• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1355
  • 927
  • 328
  • 224
  • 79
  • 63
  • 55
  • 42
  • 42
  • 36
  • 31
  • 27
  • 27
  • 22
  • 20
  • Tagged with
  • 3514
  • 1046
  • 631
  • 618
  • 577
  • 564
  • 424
  • 414
  • 395
  • 354
  • 326
  • 299
  • 273
  • 263
  • 240
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

IT-säkerhet- Tre branscher / IT- security : Three sectors

Hadzic, Aida January 2008 (has links)
Ofantliga informationsmängder och den ideligen växande utvecklingen inom IT ställerallt högre krav på organisationers arbete gällande IT-säkerhetsåtgärder. I takt med atthotet ökar utifrån måste de egna resurserna skyddas och negativa konsekvenserförebyggas. Genom en väldefinierad och existerande IT-säkerhetspolicy som anställdainom organisationer är införstådda med kan vardagen underlättas och risker minimeras.Ett verkningsfullt informationssäkerhetsarbete är en förutsättning och god försäkran somger långsiktig avkastning. Inom organisationer kan informationen ofta vara bristfälligoch säkerhetspolicys är inte ett undantag för den regeln. I studien redovisas tre intervjuersom är genomförda på tre olika verksamheter och där organisationsmedlemmarna ärverksamma inom helt skilda branscher. Det framgår tydligt att IT-säkerhetspolicy intealltid är ett dokument som finns tillgänglig för anställda. Undersökningen visar att detinom enskilda verksamheter inte ställs krav på anställda att ta del av IT-säkerhetspolicy.Utbildning kring IT - och informationssäkerhet bland anställda är inte ett förkommandefaktum och någon ny och uppdaterad information kring ändrade riktlinjer gällande ITsäkerhetförekommer inte. / Uppsatsnivå: C
32

Attrahera, främja och behålla kvinnorna i IT-branschen : En studie om det kvinnliga nätverket Geek Girl Meetup / Attract, promote and retain women in the IT industry : A study on the women's network Geek Girl Meetup

Gereb, Emmi January 2010 (has links)
The aim of this study is to examine the conditions for participation in women's networks for the members of the Geek Girl Meetup network, to expose the members' perceptions of the IT industry and to highlight the network's impact on women's situation in the IT industry. The empirical material consists of interviews and a survey. The interviews were carried out with the network leaders for a better understanding of the network structure and why it exists. The survey completed by the members illuminates how the members perceive the networks function in the IT industry and what kind of an impact the network has on the members and if it has any at all. The result of the study shows that participation in networks like Geek Girl Meetup can be a model for promoting gender equality and improving conditions for women in the IT industry. However, the study does not clearly show whether being a member of the Geek Girl Meetup network has any effect on other women to start training or career in IT, or that this would promote a certain influx of women into IT-related occupations. The essay concludes that a direct impact of the women's network Geek Girl Meetup on IT industry can not be verified but it has a positive impact on the members
33

The Impact of IT Governance on Strategic Aligment and Organization Performance

Chiu, Yi-chieh 19 January 2011 (has links)
In modern dynamic business environment, every enterprise needs to emphasize more on IT in order to increase the benefit. The well-performed IT governance is the key to effectively apply IT resource. This research focus on the following dimension: IT governance maturity, IT Governance Archetype, Strategic alignment and Organization performance. Accoridng to the literature, an empirical research was performed to examine the relation among these four dimensions. Through the empirical research, this research verify the significant positive relation among IT governance maturity, strategic alignment and organization performance. Also among IT governance Archetype (the level of centralized) and strategic alignment. As for IT governance Archetype (the level of professionalize), there is significant positive relation between IT governance Archetype (the level of professionalize) and stragic alignment and significant negative relation between IT governance Archetype (the level of professionalize) and organization performance.
34

Alignment among Governance Environment,Organization,IT Governance, IT Use and IT Performance

Lu, Chun-Wei 25 July 2008 (has links)
This research intends to investigate the relationships among governance environment, organizational structure, information technology governance, information technology use, and information technology performance. An empirical study was conducted to collect from Taiwanese companies. The result shows three major findings. First, small positive effect exists between information technology use and the alignment between governance environment and organization structure. Second, information technology use has positive effects on information technology performance. Finally, the relative governance of IT department does not affect IT use. This research helps organizations understand how information technology governance affects IT use and performance. Organizations could adjust their organization governance strategy to fir its structural and cultural environment in order to improve information technology performance.
35

IT-Outsourcing for four organizations

Derventzas, Konstantinos January 2010 (has links)
Introduction IT-Outsourcing is a concept that describes the supply of part or all of Information Technology (IT) services by an external supplier company, known as IT-vendor, to a client company. The ‘IS-Improvement’ is one of the three strategic views of IT-Outsourcing for clients and involves advantages like focusing on core business, cost reductions and increase of IT-resources efficiency.   Objectives The purpose of this project is to discover, describe and analyze the most critical aspects in implementing IT-Outsourcing and the critical aspects of the ‘IS Improvement’ view of IT-Outsourcing for clients, to further let IT-vendors know how they can improve on delivering their services to their customers.   Research Question “Which are the most critical factors in implementing IT-Outsourcing and which are the critical aspects of the IS-improvement view of IT-Outsourcing for four organizations as clients?”   Method This project follows an exploratory research method. It is mainly an action research but there is also an element of a realist research. The subject of IT-Outsourcing was chosen because it is part of IT-Management. The analysis is based on primary data collected from four organizations in the European Union (EU) that were chosen because they use IT intensively in their activities. Access to these organizations was because of convenience since it was enabled by personal contacts. Two organizations were in the shipping business, the third organization was an electronic-devices factory, and the fourth was a university. The data collection was based on three face-to-face interviews with the IT-Managers of the organizations, and one response was collected by electronic means since the fourth respondent (also IT-Manager) completed and sent the questionnaire by e-mail. The interviews were based on a semi-structured questionnaire, that in turn was formed based on the content of the critical literature review. The critical literature review was formed from books and articles found at Mälardalens Högskola’s library and databases, and interlibrary loans. The data were inserted in a table for content analysis that helped count the frequencies of the various factors of IT-Outsourcing. The results were drawn based on qualitative analysis and they were tested against dialectical critique.   Conclusions The most critical factors in implementing IT-outsourcing for these four organizations are: Hardware maintenance is the most critical area to be outsourced. Low costs of services, supplier’s stability and reputation are the most critical factors in selecting an IT-vendor. Supplier’s understanding of client’s objectives is the most critical factor for a successful relationship between clients and IT-vendors. Precise definition of costs is the most critical factor to be included in an IT-Outsourcing contract, and selective/partial IT-Outsourcing is the IT-sourcing solution preferred by these organizations. The ‘IS-Improvement’ view of IT-Outsourcing for these four organizations is not valid, but the respondents’ words indicate ways that IT-Outsourcing can be improved to achieve increased IT-resources efficiency.
36

Exploring IT benefits evaluation effectiveness at ex-ante project justification stage

Asmelash, Dawit 25 September 2012 (has links)
The business benefits of IT projects are becoming the main determining factor in selecting projects at the ex-ante justification stage. The core stakeholders, i.e. the business management and IT professionals are charged with the task of evaluating the benefits of IT investment. Despite high adoption rates of formal IT investment appraisal methods, there is still on-going evidence that show organisations not being able to appropriately evaluate IT benefits. This study investigates the process of IT project evaluation at the ex-ante justification stage to understand factors that contribute to ineffective practical application of evaluation and based on the findings, to explore how these factors can be redeemed to improve the benefit evaluation process. A case study research was conducted to explore how benefits can be evaluated appropriately within its context in a tertiary educational institution. The case study research approach enabled the researcher to gain a complete and in-depth understanding of the process and activities involved to identify and measure benefits at the justification stage. Business middle managers that are involved and responsible for IT project justification were approached from various business units as case study participants. Interview questions addressed various aspects of the benefits evaluation process in reference to participants’ experience and past IT project justifications. Content analysis was used to identify frequencies and intensities with which themes and concepts appear in interviewee responses. In addition, a cause and effect relationship tool was used to summarize the research findings for better data analysis and interpretation. The findings indicate factors that contributed to ineffective benefit evaluation in the organization. Close collaboration and partnership between business management and IT professionals is shown to be a crucial component of the justification process. The suggested role of IT management exceeds beyond the task of technical advisor and involves the task of being a coach, informer, educator, assessor, transparency and communication agent. The results also show how best the measurement process can be performed at this stage. This study confirms that business management’s clear understanding of IT benefit concepts is necessary in the evaluation process. Based on the findings, an IT benefit evaluation method is developed as a modification of the current justification process in the organisation. The results presented in this study lay plausible insights for additional approaches to IT benefit evaluation research. It compels researchers to consider new methodologies in the quest for improving benefit evaluation. / Dissertation (MIT)--University of Pretoria, 2011. / Informatics / unrestricted
37

Syntax a sémantika podmětového "it" jako stylový ukazatel / The syntax and semantics of the subject "it" as a style marker

Fišerová, Helena January 2015 (has links)
This thesis analyses the distribution of the different functions of the subject it in two text types: academic prose and fiction. The objective of the thesis is to discover to what extent and in which aspects the two examined text types differ. The analysis is based on two hundred examples of it in the subject function obtained from the British National Corpus (BNC), one half of them drawn from academic prose, the other from fiction. The functions of it analysed include anaphoric it, anticipatory it, empty it and it as the subject in a cleft sentence (focusing it). The discussion of anaphoric it focuses on the distance of the referent from the pronoun, the realisation form and semantic role of the referent; in the case of anticipatory it, attention is paid to the type of subordinate clause realising the extraposed subject and the realisation form and semantics of the predicate in the superordinate clause; for the cleft sentence, the analysis deals mainly with the realisation form and underlying syntactic function of the focused element. Additionally, the instances of it that did not fit into any of the four main categories are also examined. The two text types are first discussed separately, and the findings are then compared in the final part of the thesis. Key words: anaphoric it, anticipatory...
38

The IT-consultant’s view of managing application investments’ : A study on roles and responsibilities / IT-konsulters syn på hantering av applikationsinvesteringar : En studie av roller och ansvar

Granehäll, Maria, Karlström, Jessica January 2006 (has links)
<p>Sedan IT-bubblan sprack 2002 har marknaden nu börjat återhämta sig. Allt fler mindre organisationer investerar i IT igen. Detta gör att IT-konsulterna blir mer eftertraktade på marknaden. I takt med att IT-konsulternas ökade arbete och ökningen av de mindre företagens investeringar, ökar vikten av IT-konsulternas råd angående kommunikation, ansvarsfördelning och samordning som förmedlas till de små och medelstora företagen under investerings processen.</p><p>Samtidigt presenterar dagens litteratur en mix av olika rekommendationer för hur organisationer bör hantera olika roller och dess ansvarsfördelning. Dessa teoretiska rekommendationer är både tydligt –och otydligt uttryckta av diverse författare. På grund av denna teoretiska kunskap, de små –och medelstora företagens (SME) ökade entreprenad av IT och vikten av en klar ansvarsfördelning vid IT-investeringar, har syftet med denna studie varit att undersöka vilka råd dagens IT-konsulter ger till SME i relation till de teoretiska riktlinjerna. Studien har sedan genomförts ur ett konsultperspektiv.</p><p>Genom detta syfte har metoden för att samla in data varit personliga semistandardiserade intervjuer med 12 olika IT-konsulter i Jönköpings län riktade mot SME. För att vi skulle kunna utvinna en djup förståelse för dessa konsulters syn på roller och ansvarsfördelning har vi använt oss av en kvalitativ metod. Dessutom har vi haft en utforskande och jämförande ansats genom vår granskning av studie området och vår jämförelse av roller och ansvarsfördelning som först mellan alla IT-konsulter och sedan mellan IT-konsulternas kategoriserade synsätt och de identifierare teoretiska synsätten.</p><p>En faktor som påverkar studiens tillvägagångssätt är den teoretiska studie som gjorts kring ämnet roller och ansvar vid IT-investeringar av Granehäll et al. (2005). Dessa författare presenterar tre olika teoretiska synsätt av roller och ansvarsfördelning vid applikationsinvesteringar. Vi fann dessa synsätt vara i behov av att kompletteras för att bli fullständiga och anpassade för små –och medelstora företag. Detta utgav grunden för den teoretiska del i denna studie och påverkat strukturen och presentationen av de teoretiska data som här presenteras.</p><p>Efter en presentation av ytterligare teori om roller och ansvar och en utökning av de tidigare fastställda teoretiska synsätten, kunde vi i denna studie identifiera tre nya teoretiska synsätt fokuserade på roller och ansvar vid applikationsinvesteringar</p><p>Den empirisk data som vi fått fram under studien av de olika medverkade IT-konsulterna presenteras var för sig. Detta har gjorts för att ökad förståelse och underlättad läsning.</p><p>Under studien av roller och ansvar i applikationsinvesteringar och IT-konsulternas synsätt på roller och ansvar i SME applikationsinvesteringar har vi kommit fram till att teorins rekommendationer riktar sig mot företag i allmänhet, då oftast mot större företag, vilket gör att teorins rekommendationer till viss del skiljer sig från IT-konsulternas syn på roller och ansvarsfördelning. Vi såg även att IT-konsulterna presenterar olika råd angående roller och ansvar. Vi har därför haft möjlighet att kategorisera dessa olika råd till tre synsätt med olika fokus.</p> / <p>As the market now has begun to recover from the IT-crash in 2002, many smaller organisations are now starting to invest in IT again. This makes the IT-consultants more wanted on the market. In proportion to the increasing work of the IT-consultants and the increasing SME investments, the IT-consultants advices becomes more important regarding communication, responsibilities and collaboration, given to the Small and Medium sized Enter-prises (SME) in the time of their investment process.</p><p>At the same time the theory presents a mix of recommendations for how roles and responsibility should be managed within the general organisation. These recommendations are clearly and vague expressed by different authors. Given this theoretical knowledge, the SME’s increasing outsourcing of IT-management and the importance of a clear structure of responsibilities in IT-investments, has the purpose of this study been to investigate in the advices the IT-consultants are communicating to SME in relation to the theoretical rec-ommendations. The study has then been accomplished through a consultant’s perspective.</p><p>Due to the purpose this study has been accomplished by face-to-face semi-standardised interviews with 12 IT-consultants within the County of Jönköping directed towards SME in application investments. Given that we wanted to gain a deep understanding of these IT-consultants recommendations on roles and responsibilities we therefore used a qualitative method. Furthermore, we also used an explorative effort due to our purpose to scrutinise the research area and a comparative effort when comparing the IT-consultants views with each other and then comparing the categorised IT-consultants views to the theoretical views identified in this study.</p><p>One factor influencing the mode of procedure is the theoretical study of roles and responsibilities made by Granehäll, Karlström and Uyanik (2005). These authors present three different views of roles and responsibilities in application investments. We found these views necessary to be further developed. This became the foundation of the theoretical data of roles and responsibilities in this study, setting the structure of the presentation of theoreti-cal data.</p><p>After presenting the additional theory and adding it to the all ready known views, we were in this study able to identify three new theoretical views on roles and responsibilities fo-cused on different roles.</p><p>The empirical data, established during this study, expressed by each participative IT-consultant is presented separately. This has been done to increase understanding and to facilitate the reading.</p><p>During this study on roles and responsibilities in application investments and the IT-consultants view on roles and responsibilities in SME application investments we found that the theory is directed to organisations in general, with an undertone that specifies the direction towards larger organisations, causing the theory to recommend different roles of responsibilities than the IT-consultants actually are practising. The IT-consultants we found to present different advice regarding roles and responsibilities. We have therefore been able to categorise these different advices into three different views with different focus.</p>
39

Dimensions and Operationalisations of IT Governance: A Literature Review and Meta-Case Study

Novotny, Alexander, Bernroider, Edward, Koch, Stefan January 2012 (has links) (PDF)
This paper seeks to tackle the current confusion about the constituent dimensions of IT Governance (ITG) and inconsistent operationalisation approaches inhibiting advances in research and organisational ITG practice. Through a structured literature review of ranked high-quality publications augmented by a meta-case study with five underlying projects, we find nine distinct dimensions of ITG. The input-oriented dimensions Compliance Management, IT Investment Management and ITG Improvement have received little attention in earlier conceptualisations, while the more output-oriented dimensions Business/IT Alignment and Business Value Delivery have featured more often in related studies. Scope and application of ITG may depend on the organisational context and the intentional use, such as regulatory or strategic. Depending on the context, more research seems to be warranted to develop context-dependent measurement constructs of ITG that can be compared over studies. (author's abstract)
40

IKT i undervisningen : En undersökning om hur IKT används i svenskaundervisningen i årskurs 4-6 / ICT in education : A study of how ICT is used in the teaching of Swedish in level 4-6

Andersson, Veronica January 2016 (has links)
Denna undersökning visar hur undervisande lärare i år 4-6 använder IKT i sin undervisning samt vilken syn de har på användandet av IKT. Undersökningen har gjorts genom kvalitativa intervjuer med sex lärare som är yrkesverksamma på sex olika skolor. Resultatet visar på att lärarna känner stor osäkerhet i arbetet med IKT, men att de upplever ett större engagemang hos eleverna jämfört med den traditionella undervisningen.

Page generated in 0.0347 seconds