To see the other types of publications on this topic, follow the link: Personal information management – Zimbabwe.

Dissertations / Theses on the topic 'Personal information management – Zimbabwe'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Personal information management – Zimbabwe.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Layouni, Mohamed. "Privacy-preserving personal information management." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.

Full text
Abstract:
The spread of Information and Communication Technologies (ICTs) has transformed the way we deliver services, and has made them in general more efficient and more accessible to users. With these improvements however came new challenges. The extensive use of electronic services in our daily life, and the massive gathering of transactional data have led to serious privacy violations.
In this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
APA, Harvard, Vancouver, ISO, and other styles
2

Franz, Thomas [Verfasser]. "Semantic Personal Information Management / Thomas Franz." München : Verlag Dr. Hut, 2010. http://d-nb.info/1009972243/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gwizdka, Jacek, and Mark Chignell. "Individual Differences in Personal Information Management." University of Washington Press, 2007. http://hdl.handle.net/10150/105751.

Full text
Abstract:
In an increasingly complex world where people routinely handle large amounts of information, individuals are constantly challenged to manage and effectively use the information that they are responsible for. While email is the canonical example of an information overloading application, other well known PIM applications and tasks cited in earlier chapters of this book include maintaining addresses and contacts, scheduling, and organizing the various documents and bookmarks that one is interested in. Not surprisingly, there are individual differences (ID) in how, and how well, people cope with the challenge of personal information management. This greatly complicates any scientific analysis of PIM behavior. Thus, in addition to the evaluation methods discussed in the previous chapter, researchers and designers need to consider when and how individual differences should be included within parsimonious interpretations and explanations of PIM behavior. In this chapter we propose an approach where differences between individuals are considered last, after the influences of the environment and the task context have first been considered, and after group difference (e.g., between job classifications) have been investigated. We believe that this is a logical way to proceed, since like observing an ant walking over sand-dunes (cf. Simon, 1996) we should not ascribe complexities to an individual if they can instead be explained as due to properties of the environment. The goal of this chapter will be to review and synthesize some of the key findings in how PIM behavior differs between individuals. Some of the reasons why these differences occur and what can be done about them will also be discussed.
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Jamie M. Eng Massachusetts Institute of Technology. "Customizable application for personal information management." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61172.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 83-84).
As digital content becomes increasingly pervasive in our daily lives, next-generation organizational tools must be developed to help end users curate that information. The information management tools available today are limited in several ways. They are either restrictive in how users define and organize their data, or they offer few options in how users can view and interact with that data. In this thesis, we introduce a new application geared toward the layman end user to help resolve this lack of personalization when managing data. With this tool, users can store any collection of information (i.e. to do lists, address book, DVD collection), customize how they want to view and browse that data, and create any number of visualizations for the same data set or overlapping sets of data. For example, a user might want to manage an address book for a collection of all contacts, and manage a different set of items involving all research-related items, including colleagues, in another visualization. This tool allows her to do this without duplicating the overlapping data set for contact information of colleagues, enabling her to make changes to an item in one visualization and see that change applied to any other visualization that includes the same item. Moreover, users can import data from other sources, as well as share their data with others either with a visualization, such that the receiver can interact with the visualization the user has already created, or as raw data, such that the receiver can create his or her own visualization of the data.
by Jamie Liu.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
5

Elsweiler, David. "Supporting human memory in personal information management." Thesis, University of Strathclyde, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488520.

Full text
Abstract:
Personal Information Management (PIM) describes the processes by which an individual acquires, organises, and re-finds information. Studies have shown that people find PIM challenging and many struggle to manage the volume and diversity of information that they accumulate.
APA, Harvard, Vancouver, ISO, and other styles
6

Keeble, Richard John. "An adaptive environment for personal information management." Thesis, Brunel University, 1999. http://bura.brunel.ac.uk/handle/2438/6509.

Full text
Abstract:
This dissertation reports the results of research into the provision of adaptive user interfaces to support individuals in the management of their personal information. Many individuals find that they have increased responsibility for managing aspects of their own lives, including the information associated with their jobs. In contrast with traditional approaches to information management, which are generally driven by organisational or business requirements, the requirements of personal information management systems tend to be less rigidly defined. This dissertation employs research from the areas of personal information management and adaptive user interfaces - systems which can monitor how they are used, and adapt on a personal level to their user - to address some of the particular requirements of personal information management systems. An adaptive user interface can be implemented using a variety of techniques, and this dissertation draws on research from the area of software agents to suggest that reactive software agents can be fruitfully applied to realise the required adaptivity. The reactive approach is then used in the specification and development of an adaptive interface which supports simple elements of personal information management tasks. The resulting application is evaluated by means of user trials and a usability inspection, and the theoretical architectures and techniques used in the specification and development of the software are critically appraised. The dissertation demonstrates an application of reactive software agents in adaptive systems design and shows how the behaviour of the system can be specified based on the analysis of some representative personal information management tasks.
APA, Harvard, Vancouver, ISO, and other styles
7

Gyllstrom, Karl Stotts P. David. "Enriching personal information management with document interaction histories." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2009. http://dc.lib.unc.edu/u?/etd,2727.

Full text
Abstract:
Thesis (Ph. D.)--University of North Carolina at Chapel Hill, 2009.
Title from electronic title page (viewed Mar. 10, 2010). "... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science." Discipline: Computer Science; Department/School: Computer Science.
APA, Harvard, Vancouver, ISO, and other styles
8

Matizirofa, Lazarus. "Information management and dissemination of HIV/AIDS information by NGOs in Zimbabwe: An explanatory study." Master's thesis, University of Cape Town, 2005. http://hdl.handle.net/11427/8726.

Full text
Abstract:
Includes bibliographical references (leaves 99-119).
The HIV/AIDS epidemic has become a serious health, social and economic problem in Zimbabwe. Almost 30 percent of the population had been infected by AIDS (Acquired immune Deficiency Syndrome) by 2004. The epidemic has also affected almost the entire population in one way or another - domestically, socially and economically. Zimbabwe faces a long-term development disaster because of the effects of the disease across the societal spectrum. AIDS is threatening every fibre of the nation from food supply to economic productivity, and not least human resource development. Many households have lost their principal source of income to the disease and have become impoverished. The national budget is increasingly under pressure as scarce resources are channelled to fight the HIV/AIDS pandemic. Despite a multitude of interventions aimed at preventing the scourge of the epidemic on the health system, the economy and human development, HIV/AIDS still presents a problem of enormous magnitude in Zimbabwe. It is argued that a major limitation of the various interventions to fight the pandemic has been the failure to extensively and effectively harness knowledge and disseminate information relating to all aspects of HIV/AIDS in Zimbabwe. The NGO sector, because of its grassroots involvement with the disease, is particularly well placed to fulfil such a role. The main aim of this study was to explore information and knowledge management and dissemination by HIV/AIDS NGOS in Zimbabwe. A further objective was to identity in the literature strategies that have been used, vis-a-vis modern information and knowledge management practice, in cognate sectors of development in Zimbabwe and other countries. It is argued that by applying appropriate information and knowledge management practices valuable knowledge and information that relate to how communities experience the problems and the impact associated with HlV/AIDS can be gathered and disseminated. Information and knowledge management is recommended by the United Nations' UNAIDS as the best way to harness both tacit and explicit information related to all aspects of the epidemic. A survey was conducted amongst 64 HIV/AIDS NGOs based in Harare, Zimbabwe. Data was collected using questionnaires, key informant interviews, and observation methods, and this was further supported by data collected from documentary and electronic sources. The main outcome of the study indicates that information and knowledge management is generally not well practised in the HIV/AIDS NGO sector in Zimbabwe. This is despite the fact that 75% of the NGOs had information services in place. Far too few qualified staff have been appointed to manage information services and this lack of professional skills has had a negative impact on HIV/AIDS information dissemination. It is argued that in a society such as in Zimbabwe, effective information dissemination measures are needed to assist social, economic and scientific interventions. It was further established that a sound information and knowledge management policy, and information technology developments were needed to address the information service challenges. The other main outcome showed that NGOS were not networking effectively among themselves, with government and other role players such as the private sector, educational institutions and churches, etc. Lastly, there was a strong indication that information technology, i.e., computers and accessories, the Internet, intranets, databases and audio-visuals, etc.. were not fully utilised, this is despite the fact that in other countries they have been very effective to assist in the creation, generation, gathering and diffusion of information. Based on the research outcomes, the researcher thus proposes that information and knowledge management practices should be set in place in the HIV/AIDS sector of Zimbabwe. NGOs should ensure that information services are run and manned by skilled and trained information officers. It is also suggested that government should be encouraged to become more involved and complement the work done by NGOs by reviewing the 1985 NLDS Act and other policy instruments. The study further recommends that, HIV/AIDS NGOs should work towards networking and providing a single shared dissemination source to the public, such as a national database, which would be hosted via a web-based internet portal. This would also enable NGOs to explore further networking efforts such as communities of practice (expert forums), a national HIV/AIDS bibliography and electronic publishing.
APA, Harvard, Vancouver, ISO, and other styles
9

Mago, Shamiso. "The impact of information and communication technologies (ICTs) on rural livelihoods: the case of smallholder farming in Zimbabwe." Thesis, University of Fort Hare, 2012. http://hdl.handle.net/10353/d1007185.

Full text
Abstract:
This study seeks to determine the impact of Information and Communication Technologies (ICTs) on livelihoods of smallholder farmers in Zimbabwe. The study was motivated by the fact that benefits of ICT development still need to be known among rural smallholder farmers in Zimbabwe. ICTs have been upheld as catalysts for the promotion of rural livelihoods the world over. The question that remains is whether ICTs in Zimbabwe promote livelihoods of smallholder farmers. Although the Government formulated the ICT policy in 2005, the benefits still need to be known among rural smallholder farmers in Zimbabwe. The challenges faced by smallholder farmers include limited access to ICTs, high costs in ICT services and lack of ICT infrastructural development in the country. The challenges hindered ICT benefits that are expected to accrue to smallholder farmers. This study is significant in the view that most studies on ICT have focused on the general roles of ICT on rural development without giving particular attention to smallholder farming that has a potential of reducing poverty and promoting food security. For a theoretical lens, the Sustainable Livelihood Approach was used with special attention to Chapman et al (2001)’s information wheel. Regarding methodological issues, the study followed a qualitative research methodology guided by a secondary analysis research design. Data were collected from published reports of government, reports from the Ministry of ICT, internet, journals, newspapers and periodicals. The study established that ICTs promote livelihoods of smallholder farmers through the dissemination of vital information for improvement of agricultural productivity. From the research findings, the study proposes four main recommendations. Firstly, strengthening of ICT policy for effective smallholder farmers. Secondly, the government to organise ICT awareness campaigns directed towards rural people especially smallholder farmers. Thirdly, up scaling ICT Infrastructural development .Finally, a large-scale ICTs and livelihoods research must be commissioned in the country.
APA, Harvard, Vancouver, ISO, and other styles
10

Yiu, Kelvin Shek. "Time-based management and visualization of personal electronic information." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0016/MQ29420.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Shanahan, Daniel Patrick. "Intentional Information Fragmentation in Email Management." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/35078.

Full text
Abstract:
Personal Information Management (PIM) studies the practice of storing, organizing, and retrieving information by an individual in support of their roles and tasks (Bergman, et al., 2004). One important problem in PIM is information fragmentation (IF) â the condition of having data in different formats, distributed across multiple locations, manipulated by different applications, and residing in a generally disconnected manner (Tungare, 2007). IF can conflict with the PIM ideal that users should have access to the right information at the right time, in the right place, in the right form, and of sufficient completeness and quality to perform the task at hand (Bergman, et al., 2004). It is typically assumed that IF is unintentional, and occurs as a result of the many applications and devices we use to do our daily work. It is further assumed that IF is â badâ or has negative consequences. In this thesis, I study when IF occurs intentionally. Intentional IF (IIF) refers to the fragmentation in PIM that occurs when a person fragments his or her own personal data purposefully. Although research into the problem of IF has been growing quickly in the past decade, IIF has not been investigated in the literature. Prior studies have portrayed IF as a problematic type of information management. Email is a common context in which IF is found. While IF in email may be unintentional, such as when required by an employer, it is also likely to be intentional, as is the case when users use separate email accounts for different purposes. To further the research in this field, this project investigated the phenomenon of IIF in email by conducting and analyzing data from an online survey. In addition to finding the extent of IIF in email, the survey addressed what motivates the participant to purposely fragment their email as well as the advantages and disadvantages in doing so. My study is the first that has explored intentional fragmentation of information. The findings of this study show that IIF exists in email usage, revealing that IIF occurs across a userâ s devices and also across a userâ s multiple email accounts. The two most common motivations for IIF are to keep information separated by the userâ s social roles (work, school, personal communications, etc.), and to filter out extraneous information in order to simplify their information management. These results show that in addition to the negative consequences of IF there also exists positive uses of IF, that is helpful for some users.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
12

Sauermann, Leo. "The Gnowsis semantic desktop approach to personal information management weaving the personal semantic web." Berlin dissertation.de, 2009. http://d-nb.info/996092501/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Eriksen, Jon. "Samlingen som verktyg : Personal Information Management och konstnärers personliga samlingar." Thesis, Uppsala universitet, Institutionen för ABM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-175388.

Full text
Abstract:
The study set out to find how artists organize and use their personal collections from a Personal Information Management (PIM) perspective, and how that use affects their practice and their art production. A secondary object of the study was to articulate the ways that personal collections are utilized as tools by creative users.  The empirical data consisted of five qualitative, semi-structured interviews with Swedish and Norwegian sound artists. The constant comparative method was used for analysis, and Activity Theory was used as a theore- tical framework for the study. The study concluded that artists’ personal collections, while diverse in content and structure, serve the same functions as tools in creative processes, and that attention to the uses of personal collections highlight needs that could be better met by integrated PIM-functionality.  The study also concluded that artists constitute an underutilized resource for future PIM-research and that artists’ personal collection use provides insight into creative use of collections, and highlights potential direc- tions for future development of PIM tools. This paper is a two years master’s thesis in Library and Information Science.
APA, Harvard, Vancouver, ISO, and other styles
14

Pikas, Christina K. "Personal Information Management Strategies and Tactics Used by Senior Engineers." American Society for Information Science and Technology, 2007. http://hdl.handle.net/10150/106236.

Full text
Abstract:
This paper reports the results of an exploratory qualitative study of how senior engineers in a research laboratory environment do personal information management (PIM). Responsive, semi-structured interviews were conducted with four senior engineers. Thirteen themes in four groupings emerged. The four groupings are: organization and retrieval, un-organized aspects, information keeping and preservation, and use of specialized tools. Themes not seen in other studies are: writing to remember and reporting to retrieve, and personal handbooks. The themes are described in detail. Implications for the design of information systems and future work are discussed.
APA, Harvard, Vancouver, ISO, and other styles
15

Mushonga, Cleopatra Tsungai. "Social networking for knowledge management : group features as personal knowledge management tools." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86315.

Full text
Abstract:
Thesis (MPhil)--Stellenbosch University, 2014.
ENGLISH ABSTRACT: With the emergence of Web 2.0 (social network platforms) some Knowledge Management theorists saw the potential for incorporating its collaborative and networking features in Knowledge Management Systems. However, the consensus is that harnessing Web 2.0 features for Knowledge Management is still in its infancy and according to some it seems that Web 2.0 success in the social sphere is hard to translate to the work context. The thesis argues that Web 2.0 primarily facilitates Personal Knowledge Management (PKM) and in this way indirectly contributes to Organisational Knowledge Management. Furthermore not all Web 2.0 features are equally useful in facilitating Personal Knowledge Management. The thesis identifies the group features of social network platforms as the prime locations for networking and learning. The thesis is theoretically based on Cheong and Tsui's PKM 2.0 model, in particular the Interpersonal Knowledge Transferring phase that in turn is based on Nonaka's SECI model of knowledge conversion. The thesis starts out with considering the distinction and relationship between Organisational Knowledge Management (OKM) and Personal Knowledge Management (PKM). Thereafter Cheong and Tsui's PKM 2.0 model is described as well as Nonaka's SECI model. The Web 2.0 phenomenon is introduced through a literature review of various studies on the usefulness of social network platforms and the group features are specifically highlighted. A survey is conducted among users of a particular Web 2.0 group feature, based on questions developed from the SECI and PKM 2.0 models. The thesis comes to the conclusion that the group features of Web 2.0 social network platforms are useful for Knowledge Management, because it is indeed a component of users' Personal Knowledge Management.
AFRIKAANSE OPSOMMING: Sekere Kennisbestuursteoretici het met die opkoms van Web 2.0 (sosiale netwerk-platforms) die moontlikheid waargeneem om die samewerks- en netwerk-funksionaliteit van Web 2.0 platforms met bestaande Kennisbestuurstelsels te integreer. Die konsensus is egter dat sulke pogings nog veel tekortskiet en sommige waarnemers meen dat dit baie moeilik sal wees om Web 2.0 se sukses in die sosiale sfeer in die werksplek in te span. Die tesis argumenteer dat Web 2.0 hoofsaaklik Persoonlike Kennisbestuur (PKB) fasiliteer en langs hierdie ompad 'n bydrae lewer tot Organisatoriese Kennisbestuur (OKB). Verder lewer alle funksionaliteite van Web 2.0 nie 'n bruikbare bydra tot Kennisbestuur nie, maar is dit hoofsaaklik die groepsfunksies wat bruikbaar is in terme van netwerking en leer. Die tesis is teoreties gewortel in Cheong en Tsui se PKB 2.0 model, veral die Interpersoonlike Kennisoordragsfase wat weer op Nonaka se SEKI model gebaseer is. Die tesis oorweeg aanvanklik die onderskeid en verhouding tussen Organisatoriese Kennisbestuur (OKB) en Persoonlike Kennisbestuur (PKB). Daarna word Cheong en Tsui se PKB 2.0 model en Nonaka se SEKI model bespreek. Die Web 2.0 fenomeen word beskryf aan die hand van 'n literatuurstudie van navorsing oor die bruikbaarheid van Web 2.0 platforms en die groepsfunksionaliteit word spesifiek belig. 'n Vraelys, gebaseer op die SEKI en PKB 2.0 modelle, is onder gebruikers van 'n spesifieke Web 2.0 groepsfunksie geadministreer. Die tesis kom tot die konklusie dat die groepsfunksies van Web 2.0 sosiale netwerk-platforms bruikbaar is vir Kennisbestuur, want dit is inderdaad 'n komponent van gebruikers se Persoonlike Kennisbestuur (PKB).
APA, Harvard, Vancouver, ISO, and other styles
16

Mhonderwa, Blessed Sue. "Knowledge Management as an Organisational Tool : The Case of the Electricity Supply Industry in Zimbabwe." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/75806.

Full text
Abstract:
Countries no longer contest solely on monetary capital and strength for survival, sustainable growth, development and advancement, but rather on creation, accumulation and strategic use of cutting-edge knowledge. A winning knowledge management (KM) programme makes innovations feasible, enables better and faster decisions, and increases staff productivity, product and service quality and deliverable consistency by capitalising on intellectual and knowledge-based assets, thereby enhancing organisational performance. Eager to reap the benefits of KM, many organisations leap into a knowledge management solution; however, implementation of KM can be a challenge. The challenges emanate from failure to effectively incorporate and manage the crucial elements that determine the successful implementation of KM as an organisational tool that engages people, strategy, corporate culture and information technology. This interpretive case study focuses on Zimbabwe’s electricity supply industry, which is on the verge of losing knowledge from its experienced employees owing to employee retirement and employee mobility. The Zimbabwe Electricity Transmission and Distribution Company (ZETDC), a state-owned company, is accountable for transmitting electricity from power stations, distributing it and retailing it to end users. The recent revival of the economy in Zimbabwe has increased demand and there is much pressure on the power generation capacity of ZETDC to meet demand from the industry and private households. This pressure affects the ZETDC’s operating model and therefore, organisational tools such as KM must be applied to manage its impact. Secondary data was collected through a review of the relevant literature and questionnaires and semi-structured interviews in ZETDC. Data collected was analysed and the themes that emerged were reported on. The study found that the ZETDC might suffer knowledge drain because of lack of an adequate system and procedures to manage its knowledge assets. Therefore, a proper KM system and strategy are required to ensure that both tacit knowledge and explicit knowledge are effectively passed on to the remaining and future employees. Furthermore, the electricity supply industry must integrate, build and remodel its internal and external capabilities through KM activities to improve application of KM as an organisational tool for enhancing performance in the fast-changing environment in which it operates.
Dissertation (MIT)--University of Pretoria, 2020.
UP Postgraduate Masters Research bursary
Informatics
MIT (Information Systems)
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
17

Grebner, Olaf [Verfasser], and R. [Akademischer Betreuer] Studer. "Using Unified Personal Information in Workspaces / Olaf Grebner. Betreuer: R. Studer." Karlsruhe : KIT-Bibliothek, 2009. http://d-nb.info/1014099900/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Jolaoso, Sheriff Olayinka. "TaskAmbient: A Study in Personal Task Management Visualization." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/52782.

Full text
Abstract:
In personal task management, individual tasks are susceptible to failure at various stages due to failures in prospective memory, information fragmentation, and/or cognitive overload. To alleviate the troubles that occur in personal task management, people use various tools such as notifications and external memory aids, but there is still room for improvement in regards to maintaining distributed cognitive artifacts such as calendars and to-do lists. Improvement in staying abreast of this personal task information as opposed to being alerted of it in individual instances was the topic of exploration in this work. TaskAmbient is an ambient information display system that was designed to address these problems. TaskAmbient supports retention of individual task knowledge as well as retention of task knowledge in a user's different areas of responsibility. With this tool, I observed usage to verify or deny its ability to support prospective memory and combat the problems associated with information fragmentation and cognitive overload in respect to personal task management. In this research, studies were conducted to learn about personal task management practices and how TaskAmbient was used. In conducting these studies, I found that TaskAmbient provided value in retaining task information and staying aware of tasks in a user's various areas of responsibility. TaskAmbient showed the extendibility to other domains of personal information management.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
19

Crystal, Abe J. Greenberg Jane. "Design research for personal information management systems to support undergraduate students." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2122.

Full text
Abstract:
Thesis (Ph. D.)--University of North Carolina at Chapel Hill, 2008.
Title from electronic title page (viewed Feb. 17, 2009). "... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the School of Information and Library Science." Discipline: Information and Library Science; Department/School: Information and Library Science, School of.
APA, Harvard, Vancouver, ISO, and other styles
20

Jacobs, Ellen Mueller Keith J. "In search of a message to promote personal health information management." Click here for access, 2009. http://www.csm.edu/Academics/Library/Institutional_Repository.

Full text
Abstract:
Thesis (Ph. D.)--University of Nebraska -- Omaha, 2009.
Presented to the faculty of the Graduate College in the University of Nebraska in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Medical Sciences Interdepartmental Area Health Services Research and Administration. Under the supervision of Professor Keith J. Mueller. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
21

Alomar, Mashael. "Scholars' research related Personal Information Management : an investigation of PAAET, Kuwait." Thesis, University of Sheffield, 2014. http://etheses.whiterose.ac.uk/5602/.

Full text
Abstract:
Personal Information Management (PIM) refers to the way people collect, organize and retrieve different forms of information including traditional printed and electronic content, such as books, papers, documents, email and bookmarks. Studies have shown that individuals struggle in their PIM practices to manage the diverse and voluminous information they accumulate. Within their research, scholars specifically, are not only information seekers, they are information keepers and managers as well. This research investigated the PIM practices of scholars in the Public Authority for Applied Education and Training (PAAET), a Higher Education institution in Kuwait. The study explored the factors that shape how scholars manage their personal information collections (PICs) within the research process. This was achieved by answering four research questions: How are scholars' research-related PICs created? What are the main characteristics of research related PICs? How are they used? What are the factors that shape them? The study employed a naturalistic qualitative design methodology. Three series of interviews were conducted with librarians and faculty members to identify a focus for the main study in an exploratory stage of the research. The main body of data investigated scholarly PIM practice of 17 scholars from Education and Health disciplines (College of Nursing and Health Science College) and focussing specifically on their research-related PICs. The data collected was interviews and photographs of scholars' collections, in addition to observation via tours of their working spaces within the interviews. The data was analysed using thematic analysis. The study found that scholars' research-related information collections (PICs) are huge, diverse, hybrid, and fragmented. Scholars' personal space of information contained a massive quantity of information related to their research that is stored in different places at different stages of the research. It chiefly consists of four types of information: sources of literature, research data, published research and administrative paperwork. It is fragmented in different locations physically and electronically. A model linking the size, diversity, hybridity and fragmentation of the collections to immediate and underlying factors was developed, explaining how the two layers of factors shaped the research-related PICs. The immediate factors affect the collections directly and were identified as: The need for research, Time pressure, Workspace, Technology opportunity, Support services and Self-positioning & Self-presentation. Those which affected the collections indirectly, the underlying factors, were: Age, Gender, Nationality, Seniority, Discipline, Foreign language, and Educational background. The study offers several contributions one of which is defining the specific nature of the research-related PICs of scholars and providing a model that explains the relationships between factors shaping their features. The research-related PIC is a special type of collection and thus needs special attention in handling such sizable, diverse, hybrid and fragmented material. By its findings, the study informed several stakeholders including scholars themselves, librarians, institutions, policy makers, PIM system vendors and software developers. Practical implications drawn out for each stakeholder can help scholars to be more efficient in creating, organizing and curating their research-related PICs, which will have positive effects in terms of time pressure and re-finding stored material.
APA, Harvard, Vancouver, ISO, and other styles
22

Long, Trisha L. "Medication Information Management Practices of Older Americans." Master's thesis, School of Information and Library Science, 2007. http://hdl.handle.net/1901/391.

Full text
Abstract:
This paper presents the results of a survey of 30 adults aged 55 and older, who had taken multiple prescription medications in the past two years. The purpose of the study was to determine how older adults manage their medication information currently, what information they save and share, and how they wish to manage medication information in an electronic environment, such as a personal health record. Adults in the survey shared information most frequently with their doctors, and with friends and family. They usually shared basic information about a medication, including its name, dose, and the frequency with which it is taken. Nearly half used an artifact, such as a list, to keep track of and share their information. Nearly a third of participants desired to keep an electronic record, suggesting that a percentage of the older adult population would be open to using electronic records to manage medication information.
APA, Harvard, Vancouver, ISO, and other styles
23

Beets, Simone Yvonne. "Enhanced visualisation techniques to support access to personal information across multiple devices." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1021136.

Full text
Abstract:
The increasing number of devices owned by a single user makes it increasingly difficult to access, organise and visualise personal information (PI), i.e. documents and media, across these devices. The primary method that is currently used to organise and visualise PI is the hierarchical folder structure, which is a familiar and widely used means to manage PI. However, this hierarchy does not effectively support personal information management (PIM) across multiple devices. Current solutions, such as the Personal Information Dashboard and Stuff I’ve Seen, do not support PIM across multiple devices. Alternative PIM tools, such as Dropbox and TeamViewer, attempt to provide a means of accessing PI across multiple devices, but these solutions also suffer from several limitations. The aim of this research was to investigate to what extent enhanced information visualisation (IV) techniques could be used to support accessing PI across multiple devices. An interview study was conducted to identify how PI is currently managed across multiple devices. This interview study further motivated the need for a tool to support visualising PI across multiple devices and identified requirements for such an IV tool. Several suitable IV techniques were selected and enhanced to support PIM across multiple devices. These techniques comprised an Overview using a nested circles layout, a Tag Cloud and a Partition Layout, which used a novel set-based technique. A prototype, called MyPSI, was designed and implemented incorporating these enhanced IV techniques. The requirements and design of the MyPSI prototype were validated using a conceptual walkthrough. The design of the MyPSI prototype was initially implemented for a desktop or laptop device with mouse-based interaction. A sample personal space of information (PSI) was used to evaluate the prototype in a controlled user study. The user study was used to identify any usability problems with the MyPSI prototype. The results were highly positive and the participants agreed that such a tool could be useful in future. No major problems were identified with the prototype. The MyPSI prototype was then implemented on a mobile device, specifically an Android tablet device, using a similar design, but supporting touch-based interaction. Users were allowed to upload their own PSI using Dropbox, which was visualised by the MyPSI prototype. A field study was conducted following the Multi-dimensional In-depth Long-term Case Studies approach specifically designed for IV evaluation. The field study was conducted over a two-week period, evaluating both the desktop and mobile versions of the MyPSI prototype. Both versions received positive results, but the desktop version was slightly preferred over the mobile version, mainly due to familiarity and problems experienced with the mobile implementation. Design recommendations were derived to inform future designs of IV tools to support accessing PI across multiple devices. This research has shown that IV techniques can be enhanced to effectively support accessing PI across multiple devices. Future work will involve customising the MyPSI prototype for mobile phones and supporting additional platforms.
APA, Harvard, Vancouver, ISO, and other styles
24

Heider, Jens [Verfasser], Claudia [Akademischer Betreuer] Eckert, and Uwe [Akademischer Betreuer] Baumgarten. "Ubiquitous Personal Information Management / Jens Heider. Gutachter: Uwe Baumgarten. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2011. http://d-nb.info/1019587393/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Jackson, Wanda Kaye. "Information overload and managerial roles : a naturalistic study of engineers /." Full text (PDF) from UMI/Dissertation Abstracts International, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3008358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Van, Kleek Max 1980. "Effort, memory, attention and time : paths to more effective personal information management." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66466.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2011.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 256-272).
With the widespread availability of digital tools for storing, accessing, and sharing information, why is so much information still lost, forgotten, or kept on paper? The work in this thesis finds that such disorganization results from problems in the designs of the personal information management (PIM) tools in common use today. Such problems impede information capture, force many information forms to be left out, and cause information to be forgotten. How can these problems be mitigated? Our Information Scraps study identifies the need to support more diverse kinds of information, while conserving time, attention, and memory for retained information items. Our first approach to achieving these goals is to eliminate the artificial separation and homogeneity that structured PIM tools impose, so that arbitrary information can be captured in any way desired. A two-year study of List-it, our short-note-taking tool, discovers that people keep notes serving 5 primary roles: reminders, reference items, progress trackers, places to think, and archives of personal value. The second reintroduces structured data to support more effective use and management of information collections. Jourknow addresses the manageability of large note collections with lightweight-structured note contents and contextual retrieval, the access of notes by the contexts and activities at the time of creation. Poyozo reinforces recollection of previously seen information, by providing visualizations of all of a person's past information activities. Finally, Atomate addresses the challenge of managing the ever-increasing deluge of new information, by letting people delegate to software behaviors actions to be automatically taken when new information arrives. These studies identify critical needs of PIM tools and offer viable solutions.
by Max Goodwin Van Kleek.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
27

Tungare, Manas. "Mental Workload in Personal Information Management: Understanding PIM Practices Across Multiple Devices." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/26878.

Full text
Abstract:
Multiple devices such as desktops, laptops, and cell phones are often used to manage users' personal information, such as files, calendars, contacts, emails, and bookmarks. This dissertation presents the results of two studies that examined users' mental workload in this context, especially when transitioning tasks from one device to another. In a survey of 220 knowledge workers, users reported high frustration with current devices' support for task migration, e.g. making files available on multiple machines. To investigate further, I conducted a controlled experiment with 18 participants. While they performed PIM tasks, I measured their mental workload using subjective measures and physiological measures. Some systems provide support for transitioning users' work between devices, or for using multiple devices together; I explored the impact of such support on mental workload and task performance. Participants performed three tasks (Files, Calendar, Contacts) with two treatment conditions each (lower and higher support for migrating tasks between devices.) This dissertation discusses my findings: workload measures obtained using the subjective NASA TLX scale were able to discriminate between tasks, but not between the two conditions in each task. Task-Evoked Pupillary Response, a continuous measure, was sensitive to changes within each task. For the Files task, a significant increase in workload was noted in the steps before and after task migration. Participants entered events faster into paper calendars than into an electronic calendar, though there was no observable difference in workload. For the Contacts task, task performance was equal, but mental workload was higher when no synchronization support was available between their cell phone and their laptop. Little to no correlation was observed between task performance and both workload measures, except in isolated instances. This suggests that neither task performance metrics nor workload assessments alone offer a complete picture of device usability in multi-device personal information ecosystems. Traditional usability metrics that focus on efficiency and effectiveness are necessary, but not sufficient, to evaluate such designs. Given participants' varying subjective perceptions of these systems and differences in task-evoked pupillary response, aspects of hot cognition such as emotion, pleasure, and likability show promise as important parameters in system evaluation.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
28

Norberg, Patricia A. "Managed profiles : the value of personal information in commercial exchange /." View online ; access limited to URI, 2003. http://0-wwwlib.umi.com.helin.uri.edu/dissertations/dlnow/3115636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Varnadore, Michael Ray. "Examining the End-user Perspective of Personal Computer Security| A Qualitative Q Methodology Study." Thesis, University of Phoenix, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10808067.

Full text
Abstract:

The Personal Computer is one of the most versatile inventions of the modern world. From its introduction in the 1980s, businesses have used these devices to perform everything from routine administrative tasks to complex engineering activities. Without proper attention to the security, companies put their ongoing operations and data at risk of theft, alteration, or destruction. Employees using personal computing systems are the primary gatekeepers of intellectual property and at the same time are the source of most data breaches. The purpose of this study was to analyze attitudes and behavioral patterns of end-users who repeatedly fall victim to simulated phishing attacks. Using a Q-Methodology approach, participants rated their level of agreement or disagreement of statements collected from research about end-user attitude and training towards computer security. Analysis of participant responses yielded three factors that demonstrated a pattern of behavior and opinion and categorized participants into three groups; gatekeepers, oblivions, and conformists. Analysis of the three group’s alignment with the studies research questions reveals that although all groups are well trained in computer security procedure and policy, two of the groups demonstrate deficiency in recognizing cyber risk and understanding how to protect against the threat. For companies to be secure, the end-user must view themselves as the primary gatekeeper to protect intellectual property. Technology can be circumvented, passwords can be compromised, and systems can be penetrated. The most effective method therefore to combat cyber threat is to create a culture of vigilance that every end-user understands, accepts, and embraces as their primary responsibility.

APA, Harvard, Vancouver, ISO, and other styles
30

Chikono, Albert Nhawo. "Knowledge sharing practices amongst academics at the Zimbabwe Open University." University of the Western Cape, 2018. http://hdl.handle.net/11394/6426.

Full text
Abstract:
Magister Library and Information Studies - MLIS
This study investigated knowledge sharing (KS) practices at the Zimbabwe Open University (ZOU) in Zimbabwe. The study assessed the knowledge sharing practices in the ZOU regional campus faculty departments and identified gaps, with the aim to find out how knowledge is being managed, shared in an Open and distance learning institution and if knowledge management (KM) is playing a role. The quantitative study was undertaken at the 10 regional campuses of the Zimbabwe Open University. A questionnaire survey was carried out to collect data from a sample of 100 academic staff in the 10 Regional Centres. The underlying question was whether the university academic members were aware of the knowledge that exists, how this knowledge is created and, shared and flows in the organization. The study also sought to establish the views of academic staff, on the benefits that can be reaped from KM practices. The study confirmed that there is willingness to engage in knowledge sharing activities. However, the lack of a clear knowledge policy negatively impacts on the university’s ability to competitively position itself in the knowledge economy as a knowledge driven university and this impacts research productivity and distance learning course delivery at the ZOU. One of the key recommendations emanating from this research is that the university should have a Knowledge policy aligned to its strategic plan which will act as a guideline on the sharing of knowledge internally and externally as well as make it mandatory for academic staff to publish internally as well as to store their publications in the university repository.
APA, Harvard, Vancouver, ISO, and other styles
31

Harmse, Magda Susanna. "Physicians' perspectives on personal health records: a descriptive study." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/6876.

Full text
Abstract:
A Personal Health Record (PHR) is an electronic record of a patient’s health-related information that is managed by the patient. The patient can give access to other parties, such as healthcare providers and family members, as they see fit. These parties can use the information in emergency situations, in order to help improve the patient’s healthcare. PHRs have an important role to play in ensuring that a patient’s complete health history is available to his healthcare providers at the point of care. This is especially true in South Africa, where the majority of healthcare organizations still rely on paper-based methods of record-keeping. Research indicates that physicians play an important role in encouraging the adoption of PHRs amongst patients. Whilst various studies have focused on the perceptions of South African citizens towards PHRs, to date no research has focused on the perceptions of South African physicians. Considering the importance of physicians in encouraging the adoption of PHRs, the problem being addressed by this research project thus relates to the lack of information relating to the perceptions of South African physicians of PHRs. Physicians with private practices at private hospitals in Port Elizabeth, South Africa were surveyed in order to determine their perceptions towards PHRs. Results indicate perceptions regarding benefits to the physician and the patient, as well as concerns to the physician and the patient. The levels of trust in various potential PHR providers and the potential uses of a PHR for the physician were also explored. The results of the survey were compared with the results of relevant international literature in order to describe the perceptions of physicians towards PHRs.
APA, Harvard, Vancouver, ISO, and other styles
32

Patton, George Allen. "Supporting and Securing Personal Mobile Devices Within an Existing Information Technology Environment." ScholarWorks, 2014. https://scholarworks.waldenu.edu/dissertations/124.

Full text
Abstract:
Personal mobile devices are becoming integrated into the daily operations of business. Managers are realizing that employees who are allowed to use personal mobile devices to access corporate information systems may reduce costs as users buy their own devices. The problem was that managers have a limited understanding of the need to secure or support personal mobile devices. The purpose of this survey study was to examine the relationship between employees' desire to use personal mobile devices and corporation needs for security and support. Hypotheses were tested by examining the relationships between the requirement to support and secure personal mobile devices as the independent variables and the desire to use personal mobile devices as the dependent variable. The theoretical framework for the study included the IT product life-cycle management theory, IT security-management theory, and IT strategic-management theory. Survey data were collected from a convenience sample of 108 employees at the study-site organization from an estimated population of 170. Basic linear regression analyses performed found a correlation coefficient of 0.905 indicating the variables are highly correlated. This finding indicates that if personal mobile devices are given access to corporate information systems, then support and security will be necessary for successful operations. If the relationship between internal factors and operational success is clearly documented, organizations may be able to use the data to justify incorporating personal mobile devices within their own corporate information system to reduce costs, improve productivity, and increase employee satisfaction, thereby making a positive contribution to society.
APA, Harvard, Vancouver, ISO, and other styles
33

Capra, Robert G. "An Investigation of Finding and Refinding Information on the Web." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/26342.

Full text
Abstract:
Refinding electronic information is a common problem, yet it has received less study than the problem of how to find information for the first time. In this dissertation, I examine how people approach tasks to refind information they have seen on the Web and factors that may affect refinding. I conducted a controlled, laboratory study in which participants participated in two sessions: one to find information for a set of 18 tasks and a second session, about a week later, to attempt a set of counterpart refinding tasks. Results indicate that finding and refinding do have differences, but not for all types of tasks. The use of Web search engines was not observed to change significantly from the first session to the second. However, for tasks that participants were more familiar with, search engines were used less. Tasks that involved refinding a subset of the information that was found in the first session took longer to complete and were perceived as more difficult. Participants often went directly to known resources on the Web to start their searches. These sets of known resources included many on-line counterparts of paper resources such as telephone directories, dictionaries, and newspapers. For many tasks, participants used the same starting strategy to refind the information that they used find it, indicating strong patterns of access. This work contributes to the base of knowledge about how people refind information and the factors that affect refinding. It also contributes to the research field of information refinding and personal information management by identifying dimensions and factors that affect refinding. The results reported have implications for the design of Web sites and information repositories, the design of tools to help users find and refind information, and for the research community studying personal information management.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
34

Board, Barbara A. "Preference of selected Virginia citizens for information and education in personal financial management." Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-09292009-020022/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Paré, François-Xavier. "Personal information management among office support staff in a university environment: an exploratory study." Thesis, McGill University, 2011. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=104610.

Full text
Abstract:
Since the late 1960s, several studies have investigated personal information management (PIM) in the workplace. However, very few studies have focused on the behaviour of office support staff in a work environment. The purpose of this exploratory study was to examine the document management behaviour of office support staff in a large Canadian university. The methodological approach used for this study was grounded theory. Fifteen in-depth interviews were conducted in participants' offices, and visual observations of their document structures were made. A pre-interview survey was also administered in order to gather additional information. Participants were chosen according to the principles of theoretical sampling, and simultaneous data collection and analysis continued until theoretical saturation was reached. Transcribed interviews were coded, after which abstract concepts were derived and grouped into categories, using the constant comparison method. A substantive theory was then developed. The findings suggest the existence of several distinct document spaces within workers' document landscape: a main folder, secondary folders, the operating system desktop, e-mail, paper documents and shared environments. Behaviour pertaining to the handling of orphan files and multiple versions, the naming of files and folders as well as searching and browsing were described. Overall, despite several elements in common, significant variation was noted among participants. In order to explain the variation observed, a model of the factors that are likely to influence PIM behaviour was developed. It comprises seven main categories of factors: job content, job status, existing documents, relationship with the superior, worker characteristics, organizational context and document attributes. Several of the factors identified had never been mentioned in the PIM literature, while in other cases, the evidence presented helped confirm previous findings. The proposed model also highlights the inherent complexity of PIM, and the importance of adopting an all-encompassing view when analyzing PIM behaviour.
Depuis la fin des années 1960, plusieurs études ont porté sur la gestion personnelle de l'information (GPI) en milieu de travail. Néanmoins, très peu d'études se sont penchées sur les comportements des employés de soutien tels que les commis de bureau ou les assistantes administratives. L'objectif de cette étude exploratoire était d'examiner les comportements de gestion documentaire d'employés de soutien dans une grande université canadienne. L'approche méthodologique utilisée est celle de la théorisation ancrée. Quinze entrevues en profondeur ont été menées dans le bureau des participantes, et des observations visuelles de leurs structures de documents ont été effectuées. Un questionnaire pré-entrevue a également permis de recueillir des informations additionnelles. Les participants ont été sélectionnés selon un principe d'échantillonnage théorique, et la collecte et l'analyse des données, menées en parallèle, se sont poursuivies jusqu'au point de saturation théorique. Les entrevues transcrites ont été codées, à la suite de quoi des concepts ont été dérivés et groupés en catégories, selon la méthode de la comparaison constante. Une théorie substantive a ensuite été développée.Les résultats suggèrent que le paysage documentaire de ces employés est composé de plusieurs espaces documentaires distincts: un répertoire principal, des répertoires secondaires, le bureau du système d'exploitation, le courriel, les documents papiers ainsi que les environnements partagés. Les habitudes des participants face à la gestion des fichiers orphelins, des versions multiples, au nommage des fichiers et répertoires ainsi qu'à la recherche et la navigation ont été décrites. En somme, malgré certains éléments en commun, des variations significatives ont pu être observées parmi les participants.Afin d'expliquer la variation observée, un modèle des facteurs pouvant influencer la GPI a été développé. Il comprend sept catégories de facteurs: nature de l'emploi, statut de l'emploi, documents existants, relation avec le ou la supérieur(e), caractéristiques de l'employé, contexte organisationnel et caractéristiques des documents. Plusieurs des facteurs identifiés dans cette étude n'avaient jamais été mentionnés dans la littérature sur la GPI, alors que dans d'autres cas les éléments présentés ici viennent confirmer les résultats d'études précédentes. Le modèle proposé met également en lumière la complexité inhérente à la GPI, et l'importance d'adopter une approche holistique dans l'analyse des comportements de GPI.
APA, Harvard, Vancouver, ISO, and other styles
36

Ravasio, Pamela [Verfasser]. "Personal Information Organisation : Studies on User-Appropriate Classification and Retrieval Strategies and their Implications for Information Management Systems Design / Pamela Ravasio." Aachen : Shaker, 2005. http://d-nb.info/118162147X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ravasio, Pamela. "Personal information organisation: Studies on user-appropriate classification and retrieval strategies and their implications for information management systems design /." Zürich : ETH, 2004. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=15579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Pienaar, Heila. "Die ontwerp van 'n webportaal vir akademici." Pretoria : [s.n.], 2001. http://upetd.up.ac.za/thesis/available/etd-03202003-161802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Unruh, Kent T. "Information and the cancer experience : a study of patient work in cancer care /." Thesis, Connect to this title online; UW restricted, 2007. http://hdl.handle.net/1773/7176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Alyami, Mohammed Abdulkareem. "Toward Patient-Centered Personal Health Records Systems to Promote Evidence-Based Decision-Making and Information Sharing." Thesis, Towson University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10745897.

Full text
Abstract:

Personal health record (PHR) is considered a crucial part in improving patient outcomes by ensuring important aspects in treatment such as continuity of care (COC), evidence- based treatment (EBT) and most importantly prevent medical errors (PME). Recently there has been more focus on preventive care or monitoring and control of patients symptoms than treatment itself. Nowadays, there are many mobile health applications and sensors such as blood pressure sensors, electrocardiogram sensors, blood glucose measuring devices, and others that are used by the patients who monitor and control their health. These apps and sensors produce personal health data that can be used for treatment purposes. If managed and handled properly, it can be considered patient-generated data. There are other types of personal health data that are available from various sources such as hospitals, doctors offices, clinics, radiology centers or any other caregivers.

Aforementioned health documents are deemed as a PHR. However, personal health data is difficult to collect and manage due to the fact that they are distributed over multiple sources (e.g. caregivers, patients themselves, clinical devices, and others) and each may describe patient problems in their own way. Such inconsistencies could lead to medical mistakes when it comes to the treatment of the patient. In case of emergency, this situation makes timely retrieval of necessary personal clinical data difficult. In addition, since the amount and types of personal clinical data continue to grow, finding relevant clinical data when needed is getting more difficult if no actions are taken to resolve such issue. Having complete and accurate patient medical history available at the time of need can improve patient outcomes by ensuring important aspects such as COC, EBT, and PME. Despite the importance of PHR, the adoption rate by the general public in the U.S. still remains low. In this study we attempt to use Personal Health Record System (PHRS) as a central point to aggregate health records of a patient from multiple sources (e.g. caregivers, patients themselves, clinical devices, and others) and to standardize personal health records (e.g. use of International Classification of Diseases (ICD- 10) and Systemized Nomenclature of Medicine Clinical Terms (SNOMED CT)) through our proof-of-concept model: Health Decision Support System (HDSS).

We started out by exploring the barriers in adopting PHRs and proposed a few approaches that can promote the adoption of PHRS by the general public so it is possible to implement continuity of care in community settings, evidence-based care, and also prevent potential medical errors. To uncover the barriers in adopting PHR, we have surveyed articles related to PHRS from 2008 to 2017 and categorized them into 6 different categories: motivation, usability, ownerships, interoperability, privacy, and security and portability.

We incorporated the survey results into our proposed PHRS, so it can help overcome some of the barriers and motivate people to adopt PHRS. In Our proposed PHRS, we aimed to manage personal health data by utilizing metadata for organizing and retrieval of clinical data. Cloud storage was chosen for easy access and sharing of health data with relevant caregivers to implement the continuity of care and evidence-based treatment. In our study, we have used Dropbox as storage for testing purposes. However, for practical use, secure cloud storage services that are Health Insurance Portability and Accountability Act (HIPAA) complaint can be used for privacy and security purposes, such as Dropbox (Business), Box, Google Drive,Microsoft OneDrive, and Carbonite. In case of emergency, we make critical medical information such as current medication and allergies available to relevant caregivers with valid license numbers only. In addition, to standardize PHR and improve health knowledge, we provide semantic guidance for using SNOMED CT to describe patient problems and for mapping SNOMED CT codes to ICD-10-CM to uncover potential diseases. As a proof of concept, we have developed two systems (prototypes): first, my clinical record system (MCRS) for organizing, managing, storing, sharing and retrieving personal health records in a timely manner; second, a health decision support system (HDSS) that can help users to use SNOMED CT codes and potential disease(s) as a diagnosis result.

APA, Harvard, Vancouver, ISO, and other styles
41

Epstein, Michael K. "The two faces of MIS--group membership, role orientation, and personal outcomes among information systems designers." Thesis, Massachusetts Institute of Technology, 1991. http://hdl.handle.net/1721.1/13478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Dong, Xin. "Providing best-effort services in dataspace systems /." Thesis, Connect to this title online; UW restricted, 2007. http://hdl.handle.net/1773/6902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Campbell-Macdonald, Daniel. "Congenital nausea this exegesis [thesis] was submitted to the Auckland University of Technology in partial fulfilment of the degree of Master of Arts (Art and Design), 2003 /." Full thesis. Abstract, 2003.

Find full text
Abstract:
Thesis (MA--Art and Design) -- Auckland University of Technology, 2003.
Not all images visible in e-thesis. Also held in print (45 leaves, ill., CD-ROM, 30 cm.) in Wellesley Theses Collection. (T 709.93 CAM)
APA, Harvard, Vancouver, ISO, and other styles
44

Gooren-Sieber, Stefanie [Verfasser], Andreas [Akademischer Betreuer] Henrich, and Ute [Akademischer Betreuer] Schmid. "Information Management for Digital Learners : Introduction, Challenges, and Concepts of Personal Information Management for Individual Learners [[Elektronische Ressource]] / Stefanie Gooren-Sieber. Betreuer: Andreas Henrich ; Ute Schmid." Bamberg : University of Bamberg Press, 2014. http://d-nb.info/1058949284/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Mitschick, Annett. "Ontologiebasierte Indexierung und Kontextualisierung multimedialer Dokumente für das persönliche Wissensmanagement." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2010. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-27543.

Full text
Abstract:
Die Verwaltung persönlicher, multimedialer Dokumente kann mit Hilfe semantischer Technologien und Ontologien intelligent und effektiv unterstützt werden. Dies setzt jedoch Verfahren voraus, die den grundlegenden Annotations- und Bearbeitungsaufwand für den Anwender minimieren und dabei eine ausreichende Datenqualität und -konsistenz sicherstellen. Im Rahmen der Dissertation wurden notwendige Mechanismen zur semi-automatischen Modellierung und Wartung semantischer Dokumentenbeschreibungen spezifiziert. Diese bildeten die Grundlage für den Entwurf einer komponentenbasierten, anwendungsunabhängigen Architektur als Basis für die Entwicklung innovativer, semantikbasierter Lösungen zur persönlichen Dokumenten- und Wissensverwaltung
Personal multimedia document management benefits from Semantic Web technologies and the application of ontologies. However, an ontology-based document management system has to meet a number of challenges regarding flexibility, soundness, and controllability of the semantic data model. The first part of the dissertation proposes necessary mechanisms for the semi-automatic modeling and maintenance of semantic document descriptions. The second part introduces a component-based, application-independent architecture which forms the basis for the development of innovative, semantic-driven solutions for personal document and information management
APA, Harvard, Vancouver, ISO, and other styles
46

Maguraushe, Kudakwashe. "Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university." Thesis, 2021. http://hdl.handle.net/10500/27557.

Full text
Abstract:
Orientation: The safety of any natural being with respect to the processing of their personal information is an essential human right as specified in the Zimbabwe Data Protection Act (ZDPA) bill. Once enacted, the ZDPA bill will affect universities as public entities. It will directly impact how personal information is collected and processed. The bill will be fundamental in understanding the privacy perceptions of students in relation to privacy awareness, privacy expectations and confidence within university. These need to be understood to give guidelines to universities on the implementation of the ZPDA. Problem Statement: The current constitution and the ZDPA are not sufficient to give organisations guidelines on ensuring personal information privacy. There is need for guidelines to help organisations and institutions to implement and comply with the provisions of the ZDPA in the context of Zimbabwe. The privacy regulations, regarded as the three concepts (awareness, expectations and confidence), were used to determine the student perceptions. These three concepts have not been researched before in the privacy context and the relationship between the three concepts has not as yet been established. Research purpose: The main aim of the study was to develop and validate an Information Privacy Perception Survey (IPPS) diagnostic tool and a Student Personal Information Privacy Perception (SPIPP) model to give guidelines to universities on how they can implement the ZDPA and aid universities in comprehending student privacy perceptions to safeguard personal information and assist in giving effect to their privacy constitutional right. Research Methodology: A quantitative research method was used in a deductive research approach where a survey research strategy was applied using the IPPS instrument for data collection. The IPPS instrument was designed with 54 items that were developed from the literature. The preliminary instrument was taken through both the expert review and pilot study. Using the non-probability convenience sampling method, 287 students participated in the final survey. SPSS version 25 was used for data analysis. Both descriptive and inferential statistics were done. Exploratory factor analysis (EFA) was used to validate the instrument while confirmatory factor analysis (CFA) and the structural equation modelling (SEM) were used to validate the model. Main findings: diagnostic instrument was validated and resulted in seven new factors, namely university confidence (UC), privacy expectations (PE), individual awareness (IA), external awareness (EA), privacy awareness (PA), practice confidence (PC) and correctness expectations (CE). Students indicated that they had high expectations of the university on privacy. The new factors showed a high level of awareness of privacy and had low confidence in the university safeguarding their personal information privacy. A SPIPP empirical model was also validated using structural equation modelling (SEM) and it indicated an average overall good fit between the proposed SPIPP conceptual model and the empirically derived SPIPP model Contribution: A diagnostic instrument that measures the perceptions (privacy awareness, expectations and confidence of students) was developed and validated. This study further contributed a model for information privacy perceptions that illustrates the relationship between the three concepts (awareness, expectations and confidence). Other universities can use the model to ascertain the perceptions of students on privacy. This research also contributes to improvement in the personal information protection of students processed by universities. The results will aid university management and information regulators to implement measures to create a culture of privacy and to protect student data in line with regulatory requirements and best practice.
School of Computing
Ph. D. (Information Systems)
APA, Harvard, Vancouver, ISO, and other styles
47

Tung, Tse-Hua, and 童子樺. "Personal Health Information Management System." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/32834402189836574756.

Full text
Abstract:
碩士
國立陽明大學
醫學工程研究所
95
We hope to provide a long-term record interface through developing a personal health information management system which includes a physiological database for four chronic diseases(e.g. Heart disease, Hypertension, Metabolism and Asthma) and there relative major physiological parameters(e.g. ECG, Blood Pressure, Blood Glucose, Peak Flow and SPO2.). With Long-term personal records compared with physiology parameters criteria, and assisted with the importance log and the 2nd order curve fitting trends. The characteristic of local database provide the ability to carry personal health record anywhere and help users to provide doctors more aid in diagnostic information which were recorded during non-visiting duration.
APA, Harvard, Vancouver, ISO, and other styles
48

Liu, Kai, and 劉凱. "Personal Game Information Management System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/40418613669248659213.

Full text
Abstract:
碩士
義守大學
資訊工程學系碩士班
94
Modern IT technique and broadband network infrastructure make on-line games become one of the high value-added industries. Especially when the market of the broadband network grew rapidly since 2000, not only the market of the on-line games increased in 10 megabyte speed, it also becomes the most favorite entertainment to all ages. Extra information will be adopted during the game playing that makes the users confused to filter and organize the information from the overwhelming Internet information. In order to solve this problem, a system is proposed to let user get the valued knowledge and organize from the Internet via the information fetch. This thesis designs an information objects searching mechanism based on the method of RSS (Really Simple Syndication) to build the personal game knowledge-searching infrastructure as the basis of the game knowledge-searching system design. Valuable game knowledge could be obtained by this personal game knowledge-searching system. Since this system is not restricted by the source or the property of the information, it could be applied in the other system.
APA, Harvard, Vancouver, ISO, and other styles
49

Marková, Katerina. "Digital dying in personal information management towards thanotosensitive information management." Dissertação, 2011. http://hdl.handle.net/10216/65334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Marková, Katerina. "Digital dying in personal information management towards thanotosensitive information management." Master's thesis, 2011. http://hdl.handle.net/10216/65334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography