
Sökresultat:
2565 Uppsatser om State security - Sida 5 av 171
Civilsamhället i Ryssland : En fallstudie om hur den ryska staten förhåller sig till civilsamhället.
When Vladimir Putin in the year 2000 came to power in Russia many believed that the Russian civil society were weak and had very little influence and with Putin people say that the situation have deteriorated. The purpose of this paper is to establish what kind of relationship exists between the Russian state and the civil society and to analyze this from a top-down perspective. We are looking at Russia during Putins first term in office from the year 2000 until 2004. In order to establish the relationship we have used John S. Dryzeks theory of inclusive and exclusive state and whether it?s active or passive in this process.
Från diskurs till praktik? En studie om säkerhetiseringen av irreguljär migration och dess konsekvenser
This thesis discusses the theory of securitization in relation to the issue of irregularmigration, from EU level to national level. By using discourse analysis, the purpose isto explore whether the discourse leads to practice when it comes to nationalimplementation of EU debates on return policy. The material used in this workconsists of policy documents regarding the Return Directive from the EuropeanCommission as well as the Reva Project in Swedish migration policy. The mainobjective of the Reva Project is to make the process of returning irregular immigrantsmore effective and it has been strongly criticized, both by media and public opinion.The conclusion of this case study is that even if the security rhetoric may appearstronger on the EU level, the main elements of the security discourse are stillportrayed in the implementation on the national level. Based on this analysis we canmake the presumption that discourse develops into practice in the case of returnpolicy in the EU-member state relation..
Säkerheten i trådlösa nätverk
The number of wireless networks has increased rapidly among both home users and companies in just a few years. That has brought a lot of good things with it, for example the possibility to connect wireless equipment to the network or Internet from an arbitrary position within range of the accesspoint. But since the transmissions take place through the air some new security risks appear. It?s difficult to restrict the signals to a specific space and thereby a lot easier for unauthorized to eavesdrop or disturb the signals compared to a traditional wired network.
Varierande Vägar till Frihet - Hur staten och civilsamhället interagerar för demokrati i Vitryssland, Moldavien och Ukraina
The three post-communist states - Belarus, Moldova, and Ukraine ? have gone different ways in terms of freedom and democracy since the breakdown of the Soviet Union 1991. During these years, the state and the civil society have been fundamental actors in the struggle against, and even for, authoritarianism.A strong state with great capacity in Belarus has undermined the chances for the civil society to fulfil its task as a watchdog of the state and link between the citizens and the government.Failed authoritarianism in Moldova has led to a situation where both the state and the civil society are weak. The major problem is lack of organization and cohesion; both the state and the civil society have often been divided by ethnical differences and are therefore not strong enough to promote democracy.In Ukraine, the dominance of a strong state ended in 2004 when the Orange Revolution took place, sometimes called a ?peak of democracy? where popular mobilization and protests succeeded in it's opposition against the state.
Säkerhetsutvärdering certifikatserver i stället för aktiva kort
Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware.
Statlig övervakning av Internet: En diskursanalys av riksdagstryck 1994-2007
This paper attempts to survey the debate in the Swedish parliament on state surveillance on the Internet, from 1994 to March, 2007. With a discourse analysis inspired by Foucault, we follow how the idea of state surveillance is viewed by politicians during the period. By focusing on the Internet, we expect to find how politicians in the parliament regard the idea of an unregulated forum for citizen communication and interaction, and how the need for state surveillance on the new arena that is Internet, is expressed and argued for. Theoretical framework is given by Foucault?s theory of the Panoptic state, as well as his thoughts on discourse, power and governmentality.
Säkra kommunikationskanaler i en distribuerad heterogen miljö
The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a secure manner.
Hembudsklausuler i aktieägaravtal
Since the 9/11-attacks several nations have been confronted with a new international threat, its nature traces back to the political- and religious- radical movements of the 20th century Cold War. Ever since, various states have been under threat by terrorist organizations around the world due to mainly participating in worldwide counter-terrorist interventions created by western alliances. In Sweden, amongst other countries, the state took security-precautions that would imply total control of information throughout the territorial borders. The assigned proposition was accepted by the Swedish parliament in June 18th 2008, after this date wild spread criticism was still in effect ever since the Swedish government first publicly announced the proposition in May 8th 2007. This study emphasizes on understanding why the Swedish government chose to present this proposition to parliament, in order to complete this task the study will present the motives and the alleged threats that were the core of the proposition and its value-maximizing goal of creating a new surface for Swedish homeland security.
Autonomi och gemensamma strävanden
The liberal state, it has been argued, must be neutral between different conceptions of the good. Embodying ideals such as fairness and impartiality, state neutrality is intuitively appealing, but working as a restraint for state actions it is somewhat unsatisfactory. People make mistakes about their lives and people live less valuable lives than they could do. To then restrain the state from doing as much good as it can seems just as unappealing as neutrality at first seemed appealing. In this paper, a possible solution to this dilemma is presented.
Säkerhetsklassificering av IT-system på Fläkt Woods AB
This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.
Hur man rättfärdigar intervention i suveräna stater : en studie av FN:s intervention i forna Jugoslavien
This study examines the theories about intervention and sovereignty in relation to the world of today, with the raising question about humanitarian intervention in a globalized society.The purpose of this paper is to examine if intervention can be justified in a sovereign state and how it can be justified. The expected outcome is that conclusion can be drawn from the specific case with United Nations intervention in Bosnia and Hercegovina, and what kind of motives they putted up to justify their intervention.Because we are still living in the era of the Westphalia system with the inherited thoughts of state sovereignty, but in conflict with the new ideas of globalization and human rights, it?s of big relevance to look at this topic closer.First of all the reader is presented to the theoretical aspects of state, sovereignty and different kinds of intervention, to become more aware of the complications surrounding the relationship between these conceptions.The method used in this study is a motive analysis with the focus on the motives told by United Nation, to be the reason for the intervention in Bosnia and Hercegovina. The empirical results are based on the reports from United Nations Security Council during the years 1991 ? 1995.The results are that the intervention in Bosnia and Hercegovina can be justified when looking at the theories in relation to the empirical result, with the FN ? charter and the fact of violation against humanitarian law and human rights.One conclusion can easily be drawn, that individual rights are playing a big role in today?s global society and are putting some pressure on the United Nation to look over the rules about humanitarian intervention..
Framtagning av en informationssäkerhetspolicy
This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.
Den försvinnande staten Tuvalu : En fallstudie om klimatflyktingars rättigheter och staters ansvar
This thesis aimed to, with the help of a case study, investigate and discuss state responsibility towards climate refugees. The state of Tuvalu was selected because of their vulnerability as a low-lying island state. This was fulfilled by on-site study how the state Tuvalu acted to climate threats, determine if the future migrants from Tuvalu can be counted as climate refugees and find out if they are by that definition included by the UN Refugee Convention. The result indicated that the state of Tuvalu is adapting to climate threats, that in the future the population can be seen as climate refugees, if they are forced from their homes due to climate change, and that they, despite that definition, can not be included by the UN Refugee Convention. The study also indicates a need for greater international protection of climate refugees by, for example, an expansion of the UN Refugee Convention so that these vulnerable people do not fall into oblivion due to a question of definition..
En insats för freden eller statsbudgeten? : Riksdagsdebatten kring försvarsbesluten 2000 och 2004
The purpose of this essay is to investigate what kind of motives where behind the long term decisions for the Swedish military defense in 2000 and 2004. This leads to the questions that the essay is meant to answer; 1. Were the motives behind the two decisions for the Swedish military defense of economic character or an adjustment of security and defense policy? 2. Was the parliament united in the two decisions and if they were not, why? 3.
WLAN : Oskyddad och okontrollerad datakommunikation
This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.