788 resultados para Infrastructure Organizations
Resumo:
Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
Esitys Dries Moreelsin tapaamisessa (Ghent University Library) 15.–16.10. 2014, Vallila Helsinki. /Performance at visit of Dries Moreels Ghent University Library oct 15th- oct 16th 2014, Vallila Helsinki.
Resumo:
Esitys Helsingissä 24.9.2014.
Resumo:
A postgraduate seminar series with a title Critical Infrastructure Protection against Cyber Threats held at the Department of Military Technology of the National Defence University in the fall of 2013 and 2014. This book is a collection of some of talks that were presented in the seminar. The papers address origin of critical infrastructure protection, wargaming cyberwar in critical infrastructure defence, cyber-target categorization, supervisory control and data acquisition systems vulnerabilities, electric power as critical infrastructure, improving situational awareness of critical infrastructure and trust based situation awareness in high security cloud environment. This set of papers tries to give some insight to current issues of the network-centric critical infrastructure protection. The seminar has always made a publication of the papers but this has been an internal publication of the Finnish Defence Forces and has not hindered publication of the papers in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers.
Resumo:
Business plans are made when establishing new company or when organizations launch new product or services. In this Master Thesis was examined the elements are included in the business plan and emphasized. Business plan is a wide document and can also contain company specific information, the literature review was restricted into three areas which were investigated from the relating literature and articles. The selected areas were Market Segmentation and Targeting, Competitive Environment, and Market Positioning and Strategy. The different business plan models were investigated by interviewing companies who operates in a different industry sectors from each other’s. The models were compared to each other and to the findings from literature. Based on interview results and literature findings, the business plan for fibre based packaging. The created business plan contains three selected areas. It was found that the selected business plan elements can be found from the interviewed companies’ business plans. The market segmentation was done by comparing the market share to known total market size. When analyzing the competitive environment, there was no one selected model in use. The tools to evaluate competitive environment was selected parts from both SWOT analysis and Porter’s five forces model in applicable part. Based on interview results, it can be state that the company or organization should find and built its own model for business plans. In order to receive the benefits for future planning, the company should use the same model for long time.
Resumo:
Tämän tutkimuksen keskeisempänä tavoitteena on kehittää kustannusriskien tunnistamista ja hallintaa julkisen organisaation liikenneväylähankkeissa. Hankkeiden kustannusarvioinnin epävarmuustekijöiden tunnistaminen ja minimointi varhaisessa vaiheessa nähdään keinona parantaa organisaation kokonaistuottavuutta ja -taloudellisuutta. Kyseinen diplomityö on tutkimusmenetelmältään laadullinen tapaustutkimus, jossa kustannusriskejä pyritään ymmärtämään ilmiöinä ja luomaan uutta tietoa. Työn empiirisenä aineistona on viisi eri liikenneväylähanketta. Kustannusriskien taustalla olevien tekijöiden tunnistamista varten on haastateltu näiden viiden väylähankkeen kustannushallinnan ydinhenkilöitä. Tähän menetelmään kiteytyy työn uutuusarvo aihepiirin aiempaan tutkimukseen verrattuna. Tutkimuksen keskeisin tulos on kustannusriskien tunnistustaulukko, jota ehdotetaan käytettävän kustannusarviointiin epävarmuutta aiheuttavien tekijöiden tunnistamiseen. Kustannusarvioinnin epävarmuustekijöiden minimointia varten tarkistustaulukossa on lueteltu kunkin kustannusriskin hallintaan ehdotettu hallintakeino. Tunnistustaulukkoa voidaan käyttää missä tahansa suunnitteluvaiheessa ja tarvittaessa päivittää tulevaisuudessa.
Resumo:
The computer game industry has grown steadily for years, and in revenues it can be compared to the music and film industries. The game industry has been moving to digital distribution. Computer gaming and the concept of business model are discussed among industrial practitioners and the scientific community. The significance of the business model concept has increased in the scientific literature recently, although there is still a lot of discussion going on on the concept. In the thesis, the role of the business model in the computer game industry is studied. Computer game developers, designers, project managers and organization leaders in 11 computer game companies were interviewed. The data was analyzed to identify the important elements of computer game business model, how the business model concept is perceived and how the growth of the organization affects the business model. It was identified that the importance of human capital is crucial to the business. As games are partly a product of creative thinking also innovation and the creative process are highly valued. The same applies to technical skills when performing various activities. Marketing and customer relationships are also considered as key elements in the computer game business model. Financing and partners are important especially for startups, when the organization is dependent on external funding and third party assets. The results of this study provide organizations with improved understanding on how the organization is built and what business model elements are weighted.
Resumo:
The number of security violations is increasing and a security breach could have irreversible impacts to business. There are several ways to improve organization security, but some of them may be difficult to comprehend. This thesis demystifies threat modeling as part of secure system development. Threat modeling enables developers to reveal previously undetected security issues from computer systems. It offers a structured approach for organizations to find and address threats against vulnerabilities. When implemented correctly threat modeling will reduce the amount of defects and malicious attempts against the target environment. In this thesis Microsoft Security Development Lifecycle (SDL) is introduced as an effective methodology for reducing defects in the target system. SDL is traditionally meant to be used in software development, principles can be however partially adapted to IT-infrastructure development. Microsoft threat modeling methodology is an important part of SDL and it is utilized in this thesis to find threats from the Acme Corporation’s factory environment. Acme Corporation is used as a pseudonym for a company providing high-technology consumer electronics. Target for threat modeling is the IT-infrastructure of factory’s manufacturing execution system. Microsoft threat modeling methodology utilizes STRIDE –mnemonic and data flow diagrams to find threats. Threat modeling in this thesis returned results that were important for the organization. Acme Corporation now has more comprehensive understanding concerning IT-infrastructure of the manufacturing execution system. On top of vulnerability related results threat modeling provided coherent views of the target system. Subject matter experts from different areas can now agree upon functions and dependencies of the target system. Threat modeling was recognized as a useful activity for improving security.
Resumo:
This research concerns virtual teams in the field of volunteer work. The developments in the area of information and communication technology have decreased their costs and made them easily accessible. As a result, it seems natural that also the voluntary organizations have adopted online tools and virtual teams as a part of their work modes. However, virtual teams have not received much research in this context, and one of the goals of this study was to begin closing that gap. The research had two main focus areas: the challenges that the volunteers face in the teams, and the leadership that the teams have. The study used a qualitative approach and semi-structured interviews. The interviews were conducted over Skype and email and included members from six different teams. The case organization was a European-wide student organization that widely utilized virtual teams in its work. The study identified three critical issues for managing the virtual teams. The first challenge was creating common ground for teamwork through electronic communication. Secondly, volunteering created challenges for the teams through variations in the level of commitment of the members, as some left the organization during the term of the team. Lastly, knowledge transfer was a challenge that came from changing the team members regularly each year. As for the second key topic, leadership in the teams was spread among the team members unevenly. The teams had a formal leader, but they exhibited signs of shared leadership, and the team members were able to influence the team through their own level of involvement. Especially the experience that a member had contributed the amount of influence she held. All in all, the challenges that the volunteers faced were similar to those of normal virtual teams. Volunteering brought additional challenges through the varying levels of commitment and the changing of the team members. Additionally, the role of the team leader was not as firm. The results of the study can be applied to other volunteer organizations that utilize virtual teams.
Resumo:
This research concerns virtual teams in the field of volunteer work. The developments in the area of information and communication technology have decreased their costs and made them easily accessible. As a result, it seems natural that also the voluntary organizations have adopted online tools and virtual teams as a part of their work modes. However, virtual teams have not received much research in this context, and one of the goals of this study was to begin closing that gap. The research had two main focus areas: the challenges that the volunteers face in the teams, and the leadership that the teams have. The study used a qualitative approach and semi-structured interviews. The interviews were conducted over Skype and email and included members from six different teams. The case organization was a European-wide student organization that widely utilized virtual teams in its work. The study identified three critical issues for managing the virtual teams. The first challenge was creating common ground for teamwork through electronic communication. Secondly, volunteering created challenges for the teams through variations in the level of commitment of the members, as some left the organization during the term of the team. Lastly, knowledge transfer was a challenge that came from changing the team members regularly each year. As for the second key topic, leadership in the teams was spread among the team members unevenly. The teams had a formal leader, but they exhibited signs of shared leadership, and the team members were able to influence the team through their own level of involvement. Especially the experience that a member had contributed the amount of influence she held. All in all, the challenges that the volunteers faced were similar to those of normal virtual teams. Volunteering brought additional challenges through the varying levels of commitment and the changing of the team members. Additionally, the role of the team leader was not as firm. The results of the study can be applied to other volunteer organizations that utilize virtual teams.