• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 62
  • 25
  • 13
  • 12
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 128
  • 128
  • 128
  • 53
  • 46
  • 27
  • 23
  • 22
  • 22
  • 22
  • 18
  • 18
  • 16
  • 15
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Integration of Mobile Technologies with Routine Healthcare Services in Mozambique

Nhavoto, José António January 2017 (has links)
Mobile technologies are emerging as one way to help address health challenges in many countries, including in Least Developed Countries. Mobile technology can reach a large share of the population but in order to provide effective support to healthcare services, technology, information collection and dissemination, and work processes need to be well aligned. The thesis uses a design science methodological approach and mixes qualitative and quantitative data analysis to address the question of, How can mobile technologies be effectively integrated with routine healthcare services? The study concerns the design, implementation, and evaluation of a mobile technology-based system, called SMSaúde, with the aim of improving the care of patients with HIV/AIDS and tuberculosis in Mozambique. The work started with the elicitation of functional and user requirements, based on focus group discussions. An important challenge, as in many mHealth interventions, was the integration with routine healthcare services and the existing IT systems, as well as developing a scalable technical structure. The system has now been in routine use since 2013 in more than 16 healthcare clinics in Mozambique. Evaluation was done by a randomised controlled study. Analysis of patient records showed that retention in care in urban areas was significantly higher in the intervention group than in the control group. In a user study both patients and health professionals were very positive to the system. The thesis contributes to research by demonstrating how information system artefacts can be constructed and successfully implemented in resource-constrained settings. The practical contributions include the designed artefact itself as well as improved healthcare practices and mHealth policy recommendations.
72

Towards a Digital Analytics Maturity Model : A Design Science Research Approach

Andréasson, Magnus January 2017 (has links)
Digital analytics kallas den samling teknologier som med olika teknikeranalyserar digitala kanaler (webbsidor, email och även offline data) för attsöka förståelse för kunders beteenden och intentioner. Digital Analytics harblivit en mycket viktig komponent till en stor del webbaserade systemmiljöer,där den stödjer och underlättar affärer och beslutsfattande för organisationer.Men hur väl tillämpas dessa teknologier och hur ser den digitalatransformationen ut som utspelar sig inom organisationer, och hur kan manmäta denna digitala mognadsprocess?Denna studie tillämpar en Design Science Research-approach för att uppfyllamålet om att utveckla en Digital Analytics Maturity Model (DAMM) lämpligför små till medelstora företag, varav en expertpanel bestående av 6 st ledandeforskare inom mognadsforskning och Digital Analytic är tillsatt i formen av enDelphi-undersökning. Resultaten från studien visar bl.a att organisatoriskaaspekter spelar en viktig roll för Digital Analytics samt att utvecklingen av enfunktionsduglig DAMM som är redo att tas i burk är möjligt.
73

Can knowledge be created and shared on the move? The case of collaborative problem-solving in the mobile workers’ context

Francisco, Rosemary 30 June 2017 (has links)
Submitted by JOSIANE SANTOS DE OLIVEIRA (josianeso) on 2017-09-26T16:43:47Z No. of bitstreams: 1 Rosemary Francisco_.pdf: 7758052 bytes, checksum: 44ca1c4c6afa003c13d4783f220148be (MD5) / Made available in DSpace on 2017-09-26T16:43:47Z (GMT). No. of bitstreams: 1 Rosemary Francisco_.pdf: 7758052 bytes, checksum: 44ca1c4c6afa003c13d4783f220148be (MD5) Previous issue date: 2017-06-30 / Nenhuma / Mobile workers are professionals who frequently work on the move, far from a fixed workplace, often performing knowledge-intensive activities. Mobility brings challenges to the processes of knowledge creation and sharing of these workers, and the existing literature lacks theoretical frameworks to explain these phenomena. Considering this gap, this study seeks to answer the following research question: How knowledge creation and knowledge sharing are carried out in collaborative problem-solving situations in the mobile workers’ context? The primary purpose of this investigation is to analyse how knowledge creation and knowledge sharing are carried out in collaborative problem-solving situations in the mobile workers’ context. To reach the research goals, this study applied Activity Theory (AT) and its key concepts as a theoretical lens. This theoretical approach allowed better understanding both the individual (the mobile worker) as well as his relations in his/her social context. Besides, the adoption of the Design Science Research method (DSR) provided tools for a deeper understanding of the research problem and also to propose an approach to stimulate knowledge creation and sharing through collaborative problem-solving in the mobile workers’ context. The results of this study helped to understand the fundamental needs of mobile workers related to knowledge creation and knowledge sharing to solve work problems. It was observed that these workers use their ICT tools, especially mobile ICT, to conduct the majority of their collaborative problem-solving situations and subsequently, to create and share knowledge on the move. The findings also highlight how mobile technologies are used to support collaborative problem-solving in the mobile work’ context. Therefore, the key argument tested and supported in this thesis is that collaborative problem-solving mediated by mobile ICT can support and stimulate knowledge creation and knowledge sharing in the context of mobile workers. This research makes a theoretical contribution by exploring this key argument with the use of AT as a theoretical lens. Since this theory was not used so far to analyse practices of knowledge creation and sharing in the context of mobile workers, this study contributes to the expansion of this theory in this subject. The results of the empirical data also provided lessons from the practice that can contribute to the theory, mainly considering the diversity of workplaces that mobile workers can use to perform their work activity. Also, this study provides methodological and practical contributions; through a detailed descriptive of how to apply the DSR in IS (Information Systems) studies, in addition to the artifact developed that can be used in practice. Finally, this study addresses some questions that can be explored in future research. / Trabalhadores móveis são profissionais que freqüentemente trabalham em movimento, longe de um local de trabalho fixo, muitas vezes realizando atividades intensivas em conhecimento. A mobilidade traz desafios aos processos de criação e compartilhamento de conhecimento para esses trabalhadores, e a literatura existente carece de frameworks teóricos para explicar esses fenômenos. Considerando esta lacuna, este estudo procura responder à seguinte pergunta de pesquisa: Como a criação e o compartilhamento de conhecimento são realizados em situações colaborativas de resolução de problemas no contexto dos trabalhadores móveis? O objetivo principal deste estudo é analisar como a criação e o compartilhamento do conhecimento são realizados em situações colaborativas de resolução de problemas no contexto dos trabalhadores móveis. Para alcançar os objetivos da pesquisa, este estudo aplicou a Teoria da Atividade (AT) e seus conceitos-chave como uma lente teórica. Esta abordagem teórica permitiu uma melhor compreensão tanto do indivíduo (o trabalhador móvel) quanto das suas relações no seu contexto social. Além disso, a adoção do método de pesquisa Design Science Research (DSR) proporcionou ferramentas para uma compreensão mais profunda do problema de pesquisa e também para propor uma abordagem para estimular a criação e o compartilhamento do conhecimento por meio da colaboração na resolução de problemas no contexto dos trabalhadores móveis. Os resultados deste estudo ajudaram a compreender as necessidades fundamentais dos trabalhadores móveis em relação à criação e ao compartilhamento de conhecimento para a resolução de problemas de trabalho. Observou-se que esses trabalhadores utilizam suas ferramentas de TIC, especialmente as TIC móveis, para conduzir a maioria de suas situações colaborativas de resolução de problemas e, posteriormente, criar e compartilhar conhecimento em movimento. Os resultados também destacam como as tecnologias móveis são usadas para apoiar a resolução colaborativa de problemas no contexto do trabalho móvel. Portanto, o principal argumento testado e suportado por esta tese, indica que a resolução colaborativa de problemas, mediada por TICs móveis, pode apoiar e estimular a criação e o compartilhamento do conhecimento no contexto de trabalhadores móveis. Esta pesquisa faz uma contribuição teórica explorando este argumento chave com o uso de AT como uma lente teórica. Uma vez que esta teoria não foi utilizada até agora para analisar as práticas de criação e compartilhamento de conhecimento no contexto dos trabalhadores móveis, este estudo contribui para a expansão desta teoria neste assunto. Os resultados empíricos também forneceram lições da prática que podem contribuir para a teoria, considerando, principalmente, a diversidade de locais de trabalho que os trabalhadores móveis podem usar para realizar suas atividades de trabalho. Além disso, este estudo fornece contribuições metodológicas e práticas; por meio de um descritivo detalhado de como aplicar o DSR em estudos de SI (Sistemas de Informação), além do artefato desenvolvido que pode ser usado na prática. Finalmente, este estudo endereça algumas questões que podem ser exploradas em futuras pesquisas.
74

Utilização do pensamento sistêmico e planejamento por cenários em setores produtivos: uma aplicação no setor de vestuário na região do Alto Uruguai

Serrano, Rosiane 27 May 2013 (has links)
Submitted by Maicon Juliano Schmidt (maicons) on 2015-07-07T13:18:41Z No. of bitstreams: 1 Rosiane Serrano.pdf: 2567085 bytes, checksum: 9a27b2246b749bfc0cf46f79adb48dbe (MD5) / Made available in DSpace on 2015-07-07T13:18:41Z (GMT). No. of bitstreams: 1 Rosiane Serrano.pdf: 2567085 bytes, checksum: 9a27b2246b749bfc0cf46f79adb48dbe (MD5) Previous issue date: 2013-05-27 / Nenhuma / Em setores complexos como o de vestuário, no qual a competitividade está atrelada à diferenciação dos produtos, realizar estudos setoriais que possibilitem identificar e prospectar tendências é essencial para o desenvolvimento de estratégias que auxiliem no posicionamento competitivo do setor. Neste contexto, a presente pesquisa tem como objetivo aplicar a abordagem sistêmica com o intuito de buscar melhorias alavancadoras do desempenho de um setor. O método de pesquisa abordado foi o Design Science Research, que se caracteriza por ser um processo que usa o conhecimento para projetar artefatos que serão utilizados e submetidos à análise para verificar sua eficácia. Nessas condições, foram aplicados o Pensamento Sistêmico e o Planejamento por Cenários no Setor de Vestuário, especificamente na região norte do Rio Grande do Sul, denominada Alto Uruguai. Inicialmente, conceituou-se a problemática envolvida neste estudo, construiu-se o referencial teórico, abordando-se os principais tópicos para o desenvolvimento da pesquisa, sendo que, posteriormente, foram propostos esboços de pesquisa e, na sequência, realizou-se a aplicação. Ao final, foi feita uma avaliação, buscando evidências sobre o método aplicado e sua efetividade, bem como para atender a um dos objetivos específicos. Como resultados, a pesquisa apresenta um Modelo de Governança visando à sinergia dos diversos atores do setor, um Plano de Ação desenvolvido para a efetividade das ações de alavancagem do segmento, além de um banco de dados inicial do mesmo, contendo as variáveis importantes para o seu contexto. Por fim, evidencia-se, através das entrevistas e da aprendizagem relatada, que o método aplicado permite o entendimento das variáveis que circundam o setor, sendo aplicável para estudos setoriais. / In complex sectors as the clothing sector, which competitiveness is linked to product’s differentiation, it’s essential realize sectorial studies that allows identify and prospect trends to develop strategies that helps in the sector competitive position. In this context, this research has as main objective apply the systemic approach in order to improve the sector performance. The research method used was the Design Science Research, which is characterized by being a process which uses the knowledge to project artifacts that will be used and analyzed to prove its efficacy. Under this conditions, it was applied the System Thinking and the Scenario Planning in the clothing sector, specifically in the north region of Rio Grande do Sul, named Alto Uruguai. Initially, the situation involved in this study was conceptualized, the theoretical referential was described approaching the main topics to the research development. After the method was applied and evaluated, searching for evidences about the method and its effectiveness in order to understand one of the specific objectives. As results the research presents a Governance Model viewing the actor’s sector synergy, an Action Plan developed to ensure the actions’ effectiveness, besides an initial data base containing important variables to the context. Finally, it’s possible to evidence, through interviews and the learning that the applied method allows the variables understanding, being usable to sectorial studies.
75

Desenvolvimento de um serviço de informações gamificado como uma estratégia de engajamento do consumidor com a marca

Miozzo, Regina Kossmann 03 September 2015 (has links)
Submitted by Silvana Teresinha Dornelles Studzinski (sstudzinski) on 2016-02-05T13:01:28Z No. of bitstreams: 1 Regina Kossmann Miozzo_.pdf: 3193134 bytes, checksum: 4b94aaaa2557eba1c6f488d6fc5765ad (MD5) / Made available in DSpace on 2016-02-05T13:01:28Z (GMT). No. of bitstreams: 1 Regina Kossmann Miozzo_.pdf: 3193134 bytes, checksum: 4b94aaaa2557eba1c6f488d6fc5765ad (MD5) Previous issue date: 2015-09-03 / Nenhuma / A gamificação (do Inglês gamification) é um fenômeno crescente que tem despertado o interesse tanto de pesquisadores quanto de executivos. Elementos de jogos têm sido aplicados em contextos e atividades diversas às do entretenimento com o intuito de enriquecer a experiência de quem as executa, gerando maior interesse, envolvimento, diversão e engajamento. Desta forma, a gamificação tem sido utilizada como um recurso para motivar comportamentos de engajamento dos consumidores, tornando-se uma estratégia de marketing. Contudo, até o presente estudo, não foram encontrados na literatura estudos empíricos que apliquem a gamificação para gerar engajamento em consumidores de bens duráveis, como as máquinas agrícolas. Assim, o presente estudo tem como objetivo analisar como os aspectos da gamificação podem desenvolver o envolvimento no consumidor de máquinas agrícolas em uma experiência interativa digital, identificando os elementos mais relevantes para incentivar comportamentos de engajamento com uma marca. A pesquisa adota uma abordagem qualitativa, tendo como método de pesquisa a metodologia Design Science Research (DSR). O estudo foi realizado em uma empresa que desenvolve, produz e comercializa máquinas agrícolas e envolveu consumidores de tratores e colheitadeiras. As atividades realizadas compreenderam entrevistas semiestruturadas e questionários que objetivaram compreender o problema tratado na pesquisa, levantar a motivação da empresa em abordá-lo e obter subsídios para desenhar um artefato que auxiliasse na solução do problema. Os dados coletados na empresa e com consumidores permitiram desenhar e implementar um protótipo de média fidelidade do artefato proposto. O protótipo foi usado e avaliado pelos consumidores, visando verificar o potencial de gamificação para desenvolver o envolvimento e consequentes intenções de engajamento nos consumidores de máquinas agrícolas. Os principais resultados indicam que a gamificação tem o potencial de desenvolver o envolvimento nos consumidores de máquinas agrícolas, porém existem elementos e riscos a serem considerados, em especial os relacionados a suas motivações e interesses. Foram identificadas três perspectivas pelas quais a geração de valor pode ser conduzida, através da gamificação, em direção ao envolvimento e engajamento com uma marca: utilidade, prazer e relacionamento social. Esta pesquisa contribui para enriquecer a literatura sobre a gamificação, acrescentando um estudo empírico sobre seu uso no contexto do marketing. Também demonstra a aplicação de um método para o uso da gamificação em soluções que objetivam estimular envolvimento nos consumidores e intenções de engajamento com uma marca. / Gamification is a growing phenomenon that concerns both researchers and practitioners. Game elements have been applied in several contexts and activities out of entertainment with the aim of enriching the experiences of those who execute them, generating higher levels of interest, involvement, entertainment and engagement. Gamification has been suggested, especially by IT industry, as a marketing strategy to develop consumer engagement. However, there is no empirical research related to the use of gamification to promote engagement in utilitarian brands consumers such as agricultural machinery. The present study aims to analyze which aspects of gamification can develop the involvement of the agricultural machinery consumer in an interactive digital experience, identifying the most relevant elements on encouraging consumer brand engagement behaviors. The research adopts a qualitative approach, adopting the Design Science Research (DSR) as the research method. DSR was applied to the development of a technological artifact which was presented and evaluated by agricultural machinery consumers. In order to get empirical data, the study was performed into a company that develops, produces and commercializes agricultural machinery, involving marketing, IT and after sales professionals, and Brazilian agricultural machinery consumers. The activities performed comprehended semi structured interviews and questionnaires that aimed to understand the problem to be addressed to identify the company´s motivation to find a solution and to get subsidies to design the artifact. Data was collected to design and implement a medium fidelity prototype of the proposed artifact. The prototype was used and evaluated by consumers in order to verify gamification's potential on the involvement development and consequent engagement intentions. The main results indicate gamification does have the potential to develop the involvement of agricultural machinery consumers. However, there are element and risks to be considered, especially the ones related to the consumer's interests and motivations. Three perspectives were identified, by which the generation of value through gamification can be driven towards the brand engagement: utility, pleasure and social relationship. This research contributes to the enrichment of the gamification literature, adding empirical study about its usage in marketing context and also demonstrating the usage of a method to implement gamification in a solution to stimulate consumer involvement and engagement behavior intention.
76

Modelo de distribuição de recursos orçamentários baseado em indicadores de desempenho para um instituto federal de educação, ciência e tecnologia

Gori, Rodrigo Soares Lelis 15 July 2016 (has links)
Submitted by Silvana Teresinha Dornelles Studzinski (sstudzinski) on 2016-08-25T11:59:57Z No. of bitstreams: 1 Rodrigo Soares Lelis Gori_.pdf: 3233868 bytes, checksum: 85348cf4692a41fcec31474ebaaed132 (MD5) / Made available in DSpace on 2016-08-25T11:59:57Z (GMT). No. of bitstreams: 1 Rodrigo Soares Lelis Gori_.pdf: 3233868 bytes, checksum: 85348cf4692a41fcec31474ebaaed132 (MD5) Previous issue date: 2016-07-15 / Nenhuma / As Instituições Federais de Ensino buscam, constantemente, implementar avanços em um de seus principais instrumentos de planejamento e controle, o orçamento público anual. Em vista da natureza e das características especiais destas instituições, o seu processo orçamentário se reveste de especificidades e exige estudos e análise para melhor compreensão desse fenômeno. Surge, então, como um instrumento de auxílio na gestão orçamentária a avaliação de desempenho através de indicadores. A pesquisa avança para a proposição de um modelo que melhor trate o objeto deste estudo. Logo, para a realização deste trabalho, foi utilizada a DSR como método de pesquisa, apoiada pelo método AHP. Assim, o presente estudo se propôs a desenvolver um modelo de distribuição de recursos orçamentários, baseado em indicadores de desempenho para as unidades de ensino que compõem um Instituto Federal de Educação, Ciência e Tecnologia. A instituição escolhida localiza-se na região Norte. O modelo proposto foi aplicado no processo de distribuição de orçamento para oito unidades que compõem a referida instituição, adotando dois critérios, número de discentes regularmente matriculados e a avaliação de indicadores de desempenho. Três etapas integradas entre si, mas com finalidades diferentes estruturam o modelo proposto. A primeira etapa do modelo consiste na avaliação dos indicadores de desempenho, por meio do método AHP, indicadores estes selecionados por um grupo de nove especialistas. A segunda etapa consiste na obtenção de uma pontuação para cada unidade de ensino da instituição pesquisada, de acordo com a avaliação dos indicadores de desempenho. A terceira e última etapa consiste na definição de um peso para cada unidade de ensino para aplicação no orçamento de 2016 da instituição. Como principal resultado, verificou-se que o modelo proposto, quando comparado com o modelo atual, imprime uma nova postura no processo orçamentário da instituição, implementando mecanismos que permitem valorizar o esforço acadêmico de suas unidades através do uso dos indicadores de desempenho, proporcionando uma equalização entre as unidades que compõem a instituição. / Federal Education Institutions constantly seek to implement advances in one of their main planning and control tools, which is the annual public budget. Due to their nature and special features the institutions’ budget process is very specific, so it demands studies and analysis in order to better understand this phenomenon. As a result of this, and like an aid in budget management, arises the performance evaluation through indicators. The research goes forward for the proposition of a model that better addresses the subject of this study. So, to accomplish this work, it was used the DSR (Design Science Research) as the research method which was supported by AHP (Analytic Hierarchy Process). Thus, the present study had as its proposal to develop a distribution model of budget resources, based on performance indicators for the teaching units that comprise a Federal Institute of Education, Science and Technology. The chosen institution is located in the North of Brazil. The proposed model was applied on the budget allocation process in eight units that are part of the institution mentioned above. Two criteria were adopted: the number of enrolled students and the performance indicators evaluation. Three integrated steps, but with different purposes, have structured the proposed model. The first step consists in the performance indicators evaluation, through the AHP method; such indicators were selected by a group of nine experts. The second step consists in obtaining a score for each teaching unit of the researched institution, according to the assessment of performance indicators. The third and final step consists in defining a weight for each teaching unit for using in the 2016 budget of the institution. As the main result, it was found out that the proposed model, when compared to the current one, presents a new approach in the institution budget process, implementing tools that enhance the academic effort of its units by using the performance indicators, providing equalization between the units that comprise the institution.
77

Inter-Organizational Social Network Information Systems: Diagnosing and Design

Mullarkey, Matthew T 30 June 2014 (has links)
While IS research into on-line Inter-Personal (IP) Social Networks (SN) is highly visible, there has been surprisingly little focus on the use of on-line social networks for Inter-Organizational (IO) communications, interactions, and goal achievement. We explore the issues and challenges facing organizations in their design and use of inter-organizational social network information systems (IO SNIS). Artifact design principles are drawn from a new and insightful model that contrasts the advantages of existing innovative inter-personal (IP) SNIS artifacts with Social Network Theory on differences between IP and IO Social Networks. This research extends the existing streams of IS social networking research into the inter-organizational domain and encourages additional IS research into the analysis, design, and build of artifacts that animate the social behavior of organizations. We develop a key design concept for IO SNIS and establish the design principles underlying the general artifact design and the specific design features that apply the design constructs to an exemplar IO social domain. This dissertation uses Action Design Research (ADR) approach within the Design Science Research (DSR) paradigm to formulate the research opportunity and anticipate a practice-inspired and theory-ingrained artifact. The researcher works with a practitioner team in the domain of mid-market private equity (MMPE) to explore the model and evaluate existing on-line inter-organizational artifacts to establish specific design features for an IO SNIS artifact. We find that the design principles can generalize from the IO SNIS Design Concept Model to other IO Social domains and that the design features can be used to build an instantiation of IO SNIS in the Private Equity domain.
78

Multi-Step Tokenization of Automated Clearing House Payment Transactions

Alexander, Privin 08 November 2017 (has links)
Since its beginnings in 1974, the Automated Clearing House (ACH) network has grown into one of the largest, safest, and most efficient payment systems in the world. An ACH transaction is an electronic funds transfer between bank accounts using a batch processing system. Currently, the ACH Network moves almost $43 trillion and 25 billion electronic financial transactions each year. With the increasing movement toward an electronic, interconnected and mobile infrastructure, it is critical that electronic payments work safely and efficiently for all users. ACH transactions carry sensitive data, such as a consumer's name, account number, tax identification number, account holder name, address, or social security number. ACH fraud consists of the theft of funds through the Automated Clearing House financial transaction network (Accounts Receivable & Order-to-Cash Network, 2012). If the transactions are intercepted by fraudulent activities, either during transit or during rest, the sensitive customer data can be used to steal the transferred funds, which can cause financial and reputational damage to ACH network participants and consumers. Even though the National Automated Clearing House Association (NACHA) requires ACH participants to use commercially reasonable encryption and authentication procedures, the risks associated with employee error or negligence, physical theft, and insider theft of data remain substantial. The ACH network that handles 40 billion transactions annually has consumer and corporate financial information. As the ACH network emerges as a prominent payment channel, proactive steps must be taken to guarantee consumer safety. The primary research question “How can opportunities to commit ACH fraud by insiders be inhibited by masking sensitive data in the ACH transactions life cycle?” is addressed employing design science research methodology with special focus on this specific question: Will use of Multi-step tokens in life cycle of ACH transactions lower the risk of sensitive data exposure? To demonstrate the extent to which the Multi-step tokens in the life cycle of ACH transactions lower the risk of sensitive data exposure, the following two sub-questions will be answered: • How to model and simulate sensitive data exposure risk in current ACH transaction life cycle? • How to model and simulate sensitive data exposure risk in the multi-step tokenized ACH transaction life cycle? The research findings through proof of concept simulations confirm that sensitive consumer personal identifiable information shared in ACH network can be made more secure from insider threat opportunities by multi-step tokenization of ACH data. In the to-be system, the real account number will not be used to post the actual financial transaction. Only tokenized account number will be used by RDFI (Receiving Depository Financial Institution) to post the financial transaction. Even if the ODFI (Originating Depository Financial Institution) initiate the financial transaction using real account number, RDFI will reject the transaction back to the originator to resend the transaction using the token value. For the same account number, RDFI will have different token values based on SEC (Standard Entry Class) code, origin, ODFI, transaction type etc. The account token value will be generated only if ODFI sends a token request separately to RDFI in a multi-step manner. The research findings suggest that multi-step tokenization can be used to generate and validate unique transaction path as a function of the transaction origin number, originating depository financial institution, Standard Entry class, Receiving depository financial institution and account number. Even if the account or token value gets misplaced, the data will be of no use to the person having the information. The cipher can be further strengthened by including additional unique ACH data elements. The findings stem from proof of concept development and testing of conceptual, empirical and simulated models of current ACH network, insider breach scenarios, and multi-step tokenized systems. The study findings were augmented by running different model scenarios and comparing the outputs for breaches, network traffic and costs. The study findings conclude with an implementation proposal of the findings in the ACH network and opportunities for further research on the topic.
79

CrashApp™ –Concurrent Multiple Stakeholder Evaluation of a DSR Artefact

Papp, Timothy M. 21 September 2017 (has links)
The successful design, implementation, deployment, and use of mobile software applications is rare. While many mobile apps are developed, few succeed. This design science research project builds and evaluates CrashApp™, a mobile application that connects lawyers and clients before, during, and after car accidents. The effective, widespread use of this app depends on satisfying the needs of three groups of stakeholders – the end-users (clients), the owners (lawyers), and the software developers. The research objective is to investigate the key differences among the three stakeholder groups on evaluation criteria for mobile app success. Evaluation strategies and methods are selected to collect data that measures each group’s satisfaction with the constructed application artefact. Research contributions are the identification of multiple stakeholder groups and the ability to design rich evaluation strategies that provide measures of application success. Practice contributions are the design and development of a useful mobile app that provides needed services to the client and effective client connections for the law firm to interact with the clients. The project produced an instantiation of the design artefact CrashApp™ mobile application, which was evaluated with a naturalistic evaluation approach, including the following methods and techniques: focus groups, focused surveys, usability surveys, and real life tests and assessments.
80

Security management process in distributed, large scale high performance systems

Kraus, K. (Klemens) 25 November 2014 (has links)
Abstract In recent years the number of attacks on critical infrastructure has not only increased substantially but such attacks have also shown higher sophistication. With the increasing interconnection of information systems it is common that critical systems communicate and share information outside an organization’s networks for many different scenarios. In the academic world as well as in existing security implementations, focus is placed on individual aspects of the security process - for example, network security, legal and regulatory compliance and privacy - without considering the process on the whole. This work focuses on solving this security gap of critical infrastructure by providing solutions for emerging attack vectors. Using design science research methods, a model was developed that seeks to combine these individual security aspects to form a complete security management process (SMP). This SMP introduces, among others theories of security topics, recommended best practices and a security organization structure. An instantiation of the SMP model was implemented for a large-scale critical infrastructure. This work introduces the system developed, its architecture, personnel hierarchy and security relevant workflows. Due to employed surveillance networks, specialized requirements for bandwidth utilization while preserving data security were present. Thus algorithms for solving these requirements are introduced as sub-constructs. Other focus points are the managerial aspects of sensors deployed in surveillance networks and the automatic processing of the sensor data to perform data fusion. Algorithms for both tasks were developed for the specific system but could be generalized for other instantiations. Verification was performed by empirical studies of the instantiation in two separate steps. First the instantiation of the SMP was analyzed as a whole. One of the main quality factors of the instantiation is incident response time, especially in complex scenarios. Consequently measurements of response times when handling incidents compared to the traditional system were performed in different scenarios. System usability was then verified by user acceptance tests of operators and administrators. Both studies indicate significant improvements compared to traditional security systems. Secondly, the sub-constructs communication optimizations and the data fusion algorithm were verified showing substantial improvements in their corresponding areas. / Tiivistelmä Viime vuosina kriittisiin infrastruktuureihin on kohdistunut merkittävästi aiempaa enemmän erilaisia hyökkäyksiä. Tietojärjestelmien välisten yhteyksien lisääntymisen myötä myös kriittiset järjestelmät kommunikoivat nykyään keskenään ja jakavat tietoa organisaation sisäisten verkkojen ulkopuolellekin. Akateemisessa tutkimuksessa ja turvajärjestelmien toteutuksissa on huomio kohdistettu turvallisuutta koskevien prosessien yksittäisiin piirteisiin, kuten esimerkiksi verkkojen turvallisuuteen, lakien ja sääntöjen noudattamiseen ja yksityisyyteen, miettimättä prosesseja kokonaisuutena. Väitöstutkimuksen tavoitteena on ollut ratkaista tämä kriittisten infrastruktuurien turvallisuusongelma tarjoamalla ratkaisuja, jotka paljastavat mahdollisia hyökkäysreittejä. Väitöstutkimuksessa kehitettiin suunnittelutieteellisen tutkimuksen avulla lähestymistapa, joka yhdistää yksittäiset turvallisuusnäkökohdat ja muodostaa näin turvallisuuden kokonaishallinnan prosessin mallin. Malli hyödyntää erilaisia turvallisuusteorioita, suositeltuja hyviä käytäntöjä ja turvallisen organisaation rakennemalleja. Mallista kehitettiin esimerkkitoteutus laajamittaista kriittistä infrastruktuuria varten. Tämä väitöskirja esittelee kehitetyn järjestelmän, sen arkkitehtuurin, henkilökuntahierarkian ja turvallisuuden kannalta relevantit työnkulkukaaviot. Työssä huomioitiin laajan valvontaverkoston edellyttämät erityisvaatimukset tilanteessa, jossa tietoturvallisuuden säilyttäminen oli tärkeää. Myös näiden erityisvaatimuksiin liittyvien mallin osien ratkaisualgoritmit esitetään. Muita työn tuotoksia ovat hallinnolliset näkökulmat, jotka on huomioitava, kun valvonnalle tärkeitä sensoreita hallinnoidaan ja sensorien tuottamaa dataa yhdistellään. Algoritmit luotiin esimerkkiympäristöön, mutta niitä on mahdollista soveltaa muihinkin toteutuksiin. Toteutuksen oikeellisuuden todentamisessa käytettiin empiirisiä ympäristöjä kahdessa eri vaiheessa. Ensiksi turvallisuusprosessin kokonaishallinnan malli analysoitiin kokonaisuutena. Merkittävä laatutekijä oli havaintotapahtuman vasteaika erityisesti monimutkaisissa skenaarioissa. Siksi työssä esitellään eri skenaarioiden avulla tapahtumanhallinnan vasteaikojen mittauksia suhteessa perinteisiin järjestelmiin. Tämän jälkeen järjestelmän käytettävyys todennettiin operaattorien ja hallintohenkilöstön kanssa tehtyjen hyväksymistestien avulla. Testit osoittivat huomattavaa parannusta verrattuna perinteisiin turvajärjestelmiin. Toiseksi verifiointiin mallin osien kommunikaation optimointi ja algoritmien toimivuus erikseen ja niissäkin ilmeni huomattavia parannuksia perinteisiin järjestelmiin verrattuna.

Page generated in 0.0619 seconds