Search for dissertations about: "systems evaluation"
Showing result 1 - 5 of 1797 swedish dissertations containing the words systems evaluation.
-
1. On Enterprise Systems Artifacts: Changes in Information Systems Development and Evaluation
Abstract : Enterprise Systems are one of the most important developments in corporate information systems during the last decade. These integrated information systems are characterized by a number of features which include a very broad scope and functionality, as well as being generic, master data, and business-process orientated. READ MORE
-
2. Advancing Automation in Digital Forensic Investigations
Abstract : Digital Forensics is used to aid traditional preventive security mechanisms when they fail to curtail sophisticated and stealthy cybercrime events. The Digital Forensic Investigation process is largely manual in nature, or at best quasi-automated, requiring a highly skilled labour force and involving a sizeable time investment. READ MORE
-
3. National environmental evaluation systems : guiding towards sustainability?
Abstract : Background: Dealing with environmental threats is one of the largest, if not the largest, challenge contemporary societies face. One way to better deal with this challenge would be to produce knowledge that can be used to improve environmental work and environmental policy and thus ultimately contribute to sustainable development. READ MORE
-
4. Information Systems Actability : Understanding Information Technology as a Tool for Business Action and Communication
Abstract : This dissertation is devoted to a perspective from which IT-based information systems are conceived as information technological artefacts intended for business action and communication. The perspective has been made concrete through the concept of information systems actability, which is the main concept under scrutiny. READ MORE
-
5. On the Secure and Resilient Design of Connected Vehicles: Methods and Guidelines
Abstract : Vehicles have come a long way from being purely mechanical systems to systems that consist of an internal network of more than 100 microcontrollers and systems that communicate with external entities, such as other vehicles, road infrastructure, the manufacturer’s cloud and external applications. This combination of resource constraints, safety-criticality, large attack surface and the fact that millions of people own and use them each day, makes securing vehicles particularly challenging as security practices and methods need to be tailored to meet these requirements. READ MORE