Dissertations / Theses on the topic 'Best practice network'

To see the other types of publications on this topic, follow the link: Best practice network.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 20 dissertations / theses for your research on the topic 'Best practice network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

GRANDI, Daniele. "Welfare aziendale e reti: prospettive di sviluppo e analisi di due best practice italiane." Doctoral thesis, Università degli studi di Bergamo, 2017. http://hdl.handle.net/10446/77268.

Full text
Abstract:
La crisi dello stato sociale, che si trascina da quasi quarant’anni, unitamente agli effetti della crisi economica del 2007 hanno portato l’attenzione di imprese e istituzioni sul tema del welfare aziendale quale potenziale anello di congiunzione tra la ricerca di nuovi modelli per la competitività delle imprese e il processo di ricalibratura del welfare pubblico. Tuttavia, in Italia il fenomeno riguarda un numero ancora molto limitato di imprese – in prevalenza di grandi dimensioni -, prevalgono misure ancora non pienamente in grado di intercettare efficacemente i nuovi bisogni sociali e non si è ancora registrato un forte sviluppo di modelli in grado di coinvolgere il territorio per la generazione di reti di servizi che possano inserirsi a pieno titolo in un sistema di “secondo welfare”, ovvero un’arena in cui attori di natura diversa – fondazioni, associazioni, organizzazioni sindacali, associazioni datoriali, imprese, eccetera – mobilitano risorse non pubbliche per sviluppare servizi in grado di sostenere ed integrare il welfare pubblico da un punto divista quali-quantitativo. Uno dei modi per coniugare tali aspetti e contribuire allo sviluppo del welfare aziendale è ritenuto essere l’aggregazione tra aziende in rete. L’obbiettivo del presente lavoro è quello di fare chiarezza su quelle che possono essere le criticità e i vincoli, nonché il potenziale, delle reti nate per creare servizi di welfare comuni tra le aziende aderenti e valutare se effettivamente quello della rete può essere uno strumento in grado di portare a uno sviluppo del welfare aziendale in chiave territoriale e a portata delle imprese di piccole e medie dimensioni. La ricerca è stata svolta tramite la metodologia dello “studio di caso” e ha visto il coinvolgimento di due importanti realtà italiane. I risultati mostrano che le reti nate per la creazione di misure di welfare comuni possono agevolare l’avvicinamento delle PMI al tema del welfare aziendale e possono rappresentare un potenziale laboratorio di sperimentazione sul territorio per nuovi servizi in risposta a nuovi bisogni. Tuttavia, per facilitare tali processi occorre prestare particolare attenzione, in fase di progettazione della rete, alle caratteristiche di quello che sarà il territorio di riferimento, ai sistemi di relazioni industriali delle aziende partecipanti e ai meccanismi di regolamentazione interna.
APA, Harvard, Vancouver, ISO, and other styles
2

McGlanaghy, Edel. "Evidenced based psychological interventions : informing best practice and considering adverse effects : Part 1. Adverse effects of psychological therapy: creation of APTMOS outcome measure based on consensus; and, Part 2. A network meta-analysis of psychological interventions for schizophrenia and psychosis." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/33157.

Full text
Abstract:
Clinical decision-making about psychological interventions is best supported by robust evidence and informed patient choice. Randomised controlled trials (RCTs) are the current gold standard in evaluating intervention effectiveness and identifying harm. At present, RCTs of psychological intervention are unlikely to include measurement of adverse effects and this is in part due to lack of consensus about this topic. A Delphi study was conducted with a panel of both professionals and people with personal experience of face-to-face psychotherapy across the spectrum of mental health difficulties to seek consensus on what to include on a measure of adverse effects. Fifty-four items derived from an initial list of 147 items generated by the panel, are included on the APTMOS outcome measure, which now in it's preliminary form now requires validation before use in RCTs. To date, the evidence for psychological interventions for psychosis and schizophrenia has not been synthesised, which is important to inform patient choice and decision-making. Network meta-analysis compares multiple interventions using direct evidence from randomised controlled trials (RCTs) and indirect evidence from the network. A systematic review of the literature identified 91 RCTs across 23 different intervention/control group categories. Psychological interventions were more effective at reducing total symptoms of psychosis than control groups. One intervention with a low risk of bias, mindfulness-based psychoeducation, was consistently identified as most effective, with large effect sizes. Subgroup analyses identified differential effectiveness in different settings and for different subgroups. Further high quality RCT evidence of the highest ranked interventions is required to inform updates to clinical guidelines of psychological interventions for psychosis.
APA, Harvard, Vancouver, ISO, and other styles
3

Paakkanen, Miia. "Best practices of networks in the Finnish music industry." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-20105.

Full text
Abstract:
The purpose of this research is to study the practice of networks in the crea- tive industries, which are thought to carry great economic, social and cultural po- tential inherent in them. The creative industries are said to be valuable especially for the development of a small and open economy like Finland. Networks, on the other hand, are identified as important in the business of micro entrepreneurial firms composing the creative industries, but the practice is still less researched. Thus, in order to better understand and support the needs of the creative industries regarding networks this thesis aims to identify best practices of networks in one specific creative industry of the small and open economy of Finland, the Finnish music industry. Seven Finnish music industry professionals including both men and women and representing different roles, music genres, lengths of careers and aspects of the Finnish music industry are face-to-face interviewed according to the method of Appreciative Inquiry (AI) focusing on successes and positive aspects instead of weaknesses and limitations. That is, with AI the Finnish music industry profes- sionals were encouraged to discuss their networks as part of their lives and work as truthfully and naturally as possible without pushing them to list some sort of requirements or expectations. A comprehensive list of best practices of networks is identified. Additional- ly, aspects of a great networking seminar are included in the list. Most important- ly, networks and relationships are said to mean everything to the Finnish music industry professionals interviewed in terms of developing their career and busi- ness as well as adding to their personal well-being. The findings discuss the ap- preciated aspects of and the appreciated elements received through networks. Al- so, the findings show how different practices of networks are needed in different situations in the lives of the Finnish music industry professionals interviewed and how different aspects of networks best serve their needs. To give an example, ap- preciated elements received through networks include information, ideas, advice, support, increase in happiness, facilitation of the work load, identification of new business opportunities, new opportunities through being recommended, progress business-wise, results, increase in the effectiveness of business, increase in the feeling of belonging to a community and new additional network contacts, and whereas the need to recognize new business opportunities, for example, is best satisfied with weak links, the need for support is better satisfied with strong ties.
APA, Harvard, Vancouver, ISO, and other styles
4

Hodges, Clayton Christopher. "Optimization of BMP Selection for Distributed Stormwater Treatment Networks." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/81698.

Full text
Abstract:
Current site scale stormwater management designs typically include multiple distributed stormwater best management practices (BMPs), necessary to meet regulatory objectives for nutrient removal and groundwater recharge. Selection of the appropriate BMPs for a particular site requires consideration of contributing drainage area characteristics, such as soil type, area, and land cover. Other physical constraints such as karst topography, areas of highly concentrated pollutant runoff, etc. as well as economics, such as installation and operation and maintenance cost must be considered. Due to these multiple competing selection criteria and regulatory requirements, selection of optimal configurations of BMPs by manual iteration using conventional design tools is not tenable, and the resulting sub-optimal solutions are often biased. This dissertation addresses the need for an objective BMP selection optimization tool through definition of an objective function, selection of an optimization algorithm based on defined selection criteria, development of cost functions related to installation cost and operation and maintenance cost, and ultimately creation and evaluation of a new software tool that enables multi-objective user weighted selection of optimal BMP configurations. A software tool is developed using the nutrient and pollutant removal logic found in the Virginia Runoff Reduction Method (VRRM) spreadsheets. The resulting tool is tested by a group of stormwater professionals from the Commonwealth of Virginia for two case studies. Responses from case study participants indicate that use of the tool has a significant impact on the current engineering design process for selection of stormwater BMPs. They further indicate that resulting selection of stormwater BMPs through use of the optimization tool is more objective than conventional methods of design, and allows designers to spend more time evaluating solutions, rather than attempting to meet regulatory objectives.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
5

Larsson, Fredrik, Oskar Christensson, and Carlos Ibarra. "Best Practices in Web 2.0 Climate : Competitive Advantage Through Social Networking Tools." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-16816.

Full text
Abstract:
The usage of social media such as YouTube, Twitter and Facebook has expanded drastically. Today almost every organization has a Facebook page and a Twitter account that complements their webpage and their physical stores. However, why and how are they using these social medias?  This research focuses on why and how organizations are using Facebook and Twitter in their business strategy. More specifically, what methods and organizational strategies are used. The requirement for our research was that the organization had to had some success on these social medias but due to time and budget limitations, the research is restricted to three local organizations that have a national presence. Conducting primary data with three face-to-face semi-structured interviews and obtaining secondary data such as books, theses and academic journals we had the data to make an analysis about how Facebook and Twitter could make these three organizations gain competitive advantage.  By correctly utilizing the tools that social networking sites (SNS) provide; organizations can make way for a differentiation path that provides competitive advantage, build brand awareness, and provide statistical tools for evaluating customer behavior. One of the benefits of SNS is that they are virtually free to implement, both from a capital and human resource investment point of view. This research shows that organizations utilizing SNS in order to gain competitive advantage need to focus on creating a committed and engaged user base. By keeping in mind the drivers of differentiation: timing, location, linkages and scale, organizations transform their competitive advantage into a sustained competitive advantage.
APA, Harvard, Vancouver, ISO, and other styles
6

Sherman, Michael A. "An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FSherman.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hatting, Henry Lindo. "An opportunity exploration and best practices analysis for South African mobile value-added companies entering the Ghanaian market." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/97329.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2015.
ENGLISH ABSTRACT: Mobile penetration in Ghana and the rest of Western Africa is reaching maturity. Mobile operators are looking for ways to complement their traditional revenue streams, as they cannot merely rely on voice and short message service (SMS) income anymore. Mobile value-added services are a good addition to the portfolio, bringing much needed services like transactional banking, commerce, information and entertainment, insurance, and health information services to mobile users that had difficult to no access to the above services until recently. South African mobile value-added services (VAS) companies that have a good relationship with market leading mobile providers, like MTN, have the opportunity to tap into the Ghanaian market as these services predominantly consist of mobile financial services products with limited functionality. Other specific services like agriculture, health, entertainment and insurance have been identified as mobile subscriber needs in the Ghanaian market. The benefit that South African mobile value-added companies have is that they already have developed similar well-functioning value-added services for the local market where comparisons with the Ghanaian market dynamics can be found. These companies can tailor them to the specific needs and requirements of the market in Ghana, saving them time and having the much-needed first mover advantage with regards to new or better mobile VAS in this market. Ghana is seen as the most stable country in the West African region and ease of doing business is good in comparison with neighbouring countries like Nigeria. Ghana is therefore a good entry point for South African mobile VAS companies in the West African market to truly scale their business model. The researcher chose to investigate the opportunities and best ways to enter this market by interviewing a project manager and managing director of a leading mobile value-added services company doing business in emerging economies, including Ghana. Questionnaires were also sent to employees working for various mobile VAS employers with extensive experience in the research and development of mobile VAS in these markets. The researcher derived information on the difficulty of doing business in Ghana; the current available VAS in the Ghanaian market; factors that hinder business growth in this market specifically; drivers of success; the importance of partnering with leading mobile operators like MTN to be successful; how the South African business model can be compatible; South African and other African trends that will most likely overflow to Ghana; together with the size data-enabled VAS which will form part of the portfolio of products that mobile VAS companies can offer and be market ready for in the near future. The findings of the researcher can be used as a starting framework to further investigate and determine specific market size and to conduct in-depth market analysis of the needs and requirements of mobile subscribers with regards to mobile VAS in Ghana with the vision of moving into the rest of Western Africa.
APA, Harvard, Vancouver, ISO, and other styles
8

Yassin, Ahmed, and Fatih Yalcin. "Enterprise transition to Software-defined networking in a Wide Area Network : Best practices for a smooth transition to SD-WAN." Thesis, KTH, Hälsoinformatik och logistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-253007.

Full text
Abstract:
Software defined wide area networks (SD-WAN) is a relatively new concept for enterprises to structure their networks throughout sites. This thesis was to find best practices for enterprises wanting to transition their current infrastructure to SD-WAN with multiple factors considered. To accomplish this, results gathered from literature reviews, lab testing and interviews with employees from two different enterprises was made.  What was accomplished from the literature review was an overview from Equity Office’s transition to SD-WAN which gave a positive result, as well as a cost of ownership tests with Talari SD-WAN units by NSS Labs. Lab testing with Talari SD-WAN units and a cloud site from Amazon Web Services resulted in improvements in performance and stability compared to a local traditional setup to the cloud site, especially on multiple simultaneous connections. Lastly, results from interviews provided deep insight on how the enterprises planned the transition, what results were expected as well as gained profits in forms of cost and effectivity.  A definitive best practice which every enterprise should follow could not be made. Instead, best practices were found by factoring in different criteria that are unique for different enterprises. For future work, narrowing down to one methodology with more resources, could help in obtaining more realistic and accurate results.
Mjukvarudefinierade wide area networks (SD-WAN) är ett relativt nytt koncept för företag att strukturera sina nätverk genom sina kontor. Projektets mål var att hitta bästa praxis för företag som vill övergå från sin nuvarande infrastruktur till SD-WAN med hänsyn till flera faktorer. För att uppnå detta samlades resultat in från litteraturstudier, tester med laboration och intervjuer med anställda från två olika företag.  Det som uppnåddes från litteraturstudien var en översikt över Equity Offices övergång till SD-WAN vilket gav ett positivt resultat, samt en överblick av tester på ägandekostnader med Talari SD-WAN enheter som utfördes av NSS Labs. Tester med Talari SD-WAN enheter och en molnuppsättning på Amazon Web Services resulterade i förbättringar i prestanda och stabilitet jämfört med en lokal traditionell uppsättning till molnet, särskilt vid parallella anslutningar. Slutligen gav resultaten från intervjuer en djup inblick i hur företagen planerade övergången, vilka resultat som förväntades samt vinster i form av kostnad och effektivitet.  En slutgiltig bästa praxis som varje företag bör följa kunde inte bestämmas. Istället hittades bästa praxis genom att ta hänsyn till olika kriterier som är unika för olika företag. För framtida arbeten kan man smala ner arbetet till en typ av metodik med mer resurser, för att hjälpa till med att få mer realistiska och korrekta resultat.
APA, Harvard, Vancouver, ISO, and other styles
9

Smith, Pauline J. "An Investigation of the Strategies used by Organizations Participating in the Welfare-to-Work Network Programs and Correlation of the Strategies with the Retention Data to Determine Best Practices for Job Retention among Former Welfare Recipients." FIU Digital Commons, 2010. http://digitalcommons.fiu.edu/etd/326.

Full text
Abstract:
This ex post facto study (N = 209) examined the relationships between employer job strategies and job retention among organizations participating in Florida welfare-to-work network programs and associated the strategies with job retention data to determine best practices. An internet-based self-report survey battery was administered to a heterogeneous sampling of organizations participating in the Florida welfare-to-work network program. Hypotheses were tested through correlational and hierarchical regression analytic procedures. The partial correlation results linked each of the job retention strategies to job retention. Wages, benefits, training and supervision, communication, job growth, work/life balance, fairness and respect were all significantly related to job retention. Hierarchical regression results indicated that the training and supervision variable was the best predictor of job retention in the regression equation. The size of the organization was also a significant predictor of job retention. Large organizations reported higher job retention rates than small organizations. There was no statistical difference between the types of organizations (profit-making and non-profit) and job retention. The standardized betas ranged from to .26 to .41 in the regression equation. Twenty percent of the variance in job retention was explained by the combination of demographic and job retention strategy predictors, supporting the theoretical, empirical, and practical relevance of understanding the association between employer job strategies and job retention outcomes. Implications for adult education and human resource development theory, research, and practice are highlighted as possible strategic leverage points for creating conditions that facilitate the development of job strategies as a means for improving former welfare workers’ job retention.
APA, Harvard, Vancouver, ISO, and other styles
10

CENNI, DANIELE. "User Behavior and Information Retrieval in a Best Practice Network." Doctoral thesis, 2012. http://hdl.handle.net/2158/799288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Tsolas, I. E., Charles Vincent, and T. Gherman. "Supporting better practice benchmarking: A DEA-ANN approach to bank branch performance assessment." 2020. http://hdl.handle.net/10454/17952.

Full text
Abstract:
No
The quest for best practices may lead to an increased risk of poor decision-making, especially when aiming to attain best practice levels reveals that efforts are beyond the organization’s present capabilities. This situation is commonly known as the “best practice trap”. Motivated by such observation, the purpose of the present paper is to develop a practical methodology to support better practice benchmarking, with an application to the banking sector. In this sense, we develop a two-stage hybrid model that employs Artificial Neural Network (ANN) via integration with Data Envelopment Analysis (DEA), which is used as a preprocessor, to investigate the ability of the DEA-ANN approach to classify the sampled branches of a Greek bank into predefined efficiency classes. ANN is integrated with a family of radial and non-radial DEA models. This combined approach effectively captures the information contained in the characteristics of the sampled branches, and subsequently demonstrates a satisfactory classification ability especially for the efficient branches. Our prediction results are presented using four performance measures (hit rates): percent success rate of classifying a bank branch’s performance exactly or within one class of its actual performance, as well as just one class above the actual class and just one class below the actual class. The proposed modeling approach integrates the DEA context with ANN and advances benchmarking practices to enhance the decision-making process for efficiency improvement.
APA, Harvard, Vancouver, ISO, and other styles
12

Botha, Carla-Lee. "A gab analysis to compare best practice recommendations legal requirements when raising information security awareness amongst home users of online banking." Diss., 2011. http://hdl.handle.net/10500/5457.

Full text
Abstract:
South African home users of the Internet use the Internet to perform various everyday functions. These functions include, but are not limited to, online shopping, online gaming, social networking and online banking. Home users of online banking face multiple threats, such as phishing and social engineering. These threats come from hackers attempting to obtain confidential information, such as online banking authentication credentials, from home users. It is, thus, essential that home users of online banking be made aware of these threats, how to identify them and what countermeasures to implement to protect themselves from hackers. In this respect, information security awareness (ISA) programmes are an effective way of making the home users of online banking aware of both the threats they face and the countermeasures available to protect themselves from these threats. There are certain legal requirements with which South African banks have to comply when implementing ISA initiatives. Non-compliance or failure to demonstrate due care and due diligence should a security incident occur will result in financial penalties for the bank as well as possible brand damage and loss of customers. Banks implement international best practice recommendations in an effort to comply with legislation. These include recommendations for information security awareness. This research investigated both information security best practice recommendations and information security legal requirements for information security awareness. A selected list of information security best practices was investigated for best practice recommendations while a selected list of information security legislation was investigated for legal requirements imposed on South African banks. A gap analysis was performed on both these recommendations and requirements to determine whether the implementation of best practice recommendations resulted in compliance with legal requirements. The gap analysis found that the implementation of best practice recommendations does not result in compliance with legal requirements. Accordingly, the outcome of this research highlighted the importance of understanding the legal requirements and ensuring that adequate controls are in place with which to achieve compliance.
Business Information systems
Msc. (Information systems)
APA, Harvard, Vancouver, ISO, and other styles
13

Botha, Carla-Lee. "A gap analysis to compare best practice recommendations and legal requirements when raising information security awareness amongst home users of online banking." Diss., 2011. http://hdl.handle.net/10500/5457.

Full text
Abstract:
South African home users of the Internet use the Internet to perform various everyday functions. These functions include, but are not limited to, online shopping, online gaming, social networking and online banking. Home users of online banking face multiple threats, such as phishing and social engineering. These threats come from hackers attempting to obtain confidential information, such as online banking authentication credentials, from home users. It is, thus, essential that home users of online banking be made aware of these threats, how to identify them and what countermeasures to implement to protect themselves from hackers. In this respect, information security awareness (ISA) programmes are an effective way of making the home users of online banking aware of both the threats they face and the countermeasures available to protect themselves from these threats. There are certain legal requirements with which South African banks have to comply when implementing ISA initiatives. Non-compliance or failure to demonstrate due care and due diligence should a security incident occur will result in financial penalties for the bank as well as possible brand damage and loss of customers. Banks implement international best practice recommendations in an effort to comply with legislation. These include recommendations for information security awareness. This research investigated both information security best practice recommendations and information security legal requirements for information security awareness. A selected list of information security best practices was investigated for best practice recommendations while a selected list of information security legislation was investigated for legal requirements imposed on South African banks. A gap analysis was performed on both these recommendations and requirements to determine whether the implementation of best practice recommendations resulted in compliance with legal requirements. The gap analysis found that the implementation of best practice recommendations does not result in compliance with legal requirements. Accordingly, the outcome of this research highlighted the importance of understanding the legal requirements and ensuring that adequate controls are in place with which to achieve compliance.
Business Information systems
Msc. (Information systems)
APA, Harvard, Vancouver, ISO, and other styles
14

Lessing, Martha Maria. "A model for best practice driven information security governance." Thesis, 2008. http://hdl.handle.net/10210/524.

Full text
Abstract:
To ensure the likely success of an organisation’s Information Security Governance, discipline leaders recommend that organisations follow the guidelines as set out in Information Security Governance best practice documents. Best practices and related documents from the Information Security Governance discipline, as well as best practices and related documents from the Corporate Governance and Information Technology Governance disciplines, all include sections pertaining to Information Security, Information Security Governance and Information Technology assets. This study puts these sections together, and constructs an Information Security Governance model that combines all aspects of Information Security Governance. In theory, this model should guide an organisation to the ultimate level of Information Security Governance.
Prof. S. H. von Solms
APA, Harvard, Vancouver, ISO, and other styles
15

"Is "best practice" really the best?: examining the effects of ERP adoption on core competency." Thesis, 2010. http://library.cuhk.edu.hk/record=b6074879.

Full text
Abstract:
Organizations become more homogenous when they adapt to the external environment for survival and competitiveness. Institutional theorists call this phenomenon "isomorphism," which is a constraining process that forces organizations---through coercive, mimetic, or normative pressures---to resemble each other when facing the same set of environmental conditions. In recent years, concerns about cost-efficiency and standardization of information technology (IT) have led organizations to rely more heavily on IT to enhance their business operations. Enterprise resource planning (ERP) systems enable the tight integration of all necessary business functions into a single system. Typically, a database, designed to standardize organizational IT platforms and business processes, is shared throughout an organization. The high adoption rate of ERP systems among the biggest corporations has pressured other organizations to adopt ERP systems. Information system (IS) researchers call this phenomenon "technical isomorphism".
This study examines the effects of ERP implementation on organizational homogeneity from the viewpoint of institutional theory. Through mediating factors, such as the extent of ERP implementation and software adaptation, this study also investigates the effects of organizational homogeneity on the core competencies of user-organizations. It addresses four important issues: (a) whether institutional pressures lead to organizational homogenization; (b) whether institutional pressures affect the extent of ERP implementation in organizations; (c) whether the extent of ERP implementation affects software adaptation and subsequently, homogenization; and (d) whether the core competencies of organizations are ultimately affected by the adoption of technology.
This study's findings contribute to our understanding on the effects of ERP implementation in organizations, particularly on the IT and business activities. They open a whole new arena of research into the impact of technology on organizational abilities, providing a new set of constructs, relationships, antecedents, and dependent variables. Moreover, this study provides the necessary evidence on the occurrence of homogenization, its origins, and its consequences. It also provides valuable guidelines in finding a balance between conformity and retaining the uniqueness of companies, which is regarded as a source of core competencies. Thus, the research findings can help organizations redirect their focus and efforts into ERP implementation, saving millions of dollars in the process.
Liu, Kar Wai Connie.
Adviser: Vincent S. Lai.
Source: Dissertation Abstracts International, Volume: 72-04, Section: A, page: .
Thesis (Ph.D.)--Chinese University of Hong Kong, 2010.
Includes bibliographical references (leaves 141-152).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. Ann Arbor, MI : ProQuest Information and Learning Company, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. Ann Arbor, MI : ProQuest Information and Learning Company, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstract also in Chinese; appendix 8.3 and 8.4 in Chinese.
APA, Harvard, Vancouver, ISO, and other styles
16

Seals, Courtney Renee. "Inter-organizational networks : challenges, best practices, and relevance in Austin, TX." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-05-3110.

Full text
Abstract:
In the recent years, the number of nonprofit organizations in the Austin area has proliferated. At the same time, the state economic budget crisis has reduced public and private resources available to social service providers. In addition, potential clients face many barriers to accessing the services being provided. Research suggests that service coordination and collaboration between service providers may be one way to increase efficiency and effectiveness in the nonprofit sector and improve outcomes for clients. The four objectives of this report are: 1) to present an overview of issues facing the Austin social services field as a whole, 2) to conduct an exploratory scan of existing Austin networks including their goals, organizational histories, and challenges that they face in their collaborative efforts, 3) to synthesize findings from a variety of publications in a thorough discussion of the challenges and best practices for forming effective inter-organizational working groups, and 4) to identify what Austin networks can learn from the literature and derive recommendations for enhancing coordinated efforts between social service providers in the city of Austin.
text
APA, Harvard, Vancouver, ISO, and other styles
17

"Best practice strategy framework for developing countries to secure cyberspace." Thesis, 2015. http://hdl.handle.net/10210/15091.

Full text
Abstract:
M.Com. (Informatics)
Cyber issues are global phenomena in a world of inter-related systems, and as such, the discussion on cybersecurity frameworks, policies and strategies inevitably requires reference to, and benchmarking with regional, continental and global trends and solutions. This, in the context of the effects of globalisation on developing countries, with specific reference to areas such as Africa as a developing continent with regard to the protection of its cyberspace. More drastic measures, such as the utilization of cyber warfare techniques and pre-emptive cyber strike-teams in addition to traditional cybersecurity mechanisms as an essential part of a national security effort to protect cyberspace has become more prevalent within the developed worlds. Likewise, developing nations need to gear themselves in a structured, coordinated and responsible way in order to do their part to secure their own environments. Cyberspace is a dynamic global environment with cyber related issues being a global concern. Although countries generally regulate their own cyber environment through policy; cross-border cyber issues are difficult to resolve and the lack of international cyber laws impede cybersecurity efforts. Cybercrime and the management of cross-border cyber incidents are becoming a growing national security concern as the lack of effective controls leave critical infrastructure and the cyber-connected environment vulnerable to attack. Some developing countries are on track with the maturity of their cybersecurity initiatives, but appropriate cybersecurity frameworks for many developing countries require careful consideration, especially due to the lack of resources, infrastructure and local technology development capabilities.
APA, Harvard, Vancouver, ISO, and other styles
18

Gonçalves, Ricardo Jorge Girante. "Cybersecurity in social networks." Master's thesis, 2022. http://hdl.handle.net/10362/133016.

Full text
Abstract:
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business Intelligence
In recent years, the use of social networks has been increasing substantially. As we know, platforms such as Facebook, Twitter, Google +, Pinterest, LinkedIn or Instagram allow millions of individuals to create online profiles and share personal information with several friends through social networks – and, often, it’s possible to do the same with a large amount of strangers. By itself, social networks should not be considered a cyber threat. However, there are several issues related to maintaining the user’s data security and privacy, especially when they upload personal information, photos and / or videos. The large majority of users ignores the security best practices, which sometimes facilitates the hackers’ attacks. The main goal of this research is to understand patterns of information that are revealed on online social networks and their privacy implications. The goal is to map people behaviour on social networks and understand if they care about the security of their data exposed on the Internet. This research also aims to understand the impact of cybersecurity in social networks and a comparison of which social network is most concerned with the exposure of its user. It will be also addressed the current defence solutions that can protect social network users from these kinds of threats.
APA, Harvard, Vancouver, ISO, and other styles
19

Perkins, Catharina Elizabetha. "The management of an information technology infrastructure in schools in the Western Cape Province." Diss., 2012. http://hdl.handle.net/10500/9266.

Full text
Abstract:
This research conceptualises IT infrastructure management at secondary schools in the WCED (Western Cape Education Department). This includes whether or not secondary schools in the WCED make use of a full time, on-site network administrator or whether a teacher acts as on-site network administrator. The literature review studied the effectiveness of IT infrastructure management which includes hardware, software, policies, computer network, security; staff management and BYOD (bring your own device). The management of IT infrastructure at secondary schools within the WCED differs widely from school to school, and its functionality depends on many factors. The quantitative study revealed problem areas within IT infrastructure management at secondary schools in the WCED. Furthermore the quantitative study also revealed that there is a need for best practice guidelines with regards to IT infrastructure management in order to improve service delivery. The literature review provided sources for best practice IT infrastructure management.
Rekenaar infrastruktuur by sekondere skole in die WKOD (Wes Kaapse Onderwys Departement) word in die navorsing beskryf. Die studie ondersoek verskillende strukture naamlike skole wat 'n voltydse netwerk administrateur het en skole waar 'n onderwyser die verantwoordelikheid aanneem van 'n netwerk administrateur. Die effektiewe beheer van rekenaar infrastrukture word bespreek. Dit sluit hardeware, sagteware, beleid formulasie, rekenaar netwerk, sekuriteit, personeel bestuur, en BYOD (bring jou eie toestel). Die bestuur van rekenaar infrastruktuur verskil van skool tot skool en die effektiewe bestuur daarvan word deur baie faktore beinvloed. Die kwantitatiewe studie het probleem areas vir die bestuur van rekenaar infrastruktuur by sekondere skole in die WKOD uitgewys. Die kwantitatiewe studie het verder die behoefte vir beste praktyk riglyne uitgewys om sodoende better dienslewering te verseker. Die literere studie het beste praktyk riglyne vir rekenaar infrastruktuur bestuur genoem.
Educational Leadership and Management
APA, Harvard, Vancouver, ISO, and other styles
20

"Crossroads of Enlightenment 1685-1850 : exploring education, science, and industry across the Delessert network." Thesis, 2015. http://hdl.handle.net/10388/ETD-2015-03-2022.

Full text
Abstract:
The Enlightenment did not end with the French Revolution but extended into the nineteenth century, effecting a transformation to modernity. By 1850, science became increasingly institutionalized and technology hastened transmission of cultural exchange. Restricting Enlightenment to solitary movements, philosophic text, or national contexts ultimately creates insular interpretations. The Enlightenment was instead a transnational phenomenon, of interconnected communities, from diverse geographical and cultural spaces. A revealing example is the Delessert family. Their British-Franco-Swiss network demonstrates the uniqueness, extent, and duration of the Enlightenment. This network’s origins lie in the 1680s. French and British desires for stability resulted in contrasting policies. Toleration, through partial rights, let British Dissenters become leading educators, manufacturers, and natural philosophers by 1760. Conversely, Huguenots were stripped of rights. Thousands fled persecution, and France’s rivals profited by welcoming waves of industrious Huguenots. French refugee communities became vital printing centres, specializing in Enlightenment attacks on the Ancien régime, and facilitated the expansion of the Delessert network. The Delessert banking family made a generational progression from Geneva to Lyon to Paris, linking them to Jean-Jacques Rousseau. His friendship fostered passions for botany and education. The Delesserts parlayed this into participation in Enlightenment science and industry, connecting them to the Lunar Society, Genevan radicals, and British reformers. By 1780, a transition toward modernity began. Grand Tours shifted from places of erudition to practical sites of production. Lunar men sent sons to the Continent for practical education, as Franco-Swiss visited English manufactories and Scottish universities to expand knowledge. Moderates greeted the French Revolution with enthusiasm. In the early 1790s this changed significantly. Royalist mobs threatened Lunar men, destroying property, in Birmingham. In France, moderates tried to defend the monarchy from republican mobs. Even so, the network, fragmented both by revolution and war, continued espousing reform and assisting members who were jailed, endangered, or escaping to America. The Delessert network reconnected in 1801. Franco-Swiss toured Britain as Britons visited Paris, gathering at the hôtel Delessert, a crossroads of the Enlightenment. New societies encouraged science, industry, and philanthropy. Enlightenment exchange continued, despite warfare, into the nineteenth century. Industrial partnerships and scientific collaborations, formed during the peace, circumvented trade barriers. Over three generations (1760-1850) cosmopolitanism helped usher in a transition to modernity. Ultimately, the Delessert network’s endurance challenges traditional interpretations of the Enlightenment, and the Industrial Revolution.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography