• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 183
  • 15
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 250
  • 250
  • 250
  • 81
  • 67
  • 57
  • 42
  • 41
  • 35
  • 31
  • 29
  • 28
  • 26
  • 20
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Information systems for organizations and the problem of ephemeral information

Barreau, Deborah Kay. January 1997 (has links)
Thesis (Ph. D.)--University of Maryland at College Park, 1997. / Includes bibliographical references.
52

Measuring information-sharing behavior : the case of supply chains in operational contexts

Bao, Xiaowen, 1973- January 2009 (has links)
No description available.
53

Developing a marketing information systems (MKIS) model for South African service organizations

Venter, Petrus 06 1900 (has links)
Text in English, abstract in English and Afrikaans / Information is one of the most important resources in organizations today. The role of Marketing Information Systems (MKIS) is to facilitate the efficient and effective use of information in marketing decision-making. Service organizations are especially reliant on decision-support information, due to the complex nature of their environment. However, indications are that they are not utilizing information to their best benefit, despite the considerable advantages they might gain from it. In fact, it could be said that service organizations often seem to lack a culture of market orientation. In measuring the satisfaction with the quality of market intelligence, it becomes obvious that marketing decision-makers are generally dissatisfied with the results of MKIS. Some of the reasons are: • The 'disconnect' between information technology and marketing in organizations, which results in marketing decision-makers not getting information in the format they require, and feeling as if their requirements are not taken into account when MKIS are developed. • The lack of availability of usable customer and competitor data, which are regarded by marketing decision-makers as the most important categories of information. • The focus on generating data, but not adding value to it. Marketing decisionmakers have indicated that they require analysis, and not raw data. In order to bridge these problems, South African service organizations need to focus on the successful integration of MKIS into the organization. This requires an understanding of marketing decision-makers' requirements, closer cooperation between IT and marketing and the establishment of a culture of information sharing. / lnligting is een van die belangrikste hulpbronne van hedendaagse organisasies. Die rol van bemarkingsinligtingstelsels (BMIS) is die fasilitering van die doelmatige en effektiewe gebruik van inligting in bemarkingsbesluitneming. Diensorganisasies is veral afhanklik van besluitsondersteunende inligting, as gevolg van die komplekse aard van hulle omgewing. Tog is daar aanduidings dat hulle inligting nie tot die beste voordeel aanwend nie, ten spyte van die aansienlike voordeel wat hulle daaruit kan trek. In werklikheid kan dit gestel word dat diensorganisasies skynbaar nie 'n markgerigte kultuur het nie. In die meting van tevredenheid met die kwaliteit van markintelligensie blyk dit dat bemarkingsbesluitnemers in die algemeen ontevrede is met die resultate van BMIS. Sommige redes hiervoor: • Die gaping tussen inligtingstegnologie en bemarking in organisasies, wat daartoe lei dat bemarkingsbesluitnemers nie inligting ontvang in die formaat wat hulle vereis nie, en voel dat hulle behoeftes nie in ag geneem word wanneer BMIS ontwikkel word nie. • Die gebrek aan bruikbare inligting oor kliente en mededingers, wat deur benarkingsbesuitnemers beskou word as die belangrikste kategoriee van inligting. • Die fokus op die genereer van data, sonder om waarde daaraan toe te voeg. Bemarkingsbesluitnerners het aangedui dat hulle ontleding vereis en nie slegs 'rou' data nie. Ten einde hierdie probleme te oorbrug moet Suid-Afrikaanse diensorganisasies fokus op die suksesvolle integrasie van BMIS in die organisasie. Dit vereis begrip vir bemarkingsbesluitnemers se behoeftes, nader samewerking tussen inligtingstegnologie en bemarking en die daarstel van 'n kultuur van gedeelde inligting. / Business Management / D. Comm. (Business Management)
54

Data manipulation in collaborative research systems.

Lynch, Kevin John. January 1989 (has links)
This dissertation addresses data manipulation in collaborative research systems, including what data should be stored, the operations to be performed on that data, and a programming interface to effect this manipulation. Collaborative research systems are discussed, and requirements for next-generation systems are specified, incorporating a range of emerging technologies including multimedia storage and presentation, expert systems, and object-oriented database management systems. A detailed description of a generic query processor constructed specifically for one collaborative research system is given, and its applicability to next-generation systems and emerging technologies is examined. Chapter 1 discusses the Arizona Analyst Information System (AAIS), a successful collaborative research system being used at the University of Arizona and elsewhere. Chapter 2 describes the generic query processing approach used in the AAIS, as an efficient, nonprocedural, high-level programmer interface to databases. Chapter 3 specifies requirements for next-generation collaborative research systems that encompass the entire research cycle for groups of individuals working on related topics over time. These requirements are being used to build a next-generation collaborative research system at the University of Arizona called CARAT, for Computer Assisted Research and Analysis Tool. Chapter 4 addresses the underlying data management systems in terms of the requirements specified in Chapter 3. Chapter 5 revisits the generic query processing approach used in the AAIS, in light of the requirements of Chapter 3, and the range of data management solutions described in Chapter 4. Chapter 5 demonstrates the generic query processing approach as a viable one, for both the requirements of Chapter 3 and the DBMSs of Chapter 4. The significance of this research takes several forms. First, Chapters 1 and 3 provide detailed views of a current collaborative research system, and of a set of requirements for next-generation systems based on years of experience both using and building the AAIS. Second, the generic query processor described in Chapters 2 and 5 is shown to be an effective, portable programming language to database interface, ranging across the set of requirements for collaborative research systems as well as a number of underlying data management solutions.
55

Comparisons of attacks on honeypots with those on real networks

Duong, Binh T. 03 1900 (has links)
Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyber-attacks and attacker behavior. When implemented as part of a security posture, honeypots also protect real networks by acting as a decoy, deliberately confusing potential attackers as to the real data. The objective of this research is to compare attack patterns against a honeypot to those against a real network, the network of the Naval Postgraduate School. Collection of suspicious-event data required the implementation and setup of a honeypot, in addition to the installation and use of an intrusion-detection system. A statistical analysis was conducted across suspicious-event data recorded from a honeypot and from a real network. Metrics used in our study were applied to the alerts generated from Snort 2.4.3, an open-source intrusion detection system. Results showed differences between the honeypot and the real network data which need further experiments to understand. Both the honeypot and the real network data showed much variability at the start of the experiment period and then a decrease in the number of alerts in the later period of the experiment. We conclude that after the initial probing and reconnaissance is complete, the vulnerabilities of the network are learned and therefore fewer alerts occur; but more specific signatures are then aimed at exploiting the network.
56

The Organizational Consequences of Information Deployment

Remington, William S. (William Seth) 12 1900 (has links)
This study investigates the influence that increasing end user autonomy has on organizational data models. The independence offered by microcomputer technology offers users increasing independence in their information-handling activities. As independence increases, uniformity of data models across the organization is theorized to diminish. The problem motivating this study is the potential for improper allocation of resources that may result from a misinterpretation of organizational data. This study suggests that the expanding use of microcomputers in the business setting will contribute to diversity of data models. This may eventually lead to confusion and even lack of confidence in the information produced.
57

An investigation of technical support issues influencing user satisfaction

Gutierrez, Charletta Frances 05 1900 (has links)
The widespread distribution of personal computers (PCs) throughout organizations has made a substantial impact on information systems. Additionally, the tremendous growth of the Internet has changed the way business is carried out. As the user population evolves into a much more technical and demanding group, their needs are also changing. With this change, Management Information Systems (MIS) departments must develop new ways of providing service and support to the user community. This study investigates the relationship between information systems support structures, support services, service quality and the characteristics of a diverse user population. This includes investigating technical support issues influencing user satisfaction. This study attempts to improve the understanding of the support function within MIS. The results of this study clarify the support needs of the users and identify user satisfaction factors, as well as factors relative to the quality of the support received. Six streams of prior research were reviewed when developing the research framework. These include: user support, end users and end-user computing, identifying and classifying user types, information centers, user satisfaction, service quality and other sources of computer support. A survey instrument was designed using the (UIS) user satisfaction instrument developed by Doll and Torkzadeh (1988) and the SERVQUAL instrument as modified by Kettinger and Lee (1994). The survey was distributed to 720 individuals. A total of 155 usable responses were analyzed providing mixed results. Of the ten hypotheses, only four were rejected. The finding of this study differ from those in earlier studies. The variables that were found to be significant to the users for service quality are the method of support that is provided to the user, i.e., help desk or local MIS support and the support technician's experience level. For user satisfaction the location of the service personnel made a difference to the end user. As with service quality, the support technician's experience level added to the users' satisfaction with MIS support. The results of this study are pertinent to managers of MIS departments as it clarifies the support needs of the users and identifies issues of user satisfaction and service quality.
58

The role of a training intervention in reducing email overload and improving productivity

Campbell, Kerry Meghan January 2017 (has links)
A research report submitted to the Faculty of Humanities, School of Human and Community Development, in partial fulfilment of the requirements for the degree of Master of Arts by coursework and research report in the field of in Organisational Psychology, University of the Witwatersrand, Johannesburg September 2017 / Emails have become a fundamental computer application and business tool, in organisations across the global. This is because of the accessibility and convenience of emails which have generated an array of benefits to both employees and their organisations. However, this accessibility has led to an over-reliance on emails, which often has the negative consequence of email overload. Email overload continues to be a recurring issues experienced by employees universally, which research has found to have negative implications on employees’ wellbeing and productivity. Yet there has been limited research, particularly in South Africa, that aims to reduce email overload among employees. Thus, this research report investigated how the role of providing employees with a job resource (training intervention) could increase perceived productivity and eliminate email overload and change caused by the job demands (emails) on employees .In order to examine this effect, this research utilised a pretest post-test control group design on order to compare the impact of a training intervention in reducing email overload and increasing productivity. The quantitative results revealed that the training intervention contributed to a decrease in feelings of email overload among the participants. Additionally, focus groups were administered to determine participants’ experience with emails both prior to the training and after the training, to gain a clearer understanding of the best practices used to eliminate email overload. These findings observed that the participants transferred learnt contents from training into their working lives. Thus research both further contributes to other research currently associated with email and email overload, and also provides a greater understanding of the need to provide employees with job resources much like training intervention in order to counteract those job demands like emails, that are often ignored. / XL2018
59

Building and testing theory on the role of IT in the relationship between power and performance implementing enterprise performance management in the organization /

Wenger, Mitchell R. January 1900 (has links)
Thesis (Ph.D.)--Virginia Commonwealth University, 2009. / Prepared for: Dept. of Information Systems. Title from title-page of electronic thesis. Bibliography: leaves 168-174.
60

An analysis of the relationships between end-user support and information technology strategic planning at Pennsylvania community colleges

Feiertag, Jason P. January 2001 (has links)
Thesis (M.P.A.)--Kutztown University of Pennsylvania, 2001. / Source: Masters Abstracts International, Volume: 45-06, page: 2921. Typescript. Abstract precedes thesis as preliminary leaves [1-2]. Includes bibliographical references (leaves 95-97).

Page generated in 0.1853 seconds