Essays about: "Business Process hacking"

Found 4 essays containing the words Business Process hacking.

  1. 1. How can B2B companies optimize their marketing and sales efforts in the customer journey with digital means? : A case study with a Swedish manufacturing company.

    University essay from Högskolan i Halmstad/Akademin för företagande, innovation och hållbarhet

    Author : Lisa Svensson; Sanna Eriksson; [2022]
    Keywords : Data-driven Marketing; B2B Customer Journey; B2B Sales Funnel; B2B Sales Management; Digital Inbound Marketing; Digital Content Marketing; Growth hacking;

    Abstract : Rapid digital transformation, accelerated by covid-19 and a younger, more digital workforce, has changed the B2B sales environment affecting customer behavior, business practices and technologies. To adapt to this change B2B companies need to create new endeavors that connect marketing and sales activities, and identify how these can be efficiently enhanced by technology and digital tools. READ MORE

  2. 2. Penetration Testing Ten Popular Swedish Android Applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Astély; Johan Ekroth; [2022]
    Keywords : Penetration testing; Android; vulnerabilities; exploitation; mobile security; penetrationstest; Android; sårbarheter; exploatering; mobilsäkerhet;

    Abstract : As more services previously conducted physically are being conducted on mobiles, the security of mobile applications has become a more important part of the development. These mobile applications may handle sensitive information for the user such as payment data, health data, and other information that can have value for malicious actors. READ MORE

  3. 3. HOW HAS TECHNOLOGY INFLUENCED FINANCIAL REPORTING PROCESS IN ACCOUNTING FIRMS? : An analysis of two international audit firms in Liberia

    University essay from Umeå universitet/Företagsekonomi

    Author : PRISCA ENOW ETCHI; SYLVIA FREEMAN TARKPAH; [2019]
    Keywords : AUTOMATION; FINANCIAL REPORTING; TECHNOLOGY; AUDITING FIRMS;

    Abstract : Technology helps firms maintain data flow, track processes and maintain employee records. Technology makes it possible for firms to operate efficiently and effectively with minimal manpower and helps to reduce operating costs. READ MORE

  4. 4. RISKS AND CONSEQUENCES OF CYBER- ATTACKS AFFECTING DSO'S AND ELECTRICAL SUPPLIER’S BUSINESS PROCESSES IN THE SUPPLIER CENTRIC MODEL

    University essay from KTH/Skolan för elektro- och systemteknik (EES)

    Author : Rodrigo Gonzalez Hernandez; [2016]
    Keywords : Data service hub; Process resilience; Supplier Centric Model; Business Process hacking; Cyber-Security and Nordic Electricity Retail Market; Tjänstehubb; Process spänstighet; Elleverantörs Centriska Modellen; Process hackning; Cyber-Säkerhet och Nordiska elmarknaden;

    Abstract : There has been a motivated desire from different power system operators to have more systems embedded in computing and networking due to the great advantages of adding new capabilities that wasn't before possible. These advantages increased the power system’s up-time, performance and reduced its maintenance but opened a world of possible cyber-attacks. READ MORE