Spelling suggestions: "subject:"6electronic data processing departments"" "subject:"belectronic data processing departments""
31 |
An empirical investigation of the determinants of information systems outsourcingSmith, Michael Alan 05 1900 (has links)
No description available.
|
32 |
The determinants of customer perceptions in a dynamic business environment an exploratory analysis of the ASP business model /Liang, Yan-Mei (Amy) January 2008 (has links)
Thesis (Ph.D.)--University of Waikato, 2008. / Title from PDF cover (viewed October 1, 2008) Includes bibliographical references (p. [331]-366)
|
33 |
Computer support effectiveness : an exploratory study /Elliott, Marlene January 1900 (has links)
Thesis (M.B.A.)--Carleton University, 2002. / Includes bibliographical references (p. 236-240). Also available in electronic format on the Internet.
|
34 |
Perception of organisational politics and workplace innovation : an investigation of the perceptions and behaviour of staff in an Australian IT services organisation /Baxter, David. January 2004 (has links)
Thesis (D.B.A.)--Swinburne University of Technology, Australian Graduate School of Entrepreneurship, 2004. / A thesis submitted to the fulfilment of the requirements for the degree of Doctor of Philosophy, Australian Graduate School of Entrepreneurship, Swinburne University of Technology, 2004. Typescript. Includes bibliographical references (p. 229-230).
|
35 |
A study of the computer systems development process of a large private companyLi, Kwok-hung. January 1983 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1983. / Also available in print.
|
36 |
A case study of IT outsourcing in Hong Kong government /Lam, Cheuk-yung. January 1995 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1995. / Includes bibliographical references (leaves 95-97).
|
37 |
Distributed authentication for resource controlBurdis, Keith Robert January 2000 (has links)
This thesis examines distributed authentication in the process of controlling computing resources. We investigate user sign-on and two of the main authentication technologies that can be used to control a resource through authentication and providing additional security services. The problems with the existing sign-on scenario are that users have too much credential information to manage and are prompted for this information too often. Single Sign-On (SSO) is a viable solution to this problem if physical procedures are introduced to minimise the risks associated with its use. The Generic Security Services API (GSS-API) provides security services in a manner in- dependent of the environment in which these security services are used, encapsulating security functionality and insulating users from changes in security technology. The un- derlying security functionality is provided by GSS-API mechanisms. We developed the Secure Remote Password GSS-API Mechanism (SRPGM) to provide a mechanism that has low infrastructure requirements, is password-based and does not require the use of long-term asymmetric keys. We provide implementations of the Java GSS-API bindings and the LIPKEY and SRPGM GSS-API mechanisms. The Secure Authentication and Security Layer (SASL) provides security to connection- based Internet protocols. After finding deficiencies in existing SASL mechanisms we de- veloped the Secure Remote Password SASL mechanism (SRP-SASL) that provides strong password-based authentication and countermeasures against known attacks, while still be- ing simple and easy to implement. We provide implementations of the Java SASL binding and several SASL mechanisms, including SRP-SASL.
|
38 |
The application of artificial intelligence within information security.De Ru, Willem Gerhardus 17 August 2012 (has links)
D.Phil. / Computer-based information systems will probably always have to contend with security issues. Much research have already gone into the field of information security. These research results have yielded some very sophisticated and effective security mechanisms and procedures. However, due to the ever increasing sophistication of criminals, combined with the ever changing and evolving information technology environment, some limitations still exist within the field of information security. Recent years have seen the proliferation of products embracing so-called artificial intelligence technologies. These products are in fields as diverse as engineering, business and medicine. The successes achieved in these fields pose the question whether artificial intelligence has a role to play within the field of information security. This thesis discusses limitations within information security and proposes ways in which artificial intelligence can be effectively applied to address these limitations. Specifically, the fields of authentication and risk analysis are identified as research fields where artificial intelligence has much to offer. These fields are explored in the context of their limitations and ways in which artificial intelligence can be applied to address these limitations. This thesis identifies two mainstream approaches in the attainment of artificial intelligence. These mainstream approaches are referred to as the "traditional" approach and the "non-traditional" approach. The traditional approach is based on symbolic processing, as opposed to the non-traditional approach, which is based on an abstraction of human reasoning. A representative technology from each of these mainstream approaches is selected to research their applicability within information security. Actual working prototypes of artificial intelligence techniques were developed to substantiate the results obtained in this research.
|
39 |
A framework towards effective control in information security governanceViljoen, Melanie January 2009 (has links)
The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that aims to improve the visibility and contribute to better management of information security throughout an organization by enabling the provision of summarized, comprehensive information security management information to all managers in an affordable manner.
|
40 |
Strategies for sourcing IT skills for South African tertiary institutionsMoller, Alison January 2004 (has links)
Traditional methods of IT recruitment in tertiary institutions need to be reviewed and more modern approaches analysed. A lot of successes and failures have been reported for each type of sourcing strategy in the IT sector. Many organizations have been liquidated due to poorly planned mergers, takeovers, and total outsourcing strategic shifts. The primary objective is to review the current IT sourcing strategies in tertiary institutions and to analyse and discuss the benefits and limitations of employing permanent IT staff, contract workers or outsourced staff.
|
Page generated in 0.1308 seconds