Spelling suggestions: "subject:"forminformation technology"" "subject:"informationation technology""
1 |
Controlling information technology costs and reporting ROI in large organizationsJones, Darrell. January 2008 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2008. / Title from PDF title page (viewed on Feb. 03, 2009). Includes bibliographical references.
|
2 |
The value of information technology an empirical study of the impact of IT capabilities and IT use on economic growth and on organizational performance in Taiwan /Wang, Hsiao-Hui. January 1997 (has links)
Thesis (Ph. D.)--University of Hawaii, 1997. / eContent provider-neutral record in process. Description based on print version record.
|
3 |
Investigating the need for costing and estimating in information technology academic programs at technikons /Khan, Gillian. January 1900 (has links)
Thesis (MTech (Information Technology))--Peninsula Technikon, 2005. / Word processed copy. Summary in English. Includes bibliographical references (leaves 80-82). Also available online.
|
4 |
Efficiency enhancing effects of IT investment on other factor inputs and accounting identity approach to value of ITMittal, Neeraj. January 2004 (has links)
Thesis (Ph. D.)--Ohio State University, 2004. / Title from first page of PDF file. Document formatted into pages; contains xi, 120 p.; also includes graphics. Includes bibliographical references (p. 115-120). Available online via OhioLINK's ETD Center.
|
5 |
A study of persistence factors of nontraditional students enrolled in noncredit information technology programs in the Advantage Valley Community College ConsortiumBrown, Steven Lee. January 2008 (has links)
Thesis (Ed.D.)--Marshall University, 2008. / Title from document title page. Includes abstract. Document formatted into pages: contains 114 p. Includes bibliographical references (p. 87-98).
|
6 |
Legal requirements acquisition for the specification of legally compliant information systemsBreaux, Travis Durand. January 2009 (has links) (PDF)
Thesis (Ph.D.)--North Carolina State University, 2009. / Includes bibliographical references (leaves 92-105) and index. Also available online.
|
7 |
Applying COBIT in an ERP environment, with specific reference to Qmuzik /Kieviet, Frèda. January 2006 (has links)
Assignment (MRek)--University of Stellenbosch, 2006. / Bibliography. Also available via the Internet.
|
8 |
Performance evaluation of a wired and a wireless iSCSI network using simulation modelKawatra, Kshitij 06 May 2016 (has links)
<p> This paper compares the performance of a wired and a partial wireless network sending storage data from client’s end to the server’s end. The purpose of this project is to observe if a wireless network can be an efficient alternative to a wired network to send storage specific protocols and data. The comparison has been made on the basis of throughput i.e., number of bits being transferred per second, and delay i.e., time taken by one bit to transfer from one end to another. For a wired network, delay can be added to the transmission at each node depending on their processing speed as well as the distance between two nodes. For a wireless network other factors like channel bandwidth and buffer size play an important role. In this paper, we have also observed the effect of buffer size on a wireless network and how it can be manipulated to minimize delay and packet loss in the network. We have implemented and simulated our network scenario in Opnet Modeler by Riverbed. </p>
|
9 |
An analysis of automated solutions for the Certification and Accreditation of navy medicine information assetsGonzales, Dominic V. 09 1900 (has links)
A process.
|
10 |
An Empirical Investigation of Factors Affecting Resistance to Using Multi-Method Authentication Systems in Public-Access EnvironmentsMarnell, Joseph W. 17 August 2016 (has links)
<p> Over the course of history, different means of object and person identification as well as verification have evolved for user authentication. In recent years, a new concern has emerged regarding the accuracy of verifiable authentication and protection of personal identifying information (PII), because previous misuses have resulted in significant financial loss. Such losses have escalated more noticeably because of human identity-theft incidents due to breaches of PII within multiple public-access environments. Although the use of various biometric and radio frequency identification (RFID) technologies is expanding, resistance to using these technologies for user authentication remains an issue. This study addressed the effect of individuals’ perceptions on their resistance to using multi-method authentication systems (RMS) in public-access environments and uncovered key constructs that may significantly contribute to such resistance.</p><p> This study was a predictive study to assess the contributions of individuals’ perceptions of the importance of organizational protection of their PII, noted as Perceived Value of Organizational Protection of PII (PVOP), authentication complexity (AC), and invasion of privacy (IOP) on their resistance to using multi-method authentication systems (RMS) in public-access environments. Moreover, this study also investigated if there were any significant differences on the aforementioned constructs based on age, gender, prior experience with identity theft, and acquaintance experience with identity theft. As part of this study, a rollout project was implemented of multi-factor biometric and RFID technologies for system authentication prior to electronic-commerce (e-commerce) use in public-access environments. The experimental group experienced the multi-factor authentication and also was trained on its use. Computer users (faculty & students) from a small, private university participated in the study to determine their level of PVOP, IOP, and AC on their resistance to using the technology in public-access environments. Multiple Linear Regression (MLR) was used to formulate a model and test predictive power along with the significance of the contribution of the aforementioned constructs on RMS. The results show that all construct measures demonstrated very high reliability. The results also indicate that the experimental group of the multi-factor authentication had lower resistance than the control group that didn’t use the technology. The mean increases indicate an overall statistically significant difference between the experimental and control groups overall. The results also demonstrate that students and participants’ increased levels of education indicate an overall statistically significant decrease in resistance. The findings demonstrate that overall computer authentication training do provide added value in the context of measuring resistance to using newer multi-method authentication technology.</p>
|
Page generated in 0.1295 seconds