• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 122
  • 10
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 151
  • 151
  • 50
  • 24
  • 24
  • 22
  • 21
  • 18
  • 17
  • 13
  • 11
  • 11
  • 11
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Leading Across Boundaries| Collaborative Leadership and the Institutional Repository in Research Universities and Liberal Arts Colleges

Seaman, David M. 03 November 2017 (has links)
<p> Libraries often engage in services that require collaboration across stakeholder boundaries to be successful. Institutional repositories (IRs) are a good example of such a service. IRs are an infrastructure to preserve intellectual assets within a university or college, and to provide an open access showcase for that institution&rsquo;s research, teaching, and creative excellence. They involve multiple stakeholders (librarians, IT experts, administrators, faculty, and students) and are typically operated by academic libraries. They have existed since the early 2000s. </p><p> Collaborative leadership has been studied in areas such as health care and business, but it has received little attention in studies of library leadership and management. Collaborative leadership has been shown to be an effective leadership style for an increasingly networked world; it is an interactive process in which people set aside self-interests, share power, work across boundaries, and discuss issues openly and supportively. Collaborative leadership moves organizations beyond mere cooperation towards a state of interdependence; it empowers all members of a team to help each other to achieve broader goals, find personal satisfaction in their work, and sustain productive relationships over time. A better understanding of collaborative leadership can inform both IR development and future complex multi-stakeholder campus services. </p><p> Two methodologies &ndash; content analysis of IR web pages and surveys of library directors and IR developers &ndash; were employed to determine if IRs revealed evidence of collaborative leadership. The study populations were those members of the Association of Research Libraries (ARL) and the Oberlin Group of liberal arts colleges that operated IR services by July 2014 (146 institutions overall). The research examined if IR format, size, age, nomenclature, or technology platform varied between ARL and Oberlin Group members. It asked if there is any difference in the perception of collaborative leadership traits, perceived IR success, or collaborative involvement with stakeholder communities between ARL and Oberlin Group members or between library directors and IR developers. The study found evidence of all six collaborative leadership traits being examined: assessing the environment for collaboration, creating clarity, building trust, sharing power, developing people, and self-reflection. </p><p>
72

A Study of How Young Adults Leverage Multiple Profile Management Functionality in Managing their Online Reputation on Social Networking Sites

McCune, T. John 26 October 2017 (has links)
<p> With privacy settings on social networking sites (SNS) perceived as complex and difficult to use and maintain, young adults can be left vulnerable to others accessing and using their personal information. Consequences of not regulating the boundaries their information on SNS include the ability for current and future employers to make career-impacting decisions based upon their online reputation that may include disqualifying them as job candidates. </p><p> On SNS, such as Facebook, LinkedIn, and Twitter, young adults must decide on how to manage their online reputation by regulating boundaries to their own personal and professional information and identities. One known practice for the regulation of boundaries is the use of multiple profile management (MPM), where users of SNS create and use multiple accounts on a SNS and separate the social and professional identities that they disclose publicly and privately. </p><p> The purpose of the study was to understand the lived experiences of young adults in how they regulate boundaries on SNS, through the use of MPM, as they manage their online reputation to different audiences. The practice was studied by applying interpretative phenomenological analysis (IPA) through interviewing young adults of 18-23 years of age, who use MPM on a SNS. Semi-structured interviews permitted participants to provide in-depth descriptions of their lived experiences.</p><p> Eight themes were identified and described based on the analysis of the interviews that include: SNS use with online audiences, motivations for using MPM, the processes for the presentation of self, online search results, privacy settings, untagging SNS posts, self-editing and censorship, and new features. The themes describe the complexity and challenges that young adults face with regulating boundaries with their professional and social identities online through the use of MPM.</p><p> Findings from this study have implications for a variety of audiences. Through the findings of this study, SNS developers can introduce new features, improve usability related to privacy management, and further encourage use of their networks. Users of SNS can use this study to understand risks of using SNS and for learning of practices for how to manage their online reputation on SNS.</p><p>
73

A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones

Maghsoudi, Javid 03 January 2018 (has links)
<p> This is a study of the behavioral biometric of smartphone motion to determine the potential accuracy of authenticating users on smartphone devices. The study used the application Sensor Kinetics Pro and the Weka machine-learning library to analyze accelerometer and gyroscope data. The study conducted three experiments for the research. They were conducted in spring 2015, fall 2015, and spring 2016. The final experiment in spring 2016 used six Android-based smartphones to capture data from 60 participants and each participant performed 20 trials of two motions: bringing the phone up to eye level for review, and then bringing the phone to the ear, resulting in 1200 runs. The resulting sensor datasets were used for machine learning training and testing. The study used filtering data to remove noise, and then aggregated the data and used them as inputs to the Weka Machine Learning tool. The study used several machine classification algorithms: the Multilayer Perception (MLP), k-Nearest Neighbor (k-NN), Na&iuml;ve Bayes (N-B), and Support Vector Machine (SVM) machine learning classification algorithms. The study reached authentication accuracies of up to 93% thus supporting the use of behavioral motion biometrics for user authentication. Preliminary studies with smaller numbers of participants in spring 2015 and in fall 2015 also produced 90%+ authentication accuracy.</p><p>
74

Flexible production in the unstable state the Brazilian information technology industry /

Bornstein, Lisa Margaret. January 1993 (has links)
Thesis (Ph. D.)--University of California, Berkeley, 1993. / Includes bibliographical references (leaves 248-265).
75

South Korean universal service and Korean reunification a policy analysis /

Jeong, Bun-hee, Doty, Philip, January 2004 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2004. / Supervisor: Philip Doty. Vita. Includes bibliographical references.
76

The Dynamics of the adoption and use of ICT-based initiatives for development results of a field study in Mozambique /

Macome, Esselina. January 2002 (has links)
Thesis (Ph. D.)(Informatics)--University of Pretoira, 2002. / Appendices mostly in Portuguese. Includes bibliographical references.
77

The information technology, risk and return triad : a longitudinal analysis of corporate financial data /

Singh, Anil, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 96-104). Available also in a digital version from Dissertation Abstracts.
78

An investigation of factors affecting Omani faculty members' adoption of information and computing technology

Al Senaidi, Said. Poirot, James L., January 2009 (has links)
Thesis (Ph. D.)--University of North Texas, Aug., 2009. / Title from title page display. Includes bibliographical references.
79

Information overload and managerial roles : a naturalistic study of engineers /

Jackson, Wanda Kaye, January 2001 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2001. / Vita. Includes bibliographical references (leaves 218-227). Available also in a digital version from Dissertation Abstracts.
80

Appropriate Technology for Natural Resources Development: An Overview, Annotated Bibliography, and A Guide to Sources of Information

Bulfin, Robert L., Weaver, Harry L. January 1977 (has links)
This item was digitized as part of the Million Books Project led by Carnegie Mellon University and supported by grants from the National Science Foundation (NSF). Cornell University coordinated the participation of land-grant and agricultural libraries in providing historical agricultural information for the digitization project; the University of Arizona Libraries, the College of Agriculture and Life Sciences, and the Office of Arid Lands Studies collaborated in the selection and provision of material for the digitization project.

Page generated in 0.1008 seconds