• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 96
  • 45
  • 24
  • 21
  • 19
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 228
  • 228
  • 93
  • 89
  • 80
  • 53
  • 38
  • 37
  • 34
  • 31
  • 24
  • 21
  • 21
  • 21
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Analýza rizik IT / Analysis of IT risks and creation of correctional actions in company Metalik Ltd.

Zrcek, Milan January 2010 (has links)
The aim of this thesis is to analyse the risks of information technologies in the company Metalik Ltd. which balances on the boundary of small and medium enterprises. One part of this analysis is a preparation of the scale for estimation of the impacts, threats and vulnerabilities. Finally is drafted a register of actions which responds to IT risks which were identified in the frame of the thesis. The register is in compliance with the business plan of the company and its recent market position. The contribution of this thesis is in showing how the firm, which can represent the typical small or medium enterprises, works with IT risks. The principles of some correctional actions can be also generally related to this group of enterprises. The benefit specifically for the firm Metalik Ltd. is documentation for future work with the risks connected with the information technologies.
72

Leveraging Information Technologies and Policies to Influence Short- and Long-term Travel Decisions

Yuntao Guo (5929718) 13 August 2019 (has links)
<div>Growing automobile dependency and usage continue to exacerbate traffic congestion, air pollution, and physical inactivity in metropolitan areas. Extensive efforts have been made to leverage advanced technology and related policies to influence short- (within-day and day-to-day) and long-term (mobility and lifestyle) travel decisions to address these issues from the system operator and individual traveler perspectives. However, most studies have yet to address system operator and individual traveler needs together; provide sufficient understanding of the impacts of such technologies on safety and health; and consider the impacts of distinctive regional and political characteristics on responses to different policies among population subgroups.</div><div>This dissertation seeks to facilitate the leveraging of information technologies and related policies to influence short- and long-term travel decisions by: (1) developing a framework for apps that integrate augmented reality, gamification, and social component to influence travel decisions that address multiple user- and system-level goals, (2) understanding the safety and health impacts of these apps, (3) developing strategies to influence residential location decision-making to foster sustainable post-relocation travel behavior, (4) investigating the impacts of economic and legal policies on travel decisions by considering distinctive regional and political characteristics.</div><div>This dissertation can provide insights to system operators for designing a new generation of apps to dynamically manage traffic in real-time, promote long-term mode shifts from single-occupancy driving to carpooling, public transit use, walking and cycling, and address individual traveler needs. The dissertation also presents app mechanisms for providing feedback to legislators and app developers for designing policies and apps geared towards safe usage and promoting the physical and mental health of its users. </div><div>In addition, by considering the impacts of distinctive regional and political characteristics on population subgroups in terms of their responses to information technologies and economic and legal policies, additional measures can be deployed to support and facilitate the implementation of such technologies and policies.</div><div><br></div>
73

RFID based Smart goods and infrastructure

Pirazadeh, Nima, Pirazadeh, Laleh January 2009 (has links)
This report mainly focuses on RFID based smart goods and their effect on supply chainintelligence and local decision making. In today’s supply chain for making any decision, it isrequired to make a connection to central data bank system. Among some vertical transactionsbetween a special supply chain level and central part, decision is made. As it will be discussedin the report this structure has many disadvantages. The report tries to introduce a smartinfrastructure that is based on decentralized decision making enabled with smart goods.In this report several ways of distributing intelligence and providing smart logistic system withthe help of different technologies will be discussed and compared according to theiradvantages and disadvantages. The report introduces a smart infrastructure containing smartgoods, RFID tags and readers that supports local decision making idea and intelligencedistribution concept. Also smart freight benefits and possibilities in supply chain are discussedin the report.
74

Movimentos sociais no ciberespaço: uma investigação sobre o ciberativismo

Arruda, Gisele Regina Paes de 11 November 2011 (has links)
Made available in DSpace on 2016-04-29T14:23:03Z (GMT). No. of bitstreams: 1 Gisele Regina Paes de Arruda.pdf: 3974439 bytes, checksum: fac6519e5d1999ff8158be5e99f57d8a (MD5) Previous issue date: 2011-11-11 / This paper shows a contextualization of changes which has happened in relation to the Social Movements, specially from the 90s, the decade that marked the growth of communication and information technologies usage, bringing a horizontalization of social movements through cyberativism. Thus, the research intended to feature the internet evolution, illustrated by images and maps picked from The Atlas of Cyberspace by Martin Dodge and Rob Kitchin, simultaneously analyzing how the cyberspace has influenced on configuration of these new social movements when it approached these new technologies. Through a comparison and an analysis of some representative social movements, it will be develop a study on the internet role as a way of cyberativism formation in advertisement implementation of causes and society mobilization / Esta dissertação apresenta uma contextualização das mudanças que ocorreram nos Movimentos Sociais, sobretudo a partir dos anos 90, década que marcou o crescimento do uso das tecnologias da comunicação e informação, trazendo consigo uma horizontalização dos movimentos sociais por meio do ciberativismo. Assim, a pesquisa procurou traçar a evolução da internet, ilustrada mediante imagens e mapas retirados do Atlas do Ciberespaço de Martin Dodge e Rob Kitchin, simultaneamente, analisando como o ciberespaço influenciou na configuração desses novos movimentos sociais ao se apropriarem dessas novas tecnologias. Por meio da comparação e análise de alguns movimentos sociais representativos, desenvolveremos um estudo sobre o papel da internet como forma de disseminação e formação do ciberativismo na implementação de campanhas, divulgação de causas e mobilização da sociedade
75

Forensic Computing from a Computer Security perspective / Forensisk granskning av datorer ur ett datasäkerhetsperspektiv

Lázaro, Pablo García-Crovetto January 2004 (has links)
<p>This work contains a brief study about Forensic Computing problems done from a Computer Security perspective. </p><p>Based on the description and investigation methods of Forensic Computing, a list of common difficulties that forensic examiners have to deal with has been created. After making an analysis about each difficulty in the Forensic Computing field, it can be said that the main reasons are related to the legal restrictions and an incorrect security management. </p><p>Using a Computer Security perspective for analysing why the incorrect security management generates problems in the forensic computing field, we have made a risk analysis of a possible distribution for a correct security management. Later, based on own results, a list on priorities in prevention methods in t he Forensic Computing field has been created. </p><p>Finally it can be said that the difficulties in the Forensic Computing field could be avoided by creating awareness among users about the importance of taking prevention methods for protecting data and consequently for decreasing the number of e-crimes.</p>
76

Controlling Telework: An Exploratory Investigation of Portfolios of Control Applied to Remote Knowledge Workers

Wang, Jijie 06 May 2009 (has links)
Abstract Enabled by the development of information technologies, telecommuting and telework have been incorporated into organizations for around 30 years. However, there still exists resistance to this work arrangement, particularly from middle-level managers. Formal knowledge about how to manage telework is needed to keep the managers better informed. I conducted a qualitative exploratory study to investigate how managers exercise controls in the telework environment and examined the role of the use of information technologies in organizational controls in this work environment. Based on interview data with people from two work groups that participate in telework program, I found that the managers exercise a portfolio of controls that consist all four documented control forms (outcome, behavior, clan and self control), and controlling the employees’ adoption and use of information technologies is a new form of behavior control in the telework environment.
77

IT priežiūra mažose ir vidutinėse Lietuvos įmonėse / IT service in small and middle size Lithuanian companies

Baranauskaitė-Baliukienė, Virginija 11 June 2004 (has links)
The majority of all organizations are small and middle size companies in Lithuania. Information technologies are one of the most important parts of enterprise even if IT is not core business. It’s needed to support company’s information systems in order to achieve high effectiveness of IT. The goal of this work is to propose IT support recommendations orientated to small and middle size Lithuanian companies. The recommendations are based on ITIL, CobiT and quality management standard ISO 9001:2000. This work presents support stages and required software for collecting and storing needed information and monitoring the system’s performance. This software can perform described tasks with minimum consumption of resources. Proposed recommendations are not related to core business and organization’s IT. They can be applied by organizations with support they IT by themselves and by IT support outsourcing companies.
78

Pašto siuntų registravimo ir klientų informavimo sistemos tyrimas / Research of parcel registration and client information system

Baliūtis, Nerijus 11 January 2006 (has links)
The goal of this research is to create a modern computer system, which allows to trace a parcel location at any time and inform the consignor by sending an email or SMS. The client can by himself on the Internet, set the period for receiving messages to his email or telephone. The software will send information about attempted delivery times for the parcel to the consignee and his name and adreess. The system comprises the from following subsystems – order management system, transport management system, exception reporting, track and trace, warehouse management system, data warehouse and connectivity – information backbone. The office of exchange manager needs to know if a registered bag was not received on time, without looking through information on all bags arriving. Client needs to be informed that important parcels arrived when they arrived, without having to constantly look for it via the Internet. The answer is the modern paradigm of "Alert" and wireless communication. At the basis of the system is a set of definitions of events, targets, physical units and messages – alert definition, display and messages.
79

Informacinės sistemos programinės įrangos kūrimo darbų apimties įvertinimo modelis / Information systems software development amount estimation model

Mikulėnas, Gytenis 11 January 2006 (has links)
The main goal of this work is to analyze existing popular software size estimation and project completeness schedule methods and models, find advantages and disadvantages, try to combine them for using together, searching for common properties. The combination of these methods and models will give a new model, which will be tested with experimental research.
80

Interaktyvios interneto sąsajos kūrimo metodika integruojant Flash, XML, ASP.NET, MSSQL technologijas / The methodology of interactive internet user-interface development by integrating Flash, XML, ASP.NET, MSSQL technologies

Bargelis, Tautvydas 11 January 2006 (has links)
Internet in recent years has changed quite a lot, usual static user interfaces poorly satisfy user's requirements or do not at all. That is why there is a need to analyze a new breed of internet presentation-level technique – rich internet applications (RIA). Main RIA technologies and several internet projects were analyzed in this thesis. Macromedia Flash technology was chosen because of its flexibility, multiplatform implementation, rich user experience, good integration among various server technologies. An experimental system named Ferry transport booking system was built using Macromedia Flash technology and implemented with Microsoft server technologies. Experimental research of this project is described; a comparative analysis of rich internet application and simple static interface advantages is provided.

Page generated in 0.15 seconds