• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • 5
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 27
  • 27
  • 7
  • 6
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Návrh a implementace části informačního systému podniku / Part of the Enterprise Information System Proposal and Implementation

Maringa, Dominik January 2014 (has links)
The diploma thesis focuses on information systems analysis and assessment of a chosen company. After results evaluation based on this analysis, a proposal will be made on how to convert the former information system into a new one. This proposal will be described from an economic point of view at the end of the thesis as well.
2

The Application of Technology Acceptance Model on IT Services Industry¡ÐA Study of the Innovative Web 2.0 Services

Tsai, Yi-Chun 13 August 2007 (has links)
The progress of internet application never stopped. As an evolutionary result, Web2.0, of which made asynchronous mutual communication on web page become capable was a significant milestone in internet application. Web2.0 emphasized on the function of interaction, such as experience share, idea exchange, as well as topic discussion, and set the trend of community interaction. Numerous websites were set up with function of Web2.0 in order to following the trend. Therefore, a proposal competition of Web2.0 was held by Innovative DigiTech-Enabled Applications & Services Institute to encourage those who would like to make a business of Web2.0 application to propose their business plan. In the competition, participants were able to attend relevant courses, acquire much more technical knowledge, and amount of business information was provided. This research mainly aimed at participants of the proposal competition, and took Technology Acceptance Model (TAM) as a theoretical framework, though some modification had been made for research needs. The questionnaires were sent out and gathered through internet to measure the connection between perceived usefulness, perceived ease used, the attitude of Web2.0 of participants and their will of starting a business. The purposes of this paper attempted to discover¡G(1) was it appropriate to take TAM for explaining the adoption behaviors of Web2.0; furthermore, (2) to apprehend if the attitude, one of the variables in TAM, have been proved to have influences on adoption behaviors of adopters, did the attitude also cause influences on motivation of starting a business of competition participants. Finally, the results of this research could be reference for government to take into consideration while developing further related programs.
3

Looking through the Clouds : A Tale of Two Universities

Melin, Ulf, Sarkar, Pradip, K., Young, Leslie, W. January 2012 (has links)
Cloud computing has become a popular buzzword and a trend in the IT industry. With characteristic features of scalable computing resources on-demand, and accessibility on a pay-per-use basis, it has been promoted as the harbinger of good tidings to its subscribers, such as the minimization of in-house IT infrastructures, substantial cost savings, and diminished administrative hurdles, thereby appearing as an appealing outsourcing proposition for non-IT enterprises, such as universities. This paper presents a comparative case study of two universities, one in Australia (UniOz) and one in Sweden (UniSwed). The two universities illustrate examples of how contemporary organisations interpret cloud computing, of drivers behind moving services into the cloud, and of prevailing concerns. Similarities pertaining to drivers for cloud computing are identified at the two cases (seeking scalable computing resources, and the re-allocation of IT resources to focus on core enterprise operations, with an aim to trim costs). This is identified in spite of differences in the culture of respective IT departments. Differences were also identified in terms of student vs. staff driven sourcing of services (email), and early vs. late adoption. The case study also illustrates interesting patterns in terms of the organisational implications of cloud services over time that calls for longitudinal studies. The implication of this paper is three-fold; two cases are consistent with outsourcing theories, they point to a transformation of the status quo, rather than an erosion of the role and influence of the internal IT department, and also reveals gaps in outsourcing theories and a possible future research direction in strengthening the relevant theoretical framework.
4

none

Wang, Chin-chiu 24 July 2008 (has links)
The researches applied theory of planned behavior(TPB) are enormously inpliemented.Also there are some researches with theory of planned behavior address training programs in organizations.Althougtht training programs are an important compotent in most of companies,little theoretical guidance is available for their implementation in information technology services industry This research proposes the behavior model originated from Ajzen¡¦s (1985)theory of planned behavior(TPB) to understand how employees¡¦ attitude, subject norm and perceived control behavior determinants of employees¡¦ behavior in training programs. Data were collected from a company of information service industry in Taiwan. The results indicate traning programs must be suitable and acceptable to employees, otherwise, it wouldn¡¦t change employee¡¦s attitude toward training programs even they have plenty of choices and opportunities. Personl attidute and subject norm predicts employees¡¦ behavior, salient individuals or groups, such as supervisors, co-workers¡A friends and families affact employees¡¦ behavior much more than their personal attitudes. The results only partially support the theory of behavior because information service industry is a highly skilled required. Employee who has willing to attend the training program is by personal professional needs instead of the self convinence level to training attendance or the diversites of training programs. This research provided factors affect intensions of employees¡¦ behavior in training programs and would be instructive suggestions to better understandig of training programs development in the future.
5

IT paslaugų valdymo procesų atitikties analizatorius / IT Service Management Process‘s Compliance Analyzer

Grigienė, Ilona 13 January 2006 (has links)
There are several process maturity measurement automation tools available on the market. Most of them have significant shortcomings: they collect many incorrect data, they lack of graphic representation, or they do not facilitate continuous comparison of achieved levels over time axis. In this situation UAB “Blue Bridge” has taken decision to investigate possibility to develop own software which is free of these shortcomings. Therein described system is targeted to automate and shorten time of the process maturity measurement. It is intended to be implemented in UAB “Blue Bridge” IT infrastructure and to be used as an automating tool for the Project Planning and Implementation process. Tasks which have been completed are: • Thorough analysis of available software pointing out advantages and disadvantages they have; • Identification and documentation of functional and usability requirements • Developed system architecture design • Database designed to store questionnaires and responses to them • Developed web-based user interface • Prepared system testing plan and estimated ways to implement it �� Developed system and user documentation set There is sought company management support to the implementation of this system and during it testing in production environment phase.
6

Technologieband: zentrale IT-Dienste an der TU Chemnitz ; Geschäftsjahre 2014/2015

31 March 2016 (has links) (PDF)
Der Technologieband des Universitätsrechenzentrums der TU Chemnitz fasst die Schwerpunkte und Projekte der Geschäftsjahre 2014 und 2015 zusammen und stellt das Diensteangebot des Rechenzentrums näher vor.
7

Metodiky řízení informatických procesů, srovnání, vliv na efektivitu podnikového IS/ICT / Methodologies of information services management, their comparison and impacts on corporate ICT efficiency

Novák, Tomáš January 2009 (has links)
This diploma thesis engages with methodologies of managing processes in informatics. This thesis takes into account ITIL, COBIT and ITGPM frameworks considering primarily aspects of setting-up and ensuring SLAs of the services provided by informatics. The author of this thesis has chosen this topic with regards to his profession where as project manager has met typical problems related to the development as well as to the operation of information systems. The goal of this work is to find out what is the approach of each of the considered methodologies to SLAs and their fulfilment. In the second part the thesis is aimed in practical impact of SLAs to the development and operation phases of the service lifecycle. In the first part of the thesis, the given objectives are met on a theoretical level, where is for each of the selected methodological frameworks captured its approach to the issues related to an information service operation, its parameters and their ensuring. Next goal, still on theoretical level, is to find out, whether the individual methodologies (approaches) can be combined together in order to reach the needed quality of a service. In its second part is the thesis aimed on practical analysis of the SLA impact on the development and operational activities. As an example, the author describes necessary adjustments to the processes of both, the provider and the customer of any informatics service, beginning from the initial analytical phases to the live mode of the service. The practical part combines approaches of the given frameworks and adds author's experiences gained in the domain. In the end of the thesis, findings and conclusions resulting from the captured facts are briefly summarized, including the author's opinion and recommendations.
8

Analyse multidimensionnelle des facteurs d’échec du processus de gestion des connaissances dans une entreprise – cas d’une ESN (SSII) / A multidimensional Analysis of Failure Factors of the Knowledge Management Process in a company - case of an IT and numeric services company

El Guellaa, Amal 20 December 2018 (has links)
Notre travail de recherche tente d’analyser et de comprendre les facteurs d’échec des tentatives de mise en place des outils de gestion des connaissances dans une société de type SSII où le savoir et les connaissances sont l’essence de son capital.Notre recherche s’opère dans une perspective exploratoire aux fins de description et de compréhension du processus de gestion des connaissances (outils, acteurs, contenu et culture organisationnelle) au sein du modèle organisationnel SSII.Elle vise à comprendre pourquoi les différentes tentatives de gestion de connaissances si nombreuses, échouent dans la mesure où elles sont très peu utilisées et finissent par disparaître à court et moyen terme. / Our research tries to analyze and understand the factors of failure of knowledge management tools in a IT services company.Our research is explorative and consists on describe and understand the knowledge management process (tools; actors; flows; content; and organizational culture) within the IT services organizational model.It aims to understand why various initiatives of knowledge management fail and eventually disappear.
9

Posouzení a návrh informační bezpečnosti v organizaci / Assessment and a Proposal for Information Security in the Organization

Rybáková, Alena January 2015 (has links)
This diploma thesis deals with the issue of information security in the organization. Author's effort is to gain a broad overview of connections, which will then be evaluated in the final section, providing concrete recommendations. In this thesis it is discussed information security management system, service management system and cyber security, both in theory and in terms of real application in a particular organization. The aim is to provide own recommendations for improvement.
10

The Promise of Public Value Co-Creation in Open Government : Designing IT Services for Open Government and Public Value Co-Creation

Uppström, Elin January 2014 (has links)
The engagement of citizens in governmental actives is the future of publicsector reforms. The private sector has already started to leverage onlinetechnology to innovate and to reinvent businesses. The move towards servicesexchange instead of goods exchange is making producers, providersand users cooperate to recognize and exploit value co-creation opportunities.The degree to which collective intelligence is leveraged could be correlatedto the value an initiative generates in the public sector. Thereby open governmentimplies a focus on value co-creation in the public sector. This thesisargues that an important purpose of opening up governments towards citizensand private business is to leverage the potential of value co-creation in asimilar fashion to that already being explored in the private sector. To explorethis phenomenon this thesis addresses the following research question:How can local government use IT services to become more open and leveragethe potential of public value co-creation?Utilizing a design science approach with interpretive philosophical assumptions,the thesis contributes to knowledge on open government and value cocreationby designing artifacts that support open government in the form ofe- and m-services. It also investigates inhibitors of public value co-creationthat may arise from the design of the artifacts.

Page generated in 0.0462 seconds