• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1355
  • 927
  • 328
  • 224
  • 79
  • 63
  • 55
  • 42
  • 42
  • 36
  • 31
  • 27
  • 27
  • 21
  • 20
  • Tagged with
  • 3512
  • 1046
  • 631
  • 618
  • 577
  • 564
  • 424
  • 414
  • 395
  • 354
  • 326
  • 299
  • 273
  • 263
  • 240
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Prostorové modelování vybraných ekonomických ukazatelů obcí majících vztah na pohodu obyvatelstva

Rajsigl, Michal January 2010 (has links)
No description available.
132

Návrh IT infrastruktury pro provoz nadnárodního portálu

Ruprich, Tomáš January 2013 (has links)
No description available.
133

Factors for success in acquiring information technology

Jawad, Ali Qassim January 1995 (has links)
The acquisition of new IT systems is expensive and risky. Systems often fail to provide the expected services, or may commit an organisation to a particular long-term solution to its information management needs which can be very costly to change. The purpose of this research was to help organisations to manage the IT acquisition process with greater chances of success. In this research 'Acquisition of IT' means the whole process of initiating, implementing and then using an information technology system. The approach taken was to identify success factors for IT acquisition. A large number of actual acquisition cases were examined, and a list was compiled of factors reported by people involved in these cases to affect their success or otherwise. The relative importances of these factors were then measured quantitatively by correlating the degree to which each factor was present in the cases, with the degree of success of the cases. This work has produced: a comprehensive list of factors to be considered; a method of defining what is meant by success for a given project; a description of the acquisition project lifecycle; and an identification of the different roles played by different people within an organisation. It is shown how to integrate these considerations into a structured approach to managing IT acquisitions. This integrated approach is called the Success Map. Three mini case studies were included, and one of these was analysed in the light of the findings. In a supplementary section, fifteen guiding principles for people involved in an IT acquisition are presented.
134

Computer supported IT training for managers

Harun, Mazlan January 2000 (has links)
It is widely acknowledged that communications and information technologies (C&IT) have revolutionised organisational life. However, although C&I technologies have extensively entered the workplace, in many organisations they seem to be making very little contribution to the achievement of the goals of the organisation. The research that has been focused in this area has suggested that potential users in the organisations are perceived (and often perceive themselves) to have inadequate knowledge and skill to utilise the technologies effectively. It also indicates that the users frequently lack motivation to use the technologies because they feel that the technologies are insufficiently supportive of tasks, which they need to perform. This latter observation appears to be particularly important where the users have the choice as to whether and when they will use the technologies (i. e. they are 'discretionary' users) as is often the case with managers in a non-C&IT focused organisation. Service and an interest in the role of training in this process. As a starting point, a study of previous research work was undertaken which indicated that conventional training was likely to be of limited usefulness in this environment. It also indicated that C&IT based support systems in the workplace were being suggested as a possible The research presented in this thesis started from a perceived need to improve the effective utilisation of the new technologies by managers in the Malaysian Civil supplement to existing conventional training methods. These results were field tested by undertaking a survey of a sample of managers in the Malaysian Civil Service to determine their perception of existing training and to assess the potential acceptability of C&IT based support for their work. The results of the survey confirmed the other research studies by indicating that the existing training, while satisfactory in itself, did not seem particularly relevant to the workplace tasks that the managers needed to carry out. The results also indicated that the knowledge and skill gained through training had frequently been forgotten or lost by the time it was needed in the workplace. Finally, a significant number of the managers who were surveyed indicated that they were interested in `point of need' support and that, although they would prefer that support to come from people, they would be interested in trying a C&IT based system, if one were provided. An examination of the requirements for point of need support indicated that any system must include both information about the usage of the C&I technologies and equipment themselves and about the application of the technologies to the tasks which needed to be performed in the workplace. Given the spatial distribution of the managers and the relatively rapid evolution of the applications that the managers would be expected to use, it was postulated that a fully distributed system with `learning' capabilities would require. To test the principles involved a prototype Web based system was developed and released. Initial feedback has been collected and analysed and suggestions are made for the application of the findings to improving the effectiveness with which managers use communications and information technologies in the workplace.
135

IT Consumerization & Enterprise Architecture: An Exploratory Case Study

Zhou, Eric January 2017 (has links)
IT Consumerization is the phenomenon of consumer-originated and consumer-oriented technologies entering organizations and their corresponding organizational impacts, risks, and opportunities. IT Consumerization has fundamentally changed the way organizations respond to the technology needs of business users as well as the corresponding governance, management, and operational maintenance of information technology. Enterprise Architecture (EA), a practice and body of knowledge that views organizations and enterprises through architectural layers, has been posited as an effective tool in supporting the needs of IT Consumerization. This thesis addresses the question of what roles EA can play in the context of IT Consumerization as well as the general effectiveness and comprehensiveness of current EA frameworks in addressing IT Consumerization needs. Using a single case study design, this research study applied directed content analysis and a deductive thematic analysis approach to answer these questions. The initial set of codes and themes were derived from sensitizing concepts within The Open Group Architectural Framework (TOGAF). Findings from this research suggest that IT Consumerization is a complex domain characterized with unpredictability, unknown decision variables, and no single correct answer in the context of problem solving and decision making. Our research suggests that in order for an EA practice to help in IT Consumerization initiatives, organizations must ensure that EA practices are not limited to technical problem solving, and that they have the resources and skills required for business problem solving. While EA has often been positioned as an information technology function within many organizations, we argue that based on our findings, EA’s role within organizations can go beyond this traditionally technical focus, to include both advisory and strategic roles leveraging business skillsets to solve business problems. Our EA role framework is a significant departure from the widespread belief that EA practices start at the translation of business strategy to technology strategy, by proposing that EA can play a valuable role earlier in strategic processes such as business strategy development, direction setting, and change prioritization. This inquiry highlights some of the key interrelationships between EA and IT Consumerization.
136

IT Governance na MZV ČR - systémový pohled a praktické dopady / IT GOVERNANACE AT THE MINISTRY OF FOREIGN AFFAIRES OF THE CZECH REPUBLIC: SYSTEMIC APPROACH AND FIELD IMPLEMENTATION

Protiva, Tomáš January 2008 (has links)
The diploma thesis reacts on the interest of the Czech foreign ministry IT department to get an overview of ITIL 2 and COBIT 4.1 world-wide acknowledged IS/IT management best practice libraries. Both libraries are put in the framework of IT Governance theory and practice. COBIT is presented as world ITG standard, meaning the alignment of organization's strategic goals and IT goals. It is focused on organizations, where the shift of IT perception towards a strategic partnership with the business is driven by top-down board initiative. On the other hand, the ITIL core texts Service Support and Service Delivery are treated as a standard of IT service management, suitable as a framework to establish processes within the foreign ministry's IT department. Three alternative implementations of the two libraries are shown, in a situation of non-existent process management and information architecture. Moreover, the IT Governance initiative has a bottom-up character. The first variant connects ITIL and COBIT process models to the goals and projects outlaid in the 2008-2010 IT Strategy draft (IT BSC was used in the strategy to set up goals). The COBIT processes are aligned to the IT BSC domains and projects; further on, more detailed ITIL tools are assigned to the COBIT processes using the toolbox [IT GOVERNANCE INSTITUTE; OFFICE OF GOVERNMENT COMMERCE. Aligning COBIT, ITIL and ISO 17799 for Business Benefit]. As the projects formulated in the IT Strategy don't focus on the fundaments of process management, a stepwise approach to document the current processes using the ITIL: Service Support and Service Delivery framework is suggested. The second variant came into reality in mid 2008: COBIT has been used without success to estimate users' preferences. The reasons of the failure are discussed. Czech translation of COBIT 4.1 maturity models by the author intended to use as one of the tools in the opinion poll is attached as Annex 2. The last variant is not directly aligned to the problems of foreign ministry's IT/IS, but it is the most pragmatic guide to the implementation of the libraries. As an external help desk has been already launched, I suggest the establishment of ITIL Incident Management and Problem Management processes, supported with a CMDB configuration database.
137

Charakteristika IT infrastruktury / Characteristics of IT infrastructure

Křena, Martin January 2013 (has links)
The theme of this thesis is the IT infrastructure in enterprises in the Czech Republic. Nowadays IT infrastructure exists in all companies which are trying to succeed in the competition. Outputs (services) of IT infrastructure should be monitored and managed so the company could most effectively support their core processes. For monitoring and man-agement processes can be used a variety of tools designed for management of information systems. This work deals with the evaluation of the level of IT infrastructures service man-agement. The aim of this thesis is to assess the level of IT infrastructure services manage-ment in the selected company. This work establishes methods showing appreciation of IT infrastructure service level that is applicable in all companies, regardless of their orientation. In conclusion, the methodology is tested on a real company from the IT environment.
138

Sustainability of Preparations Programs Initiated through the Information Technology (IT) Professionals in Health Care Program

Scott, Nena Parrish 14 December 2018 (has links)
In 2010, the Office of National Coordinator (ONC), a branch of the federal government, launched a program called the IT Professionals in Health Care Program. The Program was intended to address the anticipated shortage of skilled workers in health information technology (HIT) and electronic health records (EHRs). According to the National Opinion Research Center (NORC, 2014), the ONC estimated a shortfall of 51,000 HIT workers over 5 years in terms of the number that would be needed to fully support health care providers and facilities in the adoption of EHRs. The growing demand for HIT professionals did not match the number of graduates that the health institutions were releasing into the job market. This pattern necessitated the training of more HIT professionals to reduce the predicted market deficit. The need for persons with specialized skill in HIT once again placed the community colleges in a central role in providing training of a workforce that can meet the market demand for employees with knowledge, skills and competencies in HIT. The current study is intended as a follow-up to that evaluation and seeks to identify the sustainability of the preparation programs initiated through the IT Professionals in Health Care Program in Region D colleges, which are those colleges in a consortium of 11 southern states. The study was conducted as a qualitative study in which 6 program directors at 6 of the 20 participating community colleges in region D were interviewed regarding their perceptions of the sustainability of the Health IT Workforce Development Program. In addition, websites and curriculum guides were analyzed so that the data could be triangulated with the interview responses. Interviews of the 6 program directors revealed that difficulties arose when employers questioned if students completing the program would be ready to take on the responsibilities necessary for the demanding positions that were available in the healthcare IT workforce. The 6 program directors interviewed stated a key area of improvement would have been to add a practicum that allowed for hands on experience as well as ensuring a suitable workload to for the program.
139

Information technology certification programs and perceptions of attitude and need by high school principals, information technology teachers, and information technology professionals in Ohio

Randall, Michael H. 15 March 2006 (has links)
No description available.
140

Towards eXplainable Artificial Intelligence (XAI) in cybersecurity

Lopez, Eduardo January 2024 (has links)
A 2023 cybersecurity research study highlighted the risk of increased technology investment not being matched by a proportional investment in cybersecurity, exposing organizations to greater cyber identity compromise vulnerabilities and risk. The result is that a survey of security professionals found that 240\% expected growth in digital identities, 68\% were concerned about insider threats from employee layoffs and churn, 99\% expect identity compromise due to financial cutbacks, geopolitical factors, cloud adoption and hybrid work, while 74\% were concerned about confidential data loss through employees, ex-employees and third party vendors. In the light of continuing growth of this type of criminal activity, those responsible for keeping such risks under control have no alternative than to use continually more defensive measures to prevent them from happening and causing unnecessary businesses losses. This research project explores a real-life case study: an Artificial Intelligence (AI) information systems solution implemented in a mid-size organization facing significant cybersecurity threats. A holistic approach was taken, where AI was complemented with key non-technical elements such as organizational structures, business processes, standard operating documentation and training - oriented towards driving behaviours conducive to a strong cybersecurity posture for the organization. Using Design Science Research (DSR) guidelines, the process for conceptualizing, designing, planning and implementing the AI project was richly described from both a technical and information systems perspective. In alignment with DSR, key artifacts are documented in this research, such as a model for AI implementation that can create significant value for practitioners. The research results illustrate how an iterative, data-driven approach to development and operations is essential, with explainability and interpretability taking centre stage in driving adoption and trust. This case study highlighted how critical communication, training and cost-containment strategies can be to the success of an AI project in a mid-size organization. / Thesis / Doctor of Science (PhD) / Artificial Intelligence (AI) is now pervasive in our lives, intertwined with myriad other technology elements in the fabric of society and organizations. Instant translations, complex fraud detection and AI assistants are not the fodder of science fiction any longer. However, realizing its bene fits in an organization can be challenging. Current AI implementations are different from traditional information systems development. AI models need to be trained with large amounts of data, iteratively focusing on outcomes rather than business requirements. AI projects may require an atypical set of skills and significant financial resources, while creating risks such as bias, security, interpretability, and privacy. The research explores a real-life case study in a mid-size organization using Generative AI to improve its cybersecurity posture. A model for successful AI implementations is proposed, including the non-technical elements that practitioners should consider when pursuing AI in their organizations.

Page generated in 0.018 seconds