• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 86
  • 28
  • 20
  • 17
  • 16
  • 9
  • 6
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 209
  • 209
  • 58
  • 28
  • 27
  • 26
  • 26
  • 26
  • 24
  • 20
  • 18
  • 18
  • 17
  • 17
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Die strafrechtliche Haftung des Linkanbieters im Ausland nach deutschem Recht /

Poenig, Andreas. January 2006 (has links) (PDF)
Inauguraldiss. Univ. Bern, 2005. / Im Buchh.: Göttingen : Sierke-Verlag. Bibliogr.
92

Comparativo entre processos florestais terceirizados e primarizados / Comparison between outsourced and primarized forest processes

João Fernando Silva 10 February 2012 (has links)
A terceirização e a primarização constituem estratégias de gestão que vem sendo adotadas por empresas florestais brasileiras. Entretanto, apesar de sua crescente utilização, suas diferenças em termos técnicos, econômicos e estratégicos, tais práticas não têm sido objeto de muitos estudos no Brasil, principalmente no que se refere ao setor florestal. Em virtude dessa realidade, o objetivo principal desta pesquisa foi comparar os modelos terceirizados e primarizados dos processos de produção de mudas, formação florestal, colheita e carregamento de madeira, em florestas plantadas, avaliando riscos, oportunidades e recomendando melhores alternativas segundo a percepção ou o ponto de vista dos principais envolvidos, ou seja, a empresa florestal contratante e o prestador de serviços. Para a realização das análises financeiras e de custos dos processos florestais abrangidos no estudo foram utilizadas informações levantadas junto a empresas prestadoras de serviços florestais localizadas no extremo sul da Bahia, cedidas pela Cia Suzano Papel e Celulose, Unidade Mucuri-BA (contratante) e mais outras cotações realizadas com diferentes fornecedores de materiais, mão-de-obra, serviços e insumos. A partir das análises, verificou-se que os processos florestais produção de mudas (com viveiro próprio) e carregamento de madeira, quando terceirizados, apresentaram custo operacional menor do que quando primarizados. Já os processos formação florestal e colheita mecanizada, quando primarizados com a aquisição de máquinas, resultaram em custo operacional menor do que quando terceirizados. Porém, em virtude da necessidade de investimento para aquisição de equipamentos e estruturas, o resultado da análise financeira de todos os processos primarizados tornou-se negativo (VPL < 0). Constatou-se também que os principais fatores contrários à primarização foram: custo com mão-de-obra (significativamente maior para a atividade primarizada), custo com estrutura de apoio e remuneração do capital investido. Já os principais fatores favoráveis à primarização foram: carga de taxas e impostos incidentes sobre o custo do serviço de terceiros e a margem de lucro aplicada pelo prestador de serviço. Ainda que apresente resultados financeiros negativos, a primarização das atividades florestais pode trazer outros benefícios, viabilizando-a estratégica e até economicamente, possibilitando o livre-arbítrio ao administrador quanto à melhor forma de gestão de acordo com a sua realidade e necessidade dentro do mercado. Palavras-chave: Operaçõ / The Outsourcing and the Primarization constitute management strategies been used by Brazilians forest companies. However, although its use is increasing, technical, economics and strategy terms are not being studied in Brazil, mainly on the forestry sector. Therefore, the principal goal on this research was to compare Outsourcing and Primarization Models including the process of seedlings production, forest formation, harvest and loading for planted forest, evaluating risk, opportunity and recommendation about better practices by the perception or point of view of the forest company and the service provider. The database for realize the financial and cost analyses from forest processes came from forest services providers, in the Extreme South of Bahia Estate, and Suzano Pulp and Paper Company (contractor). Seedling production, with own nursery, and wood loading presented lower operational costs when done by services providers. The costs of forest formation and harvest processes, when done by the contractor, including machines acquisition, were lower than the same operations done by services providers. However, because of necessary investment for machinery and structure acquisition, the financial analysis of all primarized processes resulted negative (NPV < 0). The main negative factors were labor cost (significantly higher for primarized activities) and the cost of payment for invested capital. The main factors favoring the primarization were taxes paid by services providers and the profit margin earned by them.
93

Digital Transformation, a Question of Survival? : Exploring the Possibility for a Swedish Car Rental Company to Digitally Transform into a Mobility Service Provider

Enocson, Julia, Söderholm, Linnéa January 2017 (has links)
Background: Due to arising shifts in customers’ digital expectations, businesses need to adapt current strategies to dynamic environments in order to stay competitive in today’s digital era. These shifts, which are to set new directions for entire industries, is also known as a digital transformation. To digitally transform a firm entails both opportunities to thrive and challenges to face. The technological advances create a need for new roles and skills to be mastered. In addition, the rise of the sharing economy has led to the need for certain industries to adapt accordingly, including the car rental industry. Purpose: The purpose of this thesis is to contribute to the identification of necessary internal and external factors that firms need to consider in order to digitally transform their services. Further, this study aims to provide guidelines for firms aspiring to transform their service to become a MSP. Methodology: This study has adopted a qualitative research strategy and the design of a single case study of a car rental company. In order to collect empirical data, semi- structured interviews were conducted within related fields. Conclusion: The authors of this study have identified prominent internal and external factors within the fields of digital transformation and MaaS. In addition, the authors have come to the conclusion that the identified factors possess different levels of impact within each perspective, which is illustrated through a constructed analysis model. To conclude, this study has contributed with guidelines regarding possible strategies a traditional car rental company could implement in order to transform its business to become a MSP.
94

Bezpečnost bezdrátové sítě poskytovatele internetových služeb / Wireless Network Security of Internet Service Provider

Parolek, Pavel January 2013 (has links)
This thesis analyzes the wireless network security of the Internet service provider company Net-Connect s.r.o. It identifies its weak points and suggests measures that lead to the increase of the wireless network security.
95

Návrh projektu na zřízení sítě pro poskytovatele internetu / The Project Proposal for Building an ISP Network

Kovács, Benjamín January 2015 (has links)
The subject of the „The project proposal for building an ISP network“ thesis is the analysis of a current state of internet connectivity in a city of Komarno as well as a project proposal of a new network infrastructure for an internet service provider. The analysis consists of the current state of infrastructure and a possibilities of building new ISP network infrastructure. This thesis also contains brief summary of a required technologies and a description of project management, including project risk analysis, time schedule and cost calculation.
96

Implementace vybrané technologie pro ISP / Implementation of the Selected Technology for ISP

Doležal, Martin January 2016 (has links)
The thesis focuses on implementation of selected technology within the company CPU-Kocourek, s.r.o, which provides varied internet services. Based on the theoretical part and the analysis of the current situation are proposed solutions suitable for the management of access network provider. The proposal part contains selection of the best proposal and its implementation into the routine mode of operation.
97

Un modèle de référence pour l'application de l'ABC dans le cadre de la réorganisation des activités de l'entrepôt : une recherche-intervention chez FM Logistic / A reference model for the application of ABC during the design of the warehouse activities : an action research at FM Logistic

Bessouat, Jeanne 08 October 2019 (has links)
Le prestataire de services logistiques (3PL) réorganise les activités de ses entrepôts afin d’être performant (C.-L. Liu and Lyons 2011). De fait, le 3PL a besoin d’une connaissance détaillée du coût des activités de ses entrepôts. Le cadre théorique de cette thèse se situe à l’intersection entre l’entrepôt, la conception, et les coûts. Dans le cadre de la conception des entrepôts, la sélection et plus particulièrement l’identification de l’ensemble des ressources de l’entrepôt est peu étudiée (S. S. Heragu et al. 2005; Gu, Goetschalckx, and McGinnis 2010). Parallèlement, l’activity-based costing (ABC) est une méthode de calcul de coût peu appliquée pour obtenir le coût des entrepôts (Pirttilä and Hautaniemi 1995). Plusieurs freins entravent son application, dont le manque de formalisation dans la définition des activités (Waeytens and Bruggeman 1994). À l’aide d’une recherche qualitative au sein de l'entreprise FM Logistic, une classification des ressources de l’entrepôt et un modèle de référence des activités de l’entrepôt sont proposés. La classification des ressources de l’entrepôt permet l’identification de l’ensemble des ressources de l’entrepôt. La classification est ensuite utilisée au sein du modèle de référence des activités de l’entrepôt. Le modèle de référence facilite l’application de l’ABC en standardisant le vocabulaire utilisé pour définir les activités de l’entrepôt. Le modèle de référence est ensuite mobilisé lors de différentes applications, dans le cadre de la conception des activités de l’entrepôt d’un prestataire de services logistiques. / The logistics service provider (3PL) is reorganizing the activities of its warehouse to be efficient (C.-L. Liu and Lyons 2011). In fact, 3PL needs a detailed knowledge of the cost of the activities of its warehouses. The theoretical framework of this thesis lies at the intersection between warehouse, design and costs. Concerning the design of the warehouses, the selection, and especially the identification of all resources, are not much studied (S. S. Heragu et al. 2005; Gu, Goetschalckx, and McGinnis 2010). Concurrently, activity-based costing (ABC) is a cost calculation method which is little applied for obtaining warehouse costs (Pirttilä and Hautaniemi 1995). Several obstacles hinder its application, including the lack of formalization in the definition of activities (Waeytens and Bruggeman 1994).Using qualitative research within the enterprise FM Logistic, a classification of warehouse resources and a reference model of warehouse activities are proposed. The warehouse resource classification allows the identification of all the warehouse resources. The classification is then mobilised within the reference model of warehouse activities. The reference model facilitates the application of the ABC by standardizing the vocabulary to define the activities of the warehouse. The reference model is then employed for different applications, as part of the design of warehouse activities of a logistic service provider.
98

Säkerhetsrisker i molntjänster / Security risks in cloud services

Angtorp, Felix, Kjellberg, Julia January 2022 (has links)
Användningen av molntjänster är utbredd bland företag idag, där den flexibilitet och tillgänglighet som erbjuds i molntjänster har påskyndat övergången från lokal datalagring och mjukvara. Tillämpningen av en tredjepartsleverantör för datalagring och användning av tjänster i molnet har skapat vissa farhågor om säkerhet och tillhörande risker. Därför syftar denna uppsats till att öka kunskapen om cybersäkerhet och tillhörande risker i molntjänster för användare och tjänsteleverantörer. För att uppnå det uttalade målet ställdes följande forskningsfråga: Vilka är säkerhetsriskerna i molntjänster idag, är det skillnad mellan molntjänstanvändare och molntjänstleverantörer i upplevda säkerhetsrisker? För att besvara forskningsfrågan har avhandlingen framför allt använt sig av tematisk analys av data som samlats in via semistrukturerade intervjuer och mailintervjuer. Intervjuerna har genomförts på ett urval av molntjänstleverantörer (två företag) och slutanvändare av molntjänster (två företag). Utifrån analysen av den insamlade empiriska datan fann avhandlingen att användare och leverantörer av molntjänster uppfattar insiderrisk som den mest kritiska säkerhetsrisken. För användare av molntjänster ansågs dataläckage, särskilt relaterat till kunddata, vara den högsta risken. Detta skiljer sig från molntjänstleverantörer, de är oroliga för konsekvenserna av ett dataläckage. För molntjänstleverantörer handlar det om att kunna visa att man tar en insider attack som en stor säkerhetsrisk och motarbetar den på ett förebyggande sätt för att öka förtroendet hos de företag som väljer att använda molntjänster. Samtidigt behövs fortsatt fokus på utvecklingen av säkerheten mot olika typer av hackerattacker och intrångsförsök som tas upp i studien för att inte försumma de säkerhetsrisker som ändå bör tas på allvar. / The use of cloud services is widespread among companies today, where the flexibility and availability offered in cloud services has sped up the transition from local data storage and software. The application of a third-party provider for data storage and the use of services in the cloud has created some concerns about security and associated risks. Therefore, this thesis aims to increase knowledge about cyber security and associated risks in cloud services for users and service providers. To achieve the stated aim the following research question was raised: What are the security risks in cloud services today, is there a difference between cloud service users and cloud service providers in perceived security risks? To answer the research question, the thesis predominantly made use of thematic analysis of data collected via semi-structured interviews and email-interviews. The interviews were conducted on a sample of cloud service providers (two companies) and end-users of cloud services (two companies). From the analysis of the collected empirical data, the thesis found out that cloud service users and providers perceive insider risk as the most critical security risk. For cloud service users, data leakage, particularly related to customer data, was considered to be the highest risk. This differs from cloud service providers; they are worried about the consequences of a data leakage.For cloud service providers, it is about being able to demonstrate that you take an insider attack as a major security risk and work against it in a preventive way in order to increase the trust of the companies that choose to use cloud services. At the same time, continued focus is needed on the development of security against various types of hacker attacks and intrusion attempts addressed in the study in order not to neglect the security risks that should still be taken seriously.
99

Translation-mediated Organization Discourse in Cyberspace: A Contrastive Convention Analysis of Selected Localized and Non-localized English-language Organization Websites

Liu, Bin, Liu 26 June 2018 (has links)
No description available.
100

Identifying Key Determinants of Service Provider Effectiveness and the Impact it has on Outsourced Security Success

Lewis, James B. 01 January 2015 (has links)
The purpose of this research was to identify key determinants of service provider effectiveness and how it impacts outsourced security success. As environments have become more robust and dynamic, many organizations have made the decision to leverage external security expertise and have outsourced many of their information technology security functions to Managed Security Service Providers (MSSPs). Information Systems Outsourcing, at its core, is when a customer chooses to outsource certain information technology functions or services to a service provider and engages in a legally binding agreement. While legal contracts govern many aspects of an outsourcing arrangement, it cannot serve as the sole source of determining the outcome of a project. Organizations are viewing outsourcing success as an attainment of net benefits achieved through the use of a service provider. The effectiveness of the service provider has an impact on a company’s ability to meet business objectives and adhere to service level agreements. Many empirical studies have focused on outsourcing success, but few have focused on service provider effectiveness, which can serve as a catalyst to outsourcing success. For this research, Agency Theory (AT) was proposed as a foundation for developing the research model which included key areas of focus in information asymmetry, the outsourcing contract, moral hazard, trust, service provider effectiveness, and security outsourcing success. Agency Theory helped uncover several hypotheses deemed germane to service provider effectiveness and provided insight into helping understand the principal-agent paradigm that exists with security outsourcing. Confirmatory Factor Analysis (CFA) and Partial Least Squares-Structured Equation Modeling (PLS-SEM) were used with SmartPLS to analyze the data and provided clarity and validation for the research model and helped uncover key determinants of service provider effectiveness. The statistical results showed support for information asymmetry, contract, and trust, all of which were mediated through service provider effectiveness. The results also showed that service provider effectiveness is directly correlated to increasing security outsourcing success. This concluded that the research model showed significant results to support 4 of the 5 hypotheses proposed and helped uncover key findings on how security outsourcing success can be impacted. This research served as an original contribution to information security while viewing outsourcing success from the perspective of the client, security services, and customer expectations.

Page generated in 0.0875 seconds