• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2239
  • 940
  • 465
  • 70
  • 69
  • 63
  • 50
  • 44
  • 37
  • 35
  • 27
  • 18
  • 16
  • 15
  • 13
  • Tagged with
  • 4538
  • 4538
  • 1106
  • 827
  • 791
  • 733
  • 689
  • 542
  • 491
  • 448
  • 435
  • 428
  • 378
  • 363
  • 362
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

The United States Navy Reserve Component's account management challenge in a Navy Marine Corps intranet environment

Graves, Gwendolyn M. 09 1900 (has links)
Declining budgets and the reduction of workforce has caused many organizations to perform additional job assignments with fewer personnel. These organizations realized that in order to survive in a competitive market, scarce resources would provide the most value if used to work on mission-essential tasks, while allowing the performance of support functions by an outside source (called outsourcing). The Department of the Navy (DoN) is one organization that has chosen to outsource many business areas, but none bigger than the outsourcing of information technology (IT) to form the Navy Marine Corps Intranet (NMCI)â the largest IT outsourcing contract to date. While the DoN has faced many challenges since the onset of the NMCI contracting agreement, this thesis focuses on the challenges faced by the Navy Reserve with managing the Intranetâ 's user accounts. The research uses the principles of Business Process Redesign (BPR) and Knowledge Management (KM) to determine the current state (As-Is) and to recommend changes in the account management process. Specifically, the Knowledge-Value Added (KVA) methodology was used to determine the amount of knowledge quantitatively embedded in each sub-process for a relative comparison of the value that the sub-processes provide to the overall process.
22

Developing a reliable methodology for assessing the computer network operations threat of Iran

Smith, Matthew N. 09 1900 (has links)
This thesis is part of a project at the Naval Postgraduate School to assess the Computer Network Operations (CNO) threat of foreign countries. CNO consists of Computer Network Attack (CNA), Computer Network Exploitation (CNE), and Computer Network Defense (CND). Threats to the nation's critical infrastructures come from an adversary using CNA and CNE to degrade, deny or destroy access to the information systems they depend upon. Defensive capabilities are also addressed since exploitation, attack, and defense are inherently related. The result of a successful cyber-attack upon these critical infrastructures has the potential to cripple a country's communications and other vital services, economic well-being, and defensive capabilities. The goal of this thesis is to develop a methodology for assessing the CNO threat of Iran. The methodology is based on open sources that can supplement classified information acquired by the intelligence community.
23

Extending the tactical wireless internet in support of USMC Distributed Operations

Swick, Justin R. 09 1900 (has links)
"This thesis will research, examine, and propose a Tactical Wireless Network infrastructure Concept of Operations in Support of Distributed Operations. Research and analysis will include the capabilities and performance characteristics of the 802.16 equipment currently implemented as part of the Marine Corps Tactical Command and Control Architecture in support of Operation Iraqi Freedom. Current Distributed Operations doctrinal capabilities will be compared to a proposed Concept of Operations that incorporates the most current state of the art wireless technologies to maximize both capability and interoperability. The method for evaluation will incorporate COTS products and Marine Corps tactical communications devices installed and operated in both a laboratory setting as well as a tactical field environment. Key performance metrics captured include equipment throughput capacity, communications bandwidth, range and distance limitations, power consumption, communications security, and transmission security. Additional metrics evaluated include level of equipment operational complexity and degree of interoperability with current USMC command and control architecture."-- p. i.
24

Web-enabled database application for Marine Aviation Logistics Squadrons an operations and sustainment prototype

Davis, Robert M. 09 1900 (has links)
This thesis analyzed the principles and concepts of Marine Aviation Logistics doctrine at the tactical level and the current Information Management Systems used to execute mission requirements. A web-enabled prototype for Marine Aviation Logistics Squadrons (MALS) was developed to optimize management and decision support for deliberate, time sensitive and crisis action planning of aviation support operations. The first iteration of the prototype was tested by two Operations (S-3) Officers formerly assigned to active-duty Marine Aviation Logistics Squadrons (MALS). The application was also subjected to a usability experiment at the Database and Web Technologies Lab at the Naval Postgraduate School. The results of this research revealed potential benefits for tactical-level aviation logistics planners and sustainers; the prototype is a viable concept, worthy of future development.
25

Assessing the potential value of FORCEnet technologies within the JFMCC planning process using the knowledge value added methodology

Kovats, Keith E. 06 1900 (has links)
In the FORCEnet Functional Concept document published by the Chief of Naval Operations and the Commandant of the Marine Corps, the leaders of the US Naval Forces called for the development of "adaptive, distributed networks of commanders, staffs, operating units, supporting organizations, sensors, weapons and other equipment interacting with one another on an underlying infrastructure, as well as the associated command and control policies, concepts, organizations... to allow them to interact." Posed to invest in the development of the FORCEnet architecture, the Navy and Marine Corps require a means of analysis to determine the value of information technologies prior to development and acquisition. The Knowledge Value Added (KVA) methodology can provide the decision makers with quantitative tools to make informed and accurate decisions in the acquisitions process of information technologies within the FORCEnet Functional Concept framework. Historically, these decisions were based on costs, schedule, and capabilities, with the emphasis on cost. A Proof of Concept analyzing the Joint Forces Maritime Component Command Planning Process was developed to demonstrate the utility of the KVA method. This analysis demonstrates the current inefficiencies within the process and the potential value of notional information technologies that could be developed to support the planning process. / US Marine Corps (USMC) author.
26

A Saudi Female Perspective on the Adoption of Online Banking with Saudi Arabian Banks

Alabdan, Rana I. 07 June 2017 (has links)
<p> The adoption of online banking in Saudi Arabia is still emerging. The purpose of this study was to identify the factors that influenced Saudi females to adopt online banking with Saudi banks. This study answered the following research question: What are the factors that influence Saudi female users in Saudi Arabia to adopt online banking through Saudi Arabian banks? This study contributes to a gap in the literature regarding the limited studies of online banking from a Saudi female perspective. A qualitative method was used to conduct the study. A semi-structured interview was conducted to collect data from the participants. The sample consisted of 13 Saudi females who live in Riyadh, Saudi Arabia. The themes of this study developed by coding the transcripts via NVivo, then categorizing the responses into themes. These themes were identified according to the multiple responses from the participants repeatedly on each theme. The results provided seven main themes which influenced females to adopt online banking. Easiness and convenience were the preeminent influential themes according to the females followed by security, trust, user-friendly comfortable, and availability. The sub-themes were: (1) save time, (2) effortless, (3) easy to navigate, (4) easy to use, (5) clear options, and (6) clear to navigate. In addition, this study found that education, professional background, computer competency, and age had a significant impact on online banking adoption from Saudi females.</p>
27

Cyber Mobs| A Model for Improving Protections for Internet Users

Lazarus, Seth A. 29 April 2017 (has links)
<p> Cyber mobs have grown to have a significant impact on individuals in real space and cyber space. Law enforcement and legislators have been confronted with challenges in mitigating the intangible harms inflicted by individuals of cyber mobs. Law enforcement, in most cases, is focused on solving cybercrimes associated with tangible harms. Thus, legislators seek to better protect cyber mob victims by increasing law enforcement training and focus on cyber mob incidents, as well as to create new legislation to better cope with the harms caused by cyber mobs. Much of the current research available focuses on the social aspects of cyber mobs, and before creating changes to statutes and law enforcement training, research is necessary to craft those changes better to counter cyber mob activities. The study reviewed several different types of cyber mobs, legislative measures, and cyber policing methods to provide recommendations. The research found that cyber mobs seem to overlap in their techniques, tactics, and procedures, though the harms they cause to accomplish their goals vary. In order to protect against their actions, research suggested, overall, that the examination of current legislation to create new methods of enforcement is necessary before creating additional statutes. In parallel with using current legislation, online communities already employ methods to police themselves, and these methods offer new avenues for law enforcement to work with these communities to better assist them when issues arise. These results demonstrated that much of what is necessary to protect against cyber mobs is already available, but it must be utilized differently to improve effectiveness.</p>
28

The evolving role of information technology in internal auditing

28 September 2015 (has links)
M.Com. (Computer Auditing) / Modern organizations are increasingly dependent on information technology (IT) for various reasons: to enhance their operational efficiency, reduce costs or even attain a competitive advantage. The role of information technology in the organization continues to evolve and this has an impact for the internal audit functions that serve these organizations. The study investigated whether the King III report, ISACA standards and IIA standards assist the internal audit function in addressing the impact of information technology on the organization and, as a result, the internal audit function itself. This was performed by way of a comprehensive literature study on the internal audit function and the selected standards and corporate governance framework, the role of information technology in both the organization and the internal audit function, as well as an empirical study detailing a comparative analysis of the King III report, ISACA standards and IIA standards, utilizing key success factors. The study identified an alignment of the key principles and elements identified in the King III report, ISACA standards and IIA standards. There was direct support for ITrelated reviews in the King III report, ISACA Standards and IIA Standards. The comparative analysis performed between the King III report and IIA standards, as well as the ISACA standards and the IIA standards resulted in the formulation of key internal audit success factors. These key success factors compared favourably to those identified in the literature review. The study indicated that the King III report, ISACA Standards and IIA Standards assisted the internal audit function by addressing IT related risks, controls and governance elements.
29

The Perceptions of Costs and Benefits of Affirmative Action Public Procurement Programs by Racial Minority Business Owners

Rehman, Saif 15 September 2016 (has links)
<p> Affirmative action public procurement programs (AAPPP) stem from legislation related to the Civil Rights movement. Debates about program usefulness and relevance have occurred as well as court decisions challenging not only the legality of these programs, but their very existence. The problem is that, although minority small businesses are fast-growing, access to public procurement opportunities is minimal. An assessment of the perceived social and economic impact of affirmative action public procurement programs between participants and non-participants could provide needed information to inform stakeholders more about how these programs are experienced. The purpose of this quantitative quasi-experimental causal-comparative (ex post facto) study was to determine whether minority business owners who have participated in AAPPP perceive the economic benefits, economic costs, social benefits, and social costs in minority businesses differently than non-participants. A random sample of 128 minority business owners seeking government contracts in the information technology field participated in this study. The participants were requested to complete a survey to assess their perceptions of affirmative action public procurement program participation on its economic benefits, economic costs, social benefits, and social costs. The findings showed AAPPP participants and non-AAPPP participants perceived economic costs and economic benefits similarly. The findings also showed AAPPP participants perceived both the social costs and benefits significantly greater than non-participants. Although the findings lend support for the continued use of these programs, the results paradoxically lend some support for their discontinuance. Without any overwhelming evidence to the contrary, it can be argued that continuing with these programs is necessary, since an inherent form of discrimination based on race or gender within the economic system still appears to exist, although not coherently depicted or understood. </p>
30

Information visualization techniques for online identity presentation| A multidimensional approach

Mahmud, Athir 01 November 2016 (has links)
<p> Information visualization offers a unique method to assist users in understanding large quantities of data, such as that which is found in social media. The recent surge in the use of social media platforms, the abundance of data generated, and the implications about what this data means has made it increasingly necessary to provide feedback to these users about what they and others are presenting online. Thus, it is critical for these individuals to access this information and gain some level of visual understanding regarding their own identities or that of a particular group. This dissertation is organized in the format of a three-paper dissertation. Chapter 1 is the introduction for the subsequent three chapters and provides background on information visualization and identity presentation in social media, while exploring theoretical approaches to visual perception and design. Chapter 2 demonstrates a variety of past and current multidimensional information visualization techniques that are relevant to social media data, as related to online identity presentation. The overview includes data portraits, motion-based visualization, music visualization, and textual structures. Chapter 3 introduces <i>CarrinaCongress</i>, an information visualization dashboard that affords users with the ability to compare two members of Congress in order to better understanding the elected officials&rsquo; tweets and external information. Chapter 4 presents <i> HadithViz</i>, a motion-based information visualization dashboard that borrows from video game interfaces and focuses on event-based tweets, as defined by hashtags related to sexism in the video gaming industry. Finally, Chapter 5 is the conclusion to this dissertation and will summarize the three individual studies, discuss limitations and implications, and provide recommendations that future work consist of simple, accessible visualizations that are based on existing visual languages and can be interpreted by a wide-ranging audience. </p>

Page generated in 0.0493 seconds