• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 63
  • 25
  • 13
  • 12
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 129
  • 129
  • 129
  • 54
  • 47
  • 27
  • 24
  • 23
  • 23
  • 22
  • 19
  • 18
  • 16
  • 15
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Cooperative design of a cross-age tutoring system based on a social networking platform

Chimbo, Bester 11 1900 (has links)
In South Africa, many young children from poor social and economic backgrounds are cared for at home by parents or guardians who are themselves illiterate. This leads to poor educational outcomes later in life. Yet there are many privileged teenagers with access to mobile technologies who spend a greater portion of their spare time interacting on ubiquitous social media platforms. This presents an opportunity whereby the poor educational outcomes referred to previously could be addressed by applying a technology solution providing social media-based homework support by privileged teenagers to underprivileged younger children. However, most applications designed for use by children are designed by adults, with little understanding of the user requirements of the target end users. This research explores the following question: How can a cross-age tutoring system be designed for implementation on a social networking platform to support numeracy and literacy skill acquisition? The main contribution of this research was the definition of the Cooperative design by Children for Children (CD2C) Design Framework, a blueprint of how a cross-age tutoring system could be co-designed by children of different age groups and life circumstances. The CD2C Design Framework was derived as an abstraction of the second contribution of this research, the TitanTutor, an artifact designed using co-operative inquiry method and the Design Science Research approach. The third novelty of this research was contribution to Design Science Research theory, with the addition of new theory that states that cooperative design by children from different age groups and life circumstances is tempered by socio-environmental context and power relations between the co-design partners. This work provided important contributions to researchers in the areas of Cooperative Inquiry (CI), Human Computer Interaction (HCI), and Design Science Research (DSR). Future researchers could extend the CD2C Design Framework to make it even more abstract, thereby making it universally applicable to any co-design scenario. / Computing / Ph. D. (Information Systems)
122

A methodology for the evaluation of management information systems at public technical and vocational education and training colleges in South Africa

Visser, Margaretha Maria 09 1900 (has links)
The support and promotion of public Technical and Vocational Education and Training (TVET) Colleges is fundamental in addressing South Africa’s intermediate-level and artisanal skills as shortages in these areas contribute to considerable unemployment in South Africa. These institutions have been earmarked by the South African government for extensive growth. Therefore, efficient and effective management and accurate decision-making within these institutions are essential. The evaluation of the management information systems (MISs) within these institutions, which provide data and information to inform institutional short-term and long-term management decision-making and day-to-day operations, should take place on a regular basis to so enhance the reliability and accuracy of the data and information. The problem is that no evidence of a methodology (artefact) for the evaluation of MISs at public TVET Colleges in South Africa could be found in the literature. Therefore, the rationale for this study is to develop a methodology for the evaluation of MISs at public TVET Colleges in South Africa. Hence the main research question for the study was formulated as: What are the components that constitute a methodology for the evaluation of a MIS at a public TVET College in South Africa? The study was conducted according to a design science paradigm. Design science is underpinned by a pragmatic philosophical paradigm which considers thought as a tool for prediction, problem solving and action. The Design Science Research Process (DSRP) model informed the research process utilised to develop the artefact for this problem centred initiated study. The iterated activities of the DSRP model which include: design, demonstrate, evaluate and and communicate, contributed to the refinement of the methodology (artefact). The artefact mainly underwent experimental evaluation to demonstrate its applicability. The methodology (artefact) was empirically evaluated at three cluster-random selected public TVET Colleges after all colleges, with similar MIS maturity levels, were clustered into groups.The study contributed to the extant knowledge base of: theory building, on different levels. The main theoretical contribution is the final evaluated methodology (DSR artefact) which enables IT practitioners and MIS managers at public TVET Colleges in South Africa to evaluate their MISs on a regular basis. The methodology (artefact) presents a theory for design and action which satisfies the conditions of importance, parsimony and novelty on a micro-level. The study furthermore contributed to the extant literature on the theory of MIS success evaluation by contributing to theory on the measurement of MIS success constructs and measuring of the relationships between the constructs. Another theoretical contribution is the innovative evidence-based method by which the public TVET Colleges were clustered. The clustering method was used to ensure a more rigorous sample selection technique than purposive or convenient sample selection of cases and is generalisable to other knowledge domain contexts. The research study furthermore produced results of interest to both technology-focused and management-focused audiences. For technology-focused audiences the processes by which the artefact was constructed and evaluated are described, thus establishing repeatability of the study and building the knowledge base for further research extensions by future design science researchers. The rigour of the artefact design process was complemented by a thorough presentation of the experimental design of the artefact’s field test in three public TVET College environments which provides sufficient detail for management audiences to determine if sufficient organisational resources exist for utilisation of the artefact. / Information Science / Ph. D. (Information Systems)
123

A methodology for the evaluation of management information systems at public technical and vocational education and training colleges in South Africa

Visser, Margaretha Maria 09 1900 (has links)
The support and promotion of public Technical and Vocational Education and Training (TVET) Colleges is fundamental in addressing South Africa’s intermediate-level and artisanal skills as shortages in these areas contribute to considerable unemployment in South Africa. These institutions have been earmarked by the South African government for extensive growth. Therefore, efficient and effective management and accurate decision-making within these institutions are essential. The evaluation of the management information systems (MISs) within these institutions, which provide data and information to inform institutional short-term and long-term management decision-making and day-to-day operations, should take place on a regular basis to so enhance the reliability and accuracy of the data and information. The problem is that no evidence of a methodology (artefact) for the evaluation of MISs at public TVET Colleges in South Africa could be found in the literature. Therefore, the rationale for this study is to develop a methodology for the evaluation of MISs at public TVET Colleges in South Africa. Hence the main research question for the study was formulated as: What are the components that constitute a methodology for the evaluation of a MIS at a public TVET College in South Africa? The study was conducted according to a design science paradigm. Design science is underpinned by a pragmatic philosophical paradigm which considers thought as a tool for prediction, problem solving and action. The Design Science Research Process (DSRP) model informed the research process utilised to develop the artefact for this problem centred initiated study. The iterated activities of the DSRP model which include: design, demonstrate, evaluate and communicate, contributed to the refinement of the methodology (artefact). The artefact mainly underwent experimental evaluation to demonstrate its applicability. The methodology (artefact) was empirically evaluated at three cluster-random selected public TVET Colleges after all colleges, with similar MIS maturity levels, were clustered into groups. The study contributed to the extant knowledge base of: theory building, on different levels. The main theoretical contribution is the final evaluated methodology (DSR artefact) which enables IT practitioners and MIS managers at public TVET Colleges in South Africa to evaluate their MISs on a regular basis. The methodology (artefact) presents a theory for design and action which satisfies the conditions of importance, parsimony and novelty on a micro-level. The study furthermore contributed to the extant literature on the theory of MIS success evaluation by contributing to theory on the measurement of MIS success constructs and measuring of the relationships between the constructs. Another theoretical contribution is the innovative evidence-based method by which the public TVET Colleges were clustered. The clustering method was used to ensure a more rigorous sample selection technique than purposive or convenient sample selection of cases and is generalisable to other knowledge domain contexts. The research study furthermore produced results of interest to both technology-focused and management-focused audiences. For technology-focused audiences the processes by which the artefact was constructed and evaluated are described, thus establishing repeatability of the study and building the knowledge base for further research extensions by future design science researchers. The rigour of the artefact design process was complemented by a thorough presentation of the experimental design of the artefact’s field test in three public TVET College environments which provides sufficient detail for management audiences to determine if sufficient organisational resources exist for utilisation of the artefact. / Information Science / Ph. D. (Information Systems)
124

Automating the monotonous workflow : Mobile application development and deployment / Automatisera det monotona arbetsflödet : Mobil applikationsutveckling och distribution

Vakilalroayayi, Ahmadreza January 2021 (has links)
To create, update, or deploy a mobile application, a collection of hand-operated works must be satisfied. In this project, regardless of the mobile application's code and its core functionalities, which can be an e-book, an application, or even a mobile game, we will study how to automate, visualize and simplify the following manual procedures: 1.Create a remote Git repository for the mobile application. 2.Constructing or altering the mobile application's configuration or graphical contents. 3.Push all changes to the remote Git repository. 4.Deploy or distribute the mobile application from its Git repository after each push. / För att skapa, uppdatera eller distribuera en mobilapplikation måste en samling handstyrda verk uppfyllas. I detta projekt, oavsett mobilapplikationens kod och dess kärnfunktioner, som kan vara en e-bok, en applikation eller till och med ett mobilspel, kommer vi att studera hur man automatiserar, visualiserar och förenklar följande manuella procedurer: 1. Skapa ett avlägset Git -arkiv för mobilapplikationen. 2.Konstruera eller ändra mobilapplikationens konfiguration eller grafiska innehåll. 3.Push alla ändringar i det externa Git -arkivet. 4. Distribuera mobilappen från sitt Git -arkiv efter varje ändring.
125

A context-aware business intelligence framework for South African Higher Institutions

Mutanga, Alfred January 2016 (has links)
PhD (Business Management) / Department of Business Management / This thesis demonstrates the researcher’s efforts to put into practice the theoretical foundations of information systems research, in order to come up with a context-aware business intelligence framework (CABIF), for the South African higher education institutions. Using critical realism as the philosophical underpinning and mixed methods research design, a business intelligence (BI) survey was deployed within the South African public higher education institutions to measure the respondents’ satisfaction and importance of business intelligence characteristics. The 258 respondents’ satisfaction and importance of the 34 observed business intelligence variables, were subjected to principal components analysis and design science research to come up with the CABIF. The observable BI variables were drawn from four latent variables namely technology and business alignment; organizational and behavioural strategies; business intelligence domain; and technology strategies. The study yielded good values for all the observed satisfaction and importance business intelligence variables as indicated by the Kaiser- Meyer-Olkin (KMO) Measure of Sampling Adequacy and the Bartlett Test of Sphericity. The data set collected from the survey deployed at the South African public higher education institutions, was reliable and valid based on the Cronbach α values which were all above 0.9. The researcher then used the descriptive and prescriptive knowledge of design science research, and the meta-inferences of the results from the principal components analysis to produce five contexts of CABIF. The BI contexts developed were, the Basic Context; the Business Processes Context which was divided into Macro and Micro business process contexts; the Business Intelligence Context; and the Governance Context. These contexts were extrapolated within the University of Venda’s business processes and this researcher concluded that the CABIF developed, could be inferred within the South African higher education institutions. At the University of Venda, this researcher managed to draw up CABIF based business intelligence tools that spanned from leveraging the existing ICT infrastructure, student cohort analysis, viability of academic entities, strategic enrolment planning and forecasting government block grants. The correlations and regression measures of the technology acceptance variables of the business intelligence tools modelled using CABIF at University of Venda, revealed high acceptance ratio. Overall, this research provides a myriad of conceptual and practical insights into how contextualised aspects of BI directly or indirectly impact on the quality of managerial decision making within various core business contexts of South African higher education institutions.
126

Green Information Systems in der digitalen Gesellschaft - Eine multimethodische und multiperspektivische Analyse der Technologieakzeptanz

Warnecke, Danielle 02 March 2021 (has links)
Im Fokus der Dissertation steht die Erforschung nachhaltiger Effekte durch Informationssysteme, insbesondere Ansatzpunkte zur Nachhaltigkeitstransformation der Gesellschaft durch Methoden und Artefakte der Green Information Systems (Green IS). Als Green IS werden sozio-technische Informationssysteme bezeichnet, die neben wirtschaftlichen Kriterien der ressourceneffizienten Bereitstellung von Informationen, der Koordination und Kommunikation auch die ökologische und soziale Dimension gemäß der „Triple Bottom Line“ (Drei-Säulen-Modell der nachhaltigen Entwicklung) adressieren. Der Anwendungsbereich von Green IS liegt auf der Reduktion von Umweltbelastungen und der Bewältigung komplexer Umweltherausforderungen durch sozio-technische Informationssysteme. Neben Forschungsthemen der (Wirtschafts-)Informatik und der Wirtschaftswissenschaften werden Bereiche der Psychologie und Sozialwissenschaften zu Fragen der digitalen Nachhaltigkeitstransformation, der Nachhaltigkeitsbewertung sowie Akzeptanzforschung behandelt. Aufgrund der Komplexität und Vielschichtigkeit des Themas wird ein multimethodischer Forschungsansatz verfolgt, indem sowohl qualitative als auch quantitative Methoden zum Einsatz kommen. Die zentralen Forschungsfragen lauten dabei wie folgt: FF1. Welchen Beitrag können Green IS auf Makro- und Meso-Ebene zur Nachhaltigkeitsbewertung leisten und welchen Reifegrad weisen sie auf? FF2. Inwiefern können digitale Geschäftsmodelle zur unternehmerischen und gesellschaftlichen Nachhaltigkeitstransformation beitragen? FF3. Kann durch gezieltes Nachhaltigkeitsmarketing die Akzeptanz von Green IS in der Gesellschaft gefördert werden? Gemäß der Design Science Research werden Verfahren zur Nachhaltigkeitsbewertung für Smart City Mobilitätsstrategien und betriebliche Umweltinformationssysteme (BUIS) des produzierenden Gewerbes konstruiert. Es wird ein Prototyp zum webbasierten Benchmark solcher Smart City Initiativen realisiert. Das entwickelte Geschäftsprozessmodell zeigt auf, inwiefern eine Transformation zur Plattformorganisation im Rahmen von Open Innovation für Industriebetriebe erfolgreich gelingen kann. Die quantitativen Erhebungen zeigen auf, das vor allem hochpreisige Informations- und Kommunikationstechnologie (IKT) für Geschäftsmodelle der Sharing Economy geeignet ist sowie, dass die Akzeptanz nachhaltiger IKT in der Gesellschaft bereits insbesondere bei Zugehörigen des "Lifestyle of Health and Sustainability" (LOHAS) vorhanden ist und der weiteren Förderung durch geeignete Verbraucher-Symbole bedarf.
127

Collaborative Network Management: Ein abhängigkeitsbasierter Ansatz zur Planung, Kontrolle und Steuerung von Unternehmensnetzwerken

Zarvić, Novica 27 November 2013 (has links)
In dieser Arbeit werden Unternehmensnetzwerke aus einer abhängigkeitsbasierten Perspektive betrachtet und es wird ein Beitrag zum Management solcher Netzwerke geleistet. Unter dem Begriff Management wird im Kontext dieser Arbeit die ganzheitliche Planung, Kontrolle und Steuerung verstanden. Dabei wurden in sechs wissenschaftlichen Erst- und Koautorenschaften diverse gestaltungsorientierte Forschungsergebnisse in Form von Design-Science-Artefakten entwickelt. Mit deren Hilfe können Managementaktivitäten in den Bereichen Business-IT-Alignment, Partnerauswahl in Netzwerken, sowie IT-Governance auf der Basis von Abhängigkeiten mit interorganisationaler Ausprägung betrachtet und gemeistert werden. In dieser kumulativen Dissertationsschrift werden die Resultate entlang des Lebenszyklus von Unternehmensnetzwerken eingeordnet, wodurch die Relevanz der eingereichten Artikel auf die einzelnen Netzwerklebensphasen gespiegelt wird. Zudem werden sowohl theoretische als auch praktische Implikationen der Resultate diskutiert. Insgesamt tragen sowohl die ganzheitliche Sichtweise als auch der interdisziplinäre Charakter der Ausarbeitungen zu einem gesteigerten Verständnis von Abhängigkeitsbeziehungen in Unternehmensnetzwerken bei.
128

User Experience Engineering Adoption and Practice: A Longitudinal Case Study

Redfearn, Brady Edwin 09 August 2013 (has links) (PDF)
User Experience Engineering (UxE) incorporates subject areas like usability, HCI, interaction experience, interaction design, "human factors", ergonomics", cognitive psychology", behavioral psychology and psychometrics", systems engineering", [and] "computer science," (Hartson, 1998). It has been suggested that UxE will be the main success factor in organizations as we enter the "loyalty decade" of software development, where the repeat usage of a product by a single customer will be the metric of product success (Alghamdi, 2010; Law & van Schaik, 2010, p. 313; Nielsen, 2008; Van Schaik & Ling, 2011). What is relatively unknown in the current academic literature is whether existing UxE methodologies are effective or not when placed in a longitudinal research context (Law & van Schaik, 2010). There is room for the exploration of the effects of long-term UxE practices in a real-world case study scenario. The problem, addressed in this study, is that a lack of the application of UxE-related processes and practices with an industrial partner had resulted in customer dissatisfaction and a loss of market share. A three-year case study was performed during which 10 UxE-related metrics were gathered and analyzed to measure the improvements in the design of the customer's experience that long-term UxE practices could bring to a small corporate enterprise. The changes that occurred from the corporate and customer's point of view were analyzed as the customer's experience evolved throughout this long-term UxE study. Finally, an analysis of the problems and issues that arose in the implementation of UxE principles during the application of long-term UxE processes was performed. First-hand training between the research team and company employees proved essential to the success of this project. Although a long-term UxE process was difficult to implement within the existing development practices of the industrial partner, a dramatic increase in customer satisfaction and customer engagement with the company system was found. UxE processes led to increased sales rates and decreased development costs in the long-term. All 10 metrics gathered throughout this study showed measurable improvements after long-term UxE processes and practices were adopted by the industrial partner.
129

Dynamic Risk Management in Information Security : A socio-technical approach to mitigate cyber threats in the financial sector / Dynamisk riskhantering inom informationssäkerhet : Ett sociotekniskt tillvägagångssätt för att hantera cyberhot i den finansiella sektorn

Lundberg, Johan January 2020 (has links)
In the last decade, a new wave of socio-technical cyber threats has emerged that is targeting both the technical and social vulnerabilities of organizations and requires fast and efficient threat mitigations. Yet, it is still common that financial organizations rely on yearly reviewed risk management methodologies that are slow and static to mitigate the ever-changing cyber threats. The purpose of this research is to explore the field of Dynamic Risk Management in Information Security from a socio-technical perspective in order to mitigate both types of threats faster and dynamically to better suit the connected world we live in today. In this study, the Design Science Research methodology was utilized to create a Dynamic Information Security Risk Management model based on functionality requirements collected through interviews with professionals in the financial sector and structured literature studies. Finally, the constructed dynamic model was then evaluated in terms of its functionality and usability. The results of the evaluation showed that the finalized dynamic risk management model has great potential to mitigate both social and technical cyber threats in a dynamic fashion. / Under senaste decenniet har en ny våg av sociotekniska cyberhot uppkommit som är riktade både mot de sociala och tekniska sårbarheterna hos organisationer. Dessa hot kräver snabba och effektiva hotreduceringar, dock är det fortfarande vanligt att finansiella organisationer förlitar sig på årligen granskade riskhanteringsmetoder som både är långsamma och statiska för att mildra de ständigt föränderliga cyberhoten. Syftet med denna forskning är att undersöka området för dynamisk riskhantering inom informationssäkerhet ur ett sociotekniskt perspektiv, med målsättningen att snabbare och dynamiskt kunna mildra bägge typerna av hot för att bättre passa dagens uppkopplade värld.  I studien användes Design Science Research för att skapa en dynamisk riskhanteringsmodell med syfte att hantera sociotekniska cyberhot mot informationssäkerheten. Riskhanteringsmodellen är baserad på funktionskrav insamlade genom intervjuer med yrkesverksamma inom finanssektorn, samt strukturerade litteraturstudier.  Avslutningsvis utvärderades den konstruerade dynamiska modellen avseende dess funktionalitet och användbarhet. Resultaten av utvärderingen påvisade att den slutgiltiga dynamiska riskhanteringsmodellen har en stor potential att mitigera både sociala och tekniska cyberhot på ett dynamiskt sätt.

Page generated in 0.0757 seconds