• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 507
  • 88
  • 39
  • 31
  • 7
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • Tagged with
  • 912
  • 912
  • 912
  • 230
  • 152
  • 144
  • 136
  • 108
  • 86
  • 84
  • 78
  • 78
  • 71
  • 68
  • 60
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
251

The impacts of organizational culture and supply chain management (SCM) practices on enterprise resources planning (ERP) decisions. / CUHK electronic theses & dissertations collection / ProQuest dissertations and theses

January 2011 (has links)
Based on the findings of previous studies, we propose that culture and management practices significantly influence ERP decisions that include using or not using ERP and using which type of ERP system. To provide more insights for the ERP vendors to develop systems which fit Chinese culture and practices as well as for Chinese manufacturers to choose a suitable ERP system, this study explores and aims to empirically validate factors influencing ERP decisions from the perspectives of organizational culture and SCM practices. / In the past decade, more and more Chinese manufacturers adopt enterprise resources planning (ERP) systems to facilitate their planning, manufacturing, logistics and other business processes and management. Meanwhile, how to choose a suitable ERP system becomes a difficult problem for many companies. / Scholars have conducted many studies related to ERP decision problem. Findings of those existing studies have provided important references for companies to make decision on using or not using ERP system. However, very limit insight can be found from the previous studies regarding of which type of ERP system should be chosen. / We propose two research models integrating organizational culture, SCM practices and ERP decisions, based on a comprehensive review on the literatures of IT and culture, management practices and culture. We conduct a survey in the manufacturing firms in five cities in Pearl River Delta (PRD) regions and empirically validate our research models. The empirical results indicate that process versus results oriented, open versus closed system and information sharing significantly influence the decision on using or not using ERP system; in addition, loose versus tight control, normative versus pragmatic, information quality and internal agile practices significantly influence the decision on using which type of ERP system. / Tang, Mincong. / Advisers: Xiande Zhao; Waiman Cheung. / Source: Dissertation Abstracts International, Volume: 73-07(E), Section: A. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2011. / Includes bibliographical references (leaves 179-205). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. Ann Arbor, MI : ProQuest dissertations and theses, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract and appendix also in Chinese.
252

Multimedia applications in production information management.

January 1993 (has links)
by Ip Kin-ting, Joma. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1993. / Includes bibliographical references (leaves 47-49). / ABSTRACT --- p.ii / TABLE OF CONTENTS --- p.iii / ACKNOWLEDGEMENTS --- p.v / Chapter / Chapter I. --- INTRODUCTION --- p.1 / Background --- p.1 / Objective --- p.2 / Report Organization --- p.2 / Chapter II. --- RESEARCH METHODOLOGY --- p.3 / Methodology --- p.3 / Problem Definition --- p.3 / Information Needs --- p.3 / Information Collection --- p.4 / Analysis and Conclusion --- p.4 / Chapter III. --- MULTIMEDIA TECHNOLOGY - AN OVERVIEW --- p.5 / Definition --- p.5 / Benefits --- p.6 / Major Components of Multimedia systems --- p.6 / Typical Multimedia Systems --- p.12 / Multimedia Standards --- p.15 / Existing Multimedia Applications --- p.16 / The Trend --- p.18 / Summary --- p.20 / Chapter IV. --- PRODUCTION MANAGEMENT - AN OVERVIEW --- p.22 / Definition --- p.22 / Major Production Management Activities --- p.22 / Manufacturing Resource Planning --- p.26 / Just-in-time Manufacturing --- p.27 / Computerised Production Information Systems --- p.28 / The Trend --- p.32 / Summary --- p.34 / Chapter V. --- INTERVIEW REPORTS --- p.35 / Rototech --- p.35 / Kitty & Kettie Supermarket Limited --- p.36 / Summary --- p.36 / Chapter VI. --- MULTIMEDIA TECHNOLOGY IN PRODUCTION INFORMATION MANAGEMENT --- p.37 / The Role of Multimedia Technology in Production Information Management --- p.37 / Existing Applications --- p.38 / The Opportunities --- p.41 / Summary --- p.43 / Chapter VII. --- CONCLUSIONS AND RECOMMENDATIONS --- p.44 / BIBLIOGRAPHY --- p.47
253

A comparison of management information systems of selected Chinese, British and American banks in Hong Kong.

January 1974 (has links)
Helen Shih. / Summary in Chinese. / Thesis (M.B.A.)--Chinese University of Hong Kong. / Bibliography: leaves 114-118.
254

A study of the management information systems in Hong Kong's hotel industry.

January 1975 (has links)
Summary in Chinese. / Thesis (M.B.A.)--Chinese University of Hong Kong. / Bibliography: leaves 83-84.
255

The design and implementation of a digital model for computer-based information system project management.

January 1976 (has links)
Thesis (M.B.A.)--Chinese University of Hong Kong. / Bibliography: leaves 164-166.
256

Implementing new technology--: processes and problems.

January 1998 (has links)
by Wong Ngar Yan Sandy. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaf 55). / ABSTRACT --- p.4 / TABLE OF CONTENTS --- p.5 / Chapter / Chapter I. --- INTRODUCTION --- p.6 / Chapter II. --- METHODOLOGY --- p.8 / Chapter III. --- INFORMATION ANALYSIS --- p.11 / Definition of the Organization's or Business Application's Objectives --- p.11 / Examining the Current System --- p.12 / Proposing System Solutions --- p.15 / Chapter IV. --- SYSTEM DESIGN --- p.20 / Chapter V. --- SYSTEM DEVELOPMENT --- p.25 / Chapter VI. --- TESTING --- p.30 / Chapter VII. --- SYSTEM INSTALLATION --- p.33 / Parallel Run and Conversion --- p.35 / Pilot Run --- p.36 / CUTOVER AND CONVERSION --- p.38 / Hardware Installation --- p.39 / Chapter VIII. --- TRAINING --- p.42 / Chapter IX. --- SYSTEM LAUNCH --- p.44 / Chapter X. --- SYSTEM REVIEW --- p.46 / Chapter XI. --- SYSTEM MAINTENANCE --- p.47 / Chapter XII. --- OPERATION MANAGEMENT --- p.48 / Chapter XIII. --- CONCLUSION --- p.49 / APPENDIX --- p.53 / BIBLIOGRAPHY --- p.55
257

Microcomputer based management information system

Lin, Francis January 2010 (has links)
Typescript (photocopy).rev / Digitized by Kansas Correctional Industries / Department: Computer Science.
258

Access rights for intelligent data objects

Bishop, Sandra Kay January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries / Department: Computer Science.
259

Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice?

Raykova, Mariana Petrova January 2012 (has links)
Many services that people use daily require computation that depends on the private data of multiple parties. While the utility of the final result of such interactions outweighs the privacy concerns related to output release, the inputs for such computations are much more sensitive and need to be protected. Secure multiparty computation (MPC) considers the question of constructing computation protocols that reveal nothing more about their inputs than what is inherently leaked by the output. There have been strong theoretical results that demonstrate that every functionality can be computed securely. However, these protocols remain unused in practical solutions since they introduce efficiency overhead prohibitive for most applications. Generic multiparty computation techniques address homogeneous setups with respect to the resources available to the participants and the adversarial model. On the other hand, realistic scenarios present a wide diversity of heterogeneous environments where different participants have different available resources and different incentives to misbehave and collude. In this thesis we introduce techniques for multiparty computation that focus on heterogeneous settings. We present solutions tailored to address different types of asymmetric constraints and improve the efficiency of existing approaches in these scenarios. We tackle the question from three main directions: New Computational Models for MPC - We explore different computational models that enable us to overcome inherent inefficiencies of generic MPC solutions using circuit representation for the evaluated functionality. First, we show how we can use random access machines to construct MPC protocols that add only polylogarithmic overhead to the running time of the insecure version of the underlying functionality. This allows to achieve MPC constructions with computational complexity sublinear in the size for their inputs, which is very important for computations that use large databases. We also consider multivariate polynomials which yield more succinct representations for the functionalities they implement than circuits, and at the same time a large collection of problems are naturally and efficiently expressed as multivariate polynomials. We construct an MPC protocol for multivariate polynomials, which improves the communication complexity of corresponding circuit solutions, and provides currently the most efficient solution for multiparty set intersection in the fully malicious case. Outsourcing Computation - The goal in this setting is to utilize the resources of a single powerful service provider for the work that computationally weak clients need to perform on their data. We present a new paradigm for constructing verifiable computation (VC) schemes, which enables a computationally limited client to verify efficiently the result of a large computation. Our construction is based on attribute-based encryption and avoids expensive primitives such as fully homomorphic encryption andprobabilistically checkable proofs underlying existing VC schemes. Additionally our solution enjoys two new useful properties: public delegation and verification. We further introduce the model of server-aided computation where we utilize the computational power of an outsourcing party to assist the execution and improve the efficiency of MPC protocols. For this purpose we define a new adversarial model of non-collusion, which provides room for more efficient constructions that rely almost completely only on symmetric key operations, and at the same time captures realistic settings for adversarial behavior. In this model we propose protocols for generic secure computation that offload the work of most of the parties to the computation server. We also construct a specialized server-aided two party set intersection protocol that achieves better efficiencies for the two participants than existing solutions. Outsourcing in many cases concerns only data storage and while outsourcing the data of a single party is useful, providing a way for data sharing among different clients of the service is the more interesting and useful setup. However, this scenario brings new challenges for access control since the access control rules and data accesses become private data for the clients with respect to the service provide. We propose an approach that offers trade-offs between the privacy provided for the clients and the communication overhead incurred for each data access. Efficient Private Search in Practice - We consider the question of private search from a different perspective compared to traditional settings for MPC. We start with strict efficiency requirements motivated by speeds of available hardware and what is considered acceptable overhead from practical point of view. Then we adopt relaxed definitions of privacy, which still provide meaningful security guarantees while allowing us to meet the efficiency requirements. In this setting we design a security architecture and implement a system for data sharing based on encrypted search, which achieves only 30% overhead compared to non-secure solutions on realistic workloads.
260

Ethical belief and behavior in using information systems : in search of predictive models

Choi, Kin Ying 01 January 1997 (has links)
No description available.

Page generated in 0.1251 seconds