• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1016
  • 224
  • 97
  • 96
  • 69
  • 31
  • 29
  • 19
  • 19
  • 14
  • 12
  • 8
  • 7
  • 7
  • 7
  • Tagged with
  • 2077
  • 745
  • 706
  • 585
  • 437
  • 357
  • 330
  • 310
  • 227
  • 221
  • 193
  • 189
  • 174
  • 165
  • 160
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
761

Nursing Approaches for Use and Sustainability of Barcode Medication Administration Technology

Njeru, Jackson Ngigi 01 January 2017 (has links)
Approximately 43.4% of medication errors occur at the time of administration despite the use of bar code medication administration (BCMA) System. This trend has prompted a national effort to mitigate this problem in the United States. Implementing BCMA in health care settings is one of those efforts. Studies focusing on the approaches employed by nurses when using this system are scant. The purpose of this qualitative case study was to investigate strategies nurses and their leaders use to ensure BCMA is implemented, maximized, and sustained. The technology acceptance model was used to guide the study. The 2 research questions addressed nurses' perceptions regarding the use and optimization of BCMA, and approaches of clinical nurses and their leaders to ensure that BCMA technology is properly used, optimized, and sustained in acute care units. Data collection included semistructured interviews with 8 participants. Thematic data analysis generated themes including ease of use, reduce errors, time saving, old technology, overreliance on technology, paper backups, and hope for future development. Common barriers to system effectiveness were system errors and inadequate training; intragroup and self-monitoring were important strategies to sustain use of the system. Study results may be used by health care leadership to reduce medication errors by adopting easy to use technology, change policies regarding training of BCMA end users in hospitals, increase the culture of patient safety among nurses, and prompt technology redesign within health care settings that meets the national patient safety goals.
762

Exploring Welfare Recipients' Self-Sufficiency Barriers through Information Management Systems in Tennessee

Nichols, Valenta Eunice 01 January 2018 (has links)
Families living on welfare in low-income impoverished neighborhoods encounter multiple barriers that need mitigating before seeking work to reach self-sufficiency. Many welfare recipients' self-sufficiency barriers are unnoticeable to caseworkers due to lack of data sharing to assess clients' needs through information technology processes. The purpose of this exploratory descriptive phenomenological qualitative study was to understand welfare recipients' viewpoints on socioeconomic barriers to living self-sufficiently and gain perspectives from human services caseworkers and technical resources on data sharing issues that impact recipients' ability to live independently from government assistance. Data collection and observational field notes resulted from in-depth interviews of 11 participants to capture welfare recipients' lived experience on human services barriers to achieve self-sufficiency, as well as, caseworker and technical resources views on welfare systems data sharing issues. The analysis of semistructured interviews revealed that welfare systems data sharing is an enhancement needed to help caseworkers identify and mitigate welfare recipients' self-sufficiency barriers. The common assessment framework model provided a contextual view to exploring research questions to elicit participants' perceptions of data sharing in welfare systems processes. The data analysis showed that the lack of data sharing impacts caseworkers' ability to assist recipients with self-sufficiency barriers. Results indicated the need for caseworkers to use data sharing to understand client's socioeconomic barriers and to make effective decisions to lead them to self-sufficiency. The impact on positive social change is using automated data sharing to identify and mitigate recipients' barriers to self-sufficiency.
763

Effective Strategies for Managing Continuous Consultant Turnover in IT Project Teams

Jury, Nicholas K 01 January 2018 (has links)
Information Technology project managers have found that collective turnover of consultants lowers code quality, increases knowledge loss and negatively impacts team performance. Within the last decade, companies have begun to see that offshore consultants have a turnover rate greater than 26%, more than double the rates for the rest of the IT consulting industry. Collective turnover also puts additional pressure on the project team, causing work exhaustion and thus additional turnover. The purpose of this single case study was to explore strategies that 6 successful project managers utilized to limit and reduce the impact of collective turnover of their hybrid sourced project teams. Participants were selected through purposeful sampling, based on career experiences and history of successful project execution. Data collection was completed through semi structured face to face interviews, acquisition of company documents including knowledge transfer plans, onboarding documents and turnover statistics. Data were analyzed using coding and key word analysis. Three themes emerged from data collection on the impact collective turnover has on hybrid sourced project teams. First, collective turnover of consultants decreased team performance. Second, improving global team dynamics reduced the negative impact of collective turnover. Last using knowledge transfer tools and project documentation practices reduced the negative impact of collective turnover. This research may contribute to effectively social change by providing managers information and techniques to improve global team dynamics and remove cultural barriers from the workplace.
764

Consumer Perceptions of Eco-Friendly Products

Isaacs, Sheik M. 01 January 2015 (has links)
The rate of failure to manage e-waste and the business sectors' failure to produce more eco-friendly products is high. These failure rates cause companies to lose profits on expanding an eco-friendly customer market. The central research question addressed by this correlational design examined the quality, price, and brand loyalty of eco-friendly products related to customers' willingness to recycle e-products. Consumer and buying behavior theories served as the theoretical framework in this investigation. SurveyMonkey was used to distribute the researcher-developed survey to the participants for the collection of the data. The collection data instrument was validated by performing a pilot test using students of the subject organization. The final sample size consisted of 381 participants, 18-24 years old. The strength of the association between ranked variables was determined using Spearman correlation while the customer behavior relationships of interest were examined using ordinal regression. One of the key findings was that when customers had used a certain brand in the past, they were more likely to continue buying that brand, even when the price increased. However, another finding showed that some customers were not willing to recycle electronic devices even if more drop-off recycling facilities were available. The profitability of green product innovations due to brand loyalty, combined with a demonstration of social responsibility by a business, could create a powerful venue for positive social change. The socially-responsible activities of a business could promote awareness that green products and recycling of e-waste are important for an environmentally-secure future.
765

Perceptions of Factors that Contribute to Employee Retention of IT Project Managers

Wiebell, Julie Ann 01 January 2019 (has links)
The low retention rate of information technology (IT) project managers from a region in the southeastern United States has increased an organization's operational costs and decreased the organization's global competitiveness. The conceptual foundation for this study was the resource-based theory of competitive advantage. This multiple case study explored IT project managers' perceptions of the factors that contributed to their retention. Participants in the study included 10 IT project managers with at least 5 years of experience who were also members of a chapter of the Project Management Institute (PMI). Semistructured interviews were conducted via teleconference to collect data that were subjected to a thematic analysis. Three key themes emerged from the analysis: an understanding of project management, challenging work, and certification support. The results of the study might provide those individuals in charge of hiring IT project managers with criteria that define what these IT project managers require as well what benefits can be offered and what methods can be applied in retaining these IT Project Managers. Findings from the study have implications for positive social change by contributing to the project management body of knowledge, positioning companies competitively, and effectively engaging IT project managers.
766

Exploring the Cybersecurity Hiring Gap

Pierce, Adam O. 01 January 2016 (has links)
Cybersecurity is one of the fastest growing segments of information technology. The Commonwealth of Virginia has 30,000 cyber-related jobs open because of the lack of skilled candidates. The study is necessary because some business managers lack strategies for hiring cybersecurity professionals for U.S. Department of Defense (DoD) contracts. The purpose of this case study was to explore strategies business managers in DoD contracting companies used to fill cybersecurity positions. The conceptual framework used for this study was the organizational learning theory. A purposeful sample of 8 successful business managers with cybersecurity responsibilities working for U.S. DoD contracting companies that successfully hired cybersecurity professionals in Hampton Roads, VA participated in the study. Data collection included semistructured interviews and a review of job postings from the companies represented by the participants. Coding, content, and thematic analysis were the methods used to analyze data. Within-methods triangulation was used to add accuracy to the analysis. At the conclusion of the data analysis, two main themes emerged: maintaining contractual requirements and a strong recruiting process. Contractual requirements guided how hiring managers hired cybersecurity personnel and executed the contract. A strong hiring process added efficiency to the hiring process. The findings of the study may contribute to positive social change by encouraging the recruitment and retention of cybersecurity professionals. Skilled cybersecurity professionals may safeguard businesses and society from Internet crime, thereby encouraging the safe exchange and containment of data.
767

Cybersecurity Policy Development at the State Level: A Case Study of Middle Tennessee

Scherr, Daniel Leslie 01 January 2019 (has links)
Cybersecurity is a growing threat not only to nations, critical infrastructure, and major entities, but also to smaller organizations and individuals. The growing number of successful attacks on all manner of U.S. targets highlights the need for effective and comprehensive policy from the local to federal level, though most research focuses on federal policy issues, not state issues. The purpose of this study was to examine the effectiveness of the decision-making process within the current cybersecurity policy environment in a southern state of the United States. Sabatier's advocacy coalition framework served as the theoretical framework for the study. Data were collected through 5 semistructured interviews with individuals who were either elected or appointed officials, emergency managers, or subject matter experts. These data were transcribed, then coded and analyzed with McCracken's analytic categorization procedure. Participants recognized that the federal government provides some resources but acknowledged that action at the state level is largely funded through the state resulting in a network of dissimilar policies and protocols in states across the country. Findings also revealed that state leadership in some locations better grasps what resources are needed and is more likely to earmark in order to plan for unanticipated cybersecurity needs of the public. Analysis of study data also highlighted areas for future study and identified needed resources or areas of opportunity for creating a more comprehensive and effective cybersecurity policy environment. Implications for positive social change include recommendations for state and federal decision makers to engage in community partnerships in order to more effectively protect the public from cybersecurity threats.
768

Mobile Technology Deployment Strategies for Improving the Quality of Healthcare

Song, Won K. 01 January 2019 (has links)
Ineffective deployment of mobile technology jeopardizes healthcare quality, cost control, and access, resulting in healthcare organizations losing customers and revenue. A multiple case study was conducted to explore the strategies that chief information officers (CIOs) used for the effective deployment of mobile technology in healthcare organizations. The study population consisted of 3 healthcare CIOs and 2 healthcare information technology consultants who have experience in deploying mobile technology in a healthcare organization in the United States. The conceptual framework that grounded the study was Wallace and Iyer's health information technology value hierarchy. Data were collected using semistructured interviews and document reviews, followed by within-case and cross-case analyses for triangulation and data saturation. Key themes that emerged from data analysis included the application of disruptive technology in healthcare, ownership and management of mobile health equipment, and cybersecurity. The healthcare CIOs and consultants emphasized their concern about the lack of cybersecurity in mobile technology. CIOs were reluctant to deploy the bring-your-own-device strategy in their organizations. The implications of this study for positive social change include the potential for healthcare CIOs to emphasize the business practice of supporting healthcare providers in using secure mobile equipment deployment strategies to provide enhanced care, safety, peace of mind, convenience, and ease of access to patients while controlling costs.
769

Diffusion of Technology in Small to Medium Medical Providers in Saudi Arabia

Arnaout, Ziad Hisham 01 January 2015 (has links)
The Saudi ministry of health reported that government health care spending doubled from 2008 to 2011. To address increased demand, the government encouraged small to medium enterprise (SME) growth. However, SME leaders could not leverage technology as a growth enabler because they lacked strategies to address operating inefficiencies associated with technology. Only 50% of hospitals fully implemented information technology. The purpose of this phenomenological study was to explore lived experiences of SME leaders on strategies needed to accelerate technology implementation. This exploration drew on a conceptual framework developed from Wainwright and Waring's framework addressing issues of technology adoption. Data were collected from semistructured interviews of 20 SME leaders in Saudi Arabia. A modified van Kaam method was used to analyze participants' interview transcripts in search of common themes. The main themes were strategies to address human resources, clinical teams, funding, and organizational and leadership alignment to accelerate the diffusion of technology. Findings indicated that insurance companies influence SME operations, growth, and survival. Analysis of findings revealed the need for change in management, training, implementation follow up, and staff retention to accelerate technology implementation. Application of findings has the potential to promote positive social change in guiding SME leaders to be change agents and enabling them to create a reliable, sustainable health care delivery system.
770

Examination of Adoption Theory on the DevOps Practice of Continuous Delivery

Anderson, Andrew John 01 January 2019 (has links)
Many organizations have difficulty adopting advanced software development practices. Some software development project managers in large organizations are not aligned with the relationship between performance expectancy, effort expectancy, social influence, and facilitating conditions, as moderated by experience, with intent to adopt the DevOps practice of continuous delivery. The purpose of this study was to examine the statistical relationships between the independent variables—performance expectancy, effort expectancy, social influence, and facilitating conditions, as moderated by experience—and the dependent variable of behavioral intent to adopt a continuous delivery system. Venkatesh, Morris, Davis, and Davis's unified theory of acceptance and use of technology provided the theoretical framework. A stepwise multiple linear regression analysis was performed on survey data from 85 technical project managers affiliated with LinkedIn project management groups. The analysis reflected that only performance expectancy was significant in predicting intent to adopt continuous delivery. The findings may contribute to social change by providing project managers with the information they need to support organizational change, collaboration, and facilitation. The knowledge gained may additionally help organizations develop operational efficiency, competitive advantage, and generate higher value to their clients and society.

Page generated in 0.0346 seconds