• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 16
  • 4
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 31
  • 31
  • 28
  • 18
  • 11
  • 8
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

An Examination of a Virtual Private Network Implementation to Support a Teleworking Initiative: The Marcus Food Company Inc. Case Study

Ferguson, Jason 01 January 2010 (has links)
In this dissertation, the author examined the capabilities of virtual private networks (VPNs) in supporting teleworking environments for small businesses in the food marketing sector. The goal of this research was to develop an implementation model for small businesses in the food marketing sector that use a VPN solution to support teleworker access to corporate resources. The author conducted a case study of the Marcus Food Company (MFC) VPN implementation in conjunction with the system development life cycle (SDLC) methodology to achieve this objective. The SDLC methodology was used to support the planning, design, and implementation of the MFC VPN. The SDLC consists of five phases. For Phase 1, the Research Phase, the author examined the business requirements for a VPN, conducted a survey of MFC employees, and performed participant observation. In Phase 2, the Analysis Phase, the author analyzed the data collected during Phase 1 to facilitate the development of a requirements list. Next, in Phase 3, the Logical Design Phase, the author designed and developed standardized diagrams of the MFC VPN implementation. In Phase 4, the Physical Design Phase, the author identified specific processes, procedures, and technologies. For Phase 5, the Implementation Phase, the author described the implementation processes for the MFC VPN initiative. Finally, the author analyzed and interpreted the data collected and then reported the results of the research. The findings from this investigation demonstrate that the SDLC methodology was a framework for planning, designing, and implementing a secure and reliable VPN solution to support teleworking. Utilizing the SDLC methodology resulted in thorough documentation, including a review of in-place network documentation, results from a survey, prioritized functional and nonfunctional requirements lists, logical design diagram, and specific hardware/software components and configurations. Using the findings from the case study and SDLC methodology, the MFC VPN implementation model is presented. The MFC implementation model may be used in small businesses, of a size similar to MFC, in which VPN initiatives are being considered.
2

How IP VPN Affects Strategy for Company X

TSAI, TUN-CHI 16 July 2003 (has links)
The purpose of this article is to identify how Internet Protocol Virtual Private Network (IP VPN) affects the business strategy for Taiwan Internet Service Provider, using X Company as an example. With the change in technology, the world¡¦s business environment change from day to day. The break though development such as Internet Protocol Virtual Private Network, create a whole new era of communication. With the pressure coming from both the fixed network carrier (Type 1 telecommunications enterprises) and the existing Internet service provider competitors. X Company needs to find a new market niche to maintain its competition. Strategy becomes most important when the existing business model is coming into a mature stage. A partnership with other service carriers or an innovation within the same business filed becomes the crucial decision. Through X Company¡¦s internal data, this thesis will analyzed the strength and weakness compare to its current competitors. With the data from the customer survey, X Company can also identify the need of its customers. At the end, this thesis will prove X Company¡¦s trend toward IP VPN transformations is the right strategy. As data traffic expected to outgrow voice traffic in the coming year, X Company¡¦s transformation to IP-based Virtual Private Networks is the right strategy. IP VPN setup will be the trend of increasing dependence on the corporate network as a way of interconnecting users with enterprise software, business process, databases, and intellectual capital. Companies are transferring more enterprise applications between sites, as well as data replication and transfer. But enterprises are aiming at the same time to combine the effectiveness of information sharing with the network with the need to make sure security, manageability, functionality and privacy while being paying attention on cost control. X Company IP VPNs offer a more reasonable mean of doing so without the necessity for expensive leased line dedicated connections.
3

Protecting management information systems: Virtual Private Network competitive advantage

Sirisukha, Sid Unknown Date (has links)
Information security technologists and business scholars are motivated by a desire to understand how and to what extent the application of IT within enterprise systems leads to improved and secured organizational performance. An effective relationship between business and IT professionals is a primary determinant of success in gaining business advantage through the enterprise system. As business innovation has relied increasingly on partnerships between business and IT professional, a different perspective of how IT professionals view their organizational contributions was needed for organizations to remain competitive. Business knowledge is essential if IT professionals are to create linkages with other organizational units and have a wider perspective about business objectives, thus achieving fit between IT and organizational strategies. Organizations have started responding to this challenge by demanding more business acumen in their IT staff. The focus of this study is on the knowledge that is beyond that of independent business and IT only domain knowledge of information security. Therefore, technical areas of knowledge, such as hardware and software, all of which are closely associated with IT skills, are not discussed in this thesis. This is not to declare that such knowledge is not important. Clearly technical knowledge is part of the IT professional's overall information security technology expertise, but this study is about the organization proficiency of business and the IT professional, and is therefore interested in what enables business and IT professionals to apply their business domain and technical knowledge in ways that are beneficial to the organization and to act cooperatively with their customers and business partners. The purpose of this study is to employ the triangulation method to identify the theoretical links and empirically examine the association between business and IT perspective of information security. An important contribution of this study is the identification of business and IT perspectives on information security technology. By establishing the link between business and IT, the study focuses and evaluates Virtual Private Network (VPN) as an information security technology to find out if VPN can secure and gain competitive advantage by partisan business process and organization performance. This study articulates distinctive characteristics of Virtual Private Network and management processes that extend the range of applicability across diverse business segments. It distinguishes between business and IT and explains why the exploitation of a complementary set of related information security entities (such as VPN) across multiple functions create competitive vi advantages even across a diverse set of businesses that have limited opportunity to exploit business process and organization performance. The most important direct predictor of this study is a high level of communication between business and IT. However, one cannot mandate meaningful communication between individuals. IT people have to earn the right to play a meaningful role in management forums. Based on the findings from this study, one important way for an IT person to be heard is for him/her to devote the time necessary to create competitive advantage and develop shared domain knowledge, the most influential construct in the research model. An IT person needs to understand the leverage points of the industry, the history and current issues of the business units, and to learn to apply business oriented objectives in the application of technology to business problems. This change in view would help focus their attention on security technology and ideas that could produce the most benefit and create competitive advantage, rather than those that offer the most technical promise.
4

Network Capability Analysis and Related Implementations Improvements Recommendations

Tabassum, Mujahid, Elkhateeb, Khamees January 2009 (has links)
<p>The networking field has become a core component for any company. All of the</p><p>businesses rely on the networking industry, due its vastness and significance. Every day</p><p>companies are planning and thinking to develop better strategies that can offer efficient</p><p>and reliable communication solutions between their employees and customers for</p><p>maximum revenue. The planning of a company’s network requires a lot of resources and</p><p>aspects to study, and to evaluate them carefully to build a comprehensive secure and</p><p>reliable platform. It is the job of a network administrator to take care of the company’s</p><p>network infrastructure and upgrade or update the required components and applications</p><p>from time-to-time that can follow new standards.</p><p>This thesis is a practical work aimed to evaluate a company network infrastructure in its</p><p>real environment. The purpose of this thesis is to evaluate different aspects of the</p><p>network infrastructure used such as VPN, WLAN, firewall and physical security and give</p><p>recommendations to make their performance better and to offer more advanced strategies.</p><p>This study will also provide an inclusive observation of the company’s needs and their</p><p>network infrastructure, and will provide a concept how to evaluate and fix small mistakes,</p><p>the kind of problems that can occur in an evolving company network. Lastly, this research</p><p>will make recommendations and suggest a possible implementation on the studied</p><p>network infrastructure.</p>
5

VPN : Virtual Private Network i Windows 2000

Norin, Anders, Ohlsson, Henrik January 2002 (has links)
No description available.
6

Network Capability Analysis and Related Implementations Improvements Recommendations

Tabassum, Mujahid, Elkhateeb, Khamees January 2009 (has links)
The networking field has become a core component for any company. All of the businesses rely on the networking industry, due its vastness and significance. Every day companies are planning and thinking to develop better strategies that can offer efficient and reliable communication solutions between their employees and customers for maximum revenue. The planning of a company’s network requires a lot of resources and aspects to study, and to evaluate them carefully to build a comprehensive secure and reliable platform. It is the job of a network administrator to take care of the company’s network infrastructure and upgrade or update the required components and applications from time-to-time that can follow new standards. This thesis is a practical work aimed to evaluate a company network infrastructure in its real environment. The purpose of this thesis is to evaluate different aspects of the network infrastructure used such as VPN, WLAN, firewall and physical security and give recommendations to make their performance better and to offer more advanced strategies. This study will also provide an inclusive observation of the company’s needs and their network infrastructure, and will provide a concept how to evaluate and fix small mistakes, the kind of problems that can occur in an evolving company network. Lastly, this research will make recommendations and suggest a possible implementation on the studied network infrastructure.
7

VPN : Virtual Private Network i Windows 2000

Norin, Anders, Ohlsson, Henrik January 2002 (has links)
No description available.
8

Virtual Fiber Networking and Impact of Optical Path Grooming on Creating Efficient Layer One Services

SATO, Ken-ichi, HASEGAWA, Hiroshi, YAMADA, Yoshiyuki, NARUSE, Fumisato 03 1900 (has links)
No description available.
9

Protecting management information systems: Virtual Private Network competitive advantage

Sirisukha, Sid Unknown Date (has links)
Information security technologists and business scholars are motivated by a desire to understand how and to what extent the application of IT within enterprise systems leads to improved and secured organizational performance. An effective relationship between business and IT professionals is a primary determinant of success in gaining business advantage through the enterprise system. As business innovation has relied increasingly on partnerships between business and IT professional, a different perspective of how IT professionals view their organizational contributions was needed for organizations to remain competitive. Business knowledge is essential if IT professionals are to create linkages with other organizational units and have a wider perspective about business objectives, thus achieving fit between IT and organizational strategies. Organizations have started responding to this challenge by demanding more business acumen in their IT staff. The focus of this study is on the knowledge that is beyond that of independent business and IT only domain knowledge of information security. Therefore, technical areas of knowledge, such as hardware and software, all of which are closely associated with IT skills, are not discussed in this thesis. This is not to declare that such knowledge is not important. Clearly technical knowledge is part of the IT professional's overall information security technology expertise, but this study is about the organization proficiency of business and the IT professional, and is therefore interested in what enables business and IT professionals to apply their business domain and technical knowledge in ways that are beneficial to the organization and to act cooperatively with their customers and business partners. The purpose of this study is to employ the triangulation method to identify the theoretical links and empirically examine the association between business and IT perspective of information security. An important contribution of this study is the identification of business and IT perspectives on information security technology. By establishing the link between business and IT, the study focuses and evaluates Virtual Private Network (VPN) as an information security technology to find out if VPN can secure and gain competitive advantage by partisan business process and organization performance. This study articulates distinctive characteristics of Virtual Private Network and management processes that extend the range of applicability across diverse business segments. It distinguishes between business and IT and explains why the exploitation of a complementary set of related information security entities (such as VPN) across multiple functions create competitive vi advantages even across a diverse set of businesses that have limited opportunity to exploit business process and organization performance. The most important direct predictor of this study is a high level of communication between business and IT. However, one cannot mandate meaningful communication between individuals. IT people have to earn the right to play a meaningful role in management forums. Based on the findings from this study, one important way for an IT person to be heard is for him/her to devote the time necessary to create competitive advantage and develop shared domain knowledge, the most influential construct in the research model. An IT person needs to understand the leverage points of the industry, the history and current issues of the business units, and to learn to apply business oriented objectives in the application of technology to business problems. This change in view would help focus their attention on security technology and ideas that could produce the most benefit and create competitive advantage, rather than those that offer the most technical promise.
10

Qualitative analysis about the experience of VPN from people with software expertise in Sweden

Gerdtsson, Markus, Nielsen, Erik January 2022 (has links)
VPN is primarily used to encrypt your network traffic and identity online securely from a private location. This can be used as a safety measure to prevent theft of personal data. It also allows its user to change the geolocation to wherever they want which unlocks the possibility to use another country's services. Related work has shown that there are also downsides to using VPN services. Some VPN solutions do have security problems that its user could be unaware of. This study explored the experience and beliefs surrounding the usage of VPN while browsing the internet from people with software expertise. Interviews were conducted with people in different areas surrounding usage of VPN services to get a deeper understanding of why VPN is used and to what extent they believe VPN is providing anonymity and security of their data. The findings from this study is that the main reason to use a VPN is to access unavailable services. These services can vary from content online that is not available in the region from where you access the internet to services that are work related and locked to specific networks. Another finding was also that among these people the belief that the use of a VPN was enough to make a user anonymous by itself is controversial.

Page generated in 0.0284 seconds