• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4310
  • 2183
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 6500
  • 6494
  • 5850
  • 5652
  • 5613
  • 1815
  • 1698
  • 1688
  • 1684
  • 1683
  • 1176
  • 1157
  • 1017
  • 472
  • 435
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
561

Managing Knowledge for Innovation in SMEs: the role of Digital Technologies

Song, Zihan January 2020 (has links)
No description available.
562

Anomaly detection in ring rolling process : Using Tree Ensemble Methods

Alcaçoas, Dellainey January 2019 (has links)
Anomaly detection has been studied for many years and has been implemented successfully in many domains. There are various approaches one could adopt to achieve this goal. The core idea behind these is to build a model that is trained in detecting patterns of anomalies. For this thesis, the objective was to detect anomalies and identify the causes for the same given the data about the process in a manufacturing setup. The scenario chosen was of a ring rolling process followed at Ovako steel company in Hofors, Sweden. An approach involving tree ensemble method coupled with manual feature engineering of multivariate time series was adopted. Through the various experiments performed, it was found that the approach was successful in detecting anomalies with an accuracy varying between 79% to 82%. To identify the causes of anomalies, feature importance using Shapley additive explanation method was implemented. Doing so, identified one feature that was very prominent and could be the potential cause for anomaly. In this report, the scope for improvement and future work has also been suggested.
563

Towards an evaluation framework for web application environments

Comte, Jessica January 2020 (has links)
No description available.
564

Progressing towards effective record-keeping in Multidisciplinary Team Meetings : Possibilities of achieving structured, standardized, electronic records

Khumalo, Akhona Cikizwa January 2020 (has links)
No description available.
565

Teach phishing awareness with games : Comparing the effects of Gamification and Learning to read onPhishing Awareness

Ek, Pontus January 2020 (has links)
No description available.
566

Alexa, vad sa jag precis? : En studie av svenskars attityder om konfidentialitet kontra tillgänglighet hos smarta högtalare / Alexa, what did I just say? : A study of Swede's attitudes toward confidentiality versus accessibility in smart speakers

Petersen, Henrik January 2021 (has links)
Studien utforskar medvetandet hos svenskar gällande smarta högtalare och den information om användarna den hanterar. För att kunna ge svar på frågeställningen om hur medveten användaren är, skickades en kvantitativ enkät med frågor ut, där deltagare kunde betygsätta sin egen medvetenhet om produkten och dess säkerhet, men även hur de agerar runt och med sin/andras smarta högtalare. Studien hittar och definiera omfånget på det gap som finns mellan användarens konfidentialitet och den enkla, samt höga, tillgängligheten som tillverkarna bakom produkterna strävar efter.Svaren på enkäten kan styrka Kowalczuk (2018) studie om att den främsta anledningen att ett inköp av en smart högtalare sker är nöje. Det betyder i sin tur att användarna värderar säkerhet och konfidentialitet lägre än nöje och användarbarhet, något som Lau et al. (2018) också kunde styrka i sin studie. När deltagarna betygsätta sin egen medvetenhet verkar det som att graden av medvetenhet varken är hög eller låg. Det som är intressant är hur de agerar med och runt de smarta högtalarna. Ytterst liten del anger att de faktiskt inte pratar om vissa saker eller helt enkelt stänger av högtalaren vid vissa situationer. Detta till trots att det finns en generell oro kring tillverkarens hantering av information som den smarta högtalaren lyssnar på. Sammantaget behöver den smarta högtalarna enklare och säkrare installation, så att varje användare har fullgott skydd av sin information som produkten hanterar. Vidare behöver användare av smarta högtalare och annan IT-utrustning, höja sin generella nivå gällande säkerhetstänk. / The study explores the awareness of Swedes regarding smart speakers and the information about the users it handles. To answer the question of how aware the user is, a quantitative questionnaire was sent out, with questions where participants could rate their own awareness of the product and its security, but also how they act around and with their/others' smart speakers.The study finds and defines the extent of the gap that exists between the user's confidentiality and the simple, as well as high, availability that the manufacturers behind the products strive for.The answers to the survey can confirm Kowalczuk's (2018) study that the main reason for purchasing a smart speaker is pleasure. This in turn means that users value security and confidentiality lower than pleasure and usability, something that Lau et al. (2018) could also validate in their study.When the participants rate their own awareness, it seems that the level of awareness is neither high nor low. What is interesting is how they act with and around the smart speakers. Very few states that they do not actually talk about certain things or simply turn off the speaker in certain situations. This is even though there is a general concern about the manufacturer's handling of information that the smart speaker listens to.All in all, the smart speakers need easier and more secure installation, so that each user has full protection of their information that the product handles. Furthermore, users of smart speakers and other IT equipment need to raise their general level of security awareness.
567

Cyber Supply-Chain Security Challenges in the Context of Interorganizational Collaboration

Henriksson, Johannes January 2021 (has links)
No description available.
568

Utveckling och implementation av styrdokument i oförutsägbara situationer / Development and implementation of policy documents in unpredictable situations

Pang, Fredrik, Christensen, Johan January 2021 (has links)
Under våren 2019 slog pandemin känd som COVID-19 till. Kort därefter tvingades majoriteten av organisationer att flytta hem sin verksamhet från kontoren för att minska smittspridningen. Detta ledde till att alltmer arbete bedrevs över internet där hoten mot användares information ökade kraftigt. Även statliga verksamheter blev påverkade av den forcerade digitaliseringen och denna studie undersöker hur svenska lärosäten hanterade sina informationssäkerhetsrelaterade styrdokument under COVID-19. För att undersöka vilka åtgärder som tagits och beslut som fattats genomfördes en intervjustudie med informationssäkerhetsansvarig personal från fyra av Sveriges statliga lärosäten.  Resultatet påvisade att policyer inte har utvecklats som ett svar till COVID-19 pandemin. Dock påvisades en kraftig digitalisering, vilket var ett resultat av statens rekommendationer om hemarbete för att minska spridningen. Vidare visades utrymme för förbättring inom policyutveckling samt efterlevnad.   Slutsatsen ger svar på problem som upptäcktes i problemformuleringen. Den ger även rekommendationer för att förbättra policyutvecklingen, skapa en informationssäkerhetsmedvetenhet och öka efterlevnaden. Några av dessa rekommendationer var att arbeta riskbaserat, undvika självändamål vid policyutveckling och utföra omvärldsanalyser. / In the spring of 2019, the pandemic known as COVID-19 struck the world. Shortly afterwards, many organizations were forced to move their operations home from the offices to reduce the spread of infection. This led to more and more work being conducted over the internet where the threats to users' information increased drastically. Government activities were also affected by the forced digitalisation and this study examines how Swedish higher education institutions handled their information security-related governing documents during COVID-19. To investigate what measures and decisions were made, an interview study was conducted with staff responsible for information security from four of Sweden's higher education institutions. The results showed that policies have not been developed in response to COVID-19 pandemic. However, rapid digitalisation was demonstrated, which was a result of the state's recommendations regarding working from home to reduce the spread. Furthermore, room was shown for improvement in policy development and compliance. The conclusion provides answers to problems that were discovered in the introduction. It also provides recommendations to improve policy development, create information security awareness and increase compliance. Some of these recommendations were to work risk-based, avoid self-fulfilments when designing policies and perform worldwide threat assessments.
569

The shift from traditional to Self Service Business intelligence : A case study in a large enterprise company

Mazulis, Justas January 2021 (has links)
Background: Business intelligence has been used in businesses for many years. The technology evolves and there is enough ground covered to see how it became an integral part of ICT in corporations and even medium sized companies. The IT applications are evolving in all areas, consumers get educated about various aspects of different analytics software together with the growth of businesses. Moreover, fast pace of business requires rapid decisions being made. This synergy creates a new type of business intelligence called Self Service Business Intelligence (SSBI). Gartner (2020) says Self-service business intelligence is defined as end users designing and deploying their own reports and analyses within an approved and supported architecture and tools portfolio. The literature review showed a fair amount of skepticism related to the value a SSBI implementation can bring. Purpose: The main aim of the thesis is to address the concern of missing recent insights into SSBI roll-outs, and firstly identify the potential in value of the SSBI implementation. After this is done, scientific methods are applied to structure the knowledge, evaluate it in the context of chosen value identification theoretical framework and show how a transition from BI to SSBI can generate value to the organization through implementing SSBI. The thesis will aim to answer the main research question: "What are the main aspects shaping the Self Service Business Intelligence implementation, as seen from participants views?" Methodology: This is a qualitative case study of a transition from traditional BI to Self Service BI in the selected case company. The theoretical background is based on scientific journal publications retrieved from Scopus database and academic literature. The empirical data is collected with a means of semi- structured interviews and internal documentation received from the case company. The data is collected from five internal respondents related to SSBI transition in the case company. Findings: The interviews indicated there were numerous expectations from IT and Finance departments which have materialized successfully as well as several that were not expected. The case company data analysis using the adapted SSBI value generating model helped the researcher to pinpoint and enhance the value generating areas list in the SSBI transition process. Keywords: Self-Service Business Intelligence, SSBI, Business Intelligence, SSBI Value, SSBI skepticism, SSBI implementation, Organizational Benefits, Business Value, Analytics Use, Organizational Transformation, Case study.
570

IT-säkerhet inom sjukvården : En undersökning av förtroendet för IT-säkerhet inom den svenska sjukvården / IT-security within swedish healthcare : An investigation of trust for IT-security in the swedish healthcare

Strand, Fredrik, Lydrup, William January 2021 (has links)
No description available.

Page generated in 0.1067 seconds