Sök:

Sökresultat:

1365 Uppsatser om The UN Security Council - Sida 11 av 91

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik

The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.

Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd

How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.

Går det att lära gamla hundar att sitta? : En studie om att ändra på en verksamhets utskriftsvanor.

The consumer society exploits the earth?s resources more than the earth itself has capability to produce. This over-consumption causes a mass production of products, which mean that more greenhouse gases are being emitted to the atmosphere. This is one of the reasons why the earth?s temperature is rising, where the result of it is worldwide disasters.

Telemedicin som stödtjänst : Vårdprocessen ÖAK-2004, för övre abdominell kirurgi vid Karolinska Universitetssjukhuset, Huddinge

Sweden?s health care is continuously subjected to economical cutbacks, which results in enormous workloads. To prevent problems that arise in these situations, it is of great importance to take measures to increase the efficiency of the working process. This goal can be obtained by increasing our knowledge of the body, under both normal and sickly conditions. That is, by sharing knowledge of the various medical service units within Stockholm?s county council and thus elaborates diagnostics.

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

Regionalisering och demokratiaspekten : En fallstudie av Region Värmland

This is a study of how democracy is affected by regionalization. The study focuses on values related to the democracy; these values are representative, transparency, participation, anchoring of decisions and accountability. The case study for this essay is the Regional Development Council of Värmland case study of Region Värmland.1997 a proposition was put forward the Swedish government about changes in responsibilities regarding four Swedish counties. It was decided that Kalmar, Gotland, Skåne and Västra Götaland County would be part of pilot project with extended regional autonomy.Region Värmland was formed at 2001 as a Region Development Council and was at 2007 transformed to a co-cooperative body. Region Värmland has an indirectly elected council, i.e.

Visstidsdirektivets implementering i svensk rätt : Har korrekt implementering skett?

The essays main intent is to examine whether there has been a proper implementation of the Council?s directive 1999/70/EG into Swedish law regarding the requirement for measures to prevent the abuse of successive fixed-term employment contracts. To achieve this purpose there is a need for an examination of current law. The essay also has some secondary purposes. One of these secondary purposes is the question of whether the implementation of the Council?s directive 1999/70/EG has lead to a reduction of the workers employment protection, which is closely connected to my main question and the violation case.

Jakten på kulturplanering. En textanalytisk studie av instrumentell kulturpolitik i Göteborg.

The aim of this study is to explore local cultural policy documents in the municipality of Gothenburg Sweden, and, more specifically, to investigate the concepts of cultural planning and instrumental cultural policy. Cultural planning is in this thesis seen as a result of an instrumental view of cultural policy. The theoretical framework consists of the theories of Danish cultural policy researcher Dorte Skot-Hansen. She describes cultural policy in urban areas as founded in motives such as economy, social issues, entertaining and enlightenment. A qualitative text analysis is performed in order to see if the purpose of the cultural policies is to focus on cultural planning as formulated in the document Kulturpolitisk strategi ? version 1.0, adopted by the city council in 1998.

Förstudie till införandet av centralt loggsystem hos Försvarsmakten

Modern IT systems tend to become more and more complex, while the number of active systems in companies increases. Furthermore, the number of security-related incidents is at an all-time high. These new conditions impose new demands on organizations. For example, it is no longer possible to manually collect and examine the systems log messages.The purpose of this thesis has been to make a comprehensive study of solutions for automated collecting and managing of log messages, analyze the Swedish Armed Forces specification for solutions for central log collection and management, and evaluating exis- ting solutions. The work consisted primarily of literature studies and evaluations of two of the Swedish Armed Forces of selected products: NetIQ Security Manager and Splunk.

Ett anpassat ledningssystem för informationssäkerhet : - Hur gör en liten organisation med hög personalomsättning?

This paper aims to find out how to implement an information security management (ISMS) system that is based on ISO/IEC 27001-standard into a small organization with high employee turnover. The standard employs the PDCA-method as a course of action for implementing the standard. The reason for implementing such a system is to introduce information security to the organization and to maintain it despite the changes in management. The paper based it?s survey on a case study of a student nation in Uppsala, Sweden.

Kroppen i det offentliga rummet En studie av performanceverken Twilight Walk och Göteborg Crawl

This essay aims to analyse the social and physical interaction through the body inpublic space, based on the performances Twilight Walk by The New Beauty Council,and Crawl, by William Pope.L. As part of the performance-programme CityExcavations from Gothenburg International Biennial of Contemporary Art 2011,artists occupied the streets of Gothenburg for a few days in June 2011. Through aninterpretation on performativity and feminism architecture-theory this essay looks intohow bodies integrate with public space; on how space potentially includes or excludesrepresentations of different bodies and the construction of (gender) identities. I wantto discuss how bodily performances such as movements, gestures, visual andemotional expressions interact with architecture and social contexts..

Hotet från de kriminella MC-gängen - en normativ studie av värdekonflikten mellan den personliga integriteten och statens säkerhet

The aim of this essay is to illustrate a fundamental question; what is a democracy allowed to do to protect itself from enemies? I´ve chosen to analyze the conflict between the two values; individual integrity and state´s security. The individual integrity refers to every person's right to have a protected sphere, and the stat´s security refers to its right to protect itself, and these two positions are often time incompatible. This conflict of value is shown in a normative analysis, where depending on which perspective or normative logic is seen as primate, it gives different conclusions to what a democracy should do to defend itself.To demonstrate how severe the threats are against the society, I choose to examine a specific part of the organized crime, the outlaw motorcycle gangs. They have a special position in affecting the legal system because they have an explicit aim to influence the judicial system with scaremongering and threats.

Anbudskalkyl mer användbar i byggprocessen

This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.

<- Föregående sida 11 Nästa sida ->