Sök:

Sökresultat:

3111 Uppsatser om Task Technology Fit - Sida 46 av 208

Apputveckling : En studie av motsättningar mellan design- och användningspraktiker ur ett verksamhetsteoretiskt perspektiv

We live in a high tech era of electronic media, which is changing our lives (Giddens, 1999). Apps are examples of technologies that affect our lives. An interesting question in this context is what apps will have for significance; on one hand for the development of technology, and on other hand for humans? relation to technology. Since the development and change process are central issues in the science of education I will explore the development of applications.

Debatten om Biblioteksdatoriseringen : tendenser i Biblioteksbladet, Bis och DIK-forum 1970-1999

The purpose of this thesis was to trace and discuss tendencies in the debate of the computerization of the libraries, in Swedish library press during the period of 1970-1999. The set-out was the issue of how the library journals, as representatives and mouthpieces of a by tradition humanistic profession, coped with a revolutionary innovation related to a field (data technology) which they hadn't any knowledge or even interest in. The examination included three Swedish library journals: Biblioteksbladet with connection to Sweden?s most established library organization (SAB); Bis which is founded upon a socialistic base and; DIK-forum rooted in the union. The analysis of the debate was partly based on three different sets of values related to data and systems development.

Inkludering ? : För elever med särskilda behov och funktionshinder, ur ett historiskt perspektiv

This present study is a result of a research that I made . My purpose is to find out how the debate about inclusion looked like back in the history. My research was about the view we had absolut inclusion in the history, I also made some interviewes among teachers and students in the schools of today. I wanted to se their views about inclusion today and I wanted to know their opinions about inclusion. Did the students and the teachers have prejudice against other students with functional disabilities as Down syndrom and blindness? What was their thoughts about inclusion of students with differents functional disabilities?One more task I had with this study I made was to raise another debate about inclusion .! Keywords: Inclusion and funtional disabilities.

Omvärldsbevakning på bibliotek

The purpose of this article is to investigate how and from which sources librarians collect information on their profession with respect to factors that are important for their work. In order to achieve this goal, a questionnaire-based survey will be conducted at three medium-sized central-public-libraries in southern Sweden. Using this survey, I wish to answer the following four questions: To what extent do librarians acquaint themselves with changes and developments within regional and cultural policy arenas important to their work? To what extent do librarians acquaint themselves with information using conferences and library debates that are focussed on changes and developments relevant to their work? Do librarians consider that they have enough time within the limits of their work hours to follow developments within the librarian profession, for example with respect to developments within information technology, and how would they appraise the future demand for information technology-based services at the library? From which source(s) do librarians collect information relevant to their work? The theoretical basis of this paper can be compared to a radar as it scans subjects-of-interest to the organization in the field of business intelligence. This investigation uses a quantitative method, with data collected via a survey consisting of 13 questions.

TECHNOLOGY MEETS THE EYE : Utveckling av system för att jämföra eye tracking data med visuellt stimuli

The purpose of the project was to make a system that could extract data from a mobile eye tracker and make it comparable with data from visual stimuli. The produced system was programmed in Java and provided all the necessary parts that were required to achieve the purpose. This provides a foundation for further research to determine whether the eye tracker is sufficiently accurate to diagnose Parkinson?s disease..

Förväntningar på Framtida Mobila Tjänster

Today?s society is very focused around technology and something that is very popular is the usage of mobile devices such as Smartphones or Tablet computers. One of the reasons why these devices are so popular, is because of the large amounts of services or ?apps? that they can provide for the user. They can do a lot of things that makes everyday living easier for the users.The focus of this study is to find out what kinds of mobile services the users of these devices are expecting and/or wishes to see in the future and what is required to be able to develop and use these services in a good way.We started of the study by searching for earlier studies on the same or similar subjects.

Distribution av känslig data

Information Technology (IT) makes it possible to electronically distribute data between actorswho are in geographically diverse areas. Nowadays, information is sent less frequently throughtraditional correspondence in favor of faster electronic equivalents via the internet.Despite effective IT environmentand secure encryption techniques choose some actors to sendinformation through physical delivery. This phenomenon occurs in those working withconfidential information as it is handled by a number of rules and safety regulations.Based on a set of rules and requirements, we have looked over the possibility of sending sensitiveinformation electronically over the internet. The aim was to find general guidelines for howcompanies and organizations should manage and send sensitive information over insecurenetworks. This led us to our research question: How can information be exchanged betweenactors in geographically diverse areas be categorized and encrypted so that it can be transportedover the internet without security or integrity deficiencies?To answer the question, there was a case study at a defense company.

Riktlinjer för implementering av ISO 17799

An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field.

Avsändare Anonym : en kvalitativ undersökning om fenomenet nätmobbning ur skolpersonalens perspektiv

This study attempts to explore how schools? handles and prevents cyber-bullying among pupils. The purpose in this study was to investigate how the school staffs work in secondary schools with grades sixth to ninth. How do the schools discover, prevent and stop cyber-bullying? Do the schools? have any experiences of cyber-bullying? How do the schools work with anti-bullying concepts ? have the new phenomenon cyber-bullying affected and changed the schools´ anti-bullying work in connection with the guidelines and in relation to the "new technology"? This study attempts to examine how this is handled within several secondary schools with three different municipalities.

Integritet och sa?kerhet inom den digitaliserade sjukva?rden. : Med perspektiv utifrån patientdatalagen

The digitization of patient data and medical records used by the healthcare-industry in Sweden is rapidly developing. However; developing and changing things in this field is not an easy task because of the circumstances surrounding it. Digital systems intended to process, and hold, sensitive personal data, such as medical journals, must be developed with laws, confidentiality, integrity and availability in mind to secure that none of this data gets compromised.A complicating factor in regards to this is the fast rate of development within IT in contrast to the much slower bureaucratic process of the justice system. This means that laws and regulations oftentimes aren?t up to date with the newest available technology.With the purpose of establishing set regulations on how patient data should be properly handled the Swedish government enacted the Patient Data Act (sv.

Inköpsstrategier för ökad konkurrenskraft inom dagligvarubranschen

Term: Spring term 2007Study objects: Reitan Servicehandel AB, Vi-butikerna, ICA Sverige ABPurpose: The purpose of this study is to analyse how procurement is used as a strategy to achieve better competitive strength, within the retail food industry.Theoretical: The theoretical chapter illustrates different procurement organisations, multiple and single sourcing, brand equity, consumer behaviour and involvement, Efficient Consumer Response including supply chain and category management and finally Demand Chain Management.Method: For the case studies, three food retail companies have been interviewed: Reitan Servicehandel AB, Vi-butikerna and ICA AB. To illustrate how consumer behaviour influences retail food market, several secondary consumer research studies have been analysed.Conclusions: The results indicate that the procurement organisation can achieve a better competitive strength by a centralised organisation, which make it possible to improve conditions of terms when ordering higher purchase volumes. The sourcing strategies can improve a company?s power within the supply chain. All companies within the study had a very good knowledge about consumer behaviour.

Undersökning av svetsegenskaper för svetsning med rörtråd kontra homogen tråd

Welding is a common method for joining of metal or plastic construction parts. This report describes several different weld methods in general terms. The report focuses on the GMAW method, specifically MAG welding.A case study has also been performed for the company Wenmec. The task received from the company was to compare the mechanical properties of joints welded with the tube electrode called Nittetsu SM-3A and joints welded with the homogenous electrode called ESAB Aristorod 12.63. Both types of weld joint were welded with the MAG method with an Argon based shielding gas with 18% CO2.

Spelskapande men en komponentbaserad arbetsprocess

Syftet med detta kandidatarbete är att testa en arbetsmetod som skiljer sig ifrån det en mindre grupp i vanliga fall använder sig av: en komponentbaserad arbetsprocess för att utforska och sammanställa arbetserfarenheten med den komponentbaserade arbetsmetoden, utvecklar vi därför ett digitalt spel..

Informations- och kommunikationsteknologiers betydelse i utvecklingsarbete : En intervjubaserad studie om IKT:s betydelse för indiska kvinnor

New forms of Information and Communication Technologies (ICTs) have become more influential in development contexts. The concept of ?The Digital Divide? points at a large division between rich and poor countries regarding access to ICTs. Critics say that the debate concerning this topic for far too long has focused mainly on the technology itself rather than social factors which impact social inclusion and development. Scholars agree that ICTs holds a tremendous potential, but how is this implemented in development contexts and how can it be used with more sensitivity towards local preconditions and social aspects?This paper aims to examine how ICTs are being used in the context of development within an India based organisation for women called SEWA (Self Employed Women?s Association).

Behovsanpassad bevakning

The market for security is one filled with great opportunities. The security services companies are numerous and diverse, the Swedish market is dominated by two large companies: Securitas Bevakning AB and Falck Security AB. In this study we have focused on the bigger of the two, Securitas. This report describes and analysis the security service branch and its surroundings in an involved manner. The target group of the result is mainly people within the security branch.

<- Föregående sida 46 Nästa sida ->