• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 57
  • 5
  • 5
  • 4
  • 1
  • Tagged with
  • 124
  • 124
  • 124
  • 56
  • 48
  • 43
  • 35
  • 35
  • 34
  • 33
  • 29
  • 14
  • 13
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

A control framework for the assessment of information security culture

Okere, Irene Onyekachi January 2013 (has links)
The modern organisation relies heavily on information to function effectively. With such reliance on information, it is vital that information be protected from both internal (employees) and external threats. The protection of information or information security to a large extent depends on the behaviour of humans (employees) in the organisation. The behaviour of employees is one of the top information security issues facing organisations as the human factor is regarded as the weakest link in the security chain. To address this human factor many researchers have suggested the fostering of a culture of information security so that information security becomes second nature to employees. Information security culture as defined for this research study exists in four levels namely artefacts, espoused values, shared tacit assumptions and information security knowledge. An important step in the fostering of an information security culture is the assessment of the current state of such a culture. Gaps in current approaches for assessing information security culture were identified and this research study proposes the use of a control framework to address the identified gaps. This research study focuses on the assessment of information security culture and addresses 5 research objectives namely 1) to describe information security culture in the field of information security, 2) to determine ways to foster information security culture in an organisation, 3) to demonstrate the gap in current approaches used to assess information security culture, 4) to determine the components that could be used for the assessment of information security culture for each of the culture’s underlying levels and 5) to describe a process for the assessment of information security culture for all four levels. This research study follows a qualitative approach utilising a design science strategy and multi-method qualitative data collection techniques including literature review, qualitative content analysis, argumentation, and modelling techniques. The research methods provide a means for the interpretation of the data and the development of the proposed control framework.
92

Information System Quality: An Examination of Service-Based Models and Alternatives

Maples, Glenn (Glenn Edward) 08 1900 (has links)
Service quality as a component of overall Information Systems quality is examined. Three related studies test the SERVQUAL and related instruments (SERVPERF and Importance-weighted SERVPERF) using Information System users. SERVPERF outperformed SERVQUAL in all three studies.
93

An analysis of the current nature, status and relevance of data mining tools to enable organizational learning

Hattingh, Martin 12 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2002. / ENGLISH ABSTRACT: The use of technological tools has developed rapidly over the past decade or two. As one of the areas of business technology, Data Mining has been receiving substantial attention, and thus the study defined the scope and framework for the application of data mining in the first place. Because of the wide area of application of data mining, an overview and comparative analysis was given of the specific data mining tools available to the knowledge worker. For the purposes ofthe study, and because the goals of data mining involve knowledge extraction, the concept of organizational learning was analysed. The factors needed to facilitate this learning process were also taken into consideration, with a view towards enabling the process through their improved availability. Actual enablement of the learning process, through the improved factor availability described above, was analysed through the use of each specific tool reviewed. The salient conclusion of this study was that data mining tools, applied correctly, and within the correct framework and infrastructure, can enable the organizational learning process on several levels. Because of the complexity of the learning process, it was found that there are several factors to consider when implementing a data mining strategy. Recommendations were offered for the improved enablement of the organizational learning process, through establishing more comprehensive technology plans, creating learning environments, and promoting transparency and accountability. Finally, suggestions were made for further research on the competitive application of data mining strategies. / AFRIKAANSE OPSOMMING: Die gebruik van tegnologiese hulpmiddels het gedurende die afgelope dekade of twee snel toegeneem. As een afdeling van ondernemings tegnologie, is daar aansienlike belangstelling in 'Data Mining' (die myn van data), en dus het die studie eers die omvang en raamwerk van 'Data Mining' gedefinieer. As gevolg van die wye toepassingsveld van 'Data Mining', is daar 'n oorsig en vergelykende analise gegee van die spesifieke 'Data Mining' hulpmiddels tot beskikking van die kennis werker. Vir die doel van die studie, en omdat die doelwitte van 'Data Mining' kennisonttrekking behels, is die konsep van organisatoriese leer geanaliseer. Die faktore benodig om hierdie leerproses te fasiliteer is ook in berekening gebring, met die mikpunt om die proses in staat te stel deur verbeterde beskikbaarheid van hierdie faktore. Werklike instaatstelling van die leerproses, deur die verbeterde faktor beskikbaarheid hierbo beskryf, is geanaliseer deur 'n oorsig van die gebruik van elke spesifieke hulpmiddel. Die gevolgtrekking van hierdie studie was dat 'Data Mining' hulpmiddels, indien korrek toegepas, binne die korrekte raamwerk en infrastruktuur, die organisatoriese leerproses op verskeie vlakke in staat kan stel. As gevolg van die ingewikkeldheid van die leerproses, is gevind dat daar verskeie faktore is wat in ag geneem moet word wanneer 'n 'Data Mining' strategie geïmplementeer word. Aanbevelings is gemaak vir die verbeterde instaatstelling van die organisatoriese leerproses, deur die daarstelling van meer omvattende tegnologie planne, die skep van leer-vriendelike omgewings, en die bevordering van deursigtigheid en rekenskap. In die laaste plek is daar voorstelle gemaak vir verdere navorsing oor die kompeterende toepassing van 'Data Mining' strategieë.
94

Market requirements of a hosted MES for small and medium size manufacturers in South Africa

Anthonissen, Carel Aaron 03 1900 (has links)
Thesis (MBA)--Stellenbosch University, 2013. / As small manufacturing enterprises (SMEs) grow, the complexity of their manufacturing operations are likely to increase to a point where they can benefit from manufacturing specific information systems, such as a manufacturing execution system (MES), to manage the complexity of their operating environment. Unfortunately, the capital expense required to implement an MES may prohibit smaller enterprises from adopting this potentially advantageous technology. Software-as-a-Service (SaaS) is a developing delivery channel that promises to realise the same economies of scales of large software implementations by hosting software centrally and allowing access by multiple customers through the internet. This delivery model promises, amongst its many benefits, access to advanced software at a subscription based fee, which reduces its capital expense and makes it affordable to smaller enterprises. The purpose of this study is to identify factors that would influence the adoption of SaaS based MESs in South-African manufacturing SMEs. A literature survey was conducted to understand the characteristics of SaaS, the functionality and benefits that can be derived from an MES and the characteristics of SMEs that differentiate them from larger organisations. Instruments were identified which can be used to assess the propensity of SMEs to adopt new technology. An internet survey of South-African manufacturing SMEs was conducted to determine their perceptions and beliefs regarding SaaS and MES, and their intent to implement licensed or SaaS based MES within the next 12 months. The survey results were analysed to determine which beliefs were the most influential in determining an SME’s intention to adopt an MES and particularly which beliefs bias their decision towards either a licensed or a SaaS based MES implementation. The perceived benefits of an MES were found to be the most significant factor in driving the intent to adopt an MES. It was found that some beliefs regarding SaaS and licensing may influence the choice of delivery channel, and the perceptions of industry peers and customers were also found to influence the decision to adopt either a licensed or a SaaS based MES. A simple screening of input variables was effective in improving the predictive ability of the research model. While a full set of variables was able to explain 9.4% of the variation in the intent to adopt MES, a screened set of variables was able explain 15.5%. Further improvement in screening techniques could further improve the predictive power of the model. Since the model was only able to explain around 15.5% of the variation in the intent to adopt an MES, it is likely that there may be other significant factors that drive the intention to adopt an MES that are not covered in this study. These could include personal attitudes of the owner that are independent of the enterprise itself.
95

The impact of the Internet on development strategies of real estate agencies: a qualitative study based onBeijing's real estate agency industry

王晨, Wang, Chen January 2003 (has links)
published_or_final_version / Real Estate and Construction / Doctoral / Doctor of Philosophy
96

Combating the corporate paper war: optimising electronic mail and electronic filing

Bothma, Marchelle Marelize 11 1900 (has links)
Thesis (M. Tech. (Office management & Technology)) -- Vaal University of Technology / The primary objective of this research project was primarily to investigate filing methods and mailing practices in the computer support or administrative environment with specific focus on the abuse of paper. The research design consisted of an exploratory investigation in selected Higher Education Institutions in the Province of Gauteng whereby a structured questionnaire was used as a measuring instrument. The investigation was sub-divided into two categories, namely, paper-based filing systems and mailing systems as opposed to electronic filing and mailing systems. In the empirical findings, analysis and interpretations, correlation and cross-tabulation were done on all sets of variables in order to determine whether any meaningful associations could be found. With reference to the title of this study "Combating the corporate paper war: optimising electronic mail and electronic filing", it has been proven that the war against paper abuse is far from over. Perceptions regarding a future paperless office and assumptions that technology such as the electronic mail facility and electronic filing could assist organisations to combat paper abuse were unfounded, due to a lack of guidance and control measures in the corporate environment. Consequently, it is recommended that an e-filing and e-mailing model be created and followed in conjunction with specified computer software features in order to counteract the abuse of paper. Follow-up research could focus on electronic filing methods versus scanning of documents for filing purposes.
97

A computer system for converting bill of quantities into quantity and dollar budgets for construction projects.

January 1985 (has links)
by Paul Chu Hoi-fai. / Bibliography: leaf 40 / Thesis (M.B.A.)--Chinese University of Hong Kong, 1985
98

Multimedia opportunities in Hong Kong.

January 1993 (has links)
by Chau Wan-yung William, Wong Kwok-wai Steven. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1993. / Includes bibliographical references (leaves [34-35]). / EXECUTIVE SUMMARY --- p.ii / LIST OF STATISTICAL CHARTS --- p.iv / ACKNOWLEDGMENTS --- p.v / Chapter CHAPTER 1 --- INTRODUCTION --- p.1 / Chapter 1.1 --- Background --- p.1 / Chapter 1.2 --- Definitions --- p.2 / Chapter 1.3 --- Characteristics --- p.4 / Chapter 1.4 --- Objectives --- p.5 / Chapter CHAPTER 2 --- RESEARCH METHODOLOGY --- p.7 / Chapter 2.1 --- Statement of Problem --- p.7 / Chapter 2.2 --- Exploratory Pilot Study --- p.7 / Chapter 2.3 --- Mail Questionnaire Survey --- p.9 / Chapter 2.4 --- Statistical Analysis --- p.11 / Chapter CHAPTER 3 --- INTERVIEW FINDINGS --- p.12 / Chapter 3.1 --- Echo Presentation Services Limited --- p.12 / Chapter 3.2 --- Cathay Pacific Airways Limited --- p.14 / Chapter CHAPTER 4 --- DATA ANALYSIS & FINDINGS --- p.16 / Chapter 4.1 --- Sample Characteristics --- p.16 / Chapter 4.2 --- Current Development of Multimedia --- p.18 / Chapter 4.3 --- The Future of Multimedia --- p.22 / Chapter CHAPTER 5 --- DISCUSSIONS - LIMITATIONS & INTERPRETATIONS --- p.27 / Chapter 5.1 --- Limitations --- p.27 / Chapter 5.1.1 --- Sampling Design --- p.27 / Chapter 5.1.2 --- Statistical Support --- p.28 / Chapter 5.2 --- Interpretations --- p.28 / Chapter CHAPTER 6 --- RECOMMENDATIONS --- p.32 / BIBLIOGRAPHY / APPENDIX I: QUESTIONNAIRE SAMPLE / APPENDIX II: STATISTICAL CHARTS
99

A study of the application of electronic data interchange in the Hong Kong trading community.

January 1990 (has links)
by Alfred Cheng Hung Chi, Chan Sik Kuk. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1990. / Bibliography: leaves 82-84. / ABSTRACT --- p.ii / TABLE OF CONTENTS --- p.v / ACKNOWLEDGMENT --- p.vii / Chapter / Chapter I. --- INTRODUCTION --- p.1 / Chapter II. --- PROBLEMS AND METHODOLOGY --- p.6 / Chapter III. --- THE PAPER-BASED TRADING SYSTEM & THE EDI TRADING SYSTEM --- p.10 / Chapter IV. --- EXISTING EDI NETWORKS --- p.19 / Chapter ´Ø --- SWIFT --- p.19 / Chapter ´Ø --- TradeNet --- p.22 / Chapter ´Ø --- Intertrade --- p.25 / Chapter V. --- CONSIDERATIONS FOR A COMMUNITY-WIDE EDI NETWORK IN HONG KONG --- p.28 / Chapter ´Ø --- Legal Issues --- p.29 / Chapter ´Ø --- Regulatory Issues --- p.34 / Chapter ´Ø --- Security --- p.38 / Chapter ´Ø --- Standards --- p.40 / Chapter ´Ø --- Linkage with Global Networks --- p.42 / Chapter ´Ø --- Chinese EDI Capabilities --- p.42 / Chapter ´Ø --- Franchise --- p.45 / Chapter VI. --- DEVELOPMENT PLAN --- p.47 / Chapter ´Ø --- The Role of the Hong Kong Government --- p.47 / Chapter ´Ø --- Development Plan --- p.50 / Chapter VII. --- CONCLUSIONS --- p.52 / APPENDIX --- p.53 / Chapter 1. --- Case Study On EDI Network - TradeNet --- p.53 / Chapter 2. --- Message Standards --- p.64 / Chapter ´Ø --- Available EDI Message Standards --- p.65 / Chapter ´Ø --- UN/EDI FACT --- p.67 / Chapter 3. --- Message Handling Standard - X.400 --- p.70 / Chapter ´Ø --- What is X.400 ? --- p.70 / Chapter ´Ø --- Why X.400 ? --- p.72 / Chapter ´Ø --- Security and Audit --- p.73 / Chapter ´Ø --- Acknowledgement --- p.74 / Chapter ´Ø --- Performance --- p.74 / Chapter ´Ø --- Commitments and X.500 --- p.75 / Chapter 4. --- Trading Documents --- p.77 / BIBLIOGRAPHY --- p.82
100

Exception prediction in workflow management

Leong, Iok Fai January 2010 (has links)
University of Macau / Faculty of Science and Technology / Department of Computer and Information Science

Page generated in 0.125 seconds