31 |
Komunikace a její technologická podpora ve firmě na konkrétním příkladě / Communication and it's technological support in concrete organizationRosická, Tereza January 2008 (has links)
For as much as GfK Company is now reorganized, because all management has been changed, all processes are changing as well. One of this process is even process of communication, which until this time wasn't specifically solved itself. Especially due to this, is very hard to describe this process and sort. Object of this work is try to analyse process of extern and intern communication in GfK Company and simultaneously try to offer any suggestion to improve. To deals with all processes of this company isn't able due to extend of this work, and since GfK Company deals with market research and public mind, in this work is concentrated attention to communication by main activity of company. By these processes is communication with respondents and with clients, according to extern communication. In as much as communication with respondent, this work is focused mainly on household panel, because this company has from this most information (as primary data ). Same the internal communication is focused by main process of GfK Company, and that is data transmission and processing. These processes are for company basic, the most interesting and themselves right progress influenced the company as a whole, like a name and prestige and like an income. The work is separated to two main parts. The first part deals with theoretic problems. The main ideas are approached there, that are taking processes, information, communication and systems. The communication is research by social view and by technological view, so how communication is influenced by ICT, and it's positive or negative. The second part is focused to solve the concrete problem of GfK Company. In the first time is introduced the GfK, later are developed processes of internal and external communication. Next parts describe present situation and true using of ICT. According to this information are in conclusion mentioned any suggests and recommends how to improve these processes.
|
32 |
Význam analýzy rizik při auditu IS / Significance of risk analysis during IS auditGuznar, Jiří January 2008 (has links)
The essential theme of this thesis is the problems of information systems audit. Main aim is to analyze the position of this audit within the internal audit framework and the significancy of risk analysis for audit. This thesis subsequently identifies the most important international standards and methodics concerning this problem area. In the risk domain it focuses above all on risk specifics in the framework of information systems area and technologies. The main goal of this thesis is to create a guideline for audit process. The theme is elaborated in the way of study of accessible domestic and foreign literature and electronic resources. The outcome of this thesis is the settlement of work up of findings from internal audit area, from informational system audit and from risk analysis and risk management. Main contribution of this thesis is the self-constructed guideline covering the whole process of audit, which is based on evaluation of risks and their analysis. The surveyed area can be assessed as progressively developing with raising importance because of still bigger development in the information technology area.
|
33 |
Implementace helpdeskového řešení pro správu požadavků / Implementation of helpdesk solution for ticket managementMyslivec, Tomáš January 2010 (has links)
Master thesis deals with implementation of helpdesk solution provided by Kayako Fusion in medium-sized IT outsourcing company. The first part focus on analysis of existing application in technical department, together with an analysis of management and customers functional requirements. Subsequently, the helpdesk system is designed to fulfill the objectives of analysis. In the last part of the thesis you will find detailed description of procedure for implementation and customization of mentioned helpdesk application. The proposed solution is based partly on provision of IT services (ITIL), especially the area of Incident and Problem management. In conclusion you will find the statement indicating if the implementation of Kayako Fusion fulfilled the expectations of management, meet predetermined requirements and become suitable tool to support and carry out daily business processes.
|
34 |
Informační systém pro malou firmu / Information system for small businessBatelka, Martin January 2011 (has links)
This thesis deals with the creation of individual information system for small business dealing with rental properties. The goal is to obtain a system that would meet the needs of the company. The paper focuses on information system design and development in its own by using the Grails web framework.
|
35 |
Isens effekt på trädartsammansättningen : Hur dynamisk is påverkar träden som växer i strandzonerna / The effects of ice on the composition along riparian zones : How dynamic ice formation affects trees that grow in riparian zonesStridh, Lisa January 2020 (has links)
Under vintern bildas det is i vattendrag och när den smälter kan den börja att röra på sig, och blir då dynamisk. Isdynamik kan skada och hämma träd som växer i strandzonen. I denna studie inventerades träden och dess isrelaterade skador på träd längs med två vattendrag. Två områden, ett med och ett utan dynamisk is identifierades och områdena delades in i transekter på två avstånd från vattnet. Antal, art och mängden skador på träd jämfördes mot varandra i förhållande till de två områdena med och utan isdynamik. Tidigare studier har visat att is kan påverka vegetationen och artsammansättning längs vattendrag. Denna studie fokuserar därför på hur isdynamik påverkar träd som växer i strandzonen, med avseende på antal, artsammansättning och mångfald. Resultatet av studien visade att det inte fanns något samband mellan isdynamik och antal träd i de två områdena. I områden med isdynamik var artrikedomen lägre men det var en jämnare fördelning av arterna i jämförelse med områden utan isdynamik. En intressant slutsats av denna studie var att på avstånden där det skadades flest träd var det högre artrikedom och diversitet än på avstånd där färre skadades. / During winter, ice develops in streams and when it melts it may start to move, and it becomes dynamic. Ice dynamics can damage and obstruct trees that grow in the riparian zones. In this study, trees and the ice related damages on trees along two streams were examined. Two locations, one with and one without ice dynamics were identified and the areas were divided into transects at two distances from the stream. Quantity, species and the amount of damage on trees were compared against each other in relation to the two locations with and without ice dynamics. Previously it has been shown that ice can affect the vegetation and composition of species along streams. This study therefore focuses on how ice dynamics affects trees that grow in the riparian zone, with respect to the quantity, composition of species and diversity. The result of this study showed that there is no relationship between ice dynamics and number of trees in these two locations. In the areas with ice dynamics the species richness was lower, but there was a more even distribution of species compared to the areas without ice dynamics. An interesting conclusion of this study is that at distances where most trees were damaged, there was higher richness of species and diversity compared to distances were fewer was damaged.
|
36 |
MRP implementation in Thailand : social and cultural issuesRohitratana, Kaewta January 1998 (has links)
No description available.
|
37 |
Economic institutions and routine practices : the case of high-technology small and medium-sized enterprisesCostello, Neil January 1998 (has links)
The dissertation provides a rich analysis of routines in four case-study companies. Explanations for the behaviour of the firms are developed and provide new building blocks for the understanding of other firms in different circumstances, emphasising empirical evidence, rule-based action and recognising the historical, social and interpretive contexts. Routines are defined as established, significant, sanctioned and recurrent practices within organizations. A number of key features of organizations figure in the analysis: the relationship between structure and agency, the firm's culture and the firm's history. Structures are identified as rules and relationships. The analysis of agency focuses on the position of the agent, the agent's skill and the desire to reduce uncertainty. Technology is an important factor in the analysis. It is (partly) constitutive of the firms, that is it has the power to enact or establish the firms. It cannot do this on its own, it is argued, but, in interacting with other factors, has major implications for the structure and routine behaviour of the firms. The cases suggest that technology has implications for human agency which go beyond the initial intentions of the agents. Technology is not determining but interacts with the other factors in a recursive way and cannot be adequately analysed outside the social system of which it is a part. The primary contribution of the research is the development of a broader concept of routine, in particular, the identification of routine practices at a strategic level and the demonstration that such practices can incorporate change. In addition, the analysis identifies the role of technology in economic change. It adds to the understanding of routines more generally and confirms that an institutional approach to the understanding of firms' behaviour is fruitful and can add to the current repertoire of approaches in Economics.
|
38 |
IS security leveraging the concept of knowledge managementNeville, Karen M. January 2010 (has links)
IS Security (ISS) has become a key element of business risk management and can itself create competitive advantage. Thus, organisations seek practical approaches to protect the operation of the business. Protecting the functionality of an organisation is a difficult task but it is the responsibility of both senior management and ISS functions to do so. An analysis of the ISS literature reveals a paucity of research of ISS management, and a need for research to develop a holistic model for managing ISS knowledge to overcome the ever-increasing number of negative security incidents. The ISS research community is restrained by small-scale technical questions as the social aspects of ISS are ignored resulting in fragmented research across the IS field. While several possible methods are scattered throughout the literature – they focus on the development of information systems. ISS professionals require a range of skills encompassing business knowledge, legal awareness, and organisational processes as well as technical security knowledge. Research to date has failed to provide an integrated approach to managing ISS knowledge. This study investigates how ISS could leverage the concept of knowledge management. It proposes a theoretical model derived from the ISS and KM literatures. Thus to address this gap in research, this study adopts an exploratory interpretive holistic case study approach using interviews and document analysis as data gathering methods. The study will focus on the relationship between ISS and KM and the proposed benefits that an ISS KM initiative would produce. An analysis of the approaches used by these specialised structures in managing knowledge within and across the two case studies facilitated the development of an integrated model. The interplay between the functions provided rich description of the approaches used to manage knowledge. This research builds on previous studies documented in the ISS literature, by providing a much needed model against which practitioners may diagnose problems, plan action and implement solutions. ISS models and standards today do not exhibit much flexibility, therefore managers make ISS decisions in a vacuum. ISS problems can be managed or reduced when the ISS functions and management are aware of the full range of controls available and implement the most effective. Unfortunately, they often lack this knowledge and their subsequent actions to cope with threats are less effective. The focus of ISS research to date has been technical and grounded in positivism and few, if any, studies utilise a qualitative approach, therefore eliminating holistic, in-depth rich descriptions of core issues within the field. Comparatively little work has taken a managerial point of view, covering broad organisational and social issues. This study acknowledges these issues and provides a solid conceptual foundation for future studies on ISS by answering calls for a theoretical model to guide research in the area. The study also identifies the positive and negative impacts of compliance and describes how organisations can apply the model to overcome these negative effects.
|
39 |
Intensional infrastructure for collaborative mapping.Mancilla, Blanca, Computer Science & Engineering, Faculty of Engineering, UNSW January 2004 (has links)
This thesis presents the Anita Conti Mapping Server, a Web interface and infrastructure for the creation and presentation of maps using an active, pervasive,multidimensional, global context. For each user, the context contains the parameterizations for every component of the system. In addition, parts of a user???s context may be shared with other users, so that the actions of one user directly affect the look, feel and content of another user???s system, thereby giving new meaning to the term collaborative computing. The mapping server consists of a Web interface, the GMT mapping tools, a database and the Omega typesetting system. Instead of the components being directly attached to each other through point-to-point communication, they are brought together by the context. This approach provides much more flexbility, since new components and new parameters can be more easily added to the overall system, with little or no change to the components already present. The whole infrastructure is built using intensional programming, a form of programming in which software entities are considered to be intensions (in the logical sense), i.e. mappings from contexts to ordinary entities, called extensions. The thesis presents a comprehensive overview of the development of intensional programming, and highlights its relevance for current work in the areas of electronic documents and distributed software configuration management. The mapping server is the most significant intensional application to date: it contains the most number of lines of intensional code ever written with the biggest context space implemented in a real, working system. The thesis focuses on the parameterization of the Web interface, the mapping engine and the generation of correctly typeset labels for maps to create a parameter space that accurately describes these components, and how this parameter space as a whole can be browsed by a user independently or as a member of a collaborative group. This thesis is just the beginning of a new way to look at mapping and proves that focusing on the context allows the creation of powerful extensible software.
|
40 |
Studies on Adaptation to Information Systems: Multiple Roles and Coping StrategiesElie-Dit-Cosaque, Christophe 02 September 2009 (has links)
Understanding individual adaptation to Information Systems (IS) has received relatively little attention in IS research. For furthering these issues, a multi-paper dissertation is adopted and studies distinct aspects of user interaction with IT related with adaptation. Thus, in order to better understand how system users adapt to IT disruptions this study examines (1) how system users who become disrupted by IS that provide them with too much information interact with these systems, (2) the influence of espoused cultural values (Srite et al. 2006) on user coping strategies of adaptation to IS, and (3) middle managers responses to the implementation of disruptive IT in public administration. These dissertation studies together help improve our knowledge on individual adaptive responses to IT disruptions.
|
Page generated in 0.0179 seconds