• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 5
  • 3
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 25
  • 12
  • 8
  • 8
  • 7
  • 7
  • 7
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Information Technology Application on Customer Relationship Management for Steel Industry, an example of Sheng Yu Steel Co., Ltd.

Huang, Nelson 18 April 2001 (has links)
The procedures of the study are mainly through the review on the relevant reference documents related to the subject of those have been published domestically and internationally, meanwhile to get a better understanding on the most recent development on Information Technology and its associated models which are being applied to the customer relationship management by the organizations and/or business units in the world. Then, through the investigation and review on steel industries to understand the real situations domestically and internationally, specifically to focus on the Sheng Yu Steel Co., Ltd. As an example, for which to plan the implementation of Extranet System for the improvement of Customer Relationship Management (CRM) by using Information Technology, what problems it will be faced and how is the best strategyfor this implementation. Then after the completion of the study, to make a constructive recommendation to the Sheng Yu Steel Co., Ltd as an useful reference when the Extranet system to be planned and implementedfor. In Chapter-1 ¡©Introduction¡ª¡Ato descibe the backgroud, purposes, procedures and the limitation related to the study¡Fin Chapter-2, the major is concentrate on the review and understand on the relevant documents of the subject related¡Fin Chapter-3, specifically to focus on the existing situations of the steel industries and the Sheng Yu Steel Co., Ltd. how it is the current situation to the subject issue¡Fin Chapter-4, to have further investigation on recent situations for the use of Information Technology in Sheng Yu Steel Co., Ltd. to make a recommendation for their reference whn they plan for the implementation of Extranet System for the improvement of Customer Relationship Management¡Fand finally, in Chapter-5, to describe the findings and issues for whicht to be expected to have further study in the future to come up a generalized model for which can be applied to all companies not only for steel industies but also to all conventional enpterprises as an important and valuable reference guideline.
22

Das Paradigma des homogenen Enterprise Access Managements sowie ein Vorschlag zur unternehmensweit konsistenten Zugriffssteuerung

Rottleb, René 13 November 2003 (has links) (PDF)
Bei der Umsetzung moderner Managementkonzepte wie bspw. Supply Chain Management, Customer Relationship Management und Partner Relationship Management werden Anwendungssysteme wertschöpfungskettenübergreifend eingesetzt. Das bedeutet, dass sowohl interne als auch externe Benutzer auf verschiedene Anwendungssysteme eines Unternehmens zugreifen. Die daraus resultierenden Anforderungen werden als Paradigma des homogenen Enterprise Access Managements (hEAM) beschrieben. Zur Umsetzung dieser Anforderungen wird ein Referenzmodell zur anwendungssystemübergreifend konsistenten Zugriffssteuerung (MAKS) entwickelt. Eine entsprechende Realisierungsmöglichkeit in Form eines zentralen Rollen- und Rechtemanagementsystems (ZR2MS) ergibt sich aus der Referenzarchitektur zur anwendungssystemübergreifend konsistenten Zugriffssteuerung (A2KS).
23

Agent-based one-shot authorisation scheme in a commercial extranet environment

Au, Wai Ki Richard January 2005 (has links)
The enormous growth of the Internet and the World Wide Web has provided the opportunity for an enterprise to extend its boundaries in the global business environment. While commercial functions can be shared among a variety of strategic allies - including business partners and customers, extranets appear to be the cost-effective solution to providing global connectivity for different user groups. Because extranets allow third-party users into corporate networks, they need to be extremely secure and external access needs to be highly controllable. Access control and authorisation mechanisms must be in place to regulate user access to information/resources in a manner that is consistent with the current set of policies and practices both at intra-organisational and cross-organisational levels. In the business-to-customer (B2C) e-commerce setting, a service provider faces a wide spectrum of new customers, who may not have pre-existing relationships established. Thus the authorisation problem is particularly complex. In this thesis, a new authorisation scheme is proposed to facilitate the service provider to establish trust with potential customers, grant access privileges to legitimate users and enforce access control in a diversified commercial environment. Four modules with a number of innovative components and mechanisms suitable for distributed authorisation on extranets are developed: * One-shot Authorisation Module - One-shot authorisation token is designed as a flexible and secure credential for access control enforcement in client/server systems; * Token-Based Trust Establishment Module - Trust token is proposed for server-centric trust establishment in virtual enterprise environment. * User-Centric Anonymous Authorisation Module - One-task authorisation key and anonymous attribute certificate are developed for anonymous authorisation in a multi-organisational setting; * Agent-Based Privilege Negotiation Module - Privilege negotiation agents are proposed to provide dynamic authorisation services with secure client agent environment for hosting these agents on user's platform
24

The role of taxonomies in knowledge management

Fouché, Marie-Louise 30 June 2006 (has links)
The knowledge economy has brought about some new challenges for organisations. Accessing data and information in a logical manner is a critical component of information and knowledge management. Taxonomies are viewed as a solution to facilitate ease of access to information in a logical manner. The aim of this research was to investigate the role of taxonomies within organisations which utilise a knowledge management framework or strategy. An interview process was utilised to gain insight from leading organisations as to the use of taxonomies within the knowledge management environment. Organisations are starting to use taxonomies to manage multi-sourced environments and facilitate the appropriate sourcing of the organisations intellectual capital. Based on the research it is clear that taxonomies will play a central role in the coming years to help manage the complexity of the organisation's environment and ease the access to relevant information. / Information Science / M.Inf.
25

Das Paradigma des homogenen Enterprise Access Managements sowie ein Vorschlag zur unternehmensweit konsistenten Zugriffssteuerung

Rottleb, René 08 December 2003 (has links)
Bei der Umsetzung moderner Managementkonzepte wie bspw. Supply Chain Management, Customer Relationship Management und Partner Relationship Management werden Anwendungssysteme wertschöpfungskettenübergreifend eingesetzt. Das bedeutet, dass sowohl interne als auch externe Benutzer auf verschiedene Anwendungssysteme eines Unternehmens zugreifen. Die daraus resultierenden Anforderungen werden als Paradigma des homogenen Enterprise Access Managements (hEAM) beschrieben. Zur Umsetzung dieser Anforderungen wird ein Referenzmodell zur anwendungssystemübergreifend konsistenten Zugriffssteuerung (MAKS) entwickelt. Eine entsprechende Realisierungsmöglichkeit in Form eines zentralen Rollen- und Rechtemanagementsystems (ZR2MS) ergibt sich aus der Referenzarchitektur zur anwendungssystemübergreifend konsistenten Zugriffssteuerung (A2KS).

Page generated in 0.0523 seconds