• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 9
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 19
  • 19
  • 12
  • 9
  • 9
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A probabilistic and multi-objective conceptual design methodology for the evaluation of thermal management systems on air-breathing hypersonic vehicles

Ordaz, Irian. January 2008 (has links)
Thesis (Ph.D)--Aerospace Engineering, Georgia Institute of Technology, 2009. / Committee Chair: Mavris, Dimitri N.; Committee Member: German, Brian J.; Committee Member: Osburg, Jan; Committee Member: Ruffin, Stephen M.; Committee Member: Schrage, Daniel P.. Part of the SMARTech Electronic Thesis and Dissertation Collection.
2

Organizational factors in the reliability assessment of offshore systems

Biondi, Esteban L. 22 October 1998 (has links)
The reliability of ocean systems is dependent on organizational factors. It has been shown that low probability / high consequence system failures are overwhelmingly induced by organizational factors. However, no methodology is yet widely accepted for the evaluation of this phenomenon or its accurate quantification. A qualitative complementary approach is proposed based on the CANL (Complex Adaptive Non-Linear) model. In the first part, the understanding of organizational processes that affect reliability is sought. The approach is applied to several case studies based on published information: the "Story of a Platform Audit" (where no failure occurred) and some offshore accidents. A methodology is proposed to complement regular safety audit procedures. The approach is shown useful also to improve post-mortem investigations. In the second part, quantitative probabilistic formulations are revised, based on the understanding obtained through the previous approach. Some of the limitations of these quantitative methods are pointed out. The Reliability State of an Organization is defined and a ranking for its evaluation is proposed. Preliminary guidelines are presented for the use of this approach as a framework to identify suitable quantitative methods for a given case. The use of a qualitative approach is demonstrated. A different insight into organizational factors is achieved based on a disciplined approach that relies on experience. Significant conclusions regarding quantitative methods, their limitations and appropriate use, are obtained. / Graduation date: 1999
3

Investigating green building assessment tools: a risk-analysis based approach

Chandra, Shailja, Built Environment, Faculty of Built Environment, UNSW January 2006 (has links)
This research investigates risks arising from the mechanism of green building assessment tools that may impact on the consistency of their outcomes and render them ineffective in reliably fulfilling their goals in the building industry. None of the past efforts at developing assessment tools have focused on the risk aspects of assessment tools. Moreover, slowly the building industry has started placing considerable reliance on them without completely understanding the consequences of potential risks. The origin of risks lies in the realization that assessing sustainability in buildings is complex and full of conflicting concepts and opinions, and that amidst all this, assessment tools are expected to deliver multiple performance objectives and goals. Given that the importance of assessing sustainability in buildings cannot be ignored, it becomes extremely important that assessment tools are understood well and are free from risks. To accomplish this, an array of potential risks are systematically brought together using a risk categorization method, which facilitated a basis to critically analyse the literature in the light of risks. This addressed the acknowledged gap in the literature on risks relating to assessment tools. Four categories are discussed under this categorization. These categories provide a basis for the quantitative investigation, which applies techniques of uncertainty analysis to quantify these risks. In the quantitative investigation, uncertainty in 40 input parameters is propagated through several alternative forms of the mechanism of assessment tools. The input parameters are selected using the assessment data of a case study (Arts Faculty building, University of Sunshine Coast). The design of alternative forms of the mechanism is based on the identified risk categories and is carried out using a vehicle assessment tool (Green Building Tool). The uncertainty propagation is carried out using a risk analysis tool (@Risk). Descriptive statistics is deployed to analyse the results of the uncertainty propagations. Analysis of the results has brought an understanding and insights into various aspects of the mechanism in the context of their predisposition to increase or decrease risks. To ensure that an assessment tool's specific goals are fulfilled, the mechanism needs to be designed carefully so that it is low-risk and appropriate to the intent. By providing in-depth insights into the mechanism, the methodology and outcomes of this research are important for the future development of green building assessment tools.
4

Risk assessment of the Naval Postgraduate School gigabit network /

Shumaker, Todd. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis Advisor(s): Karen Burke, Craig Rasmussen. Includes bibliographical references (p. 131). Also available online.
5

An information security risk assessment model for public and university administrators /

Casas, Victoriano. January 2006 (has links)
Thesis (M. P. A.)--Texas State University-San Marcos, 2006. / "Spring 2006." Includes bibliographical references (leaves 72-74).
6

Engineering approach to risk management in information technology systems

Seker, Harun 10 September 2012 (has links)
M.Phil. / The use of information systems has increased dramatically after the emergence of internet. Individuals, companies and organizations are becoming increasingly dependent on IT systems. Before technology and computers became such an important part of society, it was difficult to manage and control large organizations. Today computers enable the effective and efficient management of large organizations, therefore allowing them to spread throughout the country and world. Businesses are following latest advances in this era to remain competitive in the changing global market place. They use computers, automated IT systems and networks to gather, store, retrieve, process, and analyze information as well as to trade and communicate. The rapid advances in computer technology are largely a result of the research, development and design efforts of computer engineers. There is a direct correlation between a nation's wealth and scientific and technological capacity. The most effective way of taking our country forward is to enthuse our youth for science and technology. As the world makes rapid, sometimes breathtaking strides in the diverse fields of science and technology, South Africa more than ever needs qualified individuals who will use their skills and entrepreneurial spirit to enable our country to complete internationally with the best. However, Information systems and networks and their worldwide increasing usage have been accompanied by new and increasing risks. Data and information stored on and transmitted over information technology systems and networks are subject to threats from various means of unauthorized access, such as misuse, misappropriation, alteration, malicious code transmissions, denial of service or destruction and require appropriate safeguards. This research report will aim to emphasize the importance of risk management and its three activities; risk assessment, risk mitigation and evaluation and assessment. It will focus on activities that deal with the solution of problems through logical thinking, information system management This report will also deal with a case study that gives us real life examples of risk management experiences of one local computer hardware and software supplier companies. Information has become valuable assets that need to be protected after moving to a digital era and E-commerce. Protecting information can also be as critical as protecting other resources like money and physical assets.
7

Revisorns förändring i linje med digitaliseringen / Auditor's change in line with digitalization

Frick, Victor, Källroos, William, Lindberg, Niclas January 2020 (has links)
All industries are affected by digitalisation, therefore are also the auditing industry and the auditor's professional role. The audit function is to create confidence for the business and it is therefore important to understand how the digitization of the area is affected. How the professional role needs to be changed and education needs to be developed to keep up with the development. What are the positive and possibly negative consequences of digitalisation. This has been discussed for a long time and many believe that digitization will have a major impact, which is why further studies are needed in the area. It was because of lack of information within the area that the issue arose and was adopted in this work. / Introduktion Alla branscher påverkas av digitaliseringen, därmed också revisionsbranschen och revisorns yrkesroll. Revisionen funktion är att skapa förtroende för näringslivet och det är därför av vikt att förstå hur digitaliseringen av området påverkas. Hur behöver yrkesrollen förändras och utbildningen utvecklas för att följa med i utvecklingen. Vilka är de positiva och eventuellt negativa konsekvenser av digitaliseringen. Detta har under en längre tid diskuterats och många tror att digitaliseringen kommer att ha en stor påverkan varför ytterligare studier behövs göras inom området. Det var på grund av denna brist som frågeställningen uppkom och antogs i detta arbete. Syfte Syftet med denna studie är att få en djupare förståelse och utforska digitaliseringens påverkan på revisorns yrkesroll Metod Studien använder sig av en kvalitativ forskningsdesign som har utgått från en abduktiv ansats. informationsinsamlingen i empirin har samlats in genom semi-strukturerade intervjuer. Slutsats Studien visar att revisorsyrket påverkas i hög grad av digitaliseringen. Mest centralt är graden av effektivisering, där manuellt arbete har ersatts av automatiserade processer. En ytterligare förändring är att tillgängligheten av större mängder data ger underlag för djupare analyser vilket ger en bättre helhetsbild. Det skapar utrymme för mer värdeskapande arbete mot företaget men även att upptäcka oegentligheter. De nya verktygen kräver en ökad kunskap och möjlighet att ta till sig den nya teknologin, och en ny roll har i och med det skapats, vilket är IT-revisorn. Digitalisering och automatisering frigör tid vilket gör att revisorerna kan utöka erbjudandet med rådgivningstjänster. Digitaliseringen medför även nackdelar; genom automatisering försvinner möjligheten att lära sig grundläggande processer som tidigare varit centralt för revisorn, därmed kan det försvåra förståelsen av helhetsbilden hos företagen. Dessutom kan kundrelationerna påverkas i och med digitaliseringens utveckling då virtuella möten blivit en vanligare del i vardagen.
8

Analysis of information technology risk management in South African small and medium enterprises.

Mseteka, Phumzile D. January 2015 (has links)
M. Tech. Business Information Systems / Information Technology (IT) has become the driving force behind businesses and organizations. However, Information Technology comes with risks and other vulnerabilities. And by the same token, IT also poses threats to the organization. This then means that every organization must be able to contain and manage these risks and threats well, if it is to stay in the market and competitive. Information Technology Risk Management is to control Information Technology risks occurrences, acceptance and mitigate them. This means, organizations need proper precautionary measures and management tools to be able to identify risks, analyze risks, monitor the risks and have risk-reducing measures. This dissertation is about Information Technology Risk Management. Small and Medium Enterprises (SMEs) operating in South Africa tend to focus more on business operations, often neglecting the need to manage Information Technology risks effectively.
9

Government policy and corporate strategy in managing risk and uncertainty on technology deployment and development in the regulated market in the UK : a study of biofuels

Chew, Boon Cheong January 2012 (has links)
Technological change when a large social technology is under the processes of deployment and development are complex and uncertain. In this dynamic context, risks and uncertainties (R&U) incurred are unavoidable, which might obstruct the progression of the technology implementation and innovation. Hence, a set of mechanism and strategy are required from the stakeholders to facilitate these two processes and to deal with R&U arise. This research studied biofuels in the UK by looking at the context of a regulated market. The Scottish Government and two oil companies (BP and Shell) were selected as cases studied. Subsequently, an overarching research question was formulated to drive the research “How these major actors interact with one and another to deal with R&U arising from technological change during a technology deployment and development?” By using Social Shaping of Technology (SST), integrating with Risk Governance and the Risk Regulated Regime; an interdisciplinary concept has been developed. The application of SST was to broaden the risk governance and risk regulated regime, helped to look at R&U of technological change from a social dimension. The research was grounded on social constructionism under an exploratory study. A qualitative case study approach was adopted, backed by three data collection methods-interview, observation and document analysis. This research was aimed to investigate the driving forces for the government and oil companies in taking biofuels as the current energy source for transport; their roles and responsibilities in biofuels deployment and development; interactions taken place, R&U faced during two processes, as well as counteracting strategy implemented to deal with these R&U. After that, explanation building and time series analysis were adopted for data analysis. The research points out there were different types of R&U (expected and unexpected) arose when a technology undergoes the processes of technological change. These different types of R&U required different strategies to deal with. Therefore, the regulators have to set a clear direction for a technology deployment and development, as well as to have the control mechanism with precautionary principle instituted, in order to facilitate the technology implementation and innovation. Meanwhile, oil companies are collaborating with the governments, to commit consistent biofuels supply which fulfil the requirements set by the regulators; as well as established various types of partnership with biotechnology institutions/agriculture industry to conduct the next generation biofuels (NBG) R&D. Such seamless interactions and cooperation, not only aim to reduce the possibilities of R&U occurrence, to minimise the impacts, but also to set a path for the ease of technology adoption and innovation. Therefore, apart from satisfying their respective internal interests of political and economic gains; these two actors have to safeguard the social, economic and environmental benefits for the interests of the general public.
10

Managing infrastructure risks in information communication technology outsourced projects : a case study at Transnet, South Africa

Basson, Delton Jade January 2017 (has links)
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2017. / The balance between the dependency on Information and Communications Technology (ICT) and reducing costs has led to an increase in ICT outsourcing in many organisations. ICT outsourcing has benefits, but organisations have limited knowledge on information security and risks when outsourcing these functions. A lack of information security knowledge or a poor organisational risk culture carries the risk of project failure and security breaches. It is unclear how to manage information risks through the usage of ICT infrastructure risk management when outsourcing ICT projects, and this exposes organisations to ICT security risks. The aim of the study is to explore how a selected transport organisation can manage information risks through the usage of infrastructure risk management when outsourcing ICT projects. Two primary research questions are posed namely, “what information risks does the ICT department manage when outsourcing ICT projects?”, and “how can the ICT department protect their information through the usage of infrastructure risk management against ICT security threats when outsourcing ICT?” To answer these two questions, a study was conducted at a transport organisation in South Africa. A subjective ontological and interpretivist epistemological stance has been adopted and an inductive research approach was followed. The research strategy was a case study. Data for this study was gathered through interviews (17 in total) using semi-structured questionnaires. Data collected were transcribed, summarised, and categorised to provide a clear understanding of the data. For this study, forty findings and eight themes were identified. The themes are ICT outsourcing, information risks, costs, ICT vendor dependency, vendor access and management, risk management, user awareness, and frameworks. Guidelines are proposed, comprising six primary components. The results point to gaps that need to be addressed to ensure that information is protected when outsourcing ICT projects. Measures need to be put in place and communication has to be improved among operating divisions. The findings lead to questions such as, ““how does business create an ICT security culture to ensure that information is protected at all times”, and “does vendor access management really get the necessary attention it requires?” Further studies on human behaviour towards ICT security is needed to ensure the protection of organisations against security risks.

Page generated in 0.1038 seconds