• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 147
  • 27
  • 24
  • 14
  • 9
  • 8
  • 7
  • 7
  • 6
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 312
  • 73
  • 60
  • 44
  • 35
  • 29
  • 27
  • 23
  • 22
  • 22
  • 21
  • 21
  • 21
  • 20
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Dopad bezpečnosti IIoT na proaktivní údržbu firemních aktiv / Impact of IIoT security on proactive maintenance of company's assets

Chomyšyn, Maxim January 2020 (has links)
This work examines possible safety risks associated with the operation of IIoT technologies in industrial production. The content of this document is an analysis of used IIoT technologies, their purpose and method of implementation into production processes and the company's technology strategy. The outcome of this analysis will serve to develop possible risk scenarios and their associated impacts. Finally, I recommend possible changes that either eliminate these risks completely or at least minimize them.
182

The pursuit of sustainability in the oil industry : A case study in an international company

Seinelä, Visa, Galouk, Yara January 2020 (has links)
Abstract Background: The oil industry is experiencing tremendous challenges due to the shifts in global markets and decreasing profits from oil. These challenges have steered companies to select more profitable investments and disregarding different matters of sustainability. However, the oil companies aim to be seen as more sustainable, since the demands of the public and governments increased toward sustainability. Thus, improving sustainability capabilities in the oil industry has become more critical than ever. In this study, the triple bottom line framework is used, which covers the social, environmental, and economical dimensions of sustainability. This study focuses on reactive and proactive practices that can overcome the barriers to achieving sustainability. Furthermore, the focus is on the oil industry’s pursuit of sustainability is facilitated by connecting reactive and proactive practices to improve the sustainability capabilities of a company. Purpose: The purpose of this study is first to identify the barriers to achieving sustainability in the oil industry and understand how companies can overcome these barriers by conducting reactive and proactive practices. Furthermore, the purpose is to understand how reactive and proactive practices can improve companies' capabilities for sustainability performance. Method: This study follows the inductive approach, as the aim was to discover new insights and assumptions from the studied phenomenon. Furthermore, the study is conducted as exploratory and qualitative, in order to provide a rich understanding of the barriers of sustainability within the oil industry, and how reactive and proactive practices can facilitate the capabilities for improving sustainability in companies. For the data collection method, semi-structured interviews were conducted with experts working within a single company that operates in the oil industry. The collected empirical data was analyzed with grounded analysis. Conclusion: With the empirical findings and existing literature, the internal and external barriers to achieving sustainability are identified. Furthermore, the connection with identified barriers and reactive and proactive practices is introduced, as well as how the practices facilitate overcoming these barriers. Also, the study connects reactive and proactive practices that improve sustainability capabilities in companies. The study suggests that practitioners focus on developing a solid foundation of reactive practices, on which to build strategies with proactive practices. Primarily the focus on the oil industry should be in the creation of environmental capabilities, as this potential is disregarded with the current set of practices. Improving triple bottom line dimensions is identified as a win-win process, which argues for the potential of improvement in environmental sustainability would assist in matching the economic and social demands of the oil industry.
183

Social Media Risk Management : and the impact on organization IT security

Holmstedt, Malena January 2020 (has links)
The purpose of this study was to investigate and try to describe how social media risk management is performed and what impact social media risk management could have on organizations IT security.  The outcome of this study is possible knowledge for researchers and for practitioners in the field, of how social media risk management was handled in some organizations in Sweden and what impact the chosen social media risk management could have on the IT security. This study looked at social media risk management and what impact it could have on organizations IT security through prior studies done and through data collected from semi structured interviews and surveys.  Social media risk management was according to this study performed mostly reactive and a majority of the organizations did not have risk management specifically for social media. More organizations had a social media policy than performed risk management for social media.  The risk management for social media in the IT organizations in this study was described in the interviews as reactive due to several reasons: old systems that made it hard to be proactive, lack of time for prioritizing social media risks or risk management for social media was currently being worked on.  The proactive IT organizations described themselves to have a general security policy and risk management plans for basically everything. Social media risks can lead to risks that impacts organization IT security.  In the interview notes five quotes was found that could be considered to suit the risks themes found in prior studies.
184

Reactive remote leadership - In disruptive times.

Bazancir, Bejna, Österberg, Jennie January 2021 (has links)
The worldwide Covid-19 pandemic caused lockdowns in countries across the globe and forced organizations to conduct remote work solutions, contributing for challenges to arise. Therefore, the purpose of this study is to investigate main challenges related to remote leadership caused by external disruptions. Further, this study has conceptualized remote work conditions and distinguishes between remote leadership derived from proactive changes and reactive changes to create the concept of “proactive remote leadership” and “reactive remote leadership”. A qualitative and exploratory method was applied through semi structured interviews, with nine managers at a global organization named Leaseplan. The empirical findings from the data collection discovered noticeable differences in challenges between the two remote leadership concepts. Main challenges found within reactive remote leadership which had not been highlighted in previous studies focusing on remote leadership were organizational silos, information sharing, transparency, workload, employee wellbeing and motivation. The findings suggest that it is important for both scholars and managers to put context to leadership to find nuanced challenges but also opportunities.
185

Relating school codes of conduct to learner behaviour

Pentz, Janos 10 May 2011 (has links)
Schools and other educational institutions mirror the violence and moral decay in South African society. Maintaining discipline therefore in schools these days is a difficult task. There are many factors influencing learner behavior and in this study we investigate to see what impact a code of conduct has on learner behavior in selected schools. I adopted a qualitative approach to answer the research questions that sought to explore whether or not intent of the codes of conduct in sampled schools is primarily moral or administrative, whether the learners in the public secondary schools selected are generally well-behaved, whether or not there is a relationship between learner behaviour and the codes of conduct at the selected schools and whether or not the infusion of values into codes of conduct in general might affect learner behaviour. A case study involving three high schools was conducted. Data was collected through document analysis, interviews and questionnaires. It has emerged in the findings that, with regard to learner behavior, there is a clear link between learner behaviour and the culture of the school concerned as well as between the culture of the school and the culture of the community that is served by the schools. Regarding the impact that existing codes of conduct have on learner behavior, it seems that the impact that a code can have is related to its development and implementation process. Due to these findings, it seems clear that values need to be considered in the development of a code of conduct. This may lead to a positive relationship between learner behavior and codes of conducts for learners. The study hopes to contribute to the existing body of knowledge and will be useful to school governing bodies, principals and educators by enabling them to see the benefits that a code of conduct could have on learner behaviour when values are included in the developmental and implementation process. / Dissertation (MEd)--University of Pretoria, 2010. / Education Management and Policy Studies / unrestricted
186

Les méthodes de caching distribué dans les réseaux small cells / Distributed caching methods in small cell networks

Bastug, Ejder 14 December 2015 (has links)
Cette thèse explore le caching proactif, l'un des principaux paradigmes des réseaux cellulaires 5G utilisé en particulier le déploiement des réseaux à petites cellules (RPCs). Doté de capacités de prévisions en combinaison avec les récents développements dans le stockage, la sensibilité au contexte et les réseaux sociaux, le caching distribué permet de réduire considérablement les pics de trafic dans la demande des utilisateurs en servant de manière proactive ces derniers en fonction de leurs demandes potentielles, et en stockant les contenus à la fois dans les stations de base et dans les terminaux des utilisateurs. Pour montrer la faisabilité des techniques de caching proactif, nous abordons le problème sous deux angles différents, à savoir théorique et pratique.Dans la première partie de cette thèse, nous utiliserons des outils de géométrie stochastique pour modéliser et analyser les gains théoriques résultant du stockage dans les stations de base. Nous nous focalisons en particulier sur 1-) les réseaux ``niveau-simple" dans lesquels de petites stations de base ayant une capacité de stockage limitée, 2-) Réseaux ``niveau-multiples" avec un backbone à capacité limitée et 3-) Les réseaux ``niveau-multiples groupés" à deux topologies différentes: déploiements en fonction de la couverture et en fonction de la capacité. Nous y caractérisons les gains de stockage en termes de débit moyen fourni et de délai moyen, puis nous montrons différents compromis en fonction du nombre de stations de base, de la taille de stockage, du facteur de popularité des contenus et du débit des contenus ciblés. Dans la seconde partie de la thèse, nous nous focalisons à une approche pratique du caching proactif et nous focalisons sur l'estimation du facteur de popularité des contenus et les aspects algorithmiques. En particulier, 1-) nous établissons dans un premier lieu les gains du caching proactif à la fois au niveau des stations de base qu'au niveau des terminaux utilisateurs, en utilisant des outils récents d'apprentissage automatique exploitant le transfert des communications appareil-à-appareil (AàA); 2-) nous proposons une approche d'apprentissage sur la base de la richesse des informations transmises entre terminaux (que nous désignons par domaine source) dans le but d'avoir une meilleure estimation de la popularité des différents contenus et des contenus à stocker de manière stratégique dans les stations de base (que nous désignons par domaine cible); 3-) Enfin, pour l'estimation de la popularité des contenus en pratique, nous collectons des données de trafic d'usagers mobiles d'un opérateur de télécommunications sur plusieurs de ses stations de base pendant un certain nombre d'observations. Cette grande quantité de données entre dans le cadre du traitement ``Big Data" et nécessite l'utilisation de nouveaux mécanismes d'apprentissage automatique adaptés à ces grandes masses de données. A ce titre, nous proposons une architecture parallélisée dans laquelle l'estimation de la popularité des contenus et celle du stockage stratégique au niveau des stations de base sont faites simultanément. Nos résultats et analyses fournissent des visions clés pour le déploiement du stockage de contenus dans les petites stations de base, l'une des solutions les plus prometteuses des réseaux cellulaires mobiles hétérogènes 5G. / This thesis explores one of the key enablers of 5G wireless networks leveraging small cell network deployments, namely proactive caching. Endowed with predictive capabilities and harnessing recent developments in storage, context-awareness and social networks, peak traffic demands can be substantially reduced by proactively serving predictable user demands, via caching at base stations and users' devices. In order to show the effectiveness of proactive caching techniques, we tackle the problem from two different perspectives, namely theoretical and practical ones.In the first part of this thesis, we use tools from stochastic geometry to model and analyse the theoretical gains of caching at base stations. In particular, we focus on 1) single-tier networks where small base stations with limited storage are deployed, 2) multi-tier networks with limited backhaul, and) multi-tier clustered networks with two different topologies, namely coverage-aided and capacity-aided deployments. Therein, we characterize the gains of caching in terms of average delivery rate and mean delay, and show several trade-offs as a function of the number of base stations, storage size, content popularity behaviour and target content bitrate. In the second part of the thesis, we take a more practical approach of proactive caching and focus on content popularity estimation and algorithmic aspects. In particular: 1) We first investigate the gains of proactive caching both at base stations and user terminals, by exploiting recent tools from machine learning and enabling social-network aware device-to-device (D2D) communications; 2) we propose a transfer learning approach by exploiting the rich contextual information extracted from D2D interactions (referred to as source domain) in order to better estimate the content popularity and cache strategic contents at the base stations (referred to as target domain); 3) finally, to estimate the content popularity in practice, we collect users' real mobile traffic data from a telecom operator from several base stations in hours of time interval. This amount of large data falls into the framework of big data and requires novel machine learning mechanisms to handle. Therein, we propose a parallelized architecture in which content popularity estimation from this data and caching at the base stations are done simultaneously.Our results and analysis provide key insights into the deployment of cache-enabled small base stations, which are seen as a promising solution for 5G heterogeneous cellular networks.
187

Proaktiv Riskhantering: : En kvalitativ studie om dess betydelse för informations- och cybersäkerhetsföretag i sviterna av Covid-19 / Proactive Risk Management: : A qualitative study of its importance for information and cyber security companies in the wake of Covid-19

Ahlén, Fanny, Bauhn, Ludwig January 2023 (has links)
Digitaliseringen sker i en rasande fart världen över, vilket resulterar i en ofantlig ökning av data som cirkulerar. Detta i sin tur både bringar nya möjligheter men också stora utmaningar för företag då man ständigt måste vara redo på det oväntade vilket inte minst märktes då Covid-19 pandemin slog till.  Organisationer tvingas stänga ner sina kontor och istället arbeta hemifrån, vilket innebär ännu större risker gällande hot och säkerhet om man inte var väl förberedd. Syftet i denna studie är att studera företag inom informations- och cybersäkerhetsbranschen och hur deras interna, proaktiva riskhanteringsarbete ser ut. Med grund i Covid-19 vill vi dessutom studera de lärdomar dessa företag tog med sig från pandemin. För att uppnå detta har vi genomfört en kvalitativ studie baserad på 9 intervjuer med individer inom branschen som fått berätta om deras tankar och åsikter kring proaktiv cybersäkerhet och Covid-19. Studien har resulterat i en sammanställning av de strategier och metoder som anses centrala för att bedriva en så framgångsrik riskhantering som möjligt med stort fokus på individen och dess medvetenhet och kunskap vilket anses vara en central del. Exempelvis kan företag arbeta efter Zero trust-principen för att verifiera och kontrollera vilka tillgångar en individ har, samt arbeta efter de fyra vanligaste arbetssätten; personalutbildning, etiska hackare, jaga hot och proaktiv övervakning av nätverk och slutpunkt, för att proaktivt reducera sannolikheten att exponeras för oönskade risker. / The digitalization develops at a blistering pace all around the world which results in an immense increase of circeling data. This in turn brings new possibilities but at the same time a lot of challenges for companies. They constantly have to be ready and expect the unexpected which was not least noticed when the Covid-19 pandemic hit. Organizations were forced to shut down their offices and work from home instead, which in turn implies even greater risks when it comes to threat and security if you are not prepared. The purpose of this study is to study companies in the information- and cybersecurity industry and how their internal, proactive risk management looks like. With Covid-19 as the foundation we also aim to study the lessons learned by companies as they emerged from the pandemic. To achieve this we have carried out a qualitative study based on 9 interviews with individuals in the industry which have had the opportunity to tell us their thoughts and opinions about proactive cybersecurity and Covid-19. The study has resulted in a compilation of the strategies and methods that are considered central to conducting as successful risk management as possible with a strong focus on the individual and their awareness and knowledge, which is considered to be a central part. For example, companies can work according to the Zero Trust principle to verify and control the assets an individual has, as well as work according to the four most common approaches: employee training, ethical hackers, threat hunting, and proactive monitoring of networks and endpoints, in order to proactively reduce the likelihood of being exposed to unwanted risks.
188

Navigating Multiple Liminalities: An Exploration of How First-Year Faculty Construct Relationships of Support

Myers, Meredith H. 13 February 2015 (has links)
No description available.
189

Reactive and Proactive Fault-Tolerant Network-on-Chip Architectures using Machine Learning

DiTomaso, Dominic F. January 2015 (has links)
No description available.
190

Being On the Right Side Corporate Social Responsibility Implementation in Large Firms –A Study within IKEA

Kazerooni, Gisoo January 2015 (has links)
Accounting for the environmental and social impacts produced by the business or Corporate Social Responsibility (CSR), has arguably been one of the main topics and requisites within urban sustainability. Large companies having more impacts on the environment and the society due to amongst others the more diverse background of stakeholders and the more use of resources are more in the spotlight to implement CSR in their business. Companies which carelessly aim mainly for profitability and give less care to the environment are more and more proving to loose sustainability in their lifeline (Waldman, Kenett, & Zilberg, n.d.).This paper, using IKEA as a case study, has demonstrated the importance of CSR in larger firms. It has well demonstrated how and why large firms engage in CSR activities and how it could further enhance these activities in the upcoming demanding future. This has been done by presenting three theories, CSR communication, proactive and reactive CSR and motives for CSR. These theories principally show the effectiveness of CSR communication and a framework for successful internal and external communication; the difference and benefits of proactive and reactive CSR and which is more desirable; and finally the motives companies have to engage in both reactive and proactive CSR activities. With the help of these theories in the analysis section, this paper demonstrates how IKEA has used CSR in its framework to rebuild its reputation and how it has improved its sustainability by using proactive CSR strategies. The study further demonstrates how IKEA has proven that they are caring in gaining a sustainable future and presents some thoughts for further studies and practices.

Page generated in 0.0541 seconds