Search for dissertations about: "information technology maturity"

Showing result 1 - 5 of 52 swedish dissertations containing the words information technology maturity.

  1. 1. On the utilisation of information technology for the management of profitable maintenance

    Author : Mirka Kans; Basim Al-Najjar; Benoît Iung; Växjö universitet; []
    Keywords : ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Maintenance decisions; computerised maintenance management; common database; maintenance profitability; maintenance data; information technology systems; decision support systems; information technology maturity; Industrial engineering and economy; Industriell teknik och ekonomi; Terotechnology; Systemekonomi;

    Abstract : Maintenance is one area of business that recently has been considered as an activity contributing efficiently to the companies' strategic goals. Understanding the way maintenance could utilise modern technology such as computerised tools or digital data processing is one way to make maintenance profitable. READ MORE

  2. 2. The value of information sharing in automotive supply chains: Understanding the role of information utilisation for operations planning and control

    Author : Paulina Myrelid; Chalmers University of Technology; []
    Keywords : TEKNIK OCH TEKNOLOGIER; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; ENGINEERING AND TECHNOLOGY; automotive industry; information sharing; information quality; performance; planning processes; information utilisation; operations planning and control; buyer-supplier relationships;

    Abstract : The purpose of the thesis is to provide knowledge about the role of information utilisation in suppliers’ operations planning and control (OPC) processes, for generating value of shared demand-related information in automotive supply chains. To do so, the thesis focuses on information utilisation from three different perspectives: (1) how suppliers utilise shared information; (2) why they utilise the information the way they do; and (3) the effect of the utilisation. READ MORE

  3. 3. Corrective maintenance maturity model : problem management

    Author : Mira Kajko-Mattsson; Ned Chapin; Stockholms universitet; []
    Keywords : NATURAL SCIENCES; NATURVETENSKAP; SOCIAL SCIENCES; SAMHÄLLSVETENSKAP; SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; System design; Maintenance process models; Systemutveckling; data- och systemvetenskap; Computer and Systems Sciences;

    Abstract : Maintenance has become one of the most complex, crucial and costly disciplines within software engineering. Despite this, very few maintenance process models have been suggested. The extant models are too general, covering all maintenance categories, i.e. READ MORE

  4. 4. Handling combinatorial explosion in software testing

    Author : Mats Grindal; Sten Andler; Yu Lei; Linköpings universitet; []
    Keywords : NATURAL SCIENCES; NATURVETENSKAP; NATURVETENSKAP; NATURAL SCIENCES; NATURAL SCIENCES; NATURVETENSKAP; Input parameter models; software development; software testing; test process; Computer science; Datavetenskap; Software engineering; Programvaruteknik; Technology; Teknik;

    Abstract : In this thesis, the overall conclusion is that combination strategies, (i.e., test case selection methods that manage the combinatorial explosion of possible things to test), can improve the software testing in most organizations. The research underlying this thesis emphasizes relevance by working in close relationship with industry. READ MORE

  5. 5. A Framework for Securing e-Government Services : The Case of Tanzania

    Author : Geoffrey Rwezaura Karokola; Louise Yngström; Mariki Eloff; Stockholms universitet; []
    Keywords : ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; e-Government; information security; maturity models; services; technical security; non-technical security; data- och systemvetenskap; Computer and Systems Sciences;

    Abstract : e-Government services are becoming one of the most important and efficient means by which governments (G) interact with businesses (B) and citizens (C). This has brought not only tremendous opportunities but also serious security challenges. Critical information assets are exposed to current and emerging security risks and threats. READ MORE