Essays about: "leading through ICT"

Showing result 1 - 5 of 11 essays containing the words leading through ICT.

  1. 1. Potential for improving public services by exploring citizens’ communication to public organizations in Sweden

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ibrahim Ali Mehkri; [2023]
    Keywords : citizen inquiries; e-Government; Sweden; CRM;

    Abstract : Little et al., (1971) define citizen feedback as information from citizens directed to societal institutions, particularly government, to improve their functioning. READ MORE

  2. 2. The Effect of Leading Behavior and Style of Project Manager on the Retention of Skillful ICT Project Workers

    University essay from Uppsala universitet/Industriell teknik

    Author : Abdiwahab Hassan; Abdul Rahman Ismail; [2019]
    Keywords : ;

    Abstract : Talent turnover is a threat to different industries, and ICT industry is one industry sector that suffers the highest turnover rate of its skillful ICT project workers. Even though practitioners and researchers from strategic human resource management has taken the issue into great deal of concerns, yet the turnover rate in the industry is still high. READ MORE

  3. 3. Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Niklas Tellini; Fredrik Vargas; [2017]
    Keywords : Two-Factor Authentication; Security; One-Time Passwords; Access control; Digital Assessment Platform; Två-stegs autentisering; Säkerhet; Engångslösenord; Åtkomst kontroll; Digital bedömningsplattform;

    Abstract : Two-Factor Authentication (2FA) is a two-step verification process that aims to provide an additional layer of security by requiring the user to authenticate himself/herself using a secondary means (ownership factor or inheritance factor). Without the use of 2FA, an attacker could gain access to a person’s devices or accounts solely by knowing the victim’s password, while with 2FA knowing only this password is insufficient to pass the authentication check. READ MORE

  4. 4. Predicting Solar Radiation using a Deep Neural Network

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Adam Alpire; [2017]
    Keywords : Deep Learning; Climate Science Prediction; Regression; Convolutional Neural Network; Solar Radiation; Tensorflow.; Djupinlärning; klimatprediktion; regression; neurala faltningsnätverk; solstrålning; Tensorflow.;

    Abstract : Simulating the global climate in fine granularity is essential in climate science research. Current algorithms for computing climate models are based on mathematical models that are computationally expensive. Climate simulation runs can take days or months to execute on High Performance Computing (HPC) platforms. READ MORE

  5. 5. To lead from a distance : Virtual Leadership

    University essay from Högskolan i Jönköping/IHH, Informatik

    Author : Jessica Jönsson; [2016]
    Keywords : e-leadership; virtual leadership; distant leadership; leading through ICT; global leadership; virtual teams; trust; communication; goal fulfillment; FIRO;

    Abstract : In a world that is getting more and more globalized and dependent of the progress within the sphere of technology, there is a need for organizations to keep up with this development. Virtual Teams are a developing area, where there is a strive and a consistent desire to evolve and reach a higher level of efficiency. READ MORE