Sök:

Sökresultat:

2565 Uppsatser om State security - Sida 15 av 171

Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik

The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.

Försörjningens paradox : En kvalitativ studie om statliga företrädares framställning av våld i nära relation

The aim of this study was to examine how state representatives prepared domestic violence, regarding the economic consequences of women exposed to violence. In order to achieve a profound and comprehensive view of the governmental keyfigures discussion we performed five interviews and studied selected governmental preparatory works between the years 1995-2015. We used theory on social construction as an approach and certain themes were more regular in our empirical material, which we compiled in three different discourses. According to our empirical material the economic situation of women exposed to violence is caused by inequality and gender power structure. The solution given by state representatives are referred to the municipality and social services.

Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd

How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.

Den svenska statens dilemma : En fallstudie om samernas grupprättigheter

The Swedish society has trough decades developed into a multicultural society. Minority groups such as Sami have been a part of the country for a long time. By being separated from the majority through culture, language etc. minorities demand the right to become independent and have the ability to practice their culture. History show that minorities all over the world have been discriminated and abused by the majorities. Democratic procedures are often advantages for the majority.

Försvaret i skolan : En studie om total- och civilförsvarundervisning i skolan under 70-talets kallakrigsår.

The purpose of this essay is to illustrate the preparation of total and civil defense education in schools in the 1970s to gain insight into how the school looked and pondered the complicated world that existed outside the school's doors. By using the concepts of welfare state, welfare and civil defense culture, I have studied relevant materials to get answers to questions treating the total and civil education in schools after Lgr69, the way the state sees the subject and if it is possible to detect a civil defense culture in schools and if so, how it will be expressed.     The results show that the state emphasized education as incredibly important because knowledge of how to act in a crisis or war could be extremely crucial for the individuals and their survival. The education was so important that it got a role as a main factor in Lgr69. But even if the education was important the teachers had huge problems with the schedule and many teachers couldn´t educate all facts because they didn´t have enough time.

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

Förstudie till införandet av centralt loggsystem hos Försvarsmakten

Modern IT systems tend to become more and more complex, while the number of active systems in companies increases. Furthermore, the number of security-related incidents is at an all-time high. These new conditions impose new demands on organizations. For example, it is no longer possible to manually collect and examine the systems log messages.The purpose of this thesis has been to make a comprehensive study of solutions for automated collecting and managing of log messages, analyze the Swedish Armed Forces specification for solutions for central log collection and management, and evaluating exis- ting solutions. The work consisted primarily of literature studies and evaluations of two of the Swedish Armed Forces of selected products: NetIQ Security Manager and Splunk.

Ett anpassat ledningssystem för informationssäkerhet : - Hur gör en liten organisation med hög personalomsättning?

This paper aims to find out how to implement an information security management (ISMS) system that is based on ISO/IEC 27001-standard into a small organization with high employee turnover. The standard employs the PDCA-method as a course of action for implementing the standard. The reason for implementing such a system is to introduce information security to the organization and to maintain it despite the changes in management. The paper based it?s survey on a case study of a student nation in Uppsala, Sweden.

Joseph Brodskys litterära exil

Nobel Prize Laureate Joseph Brodsky is a key figure in Soviet Russian literature. Expelled from the USSR in 1972, he became a US citizen in 1977 and Poet Laureate of the United States in 1991. In this essay, I have sought to examine the state of exile perceived in Brodsky?s poems. Using Russian literary critic Viktor Shklovsky?s concept of defamiliarization, I have strived to illuminate the formal composition of this state ? its technique.

Anbudskalkyl mer användbar i byggprocessen

This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.

Att ge beröring i omvårdnad : en litteraturöversikt

Background: Touching exists in different forms and can be experienced through the skin. By touching oxytocin is released like a relaxing hormone which counteracts anxiety and depression. Therapeutic contact and healing touch are methods nurses? uses to give positive feeling of serenity, warmth and wellbeing for the patients. Touching can be a method for communication and happiness when word is not enough.

SSDs påverkan på MySQL: En prestandajämförelse

Solid State Drives (SSD) blir idag allt vanligare som lagringsmedium och håller på att bli ett alternativ till magnetiska hårddiskar. Denna studie+ har undersökt hur man på bästa sätt kan utnjytta SSDer i en MySQL-databas. Undersökningen genomfördes med hjälp av experiment där prestandamätningar gjordes för att få en klar bild på i vilken konfiguration av SSDs som ger bäst prestanda i MySQL. Mätverktygen som användes var sql-bench och mysqlslap.   Resultaten visar att en databas på en enskild SSD presterar lika bra som en databas med  SSD-cache  under  majoriteten  av  mätningarna  och  visar  bättre  resultat  än resterande konfigurationerna som var en databas på hårddisk och transaktionsloggen på en SSD. .

Förändrad syn på svensk militär alliansfrihet? : En studie om svensk neutralitetspolitik mellan 1990-2008

Abstract: The purpose of this study is to examine how the Swedish policy of neutrality has changed between the years 1990-2008. The research method used for this essay has been comparative case study, which strives to answer four research questions. Two of these questions are: Which specific occurrences have been fundamental in changing the Swedish policy of neutrality? How have the Swedish policy of neutrality and the policy of non-alignment changed between the years 1990-2008? The theoretical frame work of this study consists of Europeanization as a comprehensive theoretical perspective. In order to explain the Swedish act regarding the policy of neutrality, Logic of Consequences and Logic of appropriateness are used.

Med Säkerhetsrådets resolution 1325 (2000) som utgångspunkt : En komparativ studie av två handlingsplaner

Security Council resolution 1325 (2000) is about women, peace and security. Since the resolution was adopted several countries has made their own National Action Plan for implementation of the resolution.Sweden and Denmark are two of these countries. Resolution 1325 is one of the documents that each countries armed force has to relate to in international work.These countries can get to work together in international operations within the framework of the Nordic Defense Cooperation, NORDEFCO. This study is done by looking at similarities and differences in the action plans and whether they can be an obstacle for the countries to cooperate in an international operation.In this paper a comparative analysis of Sweden and Denmark's plans for the Security Council resolution 1325 will be done. The comparison is made based on the clauses of the resolution relating to the member states actions.In this paper, a qualitative text analysis to be carried out with sections of Resolution 1325 as a model for the comparison..

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

<- Föregående sida 15 Nästa sida ->