• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 24
  • 10
  • Tagged with
  • 34
  • 27
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Design and evaluation of anonymity solutions for mobile networks /

Andersson, Christer, January 2007 (has links)
Diss. Karlstad : Karlstads universitet, 2008.
22

Visualising security through computer games : investigating game-based instruction in ICT security : an experimental approach /

Näckros, Kjell, January 2005 (has links)
Diss. Stockholm : Stockholms universitet, 2005.
23

Information security in distributed healthcare : exploring the needs for achieving patient safety and patient privacy /

Åhlfeldt, Rose-Mharie, January 2008 (has links)
Diss. (sammanfattning) Stockholm : Stockholms universitet, 2008.
24

Säkerhetsklassificering av IT-system på Fläkt Woods AB

Bustos, Sebastian, Grek, Niklas January 2006 (has links)
<p>This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:</p><p>• What defines a secure system and how does the company relate to these factors?</p><p>• What are the threats today based on hardware/software, human factors and company routines/policies?</p><p>• What measures should be taken for the organisation to reach a higher level of security for their systems?</p><p>• How do we develop a method for classification of security and what components should it contain?</p><p>• What changes are reasonable and necessary with the respect to the company’s resources?</p><p>The report has been done through interviews and analysis of existing systems on Fläkt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company’s needs, have been compiled to a document. It is a model for guidelines to work with security classification of IT-systems.</p><p>The combination of the method for information and the security classification has been clear through the work on the rapport. The method that has been developed for work with security classification of IT systems can therefore not be used as an isolated occurrence to reach the wanted results but should be integrated with the existing classification of information.</p><p>Our conclusions are reflected by the complexity of the project together with the fact that computer security is a topic that includes all parts in an IT- supported organisation. The analyses have given us a good picture of the threats to an organisation. It has clearly been shown, that much security related problems are based on direct organisational problems such as the lack of resources and requirements of system specific guidelines and policies.</p>
25

Identity and anonymity in ad hoc networks /

Martucci, Leonardo A., January 2009 (has links)
Diss. Karlstad : Karlstads universitet, 2009. / S. 167-188: References.
26

Stadsgemenskapens resurser och villkor : samhällssyn och välfärdsstrategier i Linköping 1600-1620 /

Sandén, Annika, January 2005 (has links)
Diss. Linköping : Linköpings universitet, 2005.
27

A socio-technical analysis of information systems security assurance : a case study for effective assurance /

Chaula, Job Asheri, January 2006 (has links)
Diss. Stockholm : Stockholms universitet, 2006.
28

Säkerhetsklassificering av IT-system på Fläkt Woods AB

Bustos, Sebastian, Grek, Niklas January 2006 (has links)
This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are: • What defines a secure system and how does the company relate to these factors? • What are the threats today based on hardware/software, human factors and company routines/policies? • What measures should be taken for the organisation to reach a higher level of security for their systems? • How do we develop a method for classification of security and what components should it contain? • What changes are reasonable and necessary with the respect to the company’s resources? The report has been done through interviews and analysis of existing systems on Fläkt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company’s needs, have been compiled to a document. It is a model for guidelines to work with security classification of IT-systems. The combination of the method for information and the security classification has been clear through the work on the rapport. The method that has been developed for work with security classification of IT systems can therefore not be used as an isolated occurrence to reach the wanted results but should be integrated with the existing classification of information. Our conclusions are reflected by the complexity of the project together with the fact that computer security is a topic that includes all parts in an IT- supported organisation. The analyses have given us a good picture of the threats to an organisation. It has clearly been shown, that much security related problems are based on direct organisational problems such as the lack of resources and requirements of system specific guidelines and policies.
29

KRG som regional säkerhetsskapande aktör. En litteraturstudie ur ett realistiskt perspektiv / KRG as a regional security creative performer. A literature from a realistic perspective.

Pawan, Mostafa January 2016 (has links)
Sammandrag Kurder är idag världens största befolkning, som beräknas vara mellan 40-45 miljoner i hela världen, som är utan en erkänd stat. Dock finns det ett geografiskt område, i sydvästra Asien, som kallas för Kurdistan av alla kurder och är moderlandet för kurderna. I dagens läge är södra Kurdistan, norra Irak, den enda delen av Kurdistan som har en självständig region och är känd som KRG, Kurdistans regionala regering, och som den här studien kommer att fokusera på. Politiken i Mellanöstern ökar i snabb takt runt KRG, där under större delen av nittonhundratalet har setts som ett helt destabiliserande kraft i regionen, men i det senaste tio åren har denna uppfattning förändras. Idag är KRG en tillgång vad det gäller politiskt säkerhet i mellanöstern, där KRG bidrar till främjande av stabiliteten och utvecklingen i regionen. Syftet med denna uppsats är att förstå mekanismerna bakom stabiliteten och instabiliteten i konfliktfyllda regioner där KRG som aktör, i mellanöstern, ligger i fokus. Detta framställs genom att upplysa de problem som finns och förtydliggöra de regionala staternas ställningstagande gentemot KRG och vice versa. Genom de förändringar som har skett i regionen ska ett svar hittas till den övergripande frågan. Min strategi för att kunna besvara forskningsfrågan i uppsatsen är att analysera USA- och Turkiets säkerhetspolitiska hållning mot KRG. Detta tillämpades genom att göra en litteraturstudie av de dokument som tydliggör sammanställningen av geopolitiska processer och skeenden som omformat KRG:s ställning i regionen, i ett internationellt säkerhetsperspektiv. I detta används indikatorer från det teoretiska perspektivet realism för att på så sätt operationalisera och undersöka uppsatsens forskningsfråga. Slutsatsen visar att det finns många faktorer som påverkar KRG:s roll vad det gäller säkerhetsnivån både regionalt och internationell där mycket lutar åt samarbetet mellan KRG och Turkiet regionalt samt KRG och USA internationellt. Dessa kopplingar mellan KRG, Turkiet och USA ger ett kompletterande politik i regionen. / Abstract Kurds are now one of the world's largest population, estimated to be between 40-45 million worldwide, which is not a recognized state. However, there is a geographic area in southwestern Asia, known as Kurdistan by the Kurds and is the motherland. Nowadays, southern Kurdistan and northern Iraq is the only part of Kurdistan which has an autonomous region and is known as the KRG, the Kurdistan Regional Government, which this study will focus on. The politics in the Middle East is growing rapidly around the KRG, where during most of the twentieth century has been seen as a totally destabilizing force in the region, but in the last ten years this perception is changing. Today, the KRG is an asset in terms of political security in the Middle East, where the KRG contributes to the promotion of stability and development in the region. The purpose of this paper is to understand the mechanisms behind the stability and instability in conflict-ridden regions where the KRG as an actor in the Middle East is in focus. This is generated by informing the problems and clarifying the Regional States approach towards the KRG and vice versa. Through the changes that have taken place in the region an answer should be found to the overall question. My strategy to answer the research question in this paper is to analyze the US and Turkey's geopolitical posture toward the KRG. This was applied by making a literature review of the documents that clarify the compilation of geopolitical processes and events that transformed the KRG's position in the region, in an international security perspective. Indicators are used from the theoretical perspective realism to thereby operationalize and examine the essay research question. The conclusion shows that there are many factors that affect the KRG's role, in terms of security, both regional and international, where a lot leans towards cooperation between the KRG and Turkey regionally, as well as the KRG and the United States internationally. These connections between the KRG, Turkey and the United States provides a complementary policy in the region.
30

Gränsen mellan publikt och privat på Twitter : En studie om svenska twitteranvändares syn på delning av privat information på Twitter / The line between public and private on Twitter : A study of Swedish twitter users' views on the sharing of private information on Twitter

Ekman, Gabriella, Karlsson, Victor January 2011 (has links)
In this report we make an attempt to analyze where Swedish Twitter users believe the line is drawn between the private and public. Our goal is to find out what the factors are that determine what they decide to write on Twitter and what not. A survey was sent out and spread amongst Swedish Twitter users during one week to provide us with the data to answer our question formulation. The results do not draw an exact line between the private and the public but it nevertheless provides us with an idea of what users think is inappropriate to write about on Twitter. Through the study we found out that our respondents believe that it is inappropriate to write private information about others than them self. They also believe that racist and offensive comments are inappropiate. Our study also gives us some indication that Swedish Twitter users are rather open concerning sharing of private information about themselves.

Page generated in 0.0531 seconds