Search for dissertations about: "data- och systemvetenskap Informatik"
Showing result 1 - 5 of 533 swedish dissertations containing the words data- och systemvetenskap Informatik.
-
1. Lock-free Concurrent Search
Abstract : The contemporary computers typically consist of multiple computing cores with high compute power. Such computers make excellent concurrent asynchronous shared memory system. READ MORE
-
2. Improving IT Integration for Higher Education Institutional Performance : Towards a Contextualised IT-Institutional Alignment Model
Abstract : The integration of information technology (IT) into service delivery is currently seen as an innovative strategy to support the modernising of universities worldwide. However, in some institutions in developing countries, including Rwanda, IT has failed to add the intended value to university services, despite huge associated investments in IT. READ MORE
-
3. Advancing Automation in Digital Forensic Investigations
Abstract : Digital Forensics is used to aid traditional preventive security mechanisms when they fail to curtail sophisticated and stealthy cybercrime events. The Digital Forensic Investigation process is largely manual in nature, or at best quasi-automated, requiring a highly skilled labour force and involving a sizeable time investment. READ MORE
-
4. External Data Incorporation into Data Warehouses
Abstract : Most organizations are exposed to increasing competition and must be able to orient themselves in their environment. Therefore, they need comprehensive systems that are able to present a holistic view of the organization and its business. READ MORE
-
5. A Value Perspective on Information System Security : Exploring IS security objectives, problems and value conflicts
Abstract : The inability to understand the social aspects in IS security is pointed out as one of the biggest and most difficult problems in the IS security area. By applying a value perspective on IS security this thesis contributes to increased understanding of social aspects in relation to IS security and peoples’ security behaviours. READ MORE