Dissertations / Theses on the topic 'Personal information management – Zimbabwe'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Personal information management – Zimbabwe.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Layouni, Mohamed. "Privacy-preserving personal information management." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.
Full textIn this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
Franz, Thomas [Verfasser]. "Semantic Personal Information Management / Thomas Franz." München : Verlag Dr. Hut, 2010. http://d-nb.info/1009972243/34.
Full textGwizdka, Jacek, and Mark Chignell. "Individual Differences in Personal Information Management." University of Washington Press, 2007. http://hdl.handle.net/10150/105751.
Full textLiu, Jamie M. Eng Massachusetts Institute of Technology. "Customizable application for personal information management." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61172.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 83-84).
As digital content becomes increasingly pervasive in our daily lives, next-generation organizational tools must be developed to help end users curate that information. The information management tools available today are limited in several ways. They are either restrictive in how users define and organize their data, or they offer few options in how users can view and interact with that data. In this thesis, we introduce a new application geared toward the layman end user to help resolve this lack of personalization when managing data. With this tool, users can store any collection of information (i.e. to do lists, address book, DVD collection), customize how they want to view and browse that data, and create any number of visualizations for the same data set or overlapping sets of data. For example, a user might want to manage an address book for a collection of all contacts, and manage a different set of items involving all research-related items, including colleagues, in another visualization. This tool allows her to do this without duplicating the overlapping data set for contact information of colleagues, enabling her to make changes to an item in one visualization and see that change applied to any other visualization that includes the same item. Moreover, users can import data from other sources, as well as share their data with others either with a visualization, such that the receiver can interact with the visualization the user has already created, or as raw data, such that the receiver can create his or her own visualization of the data.
by Jamie Liu.
M.Eng.
Elsweiler, David. "Supporting human memory in personal information management." Thesis, University of Strathclyde, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488520.
Full textKeeble, Richard John. "An adaptive environment for personal information management." Thesis, Brunel University, 1999. http://bura.brunel.ac.uk/handle/2438/6509.
Full textGyllstrom, Karl Stotts P. David. "Enriching personal information management with document interaction histories." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2009. http://dc.lib.unc.edu/u?/etd,2727.
Full textTitle from electronic title page (viewed Mar. 10, 2010). "... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science." Discipline: Computer Science; Department/School: Computer Science.
Matizirofa, Lazarus. "Information management and dissemination of HIV/AIDS information by NGOs in Zimbabwe: An explanatory study." Master's thesis, University of Cape Town, 2005. http://hdl.handle.net/11427/8726.
Full textThe HIV/AIDS epidemic has become a serious health, social and economic problem in Zimbabwe. Almost 30 percent of the population had been infected by AIDS (Acquired immune Deficiency Syndrome) by 2004. The epidemic has also affected almost the entire population in one way or another - domestically, socially and economically. Zimbabwe faces a long-term development disaster because of the effects of the disease across the societal spectrum. AIDS is threatening every fibre of the nation from food supply to economic productivity, and not least human resource development. Many households have lost their principal source of income to the disease and have become impoverished. The national budget is increasingly under pressure as scarce resources are channelled to fight the HIV/AIDS pandemic. Despite a multitude of interventions aimed at preventing the scourge of the epidemic on the health system, the economy and human development, HIV/AIDS still presents a problem of enormous magnitude in Zimbabwe. It is argued that a major limitation of the various interventions to fight the pandemic has been the failure to extensively and effectively harness knowledge and disseminate information relating to all aspects of HIV/AIDS in Zimbabwe. The NGO sector, because of its grassroots involvement with the disease, is particularly well placed to fulfil such a role. The main aim of this study was to explore information and knowledge management and dissemination by HIV/AIDS NGOS in Zimbabwe. A further objective was to identity in the literature strategies that have been used, vis-a-vis modern information and knowledge management practice, in cognate sectors of development in Zimbabwe and other countries. It is argued that by applying appropriate information and knowledge management practices valuable knowledge and information that relate to how communities experience the problems and the impact associated with HlV/AIDS can be gathered and disseminated. Information and knowledge management is recommended by the United Nations' UNAIDS as the best way to harness both tacit and explicit information related to all aspects of the epidemic. A survey was conducted amongst 64 HIV/AIDS NGOs based in Harare, Zimbabwe. Data was collected using questionnaires, key informant interviews, and observation methods, and this was further supported by data collected from documentary and electronic sources. The main outcome of the study indicates that information and knowledge management is generally not well practised in the HIV/AIDS NGO sector in Zimbabwe. This is despite the fact that 75% of the NGOs had information services in place. Far too few qualified staff have been appointed to manage information services and this lack of professional skills has had a negative impact on HIV/AIDS information dissemination. It is argued that in a society such as in Zimbabwe, effective information dissemination measures are needed to assist social, economic and scientific interventions. It was further established that a sound information and knowledge management policy, and information technology developments were needed to address the information service challenges. The other main outcome showed that NGOS were not networking effectively among themselves, with government and other role players such as the private sector, educational institutions and churches, etc. Lastly, there was a strong indication that information technology, i.e., computers and accessories, the Internet, intranets, databases and audio-visuals, etc.. were not fully utilised, this is despite the fact that in other countries they have been very effective to assist in the creation, generation, gathering and diffusion of information. Based on the research outcomes, the researcher thus proposes that information and knowledge management practices should be set in place in the HIV/AIDS sector of Zimbabwe. NGOs should ensure that information services are run and manned by skilled and trained information officers. It is also suggested that government should be encouraged to become more involved and complement the work done by NGOs by reviewing the 1985 NLDS Act and other policy instruments. The study further recommends that, HIV/AIDS NGOs should work towards networking and providing a single shared dissemination source to the public, such as a national database, which would be hosted via a web-based internet portal. This would also enable NGOs to explore further networking efforts such as communities of practice (expert forums), a national HIV/AIDS bibliography and electronic publishing.
Mago, Shamiso. "The impact of information and communication technologies (ICTs) on rural livelihoods: the case of smallholder farming in Zimbabwe." Thesis, University of Fort Hare, 2012. http://hdl.handle.net/10353/d1007185.
Full textYiu, Kelvin Shek. "Time-based management and visualization of personal electronic information." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0016/MQ29420.pdf.
Full textShanahan, Daniel Patrick. "Intentional Information Fragmentation in Email Management." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/35078.
Full textMaster of Science
Sauermann, Leo. "The Gnowsis semantic desktop approach to personal information management weaving the personal semantic web." Berlin dissertation.de, 2009. http://d-nb.info/996092501/04.
Full textEriksen, Jon. "Samlingen som verktyg : Personal Information Management och konstnärers personliga samlingar." Thesis, Uppsala universitet, Institutionen för ABM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-175388.
Full textPikas, Christina K. "Personal Information Management Strategies and Tactics Used by Senior Engineers." American Society for Information Science and Technology, 2007. http://hdl.handle.net/10150/106236.
Full textMushonga, Cleopatra Tsungai. "Social networking for knowledge management : group features as personal knowledge management tools." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86315.
Full textENGLISH ABSTRACT: With the emergence of Web 2.0 (social network platforms) some Knowledge Management theorists saw the potential for incorporating its collaborative and networking features in Knowledge Management Systems. However, the consensus is that harnessing Web 2.0 features for Knowledge Management is still in its infancy and according to some it seems that Web 2.0 success in the social sphere is hard to translate to the work context. The thesis argues that Web 2.0 primarily facilitates Personal Knowledge Management (PKM) and in this way indirectly contributes to Organisational Knowledge Management. Furthermore not all Web 2.0 features are equally useful in facilitating Personal Knowledge Management. The thesis identifies the group features of social network platforms as the prime locations for networking and learning. The thesis is theoretically based on Cheong and Tsui's PKM 2.0 model, in particular the Interpersonal Knowledge Transferring phase that in turn is based on Nonaka's SECI model of knowledge conversion. The thesis starts out with considering the distinction and relationship between Organisational Knowledge Management (OKM) and Personal Knowledge Management (PKM). Thereafter Cheong and Tsui's PKM 2.0 model is described as well as Nonaka's SECI model. The Web 2.0 phenomenon is introduced through a literature review of various studies on the usefulness of social network platforms and the group features are specifically highlighted. A survey is conducted among users of a particular Web 2.0 group feature, based on questions developed from the SECI and PKM 2.0 models. The thesis comes to the conclusion that the group features of Web 2.0 social network platforms are useful for Knowledge Management, because it is indeed a component of users' Personal Knowledge Management.
AFRIKAANSE OPSOMMING: Sekere Kennisbestuursteoretici het met die opkoms van Web 2.0 (sosiale netwerk-platforms) die moontlikheid waargeneem om die samewerks- en netwerk-funksionaliteit van Web 2.0 platforms met bestaande Kennisbestuurstelsels te integreer. Die konsensus is egter dat sulke pogings nog veel tekortskiet en sommige waarnemers meen dat dit baie moeilik sal wees om Web 2.0 se sukses in die sosiale sfeer in die werksplek in te span. Die tesis argumenteer dat Web 2.0 hoofsaaklik Persoonlike Kennisbestuur (PKB) fasiliteer en langs hierdie ompad 'n bydrae lewer tot Organisatoriese Kennisbestuur (OKB). Verder lewer alle funksionaliteite van Web 2.0 nie 'n bruikbare bydra tot Kennisbestuur nie, maar is dit hoofsaaklik die groepsfunksies wat bruikbaar is in terme van netwerking en leer. Die tesis is teoreties gewortel in Cheong en Tsui se PKB 2.0 model, veral die Interpersoonlike Kennisoordragsfase wat weer op Nonaka se SEKI model gebaseer is. Die tesis oorweeg aanvanklik die onderskeid en verhouding tussen Organisatoriese Kennisbestuur (OKB) en Persoonlike Kennisbestuur (PKB). Daarna word Cheong en Tsui se PKB 2.0 model en Nonaka se SEKI model bespreek. Die Web 2.0 fenomeen word beskryf aan die hand van 'n literatuurstudie van navorsing oor die bruikbaarheid van Web 2.0 platforms en die groepsfunksionaliteit word spesifiek belig. 'n Vraelys, gebaseer op die SEKI en PKB 2.0 modelle, is onder gebruikers van 'n spesifieke Web 2.0 groepsfunksie geadministreer. Die tesis kom tot die konklusie dat die groepsfunksies van Web 2.0 sosiale netwerk-platforms bruikbaar is vir Kennisbestuur, want dit is inderdaad 'n komponent van gebruikers se Persoonlike Kennisbestuur (PKB).
Mhonderwa, Blessed Sue. "Knowledge Management as an Organisational Tool : The Case of the Electricity Supply Industry in Zimbabwe." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/75806.
Full textDissertation (MIT)--University of Pretoria, 2020.
UP Postgraduate Masters Research bursary
Informatics
MIT (Information Systems)
Unrestricted
Grebner, Olaf [Verfasser], and R. [Akademischer Betreuer] Studer. "Using Unified Personal Information in Workspaces / Olaf Grebner. Betreuer: R. Studer." Karlsruhe : KIT-Bibliothek, 2009. http://d-nb.info/1014099900/34.
Full textJolaoso, Sheriff Olayinka. "TaskAmbient: A Study in Personal Task Management Visualization." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/52782.
Full textMaster of Science
Crystal, Abe J. Greenberg Jane. "Design research for personal information management systems to support undergraduate students." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2122.
Full textTitle from electronic title page (viewed Feb. 17, 2009). "... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the School of Information and Library Science." Discipline: Information and Library Science; Department/School: Information and Library Science, School of.
Jacobs, Ellen Mueller Keith J. "In search of a message to promote personal health information management." Click here for access, 2009. http://www.csm.edu/Academics/Library/Institutional_Repository.
Full textPresented to the faculty of the Graduate College in the University of Nebraska in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Medical Sciences Interdepartmental Area Health Services Research and Administration. Under the supervision of Professor Keith J. Mueller. Includes bibliographical references.
Alomar, Mashael. "Scholars' research related Personal Information Management : an investigation of PAAET, Kuwait." Thesis, University of Sheffield, 2014. http://etheses.whiterose.ac.uk/5602/.
Full textLong, Trisha L. "Medication Information Management Practices of Older Americans." Master's thesis, School of Information and Library Science, 2007. http://hdl.handle.net/1901/391.
Full textBeets, Simone Yvonne. "Enhanced visualisation techniques to support access to personal information across multiple devices." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1021136.
Full textHeider, Jens [Verfasser], Claudia [Akademischer Betreuer] Eckert, and Uwe [Akademischer Betreuer] Baumgarten. "Ubiquitous Personal Information Management / Jens Heider. Gutachter: Uwe Baumgarten. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2011. http://d-nb.info/1019587393/34.
Full textJackson, Wanda Kaye. "Information overload and managerial roles : a naturalistic study of engineers /." Full text (PDF) from UMI/Dissertation Abstracts International, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3008358.
Full textVan, Kleek Max 1980. "Effort, memory, attention and time : paths to more effective personal information management." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66466.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 256-272).
With the widespread availability of digital tools for storing, accessing, and sharing information, why is so much information still lost, forgotten, or kept on paper? The work in this thesis finds that such disorganization results from problems in the designs of the personal information management (PIM) tools in common use today. Such problems impede information capture, force many information forms to be left out, and cause information to be forgotten. How can these problems be mitigated? Our Information Scraps study identifies the need to support more diverse kinds of information, while conserving time, attention, and memory for retained information items. Our first approach to achieving these goals is to eliminate the artificial separation and homogeneity that structured PIM tools impose, so that arbitrary information can be captured in any way desired. A two-year study of List-it, our short-note-taking tool, discovers that people keep notes serving 5 primary roles: reminders, reference items, progress trackers, places to think, and archives of personal value. The second reintroduces structured data to support more effective use and management of information collections. Jourknow addresses the manageability of large note collections with lightweight-structured note contents and contextual retrieval, the access of notes by the contexts and activities at the time of creation. Poyozo reinforces recollection of previously seen information, by providing visualizations of all of a person's past information activities. Finally, Atomate addresses the challenge of managing the ever-increasing deluge of new information, by letting people delegate to software behaviors actions to be automatically taken when new information arrives. These studies identify critical needs of PIM tools and offer viable solutions.
by Max Goodwin Van Kleek.
Ph.D.
Tungare, Manas. "Mental Workload in Personal Information Management: Understanding PIM Practices Across Multiple Devices." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/26878.
Full textPh. D.
Norberg, Patricia A. "Managed profiles : the value of personal information in commercial exchange /." View online ; access limited to URI, 2003. http://0-wwwlib.umi.com.helin.uri.edu/dissertations/dlnow/3115636.
Full textVarnadore, Michael Ray. "Examining the End-user Perspective of Personal Computer Security| A Qualitative Q Methodology Study." Thesis, University of Phoenix, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10808067.
Full textThe Personal Computer is one of the most versatile inventions of the modern world. From its introduction in the 1980s, businesses have used these devices to perform everything from routine administrative tasks to complex engineering activities. Without proper attention to the security, companies put their ongoing operations and data at risk of theft, alteration, or destruction. Employees using personal computing systems are the primary gatekeepers of intellectual property and at the same time are the source of most data breaches. The purpose of this study was to analyze attitudes and behavioral patterns of end-users who repeatedly fall victim to simulated phishing attacks. Using a Q-Methodology approach, participants rated their level of agreement or disagreement of statements collected from research about end-user attitude and training towards computer security. Analysis of participant responses yielded three factors that demonstrated a pattern of behavior and opinion and categorized participants into three groups; gatekeepers, oblivions, and conformists. Analysis of the three group’s alignment with the studies research questions reveals that although all groups are well trained in computer security procedure and policy, two of the groups demonstrate deficiency in recognizing cyber risk and understanding how to protect against the threat. For companies to be secure, the end-user must view themselves as the primary gatekeeper to protect intellectual property. Technology can be circumvented, passwords can be compromised, and systems can be penetrated. The most effective method therefore to combat cyber threat is to create a culture of vigilance that every end-user understands, accepts, and embraces as their primary responsibility.
Chikono, Albert Nhawo. "Knowledge sharing practices amongst academics at the Zimbabwe Open University." University of the Western Cape, 2018. http://hdl.handle.net/11394/6426.
Full textThis study investigated knowledge sharing (KS) practices at the Zimbabwe Open University (ZOU) in Zimbabwe. The study assessed the knowledge sharing practices in the ZOU regional campus faculty departments and identified gaps, with the aim to find out how knowledge is being managed, shared in an Open and distance learning institution and if knowledge management (KM) is playing a role. The quantitative study was undertaken at the 10 regional campuses of the Zimbabwe Open University. A questionnaire survey was carried out to collect data from a sample of 100 academic staff in the 10 Regional Centres. The underlying question was whether the university academic members were aware of the knowledge that exists, how this knowledge is created and, shared and flows in the organization. The study also sought to establish the views of academic staff, on the benefits that can be reaped from KM practices. The study confirmed that there is willingness to engage in knowledge sharing activities. However, the lack of a clear knowledge policy negatively impacts on the university’s ability to competitively position itself in the knowledge economy as a knowledge driven university and this impacts research productivity and distance learning course delivery at the ZOU. One of the key recommendations emanating from this research is that the university should have a Knowledge policy aligned to its strategic plan which will act as a guideline on the sharing of knowledge internally and externally as well as make it mandatory for academic staff to publish internally as well as to store their publications in the university repository.
Harmse, Magda Susanna. "Physicians' perspectives on personal health records: a descriptive study." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/6876.
Full textPatton, George Allen. "Supporting and Securing Personal Mobile Devices Within an Existing Information Technology Environment." ScholarWorks, 2014. https://scholarworks.waldenu.edu/dissertations/124.
Full textCapra, Robert G. "An Investigation of Finding and Refinding Information on the Web." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/26342.
Full textPh. D.
Board, Barbara A. "Preference of selected Virginia citizens for information and education in personal financial management." Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-09292009-020022/.
Full textParé, François-Xavier. "Personal information management among office support staff in a university environment: an exploratory study." Thesis, McGill University, 2011. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=104610.
Full textDepuis la fin des années 1960, plusieurs études ont porté sur la gestion personnelle de l'information (GPI) en milieu de travail. Néanmoins, très peu d'études se sont penchées sur les comportements des employés de soutien tels que les commis de bureau ou les assistantes administratives. L'objectif de cette étude exploratoire était d'examiner les comportements de gestion documentaire d'employés de soutien dans une grande université canadienne. L'approche méthodologique utilisée est celle de la théorisation ancrée. Quinze entrevues en profondeur ont été menées dans le bureau des participantes, et des observations visuelles de leurs structures de documents ont été effectuées. Un questionnaire pré-entrevue a également permis de recueillir des informations additionnelles. Les participants ont été sélectionnés selon un principe d'échantillonnage théorique, et la collecte et l'analyse des données, menées en parallèle, se sont poursuivies jusqu'au point de saturation théorique. Les entrevues transcrites ont été codées, à la suite de quoi des concepts ont été dérivés et groupés en catégories, selon la méthode de la comparaison constante. Une théorie substantive a ensuite été développée.Les résultats suggèrent que le paysage documentaire de ces employés est composé de plusieurs espaces documentaires distincts: un répertoire principal, des répertoires secondaires, le bureau du système d'exploitation, le courriel, les documents papiers ainsi que les environnements partagés. Les habitudes des participants face à la gestion des fichiers orphelins, des versions multiples, au nommage des fichiers et répertoires ainsi qu'à la recherche et la navigation ont été décrites. En somme, malgré certains éléments en commun, des variations significatives ont pu être observées parmi les participants.Afin d'expliquer la variation observée, un modèle des facteurs pouvant influencer la GPI a été développé. Il comprend sept catégories de facteurs: nature de l'emploi, statut de l'emploi, documents existants, relation avec le ou la supérieur(e), caractéristiques de l'employé, contexte organisationnel et caractéristiques des documents. Plusieurs des facteurs identifiés dans cette étude n'avaient jamais été mentionnés dans la littérature sur la GPI, alors que dans d'autres cas les éléments présentés ici viennent confirmer les résultats d'études précédentes. Le modèle proposé met également en lumière la complexité inhérente à la GPI, et l'importance d'adopter une approche holistique dans l'analyse des comportements de GPI.
Ravasio, Pamela [Verfasser]. "Personal Information Organisation : Studies on User-Appropriate Classification and Retrieval Strategies and their Implications for Information Management Systems Design / Pamela Ravasio." Aachen : Shaker, 2005. http://d-nb.info/118162147X/34.
Full textRavasio, Pamela. "Personal information organisation: Studies on user-appropriate classification and retrieval strategies and their implications for information management systems design /." Zürich : ETH, 2004. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=15579.
Full textPienaar, Heila. "Die ontwerp van 'n webportaal vir akademici." Pretoria : [s.n.], 2001. http://upetd.up.ac.za/thesis/available/etd-03202003-161802.
Full textUnruh, Kent T. "Information and the cancer experience : a study of patient work in cancer care /." Thesis, Connect to this title online; UW restricted, 2007. http://hdl.handle.net/1773/7176.
Full textAlyami, Mohammed Abdulkareem. "Toward Patient-Centered Personal Health Records Systems to Promote Evidence-Based Decision-Making and Information Sharing." Thesis, Towson University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10745897.
Full textPersonal health record (PHR) is considered a crucial part in improving patient outcomes by ensuring important aspects in treatment such as continuity of care (COC), evidence- based treatment (EBT) and most importantly prevent medical errors (PME). Recently there has been more focus on preventive care or monitoring and control of patients symptoms than treatment itself. Nowadays, there are many mobile health applications and sensors such as blood pressure sensors, electrocardiogram sensors, blood glucose measuring devices, and others that are used by the patients who monitor and control their health. These apps and sensors produce personal health data that can be used for treatment purposes. If managed and handled properly, it can be considered patient-generated data. There are other types of personal health data that are available from various sources such as hospitals, doctors offices, clinics, radiology centers or any other caregivers.
Aforementioned health documents are deemed as a PHR. However, personal health data is difficult to collect and manage due to the fact that they are distributed over multiple sources (e.g. caregivers, patients themselves, clinical devices, and others) and each may describe patient problems in their own way. Such inconsistencies could lead to medical mistakes when it comes to the treatment of the patient. In case of emergency, this situation makes timely retrieval of necessary personal clinical data difficult. In addition, since the amount and types of personal clinical data continue to grow, finding relevant clinical data when needed is getting more difficult if no actions are taken to resolve such issue. Having complete and accurate patient medical history available at the time of need can improve patient outcomes by ensuring important aspects such as COC, EBT, and PME. Despite the importance of PHR, the adoption rate by the general public in the U.S. still remains low. In this study we attempt to use Personal Health Record System (PHRS) as a central point to aggregate health records of a patient from multiple sources (e.g. caregivers, patients themselves, clinical devices, and others) and to standardize personal health records (e.g. use of International Classification of Diseases (ICD- 10) and Systemized Nomenclature of Medicine Clinical Terms (SNOMED CT)) through our proof-of-concept model: Health Decision Support System (HDSS).
We started out by exploring the barriers in adopting PHRs and proposed a few approaches that can promote the adoption of PHRS by the general public so it is possible to implement continuity of care in community settings, evidence-based care, and also prevent potential medical errors. To uncover the barriers in adopting PHR, we have surveyed articles related to PHRS from 2008 to 2017 and categorized them into 6 different categories: motivation, usability, ownerships, interoperability, privacy, and security and portability.
We incorporated the survey results into our proposed PHRS, so it can help overcome some of the barriers and motivate people to adopt PHRS. In Our proposed PHRS, we aimed to manage personal health data by utilizing metadata for organizing and retrieval of clinical data. Cloud storage was chosen for easy access and sharing of health data with relevant caregivers to implement the continuity of care and evidence-based treatment. In our study, we have used Dropbox as storage for testing purposes. However, for practical use, secure cloud storage services that are Health Insurance Portability and Accountability Act (HIPAA) complaint can be used for privacy and security purposes, such as Dropbox (Business), Box, Google Drive,Microsoft OneDrive, and Carbonite. In case of emergency, we make critical medical information such as current medication and allergies available to relevant caregivers with valid license numbers only. In addition, to standardize PHR and improve health knowledge, we provide semantic guidance for using SNOMED CT to describe patient problems and for mapping SNOMED CT codes to ICD-10-CM to uncover potential diseases. As a proof of concept, we have developed two systems (prototypes): first, my clinical record system (MCRS) for organizing, managing, storing, sharing and retrieving personal health records in a timely manner; second, a health decision support system (HDSS) that can help users to use SNOMED CT codes and potential disease(s) as a diagnosis result.
Epstein, Michael K. "The two faces of MIS--group membership, role orientation, and personal outcomes among information systems designers." Thesis, Massachusetts Institute of Technology, 1991. http://hdl.handle.net/1721.1/13478.
Full textDong, Xin. "Providing best-effort services in dataspace systems /." Thesis, Connect to this title online; UW restricted, 2007. http://hdl.handle.net/1773/6902.
Full textCampbell-Macdonald, Daniel. "Congenital nausea this exegesis [thesis] was submitted to the Auckland University of Technology in partial fulfilment of the degree of Master of Arts (Art and Design), 2003 /." Full thesis. Abstract, 2003.
Find full textNot all images visible in e-thesis. Also held in print (45 leaves, ill., CD-ROM, 30 cm.) in Wellesley Theses Collection. (T 709.93 CAM)
Gooren-Sieber, Stefanie [Verfasser], Andreas [Akademischer Betreuer] Henrich, and Ute [Akademischer Betreuer] Schmid. "Information Management for Digital Learners : Introduction, Challenges, and Concepts of Personal Information Management for Individual Learners [[Elektronische Ressource]] / Stefanie Gooren-Sieber. Betreuer: Andreas Henrich ; Ute Schmid." Bamberg : University of Bamberg Press, 2014. http://d-nb.info/1058949284/34.
Full textMitschick, Annett. "Ontologiebasierte Indexierung und Kontextualisierung multimedialer Dokumente für das persönliche Wissensmanagement." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2010. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-27543.
Full textPersonal multimedia document management benefits from Semantic Web technologies and the application of ontologies. However, an ontology-based document management system has to meet a number of challenges regarding flexibility, soundness, and controllability of the semantic data model. The first part of the dissertation proposes necessary mechanisms for the semi-automatic modeling and maintenance of semantic document descriptions. The second part introduces a component-based, application-independent architecture which forms the basis for the development of innovative, semantic-driven solutions for personal document and information management
Maguraushe, Kudakwashe. "Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university." Thesis, 2021. http://hdl.handle.net/10500/27557.
Full textSchool of Computing
Ph. D. (Information Systems)
Tung, Tse-Hua, and 童子樺. "Personal Health Information Management System." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/32834402189836574756.
Full text國立陽明大學
醫學工程研究所
95
We hope to provide a long-term record interface through developing a personal health information management system which includes a physiological database for four chronic diseases(e.g. Heart disease, Hypertension, Metabolism and Asthma) and there relative major physiological parameters(e.g. ECG, Blood Pressure, Blood Glucose, Peak Flow and SPO2.). With Long-term personal records compared with physiology parameters criteria, and assisted with the importance log and the 2nd order curve fitting trends. The characteristic of local database provide the ability to carry personal health record anywhere and help users to provide doctors more aid in diagnostic information which were recorded during non-visiting duration.
Liu, Kai, and 劉凱. "Personal Game Information Management System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/40418613669248659213.
Full text義守大學
資訊工程學系碩士班
94
Modern IT technique and broadband network infrastructure make on-line games become one of the high value-added industries. Especially when the market of the broadband network grew rapidly since 2000, not only the market of the on-line games increased in 10 megabyte speed, it also becomes the most favorite entertainment to all ages. Extra information will be adopted during the game playing that makes the users confused to filter and organize the information from the overwhelming Internet information. In order to solve this problem, a system is proposed to let user get the valued knowledge and organize from the Internet via the information fetch. This thesis designs an information objects searching mechanism based on the method of RSS (Really Simple Syndication) to build the personal game knowledge-searching infrastructure as the basis of the game knowledge-searching system design. Valuable game knowledge could be obtained by this personal game knowledge-searching system. Since this system is not restricted by the source or the property of the information, it could be applied in the other system.
Marková, Katerina. "Digital dying in personal information management towards thanotosensitive information management." Dissertação, 2011. http://hdl.handle.net/10216/65334.
Full textMarková, Katerina. "Digital dying in personal information management towards thanotosensitive information management." Master's thesis, 2011. http://hdl.handle.net/10216/65334.
Full text