Dissertations / Theses on the topic 'Software - Economic aspects'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 15 dissertations / theses for your research on the topic 'Software - Economic aspects.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Missopoulos, Fotios Stavros. "An analysis of cost influential factors for the development of a software product and a hypothetical method for estimating cost using the Cocomo and Putnam models." Virtual Press, 1988. http://liblink.bsu.edu/uhtbin/catkey/539731.
Full textDepartment of Computer Science
Monroe, Hunter K. "Mix-and-match compatibility and asymmetric costs." Thesis, University of Oxford, 1993. http://ora.ox.ac.uk/objects/uuid:ad9e7169-f426-4f71-aada-429735a84dee.
Full textVieira, Erivaldo Costa. "Principios economicos aplicados a tecnologia da informação : uma analise sobre a industria brasileira de Software de Gestão Integrada (ERP)." [s.n.], 2005. http://repositorio.unicamp.br/jspui/handle/REPOSIP/286139.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Economia
Made available in DSpace on 2018-08-06T18:29:12Z (GMT). No. of bitstreams: 1 Vieira_ErivaldoCosta_M.pdf: 624383 bytes, checksum: e056c8e7fd377525c15548f62773b5e1 (MD5) Previous issue date: 2005
Resumo: Este trabalho tem por objetivo analisar capacidade que o instrumental teórico microeconômico tem para explicar a estratégia competitiva das empresas do setor de software de gestão integrada (ERP), mais especificamente pela análise da indústria brasileira de software de gestão, tendo como fundamento o trabalho de Shapiro e Varian (1999). Este trabalho está dividido em três fases principais, nas quais foram utilizadas três formas de pesquisa: revisão bibliográfica, pesquisa documental e pesquisa de campo (estudo de caso ou multicaso, já que envolve mais de um sujeito, mais de uma situação). A partir destes elementos elaboram-se considerações sobre as potencialidades e limitações do instrumental teórico microeconômico de explicar o comportamento dos agentes no referido setor
Mestrado
Mestre em Ciências Econômicas
Hu, Ganglan Information Systems Technology & Management Australian School of Business UNSW. "Decision-making criteria for software requirements selection: an empirical study in China." Awarded by:University of New South Wales. School of Information Systems, Technology and Management, 2006. http://handle.unsw.edu.au/1959.4/25980.
Full textKudyachete, Gratitude. "An assessment of factors that impact on the performance of Cisco Academies: the South African situation." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1014720.
Full textAndjelkovic, Maja. "Mimetic processes in entrepreneurship ecosystems : the cases of mobile technology entrepreneurship networks in Nairobi, Kathmandu and London." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:935a8a55-f63f-458f-b462-17cad23c040e.
Full textJo, Arrah-Marie. "Economics of information security and the market for software vulnerabilities." Electronic Thesis or Diss., Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAT003.
Full textThis thesis aims at contributing empirically to the research field of information security economics, by referring to traditional tools and knowledge in economics especially in Industrial Organization. It focuses on new and evolving elements in the cybersecurity environment such as the use of free software revenue models in digital markets (Chapter 1), the introduction of crowdsourcing mechanisms to improve software security (Chapter 2), or the increasing involvement of third parties in software security (Chapter 3). I am particularly interested in understanding the incentives of major actors that contribute to software security, such as software vendors, white-hat hackers, security firms, and other third parties. The thesis is organized in three chapters, each addressing a separate research question. In a first chapter, I examine the impact of competition intensity on software vendors' security investment behavior. I study the case of a software at the center of Internet security, namely the web browser, in which the vendors derive their revenue from advertising and compete in quality. I find out that market concentration is not necessarily harmful to security provision: indeed, higher market concentration positively impacts vendors' responsiveness in patching vulnerabilities, although this effect is reduced when a vendor is too dominant. In a second chapter, I focus on the crowdsourcing mechanism of white-hat hackers, which is representative of the market for software vulnerabilities that capitalizes on third parties' contribution. I study how hackers' perception of the uncertainty to be rewarded, determined by the level of information a contest provides about the contractual terms, affects their participation and thus the efficiency of the contest. I show that the self-selection process of participants leads to a trade-off between more numerous, but less performant participants, and higher quality but fewer participants. In a third chapter, I examine how the disclosure of a critical vulnerability affects the contribution of software vendors and third parties in discovering new vulnerabilities. I find that third parties' overall contribution in improving software security is considerable and that their contribution is significantly affected by externalities such as the disclosure of a critical vulnerability
Yang, Ching-Ling. "Java/XML-based Trading Information Processing System for produce wholesale market." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2711.
Full textGislen, Mikael. "Dysfunctional aspects of Software Development : An analysis of how lip-service, deception and organisational politics may side-track the result of well-intended methodologies." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5445.
Full textUppsatsen försöker förstå mänskliga sociala hinder för att utveckla programvara med hög kvalitet. Dessa hinder inkluderar "läpparnas bekännelser", ta genvägar, vilseleda och internpolitik. Sådana hinder kan underminera utvecklingsmetoder. Denna uppsats bygger på literatur från olika discipliner och använder etnografisk forskningsmetodik för att skapa en rik bild av dessa oroande aspekter inom ramen för ett IT-företag i Indien. Vad står ut är att intern kvalitetsrevision fokuserar för mycket på att finna fel i dokumentationsprocesser medan revision av hur utvecklingsarbetet faktiskt sker har varit för ytligt. Dessutom har de interna revisorernas förståelse av affärsrisker varit svag.
Håkanson, Josefin. "User Experience Design as a Building Block in a B2B Company’s Market Strategy : An empirical study of how the user experience of a software service can be used to create increased customer value." Thesis, Linköpings universitet, Industriell ekonomi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-172288.
Full textYoussef, Mohammed. "Le contrat d'entreprise et la propriété intellectuelle : étude en droit français et syrien." Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM1028.
Full textThe specificity of the subject of intellectual property entitled to a singularity of the contract of enterprise regime. The assertion is evident both on the literary and artistic property as about industrial property and therefore called the search for a general theory.Concerning the literary and artistic property, the existence of moral rights of the author disrupts the contractual relationship and justify the implementation of an important formalism. The aim of the legislator is then to try to protect the author, seen as the weak party to face the project Owner. And although some exceptions have been introduced, they remain insufficient. Nevertheless, such a method "principle - exception" proves alternately unnecessary or harmful, so the exceptions should be converted into common rule. For example, the initial attribution of copyright to the Owner project under the collective work or software should be generalized.If the protection provided to the contractor under the law of literary and artistic property thus appears excessive, it is insufficient otherwise under the law of industrial property. Indeed, despite identical basis, the contract of enterprise for industrial property rights is governed by the provisions of the Civil Code, which do not protect the author or creator. Thus, in this context, the inventor does not have a right to remuneration proportional because the economic aspect dominates all stages of the contractual relationship, obtaining creation to its exploitation. Nevertheless, the rules of the attribution of the right to creation industrial are not clear
Qiu, Xuemei. "Exploring the impact of test suite granularity and test grouping technique on the cost-effectiveness of regression testing." Thesis, 2002. http://hdl.handle.net/1957/31103.
Full textGraduation date: 2003
Tran, Du Vinh. "Three essays on industrial organization." Thesis, 2007. http://hdl.handle.net/2152/3055.
Full textTran, Du Vinh 1977. "Three essays on industrial organization." 2007. http://hdl.handle.net/2152/13235.
Full textMartins, Miguel da Silva Canedo Delgado. "Aspetos específicos da gestão de projetos de desenvolvimento de software de patient relationship management." Master's thesis, 2013. http://hdl.handle.net/10400.8/2114.
Full text