• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 583
  • 533
  • 10
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 1139
  • 1139
  • 918
  • 845
  • 821
  • 278
  • 275
  • 144
  • 104
  • 78
  • 76
  • 71
  • 63
  • 61
  • 47
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

A Dynamic and Adaptive Information Security Awareness (DAISA) Approach

Casmir, Respickius January 2005 (has links)
<p>Information systems fail not only because of problems with technology used and technical incompetence of professionals administering them but also because of lack of security awareness to the end users. In addition, various research results have revealed that security and reliability of IS/IT systems is a function of technology, processes and people.</p><p>This research has focused on the latter aiming at developing an integrated information security education, training and awareness learning continuum. Particularly, the research has focused on developing countries where a little has been done to address information security learning continuum. The research has been done in two cyclic phases in which cycle one has chiefly addressed security education and training aspects whereas cycle two has mainly focused on security awareness aspects. Based on empirical analysis of security practices in organisations; the thesis proposes a Dynamic and Adaptive Information Security Awareness (DAISA) approach. Founded on six interdependent pillars, the approach delineates high level guidelines for establishing and maintaining information security awareness programs at workplaces.</p>
62

Beyond Users : Grounding Technology in Experience

Ljungblad, Sara January 2008 (has links)
<p>This thesis goes beyond a user-centred design approach to explore potential future applications and modes of interaction. With several design cases, we investigate how early technology ideas can be matched with a specific practice to inspire novel design. This involves learning about existing experiences, interests and activities that can be relevant for a potential application, but which are not necessarily found among the intended users. Starting with early technology ideas and then finding a suitable practice to learn from is an alternative perspective of design activities. This can be useful for researchers and designers in Human Computer Interaction (HCI) who are interested in complementing approaches compared to user-centred design. Our approach is also relevant for researchers that face technology-driven starting points, and want to investigate future applications by grounding the design in existing practices.</p><p>A set of design cases show how the overall research goes from a usability-oriented perspective towards a more experience-oriented one, in order to accommodate technology-driven design situations. The design cases have involved different technical starting points, including information display technologies, surface-based networking, digital photography, and robot technology for everyday settings. The overall design process evolves towards matching the technology with a practice, and to investigate applications by developing one or more research prototypes. This has resulted knowledge of novel applications and interaction for the technology in question, as well as knowledge on how to employ empirical data to inspire novel design. Finally, we provide an overall reflection of the research process and show how a design approach that goes beyond users can benefit the design process.</p>
63

IT-supported Knowledge Repositories : Increasing their Usefulness by Supporting Knowledge Capture

Aggestam, Lena January 2008 (has links)
<p>Organizations use various resources to achieve business objectives, and for financial gain. In modern business, knowledge is a critical resource, and organizations cannot afford not to manage it. Knowledge Management (KM) aims to support learning and to create value for the organization. Based on three levels of inquiry (why, what, how), work presented in this thesis includes a synthesized view of the existing body of knowledge concerning KM and hence a holistic characterization of KM. This characterization reveals a strong dependency between KM and Learning Organization (LO). Neither of them can be successful without the other. We show that a KM project resulting in an IT-supported knowledge repository is a suitable way to start when the intention is to initiate KM work. Thus, our research focuses on ITsupported knowledge repositories.</p><p>Large numbers of KM projects fail, and organizations lack support for their KM undertakings. These are the main problems that our research addresses. In order for an IT-supported knowledge repository to be successful, it must be used. Thus, the content of the repository is critical for success. Our work reveals that the process of capturing new knowledge is critical if the knowledge repository is to include relevant and updated knowledge. With the purpose of supporting the capture process, this thesis provides a detailed characterization of the capture process as well as guidance aiming to facilitate the implementation of the capture process in such a way that knowledge is continuously captured, also after the KM implementation project is completed. We argue that the continuous capture of new knowledge which can potentially be stored in the knowledge repository will, in the long term perspective, have a positive influence on the usefulness of the repository. This will most likely increase the number of users of the repository and accordingly increase the number of successful KM projects.</p><p>All the work presented in this thesis is the result of a qualitative research process comprising a literature review and an empirical study that were carried out in parallel. The empirical study is a case study inspired by action research, which involved participation in the project Efficient Knowledge Management and Learning in Knowledge Intensive Organizations (EKLär).</p>
64

Towards integrating agile development and risk management

Nyfjord, Jaana January 2008 (has links)
<p>Risk management has become recognized as a best practice in the software industry. Controlling risks improves essential software development features such as product quality, planning precision and cost-efficiency. For this reason, the inclusion of risk management in software development is an important factor to consider if one wishes to achieve project success.</p><p>Agile software development models claim to be risk-driven. They state that their iterative approach enables continuous attention to risks and that the risks can be reduced by practices such as continuous software integration and early testing. In reality, however, the agile development models implement few risk management practices.</p><p>The research problem addressed in this thesis is multi-faceted. The problem concerns the lack of explicit risk management practices in agile development. However, it also concerns the need to address risk management on an organization-wide basis. In addition, it concerns the conflict that emerges from trying to merge the agile process with standard industrial processes, such as risk management, without compromising agility.</p><p>The goal of this thesis is to explore integration as a solution for addressing the lack of risk management in the agile model based on empirical research. It involves (a) outlining a model integrating the agile and risk management processes on an organization-wide basis, and (b) providing a foundation for its extension.</p><p>The results show that, within the scope of this research, the proposed solution is a valid candidate for improving the agile situation. However, it is still in its infancy. It does not claim to be complete but needs to be further elaborated and complemented with details. Hence, we outline the model and provide a foundation established in empirical investigation for extending it in future research.</p>
65

Designing a mobile phone for children : Creating personas of young mobile phone users and their parents with a means-end study

Lidälv, Gustav, Bachrach, George January 2009 (has links)
No description available.
66

On Security in Safety-Critical Process Control

Åkerberg, Johan January 2009 (has links)
<p>This Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since the introduction of Ethernet-based fieldbus protocols. As an example, a successful attack on a power plant, supporting large cities with energy, could result in a temporal but total power loss. Such attacks could be devastating for the society. The security threats are real, and motivations for attacking industrial communication systems may be political or economical.</p><p>The visions of autonomous systems, which can be supervised, diagnosed and maintained from remote is not far from reality, but stress the need for security and safety measures. Wired fieldbus protocols are mature when it comes to safety and there are existing standards for safe communication. In a setup like an autonomous system security measures over safe communication has to be taken into account.</p><p>The state-of-the-art in automation security is to use firewalls to restrict incoming and outgoing traffic to the networks. Firewalls can be deployed between different automation networks, i.e. server, control, and fieldbus networks, and even protect a single automation cell with a dedicated firewall. If an adversary can penetrate the perimeter defenses, no other security countermeasures exist in process automation to protect the safety-critical communication from sabotage.</p><p>In this thesis we initially explore the possibilities of security attacks on the automation protocols PROFINET IO and PROFIsafe. We show that it is possible to attack safety-related communication to take control of safety-critical fieldbus nodes. We propose the concept of <em>Security Modules</em> in combination with PROFINET IO and PROFIsafe to achieve safe and secure real-time fieldbus communication.</p>
67

Development of an Electronic Business Card system - The Meetia system

Yang, Mengting, Zhang, Fan January 2010 (has links)
<p>First and foremost, we would like to thank to our supervisor Wagner Ourique de Moraisfor his valuable guidance and suggestions during the whole time of the thesis work. Hemotivated us contributed to our project and inspired us greatly.Furthermore, we would like to thank Anders Nilsson and Henrik Abrahamsson who arebusiness students at Halmstad University for the project idea. They gave us an opportunity toparticipate and learn from each other.Finally, we would like to thank you our friends for helping us this project.</p>
68

BookZone web shop

Alagic, Amir January 2007 (has links)
<p>My task was to create an e-commerce solution or web shop that is integrated with PayPal system. The intent of this paper is to show how this e-commerce web application was built and integrated with the PayPal system. </p><p>The underlying technology used in the implementation of the application includes .Net 2.0 framework (ASP.Net 2.0 and C# 2005 and Express edition of SQL Server 2005)</p>
69

Affärssystem för Gamersneed Sweden

Bertilsson, Mattias, Lindberg, Johan January 2007 (has links)
<p>This degree project deals with the creation of a business system for Gamersneed Sweden. </p><p>The system is divided into two parts, one windows appliction and one websolution.</p>
70

Lärande i molnet : EduSync belyst ur ett connectivistiskt synsätt

Karlsson, David, Andersson, Michael January 2009 (has links)
<p>This essay has discussed and analyzed a draft for an idea about a network called EduSync. This idea is based on that teachers and students, attending and holding courses, all over the world should be able to find and interact with each other. EduSync is founded from a new learning theory, connectivism. Interviews, participation in a conference and two workshops have been used to gather information and different points of view concerning e-learning, for example possibilities and problems with this idea of a network.  A comparison of web communities and e-learning environments that exists today was also done. The gathered information from persons as well as literature resulted in a discussion concerning learning and what would or would not be possible with the creation of EduSync. Some suggestions of future studies, both practical and scientific, are also given in this essay.</p> / <p>Den här uppsatsen har belyst och analyserat ett utkast till en nätverksidé som kallas EduSync. Denna idé grundar sig i att lärare och studenter i samtidiga liknande kurser världen över ska kunna hitta varandra och interagera. EduSync baseras på en ny lärteori, connectivism. Intervjuer och deltagande i konferenser samt workshops har använts för att samla information och olika synvinklar kring e-lärande och möjliga fördelar och nackdelar med denna nätverksidé. Det gjordes även en enklare jämförelse av idag existerande webbcommunities och lärmiljöer. Den insamlade informationen från personer och litteraturstudier resulterade i en diskussion angående lärande och vad som skulle vara möjligt eller inte att genomföra i skapandet av EduSync. Några förslag på framtida forskning, både praktisk och vetenskaplig, ges också i den här uppsatsen.</p>

Page generated in 0.0798 seconds