Essays about: "enterprise information system"
Showing result 11 - 15 of 163 essays containing the words enterprise information system.
-
11. A Novel Framework For Detecting Subdomain State Against Takeover Attacks
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. READ MORE
-
12. Digital Technology for Collecting and Handling Traceability Information in A Fish Meal Factory : A Qualitative Grounded Theory Study
University essay from Linnéuniversitetet/Institutionen för informatik (IK)Abstract : As science are growing and new technology emerges in combination with joined rules and laws between countries and unions industries and supply chains are forced to explore and adopt new systems to keep up with this ongoing process. Without modern solutions the information flow can be the Achilles heel that makes companies products less attractive on the market as lack of information sharing can cause tension in questions regarding traceability and sustainability. READ MORE
-
13. Real-Time Locating System (RTLS) Applicability for ERP Integration : Guidelines for Applicability and Barriers and Enablers for RTLS and ERP Integration
University essay from Jönköping University/JTH, ProduktionsutvecklingAbstract : Purpose. Real-time Locating Systems (RTLS) are used to identify and locate physical assets in real-time. Essentially, the aim of RTLS is to increase process visibility and thus provide accurate process data concerning for example, lead times, cycle times and inventory control. READ MORE
-
14. Information Security Training and Serious Games
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The digital transformation of the 21st century has led to a series of new possibilities and challenges, where one major concern of many major organizations and enterprises is promoting Information Security Awareness and Training (ISAT) for their employees. This aspect of Information Security (IS) can promote cybersecurity in the work environment against threats related to the human factor. READ MORE
-
15. Predicting security vulnerabilities using software code metrics
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The use of open-source systems in software development is more of a general practice in firms, institutions and large enterprises. Such systems produce and oper- ate on a large amount of enterprise data. Thus the protection of the access, integrity and confidentiality of enterprise information assets is of high importance. READ MORE