• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2875
  • 957
  • 495
  • 79
  • 70
  • 64
  • 56
  • 44
  • 37
  • 36
  • 35
  • 18
  • 16
  • 15
  • 13
  • Tagged with
  • 5352
  • 5352
  • 1264
  • 857
  • 845
  • 807
  • 757
  • 610
  • 551
  • 517
  • 481
  • 480
  • 412
  • 395
  • 381
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
311

Man skriver lite om sin favoritfilm eller favoritfotbollsspelare och alla i hela världen kan läsa det : En studie om elevers uppfattningar om informations- och kommunikationsteknik, IKT.

Gabrielsson, Johan, Lundström, Andreas January 2008 (has links)
<p>Studiens huvudsyfte var att undersöka hur elever använder och uppfattar informations- och kommunikationsteknik, (IKT) i skolan respektive hemmet, samt studera detta ur ett genusperspektiv. Syftet var även att undersöka vilka IKT-verktyg som används i respektive miljö samt på vilka sätt dessa används. Vidare undersöks också elevernas uppfattning om möjligheter och hinder med IKT. I studien har elever från en IKT-profilerad grundskola, år fyra, intervjuats. Resultatet visade att de medverkande eleverna i studien hade en positiv inställning till IKT generellt, då de också visade att de var medvetna och insatta i en mängd olika företeelser inom IKT-området. Studien visade också på att det inte fanns några större skillnader mellan pojkar och flickor i uppfattandet av IKT, då de största skillnaderna som påvisades handlade om användandet i val av aktivitet, där intresset skiljde sig åt.</p>
312

Linking properties of knowledge and knowledge network topology with performance

Bustamante, Miguel A. January 1900 (has links)
Thesis (Ph.D.)--University of Nebraska-Lincoln, 2007. / Title from title screen (site viewed Oct. 10, 2007). PDF text: v, 110 p. : ill. (some col.) UMI publication number: AAT 3258768. Includes bibliographical references. Also available in microfilm and microfiche formats.
313

Information technology and firms' organizational scope and structure

Xue, Ling, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2007. / Vita. Includes bibliographical references.
314

The impact of information technology on vertical relationships

Wu, Dazhong, January 1900 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2006. / Vita. Includes bibliographical references.
315

An analysis of student performance in internet delivered and classroom-based information technology courses at Waukesha County Technical College

Beidel, Todd M. January 2006 (has links) (PDF)
Thesis PlanB (M.S.)--University of Wisconsin--Stout, 2006. / Includes bibliographical references.
316

Cybersecurity of unmanned aircraft systems (UAS)

Gomez, Cesar A. 19 December 2015 (has links)
<p> The purpose of this research was to investigate the cybersecurity controls needed to protect Unmanned Aircraft Systems (UAS) to ensure the safe integration of this technology into the National Airspace System (NAS) and society. This research presents the current vulnerabilities present in UAS technology today along with proposed countermeasures, a description of national and international rules, standards, and activities pertaining to UAS and cybersecurity, and a minimum set of safety operational requirements which are recommended to be implemented by manufacturers of small UAS and mandated by governing agencies. UAS attacks are defined in three categories: hardware attack, wireless attack, and sensor spoofing. The future influx of small and hobby oriented UAS should consider a minimum set of regulated cyber safety standards right out of the box, such as Geofencing technology and isolated auto safety measures. The commonality between national and international cyber related activities point to several operational requirements, hardware limitations, and heightened UAS vulnerabilities. These include type of radio frequency spectrum that is used during operation, methods for detect and avoid, safety measures, lost link procedures, and corrupted data communications.</p>
317

Architecting a Cybersecurity Management Framework| Navigating and Traversing Complexity, Ambiguity, and Agility

Tisdale, Susan M. 09 June 2018 (has links)
<p> Despite advancements in technology, countermeasure, and situational awareness, cybersecurity (CS) breaches continue to increase in number, complexity, and severity. This qualitative study is one of a few to comprehensively explore CS management. The study used a systems&rsquo; approach to identify business, socioeconomic, and information technology (IT) factors, and their interrelationships. The study examined IT management frameworks and CS standards and literature. Interviews and a focus group of subject matter experts followed. The research found CS is a leadership, not a technical issue. CS is an ecosystem; its components are interrelated and inseparable, requiring qualitative, subjective, risk and knowledge management interventions. CS, IT, and threats are too complex and volatile for organizations to manage all risks and vulnerabilities in a timely, agile manner. CS lexicons lack uniformity and consistency. An IT management framework is better suited for CS. Companies must segregate and encrypt the most sensitive information and curb their appetites for new, unsecured technology. CS and IT is multilayered, requiring subspecialists, who often serve conflicting business needs and security objectives. Organizations need to minimize mid-level CS management, raise CS to a business level function (not subordinate to IT), and involve cyber specialists at all levels in the business lifecycle. Cross-pollinating people from all business areas, especially from finance, CS, and IT, increases awareness of the others&rsquo; responsibilities and obligations and facilitates more rapid portfolio, lifecycle CS activities, from investments to detection and response activities. Future studies should focus on these issues as critical success factors. Finally, the study of CS requires agile, qualitative, multidisciplinary methodology to produce thick, quick, actionable information.</p><p>
318

The Relationship of Negotiation and Reciprocity to Knowledge Sharing among Software Developers

Elsayess, Mahmoud B. 06 December 2018 (has links)
<p> Knowledge sharing among software developers enhances the success of software design and implementation. However, there is an inadequate understanding of how communication factors such as negotiation and reciprocity impact the knowledge-sharing process within software development teams and between team leaders and team members. The present study used a correlational research design to test the relationship between the reciprocity (i.e., communication between team members), negotiation (i.e., communication between team leaders and team members), and knowledge sharing to determine whether different types of communication influence knowledge-sharing outcomes. A cross-sectional survey was used to collect data from a target population of software developers. The sample consisted of 85 software developers with a minimum of 2 years of experience working on software development teams. Multiple linear regression analyses were run to determine the extent to which the variables of negotiation, reciprocity, and knowledge sharing were related. The results indicated that the variables were significantly related, and 70% of knowledge sharing was the result of reciprocity-exchange of ideas and reciprocity-meetings. Team meetings and the open exchange of ideas between team members were found to be the most effective methods of reciprocity related to knowledge sharing among team members. Negotiation and team cohesiveness, however, were not significant to the knowledge-sharing process. The findings indicated that the process of knowledge sharing is more important than individual relationships between software development team members. Thus, from an organizational perspective, holding regular project meetings with all team members would be a more effective knowledge-sharing strategy than using team-building exercises to strengthen personal bonds between team members. Additional research is necessary to determine how software developers&rsquo; personal characteristics impact knowledge-sharing processes.</p><p>
319

Digital Strategies Senior Bank Executives in Mauritius use to Improve Customer Service

Sewpaul, Sailesh 15 December 2018 (has links)
<p> Customers&rsquo; use of digital banking has reshaped traditional banking, and senior level bank executives must know how to leverage this innovation to improve customer service to increase profitability. Using the technology acceptance model as the conceptual framework, the purpose of this multiple case study was to explore effective digital banking strategies that senior level executives used to improve customer service to increase profitability. The target population for this study included senior-level executives from 3 banks in Mauritius possessing successful development and implementation experience in digital banking strategies to improve customer service. Data were collected through semistructured interviews and organizational documents, which were analyzed in accordance with Yin&rsquo;s 5-phase data analysis process consisting of pattern matching, explanation building, time-series analysis, program logic models, and cross-case synthesis. The use of member checking and methodological triangulation increased the trustworthiness of data interpretations. Three themes emerged from the analysis of data: use of mobile strategies to migrate customers to digital banking, challenges to migrate customers to digital banking, and digital banking innovation. The implications of this study for positive social change include improving convenience to customers; promoting green banking; and providing easy access to banking to the poor, those with physical disabilities, and those living in remote and rural areas. </p><p>
320

Accepting the Cloud| A Quantitative Predictive Analysis of Cloud Trust and Acceptance Among IT Security Professionals

Peake, Chris 20 December 2018 (has links)
<p> Industry experts recognize the cloud and cloud-based services as advantageous from both operational and economic perspectives, yet the gap is that individuals and organizations hesitate to accept the cloud because of concerns about security and privacy. The purpose of this study is to examine what factors that may influence the cloud acceptance by IT professionals by focusing on the principal research question: To what extent do ease of use, usefulness, attitude, security apprehensions, compatibility, and trust predict IT security professionals&rsquo; acceptance of cloud computing. The population for this study consisted of IT security professionals who either had industry security certifications or had been in a security position for at least two years. Sample inclusion criteria consisted IT professionals with the qualification described above and over the age of 18 who were living in the United States. The study survey was administered using SurveyMonkey, which randomly selected and recruited potential participants who met the sample criteria from a participant database, resulting in ninety-seven total study participants. Among the six factors examined, perceived usefulness, attitudes, security apprehensions, and trust were found to significantly predict cloud acceptance. The results indicate that cloud service providers should focus their attention on these factors in order to promote cloud acceptance.</p><p>

Page generated in 0.1168 seconds