Sök:

Sökresultat:

18170 Uppsatser om Information Network - Sida 1 av 1212

Värdeskapande i nätverk

The purpose of this thesis is to examine value creation in networks. Based on a case study of Livebookings Network, an online booking service. This thesis has an explorative nature. As a theoretical framework we use theories on value and network dynamics. By combining these theories we develop an operationalized framework that we use to analyze our empirical findings.

STUDENTERS INFORMATIONSHORISONTER: Användning av Google och sociala nätverk i informationsökningsprocessen

The theses discuss information seeking with a focus on Google and social networks. Students attending the librarian program in Lund have been examined by means of two methods; diaries and information horizons, where they had to solve a specific assignment. The information horizon as a method contributes to getting a structural perspective on the information search process instead of viewing information search as a procedure. Information horizons use social network analysis.The aim of the theses is to investigate the importance of the social network in information search, with a particular focus on Google as a search tool. Our hypothesis is that Google acts as a compensator to the social network when the students search for information and in the educational program.The research indicates that there is no direct correlation between usage of the social network and usage of Google.

HAVECA-modellen : En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

"Att bygga broar över murar" : en studie av ett kvinnligt ekumeniskt nätverk

The purpose of this master`s thesis is to examine how the contemporary changes in society display itself in the network Ecumenical Forum of European Christian Women EFECW and to increase the understanding of networks. My main questions are: What does the networks structure look like? What does the networks relationships look like? How is identity created in the network and what types of identities is created? The objectives are reached by using two methods, qualitative inquiries and document analysis. The inquiries were carried out to nine members in the network of different countries. The theoretical framework of the thesis is Manuel Castells theories of the network society, and the study is also placed in context by a presentation of previous research on the field.

How Venture Capitalists can use their Network in order to reduce the Information Asymmetries between themselves and the Venture Management Team

The purpose of this study is to increase the understanding of how venture capitalists can use their network in order to reduce information asymmetries between themselves and the venture management team. A qualitative approach with semi-structured interviews, consisting of open questions, have been used to receive gradate information in order to reach our explorative purpose. Our theoretical framework consists of relevant studies made on the dynamics of networks and the problems that can arise in the complex relationship between a principal and an agent. We have been interviewing two venture capital firms and therepresentatives from two business angel networks. We also made an additional interview with an influential financial actor in order to try to verify our conclusions Our conclusions are that an extensive network can be used by venture capitalists in order to; verify ventures? technologies, complement the competences in the venture management team, and arrange co-investments, resulting in reduced information asymmetries between themselves and the venture management team.

HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

Urval och risk i informell finansiering av entreprenörsprojekt : En fallstudie av Firm Factory Network

This thesis discusses various approaches that venture capitalists have when evaluating investment prospects. The thesis is a case study of the business angel network Firm Factory Network. The empirical material is based on an extensive interview with Firm Factory CEO Daniel Kaplan. Our conclusion is that Firm Factory Network uses both informal and formal methods when they evaluate interesting prospects..

Brandväggar för hemmakontor

Firewalls protect network traffic and decide witch traffic to send further and witch traffic will be blocked. All this depends on the rules in the firewall. The firewall is installed between the internal network and the Internet. It is difficult to find a firewall that can protect us against different threats. Firewalls have both advantages and disadvantages and all this make them vulnerable.

Implementation av Network Admission Control

This examination work is about implementation of Cisco Systems Network Admission Control (NAC) within a leading IT-company in region of Jönköping. NAC is a technique that is used for securing the internal network from the inside. NAC can verify that the client who connects to the network has the latest antivirus updates and latest operative system hotfixes. Clients who don?t meet the criteria can be placed in quarantine VLAN where they only have access to the update servers.

Software keystroke logging : Automatisering av skydd mot software keystroke logging

This piece of work develops a solution that automates protection against software keystroke loggers. Keystroke loggers can be used illegally to register a user's keystrokes and in that way acquire sensitive information. The solution was tested on two different networks and the efficiency was measured. The network represents an enterprise network that uses the operating system Windows along with the directory service Active Directory. A script was developed to solve the automation matter.

The Co-Creative Network

The purpose of this thesis is to explore the co-creation process and how value is created based on a service orientation using a network perspective. The thesis is studied from a social-constructionist philosophy, using a qualitative approach of data collection and the theoretical framework includes network theories, theories of service-orientation and co-creation. We have conducted semi-structured interviews with a small firm and its network, which consists of a customer, a supplier and a partner. We found that Håkansson?s ARA framework combined with Ballantyne and Varey?s triangulation of value-creating activities help to acquire an understanding of the actors? bonds, the resources? ties and the activity links that exist in a network.

Sårbarhetsanalys av ett infrastrukturnätverk - Användning av nätverksteorier för sårbarhetsanalys av komplexa nätverk

The aim of this report is to examine the possibilities to use network theories to perform vulnerability analysis on complex networks. The scoop of this work is also to improve the possibilities to chart, analyze and present the vulnerability in a power grid. In this report it has been, using power outage statistics, possible to verify, that network theories can be used to evaluate the vulnerability of an infrastructure network. However further studies to establish values on how vulnerable a network is are needed..

Vägen till rätt information. - En studie av informationsbehov hos personer som arbetar med information i olika verksamheter

The purpose of this Master thesis is to examine theinformation use and information seeking behaviour amongpersons who actively work with information. For this study,interviews have been conducted with a group of six personswho work with information in information intensiveorganizations. The aim is to answer the following questions:What kind of information is connected to the respondents?work tasks? What is the purpose of their search forinformation? Which information sources do they use and whatkind of information sources do they demand? The theoreticalframework consists mainly of Wilsons information needs andinformation seeking model.The results of this study show that none of the respondentshad any strategic model for their work with information. Theinformation that the respondents were searching for is ofdifferent content and depends on the organization in which therespondent operates.

Beredning av lokalnät i landsbygd

In this thesis a rural network in Norrbotten, Sweden, has been to designed and planned with the purpose of improving distribution reliability by exchanging existing overhead lines with underground cables. General network design considerations are discussed as well as the ones for the specific low voltage grid. During the design phase the maximum power of domestic consumers has been estimated using Velander?s method. Currents, voltage drop and impedance of the network have been calculated and fuse operation and selectivity has been considered.

Lärande i molnet : EduSync belyst ur ett connectivistiskt synsätt

This essay has discussed and analyzed a draft for an idea about a network called EduSync. This idea is based on that teachers and students, attending and holding courses, all over the world should be able to find and interact with each other. EduSync is founded from a new learning theory, connectivism. Interviews, participation in a conference and two workshops have been used to gather information and different points of view concerning e-learning, for example possibilities and problems with this idea of a network.  A comparison of web communities and e-learning environments that exists today was also done. The gathered information from persons as well as literature resulted in a discussion concerning learning and what would or would not be possible with the creation of EduSync.

1 Nästa sida ->