
Sökresultat:
1365 Uppsatser om The UN Security Council - Sida 5 av 91
Mobil verksamhetsapplikation för Nationell patientöversikt : Implementation och automatiserad testning av mobil applikation
While the technological infrastructure that enables collaboration between municipalities, counties and private health care providers improves, so does the need for health-care providers to gain access to the right patient journal at the right time. For doctors, nurses and other health-care organization employees this goal is achieved by NPÖ, National Patient Summary. NPÖ effectively enables health-care records to be shared across organizational boundaries. This thesis is based on a demand by a mobile application that can give district nurses access to health-care records wherever they are.This thesis describes the development of a prototype of a mobile application aimed for NPÖ. This includes investigating a suitable mobile platform, investigating available card readers for reading electronic identification from SITHS cards and the ability to connect to external services such as NPÖ.
Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling
The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.
Armlängdsprincipen och Statens kulturråd: En fallstudie om maktfördelning i svensk kulturpolitik
This Masters Thesis is about the Swedish National Council for Cultural Affairs and the arms length principle. The principle is used to explain the separation of power between two parts with a common interest. The main purpose is to elucidate if, and if so in what way, the arms length principle can be used to explain the relation between the National Council for Cultural Affairs and the Ministry of Education and Culture, i.e. the Swedish government, but also to examine the structures of power and relations within the Council. In the thesis we show that in the field of cultural policy the content of the arm lengths principle varies due to the many interpretations of the meaning.
Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv
The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.
Analys av datakommunikationssäkerhet för VoIP-protokoll
Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
Betalningssätt via webben : En studie om konsumenters ansedda kunskap angående olika betalningssätt via webben och deras säkerhet
The e-commerce in Sweden has increased each year for the past several years, but still just over half of all the consumers feels worry about payment security. This could be the reason why over half of the consumers just shopped about one time on the Internet during the whole year of 2009. Another reason could be that the many consumers have a lack of trust to the different payment methods that are available during payment on the Internet, because they might don't possess enough knowledge regarding the payment methods and their security. If the consumers were to gain more knowledge about the payment methods and their security, it may lead to that the they would feel more comfortable when shopping online, and do it more frequently. It is this that will be investigated in this paper.The purpose of the paper is to research if consumers believed knowledge concerning the different payment methods available on the web and their security influence the consumers trust in the payment methods.
Det etniska säkerhetsdilemmat-en idealtypsanalys över etniska konflikter
In the world after the Cold War, internal and ethnic conflicts have been predominant. Ethnic conflicts have their own theories on why they erupt and what can be done to solve them. This essay seeks to analyze how the Ethnic Security Dilemma can explain the causes, and possible solutions, of today´s armed ethnic conflicts.By making an ideal types typology over different types of ethnic conflicts, and then analyzing the Ethnic Security Dilemma´s impact on each conflict type.
Säkerhet i smarttelefoner : En jämförelsestudie mellan bärbara datorer och smarttelefoner i verksamheter
Smartphones have become more common as business tools within the workplace. With its many features and great flexibility, the smartphone has stormed the business world and become an alternative or complement to the laptop. As these mobile units' popularity has increased, the interest of businesses to invest in this new technology has increased, but has security kept up with the technology developments?This study aims to conduct a study to see if the companies in the IT industry have the same safety awareness for smart phones to laptops.The study shows that companies have greater safety awareness and higher safety requirements for laptops than smartphones. Meanwhile, both end-users and management are well aware of the risks and threats that the smartphone is facing..
Resolution 1325, lidandet i Liberia och kvinnors rättigheter
AbstractBetween 1989-1996 and 2000-2003 a civil war took place in Liberia. During the war many, many people were killed or were forced to flee. Another of the war's characteristics was the high number of women being sexually abused and beaten by the soldiers. The aim of this thesis is to analyze to what degree the peacekeeping personnel in Liberia, foremost staff working for the UN and agencies related to the UN, have implemented Resolution 1325 in their work. Resolution 1325 was adopted by the members of the United Nations Security Council in year 2000 and aims to increase the efforts made to secure women's rights and security in parts of the world where war and crisis prevail.
Vilken betydelse har ett filialbibliotek? exempel Högsby
The purpose of the present thesis is to investigate the interaction between the branches in the different villages and its users and the importance of the branches for democracy. To illustrate these points, I have focused on Högsby municipality, a local council in Kalmar county. Högsby municipality is of particular interest in this connection, since all seven of the branches have been closed recently; only the main library remains. Moreover, three of the closed branches were, in 2005, taken over by citizen organizations local to the part of Högsby municipality where the libraries were located. The specific issues that were addressed were:- What needs were satisfied by the local libraries in Högsby council and is it possible to satisfy these needs in other ways and then, how?- Does the absence of a local library affect democracy?Interviews were performed.
Och på den heliga Anden - Angående skillnaderna i N och NC och deras orsaker
In this essay I set out to investigate the differences between the creed that was formulated at the council of Nicaea (325 A.D) and the creed that was produced at the council of Constantinopel (381 A.D). The majority of the differences are caused by the fact that the second of the two creeds isn?t based on the the first in text although it?s producerers thought of it as a confirmation of the first with an elaborated theology about the Spirit. This theological elaboration was made in accordance to the theology of the holy Spirit developed by the Capadocian theologians..
Riskhanteringens utmaning : En studie som identifierar svenska organisationers riskhantering avseende informationssäkerhet samt dess prioritering.
Background: Risk Management plays an important part of the enterprises strategic business activity. Efficient Risk Management will secure the businesses survival, assets and creates market advantages. The interest of information security has consequently gained in Swedish corporations. Corporations have realized the importance of the information which is stored in the IT systems. IT is the tool for businesses future progress and growth and therefore a source of risks.
Säkerhetspolitik, Medborgare & Frihet
The terror attack in New York year 2001 was a turning point in international politics. New policies were reformed in both USA and EU to secure their citizens from terrorism. The power of the institutions has developed and the question is; how does the new security policy affect people?s freedom? Is it the agencies new policies that are restricting the freedom or the actions of a terrorist? The purpose of this study is to examine if the security policies in USA and EU are protecting their citizen?s freedom. Many individuals are not aware of how much the security policies are affecting their lives.
Informationssäkerhet i arkitekturbeskrivningar : En studie i hur säkerhetsfunktioner kan beskrivas med hjälp av vyer
Information security is an essential part of all information systems; especially in large organizations and companies dealing with classified material. Every large information system has an architecture that includes many parts that together form an Enterprise Architecture. The aim of this thesis is to study how to describe several security functions in an Enterprise Architecture and also how to ensure accountability between requirements and the implementation of the security functions. The description is for stakeholders on a conceptual level rather than a technical level. The study has been carried out by comparing the theoretical framework that has been formed by a study of the literature, and the empirical framework that has been formed by a group discussion and interviews with Information Security Consultants from Combitech AB.