• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 122
  • 10
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 151
  • 151
  • 50
  • 24
  • 24
  • 22
  • 21
  • 18
  • 17
  • 13
  • 11
  • 11
  • 11
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Applying COBIT in an ERP environment, with specific reference to Qmuzik /

Kieviet, Frèda. January 2006 (has links)
Assignment (MRek)--University of Stellenbosch, 2006. / Bibliography. Also available via the Internet.
22

Knowledge sharing among professionals in three online communities

Hew, Khe Foon. January 2006 (has links)
Thesis (Ph.D.)--Indiana University, Dept. of Instructional Systems Technology, 2006. / "Title from dissertation home page (viewed July 5, 2007)." Source: Dissertation Abstracts International, Volume: 67-08, Section: A, page: 2947. Adviser: Thomas A. Brush.
23

The Relationship of Negotiation and Reciprocity to Knowledge Sharing among Software Developers

Elsayess, Mahmoud B. 06 December 2018 (has links)
<p> Knowledge sharing among software developers enhances the success of software design and implementation. However, there is an inadequate understanding of how communication factors such as negotiation and reciprocity impact the knowledge-sharing process within software development teams and between team leaders and team members. The present study used a correlational research design to test the relationship between the reciprocity (i.e., communication between team members), negotiation (i.e., communication between team leaders and team members), and knowledge sharing to determine whether different types of communication influence knowledge-sharing outcomes. A cross-sectional survey was used to collect data from a target population of software developers. The sample consisted of 85 software developers with a minimum of 2 years of experience working on software development teams. Multiple linear regression analyses were run to determine the extent to which the variables of negotiation, reciprocity, and knowledge sharing were related. The results indicated that the variables were significantly related, and 70% of knowledge sharing was the result of reciprocity-exchange of ideas and reciprocity-meetings. Team meetings and the open exchange of ideas between team members were found to be the most effective methods of reciprocity related to knowledge sharing among team members. Negotiation and team cohesiveness, however, were not significant to the knowledge-sharing process. The findings indicated that the process of knowledge sharing is more important than individual relationships between software development team members. Thus, from an organizational perspective, holding regular project meetings with all team members would be a more effective knowledge-sharing strategy than using team-building exercises to strengthen personal bonds between team members. Additional research is necessary to determine how software developers&rsquo; personal characteristics impact knowledge-sharing processes.</p><p>
24

The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites

Landress, Angela D. 14 August 2018 (has links)
<p> Insider threat by employees in organizations is a problematic issue in today&rsquo;s fast-paced, internet-driven society. Gone are the days when securing the perimeter of one&rsquo;s network protected their business. Security threats are now mobile, and employees have the ability to share sensitive business data with hundreds of people instantaneously from mobile devices. While prior research has addressed social networking topics such as trust in relation to information systems, the use of social networking sites, social networking security, and social networking sharing, there is a lack of research in the mindfulness of users who spill sensitive data contained within images posted on social networking sites (SNS). The author seeks to provide an understanding of how non-malicious spillage through images relates to the mindfulness of employees, who are also deemed insiders. Specifically, it explores the relationships between the following variables: mindfulness, proprietary information spillage, and spillage of personally identifiable information (PII). A quasi-experimental study was designed, which was correlational in nature. Individuals were the unit of analysis. A sample population of business managers with SNS accounts were studied. A series of video vignettes were used to measure mindfulness. Surveys were used as a tool to collect and analyze data. There was a positive correlation between non-malicious spillage of sensitive business, both personally identifiable information and proprietary data, and a lack of mindfulness. </p><p>
25

Academic computing from a technological innovation perspective: Faculty concerns

Hawes, F. Elizabeth 01 January 1993 (has links)
The objective of computer acquisitions is generally to have the computers used in ways that assist faculty in their teaching, research, and other work-related activities. The conceptual model and the research design of this study were based on the premise that the needs and concerns of users must be understood and addressed in order to achieve a desired level of utilization of computer resources. This study examined the perceptions of faculty members about a new networked system of microcomputers. An administrative decision had been made to provide all full-time faculty members with a microcomputer networked to shared laser printers with communications capabilities. The concerns most frequently expressed by faculty were indicative of the early stages of using an innovation. This can be explained in part by the fact that the self-reported ratings for computer software experience indicated that as a group this faculty was at a beginner level. The faculty expressed concerns about learning how to use the networked computers as well as concerns how the college would manage the system so that it would be a cost effective acquisition. Statistical analysis indicated that faculty members' characteristics like age and gender were not indicators of the concerns reported. However, a statistically significant relationship was found between computer software experience and reported stages of concern. The results also showed that the more self-reported computer software experience, the higher the scores on the later stages of concern: Consequence, Collaboration, and Refocusing. There was also a statistically significant relationship found between computer experience and discipline and interest in learning new software and discipline. The disciplines where it would be expected that faculty might make greater use of computer resources (i.e. Sciences) did show greater self-reported experience amongst the faculty. Also, those in disciplines with the least self-reported experience indicated interest in learning new software sooner than those in disciplines with more experienced faculty. The responses to the open-ended question and the interview data confirmed and added to the information gathered from the quantitative analysis. The study concludes with recommendations that may be useful to others managing technological innovations of this nature.
26

Geovisualizing and modeling physical and Internet activities in space-time toward an integrated analysis of activity patterns in the information age /

Ren, Fang. January 2007 (has links)
Thesis (Ph. D.)--Ohio State University, 2007.
27

An empirical investigation of the influence of age, gender, and occupational level on stress perceptions, job satisfaction, organizational commitment, and turnover

Cordas, Jon D. Beyerlein, Michael Martin, January 2008 (has links)
Thesis (Ph. D.)--University of North Texas, May, 2008. / Title from title page display. Includes bibliographical references.
28

The cyber-framing of Nigerian nationhood diaspora and the imagined nation /

Odutola, Kole Ade, January 2010 (has links)
Thesis (Ph. D.)--Rutgers University, 2010. / "Graduate Program in Communication, Information and Library Studies." Includes bibliographical references (p. 245-264).
29

The geography of Internet production and consumption in the Asia-Pacific

Wong, Yan-ping, Agnes. January 2002 (has links)
Thesis (M.Phil.)--University of Hong Kong, 2003. / Includes bibliographical references (leaves 131-144) Also available in print.
30

A framework for the provision of information sources to technologists

Van der Walt, Wilma Christina 05 August 2014 (has links)
M.Tech. (Production Management) / The development of technikons into autonomous tertiary technical educational institutions, offering education up to doctorate level, conducting research, offering vocational and continuing education, brought with them libraries which cannot provide in the requirements set to them. This study investigates the place for a library in the Technikon Witwatersrand and some of the environmental influences that have a bearing on the library. It continues from there to determine the library infrastructure of the Witwatersrand in order to establish the presence and accessibility of information sources. A framework is then developed according to which the needs of the users of the library determined. user categories are then identified and their needs for information sources determined. The study continues from there to develop this framework on a computer so that it can be used in planning for the provision of information sources to technologists in the future. The study is concluded with recommendations regarding the provision of information sources.

Page generated in 0.1298 seconds