• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 94
  • 25
  • 16
  • 8
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 213
  • 52
  • 42
  • 37
  • 35
  • 29
  • 28
  • 24
  • 21
  • 21
  • 20
  • 17
  • 17
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

Autonomous email notification- and booking management system : In a property administration environment / Autonomt notifikationssystem och bokningshanteringssystem : Inom fastighetsadministration

Söderlund, Henrik January 2017 (has links)
The contracting company is in the desire of an autonomous system that can do tedious administrative work that is today done manually. They would like to autonomically notify customers about incoming alarms from the customers’ real estates’ Data Under Centrals and to notify about bookings, in which a complete booking system has to be created, together with a file system analyzer that notifies about new files in the customers’ project folders. A notification system was made that was easily deployable and ready to use. The system had to be completely configurable for the contracting company to use it to its full potential. The notification system was to send notifications when a new alarm had entered the database, a booking had to be reminded of, a rebooking was made or a file had been added to the file system in a designated project folder. The contracting company had a web portal that was further developed in ASP.net in which a booking calendar and booking viewer page was added together with a form creation and management system. A demo buttons page was also added for generating demo notifications for the company to show it’s customers how the system responds to certain events. The employees at GATE IBS feel confident that this system will help them in their working environment to further strengthen their position as an industry leading business in control- and monitoring technology. / Det uppdragsgivande företaget önskar ett autonomt system som kan utföra tidskrävande administrativt arbete som idag utförs manuellt. De vill autonomt informera kunderna om inkommande larm från kundens fastigheters "Data Under Centrals" samt meddela om bokningar där ett komplett bokningssystem måste skapas tillsammans med en filsystemanalysator som meddelar om nya filer i kundens projektmapp. Ett notifikationssystem gjordes som var enkelt att distribuera och redo att använda. Systemet måste vara helt konfigurerbart för att det uppdragsgivande bolaget ska kunna använda programmet till sin fulla potential. Anmälningssystemet skulle skicka meddelanden när ett nytt larm hade kommit in i databasen, en bokning måste påminnas om, ombokning gjordes eller en fil hade lagts till filsystemet i en utsedd projektmapp. Kontraktsföretaget hade en webbportal som vidareutvecklades i ASP.net där en bokningskalender och bokningsvisningssida lagts till tillsammans med ett formulärgenererings- och formulärhanteringssystem och en demoknappssida för att generera demonotifikationer för att företaget ska kunna visa kunderna hur systemet svarar på vissa händelser. De anställda på GATE IBS är övertygade om att detta system kommer att hjälpa dem i sin arbetsmiljö för att ytterligare stärka sin ställning som branschledande företag inom kontroll- och övervakningsteknik.
142

Knowledge technologies process and cultures : improving information and knowledge sharing at the Amateur Swimming Association (ASA)

Onojeharho, Ejovwoke January 2015 (has links)
Over the last few years the ASA determined KM as a priority to assist with reducing knowledge loss, realising information assets and reducing work duplication by attempting to implement IKM tools and strategies. This research employed a pragmatic viewpoint, using a mix of both quantitative and qualitative methods to check reliability, to ensure validity while undertaking the task of implementing the IKM tools. Using a case study strategy and action research was justified, as to be pragmatic the researcher needed to understand the extent of the problem within a specified context. The research discussed in this thesis, provides a new framework for implementing KM tools; focusing on the NSO category, which the case study organisation falls into. The literature agrees enlisting influential members onto the project is vital for success; however, the findings suggested that success was not only tied to this buy-in alone, but also to the organisation s ability to retain these members for the duration of the project. The research proposed the use of a newly developed tool within the new framework, as an approach to reduce the time it takes to undertake traditional social network analysis of the organisation, as it became clear that there was a need for a method of producing updated results of the SNA, which would span the length of long projects within organisations with significantly high staff turn-over rates. Privacy was given as a factor to consider the in literature; however, the findings from this study indicated that a majority of the participants were comfortable with the system. Email knowledge extraction, and email social network systems are not new concepts, however this research presents EKESNA; a novel tool that combines both concepts in a way that allows for the continuous discovery, visualisation, and analysis of knowledge networks around specified topics of interest within an organisation; linking conversations to specific expert knowledge. EKESNA s continuous discovery of the organisation s knowledge network affords members up-to-date data to inform business process reengineering. This is a potentially ground breaking new tool that has the possibility of transforming the KM landscape in NSOs as well as a whole range of other kinds of enterprises.
143

Vytvoření marketingové komunikace v rámci podnikatelského plánu nově vznikajícího e-shopu / Creation of markerting communication within the business plan of the new created e-shop

Oliva, Matěj January 2018 (has links)
Title: Creation of marketing communication within the business plan of the new created e-shop Objectives: The main goal of the final diploma thesis will be the creation of marketing communication for the new created online store. Methods: The theoretical and practical knowledge of internet marketing acquired during the study of the issue and in the long-term employment relationship in the area of social media was used to write the final diploma thesis. Results: The result of the final diploma thesis is the creation of a marketing communication campaign for the new internet shop. The campaign focuses on advertisement on social network and paid PPC advertisement. The advantage of the created marketing communication is its practical applicability in the business plan, which will be realized at the beginning of the new year. Keywords: Questionnaire, Email, Sales Support, PPC Advertising, SEO, Social Media
144

Usable, Secure Content-Based Encryption on the Web

Ruoti, Scott 01 July 2016 (has links)
Users share private information on the web through a variety of applications, such as email, instant messaging, social media, and document sharing. Unfortunately, recent revelations have shown that not only is users' data at risk from hackers and malicious insiders, but also from government surveillance. This state of affairs motivates the need for users to be able to encrypt their online data.In this dissertation, we explore how to help users encrypt their online data, with a special focus on securing email. First, we explore the design principles that are necessary to create usable, secure email. As part of this exploration, we conduct eight usability studies of eleven different secure email tools including a total of 347 participants. Second, we develop a novel, paired-participant methodology that allows us to test whether a given secure email system can be adopted in a grassroots fashion. Third, we apply our discovered design principles to PGP-based secure email, and demonstrate that these principles are sufficient to create the first PGP-based system that is usable by novices. We have also begun applying the lessons learned from our secure email research more generally to content-based encryption on the web. As part of this effort, we develop MessageGuard, a platform for accelerating research into usable, content-based encryption. Using MessageGuard, we build and evaluate Private Facebook Chat (PFC), a secure instant messaging system that integrates with Facebook Chat. Results from our usability analysis of PFC provided initial evidence that our design principles are also important components to usable, content-based encryption on the Web.
145

IT-adaptation as sensemaking : inventing new meaning for technology in organizations

Henfridsson, Ola January 1999 (has links)
Noting how organizations today are increasingly dependent on IT for a broad range of organizational activities, the thesis starts from the observation that many IT-related endeavors nevertheless fail. In tracing part of the problem to the inability of many organizations to cope with changes in the surrounding material and social context, the emphasis is put on the processes by which IT-artifacts are adapted and re-adapted, after they have been put into daily use. Assuming human sensemaking as a good basis for coping with the changes, qualitative data from two organizations — a Swedish social services department and a software firm — provides an empirical context for assessing how sensemaking processes affect IT-adaptation. Conceptually, the thesis draws on Karl Weick's thinking, introducing the "double interact" and the "response repertoire" as sensitizing concepts with which to understand the mechanisms generating adaptation of IT-artifacts. Methodologically, the interpretive case study is employed, using the "hermeneutic circle" as the guiding principle for the research process. The thesis draws some specific implications concerning how IT-adaptation can be understood in organizations. The generic IT-adaptation process can be divided into two elementar}- phases, exploration and exploitation. During the exploration phase, several individual interpretations of a particular IT-artifact co-exist, occasioning ambiguity about its meaning in organizational daily activity. During the exploitation phase, the IT-artifact itself is in the background of matters of attention, providing organizational actors, who pursue individual goals and desires, the opportunity to exploit the shared and taken-for-granted meaning they see in the artifact. While the exploitation phase is important for organizational efficacy, there is nevertheless a risk that the meaning exploited becomes outdated by surrounding socio-material changes over time. Among other proposals, the thesis therefore suggests that triggering sensemaking processes can be important for meaningful IT-adaptation. In addition, it suggests the activity of searching for the interlacing areas of professional identity of actor groups, as a means to make IT-artifacts meaningful in organizing endeavors. / <p>[8] s., s. 1-64: sammanfattning, s. 65-168: 6 uppsatser</p> / digitalisering@umu
146

Email-based Telemedicine: Design and validation of a decision support model for service-delivery application

Liam Caffery Unknown Date (has links)
There is a growing realisation from the Australian government that new models of health care will need to be developed to address the disparity of access, increasing demand and escalating cost of traditional means of delivering health care. There is growing evidence showing health care services can be delivered safely and efficiently by email. Despite this body of evidence the clinical utility of email is occurring at a much slower rate than in other business areas. Technological barriers and privacy risks are often cited as cause of the fragmented adoption and utilisation of email-based telemedicine. In addressing these impediments, the service-delivery application needs to be considered. The service-delivery applications used in email-based telemedicine can be divided into two distinct categories. The first is ordinary email applications — such as the commercial products used for personal communication — and the second is where the health care provider undertakes the development of an email application purpose-written to support their telemedicine service. This aim of this research was to develop a decision support model (DSM) to address the complex issues in choosing the service-delivery application most appropriate for an email service. Three areas which would influence a provider’s decision were identified — i) privacy and security ii) economics and ii) quality of service — and investigated. Most emails are sent in plain text across the Internet and pose a privacy risk. Encryption of the email message is used to mitigate the risk. Two means of encryption were investigated: public key infrastructure (PKI) used in conjunction with ordinary email and secure web-mail applications, which require the development of a purpose-written application. Decisive factors in choosing the most appropriate privacy-enhancing technology for an email-based service were identified by a number of means including: technical assessment of encryption models, literature review, survey of users of an email-based telemedicine service and analysis of client applications used in a telemedicine service. This investigation established that correspondent’s perception to privacy risk, email client application support of PKI, risk tolerance to human error and the technical skill are decisive factors in choosing privacy-enhancing technology. The survey respondents considered a privacy breach during email communication was either likely or very unlikely regardless of whether the communication was encrypted or not. Indicating correspondents are unlikely to comply with encryption especially if the technology is cumbersome. Although the population was of a limited demographic, there was a large proliferation (around 87%) of web-mail clients — for example, Hotmail and Gmail — amongst the users of email-based telemedicine services. Web-mail clients cannot be secured with PKI. Hence, assessment of client-email applications used by correspondents in telemedicine will influence the type of privacy-enhancing technology. Technical assessment of privacy-enhancing technology has identified human-error as a risk when using PKI. Secure web-mail obviates human-error. Therefore, tolerance to human-error risk will be decisive in choice of privacy-enhancing technology. PKI has received criticism for being user-unfriendly and requiring technical proficiency to use. This investigation has established the usability of secure web-mail is comparable to ordinary, unencrypted email. Indicating secure communication is feasible when services are not supported by technical expertise. The cost of providing an email-based service is influenced by the service-delivery application. To develop a purpose-written application will cost the heath care provider but staff may be able to work more efficiently because the resultant application contains telemedicine specific functionality that meet the exact requirements of the service. Staff resources to run an email-based telemedicine service using ordinary email were compared to staff resources to run the same service using a purpose-written application. The purpose-written application afforded a reduction of 3% in time for clinical staff. Ancillary staff savings were more pronounced with a 33% reduction in administrative staff time and a 21% reduction in supervisory staff time. A cost-minimisation analysis established at a workload of up to 5000 email consultations per annum it is more economical to the run the service with ordinary email. For higher workload volumes it is cheaper to run the service with a purpose-written application. The threshold of 5000 emails consultations is the point at which the higher initial development cost of a purpose- written application are offset by staff efficiencies. A sensitivity analysis established the most influential factor in the economic model was workload volume — development costs and variable costs had little influence on the threshold. Response time was established as a quality of service metric after investigation demonstrated increases in response time were strongly correlated with a decrease in utilisation rate. The response time to maximise the utilisation rate was 32h or less. Pre- and post- studies demonstrated a purpose-written application can reduce response times. Telemedicine specific functionality in a purpose-written application was also investigated. Conditions for a purpose-written application — for example, use of multi-disciplinary staff, a priority service model and continuum of care over multiple email exchanges — to be efficacious at reducing response times were established. The conditions identified in the privacy and security, economic and quality of service investigation were amalgamated into a DSM. The DSM was retrospectively tested by comparing the output of the model to a gold-standard of the actual service-delivery used by a number of subject organisations. When used to identify services that required a purpose-written application the DSM was 92% sensitive and 92% specific. The model was also tested prospectively and demonstrated 85% concordance from testers in the choosing the service-delivery application. Testing the DSM identified strengths for both ordinary email and purpose-written applications under different circumstances — indicating both are valid alternatives for email-based telemedicine. The individual requirements of a telemedicine service — for example, privacy requirements, participants, the workload volume, number of staff disciplines, mode of service — will dictate the choice of the most appropriate service-delivery application. Informed decision on when and why to use a service-delivery application has implications for the successful delivery of email-based telemedicine services because the choice of service-delivery application will affect: - The staff resources needed to run the service; - The capital cost of implementing a service; - The operating costs of running a service; - The response times to client emails which in turn, influences the utilisation of the service; - The privacy-enhancing technology which in turn, influences the usability and compliance to legislative and statutory requirements.
147

Invasion of Privacy : Spam - one result of bad privacy protection

Gunnarsson, Annicka, Ekberg, Siri January 2003 (has links)
Our personal privacy is being eroded from various directions as modern technologies bring lots of new threats towards our personal privacy. Unfortunately, people are often oblivious about it and accept invasion of privacy to a great extent without questions. This thesis is a presentation of our study dealing with privacy violations while using the Internet. It also includes a further investigation about unsolicited bulk email, which is one of many consequences of bad privacy protection. We have also examined the differences between the United States and the European Union and found that the fundamental privacy protection is better in the European Union. We have used different methods to complete this thesis such as studies of literature and articles as well as performing a spam study. Using these methods we have concluded that privacy violations on the Internet is a significant problem and that the Internet users have a right to an adequate privacy protection.
148

Mitteilungen des URZ 3/4 1998

Clauß,, Fischer,, Grunewald,, Heide,, Riedel, U., Riedel, W., Wegener, 25 January 1999 (has links)
Linux auf dem Vormarsch KDE unter Linux in den PC-Pools Womit schreibt man denn nun Studien- oder Diplomarbeiten? (Textsatz-Software im Campusnetz) Windows 98 - Umstieg erforderlich? Neues vom WWW-Server Serveranbindung via Level-4 Switch Webzugriffe ermitteln Maximale Größe und Zustellzeit einer E-Mail
149

Writing Business Emails in English as a Lingua Franca - how informal can you be? : An analysis of formality in BELF emails

Pettersson, Lena January 2015 (has links)
As a result of globalisation, the number of companies working globally is increasing at an unprecedented pace. Consequently, the need to communicate with people from other countries is getting bigger. In such intercultural communication, a common language must be used to interact. The language of choice is most often English, which is the business lingua franca (BELF) today. Furthermore, email has become the obvious choice of medium when interacting with foreign business associates. The present study was conducted through intensive and extensive analyses, investigating BELF emails written by 21 individuals with 14 different native languages. The data consists of 209 emails. The study follows Bjørge’s (2007) work on formality in emails written in academic settings. The aim of the study was to determine how formal the participants were in greetings and closings and whether they accommodated their language to the respondent. The results suggest that the level of formality mainly depends on the purpose of the email and, to some extent, how formal the correspondent is. The accommodation to the correspondent seems to be individual. The present study wishes to extend knowledge on email communication in BELF settings. The results are likely to be relevant for teachers and students of Business Communication and English as a Second or Foreign Language along with managers in internationally functioning companies, especially as regards what should be considered in BELF communication.
150

The impact of Internet tools upon volunteer mobilisation and party membership at a local level : a study of the experiences and perceptions of Liberal Democrat grassroots activists

Tidy, Rebecca January 2015 (has links)
This thesis studies how Liberal Democrat members and supporters use Internet tools to mobilise volunteers within local election campaigns. It also identifies who is most likely to use these tools and who is most likely to perceive that they are useful. Existing studies of the use of Internet tools to mobilise volunteers are limited because they have typically focused upon the Internet-as-a-whole, instead of breaking it down into smaller, more meaningful categories. It is important to study Internet tools individually as they each have different features and some are more deeply integrated into mobilisation practices than others. Therefore, this thesis addresses this limitation by focusing upon three specific Internet tools: Facebook, Twitter and email. It uses data generated from a participant observation, survey and series of semi-structured interviews. Similarly, few studies have been carried out in England or within the context of second order elections. As a result, this thesis explores the perceptions of grassroots activists in relation to English local elections, thus offering a relatively unique perspective upon the link between Internet tools and volunteer mobilisation. The findings confirm that it is beneficial to analyse Internet tools individually because there are significant differences in how they are used, in addition to who uses them and who perceives them to be useful. Email is the most commonly used; it is also perceived to be the most useful for mobilising volunteers and increasing membership. Younger people are more likely to use Facebook and Twitter and to perceive that they are useful tools, whereas older people are less likely to do so. This emphasises the importance of younger supporters, as the party would find it more difficult to reach online audiences without them. This thesis argues that people that become involved as a result of Internet tools are less likely to remain heavily involved over the long-term. For instance, externally elected public officials are less likely to join online or use Internet tools to mobilise volunteers and increase membership. This fits with a wider pattern of engagement amongst party elites and long-term members. It emphasises the importance of using a combination of online and offline tools to mobilise volunteers and increase membership.

Page generated in 0.0577 seconds