• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2879
  • 958
  • 497
  • 79
  • 70
  • 64
  • 56
  • 44
  • 39
  • 37
  • 36
  • 19
  • 16
  • 15
  • 13
  • Tagged with
  • 5364
  • 5364
  • 1268
  • 858
  • 846
  • 807
  • 757
  • 611
  • 553
  • 520
  • 481
  • 481
  • 413
  • 398
  • 384
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

The application of natural language processing to open source intelligence for ontology development in the advanced persistent threat domain

Holzer, Corey T. 09 March 2017 (has links)
<p> Over the past decade, the Advanced Persistent Threat (APT) has risen to forefront of cybersecurity threats. APTs are a major contributor to the billions of dollars lost by corporations around the world annually. The threat is significant enough that the <i>Navy Cyber Power 2020</i> plan identified them as a &ldquo;must mitigate&rdquo; threat in order to ensure the security of its warfighting network. </p><p> Reports, white papers, and various other open source materials offer a plethora of information to cybersecurity professionals regarding these APT attacks and the organizations behind them but mining and correlating information out of these various sources needs the support of standardized language and a common understand of terms that comes from an accepted APT ontology. </p><p> This paper and its related research applies the science of Natural Language Processing Open Source Intelligence in order to build an open source Ontology in the APT domain with the goal of building a dictionary and taxonomy for this complex domain.</p>
12

Factors Influencing the Adoption of Bring Your Own Device Policies in the United States Healthcare Industry

Moore, Phyllis Y. 24 January 2019 (has links)
<p> The trend of using personally owned mobile devices such as smartphones and tablets in the workplace, referred to as Bring Your Own Device (BYOD), is being rapidly adopted by U.S. healthcare organizations. Because of the many advantages of BYOD policies, this trend is expected to continue. However, the use of personally owned devices in healthcare settings does present risks and challenges to health information technology professionals responsible for data security. A research gap exists as scholars have not yet identified what factors influence healthcare professionals&rsquo; intentions to accept and use an organization&rsquo;s BYOD policy. Using the technology adoption model (TAM) as a theoretical framework, the variables of perceived trust, perceived usefulness (PU), and perceived ease of use (PEOU) were examined to better understand the phenomenon of BYOD adoption in U.S. healthcare industry. A nonexperimental, correlational research design was chosen, and data were collected using a cross-sectional, online survey instrument. The population of interest included individuals working in the U.S. healthcare industry that owned a mobile device. The sample consisted of 130 healthcare personnel including clinical practitioners and health information technology personnel. Data were analyzed using a multiple linear regression technique. The results indicated that perceived trust and PU were significantly related to BYOD adoption, but no significant relationship existed between PEOU and BYOD adoption. These findings suggest that to promote BYOD adoption, organizations should focus on building trust and ensuring that users can derive utility from these devices. Ease of use was not a significant factor in this study, possibly as users were already familiar with their personal devices.</p><p>
13

Measuring the Impact of Open-Source Projects

Ahuja, Vinod Kumar 20 February 2019 (has links)
<p> Foundations and communities for open-source projects often want to determine the impact of their software projects. This impact can be understood in a variety of ways, and this research explores this subject by examining the interdependencies between an open-source project and other projects. In this context, the open-source project is dependent on components created upstream by the other projects. Conversely, software is used downstream by other projects. This thesis proposes an index called the V-index, through which impact of an open-source project, as used in downstream projects, can be measured. The V-index is developed using the open database libraires.io, which provides the requisite dependencies and, thus, a determination of the impact of open-source projects. Further, to explore how the V-index can be understood, project-specific open-source health metrics are identified as potentially easier targets for change than is project impact. A correlation matrix is formed among the identified metrics and the V-index is calculated to determine the corresponding relationships among them. Finally, the conclusions and implications of this research are drawn.</p><p>
14

The Relationship between Privacy Notice Formats and Consumer Disclosure Decisions| A Quantitative Study

Carlton, Alexys Mercedes 02 May 2019 (has links)
<p> In the Data Era, the future success of many businesses will heavily depend on the business&rsquo;s ability to collect and process consumer personal information. Business leaders must understand and implement practices that increase consumer trust to influence their willingness to disclose their information. The problem addressed by this study is many consumers do not trust online service providers with their personal information, and as a result, have refrained from engaging in online activities. This lack of consumer trust impacts the consumers, businesses, and the global economy. The privacy calculus theory, which provided the theoretical framework for this study, suggests that consumer conduct a risk-benefit analysis to aid in their decision to disclose personal information. The purpose of this quantitative correlational study was to understand how consumers use privacy notices in their decisions whether to share their personal information with online businesses. This study was designed to answer how consumers view the relationship between privacy notice type and trust, privacy-related costs, and their likeliness to disclose personal information. A sample of 288 American adult privacy pragmatists were recruited using Amazon Mechanical Turk. The participants were randomly assigned to read one of three privacy notice formats, a full-text format, a layered text format, or a standardized table format, and asked to answer a survey. A one-way analysis of variance was used to test the hypotheses. This study <i>F</i>(8, 55) = 2.08, <i>p</i> = .04 found a relationship between privacy notice type and consumer trust (&eta; = .22, <i>p</i> = .001). No relationship was found between privacy notice type and a consumer&rsquo;s perceived protection belief (&eta; = .14, <i>p</i> = .07), perceived risk belief (&eta; = .05, <i> p</i> = .70) or likeliness to disclose (&eta; = .11, <i>p</i> = .20). Practitioners should focus factors that will encourage disclosure collect consumer personal information other than website privacy notice format. Further research is needed to study these relationships in different online contexts and with different populations. Further research is also needed to study the relationships using other privacy format types.</p><p>
15

The factors influencing ICT Governance implementation in the organisation : a case study : a dissertation submitted to the graduate faculty of design and creative technologies , AUT University in partial fufilment of the requirements for the degree of Master of Computer and Information Sciences, 2009 /

Tavalea, Ikapote. January 2009 (has links)
Dissertation (MCIS - Computer and Information Sciences) -- AUT University, 2009. / Includes bibliographical references. Also held in print ( xi, 156 leaves ; 30 cm.) in the Archive at the City Campus (T 658.4038011 TAV)
16

Investigating the effectiveness of using an integrated project to improve transferability of IT skills to the workplace /

Allie, Faiza. January 1900 (has links)
Thesis (MTech (Information Technology))--Peninsula Technikon, 2003. / Word processed copy. Summary in English. Includes bibliographical references. Also available online.
17

Information technology and systems (ITS) sourcing decisions : a comparative study of transaction cost theory versus the resource-based view /

Watjatrakul, Boonlert. January 2002 (has links) (PDF)
Thesis (Ph. D.)--University of Queensland, 2002. / Includes bibliographical references.
18

An analysis of the information technology (IT) attitudes, and anxieties of leaders at the Phillips Plastics Corporation

Janisse, James J. January 2002 (has links) (PDF)
Thesis--PlanA (M.S.)--University of Wisconsin--Stout, 2002. / Includes bibliographical references.
19

Understanding the creation and adoption of information technology innovations: the case of open source software development and the diffusion of mobile commerce

Long, Ju 28 August 2008 (has links)
Not available / text
20

The relationship between the business value of information technology and the effectiveness of enterprise architectural planning

Gwynne, Daniel W. 04 September 2015 (has links)
<p> According to Gartner Inc., $3.7 trillion dollars was spent in the United States alone in 2013 on IT services. The continued anticipated growth of United States IT spending will reach as high as $3.9 trillion in 2014, representing an average increase in spending of 4.1% between 2013 and 2014. A significant percentage of those investments were lost to waste and failed projects. The combination of rising costs and losses has driven a considerable amount of research on the impact of successful project management on the value that IT creates within an organization. The results of a recent study confirmed a significant relationship between the success of an IT project and the quality of the IT department&rsquo;s technical efficiencies and processes. Recent studies have also demonstrated a link between enterprise architectural planning and an organizations ability to manage IT investments. This study on IT managers&rsquo; perceptions of the business value of IT and the effectiveness of enterprise architectural planning as moderated by age, gender, and education, used a non-experimental quantitative design and a random sample provided by the SurveyMonkey contribute panel to obtain 109 survey responses. The use of a random sample and the size of the study were intended to allow for the generalizability of the results within the geographic region of the United States. A bootstrapped hierarchical linear regression statistical methodology was employed using SPSS as the data were not normally distributed. Ethical considerations were mediated according to the requirements outlined in the Belmont Report (2014). This study found a statistically significant relationship between IT managers&rsquo; perceptions of the business value of IT and the effectiveness of enterprise architectural planning as moderated by age, gender, and education. The results of the study support existing research on the topic of the perceived business value of IT and enterprise architectural planning.</p>

Page generated in 0.1165 seconds