
Sökresultat:
2565 Uppsatser om State security - Sida 13 av 171
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..
Mer säkerhet och mindre frihet med risk att förlora dem båda: En kritisk diskursanalys av lagförslaget till FRA-lagen
The aim of this thesis is to contribute to a better understanding of the FRA-law. The focus of the study is to examine how Swedish politicians relate to the new draft of this law on intelligence. Key themes in the study are security, threats, surveillance and privacy. The power relationship between the individual and the state is also examined. Empirical data used in this study consists of a spoken plenary debate in the House which was held in connection with the adoption of the FRA law in June 2008.
Privilegierad mobilitet? : Flygplatser, resande och säkerhet
Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
Mänskliga rättigheter vid en naturkatastrof : En jämförelse mellan Haiti och Thailand
There are three main purposes for this thesis; the first is to distinguish the possible violations that can occur in time of natural disasters. The second is to analyze if there is a correlation between political systems and how the effected country handles the aftermath of a natural disaster. The third purpose is to determine the role of the global community and what responsibility lies with them. The issue is often that the aid becomes the main object for discussion and analysis, but the focus rarely shifts to the effected State. Therefore the focus in this essay is the political system and how they cope with the human rights violations that can occur in a time of natural disaster.
Att tillgängliggöra distributionsstödda titlar med hjälp av marknadsföring ? En studie om bibliotekariers ansatser på området
The purpose of this master's thesis is to study how librarians at public libraries make the literature with state supported distribution available through marketing. By qualitative interviews with nine heads of libraries the thesis examines how the library staff in each library market the state supported distribution by the Swedish Art Council. My theoretical framework is based on Philip Kotler's thesis on marketing. My conclusion is that the library staff rather market the library as whole, than focus on just one specific type of books. The attitudes toward the state supported distribution are a mixed one, but the library staff is glad for what is given..
Att ställa den skyddsbehövande inför rätta : Om de rättsliga förutsättningarna för att förhindra skyddslöshet vid tillämpningen av Flyktingkonventionens uteslutandeklausuler och samtidigt motverka straffrihet för de grova folkrättsbrott som faller under k
The purpose of this study has been to investigate the prospects for identifying and prosecuting individuals suspected of war crimes, within the process of exclusion from refugee status under article 1F(a) of the 1951 Refugee Convention, and using subsequent mechanisms for extradition or prosecution in international criminal law. A number of principles within human rights law and public international law have been advocated by the UNCHR and several human rights NGOs as necessary for a thorough application of the exclusion clauses; one that takes individual responsibility into account and upholds the aims and purposes of the exclusion clauses. There is a discussion as to whether specialised or accelerated exclusion procedures are justified for reasons of security and efficiency, or if they put the rights of the individual at risk and limit the opportunities for gathering information to support investigation and prosecution of the crime in question. Apart from the instruments of asylum law and procedure that have emerged within the EU harmonisation process, there are no general, binding rules on the procedural aspects of the exclusion clauses. One principle that regulates the consequences for the individual of exclusion from refugee status and decisions on extradition is, however, the principle of non-refoulement.
Framväxten av en svensk biblioteksersättning
erspective [80][upps-01.gif] This is a thesis on the Swedish Public Lending Right PLR, from a historical perspective. Some of the questions which are investigated in this thesis are: why did the State decide to introduce a PLR and why did it take about 20 years to make the decision? The question why the PLR was not introduced on a copyright basis is also discussed. The focus of this study is during the period of 1934-1956 and it is a literature-study. Mainly there are four reports made by different committees that have been examined.
Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas
Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.
NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan
The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.
Ukraina: Realismens återkomst? : En kvalitativ textanalys om hur fred och säkerhet bör skapas i Europa utifrån teorierna realism och liberalism
Ukraine shares a long history with Russia. In the early 21th century, Ukrainians wanted a freer Ukraine. Therefore the orange revolution started in 2004 by the Ukrainians and had a positive outcome. The situation later became worse because of the economic crisis in 2008 and a corrupt president. The pro-western politician Petro Poroshenko was elected to become president in 2014.
Svenskt utrikespolitiskt beslutsfattande : Flernivåanalys av Sveriges beslut att bli en del av den europeiska säkerhets- och försvarspolitiken (ESFP).
In 1998 Sweden accepted the Treaty of Amsterdam which contained a development of the common foreign and security policy (CFSP) towards a European security and defense policy (ESDP). This thesis aims at studying the decision making process behind the Swedish foreign policy decision to further develop its security policy within the European Union. The purpose is to explain which factors and conditions that did affect and influence the Swedish foreign policy decision. The research applies foreign policy analysis, a theoretical perspective that analyzes both domestic and international conditions using different levels of analysis. The research methods being used has been qualitative as well as quantitative, complemented by interviews, since the research is a process tracing case study.The thesis conclusion is that the Swedish decision is explained by several factors.
En skogshistorisk jämförelse mellan två närbelägna landskap med olika mångfald i östra Småland :
This study shows the historical development of the forests in Hornsö and Ebbegärde state forest area in eastern Småland situated in southern Sweden..
Gruppmålföljning av markobjekt
This Masters Thesis considers tracking of ground targets. Since ground targets often are difficult to detect with sensors a track is easily lost in ground target tracking. The main question in this thesis is whether information on close targets and observations of them can be used to make the tracking more reliable. An algorithm using Kalman filters and JPDA-association to create a group track for vehicles travelling together has been implemented in Matlab. Using the state of the centre of the group the state of a vehicle in the group can be updated.
DDoS : -Vad är det och går det att skydda sig?
This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks..