• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 122
  • 10
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 151
  • 151
  • 50
  • 24
  • 24
  • 22
  • 21
  • 18
  • 17
  • 13
  • 11
  • 11
  • 11
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

On access network selection models and mobility support in heterogeneous wireless networks

Andersson, Karl January 2010 (has links)
The aim of this thesis is to define a solution offering end-users seamless mobility in a multi-radio access technology environment. Today an increasing portion of cell phones and PDAs have more than one radio access technology and wireless access networks of various types are commonly available with overlapping coverage. This creates a heterogeneous network environment in which mobile devices can use several networks in parallel. In such environment the device needs to select the best network for each application to use available networks wisely. Selecting the best network for individual applications constitutes a major core problem.The thesis proposes a host-based solution for access network selection in heterogeneous wireless networking environments. Host-based solutions use only information available in mobile devices and are independent of information available in the networks to which these devices are attached. The host-based decision mechanism proposed in this thesis takes a number of constraints into account including network characteristics and mobility patterns in terms of movement speed of the user. The thesis also proposes a solution for network-based mobility management contrasting the other proposals using a host-based approach. Finally, this thesis proposes an architecture supporting mobility for roaming users in heterogeneous environments avoiding the need for scanning the medium when performing vertical handovers.Results include reduced handover latencies achieved by allowing hosts to use multihoming, bandwidth savings on the wireless interface by removing the tunneling overhead, and handover guidance through the usage of directory-based solutions instead of scanning the medium. User-perceived quality of voice calls measured on the MOS (Mean Opinion Score) scale shows no or very little impact from the mobility support procedures proposed in this thesis. Results also include simulation models, real-world prototypes, and testbeds that all could be used in future work. The proposed solutions in this thesis are mainly evaluated using simulations and experiments with prototypes in live testbeds. Analytical methods are used to complement some results from simulations and experiments / Godkänd; 2010; 20100811 (karand); DISPUTATION Ämnesområde: Mobila system/Mobile Systems Opponent: Universitetslektor, docent Marcus Fiedler, Blekinge tekniska högskola Ordförande: Universitetslektor, docent Christer Åhlund, Luleå tekniska universitet Tid: Fredag den 12 november 2010, kl 11.00 Plats: A1514 Demostudion, Luleå tekniska universitet
32

Assessing Knowledge Management Values By Using Intellectual Capital to Measure Organizational Performance

Nguyen, Thuan Luong 13 December 2016 (has links)
<p> Measuring knowledge management performance was one of, if not the most challenging knowledge management activities. This study suggested using intellectual capital as a proxy for knowledge management performance in evaluating its impact on organizational performance. The Value Added Intellectual Coefficient model was employed to measure intellectual capital. Although being used widely in research, the model had its limitations. Also, for intellectual capital measurement, there was a lack of guidelines supported by empirical evidence or best practices. The present study aimed to test the classic and a modified version of this model, and based on the results, shed light on whether the classic version was good enough or the modified one should be highly recommended. The financial fundamental and market data of 425 randomly selected publicly listed firms were collected, and the structural equation modeling technique was employed to test the models. Chi-square difference test was performed to determine whether there was a statistically significant difference between these two models. The results of the tests indicated that the difference between them was insignificant. Therefore, it was concluded that the classic model is adequate, and it can be used effectively to measure intellectual capital. Adding two new efficiency elements&mdash;research and development efficiency and relational capital efficiency&mdash;in the model did not provide any significant benefit.</p>
33

Understanding the Impact of Hacker Innovation upon IS Security Countermeasures

Zadig, Sean M. 19 October 2016 (has links)
<p> Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace. </p><p> Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining to the defeat of IS security countermeasures. This research sought to understand the manner in which hackers diffuse innovations within these communities. Employing a multi-site, positivist case study approach of four separate hacking communities, the study examined how hackers develop, communicate, and eventually adopt these new techniques and tools, so as to better inform future attempts at mitigating these attacks. The research found that three classes of change agents are influential in the diffusion and adoption of an innovation: the developer/introducer of the innovation to the community, the senior member of a community, and the author of tutorials. Additionally, the research found that three innovation factors are key to successful diffusion and adoption: the compatibility of the innovation to the needs of the community, the complexity of the innovation, and the change in image conferred upon the member from adopting the innovation. The research also described the process by which innovations are adopted within the hacking communities and detailed phases in this process which are unique to these communities.</p>
34

Content analysis of transformational leadership competencies for virtual teams

Hurst, Michael W. 01 July 2015 (has links)
<p> The quantitative content analysis compared virtual team leadership styles as described in peer-reviewed journal literature from 2005 to 2010 through the lens of two online education textbooks, <i>Transformational and Charismatic Leadership: The Road Ahead</i> (Avolio &amp; Yammarino, 2002) and <i>The Transformational Leader: The Key to Global Competitiveness </i> (Tichy &amp; DeVanna, 1990), which outline transformational leadership competencies. Bean&rsquo;s (2008) observation regarding the lack of alignment between textbooks and literature are explored. Based upon two alternative hypothesis the content of the two textbooks and the literature showed significant differences, thus agreeing with Bean (2008). Research on virtual learning and virtual teamwork in the past century focused on acceptance and normalization. Online team meetings are an important aspect of industry and education; more than 13 million workers are involved in virtual project teams (Arnold, 2008). According to various literature authors, virtual team leadership might be a natural extension of the transformational leadership model. The four concepts, <i> flexibility, interdependent, responsiveness,</i> and <i>identification </i> are essential skills for effective virtual team leadership and noted in the textbooks on transformational leadership. The study used Catpac II&trade; software to code textbooks and peer-reviewed journal literature for comparison of textbooks to literature. Implications for training and practice are discussed. Transformational leadership competencies are outlined using the Five Factor model (Antonakis &amp; House, 2002).</p>
35

Google books as infrastructure of in/justice| Towards a sociotechnical account of Rawlsian justice, information, and technology

Hoffmann, Anna Lauren 07 November 2014 (has links)
<p> The Google Books project is germane for examining underappreciated dimensions of social justice and access to information from a Rawlsian perspective. To date, however, the standard account of Rawls as applied to information and technology has focused almost exclusively on rights to access and information as a primary good (Drahos 1996; van den Hoven and Rooksby 2008; Duff 2011). In this dissertation, the author develops an alternative to the standard account&mdash;the sociotechnical account&mdash;that draws on underappreciated resources available within discussions of Rawls' work. Specifically, the author focuses on the importance of Rawls' basic structure argument and the value of self-respect&mdash;two ideas that figure prominently in Rawls' theory and have been discussed extensively by its critics. After developing this alternative account, the author undertakes a disclosive ethical analysis of Google Books from a social justice perspective. As a method, disclosive ethics is concerned with identifying morally opaque features of artifacts and systems. Following Brey (2000; 2010), the analysis proceeds along three levels: theoretical, disclosure, and application. At the <i>theoretical level</i>, extant Rawlsian applications are scrutinized and rearticulated in light of advanced informational and technological practices. At the <i>disclosure level</i>, morally opaque dimensions of Google Books are disclosed as relevant to self-respect and social justice. In particular, the author focuses on three dimensions of the Books project that would go otherwise overlooked on the standard account of Rawls: quality of scans and metadata, visibility of indexes in Books' preview mode, and Google's conception of the value of information. At the <i>application level</i>, disclosed dimensions are examined according to both the standard and sociotechnical accounts. Ultimately, the author shows how, on a sociotechnical account, these three dimensions of Google Books raise otherwise overlooked questions regarding social justice, information, and technology today..</p>
36

Contingency contracting and the it manager today's challenges and future implications /

Randall, Derek A. Seaberry, Charles M. January 2009 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2009. Thesis (M.B.A.)--Naval Postgraduate School, March 2009. / Thesis Advisor(s): Barreto, Albert. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Contingency, Contracting, Information Technology, Information Technology Management, Defense Contracting, Case Study, Interview, Survey, Procurement, Contract Management, Contractor, Iraq, Army, Gansler. Includes bibliographical references (p. 117-120). Also available in print.
37

Reconstructing "digital literacy" in a Constructionist computer club the role of motivation, interest, and inquiry in children's purposive technology use / by Rebecca Reynolds.

Reynolds, Rebecca. January 2008 (has links)
Thesis (Ph.D.)--Syracuse University, 2008. / "Publication number: AAT 3333583."
38

Communication, Information, and Knowledge in a Coworking Space

Swaney, Chad 29 September 2018 (has links)
<p> Since the early 2000s, a new type of working environment has developed in which individual workers&mdash;usually in a technology profession&mdash;share office space in a large, open, nontraditional environment that transcends traditional organizational boundaries. These new environments, called coworking spaces, present opportunities for communication, information sharing, and knowledge creation because of their open physical environments, the reduced presence of organizational barriers, and as a result of intentional efforts of the leaders of coworking spaces to encourage collaboration. While there is a substantial body of knowledge focused on how workers share information and build knowledge in traditional workplaces, there is little academic research on these novel coworking environments. This study examines the lived experiences of members of a specific coworking space located in the Phoenix, Arizona area in the United States. </p><p> Through interviews with key informants, this study evaluates the communication channels that members of a coworking space use to share information and uses the Nonaka SECI model to determine the types of information sharing and knowledge creation that happen at the space. </p><p> This study finds that members of the coworking space heavily lean toward using in-person communication and next-generation instant messaging to share information, and that they primarily create knowledge through combining the explicit knowledge of members to create new explicit knowledge. The findings of this study lead to specific implications for researchers to further examine the communication channels used in coworking spaces, especially next-generation instant messaging tools. The researcher also recommends specific steps that leaders of coworking spaces can follow to improve the level of involvement of members of their spaces, and to position non-profit spaces favorably against competing for-profit coworking spaces.</p><p>
39

Information technology implementation in small and medium-sized enterprises : a cross-country comparison of Hong Kong and Singapore /

Leung, Lai-chun, Fiona. January 1997 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1997. / Includes bibliographical references.
40

A phenomenological study of critical success factors in implementing information governance

Smith, Michael Scott 04 February 2016 (has links)
<p> Information Governance (IG) professionals are overwhelmed by the complexities and ever changing regulations regarding data and information. To compound the issues are the increased volume, velocity, and variations of data from social media to corporate applications. The purpose of this phenomenological study was to determine critical success factors in implementing information governance within an enterprise information management program. The logic for using the qualitative method of research was to capture the lived experiences of the participants regarding the implementation of an information governance program. Phenomenology accentuates the subjective experiences and interpretations of the participants. Interviews were conducted with 20 IG professionals. The participants were interviewed using a semistructured interview providing open ended responses. The interviews were transcribed and six major themes emerged from the study that may provide insight into understanding the critical success factors in implementing information governance: (a) executive support, (b) risk management, (c) change management, (d) communication, (e) technology, and (f) strategy and planning. The study recommends further research from the findings of the study. Executive support must be engaged for the long-term IG program and support the IG professional by providing the necessary resources to manage risk, promote change management, and encourage open communication. Recommendations for IG professionals to consider based on this study include nurturing of executive sponsorship, the need to balance risk management with business value, the necessity of speaking the language of internal customers, building collaborative relationships, and leveraging the learning.</p>

Page generated in 0.1061 seconds