• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2866
  • 957
  • 483
  • 79
  • 70
  • 64
  • 56
  • 44
  • 37
  • 36
  • 35
  • 18
  • 16
  • 15
  • 13
  • Tagged with
  • 5330
  • 5330
  • 1258
  • 854
  • 845
  • 807
  • 756
  • 609
  • 551
  • 500
  • 481
  • 480
  • 412
  • 379
  • 366
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

The lived experience of smartphone use in a unit of the United States Army

Gardner, Gregory C. 23 September 2014 (has links)
<p> Smartphones, now so ubiquitous that almost every American adult carries one, bring major changes not just to the way people gather and exchange information but also to the way in which they interact with one another and with the organizations to which they belong. A variety of research indicates that while it unleashes remarkable creativity and productivity, this complex, entangled phenomenon also has subtle, worrying implications. This study focused on those dynamics in one unit of the United States Army. Scharmer's Theory U as well as the systems theory espoused by Gharajedaghi and Ackoff guided this research. The research question asked, <i>What are the most important aspects of the holistic smartphone user experience in an Army work environment? </i> This phenomenological study was based on interviews with 28 military personnel of a variety of ages, ranks, and duty positions. While the findings were generally consistent with other research into smartphone use in society, it is clear that smartphone use is inextricably linked to a number of complex challenges for the leaders of the military unit studied. In particular, the paradoxical aspects of smartphone use which, while clearly beneficial, also foster tension, complexity, stress, and anxiety. More concerning is the finding that smartphone use jeopardizes the development of the traditional interactive and collaborative culture of the unit. Finally, current policies related to the use of smartphones inadequately address the issues and concerns expressed by respondents. The results of the study, therefore, serve as a call to action for unit leaders. They offer a compelling case for transformative change and leader attention and intention so that smartphone use can continue to enhance creativity and productivity while optimizing organizational development in the emerging future.</p>
142

A Conceptual Model for Assessing the Value of Information Technology

Tse, David Christopher January 2006 (has links)
The value of an IT system can be considered from a number of different perspectives. Specifically, the same IT system can be valued differently across different stakeholders, time periods, usage environments, and other contextual factors. When measuring the value of an IT system, it is important to consider what value perspectives are relevant and how those perspectives affect the development of value metrics. An IT value assessment framework is proposed to aid in identifying such contextual factors and exploring how those factors affect the value that is realized from an IT system.
143

A quantitative experimental study of the effectiveness of systems to identify network attackers

Handorf, C. Russell 14 February 2017 (has links)
<p> This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager (OSSIM) against techniques that were used to prioritize the detailed analysis of the data which would aid in the faster identification of attackers. It was found that by adding the results from computing a Hilbert Curve, Popularity Analysis, Cadence Analysis and Modus Operandi Analysis did not introduce significant or detrimental latency for the identification of attacker traffic. Furthermore, when coupled with the traditional tools within OSSIM, the identification of attacker traffic was greatly enhanced. Future research should consider additional statistical models that can be used to guide the strategic use of more intense analysis that is conducted by deep packet inspection software and broader intelligence models from reviewing attacks against multiple organizations. Additionally, other improvements in detection strategies are possible by these mechanisms when being able to review full data collection.</p>
144

Reducing cycle time and increasing value through the application of knowledge value added methodology to the U.S. Navy Shipyard planning process

Komoroski, Christine L. 12 1900 (has links)
0 million dollars.
145

A web-enabled database for tracking the Personnel Qualifications of Information Professional Officers

Aragon, Marc A. 12 1900 (has links)
The US Navy's Information Professional Community currently qualifies its officers using a paperbased system. Candidates for the Basic, Intermediate and Advanced Qualifications use qualification books to attain knowledge and subsequently, prove possession of it. Once those books are filled with signatures, a board of Subject Matter Experts tests the candidate and verifies his mastery of that knowledge. Using Knowledge Value Added analysis and Business Process Reengineering, the return on knowledge (ROK) for the current Personnel Qualification System was estimated and improved processes were designed with the goal of maximizing ROK. First, the as-is ROK was estimated for the three processes and their various subprocesses. Then, a new to-be workflow for each of the three processes was designed emphasizing incremental improvements that could be implemented quickly. Finally, another workflow was designed, emphasizing radical, unlimited change. When it was proven that Web-enabling the PQS system indeed improves the knowledge-creating capability of these processes, a prototype Web-enabled database, called the Electronic Qualbook was developed as a demonstrator of the technologies and capabilities involved. This thesis includes appendices illustrating the design of the database schema and the Electronic Qualbook's Web interfaces. A third appendix lists the majority of the HyperText Markup Language (HTML) and Active Server Pages (ASP) code integral to the Electronic Qualbook.
146

Wireless Local Area Network (WLAN) vulnerability assessment and security

Goodwin, Michael S. 09 1900 (has links)
"The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC). This threat requires a capable deterrent in order to mitigate risks associated with both official and un-official wireless LANs. The potential efficiencies gained by employing wireless technology within the Marine Corps and DoD is quite significant. The Marine Corps must leverage this relatively inexpensive technology to conduct operations cheaper, faster and more effectively. However, these same wireless LAN capabilities have introduced new ways in which critical information infrastructure can be viewed, altered or even denied. This thesis proposes the assessment of multiple installations within DoD in order to identify vulnerabilities and ensure secure employment of wireless technologies. These assessments will enable the development of adequate measures to secure existing wireless transmissions and protect future transmissions from observation, modification or denial of service. This thesis will assess threats posed to network infrastructure by wireless networks and evaluate WLANs that exist within the DoD to determine adequate measures to secure transmissions made by those networks. Vulnerability assessments of multiple services at different DoD installations will be conducted in order to gather a wide range of input. These assessments will provide an indication of how DoD installations are leveraging wireless capabilities to improve support to the operating forces. These vulnerability assessments will also provide insight into the current security posture within the DoD with regard to wireless communications. The practices employed by these services will be evaluated to determine the best means of standardizing wireless security procedures within the Marine Corps. In addition, a diverse assortment of wireless software and hardware tools will be tested in order to ascertain the best methods for monitoring and securing wireless networks within DoD. The evaluation of these software and hardware tools will facilitate the creation of an inexpensive and easily distributed WLAN tool kit which can be employed at installations across DoD. The final result desired is for this research is to improve the WLAN vulnerability assessment capability within the Marine Corps." p. i.
147

A study of the IEEE 802.16 MAC Layer and its utility in augmenting the ADNS Architecture to provide adaptable intra-strike group high-speed packet switched data, imagery, and voice communications

Pryor, Jameau R., Johnson, Ballard V. 09 1900 (has links)
This research evaluates the Medium Access Control Layer (MAC) of the IEEE 802.16 Wireless standard and its utility in augmenting the IP (Internet Protocol) router based Automated Digital Network System (ADNS). This research explores the need for a high throughput, high speed network for use in a network centric wartime environment and how commercial off-the-shelf (COTS) technologies that take advantage of the IEEE 802.16 wireless protocol can satisfy these requirements. The intent of this research is to prove that IEEE 802.16 systems can provide the ADNS with a viable alternative in order to enhance its capabilities and mitigate its limitations. This research includes a discussion on the current configuration of the ADNS architecture and its uses in the Carrier Strike Group (CSG). This research also analyzes the IEEE 802.16 MAC layer and identifies and tests its unique quality attributes that make it a viable high speed, high throughput communication link for point-to-point and point-to-multipoint naval applications.
148

An analysis of 802.11b and 802.16 technologies as part of the tactical internet

Swearingin, Brad E. 09 1900 (has links)
This research evaluates IEEE 802.11b and 802.16 technologies to examine whether these wireless technologies can integrate into the tactical Internet. In order to establish a baseline, the current Marine Corps' systems architecture is analyzed with emphasis placed on mobile forces at the Regimental level and below. A side-by-side comparison between existing communication assets in the Marine Corps inventory, such as the Enhanced Position Location Reporting System (EPLRS) and Single Channel Ground and Airborne Radio System (SINCGARS), and available 802.11b/16 technologies will evaluate whether existing Command and Control requirements are met, determine the existence and extent of excess capacity, and identify potential adaptations required to implement commercial-off-the-shelf (COTS) technology into a military environment. The method for side-by-side evaluation will incorporate both COTS products as well as Marine Corps tactical communication devices in laboratory as well as field experimentation. This research captures key performance metrics such as range, power consumption, security, and bandwidth, but remains focused on the needs of the warfighter by evaluating performance of the system in support of Command and Control Compact Edition (C2CE) and Command and Control Personal Computer (C2PC) applications.
149

Airborne tactical data network gateways evaluating EPLRS' ability to integrate with wireless meshed networks

Bey, Christopher S. 09 1900 (has links)
This thesis assesses the feasibility, suitability, efficacy, and military potential of utilizing the Enhanced Position Location Reporting System (EPLRS) from airborne communications nodes with emergent commercialbased wireless technologies. Such integration would offer highly mobile maneuver units with over-the-horizon (OTH) tactical data connectivity. Specifically, this work examines tactical data requirements intrinsic to military operations with current OTH tactical data solutions. It also explores current EPLRS architectures and use and then compares the functional capabilities and limitations of EPLRS with those of IEEE 802.11x and 802.16 standards and prevalent developing meshed network routing protocols. Finally, this thesis evaluates fielded and emergent technologies to see if they are suitable to build and to sustain (collectively or independently) interconnected, ubiquitous, and routable tactical data networks by capitalizing on the advantages of EPLRS and by exploiting the inherent advantages of airborne assets in overcoming line-of-sight (LOS) limitations.
150

The United States Navy Reserve Component's account management challenge in a Navy Marine Corps intranet environment

Graves, Gwendolyn M. 09 1900 (has links)
Declining budgets and the reduction of workforce has caused many organizations to perform additional job assignments with fewer personnel. These organizations realized that in order to survive in a competitive market, scarce resources would provide the most value if used to work on mission-essential tasks, while allowing the performance of support functions by an outside source (called outsourcing). The Department of the Navy (DoN) is one organization that has chosen to outsource many business areas, but none bigger than the outsourcing of information technology (IT) to form the Navy Marine Corps Intranet (NMCI)â the largest IT outsourcing contract to date. While the DoN has faced many challenges since the onset of the NMCI contracting agreement, this thesis focuses on the challenges faced by the Navy Reserve with managing the Intranetâ 's user accounts. The research uses the principles of Business Process Redesign (BPR) and Knowledge Management (KM) to determine the current state (As-Is) and to recommend changes in the account management process. Specifically, the Knowledge-Value Added (KVA) methodology was used to determine the amount of knowledge quantitatively embedded in each sub-process for a relative comparison of the value that the sub-processes provide to the overall process.

Page generated in 0.1377 seconds