• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 14
  • 9
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 30
  • 19
  • 18
  • 17
  • 16
  • 6
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Bring Your Own Device i kommun- och landstingsnätverk : En undersökning om dess utbredd

Andersson, Pär, Nylund, Robin January 2014 (has links)
Något som har blivit en stor fråga på sistone där arbetsgivare tvingats ta ställning är huruvida anställda har tillåtelse att använda sina privata enheter på arbetet eller inte. Användandet av smarta telefoner och surfplattor i privatlivet har på bara några år ökat relativt drastiskt. I och med detta så har viljan också blivit större bland arbetare att kunna utnyttja sina privata enheter även i arbetslivet. Detta fenomen kallas för Bring Your Own Device och implementationen av detta kan orsaka vissa problem och kan exempelvis påverka nätverkssäkerheten. Arbetet ämnade, att genom en enkätundersökning, undersöka hur pass vanligt det var att man tillät privata enheter i arbetet bland Sveriges kommuner och landsting. Det ämnade även undersöka vilka skyddsåtgärder som hade utförts för att skydda den resterande delen av infrastrukturen om man valt att tillåta BYOD. Resultatet från enkätundersökningen visar på att frågan ofta har lyfts bland organisationerna. Däremot har de oftast valt att inte införa BYOD på grund av olika anledningar såsom säkerhet, kostnader och brist på resurser. Har organisationerna istället valt att införa BYOD så har enheterna oftast separerats från de övriga nätverket på grund av säkerhetsskäl. / An ongoing question which have been brought into consideration lately is whether employees should be given the permission to bring their own devices to their jobs or not. The numbers of people using smartphones and laptops have been growing and with that, the will to make use of those devices at work. That phenomenon is called Bring Your Own Device and the implementation of it can cause network security related problems. This essay was written with the intentions to find out how many of the municipalities and counties that have allowed people to bring their own devices. The intentions was also to investigate which security actions that have been taken into consideration when securing the rest of the network from the brought devices. This was performed by sending out a survey. The result that the survey gave proves that BYOD have often been taking into consideration among the organizations. It also proves that many have chosen to not implement the phenomenon because of reasons like problem with the security, the costs, and the lack of resources. An overrepresented majority of the organizations who have chosen to implement it have decided to have the private devices in a separate network to secure the rest of the network infrastructure.
12

Bring Your Own Device : Analys av trenden, dess möjligheter och problem

Bohman, Emma, Murphy, Joanna January 2012 (has links)
Syftet med denna studie är att få en grundläggande kunskap kring begreppet bring your own device. Eftersom ämnet är väldigt nytt och att det finns en viss okunnighet kring begreppet är det intressant att ta reda på varför BYOD är en uppgående trend, hur svenska verksamheter tänker inför tillåtandet, vilka krav som ställs och vilka problem som följer. För att komma fram till dessa slutsatser har intervjuer genomförts på tre olika verksamheter. Varav en verksamhet har tagit sig an BYOD och de andra två planerar inför tillåtandet av BYOD. Det har även genomförts intervjuer på både unga studenter, unga i arbetslivet samt en jurist för att få en tydligare bild av företeelsen. Resultatet visar att fördelar med BYOD är kostnadsbesparingar, flexibilitet och nöjda anställda. Däremot finns det vissa säkerhetsrelaterade problem samt juridiska problem med BYOD. Sådana problem kan handla om äganderätt, osäkra nätverk, obehörig åtkomst och frågor kring abonnemang. Många av dessa problem kan däremot förhindras genom att verksamheter skriver en policy som är speciellt framtagen för BYOD.
13

Mobiltelefoner inom vuxenutbildning : Integrerade i undervisningen eller ett störningsmoment?

Englund, Petra January 2017 (has links)
Mobiltelefonens mångfacettering erbjuder många möjligheter inom studier, men även flera utmaningar. Den här studien har utgått ifrån en sociokulturell teori om lärande, där det endast går att förstå eller undersöka människors tänkande eller kunskaper genom en analys av språk och handlingar, i relation till sociala och kulturella resurser som används av människan. I detta fall mobiltelefoner. Studien baserades i uppbyggnaden av fallstudier, då det som undersökts är ”hur” och ”varför” ett aktuellt skeende i ett konkret socialt sammanhang ser ut som det gör. Studiengenomfördes även med influenser av symbolisk interaktionism, detta då mänsklig interaktion sker bland annat med hjälp av symboler och mobiltelefonen i sig kan ses som en symbol, likväl som denger tillgång till andra symboler. Då en djupare förståelse för attityderna och uppfattningarna rörande mobilanvändandet i sociala sammanhang eftersträvades var denna studie kvalitativ och utfördes med semistrukturerade intervjuer som metod för insamling av data. Intervjupersonerna kan både se för- och nackdelar med att använda mobiltelefoner i studier, bland annat mobiltelefonens lättillgänglighet och mobilitet, men även det negativa i att olika sociala medier kan pocka på uppmärksamheten och störa koncentrationen både för mobiltelefonens ägare och även andra personer i dess närhet. Dock välkomnas teknik som kan förenkla studierna, men mobiltelefonen i dag saknar anpassning till detta, vilket gör att den därmed inte är en självklar del inom utbildning och studier. / <p>Godkännande datum: 2017-06-02</p>
14

Strategies That Mitigate IT Infrastructure Demands Produced by Student BYOD Usa

Dunne, Martha 01 January 2019 (has links)
The use of bring your own devices (BYOD) is a global phenomenon, and nowhere is it more evident than on a college campus. The use of BYOD on academic campuses has grown and evolved through time. The purpose of this qualitative multiple case study was to identify the successful strategies used by chief information officers (CIOs) to mitigate information technology infrastructure demands produced by student BYOD usage. The diffusion of innovation model served as the conceptual framework. The population consisted of CIOs from community colleges within North Carolina. The data collection process included semistructured, in-depth face-to-face interviews with 9 CIOs and the analysis of 25 documents, all from participant case organizations. Member checking was used to increase the validity of the findings. During the data analysis phase, the data were coded, sorted, queried, and analyzed obtained from semistructured interviews and organizational documentation with NVivo, a qualitative data analysis computer software package. Through methodological triangulation, 3 major themes emerged from the study: the importance of technology management tools, the importance of security awareness training, and the importance of BYOD security policies and procedures. These themes highlight successful strategies employed by CIOs. The implications for positive social change as a result of this study include creating a more positive experience for students interacting with technology on campus. Effects on social change will also arise by increasing a student's mindfulness through security awareness programs, which will empower the student to take more control of their online presence and as they pass that information along to family and friends.
15

Program för digitala prov : Och hur programmet möter kraven som ställs när det används i gymnasieskolan

Jackson, Marcus January 2018 (has links)
Under de senaste två årtionden har det blivit en drastisk ökning av privat ägda laptops. Detta har öppnat för nya möjligheter som bring your own device (BYOD) digitala prov i skolan. Men med detta blir nedlåsning av datorn inför digitalt prov ännu viktigare. Undersökningar har gjorts gällande elevernas uppfattning kring digitala provsystem samt deras åsikter om digitala prov i allmänhet. Andra arbeten har gjorts gällande hur digitala provsystem fungerar tekniskt men samtidigt finns det artiklar som visar hur viktig lärarnas åsikter är. Därför kommer detta arbete definiera kraven som de krav som lärare har för att undersöka deras perspektiv, inte på det digitala prov eller provsystem som andra arbeten utan på nedlåsningsprogrammet för datorn vilket bidrar med information i ett nytt perspektiv. Detta görs genom insamling av enkäter från lärarna på en gymnasieskola för att definiera krav. Dessa krav ställs sedan mot vanligt använda nedlåsningsprogram för att svara på hur de klarar av de krav som lärare har. Resultatet av detta visar att nedlåsningsprogrammen inte uppfyller alla krav som lärarna ställer. Dock vid undersökning av de krav som underkändes bedöms nedlåsningsprogrammen leva upp till en majoritet av lärarnas krav då anpassade lösningar och vikten av olika krav disskuteras. Detta ger ett positivt betyg för nedlåsningsprogrammen och ger uppmaning till lärare att gå över till digitala prov utan att oroa sig för nedlåsningen av datorerna.
16

BYOD como pol?tica de seguran?a em uma empresa: uma an?lise ? luz da PMT

Rodrigues, Ge?rgia Cristiane 11 September 2015 (has links)
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2016-05-06T23:52:19Z No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) / Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2016-05-09T19:56:30Z (GMT) No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) / Made available in DSpace on 2016-05-09T19:56:30Z (GMT). No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) Previous issue date: 2015-09-11 / O avan?o da tecnologia m?vel, no que diz respeito ? disponibilidade de servi?os 3G/4G e da utiliza??o de Dispositivos como Smartphones e Tablets originou um novo fen?meno de comunica??o: BYOD (Bring Your Own Device), ? uma nova tend?ncia de neg?cios, onde os funcion?rios est?o utilizando seus pr?prios dispositivos para fins de trabalho. A r?pida expans?o de BYOD e as quest?es de seguran?a e privacidade de dados representam desafios significativos para as organiza??es. A resposta mais comum a essas preocupa??es ? a ado??o de pol?ticas corporativas que regem BYOD. Este estudo tem por objetivo analisar a inten??o dos funcion?rios em cumprir com a pol?tica de seguran?a da organiza??o no contexto de BYOD, quando os funcion?rios utilizam seus dispositivos pessoais para acessar recursos organizacionais para realizarem o trabalho, dentro ou fora do ambiente organizacional. Para tanto, foi utilizada a Teoria de Motiva??o a Prote??o (TMP) como embasamento te?rico. Em termos metodol?gicos, a presente pesquisa, ? do tipo descritiva e tamb?m explorat?ria com uma abordagem quantitativa. N?o aleat?ria ? o tipo de amostragem. Para coleta, foi aplicado um question?rio estruturado, tipo survey, com um conjunto de itens de medi??o para cada construto. A etapa de an?lise dos dados foi realizada por meio de utiliza??o de t?cnicas de estat?stica descritiva e an?lise multivariada, tais como a An?lise Fatorial Explorat?ria (AFE) e a Regress?o Linear M?ltipla (RLM). Do ponto de vista te?rico, os resultados demonstram que o modelo PMT fornece uma base te?rica s?lida para a investiga??o nesta ?rea. No entanto, os resultados tamb?m indicam que este modelo ? afetado por fatores contextuais, e que a escolha da amostra pode influenciar a import?ncia dos diferentes componentes do modelo. Portanto, o cuidado deve ser tomado na generaliza??o desses resultados para outros contextos e popula??es / The advancement of mobile technology, with regard to the availability of 3G / 4G and use of devices such as Smartphones and Tablets yielded a new communication phenomenon: BYOD (Bring Your Own Device), is a new business trend, where employees are using their own devices for work purposes. The rapid expansion of BYOD , data security and privacy issues pose significant challenges for organizations. The most common response to these concerns is the adoption of corporate policies governing BYOD. This study aims to analyze the intention of employees to comply with the organization's security policy in the context of BYOD, when employees use their personal devices to access organizational resources to develop work related tasks, inside or outside the organizational environment. Therefore, we will use the Motivation Theory Protection as theoretical basis. In terms of methodology, this research will be a descriptive and exploratory study with a quantitative approach. Nonrandom will be the type of sampling. For collection, a structured questionnaire, survey type, with a set of measurement items for each construct is applied. The data analysis step is performed by means of descriptive statistics, Exploratory Factor Analysis and Multiple Linear Regression. From a theoretical point of view, the results demonstrate that the PMT model provides a solid theoretical basis for research in this area. However, the results also suggest that this model is affected by contextual factors, and the selection of the sample may influence the importance of the different components of the model. Therefore, caution should be taken in generalizing these results to other settings and populations.
17

What Instructional Modification Implementations Bring Adult Education Learners To Success And Retention? Analysis Of An Online Adult Basic Education Program

Propst, Bernadette Ann 01 January 2005 (has links)
What Instructional Modification Implementations Bring Adult Education Learners to Success and Retention? Analysis of an Online Adult Basic Education Program. Adult learners enrolled in my online Adult Basic Education program showed low completion rates for the course. This study's purpose was to discover what instructional modifications would bring these learners to a successful outcome in the program. I implemented the following instructional modifications: asynchronous email communication, weekly progress reports emailed to each participant and a minimum requirement of 10 assignment completions on a weekly basis. Teacher-student interaction increased because of these implementations. I reviewed literature that discussed distance education, adult learners and teacher-student interaction to discover strategies that would improve student achievement in an online course. After reviewing the literature, I determined that there were three missing elements in my program: structured communication between the teacher and student (Palloff & Pratt, 1999), standards for online coursework completion (Comings et al., 1999) and a system to inform students of their progress in the program (Comings et al., 1999). I found that teacher-student asynchronous communication, a weekly requirement of 10 completed lessons and weekly progress reports of student accomplishments encouraged students to complete coursework on a regular basis. Students were conscientious, taking more responsibility for their learning. Students had a higher rate of coursework completions during the research study period, with performance increasing 73%.
18

THE ROLE OF PRINT AND SOCIAL MEDIA IN SOCIAL MOVEMENTS: THE CASE OF BRING BACK OUR GIRLS

KAREEM, ABDULAZEEZ MAJEK January 2017 (has links)
AbstractThis thesis critically examines the impact of print and social media in a social movement by using Bring Back Our Girls as a case study, which depicts the abduction of girls by warlords in Africa. Today, due to social inequality, activists do not possess the same budget as larger companies for advertising and mass communications. Social movement campaigners depend on media coverage to gain public attention so that their voice can be heard. This study explores the role of print and social media in a social movement - the case of Bring Back Our Girls in Nigeria. A digital signage prototype was designed and developed to solve the issue of digital divide experienced by the Bring Back Our Girls advocacy group during the campaign. However, the digital signage turns the four stages of conventional social movements, which are Emergence, Coalescence, Bureaucratisation, and Decline. For example, if the movement is on bureaucratisation and a new channel is added, people will go back to emergence stage. This prototype, when fully developed, could be used to create awareness and to reach people in rural areas. This study used two research paths, primary and secondary. Primary research is conducted using two main methods: interviews (focus group interview) and a questionnaire. The focus group consisted of fifteen people, fourteen males and one female, although many female activists were invited, only one attended the meeting because of the socio-economic factor in Nigeria and the focus questions were open-ended. In addition, a questionnaire was designed for the evaluation of the prototype. The focus group interview focused on the examination of the role played by the print and social media platforms during the BBOG campaign and the questionnaire focused on the digital signage. The study also examined how a prototype of digital signage is designed by using the Microsoft PowerPoint Application. Secondary research was conducted using literature, online material, articles, e-books, etc., to gain an in-depth understanding of the role of print media, social media, social movement, design science, prototype design, resource mobilisation theory (RMT), social mobilisation, and digital divide. Specific research methods were identified based on the theoretical perspective chosen by the author. Both quantitative and qualitative data gathered in this study suggest that print and social media have some positive impacts on social movement and some of the participants claimed that they had been informed of Boko Haram’s rampage and the abduction of the Chibok girls through print media, such as newspapers, magazines, roadside posters, and billboards.Moreover, some participants claimed that they became aware of the BBOG campaign through social media like Facebook, Twitter, etc. The focus group interviews led to identification of six key themes. These were, information and intelligence gathering, social and print media education, information sharing, religious or tribal sentiment, communication, and networking and advocacy. Also, there are a number of sub-themes, which are discussed at length within the analysis of the report. The general findings are that the BBOG campaign movement was first noticed on electronic media, but became viral and sporadic in print and social media. Despite the cultural and religious differences in Nigeria, the campaigners came together to solicit for the rescue of the Chibok Girls.
19

Bezpečnosť a správa mobilných zariadení v podnikovom IT / Security and management of mobile devices in the enterprise IT

Rusiňák, Peter January 2011 (has links)
The diploma thesis deals with the management and security of mobile devices in the enterprise IT. The aim of the work is to familiarize the reader with the issue of enterprise mobility. As enterprise mobility covers a vast area and an important aspect of greatly efficient and secure use of any company's mobile devices is their mobile strategy, the work focuses on the process of creating a mobile security strategy and providing guidelines for its successful implementation. The integration of smart phones into a corporate infrastructure is a complex act. It is necessary to take into account the many safety demands and requirements for interoperability. The issue of mobile enterprise device management and security is very broad. Another part of the work describes various mobile platforms in terms of their suitability for use in the enterprise IT. Operating systems are analyzed in detail from several different points of view. The work provides insight into the market of operating systems and explains the basic security threats to which these systems are exposed and recommends ways of protection against unwanted effects. The final part of the thesis deals with design solutions management and security of mobile devices in the company. On the basis of the requirements set suggests a solution that encompasses deployment of Mobile Device Management device management and security proposes rules for the extension of security policy on mobile device management.
20

Thomas Cromwell’s Lesson in Patriotism : Hilary Mantel’s Bring Up the Bodies as Literature for Upbringing Russian Minds

Astar, Anna January 2022 (has links)
The paper analyses Hilary Mantel’s novel Bring Up the Bodies in terms of how it might correlate with the notion of Russian patriotism. The origin for the research lies in the official list of literature recommended for patriotic education in Russia that was compiled in late 2015 and is thus immediately connected with the surge of state-driven patriotism in the country following the 2014 annexation of Crimea. Bring Up the Bodies is among very few contemporary historical novels by non-Russian authors included in the list. The conducted analysis reveals certain features in the novel’s protagonist and his behaviour that might correspond with the understanding of patriotism and citizenship in Russians. Moreover, the paper argues that legal pragmatism practiced by the protagonist, as well as the very style of historical representation in the novel, that re-evaluates the historical figure of Cromwell and undermines subjectivity of the historical past, may be seen as legitimising contemporary politics in Russia by way of establishing a “tradition.”

Page generated in 0.083 seconds