Sökresultat:
1117 Uppsatser om Wireless router security - Sida 15 av 75
Från diskurs till praktik? En studie om säkerhetiseringen av irreguljär migration och dess konsekvenser
This thesis discusses the theory of securitization in relation to the issue of irregularmigration, from EU level to national level. By using discourse analysis, the purpose isto explore whether the discourse leads to practice when it comes to nationalimplementation of EU debates on return policy. The material used in this workconsists of policy documents regarding the Return Directive from the EuropeanCommission as well as the Reva Project in Swedish migration policy. The mainobjective of the Reva Project is to make the process of returning irregular immigrantsmore effective and it has been strongly criticized, both by media and public opinion.The conclusion of this case study is that even if the security rhetoric may appearstronger on the EU level, the main elements of the security discourse are stillportrayed in the implementation on the national level. Based on this analysis we canmake the presumption that discourse develops into practice in the case of returnpolicy in the EU-member state relation..
Val av destination och reklam : En studie om faktorer som påverkar val av destinationen
The purpose of this study was to examine the various influences and advertising in particular affecting travelers' choice of destination. Data collection was conducted through quantitative method in the form of a survey to identify how travelers choose a destination, and to what extent they are influenced by advertising. Interviewees were travelers who were in Stockholm's central station would be passed on to Arlanda. The results from this study indicate that underlying factors such as economy, security, seasonal and service in place. The results also show that advertising is an important factor in selecting the destination.
Bluetooth and security
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är.
Ungdomars medvetenhet om säkerhetsrisker med bankverktyg
According to Nosti (2012) banks target youths to find new customers by giving them special offers such as debit cards from a relatively early age. However, Moschis and Churchill (1979) point out that age can affect the level of knowledge in the consumer. Therefore, this essay focuses on youths as consumers. Specifically, youths? awareness of security risks in using bank tools such as debit cards or internet banks was studied.
Trygghetskänslan hos mammor som går på tidig hemgång efter förlossningen
Vårdtiden för mammor efter förlossningen har minskat markant de sista decennierna. Det är därför av vikt att undersöka hur nyblivna mammor upplever den första tiden efter de har fött barn. Syftet med studien var att undersöka känslan av trygghet som mammor, med tidig hemgång, kände under den första veckan efter förlossningen. Metod: Enkäten Parents Postnatal Sense of Security (PPSS) med 18 frågor plus tre tilläggsfrågor användes. Enkäten skickades till 100 nyförlösta svensktalande mammor med normala förlossningar och tidigt hemgång.
Mobil verksamhetsapplikation för Nationell patientöversikt : Implementation och automatiserad testning av mobil applikation
While the technological infrastructure that enables collaboration between municipalities, counties and private health care providers improves, so does the need for health-care providers to gain access to the right patient journal at the right time. For doctors, nurses and other health-care organization employees this goal is achieved by NPÖ, National Patient Summary. NPÖ effectively enables health-care records to be shared across organizational boundaries. This thesis is based on a demand by a mobile application that can give district nurses access to health-care records wherever they are.This thesis describes the development of a prototype of a mobile application aimed for NPÖ. This includes investigating a suitable mobile platform, investigating available card readers for reading electronic identification from SITHS cards and the ability to connect to external services such as NPÖ.
Telias 4G i Umeå
This report presents the results of the tests of data rate and signal strength that I have conducted. The tests have been performed in the municipality of Arvidsjaur, Sweden. The report also contains the conclusions I have drawn from the results as well as an introduction to radio and the technology used in the nets that have been testedThe equipment used is:LG G2 cellphone used to test Telias 3GHuawei b593s-22 3G/4G router used to test Tele2s 3G/4GMobile Broadband Gateway R-90 used to test Net1s CDMAThe data rate has been tested with bredbandskollen (www.bredbandskollen.se). The signal strength(RSSI) has been read in the configuration menu of the broadband routers as well as in the cellphone.The conclussions drawn:Net1s net appears to be more used compared to its capacity than the other netsTele2s net has a high and even data rate where it?s signal strength is sufficient.
Stuxnet-attacken mot Iran : Strukturell realism i informationsrevolutionens tidsålder
This study aims to explain the Stuxnet-attack against Iran in 2009-2010 by using the IR-theory of structural realism. By doing so the theory also faces the challenge of the impact of the information revolution on security and international relations. The structural realism that is at hand is that of Kenneth Waltz and his Theory of International Politics from 1979.The study reaches the conclusion that Waltzs focus on the structure of the international system and the distribution of capabilities applies well to the case of Stuxnet as a cyber attack. The creators of the sophisticated Stuxnet, USA and Israel, also indicates that when it comes to this certain aspect of the information revolution and IR, states seem to still be the main actor. Finally the character of one of the major features of the Stuxnet-attack; the internet, is shown to have an anarchic structure that fits well as an extension of the realist view of the international system..
Utvärdering av inomhuslokalisering med Bluetooth Low Energy
Wireless communication is becoming more common, a relatively new technology within the area is Bluetooth Low Energy. It?s been developed to be energy efficient and in regard to compatibility. Alongside the growth of wireless technology, scientists and companies are looking for new areas of use. One of these is localization, which means to determine the position of a moving device with the use of stationary devices, an example of this would be GPS.This report means to evaluate indoor localization using Bluetooth Low Energy and was made for Combitech AB in Jönköping.
En snygg fasad är inte allt : En studie om tillit och säkerhet inom svensk e-handel
Trust is the most important thing for a webshop. The consumers must be able to feel trust to choose to submit their personal information to a webshop. In this study we examine the impact that design has on the consumers trust and confidence. We study six consumers that are engaged in e-commerce in their everyday life. By allowing these participants to be presented with two different webshops, an assessement could be made in both how much design is affecting and also which parts of the design that leads to trust and lack of trust.
En fallstudie inom en organisation av Security Operations Center (SOC): Utmaningar och utforskning av Agil och Traditionell metodik : A Case Study in a Security Operations Center (SOC) Organization: Challenges and exploration of Agile and Traditional Meth
This study focuses on a specific organization of a Security Operations Center (SOC) as a case studyto first identify specific challenges related to the work process, preceding with identifying whichprinciples from various process models, such as agile and traditional methodologies from softwaredevelopment companies, can be implemented. Initially, the study presents relevant research on agile and traditional process models as well asresearch on SOC. Subsequently, six semi-structured interviews are planned and conducted withemployees within a specific SOC-type organization to identify the current work process and thechallenges affecting the organization?s work process. The results of this study indicate a description of the current work process in the organization aswell as a variety of challenges related to technical and organizational issues.
Mätning av mobila datanät i Arvidsjaur
This report presents the results of the tests of data rate and signal strength that I have conducted. The tests have been performed in the municipality of Arvidsjaur, Sweden. The report also contains the conclusions I have drawn from the results as well as an introduction to radio and the technology used in the nets that have been testedThe equipment used is:LG G2 cellphone used to test Telias 3GHuawei b593s-22 3G/4G router used to test Tele2s 3G/4GMobile Broadband Gateway R-90 used to test Net1s CDMAThe data rate has been tested with bredbandskollen (www.bredbandskollen.se). The signal strength(RSSI) has been read in the configuration menu of the broadband routers as well as in the cellphone.The conclussions drawn:Net1s net appears to be more used compared to its capacity than the other netsTele2s net has a high and even data rate where it?s signal strength is sufficient.
Safe retrieval of nutrients to improve food security
Safe retrieval of nutrients from human excreta to fertilize crops in order to gain adequate yields will increase food security and sustainability in agriculture areas with nutrient-poor fields. Safe and nutritious food will meet the dietary needs of the individual which promotes public health and the ability of an active life. Human excreta should be considered as a resource instead of being assumed as waste. Human faeces and urine is excellent fertilizers which may close the nutrient loop if utilized properly. However, sanitation of the excreta is required to prevent disease transmission by reducing the content of gastrointestinal pathogens such as bacteria, viruses and parasites.
The objective of this study was to in small scale evaluate the sanitation in a combined liquid compost and urea treatment by monitor the inactivation of bacteria and viruses at the combination three start temperatures, 45, 40 and 35 °C, and three additions of urea, 0.5, 0.75 and 1 % and reference, 0 % urea addition.
En kyrklig organisations informationssäkerhet : Policyimplementation och motivation till efterlevnad av policy
The following study is dedicated to investigate what kind of problems an organisation might stumble upon in the process of implementing a policy related to information security. Alongside investigating the eventual problems occurring in the implementation process of an organisation, the study also sets out to analyse how an organisation can motivate staff in order to follow the guidelines of a policy. The collection of empirical data was done using interviews. In order to seek answers to our research questions a theoretical background is presented that illustrate the need for information security after which motivational theories are applied to our collected data.To summarise the results of the study we find a gap of knowledge between the employees of the organisation. The organisational level of an employee together with the degree of participation in working with a policy seems connected to both the employee?s knowledge of a policy as well as how well the employee are motivated to learn about and follow the guidelines provided from a policy..
En insats för freden eller statsbudgeten? : Riksdagsdebatten kring försvarsbesluten 2000 och 2004
The purpose of this essay is to investigate what kind of motives where behind the long term decisions for the Swedish military defense in 2000 and 2004. This leads to the questions that the essay is meant to answer; 1. Were the motives behind the two decisions for the Swedish military defense of economic character or an adjustment of security and defense policy? 2. Was the parliament united in the two decisions and if they were not, why? 3.