Dissertations / Theses on the topic 'Best practice network'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 20 dissertations / theses for your research on the topic 'Best practice network.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
GRANDI, Daniele. "Welfare aziendale e reti: prospettive di sviluppo e analisi di due best practice italiane." Doctoral thesis, Università degli studi di Bergamo, 2017. http://hdl.handle.net/10446/77268.
Full textMcGlanaghy, Edel. "Evidenced based psychological interventions : informing best practice and considering adverse effects : Part 1. Adverse effects of psychological therapy: creation of APTMOS outcome measure based on consensus; and, Part 2. A network meta-analysis of psychological interventions for schizophrenia and psychosis." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/33157.
Full textPaakkanen, Miia. "Best practices of networks in the Finnish music industry." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-20105.
Full textHodges, Clayton Christopher. "Optimization of BMP Selection for Distributed Stormwater Treatment Networks." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/81698.
Full textPh. D.
Larsson, Fredrik, Oskar Christensson, and Carlos Ibarra. "Best Practices in Web 2.0 Climate : Competitive Advantage Through Social Networking Tools." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-16816.
Full textSherman, Michael A. "An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FSherman.pdf.
Full textHatting, Henry Lindo. "An opportunity exploration and best practices analysis for South African mobile value-added companies entering the Ghanaian market." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/97329.
Full textENGLISH ABSTRACT: Mobile penetration in Ghana and the rest of Western Africa is reaching maturity. Mobile operators are looking for ways to complement their traditional revenue streams, as they cannot merely rely on voice and short message service (SMS) income anymore. Mobile value-added services are a good addition to the portfolio, bringing much needed services like transactional banking, commerce, information and entertainment, insurance, and health information services to mobile users that had difficult to no access to the above services until recently. South African mobile value-added services (VAS) companies that have a good relationship with market leading mobile providers, like MTN, have the opportunity to tap into the Ghanaian market as these services predominantly consist of mobile financial services products with limited functionality. Other specific services like agriculture, health, entertainment and insurance have been identified as mobile subscriber needs in the Ghanaian market. The benefit that South African mobile value-added companies have is that they already have developed similar well-functioning value-added services for the local market where comparisons with the Ghanaian market dynamics can be found. These companies can tailor them to the specific needs and requirements of the market in Ghana, saving them time and having the much-needed first mover advantage with regards to new or better mobile VAS in this market. Ghana is seen as the most stable country in the West African region and ease of doing business is good in comparison with neighbouring countries like Nigeria. Ghana is therefore a good entry point for South African mobile VAS companies in the West African market to truly scale their business model. The researcher chose to investigate the opportunities and best ways to enter this market by interviewing a project manager and managing director of a leading mobile value-added services company doing business in emerging economies, including Ghana. Questionnaires were also sent to employees working for various mobile VAS employers with extensive experience in the research and development of mobile VAS in these markets. The researcher derived information on the difficulty of doing business in Ghana; the current available VAS in the Ghanaian market; factors that hinder business growth in this market specifically; drivers of success; the importance of partnering with leading mobile operators like MTN to be successful; how the South African business model can be compatible; South African and other African trends that will most likely overflow to Ghana; together with the size data-enabled VAS which will form part of the portfolio of products that mobile VAS companies can offer and be market ready for in the near future. The findings of the researcher can be used as a starting framework to further investigate and determine specific market size and to conduct in-depth market analysis of the needs and requirements of mobile subscribers with regards to mobile VAS in Ghana with the vision of moving into the rest of Western Africa.
Yassin, Ahmed, and Fatih Yalcin. "Enterprise transition to Software-defined networking in a Wide Area Network : Best practices for a smooth transition to SD-WAN." Thesis, KTH, Hälsoinformatik och logistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-253007.
Full textMjukvarudefinierade wide area networks (SD-WAN) är ett relativt nytt koncept för företag att strukturera sina nätverk genom sina kontor. Projektets mål var att hitta bästa praxis för företag som vill övergå från sin nuvarande infrastruktur till SD-WAN med hänsyn till flera faktorer. För att uppnå detta samlades resultat in från litteraturstudier, tester med laboration och intervjuer med anställda från två olika företag. Det som uppnåddes från litteraturstudien var en översikt över Equity Offices övergång till SD-WAN vilket gav ett positivt resultat, samt en överblick av tester på ägandekostnader med Talari SD-WAN enheter som utfördes av NSS Labs. Tester med Talari SD-WAN enheter och en molnuppsättning på Amazon Web Services resulterade i förbättringar i prestanda och stabilitet jämfört med en lokal traditionell uppsättning till molnet, särskilt vid parallella anslutningar. Slutligen gav resultaten från intervjuer en djup inblick i hur företagen planerade övergången, vilka resultat som förväntades samt vinster i form av kostnad och effektivitet. En slutgiltig bästa praxis som varje företag bör följa kunde inte bestämmas. Istället hittades bästa praxis genom att ta hänsyn till olika kriterier som är unika för olika företag. För framtida arbeten kan man smala ner arbetet till en typ av metodik med mer resurser, för att hjälpa till med att få mer realistiska och korrekta resultat.
Smith, Pauline J. "An Investigation of the Strategies used by Organizations Participating in the Welfare-to-Work Network Programs and Correlation of the Strategies with the Retention Data to Determine Best Practices for Job Retention among Former Welfare Recipients." FIU Digital Commons, 2010. http://digitalcommons.fiu.edu/etd/326.
Full textCENNI, DANIELE. "User Behavior and Information Retrieval in a Best Practice Network." Doctoral thesis, 2012. http://hdl.handle.net/2158/799288.
Full textTsolas, I. E., Charles Vincent, and T. Gherman. "Supporting better practice benchmarking: A DEA-ANN approach to bank branch performance assessment." 2020. http://hdl.handle.net/10454/17952.
Full textThe quest for best practices may lead to an increased risk of poor decision-making, especially when aiming to attain best practice levels reveals that efforts are beyond the organization’s present capabilities. This situation is commonly known as the “best practice trap”. Motivated by such observation, the purpose of the present paper is to develop a practical methodology to support better practice benchmarking, with an application to the banking sector. In this sense, we develop a two-stage hybrid model that employs Artificial Neural Network (ANN) via integration with Data Envelopment Analysis (DEA), which is used as a preprocessor, to investigate the ability of the DEA-ANN approach to classify the sampled branches of a Greek bank into predefined efficiency classes. ANN is integrated with a family of radial and non-radial DEA models. This combined approach effectively captures the information contained in the characteristics of the sampled branches, and subsequently demonstrates a satisfactory classification ability especially for the efficient branches. Our prediction results are presented using four performance measures (hit rates): percent success rate of classifying a bank branch’s performance exactly or within one class of its actual performance, as well as just one class above the actual class and just one class below the actual class. The proposed modeling approach integrates the DEA context with ANN and advances benchmarking practices to enhance the decision-making process for efficiency improvement.
Botha, Carla-Lee. "A gab analysis to compare best practice recommendations legal requirements when raising information security awareness amongst home users of online banking." Diss., 2011. http://hdl.handle.net/10500/5457.
Full textBusiness Information systems
Msc. (Information systems)
Botha, Carla-Lee. "A gap analysis to compare best practice recommendations and legal requirements when raising information security awareness amongst home users of online banking." Diss., 2011. http://hdl.handle.net/10500/5457.
Full textBusiness Information systems
Msc. (Information systems)
Lessing, Martha Maria. "A model for best practice driven information security governance." Thesis, 2008. http://hdl.handle.net/10210/524.
Full textProf. S. H. von Solms
"Is "best practice" really the best?: examining the effects of ERP adoption on core competency." Thesis, 2010. http://library.cuhk.edu.hk/record=b6074879.
Full textThis study examines the effects of ERP implementation on organizational homogeneity from the viewpoint of institutional theory. Through mediating factors, such as the extent of ERP implementation and software adaptation, this study also investigates the effects of organizational homogeneity on the core competencies of user-organizations. It addresses four important issues: (a) whether institutional pressures lead to organizational homogenization; (b) whether institutional pressures affect the extent of ERP implementation in organizations; (c) whether the extent of ERP implementation affects software adaptation and subsequently, homogenization; and (d) whether the core competencies of organizations are ultimately affected by the adoption of technology.
This study's findings contribute to our understanding on the effects of ERP implementation in organizations, particularly on the IT and business activities. They open a whole new arena of research into the impact of technology on organizational abilities, providing a new set of constructs, relationships, antecedents, and dependent variables. Moreover, this study provides the necessary evidence on the occurrence of homogenization, its origins, and its consequences. It also provides valuable guidelines in finding a balance between conformity and retaining the uniqueness of companies, which is regarded as a source of core competencies. Thus, the research findings can help organizations redirect their focus and efforts into ERP implementation, saving millions of dollars in the process.
Liu, Kar Wai Connie.
Adviser: Vincent S. Lai.
Source: Dissertation Abstracts International, Volume: 72-04, Section: A, page: .
Thesis (Ph.D.)--Chinese University of Hong Kong, 2010.
Includes bibliographical references (leaves 141-152).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. Ann Arbor, MI : ProQuest Information and Learning Company, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. Ann Arbor, MI : ProQuest Information and Learning Company, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstract also in Chinese; appendix 8.3 and 8.4 in Chinese.
Seals, Courtney Renee. "Inter-organizational networks : challenges, best practices, and relevance in Austin, TX." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-05-3110.
Full texttext
"Best practice strategy framework for developing countries to secure cyberspace." Thesis, 2015. http://hdl.handle.net/10210/15091.
Full textCyber issues are global phenomena in a world of inter-related systems, and as such, the discussion on cybersecurity frameworks, policies and strategies inevitably requires reference to, and benchmarking with regional, continental and global trends and solutions. This, in the context of the effects of globalisation on developing countries, with specific reference to areas such as Africa as a developing continent with regard to the protection of its cyberspace. More drastic measures, such as the utilization of cyber warfare techniques and pre-emptive cyber strike-teams in addition to traditional cybersecurity mechanisms as an essential part of a national security effort to protect cyberspace has become more prevalent within the developed worlds. Likewise, developing nations need to gear themselves in a structured, coordinated and responsible way in order to do their part to secure their own environments. Cyberspace is a dynamic global environment with cyber related issues being a global concern. Although countries generally regulate their own cyber environment through policy; cross-border cyber issues are difficult to resolve and the lack of international cyber laws impede cybersecurity efforts. Cybercrime and the management of cross-border cyber incidents are becoming a growing national security concern as the lack of effective controls leave critical infrastructure and the cyber-connected environment vulnerable to attack. Some developing countries are on track with the maturity of their cybersecurity initiatives, but appropriate cybersecurity frameworks for many developing countries require careful consideration, especially due to the lack of resources, infrastructure and local technology development capabilities.
Gonçalves, Ricardo Jorge Girante. "Cybersecurity in social networks." Master's thesis, 2022. http://hdl.handle.net/10362/133016.
Full textIn recent years, the use of social networks has been increasing substantially. As we know, platforms such as Facebook, Twitter, Google +, Pinterest, LinkedIn or Instagram allow millions of individuals to create online profiles and share personal information with several friends through social networks – and, often, it’s possible to do the same with a large amount of strangers. By itself, social networks should not be considered a cyber threat. However, there are several issues related to maintaining the user’s data security and privacy, especially when they upload personal information, photos and / or videos. The large majority of users ignores the security best practices, which sometimes facilitates the hackers’ attacks. The main goal of this research is to understand patterns of information that are revealed on online social networks and their privacy implications. The goal is to map people behaviour on social networks and understand if they care about the security of their data exposed on the Internet. This research also aims to understand the impact of cybersecurity in social networks and a comparison of which social network is most concerned with the exposure of its user. It will be also addressed the current defence solutions that can protect social network users from these kinds of threats.
Perkins, Catharina Elizabetha. "The management of an information technology infrastructure in schools in the Western Cape Province." Diss., 2012. http://hdl.handle.net/10500/9266.
Full textRekenaar infrastruktuur by sekondere skole in die WKOD (Wes Kaapse Onderwys Departement) word in die navorsing beskryf. Die studie ondersoek verskillende strukture naamlike skole wat 'n voltydse netwerk administrateur het en skole waar 'n onderwyser die verantwoordelikheid aanneem van 'n netwerk administrateur. Die effektiewe beheer van rekenaar infrastrukture word bespreek. Dit sluit hardeware, sagteware, beleid formulasie, rekenaar netwerk, sekuriteit, personeel bestuur, en BYOD (bring jou eie toestel). Die bestuur van rekenaar infrastruktuur verskil van skool tot skool en die effektiewe bestuur daarvan word deur baie faktore beinvloed. Die kwantitatiewe studie het probleem areas vir die bestuur van rekenaar infrastruktuur by sekondere skole in die WKOD uitgewys. Die kwantitatiewe studie het verder die behoefte vir beste praktyk riglyne uitgewys om sodoende better dienslewering te verseker. Die literere studie het beste praktyk riglyne vir rekenaar infrastruktuur bestuur genoem.
Educational Leadership and Management
"Crossroads of Enlightenment 1685-1850 : exploring education, science, and industry across the Delessert network." Thesis, 2015. http://hdl.handle.net/10388/ETD-2015-03-2022.
Full text