• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 113
  • 17
  • 14
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 183
  • 183
  • 183
  • 71
  • 52
  • 47
  • 30
  • 23
  • 22
  • 22
  • 21
  • 21
  • 21
  • 18
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
171

The Evolution of Big Data and Its Business Applications

Halwani, Marwah Ahmed 05 1900 (has links)
The arrival of the Big Data era has become a major topic of discussion in many sectors because of the premises of big data utilizations and its impact on decision-making. It is an interdisciplinary issue that has captured the attention of scholars and created new research opportunities in information science, business, heath care, and many others fields. The problem is the Big Data is not well defined, so that there exists confusion in IT what jobs and skill sets are required in big data area. The problem stems from the newness of the Big Data profession. Because many aspects of the area are unknown, organizations do not yet possess the IT, human, and business resources necessary to cope with and benefit from big data. These organizations include health care, enterprise, logistics, universities, weather forecasting, oil companies, e-business, recruiting agencies etc., and are challenged to deal with high volume, high variety, and high velocity big data to facilitate better decision- making. This research proposes a new way to look at Big Data and Big Data analysis. It helps and meets the theoretical and methodological foundations of Big Data and addresses an increasing demand for more powerful Big Data analysis from the academic researches prospective. Essay 1 provides a strategic overview of the untapped potential of social media Big Data in the business world and describes its challenges and opportunities for aspiring business organizations. It also aims to offer fresh recommendations on how companies can exploit social media data analysis to make better business decisions—decisions that embrace the relevant social qualities of its customers and their related ecosystem. The goal of this research is to provide insights for businesses to make better, more informed decisions based on effective social media data analysis. Essay 2 provides a better understanding of the influence of social media during the 2016 American presidential election and develops a model to examine individuals' attitudes toward participating in social media (SM) discussions that might influence their decision in choosing between the two presidential election candidates, Donald Trump and Hilary Clinton. The goal of this research is to provide a theoretical foundation that supports the influence of social media on individual's decisions. Essay 3 defines the major job descriptions for careers in the new Big Data profession. It to describe the Big Data professional profile as reflected by the demand side, and explains the differences and commonalities between company-posted job requirements for data analytics, business analytics, and data scientists jobs. The main aim for this work is to clarify of the skill requirements for Big Data professionals for the joint benefit of the job market where they will be employed and of academia, where such professionals will be prepared in data science programs, to aid in the entire process of preparing and recruiting for Big Data positions.
172

Analysis of the relationship between Governance of Enterprise Information Technology (IT) and strategic business-IT alignment using COBIT 5 in the case of the Commercial Bank of Ethiopia

Fiseha, Martha Sileshi 06 1900 (has links)
Effective Governance of Enterprise Information Technology (GEIT) is very important for an enterprise that has a huge investment in IT infrastructure. Implementing effective GEIT helps an enterprise to meet stakeholder needs by creating business value through strategic business-IT alignment. This study focuses on the analysis of GEIT implementation related to strategic business-IT alignment using Control Objectives for Information and Related Technology (COBIT 5), using the Commercial Bank of Ethiopia (CBE) as a case study. Strategic alignment is found to be the main concern of GEIT and strong alignment between business objectives and IT capabilities as a means of creating an effective foundation for business execution. There are various internationally accepted GEIT good practices and standards. In this study, COBIT 5 is selected for its strong aspects of control objectives for strategic business-IT alignment that help enterprises’ security, risk and compliance guidance and serves as a tool for leveraging GEIT. COBIT 5 is the leading business framework for the GEIT by making clear that there is a separation between governance and management of IT. This is a single integrated framework that covers the enterprise holistically and integrates with other important frameworks and standards at an advanced level. In addition to this, the use of COBIT 5 Balanced Score Card (BSC) for performance measurement tool (goals cascade), Process Reference Model (PRM), Process Assessment Model (PAM), principles and enablers and Capability Maturity Model (CMM) tool also utilise IT investments more effectively and accurately and measure performance with lower costs through stronger governance. This study analysed how enterprises effectively implement GEIT practices using COBIT 5 to achieve strong strategic business-IT alignment. The target groups of the study were the top management and IT management of CBE. The researcher used explanatory sequential mixed methods (both quantitative and qualitative) data collection techniques and analysis procedures. In the quantitative data collection, data were collected and analysed using GEIT practices maturity assessment tool, Luftman Strategic Alignment Maturity Model (LAMM) tool and the data analysed using Statistical Package for the Social Science (SPSS). In the qualitative phase of the study, evidence was collected and examined from observation and participation, document review, focus group, formal and informal discussions with selected managements of CBE and gap assessment using COBIT 5. Finally, the researcher integrated results to combine the quantitative and qualitative methods. The finidngs of the quantitative analysis indicate that the maturity level of GEIT practices implementation was 1.77, around level 2 maturity level (repeatable but intuitive), whereas the business-IT alignment maturity level of 53.13% agrees that strategic alignment business-IT was good level 3 (established, focused processes) in the case of CBE. GEIT practices implementation regarding strategic business-IT alignment is found to be positive. The data qualitative analysis indicates that the achievement of the capability level of GEIT processes is not defined and deployed based on international best practices and also confirms that the GEIT BSC is not yet implemented. The achievement capability level of GEIT processes implementation using COBIT 5 is under level 2. In this study, the gap between the existing GEIT practices processes and desirable level 4 (managed and measurable) using COBIT 5 was identified and a method to fill the gap was proposed. / School of Computing / M. Sc. (Computing)
173

A model for information technology optimisation in supply chain and logistics of Libya oil and gas sector: the case of Zueitina oil company

Tarom, Fathi A. 12 1900 (has links)
M. Tech. (Department of Information and Communication Technology, Faculty of Applied and Computer Sciences), Vaal University of Technology. / Crude oil is among the most in-demand and desirable commodities across the world today. The multiple uses of crude oil are widespread, ranging from the generation of energy to its use as fuel for the petrochemical and transportation sectors. Because of the high use of and demand for crude oil worldwide, the petroleum industry (also known as the oil and gas industry) is a significantly role player in the world economy. Libya‘s oil and gas industry is deemed the most essential and important sector in this country, as Libya is mainly dependent on proceeds from this sector. However, existing information technologies are not always optimally applied and utilised. This, together with the challenge that information technologies in the supply chain system and logistics processes of some of Libya‘s oil and gas companies are not always sufficient, the productivity of the country‘s oil and gas supply chain is compromised, and this results in revenue losses because of wasteful expenditure. This research therefore aimed to determine what innovative information technologies should be considered by Zueitina Oil Company (as case study) in Libya to enhance its supply chain and logistics processes. Two primary research questions (PRQs) were formulated for this research, namely: (i) What is the current status of Libya‘s oil and gas sector in terms of oil production and export? (ii) What innovative information technologies need to be considered by Zueitina Oil Company in Libya to contribute towards optimising its supply chain and logistics processes? This study followed the qualitative research methodology, as the data collected were qualitative and the research design was inductive. A case study strategy was adopted, with Zueitina Oil Company in Libya as the case under study. The primary sources for the research were the management of the supply chain and logistics departments of Zueitina Oil Company. The qualitative data collection method selected was a survey conducted by means of telephone and focus group interviews. The data were analysed using thematic analysis. In total, five themes and six sub-themes emerged from the findings obtained from the analysis. This research contributes to the scientific body of knowledge by proposing an Information Technology Optimisation Model for the Supply Chain of Zueitina Oil Company in Libya in order to achieve increased revenues, reduced costs, and improved customer services, among others.
174

The capability maturity model as a criminal justice process improvement paradigm

Doss, Daniel Adrian 07 1900 (has links)
Background: The administrators, managers, and leaders of criminal justice organizations experience a plethora of processes that impact the strategic, tactical, and operational facets of their respective organizations. Sound processes are central to effectively and efficiently managing criminal justice organizations and for facilitating the optimal operations of the organization. Such management characteristics are necessary to render public services towards the goals of deterring crime and maintaining societal order. Administrating and managing criminal justice organizations involves paradigms that favor process improvement and quality of processes. Existing methods include the Compstat paradigm Total Quality Management, business process management, business process improvement, business process reengineering, standards, legislation, policy, and Six Sigma. However, such paradigms not approach process improvement from the unique perspective of process maturity as a foundational basis. Additionally, no solitary foundational basis exists that uniquely addresses organizational process improvement issues, regarding criminal justice entities, from the perspective of evolutionary process maturation through time. This research examines the potential of adapting the Capability Maturity Model Integrated (CMMi) as a foundational process improvement framework among criminal justice organizations. Within the CMMi framework, process improvement begins from a state of random, ad hoc processes and culminates in a state of highly optimized processes. Through time, process maturation occurs through five primary stages sequentially: 1) random, 2) managed, 3) defined/specific, 4) quantitatively managed, and 5) optimized. This research explores the potential of leveraging the CMMi paradigm as a form of organizational process improvement within the criminal justice domain. Scope of the Study: This research investigated the potential for adapting the Capability Maturity Model (Integrated) (CMMi) within the criminal justice domain. A derivative maturity model framework, the Criminal Justice Maturity Model (CJMM), was crafted using the CMMi concept as its foundational premise. A Likert scale survey was implemented to investigate the perceptions of personnel regarding process improvement initiatives and their work settings. This study was constrained to the criminal justice domains of the states of Alabama and Mississippi. Data processing encompassed demographic descriptions of the survey instrument and the received responses, ANOVA, Chi-Square analysis, and the Cronbach Method. Stratifications involved separating the survey responses into classifications of Alabama versus Mississippi entities, urban versus rural entities, and management versus non-management entities. Findings and Conclusions: The conclusions of this research failed to show that all five levels of the maturity model framework appear to be separately perceived among the respondents. Therefore, per each individual stage of the maturity model framework, this research failed to show conclusively that the complete maturity model framework is adaptable among administrative settings in the criminal justice domain and that process maturity issues among respondent settings are addressed via a process maturity framework. Because this research failed to show the perceived characteristics of all five maturity levels of the maturity model framework separately, it is concluded that the criminal justice administrative settings of the respondents do not conform completely to the tenets of the CMMi paradigm. Future studies were recommended to pursue additional approaches of this research project. This study represents an initial starting point from which several future endeavors may be initiated. / Criminology and Security Science / D.Litt. et Phil. (Police Science)
175

Change management : the impact on systems implementation : a business application solutioncentre (BASC) case study

Boikhutso, Tryphosa Mathakadu 25 July 2013 (has links)
The dissertation discusses the impact of change management during the implementation of an IT system. The theoretical part of the dissertation is aimed at gaining information about human performance, and the implications during the implementation of the system, and also post-implementation. Literature suggests that the human factor is the key to the successful implementation of system projects. The study, which is qualitative in nature, makes use of face-to-face interviews for the collection of evidence, as well as questionnaires as add-on tools to support the underlying constructs and research questions posed within the study. The use of data obtained from the research interviews, as well as survey data, has provided the research study with the necessary validity, reliabilityand trustworthy data to support the research results, findings – and to be able to make some recommendations. The reason for the failure of system implementation projects is often due to poor implementation during the project. It is important to place the importance of people on a par with technology and processes. A holistic approach would be the most likely to result in the acceptance – and the efficient and effective use of the implemented system. Communication, training and management participation are common means of addressingany fears of change, and to build trust. This information should be utilised by project teams during implementation projects, as it should help to provide the necessary framework to ensure the success of the change initiatives. / Human Resource Management / M. Tech. (Human Resource Management)
176

The capability maturity model as a criminal justice process improvement paradigm

Doss, Daniel Adrian 07 1900 (has links)
Background: The administrators, managers, and leaders of criminal justice organizations experience a plethora of processes that impact the strategic, tactical, and operational facets of their respective organizations. Sound processes are central to effectively and efficiently managing criminal justice organizations and for facilitating the optimal operations of the organization. Such management characteristics are necessary to render public services towards the goals of deterring crime and maintaining societal order. Administrating and managing criminal justice organizations involves paradigms that favor process improvement and quality of processes. Existing methods include the Compstat paradigm Total Quality Management, business process management, business process improvement, business process reengineering, standards, legislation, policy, and Six Sigma. However, such paradigms not approach process improvement from the unique perspective of process maturity as a foundational basis. Additionally, no solitary foundational basis exists that uniquely addresses organizational process improvement issues, regarding criminal justice entities, from the perspective of evolutionary process maturation through time. This research examines the potential of adapting the Capability Maturity Model Integrated (CMMi) as a foundational process improvement framework among criminal justice organizations. Within the CMMi framework, process improvement begins from a state of random, ad hoc processes and culminates in a state of highly optimized processes. Through time, process maturation occurs through five primary stages sequentially: 1) random, 2) managed, 3) defined/specific, 4) quantitatively managed, and 5) optimized. This research explores the potential of leveraging the CMMi paradigm as a form of organizational process improvement within the criminal justice domain. Scope of the Study: This research investigated the potential for adapting the Capability Maturity Model (Integrated) (CMMi) within the criminal justice domain. A derivative maturity model framework, the Criminal Justice Maturity Model (CJMM), was crafted using the CMMi concept as its foundational premise. A Likert scale survey was implemented to investigate the perceptions of personnel regarding process improvement initiatives and their work settings. This study was constrained to the criminal justice domains of the states of Alabama and Mississippi. Data processing encompassed demographic descriptions of the survey instrument and the received responses, ANOVA, Chi-Square analysis, and the Cronbach Method. Stratifications involved separating the survey responses into classifications of Alabama versus Mississippi entities, urban versus rural entities, and management versus non-management entities. Findings and Conclusions: The conclusions of this research failed to show that all five levels of the maturity model framework appear to be separately perceived among the respondents. Therefore, per each individual stage of the maturity model framework, this research failed to show conclusively that the complete maturity model framework is adaptable among administrative settings in the criminal justice domain and that process maturity issues among respondent settings are addressed via a process maturity framework. Because this research failed to show the perceived characteristics of all five maturity levels of the maturity model framework separately, it is concluded that the criminal justice administrative settings of the respondents do not conform completely to the tenets of the CMMi paradigm. Future studies were recommended to pursue additional approaches of this research project. This study represents an initial starting point from which several future endeavors may be initiated. / Criminology and Security Science / D. Litt. et Phil. (Police Science)
177

Integration of information technology and physical asset planning and management

Tweedale, Robyn January 2003 (has links)
Queensland University of Technology has radically restructured the top-level governance systems for information technology planning and management. Additionally, QUT has integrated information technology planning and management with physical infrastructure planning and management via the Asset Management Plan. To complete the approach, QUT has instigated a top-level governance committee for IT to ensure alignment with organisational goals and strategies. This is an unusual development for IT planning and management at an Australian university and attracted attention from the Commonwealth Department of Education, Science and Training (DEST) as well as other universities in the Australian tertiary education sector and led to the research study. This research studies the redevelopment of the information technology planning and management approach. The survey research determines the level of integration of IT and university planning, and the correlation of this integration to effectiveness of IT planning. The case study documents the changes, highlights the advantages and disadvantages of the new approach and provides a model for change in IT management at other Australian universities. It is evident from current literature on information technology management and strategic planning that these developments are validated as steps toward achieving best practice in information technology planning and management. Through rigorous conduct of interviews, observations and review of documentation and through application of a survey questionnaire to a defined population, the research reviews the developments and ongoing implementation of the planning and management infrastructure. Among the outcomes from the new approach are better alignment of information technology investment with QUT goals and objectives, better benefits realisation from information technology investment, better project management of information technology development and innovation, and increased flexibility and accountability in information technology expenditure. Finally, a comparison to other information technology planning and management methods in place at Australian universities demonstrates the uniqueness of the QUT approach. The thesis reports the benefits and difficulties associated with this approach, and provides a context for future development of IT planning, management and governance at QUT.
178

Integration of information management systems to enhance business intelligence at the Department of Transport in South Africa

Chauke, Tshepo 02 1900 (has links)
Public sector decision makers are confronted by pressures to make faster and better decisions as a result of the competitive environment they operate in. However, there is a trend in the public sector, including the Department of Transport (DoT) in South Africa, to invest in management information systems (MIS) that are highly fragmented and not aiding effective and timely decision-making. As a result, the country witnessed several service delivery protests since 2008 which also affected the public transport sector, such as the widespread burning of Metrorail trains several times by angry commuters. In most instances, poor service delivery emanates from the fact that public servants do not have information at their fingertips to make decisions. This quantitative study utilised Control Objectives for Information and Related Technologies 5 (COBIT 5) as a theoretical framework to investigate the integration of MIS at the DoT with a view to enhancing business intelligence for effective decision-making. Data were collected through a questionnaire directed at middle managers and senior managers that were selected through stratification of business units at the DoT, as well as analysis of documents such as system specifications and strategic plans. The study established that the DoT has several systems such as Alfresco, BAS, GIS, Logis and Persal to name a few, which serve different purposes. However, in most instances, the systems are not integrated as the current infrastructure did not support integration needs and plans to accommodate changing requirements. This is compounded by the system policy implementation constraints, as well as ageing legacy systems that are obsolete. The only component where MIS was found to be integrated, was in the financial business units (Supply Chain Management, Finance and Budgeting). Core business units use off-the-shelf systems and, in some cases, custom-made applications that do not integrate with any other system and thus hinder decision-making. In conclusion, decisions are made based on thumb-sucking, as management does not have access to comprehensive information that is stored in fragmented unintegrated systems. The study recommends that governance structures should be set up to deal with a more holistic business, information and technology architecture for the DoT that enable integration of various systems for effective decision-making. Failure to transform this pattern would lead to service delivery protests persisting. A further study on a framework to integrate MIS in the public sector is recommended. / Information Science / M. Inf.
179

Awareness and training: the influence on end-user' attitude towards information security policy compliance

Snyman, Mmabatho Charity 02 1900 (has links)
Research accentuates that end-users‘ noncompliance with information security policy (ISP) is a key concern for government just as it is for the private sector. Although awareness and training programmes are important factors impacting employees‘ intentions to comply with an organisation‘s ISP, it can be argued that there is insufficient empirical evidence to support this assertion. To address this gap, this study seeks to expand research on ISP compliance by focusing on attitudes as targets of change. A research model based on the Theory of Planned Behaviour was proposed to illustrate the influence of ISP awareness training on end-users‘ attitudes towards complying with their organisation‘s ISP. Relevant hypotheses were developed to test the research conceptualisation. A survey and an experiment was undertaken to collect the data from a sample of 173 end-users of a single government organisation in one province. The data was captured and analysed using a Statistical Package for Social Sciences (SPSS). Furthermore, Structural Equation Modelling (SEM) was used to test whether the overall model appears to be a good fit to support the hypotheses. The reliability, validity, and model fit were found to be statistically significant, and three out of five research hypotheses were supported. Overall this study contributes to the existing body of knowledge by providing an understanding of the methods that can be used to encourage end-users‘ ISP compliance behaviour through an attitudinal shift, thereby targeting end-users‘ attitude as a means to improve information security policy compliance. Implications of the findings are further discussed in the paper. / Information Technology / M. Tech. (Information Technology)
180

A strategic theoretical framework to safeguard business value for information systems

Grobler, Chris Daniel January 2017 (has links)
The phenomenon of business value dissipation in mature organisations as an unintended by-product of the adoption and use of information systems has been a highly debated topic in the corporate boardroom awakening the interest of practitioners and academics alike. Much of the discourse tends to focus on the inability of organisations to unlock and realise the intended benefits to be harvested through large information systems investments. While the business case for investing in large technology programmes has been thoroughly investigated, the human agent that causes value erosion through his interaction with information systems (IS), has not received the studied attention it deserves. This study examines the use of technology in organisations by considering the dichotomy inherent in IS where its introduction for the purposes of creating new or sustaining existing business value subsequently also inadvertently dissipates value. The study proceeds to investigate the root people-induced causes resulting in the unintentional dissipation of value and presents an empirically validated model suggesting that human agents do not only create value for organisations through their use of IS, but at the same time, deliberately or inadvertently, dissipate value. The root people-induced causes resulting in the unintentional dissipation of value is delineated within a Theoretical Technology Value Framework that is constructed from a review of the extant literature, and delineates the overall unintentional value destroying causes and effects of IS on organisations. The Theoretical Technology Value Framework is forthwith applied as a basis for the development of a set of questions to support both qualitative and quantitative investigations from which an Archetypical Technology Value Model was derived. Finally, an Archetypical Technology Value Model is presented as a benchmark and basis to identify, investigate, mitigate and minimise or eliminate the unintentional value destroying effects of IS on Information Technology driven organisations. The study concludes with implications for both theory and practice and suggestions on how value erosion through the activities of the human agent may be identified, modeled and mitigated. Ultimately, recommendations are offered towards the crafting of more effective IS. / School of Computing / Ph. D. (Information Systems)

Page generated in 0.204 seconds