• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 183
  • 15
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 250
  • 250
  • 250
  • 81
  • 67
  • 57
  • 42
  • 41
  • 35
  • 31
  • 29
  • 28
  • 26
  • 20
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

An investigation of the role of records management with specific reference to Amathole District Municipality

Kanzi, Noluvuyo January 2010 (has links)
The purpose of this study was to investigate the role played by records management in an organisation. The primary question that was explored was whether the management of records receives the attention it deserves at the Amathole District Municipality. In order to achieve the research objectives, an in-depth literature study was undertaken. A survey was also conducted to examine the current records management practices at ADM and the data was collected by means of self-administered questionnaires. The literature study proved the hypothesis to be correct, which stated that effective records management plays a significant role in the effective administration of an organization. The empirical study revealed that the records management function is not receiving the attention it deserves at ADM. Even though participants acknowledged the importance of records management in the decision-making process, strategic planning process (Integrated Development Plan), the realisation of the Batho Pele Principles and the overall performance of ADM, it was evident that ignorance was displayed with regard to the management of records. It has been discovered that Amathole District Municipality has a good Records Management Policy, Procedure manual and File Plan, but adherence to these policies should be continuously monitored. Regular training has been identified as one of the areas on which ADM should apply its focus to ensure sound records management. Recommendations were made within the context of empirical survey findings and the regulatory framework for records management. To improve the current records management practices at ADM, it has been recommended that the records management function be incorporated into the organisation-wide strategic plans and that records management forms part of the key performance areas of senior managers.
162

A multi-dimensional model for information security management

Eloff, Maria Margaretha 06 December 2011 (has links)
D.Phil. / Any organisation is dependent on its information technology resources. The challenges posed by new developments such as the World Wide Web and e-business, require new approaches to address the management and protection of IT resources. Various documents exist containing recommendations for the best practice to follow for information security management. BS7799 is such a code of practice for information security management. The most important problem to be addressed in this thesis is the need for new approaches and perspectives on information security (IS) management in an organisation to take cognisance of changing requirements in the realm of information technology. In this thesis various models and tools are developed that can assist management in understanding, adapting and using internationally accepted codes of practice for information security management to the best benefit of their organisations. The thesis consists of three parts. Chapter 1 and Chapter 2 constitute Part 1: Introduction and Background. In Chapter 1 the problem statement, objectives and deliverables are given. Further the chapter contains definitions of important terminology used in the thesis as well as an overview of the research. Chapter 2 defines various terms associated with information security management in an attempt to eliminate existing confusion. The terms are mapped onto a hierarchical framework in order to illustrate the relationship between the different terms. In Part 2: IS Management Perspectives and Models, consisting of chapters 3, 4, 5 and 6, new approaches to information security management is discussed. In Chapter 3 different perspectives on using a code of practice, such as BS7799 for IS management, is presented. The different perspectives are based on the unique characteristics of the organisation such as its size and functional purpose. These different perspectives also enable organisations to focus on the controls for specific resources or security services such as integrity or confidentiality. In Chapter 4 these different perspectives ofbusiness type/size, the security services and the resources are integrated into a multi-dimensional model and mapped onto BS7799. Using the multi-dimensional model will enable management to answer questions such as: "Which BS7799 controls must a small retail organisation interested in preserving the confidentiality of their networks implement?" In Chapter 5 the SecComp model is proposed to assist in determining how well an organisation has implemented the BS7799 controls recommended for their needs. In Chapter 6 the underlying implemented IT infrastructure, i.e. the software, hardware and network products are also incorporated into determining if the information assets of organisations are sufficiently protected. This chapter combines technology aspects with management aspects to provide a consolidated approach towards the evaluation of IS. The thesis culminates in Part 3: Conclusion, which comprises one chapter only. In this last chapter, Chapter 7, the research undertaken thus far is summarised and the pros and cons of the proposed modelling approach is weighed up. The thesis is concluded with a reflection on possible areas for further research.
163

Automated Syndromic Surveillance using Intelligent Mobile Agents

Miller, Paul 12 1900 (has links)
Current syndromic surveillance systems utilize centralized databases that are neither scalable in storage space nor in computing power. Such systems are limited in the amount of syndromic data that may be collected and analyzed for the early detection of infectious disease outbreaks. However, with the increased prevalence of international travel, public health monitoring must extend beyond the borders of municipalities or states which will require the ability to store vasts amount of data and significant computing power for analyzing the data. Intelligent mobile agents may be used to create a distributed surveillance system that will utilize the hard drives and computer processing unit (CPU) power of the hosts on the agent network where the syndromic information is located. This thesis proposes the design of a mobile agent-based syndromic surveillance system and an agent decision model for outbreak detection. Simulation results indicate that mobile agents are capable of detecting an outbreak that occurs at all hosts the agent is monitoring. Further study of agent decision models is required to account for localized epidemics and variable agent movement rates.
164

A Case Study of the Use of Activity-Based Analysis as an Information Resource Management Tool

Arnett, Charles A. (Charles Augustus) 12 1900 (has links)
The purpose of the study was to investigate a modification of a managerial accounting technique, Activity-Based Costing (ABC), as a tool for addressing Information Resource Management (IRM) concerns within business processes. To indicate that ABC has been adapted for the IRM context, this study called the tool "Activity-Based Analysis" (ABA). ABA includes ABC's costing methodology as well as additional methods to address broader issues. The research method was a single-site case study at a property and casualty insurance company. The unit of analysis was a business process consisting of activities needed to provide claims handling services for workers' compensation insurance. Four questions guided the study: 1. Did ABA identify management information required to monitor process effectiveness and efficiency? 2. Did ABA support outsourcing decision making by identifying IRM cost components within business processes? 3. Did ABA identify information resources; that are sharable? 4. Did ABA identify differences between Company organizational characteristics andIRM department organizational characteristics?
165

The design, development and evaluation of a holistic cloud migration decision framework

Mushi, Tumelo Nicholas January 2020 (has links)
No keywords provided in dissertation / Cloud Computing has gained traction since its emergence and client organisations that want to benefit from the Cloud are looking for ways to migrate their on-premise applications to the Cloud. To assist client organisations with migration projects, researchers and practitioners have proposed various Cloud migration approaches. However, these approaches differ in applicability depending on the type of application being migrated and the Cloud Service Provider where the application is being migrated to. The various approaches to Cloud migration create complexity in Cloud migration decisions as client organisations have to consider various approaches depending on the migration project. The purpose of this dissertation is to create a universal Cloud migration approach that can be applied to every Cloud migration project. In this dissertation, a cloud migration decision framework is proposed; namely, A Holistic Cloud Migration Decision Framework (HCMDF). The research strategy that was followed is Design Science Research (DSR) and was selected since the output of the research is going to be an Information Technology (IT) research artefact. By applying the DSR strategy, the HCMDF was successfully developed and evaluated in the real world using an adaptive case study. The analysis of the results indicated that the HCMDF solves Cloud migration problem and that it can be applied to every Cloud migration project. Throughout the evaluation, areas of improvement were identified and these will be considered in future research. / School of Computing / M. Tech (Information Technology)
166

Evaluating Clinger-Cohen Act Compliance in Federal Agency Chief Information Officer Positions

Bernard, Scott A. 02 May 2001 (has links)
This dissertation develops a method for evaluating whether federal agencies have complied with the intent of the Clinger-Cohen Act (CCA) of 1996 as they established Chief Information Officer (CIO) positions. The research is important because the CIO position, as envisioned by the CCA, oversees a growing information technology infrastructure that is increasingly becoming the primary vehicle for inter/intra-government communication and for delivering services to the public. Yet despite this importance, CIO-related aspects of the CCA have not received in-depth evaluation in policy science or public administration literature. The CCA specified many roles for the CIO position but provided few criteria for evaluating how agencies complied with the provisions that required the establishment of a CIO position. Therefore, a seven-step policy analysis process was used to develop a federal agency CIO position evaluation method that would fill this gap. This analytic research included describing the CCA's legislative context, modeling the federal CIO position, determining the intent of the CCA relative to CIO establishment, and devising a method to evaluate this activity. This research approach was grounded in organizational theory related to institutional structure. A validated "Federal CIO Position Evaluation Method" (FCPEM) is the result of the research. FCPEM, which contains thirteen evaluation criteria, was tested and validated through key actor interviews at four federal agencies and focused on CIO position establishment activity between 1996 and 2000. Additional research is required to replicate this finding in other agencies and to further validate the use of FCPEM in conducting this type of public policy inquiry. / Ph. D.
167

The development of an education management information system from a sensemaking perspective and the application of quantitative methods to analyse education data sets

Van Wyk, Christoffel 12 1900 (has links)
Thesis (PhD (Education Policy Studies))--University of Stellenbosch, 2006. / Information is a necessary resource, produced by information systems and is a key building block to the management and decision-making in any organisation. The National Department of Education’s guidelines to establish Education Management Information Systems (EMIS) in provincial departments is a recognition that proper management, planning and evaluation are contingent on quality data, data that is complete, relevant, accurate, timely and accessible. The lack of quality data and the lack of integration with other information systems hamstring the effective use of EMIS. This study addresses these limitations in three basic objectives: a) developing an information systems development model, b) applying the model in a real-life context of the development of the Western Cape EMIS, and c) applying quantitative methods on integrated data sets derived from the EMIS in the Western Cape and other information systems. The study culminates in the development of a four-phase process model for developing and using EMIS in an integrative manner that would provide a more comprehensive picture for policy and decision-making. It outlines the establishment of an information systems development (ISD) model that integrates innovative emerging trends, such as improvisation, bricolage and sensemaking, in designing and implementing information systems. These approaches postulate that beyond the numbers and quantifiable world there is a complex reality that traditional approaches do not always capture. These include, amongst other things, the atmosphere, culture and structure of an organization, together with the behaviour, emotions, knowledge and experiences of all the people who in one way or another interact with the information system. The research presents an empirical application of this developed ISD model in education management information system (EMIS) and underscores the role of information systems in everyday practice. This work practice (Practice-in-Action) approach is used to describe how the day-to-day actions and practical experiences of role players contribute to the design, development, implementation, testing, maintenance and improvement of the EMIS and is used as a lens for understanding ISD. The study further uses quantitative methods, namely education production function and learner flow-through models, to illustrate how the process of knowledge discovery in large data sets in EMIS could be facilitated. The education production function aims to identify those variables that could have a significant influence on the achievement of students in the matriculation examination. The learner flow-through models attempt to measure the effect of learner dropout and repetition on internal efficiency of the education system. Data analysis was facilitated through integration of data sets from various sources, and in turn illustrates the important role of bricolage in ISD. Through this analysis, the role of information systems of this nature to make sense of reality was highlighted. Policy making then can build on the findings from such data analyses to investigate in greater depth any trends or emerging problems, going beyond only the quantitative and macro level analysis by studies at the qualitative and micro levels.
168

Trigeiawriter: A content management system

Ram, Mohan Prabhakara 01 January 2011 (has links)
The purpose of this project was to design and implement a Content Management System (CSM). TrigeiaWriter is a Content Management System for Trigeia.com, a web based magazine site. Since TrigeiaWriter is used for a web based magazine, it incorperates different roles for the users and these roles are authors, editors, and administrators.
169

User Acceptance of North Central Texas Fusion Center System by Law Enforcement Officers

Odabasi, Mehmet 12 1900 (has links)
The September 11 terrorist attacks pointed out the lack of information sharing between law enforcement agencies as a potential threat to sound law enforcement in the United States. Therefore, many law enforcement agencies as well as the federal government have been initiating information sharing systems among law enforcement agencies to eradicate the information sharing problem. One of the systems established by Homeland Security is the North Central Texas Fusion Center (NCTFC). This study evaluates the NCTFC by utilizing user acceptance methodology. The unified theory of acceptance and the use of technology is used as a theoretical framework for this study. Within the study, user acceptance literature is examined and various models and theories are discussed. Furthermore, a brief information regarding the intelligence work done by law enforcement agencies are explained. In addition to the NCTFC, several major law enforcement information systems are introduced. The data for this study comes from the users of the NCTFC across the north central Texas region. Surveys and interviews are used to triangulate data. It is found in this study that performance expectancy and effort expectancy are important indicators of system use. Furthermore, outreach and needs assessment are important factors in establishing systems. The results of the study offer valuable input for NCTFC administrators, law enforcement officials, and future researchers.
170

Alignment of IT strategy with business strategy / Impact on IT effectiveness and business perfomance.

Musuka, Patrick 30 November 2006 (has links)
The primary purpose of this research is to establish to what extent, if any Zimbabwean companies proactively align their IT strategy with the business strategy as a way of building and sustaining business competitive advantage. The research seeks to provide further insights into the business performance implications of the alignment between IT and business strategies. It also seeks to determine if there are any linkages between strategic alignment, IT managerial resources and IT effectiveness. Last but not least, it examines whether alignment directly leads to increased business performance which Sabherwal & Chan (2001) terms ‘perceived business performance’. / Graduate School of Business Leadership / MBL

Page generated in 0.1717 seconds