221 |
Electronic Personal Health Records: A Matter of TrustDaglish, David 10 1900 (has links)
<p>Early trials of Electronic Personal Health Records (ePHRs) show they provide two strong benefits: better healthcare outcomes and lower taxpayer costs. However, consumers are concerned about the possible loss or misuse of personal health data. For people to adopt ePHRs, they must trust both the system and the operating organization. The model presented here studies consumers’ likelihood of adopting ePHRs, combining trust, distrust, risk, motivation, and ease of use; as well as their perceptions of government, software vendors, and physicians as providers of ePHRs. Based on the Technology Acceptance Model, and incorporating elements of trust-distrust dualism and perceived risk, the model was tested empirically using survey data from 366 Canadian adults. The model explains 52 percent of the variance in the intention to use an ePHR, with strong negative effects from perceived risk and distrust, and strong positive effects from trust and perceived usefulness. Other findings include further evidence that trust and distrust are different constructs, not ends of a spectrum; that Canadians’ relationship with their healthcare system is complex; and that the risks in using an online system can be overcome by the perceived benefits. Open-ended responses show that people generally trust their doctors, but are sceptical that a doctor could provide a secure ePHR. Responses indicated that participants liked the consolidation of data and ease of access, but feared loss of privacy.</p> / Doctor of Philosophy (PhD)
|
222 |
Consumer Identity Theft Prevention And Identity Fraud Detection Behaviours: An Application Of The Theories Of Planned Behaviour And Protection MotivationGilbert, John A. 04 1900 (has links)
<p>Consumer behaviour has and may increasingly have a vital role to play in protecting personal data. Understanding the behaviours of consumers in preventing identity theft and detecting identity fraud is therefore key to creating programs that minimize exposure and potential loss. In this study, based on the Theory of Planned Behaviour (TPB) and Protection Motivation Theory (PMT), an exploratory study elicited salient beliefs about identity theft prevention and detection behaviours. These beliefs were then used to create a survey to measure the strength of the salient beliefs, attitudes, intentions and behaviours, which was administered online and produced 351 valid responses. Statistical analysis was performed on eight behavioural groups, based primarily on principal component analysis of twelve behaviours. The groups were: using physical security, practicing password security, monitoring bank accounts and credit cards, getting a credit report, checking the land registry, using 'remember my password', clicking on a link in an e-mail, and giving out personal information over the phone. Results showed that beliefs with a significant influence on consumer intentions for a given behavioural group were a mix of beliefs about identity theft in general and beliefs about the behaviours in that group. While attitudes towards behaviours of consumers in any specific group had a significant influence on the intent to perform behaviours peculiar to that group, they had virtually no impact on the intent to perform behaviours in other groups. The intent to perform identity theft prevention and identity fraud detection behaviours uniformly had a statistically significant influence on actual reported behaviour, but much of the variance in behaviour was unexplained. An analysis of qualitative responses showed that gender, language and age all had significant impacts on respondents' likelihood of mentioning specific vulnerabilities, and prevention and detection measures.</p> / Doctor of Philosophy (PhD)
|
223 |
A framework for testing the learning of cognition-based human-computer interfacesMurphy, John Michael January 1992 (has links)
<p>Successful implementation of Information Systems requires user acceptance. The old approach of adapting users to the system is no longer acceptable as more middle and senior professionals and managers are becoming system users. Due to the increasing people cost component of systems implementation, there has been a recognition that the human-computer interface must be easier to learn to use and recall for the individual who is both a novice and discretionary computer user. From the cognitive psychology literature, various principles can be applied to the interface design to improve learning and recall. These principles can be used by interface designers to improve the usability of the human-computer interface. Models of human-computer interaction have been devised by other researchers. However, to date there has been little available in the way of satisfactory methodologies or tools to allow designers to measure practically how an interface implementation performs with respect to both learnability and subsequent recall. This thesis develops a framework for testing human-computer interface learning. The framework differs from previous attempts in that it defines a new criteria for quantifying human-computer learning and recall, as well as providing a simple and effective tool for use by designers to determine such learnability metrics during the design process. In order to demonstrate the usefulness of the framework, it is used to experimentally test an original prototype interface design which attempts to improve human learning speed and memory retention using elaborative learning techniques and the "generation effect". The framework was able to measure significant differences between interfaces with respect to recall performance, and has demonstrated its utility as a contribution to the field of interface usability evaluation.</p> / Doctor of Philosophy (PhD)
|
224 |
A Case Study of an Information System Developed to Generate Competitive AdvantagePlatt, Richard G. (Richard Gordon) 12 1900 (has links)
The purpose of this study was to examine the effect of information technology (IT) on the competitive position of a firm. The problem motivating this study is the potential for misallocation of scarce resources on new technology without realizing the level of competitive advantage (CA) expected. This study was a single-site case study. It examined the factors related to the selection, design, development, implementation, use, and effects of an information system (IS) intended to generate CA. The study examined all these factors within the organizational and industrial contexts of the subject firm.
|
225 |
Web 2.0 and it's implications for business with case studies from Germany and new Zealand : a dissertation submitted in partial fulfilment of the requirements for the degree of Master of Business (Information technology), 2009.Tschirch, Victoria. January 2009 (has links)
Thesis (MBus) -- AUT University, 2009. / Includes bibliographical references. Also held in print (ix, 77 leaves : ill. ; 30 cm.) in the Archive at the City Campus (T 658.4038 TSC)
|
226 |
Users' perception of human resource information systems in a Saudi Arabian public sector organisation : examining antecedents of usage, satisfaction and system's user successAl-khowaiter, Wassan Abdullah Ali January 2015 (has links)
The aim of this research is to examine the factors influencing the adoption and success of HRIS in Saudi Arabian public sector organisations.
|
227 |
Die bepaling van 'n bestuursinligtingstelsel vir die ondersteuning van die effektiewe bestuur van KromcoSmit, Sybrand 03 1900 (has links)
Thesis (MBA (Business Management))--University of Stellenbosch, 1992. / ENGLISH ABSTRACT: The aim of the exercise is to acquire a thorough knowledge of Kromco's business requirements, to create a high level datamodel, a data entity model and to determine the priorities of the different systems which will lead to an effective management information system. To acquire the desired information and strategy within a limited period of time, use was made of questionnaires, focus groups, personal interviews, value chain analysis, critical success achievements and information in use. The desired information requirements and information systems have been evaluated against the information and systems presently available. The present management information system does not fulfil the needs of a successful management information system and therefore it has been suggested that a computer be obtained. The same information is used by different departments. To prevent duplicating transactions, use must be made of a databasis. The designing of the database does not form part of this worksheet and further investigation is necessary. / AFRIKAANSE OPSOMMING: Die doelwit van die werkstuk is om 'n deeglike begrip van Kromco se besigheidsbehoeftes te verkry deur die daarstelling van 'n hoe vlak datamodel, 'n data entiteitmodel en die prioriteitsbepaling van die verskillende stelsels wat sodoende tot 'n effektiewe bestuursinligtingstelsel sal lei. Om die verlangde inligting en strategie binne die kort tydsbestek te kry is daar gebruik gemaak van vraelyste, fokusgroepe, persoonlike onderhoude, waardeketting-ontledings, kritieke suksesbepalings en bestaande inligting in gebruik. Die verlangde inligtingsbehoeftes en -stelsels is geevalueer teenoor die inligting en -stelsels wat tans beskikbaar is. Die bestaande bestuursinligtingstelsel voldoen nie aan die vereistes van 'n suksesvolle bestuursinligtingstelsel nie en die aanbeveling is om n eie rekenaar te kry. Dieselfde inligting word deur verskillende departemente gebruik. Daarom moet daar gebruik gemaak word van n databasis om duplisering van transaksies te vermy. Die databasisontwerp vorm nie deel van hierdie werkstuk nie en verdere navorsing moet daarop gedoen word.
|
228 |
Japanese and Chinese management information systems and the question of transferabilityFukuda, K. John January 1982 (has links)
published_or_final_version / Management Studies / Doctoral / Doctor of Philosophy
|
229 |
MIS in a multinational companyChan, Yiu-wing, Jacky., 陳耀榮. January 1990 (has links)
published_or_final_version / Business Administration / Master / Master of Business Administration
|
230 |
Planning and strategic application of data warehousingTo, Cho-ying, Joanne., 杜祖鸚. January 1998 (has links)
published_or_final_version / Business Administration / Master / Master of Business Administration
|
Page generated in 0.1754 seconds