• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 25
  • 11
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 50
  • 21
  • 16
  • 16
  • 16
  • 14
  • 14
  • 13
  • 12
  • 12
  • 10
  • 10
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

De la conception d'une plateforme de télétravail virtualisée et unifiée : Analyses socio-techniques du travail "à distance" équipé / About the design of a virtualized and unified platform : Socio-technical analyzes of equipped "remote" working

Marrauld, Laurie 05 December 2012 (has links)
Cette thèse de doctorat, en Sciences de Gestion, a pour terrain de réflexions et d’actions de recherche, le projet WITE 2.0 consacré à l’analyse technico-organisationnelle d’un dispositif TIC en développement : une plateforme intégrée de télétravail. Cette plateforme permet de travailler «à distance» en mode connecté ou non, à partir de n’importe quel terminal (PC, téléphone, tablette), sur un mode «client léger» et dans un environnement de type cloud computing. De la conception de cette plateforme ont émergé des questionnements relatifs à la place des technologies d’information et de communication (TIC) dans les activités de travail réalisées «à distance» de son collectif de travail. Notre stratégie de recherche est constituée de deux grandes phases d’actions de recherche : la première consistait à connaître la diversité des configurations de «télétravail» et la seconde à comprendre les modes d’appropriation et les limites des technologies de communication unifiée entrant en jeu dans la conception de la plateforme. Ces deux phases ont été conduites dans une perspective de l’«action située» et suivant une méthodologie qualitative fondée sur des études par entretiens et par observations. Les résultats rendent compte des réalités des pratiques de travail à distance en situation de mobilité équipée, des limites des équipements et des tactiques construites par les acteurs pendant la «mise en pratique» de la technologie. Ces résultats révèlent aussi les normes, souvent tacites, et valeurs d’usages de ces nouvelles technologies et permettent d’appréhender leur conception au travers des recommandations managériales englobant leurs aspects technique, d’usage et de service. / This doctoral thesis in Management Sciences concerns the project WITE 2.0 dedicated to the analysis and the design of technical and organizational ICT device : an integrated platform for teleworking. This platform allows you to work "remotely" on a connected mode or not, from any device (PC, phone, tablet), on a "thin client" and in a work environment like « cloud computing ». Some questions have emerged related to the design of the platform : these questions concern the role of the information and communication technologies (ICT) in the progress of remote working. Our design of research is divided into two research’s actions : firstly, we wanted to know the diversity of remote working configurations and secondly, we wanted to understand how the appropriation’s codes and norms of the new technologies (used for the platform) take place. We followed an « situed action » perspective and a qualitative methodology based on semi-structured interviews and observations. In our results, we describe the remote working’s realities, the limitations of the technologies and the tactics built by the workers while they « enact » the technology remotly. We discovered some use’s norms, often in a tacit dimension, and use’s values of these new technologies. Finally we gave some managerial recommandations concerning the technical, use and service aspects.
12

Enterprise Mobility : Defining and evaluating business digitalization

Arlestedt, Rebecka, Lindh, Melenie January 2016 (has links)
Mobile technology has developed rapidly in the recent years and considerably changed the way organizations work. Mobility can bring great benefits to the organizations of which they are at, by e.g. improving employee satisfaction and increase efficiency and productivity. Despite this the development of mobile solutions have grown much faster for individuals than for organizations, with a plethora of devices and applications. The slow enterprise adoption is partly due to the fact that companies need to take information security risks into account at the same time as IT systems need to be rebuilt and customized to accommodate the new mobile way of working. Employees, unlike most other technologies, largely drive mobile strategies at organizations. Organizations are not developing in a fast enough pace and many scientist are describing a research gap in organizations adoption of mobility. This study aims to examine how research in the area has been presented and how enterprise mobility is viewed and utilized. The study has been implemented through qualitative research with a interpretative and exploratory approach. A case study was conducted at two organizations, demonstrating the possibilities and obstacles of enterprise mobility, and also strengthened the existing definition of the field. Additionally the case study illustrated discrepancies in IT solutions and the adoption of enterprise mobility within two different industries. Both researchers and organizations have shown a great interest in exploring this area additionally. Further studies can be extended to include the effects of how companies have adapted to enterprise mobility. / Den mobila teknologin har utvecklats i snabb takt under de senaste åren och således förändrat organisationers sätt att arbeta. Mobilitet kan möjliggöra för organisationer att t.ex. förbättra de anställdas tillfredsställelse, öka effektiviteten och produktiviteten, samt minimera kostnader. Trots den snabba utveckling av såväl mobila lösningar som mobila enheter, så har utvecklingen gått betydligt snabbare för privatpersoner än för organisationer. Detta kan delvis förklaras av det faktum att organisationer, i större utsträckning än privatpersoner, måste ta hänsyn till de säkerhetsrisker som mobilt arbete kan medföra. Det kan också förklaras av att många IT-system kräver vidareutveckling och anpassning för att kunna möta det nya mobila sättet att arbeta. Att organisationer inte utvecklas i tillräcklig snabb takt ligger till grund för att många forskare beskriver att det finns ett forskningsgap i organisationers antagande av mobilitet. Denna studie syftar därför till att undersöka hur begreppet enterprise mobility presenteras i tidigare forskning samt hur det uppfattas och tillämpas bland anställda. Studien har använt en kvalitativ forskningsansats med ett undersökande och tolkande förhållningssätt. En fallstudie har genomförts på två olika organisationer för att identifiera möjligheter och utmaningar med enterprise mobility, men också för att stärka den befintliga definitionen av begreppet. Fallstudien presenterar också skillnader i anpassade IT-lösningar och antagandet av mobilitet inom två olika branscher. Både forskare och organisationer har uttryckt ett stort intresse av att utforska detta område ytterligare. Denna studie ligger till grund för att senare undersöka effekterna av hur företagen har anpassat sig till enterprise mobility.
13

Asmeninių įrenginių saugaus konfigūravimo sprendimų paramos sistema / Secure configuration decision support system for personal devices

Neverdauskaitė, Vaida 21 August 2013 (has links)
Mobilieji įrenginiai tobulėja ir pateikia vis daugiau galimybių jų vartotojams. Tokie įrenginiai naudojami tiek asmeniniais, tiek darbo tikslais, kas sukelia papildomų saugos grėsmių įmonėms. Esant tokiai situacijai, reikalingos papildomos valdymo priemonės, kurios užtikrintų asmeninių įrenginių saugos konfigūravimą, atitinkantį organizacijos saugos politiką. Organizacijos saugos politika privalo atsižvelgti į dvi pagrindines sritis: organizacijos sistemų saugumą ir mobiliojo įrenginio saugumą. Magistrinio darbo tikslas – išnagrinėti mobiliesiems įrenginiams keliamas grėsmes bei sudaryti mobiliųjų įrenginių saugios konfigūracijos paramos sistemos prototipą. / The mobile industry is evolving rapidly and new mobile devices with sophisticated capabilities are released almost every day. The technical advancements in mobile industry have resulted in increase of security threats and attacks. To provide strong security mechanism a combination of solutions need to be implemented at different levels based on enterprise mobile application security requirements. Enterprise mobile security should ensure two key components: enterprise system security and device security. The aim of this paper is to create secure configuration decision support system prototype for personal devices.
14

Omdesign av Intranät : vid Svenska Kyrkan i Norrköping

Persson, Erik January 2017 (has links)
Svenska Kyrkan i Norrköping upplever idag att de har ett virtuellt intranät som skulle kunna fungera bättre. Problematiken tycker de ligger i underliga trafikflöden, utarmning av IP-adresser och hög komplexitet. Därtill undrar de om det inte är hög tid att höja bandbredden ut från flera av byggnaderna. Min målsättning med arbetet är att utifrån de största församlingarna samt Kyrkans Hus – där organisationens IT-kontor och serverfarm är belägna – kunna ge rekommendationer på åtgärder och förändringar som ska kunna avhjälpa denna problematik och förhoppningsvis framtidssäkra några av dessa aspekter. Under mitt arbete har jag tagit ut rudimentära baselinemätningar, IP-adresseringstabeller och sammanställningar av trafikflöden i syfte att skapa en nulägesanalys. Jag har också ämnat illustrera den problematik som låg till grund för arbetets utformning. I min rapport har jag också behandlat moderna IT-trender såsom tunna klienter, virtualiseringsmiljöer och BYOD, Bring Your Own Device. Detta arbete har resulterat i ett generellt designförslag med redundanslänkar, gästnätverk och stöd för Ipv6 med olika alternativ inom samtliga aspekter, vilka kan användas för att skräddarsy implementeringen av de olika teknologierna. För en mer allomfattande, grundlig och slutgiltig design av intranätet som helhet skulle en mer omfattande dokumentation behövas, tillsammans med uppskattning av nätverksanvändning, IP-adressering samt budgetering. / The Church of Sweden in Norrköping are currently faced with a virtual intranet that they feel could be improved. Some of the problems they have identified are unusual traffic forwardin patterns, exhaustion of the IP adress pool and a high level of complexity. In addition, they feel that it might be time to increase the bandwidth that some of the buildings have access to. My goal with this paper – based on the largest parishes and Kyrkan Hus, where the organization’s IT office and server farm lies – is to give recommendations in terms of actions and changes that could mitigate these issues and hopefully provide a more future proof solution. During my work I have taken some rudimentary baseline readings, IP addressing tables and compilations of network flows, in order to create a current situation analysis, which I have used to draw some of my conclusions. I have also aimed to illustrate the problems that have formed the foundation for this work. In my report I have also discussed some modern IT trends, such as thin clients, virtual environments and BYOD, Bring Your Own Device. This assignment has resulted in a general design proposal with redundant links, guest networks and Ipv6 support, with different alternatives withing each aspect, which can be used to further tailor the implementations of the different technologies. For a more all encompassing, thorough design of the intranet as a whole we’d need a more complete documentation, together with approximations and evaluations regarding network usage, IP addressing and budget.
15

Zavedení BYOD pro notebooky v Telefónica Czech Republic / Implementation of BYOD for laptops in Telefónica Czech Republic

Pokorný, David January 2013 (has links)
This thesis deals with the implementation of the Bring Your Own Device program for employee's private laptops at Telefonica Czech Republic. It describes the solution using a distributed virtualization. The private laptops are given identical system environments as standard corporate laptops. The solution of the problem is set in the environment of the real corporation. Areas focused on the establishment and operation of the program are security, technology, finance and processes.
16

Framing Innovation: The Impact of the Superintendent's Technology Infrastructure Decisions on the Acceptance of Large-Scale Technology Initiatives

Arnold, Erik Paul, Cohen, Peter D., Flanagan, Gina Eva, Nolin, Anna Patricia, Turner, Henry J. January 2014 (has links)
Thesis advisor: Diana C. Pullin / Thesis advisor: Vincent Cho / A multiple-case qualitative study of five school districts that had implemented various large-scale technology initiatives was conducted to describe what superintendents do to gain acceptance of those initiatives. The large-scale technology initiatives in the five participating districts included 1:1 District-Provided Device laptop and tablet programs (DPD), a Bring Your Own Device program (BYOD), and a Blended program that included a district-sponsored Lease-To-Own laptop and tablet program (LTO). Superintendents and other personnel that were identified by each superintendent as having a key role with the technology initiative were interviewed. Key documentation regarding the large-scale technology initiative was also reviewed. To help bring perspective to the actions of superintendents surrounding large-scale technology initiatives, frame theory was used as a theoretical framework for the overall study. This study sought to determine the factors considered by superintendents in making decisions about technology infrastructure, the factors considered in making decisions about funding a large-scale technology initiative, and how technology infrastructure or funding decisions impacted the perceived acceptance of the initiative. The study found that the decisions made by superintendents with regard to the technology initiative can have an impact on the acceptance of the initiative by all stakeholders. The importance of robust and reliable Wi-Fi networks, funding for technology initiatives from multiple sources, and the significance of device capabilities and reliability were also identified as significant factors in the acceptance of large-scale technology initiatives. / Thesis (EdD) — Boston College, 2014. / Submitted to: Boston College. Lynch School of Education. / Discipline: Educational Leadership and Higher Education.
17

Bring Your Own Device (BYOD) : Potentialen och problematiken

Svensson, Markus, Svensson, Alexander January 2013 (has links)
Många konsumenter är snabbare än organisationer på att börja använda ny teknik och utrustning. När de sedan tar med denna utrustning och teknik till arbetet för att på ett mer tillfredsställande sätt utföra sina arbetsuppgifter uppstår fenomenet BYOD som har blivit allt vanligare och vanligare. Syftet med denna studie är att ta reda på vad fenomenet BYOD är och hur det påverkar organisationer som anammar det. Dess fördelar och risker har undersökts samt fenomenets utbredning bland svenska organisationer. Tidigare undersökningar har legat till grund för att identifiera ofta förekommande fördelar och risker. Utifrån dessa har sedan en enkätundersökning utformats som skickats ut till svenska organisationer. Undersökningen visar att BYOD medför vissa fördelar. Dessa är t.ex. ökad produktivitet och kreativitet bland de anställda vilket i sin tur ger organisationer en ökad operationell effektivitet, fler nöjda, flexibla och mobila anställda och bättre kundbemötande. Undersökningen visar även att många organisationer saknar en formell BYOD-policy och att stöld eller borttappade enheter är ett stort säkerhetsproblem. Stora orosmomenten bland organisationerna är bland annat ökad belastning på IT-avdelningen och undermålig enhetssäkerhet. Det är viktigt att organisationer som anammar BYOD tänker på säkerhetslösningar som mitigerar dessa risker.
18

Secure Mobile SDN

January 2015 (has links)
abstract: The increasing usage of smart-phones and mobile devices in work environment and IT industry has brought about unique set of challenges and opportunities. ARM architecture in particular has evolved to a point where it supports implementations across wide spectrum of performance points and ARM based tablets and smart-phones are in demand. The enhancements to basic ARM RISC architecture allow ARM to have high performance, small code size, low power consumption and small silicon area. Users want their devices to perform many tasks such as read email, play games, and run other online applications and organizations no longer desire to provision and maintain individual’s IT equipment. The term BYOD (Bring Your Own Device) has come into being from demand of such a work setup and is one of the motivation of this research work. It brings many opportunities such as increased productivity and reduced costs and challenges such as secured data access, data leakage and amount of control by the organization. To provision such a framework we need to bridge the gap from both organizations side and individuals point of view. Mobile device users face issue of application delivery on multiple platforms. For instance having purchased many applications from one proprietary application store, individuals may want to move them to a different platform/device but currently this is not possible. Organizations face security issues in providing such a solution as there are many potential threats from allowing BYOD work-style such as unauthorized access to data, attacks from the devices within and outside the network. ARM based Secure Mobile SDN framework will resolve these issues and enable employees to consolidate both personal and business calls and mobile data access on a single device. To address application delivery issue we are introducing KVM based virtualization that will allow host OS to run multiple guest OS. To address the security problem we introduce SDN environment where host would be running bridged network of guest OS using Open vSwitch . This would allow a remote controller to monitor the state of guest OS for making important control and traffic flow decisions based on the situation. / Dissertation/Thesis / Masters Thesis Computer Science 2015
19

Teacher Implementation of "Bring Your Own Device" At a Suburban High School Serving High SES Students

January 2013 (has links)
abstract: As students gain access to personally-owned Mobile Communication Devices (MCDs), schools have begun to embrace MCDs as mobile-learning (m-learning) teaching and learning tools. A research gap currently exists for the innovation of m-learning with student-owned devices, which this study attempts to fill by answering the following Research Question: What are the Bring Your Own Device (BYOD) Levels of Use of teachers at a high-performing, high SES suburban high school? To answer this question, I answered 5 sub questions: (1) What instructional decisions did BYOD user-level teachers make with regards to m-learning? (2) How did teachers collaborate on BYOD with colleagues during implementation? (3) How did teachers participate in voluntary professional development for BYOD and m-learning? (4) Was there a difference in Levels of Use between early career and veteran teachers? (5) What barriers to successful implementation did teachers at this school report? To answer these questions, I conducted a Levels of Use interview with 2-3 teachers from each academic department (n=28), at a school that was in its third year of BYOD implementation, as well as observed 18 of the teachers during instruction. I triangulated data from a first and second interview with observation data, and analyzed these data sets to profile the different Levels of Use among the teachers, and present recommendations for research and practice. I rated all participants between Level 0: non-use and Level IVB: refinement; no teachers in this study were above Level IVB. The findings indicate that teachers made instructional decisions based on their Level of Use, and although they did not participate in ongoing professional development specific to BYOD, they did work with others based on their Level of Use. Few teachers participated in voluntary professional development, and cited time as a factor. This study also finds that personal experience with technology and lesson planning for student-centered learning is a greater indicator of successful BYOD implementation than age or teaching experience. Finally, the most commonly reported barriers to successful implementation of BYOD were time, equity/access, and student behavior. / Dissertation/Thesis / Ed.D. Educational Administration and Supervision 2013
20

BYOD - Risks, Solutions and Guidelines

Asparuhov, Lachezar January 2015 (has links)
During the past few years the use of mobile devices became extremely popular not only for personal use but also for working. When personal mobile devices are used as working assets the enterprises should search for some suitable ways to protect their data and network from the unmanaged mobile devices. On the other hand, it is widely believed that employees are more productive when they work from their own devices. This arise three questions: what risks these devices are bringing to the organizations, how to protect the company data and network while allowing the employees to work from their devices, and how adapted the real world is to the Bring Your Own Device trend. To answer these questions and the sub-questions deriving from them, an extensive literature study and a survey approach are used. The results from the study show that even though there are many risks for the companies, brought by the use of personal mobile devices, there exist adequate solutions to mitigate these risks. However, the results from the survey approach show that the companies are not very adapted to this trend yet and there exist a need for better understanding of the problem.

Page generated in 0.0773 seconds