
Sökresultat:
1365 Uppsatser om The UN Security Council - Sida 9 av 91
peer2peer - hur dyrt är gratis?
Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas
med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas
spyware alternativt adware, misstänks för att samla in personlig information,
så som e-mailadresser och lösenord. Det föreligger en risk att informationen
sedan säljs vidare eller används för att exempelvis rikta reklam....
Den europeiska arresteringsordern : ett rättssäkert förfarande?
The European union started as an area of economic cooperation, but has developed into an area of cooperation in many legal fields. There are these days even cooperation when it comes to dealing with criminals. There is a new procedure called the European arrest warrant which goal is to make the extradition of criminals between the different member states in the European union more efficient. Sometimes when a state receives a European arrest warrant they have to extradite the person in question without doing any investigation of their own. The procedure is based on the principle of mutual recognition.
Bristfällig säkerhet inom trådlösa routrar med fokus på WPS
I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner..
Demokratisk rådgivning : En studie av inflytande hos pensionärsrådet och ungdomsfullmäktige i Karlstads kommun
The purpose of this study is to determine if and how municipal consultative entities through influence may affect the legitimacy of the Swedish democratic model. The study aims to do this through analysing the opportunities for influence present with the Youth Council and the Council of the Retired in Karlstads municipality, to determine how the councils may affect political participation and the role of elected representatives. To do so, the study asks the following primary research question:"What requisites for influence are present for participants of municipal consultative entities, as found for the representatives of the youth and the retired within the framework of their participation in the Youth Council and the Council of the Retired in Karlstads municipality?"The study answers this research question by dividing it into one question of policy and one question of democratic perspective, and investigating these matters through nine snowballing interviews with the decision makers, organisational actors and participants of the councils. The information from the interviews is then analysed per council through a framework of democracy theory, policy process theory and organisation theory.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information.
Much of the information is confidential and should not be read by those not
privileged. To protect the information from unauthorized access cryptography
can be applied. The cryptography algorithms in use today all have their pros
and cons. They are therefore suited for different applications.
Får vårdpersonalen bästa tänkbara IT-stöd? : Kartläggning och analys av informationsflödet mellan EPJ systemförvaltning och vårdpersonal
In health care today at Uppsala County Council the daily work involves spending time at the computer. IT-systems were implemented to support and aid the care givers in their work. Around these systems there is a support organization to support the users in using the system. The aim of this thesis is to investigate this organization in terms of how well it works and how successful it is in helping the users. This has been done by investigating the flow of information trough the organization and by focusing at the role of IT-coordinators with responsibility for support, process development, education and statistics.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..
Kampen för ökad tillgänglighet : - om enskilda aktörer, policynätverk och förhandlingsarenor i utarbetandet av EU:s bussdirektiv
The Motor Group of the European Council was commissioned in the autumn of 1997 to prepare a proposal for a new European Bus and Coach Directive. In the beginning, most of the Member States did not have the accessibility requirements as their main concern; still a smaller network with actors from the National delegations from Britain, Germany and Sweden would influence the other National delegations in the Council group to finally agree to retain the requirement of accessibility of the Directive. Within the EU decision process, the European Disability movement acted as a strong player during the whole negotiation process using the proposal to a new Bus and Coach Directive as a tool to influence key actors to go towards a Directive with a strong approach for accessibility.Policy Transfer and Policy Transfer Network are used as analytical tools to understand and structure the transfer of the question of accessibility during the negotiation process. Actors understanding how the bureaucratic process works within the EU decision system have a chance to contributing for the changes in the directions they wishes for within a range of policy areas. The principal aim of the Directive was to guarantee the safety of passengers and to provide technical prescription in particular to wheelchair users.
Privilegierad mobilitet? : Flygplatser, resande och säkerhet
Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas
Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.
NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan
The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.
Skolbetygens roll i den sociala reproduktionen : Gymnasieelevers upplevelser av betyg och livschanser
The aim with this independent degree project of master thesis is to find what the user opinions of the intranet in a county council is. The paper seeks how the question about how the culture in the organisation was affected by the use of the intranet. An important part is to explore the expectations and acceptance of the intranet and get a picture of which functions and services support day-to-day work with good quality. One goal is to find out how the intranet users feel that the communication, information and usability can be developed.The focus group interview is a qualitative method that has been applied for gathering data from the respondents, who participate in the investigation from the county council. The used method is unstructured focus groups containing the three dominating categories of staff in the county council.
Säkerheten i trådlösa nätverk
The number of wireless networks has increased rapidly among both home users and companies in just a few years. That has brought a lot of good things with it, for example the possibility to connect wireless equipment to the network or Internet from an arbitrary position within range of the accesspoint. But since the transmissions take place through the air some new security risks appear. It?s difficult to restrict the signals to a specific space and thereby a lot easier for unauthorized to eavesdrop or disturb the signals compared to a traditional wired network.
USA:s officiella säkerhetsstrategi : Vad ligger bakom?
The purpose of this study is twofold: First, to inquire how the George W. Bush administration plans to keep America safe from external threats and second ? based on the assumption that neoconservatives have influenced the Bush administration ? examine how neoconservative ideas have influenced this strategy to protect America. The research questions are as follows:What is the content of the Bush administration?s security strategy?How are neoconservative ideas reflected in this security strategy?To answer the first question, the main points of two studied documents were summarized.