• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 28
  • 25
  • 9
  • 5
  • 5
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 77
  • 77
  • 22
  • 20
  • 16
  • 16
  • 15
  • 14
  • 10
  • 10
  • 10
  • 9
  • 8
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Segurança em processamento de dados / Data processing security

Edson Luiz Riccio 16 October 1981 (has links)
A comunidade empresarial e os profissionais de Sistemas e Processamento de Dados enfrentam atualmente um novo tipo de desafio: A ameaça dos computadores. O crescente volume de computadores e a larga utilização das tecnologias de teleprocessamento e de redes estão levando as organizações à crescente dependencia de sua Estrutura de Informatica e de seu principal produto: os sistemas de informação e os demais elementos a eles associados. Não é dificil constatar que o impacto destas tecnologias tem sido absorvido apenas parcialmente não só por usuários mas tambem pelos profissionais. De fato o desenvolvimento dos computadores não é acompanhado pelo correspondente desenvolvimento dos princípios de Administração de Processamento de Dados. Isso significa que os princípios e normas administrativos e de controle para este tipo de atividade não se encontram no estágio desejado, isto é, não foram estabelecidos princípios e normas definitivos para obter-se uma area de Processamento de Dados completamente segura e confiável. Esta \"janela aberta\" é, como consequência, o caminho mais curto para práticas criminosas e erros generalizados, os quais resultarão em danos ás operações e aos ativos das organizações. O conceito de segurança amplamente utilizado atualmente refere-se mais à segurança física e não inclui todos os componentes de uma área de Processamento de Dados, como deveria ser compreendida, a saber: a) As instalações físicas - Incluindo equipamentos, softwares, instalações, equipamentos auxiliares, linhas telefonicas, etc. b) Os sistemas de informação por computador (sistemas \"batch\" tradicionais) c) Os Sistemas de Informação por computador que utilizam tecnologias avançadas tais como Banco de Dados e Comunicação de Dados Neste estudo propõe-se que o conceito de segurança seja extendiido a todos os elementos do ambiente de processamento de dados, como um fator que contribui para sua integridade e eficácia. Este trabalho contribui para o estudo da administração em Processamento de Dados pois apresenta, para cada elemento de uma área de Processamento de Dados as causas de ameaças e os controles mais importantes na redução do impacto dessas causas. / The business community and the Data Processing and Information Systems professionals are facing today a new kind of challenge: the Computer threat. The increasing number of installed computers and the large utilization of teleprocessing and networking techniques are pushing the organizations to be greatly dependent on the Information Processing Facility and its final product: the computerized information systems and the associated environment. It is not very difficult to verify that the impact of this fast growing technology has been only partially absorbed not only by users but also by the computer professionals. In fact, the computer development is not being followed by the corresponding development of the Data Processing Administration Principles. This means that the control and administration guidelines for this type of activity are not in the desirable stage, i.e., no final conclusions have been set up on how to obtain a completely secure and reliable Data Processing Installation. This open Window is, as a consequence, the shortest way for criminal practices and generalized errors which will result in the damage of the organizations assets and operations. The concept of security largely used today refers mostly to the physical security and does not cover all the components of the Data Processing Installation as it should be understood: a) The Physical Installation - including the hardware, software, lay-out, auxiliary equipment, telephone lines , etc.. b) The computerized information system (formal batch system) c) The computerized information systems using advanced techniques such as Data Base and Data Communication. d) The Process of Information Systems Development (Methodology) In this study, we propose that the concept of security be extended to all the elements of the Data Processing environment, as a basic factor which contributes to its integrity and effectiveness. As a contribution to the study of the Data Processing Administration, we present, for each element, the most critical causes of exposures and the most important controls which may reduce the impact of these causes.
62

Knowing and the art of IT management : an inquiry into work practices in one-stop shops

Eriksén, Sara January 1998 (has links)
New information technology is developing faster than the models, metaphors and methods in use for conceptualizing the sharing and managing of information in organizations, in communities and in society in general. The way we utilize information technology today does not seem to succeed in supporting the everyday work practices through which organizations accomplish their work. In this PhD dissertation, the results of a research project about skill, cooperation and computer support in public service one-stop shops are presented and discussed. Based on these results, alternative metaphors are presented for understanding the constructive aspects of front office work practices, One hypothesis is, that there is added value in not only being aware of multiperspectivity as an issue, but of making use of it in design. A problem here is that many traditional research methods, as well as most methods for systems development, are designed to diminish rather than make use of ambiguity and diversity. The metaphor of inverted indexicality of language is introduced in order to conceptualize the construction of meaning in action. New ways of conceptualizing IT management on the shop floor - including design issues - are proposed. Metaphors like the art of IT management, gardening and caring for are indicative of the issues at stake. / <p>This book is for sale! The Hardcopy-version of this thesis is available for 200 SEK, not including postage. Please contact the author if you are interested! mailto:sara.eriksen@bth.se</p>
63

Řízení ECM v rámci modelu řízení podnikové informatiky MBI / Management of ECM within ICT management model MBI

Malý, Jan January 2014 (has links)
The thesis is focused on ECM and its representation in the reference model of IT management MBI. The main objective is to extend the aforementioned model with objects associated with the ECM - factors describing the structure of solutions, tasks defining the procedure for its implementation and the links between them and existing objects. The thesis analyzes in detail the benefits, but also the risks and problems associated with solution implementation. The methodology provides a set of best practices for the implementation of ECM.
64

Utvärdering av förvaltningsplaner ur ett tekniknära perspektiv : En fallstudie vid Trafikverket / Evaluation of management-plans from a technical perspective : A case study at the Swedish Transport Administration

Söderlund, Josefine, Törn, Ida January 2020 (has links)
På maintenance management modell (pm3) är den förvaltningsmodell Trafikverket adapterat till sin organisation med en indelning av verksamhetsnära och tekniknära förvaltning. Förvaltningsobjekt innehåller olika verksamhetsstöd och IT-system, dessa förvaltas genom styrdokument, så kallade förvaltningsplaner. Studien fokuserar på förvaltningsplaners användbarhet för den tekniknära förvaltningen ur ett tekniknära perspektiv. Avdelningen Informations- och Kommunikationsteknik Anläggningsinformation IT (IKTa) hade behov av att undersöka förvaltningsplanernas användbarhet och om de gav stöd åt den tekniknära förvaltningen. För att undersöka detta framtogs en frågeställning innehållande tre frågor: 1. Hur ser framtagningsprocessen för en förvaltningsplan på IKTa Trafikverket ut i dagsläget enligt den tekniknära förvaltningen; 2. Är förvaltningsplanerna användbara för förvaltningsobjekten ur ett tekniknära perspektiv; och 3. Hur säkerställs det att en förvaltningsplan är ett stöd för arbetet, och ett underlag för att främja objektivitet vid måluppfyllnad inom den tekniknära förvaltningen? Studien har bedrivits som en beskrivande fallstudie med en kvalitativ datainsamlingsmetod bestående av dokumentstudier och intervjuer. Intervjuer genomfördes med fyra Tekniknära förvaltningsansvariga och sex Tekniknära förvaltningsledare, samtliga utgör förvaltningsledningen inom den tekniknära verksamheten. Resultatet påvisar att förvaltningsobjekten är för stora och att det finns behov av delförvaltningsplaner för att öka detaljeringsnivån. Förvaltningsplansmallen behöver inte ändra rubrikstruktur, men en tydligare innehållsspecifikation för respektive rubrik är nödvändig. Det framkommer att förvaltningsplanerna i dagsläget inte används som de levande dokument de bör vara. Slutsatserna dragna är att Trafikverket behöver omformulera de mål som står i förvaltningsplanerna så de håller en högre objektivitet och mätbarhet än i dagsläget. Delförvaltningsplanerna är ofrånkomliga då de är dokumenten som håller den högre detaljeringsnivån som är uppföljningsbar. / The Swedish Transport Administration has done an adaptation of the På maintenance management model (pm3) where management has been divided into business management and technical management. A management-object includes both the business and the ITsystems. Moreover, the management-organization writes management-plans which are governing-documents for deliveries within the Swedish Transport Administration. This study focuses on the technical management perspective and the technical side of the management-plans. There was a need to study the management-plans’ usability at the Department of Information and Communication Technology – Infrastructure Information. As such, the following research questions were formulated: 1. What is the process of making management-plans in Infrastructure Information at the Swedish Transport Administration today, according to the technical management; 2. Are the management-plans useful for the management-object in the perspective of technical management; 3. How is it ensured that the management-plan is used to support the work, and a basis for objectivity when fulfilling goals within the technical management? This study was conducted in the form of a descriptive case study in which qualitative data was collected by means of interviews and document studies. The interviews included four managers and six leaders of technical management, who represent the administrative management within the technical management. The results show that the management-objects are too big, and that there is a need for sub-management-plans to acquire more details. The respondents of this study wish the management-plan was a more vivid document. The main conclusions drawn from this study are that the management-plans are useful as a follow up for activities but not for following up on goals. And that while the management-plans provide an overview of the management object, the sub-management-plans are needed to specify details
65

FROM ABRUPT CHANGE TO DAILY ROUTINES : The organizational effect of one year with COVID-19

Andersson, Oscar, Pamin, Genefra January 2021 (has links)
The way we work has changed rapidly since the COVID-19 pandemic turned the world upside down. Remote work and telecommuting have become the new norm, a trend many of us have not asked or wished for. In this sense, this research is a reassessment of how IT companies in Sweden approached and managed the sudden transition to working remotely. With the support of previous literature on the topics of crisis management, organizational routine dynamics, and telecommuting, a set of seven semi-structured interviews were conducted to better understand the long-term challenges companies face during a crisis-induced shift into remote work. Our research reveals that organizations manage to quickly adapt the core business routines and operations, while social interactions and communication issues seem to be the biggest bottleneck when moving entirely remote. This leads to a perceived loss in overall productivity and the suffering of the work-life balance among all our respondents and their teams.
66

Analysing tool connectivity through enterprise architecture with emphasis on user experience / Analys av kopplingar mellan digitala arbetsverktyg genom företagsarkitektur med betoning på användarupplevelse

Ljungström, Erica January 2017 (has links)
The methods for creating new (To-be) models within Enterprise Architecture is very similar to those used in Human-Computer Interaction for creating new products. Since Enterprise Architecture is used on existing systems, and because of the similarities between the methods used between the fields, the research question has been formulated as follows: "What is the relationship between tacit knowledge and the utility value of an architectural model for an organisational department studied through observations with experienced users?". The study aims to show that methods for reusing/changing already existing products produces a higher utility value when developing on an existing system. Since observations could show flaws and opportunities which can otherwise be overlooked, the architecture could benefit from gaining tacit knowledge which does not show from interviews. The results show that observations overall give higher utility and the hypothesis, that the observation and interview methods give equal utility values, can be discarded. / De metoder som används för att skapa nya (To-be) modeller inom Enterprise Architecture är mycket lika de som används inom Människa-Dator Interaktion för att skapa nya produkter. Då Enterprise Architecture används på redan existerande system, och eftersom det finns likheter mellan metoderna från båda fälten, har studiens fråga formulerats som: "Vad är reltationen mellan fingertoppskänsla och ’utility value’, av en arkitekturmodell för en organisationsavdelning studerat genom observationer med erfarna användare? Studien ämnar visa att metoder för att återanvända/ändra redan existerande produkter kan ge högre ’utility values’ när man utvecklar ett redan existerande system. Då observationer kan visa på brister och möjligheter, som annars kunde ha förbisetts, kan arkitekturen dra nytta av att erhålla denna underförstådda kunskap som inte yttras via intervjuer. Resultatet visar på att observationer övergripande ger högre ’utility value’ samt att hypotesen, att observationer och intervjuer ger samma ’utility values’, kan förkastas.
67

MAINTAINING MAINTENANCE : The Importance of Evaluation and Upkeep in Maintenance Management Models

Berglin, Sebastian, Wennberg, Albin January 2022 (has links)
This thesis explores the consequences of neglect and lack of proper support and implementation in maintenance management models, specifically an old implementation of the Pm3 model. The area of study is not widely explored, with studies and evaluation of the specific model we have looked at being almost non-existent. We have conducted a qualitative case study at an IT department/company at a Swedish university and the data has been collected through interviews with different IT department leaders, as well as one interview with a representative with the company that owns and distributes the Pm3 model. The current software development methodology at the IT company studied in this thesis are agile methods but is locked down to a micro level, while the Pm3 model handles the macro level. The consequences of this are then compared against research within fields such as IT governance and IT/business alignment to find discrepancies from which the phenomena’s can be explained. With this thesis we want to explore the consequences of not maintaining maintenance management models in organizations, especially the Pm3 model as this is widely in Swedish institutions such as universities and government authorities. This thesis provides a word of caution and argue for the importance of maintenance in maintenance management models for such organizations.
68

Develop and Implement an Application Portfolio Management Framework : A case study at Atlas Copco / Utveckla och implementara ett ramverk för organisering av applikationsportfölj : En fallstudie på Atlas Copco

Guo, Jiayi January 2023 (has links)
Application portfolio management (APM) is the ongoing process of managing and optimizing the IT application portfolio to maximize its value. It has become increasingly important since large organizations today rely on hundreds, if not thousands, of applications to operate their businesses which in turn causes problems such as unused, redundant, or inefficient applications. Thus, numerous APM research has been conducted in the past to efficiently manage the application portfolio, but there is a lack of recent studies. This case study, which is a collaboration with Atlas Copco aims to contribute to both research and industry by developing and implementing a simple yet flexible APM framework that yields insightful analysis and application assessments. We propose a comprehensive APM framework consisting of the key phases: Objectives &amp; scope definition, data type definition, data collection, process review and process adjustment. We identify the relevant information to be collected and the essential data analysis methods. To improve the flexibility of the proposed APM model, we also recommend adopting an iterative workflow by focusing on a small set of applications at a time. Our research approach consists in conducting interviews and workshops to gather input from key stakeholders and experts. Additionally, we perform a literature study to establish the theoretical foundation. In the considered case study, Power Apps and Power BI were used to collect and analyze the data. The outcomes were evaluated by the project managers and deemed successful in terms of fulfilling the main objectives. Furthermore, the evaluation reveals that the model is applicable not only within different departments of the company but potentially to other organizations as well. / Organisering av applikationsportfölj är ett sätt att hantera och optimera företagets applikationsportfölj för att maximera dess värde. Det har blivit allt viktigare i och med stora organisationer idag förlitar sig på hundratals, om inte tusentals, applikationer för att driva sina verksamheter. Detta i sin tur kan orsaka problem som oanvända, överflödiga eller ineffektiva applikationer. Således har en del forskning utförts tidigare för att effektivt hantera applikationsportföljen, dock finns det en brist på nya studier inom området. Denna uppsats, som är ett samarbete med Atlas Copco, syftar till att bidra till både forskning och industri genom att utveckla och implementera ett enkelt men flexibelt ramverk som ger insiktsfulla analyser och bedömning av applikationer. Vi föreslår ett ramverk bestående av nyckelfaserna: Mål &amp; omfattningsdefinition, datatypsdefinition, datainsamling, processgranskning och processjustering. Vi identifierar relevant information som ska inhämtas och essentiella datanalysmetoder. Därtill, för att förbättra modellens flexibilitet rekommenderar vi ett iterativt arbetsflöde genom att fokusera på en mindre grupp applikationer i taget. Vår forskningsmetod består i att genomföra intervjuer och workshops för att samla in data från viktiga intressenter och experter. Dessutom genomför vi en litteraturstudie för att etablera den teoretiska grunden. I fallstudien användes tjänsterna Power Apps och Power BI för att samla in och analysera data. Resultatet utvärderas av projektledarna och bedömdes uppfylla huvudmålen. Vidare visar utvärderingen att modellen är tillämpbar i andra avdelningar och potentiellt även på andra organisationer.
69

The Evolution of Information Technology Executive Position in Higher Education: The Strategic and Adaptive Chief Information Officer in Higher Education

Dlamini, Reuben S. January 2011 (has links)
No description available.
70

Optimierung des IT-Managements mittels Social Media

Anlauf, Linda, Reichelt, Dirk, Sonntag, Ralph, Wenk, Thomas 14 December 2012 (has links) (PDF)
1 EINLEITUNG Laut der ARD-Media-Studie 2011 liegt die Internetdurchdringung in Deutschland bei 74,4%. Erwachsene Onliner, welche gelegentlich bis regelmäßig im Netz sind, kommen auf eine Verweildauer von täglich 137 Minuten an 5,6 Tagen pro Woche [ARD2011]. Jede fünfte Minute im Internet wird auf Social-Media-Plattformen, wie Twitter, Xing oder Wikipedia, verbracht. Zwei der weltweit meistbesuchten Websites gehören zu den Social Media: Facebook und YouTube [PWC2012]. Durch die steigende Nutzung des Internets eröffnen sich Unternehmen Möglichkeiten, welche zur Wertschöpfung in den verschiedenen Unternehmensbereichen, beispielsweise der Marketingabteilung, Human Ressources sowie der internen und externen Prozessoptimierung, genutzt werden können [Parpart2009]. Eine intensive Nutzung der Social Media erzeugt allerdings auch einen immer weiter ansteigenden Daten- und Kommunikationsverkehr. Das wachsende Datenaufkommen aufgrund zunehmender Nutzerzahlen und immer größeren Anwendungen im Internet erfordert eine Aufstockung der Ressourcen im IT-Bereich, welche zum einen Kosten verursachen und zum anderen nicht permanent benötigt werden [ITM2011]. Social Media stellen demnach nicht nur die Marketingabteilungen vor neue Herausforderungen, sondern auch das IT-Service-Management. Beide Bereiche versuchen dem mit entsprechenden Monitorings entgegenzutreten und optimale Ergebnisse zu erzielen. Aufgrund von Daten werden Analysen erstellt und Beobachtungen sowie Vorhersagen getroffen. Diese Monitoringkonzepte gewinnen heutzutage immer mehr an Bedeutung für die Unternehmen, jedoch ist es heute übliche Praxis, dass jede Abteilung, unabhängig von anderen Bereichen, individuelle Monitoringkonzepte und Datenbankmanagementsysteme aufstellt und betreibt. Im Rahmen des vorliegenden Beitrages wird untersucht, wie sich diese derzeit etablierten Lösungen im Sinne eines gesamtheitlichen Ansatzes erweitern lassen und damit die Qualität des Monitorings und darauf aufsetzend möglicher Prognoseverfahren verbessert wird. Im Fokus der Untersuchung stehen dabei die Daten auf Basis von User Generated Content im Web 2.0. Diese Arbeit schlägt ein Konzept vor, wie die Daten aus verschiedenen Quellen kombiniert und aggregiert werden können. Zum einen wird gezeigt, welches Potential eine solche Datenintegration für die Steuerung des IT-Betriebs bietet, zum anderen, wie aktuelle Anwender von Social-Media-Monitoring von einer solchen Integration profitieren können. In einem Ausblick werden aktuelle Forschungsaktivitäten, welche sich aus der aufgeworfenen Problemstellung ableiten, diskutiert.

Page generated in 0.0941 seconds