541 |
An analysis of the potential implications of the introduction of the “use it or lose it” policy in the Zimbabwean mining sectorGwata, Hillary Kudzai January 2019 (has links)
Zimbabwe is endowed with vast mineral resources which can make a significant contribution to the GDP of the country. Amongst the mineral resources found in the country are diamonds, gold and platinum and theses resources need to be properly managed for them to benefit the country through revenue and also creation of opportunities in the country. This means that the existence of vast mineral resources has numerous direct and indirect benefits which have to be utilised fully. The management of the extractives industry in the country requires proper administration and such administration is mandated to the President, in whom all minerals in the country are vested, the Minister of mines and mineral development, the Mining affairs Board and Mining Commissioner(s).
The nature of mineral resources requires that all the parties involved in the administration thereof play their roles. Mineral resources are finite and cannot be left to be underground for extended periods as this can lead to sterility. Such a position has led to the government to consider implement the “use it or lose it” policy which in simple terms means that a holder of a mineral claim should exploit it or risk losing it. This study therefore sought to consider the implications of enforcing the policy in the country. This was done by firstly discussing how someone can obtain a limited real right to a mining location to exploit the minerals and this was achieved by looking at the pertinent provisions in the Mines and minerals Act dealing with the grant of licences. The writer thereafter discussed the provisions containing the “use it or lose it” policy to ascertain what the Act stipulates and how it can be enforced. Licences amount to a limited real right and expropriation, the effect of enforcing the policy leads to a violation of property rights which are sought to be protected by the Constitution of the country.
A discussion of these provisions and the effect thereof proved that a holder of a right under the Act to exploit minerals would have his right prematurely terminated if he was not working the mining location or was not developing his location. An investigation would need to be done to ascertain the circumstances and the Board will make a recommendation to the President who makes a final decision on expropriation. Compensation following expropriation is not always guaranteed but the Act does not explain how this decision is made and an aggrieved party has recourse to the court system. The writer raised concerns on the violation of property rights in the process when the government is exercising its powers for the benefit of the public.
The implementation of the policy is valid but issues of security of tenure are obviously raised and this does not paint a good picture on the government. One must always remember the violent land grab once implemented by the same government. Transparency together with equal and fair treatment was therefore recommended by the writer and a need to have shared responsibility in the decision making to avoid politicised decisions. The writer further recommended that the court system should not be influenced by the powers that be when a decision is being made pertaining the expropriation; the rule of law should therefore be protected. / Mini Dissertation (LLM)--University of Pretoria, 2019. / Public Law / LLM / Unrestricted
|
542 |
Návrh zavedení ITSM s využitím rámce ITIL se zaměřením na bezpečnost / Design for ITSM implementation with the use of the ITIL framework focusing on securityAntalík, Dominik January 2018 (has links)
The diploma thesis solves proposals for improving the quality of providing IT services and their optimization in the interest of the company and its business goals. For the needs of user-friendly IT services with optimized cost, the processes, functions, roles of employees and technology need to be a benefit for the business. By adopting and adapting the ITIL framework, it will be possible to increase the efficiency and effectiveness of providing IT services, to clearly define the IT service management and to define the main processes with the relevant objectives. The ITIL framework uses best practices that have been successfully used in other organizations. Practically proven processes, improved service quality and long-term optimization with continuous improvement offer cost-cutting potential. ISO/IEC 27013:2015 provides guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 200001 will be helpful in maintaining the integrity of the current information security management system with the design of IT services management.
|
543 |
Finansiella revisorns IT-kompetens : En studie om den finansiella revisorns granskning av affärssystem / The financial auditor’s IT competence : A study about the financial audito’s audit of aninformation systemAndersson, Julia, Lindemann, Mathilde January 2021 (has links)
Informationsteknik är ett expanderande område som utvecklas i takt med den teknologiska utvecklingen. Allt eftersom samhället blir mer digitaliserat har det en betydande påverkan på den finansiella revisorn och dess revisionsarbete. Det finns tidigare forskningar och diskussioner kring hur viktigt IT-kompetens är för den finansiella revisorn på grund av den växande IT-miljön. Syftet med denna studie var att undersöka om den finansiella revisorn har tillräckligt med IT-kompetens för att granska affärssystem, förstå om eller när den finansiella revisorn tar hjälp av en IT-revisor samt undersöka vilka förväntningar som finns på finansiella revisorer. För att besvara studiens syfte och frågeställningar har en kvalitativ forskningsmetod med semistrukturerade intervjuer genomförts. Respondenterna som deltog i undersökningen var revisorer från olika revisionsbyråer samt en VD, vilket la grunden för den empiriska data som därefter analyserades med hjälp av studiens teoretiska referensram. De centrala slutsatserna som tagits fram i studien är att den finansiella revisorn anser sig själva ha tillräckligt med IT-kompetens för att utföra deras arbetsuppgifter och för att kunna utföra granskningar av ett affärssystem. Studien påvisar att om en finansiell revisor ska kunna göra granskningar av ett affärssystem krävs det grundläggande kunskaper om hur affärssystem fungerar. Studien visar även att en finansiell revisor kan ta hjälp IT-revisorer när deras kunskaper inte är tillräckliga. Det förekommer främst vid granskning av komplexa och specialanpassade affärssystem. Till sist visar studiens resultat att förväntningarna som finns på finansiella revisorer överensstämmer med kundens förväntningar. / Information technology is an expanding area that is evolving in step with technological development. As the society becomes more digital, it has a significant impact on the financial auditor and its audit work. There is previous research and discussions about how important IT competence is for the financial auditor due to the growing IT environment. The purpose of this study was to investigate whether the financial auditor has sufficient IT competence to audit information systems, to understand if or when the financial auditor engages the help of an IT auditor and examine the expectations that exist for the financial auditors. To answer the studies purpose and the formulated questions, a qualitative research method with semi-structured interviews was conducted. The respondents who participated in the study were auditors from various auditing firms and a CEO, they formed the empirical data which were then analyzed by using the studies theoretical framework. The key conclusions in the study are that the financial auditor considers themselves to have sufficient IT competence to perform their tasks and to be able to audit an information system. The study indicates that basic knowledge of how information systems work is required from a financial auditor to perform an audit of the system. The study also indicates that a financial auditor can engage the help of IT auditors when their knowledge is not sufficient. It appears mainly in audits of complex and special adapted information systems. Lastly the result of the study shows that the expectation of the financial auditor is in line with the customer’s expectations.
|
544 |
Laboratorní úlohy v prostředí OPNET pro předmět Pokročilé komunikační techniky / Laboratory exercises in OPNET environment for Advanced communication techniques courseMikulecký, Miloš January 2012 (has links)
The Master´s Thesis describes laboratory exercises for Advanced communication technology subject. Exercises are created in Opnet IT Guru aplication. Each exercise has detailed instructions according to which can be realized whole exercise. Each exercise also contains individual task, where are checked knowledge gained from studies of example exercise. Exercises are based on issues of routing in autonomous systems, protocol BGP, protocols TCP and UDP and issues of QoS in IP networks.
|
545 |
Návrh a implementace části informačního systému podniku / Part of the Enterprise Information System Proposal and ImplementationMaringa, Dominik January 2014 (has links)
The diploma thesis focuses on information systems analysis and assessment of a chosen company. After results evaluation based on this analysis, a proposal will be made on how to convert the former information system into a new one. This proposal will be described from an economic point of view at the end of the thesis as well.
|
546 |
Kvinnors karriärval inom IT-branschen : En kvalitativ studie om kvinnors karriärval inom IT-branschen med fokus på User Experience DesignSivén, Annie, Möllenhoff, Nichole January 2020 (has links)
Följande kandidatuppsats är en kvalitativ studie angående kvinnors yrkesval inom IT- branschen med fokus på User Experience Design. Syftet med studien är att undersöka varför kvinnor i allt större utsträckning söker sig till UX Design, då man inte ser denna utveckling i övriga professioner inom IT. Problemområdet blir därmed att studera om det finns någon problematik som kvinnor möter inom sin utbildning eller på sin arbetsplats. Flera företag har uppmärksammat kvinnors intresse för UX Design. Detta främst på grund av att de kvinnliga medarbetarna inom arbetsgrupper inriktade på UX Design vid flertalet fall är i majoritet, vilket inte hör till vanligheten inom IT-professioner. År 2016 stod kvinnor för majoriteten av konsultroller inom UX Design, samt av UX-talanger stod kvinnor för dryga 80 %. Statistik från UHR år 2019 tyder på att skillnaderna mellan män och kvinnor inom utbildningar inriktade på UX Design, inte var speciellt stora. I studien har sju intervjuer utförts, där tre av respondenterna är verksamma inom UX Design och resterande fyra deltagare studerar eller arbetar inom andra professioner i IT-branschen. Av respondenterna var det en blandning av män och kvinnor, varav tre är män samt fyra är kvinnor. Resultatet tyder på att det finns ett flertal aspekter till varför kvinnor söker sig till UX Design. En av dessa faktorer kan vara att den sociala miljön stimulerar kreativiteten. Det finns kvinnliga förebilder där vilket ger en trygghet som inte är lika given i en mansdominerad profession. Det kan även finnas en brist av manliga förebilder som stöttar vilket också kan vara en bidragande faktor, samt att kvinnor har en felaktig bild av vad IT som yrke omfattar. / The following bachelor thesis is a qualitative study on women's participation in the IT-industry which focuses on User Experience Design. The purpose of the study is to investigate how women find themselves looking for UX Design over other IT-professions. This is to see what obstacles women face in their education as well as in their workplace, and thus be able to obtain improvements to be made. Several companies have drawn attention to women's interest in UX Design. This is mainly due to the fact that the majority of female employees, within working groups focused on UX Design, are in the majority of cases, which is not a common practice in IT-professions. In 2016, women accounted for the majority of consulting roles within UX Design, and of UX talents, women accounted for just over 80 %. Statistics from UHR in 2019 show that the differences between men and women in education focused on UX Design, were not particularly large. In most cases, the men were even a minority. The study has done seven interviews where three of the participants have worked in UX Design and the remaining four work in other professions in the IT-industry. Out of the participants, there was a mix of men and women, where three were men and four were women. The results show that there are a number of factors why women are choosing a career in UX Design. It may be because it is a social environment that stimulates creativity, there are female role models which provides a security that is not as given in a male-dominated profession. It can also be due to a lack of male role models who support the women interested in the industry, and lastly that women have an incorrect image of what IT as a profession encompasses.
|
547 |
IT-kopplade AC-nät : Enpoliga jordfel i befintlig elanläggning under jordLycksell, Linus January 2020 (has links)
In some electrical facilities for underground mining, IT-system grounding is used for processes of high priority. This report explains why such systems are used in these kinds of environments, what happens when single-line-ground faults occur and how does the fault protection and monitoring devices handle those faults in accordance to current regulations and standards.An IT-system imply that the neutral point of a transformer is completely or partially connected to earth and exposed conductive parts are bolted directly to ground.IT-coupled networks have been implemented in some mining industries to prevent long and unnecessary down time of production. This is achieved by allowing a single-line-ground fault without interfering with the operation. According to current regulations and standards a single-line-ground fault is allowed on the term that continuously monitoring the insulation of the system, alarm in presence of a fault and remedy as soon as possible.During a single-line-ground fault the artificial neutral point of the system will be displaced relative earth and different amounts depending on the resistance in the fault location. When a bolted single-line-ground fault occur, the faulty line will adopt earth-potential. Between a healthy line and earth, the potential difference reaches line-line voltage and even more than that, depending on the fault-resistance. This entails a higher requirement of the insulation level of the equipment installed in an IT-system. The fault current that emerges in an IT-system depends especially of the capacitive connection between the line conductors and earth, but it is reduced by the resistance in the fault location.In the existing electrical system of the underground mine, insulation-monitoring-devices where installed. These where setup with two alarm limits, one for alarming and the second for release of the circuit breaker feeding the main busbar, if the fault remains for longer than two hours.The insulation monitoring in the existing electrical system, where supplemented with residual-current-monitoring, setup to alarm for residual currents exceeding 60 mA. One presumption the residual-current-monitoring devices requires to be able to detect a fault, is that the upstream installed cable network is widespread enough, that the capacitive connection causes a big enough current to flow.In this report the characteristics of an IT-network were verified with calculations. Simple calculations of the minimum cable length were also made, when using residual-current-monitoring.The conclusion for the existing electrical system in the underground mine, is that the IT-system network of it, is installed in accordance with current regulations and standards in Sweden.
|
548 |
Docker forensics: Investigation and data recovery on containers / Dockerforensik: Undersökning och datautvinning av containersDavidsson, Pontus, Englund, Niklas January 2020 (has links)
Container technology continuously grows in popularity, and the forensic area is less explored than other areas of research concerning containers. The aim of this thesis is, therefore, to explore Docker containers in a forensic investigation to test whether data can be recovered from deleted containers and how malicious processes can be detected in active containers. The results of the experiments show that, depending on which container is used, and how it is configured, data sometimes persists after the container is removed. Furthermore, file carving is tested and evaluated as a useful method of recovering lost files from deleted containers, should data not persist. Lastly, tests reveal that malicious processes running inside an active container can be detected by inspection from the host machine.
|
549 |
Public Procurement of Complex IT Systems Within the Electricity Sector -Does the Law Encourage Good Business Practice?Sundgren, David January 2003 (has links)
The subject of this thesis is the Swedish Act (1992:1528) onPublic Procurement (APP) and its application in procurementwithin the electricity sector of certain complex IT systems.During the course of such procurements a need for flexibilityregarding the system functionality and the contractual scope ingeneral frequently arises. This is often due to the sheercomplexity of the system and the milieu that surrounds it. The Act on Public Procurement, which often applies inprocurement within the electric-ity sector, is based on thenotion that the customer may only acquire an object that issimilar to that initially described in contract notices andcontract documents. Between this basic notion and the need forflexibility in procurement of the IT-systems there is a clearconflict. This thesis is aimed at exploring this conflict. The APP is designed for procurement of a great variety ofobjects and different rules apply depending on the situation.Which provisions to apply are decided by the kind of customerand its kind of business activity, the estimated contractvalue, and the classifi-cation of the public contract as asupply, works, or service contract. Procurement of certain complex IT systems has someproperties that require particular attention and theseproperties do not seem to have been sufficiently observed whenthe APP was written. The law appears to assume that a clearspecification is readily avail-able in the early stages of aprocurement process and that well-functioning competition isprevalent. Complex IT systems may for several reasons rarely beultimately specified at the outset and therefore they ought notto be treated as if that were the case. The research work has consisted in studying what room forflexibility concerning system functionality and contractconditions the law permits during the course of theprocure-ment; during the evaluation of tenders, duringnegotiations, at the signing of the con-tract, and when changesin the contract or further contracts related to the firstcontract become necessary. To study the need for flexibility and how the contractparties manage this need in prac-tice, two case studies havebeen carried out within the research work. The result of thesecase studies has been related to the theoretical discussions onthe permissible level of flexibility. In one of the cases therules on public procurement may have cased some problems as aneed for substantial changes arose. In the other case there wasno need for major changes and consequently the rules did notcause any concern in this respect. <b>Key words:</b>Public Procurement, IT Systems, ElectricitySector, Good Business Practice / NR 20140805
|
550 |
Effektivisering av arbetet med sociala medierSveningson, Emil January 2015 (has links)
Målet med denna studie har varit att effektivisera arbetet med sociala medier på J.Lindeberg. Anledningen till att man funnit det nödvändigt att hitta ett effektivare sätt att arbeta beror på att J.Lindeberg jobbar med många olika sociala medier med flertalet konton på varje. Detta leder till att man lägger ner mycket tid på arbetet med sociala medier och mycket av tiden läggs på att växla mellan de olika kontona och sociala medierna. Innehållet som publiceras på sociala medier är inget som tas upp i arbetet, utan fokus ligger på de plattformar och verktyg som används i arbetet med sociala medier. Studien har genomförts med hjälp av observationer på J.Lindebergs huvudkontor i Stockholm, kvalitativa intervjuer med olika företag som arbetar med sociala medier och en kvantitativ undersökning om vilka plattformar företag använder i sitt arbete med sociala medier. Intervjuerna skedde dels på plats på företagen, men också över telefon. Undersökningen bestod av en enkät som mailades ut till företagen. Resultaten från intervjuer och undersökningen har samlats in och analyserats. Studien har visat att för att effektivisera arbetet med sociala medier bör de sociala medier som används i dagsläget minskas. Dessutom kan nya plattformar med olika verktyg för sociala medier användas för att effektivisera arbetet ytterligare. Slutligen bör också de olika kontona som används minskas och en databas med material för publicering införskaffas. / The goal of this study has been to streamline the work process of social media on J.Lindeberg. It was necessary to find a more efficient way to work because today J.Lindeberg uses many different social medias and with several accounts on each one of them. This leads to much time being spent on the work with social media and much of the time is devoted to toggle between the various accounts and social medias. The focus of the study is on the platforms and tools used in the work with social media and not on the content posted on the different social medias. The study has been carried out with the help of observations on J.Lindebergs headquartered in Stockholm, qualitative interviews with various companies working with social media and a quantitative survey on which platforms companies use in their work with social media. The interviews partly took place on the companies offices, but also over the phone. The survey consisted of a questionnaire that was distributed by email to the companies. The study has shown that in order to streamline the process the social medias being used should be reduced. In addition, new platforms with different social media tools can be used to streamline the work even further. Finally the different accounts that are used should also be reduced and a database of material for publication should be created.
|
Page generated in 0.0579 seconds