Dissertations / Theses on the topic '080611 Information Systems Theory'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic '080611 Information Systems Theory.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Puhakainen, P. (Petri). "A design theory for information security awareness." Doctoral thesis, University of Oulu, 2006. http://urn.fi/urn:isbn:9514281144.
Full textSymons, Veronica Jean. "Evaluation of information systems : multiple perspectives." Thesis, University of Cambridge, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.279415.
Full textRichardson, Sandra. "HEALTHCARE INFORMATION SYSTEMS:DESIGN THEORY, PRINCIPLES AND APPLICATION." Doctoral diss., University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3182.
Full textPh.D.
Department of Management Information Systems
Business Administration
Business Administration: Ph.D.
Brown, Irwin T. J. "Espoused theory versus theory in use : the case of strategic information systems planning." Doctoral thesis, University of Cape Town, 2005. http://hdl.handle.net/11427/5638.
Full textStrategic information systems planning (SISP) has been a key issue for Information Systems (IS) managers over several decades. As a consequence, much research has been devoted to studing it. Noted concerns have been the gap between opinion and practice, and the absence of a sound theory to underpin it. Attempts at developing an overarching theoretical framework have typically used an input-process-output variance model as the basis. Rich processual elements of SISP, and the existence of feedback loops, which could then lead to improved practice, have however, been noted as absent from these models. Synthesis and integration of the above concerns lead to the goal of this study, which was to develop rich processual theories about SISP. The grounded theory methodology was ideally suited to this purpose as it aims to develop theory that is well grounded in data, and therefore very much reflective of the reality presented by the data.
McFarland, Sean Alan. "Decision making theory with geographic information systems support." CSUSB ScholarWorks, 2008. https://scholarworks.lib.csusb.edu/etd-project/3393.
Full textPloesser, Karsten. "A Design Theory for Context-Aware Information Systems." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/60865/1/Karsten_Ploesser_Thesis.pdf.
Full textMansouri-Samani, Masoud. "Monitoring of distributed systems." Thesis, Imperial College London, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.362441.
Full textLevi, Elliott Kendrick. "Information transfer in open quantum systems." Thesis, University of St Andrews, 2017. http://hdl.handle.net/10023/16690.
Full textRay, Gautam. "Information systems and competitive advantage : a process-oriented theory." Connect to resource, 2000. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1261401669.
Full textHellmuth, Wayne J. "Design theory for innovation of classroom-based information systems." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/87824/1/Wayne_Hellmuth_Thesis.pdf.
Full textGong, Li. "Cryptographic protocols for distributed systems." Thesis, University of Cambridge, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.357767.
Full textAskira, Gelman I. "Studies on the informativeness, value, and cost, of information and information systems." Diss., The University of Arizona, 2003. http://hdl.handle.net/10150/289235.
Full textButtery, E. Allan. "New paradigm research within systems development." Thesis, University of Glasgow, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.314519.
Full textEpiskopou, D. M. "The theory and practice of information systems methodologies : A grounded theory of methodological evolution." Thesis, University of East Anglia, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.380960.
Full textMyers, Barry L. "Information systems assessment: development of a comprehensive framework and contingency theory to assess the effectiveness of the information systems function." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4302/.
Full textLund, David J. "Reconfigurable channel coding for future communication systems." Thesis, Lancaster University, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.289042.
Full textJamasebi-Jahromi, Ali. "Code synchronisation in spread spectrum communication systems." Thesis, University of Manchester, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.257305.
Full textAdams, Carl. "Dealing with uncertainty within information systems development : applying prospect theory." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.395995.
Full textVigneaux, Juan Pablo. "Topology of statistical systems : a cohomological approach to information theory." Thesis, Sorbonne Paris Cité, 2019. http://www.theses.fr/2019USPCC070.
Full textThis thesis extends in several directions the cohomological study of information theory pioneered by Baudot and Bennequin. We introduce a topos-theoretical notion of statistical space and then study several cohomological invariants. Information functions and related objects appear as distinguished cohomology classes; the corresponding cocycle equations encode recursive properties of these functions. Information has thus topological meaning and topology serves as a unifying framework.Part I discusses the geometrical foundations of the theory. Information structures are introduced as categories that encode the relations of refinement between different statistical observables. We study products and coproducts of information structures, as well as their representation by measurable functions or hermitian operators. Every information structure gives rise to a ringed site; we discuss in detail the definition of information cohomology using the homological tools developed by Artin, Grothendieck, Verdier and their collaborators.Part II studies the cohomology of discrete random variables. Information functions—Shannon entropy, Tsallis alpha-entropy, Kullback-Leibler divergence—appear as 1-cocycles for appropriate modules of probabilistic coefficients (functions of probability laws). In the combinatorial case (functions of histograms), the only 0-cocycle is the exponential function, and the 1-cocycles are generalized multinomial coefficients (Fontené-Ward). There is an asymptotic relation between the combinatorial and probabilistic cocycles.Part III studies in detail the q-multinomial coefficients, showing that their growth rate is connected to Tsallis 2-entropy (quadratic entropy). When q is a prime power, these q-multinomial coefficients count flags of finite vector spaces with prescribed length and dimensions. We obtain a combinatorial explanation for the nonadditivity of the quadratic entropy and a frequentist justification for the maximum entropy principle with Tsallis statistics. We introduce a discrete-time stochastic process associated to the q-binomial probability distribution that generates finite vector spaces (flags of length 2). The concentration of measure on certain typical subspaces allows us to extend Shannon's theory to this setting.Part IV discusses the generalization of information cohomology to continuous random variables. We study the functoriality properties of conditioning (seen as disintegration) and its compatibility with marginalization. The cohomological computations are restricted to the real valued, gaussian case. When coordinates are fixed, the 1-cocycles are the differential entropy as well as generalized moments. When computations are done in a coordinate-free manner, with the so-called grassmannian categories, we recover as the only degree-one cohomology classes the entropy and the dimension. This constitutes a novel algebraic characterization of differential entropy
Magalhaes, Rodrigo Manuel. "The organizational implementation of information systems : towards a new theory." Thesis, London School of Economics and Political Science (University of London), 1999. http://etheses.lse.ac.uk/284/.
Full textHemingway, Christopher John. "A socio-cognitive theory of information systems and initial applications." Thesis, University of Leeds, 1999. http://etheses.whiterose.ac.uk/1280/.
Full textSeevinck, Jennifer. "Emergence in interactive art." Thesis, University of Technology, Sydney, 2011.
Find full textBrown, Michael Daniel. "Transputer implementation of adaptive control for turbogenerator systems." Thesis, Queen's University Belfast, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.334521.
Full textRabee, Safaa Al-Dbin Hussein. "Power control optimisation for CDMA cellular radio systems." Thesis, University of Newcastle Upon Tyne, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.270810.
Full textTindell, Kenneth William. "Fixed priority scheduling of hard real-time systems." Thesis, University of York, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.359298.
Full textZhang, Meng. "Systems thinking in the construction of information systems theory: A set of methodological inquiries." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/92275/1/Meng_Zhang_Thesis.pdf.
Full textBehnke, Matthew J. "An implementation methodology and software tool for an entropy based engineering model for evolving systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBehnke.pdf.
Full textThesis advisor(s): Mantak Shing, Christopher D. Miles. Includes bibliographical references (p. 69-70). Also available online.
Hashemi-Zahan, Saeid. "Inversion of non-minimum phase systems in signal processing." Thesis, University of Southampton, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.266944.
Full textKómár, Péter. "Quantum Information Science and Quantum Metrology: Novel Systems and Applications." Thesis, Harvard University, 2015. http://nrs.harvard.edu/urn-3:HUL.InstRepos:26718726.
Full textPhysics
Li, Y. (Ying). "Users’ information systems (IS) security behavior in different contexts." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526209395.
Full textTiivistelmä Tietokoneenkäyttäjien tietoturvakäyttäytyminen on jatkuvan kiinnostuksen kohteena niin tutkijoiden kuin käytännön ammatinharjoittajienkin keskuudessa. Aiempi tutkimus on keskittynyt tarkastelemaan tietoturvakäyttäytymistä yleensä yhdessä kontekstissa (esim. työntekijöiden tietoturvaohjeiden noudattaminen organisaatiokontekstissa), kun taas vähemmälle huomiolle on jäänyt se, kuinka kontekstin muuttuminen selittää tietoturvakäyttäytymistä. Tämä väitöskirja vastaa kyseiseen ongelmaan, sillä se käsittelee kontekstin roolia tietoturvakäyttäytymistutkimuksessa. Tutkimuksessa analysoidaan organisaatiokontekstin ja kotikontekstin eroja. Analyysi osoittaa, että on tarpeellista tutkia tietokoneen käyttäjien tietoturvakäyttäytymistä tietyissä konteksteissa, kuten esimerkiksi kotikontekstissa. Tutkimus tarjoaa ohjeita siihen, kuinka kontekstisidonnaisia teorioita sovelletaan ja kehitetään tietoturvakäyttäytymistutkimuksessa. Väitöskirja sisältää 2 empiiristä tutkimusta, jotka pohjautuvat edellä mainittuihin ohjeisiin. Ensimmäisessä vaiheessa tutkimuksessa sovelletaan rational choice -teoriaa, jonka pohjalta vertaillaan tiettyä tietoturvakäyttäytymistyyppiä 2 kontekstissa: työkonteksti (N = 210) ja henkilökohtaisen käytön konteksti (N = 202). Toiseksi, tutkimus soveltaa stewardship -teoriaa ja kehittää siihen pohjautuen kontekstisidonnaisen teorian, joka selittää organisaation työntekijöiden käyttäytymistä liittyen tietoturvariskin ottamiseen (N = 170). Väitöskirjan tutkimustulokset esittävät erilaisia selityksiä tietokoneen käyttäjien tie-toturvakäyttäytymiselle eri konteksteissa. Tutkimus korostaa sitä, kuinka tärkeää on ottaa konteksti huomioon tutkittaessa tietoturvakäyttäytymistä. Kummankin empiirisen tutkimuksen tulokset tarjoavat teoreettisen kontribuution lisäksi käytännöllisiä neuvoja tietoturvan toteuttamiseen
Mujuru, Takunda Arthur. "Realising partnership needs : a grounded theory of mobile banking service providers in Zimbabwe." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/5667.
Full textIncludes bibliographical references.
Mobile banking in Zimbabwe as a new phenomenon has been generally unexploredacademically. The infant industry has seen various stakeholders step up to partake in thedevelopment of mobile banking services with various renditions of the phenomenonsurfacing. The coming together of the stakeholders from different backgrounds has not beenwithout complications. This study employs the Classic Grounded Theory methodology in aneffort to discover the main concerns of the stakeholders involved in the development ofmobile banking in Zimbabwe. The study finds that the main concern of these people ispartnering. A grounded theory on how the need for partnering is realised and pursued througha three stage process named the Realisations Process is developed. The Realisations Processis how the stakeholders involved resolve their main concern by initially realising their needfor partnering, reaching out to and engaging potential partners and eventually partnering withthem on the condition they similarly realise the need to partner.
Oreshkov, Ognyan. "Topics in quantum information and the theory of open quantum systems." Doctoral thesis, University of Southern California, Los Angeles, 2008. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/225666.
Full textLudlow, Brian Alan. "Information systems strategy - theory and practice within a multi-divisional organisation." Thesis, Henley Business School, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.232937.
Full textOnik, Mohammad Fakhrul Alam. "Business value of information technology: A complex adaptive systems theory view." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/132323/1/Mohammad%20Fakhrul%20Alam_Onik_Thesis.pdf.
Full textAbegaze, A. "Assessment of speech synthesis systems for application in mobile communications." Thesis, University of Bradford, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.380392.
Full textJohansson, Ronnie. "Information Acquisition in Data Fusion Systems." Licentiate thesis, KTH, Numerical Analysis and Computer Science, NADA, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-1673.
Full textBy purposefully utilising sensors, for instance by a datafusion system, the state of some system-relevant environmentmight be adequately assessed to support decision-making. Theever increasing access to sensors o.ers great opportunities,but alsoincurs grave challenges. As a result of managingmultiple sensors one can, e.g., expect to achieve a morecomprehensive, resolved, certain and more frequently updatedassessment of the environment than would be possible otherwise.Challenges include data association, treatment of con.ictinginformation and strategies for sensor coordination.
We use the term information acquisition to denote the skillof a data fusion system to actively acquire information. Theaim of this thesis is to instructively situate that skill in ageneral context, explore and classify related research, andhighlight key issues and possible future work. It is our hopethat this thesis will facilitate communication, understandingand future e.orts for information acquisition.
The previously mentioned trend towards utilisation of largesets of sensors makes us especially interested in large-scaleinformation acquisition, i.e., acquisition using many andpossibly spatially distributed and heterogeneous sensors.
Information acquisition is a general concept that emerges inmany di.erent .elds of research. In this thesis, we surveyliterature from, e.g., agent theory, robotics and sensormanagement. We, furthermore, suggest a taxonomy of theliterature that highlights relevant aspects of informationacquisition.
We describe a function, perception management (akin tosensor management), which realizes information acquisition inthe data fusion process and pertinent properties of itsexternal stimuli, sensing resources, and systemenvironment.
An example of perception management is also presented. Thetask is that of managing a set of mobile sensors that jointlytrack some mobile targets. The game theoretic algorithmsuggested for distributing the targets among the sensors proveto be more robust to sensor failure than a measurement accuracyoptimal reference algorithm.
Keywords:information acquisition, sensor management,resource management, information fusion, data fusion,perception management, game theory, target tracking
Mair, Patrick, and Horst Treiblmaier. "Partial Credit Models for Scale Construction in Hedonic Information Systems." Department of Statistics and Mathematics, WU Vienna University of Economics and Business, 2008. http://epub.wu.ac.at/1614/1/document.pdf.
Full textSeries: Research Report Series / Department of Statistics and Mathematics
Mpazanje, Flora Titani Harriet. "Towards understanding as-lived experiences in information systems projects : an actor-network theory perspective." Master's thesis, University of Cape Town, 2009. http://hdl.handle.net/11427/5668.
Full textThis research project began with a literature review of IS project management theories which aimed to explore and describe the as-lived experience of practitioners in an IS project network. The study builds on this body of knowledge by providing a narrative of as-lived experiences of IS project participants. The study involved a cross-sectional study of two IS projects cases from two countries in sub-Saharan Africa, namely, Malawi and South Africa. Information was collected and analysed qualitatively using Actor-network Theory. Unstructured interviews were the main data gathering technique supplemented with secondary data and observations. Most interviews were audio recorded. All interviews were transcribed before analysis.
Mutshewa, Athulang. "A theory of the use of information for environmental planning : the case of Botswana." Doctoral thesis, University of Cape Town, 2006. http://hdl.handle.net/11427/15426.
Full textThis study is about the use of information by people work roles. Although the use of information is a key issue in information systems theory and practice, it has received little attention from information systems researchers. Information systems research has been biased towards technology and its use. Our understanding of the use of information by people in work roles to guide the development of information svstems and information management is limited. The present study addresses this imbalance investigating the use of information by planners when they grapple with environmental issues in the development process. The study takes a behavioural perspective to develop a Grounded Theory of the use of information for environmental planning. The research emphasises the use of a qualitative research to understand the use information in relation to tasks and activities the planners perform in projects. Semi-structured interviews were conducted in the workplace environment to collect data on the respondents have used information in projects that they had done before. Forty-four subjects were selected from five councils in Botswana. The evidence was corroborated by interviewing ten people outside council who were identified with help of the respondents in the councils. The data was analysed through a coding process in accordance the Grounded Theory techniques. The coding took place in multiple iterations, experts confirmed the results, and the respondents validated theory. The study demonstrates that the use of information by people in work roles can be explored empirically from a behavioural perspective using a qualitative approach – in particular, Grounded Theory. The study identified the processes, contexts, and behaviours relating to the use information. The main finding is the Grounded Theory of the use information for environmental planning. The theory has seven main categories - dynamic project information context, motivators, experiential knowledge, informational power, strategy for participation and pattern of information use. The pattern of information use is the core category. The dynamic project information context, motivators, experiential knowledge and role context influence the pattern of information use in a variety of ways. The pattern of information use generates the informational power base of the planners. The interpretation of the theory shows that the planners exercise their informational power through the strategy for participation in which they facilitate the environmental planning process for the production of environmental plans. The study shows that power relations endemic in environmental planning are essential determinants of the kind of information behaviour that planners exhibit. The findings provide a new way of thinking about developing information systems and information management for planners. It is suggested that when developing information systems for planners the developers should focus on systems functions that facilitate and enhance information behaviours that are induced by the power relations experienced by the planners.
Dooley, Phillip. "The Effective implementation of GIS in local government using diffusion theory /." Connect to thesis, 2001. http://eprints.unimelb.edu.au/archive/00001047.
Full textParrish, James. "SENSEMAKING IN INFORMATION SYSTEMS: TOWARD A SENSEMAKING INQUIRING SYSTEM." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3502.
Full textPh.D.
Department of Management Information Systems
Business Administration
Business Administration PhD
Ko, Pui S. "Dimensions of information technology governance: A study of theory and practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2008. https://ro.ecu.edu.au/theses/1609.
Full textYeldener, Suat. "Sinusoidal model based low bit rate speech coding for communication systems." Thesis, University of Surrey, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.359842.
Full textBackhouse, James. "The use of semantic analysis in the development of information systems." Thesis, London School of Economics and Political Science (University of London), 1991. http://etheses.lse.ac.uk/2079/.
Full textHuang, Xiangji. "A probabilistic approach for Chinese information retrieval : theory, analysis and experiments." Thesis, City University London, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.390951.
Full textConstaninides, George Anthony. "High level synthesis and word length optimization of digital signal processing systems." Thesis, Imperial College London, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.252020.
Full textAtungsiri, Samuel Asangbeng. "Joint source and channel coding for low bit rate speech communication systems." Thesis, University of Surrey, 1991. http://epubs.surrey.ac.uk/989/.
Full textAl-Rawas, Layth. "The design of synchronisation and tracking loops for spread-spectrum communication systems." Thesis, University of Bath, 1985. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.370459.
Full textRobbin, Alice, and Lee Frost-Kumpf. "Extending theory for user-centered information systems: Diagnosing and learning from error in complex statistical data." John Wiley & Sons, Inc, 1997. http://hdl.handle.net/10150/105746.
Full textBurgos, Andrés C. "Information-theoretic models of communication in biological systems." Thesis, University of Hertfordshire, 2017. http://hdl.handle.net/2299/19509.
Full text