Sökning: "Information utilization"
Visar resultat 1 - 5 av 540 avhandlingar innehållade orden Information utilization.
1. Organizational information provision : managing mandatory and discretionary utilization of information technology
Sammanfattning : This dissertation focuses on the organizational units that participate in the operation of shared information systems - and especially how the codification responsibilities (information creation, collection and recording) are described in the governance models: who are supposed to perform these activities and how are they promoted or hampered by the management control systems?The IT governance model describes the patterns of authority for key IT activities in an organization, which are allocated to different stakeholders to assure that the IT resources are managed and utilized to support the organization's strategies and goals.Altogether, primary data has been compiled in eight case studies and one brief telephone survey. LÄS MER
2. Breaking information barriers through information literacy : A longitudinal and interventional study among small-firm managers
Sammanfattning : The primary aim of this thesis is to contribute to an increased understanding of the information utilisation process through studying impeding process determinants, information barriers, and how they might be tackled by pedagogical means. This would be attained by studying the information situations of small-company managers. LÄS MER
3. Behovet av struktur och frihet : En avhandling om situationsanpassad facilitering vid samarbetsinriktad modellering
Sammanfattning : Informationssystem är resultatet av samarbete människor emellan. System designas, realiseras, testas och implementeras i de verksamheter som de ska stödja. Samarbete krävs under alla dessa steg. LÄS MER
4. Network-Calculus-based Performance Analysis for Wireless Sensor Networks
Sammanfattning : Recently, wireless sensor network (WSN) has become a promising technologywith a wide range of applications such as supply chain monitoringand environment surveillance. It is typically composed of multiple tiny devicesequipped with limited sensing, computing and wireless communicationcapabilities. LÄS MER
5. Shaping information security behaviors related to social engineering attacks
Sammanfattning : Today, few companies would manage to continuously stay competitive without the proper utilization of information technology (IT). This has increased companies’ dependency of IT and created new threats that need to be addressed to mitigate risks to daily business operations. LÄS MER