• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1355
  • 927
  • 326
  • 224
  • 78
  • 63
  • 55
  • 42
  • 42
  • 36
  • 31
  • 27
  • 27
  • 21
  • 20
  • Tagged with
  • 3509
  • 1045
  • 631
  • 617
  • 576
  • 564
  • 424
  • 414
  • 395
  • 354
  • 326
  • 299
  • 273
  • 263
  • 240
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
321

IT Controlling / IT Controlling

Školník, Petr January 2010 (has links)
In last decades, we are viewers of the trend, when business informatics adopts and implements general managerial methodology, methods and tools. These are modified in the specific condition of business informatics. We can demonstrate this trend on the follow examples: Corporate Governance, derived IT Governance. Corporate Performance Measurement (CPM), derived IT Performance Measurement (IT PM) or Balanced Scorecard (BSC), derived IT Balanced Scorecard (IT BSC). There is enough scope for all this domains in the Czech written literature. But there is no scope for IT controlling. The main goal of this thesis is verify the Eschenbach concept of controlling can be adopted by business informatics in its specific condition. This diploma thesis also handles about problems and benefits caused by implementation this concept of controlling in business informatics. The main goal is reached by exploration literature, researches, case studies, articles and other paper or electronic essays, when the methods of deduction and synthesis are used for customizing general facts about controlling for IT Governance and IT Management Thesis is divided in three parts: At the beginning of this diploma thesis, there are introduced right assumptions for correct understanding of IT controlling. The benefits of this part we can see in the defining of system attributes of business informatics and comparison IT Management and IT Governance with two theoretical approaches to management control system. By this comparison is verified the possibility to adopt controlling in business informatics. In the second part of this diploma thesis, there is description of author concept IT controlling based on Eschenbach. There is description of main IT controlling function, institutionalization of IT controlling and the role of IT controller in organizational structure. The rest of this thesis is devoted to the concrete IT controlling functions, problems and solving of theirs. These are divides in two categories. The firs one is focused on performance oriented IT controlling. The second one is focused on IT costs oriented IT controlling. This thesis handles about IT controlling complexly. The result of this diploma thesis is author concept of IT controlling based on Eschenbach concept of controlling.
322

Systémy řízení podnikové informatiky / Systems for managing Enterprise IT

Hrubý, Karel January 2011 (has links)
The topic of this master thesis are the Systems for managing enterprise IT. This paper is divided into three parts, where the first and second part gives a comprehensive view and concentrates existing knowledge from the examined area. The third part consists of my own conclusions based on available resources. For the overall IT Management, it is necessary to manage and measure IT Performance. Therefore, the first part deals with IT Performance Management (ITPM).Performance Management should penetrate the entire organization and ITPM should be part of the overall Performance Management of the organization. It is necessary to manage and measure performance at all levels of the organization (strategic, tactical and operational level). To measure the organizational IT performance, it is necessary to design relevant metrics. To design these metrics it is recommendable to follow a framework, whether ITIL or COBIT. The second part of this paper deals with IT Management frameworks and their support for designing metrics. It deals with the new wave in IT -- ITSM (IT Service Management). The de facto standard for ITSM is ITIL. Furthermore, the second part discusses the de facto standard for IT Governance -- COBIT and IT Balanced Scorecard for clarifying and translating the vision and strategy into specific objectives. The third part describes a specific procedure for designing metrics according to the ITIL framework. In addition, this part describes the software Metricus which enables a centralized management of ITPM and uses a holistic view of the overall ITPM.
323

AN ASSESSMENT OF THE IT GOVERNANCE MATURITY AT SL

Stanojevic, Petar January 2011 (has links)
Today Information Technology (IT) can be found in every modern enterprise. As IT has become one of the most crucial parts of an enterprise, it has made management aware of the impact IT has on the success of the enterprise. This has led to a significant increase on IT investments. IT governance aims at assuring that IT delivers more value from IT investments and enforcing IT‟s role as a business enabler. AB Storstockholms Lokaltrafik (SL) is a government owned company that is responsible for the general transportation system in the municipality of Stockholm. This master thesis aims at assessing the IT organization at SL from an IT governance perspective. The purpose of such assessment is to identify problem areas and suggest measures for improvement. The IT governance framework COBIT (Control Objectives for Information and related Technology) has guided the theory for IT governance throughout this study. A framework for the assessment of the IT governance maturity at SL was developed based on the IT Organization Model Assessment Tool (ITOMAT), a formalized method for assessing the IT governance maturity. The IT governance maturity of SL obtained the score 2,68 out of 5,00. Considering the fact that SL started with the process of introducing IT governance to the organization as recent as 3 years ago, the result obtained is higher than expected. It indicates that significant progress has been achieved in their IT governance. Nevertheless, the organization still has great potential for improvement.
324

Beyond IT and Productivity : How Digitization Transformed the Graphic Industry

Cöster, Mathias January 2005 (has links)
This thesis examines how IT and the digitization of information have transformed processes of the graphic industry. The aim is to show how critical production processes have changed when information in these processes have been digitized. Furthermore it considers if this has influenced changes in productivity while also identifying other significant benefits that have occurred as a result of the digitization. The debate concerning the productivity paradox is one important starting point for the thesis. Previous research on this phenomenon has mainly used different types of statistical databases as empirical sources. In this thesis though, the graphic industry is instead studied from a mainly qualitative and historical process perspective. The empirical study shows that digitization of information flows in the graphic industry began in the 1970s, but the start of the development and use of digitized information happened in the early 1980s. Today almost all types of materials in the industry, for example text and pictures, have developed into a digital form and the information flows are hereby more or less totally digitized. A common demand in the industry is that information produced should be adaptable to the different channels in which it may be presented. The consequences from use of IT and the digitization of information flows are identified in this thesis as different outcomes, effects, and benefits. The outcomes are identified directly from the empirical material, whilst the resulting effects are generated based on theories about IT and business value. The benefits are in turn generated from a summarization of the identified effects. Identified effects caused by IT and digitization of information include integration and merging of processes; vanishing professions; reduced number of operators involved; decreased production time; increased production capacity; increased amount and quality of communication; and increased quality in produced originals. One conclusion drawn from the analysis is that investments and use of IT have positively influenced changes in productivity. The conclusion is based on the appearance of different automational effects, which in turn have had a positive influence on factors that may be a part of a productivity index. In addition to productivity other benefits, based on mainly informational effects, are identified. These benefits include increased capacity to handle and produce information, increased integration of customers in the production processes, increased physical quality in produced products, and options for management improvements in the production processes. The conclusions indicate that it is not always the most obvious benefit, such as productivity, that is of greatest significance when IT is implemented in an industry. / <p>ISRN/Report code: LiU-Tek-Lic-2005:38</p>
325

Åtgärder för förbättrad säkerhetsmedvetenhet om organisatoriska riktlinjer

Joseph, Niclas, Rönnqvist, Ludvig January 2024 (has links)
In recent years, both the private and the government sector in Sweden have seen an increase in currentcyber and IT-related attacks. Despite a trend of increased technological aspects, investment securityincidents and breaches continue to rise. Organizations tend to overlook the importance of users, while statistics show that the majority of security incidents occur when an employee undermines existingcontrols. As a result of these incidents and attacks, IT security has become one of the most relevantand rapidly growing areas of focus in modern IT security. Employee awareness of organizational rules and guidelines is critical to ensuring a last line of defense. This study is carried out in a municipality in northern Sweden, where previous surveys show a trendof naivety and a lack of IT security. The Swedish municipalities have an important missioninfrastructure protection of sensitive sensitivity and information about their citizens. It is therefore particularly important that such an organization can demand and communicate thenecessary IT security requirements to its employees. In this study, we examine employees' awareness,perception and behavior towards the municipality's guidelines for information security, studies have identified potential measures that can contribute to increasing employees' security awareness and compliance with security measures and guidelines at an organizational level. The study uses qualitative methods to collect and analyze employees' awareness, perception and behavior towards information security guidelines. The method for collecting empirical evidenceconsists of two parts. Primary data is collected through a total of six semi-structured interviews, and secondary data is collected through the policy, rules, guidelines and security guidelines in document form. The analysis is carried out to point out potential patterns, regularities, specific deviations or underlying causes. The study found that employees show high general awareness of IT security, quick awareness of specific security measures and guidelines is slightly worse. The study presents five central measures and areas of action to improve precise awareness: Adaptation of the introductory training and additional training in relevant IT security areas, clearer communication channels between management, clarifying and developing an IT security policy in joint action.
326

Managing mission-critical IT in the financial industry

Mårtensson, Anders January 2003 (has links)
In recent years, IT has come to play an important role in companies. So successful execution of business processes often depends on mission-critical IT-solutions. Managing such IT is challenging. Companies have to keep up with rapid developments, but also consider long-term consequences while doing so. How do they survive in the long run without surrendering in the short run? What should be done in-house? What should be bought from external providers? How should they allocate scarce IT resources? This book answers these questions on the basis of four cases from the financial industry. After describing and analyzing IT portfolios, it investigates the questions of sourcing and technology adoption. Finally, it explores the relationship between mission-critical IT and business operations. The study suggests different ways of analyzing the role applications play in a company rather than the applications themselves. The character of an application may be in the eye of the beholder. Framing applications from both business and IT perspectives is also important, especially in information intensive companies. The Resource Allocation Matrix provides a tool for characterizing four types of IT-management efforts: agile action, firefighting, business transformation and platform construction. / Diss. Stockholm : Handelshögskolan, 2003
327

How companies manage IT security : A comparative study of Pakistan and Sweden

Qureshi, Mustafa Ali, Khalid, Farhan January 2013 (has links)
IT security provides comprehensive picture both internally and externally by act of ensuring that data is not lost when critical issues arise. In spite of the world has now been replaced with an imperative approach. The companies are using widely desktop computers, laptops, ipads, smart phones and workstation. The sum of all this has been influence to the IT based information and communication system in companies.   The purpose is to do research by taking a critical look at how different kind of business and non-business companies manage their IT security in Pakistan and Sweden with specific emphasis on the administrative controls. As the IT security has a list of steps but the authors focused on three major functions: IT security policy, IT security plan and IT security risk analysis.   As soon as the topic was selected the emphasis was laid on collecting and reading material related to the IT security. It became clear that the most relevant and interesting task was not merely to investigate how different companies in Pakistan and Sweden manage their IT security but infact try to understand what kind of steps and measures lies behind to achieve them. The method was adopted qualitative because it fulfil the requirements which authors want to achieve in the form of deeper understanding how different companies manage IT security in two different countries.   This study concluded that Pakistani companies in terms of IT security policy should focus on data ware houses by implementing policies for securing of exploiting the data and in case of Swedish company IT managers should implement policies for securing of personal data. Evaluation techniques are missing from the companies of Pakistan and Sweden in IT security plan. Enhancing the performing of IT risk analysis to countermeasure the threat. Pakistani companies should focus on business model of information asset. In case of Swedish company higher level and more detailed analysis can apply to core areas of the IT system. These proposed points for improvements could also help in more understanding of IT security in Pakistan and Sweden.
328

[pt] A TEOLOGIA DO PRESBITERADO: UMA ANÁLISE SOBRE O PERCURSO TEOLÓGICO ENTRE EVENTO CONCILIAR E SUA RECEPÇÃO / [it] LA TEOLOGIA DEL PRESBITERIO: UN ANALISI DEL PERCORSO TEOLOGICO TRA L EVENTO CONCILIARE E LA SUA RICEZIONE

MARCOS QUAINI 21 March 2022 (has links)
[pt] Esta pesquisa analisa a recepção pós-conciliar da teologia do presbiterado do Vaticano II. O período pós-conciliar é entendido como o momento após o encerramento do Concílio até hoje. O estudo mostra o desenvolvimento da concepção renovada sobre a natureza e identidade dos presbíteros, que tem sua origem conceitual no reenquadramento proporcionado pela eclesiologia renovada, presente na Constituição Lumen Gentium, número vinte e oito. O trabalho assume o método da leitura bibliográfica e expõe os resultados do estudo dos principais documentos e eventos do Magistério Universal, bem como das duas principais correntes teológicas relacionadas ao tema. Estas duas frentes de pesquisa no pósconcílio têm em comum o fato de reproduzirem, com nuances diferentes, a polarização que se deu no Concílio entre uma linha mais cultual e outra missionária ou uma perspectiva mais cristológica e outra eclesiológica. Junta-se à análise do quadro de ideias a leitura de como alguns eventos histórico-teológico, sobretudo a crise de identidade teológica dos presbíteros marcou a recepção conciliar. Somado a isto, a obra traz uma rápida menção sobre questões atuais ligadas ao tema. Finalmente, com os dados levantados, o trabalho propõe uma leitura comparativa no último capítulo, expondo elos e rupturas, conceitos e ideias que marcaram definitivamente a leitura do Decreto Presbyterorum Ordinis, neste quase 60 anos de história. / [it] Questa ricerca analizza la ricezione postconciliare della teologia del presbiterio del Vaticano II. Il periodo postconciliare è inteso come il tempo successivo alla chiusura del Concilio fino ad oggi. Lo studio mostra lo sviluppo della rinnovata concezione della natura e dell identità dei sacerdoti, che trova la sua origine concettuale nella riformulazione fornita dalla rinnovata ecclesiologia, presente nella Costituzione Lumen Gentium, numero ventotto. L opera assume il metodo della lettura bibliografica ed espone i risultati dello studio dei principali documenti ed eventi del Magistero universale, nonché delle due principali correnti teologiche legate al tema. Questi due fronti di ricerca nel postconcilio hanno in comune il fatto di riprodurre, con sfumature diverse, la polarizzazione avvenuta al Concilio tra una linea più cultuale e una missionaria o una prospettiva più cristologica ed ecclesiologica. All analisi del quadro delle idee si aggiunge la lettura di come alcuni eventi storico-teologici, in particolare la crisi di identità teologica del sacerdozio, abbiano segnato l accoglienza conciliare. In aggiunta a ciò, il lavoro porta un rapido accenno alle questioni attuali legate al tema. Infine, con i dati raccolti, l opera propone una lettura comparativa nell ultimo capitolo, esponendo collegamenti e rotture, concetti e spunti che hanno segnato definitivamente la lettura del Decreto Presbyterorum Ordinis, in questi quasi 60 anni di storia.
329

Inställningen till Zero Trust på svenska företag : Ett examensarbete i samarbete med Orange Cyberdefense / The attitude to Zero Trust in Swedish companies : A thesis in collaboration with Orange Cyberdefense

Björkman, Jonathan, Råsberg, Fredrik January 2022 (has links)
Dagens IT-miljöer genomgår en förändring. De tydliga gränserna mellan ett företags inre miljö och den externa miljön har förändrats och håller på att suddas ut. Zero Trust har lyfts fram som en lösning för att bättre skydda dagens IT-miljöer men trots det är det få som använder det. Syftet med denna studie var att undersöka vad några svenska företag har för inställning till Zero Trust och om de ser några hinder med att implementera det i sina miljöer. För att besvara syftet valdes en kvalitativ ansats där sex semistrukturerade intervjuer genomfördes. Målet var att söka beskrivande och förklarande kunskap för att bidra till en ökad förståelse kring ämnet Zero Trust. Studien uppnådde även viss form av normativ kunskap vilket resulterade i ett antal rekommendationer riktade mot företag.   Studiens resultat visar att inställningen till Zero Trust är välvillig vilket beror på att de upplever krav från ledning, regelverk och kunder. De hinder som studien identifierar är föråldrade resurser (legacy), komplexitet, tid och kostnad som avgörande hinder för att implementera Zero Trust. Studien visar även visa att företagen är delade i uppfattningen om användaren av en resurs kommer påverkas negativt eller gagnas av Zero Trust. Studien landar i ett antal rekommendationer varav en menar att företag, för att behålla den välvilliga inställningen till Zero Trust måste vara lyhörda mot krav från omvärlden. Vidare rekommenderas även att företagen håller sig uppdaterade om ämnet, att de har en planering för arbetet som krävs och att de tar aktiva val för att undvika onödiga kostnader. / Today's IT environments are undergoing a change. The clear boundaries between a company's internal environment and the external environment have changed and are being blurred. Zero Trust has been highlighted as a solution to better protect today's IT environments, but despite this, few use it. The purpose of this study was to investigate what some Swedish companies have to say about Zero Trust and whether they see any obstacles in implementing it in their environments. To answer the purpose, a qualitative approach was chosen in which six semi-structured interviews were conducted. The goal was to seek descriptive and explanatory knowledge to contribute to an increased understanding of the subject Zero Trust. The study also achieved some form of normative knowledge, which resulted in a few recommendations aimed at companies. The results of the study show that the attitude towards Zero Trust is benevolent, which is since they experience demands from management, regulations, and customers. The barriers that the study identifies are outdated resources (legacy), complexity, time, and cost as crucial barriers to implementing the Zero Trust. The study also shows that companies are divided on whether the user of a resource will be negatively affected or benefited by Zero Trust. The study lands in a few recommendations, one of which is that companies, in order to maintain the benevolent attitude to Zero Trust, must be responsive to demands from the outside world. Furthermore, it is also recommended that companies stay up to date on the subject, that they have a plan for the work required and that they make active choices to avoid unnecessary costs.
330

IT security : Education, Knowledge and Awareness / IT Säkerhet : utbildning, kunskap och medvetenhet

Schiöld, Ellinor, Andersson, Sanna January 2022 (has links)
IT systems that contain large volumes of information are today extremely valuable to organizations. As the IT systems grow bigger, more challenges are emerging, vulnerability increases and control decreases. Organizations are using IT security to protect their IT systems from different threats and the human factor can be seen as one of the biggest risks towards IT security. Therefore it is not optimal to only focus on the technical solutions and measures, the focus should also be on the employees IT security knowledge and IT security awareness. To increase the knowledge of IT security and to make the employees more IT security aware requires continuous work and IT security education is often mentioned as a factor to increase IT security- knowledge and awareness. Despite this, challenges are mentioned in previous research, which means that even if an employee participates in an IT security education, the organizations can not take for granted that their employees have gained IT security knowledge or know how to act more security aware. IT security education, IT security knowledge and IT security is mentioned as three factors that can affect IT security. Three research questions were intended to be answered within this research with the purpose to investigate if these factors increase each other. Three hypotheses were also forming the basis for answering the research questions. With a quantitative method and questionnaire this research reached out to 158 employees at different Swedish branches within machine manufacturing, advertising, municipal work and sales industry. Results showed that one of the three hypotheses was accepted and the other two hypotheses were not accepted. This result also gave answers to the research questions regarding that IT security education does not increase IT security knowledge, IT security knowledge does not increase IT security awareness but IT security education increases IT security awareness.

Page generated in 0.7399 seconds