• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 6
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A Study of The Impact Exerted by Constant Technological Changes on the Career Development of IT Professionals¡¦

Lin, Yih-Jih 05 August 2002 (has links)
Abstract Due to the rapid change of information technology, shorter life of computer software and hardware technology, and quicker speed of product replacement/elimination, IT professionals have received tremendous challenge. This study used the qualitative case study method to conduct in-depth interviews with senior and outstanding people in the information service field to discover how they perceive the impact of IT change and how they adapt to this change. The findings are as follows: 1. People engaged in information service sector have experienced huge impact of rapid changing technology; 2. The new technology can easily replace the old one. As a result, one¡¦s technological skill may depreciate quickly; 3. The accumulation of pure technological experience cannot be converted into the accumulation of personal value and even lower personal esteem; 4. High technology brings more challenge and high recognition of work; 5. ¡§Work loyalty¡¨ becomes history; 6. Even being a leader, more skills and technology are required, liking burning a candle on both ends; 7. There is always a sense of ¡§uncertainly¡¨; 8. Middle and higher level of workers tend to avoid active mentoring the low level employees to avoid being replaced by them; 9. Job Wins and yet Life Loses; 10. It is impreative to acquire and integrate necessary work skills; 11. Both professional and common sense knowledge are necessary; 12. It is a career deserving a life-long devotion; 13. It requires a life-long learning and learning in the life time; 14. It provides the chance to look for continuous growth Key Word : InformationTechnology¡AInformation Service
2

"Regler! Ja det är väl bra att ha?" : En studie om gränsdragningar kring ungas IT användning

Eriksson, Sofie, Karlsson, Ronja January 2016 (has links)
Previous research has shown an increased use of IT amongst young people. This has made it problematic for parents to set boundaries for their children's use of IT. The aim for this study was to create a deeper understanding of how parents relate to boundaries of IT, and how they monitor their children's use of it. This study was a qualitative study through semi-structured interviews to enable to capture the parents' experiences. The results showed that parents have boundaries but that there is a gap between the occurrence of boundaries and causes for boundaries. The study showed that parents monitor their children's use of IT but it is unclear whether the methods they use actually give them sufficient insight and knowledge regarding their children use of IT.
3

工業設計服務業與群聚-台灣和荷蘭個案比較 / The Design Services Industry and its Clusters-The Cases of Taiwan and the Netherlands

Bloem, Reinier Unknown Date (has links)
Clusters are concentrations of companies that reached a critical mass and that produce together all elements of the value chain. This research will look at the Design Services Industry and its clusters. The forming of clusters will be illustrated by examples from The Netherlands and Taiwan. To structure the research an adapted model of the Porter’s diamond is used to analyze the two countries. Porter’s diamond discusses the microeconomic foundations of competition that influence and stimulate the forming of clusters. The four major components of the model are factor conditions, demand conditions, supporting and related industries and strategy, structure and rivalry. These components can be influenced by governments and chance. The adaptations to the model consist first of making the components of virtual clusters more explicit by mentioning elements that can be leveraged by information technology And second by adding attention to the attraction and retaining of talent. The Design services industry has a special need of talent which some also call the creative class. The analysis identified several differences between the two researched countries. These differences can be seen as opportunities for improvement by the design service industries in both countries. Keywords: Design, Cluster, Factor conditions, Demand conditions, Supporting and related industries, Strategy, Structure, Rivalry, Government, Chance, Information Technology, Talent, Creative class.
4

Strong user authentication mechanisms / Starka användarverifieringsmekanismer

Haraldsson, Emil January 2005 (has links)
<p>For Siemens Industrial Turbomachinery to meet its business objectives a modular authentication concept has to be implemented. Such a mechanism must be cost- effective while providing a well-balanced level of security, easy maintenance and be as user-friendly as possible. </p><p>Authenticating users securely involves the combination of two fields, theory of authentication mechanisms in information systems and human computer interaction. To construct a strong user authentication system the correlations of these fields has to be understood and provide guidance in the design. </p><p>Strong user authentication mechanisms enforce the use of two-factor authentication or more. The combinations implemented rely on knowledge, possession and sometimes logical-location. </p><p>A user authentication system has been implemented using leading industrial products as building blocks glued together with security analysis, programming and usability research. </p><p>The thesis is divided into two parts, the first part giving the theoretical background of cryptography, authentication theory and protocols needed for the understanding of the second part, providing security analysis, blueprints, and detailed discussions on the implemented system. </p><p>Conclusions have been drawn regarding the implemented system and its context as well as from strict theoretical reasoning regarding the authentication field in general. Conclusions include: </p><p>· The unsuitability of remote authentication using biometrics</p><p> · The critical importance of client security in remote authentication</p><p> · The importance of a modular structure for the security of complex network-based systems</p>
5

Internets påverkan på den traditionella resebyråns framtid : En studie om resebyråns roll på marknaden

Eggel, Natascha, Strekalova, Nadja January 2015 (has links)
Syftet är att identifiera olika typer av värdeskapande och konkurrensfördelar som kan uppstå i den fysiska resebyrån genom att undersöka och analysera; användandet av informationsteknologin, det fysiska servicelandskapet och erbjudandet för kunden. Relaterat till syftet har vi formulerat en forskningsfråga som blev enligt följande: Hur möjliggör traditionella resebyråer skapandet av olika typer av värde för sina kunder genom sitt fysiska servicelandskap? Vår uppsats är en kvalitativ forskningsmetod, då vi eftersträvat en djup undersökning för vår valda forskningsfråga. Vi har i uppsatsens gång använt oss av både primär- och sekundärkällor. Våra primära källor har bestått av sex intervjupersoner där vi använt oss av semistrukturerade intervjuer. Under uppsatsens analys har vi kunnat urskilja att informationsteknologin, servicelandskapet och erbjudandet har en stor påverkan för den traditionella resebyråns möjligheter att skapa värde och konkurrensfördelar för sina kunder. Under denna process har vi förstått att den personliga servicen och tryggheten spelar en stor roll för kunden. Det har framkommit att de traditionella resebyråerna jobbar väldigt starkt för att behålla interaktionen med sina kunder genom att bland annat skräddarsy olika typer av reseerbjudanden och vara aktiva på internet. / The purpose of this study is to identify various types of value creation and competitive advantages that may occur in the physical travel agency by examining and analyzing; the use of information technology, the physical servicescape and the customer offering. In relation to the purpose we have chosen the following research question: How do traditional travel agencies enable the creation of various types of value for its customers through its physical servicescape? Our study is based on a qualitative research methodology, because we wanted a deep examination of our chosen research question. We have throughout our study used both primary sources and secondary sources. Our primary sources consisted of six interview respondents that have been collected through semi-structured interviews. During the analysis of the study we can distinguish that informationtechnolgy, the servicescape and the offering have a great impact on the traditional travel agencies opportunities to create value and competitive advantages to its customers. During this process we understood that the personal service and security plays a major role for the customer. It has emerged that the traditional travel agencies work very hard to retain the interaction with its customers by for example customize different types of travel offerings and being active online.
6

Strong user authentication mechanisms / Starka användarverifieringsmekanismer

Haraldsson, Emil January 2005 (has links)
For Siemens Industrial Turbomachinery to meet its business objectives a modular authentication concept has to be implemented. Such a mechanism must be cost- effective while providing a well-balanced level of security, easy maintenance and be as user-friendly as possible. Authenticating users securely involves the combination of two fields, theory of authentication mechanisms in information systems and human computer interaction. To construct a strong user authentication system the correlations of these fields has to be understood and provide guidance in the design. Strong user authentication mechanisms enforce the use of two-factor authentication or more. The combinations implemented rely on knowledge, possession and sometimes logical-location. A user authentication system has been implemented using leading industrial products as building blocks glued together with security analysis, programming and usability research. The thesis is divided into two parts, the first part giving the theoretical background of cryptography, authentication theory and protocols needed for the understanding of the second part, providing security analysis, blueprints, and detailed discussions on the implemented system. Conclusions have been drawn regarding the implemented system and its context as well as from strict theoretical reasoning regarding the authentication field in general. Conclusions include: · The unsuitability of remote authentication using biometrics · The critical importance of client security in remote authentication · The importance of a modular structure for the security of complex network-based systems

Page generated in 0.1191 seconds