very interesting to analyze.

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Testprogram till hårdvara på en viktindikator

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Response to the Terrorist Attacks of September 11 : De etniska grundantagandenas påverkan på USA:s konfliktrelation under kriget i Afghanistan

Denna studie syftar till att undersöka om den grundläggande synen på identiteter USA:s ledande politikers besitter går att utläsa i strategiskt viktiga tal med koppling till USA:s insats i Afghanistan. Syftet är också att undersöka vad dessa synsätt haft för inverkan på konfliktrelationerna i detta fall. Den besvarar därför vilken grundläggande syn George W. Bush och Barack Obama uppvisat gällande identiteter. Den berör också vilken påverkan dessa identitetssyner haft för USA:s konfliktinställning och hur det förklarar konfliktutvecklingen.För att besvara dessa frågeställningar presenteras ett teoretiskt ramverk bestående av Carol Bacchis teori om problemformuleringens betydelse samt de essentialistiska och konstruktivistiska perspektiven.

DDoS : -Vad är det och går det att skydda sig?

This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks..

Sagan om de två tornen : En jämförande fallstudie av hur 11 september-attackerna gestaltades i svensk och brittisk morgonpress

Syfte: Syftet med studien är att belysa hur 11 september-attackerna gestaltades i svensk och brittisk morgonpress en vecka efter händelserna. Tyngdpunkten i undersökningen ligger på jämförelsen mellan tidningarnas gestaltningar av händelserna.Frågeställningar: Hur gestaltas nyheten veckan efter katastrofen? Vilka likheter och skillnader finns mellan tidningarnas gestaltningar? Hur ser förhållandet mellan text respektive bilder/nyhetsgrafik ut i de båda tidningarna?Teori: Studiens teoretiska ramverk är gestaltningsteorin och främst Robert Entmans modeller. Gestaltningsteorin handlar om mediernas inflytande över hur människor upplever och uppfattar den verklighet vi lever i. Då studien är en jämförelse mellan svensk och brittisk dagspress kontextualiseras studien genom en skildring av situationen för dagspressen i respektive land.Metod: Uppsatsen har undersökt gestaltningar i medieinnehåll genom att använda kvantitativ innehållsanalys som metod för insamling av empiriskt material.

Rovdjursproblematik i Sverige med fokus på varg och får. Vilka lösningar finns?

The Swedish wolf population is like continue to grow and this will eventually lead to an increase in the predation of livestock. In Sweden carnivore attacks happen most frequent on sheep farms and the majority of these attacks are performed by wolves. Because of this, the main focus in this study is on the sheep and wolf problematic. It is not only the direct killing of livestock that affects the animals and their owners in a negative way. It has also been shown that livestock that lives close to carnivores sometimes change their behaviour in a way that will affect their ability to reproduce and to forage efficiently.

Same same - but different? - A Comparative Four Case-study of Differences in Modern American Presidents' Personality, Leadership Style and Political Skills, Concerning Management during Crisis

The word crisis is often used in everyday language, but according to political theory it actually refers to a crisis situation within a country where national interests suddenly are at stake demanding that important and complex decisions must be made within certain time constraints. These decisions can in turn lead up to most fatal consequences. USA, being one of the world's superpowers is most certainly involved in crisis situations directly or indirectly, frequently or more seldom. Amounts of people get suddenly involved and even more people can be drawn in by the decisions that are made thereby. Research has shown that the character of a leader affects decision-making.

..."with liberty and justice for all" - Medborgarskapsbaserade kränkningar av fri- och rättigheter i amerikansk politik och retorik efter 11 september

Den 11 september 2001 innebar början på en stor förändring i amerikansk inrikes och utrikespolitik. I kriget mot terrorismen har en omfattande diskriminering skett av icke-amerikanska medborgare både inom landets gränser såväl som utanför. För att rättfärdiga detta för sitt eget folk samt det internationella samfundet har man i politiken och retoriken skapat bilden av "den andre" som ett potentiellt hot mot den amerikanska säkerheten. Våra två frågeställningar behandlar skapandet av "den andre" som används för att rättfärdiga agerandet efter 11 september.Målet i uppsatsen är inte bara att besvara frågeställningarna utan också att ge en djupare insikt i varför svaren ser ut som de gör. Våra angreppssätt och valda metoder har sina begränsningar men trots det anser vi att dessa kan erbjuda en ny synvinkel på USA:s agerande efter 11 september..

1 Nästa sida ->