SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L4X0:1101 8526 srt2:(1995-1999)"

Sökning: L4X0:1101 8526 > (1995-1999)

  • Resultat 1-11 av 11
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  •  
3.
  •  
4.
  • Eberhagen, Niclas (författare)
  • An investigation of emerging knowledge distribution means and their characterization
  • 1999
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • This work investigates emerging knowledge distribution means through a descriptive study. Despite the amount of attention that processes and structures for knowledge management has received within research during the last decade, little attention has been directed towards the actual means used for the distribution of knowledge by individuals. In this respect it is the aim of the study to contribute with knowledge regarding knowledge distribution means. The study consists of a survey of emerging electronically mediated distribution means followed with a characterization and analysis. For the characterization and analysis a framework for interpretation of the different distribution means was created based on the constructs of organizational learning and the levels of knowledge system interpretation. Within the framework characteristics and concepts were identified and then used for the analysis of the knowledge distribution means. The characterization of the different knowledge distribution means as such may be used as an instrument for evaluation since it generalizable to other means of knowledge distribution. The results of the study show that knowledge distribution is not an isolated event. It takes place in larger context, such as organizational learning, since it touches upon other activities or phenomena such as knowledge acquisition, knowledge interpretation, and organizational memory. The concept of genre of knowledge distribution was found to be a viable concept to base exploration and development of support for knowledge distribution. The investigated distribution means only partly support a model for knowledge representation that captures both the problem-solution as well as an understanding of their relationship. In this respect existing distribution means must be enhanced or new ones developed if we wish to endorse such a representational model.
  •  
5.
  • Essler, Ulf, 1958- (författare)
  • Analyzing Groupware Adoption : A Framework and Three Case Studies inLotus Notes Deployment
  • 1998
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The (business) value of information technology (IT) usage is debatable. The "computer paradox" is still in force. There is no demonstrable relationship between computer spending and organization profit. The purpose of this thesis is to analyze the critical first step in generating value through IT, i. e., the adoption process. One product (Lotus Notes) in one class of software (groupware) has been chosen. The study analyzes the adoption process, focusing on the project/departmental level, in three Swedish companies of varying size and in different lines of business. The study is based on three longitudinal (one year) case studies.The main results from the study with regard to the adoption are:Adoption failed (completely and partially) in two cases and was (partially) successful in one case.The foci in the three cases with regard to application(s) were firstly co-ordination and secondly communication. In no case was collaboration of (primary) interest.The failed adoption attempts were characterized by; (1) a local point of introduction (combined with traditionally low central control within the companies); (2) little or no organizational Lotus Notes knowledge; (3) a complete dependence of external Lotus Notes consultants; (4) high ambitions about what the technology was going to accomplish.The successful adoption were characterized by; (1) a central point of introduction (combined with a traditional, strong central control within the company); (2) good organizational Lotus Notes knowledge; (3) a clearly defined role for external Lotus Notes consultants; (4) moderate and clearly defined ambitions about what the technology was going to accomplish.The main results from the study with regard to the theoretical framework are:The role of lead user is not a necessary factor for successful adoption. Local lead users (project leaders) were in a primary role in the failed adoption attempts.Both Critical Mass Theory and the Sociotechnical Perspective are too simplistic with regard to technology adoption in an organizational setting.In the Critical Mass Theory both technology aspects and management aspects need to be integrated, if applied to technology adoption.In the Sociotechnical Perspective management aspects need to be integrated, if applied to technology adoption. Not taking into account organizational decision making and organizational hierarchies make the perspective less than useful, if applied in an organizational setting.
  •  
6.
  •  
7.
  •  
8.
  • Johansson, Anna-Lena, 1951- (författare)
  • Logic program synthesis using schema instantiation in an interactive environment
  • 1995
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The research presented herein proposes a method of program synthesis based on a recursive program schema and performed with an explicit incremental plan as the core of the synthesis. A partial prototype has been built in order to be able to actually perform syntheses according to the method. The presentation of the method is accompanied by examples of performed syntheses.The program schemata proposed are simple and based directly on the inductive definition of a data structure which is a basis for the program. The replacement rule for instantiating the schemata is also simple. The simple schema and the simple rule should make the method easy to understand.In situations when program sentences in a program are similar, meaning that there are similarities in their derivations, we would like, if feasible, to avoid constructing all the corresponding derivations. A method to decide when a definition yields analogous sentences and which also produces a substitution defining the analogy is presented. As a result we can replace a derivation by a substitution, making the onus of synthesis easier. The method has been implemented as a part of the system for interactive synthesis support.The synthesised programs are discussed with three logical concerns in mind as follows: partial correctness, completeness and totality. The synthesised normal programs are always logical consequences of the specification. Whenever the programs and their goals are definite the programs are always partially correct. From a study of the synthesis emerges a sufficient condition for programs that use negation to be partially correct and for definite or normal programs to be complete. Sufficient conditions for the derived relation to be total can be used to show that the program is defined for every element of the recursive set.
  •  
9.
  • Magnusson, Christer, 1959- (författare)
  • Hedging shareholder value in an IT dependent business society : the framework BRITS
  • 1999
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Business Requirements on IT Security (BRITS) is a framework that can assist IT dependent companies to hedge losses due to IT-perils financially. Using BRITS can help these companies to hedge IT perils in the same professional way as consequences of traditional perils like fire, flood, robbery are hedged and thereby secure shareholders' investments.In the framework, the need for financial hedges and technical countermeasures against IT perils depends solely on the effect IT perils may have on the market value of the company; there are no other reasons for a commercial company to spend any of its resources on financial protection and IT security measures.BRITS has utilized and developed existing financial hedge instruments to provide cover against financial consequences of IT perils. To be able to use these instruments, I have developed a tool that can interpret and convert financial loss exposures into IT security measures, and vice versa; it is a knowledge gateway between financial and security terminology.The framework can, at least to some extent, make it possible to estimate the security awareness in existing IT-platforms. Based on that information, existing security measures can be "priced" as they may reduce the estimated maximum loss figures - and thereby the costs for the financial hedges.Moreover, more cost-effective decisions can be made on additional IT-security measures. In addition, the IT systems and the IT security's importance in the business processes can be understood more easily. Finally, the costs for the damage exposure inherent in companies' business services or products can be estimated in a better way, and thereby be incorporated in the products' price.
  •  
10.
  •  
11.
  • Wijkman, Pierre Arne Ingvar (författare)
  • Contributions to Evolutionary Computation
  • 1997
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • We present in this thesis (1) an alternative model in the field of evolutionary computation, and (2) an experimental platform that can be used to evaluate and compare many different models in evolutionary computation.The presented model is, like other models in evolutionary computation, based on the principle of natural selection. The difference between the presented model and the other models is a difference in the interpretation of the principle of natural selection. Traditional models in evolutionary computation provide only a partial interpretation of the principle of natural selection, while the presented model is based on a more complete interpretation. As a consequence, the presented model can deal with the problem of local optima in a novel way.We have built an experimental platform in such a way that a large number of different evolutionary models can be simulated and tested in parallel. We present the result of a number of such simulations. In the construction of this platform, we divided the platform into different modules so that new evolutionary mechanisms and new problem modules easily can be added.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-11 av 11

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy