Sökresultat:
1096 Uppsatser om Wireless security - Sida 15 av 74
Konsekvenser av oplanerade verksamhetsavbrott orsakat av fel på medicinteknisk utrustning : En studie inom Länssjukhuset i Kalmar med fokus på drift, säkerhet och kvalitet
Title:The issue of unplanned stoppages caused by failure in medical technology equipment ? A study within the hospital of Kalmar with a focus on manage-ment, security and quality Author:Anna Förster, Ambika Linder, Sandra Nyqvist Tutor:Thomas Karlsson Institution:Linnaeus School of Business and Economics - Linnaeus University Kalmar Date:2011-01-14 Purpose:The purpose of this study was to examine unplanned stoppages caused by medical technology equipment failure in the healthcare operation within the hospital of Kalmar. Our study is based on a number of specifically selected incidents which show the consequences these disruptions cause in management, security and quality within the operation. Our intention was also to examine what role the medical technology department of the hospital plays in the care production operation during these unplanned stoppages. Method:Through a qualitative study we have generated material from a number of interviews with staff working in the hospital of Kalmar.
FEMINISTISK SÄKERHET EN FÅFALLSTUDIE I FN:S BEAKTANDE AV FEMINIST SECURITY THEORY'S KRITIK I FREDSBEVARANDE OPERATIONER
Den tilltagande betydelsen av att skydda civilbefolkningen i fredsbevarande operationer har genomgått en påtaglig utveckling, följt av delade meningar om vad säkerhet innebär. Jag framhåller att utvecklingen skall förstås som specifikt problematisk i den meningen att kvinnor har blivit alltmer utsatta i konflikter, vilket samtidigt beskrivs som ett understuderat förhållande inom forskningsområdet. Med utgångspunkt i Feminist Security Theory syftar den här uppsatsen till att studera förekomsten av ett feministiskt perspektiv i internationell säkerhetspolitik. I samband med antagandet av UNSCR 1325 om kvinnor, fred och säkerhet år 2000 beskrevs för första gången kvinnorsställning i konflikter i form av en säkerhetsfråga och därmed inte längre enbart inkluderat i FN:s mänskliga rättigheter. Således bereddes utrymmeför nya möjligheter att hantera säkerhetsutmaningar på.
Riktlinjer för yttre hot - En inblick i riktlinjer angående yttre hot för Karlskrona kommun
Målet med detta arbete är att bättre förstå hur riktlinjer ska skapas och
användas. Utgångspunkten har varit att media uppmärksammat ett flertal
incidenter där främmande människor tog oönskad kontakt med olika förskolor i
Karlskronaområdet. Författarna ville då se över hur kommunen arbetade med
frågor om yttre hot vilket medförde att arbetet utmynnade i ett försök om att
bättre försöka få förståelse för riktlinjer och dess användning då kommunen vid
arbetets start saknade riktlinjer för yttre hot av denna typ. Metoden som
använts är av kvalitativ art i form av intervjuer med några säkerhetsansvariga
för förskolor i andra svenska kommuner. Resultatet av dessa intervjuer
tillsammans med kompletterande material från generella tillvägagångssätt för
identifikation och analys av säkerhetsproblem resulterade i ett förslag på
arbetsmetoden vid skapandet av riktlinjer samt en påminnelse om att se över
befintliga riktlinjer för yttre hot..
Retentionsr?tt och Legal Pantr?tt: Tv? Rigida Begrepp i ett Flexibelt R?ttssystem? En studie om hur retentionsr?tt och legal pantr?tt kan hanteras med hj?lp av ett funktionalistiskt angreppss?tt
Possessory liens and legal liens are two securities that has been the subject of debate from legal scholars for quite some time. Possessory liens are often viewed as a weaker security compared to legal liens. However, upon closer examination it turns out that possessory liens in most cases provide the the same opportunity to sell the property withheld as security. This possibility makes possessory liens resemble, if not be identical to, legal liens. Both securities arise by operation of law and grant the right to both withhold and sell property in the event of non-payment.
Distriktssköterskors dokumentation i omvårdnadsjournal vid telefonrådgivning.
The aim of the study was to describe what district nurses, who work with telephone- advice, document in patient record, to be able to develop their documentation. The Authors have examined 50 patient records. The examination tool is collected from ?Lokal anvisning för hälso- och sjukvården I Södra Älvsborg?. The audit areas was record keeping, review and planning, realization, individual nursing and the patients participation, information, education and agreement.
Fredsengagemang i en os?ker tid: En studie av hur svenska fredsaktivister navigerat sitt fredsengagemang sedan Rysslands fullskaliga invasion av Ukraina
This case study examines how individuals involved in the Swedish peace movement have navigated their peace activism due to the intensified security debate which followed Russia?s full-scale invasion of Ukraine in February 2022. By conducting semi-structured interviews with peace activists involved in the Swedish peace organization Svenska freds- och Skiljedomsf?reningen, the study aims to provide insight into how peace activists, and the peace movement as a whole, can be affected when the security debate intensifies. By applying a theoretical framework consisting of Political Process Theory (PPT) and Discursive Opportunity Structure (DOS), as well as previous studies and literature on social movement organizations and peace movements, the study?s objective is also to apply context to the observations made by the peace activists in the study.
"Att föräldrarna får vara sig själva är den stora vinsten" : en studie med betoning på den kortare inskolningsmodellen i förskolan
I have examined acclimatization models in pre-school. My emphasis is on the shorter acclimatization models. To begin pre-school is a big change, not only for small children, for the whole family as well. It is important to get a good acclimatization in pre-school, and one of the things it takes to achieve that is to interact with the parents. The reason why I chose this subject was because we have not studied much literature about this subject during our education to become pre-school teachers.
Riktlinjer för implementering av ISO 17799
An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field.
Emwiro Trådlös Kommunikationsmodul : "An embedded, intelligent and wireless relay module"
Projektet syftar till att utveckla en kommunikationsmodul till ett trådlöst larmsystem.Kommuikationsmodulen integrerar ett inbyggt system som kommunicerar via en radiomodulutvecklad av företaget Emwitech AB. Kommunikationsmodulen har som uppgift att styra externadetektorer och periferienheter. Utvecklingen av hårdvaran har skett i Altium Designer vilket harresulterat i en prototyp. Prototypen inkluderar avancerad teknik såsom programmerbar logik ochmikroprocessorer. Mjukvaran utgör intelligensen i systemet och ansvarar för att larmsystemetarbetar enligt de standarder som finns för hög säkerhet.En utredning med avsikt att välja kärnan i systemet har utförts och ett flertal aktuella teknologierhar analyserats och vägts mot varandra..
Gaussiska heltal
This project investigated the current market regarding wireless net and the communication between the tools used for diagnostics/maintenance and an embedded system. Based on documentation obtained through interviews a demo system was created based on Bluetooth Low Energy (BLE) communication between an embedded system and an Android device.This report intends to describe the tools and methods used in the design of the demo system and the result of an analysis of the BLE communication.Bluetooth Low Energy is an exciting protocol with wide applicability within the industrial field. This project investigated the communicational possibilities between a Smartphone and a Raspberry Pi and based on the results that emerged the conclusion can be drawn that BLE is a protocol with many beneficial applications within industrial IT..
Tryggare kan ingen vara? En studie om den danska flexicurity-modellens lämplighet för Sverige
This paper discuss the possibilities to transfer the Danish labour market policy, called flexicurity, to Sweden. There are two main purposes of this essay. The first purpose is to discuss the reasons why the Danish labour market policy could be interesting for Sweden. The second purpose is to investigate which obstacles that might occur during the transfer. For guidance I have used two startingpoints which highlights the Danish flexicurity's pros and cons.
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
Trådlös energiöverföring via elektromagnetisk induktion
This paper describes a method for wireless energy transfer via near-field electromagnetic inductionthat is inexpensive, simple and can be applied to almost any type of system, regardless of size andenergy demands.The method uses a primary unit consisting of an oscillator, amplifier and inductive coil thattransfers energy to a secondary unit consisting of a coil, rectifier and voltage regulator. Two typesof oscillators and several amplifier designs were realized and evaluated together with a multitudeof flat coils of both monofilar and bifilar type.The results show that it is important to use an oscillator whose frequency is dependent on theinductance of the connected transmission coil, such as the Colpitts oscillator. This is preferable toan oscillator with a preset frequency, such as a Schmitt-trigger oscillator..
Stadsdelsförnyelse i Norra Björksätra, Sandviken
The housing estates in the outskirts of Sandviken, consist of relatively large scale apartment buildings. This report, that is a B.A. thesis at 10 Swedish university points, aims to investigate and describe the opportunities to improve safety and security for inhabitants in Norra Björksätra. The purpose with this report is to make Norra Björksätra to a more attractive place to live in, by changing the negative trends in the area. Since demolition of at least some of the houses could be of current interest in some years; the purpose is also to investigate whether demolition or renewal of the area is the best solution.
Dolt i det öppna
Communication is a part of everyday life. The more sensitive information we handle, the more interesting the question around security of your information becomes. There are two ways of handling security around the information you want to communicate, either you control the means by which you are communicating. Or you control the way you communicate, making you able to use existing communication channels. Existing methods within cryptography enables two parties to communicate information securely.