• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4187
  • 2121
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 6315
  • 6309
  • 5665
  • 5467
  • 5428
  • 1711
  • 1594
  • 1586
  • 1582
  • 1581
  • 1169
  • 1150
  • 1016
  • 456
  • 419
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Vad är Internet of Things inom medicinteknik? : Hur påverkar det vården och patienterna ur ett framgångs- och säkerhetsperspektiv?

Emma, Hammarström, Sandra, Puekker January 2017 (has links)
This study is written by two students at Linköping University, studying the Systems Science program. It is a qualitative study in the form of case study where empirical data is collected from Region Östergötland. We conducted three interviews where everyone had a connection to the Internet of Things within medical technology. The positions of the interviewees are IT Security Officer, Unit Manager on Test and Innovation and MT Strategist.The study is about what the Internet of Things within medical technology and how it affects the healthcare and patients from a success and safety perspective. There is no clear definition of Internet of Things within medical technology. Is Internet of Things medical technology or is it a part of medical technology? Our definition is that if data is collected and sent on to the Internet's architecture for analysis and have a medical purpose, it’s a medical product that uses Internet of Things.We also have identified a number of advantages and disadvantages with this type of technology in healthcare. It allows, among other things, aftercare at home in a new way, and the collection of data about a patient in a simplier way. The disadvantages are the unsafety in these products as they lack many security measures. Most likely, the security has been lost because of pressure from the consumer market to always have the latest technology in healthcare. There are two parties that are responsible for the safety of a medical device that uses the Internet of Things and these are the healthcare and the supplier. Internet of Things has revolutionized medical technology and in the future we will see more of these types of products within the healthcare sector.
22

Informationsspridning vid Introduktionsprocessen på ett Bemanningsföretag : En studie där informationsspridningen vid Introduktionsprocessen studerats. / Dissemination of information during the introduction process at a Staffing Company : A study in which the dissemination of information during the Introduction process was studied.

Antonio, Zubak, Viberg, Jacob January 2019 (has links)
Personalomsättningen är idag väldigt stor inom organisationer och numera söker sig unga människor med mindre arbetslivserfarenhet till bemanningsföretag. Tidspressen är hög inom branschen och företagen vill snabbt få ut sina anställda, vilket ställer stora krav på en lyckad och tidsbegränsad introduktion. Fördelar med en lyckad introduktion är att den anställde känner trygghet och tillit inför kommande uppdrag och arbetsgivare. Bakgrunden till ett fördjupat intresse av att studera introduktionsprocessen inom bemanningsbranschen framstod när tidigare forskningar påvisade tydliga brister men även förbättringsmöjligheter som finns inom området. En bidragande orsak till valet av studie var fallföretagets engagemang, vilja och positiva inställning till en fördjupad forskning. Genom tidigare erfarenheter inom branschen av författarna upplevdes forskningsfrågan relevant och viktig. Efter en avstämning med tänkt fallföretag framkom det att konsultchefen upplevde att informationsspridningen under introduktionsprocessen var problematiskt. Därmed var vår tanke att bidra med en extern samt intern synvinkel över introduktionsprocessen. Syftet med studien var att undersöka hur nyanställda konsulter upplever informationsspridningen vid introduktionsprocessen ur ett informationslogistiskt perspektiv. För att få fram önskade data har ett induktivt angreppssätt använts där författaren gått från empiri till teori. För att få fram djupgående fakta och insikter användes en kvalitativ datainsamlingsmetod där 7 informanter i olika åldersgrupper intervjuades. För att besvara frågeställningen har följande teorier använts; Knowlegde Management, Organisatoriskt lärande, Informationslogistik, Informationsspridning och Bauers 4:cn. Studien har resulterat i en slutsats som visar olika tillvägagångssätt av förbättringsförslag som kan användas till underlag för att implementera och etablera en förändring av introduktionsprocessen. Dessa områden är att göra konsulten mer aktiv under introduktionen, att avsätta tid utifrån varje individs behov samt att använda workshops för att konsulterna ska kunna sprida insikter till varandra. Förslag till fortsatt forskning inom området är att studera ledarskapets roll i introduktionsprocessen samt hur en helt digital introduktion skulle kunna effektivisera introduktionen.
23

Väderdata, Inverse Distance Weighting och XGBoost för prediktering av väglagsfriktion : En utforskande studie / Weather data, Inverse Distance Weighting and XGBoost for prediction of road friction : An exploratory study

Hesselroth, Johannes January 2019 (has links)
No description available.
24

Informationssäkerhet inom ramen av GDPR : Utmaningar för personer som arbetar med känsliga personuppgifter

Wong, Helene January 2019 (has links)
No description available.
25

A Holistic Approach for Managing ICT Security in Non-Commercial Organisations : A Case Study in a Developing Country

Bakari, Jabiri Kuwe January 2007 (has links)
<p>The research reported here is about improvement of the ICT security management process in non-commercial organisations in order to reduce possible financial damage, taking into consideration the realities found in developing countries. The research took place in a developing country—Tanzania, where five organisations were involved. </p><p>The study is organised into seven papers covering: the state of ICT security management in the organisations; prerequisites when utilising the existing ICT security management approaches in attaining a solution for managing ICT security in the organisations; issues and challenges of managing ICT security; important aspects to be taken into consideration in order to successfully manage ICT security; and how the management of ICT security in non-commercial organisations could be improved. Among others, the research was motivated by the observed need for bridging the perception gap between the management and technicians when dealing with the ICT security problem, and consequently extending to a common understanding by the staff in the various departments and specialities within and between the departments. </p><p>The thesis contributes to increased empirical knowledge on the importance of the holistic ICT security management process. Particularly, our main contribution is the proposed holistic approach for managing ICT security in non-commercial organisations, organised in the form of guidelines with two main phases: the initialisation phase which involved the introduction of the ICT security management process in the organisation; and the internalised and continuous phase. </p>
26

Strategic Planning of Knowledge Management Systems : A Problem Exploration Approach

Aidemark, Jan January 2007 (has links)
<p>Knowledge management (KM) is focused on the problems and opportunities of using organizational knowledge as a resource. Information systems that are used to support KM processes are called knowledge management systems (KMS). A KMS is distinguished from any information system by the organizational processes that it supports, that is, creation, capture, storage and dissemination of competences and knowledge. The research area can be summarized as: “Perspectives and frameworks for the strategic planning of knowledge management systems, i.e. information systems for the support of organizational knowledge processes”. We approach the problem area from a strategic point of view, assuming that the problems of the area are based on a socio-technical dimension and that a multiple-paradigm approach is necessary for dealing with the problems of the various KM areas. The research strategy applied to achieve this is interpretative case studies. A number of case studies are used for exploring KM planning areas, developing frameworks for planning and testing the resulting approach. The empirical material consists of three main case studies, together with a number of secondary cases by other writers in the KM field. The outcome of the research is a planning approach, which is given the name: “The problem exploration approach”. The approach is intended for the generation of ideas of possible systems, as a strategic part of knowledge management systems planning. The purpose of the planning approach is to support the creation of a portfolio of KMS. A KMS portfolio is a structured set of information systems that could be developed for an organizational unit. The approach consists of five planning frameworks, all targeting different aspects of an organization. “The problem exploration approach” and its development process are then examined for more general insights into the subject of strategic KM planning. As an outcome of this examination a 12-point program for balancing a planning approach is presented. </p>
27

Plot, Spectacle, and Experience : Contributions to the Design and Evaluation of Interactive Storytelling

Laaksolahti, Jarmo January 2008 (has links)
<p>Interactive storytelling is a new form of storytelling emerging in the crossroads of many scholarly, artistic, and industrial traditions. In interactive stories the reader/spectator moves from being a receiver of a story to an active participant. By allowing participants to influence the progression and outcome of the story new experiences will arise. This thesis has worked on three aspects of interactive storytelling: plot, spectacle, and experience. The first aspect is concerned with finding methods for combining the linear structure of a story, with the freedom of action required for an interactive experience. Our contribution has focused on a method for avoiding unwanted plot twists by predicting the progression of a story and altering its course if such twists are detected.</p><p>The second aspect is concerned with supporting the storytelling process at the level of spectacle. In Aristotelian terms, spectacle refers to the sensory display that meets the audience of a drama and is ultimately what causes the experience. Our contribution focuses on graphically making changing emotions and social relations, important elements of dramatic stories in our vision, salient to players at the level of spectacle. As a result we have broadened the view of what is important for interactive storytelling, as well as what makes characters believable. So far not very much research has been done on evaluating interactive stories. Experience, the third aspect, is concerned with finding qualitative methods for evaluating the experience of playing an interactive story. In particular we were interested in finding methods that could tell us something about how a players experience evolved over time, in addition to qualities such as agency that have been claimed to be characteristic for interactive stories. Our contribution consists of two methods that we have developed and adapted for the purposes of evaluating interactive stories that can provide such information. The methods have been evaluated on three different interactive storytelling type games.</p>
28

Mobile Agent Approach to Congestion Control in Heterogeneous Networks

Nguyen, Hong Van January 2008 (has links)
<p>One of the motivations to study the behavior of the Internet is to find out the best way to maintain the relative stability of the global network. This leads into the investigations of events that impair the performance of the system such as congestion that occurs whenever the demand for resources exceed the available capacity. When the congestion is left uncontrolled the performance of the whole system degrades through severe delays, lost packets, and even a complete shutdown of the network. Hence, congestion management through monitoring, detection and control is necessary in order to sustain acceptable levels of network performance and this may be done via the transport protocols. Consequently, many modifications of the original TCP protocol have been implemented to manage the control. On the other hand, unlike TCP, UDP has no knowledge of congestion whatsoever and hence unresponsive to the network problems.</p><p>The work explores the possibility to influence and modify the unresponsive behavior of UDP or similar protocols via the mobile agent paradigm. The autonomous entities are able to migrate across the network and sense the state of the network and when needed tame the intensity of UDP or alike flows to prevent congestion. The proposed model is termed the Combined Model for Congestion Control (CM4CC) and has two different objectives. The first one is to employ the host centric or end-to-end (E2E) congestion control mechanisms for the TCP flows; the second one is to invoke the mobile agent paradigm to manage the non-TCP (or UDP) traffic. Both mechanisms must work together to avoid congestion. When it eventually appears, they have to assist the network in speedy recovery and return to the normal mode of operation. The validity of the CM4CC has been verified through numerous simulation scenarios using the Optimized Network Engineering Tool (OPNET). The results provide the basis for an environment that makes possible the coexistence of responsive and unresponsive flows.</p>
29

Information Security in Distributed Healthcare : Exploring the Needs for Achieving Patient Safety and Patient Privacy

Åhlfeldt, Rose-Mharie January 2008 (has links)
<p>In healthcare, patient information is a critical factor. The right information at the right time is a necessity in order to provide the best possible care for a patient. Patient information must also be protected from unauthorized access in order to protect patient privacy. It is furthermore common for patients to visit more than one healthcare provider, which implies a need for cross border healthcare and continuity in the patient process.</p><p>This thesis is focused on information security in healthcare when patient information has to be managed and communicated between various healthcare actors and organizations. The work takes a practical approach with a set of investigations from different perspectives and with different professionals involved. Problems and needs have been identified, and a set of guidelines and recommendations has been suggested and developed in order to improve patient safety as well as patient privacy.</p><p>The results show that a comprehensive view of the entire area concerning patient information management between different healthcare actors is missing. Healthcare, as well as patient processes, have to be analyzed in order to gather knowledge needed for secure patient information management.</p><p>Furthermore, the results clearly show that there are deficiencies both at the technical and the administrative level of security in all investigated healthcare organizations.</p><p>The main contribution areas are: an increased understanding of information security by elaborating on the administrative part of information security, the identification of information security problems and needs in cross border healthcare, and a set of guidelines and recommendations in order to advance information security measures in healthcare.</p>
30

A Dynamic and Adaptive Information Security Awareness (DAISA) Approach

Casmir, Respickius January 2005 (has links)
<p>Information systems fail not only because of problems with technology used and technical incompetence of professionals administering them but also because of lack of security awareness to the end users. In addition, various research results have revealed that security and reliability of IS/IT systems is a function of technology, processes and people.</p><p>This research has focused on the latter aiming at developing an integrated information security education, training and awareness learning continuum. Particularly, the research has focused on developing countries where a little has been done to address information security learning continuum. The research has been done in two cyclic phases in which cycle one has chiefly addressed security education and training aspects whereas cycle two has mainly focused on security awareness aspects. Based on empirical analysis of security practices in organisations; the thesis proposes a Dynamic and Adaptive Information Security Awareness (DAISA) approach. Founded on six interdependent pillars, the approach delineates high level guidelines for establishing and maintaining information security awareness programs at workplaces.</p>

Page generated in 0.0817 seconds