• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 115
  • 46
  • 44
  • 22
  • 21
  • 12
  • 10
  • 10
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 324
  • 324
  • 102
  • 68
  • 67
  • 64
  • 61
  • 60
  • 60
  • 57
  • 56
  • 40
  • 40
  • 40
  • 34
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

The Rise of Solidarity : A comparative analysis of the change in Swedish foreign and security policy after the signing of the Lisbon Treaty

Lindqvist, Lovisa, Palm, Johanna January 2020 (has links)
The change in Swedish foreign and security policy that took place during the post-Cold War era is well known. Sweden left the foreign and security policy based on the principle of “nonalignment in peace, aiming at neutrality in the event of war” and headed towards international cooperation within the field of foreign and security policy as well as signing the Lisbon Treaty in 2008 with the EU, which included the principle of solidarity. By implementing a role-theory based analysis, this thesis aims to contribute to an understanding of the changes in Swedish security and foreign policy, which developed after the signing of the Lisbon Treaty in 2008. The research stretches from 2006 until 2011 and examines Swedish foreign and security policy role change and role conceptions by using a comparative case study design of the Swedish Government’s annual foreign declarations. Finally, this study suggests that Sweden no longer perceives itself as a neutral state, but rather as a solidarity state. This shows that Sweden’s foreign and security policy has gone from neutrality to solidarity. In conclusion, the study’s result is that Sweden’s foreign and security policy change from neutrality to solidarity would not be possible without the changes in the foreign policy role conceptions.
92

Comparing Access Control Security Policies : A Case Study Using SBVR

Graisithikul, Gunyarat January 2012 (has links)
Companies today are required more and more to interconnect their information systems with partners and suppliers in order to be competitive in a global marketplace. A problem of how to compare a security policy between two different companies when they need to agree upon a single security policy has been raised. Can a comparison of two access control policies made through Semantic of Business Vocabulary and Business Rules (SBVR) be more appropriate than the traditional way of intuitively comparing two information security policies? In this research, a case study has been conducted along with the questionnaires as a data collection approach. In the case study, a calculation for a degree of policy statement similarity of Company A’s and Company B has been done. Both calculations were based on the questionnaire results of the Company A and Company B in form of SBVR and traditional policy statements separately. This research has revealed that SBVR applied policy is more appropriate for comparing two company policies than a traditional written policy. By applying SBVR to the policy statements, Company A and Company B had their policy in the same structure, which is in the SBVR format. They could get a very clear similar part of the policy statements (70% calculated by the results of the second questionnaire in this case study) agreed by both companies.
93

Secure Wireless Communication

Muhovic, Admir January 2007 (has links)
The need for and requests for utilization of wireless equipment are growing rapidly. Advantages of using wireless communication are easy to realize. Having access to electronically stored information no matter where you are is a big advantage. Furthermore, wireless communication is increasingly utilized in everyday work and there is a constant development of new wireless equipment. Today, utilization of wireless communication is very practical as well as effective. On the other hand, using wireless equipment and communication entails risk unless efforts are made to secure this communication. Some wireless protocols exist and are used, despite their being vulnerable to attacks. Additionally, the traffic can easily be eavesdropped. Incorrect installation of wireless equipment contributes to the vulnerabilities of wireless communication. Some of the IT-equipment available on the market today offers wireless communication. This equipment is increasingly used within FMV. Such equipment includes: laptops, PDAs, cellular phones, etc. This wireless equipment, according to FMV’s information security policy, must be approved from a security viewpoint before it can be used at FMV. Thus an analysis of risks associated with usage of wireless equipment must take place and the mechanisms necessary to ensure adequate security must be identified. The document “Requirements on Security Functions (Kraven på SäkerhetsFunktioner, KSF)” identifies the technical and/or administrative requirements for such equipment.</p> The aim of this thesis was to analyze if it is possible to utilize wireless equipment at FMV, specifically, if it can be connected to the internal LAN at FMV. In other words, the wireless equipment must be able to offer security protection corresponding to the information security class: HEMLIG/RESTRICTED. The thesis contains an analysis of which security functions are available on the market today and evaluates whether these security functions meet the requirements given in KSF. The result is a proposal for the best security mechanism(s) within the constraints of KSF and the available equipment. The thesis proposes a technical solution along with suitable security mechanisms. The advantages and drawbacks of each has been analyzed. Additionally, the thesis presents a number of (administrative) security policies in order to be able to handle security aspects which are not covered by the KSF. / Behoven och efterfrågan av mobil och trådlös utrustning är i dagsläget allt större. Fördelarna med att använda sig av trådlös kommunikation är enkla att inse. Att kunna ha tillgång till elektroniskt lagrad information oavsett var man än befinner sig är en stor fördel. Vidare implementeras trådlös kommunikation allt mer i det vardagliga arbetet samtidigt som utrustning för denna sorts kommunikation är i ständig utveckling. I slutändan är användandet av trådlös kommunikation väldigt praktiskt samtidigt som det är effektivt. Användandet av trådlös utrustning och kommunikation medför ett risktagande då denna typ av kommunikation allmänt är osäker. Detta eftersom teknologin fortfarande är i utvecklingsfasen. De i dagsläget aktuella trådlösa protokollen är sårbara för attacker och det är dessutom enkelt att avlyssna trafiken. Felaktig installation av utrustning bidrar dessutom också till att den trådlösa kommunikationen blir sårbar. En del av den IT-utrustning som idag finns tillgänglig ute på marknaden och som alltmer används inom FMV har möjlighet att kommunicera trådlöst med omgivningen. Exempel på sådan utrustning är bärbara datorer, PDA:er, mobiltelefoner mm. Denna typ av utrustning, dvs. trådlös utrustning, skall enligt FMVs informationssäkerhetspolicy godkännas från säkerhetssynpunkt innan den får tas i bruk på FMV. Det innebär att man utför en analys av vilka risker som är förknippade med användandet av trådlös utrustning samt att man identifierar adekvata skyddsåtgärder. Till sin hjälp använder man sig av Kraven på SäkerhetsFunktioner (KSF) som består av tekniska och/eller administrativa krav. Syftet med detta examensarbete var att undersöka om det finns möjlighet att använda trådlös utrustning på FMV, dvs. att denna används på interna LAN på FMV. Med andra ord skall den trådlösa utrustningen kunna erbjuda ett skydd motsvarande högst informationssäkerhetsklassen HEMLIG/RESTRICTED (H/R). Examensarbetet innefattar en analys av vilka säkerhetsfunktioner idag finns tillgängliga ute på marknaden och utvärderar huruvida dessa säkerhetsfunktioner uppfyller kraven givna i Kraven på SäkerhetsFunktioner (KSF). Resultatet är ett förslag på de bästa säkerhetsmekanismerna inom restriktionerna av KSF och den tillgängliga utrustningen. Examensarbetet föreslår en teknisk lösning med lämpliga säkerhetsmekanismer. Dess för- och nackdelar har analyserats. Examensarbetet presenterar dessutom ett antal (administrativa) säkerhets policies som hanterar säkerhetsaspekter som inte omhändertas av KSF.
94

Sweden's Roles Vis-à-Vis Russia : A role theory analysis of Sweden's foreign and security policy formulations

Kulic, Luka, Kupi, Uran January 2020 (has links)
While framing its foreign and security policy, Sweden continuously uses formulations aimed at Russia. The relations between the two states have experienced various stages during the course of time, with the more companionable relations characterising the periods of 1990s and majority of 2000s, while experiencing a turmoil throughout the 2010s. These periods mirror the overall change in Sweden's foreign policy which overlaps with the shift from an increased focus on the European Union towards the Nordic region. This research is articulated as a single-N case study where role theory is applied to descriptively investigate how Sweden framed its foreign and security policy vis-à-vis Russia in the period from 2002 to 2020. In order to do so, a qualitative content analysis was conducted to explore how Sweden's Ministry for Foreign Affairs formulated the official documents in relation to Russia. From the analysis, it resulted that in the observed time period, Sweden's foreign policy revealed a blend of both change and continuity in its relations to Russia. This was a reflection of a general pattern in Sweden's foreign and security policy, but also a consequence of Russia's gradual turn towards a more authoritarian state. Therefore, this study will contribute to the broader question how Sweden has responded to the newly formed security issues in Europe and Nordic region.
95

Sveriges säkerhetspolitiska strategi: Balancing, bandwagoning eller hedging?

Nygren, Max January 2020 (has links)
Small states tend to use different security strategies to increase and gain influence over their own level of security. Sweden is a small Nordic state with a long history of proclaimed neutrality when it comes to security policy. But in the last couple of decades the country has increased its contributions to, and participations in, numerous EU and NATO security projects and exercises. In 2009, Sweden adopted a declaration of solidarity towards the member countries of the EU. In 2014, Sweden also signed a memorandum of understanding with NATO. This has ignited bothan internal and an external debate among political scientists and security experts about what the Swedish security strategy is. This paper seeks to describe and clarify the Swedish security strategy by analyzing documents on security policy from the Swedish government. The study also examines the level of continuity in the Swedish security strategy. Based on a theoretical framework of security strategies of small states, the study utilizes three ideal types of the small state security strategies balancing , bandwagoning and hedging to analyze and describe the Swedish security strategy. The study concludes that the Swedish security strategy as it is presented in two official documents on security policy ranging from 2009 to 2015 mostly indicates balancing . The willingness to strengthen the Swedish military capacity and theeagerness for cooperation with the EU, NATO and USA clearly indicates balancing towardsRussia, a state which is described as a security threat in both documents. However, there are also tendencies towards hedging due to the insistence of armed neutrality in both documents. The study also shows that while there is a high degree of continuity in Sweden’s security strategy there has been a small shift in strategy towards more balancing from 2009 to 2015.
96

Säkerhetisering av cyber? : En studie om inramningen av cyberhot i svensk politik

Pohjanen, Sofia January 2021 (has links)
The following thesis intends to study how cyber security and cyber threats are portrayed in Swedish political discourses on cyber between the years 2015-2021. How the question about cyber security is framed can have a major impact on Sweden’s security- and digitization policy and further, on the population's view of which problems are important and how resources should be allocated. Through qualitative text analysis, more specific discourse analysis, political debate articles and government reports will be analyzed to evaluate how the question about cyber security has been framed as an existential threat and if so, for whom?  The purpose is to investigate whether features of securitization occurs and if the question about cyber security can be defined as securitized. And further, what kind of measures has been proposed as protection against these threats? The study also aims to identify which actors' arguments and problem representations have had an impact. The results show that there has been a securitization move within political cyber discourses and a number of safety features have been proposed or have already taken place. The question about cyber security can therefore be defined as securitized. The results also show that a few numbers of government actors have the privilege to represent the problems and furthermore, decide what actions to take.
97

BILDEN AV SÄKERHETSPOLITIK I LÄROBÖCKER : Läroboksanalys av Sveriges säkerhetspolitik i läroböcker från Lgy 70 och Lpf 94

Wikström, Joar January 2022 (has links)
In this study, the content and depiction of security policy in Sweden was studied in educational social studies textbooks, derived from the 3rd course from two different curriculums: Lgy 70 and Lpf 94. The purpose of the study was to examine if there is a notable development and shift in the way that security policy is depicted and described in Swedish textbooks, and to do it in consideration of the drastic geopolitical changes that came with the fall of the Soviet Union and the end of the Cold war. For this study, a qualitive content analysis was used. The purpose of this study is structured around 3 questions: Are there differences in content and depictions between textbooks, and if so, what are they? How has content and depictions changed between the two curriculums? And how can these potential differences be explained?To answer the last question, a theoretical framework was used that emphasizes the importance of external factors such as geopolitical conditions in shaping perceptions and policy, which in turn may affect content and depiction in textbooks, as well as an approach where the textbook is understood as a reflection of the social climate. The results of this study show a significant difference regarding content and depictions in textbooks between the two curriculums, regarding the threat level, perceived security threats, security goals, the purpose and relevance of the policy of neutrality, to name a few. For example, Lgy 70 textbooks depicted possible aggressions as being as likely to occur from NATO as the Warsaw pact, whereas Lpf 94 textbooks took a more open stance, emphasizing Sweden’s cooperation with NATO and EU.
98

Sveriges säkerhetspolitik i svensk press : En studie kring hur den svenska dagspressen har rapporterat kring Sveriges säkerhetspolitiks position / Sweden’s security policy in the Swedish press : A study of how the Swedish daily press has reported on Sweden’s security policy position

Blomberg, Linus January 2022 (has links)
The purpose of this study is to analyze and compare the representations made by Aftonbladet (AB) and Dagens Nyheter (DN) of Swedish security policy due to the Russian annexation of Crimea in 2014 and Russia’s invasion of Ukraine 2022. The period of the investigation is one week for each conflict, based on when Russian troops officially invaded Ukraine.The essay has been done through a qualitative content analysis and a security policy theory. The results as for the Crimea conflict in 2014 show Swedish security policy changing tune after recognising the worse security position in Sweden´s immediate area and increased resources for the armoured forces. As for the Russian invasion 2022 many different consequences occurred for example again increased spending for the armoured forces, direct sanctions against Russia and Sweden sent apart from aide also military equipment to Ukraine.The analysis results showed that Sweden stopped focusing on inward-facing security policy goals and are today placing as much focus on outward-looking security policy goals.
99

The Construction of Security : A Discourse Analysis of Sweden’s Foreign and Security Policy between 2014 and 2023

Hulterström, Jarl, Berglund, Matteus January 2023 (has links)
This thesis is conducted as a descriptive single case study to establish empirical knowledge regarding how securitisation is expressed in discourse by the Swedish policymaking elite, in other words “securitising actors”. The thesis takes an ontological approach of interpretivism with a theoretical approach of securitisation theory. Further, by utilising a methodological approach of an inductive method to empirically analyse 44 collected speeches from Folk och Försvars annual national conference and the annual foreign declaration in order to analyse what prominent themes emerged from the discourse. The analysis was conducted through a discourse analysis by applying two analytically driven questions derived from securitisation theory. This is in order to analyse how securitisation was expressed by the securitising actors, and what motivating factors could be identified for the shift from non-alignment to military-alignment in Swedish foreign and security policy. The result of the analysis indicated that with an ongoing security concern in Sweden’s immediate neighbourhood, securitisation was expressed as focusing on an increased national defence. Along with indicating a conflict of interests in Swedish foreign and security policy through the conflict of ideals and interests by breaking Sweden’s long-term tradition of military non-alignment. By this, this thesis aims to contribute to knowledge and to the overarching literature pertaining to discourse and shifts in Swedish foreign and security policy.
100

Comparing Theories of the European Union: An essay on how to analyze the EU’s foreign policy and international power

Sahlin, Jonathan January 2010 (has links)
The aim of this essay is to explain how IR theory relates to the European Union. Thisis motivated by the extensive use of empirical and descriptive studies on the EU. Togenerate knowledge on how theory relates to the EU, two seemingly differenttheories are compared. Neorealism and social constructivism are used to generatehypotheses, which are then tested on a quantitive study on the EU’s Common Foreignand Security Policy. The study covers the years of 2003-2005 and uses a statisticalmethod to present to empirical findings, which is supplemented by previous studieson EU’s foreign policy. The theoretical framework enables comparison of the twoemployed theories’ explanatory powers. The essay concludes that none of the theoriesprovides satisfactory explanations of in regard to EU’s global power and/or influence.Nevertheless, they are able to explain different aspects of the developments of EU’sforeign policy. Further theoretical studies should be undertaken in order to highlightthe issues of theory vis-à-vis the European Union.

Page generated in 0.0497 seconds