• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4310
  • 2183
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 6500
  • 6494
  • 5850
  • 5652
  • 5613
  • 1815
  • 1698
  • 1688
  • 1684
  • 1683
  • 1176
  • 1157
  • 1017
  • 472
  • 435
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
571

Implementation of Agile Methodology in the IT Industry as Experienced by Team Members

Jessica Emilia, Lund Johansson January 2021 (has links)
No description available.
572

Användarutbildning i etablerade affärssystem

Johansson, Philip, Bengtsson, Joakim January 2021 (has links)
Användning av affärssystem i organisationer kan generera operativa och strategiska fördelar. För att användare ska nyttja affärssystem till dess potential är det av vikt med användarutbildning för att användare ska besitta kunskap i affärssystem. Tidigare forskning har fokuserat på användarutbildning i samband med implementation. Däremot behövs mer forskning kring användarutbildning efter implementation av affärssystem. Syftet med studien var att skapa förståelse för hur organisationer hanterar användarutbildning i etablerade affärssystem. Studiens resultat resulterade i att organisationer hanterar användarutbildning i tre faser, introduktionsutbildning, kontinuerlig utbildning och vidareutbildning. / Using an ERP-system in organizations can generate operational and strategic benefits. However to generate these benefits the users in the ERP-system needs to have the correct knowledge on how to use the system. Earlier research have explored user training in the implementation of ERP-systems. However little is known about user training in established ERP-systems. The purpose of this thesis is to explore how organizations conduct user training in established ERP-systems. Our findings show that organizations conduct user training in three phases, introduction training, continuous training and supplementary training.
573

Kommunikation av mål och strategier - balansgången mellan stabilitet och flexibilitet : En fallstudie på ett bemanning- och rekryteringsbolag i tillväxt

Falk, Marie, Veronika, Jongenburger January 2020 (has links)
Service companies in the temporary work and recruitment industry are expanding and creating the conditions for good growth. In line with the rapidly changing environment, demands are made for internal change and adaptation to the new. Leading roles must communicate in a way that reaches the entire organization in order for all employees to have a common goal image to ensure that they work in the same direction.The purpose of this study was to understand how growth in a temporary work and recruitment agency changes the information structure and places new demands on communication of goals and strategies and also explain the effects this could have on the company.For the study's analysis, the contingency theory was applied, which describes organizations as open systems that have to balance the internal needs in order to be able to adapt to the environment as it changes.A qualitative study was applied to gain a deeper understanding for the communication of goals and strategies in a growth company. Semi-structured interviews with six employees at the case company form the basis for the study's collected empirics.The results of the study showed that with the prevailing growth, demands are changing for the internal communication where the balance between stability and flexibility must be adapted to its context and increased complexity. Economically set goals have no increased motivation among the organisation's employees but promote flexibility and innovation.Service companies that has a strong dependence on its enviroment must adapt its internal communication to changing conditions in order to create security while at the same time promoting flexibility to achieve set goals. A common understanding at the operational and strategic level that relates to the changing world and the internal development of the business where communication becomes crucial to explain how, when and why the organization acts as they do.The conclusions of the study shows that the balance between the organization's structure and its flexibility is dependent on the context and in line with the internal growth, the information structure that will relate to the changing demands of the world changes. Clear goals and strategies can limit the company if there is no room for flexibility. Lack of goals and strategies can lead to reduced motivation and uncertainty at the operational level, but from a strategic perspective freedom is given to the employees but also high expectations. Internal communication and dissemination of information play a central role in creating room for flexibility and innovation, but at the same time it creates a sense of security in the organization.
574

Digital transformation : Applicerbarhet i små och medelstora företag / Digital transformation : Applicability in small and medium sized enterprises

Östberg, Erik January 2020 (has links)
På en marknad i konstant och snabb förändring måste företagen hänga med i utvecklingen. Ett sätt att göra detta är att implementera Digital Transformation som strategi i kärnan av företaget. Små och medelstora företag inom tillverkningsindustrin har en stor utmaning framför sig när det kommer till att genomföra en Digital Transformation. Därför har denna studie undersökt faktorer som påverkar svenska SME:er inom tillverkningsindustrins genomförande av en digital transformation. I studiens resultat presenteras 13 faktorer för framgångsrik implementering av Digital Transformation i svenska små och medelstora företag inom tillverkningsindustrin, baserat på empiriskt insamlad data. Intervju-fynd analyserades och validerades med hjälp av studiens teoretiska referensram. Dessutom har applicerbarheten av två tillvägagångssätt för implementering av Digital Transformation i små och medelstora företag undersökts. / In a constantly and fast-changing market, companies need to find a way to manage the change. A way of doing this is to implement Digital Transformation as a core strategy. Small and Medium-sized companies in the production industry have a great challenge in performing a digital transformation. Therefore, this study investigates factors that affect such companies in Sweden when implementing digital transformation. The result of this study presents 13 factors for the successful implementation of a digital transformation in Swedish small and medium-sized production industries, based on empirical data. Interview findings were analysed and validated with a reference theoretical framework. Two research models for Digital Transformation implementation were also evaluated.
575

Self-service BI : En studie om oerfarna användare och information / Self-service BI : A study about casual users and information

Frej, Frans January 2020 (has links)
Business Intelligence is today a growing and evolving area within Information Technology and decision making and it’s becoming more and more common for organizations to implement Self-Service Business. To succeed with Self-Service Business Intelligence, it’s important for users to understand the information that is visually presented in front of them in the SSBI-tool. The information in a SSBI-tool are presented in dashboards and those are hard to design so that users easily can understand them. This study aims at finding out: ”How can a SSBI-tool facilitate and visually present information so that casual users can benefit from that information?”.To answer the question, a qualitative method has been used and the data has been collected with the help of semi-structured interviews. The interviews were done at one company that was in the middle of the process to implement a SSBI-tool and has been facing issues regarding the visual part of the SSBI-tool. The respondents contributed with material to answer the study’s question and generated new opinions regarding the subject.The result has been summarized into fem different criteria’s that will help casual users understand the visually presented information in the SSBI-tool. Those five criteria’s are: bar-graphs, explanatory terms and definitions, instruction video, simplicity before complexity and choice of words.
576

Utvärdering av disk och filsystem säker borttagning/krypteringsverktyg angående prestanda, egenskaper och säkerhet / Evaluation of disk and filesystem secure deletion/encryption tools regarding performance, characteristics and security

Ohlén, Tobias January 2020 (has links)
Computer usage is increasing constantly every year and reports of companies that have been targeted by malicious users and lost valuable and sensitive information is something that keeps on recurring and costs unfathomable amounts of money every year. Reports have shown that only in the united states tens of thousands of mobile devices and laptops disappear every year and some are used by malicious users to find sensitive information to use for personal gain. Many of the data breaches that are reported could be prevented if security was implemented in the devices such as encryption or secure deletion. This paper identify and explain the problems associated with modern hardware like SSD drives and other flash based hardware regarding secure deletion and encryption, this also applies on software. Four databases is probed for information and the accepted articles goes through a grounded theory approach. The information gathered is analyzed and presented, then conclusions will be drawn. The analysis clearly showed numerous problems with non encryption based secure deletion methods and that very few legacy approaches work fully on modern hardware and software. Encryption based secure deletion proved to be much better for modern storage devices and file systems although per file encryption still need future work since there still exist many limitations. Full disk encryption seems to be the most secure and easy to use solution of today. / Datoranvändningen ökar konstant varje år och rapporter om företag som har blivit mål för illvilliga individer och förlorat värdefull information är något som fortsätter att upprepas och kostar ofantliga mängder pengar varje år. Rapporter har visat att endast i förenta staterna av Amerika försvinner tiotusentals mobila enheter och laptops varje år och några av dem blir exploaterade av illvilliga individer för deras egna vinnings skull. Många av de dataöverträdelser som sker skulle kunna undvikas om säkerhet implementerades i enheterna såsom kryptering eller säker borttagning. Detta arbete identifierar och förklarar problemen associerade med modern hårdvara såsom SSD diskar eller andra flash baserade enheter angående säker borttagning och kryptering, detta appliceras även på mjukvara. Fyra databaser används för att leta information och de accepterade artiklarna går igenom en grundad teorimodell. Informationen som samlas in analyseras och presenteras, sedan kommer slutsatser dras. Analysen visar tydligt hur flertal problem med säkra borttagningsmetoder som inte använder kryptering samt att väldigt få äldre borttagningsmetoder fungerar fullständigt på modern hårdvara och mjukvara. Krypterings baserade säkra borttagningsmetoder bevisade sig vara mycket bättre för moderna lagringsenheter och filsystem, dock per filkryptering behöver fortfarande fortsätta att utvecklas eftersom då det fortfarande existerar många begränsningar.Full diskkryptering visade sig vara den mest säkra och lättaste lösningen att använda idag.
577

Automating the basic configuration of IPMI interfaces : To reduce the risk of misconfiguration

Sundahl, Mark Jack January 2020 (has links)
In this report the lack of basic security of IPMI devices when freshly received from the manufacturer will be discussed and analysed. Furthermore, the rest of the report will focus on attempting to find a solution on how to automate configuration of IPMI devices (and iDRACs due to hardware being borrowed from Ericsson Linköping) to avoid misconfigurations and to change the default credentials shipped. Three proposed workflows will be implemented and compared, and a fourth is further proposed in this report. All three workflows prove to work but the first using OME is found being slower, needing an additional license per iDRAC and require manual intervention while the other two workflows works fully automated. Considering how the three first workflows all require AutoConfig regardless of the rest of the steps the second workflow is recommended as its way faster than the other two methods. In theory the fourth workflow would be even better as it does not require AutoConfig to work nor would it necessarily only work for iDRACs but work for any IPMI device which supports the REDFISH API. Lastly getting better basic security should be something that the manufacturers should strive for as it only strengthens their brand and should they do so in the future then this automation may be unnecessary but could be repurposed to change any setting in the IPMI device.
578

Kvalitet i masterdata : En studie som bidrar med kunskap kring hur organisationer kan öka kvaliteten i sin masterdata

Glusac, Andrej, Birge, Karin January 2020 (has links)
No description available.
579

Combatting the data volume issue in digital forensics : A structured literature review

Sjöstrand, Mattias January 2020 (has links)
The increase in data volume and amount of data sources submitted as evidence such as from Internet of Things (IoT) devices or cloud computing systems has caused the digital forensics process to take longer than before. The increase in time consumption applies to all stages of the digital forensics process which includes collection, processing and analysing material. Researchers have proposed many different solutions to this problem and the aim of this study is to summarize these solutions by conducting a systematic literature review. The literature review uses a handful of search terms applied to three different databases to gather the material needed for the study which are then filtered by selection criteria to guarantee the quality and relevance to the topic. 29 articles were accepted for the analysis process which categorized the results by using thematic coding. The analysis showed that there were several ways to deal with data growth and different methods can be applied to different areas of digital forensics such as network forensics or social network forensics. Artificial Intelligence (AI) solutions in particular show a lot of potential for responding to the current and future challenges in the field by reducing manual effort and greatly increasing the speed of the processes.
580

Mobile Application Development : Framework with key criteria for choosing native or cross-platform application development / Mobil Applikationsutveckling : Ramverk för att välja native eller cross-platform applikationsutveckling

Aurelius, Mårten January 2020 (has links)
To develop mobile applications, developing companies can use different platforms. One approach is to use a native development environment targeting a specific operating system that gives access to all device functionalities. Another approach is to use a cross-platform development tool that allows developers to use a single code base targeting several operating systems, but often comes with limited standard features for accessing device functionalities. Each approach has its benefits and shortcomings. Multiple factors contribute to the selection of the developing platform. Thus, it is of big importance to use clearly defined criteria to make the decision that fits best the need of the final customer, but also that fits with the business and technological preconditions that the developing company can fulfil. Based on existing literature, and consolidating our takeaway with quantifiable, as well as additional business related criteria, this thesis work presents a framework to help decision makers in developing companies decide whether they will develop applications using a native or a cross-platform approach. A number of experienced professionals assessed the compiled list of criteria and attributed respective weight of each criterion in the framework. The decision makers in companies will use this framework, applying a formula, and thereafter calculating a score for each approach. The score will load then to determine whether to choose native or cross-platform development approach. The results show how we assign the final weight and, in the conclusion, we discuss limitations and future research directions for research. / mobile application development, framework, native, iOS, Android, cross-platform

Page generated in 0.1275 seconds