• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1355
  • 927
  • 328
  • 224
  • 79
  • 63
  • 55
  • 42
  • 42
  • 36
  • 31
  • 27
  • 27
  • 21
  • 20
  • Tagged with
  • 3513
  • 1046
  • 631
  • 618
  • 577
  • 564
  • 424
  • 414
  • 395
  • 354
  • 326
  • 299
  • 273
  • 263
  • 240
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
521

Säkerhetsmedvetenhet hos hemanvändare / Security Awareness of Home Users

Lagerstrand, Philip January 2015 (has links)
IT utgör en stor del av majoriteten av folks vardagliga liv. Smartphones och surfplattor har om möjligt ytterligare ökat vår användning av tekniska enheter och prylar på en daglig basis. Arbetet tas med hem i en större grad med hjälp av laptops, VPN och molnmöjligheter. Mail kan tas emot i princip var och närsomhelst på dygnet. Men hur bra är säkerheten? På arbetsplatsen hanteras mycket av IT-säkerheten och ansvaret för den ofta av erfarna och dedikerade anställda, men hur ser det ut hemma där användaren själv har ansvaret för sin IT-säkerhet? I denna studie analyseras och identifieras risker och problem vid hantering av olika aktiviteter relaterade till IT-säkerhet i hemmet. Motivationsteorin TMT och en konceptuell modell av aktiviteter relaterade till IT-säkerhet användes för att ta fram frågorna till intervjuerna och för att analysera svaren. Information har samlats in genom intervjuer med personer i olika åldrar och med varierande erfarenhetsbakgrund. Risker har identifierats relaterat till brister i hemanvändares motivation att utföra aktiviteterna lösenordshantering och säkerhetskopiering samt bristande värderingar för aktiviteten utbildning.
522

Utvinning av volatil-data : En jämförelse av olika verktygs påverkan på Windows XP och 7 vid en volatil-data-utvinning

Jorlöv, David January 2013 (has links)
Examensarbetet går ut på att utreda vad verktyg vid volatil-data-utvinning (Reeve & Shipley, 2006) orsakar för förändringar på ett datasystem. Volatil-data är information som försvinner när datasystemet stängs av och kan vara nödvändig t.ex. när man försöker läsa en krypterad hårddisk, då krypteringsnyckeln (Casey, et al., 2011) kan finnas i (Random Access Memory) RAM-minnet som är volatilt. I IT-brottslighetens barndom utvecklades (Brown, 2009) metoder för att påverkan på ett datasystem vid ett beslag skulle bli så liten som möjligt. Detta gjordes för att beviset man får från datasystemet skulle hålla i en rättgång och gick ofta ut på att slå av strömmen på datasystemet. I dagsläget är detta inte alltid möjligt då viktig volatil information kan gå förlorad som t.ex. en krypteringsnyckel från RAM-minnet. Därför är det viktigt att (Blyth, et al., 2008) veta vad verktygen som används vid en volatil-data-utvinning orsakar för förändringar på datasystemet, för att man ska kunna använda sig av det verktyget som orsakar minst förändringar på datasystemet. Dessutom kan man i en rättegång tala om vilka förändringar verktyget orsakade.I examensarbetet har 14 verktyg analyserats på operativsystemen Windows XP och Windows 7. De med samma funktion jämfördes med varandra för att ta reda på vilka som orsakar minst förändringar i datasystemet. Från analysen av verktyg vid volatil-data-utvinning kan man konstatera att verktygen med ett grafiskt gränssnitt skrev betydligt mer till Windowsregistret än kommandoradsbaserade verktyg.
523

[it] ANALISI DELLE PREGHIERE EUCARISTICHE PER MESSA CON BAMBINI: A PARTIRE DALLA METODOLOGIA MISTAGOGICA DI CESARE GIRAUDO / [pt] ANÁLISE DA ESTRUTURA LITERÁRIO-TEOLÓGICA DAS ORAÇÕES EUCARÍSTICAS PARA MISSAS COM CRIANÇAS: UM ESTUDO A PARTIR DA METODOLOGIA MISTAGÓGICA DE CESARE GIRAUDO

ANTONIO JOSE DE MORAES 02 October 2017 (has links)
[pt] A análise das Orações Eucarísticas para missa com crianças, a partir da metodologia mistagógica de Cesare Giraudo, mostra que a anáfora não é uma série de pequenas orações que precedem as palavras da consagração e a elas se seguem, mas é um texto unitário de composição literário-teológica que reflete uma teologia precisa da eucaristia, cuja estrutura é bipartida, com seção anamnéticocelebrativa e seção epiclética, tendo como matriz de origem a oração de aliança vétero-testamentária denominada todá, com seus componentes: prefácio, santo, pós-santo na primeira parte e epiclese sobre os dons, relato institucional, anamnese, epiclese sobre os comungantes, intercessões e doxologia na segunda parte. A análise em questão identifica a correspondência teológica das duas grandes seções próprias de toda oração de aliança segundo a tradição vétero-testamentária e judaica, junta-mente com o fluxo lógico-teológico dos seus nove elementos particulares. Este estudo demonstra que o pedido fundamental de toda oração eucarística é suplicar ao Pai que envie seu Espírito sobre os dons e sobre a assembléia, para que, pela comunhão nos dons do pão e do vinho transubstanciados em corpo e sangue de Cristo, o Espírito transforme a assembléia em corpo eclesial de Cristo. Em se tratando de Oração Eucarística para missa com crianças, a finalidade pedagógico-catequética precisa ter bem presente a dimensão mistagógica da anáfora na elaboração de sua tradução. / [it] L analisi delle Preghiere Eucaristiche per Messa con bambini, a partire dalla me-todologia mistagogica di Cesare Giraudo, mostra che la Anafora non è uma serie di piccole preghiere che precedono le parole della consacrazione e ad esse seguono, ma un testo unitario di composizione letterario-teologica che riflette una precisa teologia dell Eucaristia, la cui struttura è bipartita, com sezione anamnetico-celebrativa e sezione epicletica, avendo come matrice di origine la preghiera di alleanza vetero-testamentaria denominata todá, con le sue parti: prefazio, santo, post-santo nella prima parte e epiclesi sui doni, racconto istituzionale, anamnesi, epiclesi su quelli che ricevono la comunione, intercessioni e dossologia nella seconda parte. L analisi in questione identifica la corrispondenza delle due grandi sezioni di ogni preghiera di alleanza, secondo la tradizione vetero- testamentaria, e giudaica, insieme al flusso logico-teologico dei suoi nove elementi particolari. Questo studio dimostra che la domanda fondamentale di ogni preghiera eucarística é chiedere al Padre che invii il suo Spirito sui doni e sull assemblea, affinché per mezzo della comunione con i doni del pane e del vino, transustanziati nel corpo e sangue di Cristo, lo Spirito trasformi l assemblea nel corpo ecclesiale di Cristo. Trattandosi di Preghiera Eucaristica per Messa con bambini, la finalitá pedagogico-catechetica deve avere ben presente la dimensione mistagogica dell Anafora nell elaborasione della sua traduzione.
524

Analýza vzdělávacích potřeb ve společnosti CertiCon,a.s. / Analysis of Educational Needs in the Company CertiCon, a.s.

Dufková, Kateřina January 2017 (has links)
This Diploma Thesis focuses on the analysis of the company educational and development system in one specific firm. The goal of this thesis is to analyse the current situation related to the educational and development system in CertiCon and to identify space for an improvement. The theoretical part focuses on introduction of the modern educational and development methodologies, explains the specifics of the IT sector and specifics related to the employment in this industry. The practical part analyses CertiCons educational system and suggests innovations and changes based on the stakeholders requirements.
525

Cross-Layer Design for Energy Efficiency on Data Center Network

Cheocherngngarn, Tosmate 27 September 2012 (has links)
Energy efficient infrastructures or green IT (Information Technology) has recently become a hot button issue for most corporations as they strive to eliminate every inefficiency from their enterprise IT systems and save capital and operational costs. Vendors of IT equipment now compete on the power efficiency of their devices, and as a result, many of the new equipment models are indeed more energy efficient. Various studies have estimated the annual electricity consumed by networking devices in the U.S. in the range of 6 - 20 Terra Watt hours. Our research has the potential to make promising solutions solve those overuses of electricity. An energy-efficient data center network architecture which can lower the energy consumption is highly desirable. First of all, we propose a fair bandwidth allocation algorithm which adopts the max-min fairness principle to decrease power consumption on packet switch fabric interconnects. Specifically, we include power aware computing factor as high power dissipation in switches which is fast turning into a key problem, owing to increasing line speeds and decreasing chip sizes. This efficient algorithm could not only reduce the convergence iterations but also lower processing power utilization on switch fabric interconnects. Secondly, we study the deployment strategy of multicast switches in hybrid mode in energy-aware data center network: a case of famous Fat-tree topology. The objective is to find the best location to deploy multicast switch not only to achieve optimal bandwidth utilization but also minimize power consumption. We show that it is possible to easily achieve nearly 50% of energy consumption after applying our proposed algorithm. Finally, although there exists a number of energy optimization solutions for DCNs, they consider only either the hosts or network, but not both. We propose a joint optimization scheme that simultaneously optimizes virtual machine (VM) placement and network flow routing to maximize energy savings. The simulation results fully demonstrate that our design outperforms existing host- or network-only optimization solutions, and well approximates the ideal but NP-complete linear program. To sum up, this study could be crucial for guiding future eco-friendly data center network that deploy our algorithm on four major layers (with reference to OSI seven layers) which are physical, data link, network and application layer to benefit power consumption in green data center.
526

Managerial competencies for information systems project success : development of a theoretical model and a proposed empirical investigation framework

Zainuddin, Eruani 11 1900 (has links)
This study examines the link between managerial competencies and Information Systems outsourcing (ISO) project success under different types of outsourcing relationships. At present, ISO is a multi-billion dollar industry, and has spawned a new industry related to the management of outsourcing contracts. At the micro-level, ISO offers firms economic, strategic, and technical benefits. Various academic and industry publications have observed the critical importance of managerial competencies in influencing ISO project success. Yet, research that investigates the relationship between managerial competencies and ISO project success is scant. In this study, we developed a theoretical model along with a set of propositions that can be empirically tested. The model and propositions are based on theories that stem from economics (Transaction Cost Economics and Agency Theory), strategic management (core competence, and Resource-based View), and social (Relational Exchange Theory and Social Exchange Theory) perspectives. We also proposed an investigation framework utilizing the case study approach to guide future empirical studies. Our theoretical model and propositions indicate different patterns of managerial competencies for the client and vendor project managers within the different types of ISO relationships. Apart from an empirical study based on our theoretical model and propositions, future research can adapt and/or extend the model to study knowledge residing in other project stakeholders such as project directors, or to study other outsourcing context such as offshore outsourcing projects. / Business, Sauder School of / Graduate
527

Model for IT governance to improve information technology alignment of multi-campuses in South African institutions of higher learning

Ngqondi, Tembisa Grace January 2014 (has links)
Information Technology (IT) has emerged as an important issue for the public and private sectors. It has been initially identified as a vehicle in supporting business processes by speeding up the process of decision making and easy access of information as required for the competitive advantage of businesses. Organisations regarded IT as an enabler of their business processes. As IT has grown, its shape and definition have drastically changed from being an enabler of the business processes to become a central and strategic concern within the organisation that drives the business processes. The new IT landscape has made organisations completely dependant on IT for their decision making and effective functioning. The dependence on IT has created a need for unified and effective structures, standards and best practices that ensure the effective execution of business processes using IT. The establishment of IT Governance for institutions of higher learning has created the dual challenges of how IT Governance can work within the culture of inclusiveness and shared decision making while better aligning existing IT structures. These dual challenges vary from one university to another based on the culture of the specific university. This study therefore suggests possible ways that IT Governance can shape an institution of higher learning by strategically aligning the institution’s IT strategy with the overall university strategy through the development of an IT Governance Model. To come up with the said proposed model, qualitative research techniques such as document analysis, observations, interviews, a questionnaire and briefing sessions were used during the research process. The comparative analysis of the case studied was used to identify different IT Governance models adopted by other universities. Literature was reviewed to establish the emerging IT Governance practices established and implemented by different authors. The result from this study is that an IT Governance model specific to WSU has been developed. This model can be used as guiding tool in establishing new IT Governance structures and also modify and improve the existing IT Governance structure of different institutions of higher learning. This model can further be used to guide the development of the institution IT Governance implementation architecture framework.
528

A Model of Effective IT Governance for Collaborative Networked Organizations

Safdar, Morooj January 2015 (has links)
Inter-organizational collaboration based on the use of IT systems is now essential for organizations working as Collaborative Networked Organizations (CNOs). However, little research has been done to examine the critical success factors involved in shared IT governance among members of a CNO. Accordingly, this research develops a model of inter-organizational IT-governance composed of critical success factors (CSFs) and key performance indicators. The study defines fourteen CSFs that are classified under the main four categories of IT governance, which include strategic alignment, resource management, value delivery and risk management, and performance measurement. In addition, the study identifies key performance indicators that measure the CSFs and evaluate the effectiveness of how partners work together in joint processes for a common goal. The main dimensions of the KPIs include consensus, alignment, accountability, trust, involvement and transparency. The model was validated by gathering feedback from participants in a healthcare on the importance of the CSFs and performance indicators. The findings confirm the importance of the CSFs but suggest that they could be ranked in order of criticality. In addition, certain CSFs were re-defined based on the experience of CNO participants and questions were raised related to the context of the CNO, which influences participant perceptions, as well as the degree of formalization noted in the CNO.
529

Specifika trhu práce IT aplikovaná na mezinárodní společnost Devoteam, s.r.o.

Najmanová, Veronika January 2008 (has links)
Diplomová práce se zaměřuje na makroekonomickou a mikroekonomickou analýzu trhu práce v IT sektoru. Mikroanalytická část práce se věnuje analýze motivace a spokojenosti ve firmě Devoteam, s.r.o. Výsledkem práce je doporučení pro personální politiku společnosti (na základě zjištěných informací z makro a mikroanalýzy trhu).
530

Specifika komunikace B2B s příkladem vybrané IT společnosti. / Specifics of B2B communiactions with an example of a chosen IT company

Prudká, Barbora January 2008 (has links)
To define the specifics of B2B communications, to make an analysis of communications instruments of an IT company Profinit and to evaluate propriety of the chosen communication mix owing to its target groups is the main goal of this thesis. The thesis is structured to five chapters. The main definitions and individual phases of preparation, application and evaluation of commercial communications are specified in the theoretical part. The last two chapters contain a practical communication example of IT company Profinit, its evaluation and recommendation.

Page generated in 0.039 seconds