Sök:

Sökresultat:

2862 Uppsatser om Threat to international peace and security - Sida 6 av 191

Lika makter leka lika? Sanktioner eller dialog, varför skiljer sig USA respektive EU handlingsplaner från varandra angående Irans kärnvapen?

In this thesis I will discuss how US respectively EU general international security policies are formed with the scientific theories Rational Choice and Cognitive theory in mind. I?ll discuss how come US tends to go towards a more sanction orientated strategy while European Union seems to prefer a dialog and diplomatic problem solving strategy. I?ll exemplify respective security strategy through the qualitative cases study of Iran and analyse why they have taken different cores of action while trying to solve the problem with Iran's alleged nuclear weapon.

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Demokratisering utifrån- En fallstudie om demokratiseringsprocessen i etniskt splittrade Bosnien Hercegovina

After the fall of communism in Yugoslavia the ethnic resentment grew stronger and escalated in to interethnic civil conflict in 1992. After international intervention the General Framework Agreement for Peace (GFAP) installed peace in 1995. The treaty's aim was not only to establish peace but also to institute democracy in Bosnia. The OSCE were given the task to implement democracy within political institutions and civil society. This in a country with a lack of democratic experience and where great problems with ethnic antagonism still exists.By using democratization and transition theory this single case-study examines how democracy is implemented in Bosnia by the OSCE and clarifies difficulties that this democratization process is facing.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Trygghet och trygghetsskapande i arbetslivet

In this paper we examine what security is to the individual and how the individual creates and maintains security in their work. The purpose of this paper is to study how the creating of security in working life is performed. We conduct six semi-structured qualitative interviews with permanent employees in the private sector and we encode our material using thematic analysis. We analyze our material and illustrate our problem area on the basis of Anthony Giddens's theory of ontological security and give examples of how security and creating of security is performed at the empirical field with previous studies in the research area. Our survey shows that security for the individual at work seems to be about having continuity in everyday life, financial stability, a permanent employment, a challenging and fun job and a family in good health and good living.

En förändrad socialdemokratisk utrikespolitik? : En motivanalys av socialdemokratiska ställningstaganden gällande försvarsavtalet med Saudiarabien mellan år 2005 till år 2015. 

In 2005 the Swedish social democratic government settled a defense treaty with Saudi Arabia. Ten years later, a new Social democratic government ends the treaty. This thesis will study the Social democratic party?s motives behind their actions regarding the treaty. Kjell Goldmanns theory regarding the three fields of interest concerning state?s foreign policy, security policy, economy and international values, will serve as the theory and operationalization of this thesis.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Veto: En motivanalys av FN:s säkerhetsråds fem permanenta medlemmars agerande i konflikten i Syrien.

Aim: The aim of this study is to analyse the possible motives behind the actions of the five permanent members of the UN Security Council in relation to the conflict in Syria. The background of this aim is the Arab Spring and the protests and violence that have followed the uprising. While, in Libya, the UN Security Council adopted resolutions that allowed sanctions against the Libyan government, no such resolutions have been adopted yet in Syria.Theory: The principal theory of the analysis is Stephen D. Krasner´s theory on sovereignty.Method: I have researched various resolutions and statements done in the Security Council, together with official statements from the actors, through Hadenius´ motive analysis methodology and Gilje & Grimen and Ödmans theories on hermeneutics.Conclusion: The conclusion of the analysis is that there, in the case of Syria and Libya, are two different parties in the Security Council. One that stands for sovereignty and one that stands for intervention.

Testprogram till hårdvara på en viktindikator

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

"Jag tycker nog att jag bor på Araby, det är nog alla andra som tycker att jag inte gör det." : - En kvalitativ studie om hur distinktioner påverkar tryggheten

This thesis suggests an explanation for how it is possible for individuals living in an unsafe neighborhood to expressa highlevel of security. Araby is the district in Växjö municipality withthe highest level of insecurity. Within the district, there is acategory of individuals in security-measurements showing a high degree of security. Inhabitants living in house in Araby also seem to show a higher level of security than inhabitants in the same accommodation in other neighborhoods in the municipality.The study's purpose is to understand how individuals belonging to an unsafe neighborhood can experience a high degree of security.Qualitative data were collected from an observation in Araby and from interviews with individuals living in house in the district.Previous research has shown that security in the surrounding area depends on several factors, such as disorders, the degree of social control and personal opinions. Thestudy shows how a distinction to places and people in the district can explain the degree of security.

Synen på Säkerhet och Immigration : Finns det ett samband?

The aim of this study is to explore howEuropean changes in the view on securityrelates to the view on immigration and viceversa. The answer to that question is basedupon collected data from three separatetime periods; the 1950s, 1970s and 1990s.These time periods are seen as importanthistoric decades when political changes,assumed to have affected the views onsecurity and immigration, have occurred.According to certain criteria each timeperiod has been labelled in terms ofnarrowed/widened view on security as wellas restrictive/open view on immigration.The hypothesis of the study is that, whencompared, a constant pattern can be seenbetween the historical labels of eachphenomenon, where a narrow view onsecurity goes hand in hand with an openview on immigration and similarly a widesecurity view relates to a restrictive viewon immigration.The conclusion of the study gives supportto the hypothesis. During all three periodsstudied a restrictive view on immigrationrelates to a wider view on security while anopen view on immigration relates to anarrower view on security. Thisrelationship goes both ways..

Kongokrisen FN-insatsen 1960-1964 i analys

Vi har gjort en utvärdering av FN:s insatser i Kongo 1960-1964. Vi har analyseratutifrån en konflikthanteringsmodell som vi har hämtat ur Contemporary ConflictResolution av bland annat Oliver Ramsbotham. I denna modell är peacekeepingoch peace enforcement centrala inslag. Med dessa begrepp åsyftas fredsbevaranderespektive fredsframtvingande åtgärder för att nå fred eller förhindra krig.Resultatet av vår analys är att delar av insatsen var framgångsrik, däriblandpeace enforcement. Långsiktliga åtgärder för fred saknades dock, vilket ledde tillatt våldsamheterna åter tilläts blossa upp när FN lämnade landet.Resultatet av vårt arbete kan användas för att visa på att peace enforcementhar använts och kan vara en framgångsrik metod för FN i framtida situationer..

Europas gräns under en säkerhetspolitisk förändring? : En fallstudie om säkerhetspolitiken vid den europeiska gränsen mellan 2007 och 2010 samt en prövning av Köpenhamnsskolans säkerhetiseringsteori

The purpose of the essay is both to bring forward the threats images, sectors, actors and referents that can be found at the European border between 2007-2010 and to explore whether they change during this period. Furthermore, the essay also intends to review the Copenhagen School?s theory of securitization. The analysis of the essay will be done on the European commission?s ?Enlargement Strategy and Main Challenges?, a rapport that focus on the European border and its enlargement.

Inkludering eller Exkludering? Hantering av Spoilerproblematik vid Förhandlingsprocesser.

A great source of risk during peace processes of today comes from spoilers, individuals and groups who deliberately try to undermine every attempt to achieve a negotiated peace agreement. The aim of the thesis is to examine problems related to the management of spoilers during peace negotiations and the effects thereof. A central aspect in this respect is the dilemma of whether to include or exclude controversial actors like spoilers at negotiations.The choice of limits of the subject is to examine the peace negotiations that resulted in ?The Agreement? in 1998, concerning the conflict in Northern Ireland, and in ?DOP? in 1993, concerning the conflict between Israel and Palestine. I find a significant difference between these two conflicts regarding the way of managing spoilers.

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

<- Föregående sida 6 Nästa sida ->