• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2818
  • 925
  • 437
  • 78
  • 70
  • 64
  • 56
  • 44
  • 37
  • 36
  • 35
  • 16
  • 15
  • 13
  • 13
  • Tagged with
  • 5188
  • 5188
  • 1227
  • 845
  • 818
  • 778
  • 734
  • 593
  • 540
  • 469
  • 468
  • 452
  • 400
  • 356
  • 345
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.

Controlling information technology costs and reporting ROI in large organizations

Jones, Darrell. January 2008 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2008. / Title from PDF title page (viewed on Feb. 03, 2009). Includes bibliographical references.

The value of information technology an empirical study of the impact of IT capabilities and IT use on economic growth and on organizational performance in Taiwan /

Wang, Hsiao-Hui. January 1997 (has links)
Thesis (Ph. D.)--University of Hawaii, 1997. / eContent provider-neutral record in process. Description based on print version record.

Investigating the need for costing and estimating in information technology academic programs at technikons /

Khan, Gillian. January 1900 (has links)
Thesis (MTech (Information Technology))--Peninsula Technikon, 2005. / Word processed copy. Summary in English. Includes bibliographical references (leaves 80-82). Also available online.

Efficiency enhancing effects of IT investment on other factor inputs and accounting identity approach to value of IT

Mittal, Neeraj. January 2004 (has links)
Thesis (Ph. D.)--Ohio State University, 2004. / Title from first page of PDF file. Document formatted into pages; contains xi, 120 p.; also includes graphics. Includes bibliographical references (p. 115-120). Available online via OhioLINK's ETD Center.

A study of persistence factors of nontraditional students enrolled in noncredit information technology programs in the Advantage Valley Community College Consortium

Brown, Steven Lee. January 2008 (has links)
Thesis (Ed.D.)--Marshall University, 2008. / Title from document title page. Includes abstract. Document formatted into pages: contains 114 p. Includes bibliographical references (p. 87-98).

Legal requirements acquisition for the specification of legally compliant information systems

Breaux, Travis Durand. January 2009 (has links) (PDF)
Thesis (Ph.D.)--North Carolina State University, 2009. / Includes bibliographical references (leaves 92-105) and index. Also available online.

Applying COBIT in an ERP environment, with specific reference to Qmuzik /

Kieviet, Frèda. January 2006 (has links)
Assignment (MRek)--University of Stellenbosch, 2006. / Bibliography. Also available via the Internet.

A framework for the governance of information security

Edwards, Charles K. 14 February 2014 (has links)
<p> Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant interest in the recent past on how human compliance to information security policy can be achieved in an organization. Various models have been proposed by these researchers. However, there are very few models that have tried to link human commitment attributes with information security governance of an organization. The research problem of this study was to identify the security controls and mechanisms to govern information security effectively. The proposed model was based on agency theory and comprises a relationship between human commitment variables (ethics, integrity and trust) with security governance variables (structural, relational and process) referred as systemic variables in the research. The resulting correlation is further related with governance objectives (goal congruence and reducing information asymmetry) to hypothesize an effective information security in an organization. The research model proposed was tested employing confirmatory factor analysis (CFA) and structural equation modeling (SEM). There were four models tested in this research. The first model (initial measurement model) comprised human variables linked with relational and the systemic variables linked with goal congruence and information asymmetry. This model could not get through the CFA tests. A modified model comprising human and systemic attributes related with goal congruence and information asymmetry, separately, was taken forward to SEM. This model returned low model fitment scores and hence two alternate models were tested. In the first alternative, the human attributes were related with goal congruence and systemic attributes were linked with information asymmetry. In the second alternative, the relationships of the first alternatives were retained and two alternate relationships were introduced - integrity was linked with information asymmetry and structural was linked with goal congruence. Both models are very close to good model fitment scores. However, the second alternative returned better results and hence, was chosen as the final outcome of the research. The model reflects that human attributes and systemic attributes are fairly independent in an effective information security framework, and drive goal congruence and information asymmetry, respectively. However, integrity is an important human commitment for ensuring information asymmetry and the right organizational structure and roles are important for ensuring goal congruence.</p>

The effect of North American Electric Reliability Corporation critical infrastructure protection standards on bulk electric system reliability

Ladendorff, Marlene Z. 05 November 2014 (has links)
<p> Compliance with regulations may not automatically produce a secure infrastructure. In the United States energy critical infrastructure sector, compliance with regulatory cyber security standards may not necessarily mean that an entity would be able to withstand a cyber attack on critical assets potentially supporting the reliability of the Bulk Electric System (BES). This qualitative exploratory inquiry study researched technical opinions of cyber security professionals in the energy critical infrastructure industry regarding the effect of the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards on the reliability of the BES. NERC entities had been required to be compliant with the standards for several years at the time this study was undertaken. There has been speculation regarding the efficacy of the standards to impact the reliability of the BES. However, there was a lack of scholarly or professional literature confirming assumptions concerning BES reliability. In this study, data was gathered through interviews with individuals who were CIP implementation experts. The purpose of this study was to identify a theme or themes regarding changes in the reliability of the BES as a result of the NERC CIP standards implementation. Interview data from the study generated 9 themes including a theme for the research question indicating that reliability of the BES had improved as a result of the implementation and enforcement of the CIP standards. Some of the more prominent themes included NERC fines having influenced entities in the implementation of the standards; entities have been more concerned about CIP compliance than securing their equipment; and entities have removed equipment from their facilities in order to avoid the requirements, and the associated expense, the standards would demand.</p>

Ranked Similarity Search of Scientific Datasets| An Information Retrieval Approach

Megler, Veronika Margaret 13 September 2014 (has links)
<p>In the past decade, the amount of scientific data collected and generated by scientists has grown dramatically. This growth has intensified an existing problem: in large archives consisting of datasets stored in many files, formats and locations, how can scientists find data relevant to their research interests? We approach this problem in a new way: by adapting Information Retrieval techniques, developed for searching text documents, into the world of (primarily numeric) scientific data. We propose an approach that uses a blend of automated and curated methods to extract metadata from large repositories of scientific data. We then perform searches over this metadata, returning results ranked by similarity to the search criteria. We present a model of this approach, and describe a specific implementation thereof performed at an ocean-observatory data archive and now running in production. Our prototype implements scanners that extract metadata from datasets that contain different kinds of environmental observations, and a search engine with a candidate similarity measure for comparing a set of search terms to the extracted metadata. We evaluate the utility of the prototype by performing two user studies; these studies show that the approach resonates with users, and that our proposed similarity measure performs well when analyzed using standard Information Retrieval evaluation methods. We performed performance tests to explore how continued archive growth will affect our goal of interactive response, developed and applied techniques that mitigate the effects of that growth, and show that the techniques are effective. Lastly, we describe some of the research needed to extend this initial work into a true &ldquo;Google for data&rdquo;. </p>

Page generated in 0.1513 seconds