Spelling suggestions: "subject:"ddministration off information"" "subject:"ddministration oof information""
1 |
Cloud-Based Computing and human resource management performance| A Delphi studyCelaya, Tracy A. 03 February 2016 (has links)
<p> The purpose of this qualitative study with a modified Delphi research design was to understand the reasons human resource (HR) leaders are slow to implement Cloud-based technologies and potentially identify how Cloud-Based Computing influences human resource management (HRM) and HR effectiveness, and potentially the overall performance of the organization. Business executives and HR leaders acknowledge the effect of technology on business processes and strategies, and the leader's influence on technology implementation and adoption. Cloud-Based Computing is fast becoming the standard for conducting HR processes and HR leaders must be prepared to implement the change effectively. Study findings revealed characteristics demonstrated by HR leaders successfully implementing cloud technology, best practices for successful implementation, factors championing and challenging Cloud-Based Computing adoption, and effects on HRM and organizational performance as a result of using Cloud-Based Computing. The outcomes of this study may provide the foundation of a model for implementing Cloud-Based Computing, a leadership model including characteristics of technology early adopters in HR, and identify factors impeding adoption and may assist HR leaders in creating effective change management strategies for adopting and implementing Cloud-Based Computing. Findings and recommendation from this study will enable HR professionals and leaders to make informed decisions on the adoption of Cloud-Based Computing and improve the effectiveness, efficiency, and strategic capability of HR.</p>
|
2 |
Business Strategies for ASEAN's Single Window in Southeast AsiaJones, Craig Allen McGee 09 December 2016 (has links)
<p> Since the Asian Financial Crisis of 1997 and the Global Financial Crisis of 2007, members of the Association of Southeast Asia Nations (ASEAN) have sought to strengthen ASEAN’s regional economies through a digital trade project known as the ASEAN Single Window (ASW). The purpose of this case study was to explore the business strategies that multinational organizational leaders used to overcome business barriers while implementing ASEAN partnership contracts and ASW region-wide projects. This study may be unique in that, at the time of this research, there was no published study in which researchers had explored a single window for a vast, multination geographical region. Data collection was done via in-depth interviews with ASW executives, studying online ASW-related conferences, and examining relevant strategic documents. A 6-phase thematic analysis process based on methodological triangulation corroborated the data and addressed construct validity through data familiarization, generating initial coding, categorizing codes and searching for themes, breaking codes into subcategories, data reduction and defining and naming themes, and report generation. The 4 strategic themes that emerged were business models and processes, public–private partnerships, project management methodologies, and overlapping themes. The findings offer insights into ways to overcome the ASW’s constraints and barriers. These strategic themes developed into a list of critical success factors and a summary list of principle business strategies and best practices. The implication for social change is a regionally collaborative trading environment providing potential economic options that not only impede the deterioration of the regional social fabric but support new opportunities such as trade liberalization and economic stability.</p>
|
3 |
Information systems and technology leaders in merger and acquisition integrationsKaras, Lois L. 23 February 2017 (has links)
<p> Mergers and acquisitions are a common form of inorganic growth for many companies; however, the failure rate of those activities remains high with IS&T integration noted as one of the causes of failure. The purpose of this narrative inquiry study was to explore the experience of the IS&T leaders during an M&A IS&T integration to understand how to reduce future failures. Interviews were conducted with eight IS&T leaders who have been involved with M&A IS&T integrations at technology companies. Seven themes emerged from the data analysis of the transcribed interviews. The themes resulting from the study are: incomplete or incorrect technology integration and technology architecture, identification and adherence to technology standards, employee uncertainties and conflict caused as a result of the M&A, a lack of agreement on the M&A strategy across leadership, identification of the end state goals of the IS&T integration, development and consistent use of an M&A IS&T integration process playbook, and communication process across leadership and employees. The recommendations from the findings for IS&T leadership provide three areas of focus. First, the findings reflect the issues impacting M&A IS&T integration failures. Second, the rich experiences of the participants provide leadership with recommendations on how leaders can prepare for M&A integrations to reduce the potential for failures. Third, the findings provide recommendations on performing an M&A IS&T integration resulting in a reduction of failures including gaining an understanding of previous failures, preparing for, planning, and executing an M&A integration.</p>
|
4 |
Exploring cybersecurity requirements in the defense acquisition processZeng, Kui 24 September 2016 (has links)
<p> The federal government is devoted to an open, safe, free, and dependable cyberspace that empowers innovation, enriches business, develops the economy, enhances security, fosters education, upholds democracy, and defends freedom. Despite many advantages— federal and Department of Defense cybersecurity policies and standards, the best military power equipped with the most innovative technologies in the world, and the best military and civilian workforces ready to perform any mission—the defense cyberspace is vulnerable to a variety of threats. This study explores cybersecurity requirements in the defense acquisition process. The literature review exposes cybersecurity challenges that the government faces in the federal acquisition process, and the researcher examines cybersecurity requirements in defense acquisition documents. The study reveals that cybersecurity is not at a level of importance equal to that of cost, technical, and performance in the current defense acquisition process. The study discloses the defense acquisition guidance does not reflect the change of cybersecurity requirements, and the defense acquisition processes are deficient, ineffective, and inadequate to describe and consider cybersecurity requirements, weakening the government’s overall efforts to implement cybersecurity framework into the defense acquisition system. The study recommends defense organizations elevate the importance of cybersecurity during the acquisition process, to help the government’s overall efforts to develop, build, and operate in an open, secure, interoperable, and reliable cyberspace. </p>
|
5 |
Determining Relationships Between Technology Acceptance and Employee Attitudes Toward Automated Workflows in the Oil IndustryWaldner, Bruce W. 21 January 2014 (has links)
<p> Automated workflows are used to assist petroleum engineers in maximizing the productivity of oil reservoirs. However, for a workflow to be successful, end users must adopt the workflow. The purpose of this quantitative, ex post facto, correlational study was to determine the relationship between acceptance of automated workflow technology and attitudes toward automated workflow adoption. Participants included a cluster sample of 100 randomly selected petroleum engineers from five randomly chosen companies in the oil industry in the Middle East. Predictor variables were measured with a version of the Technology Acceptance Model (TAM) modified to address the issue of workflow adoption. The outcome variable was user attitude to automated workflow adoption, as measured with the Attitude subscale of the Theory of Reasoned Action (TRA) scale. A single multiple linear regression model was computed to answer all research questions. The results for the overall model were significant, adjusted <i>R<sup> 2</sup></i> = .43, <i>F</i>(6, 93) = 13.28, <i>p </i>< .001. After correcting for the number of years of engineering experience of the participants, attitudes toward using automated workflows were predicted by perceived ease of use, β = 0.30, <i>p</i> = .01; perceived usefulness, β = 0.24, <i>p</i> = .03; and computer self-efficacy, β = 0.20,<i>p</i> = .02. The level of automation, β = 0.12,<i> p</i> = .17, and perceived level of support, β = 0.08, <i> p</i> = .32, did not predict attitudes. The number of years of engineering experience was unrelated to attitudes to automated workflow adoption. These findings indicated three factors that have an effect on adoption of automated workflows: perceived ease of use, perceived usefulness, and the level of computer self-efficacy of the end-user. Areas for future research included confirmation of the reliability of the Level of Automation and the Perceived Level of Support subscales designed for this study. There is also a need for future research regarding how the level of automation and level of support affect the adoption of other technologies.</p>
|
6 |
Assessing the relationship between demographic attributes with the acceptance of biometric security devicesBitonti, Ann Marie 21 October 2014 (has links)
<p> The problem addressed was the losses incurred by organizations and individuals that resulted from computer and/or network security incidents originating from within or outside an organization. Although research has shown biometrics to be a reliable mechanism in the protection of data through authorization access, critics in opposition of biometric use profess that increased personal and financial security increases the loss of individual privacy. The acceptance and adoption of biometric based security devices has created a dichotomy between those individuals that demand increased security measures with those that fear the collection of personal data could cause them personal harm. This study extends the technology acceptance model (TAM) to include the demographic variables age, gender, and geographic residence to investigate if individual differences determine if a relationship exists between those characteristics and their perceived need for personal security and individual privacy. Previous research has shown that an individual with a strong need for security and privacy is more willing to adopt biometric technology in the protection of their personal data or self. The knowledge gained from this study addresses the challenges for a successful deployment of biometrics in the prevention of unauthorized access and the future marketing of security devices. The results from the study indicated that there is a relationship between an individual's age and their perceived need of security and perceived need for privacy. The addition of different demographic variables is recommended for future research. The addition of the demographic attributes as extended variables to TAM provides acumen in the study of end-user adoption of biometric technology and its diffusion into the marketplace.</p>
|
7 |
IT Governance of Cloud Computing| Performance Measures using an IT Outsourcing Perspectivevan Ketwich, Willem 21 March 2014 (has links)
<p> With the advent of cloud computing and the success of the cloud computing industry, organisations are beginning to adopt this service model and technology at an increasing rate. As the rate and level of use increases, organisations are faced with how best to govern these investments and obtain maximum benefit from the services offered by providers. This includes measuring the performance of these services, the corresponding organisational performance and the associated business value generated. In investigating these areas, this study compares cloud computing and IT outsourcing. It is found that while cloud measures relate, to a great extent, to the operational level of an organisation, IT outsourcing measures are concerned more with the strategic level. This highlights that cloud computing lacks strategic measures and that measures from IT outsourcing may be adopted to fill this gap.</p>
|
8 |
Leaders' Influence on the Success of Computer Support Teams| A Correlational StudyMantsch, Mary E. 26 February 2014 (has links)
<p> Computers have changed the way organizations do business and store information. Teams of professionals are needed to support the increased use of technology. Organizational leaders depend on information technology to obtain market information, maintain contact with customers, maintain organizational data, and stay competitive. Research supports organizational use of teams and a leader’s relationship with followers affect the success of teams, which in turn influences an organization’s competitiveness and outcomes. This quantitative descriptive correlational study describes how leadership and communication styles affect the success of computer support teams. The sample size in the study was relatively small. The response of leaders was eight out of 10 and follower response was 25 out of ninety. The study included a review of the impact of the increased use of teams in organizations and the relationship between leaders and followers. The results indicate a correlation of a leader’s leadership and communication style to the success of computer support team members. The effect of relationships between leaders and followers is important in determining why some computer support teams are less successful.</p>
|
9 |
The economics of industry-specific e-business standards and standard consortia /Zhao, Kexin, January 2007 (has links)
Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2007. / Source: Dissertation Abstracts International, Volume: 68-11, Section: A, page: 4759. Advisers: Michael J. Shaw; Mu Xia. Includes bibliographical references (leaves 68-74) Available on microfilm from Pro Quest Information and Learning.
|
10 |
Factors contributing to user choice between codification and personalization-based knowledge management systems a task-technology fit perspective /Clay, Paul F. January 2006 (has links)
Thesis (Ph.D.)--Indiana University, Kelley School of Business, 2006. / Source: Dissertation Abstracts International, Volume: 67-06, Section: A, page: 2227. Adviser: Alan R. Dennis. "Title from dissertation home page (viewed June 21, 2007)."
|
Page generated in 0.1996 seconds