• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1015
  • 224
  • 97
  • 96
  • 69
  • 31
  • 29
  • 19
  • 19
  • 14
  • 12
  • 8
  • 7
  • 7
  • 7
  • Tagged with
  • 2076
  • 745
  • 706
  • 585
  • 437
  • 357
  • 330
  • 310
  • 227
  • 221
  • 193
  • 189
  • 174
  • 165
  • 160
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
431

Strategies to Obtain Maximum Usage of Enterprise Resource Planning Systems

Schaffer, Edward James 01 January 2016 (has links)
Business organizations invest significant resources implementing enterprise resource planning (ERP) systems, yet some organizations utilize less than 75% of the ERP system capabilities. The purpose of this single-site case study was to explore ERP utilization strategies implemented by 4 managers in the information technology (IT) department from 1 organization that uses an ERP system in the Midwest region of the United States. The conceptual framework that grounded this study was the user participation theory. Data were collected through participant interviews and analyzed using traditional text analysis. Member checking was used to strengthen the credibility and trustworthiness of the interpretation of the participants' responses. The emergent themes from the study were user participation, user involvement, user attitude, user system satisfaction, and user preparation. The most prominent utilization strategies identified by the participants related to the user participation theme. The implications for positive social change include the potential optimization of benefits from the ERP system that could allow the organization's leaders to direct their resources to causes that can improve the health and welfare of the geographic population in the operational region.
432

Social Media Policy to Support Employee Productivity in the Finance Industry

Rogers, David Shaun 01 January 2018 (has links)
Business leaders may see social media as a distraction for their workers; however, blocking access could lead to a reduction in productivity. Using social media technologies with knowledge workers could achieve cost reductions for payroll of 30% to 35%. The purpose of this multiple case study was to explore how business leaders used a social media policy to support employee productivity. The conceptual framework for this study was social exchange theory, which supports the notion that dyad and small group interactions make up most interactions, and such interactions enhance employees' productivity. The research question was to explore how finance industry leaders are using a social media policy to enhance productivity. The target population for this study was leaders from financial companies in Charlotte, North Carolina, who have experience in using social media policies to increase employee productivity. Data collection included semistructured interviews with 9 technology leaders and company documents at two companies related to the research phenomenon. Yin's 5-step data analysis approach resulted in 3 themes: employee productivity, communication, and open company culture. Business leaders should consider using a social media policy to engage employees to support productivity, enhance communication both externally and internally, and enrich company culture in a way that is visible to employees. Employee engagement in a social media platform to connect and communicate with people could lead to a happier workplace and encourage employees to volunteer more frequently for social good.
433

Knowledge Transfer Strategy Implementation in Contract Organizations

Hudson, Delano Clyde 01 January 2019 (has links)
Despite economic perils of government shutdowns, foreclosures, bankruptcies, and employee layoffs, some contract leaders consistently fail to implement knowledge transfer strategies that could improve production and profitability and maintain operational readiness when employees transition in and out of the organization. The conceptual framework for this descriptive research study was Nonaka and Takeuchi's socialization, externalization, combination, and internalization model for knowledge creation. A purposive sample of 20 leaders from 2 contract organizations within the south central United States with at least 10 years of experience in contracting were interviewed. Member checking was used for reliability of the synthesized interviews, and triangulation was accomplished by a review of the organization's policies and standard operational procedures that confirmed the implemented processes. Thematic analysis was used to determine the 5 key themes identified in this study: cross-training, right-seat riding, after-action reviews, job shadowing, and surveying. By understanding the value of knowledge transfer strategy, business leaders and employees may benefit by establishing future business relationships and associations that create positive social change through established processes.
434

Threat Intelligence in Support of Cyber Situation Awareness

Gilliam, Billy Paul 01 January 2017 (has links)
Despite technological advances in the information security field, attacks by unauthorized individuals and groups continue to penetrate defenses. Due to the rapidly changing environment of the Internet, the appearance of newly developed malicious software or attack techniques accelerates while security professionals continue in a reactive posture with limited time for identifying new threats. The problem addressed in this study was the perceived value of threat intelligence as a proactive process for information security. The purpose of this study was to explore how situation awareness is enhanced by receiving advanced intelligence reports resulting in better decision-making for proper response to security threats. Using a qualitative case study methodology a purposeful sample of 13 information security professionals were individually interviewed and the data analyzed through Nvivo 11 analytical software. The research questions addressed threat intelligence and its impact on the security analyst's cognitive situation awareness. Analysis of the data collected indicated that threat intelligence may enhance the security analyst's situation awareness, as supported in the general literature. In addition, this study showed that the differences in sources or the lack of an intelligence program may have a negative impact on determining the proper security response in a timely manner. The implications for positive social change include providing leaders with greater awareness through threat intelligence of ways to minimize the effects of cyber attacks, which may result in increasing business and consumer confidence in the protection of personal and confidential information.
435

Exploring Strategies to Integrate Disparate Bioinformatics Datasets

Fakhry, Charbel Bader 01 January 2019 (has links)
Distinct bioinformatics datasets make it challenging for bioinformatics specialists to locate the required datasets and unify their format for result extraction. The purpose of this single case study was to explore strategies to integrate distinct bioinformatics datasets. The technology acceptance model was used as the conceptual framework to understand the perceived usefulness and ease of use of integrating bioinformatics datasets. The population of this study included bioinformatics specialists of a research institution in Lebanon that has strategies to integrate distinct bioinformatics datasets. The data collection process included interviews with 6 bioinformatics specialists and reviewing 27 organizational documents relating to integrating bioinformatics datasets. Thematic analysis was used to identify codes and themes related to integrating distinct bioinformatics datasets. Key themes resulting from data analysis included a focus on integrating bioinformatics datasets, adding metadata with the submitted bioinformatics datasets, centralized bioinformatics database, resources, and bioinformatics tools. I showed throughout analyzing the findings of this study that specialists who promote standardizing techniques, adding metadata, and centralization may increase efficiency in integrating distinct bioinformatics datasets. Bioinformaticians, bioinformatics providers, the health care field, and society might benefit from this research. Improvement in bioinformatics affects poistevely the health-care field which has a positive social change. The results of this study might also lead to positive social change in research institutions, such as reduced workload, less frustration, reduction in costs, and increased efficiency while integrating distinct bioinformatics datasets.
436

Strategies to Improve Adoption of the Federal Enterprise Architecture Framework

Caruso, Michael John 01 January 2019 (has links)
The U.S. federal government spends millions of taxpayer dollars to implement the federal enterprise architecture framework (FEAF). This qualitative multiple case study extracted successful FEAF implementation strategies used by agencies in the Washington, DC, metropolitan area. The population for this study included 10 information technology (IT) planners in 3 federal agencies. Data were collected from semistructured interviews and triangulated in comparison to 33 public documents. General system theory was used as a conceptual framework for the study, and data analysis included reviews of the academic literature, thematic analysis, and member checking to identify themes and codes related to successful aspects of the strategies collected. Key themes emerging from data analysis included critical leadership support for implementation, organizational culture, practices for maintaining an accurate organizational history, and means to maintain this knowledge. Based on the findings, the implications of this study for positive social change include efficient, effective, and reliable government services for U.S. citizens and a significant reduction in IT spending in federal agencies. In turn, the results may result in effective federal services and effective use of taxpayer money.
437

Strategies to Reduce the Fiscal Impact of Cyberattacks

Smith, Shirley Denise 01 January 2019 (has links)
A single cyberattack event involving 1 major corporation can cause severe business and social devastation. In this single case study, a major U.S. airline company was selected for exploration of the strategies information technology administrators and airline managers implemented to reduce the financial devastation that may be caused by a cyberattack. Seven participants, of whom 4 were airline managers and 3 were IT administrators, whose primary responsibility included implementation of strategies to plan for and respond to cyberattacks participated in the data collection process. This study was grounded on the general systems theory. Data collection entailed semistructured face-to-face and telephone interviews and collection and review of public documents. The data analysis process of this study involved the use of Yin's 5-step process of compiling, disassembling, reassembling, interpreting, and concluding, which provided a detailed analysis of the emerging themes. The findings produced results that identified strategies organizational managers and administrators of a U.S. airline implemented to reduce the fiscal influence of cyberattacks, such as proactive plans for education and training, active management, and an incident response plan. The findings of this study might affect social change by offering all individuals a perspective on creating effective cyberculture. An understanding of cyberculture could include the focus of a heightened understanding, whereby, to ensure the security of sensitive or privileged data and information and of key assets, thus, reducing the fiscal devastation that may be caused by cyberattacks.
438

A FRAMEWORK FOR CONCEPTUAL INTEGRATION OF HETEROGENEOUS DATABASES

Srinivasan, Uma, Computer Science & Engineering, Faculty of Engineering, UNSW January 1997 (has links)
Autonomy of operations combined with decentralised management of data has given rise to a number of heterogeneous databases or information systems within an enterprise. These systems are often incompatible in structure as well as content and hence difficult to integrate. This thesis investigates the problem of heterogeneous database integration, in order to meet the increasing demand for obtaining meaningful information from multiple databases without disturbing local autonomy. In spite of heterogeneity, the unity of overall purpose within a common application domain, nevertheless, provides a degree of semantic similarity which manifests itself in the form of similar data structures and common usage patterns of existing information systems. This work introduces a conceptual integration approach that exploits the similarity in meta level information in existing systems and performs metadata mining on database objects to discover a set of concepts common to heterogeneous databases within the same application domain. The conceptual integration approach proposed here utilises the background knowledge available in database structures and usage patterns and generates a set of concepts that serve as a domain abstraction and provide a conceptual layer above existing legacy systems. This conceptual layer is further utilised by an information re-engineering framework that customises and packages information to reflect the unique needs of different user groups within the application domain. The architecture of the information re-engineering framework is based on an object-oriented model that represents the discovered concepts as customised application objects for each distinct user group.
439

The Effects of DNA Evidence on the Criminal Justice Process

Briody, Michael, n/a January 2005 (has links)
This research examines the effects of forensic deoxyribonucleic acid (DNA) evidence on decisions in the courts and on the conduct of criminal investigations. To assess effects on court decisions, quantitative analyses were conducted using primary data from the State of Queensland. A control-comparison method was used to assess the effects in court, and this was made within a context of other evidentiary and extra-legal factors that had a bearing on case outcomes. These other factors included defendant confessions, independent witness testimony and fingerprint and photographic evidence. A sample of 750 cases referred by police for prosecution and finalised past the appeal stage in court, was selected for examination. Half of these cases utilised DNA evidence, while the other half, as a control group, did not. Cases were selected in four categories: sexual offences, serious assaults, homicides and property crime. Data on the cases were analysed using advanced statistical methods and predictor models were developed to demonstrate how, given case configurations, the addition of DNA evidence could potentially alter court outcomes. Results for the three serious offence types were that DNA evidence emerged as a positive predictor that prosecutors would pursue cases in court, and it demonstrated a powerful influence on jury decisions to convict. Incriminating DNA evidence demonstrated no significant effect on inducing guilty pleas from defendants for serious crimes against the person. However, it did correlate significantly to cases reaching court and to guilty pleas being entered for property offence cases. The analysis of the effects on investigations relies on data from jurisdictions other than Queensland. Secondary data and the literature were used to assess the potential for strategically using forensic intelligence, along with dedicated investigative resources, to reduce property crimes like burglaries and car thefts. In the one study available that employed adequate research methods, three patrol areas in New South Wales, where a police operation was trialled, were compared to other areas that acted as a control. The police operation aimed at 100% attendance at property crime scenes, the use of intelligence from DNA and fingerprint identifications and specialised investigative resources to reduce crime levels. While the operation failed to achieve its goal, it did provide some valuable lessons. The effectiveness of the national criminal DNA database in the UK, reputed to lead the world, was then evaluated in relation to domestic burglaries. Its Australian CrimTrac counterpart did not commence operations until March 2003, and by 2004 was not operating at maximum capacity. Because no published studies were located that measured any effects of the UK database on crime levels, the criterion selected to measure performance was the proportion of convictions achieved through the database to reported crime. For domestic burglaries, this ratio was calculated from secondary official data to be close to one percent (0.01), a figure that included the additional convictions achieved through the intelligence that the database provided. The research also examined forensic DNA in relation to issues of privacy and civil liberties. Privacy issues are discussed beginning with an historical background to the use and misuse of genetic data. This includes the searches for a 'criminal gene' and for genetic links to criminal behaviour. DNA databases are contrasted with databanks, and it is questioned, since we leave our DNA wherever we go, whether it really is private. Civil liberties issues that are discussed include whether providing DNA is a form of self-incrimination; how DNA has helped exonerate the convicted innocent; wrongful convictions based on flawed DNA evidence; whether occasional 'mass screenings' with DNA are a reversal of the onus of proof; concerns with DNA databases and 'function creep', and the planting or 'forgery' of DNA evidence including the use of amplicon contamination. In the final chapter, a balance is sought between on one hand, the goal of police and government to provide a safe society, and on the other, the rights to privacy and civil liberties expected by individuals in Western liberal democracies. The chapter addresses the issues of concern raised in the earlier chapter about privacy and civil liberties, and makes recommendations on how these may be resolved. The general approach favoured is to increase police powers in specific situations, but to couple these with the protection of individual rights through greater regulation of those powers. The research also developed a case prioritising system aimed at helping clear laboratory backlogs.
440

The role of biodiversity databases in coastal conservation and resource management

Palacio, Monalisa January 2008 (has links)
Marine environmental resource managers and consultants require comprehensive, accurate and current data on the status of marine biodiversity in order to fully evaluate resource consent applications that involve development, impact or encroachment within the marine environment, and for identifying areas of coast appropriate for conservation. The role and efficacy of existing global, national and regional marine biodiversity databases in delivering these types of data are evaluated. Consultation with environmental consultants revealed that none regularly, if ever used any existing marine biodiversity database during their routine consulting activities. Moreover, no existing biodiversity database had appropriate data-mining tools, although each was determined to provide information of value to resource managers and environmental consultants operating at national and regional scales; none was deemed to provide the sort of information required to manage marine resources at a local scale. To achieve the objectives of this research programme, resource managers, data users and data compilers were consulted to determine their ideal data and database requirements. Existing biodiversity data sets that included New Zealand marine biodiversity then were searched or procured, and these data and that of a novel data set of species occurring at 296 intertidal and 25 fringe-saline (effectively freshwater) sites within and proximal to the Hauraki Gulf Marine Park (from Mimiwhangata Bay in the north to Tauranga Harbour in the south) were compared with species inventories from environmental consultants operating in this region. Biodiversity data from the 296 saline, comprising presence/absence data for 713 taxa recorded from the survey region were analysed in detail. Significantly different species assemblages were identified amongst these 296 sites, five intertidal habitats being recognised, each with characteristic species assemblages: marine-hard shores, marine-soft shores, brackish-hard shores, brackish-soft shores, and mangrove shores. Species richness and diversity were consistently higher in marine habitats, and greatest on hard substrata. Most sites host unique assemblages of species. A novel index of species richness is proposed, and although the spatial distribution of richness isn’t particularly revealing, as obvious patterns in the distribution of richness are not apparent, this index has value in that the richness of any shore can be compared and contrasted with that of others throughout the region. Augmenting this richness index is a novel index of species rarity. Based on the frequency of occurrence of taxa on shores throughout the survey region, very rare through to ubiquitous taxa are recognised to routinely occur on almost all shores, regardless of the total species richness. Moreover, very rare to uncommon taxa often comprise a disproportionately high percentage of the total species occurring on any given intertidal shore, in any habitat. Accordingly, alarm bells should ring for reviewers of resource consent applications wherein environmental consultants state that an area subject to development ‘hosts no rare, unique or otherwise remarkable species or ecology.’ Two applications of these novel biodiversity data are demonstrated: the relationship between species richness and regional council consented activities is described, with a negative correlation reported for the intensity of disturbance (using the number of consented activities as a proxy for disturbance) and species richness on marine hard shores; and an appraisal of four selection criteria for marine reserves (naturalness, representativeness, uniqueness and complementarities), wherein the intertidal fauna and flora of no existing or proposed marine reserve appears to be natural, unique or representative, and effort seems to have been spent duplicating certain assemblages of species in reserve networks. The former is intuitively obvious, but the latter is alarming, and the ramifications of it far reaching in terms of conservation of the marine environment. Protocols for conducting biodiversity surveys must be established and implemented to elevate the standards of environmental consultants, resulting value judgements on the composition of species, and the likely and actual effects of these developments on the marine environment to ensure that statements made in reports are based on current data rather than perceptions and client expectations. It is possible that resource consents have been issued based on spurious appraisals of the immediate and cumulative effect of discharge on the environment, or of the relative rarity (or appreciation of this) of species that occur within it. Prior to development of the novel Monalisa data set, no existing database or data set existed that provided the information routinely required by managers and consultants to make informed judgements that affect coastal development throughout the survey region. Recommendations for additional research to build on findings detailed herein are made.

Page generated in 0.044 seconds