Sökresultat:
309 Uppsatser om Threats - Sida 4 av 21
Hot och våld på arbetsplatser inom vården - En kvalitativ intervjustudie om arbetsgivarens ansvar vid förebyggande och inträffande av en hot- och våldsituation på arbetsplatsen samt hur personalen påverkas av dessa situationer ur ett genusperspektiv
Folkhälsovetenskapligt program.
Restenos efter PC1 (ballongvidgning i hjärtats kranskärl): Upplevelser ur ett patientperspektiv
Background: The intention of this study was to clarify the patients perspective of what it means to suffer fiom documented restenosis after one or more Percutaneous Coronary Intervention (PCI). Aim: The aim of this qualitative study was to ascertain the patients experience of restenosis. Method: Nine patients were interviewed. They had undergone at least one PC1 and two had also undergone Coronary Arterio Bypass Grafting (CABG). Data collection and analysis were done simultaneously according to Grounded Theory methodology and were continued until new interviews provided no additional information, i.e saturation was met.
Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas
Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.
Psykiska övergrepp inom äldrevården
Background: Physological abuse consists of Threats, harassment, humiliation, telling off, refuse to talk, social isolation, abandonment as well as attitudes that lead to a feeling of insecurity and desperation. Institutional elder abuse is very elusive and an overall picture is still considered missing.Aim: The purpose of this essay was to review psychological abuse within the elderly care.Method: This essay is based on a literature study with systematic search.Result: This article review led to main categories and the result of the study is presented after these. The first ones gives a picture of the kind of psychological abuse that occured within the the elderly care. The second one deals with the possible explanations for psychological abuse within elderly care. The result showed that verbal assault was the most common form of psychological abuse against elderly.
Mjölkkors välbefinnande i AMS och konventionell lösdrift : skillnader i beteende och hormonstatus för oxytosin och kortisol mellan kor av hög och låg social rang
The purpose with this study was to investigate how the behaviour and physiological parameters differ between high ranked and low ranked cows, and between cows in an automatic milking system verses conventional milking parlour. The study was carried out at the Kungsängen research Centre, Department of animal nutrition an management, Swedish University of Agriculture Sciences, Uppsala. Twelve cows, the six highest and the six lowest in social rank were selected from the automatic milking system for the experiment. Ten cows, the five highest and five lowest in social rank were selected from the conventional system. Blood samples were taken during milking and resting.
Säkerhetsklassificering av IT-system på Fläkt Woods AB
This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the Threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.
Informationskrigföring : den nya teknikens hot
The new information society has revolutionised almost the entire world. But the new technique does not only bring good. That which was before only available on paper may today only be available on a computer system. This makes it possible to send data electronically. In the wrong hands that information can become a threat against the security of an individual, a company or even a nation.
Ungdomsanpassad myndighetskommunikation. En jämförande textanalys av Kronofogdemyndighetens texter som riktar sig till allmänheten och ungdomar.
The aim of this thesis is to contribute to a better understanding of the FRA-law. The focus of the study is to examine how Swedish politicians relate to the new draft of this law on intelligence. Key themes in the study are security, Threats, surveillance and privacy. The power relationship between the individual and the state is also examined. Empirical data used in this study consists of a spoken plenary debate in the House which was held in connection with the adoption of the FRA law in June 2008.
Mer säkerhet och mindre frihet med risk att förlora dem båda: En kritisk diskursanalys av lagförslaget till FRA-lagen
The aim of this thesis is to contribute to a better understanding of the FRA-law. The focus of the study is to examine how Swedish politicians relate to the new draft of this law on intelligence. Key themes in the study are security, Threats, surveillance and privacy. The power relationship between the individual and the state is also examined. Empirical data used in this study consists of a spoken plenary debate in the House which was held in connection with the adoption of the FRA law in June 2008.
Hembudsklausuler i aktieägaravtal
Since the 9/11-attacks several nations have been confronted with a new international threat, its nature traces back to the political- and religious- radical movements of the 20th century Cold War. Ever since, various states have been under threat by terrorist organizations around the world due to mainly participating in worldwide counter-terrorist interventions created by western alliances. In Sweden, amongst other countries, the state took security-precautions that would imply total control of information throughout the territorial borders. The assigned proposition was accepted by the Swedish parliament in June 18th 2008, after this date wild spread criticism was still in effect ever since the Swedish government first publicly announced the proposition in May 8th 2007. This study emphasizes on understanding why the Swedish government chose to present this proposition to parliament, in order to complete this task the study will present the motives and the alleged Threats that were the core of the proposition and its value-maximizing goal of creating a new surface for Swedish homeland security.
Ensamkommande flickors migration : En komparativ analys av Afghanistan och Somalia
Sweden is the country in Europe that receives most applicants from asylum seeking unaccompanied children. The majority of all unaccompanied children are boys and the two biggest sending countries are Afghanistan and Somalia. There is however a big difference between the proportion of unaccompanied girls between the two countries, Somalia with a big proportion of girls and Afghanistan with a low proportion of girls. Previous research has shown that there is a big knowledge gap about unaccompanied girls? migration.
Europas gräns under en säkerhetspolitisk förändring? : En fallstudie om säkerhetspolitiken vid den europeiska gränsen mellan 2007 och 2010 samt en prövning av Köpenhamnsskolans säkerhetiseringsteori
The purpose of the essay is both to bring forward the Threats images, sectors, actors and referents that can be found at the European border between 2007-2010 and to explore whether they change during this period. Furthermore, the essay also intends to review the Copenhagen School?s theory of securitization. The analysis of the essay will be done on the European commission?s ?Enlargement Strategy and Main Challenges?, a rapport that focus on the European border and its enlargement.
Informationskrigföring - den nya teknikens hot
The new information society has revolutionised almost the entire world. But the
new technique does not only bring good. That which was before only available on
paper may today only be available on a computer system. This makes it possible
to send data electronically. In the wrong hands that information can become a
threat against the security of an individual, a company or even a nation.
The possibility to protect oneself against attacks from the outside becomes
increasingly difficult.
ETT GEMENSAMT EUROPEISKT F?RSVAR? En kvantitativ analys av attityder till gemensam s?kerhets- och f?rsvarspolitik i EU
Given the current geopolitical situation in Europe and the upcoming election for the European
Parliament, it is important to further analyse individuals? attitudes towards European
integration, specifically the Common Security and Defence Policy (CSDP). This analysis aims
to gain a deeper understanding of individuals attitude towards CSDP. Therefore, the objective
of this study is to analyse which factors that plays a leading role in influencing individuals?
attitude towards CSDP.
Framtagning av en informationssäkerhetspolicy
This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different Threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which Threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.