161 |
Řízení komunikace v projektech IS/ICT / Communications management in IS/ICT projectsMacháčková, Lenka January 2008 (has links)
Práce upozorňuje na problematiku komunikace v projektovém řízení, poukazuje na hlavní principy jejího řízení v projektech, představuje reálný přístup projektových manažerů k projektové komunikaci a navrhuje rozšíření metodiky MMDIS ŘÍP o oblast řízení komunikace.
|
162 |
Lokalizace a přizpůsobení metodiky OpenUP / Localization and customization of OpenUP methodologyRejnková, Petra January 2010 (has links)
These days there are a lot of methodologies which can be used for IS/ICT implementation projects. Apart from traditional rigorous methodologies such as Rational Unified Process (RUP), there are also agile methodologies, which are characterized by positive approach to change and iterative development with very short iterations. One of these methodologies is OpenUP, which combines both agile and rigorous principles. OpenUP covers the most important factors necessary to focus on during software development, but on the other hand it also respects the fact that each project is unique. That is why it offers the possibility to extend or customize its content for specific requirements. The main objective of this diploma is to localize and customize OpenUP methodology for the projects which are running within the courses of software engineering at the University of Economics in Prague. The result if this customization and localization is a methodology suitable for small software projects called MMSP. This diploma also pursues other objectives like to find and characterize tools suitable for administration and customization of the methodology. These objectives were achieved by deep analysis of various sources about OpenUP methodology, information system development projects and methodologies of IS/ICT development. The resulting methodology was not only based on these information but it also results from experiences and best practices from the projects at the University of Economics in Prague and from consultations with experts in practice. The key benefit of this diploma is a complete Czech localized methodology MMSP which can be used both for school and real projects of IS/ICT development. MMSP is available in a form that can be easily embraced, further customized and administrated.
|
163 |
Informační systém procesně řízené SME / Information system of process-driven SMEMareček, Jaromír January 2011 (has links)
The thesis deals with the development of an information system in terms of small and medium-sized process-driven organizations. The main objectives of the study is to analyze the requirements of IS process-driven SMEs, further analyze the problems in the creation of this IS, generalize the obtained conclusions and formulate methodical recommendations for the creation of the information process-driven SMEs. The thesis consists of the first, more theoretical part and the second more practical part, which is based on the knowledge formulated in the first part. The thesis builds on experience gained by author in the project of reengineering processes and information system design in a small process-driven organization. All procedures are illustrated for better understanding and verified on specific company from the project. The thesis is written in sufficiently general, however, that its conclusions and recommendations are applicable to the greatest number of process-driven SMEs. The first part presents the basic principles of process management, improvement and reengineering business processes and examines the relationship of information system and business of organization. The contribution of this part is mainly to clarify the role of IS in the process-driven organization, which must be respected in the development of IS. The second part of the thesis analyze the requirements of the IS process-driven SMEs which are necessary to ensure support of business described in the previous section. It also describes ways to acquire and formulate requirements. Then lists the problems that accompany the creation of the IS in an effort to meet the previous requirements. The thesis ends with the formulation of methodological recommendations for each phase of the creating IS and summary conclusions. Especially is accented the importance of BPR and SOA for the final form of the IS.
|
164 |
Dílčí strategie podniku - ICT strategie / Partial Strategies of an Enterprise - ICT StrategyVaněk, Jan January 2010 (has links)
The focus of this study is the Strategic analysis and the proposal of the partial ICT Strategy of the Trade and Distribution Company K&V Electro s.c. dealing with the sale of electro technical material. The first part is the strategic analysis theory divided to external analysis exploring macro and micro business space and the internal analysis assessing the internal company environment and basic factors of the company style of work resulting with strengths and weakness features of the business. The author decided to use the SWOT analysis method to describe and assess the strategic analysis and describes this method`s theory too. The particular presentation of the mentioned company followed together with the internal analysis. The practical part of the study deals with analysis, tests and assessment particular factors which characterised the company, resulted with the SWOT matrix and the development of the conclusions and the strategy choice determination. The last chapter contents the final assessment.
|
165 |
Don’t hear about us, hear from us : Den Islamska Statens offentliga rekryteringRembe Mc Hugh, Sean January 2015 (has links)
No description available.
|
166 |
Podnikový informační systém / Company information systemBoháček, Petr January 2008 (has links)
This master's thesis deals with the analysis of the requirements placed on the technical support information system which should be used in the software developing company, lying emphasis on the improvement of the processes inside an organization. The basic functions of this system are the collecting of information about all kinds of work which the company employees concentrate on and the possibility of statistics generating. Moreover, it is also possible to implement further extensions to the system which will not only enable other functions that are not related to the primary goal of the system to be integrated; but also to define new user roles for which various limited parts of the system will be accessible.
|
167 |
Posouzení informačního systému firmy a návrh změn / Information System Assessment and Proposal for ICT ModificationPetrová, Pavla January 2013 (has links)
This dissertation is dealing with the issue of information systems in business environment. The practical part focusses on examining the contemporary solutions IS/IT at a chosen hotel with the help of analysis HOS 8 and ZEFIS. Based on these analyses the final part of this thesis proposes solutions for the improvement of the current state of IS from balance perspective as well as efficiency.
|
168 |
Analýza informačního systému ISAD a návrh jeho změn / The Analysis of the ISAD Information System and Change ProposalSchoffer, Pavel January 2016 (has links)
This diploma thesis focuses on the information system ISAD owned by ISIT a.c. Primary part of the project is composed of analysis of the system and used technologies. Another part is concentrated on integration of the system for given customer and possibilities of enhancement. Project also contains proposals of new and enhancements of current functionality of the system.
|
169 |
Expanding Protection Motivation Theory: The Role of Individual Experience in Information Security Policy ComplianceMutchler, Leigh A (Leigh Ann) 15 December 2012 (has links)
The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual’s experience in the context of information security behavior was explored through the lens of protection motivation theory. The practical foundation was provided by the framework of Security Education, Training, and Awareness (SETA) programs which are typically used by organizations within the United States to instruct employees regarding information security. A pilot study and primary study were conducted with separate data collections and analyses. Both existing and new measures were tested in the study which used a Modified Solomon Four Group Design to accommodate data collection via a web-based survey that included a two-treatment experimental component. The primary contribution to academia proposed in this study was to expand the protection motivation theory by including direct and vicarious experience regarding both threats and responses to the threats. Clear definitions and valid and reliable reflective measures for each of the four experience constructs were developed and are presented in this dissertation. Furthermore, the study demonstrated that all four forms of experience play an important part in the prediction of the primary constructs in the protection motivation model, and as such ultimately play an important part in the prediction of behavioral intent in the context of information security. The primary contribution to practice was expected to be specifically related to the application of fear appeals within a SETA instructional framework. The contribution to practice made by this dissertation became instead the implications resulting from the strong performance of the experience constructs. Specifically, experience, both direct and vicarious, and with threats and with responses, are all important influences on individuals’ behavioral choices regarding information security and should continue to be explored in this context.
|
170 |
Anselm on the Atonement in Cur Deus Homo: Salvation as a Gratuitous GraceNguyen, Thu 20 May 2018 (has links) (PDF)
No description available.
|
Page generated in 0.051 seconds