Essays about: "Conclusion of importance of technology"

Showing result 6 - 10 of 383 essays containing the words Conclusion of importance of technology.

  1. 6. Employer Branding incongruence : A qualitative study of the relationship between identity formation and employer branding among Gen Z in Sweden

    University essay from Jönköping University

    Author : Emma Steén; Ebba Blomberg; [2023]
    Keywords : Employer branding; Identity formation; Work-life Balance; Fresh-start mindset; mobile technology; Generation Z;

    Abstract : Background:  Employees are the basis upon which a successful firm is built. Today, it is a talents market, and companies must prioritize their employer branding strategies and improve their employee value proposition to attract and retain the best talent. READ MORE

  2. 7. Visual Communication in Driving Social Innovation for Disadvantaged groups in Nami

    University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakulteten

    Author : Mufaro Nhundu; [2023]
    Keywords : Social Innovation; Food Security; Visual Communication; Human Centered Design.;

    Abstract : This master’s thesis aims to explore the potential of visual communication as a powerful tool for promoting change and impact in Namibia with a focus on sustainable agriculture and food security. The study analyzes how graphic design and visual communication may effectively explain best practices for sustainable farming and inspire young adults in rural communities to engage with agriculture through empirical research. READ MORE

  3. 8. Financial and Operational outcomes of a No-Code Manufacturing Execution System (MES)

    University essay from Högskolan i Gävle/Industriell ekonomi

    Author : Linus Malmström; Sara Lind; [2023]
    Keywords : Manufacturing Execution System; Operational; Financial; Outcomes; Low-code; No-code; Case study;

    Abstract : Purpose: This study aims to identify the operational and financial outcomes of companies implementing the no-code manufacturing execution system (MES). Methods: This study has been conducted using inductive reasoning to develop new theories in this unexplored subject. READ MORE

  4. 9. From Data to Decisions: Decisive Factors Influencing Swedish IT SMEs Adoption of Business Intelligence Systems

    University essay from Uppsala universitet/Institutionen för informatik och media; Uppsala universitet/Företagsekonomiska institutionen

    Author : Shayan Nilfouroushan; Tarik Almohtasib; [2023]
    Keywords : SME; Adoption; Business Intelligence BI ; Business Intelligence Systems BIS ; Decision-making; Perceived usefulness PU ; Perceived Ease of Use PEU ; Technology Acceptance Model TAM ; The Technology Organisation Environment Framework TOEF ;

    Abstract : Research Question: Which are the decisive factors that impact the adoption of business intelligence systems (BIS) among IT SMEs in Sweden? Purpose: This paper aims to examine Swedish SMEs and understand which decisive factors have an impact on the decision makers and their adoption of BIS. This study aims to study SMEs that have already adopted BIS. READ MORE

  5. 10. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE