• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 75
  • 16
  • 13
  • 9
  • 4
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 142
  • 36
  • 33
  • 26
  • 26
  • 23
  • 23
  • 16
  • 14
  • 13
  • 12
  • 12
  • 12
  • 12
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Head in the Clouds : A quantitative study on cloud adoption in a industrial setting

Lundin, Lisa January 2020 (has links)
The purpose of this study is to investigate which factors that influence cloud adoption and contribute to existing research about cloud computing. Ten hypotheses were derived from the Technological, Organizational, and Environmental (TOE) framework combined with the Diffusion of Innovation (DOI) framework. Data was collected using a questionnaire and 91 individuals working in several industries and different countries participated in the study. The research model was tested using a quantitative approach using partial least squares structural equation modeling (PLS-SEM). The main factors that were identified as drivers for adoption of cloud computing are: digital strategy, competitive pressure, trading partner support, standardization, firm size and network and collaboration. These findings have important implications and great value to the research field, companies and cloud providers as they could formulate better strategies for a successful cloud adoption. The study also provides a new approach in research about cloud adoption where the type of enterprise system migrated to the cloud is taken into consideration. Findings in this study points towards system specific requirements influencing the adoption rate.
52

The impact of network related factors on Internet based technology in South Africa : a cloud computing perspective

Ramagoffu, Madisa Modisaotsile 24 February 2013 (has links)
Outsourcing, consolidation and cost savings of IT services, are increasingly becoming an imperative source of competitive advantage and a great challenge for most local and global businesses. These challenges not only affect consumers, but also the service providers’ community. As IT is slowly becoming commoditised, consumers, such as business organisations, are increasingly expecting IT services that will mimic other utility services such as water, electricity, and telecommunications.To this end, no one model has been able to emulate these utilities in the computing arena.Cloud Computing is the recent computing phenomenon that attempts to be the answer to most business IT requirements. This phenomenon is gaining traction in the IT industry, with a promise of advantages such as cost reduction, elimination of upfront capital outlay, pay per use models, shared infrastructure, and high flexibility allowing users and providers to handle high elasticity of demand. The critical success factor that remains unanswered for most IT organisations and its management is: What is the effect of the communication network factors on Internet based technology such as Cloud Computing, given the emerging market context.This study therefore, investigates the effect of four communication network factors (price, availability, reliability and security) in the adoption of Cloud Computing by IT managers in a South African context, including their propensity to adopt the technology. The study investigates numerous technology adoption theories, in which Technology, Organisation and Environment (TOE) framework is selected due to it having an organisational focus as opposed to an individual focus.Based on the results, this study proposes that Bandwidth (Pricing and Security) should be included into any adoption model that involves services running on the Internet. The study makes an attempt to contribute to the emerging literature of Cloud Computing, Internet in South Africa, in addition to offering organisations considering adoption and Cloud Providers’ significant ideas to consider for Cloud Computing adoption. / Dissertation (MBA)--University of Pretoria, 2012. / Gordon Institute of Business Science (GIBS) / unrestricted
53

Exploring the influence of organisational, environmental, and technological factors on information security policies and compliance at South African higher education institutions: Implications for biomedical research.

Abiodun, Oluwafemi Peter January 2020 (has links)
>Magister Scientiae - MSc / Headline reports on data breaches worldwide have resulted in heightened concerns about information security vulnerability. In Africa, South Africa is ranked among the top ‘at-risk’ countries with information security vulnerabilities and is the most the most cybercrime-targeted country. Globally, such cyber vulnerability incidents greatly affect the education sector, due, in part, to the fact that it holds more Personal Identifiable Information (PII) than other sectors. PII refers to (but is not limited to) ID numbers, financial account numbers, and biomedical research data. In response to rising threats, South Africa has implemented a regulation called the Protection of Personal Information Act (POPIA), similar to the European Union General Data Protection Regulation (GDPR), which seeks to mitigate cybercrime and information security vulnerabilities. The extent to which African institutions, especially in South Africa, have embraced and responded to these two information security regulations remains vague, making it a crucial matter for biomedical researchers. This study aimed to assess whether the participating universities have proper and reliable information security practices, measures and management in place and whether they fall in line with both national (POPIA) and international (GDPR) regulations. In order to achieve this aim, the study undertook a qualitative exploratory analysis of information security management across three universities in South Africa. A Technology, Organizational, and Environmental (TOE) model was employed to investigate factors that may influence effective information security measures. A Purposeful sampling method was employed to interview participants from each university. From the technological standpoint, Bring Your Own Device (BYOD) policy, whereby on average, a student owns and connects between three to four internet-enabled devices to the network, has created difficulties for IT teams, particularly in the areas of authentication, explosive growth in bandwidth, and access control to security university servers. In order to develop robust solutions to mitigate these concerns, and which are not perceived by users as overly prohibitive, executive management should acknowledge that security and privacy issues are a universal problem and not solely an IT problem and equip the IT teams with the necessary tools and mechanisms to allow them to overcome commonplace challenges. At an organisational level, information security awareness training of all users within the university setting was identified as a key factor in protecting the integrity, confidentiality, and availability of information in highly networked environments. Furthermore, the University’s information security mission must not simply be a link on a website, it should be constantly re-enforced by informing users during, and after, the awareness training. In terms of environmental factors, specifically the GDPR and POPIA legislations, one of the most practical and cost-effective ways universities can achieve data compliance requirements is to help staff (both teaching and non-teaching), students, and other employees understand the business value of all information. Users which are more aware of sensitivity of data, risks to the data, and their responsibilities when handling, storing, processing, and distributing data during their day to day activities will behave in a manner that would makes compliance easier at the institutional level. Results obtained in this study helped to elucidate the current status, issues, and challenges which universities are facing in the area of information security management and compliance, particularly in the South African context. Findings from this study point to organizational factors being the most critical when compared to the technological and environmental contexts examined. Furthermore, several proposed information security policies were developed with a view to assist biomedical practitioners within the institutional setting in protecting sensitive biomedical data.
54

Exploring the influence of organisational, environmental, and technological factors on information security policies and compliance at South African higher education institutions: Implications for biomedical research.

Abiodun, Oluwafemi Peter January 2020 (has links)
>Magister Scientiae - MSc / Headline reports on data breaches worldwide have resulted in heightened concerns about information security vulnerability. In Africa, South Africa is ranked among the top ‘at-risk’ countries with information security vulnerabilities and is the most cybercrime-targeted country. Globally, such cyber vulnerability incidents greatly affect the education sector, due, in part, to the fact that it holds more Personal Identifiable Information (PII) than other sectors. PII refers to (but is not limited to) ID numbers, financial account numbers, and biomedical research data.
55

Efeito da remoção da pinça pela parede e sola dos cascos dos membros torácicos de equinos sadios sobre a morfologia do casco, ângulos articulares distais e locomoção

Rosa, Vitor Bruno Bianconi January 2017 (has links)
Orientador: Carlos Alberto Hussni / Resumo: Os equinos são os animais domésticos que melhores desempenham a função locomotora, existindo a relação direta da nutrição com o sistema locomotor ao considerar-se que pastejam e se locomovem continuamente, permanecendo em apoio quadrupedal inclusive em períodos de descanso. São ungulados monodigitados, tendo por proteção o casco que sofre constante atrito com o solo. O casco que protege as estruturas internas e sofre desgastes tem crescimento contínuo em torno de meio a um centímetro por mês e tem a conformação estudada, com medidas e proporções descritas na normalidade. Sob influência de diversos fatores como terreno, uso do animal, conformação das estruturas digitais relacionadas, os equinos são frequentemente submetidos à casqueamento na busca da higiene e normalidade anatômica e funcional, sempre considerando as dimensões angulares e lineares dos diferentes aspectos a considerar os ângulos do casco pela pinça e pelos talões, as medidas da parede nas diferentes partes e ainda as medidas das estruturas observadas pela sola como larguras e comprimentos de ranilha e sola. As diferentes medidas e suas proporções conferem ao casco as características funcionais a que se aplica. A interferência no formato do casco tende a estabelecer mudanças no padrão dos andamentos que devem ser considerados como naturais ou artificiais, cujas características são: velocidade, número de batidas, saltado ou marchado, sequência de apoio dos membros, sequência de apoios dos mementos, simetria e pod... (Resumo completo, clicar acesso eletrônico abaixo) / Mestre
56

Lack of adoption of electronic Medical Records Systems in developing countries. A case study of Zimbabwe

Mhembere, Taurai Brian 12 February 2020 (has links)
This study explored the phenomenon of electronic medical records systems in Zimbabwean primary healthcare institutions. The goal of the study was to investigate the lack of adoption of electronic medical records systems by primary healthcare institutions in developing countries using an interpretative case study approach focusing on the Zimbabwean context. Despite the positive benefits that are associated with EMRs, developing countries have been reluctant in implementing this technology within their primary healthcare institutions. A number of studies have been conducted on EMR systems but only a few have investigated the reasons for the limited use of EMR technology in developing countries particularly within the Zimbabwean context. This study primarily adopted a case study approach and was qualitative in nature. The study made use of in-depth interviews to obtain its data, and purposive sampling method was used to identify participants for the study. The study made use of a sample size of fourteen respondents who were identified based on their knowledge and could assist explore this particular topic relevant to the research. The targeted population for this research were key staff members privy to patients’ medical records management within the primary healthcare facilities. The data collected was analysed using thematic analysis soon after the transcription process. The results of the study show that EMRs technology in Zimbabwe has been implemented on a limited scale within its public hospitals. The technology is being used mostly in HIV/AIDS management or in particular departments. The study reveals that although healthcare institutions in Zimbabwe have adopted EMRs technology, most of the information is still being archived on the paper based system. The findings of the study show that Zimbabwe hasn’t adopted EMRs due to challenges such as lack of proper infrastructures, resistance in the use of EMRs, remoteness, shortages in skilled labour and concerns of confidentiality and privacy. Furthermore, the study shows that though the application of the EMR system is limited in Zimbabwean hospitals, the study found that its benefits have been noticeable. EMR technology has made it easy to access information, averted redundant expenditure and has made time improvements. However, the study revealed that EMR systems come with their own shortcomings such as lack of access to patient documents due to network faults and the need for familiarity with computer systems.
57

Ankle and Midtarsal Joint Kinematics During Rearfoot and Non-rearfoot Strike Walking

Kuska, Elijah 06 September 2019 (has links)
No description available.
58

A Nonholonomic Parallel Mechanism and Body Motion-Based Leader-Follower Operation Methods for Mobile Manipulators / 作業移動型ロボットの非ホロノミックパラレル機構と身体動作に基づくリーダー・フォロワー操作法に関する研究

Yao, Qiang 23 March 2023 (has links)
京都大学 / 新制・課程博士 / 博士(工学) / 甲第24609号 / 工博第5115号 / 新制||工||1978(附属図書館) / 京都大学大学院工学研究科機械理工学専攻 / (主査)教授 小森 雅晴, 教授 松野 文俊, 教授 松原 厚 / 学位規則第4条第1項該当 / Doctor of Philosophy (Engineering) / Kyoto University / DFAM
59

Determinants of Cloud Computing Adoption in Large Companies in Sweden

Güldogan, Seher, Sun, Ruo Lin January 2023 (has links)
Cloud computing has gained popularity due to its ability to simplify IT infrastructure, reduce costs, and provide remote access. Among EU countries and company sizes, Sweden stands out with the highest rate of cloud computing adoption. However, there is a lack of concrete research in the literature focusing on the determinants of cloud computing adoption specifically by large companies in Sweden. Previous studies have examined cloud adoption from various perspectives, with a particular emphasis on small and medium-sized enterprises (SMEs) rather than large companies. Additionally, technology-related determinants have received more attention compared to those related to business, conceptualization, and application domains. To address this knowledge gap, this research aims to investigate the determinants of CC adoption in large companies in Sweden. The research question was formulated as follows: What are the determinants of cloud computing adoption in large companies in Sweden? Case study was selected as the research strategy, and the data was collected through semi-structured interviews and analyzed through thematic analysis. Semi-structured interviews were conducted with employees working at a large company in Sweden, who have experience in the IT and cloud computing field. The TOE framework was used to categorize the determinants as sub-themes into three themes: technology context, organization context, and environment context. In Company X, 30 determinants were found, with 20 aligning with previous literature. These included factors such as security, compatibility, scalability, top management support, and competitive pressure. Additionally, 10 new determinants were identified, including robustness, perceived usefulness, innovativeness, knowledge and training, and geographical locations/data centers. The experience and lessons learned from Company X could assist other companies to have better preparation for cloud adoption by understanding the significance of various potential determinants and underlying problems.
60

Smart Trafikstyrning : En fallstudie om smart teknik i samhället

Blomkvist, Alva January 2022 (has links)
Denna studie syftar till att undersöka hur Stockholm stad som offentlig organisation hanterar innovation som implementeras samt hur förändringsprocessen ser ut när en stad ska bli smart. Detta genomförs genom en fallstudie på ett projekt som Stockholm stad drivit under ett par år. Inom programmet Stockholm smart och uppkopplad stad verkar projektet Smart trafikstyrning som omfattar sex olika delprojekt som syftar till att förenkla trafiken genom smarta lösningar, som bland annat handlar om tryckknappslådor och trafiksignaler. Resultatet har samlats in genom semistrukturerade intervjuer och handlar om hur Stockholm stad har arbetat samt hur de olika projektens struktur har sett ut. Studien kommer fram till att Stockholm stad är en välutvecklad organisation när det kommer till att hantera denna innovation, men att dess svaghet är att det är en stor organisation som har svårt att uppnå den flexibilitet som ibland hade behövts. Studien bidrar till att öka kunskapen och förståelsen för hur uppkopplade enheter fungerar i en kontext av smarta städer samt hur offentliga organisationer ska förhålla sig till dessa projekt.

Page generated in 0.0158 seconds