• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1355
  • 927
  • 328
  • 224
  • 79
  • 63
  • 55
  • 42
  • 42
  • 36
  • 31
  • 27
  • 27
  • 22
  • 20
  • Tagged with
  • 3514
  • 1046
  • 631
  • 618
  • 577
  • 564
  • 424
  • 414
  • 395
  • 354
  • 326
  • 299
  • 273
  • 263
  • 240
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Planung der betrieblichen Weiterbildung in der Informationsverarbeitung /

Winkelhofer, Georg A. January 1998 (has links)
Zugl.: Stuttgart, Universiẗat, Diss., 1997 u.d.T.: Winkelhofer, Georg A.: Planung der betrieblichen Weiterbildung.
22

PFPC: Building an IT Risk Management Competency

Westerman, George, Walpole, Robert 29 July 2005 (has links)
IT Risk management is becoming increasingly important for CIOs and their executive counterparts. Educators and managers have materials they can use to discuss specific IT risks in project management, security and other risk-related topics, but they have few resources they can use to have a holistic discussion of enterprise-level IT risk management. This case is intended to address the gap. It describes the IT risks facing a large financial services firm, PFPC, as a result of rapid growth, a large merger and distributed management of the IT function. The firm’s first enterprise-wide CIO, Martin Deere used risk management as a key pillar in a major revamp of the firm's applications and IT capabilities. The case is rich in detail on the firm's IT risks, the new risk management process, including examples of the firm's risk management tools. It also describes early lessons and outcomes in the implementation of risk management capabilities. The case has enough richness and potential controversy to engage students from the undergraduate through executive levels in an informative and interesting discussion of IT risk management.
23

A Study of Issues Concerning Cross-strait Information Systems Architecture by Information Electronic Industry

CHUI, Cheng-Hsien 27 July 2003 (has links)
Abstract In recent years, Taiwanese industries investing in Mainland China have switched from traditional industries to hi-tech enterprises and their investment strategies have changed from production cost saving to division of labor and industry integration. However, without support of efficient and effective IT system, enterprises cannot quickly adjust to business environment varying from minute to minute. Thus, in this research, a study is conducted to investigate the roles of IT systems in facilitating hi-tech companies to gain accurate information and support just-in-time operations. The findings suggest that most IT system adopted by the subsidiary in China are transferred directly from the parent company in Taiwan. They are not built from the scratch nor modified by the subsidiary due to considerations such as smoothing usual operation, building up the same domain knowledge, and shortening production schedule. Whether the subsidiary in China is directly supervised by the parent company in Taiwan will affect the level of support by the MIS department in Taiwan. In addition, the subsidiary members¡¦ values and commitment will affect cross-strait IT architecture. In the area of risk management, the perception of information security risk differs between Taiwan headquarter and China subsidiary because of different needs and business models. Distrusting China subsidiary members is still an issue to develop cross-strait IT security systems. Keyword: IT architecture, IT risk management
24

IT Governance med fokus på IT-investeringar

Lindström, Lena-Maria, Karlsson, Anna January 2009 (has links)
<p><strong>Abstract</strong></p><p><strong>Date              </strong>2009-06-07<strong></strong></p><p><strong>Level             </strong>Master thesis in Information Technology and Business Administration, 15 hp, EIK024<strong></strong></p><p><strong>Authors        </strong>Anna Karlsson, akn05009@student.mdh.se                      Lena-Maria Lindström, llm05002@student.mdh.se</p><p><strong>Tutor            </strong>Peter Ekman<strong></strong></p><p><strong>Title              </strong>IT Governance with an IT investment focus</p><p><strong>Keywords     </strong>IT Governance, IT investments, IT decisions<strong> </strong></p><p><strong>Problem       </strong>To control and manage IT and IT functions in the organization has been a big challenge for many businesses for a long time. In order to make the management of IT more efficient IT Governance is needed. If the organization is going to be successful IT Governance is necessary and this type of governance enables a more effective use of IT that supports the business and its operations. The problem questions for this thesis are: <em>How is the company’s IT Governance built up? How are decisions regarding the company’s IT investments taken? How is the connection between the company’s IT investments and the company’s IT Governance?</em></p><p><strong>Purpose        </strong>The purpose of this thesis is to describe and analyze how a company’s IT Governance is built up and how the company uses IT Governance to reach the desired results from the IT investments.</p><p><strong>Method        </strong>The thesis is a qualitative study. The thesis group has made three interviews; one at Swecon Anläggningsmaskiner AB, one at Volvo Construction Equipment AB and one at Telge nät AB. The respondents are all IT managers. The interviews were semi structured as the authors of the thesis wanted it to be more of an interview / discussion.</p><p><strong>framework</strong></p><p><strong>Theoretical   </strong>The theoretical framework of the thesis begins with a presentation of decision making in the organizations followed by a background to IT investments. Finally a presentation of IT Governance which is divided into four parts follows: who takes the IT decisions, which decisions are made, how are these decisions made and monitored and the fourth part that focuses on the company management’s involvement in IT Governance. The part is finished with a summarizing analytic model made by the authors of the thesis.         </p><p><strong>Conclusion</strong>   We have concluded that the three companies all have some sort of IT Governance, but how the IT Governances are built up varies. We also have concluded that the companies' ambition by using IT Governance is to reach the desired results from their IT investments.  By using IT Governance the companies are forced to pay attention to certain aspects eg., that the investments really are aligned with the companies businesses and that certain metrics are estimated for investments in the IT investment approval process.</p>
25

An empirical investigation into Green IT practices in the North West Provincial Government / Tebogo Lucia Letlonkane

Letlonkane, Tebogo Lucia January 2014 (has links)
Climate change has been a topic for discussion in the IT industry. The IT (information technology) sector has been regarded as one of the contributing sectors towards climate change due to carbon emissions from IT equipment such as computers and servers. Environmental concerns are gaining incremental attention from organisations across the globe. Green IT is seen as part of the solution to this problem and has been defined and discussed by many researchers. The purpose of this study was to investigate Green IT practices that have been adopted in the NWPG (North West Provincial Government). The study focused on the three departments which fall under one central IT section in the department of the provincial treasury. A quantitative study was conducted in Mafikeng and questionnaires were distributed to collect the data and it was found that although end-users in the government sector are aware of Green IT, many still needed a lot of training on Green IT. The research concludes by suggesting strategies that might be adopted to improve IT use in the government sector. / Thesis (M.Com.(Information Systems) North-West University, Mafikeng Campus, 2014
26

IT-satsningar i Tranås / Priorities of IT in Tranås

Forssmed, Britt January 1997 (has links)
This thesis investigates the implementation of information technology (IT) in Tranås First there is a short background of the development and area of the use of information  technology. Some of the questions in this paper are how different actors invest in information technology, what plans they have for the future and how they handle the question of education about information technology. Something Tranås perhaps need some more of, to be received in the way of success, is more information and education about information technology just as well as incorporate it in the education. The most obvious observation to be made is perhaps that Tranås city community is one of the most active actors when it comes to make priorities in favour for information technology and also to give encouragement to the enterprises in Tranås. / <p>Det förekommer några blanka sidor i uppsatsen. Sidan 92 saknas i alla exemplar.</p>
27

IT-Outsourcing for four organizations

Derventzas, Konstantinos January 2010 (has links)
<p><strong>Introduction</strong></p><p>IT-Outsourcing is a concept that describes the supply of part or all of Information Technology (IT) services by an external supplier company, known as IT-vendor, to a client company. The ‘IS-Improvement’ is one of the three strategic views of IT-Outsourcing for clients and involves advantages like focusing on core business, cost reductions and increase of IT-resources efficiency.</p><p><strong> </strong></p><p><strong>Objectives</strong></p><p>The purpose of this project is to discover, describe and analyze the most critical aspects in implementing IT-Outsourcing and the critical aspects of the ‘IS Improvement’ view of IT-Outsourcing for clients, to further let IT-vendors know how they can improve on delivering their services to their customers.</p><p><strong> </strong></p><p><strong>Research Question</strong></p><p>“<em>Which are the most critical factors </em><em>in implementing IT-Outsourcing and which are the critical aspects of the IS-improvement view of IT-Outsourcing for four organizations as clients?</em>”</p><p><strong> </strong></p><p><strong>Method</strong></p><p>This project follows an exploratory research method. It is mainly an action research but there is also an element of a realist research. The subject of IT-Outsourcing was chosen because it is part of IT-Management. The analysis is based on primary data collected from four organizations in the European Union (EU) that were chosen because they use IT intensively in their activities. Access to these organizations was because of convenience since it was enabled by personal contacts. Two organizations were in the shipping business, the third organization was an electronic-devices factory, and the fourth was a university. The data collection was based on three face-to-face interviews with the IT-Managers of the organizations, and one response was collected by electronic means since the fourth respondent (also IT-Manager) completed and sent the questionnaire by e-mail. The interviews were based on a semi-structured questionnaire, that in turn was formed based on the content of the critical literature review. The critical literature review was formed from books and articles found at Mälardalens Högskola’s library and databases, and interlibrary loans. The data were inserted in a table for content analysis that helped count the frequencies of the various factors of IT-Outsourcing. The results were drawn based on qualitative analysis and they were tested against dialectical critique.</p><p><strong> </strong></p><p><strong>Conclusions</strong></p><p>The most critical factors in implementing IT-outsourcing for these four organizations are: Hardware maintenance is the most critical area to be outsourced. Low costs of services, supplier’s stability and reputation are the most critical factors in selecting an IT-vendor. Supplier’s understanding of client’s objectives is the most critical factor for a successful relationship between clients and IT-vendors. Precise definition of costs is the most critical factor to be included in an IT-Outsourcing contract, and selective/partial IT-Outsourcing is the IT-sourcing solution preferred by these organizations. The ‘IS-Improvement’ view of IT-Outsourcing for these four organizations is not valid, but the respondents’ words indicate ways that IT-Outsourcing can be improved to achieve increased IT-resources efficiency.</p>
28

Hantering av IT-incidenter : En fallstudie på ICAs IT-avdelning Operations

Lindström, Lena-Maria, Karlsson, Anna, Wretlund, Magnus January 2008 (has links)
<p> </p><p><strong>Date: </strong>2008-10-06</p><p><strong></strong></p><p><strong>Level: </strong>Bachelor thesis within Information Technology and business economics, 15p, EIK021</p><p><strong></strong></p><p><strong>Authors:</strong> Anna Karlsson, akn05009@student.mdh.se</p><p>Lena-Maria Lindström, llm05002@student.mdh.se</p><p>Magnus Wretlund, mvd05001@student.se</p><p><strong></strong></p><p><strong>Tutor: </strong>Marie Mörndal</p><p> </p><p><strong>Title: </strong>Managing IT-incidents, a case study at ICAs IT department                            Operations</p><p><strong></strong></p><p><strong>Keywords:</strong> IT-incident management, IT-incident management process, IT-incident, ITIL, CCTA</p><p> </p><p><strong>Problem: </strong>An organization can benefit by having an established management process of handling IT-incidents. But how can this be achieved? Are there step-by-step procedures? What´s included in the management process of IT-incidents? Is the size of the organization relevant to which model is to be chosen? Can the work of the writers of this essay result in a recommendation of a specific model for IT-incident management? These questions lead to the following essay question; <strong>How are IT-incidents managed?</strong></p><p><strong>Purpose: </strong>The purpose of this thesis is to describe and discuss how IT incidents can be managed.</p><p><strong>Method:</strong> The writers of this essay have performed a case study at ICA, a Swedish food retail company. Eleven interviews with nine different persons have been carried out. The interviews are analyzed in the chapter called Resultat och analys.</p><p><strong>Conclusion: </strong>Our conclusion is that there are both similarities and differences in Dept. Operations´ management process for handling IT-incidents compared to what is stated in the CCTA-model. Another conclusion is that it is of highest importance for a business to implement a standard procedure for handling IT-incidents. The lack of such a model could result in e.g. financial losses.</p>
29

IT-styrning och strategi inom landsting

Höglund, Michael January 2016 (has links)
Denna uppsats behandlar IT-arbete med fokus på IT-styrning, med offentlig sektor som utgångspunkt. Arbetet baseras på en två månaders praktik som utförts vid ett av Sveriges landsting, där arbetet vid huvudkontorets IT-avdelning har observerats och intervjuer utförts. Arbetet presenterar den struktur för IT-styrande som landstinget använde då praktiken utfördes. Det presenterar dessutom svårigheter som upplevs av de som styr landstingets IT i brist på dels detaljerade styrdokument för IT, och dels ett bristande stöd ifrån ledningen. Detta leder vidare till en teoretisk diskussion kring IT-governance, Shared services samt Strategizing. Det hela fångas upp i en diskussion som redogör för de olika styrande aspekternas påverkan på IT-strategi och IT-arbete. Arbetet bidrar därmed till kunskapsbasen kring IT-styrning genom analys av IT-arbete offentlig sektor.
30

Women as Chief Information Officers in Higher Education: a Mixed Methods Study of Women Executive Role Attainment in Information Technology Organizations

Clark, Elizabeth Ann January 2013 (has links)
Thesis advisor: Ana M. Martínez-Alemán / The dearth of women in executive positions within the field of information technology (IT) has been studied extensively in the corporate sector. That is not the case within higher education, despite the data collected showing that women attain the top executive role - that of the Chief Information Officer (CIO) - at much better rates than their corporate counterparts. Given this discrepancy, as well as the importance of technology in today's society, research was needed into the structural factors contributing to women's executive attainment in higher education IT organizations. Using a sequential explanatory mixed methods design, this dissertation study compared women and men higher education CIOs along a variety of individual and organizational characteristics, and examined elements related to women's ability to attain the CIO role. The study combined quantitative descriptive data on higher education CIOs, gathered via a web-based questionnaire and analyzed for significant differences between women and men in the population, with women CIOs' qualitative explanations of the quantitative findings via semi-structured interviews. 188 women and men (38 women and 150 men) participated in the questionnaire, and nine women who filled it out participated in the semi-structured interviews. All participants were higher education CIOs working at EDUCAUSE member institutions. Integrated findings from this study suggest that though few demographic differences exist between women and men in the population, higher education IT culture is based upon masculine norms, and as such, perpetuates biases against women leaders in the profession. Despite cultural norms that potentially dissuade women from working in the field, a number of environmental characteristics emerged associated with women's ability to secure the CIO position. These included stimulating work that is connected to the mission of higher education; flexible work options available at different points in IT employees' careers; the presence of women executives in academic institutions; and a nationally based professional development community focused on mentoring future generations of CIOs. / Thesis (PhD) — Boston College, 2013. / Submitted to: Boston College. Lynch School of Education. / Discipline: Educational Leadership and Higher Education.

Page generated in 0.0453 seconds