• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • No language data
  • Tagged with
  • 997
  • 79
  • 61
  • 29
  • 28
  • 28
  • 28
  • 28
  • 27
  • 24
  • 23
  • 20
  • 18
  • 17
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Planning and scheduling of refinery operations

Dave, Dhaval Jitendrabhai January 2004 (has links)
No description available.
132

Effective information assurance with risk management

Dimopoulos, Vassileios Andreas January 2007 (has links)
Today's businesses base their operation on their IT infrastructure, which consequently demands that it should be protected accordingly. Nevertheless, surveys tend to indicate that the number of IT security incidents is increasing, resulting in significant losses for the organisations concerned. Leading in poor security practices, and therefore frequent victims of related security incidents, are Small and Medium Enterprises (SMEs). Even though there are a number of solutions, ranging from baseline guidelines to a detailed Risk Assessment (which can be followed to guide organisations through systematically selecting appropriate controls and practices to properly secure their networked assets), evidence suggests that these are not being employed by SMEs. Constraints such as lack of budget, security personnel and awareness are amongst the factors that are deterring SMEs from adopting such solutions, and therefore contributing to their continued problem with security incidents. This thesis specifically targets the problem of security risk assessment within SME environments. Following an examination of the aforementioned constraints, the investigation considers the existing solutions, establishing the reasons that they are not appropriate for SME users. The research identifies that SMEs are in need of a solution that represents a progression of current guidelines, but without being as complicated as existing forms of Risk Analysis. Therefore a new methodology is designed, known as PRAM (Profile-based Risk Analysis and Management), which enables SMEs to analyse and manage their risks in a way that is simple to use and understand, as well as providing economic considerations on threats, their likelihood, effect and the spending required to reduce them to an acceptable level. The methodology is then implemented within a working prototype, which is evaluated using a series of test scenarios. These scenarios are also used as the basis for evaluating existing SME-oriented Risk Analysis solutions, and the findings determine that the PRAM approach is able to deliver a more comprehensive solution. In addition, an evaluation of the PRAM prototype by a series of end-users suggests that it also succeeds in providing a more user-friendly solution than the current alternatives. Overall, this thesis presents a solution that can be adopted by SMEs lacking in-house security expertise. It can assist them in understanding the threats they are under, while at the same time presenting appropriate information to enable management to evaluate their organisation's current IT security situation and select appropriate countermeasures.
133

Strategic fit in a university setting

Sanders, John William January 2006 (has links)
No description available.
134

A Semiotic Approach to Enterprise Infrastructure Modelling - The Problem Articulation Method for Analysis and Applications

Tan, Simon B. K. January 2006 (has links)
In recent years, advances in information technology and enterprise engineering have revolutionised the way businesses are conducted. Enterprises. are complicated organisations consisting of 'artefacts' (enterprise structure, activities, processes, information, resources, behaviour, goals, and constraints) that must be coordinated, planned and engineered to accomplish the enterprise goals. Enterprise engineering is an engineering approach comprised of techniques, methods, and infrastructures to aid the design, analysis, and implementation of an enterprise system. However, many modellers forgo the enterprise modelling methods and techniques and use localised ad-hoc and point solutions that are not amenable for enterprise infrastructure design. The current methods and techniques available are ill-equipped to model the holistic requirements oftoday's complex enterprises. .' This research adopts the PAM (problem Articulation Method), rooted in semiotics, a study of signs, symbols, language and information. PAM offers a suite of techniques, which enables the articulation and analysis of business, technical and organisational requirements, delivering a rigorous enterprise infrastructure to support the model. The method works by eliciting and formalising project planning and modelling (processes, .activities, relationships, responsibilities, communications, resources, agents, dependencies and constraints), where the abstractions are mapped to represent the manifestation ofthe 'actual' enterprise. ~ .,J The proposed enterprise framework incorporates PAM and MEASUR (Methods for Eliciting Analysing and Specifying Users Requirements) a suite of semiotics methods to model the agent's ontological relationships, defining its meaning (semantics) to improve the analytical capability of the model and elicit the normative behaviours of agents to enrich the enterprise model. The PAM method has been further extended to examine the method relevance and significance in dealing with innovation in the modelling and planning of complex enterprise projects. The PAM conceptual model created is subsequently analysed, tested and verified using an off-the-shelf discreteevent simulation software, to be modelled dynamically. The simulation models are also validated by the domain experts from the respective organisations to assess the consistency, coherence and logical correctness of the 'model. This modelling approach contributed to the further development of the PAM theories, methods and techniques and represents a significant improvement to facilitate enterprise infrastructure planning and in so doing, exploit the technological, business and organisational effectiveness.
135

Robust Value Management : providing a script for satisfying current and future end user needs

Alkizim, Ahmad Omar January 2008 (has links)
No description available.
136

Total quality management and culture, a comparative case study

Hirschhauser, Constanze January 2000 (has links)
No description available.
137

Struggling to Define Value : A Critical and Discourse-Based Study of Strategic Sensemaking in the Recorded Music Industry

Wheeldon, Jonathan January 2009 (has links)
No description available.
138

Formative Factors in New Venture Internationalization - An Extension to Theoretical Findings and an Empirical Test

Schuffel, Patrick Edmund January 2008 (has links)
No description available.
139

Reengineering Corporation Street : an empirical study of business process reengineering (BPR) in two local authorities

Chamberlin, John January 2008 (has links)
No description available.
140

An ontology-based framework for enterprise application integration

Tektonidis, Dimitrios January 2008 (has links)
No description available.

Page generated in 0.0312 seconds