• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 264
  • Tagged with
  • 476
  • 476
  • 476
  • 214
  • 178
  • 169
  • 155
  • 130
  • 128
  • 98
  • 88
  • 87
  • 70
  • 65
  • 62
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

A GIS-Centric Approach for Modeling Vessel Management Behavior System Data to Determine Oyster Vessel Behavior on Public Oyster Grounds in Louisiana

Gallegos, David X 18 December 2014 (has links)
The satellite communications system called the Vessel Management System was used to provide geospatial data on oyster fishing over the nearly 1.7 million acres of the public water bottoms in Louisiana. An algorithm to analyze the data was developed in order to model vessel behaviors including docked, gearing, fishing and traveling. Vessel speeds were calculated via the Haversine formula at small and large intervals and compared to derive a measure of linearity. The algorithm was implemented into software using Python and inserted into a PostgreSQL database supporting geospatial information. Queries were developed to obtain reports on vessel activities and daily effort expended per behavior. ArcGIS was used to display and interpret the patterns produced by the vessel activity, yielding information about fishing activity clusters and effort which implied the location and productiveness of oyster reefs.
32

Fostering an Environment of Magnet Recognition by Using Internet Technology

Montgomery, Shyneka 01 January 2016 (has links)
Magnet Recognition, a nurse-driven certification, is an acknowledgement of nursing excellence within a hospital. Magnetic Recognition supports the highest quality of patient outcomes and is the standard for nursing care and professionalism in nursing practice. The site for this project has engaged in the process of seeking Magnet Recognition but lacked a method of communicating their progress to staff, prompting the need for the institutional intranet Magnet webpage. Guided by Roger's diffusion of innovation theory and Lewin's change management model, the purpose of this quality improvement project was to develop an evaluation plan for this webpage on the institutional intranet. Specific stakeholders within the institution were targeted to answer open-ended questions about the Magnet webpage. Their feedback was summarized and used to guide the development of the evaluation plan. Feedback revealed a need to change areas of the webpage related to navigating back to the homepage, reporting outcome data for the shared-decision councils' projects, and improving the resolution of the professional practice model. A toolkit was then developed, consisting of a checklist and a questionnaire using questions about the design and content of the Magnet webpage, which could be implemented immediately and then completed annually for continuous quality improvement. The results of this project are consistent with the literature, illustrating the importance of developing a plan for evaluating the implementation process. This project was socially significant because an effective evaluation plan could be used by other institutions seeking Magnet Recognition who develop a webpage as a strategy to engage staff and communicate their Magnet Recognition journey.
33

Diffusion of Electronic Health Records in Rural Primary Care Clinics

Mason, Patricia Lynn 01 January 2015 (has links)
By the end of 2015, Medicare-eligible physicians at primary care practices (PCP) who do not use an electronic health record (EHR) system will incur stiff penalties if they fail to meet the deadline for using EHRs. Yet, less than 30% of rural primary clinics have fully functional EHR systems. The purpose of this phenomenology study was to explore rural primary care physicians and physician assistants' experiences regarding overcoming barriers to implementing EHRs. Complex adaptive systems formed the conceptual framework for this study. Data were collected through face-to-face interviews with a purposeful sample of 21 physicians and physician assistants across 2 rural PCPs in the southeastern region of Missouri. Participant perceptions were elicited regarding overcoming barriers to implementing EHRs under the American Recovery and Reinvestment Act, Health Information Technology for Economic and Clinical Health, and the Patient Protection and Affordable Care Act legislation. Interview questions were transcribed and processed through qualitative software to discern themes of how rural PCP physicians and physician assistants might overcome barriers to implementing electronic health records. Through the exploration of the narrative segments, 4 emergent themes were common among the participants: (a) limited finances to support EHRs, (b) health information exchange issues, (c) lack of business education, and (d) lack of transformation at rural medical practices. The implications for positive social change include the potential implementation of EHRs particularly in physician practices in rural communities, which could provide cost-efficient health care services for those communities and a more sustainable future at primary care practices.
34

Strategies for U.S. City Government Enterprise Resource Planning System Implementation Success

Miller, Jennifer 01 January 2017 (has links)
Strategies for enterprise resource planning (ERP) system implementation success have been a focus of scholars since the 1990s. Researchers have demonstrated that ERP system implementation could cause both system failures and organization failures, affecting both operations and stakeholders. The theory of constraints was the conceptual framework for this single qualitative case study that explored ERP system critical success factors (CSFs) and strategies U.S. city governments use to successfully implement ERP systems. One city government in New Mexico with a successful ERP system served as the case study's population. Data were collected from semistructured interviews and relevant documents and then open coded and thematically analyzed. Triangulation was employed to increase the trustworthiness of interpretations. The primary themes that emerged from the analysis of this single case study revealed the importance of the city government adequately resourcing and staffing the organization, providing top management support, continuously communicating to clarify motivations for implementations, gaining concurrence, and maintaining a change management asset. Other city government end-users, managers, leaders, and vendors could benefit from results of this study by identifying and addressing the relevant principal CSFs, and then developing and deploying strategies for the implementation, control, and remediation phases to increase ERP systems' utility. City governments seeking to implement ERPs could effect social change by demonstrating fiscal stewardship of resources, adding fiscally efficient and efficacious operations directly supporting constituents, and increasing public confidence.
35

Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems

Ayereby, Manouan Pierre-Marius 01 January 2018 (has links)
This mixed-methods study focused on the internal human factors responsible for data breaches that could cause adverse impacts on organizations. Based on the Swiss cheese theory, the study was designed to examine preventative measures that managers could implement to minimize potential data breaches resulting from internal employees' behaviors. The purpose of this study was to provide insight to managers about developing strategies that could prevent data breaches from cyber-threats by focusing on the specific internal human factors responsible for data breaches, the root causes, and the preventive measures that could minimize threats from internal employees. Data were collected from 10 managers and 12 employees from the business sector, and 5 government managers in Ivory Coast, Africa. The mixed methodology focused on the why and who using the phenomenological approach, consisting of a survey, face-to-face interviews using open-ended questions, and a questionnaire to extract the experiences and perceptions of the participants about preventing the adverse consequences from cyber-threats. The results indicated the importance of top managers to be committed to a coordinated, continuous effort throughout the organization to ensure cyber security awareness, training, and compliance of security policies and procedures, as well as implementing and upgrading software designed to detect and prevent data breaches both internally and externally. The findings of this study could contribute to social change by educating managers about preventing data breaches who in turn may implement information accessibility without retribution. Protecting confidential data is a major concern because one data breach could impact many people as well as jeopardize the viability of the entire organization.
36

Strategies to Obtain Maximum Usage of Enterprise Resource Planning Systems

Schaffer, Edward James 01 January 2016 (has links)
Business organizations invest significant resources implementing enterprise resource planning (ERP) systems, yet some organizations utilize less than 75% of the ERP system capabilities. The purpose of this single-site case study was to explore ERP utilization strategies implemented by 4 managers in the information technology (IT) department from 1 organization that uses an ERP system in the Midwest region of the United States. The conceptual framework that grounded this study was the user participation theory. Data were collected through participant interviews and analyzed using traditional text analysis. Member checking was used to strengthen the credibility and trustworthiness of the interpretation of the participants' responses. The emergent themes from the study were user participation, user involvement, user attitude, user system satisfaction, and user preparation. The most prominent utilization strategies identified by the participants related to the user participation theme. The implications for positive social change include the potential optimization of benefits from the ERP system that could allow the organization's leaders to direct their resources to causes that can improve the health and welfare of the geographic population in the operational region.
37

Social Media Policy to Support Employee Productivity in the Finance Industry

Rogers, David Shaun 01 January 2018 (has links)
Business leaders may see social media as a distraction for their workers; however, blocking access could lead to a reduction in productivity. Using social media technologies with knowledge workers could achieve cost reductions for payroll of 30% to 35%. The purpose of this multiple case study was to explore how business leaders used a social media policy to support employee productivity. The conceptual framework for this study was social exchange theory, which supports the notion that dyad and small group interactions make up most interactions, and such interactions enhance employees' productivity. The research question was to explore how finance industry leaders are using a social media policy to enhance productivity. The target population for this study was leaders from financial companies in Charlotte, North Carolina, who have experience in using social media policies to increase employee productivity. Data collection included semistructured interviews with 9 technology leaders and company documents at two companies related to the research phenomenon. Yin's 5-step data analysis approach resulted in 3 themes: employee productivity, communication, and open company culture. Business leaders should consider using a social media policy to engage employees to support productivity, enhance communication both externally and internally, and enrich company culture in a way that is visible to employees. Employee engagement in a social media platform to connect and communicate with people could lead to a happier workplace and encourage employees to volunteer more frequently for social good.
38

Knowledge Transfer Strategy Implementation in Contract Organizations

Hudson, Delano Clyde 01 January 2019 (has links)
Despite economic perils of government shutdowns, foreclosures, bankruptcies, and employee layoffs, some contract leaders consistently fail to implement knowledge transfer strategies that could improve production and profitability and maintain operational readiness when employees transition in and out of the organization. The conceptual framework for this descriptive research study was Nonaka and Takeuchi's socialization, externalization, combination, and internalization model for knowledge creation. A purposive sample of 20 leaders from 2 contract organizations within the south central United States with at least 10 years of experience in contracting were interviewed. Member checking was used for reliability of the synthesized interviews, and triangulation was accomplished by a review of the organization's policies and standard operational procedures that confirmed the implemented processes. Thematic analysis was used to determine the 5 key themes identified in this study: cross-training, right-seat riding, after-action reviews, job shadowing, and surveying. By understanding the value of knowledge transfer strategy, business leaders and employees may benefit by establishing future business relationships and associations that create positive social change through established processes.
39

Threat Intelligence in Support of Cyber Situation Awareness

Gilliam, Billy Paul 01 January 2017 (has links)
Despite technological advances in the information security field, attacks by unauthorized individuals and groups continue to penetrate defenses. Due to the rapidly changing environment of the Internet, the appearance of newly developed malicious software or attack techniques accelerates while security professionals continue in a reactive posture with limited time for identifying new threats. The problem addressed in this study was the perceived value of threat intelligence as a proactive process for information security. The purpose of this study was to explore how situation awareness is enhanced by receiving advanced intelligence reports resulting in better decision-making for proper response to security threats. Using a qualitative case study methodology a purposeful sample of 13 information security professionals were individually interviewed and the data analyzed through Nvivo 11 analytical software. The research questions addressed threat intelligence and its impact on the security analyst's cognitive situation awareness. Analysis of the data collected indicated that threat intelligence may enhance the security analyst's situation awareness, as supported in the general literature. In addition, this study showed that the differences in sources or the lack of an intelligence program may have a negative impact on determining the proper security response in a timely manner. The implications for positive social change include providing leaders with greater awareness through threat intelligence of ways to minimize the effects of cyber attacks, which may result in increasing business and consumer confidence in the protection of personal and confidential information.
40

Exploring Strategies to Integrate Disparate Bioinformatics Datasets

Fakhry, Charbel Bader 01 January 2019 (has links)
Distinct bioinformatics datasets make it challenging for bioinformatics specialists to locate the required datasets and unify their format for result extraction. The purpose of this single case study was to explore strategies to integrate distinct bioinformatics datasets. The technology acceptance model was used as the conceptual framework to understand the perceived usefulness and ease of use of integrating bioinformatics datasets. The population of this study included bioinformatics specialists of a research institution in Lebanon that has strategies to integrate distinct bioinformatics datasets. The data collection process included interviews with 6 bioinformatics specialists and reviewing 27 organizational documents relating to integrating bioinformatics datasets. Thematic analysis was used to identify codes and themes related to integrating distinct bioinformatics datasets. Key themes resulting from data analysis included a focus on integrating bioinformatics datasets, adding metadata with the submitted bioinformatics datasets, centralized bioinformatics database, resources, and bioinformatics tools. I showed throughout analyzing the findings of this study that specialists who promote standardizing techniques, adding metadata, and centralization may increase efficiency in integrating distinct bioinformatics datasets. Bioinformaticians, bioinformatics providers, the health care field, and society might benefit from this research. Improvement in bioinformatics affects poistevely the health-care field which has a positive social change. The results of this study might also lead to positive social change in research institutions, such as reduced workload, less frustration, reduction in costs, and increased efficiency while integrating distinct bioinformatics datasets.

Page generated in 0.1353 seconds