121 |
Security for IP multimedia applications over heterogeneous networks /Carrara, Elisabetta. January 2005 (has links)
Licentiatavhandling Stockholm : Tekniska högskolan, 2005.
|
122 |
Intra-family information flow and prospects for communication systems /Nässla, Hans, January 2004 (has links)
Lic.-avh. Linköping : Linköpings universitet, 2004.
|
123 |
Two topics in cryptography : lattice problems and the security of protocols /Trolin, Mårten, January 2005 (has links)
Lic.-avh. Stockholm : Tekn. högsk., 2005.
|
124 |
Discovering information security management /Björck, Fredrik, January 2005 (has links)
Diss. Stockholm : Stockholms universitet, 2005.
|
125 |
A dynamic and adaptive information security awareness (DAISA) approach /Casmir, Respickius, January 2005 (has links)
Diss. Stockholm : Stockholms universitet, 2005.
|
126 |
Usable security policies in runtime environments /Herzog, Almut, January 2007 (has links)
Diss. Linköping : Linköpings universitet, 2007.
|
127 |
Securing information assets : understanding, measuring and protecting against social engineering attacks /Nohlberg, Marcus, January 2008 (has links)
Diss. (sammanfattning) Stockholm : Stockholms universitet, 2009. / Härtill 7 uppsatser.
|
128 |
Achieving competitiveness through externally oriented capabilities : an empirical study of technology-based small firms /Parida, Vinit, January 2010 (has links)
Diss. Luleå : Luleå tekniska univ., 2010. / Härtill 5 uppsatser.
|
129 |
The relationship of the business with the in-house IT department : a customer-provider perspectiveDay, Jacqueline January 2003 (has links)
Unsuccessful IT Implementations can often be traced to organizational issues. Some of these problems originate from failures of the working relationship between the in-house IS department and other areas of the business. Before interventions can be designed to address these issues, the nature of this relationship needs to be fully elaborated. Accordingly, the aim of this research was to develop a clearer understanding of roles played by the business areas and the in-house IS department, within the development, delivery and operation of IT services. Anecdotal and academic evidence concerning the causes of relationship difficulties and their possible solutions was gathered, to enable the objectives of the study to be determined on the basis of the topics emerging from both practical and theoretical knowledge. After the research foundations had been established, grounded theory was chosen as the most appropriate methodology for the study. Data acquired from U.K. Insurance companies was analysed for abstract concepts that composed the phenomenon and constructs developed to create a theoretical framework. This shows how the relationship between the IS department and other parts of the business is constituted from the mutual trust, credibility and interdependence of the work groups that are parties to the relationship. The framework also shows the way organizational climate, attitudes of individuals, processes and outcomes affect the formation of the three relationship bonds. The validity of the research was critically evaluated against published quality criteria for grounded theory studies and limitations to the framework were identified. The plausibility of the research was tested by comparison of the framework with the existing research literature about customer-provider relationships. The study concludes with proposals for further research work, including the operationalisation of the theoretical framework and the creation of a strategy to guide the development of the relationships in question. Two contributions to knowledge are claimed for the thesis: It is a new, holistic, view of the instrumental linkages between an internal service provider organization and its customers. Interpretive methods have been under-utilised in the field of IS/IT research. This study provides an experientially based model for employing grounded theory to explore the organizational context of IT services management.
|
130 |
The Impact of Environment on Building IT Technical CompetencyWierwille, Benjamin Joseph 01 May 2012 (has links)
Information Technology Technical Competency is critical for the optimal functioning of any organization. IT personnel need to be competent in their technical skills. Studying how IT personnel build their technical competencies is a critical but under-studied area of research. To date, very little research has been done on how to build IT Technical Competencies, and virtually none of this research begins with qualitative data or uses IT personnel as key respondents. Initially, we evoke a revealed causal map that shows four concepts in the IT Environment construct: the Technical Environment, the People Environment, the Business Environment, and the Job Environment. Our model first proposes a relationship between the IT Environment and IT Technical Competency. An original survey based on the qualitative data was developed for this study. Data was collected at four research sites: a manufacturing organization, a healthcare organization, a government organization, and an education organization. All together 101 respondent's survey answers were analyzed. We tested the proposed model of IT Technical Competency using the method of path analysis with linear regression. Our results indicated that the Technical and Business Environments are viewed as one, so we end up with a three environment concept model of IT Technical Competency. Our model achieved a R-squared value of above 0.5, meaning that the environment surrounding IT personnel, the IT Environment, is 50% related to IT Technical Competency. This is the first model to this author's knowledge that holistically looks at environment in relation to technical competency. Future research will continue look more in-depth at each of the concepts in this environment individually.
|
Page generated in 0.3416 seconds