• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 58
  • 5
  • 5
  • 4
  • 1
  • Tagged with
  • 125
  • 125
  • 125
  • 56
  • 49
  • 43
  • 35
  • 35
  • 35
  • 34
  • 29
  • 14
  • 13
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

The design of a small business database using the Semantic Database Model

Morgan, Jac F January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
82

Analysis of information technology risk management in South African small and medium enterprises.

Mseteka, Phumzile D. January 2015 (has links)
M. Tech. Business Information Systems / Information Technology (IT) has become the driving force behind businesses and organizations. However, Information Technology comes with risks and other vulnerabilities. And by the same token, IT also poses threats to the organization. This then means that every organization must be able to contain and manage these risks and threats well, if it is to stay in the market and competitive. Information Technology Risk Management is to control Information Technology risks occurrences, acceptance and mitigate them. This means, organizations need proper precautionary measures and management tools to be able to identify risks, analyze risks, monitor the risks and have risk-reducing measures. This dissertation is about Information Technology Risk Management. Small and Medium Enterprises (SMEs) operating in South Africa tend to focus more on business operations, often neglecting the need to manage Information Technology risks effectively.
83

Factors contributing to successful information technology outsourcing relationships : case of a Gauteng information technology company

Kekana, Gavin. January 2012 (has links)
M.Tech. Business Administration. Business School. / The purpose of this research is to assess which factors are critical to realize success in an Information Technology (IT) outsourcing relationship. The study assessed the applicability of the Relationship Quality (RELQUAL) model dimensions as relevant constructs that leads to relationship success and relationship retention on an existing IT outsourcing relationship. Emphasis was placed on the intangible factors which are trust, commitment, communication, cultural understanding and interdependence. This research was conducted within the context of the South African business environment.
84

Model of a knowledge management support system for choosing intellectual capital assessment methods.

Pretorius, Agnieta Beatrijs. January 2008 (has links)
Thesis (DTech. in Business Information Systems)--Tshwane University of Technology, 2008. / Existing literature propagates a variety of methods for assessment of intellectual capital. Unfortunately, awareness of, and interest in the assessment of intellectual capital far exceeds its use in practice. This research argues that, due to complexities involved in selecting and customising an appropriate method or combination of methods for assessing intellectual capital, mechanisms are needed for managing and applying the evolving body of knowledge concerning such assessment. This research proceeds to develop a model, referred to as a conceptual design for a system to (i) provide management support to the process of selecting and customising an appropriate method (or combination of methods) for assessment of intellectual capital, (ii) utilise past knowledge and expertise to accelerate and improve decision-making, (iii) promote synergism through integration of methods, and (iv) manage the evolving body of knowledge concerning the assessment of intellectual capital.
85

An analysis of the impact of a small business development center consulting program on the attitudes of small business owners toward computers in their firms

Gaskin, Shelley L. January 1993 (has links)
The purpose of this study was to investigate and report on the impact and effectiveness of a Small Business Development Center consulting program. The consulting program consisted of two individualized, self-paced, interactive computer courseware sets which were designed to deliver information about business computer systems to small business owners. The study was descriptive and exploratory in nature, utilizing a pre- and post-experience application of an attitudinal instrument. The participants were small business owners in Indiana.The primary research question related to the impact that the Indiana Small Business Development Center computer assistance consulting program had upon the attitudes of small business owners toward computers in their firms. The attitude of the participants toward computers was positive prior to the experience and remained so after the experience. Other major findings regarding small business owners' perceptions of the consulting program were as follows:1. Nearly 90 percent of the participants indicated that an individualized, self-paced, interactive computer courseware set was a useful way to obtain instruction about business computer systems, and 96.2 percent indicated that they would recommend the program under investigation to other small business owners.2. Although the majority of the participants had not used an integrated software package that contains word processing, spreadsheet, and database applications under one software umbrella prior to this study, following their interaction with the courseware sets almost 74 percent indicated that an integrated package would be practical for their businesses.3. Almost all (96.2 percent) of the participants found a graphical user interface to be useful in helping them understand the computer software.4. Participants preferred to use business associates and seminars or courses as sources of information for learning about computers for their firms, but lack of time prevents them from learning as much as they would like.Results of this study indicate that as adult learners, small business owners are a fragmented population, and therefore difficult to reach via traditional adult education programs. More emphasis by government and educational institutions on providing small business owners with training and education regarding computers and more research conducted in developing programs are suggested. / Department of Educational Leadership
86

The design and evaluation of non-visual information systems for blind users

Morley, Sarah January 1999 (has links)
This research was motivated by the sudden increase of hypermedia information (such as that found on CD-ROMs and on the World Wide Web), which was not initially accessible to blind people, although offered significant advantages over traditional braille and audiotape information. Existing non-visual information systems for blind people had very different designs and functionality, but none of them provided what was required according to user requirements studies: an easy-to-use non-visual interface to hypermedia material with a range of input devices for blind students. Furthermore, there was no single suitable design and evaluation methodology which could be used for the development of non-visual information systems. The aims of this research were therefore: (1) to develop a generic, iterative design and evaluation methodology consisting of a number of techniques suitable for formative evaluation of non-visual interfaces; (2) to explore non-visual interaction possibilities for a multimodal hypermedia browser for blind students based on user requirements; and (3) to apply the evaluation methodology to non-visual information systems at different stages of their development. The methodology developed and recommended consists of a range of complementary design and evaluation techniques, and successfully allowed the systematic development of prototype non-visual interfaces for blind users by identifying usability problems and developing solutions. Three prototype interfaces are described: the design and evaluation of two versions of a hypermedia browser; and an evaluation of a digital talking book. Recommendations made from the evaluations for an effective non-visual interface include the provision of a consistent multimodal interface, non-speech sounds for information and feedback, a range of simple and consistent commands for reading, navigation, orientation and output control, and support features. This research will inform developers of similar systems for blind users, and in addition, the methodology and design ideas are considered sufficiently generic, but also sufficiently detailed, that the findings could be applied successfully to the development of non-visual interfaces of any type.
87

The effective application of information systems within SMMEs for long term competitive advantage

Ahmat, Abd-al Malik Madina January 2016 (has links)
Thesis (MTech (Information and Technology))--Cape Peninsula University of Technology, 2016. / It has been shown that the South African insurance landscape takes up an important place in the African continent, contributing nearly three quarters of the total African insurance sector (Paul, Twala & Marwala, 2012). The industry landscape has shown development at a compound annual growth rate (CAGR) of 11.7% between 2004 and 2008. The life insurance industry is assumed to grow at a CAGR of 8.3%. Small, medium and micro-sized enterprises (SMMEs) are important role players in every economy and provide a major contribution to the gross domestic product (GDP) and employment. Many South African enterprises have in the past focused on local markets, but more recently SMMEs have been forced to respond to competition in the global market as markets expand. The role of SMMEs is considered critical in terms of poverty alleviation, employment creation, and international competitiveness. However, resource limitations have made it difficult for many SMMEs to enter new markets and compete effectively. The effective application of information systems (IS) are viewed as a way for SMMEs to become more competitive and drive business benefits such as cost reduction, improved profitability, enhanced customer service, new market growth opportunities, and more efficient operating relationships with trading customers and partners. There are an increasing number of new opportunities and competition in the marketplace because of business globalisation. The marketplace and business globalisation dynamics have a major influence on SMMEs and their operations. SMMEs require a critical evaluation of their internal processes and seek out solutions to be able to sustain their growth and competitiveness. This research study adopted an inductive approach to describe the rational process of establishing a general proposition on the basis of observing particular facts. An in-depth case study is used to explore the multiple perspectives of the complexity and uniqueness of SMMEs. One-on-one interviews were conducted to collect data from 17 financial advisors using an interview guide with semi-structured questionnaires. The data were analysed through the process of thematic coding which is common in case study research, and labels were assigned to form and organise the themes in groups and categories. Ethical consideration was presented before data collection commenced, and the autonomy, self-respect and human dignity of all respondents during the data collection process were considered. The findings reveal that financial service providers (FSPs) have a different understanding of IS, what competitive means, and what it can do for a business.
88

Adoption of business information systems in an automotive manufacturing environment: a case study

Dyer, Shirley January 2008 (has links)
Dorbyl Automotive Technologies (DAT) is a manufacturing company that supplies parts and components to the local and international motor vehicle market. The automotive components’ market is very competitive and customers require more from the industry to stay competitive. Customers require full integration throughout the supply chain. DAT and its Information Systems Department have ensured that the necessary business information systems are available to assist the company in staying competitive. One problem, though, is that the users of these systems are not using and adopting the technologies available. This research examines the reasons for this by making use of a technology acceptance model called the UNIFIED THEORY OF ACCEPTANCE AND USE OF TECHNOLOGY (UTAUT), which is an integrated model based on eight different available acceptance models. The aim is to understand which factors influence the use of systems. The research also proposes a way forward by suggesting a model to assist DAT in new system implementations as well as correcting the current situation. The only way DAT will stay competitive is by ensuring that the company becomes lean. Customers demand this as more and more are moving to just-in-time delivery. This implies that the suppliers must react to changes real-time. The use of business information systems will become the main focus area to react to changes quickly and correctly. Effective and accurate systems depend on users making good use of these systems. Remaining competitive will depend on how effectively Information and Communication Technologies (ICT) are used.
89

A framework for information security governance in SMMEs

Coertze, Jacques Jacobus January 2012 (has links)
It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
90

Navigating between information security management documents : a modeling methodology

Domingues, Steve January 2010 (has links)
Organizations no longer draft their own standards. Instead, organizations take advantage of the available international standards. One standard may not cover all the organization's needs, requiring organizations to implement more than one standard. The same aspect in an organization may be covered by two or more standards, creating an overlap. An awareness of such overlaps led to various institutions creating mapping documents illustrating how a control from one standard relates to a control from a different standard. The mapping documents are consulted by the end user, to identify how a control in one standard may relate to other standards. This allows the end user to navigate between the standards documents. These mapping documents are valuable to a person who wishes to grasp how different standards deal with a specific control. However, the navigation between standards is a cumbersome task. In order to navigate between the standards the end user is required to consult three or more documents, depending on the number of standards that are mapped to the control being investigated. The need for a tool that will provide fast and efficient navigation between standards was identified. The data tier of the tool is the focus of this dissertation. As a result, this research proposes a modeling methodology that will allow for the modeling of the standards and the information about the mapping between standards, thereby contributing to the creation of tools to aid in the navigation between standards. A comparison between the major data modeling paradigms identifies multi-dimensional modeling as the most appropriate technique to model standards. Adapting an existing modeling methodology to cater for the modeling standards, yield a five step standard modeling methodology. Once modeled, the standards can be physically implemented as a database. The database schema that results from the standard modeling methodology adheres to a specific pattern and can thus be expressed according to well-defined meta-model. This allows for the generation of SQL statements by a tool with limited knowledge of the standards in a way that allows the quick navigation between standards. To determine the usefulness of the standards modeling methodology the research presents iv a prototype that utilizes the well-defined meta-model to navigate between standards. It is shown that, as far as navigation is concerned, no code changes are necessary when adding a new standard or new mappings between standards. This research contributes to the creation of a tool that can easily navigate between standards by providing the ability to model the data tier in such a way that it is extensible, yet remains independent of the application and presentation tiers.

Page generated in 0.1001 seconds