• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 23
  • 6
  • 5
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 42
  • 42
  • 24
  • 17
  • 13
  • 12
  • 10
  • 10
  • 10
  • 9
  • 8
  • 7
  • 7
  • 7
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Digitalisering och ledarskap : samband, påverkan och konsekvenser / Digitalization and leadership : conjunctions, impact and consequences

Kostet, Emelie, Holmström, Lina, Nilsson, Lucas January 2020 (has links)
Digitalization is an inevitable part of working life as well as life in general. At the same time, the leader is an important part of a business where they can act as an influential and engaging role.  The purpose of this essay is to look into the correlation between, leadership and digitalization. Moreover, what the effects are on businesses if digitalization projects are implemented and more so what the effects are if those projects are implemented in an unprepared organization. The method that formed the basis of the essay is of a qualitative approach as well as an abductive approach. Nine informants were interviewed and gave their own perspective on, and experience of, digitalization. Results, that have been obtained through studies, show that leadership has an effect on digitalisation which can be contributed to communication, environment and employees’ engagement. Leadership is the foundation of successful digitalisation and successful digitalisations in certain areas leads to, improvement of Leadership opportunities Conclusions that can be drawn from the results are that leadership’s commitment, involvement and communication is perceived to be important in creating a pleasant working environment, satisfied employees and a well-functioning business. The leader role has been determined to play an important part in various areas of a business and particularly when implementing digitalization.
22

Uma investigação sobre Comitês de Governança de Tecnologia da Informação na Administração Pública Federal direta

Salgueiro, Adriana Nascimento Moreira da Silva 22 February 2018 (has links)
Submitted by Sara Ribeiro (sara.ribeiro@ucb.br) on 2018-08-09T18:25:22Z No. of bitstreams: 1 AdrianaNascimentoMoreiradaSilvaSalgueiroDissertacao2018.pdf: 3463779 bytes, checksum: c92d0cc2bd4fa7139c94db56bfc9c33a (MD5) / Approved for entry into archive by Sara Ribeiro (sara.ribeiro@ucb.br) on 2018-08-09T18:25:35Z (GMT) No. of bitstreams: 1 AdrianaNascimentoMoreiradaSilvaSalgueiroDissertacao2018.pdf: 3463779 bytes, checksum: c92d0cc2bd4fa7139c94db56bfc9c33a (MD5) / Made available in DSpace on 2018-08-09T18:25:35Z (GMT). No. of bitstreams: 1 AdrianaNascimentoMoreiradaSilvaSalgueiroDissertacao2018.pdf: 3463779 bytes, checksum: c92d0cc2bd4fa7139c94db56bfc9c33a (MD5) Previous issue date: 2018-02-22 / The IT Governance (ITG) is known in the public and private sector, to present a group of mechanisms contemplating structures, process and relations that are defined by the Board with the objective of direct the IT actions and exert control about the use of its resources and management, aligning achievements of the strategic goals of organizations. Within the mechanisms referenced in the theoretical framework and identified in the literature review, there is the IT Strategy Committee, known worldwide as one of the most used tools by public or private organizations, enabling the IT Governance in the research for better performance. The present dissertation, through the methodologies of research content analysis and documentary analysis, identified the contribution of literature and the guiding legal apparatus to the foundation and operation of the IT Governance of the Federal Public Administration (APF), confronting them to the firmed purpose on the respective acts who built it. Therefore, this study presents a comparative analysis between twenty-four IT Strategy Committee within the scope of APF, considering the universe of records and documents that were available to this research, by the Brazilian law nº 12.527, of November 18th, 2011( 'Lei de Acesso à Informação – LAI’ ) obtained between the months of August and December 2016. Through the analyzes carried out, it was verified that only the competences associated to the categorization “IT Policies, Principles, Guidelines and Strategies”, covered by the literature, were perceived in the totality of the competences attributed to the IT Strategy Committee in the APF. The topics related to “IT Risks” were verified in the role of these Committees in only 12.5% of the documents analyzed. The guidelines issued by the department responsible for providing a guiding legal apparatus associated with the institution of these IT Governance structures in the APF were not fully observed in the acts that constituted the GTI Committees in the Brazilian direct APF. / A Governança Corporativa de Tecnologia da Informação (GCTI) é reconhecida, tanto no setor público quanto no privado, por apresentar um conjunto de mecanismos contemplando estruturas, processos e relacionamentos que são definidos pela Alta Administração com vistas à direcionar as ações de TI e exercer controle sobre o uso de seus recursos e sobre a sua gestão, em alinhamento à consecução dos objetivos estratégicos das organizações. Dentre os mecanismos referenciados no arcabouço teórico e identificados na revisão de literatura, tem-se o uso dos Comitês de Governança de Tecnologia da Informação (CGTI), reconhecidos mundialmente como um dos instrumentos mais utilizados pelas organizações, sejam elas públicas ou privadas, viabilizadores do exercício da GCTI, na busca por melhor desempenho. A presente dissertação, por meio das metodologias de pesquisa análise de conteúdo e análise documental, identificou as contribuições da literatura e o aparato legal norteador para a instituição e atuação dos CGTI da Administração Pública Feral direta, confrontando-os frente aos propósitos firmados nos respectivos atos que os constituíram. Para tanto, o estudo apresenta uma análise comparativa entre 24 Comitês de GTI no âmbito da APF, considerando-se o universo dos registros e documentos que foram disponibilizados para esta pesquisa, por meio da Lei nº 12.527, de 18 de novembro de 2011 - Lei de Acesso à Informação – LAI, obtidos entre os meses de agosto e dezembro de 2016. Por meio das análises realizadas contatou-se que apenas as competências associadas à categorização “Políticas, Princípios, Diretrizes e Estratégias de TI”, abrangidas pela literatura, foram percebidas na totalidade das competências atribuídas aos Comitês de GTI na APF. A temática relacionada aos Riscos de TI foi verificada no rol de competências desses Comitês, em apenas 12,5% dos documentos analisados As orientações emanadas do órgão responsável por prover aparato legal norteador associado à instituição dessas estruturas de GTI na APF, também não foram integralmente observadas nos atos que constituíram os Comitês de GTI na APF direta brasileira.
23

Effects of IT Infrastructure services on business process implementation-Focus on small and medium enterprises in emerging markets

Nerur Radhakrishnan, Ganapathy Subramaniam January 2011 (has links)
An organization’s information technology (IT) infrastructure capability is increasinglyrealized as a critical part to business effectiveness and efficiency. IT infrastructure servicesare particularly important for organizations looking to deploy business processes indeveloping markets. There has also been an interest from many small and medium sizedorganizations whose core business is not in IT to outsource and manage these servicesthrough third party service providers. However there is a need to create an understanding forthese organizations to deploy the right infrastructure services in order to enable easierimplementation or reengineering of the business process. There has been little researchfocusing on the patterns of the IT infrastructure capabilities in the small and medium sizedorganizations in the developing markets.The research aims for a comprehensive coverage by analyzing the requirements in thedeveloping markets and proposing a selection model for the organizations to choose ITservice provider in case they decide to outsource the infrastructure services. The effect of theIT infrastructure services on the business process implementation is presented with anemphasis on the boundary crossing services. Using empirical case study, the research analysesa firm in developing markets and compares it against four strategically similar organizationsfrom different industries. Data collection was primarily qualitative and ably supported bysecondary data.The requirements in developing markets reflect the same as in mature markets. The pricing isseen to play a major role in the selection of the service providers with service security notvery much organization’s priority. The number of boundary crossing services effectivelyenables information sharing and control. These services are the drivers in simplifying thebusiness process implementation. The findings have implications for both business andtechnical managers in regard to planning the IT strategy in the long term and developingappropriate infrastructure according to the process needs. / Program: Magisterutbildning i informatik
24

CHIEF INFORMATION OFFICERS EVOLVING ROLES AND RESPONSIBILITIES "From Operational to Strategic"

Aluebhosele, Dandy, Anobah, George January 2009 (has links)
<p>The Chief information officer (CIO) position has been seen as very important to every organization; this includes organizations that have either outsourced   or Insourced their IT function. Various studies have shown that this role emerged as a critical executive position in most organization which helps to shape organizations strategy. CIO has a major responsibility of aligning IT with business strategy that leads to an organization achieving a higher competitive advantage. This  work describeD the various roles of the CIO in organizations with a special focus on IT-business strategy alignment.</p><p>Based on our investigations from previous research, case studies and current interviews with CIOs, we were able to see that the CIO roles are shifting from operational to more strategic one. The CIO is seen to be the bridge between IT strategy and business strategy. As a result of this, they have close collaboration with the CEOs in order to be successful in aligning IT strategy to the business objectives. In view of this, the CIO plays the role of both the chief architect who designs future possibilities for business and the technology provocateur (Intelligent officer) that aligns IT with business.</p>
25

Managing mission-critical IT in the financial industry

Mårtensson, Anders January 2003 (has links)
In recent years, IT has come to play an important role in companies. So successful execution of business processes often depends on mission-critical IT-solutions. Managing such IT is challenging. Companies have to keep up with rapid developments, but also consider long-term consequences while doing so. How do they survive in the long run without surrendering in the short run? What should be done in-house? What should be bought from external providers? How should they allocate scarce IT resources? This book answers these questions on the basis of four cases from the financial industry. After describing and analyzing IT portfolios, it investigates the questions of sourcing and technology adoption. Finally, it explores the relationship between mission-critical IT and business operations. The study suggests different ways of analyzing the role applications play in a company rather than the applications themselves. The character of an application may be in the eye of the beholder. Framing applications from both business and IT perspectives is also important, especially in information intensive companies. The Resource Allocation Matrix provides a tool for characterizing four types of IT-management efforts: agile action, firefighting, business transformation and platform construction. / Diss. Stockholm : Handelshögskolan, 2003
26

CHIEF INFORMATION OFFICERS EVOLVING ROLES AND RESPONSIBILITIES "From Operational to Strategic"

Aluebhosele, Dandy, Anobah, George January 2009 (has links)
The Chief information officer (CIO) position has been seen as very important to every organization; this includes organizations that have either outsourced   or Insourced their IT function. Various studies have shown that this role emerged as a critical executive position in most organization which helps to shape organizations strategy. CIO has a major responsibility of aligning IT with business strategy that leads to an organization achieving a higher competitive advantage. This  work describeD the various roles of the CIO in organizations with a special focus on IT-business strategy alignment. Based on our investigations from previous research, case studies and current interviews with CIOs, we were able to see that the CIO roles are shifting from operational to more strategic one. The CIO is seen to be the bridge between IT strategy and business strategy. As a result of this, they have close collaboration with the CEOs in order to be successful in aligning IT strategy to the business objectives. In view of this, the CIO plays the role of both the chief architect who designs future possibilities for business and the technology provocateur (Intelligent officer) that aligns IT with business.
27

Business strategy and IT strategy alignment in SMEs

Sanders, Johan, van Meurs, Joost January 2018 (has links)
This study explores the following research question: How do CEO’s of SME’s seek to achieve and sustain alignment between business strategy and IT strategy in their companies? By conducting in-depth interviews of seven CEOs of SMEs in the Netherlands the experience of these CEOs are explored and most, if not all, of them describe how they do make use of sophisticated strategic planning that combines both business and IT strategy in a manner that appears to be analogous to that previous researchers have documented in large organisations. A number of recommendations are made as to how the methodology used could be improved to gain better understanding of the interplay of the factors involved in achieving and sustaining alignment in SMEs (and, perhaps, even large organisations)
28

Exploring barriers to Mobile e-ID adoption : A government perspective on Republic of Moldova Mobile e-ID

Rosca, Victoria January 2017 (has links)
As more and more governments have embarked on the e-government path, providing digital interaction with its citizens has boosted the demand for trusted electronic identity solutions that can ensure an official match between an online identity and a physical one. Along with this trend, the affordability and diffusion of mobile devices has translated into a strong push for governments to diversify e-ID channels by developing digital identification on mobile devices also known as Mobile e-ID. Mobile e-ID offers citizens legally binding identification, authentication and qualified electronic signatures and it has been already successfully implemented by some countries at a nation-wide scale. Extant research has investigated mobile e-ID from a technical oriented perspective focusing on potential deployment models, however little is known about the challenges a country is facing in making mID adopted by a wider number of users/ citizens. Addressing this, I run a case study on Republic of Moldova’s nationwide mobile e-ID solution to investigate the barriers to Mobile e-ID. Accordingly, I identify 18 barriers which are organised into 5 categories.
29

Achieving business impact with IT : A qualitative study of the practice and theory of driving change with technology, interaction and service design

Persson, Jakob January 2017 (has links)
As our society becomes more and more digitalized, IT projects play an increasingly important role. The relatively high failure rates in IT projects have spurred the development of methods and models to improve success rate by managing for outcomes rather than constraints. This thesis aims to contribute to our understanding of how outcome-based project methods are used in practice, and how they’re understood and conceptualized by their users such as project managers, product managers and interaction designers. It provides an overview of seven methods for managing projects for outcomes and presents findings regarding how users of a subset of these methods apply and reason about them. The study’s findings include the identification of six themes regarding the application and use of these methods and four concepts describing how they’re understood. The results indicate that the methods studied have a wide-reaching influence over workplace collaboration and culture, and provide generic strategies for solving problems in the domains of software development, interaction design and service design. Further research is recommended to determine how these methods can be used and improved to further enhance collaboration, communication, and motivation in the workplace and the methods’ wider influence on IT project success.
30

Smarta Kort : En del av en intelligent IT-lösning i hälso- och sjukvården?

Isaksson, Johanna, Sanne, Therése January 2006 (has links)
Background: IT-security is included in the concept of information security, which considers all the security of handling information within an organisation. Good IT-security is about finding the right level of measurement, however, it is hard to implemement new IT-solutions in an organisation, particularly within the health care field, where sensitive information are handled daily. Lately the Swedish government, together with county- and city council, understand the importance of IT and health care. Carelink, an organisation of interest, is working actively for the presumption of benefit by using IT within the health care field. During spring 2006 the Swedish government introduced a national IT-strategy. SITHS, Säker IT inom Hälso- och sjukvården, is a project running by Carelink and is based upon using Smart Cards as an identification. Smart Cards can be used as accesscards for logging on to a computersystem in an organsiation in order to secure an indentity. Purpose: The purpose with this thesis is to investigate the assumptions for how Smart Cards, as a part of a total security solution, can increase the ITsecurity within the Healt Care field. Method: The study was initiated with literature and suitable references to informationssecurity, Smart Cards and Healthcareinformatic. Our empirical study was carried out at Ryhov Hospital in Jönköping, one of Sweden’s newest hospitals. Both qualitative and quantitative studies were conducted, because we chose to do interviews and surveys. The interviews were conducted in order to get a deeper understanding for the organisation and the survey was made in order to investigate the attitudes among the nurses and doctors about the security of computer use. Result: Smart Cards can, according to our studie, increase the IT-security within the Health Care field by creating a safer identification with the use of ITsupport. Smart Cards can also make the process of logging on and off to a computer system easier, which leads to better logging and mobilisation. The study also demonstrates that users are not afraid of the changes a smart card will represent within their organization. / Bakgrund: IT-säkerhet ingår i begreppet informationssäkerhet som avser all säkerhet vid hantering av information inom en organisation. God IT-säkerhet handlar om att hitta rätt nivå med tillhörande åtgärder och nya IT lösningar, men detta är inte enkelt att införa i organisationer och speciellt inte i vården som dagligen hanterar känslig information. Under senare år har regeringen tillsammans med landsting och kommuner fått upp ögonen för vilken nytta IT kan utgöra inom vården. Intresseorganisationen Carelink arbetar aktivt för att skapa förutsättningar att använda IT inom vården, och under våren 2006 har även regeringen presenterat en Nationell IT-strategi. Projektet SITHS, Säker IT inom Hälso- och Sjukvården, drivs av Carelink och bygger på att använda smarta kort som säker identifikation. Korten kan bland annat användas som passerkort och vid inloggning till ett datasystem för att säkerhetsställa en identitet. Syfte: Syftet med denna uppsats är att undersöka förutsättningarna för hur smarta kort, som en del av en total säkerhetslösning, kan förbättra IT-säkerheten inom hälso- och sjukvården. Metod: Studien påbörjades med en genomgång av lämplig litteratur om informationssäkerhet, smarta kort samt vårdinformatik. Den empiriska studien utfördes sedan på Länssjukhuset Ryhov i Jönköping, som är ett av Sveriges nyaste sjukhus. Här genomfördes både kvalitativa och kvantitativa studier, då vi valde att göra ett antal intervjuer samt en enkätundersökning bland vårdgivarna. Intervjuerna gjordes för att få en djupare förståelse för organisationen, och enkätundersökningen för att undersöka attityderna till dagens datoranvändning samt hur säkerheten kring datoriseringen upplevs bland de anställda. Resultat: Enligt studien kan smarta kort förbättra IT-säkerheten inom hälso- och sjukvården genom att skapa en säker identifiering vid användning av ITstöd. Smarta kort kan även bidra till en förenklad in- och utloggningsprocess i ett datorsystem, vilket i sin tur leder till bättre spårbarhet samt ökad mobilitet bland användarna. Undersökningen visar att majoriteten av användarna inte är emot den förändring ett smart kort kan bidra till, utan snarare tvärt om.

Page generated in 0.0656 seconds