• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2866
  • 957
  • 483
  • 79
  • 70
  • 64
  • 56
  • 44
  • 37
  • 36
  • 35
  • 18
  • 16
  • 15
  • 13
  • Tagged with
  • 5330
  • 5330
  • 1258
  • 854
  • 845
  • 807
  • 756
  • 609
  • 551
  • 500
  • 481
  • 480
  • 412
  • 379
  • 366
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

The use of mobile communication technology after hours and its effects on work life balance and organizational efficiency

Davis, Wayne A., Sr. 03 February 2016 (has links)
<p> Advances in mobile communication technologies have made it easier for individuals to connect to the workplace during non-work time. The attraction of mobile devices by employers is they enhance productivity, reduce response time and costs, and enhance customer service, while at the same time an individual&rsquo;s constant connectivity to the workplace can cause conflict between the work and home domains. This research study focused on the individual&rsquo;s connectivity behavior after hours while using mobile technologies and the effect it had on work-life balance and organizational efficiency. The research study used a quantitative research methodology to survey Information Technology Professionals. The survey was sent to 877 potential participants, of which 329 responded. The focus of the research was to learn how the use of mobile technology after hours related to employee satisfaction, work-life balance, absenteeism, burnout, and the inability to detach from work. Results indicated a significant relationship between the use of mobile technology after hours and absenteeism, burnout, and the inability to detach from work, while indicating no significant relationship with work-life balance and employee satisfaction. Because mobile technologies are influencing the way we remain connected to the workplace during non-work time, it is important to understand how this technology affect work-life balance and organizational efficiency. The implication for both employer and employees is discussed with emphasis on strategies for maintaining work-life balance and employee satisfaction. </p>
122

The development of a model for municipal e-government in Puerto Rico and its evaluation tools

Santiago, Edward 08 April 2016 (has links)
<p> In the modern world, information and speed are paramount. Governments and businesses alike compete not only with one another but to better serve the public. Governments around the world are using more and more technology to reach those that are not capable of traveling to the nearest cities or do not have the resources for technology. Governments with smaller budgets or in third world countries are looking at technology as an option to do more with less. This new trend is referred to as eGovernment, or electronic government. Through this new breakthrough, governments may improve service hours, lower costs, and allow citizens to interact more with them. </p><p> This investigation will illustrate worldwide trends of doing governance utilizing more businesslike applications, such as enterprise software and network architecture. In addition, we found many good reasons to use electronic government solutions within the island of Puerto Rico in order to reduce operating costs and increase productivity. After a thorough analysis of the basic necessities of the four principal groups that demand services from any government, the ideal model for carrying out electronic government in Puerto Rico was created. </p>
123

Improving Enterprise Data Governance Through Ontology and Linked Data

DeStefano, R.J. 16 April 2016 (has links)
<p> In the past decade, the role of data has increased exponentially from being the output of a process, to becoming a true corporate asset. As the business landscape becomes increasingly complex and the pace of change increasingly faster, companies need a clear awareness of their data assets, their movement, and how they relate to the organization in order to make informed decisions, reduce cost, and identify opportunity. The increased complexity of corporate technology has also created a high level of risk, as the data moving across a multitude of systems lends itself to a higher likelihood of impacting dependent processes and systems, should something go wrong or be changed. The result of this increased difficulty in managing corporate data assets is poor enterprise data quality, the impacts of which, range in the billions of dollars of waste and lost opportunity to businesses. </p><p> Tools and processes exist to help companies manage this phenomena, however often times, data projects are subject to high amounts of scrutiny as senior leadership struggles to identify return on investment. While there are many tools and methods to increase a companies&rsquo; ability to govern data, this research stands by the fact that you can&rsquo;t govern that which you don&rsquo;t know. This lack of awareness of the corporate data landscape impacts the ability to govern data, which in turn impacts overall data quality within organizations. </p><p> This research seeks to propose a means for companies to better model the landscape of their data, processes, and organizational attributes through the use of linked data, via the Resource Description Framework (RDF) and ontology. The outcome of adopting such techniques is an increased level of data awareness within the organization, resulting in improved ability to govern corporate data assets. It does this by primarily addressing corporate leadership&rsquo;s low tolerance for taking on large scale data centric projects. The nature of linked data, with it&rsquo;s incremental and de-centralized approach to storing information, combined with a rich ecosystem of open source or low cost tools reduces the financial barriers to entry regarding these initiatives. Additionally, linked data&rsquo;s distributed nature and flexible structure help foster maximum participation throughout the enterprise to assist in capturing information regarding data assets. This increased participation aids in increasing the quality of the information captured by empowering more of the individuals who handle the data to contribute. </p><p> Ontology, in conjunction with linked data, provides an incredibly powerful means to model the complex relationships between an organization, its people, processes, and technology assets. When combined with the graph based nature of RDF the model lends itself to presenting concepts such as data lineage to allow an organization to see the true reach of it&rsquo;s data. This research further proposes an ontology that is based on data governance standards, visualization examples and queries against data to simulate common data governance situations, as well as guidelines to assist in its implementation in a enterprise setting. </p><p> The result of adopting such techniques will allow for an enterprise to accurately reflect the data assets, stewardship information and integration points that are so necessary to institute effective data governance.</p>
124

HIPAA protected delivery across Internet

Shirke, Parth P. 08 July 2016 (has links)
<p>VPN (Virtual Private Network) is a method of providing a secure connection between a source (computer/server) and a destination host. The connection is secured not on the basis of employing a dedicated channel between the source and destination host, but instead the connection is secured over the public internet. </p><p> VPN is implemented in a hospital&rsquo;s network to meet the Health Insurance Protection and Accountability Act (HIPAA) regulations. HIPAA is a directive that compels the medical centers and clinics to handle an individual&rsquo;s electronic medical record securely; free from any nature of breaching. </p><p> In an effort to execute the VPN on a hospital&rsquo;s network that complies with HIPAA, this project is focused on creating a network simulation with the VPN including other networking features. The VPN enabled network is accomplished using the GNS3 network simulation software. The data through the VPN tunnel are encoded and observed in Wireshark Software. </p><p> In the conclusion we will observe the state, unencrypted and encrypted, of the packets before and after, respectively, applying the VPN to the border routers through which the IP packets are traveling via the insecure Public Internet. </p>
125

Health in your hand| Assessment of clinicians' readiness to adopt mHealth into rural patient care

Weichelt, Bryan P. 10 June 2016 (has links)
<p> <b>Introduction:</b> Technology is as much rural as it is urban, but mobile health (mHealth) could have a unique impact on health and quality of life for rural populations. The adoption of mobile technologies has soared in recent decades leading to new possibilities for mHealth use. This project considers the impact of these technologies on rural populations. Specifically, it is focused on assessing the barriers of physicians and healthcare organizations to adopt mHealth into their care plans. Gaps in knowledge exist in assessing organizational readiness for mHealth adoption, the use of patient-reported data, and the impact on rural healthcare. This project seeks to address those gaps. </p><p> <b>Methods:</b> Utilizing semi-structured, open-ended interviews as the primary instrument of inquiry, clinicians&rsquo; current practices, motivators, and barriers to the use of mHealth technologies were identified. Thematic analysis revealed code-category linkages that identify the complex nature of a rural healthcare organization&rsquo;s current climate from a physician perspective. A thematic map was developed to visualize the flow from category to code. Those linkages were then utilized to construct a refined mHealth readiness model. </p><p> <b>Results:</b> Thirteen Wisconsin-based clinicians from the Marshfield Clinic Health System participated in interviews and consults. The interviews uncovered current practices, with 53.8% of participants reporting that they do encourage the use of mHealth apps or wearable devices with patients. Perceived barriers to adoption were categorized into three primary pillars &ndash; personal (clinician), patient, and organizational. Organizational was the most prominent category, with codes such as time, uniformity, and policy/direction. </p><p> <b>Conclusion:</b> Clinicians, particularly physicians have tight schedules with very limited time for continuing education, research, or exploration into new technologies. Limited clinician time can lead to a lack of familiarity with new and emerging technologies. Clinicians are interested and motivated to learn more, but also need assistance with screening and quality reviews. Organizationally-led directives and suggestions, such as a menu of technologies, would be used. </p><p> There are some risks that would need to be mitigated, but if organizations were prepared to manage mHealth it is very likely that physicians could improve the quality of care for their patients. However, many organizations including Marshfield Clinic are not yet prepared to prescribe or prohibit the use of mHealth technologies. Healthcare institutions should consider investing in mHealth analysis, tool development, and the promotion/recommendation of sanctioned tools for clinicians to use with patients.</p>
126

Project success in agile development software projects

Farlik, John T. 04 June 2016 (has links)
<p> Project success has multiple definitions in the scholarly literature. Research has shown that some scholars and practitioners define project success as the completion of a project within schedule and within budget. Others consider a successful project as one in which the customer is satisfied with the product. This quantitative study was conducted to test the relationship between communications of agile teams and project success. The research also tested the relationship between software process improvement and project success. The researcher presented three different characterizations of project success (time, budget and customer satisfaction). Through correlation testing, the study examined the results of the relationship between communications, software process improvement, and project success. The customer satisfaction definition of project success was more closely correlated with projects in which communications was effective. Projects characterized as having a formal software process improvement process in place were more closely correlated with the cost and schedule definitions of project success. Implications of the study include conducting further research with ordinal data in the regression testing of the independent and dependent variables. Future work should concentrate upon risk and change management in an agile project management project environment. This work furthers the ideas contained in the Project Management Second Order (PM-2) framework.</p>
127

Critical Skills for Supervisors of Information Technology Project Managers in Government| An Interpretative Phenomenological Analysis Case Study

Burns, Jacqueline 04 June 2016 (has links)
<p> A company or government is only as good as its most qualified employees. This qualitative interpretative phenomenological study sought to understand what skills are needed to supervise government information technology (IT) project managers through their lived experience. Fifteen participants in the field of government IT were interviewed. They included five senior managers, five supervisors, and five project managers who worked as IT government contractors or employees were interviewed. The participants&rsquo; responses revealed that different groups disagreed as to what skill sets were essential in supervising government IT project managers. The findings of the research highlighted that the senior managers and supervisors valued skills from a macro-level perspective, while project managers valued skills from a micro-level perspective. The results of the study indicated that the different groups of IT employees&mdash;senior management, project managers, and supervisors&mdash;deemed different skill sets as essential. There was a consensus regarding the importance of communication skills as all groups included aspects of communication in the top-five essential skills. However, the rating number allocated to these skills and the definition of the terms differed between the participants and across the groups. The results of the study brings to light the importance of developing appropriate position training for government IT supervisory positions.</p>
128

Electronic discovery

Keck, Andrew G. 03 May 2016 (has links)
<p> Cyber incidents continue to increase across the entire globe. The increase in security threats requires organizations to rethink strategies and policies continually fortifying against known and unknown threats. Cyber incident policies and response plans range from non-existent to hundreds of pages in length. A policy may include sections discussing roles and responsibility, incident detection, escalation, and many additional categories, and often discuss the collection and preservation of forensic evidence. Policies briefly address, in many cases, the proper collection of evidence; however, the written regulation concerning the potential liabilities, the risks associated with current and future litigation, and the legal consequences to a cyber incident remains sparse. The desired outcome of this paper is to enlighten the reader through identification of the risks, the potential pitfalls, and steps to policy development pertaining to the handling of electronic evidence, with a cross examination of overlapping sectors between forensics, electronic discovery, and cyber security.</p>
129

The impact of data breaches on market value of firms in the E-Commerce marketplace

Washington, Kevin D. 05 May 2016 (has links)
<p> Using a sample of information and security data breaches the present research examines the public announcement impact between Brick and Mortar firms and E-Commerce firms. The dissertation initially analyzes the effects of publicly announced information and security breaches on abnormal stock returns, abnormal trading volume, and firm risk. The dissertation then analyzes differential impact between Brick and Mortar firms and E-Commerce firm&rsquo;s market value following a data breach. Using a sample size of 38 information security breaches, E-Commerce firms resulted in more negative abnormal stock returns than Brick and Mortar firms. While data breach announcements did not significantly impact retail firms as a whole, they did have a significant impact when broken into the subsets. E-Commerce firms that announced an information security breach experienced abnormal trading volume.</p>
130

Cyber terrorrism threats

Gobran, Ashraf 27 May 2015 (has links)
<p> The purpose of this study is to explore the potential threats that are posed uniquely by cyber terrorism. While traditional terrorism has affected governmental policy, and inflicted physical damage to people and infrastructure across the world, computers and the Internet can allow for attacks as well. As terrorism groups begin to adapt to, and take advantage of - cyber tools and capabilities, the threat they pose will grow accordingly. While a terrorist is not able to directly kill people with cyber tools, the mayhem or social disruption that such attacks can cause, fit well with these organization's objectives. The anonymity of cyber space permits terrorist groups to plan and execute attacks without being identified immediately, if ever. In addition, the targets of cyber terrorists are often under prepared, and fairly vulnerable to various forms of cyber attacks. While these organizations may be aware of the risk posed by failing to adequately address cyber security deficiencies, their solutions are likely not sufficient to truly prevent cyber terrorism attacks. In order to discover technological advancements, efficient cyber security, and generally spread awareness on the subject, this study attempts to highlights existing threats, as well as an overview of what can be done to mitigate them. </p><p> Keywords: Intelligence, Cyber security, Professor Albert Orbanati</p>

Page generated in 0.1452 seconds