• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 77
  • 1
  • 1
  • Tagged with
  • 83
  • 83
  • 83
  • 26
  • 24
  • 14
  • 12
  • 9
  • 7
  • 7
  • 6
  • 5
  • 4
  • 4
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Seguran?a da informa??o e QoS na gest?o de redes de telecomunica??es em conformidade com as pr?ticas de ITIL? / Information Security and QoS in the management of telecommunication networks in conformance with ITIL

Freitas, Pablo Gulias Rufino de 02 May 2017 (has links)
Submitted by SBI Biblioteca Digital (sbi.bibliotecadigital@puc-campinas.edu.br) on 2017-08-08T12:17:56Z No. of bitstreams: 1 PABLO GULIAS RUFINO DE FREITAS.pdf: 2140333 bytes, checksum: 1e937a0df855e15ff38bbf36da286844 (MD5) / Made available in DSpace on 2017-08-08T12:17:56Z (GMT). No. of bitstreams: 1 PABLO GULIAS RUFINO DE FREITAS.pdf: 2140333 bytes, checksum: 1e937a0df855e15ff38bbf36da286844 (MD5) Previous issue date: 2017-05-02 / Pontif?cia Universidade Cat?lica de Campinas ? PUC Campinas / Traditionally, Information Security (IS) and Quality of Service (QoS), which means the capacity of a service to satisfy the needs of a user, have been considered separately, with different purposes and needs. However, the service levels that are advertised and expected for both are strongly linked. In this sense, despite the improvement in the performance of communication and of the confidentiality, integrity and the availability of data trafficked having greater premise, there still is no standardization for the joint and efficient use of IS and QoS. There are also no defined metrics or indicators that allow for this grouped measurement. This study proposed and tested a model for the management of communication networks, based on the best practices of the library for Information Technology Service Management (ITSM), Information Technology Infrastructure Library (ITIL), having the novelty of using the information security risk management process, from the 27005 (Risk Management) standard, in conjunction with a list of requirements checks of QoS and controls from the 27002 (Code of Practice) standard. This study looks to find the equilibrium between IS, performance and productivity. The results obtained showed the effectiveness of this proposal decreasing by approximately 16%, the number of incidents directly linked to IS and QoS, detected and solved in a proactive manner. / Tradicionalmente, Seguran?a da Informa??o (SI) e Qualidade de Servi?o (Quality of Service (QoS)), que significa a capacidade de um servi?o para satisfazer as necessidades do usu?rio, t?m sido consideradas, separadamente, com diferentes prop?sitos e necessidades. No entanto, os n?veis de servi?os anunciados e esperados por ambos est?o fortemente ligados. Nesse sentido, apesar da melhoria no desempenho da comunica??o e da confidencialidade, integridade e disponibilidade dos dados transportados serem premissas maiores, ainda n?o h? uma padroniza??o para um uso conjunto e eficiente entre SI e QoS. Tamb?m n?o h? uma defini??o de m?tricas ou indicadores que possibilitem essa medi??o agrupada. No presente trabalho, prop?e-se e testa-se um modelo de gerenciamento de redes de telecomunica??es, baseado nas melhores pr?ticas da biblioteca de Gerenciamento de Servi?os de Tecnologia da Informa??o (GSTI), Information Technology Infrastructure Library (ITIL), tendo como novidade a utiliza??o do processo de gest?o de riscos de seguran?a da informa??o, da norma 27005 (Gest?o de riscos), em conjun??o com uma lista de verifica??es de requisitos de QoS e controles da norma 27002 (C?digo de pr?ticas). Este trabalho busca o equil?brio entre SI, desempenho e produtividade. Os resultados obtidos mostraram a efetividade da proposta com uma diminui??o aproximada de 16%, da quantidade de incidentes diretamente ligados ? SI e QoS, detectados e solucionados de forma proativa.
82

Extracting Useful Information from Social Media during Disaster Events

Neppalli, Venkata Kishore 05 1900 (has links)
In recent years, social media platforms such as Twitter and Facebook have emerged as effective tools for broadcasting messages worldwide during disaster events. With millions of messages posted through these services during such events, it has become imperative to identify valuable information that can help the emergency responders to develop effective relief efforts and aid victims. Many studies implied that the role of social media during disasters is invaluable and can be incorporated into emergency decision-making process. However, due to the "big data" nature of social media, it is very labor-intensive to employ human resources to sift through social media posts and categorize/classify them as useful information. Hence, there is a growing need for machine intelligence to automate the process of extracting useful information from the social media data during disaster events. This dissertation addresses the following questions: In a social media stream of messages, what is the useful information to be extracted that can help emergency response organizations to become more situationally aware during and following a disaster? What are the features (or patterns) that can contribute to automatically identifying messages that are useful during disasters? We explored a wide variety of features in conjunction with supervised learning algorithms to automatically identify messages that are useful during disaster events. The feature design includes sentiment features to extract the geo-mapped sentiment expressed in tweets, as well as tweet-content and user detail features to predict the likelihood of the information contained in a tweet to be quickly spread in the network. Further experimentation is carried out to see how these features help in identifying the informative tweets and filter out those tweets that are conversational in nature.
83

A model for effective use of human resource information systems in South African State Owned Agencies

Mabaso, Thembi Merlyn 12 1900 (has links)
The relevance of this thesis is in addressing information systems business leadership HRIS use issues.The thesis explains acceptance and use issues central to Human Resource Information Systems (HRIS) within South African State Owned Agencies (SOAs). Organisations typically deploy HRIS with a view to automate Human Resource (HR) service delivery and administrative functions. Among other values, HRIS produces useful data and information which optimises HR operations and improves decision-making. However, the use of HRIS, notably within SOAs, is poorly understood owing to inadequate literature and contextualised studies. Despite the tremendous amount of investment into such systems, SOAs continuously identify emerging challenges and issues pertinent to HR operations and administration. For instance, despite HRIS automation, job applications and recruitment are still manually processed, which means that the costly implemented HRIS is not effectively used, and is thus underutilised. The burning questions for business leadership remain - why is HRIS not optimally utilised given significant organisational investment on such systems, and the mixed return-on-investments? The other question relates to what the level of acceptance is and actual use of these HR systems. There is also a need to determine to what extent do these systems enable or improve the delivery of human resource services and administration. Moreover, what influences the use of HRIS? Previous literature and organisational practice inadequately addresses these questions. This thesis, therefore, addresses these key issues to bridge these preceding knowledge gaps. In order to explain the use and subsequent effective use of HRIS, the study triangulated three theories as theoretical lenses. These theories are the Unified Theory of Acceptance and Use of Technology (UTAUT), Self Determination Theory (SDT), and the Representation Theory (RT). These theories are employed to explore and explain the individual use, and subsequent effective use of HRIS. In this respect, the ontological stance for this thesis is that reality is objective. Thus, the study followed a positivist research paradigm, whilst the research the approach was deductive. A survey research strategy was employed during the study to obtain primary data. Survey participants included executives and individuals from speciality units e.g. HR, Finance, Supply Chain, Support departments (including IT and Help Desks) as well as other HRIS users. Participants were drawn from various South African SOAs. Structural equation modelling and hypothesis testing show that there are myriad of determinants influencing use and effective use of HRIS. The results further show that certain constructs are inconsistent with the existing literature. Nevertheless, this inconsistency speaks to the unique South African SOA contexts. The outcome of the study is a model which theoretically and practically explains those factors which must be considered to effectively use and utilise HRIS. That is, the theoretical, practical, methodological, and contextual contributions of the thesis is in explaining the determinants which are significant for effective use of HRIS. / Centre for Business Manangement / D.B.L.

Page generated in 0.4785 seconds