
Sökresultat:
1365 Uppsatser om The UN Security Council - Sida 8 av 91
Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which
increases the need to stop and assess the risks against users? integrity when
integrating new technology in contemporary systems all the greater. We have
taken two technologies, Near Field Communication and Certified Wireless USB,
whose envisioned area of use is to be integrated into mobile phones, and
evaluated what security threats are revealed for the respective technologies.
The threats against security have been identified through research of the
standards and existing reports for each technology. Practical experiments have
not been conducted on account of us not having access to any equipment to run
such trials.
Att tyda tecknen -En alternativ syn på förändringarna av Japans säkerhetspolitik
Japan's foreign and security policy has seen some substantial changes as a result of events like the first Gulf war and 9/11th. This has been taken as proof, by some, that Japan is abandoning its antimilitaristic stance and pursuing a more traditional hard power role through military means. This essay aims to explore if these shifts have coincided with any substantial shifts away from antimilitarism, which has had a strong influence on the country's security policy since the end of WW2.To do this I use constructivist theory, specifically regarding the impact of norms and identities on states security policy and briefly look into the problem of actor designation. The thematic focus is on security policy, from a narrow perspective, and thus I examine areas like the input and output to the Japanese military and the actual applications of this force. State identity is used to explore the prevalence of nationalistic sentiments and support for anti militarism in the public opinion and the political elite.The result of this study points to the further relevance of constructivist theory and especially the application of norms and identity.
Politikers syn på den regionala nivån : En jämförande studie av Västra Götalandsregionen och Norrbottens läns landsting
This study investigates the concept of regionalism in the context of the Swedish middle-level political arena. The used method is qualitative theory and two cases are studied: Västra Götaland and Norrbottens läns landsting.The aim of the study is to see what the politicans think about Swedens regionalization process by compare the views of politicans that function in a region and in a county council. Do they have the same vision about what constitutes a region and which advantages do they see in working in a region or in a county council? Also dimensions about territorially and sectorial autonomy on the regional level, presented by King and Pierre are investigated in order to explain the different regionala organs functioning accordingly to these dimensions.The empirical material that have been analyzed is taken from 17 interviews, from government writings and reports from the SKL association, Sveriges Kommuner och Landsting, about the topic of regionalization and the effects and goals in Sweden.The conclusion of the material is that there is common opinion among the politicans about the goals of a region and also about which areas that can benefit the most from the perspective of beeing a region instead of a county council. When it comes to explaining the dimensions of territorially and sectorial autonomy the results have shown that the region has the most both territorially and sectorial autonomy, which is due to the regions rightfullness to taxation right, which is high in the region and ensured by a strong catchment area.
ISIT-modellen : Vägledning för att realisera en verksamhets informationssäkerhetsmål
The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.
Snabb och säker roaming i WLAN
This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market. The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative).
Förväntningar på Framtida Mobila Tjänster
Today?s society is very focused around technology and something that is very popular is the usage of mobile devices such as Smartphones or Tablet computers. One of the reasons why these devices are so popular, is because of the large amounts of services or ?apps? that they can provide for the user. They can do a lot of things that makes everyday living easier for the users.The focus of this study is to find out what kinds of mobile services the users of these devices are expecting and/or wishes to see in the future and what is required to be able to develop and use these services in a good way.We started of the study by searching for earlier studies on the same or similar subjects.
By the Secret Fashion Concil. Project No 1 - jewellery collection
The Secret Fashion Council blends spirituality with fashion, art and design. This jewellery collection shows the connections between parapsychology and quantum physics, based on the study of matter and energy, that everything in the universe is built of vibrations. Many believe psychics have the ability to sense this. By using the skills of a psychic, the Secret Fashion Council invites the wearer to have the jewellery ?read? and evaluated in a most special way, tracing the wearer?s spiritual past, present and future.
Staters förhållningssätt till Human Security i teori och praktik : En jämförande fallstudie om kriterierna för verkställighetshinder till Syrien hos Sveriges och Norges migrationsverk
Den här uppsatsen handlar om staters förhållningssätt till human security i teori och praktik. Syftet med uppsatsen har varit att undersöka om den kanadensiska definitionen av human security används som referensobjekt i policydokument från Norges och Sveriges nuvarande regeringar samt hos ländernas kriterier för verkställighetshinder av syriska medborgare. Uppsatsens metod är en jämförande fallstudie där verkställighetshinder och utvalda policydokument utgör analysenheterna. För att analysera dokument och ställningstaganden används kvalitativ textanalys.Fallstudien visar att båda länderna ser sig själva som föregångsländer inom human security, bland annat genom skapandet av strategier och handlingsplaner. Vidare visar studien att migrationsverken har olika tillvägagångsätt för verkställighetshinder till Syrien.
ISIT-modellen - Vägledning för att realisera en verksamhets informationssäkerhetsmål
The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to
realize their information security goals. In spite of this standard, studies
show flaws regarding information security in organizations. In particular flaws
regarding overall view, knowledge and clear roles and responsibilities have
been observed.
The ISIT (Information Security Integrated Three level) model and its
guidelines, developed in this thesis, help organizations to identify the
required processes and procedures as well as the logical process flow. The
thesis is based on theoretical studies and a case study within a multinational
company.
Telemedicin i Västerbottens läns landsting : Diffusion och kartläggning av telemedicin ur ett geografiskt perspektiv
Telemedicine is the use of information and communication technology to provide clinical health care at a distance. This approach is usually adopted to bridge the distance in rural settings, but it is also a method to meet demographical and economical challenges. Västerbotten, a sparsely populated county with an ageing population, is in leading edge when it comes to telemedicine. The purpose of this report was to examine the diffusion and the inventory of telemedicine in the county council of Västerbotten from a geographical perspective. To gain a deeper understanding of diffusion and inventory of telemedicine, my purpose was also to examine these processes from an international and national perspective.
Informationssa?kerhetsanalysers verksamhetsnytta : Utva?rdering och fo?rba?ttringsfo?rslag
The importance of good information security and safety grows larger and larger for each day in the information society of today. This concerns citizens, companies and public authorities. At the Swedish Transport Administration, the operation of an information security and safety process has evolved over the years to guarantee that the public authority can be trusted by its citizens, cooperating companies and other public authorities. This responsibility has been assigned to the Information Security and Safety Department (Informationssa?kerhetsavdelningen, ITsa?).In this thesis the aim is to review to what extent ITsa? achieves any business benefits for the Swedish Transport Administration, and to analyze, streamline and come up with solutions to improve their workflow.
Trygghet och säkerhet i offentlig stadsmiljö :
To thoroughly think with safety and security in mind is an important issue in planning of public city spaces. Spaces intended to be available to all inhabitants of a city should have a welcoming appearance. Unfortu-nately, this is not the situation in many pedestrian walkways, parks and such spaces, possibly due to lack in safety and security.
This master thesis intend to examine questions at this issue ? what makes you feel safe and what causes insecurity in public city spaces. The safety aspect treats the human psychological and sociological ways of perceiving her milieu and other humans in it, and how the physical shape of her surroundings can affect the sense of safety.
Vad förvaltningen bör sträva efter : -riksdagspartiernas uppfattningar om de värden som förknippas med förvaltningen
The values politicians relate with public administration are likely to affect the way that they want the public administration to be organised. The purpose of this study is therefore to examine which values Swedish parliamentary parties relate with public administration and more particularly how they emphasise these values.The study is conducted as an analysis of theoretically relevant bills that the government party and the parliamentary parties have introduced to the Riksdag, and reports and statements of opinion from the parliamentary committees. The documents are from the Riksdag´s sessions from 2000/01 to 2005/06. After examining the documents the conclusion can be drawn that the value that is most emphasised during the period is legal security. This might mean that legal security will have more influence on the decisions taken about the organisation of Swedish public administration..
IT - Bubblan och CAPM
The aim with this independent degree project of master thesis is to find what the user opinions of the intranet in a county council is. The paper seeks how the question about how the culture in the organisation was affected by the use of the intranet. An important part is to explore the expectations and acceptance of the intranet and get a picture of which functions and services support day-to-day work with good quality. One goal is to find out how the intranet users feel that the communication, information and usability can be developed.The focus group interview is a qualitative method that has been applied for gathering data from the respondents, who participate in the investigation from the county council. The used method is unstructured focus groups containing the three dominating categories of staff in the county council.
Den levande policyn
In today's changing environment, an increasing number of companies are realizing thebenefits of analyzing business information and thereby stay competitive. By making use ofdecision support systems, known as Business Intelligence (BI), organizations are expected tocollect and process business data and thus get more out of their business.Nowadays it is not enough for organizations to have access to corporate data inside officewalls, they must also be able to bring the information "on the go", which has been thefoundation for the progress of mobile BI solutions. As the mobility increases and thecorporate data leaves the office, new risks arise, which is one reason as to why manycompanies hesitate at the idea of introducing mobile BI solutions.In this paper we explore two security aspects in the area of mobile BI solutions. Our researchquestion is as follows: How does security aspects affect a company's decision to acquiremobile BI solutions? The survey was conducted through interviews in cooperation with thefirm Optivasys, exclusively dedicated to the BI solution QlikView.A significant part of the theory we studied describes security as critical; however, ourresearch suggests a solution on how companies can manage the security aspects.