Sök:

Sökresultat:

1365 Uppsatser om The UN Security Council - Sida 4 av 91

Rådet, kommissionen och den svenska sysselsättningpolitiken.

The aim of this paper is to see if Sweden has implemented the recommendations and taken notice of the guidelines for employment that the Commission and Council set up every year and from this see the role of the Commission and Council for the national employment politics. The years that I focused on in the paper are year 2000- 2004. The method that is used is a case study research that is exploratory and explanatory. The theoretical starting points are theories about delegation, cooperation and a variation of control and autonomy. This is recognized in the Principal- Agent theory and the Principal- Supervisor-Agent model.

Förändring av styrning inom en offentlig stödverksamhet: En studie över hur styrningen förändras inom en offentlig serviceenhet påverkas av en privatisering

The purpose of this study is to perform an in-depth analysis of what effects a privatization of a service organization has on the management control system within the organization. The paper studies a service organization which provides service for the county council in Östergötland, Sweden. The result is based on interviews with several people, both within the acquiring private company and also within the county council in Östergötland, and analyzed using Samuelson?s (2005) framework from his study ?Organizational, Governance and Control ?. The major finding in the thesis is that the factors that have had the largest impact on the changes in management control are the new owner demands and the degree of operationalization of the overall goal..

Mänsklig säkerhet i Sudan- För vem och mot vad?

The concept of security is a contested one. The United Nations definition in UNDPs Development report of 1994 is the most authoritive and commonly cited. The civil war in Sudan has led to 2 million deaths and over 5.5 million refugees. In a resolution from 2005, the UN decided that the war in Sudan was a threat to international security and peace. The 10th of January UN decided that a peace commission ought to be send with 10 000 military and civil men including 700 policemen.The main purpose of this thesis is to improve our knowledge of those factors which can cause an increased risk of conflict within a state, and how that can affect the social conditions for individuals.

En studie om en kapitalförvaltares skapande och bibehållande av kunder genom mervärde

The aim of this paper is to see if Sweden has implemented the recommendations and taken notice of the guidelines for employment that the Commission and Council set up every year and from this see the role of the Commission and Council for the national employment politics. The years that I focused on in the paper are year 2000- 2004. The method that is used is a case study research that is exploratory and explanatory. The theoretical starting points are theories about delegation, cooperation and a variation of control and autonomy. This is recognized in the Principal- Agent theory and the Principal- Supervisor-Agent model.

Patienters och närståendes upplevelser av Äldrevårdsenheten i landstinget Uppsala län

Background: Home health care means that patients receive care in their home. Äldrevårdsenheten in Uppsala County treats people, over 65 years, in the patient's home and because of the fact that the quality of care from the patient´s perspective not have been studied previously, this study as part of the quality control of the business.Aim: The aim of this study was to investigate how patients, and family members, who receive care within the Äldrevårdsenheten in Uppsala County experiencing the care provided in the home.Method: Interview study with qualitative analysis.Results: Patients who are cared for within the Elderly Care Unit in Uppsala County Council has a positive experience of home care. Being cared for in the home creates a sense of security and calm in the patients rather than the stress and fear of long waits in the emergency department and planning advice from medical appointments . In contrast, perceived lack of physicians in home care and accessibility to health care staff.Conclusion: In general, patients in the Elderly Care Unit in Uppsala County Council very pleased with the opportunity to the treatment they received at home. However, there are some weaknesses that need improvement. .

Mellan säkerhet och mänskliga rättigheter : en studie av den svenska officiella migrationsdiskursen

This paper focuses on the Swedish migration discourse and investigates if and to what extent it is dominated by a security perspective. Analysing a number of official texts and documents I want to show how the discourse describes migrants and what implications this carries with it for the migrants and for the Swedish migration politics. Through discourse analysis I have analysed whose security that is prioritised, the Swedish or the refugees, who is the refugee and the asylum seeker, and who is the illegal migrant in the Swedish official migration discourse. As a theoretical frame for the analysis I have used theories on migration and security. These include theories on the securitisation of politics, the globalisation and the creation of political identity from the nation state perspective and theories on the connection between migration and security.My results show that a security discourse is dominating the Swedish official migration discourse and is therefore defining our reality and the identities of refugees, asylum seekers and illegal migrants.

Är handdatorer säkra nog för hälso- och sjukvården?

The aim of this report is to discuss computer security in handheld computers and to find out the appropriate security level that must be implemented to be able to use handheld computers within the Swedish healthcare system. Most healthcare centers are using some kind of electronic journals for their patient´s data today, but there are still a number of clinics that are usingthe old paper-system. On a few places in Sweden the use of handheld computers at the clinics has already started, but in the United States the use of handheld computers in the medical area is already widespread and from this we can see a lot of different situations where it is useful and effective to work with handheld computers. The security demands on patient´s journals are high and regulated in both Swedish law and regulations from the National Swedish Board of Health and Welfare. The law does not have any substantial demands, but states that there should be an adequate security level based on the nature of the information and the costs.

Säkerhetsutvärdering certifikatserver i stället för aktiva kort

Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware.

Säkra kommunikationskanaler i en distribuerad heterogen miljö

The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a secure manner.

Container Security Initiative - En diskursanalys utifrån teorier om det il/legala

Container Security Initiative was launched in 2002 by the US Customs and Border Patrol in order to secure the global flow of containers destined for USA. This thesis attempts to analyze Container Security Initiative in relation to a possible future scenario made by the weapons industry where the state's global traderoutes are being subject to militarization. A development which is partly based on the threat posed by global illegal trade. The latter is discussed and defined based on current research made by Carolyn Nordstrom, Moíses Naím and theories on the cosmopolitan perspective made by Ulrich Beck. Strategy documents concerning Container Security Initiative are then analyzed in terms of discourse to try to say something about what the program indicates.

Säkerhetsklassificering av IT-system på Fläkt Woods AB

This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.

Människohandel som en säkerhetsfråga

The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.

Framtagning av en informationssäkerhetspolicy

This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.

Oregistrerad gemenskapsformgivning - Svaret på problemen med formskydd för modeprodukter?

In the year of 2002 a new council regulation on community designs was implemented. In the beginning of the essay the legal situtation before the implementation is investigated and part of the purpose is to evaluate if it constitutes a solution to the problems with protection of fashion designs that existed then. Because fashion designs more or less were excluded from protection during the period before the implementation the fashion business developed a habit of unauthorized reproduction. This attitude among the market players is a central point of the essay. The essay starts off with a review of the earlier lack of possibilities regarding the protection of fashion designs.

WLAN : Oskyddad och okontrollerad datakommunikation

This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.

<- Föregående sida 4 Nästa sida ->