• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 264
  • Tagged with
  • 476
  • 476
  • 476
  • 214
  • 178
  • 169
  • 155
  • 130
  • 128
  • 98
  • 88
  • 87
  • 70
  • 65
  • 62
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention

Johnson, David Philip 01 January 2017 (has links)
The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human InfoSec behavior. Applying sociobehavioral theories to InfoSec research provides information to aid IT security program managers in developing improved SETA programs. The purpose of this correlational study was to examine through the theoretical lens of the theory of planned behavior (TPB) how attitude toward the behavior (ATT), subjective norm (SN), and perceived behavioral control (PBC) affected the intention of computer end users in a K-12 environment to follow InfoSec policy. Data collection was from 165 K-12 school administrators in Northeast Georgia using an online survey instrument. Data analysis occurred applying multiple linear regression and logistic regression. The TPB model accounted for 30.8% of the variance in intention to comply with InfoSec policies. SN was a significant predictor of intention in the model. ATT and PBC did not show to be significant. These findings suggest improvement to K-12 SETA programs can occur by addressing normative beliefs of the individual. The application of improved SETA programs by IT security program managers that incorporate the findings and recommendations of this study may lead to greater information security in K-12 school systems. More secure school systems can contribute to social change through improved information protection as well as increased freedoms and privacy for employees, students, the organization, and the community.
92

The Impact of Transportation Infrastructure on Nigeria's Economic Developmeny

Agbigbe, William A 01 January 2016 (has links)
The United Nations Development Programme (UNDP) described Nigeria's road networks as one of the poorest and deadliest transportation infrastructural systems in the world. Data from the UNDP and the World Bank (WB) show that Nigeria has suffered transportation infrastructure deficits; these data also illustrate Nigeria as one of the lowest indices in economic development in the last decade. This qualitative case study addressed the impact of a lack of investment in transportation infrastructure in the form of road networks on Nigeria's economic development. The purpose of the study was to understand the relationship between the investment in road networks and economic development in Nigeria. The theoretical framework comprised Solow's economic growth theory and Frischmann's transportation infrastructure theory. Data were collected through personal interviews with a purposeful sample of 20 Nigerians including previous and current public and private sector transportation-linked individuals directly involved in investment, management, and policy administration. Interview data were compiled and organized using qualitative software for content analysis. Recurring responses were identified and patterns and trends documented from the data. Findings revealed corruption in awarding roads contracts, lack of contracts monitoring, and inefficient governance hindering economic development in Nigeria. This study supports positive social change by informing decision-makers that by investing in network of roads, that time to project completion and financial savings may promote economic development, thus improving the standard of living of Nigerians.
93

Enhancing Existing Disaster Recovery Plans Using Backup Performance Indicators

White, Gwen 01 January 2017 (has links)
Companies that perform data backup lose valuable data because they lack reliable data backup or restoration methods. The purpose of this study was to examine the need for a Six Sigma data backup performance indicator tool that clarifies the current state of a data backup method using an intuitive numerical scale. The theoretical framework for the study included backup theory, disaster recovery theory, and Six Sigma theory. The independent variables were implementation of data backup, data backup quality, and data backup confidence. The dependent variable was the need for a data backup performance indicator. An adapted survey instrument that measured an organization's data backup plan, originally administered by Information Week, was used to survey 107 businesses with 15 to 250 employees in the Greater Cincinnati area. The results revealed that 69 out of 107 small businesses did not need a data backup performance indicator and the binary logistic regression model indicated no significant relationship between the dependent and independent variables. The conclusion of the study is that many small businesses have not experienced a disaster and cannot see the importance of a data backup indicator that quantifies recovery potential in case of a disaster. It is recommended that further research is required to determine if this phenomenon is only applicable only to small businesses in the Greater Cincinnati area through comparisons based on business size and location. This study contributes to positive social change through improvement of data backup, which enables organizations to quickly recover from a disaster, thereby saving jobs and contributing to the stability of city, state, and national economies.
94

Adoption of Information and Communication Technology in Nigerian Small- to Medium-Size Enterprises

Okundaye, Kessington Enaye 01 January 2016 (has links)
Small- to medium-size enterprises (SMEs) play a vital role in a dynamic economy through job creation, poverty alleviation, and socioeconomic development in developed and developing countries. The purpose of this multiple case study was to explore how SME leaders in Lagos, Nigeria, adopted information and communication technology (ICT) as a business strategy to increase profitability and compete globally. Organizational leaders have adopted ICT so that their organizations can become more efficient, effective, innovative, and globally competitive. This study involved 4 SMEs that had successfully implemented ICT. The participants included 5 SME leaders from each of the SMEs. The data collection method included in-person semistructured interviews of participants and review of existing company data. Data were analyzed using inductive data analysis, which included member checking to ensure trustworthiness of interpretations and occurred until theoretical saturation had occurred. The technology acceptance model (TAM), which specifies the relationship between perceived usefulness, perceived ease of use, attitude toward computer use, and intention to use technology, was applied as a framework to explain the Nigerian SME's ICT adoption strategies. Four major themes emerged from the data analysis: ICT adoption factors, ICT roles and benefits, role of government, and SME success factors. The findings of this study may help SME leaders and government leaders address many of the factors inhibiting the adoption of ICT in SMEs. The findings of this study may positively affect social change by ensuring that SMEs are successful and able to create jobs, which in turn may help to alleviate poverty and promote socioeconomic development through adoption of ICT.
95

A Case Study on Social Media as an Effective Management Tool

Omolloh, Appolloh 01 January 2019 (has links)
In small businesses in the United States, specifically those with fewer than 10 employees, leaders may be skeptical of and resistant to the use of social media in their management operations. Management literature does not indicate clear and effective guidelines and policies detailing small marketing firms use of social media. The purpose of this qualitative case study was to explore the perceptions of small marketing firm leaders about the resources and knowledge needed for effective use of social media as a management tool. Emerson's social exchange theory grounded the study. The study targeted owners and managers of small marketing firms in Dallas, Texas, with three to five years of experience and firms who use social media in their firm management or operations. Twenty-three participants satisfied the criteria. Data were collected through interviews, questionnaires, and document reviews. Yin's 5-phase analysis was used to analyze the data. The primary result of the study is that small businesses that use social media in the Dallas, Texas, area reported various gains, including increased awareness about their business, valuable customer feedback, and customer retention. The study may have a positive social change impact by providing information on strategies and benefits of using social media as a management tool not only to small marketing firms in Texas, but also to very small businesses in other sectors.
96

Knowledge Sharing and Customer Relations in Mobility

Moore, Katie Dyretha 01 January 2019 (has links)
After the events of September 11, 2001, inadequacies in how government organizations and agencies shared knowledge and communication with defense mission partners became readily apparent. A reasonable U.S. government information technology expectation is the integrated use of mobile phones across organizations and agencies. Yet, it is difficult to meet this expectation, as the provisioning process for mobile devices can be different for each government organization or agency. The Department of Commerce National Institute of Standards and Technology does not set provisioning standards, and organizations and agencies determine policies tailored to their particular needs. Using Schein's theory on organizational culture, the focus of this phenomenological study was to explore the Mobility provisioning process from the experiences of government customer support personnel. Eleven personnel responded to 10 semistructured interview questions derived from the research question. The data were manually transcribed and then coded, arranged, and analyzed using a software tool. Three major themes emerged from the analyzed data: (a) expand communication with customers and leaders, (b) identify policy guidelines, and (c) streamline and centralize the process. Using these themes, recommendations include enhancing communication among stakeholders, provisioners, and Warfighters, soldiers in the field; implementing standardized user policies; and improving cross-€organization and cross-€agency provisioning processes. Social change actions include increasing mobility provisioning efficiencies among provisioners, which not only saves time and money, but also provides Warfighters with affordable, dependable, and reliable mobile communications systems.
97

Digital Strategies Senior Bank Executives in Mauritius use to Improve Customer Service

Sewpaul, Sailesh 01 January 2018 (has links)
Customers' use of digital banking has reshaped traditional banking, and senior level bank executives must know how to leverage this innovation to improve customer service to increase profitability. Using the technology acceptance model as the conceptual framework, the purpose of this multiple case study was to explore effective digital banking strategies that senior level executives used to improve customer service to increase profitability. The target population for this study included senior-level executives from 3 banks in Mauritius possessing successful development and implementation experience in digital banking strategies to improve customer service. Data were collected through semistructured interviews and organizational documents, which were analyzed in accordance with Yin's 5-phase data analysis process consisting of pattern matching, explanation building, time-series analysis, program logic models, and cross-case synthesis. The use of member checking and methodological triangulation increased the trustworthiness of data interpretations. Three themes emerged from the analysis of data: use of mobile strategies to migrate customers to digital banking, challenges to migrate customers to digital banking, and digital banking innovation. The implications of this study for positive social change include improving convenience to customers; promoting green banking; and providing easy access to banking to the poor, those with physical disabilities, and those living in remote and rural areas.
98

Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies

Brown, David A. 01 January 2017 (has links)
Target Corporation experienced an information security breach resulting in compromising customers' financial information. Management is responsible for implementing adequate information security policies that protect corporate data and minimize financial losses. The purpose of this experimental study was to examine the effect of a fear appeal communication on an individual's information security policy behavioral intention. The sample population involved information technology professionals randomly selected from the SurveyMonkey audience. A research model, developed using constructs from deterrence theory and protection motivation theory, became the structural model used for partial least squares-structural equation modeling (PLS-SEM) analysis of the survey response data, which indicated that self-efficacy was statistically significant. The remaining model variables, perceived threat vulnerability, perceived threat severity, response efficacy, informal sanction certainty, informal sanction severity, formal sanction certainty, and formal sanction severity, were not statistically significant. A statistically significant self-efficacy result could indicate confidence among the population to comply with information security policies. The nonsignificant results could indicate the fear appeal treatment did not motivate a change in behavior or information security policy awareness bias was introduced by selecting information technology professionals. Social change in information security could be achieved by developing an effective information security policy compliance fear appeal communication, which could change information security compliance behavior and contribute to securing the nation's critical cyber infrastructure and protecting data.
99

User-Centered Design Strategies for Clinical Brain-Computer Interface Assistive Technology Devices

Light, Geraldine 01 January 2019 (has links)
Although in the past 50 years significant advances based on research of brain-computer interface (BCI) technology have occurred, there is a scarcity of BCI assistive technology devices at the consumer level. This multiple case study explored user-centered clinical BCI device design strategies used by computer scientists designing BCI assistive technologies to meet patient-centered outcomes. The population for the study encompassed computer scientists experienced with clinical BCI assistive technology design located in the midwestern, northeastern, and southern regions of the United States, as well as western Europe. The multi-motive information systems continuance model was the conceptual framework for the study. Interview data were collected from 7 computer scientists and 28 archival documents. Guided by the concepts of user-centered design and patient-centered outcomes, thematic analysis was used to identify codes and themes related to computer science and the design of BCI assistive technology devices. Notable themes included customization of clinical BCI devices, consideration of patient/caregiver interaction, collective data management, and evolving technology. Implications for social change based on the findings from this research include focus on meeting individualized patient-centered outcomes; enhancing collaboration between researchers, caregivers, and patients in BCI device development; and reducing the possibility of abandonment or disuse of clinical BCI assistive technology devices.
100

Successful Strategies for Using Knowledge Management in Small and Medium-Sized Enterprises

Nsubuga-Mugoa, Josephine Kayaga 01 January 2019 (has links)
Knowledge management (KM) is vital for an organization to succeed in a highly dynamic and competitive world. The purpose of this multiple case study was to explore strategies that managers of small and medium-sized enterprises (SMEs) use to effectively integrate KM into business practices. The study population comprised 5 managers from 2 SMEs operating in Uganda. The eligibility criteria for this study were that participants had to be from Ugandan SMEs with a knowledge-intensive environment, managers with some responsibility of KM in the organization, and experienced with at least 1 year of successful KM practices. The conceptual framework for this study was theory z. Data were collected through face-to-face, semistructured interviews and reviews of company documents. Member checking was completed to strengthen credibility and trustworthiness. After methodological triangulation of the data sources collected and completion of Yin's 5-step process of data analysis, 5 themes emerged: having supportive leadership, ensuring sustainability, embedding KM practices in the organization culture, socialization, and embracing modern technology. The findings of this study might promote social change by supporting SME managers' use of KM to expand opportunities for employees to learn new skills and knowledge leading to the expansion of employment opportunities.

Page generated in 0.1357 seconds