• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 200
  • 39
  • 14
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 342
  • 342
  • 198
  • 92
  • 68
  • 51
  • 49
  • 48
  • 45
  • 32
  • 32
  • 32
  • 32
  • 27
  • 27
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Investigating the use of the ITIL framework towards IT services delivery at the NMMU

Lubambo, Nontobeko January 2009 (has links)
The purpose of this research was to investigate what is involved in IT Service Management and how the NMMU can implement it to improve the quality of IT service support and service delivery. The IT Service Management approach was investigated but the main focus was on the Service Support and Service Delivery in the ITIL framework. Higher Education was analyzed to try and measure the maturity level of the ITIL process implementation to see where Higher Education in South Africa is and to determine the gaps. Findings from the empirical study will be presented and recommendations highlighted to Top management and the IT department in order to promote and improve the quality of the IT service being delivered to users and customers. The data was collected and administered by means of a structured questionnaire based on the ITIL Service Capacity Maturity Model and Rick Leopoldi’s alternative Maturity Assessment method. An Association of South African University Directors of Information Technology (ASAUDIT) questionnaire on Service Management was also used to supplement the questionnaire. It was discovered that the implementation of ITIL in most organizations brought about improvements and benefits in the quality of the IT service being delivered.
182

An analysis of the degree of implementation of total quality and technology management principles to enhance the competitive status of a cable manufacturing company

De Booi, Ndumiso Witness January 2004 (has links)
The cable manufacturing industry may not be well known to some people, yet people’s very lives depend on products and services it produces. Today people live in a highly technological or digital world where most of the technology used by society has at least one electrical cable in it or is connected to a countrywide electrical or communications network through electrical cables in order to work. Well trained and experienced corporate and business leaders recognize the importance of lean supply chain and of being closer to one’s business suppliers for efficient running of the business. Like in all other countries where these industries exist, it is vital that the cable manufacturing industry survives and prospers in South Africa, for the benefit of South African telecommunications, electricity suppliers, computer networks and many more industries. However, today there are almost no boundaries in business owing to globalization which enhances free trade. The business environment is changing and there is fierce competition amongst international rivals. What happens then when customers are not happy with low quality products of one supplier? Would they not leave that supplier and look to the competition in order to get good quality products at reasonable prices? Of course they would. Consequently such a supplier would lose market share and ultimately be forced out of business. This research investigates the shortcomings in terms of the implementation of the principles of total quality and technology management in the cable manufacturing industry. It identifies the internationally recognised principles in the fields of total quality management and technology management as a means of enhancing a competitive advantage. Training and development are identified as extremely important supporting mechanisms which should be done professionally for the best results in the implementation of total quality and technology management principles. Finally, suggestions and recommendations based on best management practice are made.
183

Knowledge-sharing through communities of practice at institutions of higher education

Buckley, Sheryl Beverley 05 June 2012 (has links)
D. Litt. et Phil. / As the world moved from an industrial society to a knowledge society where people tend to work smarter and not harder, knowledge (implicit and explicit) became the main asset of a modern organisation. Human assets took precedence over financial assets. However, the rate at which the knowledge bank was increased owing to the progress in information technology was so fast that it became humanly impossible for one or two people to possess all knowledge. The notion of “knowledge is power” changed to one of “knowledge sharing is power”. While explicit knowledge can be quantified, saved and reused, tacit knowledge can only be shared voluntarily. This sharing of knowledge has given rise to communities of practice (CoPs). This study investigates the phenomenon of CoPs in an academic higher education (HE) institution such as a university. The aim was to establish criteria that could be used to identify the existence of such communities and their contribution to the institution, why CoPs are formed or not and how the formation of a CoP can enrich the knowledge bank of the institution. Once these objectives were achieved, it was hoped that it would be possible to create or encourage existing CoPs and ultimately ways to manage them.
184

A framework for the strategic deployment of business intelligence systems

Waterson, Elton 05 June 2012 (has links)
M.Tech. / Business Intelligence (BI) is a method used to improve on business decision-making, using collections of software applications and tools to view historical, current and predictive operations of a business. However, a company‟s BI solution will not be successful if it is not implemented in a comprehensive and strategic manner. There are three key issues that prevent organisations from benefiting from BI systems. These issues include the lack of pervasiveness of BI systems, managing a variety of non-related systems that do not work well together and using traditional methods that have not evolved to meet organisational needs (Koehler, 2008). BI vendors misinform many business users that BI tools are usable by all users in an organisation, and end up been too complex for the average user to use. The first mistake an organisation makes when assessing a BI system is neglecting to include business users on selecting the best option, although they will be the main users of the solution (Quinn, 2007). Many Information Technology (IT) departments ask for BI systems based on the assumption that once it is built, that users will automatically see the benefits. BI applications require a clear and intimate understanding of the business itself and it is only by working on business and IT issues in tandem that the real value of BI is realised (Hostmann, 2007).
185

Legal implications of information security governance

Etsebeth, Verine 08 January 2009 (has links)
LL.M. / Organisations are being placed under increased pressure by means of new laws, regulations and standards, to ensure that adequate information security exists within the organisation. The King II report introduced corporate South Africa to the concept of information security in 2002. In the same year the Electronic Communications and Transactions Act 25 of 2002 addressed certain technical information security issues such as digital signatures, authentication, and cryptography. Therefor, South Africa is increasingly focussing its attention on information security. This trend is in line with the approach taken by the rest of the international community, who are giving serious consideration to information security and the governance thereof. As organisations are waking up to the benefits offered by the digital world, information security governance is emerging as a business issue pivotal within the e-commerce environment. Most organisations make use of electronic communications systems such as e-mail, faxes, and the world-wide-web when performing their day-to-day business activities. However, all electronic transactions and communications inevitably involve information being used in one form or another. It may therefor be observed that information permeates every aspect of the business world. Consequently, the need exists to have information security governance in place to ensure that information security prevails. However, questions relating to: which organisation must deploy information security governance, why the organisation should concern itself with this discipline, how the organisation should go about implementing information security governance, and what consequences will ensue if the organisation fails to comply with this discipline, are in dispute. Uncertainty surrounding the answers to these questions contribute to the reluctance and skepticism with which this discipline is approached. This dissertation evolves around the legal implications of information security governance by establishing who is responsible for ensuring compliance with this discipline, illustrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline, ultimately providing the reader with certainty and clarity regarding the above mentioned questions, while simultaneously enabling the reader to gain a better understanding and appreciation for the discipline information security governance. The discussion hereafter provides those who should be concerned with information security governance with practical, pragmatic advice and recommendations on: (i) The legal obligation to apply information security; (ii) Liability for failed information security; (iii) Guidelines on how to implement information security; and (iv) A due diligence assessment model against which those responsible for the governance and management of the organisation may benchmark their information security efforts.
186

Accident versus Essence: Investigating the Relationship Among Information Systems Development and Requirements Capabilities and Perceptions of Enterprise Architecture

Salmans, Brian R. 08 1900 (has links)
Information systems (IS) are indelibly linked to the global economy and are indispensable to society and organizations. Despite the decisive function of IS in organizations today, IS development problems continue to plague organizations. The failure to get the system requirements right is considered to be one of the primary, if not the most significant, reasons for this high IS failure rate. Getting requirements right is most notably identified with Frederick Brooks' contention that requirements are the essence of what IT professionals do, all the rest being accidents or risk management. However, enterprise architecture (EA) may also provide the discipline to bridge the gap between effective requirements, organizational objectives, and the actual IS implementations. The intent of this research is to examine the relationship between IS development capabilities and requirements analysis and design capabilities within the context of enterprise architecture. To accomplish this, a survey of IT professionals within the Society for Information Management (SIM) was conducted. Results indicate support for the hypothesized relationship between IS development and requirements capabilities. The hypothesized relationships with the organizational demographics were not supported nor was the hypothesized positive relationship between requirements capabilities and EA perceptions. However, the nature of the relationship of requirements and EA provided important insight into the relationship leading to several explanations as to its meaning and contributions to research and practice. This research contributes to IS development knowledge by providing evidence of the essential role of requirements in IS development capabilities and in IS development maturity. Furthermore, contributions to the nascent field of EA research and practice include key insight into EA maturity, EA implementation success, and the role of IT professionals in EA teams. Moreover, these results provide a template and research plan of action to pursue further EA research in exploring EA maturity models and critical success factors, and the state of practice of EA in organizations
187

PERCEPTIONS OF PURPLE TEAMS AMONG CYBERSECURITY PROFESSIONALS

Siddharth Chowdhury (6613439) 15 May 2019 (has links)
With constant technological advancements, the attacks against existing infrastructure is constantly increasing and causing more damage. The current Red and Blue team approach to cybersecurity assessments is used to test the effectiveness of security defenses and in identifying vulnerabilities before they are exploited. Due to a lack of collaboration and inherently contradicting natures of these teams, the credibility of audits is impacted. While this has led to the synergistic and collaborative Purple team, it is important to understand how cybersecurity professionals perceive this new concept and its function. Analyzing perceptions of self-reported cybersecurity professionals via an online survey showed most believed Purple teams were beneficial and should be created from and collaborate with Red and Blue teams. However, past Red team experience was negatively linked to perceived benefit. Those who had more years of experience or had been on Red teams were more likely to believe Purple teams may have ownership or learning issues. Furthermore, professionals identified active managerial involvement and project clarity as critical success factors for Purple teams. Alongside these, management could help find the right skillset, provide resources, and offer active direction in order to avoid issues and maximize outcomes. Based on assessment relevance, a collaborative agreed-upon methodology for Red, Blue, and Purple teams was provided.
188

Investigating the Threats of Unmanned Aircraft Systems (UAS) at Airports

Cheng Wang (9745922) 15 December 2020 (has links)
Safety is the top priority for the aviation industry and a safe airport environment is essential to aviation safety. However, due to the increasing prevalence of UAS in recent years, UAS sightings have become a potential threat to airports. When UAS appear in the vicinity of airports, they bring safety concerns and result in negative operational and economic impacts on airports. Since the FAA’s mission is to provide the safest and most efficient aerospace system in the world, further research regarding the threat of UAS sightings to airports is needed. The purpose of this study is to investigate the threat of UAS to airports and in the national airspace system (NAS). This study includes three primary components: the analysis of 6,551 Federal Aviation Administration (FAA) UAS sighting reports, a case study of the impacts of the UAS sighting at Newark Liberty International Airport (EWR) on January 22, 2019, and a synthesis of airport operator perspectives based on interviews with airport personnel at five airports. The analysis of UAS sighting reports shows the characteristics of UAS sightings, the case study on EWR UAS illustrates the impact of the UAS sighting at the airport, and interview results illustrate the current perspective of airport operators regarding the risk of UAS. Along with the results, the scientific methods of identifying and analyzing the characteristics of UAS sightings in controlled airspace close to airports could be used by researchers to study UAS sightings in the future. Findings from this study may be beneficial to multiple stakeholders, including airport personnel, regulators, entrepreneurs, and vendors in the aviation industry. <br>
189

Corporate Strategies of Digital Organizations

Anparasan Mahalingam (6922799) 22 July 2021 (has links)
<p>This dissertation examines the implications of digitization for firm corporate strategy and organizational governance. I aim to link together emerging research on platform businesses and classic corporate strategy research on firm scale, scope and organization, two important streams of work that have remained largely independent despite the close connection between them. To do so, my dissertation revolves around the following central question: How can platform owners leverage governance mechanisms to alleviate market frictions, and what are the performance outcomes? </p><p><br></p> <p>In the first chapter, using game-theoretic formal models, I analyze how long standing information frictions are alleviated by digital platforms through developing capabilities for solving these information problems and exploiting synergies between those capabilities. In the second chapter, using data from online peer-to-peer lending, I show that platform owners can mitigate problems of information asymmetry in platform markets and enhance market effectiveness through allocation of key decision rights among participants. Finally, in the third chapter, using data from mobile apps, I show that platform gatekeeping serves as a screening mechanism for platform owners and how it can shape the different ways app developers profit from innovation. </p><p><br></p><p>Collectively, my dissertation aims to advance corporate strategy research in two ways. First, my research broadens the application of theories of organizational governance core to corporate strategy to a new organizational form – platforms – and I show that core tenets of the theories still apply, although the specific empirical mechanisms might take a different form in the platform context (e.g., decision rights allocated between the platform owner and complementors, rather than between the corporate office and business units). Second, my research stands to expand existing theories in corporate strategy through a sharp focus on organization and governance features that are unique to platforms – such as by studying the orchestrating role of the platform owner (e.g., through gatekeeping, platform owner can control complementors' platform access and shape their value-creation activities on the platform), and the multi-layer relationships prevalent in platforms (e.g., relationships between the platform owner and complementors, between complementors on the same side, and between complementors across two or more sides).</p>
190

Technology surveillance of the solar refrigeration by absorption/adsorption

Merino, Jose Carlos Alvarez, Hatakeyama, Kazuo 09 1900 (has links)
PICMET 2016 - Portland International Conference on Management of Engineering and Technology: Technology Management For Social Innovation, Proceedings4 January 2017, Article number 7806767, Pages 1976-19822016 Portland International Conference on Management of Engineering and Technology, PICMET 2016; Honolulu; United States; 4 September 2016 through 8 September 2016; Category numberCFP16766-ART; Code 125891 / In order to establish networks of cooperation looking for not to duplicate research and even to make use of existing research in a remote form, it is necessary to identify and classify (around the world) the researchers and laboratories, that are researching in the topic of solar refrigeration by absorption/adsorption. The methodology consists in: i) the technology's classification, ii) technological trajectory Identification, iii) a thematic bibliographic review, and iv) patent's analysis. In this way, with the previous determination of keywords, will be identified main authors and their respective institutions. With the same keywords, are determined the licensed patents (in certain span of time). In addition, the analysis of publications, patents, and commercial products give us an opportunity to establish comparisons between prototypes and tests (in several conditions). The larger results implicate the use of actor's network and the remote access to the data and tests, for a collaborative research, overcoming the lack of laboratory resource and accelerating the knowledge acquisition / Revisión por pares

Page generated in 0.072 seconds