Sök:

Sökresultat:

309 Uppsatser om Threats - Sida 5 av 21

"Kulturell nedrustning" En studie av forskningsbibliotekens hållning till Bibliotekshögskolan i Borås 1969-1978

In 1972 a national higher education for librarians was started. Up until then different categories of librarians got their education separately. The aim of this Master's thesis is to explore the attitude towards this new education for librarians. The study will concentrate on the attitude of the representatives from the research libraries. Researchlibraries had, until 1972, recruted their librarians amongst Ph.D-level scholars.

Varför engagera sig om man riskerar livet? : Motiv till fackligt deltagande hos kvinnor i Colombia

Why engage if it risks your life?Motives to participation in labour unions among women in ColombiaEssay in Political Science D-levelAuthor: Susanna SvenssonTutor: Hans LödénWhy do people choose to participate in politics when it is such a small chance that you actually make a change? Also political participation favours the collective and therefore you do not get any personal advantages for your contribution. Even more interesting is the question of why you participate when it puts yourself in a position of danger? Colombia is considered to be the most dangerous country to be a member of labour unions in and it would therefore be a context where it is unlikely to find participation. This study is based on thirteen qualitative interviews with Colombian female union members with the aim to understand why people engage in labour unions despite Threats of violence and other obstacles, when the most likely would be to abstain from action.

Threats and opportunities for the survival of the Yangtze finless porpoise

The Yangtze finless porpoise (Neophocaena phocaenoides asiaorientalis), is a small freshwater cetacean which has recently fallen dramatically in number. It is an endemic species for the Yangtze River and unless drastic action is taken, it risks the same fate as the now functionally extinct Yangtze river dolphin (Lipotes vexillifer). Threats to the porpoise are diverse but they have in common that they are caused by man. Development of the river has been made to supply a growing human population with food, hydropower, and to reduce the risk of flooding. These changes have resulted in a degraded habitat for the porpoise.

Riktlinjer för implementering av ISO 17799

An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new Threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field.

Varför snokar ni? : En motivanalys av regeringens val att presentera propositionen för en anpassad försvarsunderrättelseverksamhet

Since the 9/11-attacks several nations have been confronted with a new international threat, its nature traces back to the political- and religious- radical movements of the 20th century Cold War. Ever since, various states have been under threat by terrorist organizations around the world due to mainly participating in worldwide counter-terrorist interventions created by western alliances. In Sweden, amongst other countries, the state took security-precautions that would imply total control of information throughout the territorial borders. The assigned proposition was accepted by the Swedish parliament in June 18th 2008, after this date wild spread criticism was still in effect ever since the Swedish government first publicly announced the proposition in May 8th 2007. This study emphasizes on understanding why the Swedish government chose to present this proposition to parliament, in order to complete this task the study will present the motives and the alleged Threats that were the core of the proposition and its value-maximizing goal of creating a new surface for Swedish homeland security.

Det finns en hel karta av påverkansmetoder : Gymnasieelevers påtryckningar i betygssättningsprocessen

The setting of pupils' final grades in the Swedish upper secondary school system is the responsibility of their teachers and once grades are set, they are not open to appeal. This can be compared with the British system where an external, central examination board sets the final grades based on the result of externally marked examinations (A-levels). These grades are then open to appeal if it is felt that an injustice has been made.This research paper has been an investigation into how pupils in one Swedish upper secondary school attempt to influence their teachers in the grade-setting process and how these teachers are affected by these different methods. Five teachers in total were interviewed in a qualitative case study. The study has also taken up the controversial issue of how grades, which are set individually by thousands of teachers across the country, can be deemed to be fair and equivalent.The study revealed that pupils employ many different methods when trying to influence their teachers in the grade-setting process e.g.

En Survey av NFC och NFC-Protokoll med Fokus på Säkerhetsaspekterna

Near Field Communication (NFC) is a short range wireless communication technology that enables data exchange between devices. NFC is used in many different areas, from subway tickets to authentication systems. This paper presents possible security Threats to Near Field Communication and documented attacks that have been used to target various NFC protocols. Weaknesses in different NFC protocols will be presented and suggestions on how to counter certain weaknesses will be discussed. This survey will be valuable for companies interested in protecting their data when using or planning to use NFC systems..

Skogsvårdsentreprenörer i norra Norrland 2009 : företagsbeskrivning och analys av kompetensens betydelse för planteringsresultat

The number of silvicultural contractors has significantly increased in the last decades, and among its main clients are the forest companies. The purpose with this study was to describe the contractors that worked with planting in Norrbotten and Västerbotten in 2009 for Holmen Skog, Norra Skogsägarna, SCA Skog and Sveaskog and also examine if there was any correlation between the contractors? competence and the quality in the planting they achieved. A survey was made among 47 contractors with a questionnaire who performed planting for the forestry companies in 2009. 27 contractors answered the questionnaire and 4 representatives of these contracting companies took part in an extensive interview.

Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling

The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the Threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.

Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer

Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security Threats are revealed for the respective technologies. The Threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.

Säkerhetsstandard för ett mjukvarubaserat säkerhetselement

Researchers today anticipate that in the near future, the majority of the owners of a smartphone will use it as a wallet, i.e. for contactless payment. The technology that enables contactless payment today is ?Near Field Communication? (NFC), which is increasingly embedded in smartphones. Applications like mobile payment between a phone and a terminal use NFC.

Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer

Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security Threats are revealed for the respective technologies. The Threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.

DDoS : -Vad är det och går det att skydda sig?

This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of Threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks..

Människa ? Teknik ? Organisation ur ett utredningsperspektiv : En intervjustudie av medarbetare vid Statens haverikommission

Human - Technology - Organization (HTO) is a well-established, general unifying concept in the Swedish Accident Investigation Authority (SHK) that represents an approach, knowledge and use of various tools regarding interactions between people, technology and organizational factors. The HTO-perspective is well described in literature but there are few studies on how SHKs staff experiences working according to this method in their investigations. The aim of this study was therefore to describe their HTO-perspective, examine how it is used in the investigations at SHK and describe the investigators experience of working with the HTO-perspective as well as the method's usefulness compared to old methods in accident investigations. A literature study has been conducted in the areas of HTO, Theory of planned behavior (TPB) and safety culture. TPB and safety culture are described in this paper since they highlight the different aspects of a HTO-perspective.

Vem bryr sig? : Ett kommunikativt perspektiv på fusionen mellan Växjö Universitet och Högskolan i Kalmar

This essay takes the three models from Allison and Zelikow book Essence of decision and applies them on the Swedish defense system. After the cold war the Swedish defense system had to undergo changes to be a more modern defense and be able to defend Sweden against Threats. To also be able to cooperate with other countries in peacekeeping operations the Swedish defense had to be reorganized. The solution was to change direction from a defense system that was organized for invasion to instead be a movable defense ready for any challenge in Sweden or abroad. This reorganization will be analyzed according to the three different models..

<- Föregående sida 5 Nästa sida ->