• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 502
  • 310
  • 1
  • Tagged with
  • 813
  • 813
  • 813
  • 813
  • 813
  • 172
  • 170
  • 59
  • 51
  • 48
  • 42
  • 41
  • 36
  • 36
  • 33
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Towards integrating agile development and risk management

Nyfjord, Jaana January 2008 (has links)
<p>Risk management has become recognized as a best practice in the software industry. Controlling risks improves essential software development features such as product quality, planning precision and cost-efficiency. For this reason, the inclusion of risk management in software development is an important factor to consider if one wishes to achieve project success.</p><p>Agile software development models claim to be risk-driven. They state that their iterative approach enables continuous attention to risks and that the risks can be reduced by practices such as continuous software integration and early testing. In reality, however, the agile development models implement few risk management practices.</p><p>The research problem addressed in this thesis is multi-faceted. The problem concerns the lack of explicit risk management practices in agile development. However, it also concerns the need to address risk management on an organization-wide basis. In addition, it concerns the conflict that emerges from trying to merge the agile process with standard industrial processes, such as risk management, without compromising agility.</p><p>The goal of this thesis is to explore integration as a solution for addressing the lack of risk management in the agile model based on empirical research. It involves (a) outlining a model integrating the agile and risk management processes on an organization-wide basis, and (b) providing a foundation for its extension.</p><p>The results show that, within the scope of this research, the proposed solution is a valid candidate for improving the agile situation. However, it is still in its infancy. It does not claim to be complete but needs to be further elaborated and complemented with details. Hence, we outline the model and provide a foundation established in empirical investigation for extending it in future research.</p>
12

On Security in Safety-Critical Process Control

Åkerberg, Johan January 2009 (has links)
<p>This Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since the introduction of Ethernet-based fieldbus protocols. As an example, a successful attack on a power plant, supporting large cities with energy, could result in a temporal but total power loss. Such attacks could be devastating for the society. The security threats are real, and motivations for attacking industrial communication systems may be political or economical.</p><p>The visions of autonomous systems, which can be supervised, diagnosed and maintained from remote is not far from reality, but stress the need for security and safety measures. Wired fieldbus protocols are mature when it comes to safety and there are existing standards for safe communication. In a setup like an autonomous system security measures over safe communication has to be taken into account.</p><p>The state-of-the-art in automation security is to use firewalls to restrict incoming and outgoing traffic to the networks. Firewalls can be deployed between different automation networks, i.e. server, control, and fieldbus networks, and even protect a single automation cell with a dedicated firewall. If an adversary can penetrate the perimeter defenses, no other security countermeasures exist in process automation to protect the safety-critical communication from sabotage.</p><p>In this thesis we initially explore the possibilities of security attacks on the automation protocols PROFINET IO and PROFIsafe. We show that it is possible to attack safety-related communication to take control of safety-critical fieldbus nodes. We propose the concept of <em>Security Modules</em> in combination with PROFINET IO and PROFIsafe to achieve safe and secure real-time fieldbus communication.</p>
13

Development of an Electronic Business Card system - The Meetia system

Yang, Mengting, Zhang, Fan January 2010 (has links)
<p>First and foremost, we would like to thank to our supervisor Wagner Ourique de Moraisfor his valuable guidance and suggestions during the whole time of the thesis work. Hemotivated us contributed to our project and inspired us greatly.Furthermore, we would like to thank Anders Nilsson and Henrik Abrahamsson who arebusiness students at Halmstad University for the project idea. They gave us an opportunity toparticipate and learn from each other.Finally, we would like to thank you our friends for helping us this project.</p>
14

BookZone web shop

Alagic, Amir January 2007 (has links)
<p>My task was to create an e-commerce solution or web shop that is integrated with PayPal system. The intent of this paper is to show how this e-commerce web application was built and integrated with the PayPal system. </p><p>The underlying technology used in the implementation of the application includes .Net 2.0 framework (ASP.Net 2.0 and C# 2005 and Express edition of SQL Server 2005)</p>
15

Affärssystem för Gamersneed Sweden

Bertilsson, Mattias, Lindberg, Johan January 2007 (has links)
<p>This degree project deals with the creation of a business system for Gamersneed Sweden. </p><p>The system is divided into two parts, one windows appliction and one websolution.</p>
16

Misslyckade IT-projekt : Vilken fas i systemutvecklingens livscykel är mest bidragande

Hellberg, Bernt, Ståhl, Stefan January 2010 (has links)
<p>Many IT projects that have been developed in recent years are often considered to be unsuccessful. According to a study by Exido up to the 72% of all IT projects are considered to be failed. A failed IT projects means that the organizations that have ordered the new system may have higher costs or/and the system will not be ready in time. If costs are too high the new system might not be installed in the organization or if the system is not completed within the specified time frame the organization can become stagnant.</p><p>In this paper we conduct an investigation of the failure of IT projects there we will examine where, in the systems development lifecycle four different phases, projects fail. We will conduct an empirical study of each phase, where we describe the key steps in the process; we will also investigate failed IT projects that are linked to the current phase. After every empirical study of the phases we perform an analysis in which we describe what we believe is important to consider in the current phase, and which items have an important role in the phase that will contribute to that project fails.</p><p>We believe that the planning phase is the phase that is most important to carry out as detailed as possible when an IT project is developed. This is to ensure that the project will be successful. The phase structure of the whole project and important activities are carried out and they are affecting the other phases.</p>
17

Pointing, Placing, Touching : Physical Manipulation and Coordination Techniques for Interactive Meeting Spaces

Mattsson, Johan January 2007 (has links)
In the design and study of dedicated ubiquitous computing environments, efforts to enhance and support co-located collaborative activities and work have been a particular focus. In his vision of ubiquitous computing, Mark Weiser foresees a new era of computing, one that closes and follows on from the era of Personal Computing (Post Desktop). The vision involves simultaneous computations facilitated by a number of technical resources (services and artifacts) available in the environment. Ubiquitous Computing also draws on the perspective of embodied interaction: that our overall physical and social interaction, and the design of artifacts supporting interaction with people, places, and the environment, are two different perspectives sharing a common goal. This thesis addresses three critical aspects of interactive meeting spaces: Multi-device selection, Multi-device setup, and Multi-device direct manipulation. To do so, physical interaction techniques have been designed that make more visible the critical and central co-located manipulation and coordination actions in interactive meeting spaces. The tree designed physical interaction techniques, that have been developed and investigated are: the iwand, a pointing technique; the Magic Bowl, a placing technique; and Physical Cursors, a touching technique. In evaluation of the interaction techniques, addressed five problems that originated in observations during the development of interactive meeting spaces. How to: 1) identify and manipulate a physical object in order to select and control a particular service; 2) support the control of complementary combinations of services through physical manipulation; 3) capture, store and recall a preset group of services; 4) maintain and reuse presets, to preserve the prerequisite for a scene, under continually changing circumstances; and 5) design ways to manipulate physical widgets to enable a social protocol for coordination as an alternative to individual (invisible) manipulation? A tentative design pattern language developed, along with “sharing control”, a further developed sample of a design pattern, which applies to physical manipulations in interactive meeting spaces. Additionally, principles are described for conducting long-term studies of living-laboratory observations and for revisiting central design decisions. The principles and design patterns are drawn from designed interaction techniques and from the design and deployment of interactive meeting spaces. / QC 20100809
18

A Dynamic and Adaptive Information Security Awareness (DAISA) Approach

Casmir, Respickius January 2005 (has links)
Information systems fail not only because of problems with technology used and technical incompetence of professionals administering them but also because of lack of security awareness to the end users. In addition, various research results have revealed that security and reliability of IS/IT systems is a function of technology, processes and people. This research has focused on the latter aiming at developing an integrated information security education, training and awareness learning continuum. Particularly, the research has focused on developing countries where a little has been done to address information security learning continuum. The research has been done in two cyclic phases in which cycle one has chiefly addressed security education and training aspects whereas cycle two has mainly focused on security awareness aspects. Based on empirical analysis of security practices in organisations; the thesis proposes a Dynamic and Adaptive Information Security Awareness (DAISA) approach. Founded on six interdependent pillars, the approach delineates high level guidelines for establishing and maintaining information security awareness programs at workplaces.
19

A Socio-technical Analysis of Information Systems Security Assurance : A Case Study for Effective Assurance

Chaula, Job Asheri January 2006 (has links)
This thesis examines the concepts of Information System (IS) security assurance using a socio-technical framework. IS security assurance deals with the problem of estimating how well a particular security system will function efficiently and effectively in a specific operational environment. In such environments, the IS interact with other systems such as ethical, legal, operational and administrative. Security failure in any of these systems may result in security failure of the whole system. In this thesis a socio-technical framework is used to examine culture, usability problems, security internal controls, security requirements and re-use of security requirements of TANESCO information systems. TANESCO is the energy utility company in Tanzania where the case study was conducted. Results show that culture affects the way people approach IS security. Also results show that the socio-technical framework is effective in modeling systems security and its environment. The re-use of security requirements is also shown to significantly minimise the time taken when developing and improving security requirements for an IS. The overall purpose of this thesis has been to develop a framework for information systems security assurance. The resulting framework of thinking brings together numerous assurance concepts into a coherent explanation that should be useful for any organisation or evaluators seeking to understand the underlying principals of systems security assurance. It contains organisational, cultural, and technical issues that should be looked at when considering and applying systems security assurance methods and techniques.
20

ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach

Tarimo, Charles N. January 2006 (has links)
The consequences of Information and Communication Technology (ICT) revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes - almost on daily basis; impacting the way we work, learn and live. Following this revolution, governments around the world have recognised that the transformation from traditional government to electronic government is one of the most important public policy issues to embrace. Likewise, organisations and businesses around the world are transforming from traditional organisations and businesses to their electronic equivalent. However, to be a part in this revolution, it is important for the concerned governments and organisations to have an ability to differentiate between implementing a new IT/ICT system and a transformation to e-government, e-organisation, and e-business. E-government is not simply about implementing new ICT systems, but it is about changing business models and processes to do things differently and better. ICT offers the solutions, but e-government, eorganisation, and e-business are about changing the way they operate to achieve their mission objectives.Implicitly there are a number of key issues to be considered in this transformation. One such key issue is security, since many of the technical and social security control mechanisms that are in place today are rendered ineffective by the ICT revolution. As such, we can no longer rely entirely on our traditional security controls—e.g. physical access controls, security guards and locks—to ensure the security of an organisation’s assets, processes and communications. The multiplicity of new technical possibilities gives rise not only to new products, services and more efficient and effective ways of doing things, but also to the possibility of misuse of the technology. Consequently, new social and technical security controls are imperative in this revolution. However, research findings show that, in many cases, security issues come as an-after-thought in the ongoing transformations to ICT-enabled organisational or governmental contexts. In this thesis, the challenges of the process of computerisation and other changes due to ICT are investigated from a security point of view. An explorative study of both theoretical and practical aspects of addressing ICT security in organisations was performed. The findings from some organisations studied show that, organisations—as social-technical systems—are facing a myriad of problems in their effort to adequately and effectively implementing a sound ICT security program. As a result, the organisations, individuals, or nations as a whole; may fail in meeting the challenges of exploiting the benefits of ICT; due, in part, to their failure to manage the risks which ICT presents—not being ‘e-ready’ in ICT security matters. In view of the above, the following are the end products of the research: a Model of Security Knowledge, and a Social-Technical ICT Security Readiness Checklist. These end products draw from the available ICT-security knowledge-body and a practical experience from an empirical study conducted in Tanzania. We believe the model and checklist would serve as a starting point in assisting organisations having a similar security situation as those studied, to meet the security challenges of exploiting the benefits of ICT. By providing means for evaluation, formation and implementation of ICT security controls—both social and technical ones—the checklist can be helpful in managing the risks that ICT presents.

Page generated in 0.3212 seconds