To see the other types of publications on this topic, follow the link: Through Life Information Management.

Dissertations / Theses on the topic 'Through Life Information Management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Through Life Information Management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Carstens, Wiehahn Alwyn. "Regression analysis of caterpillar 793D haul truck engine failure data and through-life diagnostic information using the proportional hazards model." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20333.

Full text
Abstract:
Thesis (MScEng)--Stellenbosch University, 2012.
ENGLISH ABSTRACT: Physical Asset Management (PAM) is becoming a greater concern for companies in industry today. The widely accepted British Standards Institutes’ specification for optimized management of physical assets and infrastructure is PAS55. According to PAS55, PAM is the “systematic and co-ordinated activities and practices through which an organization optimally manages its physical assets, and their associated performance, risks and expenditures over their life cycle for the purpose of achieving its organizational strategic plan”. One key performance area of PAM is Asset Care Plans (ACP). These plans are maintenance strategies which improve or ensure acceptable asset reliability and performance during its useful life. Maintenance strategies such as Condition Based Maintenance (CBM) acts upon Condition Monitoring (CM) data, disregarding the previous failure histories of an asset. Other maintenance strategies, such as Usage Based Maintenance (UBM), is based on previous failure histories, and does not consider CM data. Regression models make use of both CM data and previous failure histories to develop a model which represents the underlying failure behaviour of the asset under study. These models can be of high value in ACP development due to the fact that Residual Useful Life (RUL) can be estimated and/or the long term life cycle cost can be optimized. The objective of this thesis was to model historical failure data and CM data well enough so that RUL or optimized preventive maintenance instant estimations can be made. These estimates were used in decision models to develop maintenance schedules, i.e. ACPs. Several regression models were evaluated to determine the most suitable model to achieve the objectives of this thesis. The model found to be most suitable for this research project was the Proportional Hazards Model (PHM). A comprehensive investigation on the PHM was undertaken focussing on the mathematics and the practical implementation thereof. Data obtained from the South African mining industry was modelled with the Weibull PHM. It was found that the developed model produced estimates which were accurate representations of reality. These findings provide an exciting basis for the development of futureWeibull PHMs that could result in huge maintenance cost savings and reduced failure occurrences.
AFRIKAANSE OPSOMMING: Fisiese Bate Bestuur (FBB) is besig om ’n groter bekommernis vir maatskappye in die bedryf te word. Die Britse Standaarde Instituut se spesifikasie vir optimale bestuur van fisiese bates en infrastruktuur is PAS55. Volgens PAS55 is FBB die “sistematiese en gekoördineerde aktiwiteite en praktyke wat deur ’n organisasie optimaal sy fisiese bates, hul verwante prestasie, risiko’s en uitgawes vir die doel van die bereiking van sy organisatoriese strategiese plan beheer oor hul volle lewensiklus te bestuur”. Een Sleutel Fokus Area (SFA) van FBB is Bate Versorgings Plan (BVP) ontwikkeling. Hierdie is onderhouds strategieë wat bate betroubaarheid verbeter of verseker tydens die volle bruikbare lewe van die bate. Een onderhoud strategie is Toestands Gebasseeerde Onderhoud (TGO) wat besluite baseer op Toestand Monitering (TM) informasie maar neem nie die vorige falingsgeskiedenis van die bate in ag nie. Ander onderhoud strategieë soos Gebruik Gebasseerde Onderhoud (GGO) is gebaseer op historiese falingsdata maar neem nie TM inligting in ag nie. Regressiemodelle neem beide TM data en historiese falings geskiedenis data in ag ten einde die onderliggende falings gedrag van die gegewe bate te verteenwoordig. Hierdie modelle kan baie nuttig wees vir BVP ontwikkeling te danke aan die feit dat Bruikbare Oorblywende Lewe (BOL) geskat kan word en/of die langtermyn lewenssilus koste geoptimeer kan word. Die doelwit van hierdie tesis was om historiese falingsdata en TT data goed genoeg te modelleer sodat BOL of optimale langtermyn lewensiklus kostes bepaal kan word om opgeneem te word in BVP ontwikkeling. Hierdie bepalings word dan gebruik in besluitnemings modelle wat gebruik kan word om onderhoud skedules op te stel, d.w.s. om ’n BVP te ontwikkel. Verskeie regressiemodelle was geëvalueer om die regte model te vind waarmee die doel van hierdie tesis te bereik kan word. Die mees geskikte model vir die navorsingsprojek was die Proporsionele Gevaarkoers Model (PGM). ’n Omvattende ondersoek oor die PGM is onderneem wat fokus op die wiskunde en die praktiese implementering daarvan. Data is van die Suid-Afrikaanse mynbedryf verkry en is gemodelleer met behulp van die Weibull PGM. Dit was bevind dat die ontwikkelde model resultate geproduseer het wat ’n akkurate verteenwoordinging van realiteit is. Hierdie bevindinge bied ’n opwindende basis vir die ontwikkeling van toekomstige Weibull Proporsionele Gevaarkoers Modelle wat kan lei tot groot onderhoudskoste besparings en minder onverwagte falings.
APA, Harvard, Vancouver, ISO, and other styles
2

Скворчевський, Олександр Євгенович. "Загальне середовище даних (Shared Data Environment), як інтегруючий компонент елементів CALS-технологій." Thesis, Національної академії Національної гвардії України, 2017. http://repository.kpi.kharkov.ua/handle/KhPI-Press/35021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nel, Petrus Abel. "A competitive advantage through information management." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/49667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Morris, Ashley. "Product change management : to improve the through-life management of high-value, long-life products." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/111198/.

Full text
Abstract:
The designs of complex products such as aircraft, trains and industrial plant continually evolve, during design, manufacture and also during their operating lives. Such products are invariably managed in complex multi-stakeholder environments. The product change process generates significant volumes of information and this continues through-life as designs are modified in the light of technological innovation, supplier changes and operating experience. The volume of information generated is enabled by increased network connectivity together with the competitive advantages that can be derived from greater product knowledge derived from monitoring product performance. As the service economy has grown, manufacturing and maintenance activities have increasingly been outsourced to enable a greater focus on higher, value-added, aftermarket, support services. Consequently, while the responsibility for managing the design of the end product rests with “Tier 1” manufacturers, operators and maintainers, there has been a significant increase in the responsibility for suppliers to manage design changes. To improve the management of the product change process is difficult because it spans many organizations in the supply chain and to make progress requires collaborative action. Managing products during their life, particularly in the context of design changes, is a complex process that requires the coordination of many activities spanning design, procurement, production, marketing, sales, support and disposal. These activities constitute a complex process model that is highly dependent on accurate information and can have a significant impact on an organization’s cost base. In addition "products" sold by a Manufacturer are often described as "assets" by a product operator. Regardless of whether something is considered a "product" or an "asset", the change process is supported by a value chain that spans both the domains of manufacturing and support services. Working practices and skills must constantly adapt in response to innovation and this includes the mental perspectives with which people view the world and solve problems. A significant challenge that organizations face when seeking to remain competitive relates to the need to respond to the challenges of innovation. This drives a perpetual cycle of problem solving whereby existing operations are assessed and opportunities for improvement identified. This research assesses the challenges to maintaining design integrity throughout the product lifecycle, explores the impact of inaccurate product information and sets-out an approach to achieving improvements to the management of product information specifically for complex products.
APA, Harvard, Vancouver, ISO, and other styles
5

Ryan, Cynthia A. (Cynthia Anne) 1961. "Sustainable competitive advantage through information technology." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9193.

Full text
Abstract:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management, 2000.
Also available online on DSpace at MIT.
Includes bibliographical references (leaf 48).
This paper discusses the difficulty of achieving sustainable competitive advantage through information technology. While information technology proliferates and innovations arise frequently, few companies have been able to use IT to remain leaders in their industries. Using a framework proposed by Michael Scott Morton, this paper examines how one firm, Capital One Financial, has created sustainable competitive advantage through a powerful combination of its information technology, strategic planning, and organizational design. The first section provides an introduction and information about the Scott Morton framework. Section two provides background information about the credit card industry and Capital One;s history. The third section analyzes why Capital One's advantage has been sustainable to date and includes discussion of strategic, economic, organizational and technical reasons. Section four analyzes the risks to Capital One's advantage in the future and includes discussion of technicalogical risks, organizational risks and customer risks. The final section includes a summary and some conclusions.
by Cynthia A. Ryan.
M.B.A.
APA, Harvard, Vancouver, ISO, and other styles
6

Ahlberg, Pilfold Sofia. "Managing knowledge for through life capability." Thesis, Loughborough University, 2016. https://dspace.lboro.ac.uk/2134/21802.

Full text
Abstract:
In 2005 the UK Ministry of Defence (MoD) published a White Paper in which it detailed its Defence Industrial Strategy (DIS) (UK MoD, 2005). The strategy involved a rapid transformation of UK defence towards a product-service, business-like paradigm through the adoption of Through Life Capability Management (TLCM). TLCM has since been succeeded by other initiatives. However, for organisations involved in the management of capability through life, the associated principles of operation as well as the challenges remain, including that of the management of knowledge. The confederated capability enterprise is a distributed knowledge system. Knowledge of the systems, for which a particular organisation has through-life management responsibility, may be distributed throughout an enterprise that comprises several commercial organisations as well as the customer. The bringing together of different components of capability and perspectives makes managing knowledge difficult. This is complicated further by the observation that in a decade one can expect a significant proportion of the manpower involved in a capability will have changed. Success in this type of environment requires a clear understanding of the value of particular knowledge within the organisation as well as effective knowledge management in the wider enterprise. Dstl and EPSRC have jointly funded this research which addresses management of knowledge for through life capability through modelling of the capability enterprise, a workshop on TLCM benefits and behaviours, a comparative case study at a commercial service company and the UK MoD including Dstl, and knowledge mapping within a specific exemplar capability. The results of the modelling illustrated the Systems of Systems (SoS) nature of the enterprise and the need to align capability and management processes across the enterprise. How well this can be achieved depends on the extent to which both the UK MoD and industry are willing to share, access and process information and knowledge. This would require trust between the individuals and organisations involved. The need for trust was emphasised in an international workshop where the participants discussed the behaviours that were required for the perceived benefits of TLCM to be realised. The workshop members highlighted trust in long term planning as industry seeks to manage skills and knowledge over time. ServiceCo provides communication and media services to customers globally. It comprises four customer-facing divisions and two operational units. The case which was based on interviews in one customer-facing and one operational unit revealed the following: • Focus on corporate values supports knowledge management behaviours across the organisation. • Succession planning is needed for all skills and knowledge that are critical or essential to the business. • Once the continual renewal of knowledge slows down and/or stops in an organisation, the knowledge is lost. The second case of the study was the Royal Navy Command Head Quarters and Dstl. Dstl is a trading fund that provides UK MoD and the wider UK government specialist Science & Technology services and operates and manages the Chief Scientific Advisor's research programme. The case study revealed: • Security regulations and considerations impact significantly on effective management of knowledge. • Knowledge retrieval can be 'hit and miss' as complicated filing structures and indexing practices are applied inconsistently, leading to individuals adopting a number of strategies to share knowledge. • Succession planning for people with rare skills is an issue that impacts business continuation. Comparison between the two cases showed that the two organisations experienced different problems but that the knowledge behaviours adopted by the individuals involved were essentially the same. This pointed to the need to address the issues associated with the management of knowledge as cultural and organisational in nature. Personal strategies to manage and share knowledge included individuals retaining copies of files on desktop hard drives and keeping paper copies in drawers; documents were emailed to ensure the intended audience would get it or be able to access it; and asking a colleague for advice on where to find out things. An important difference between knowledge management between the two organisations was that the UK MoD relied on processes due to the rapid change of personnel whereas the service company relied on personal relationships as people remained in the roles for longer. The knowledge mapping of 'moving personnel and materiel using vehicles' revealed that each Line of Development (LoDs) has its own constituent (LoDs) indicating the requirement to manage organisational capability in order to deliver capability to customers. It also illustrated all the active knowledge that is required in order for the capability to be delivered. The research main contributions are: • Theoretical models for exploring the use of knowledge in acquisition projects over time • Comparing two organisations at separate ends of the organisational spectrum and identifying common organisational factors that influence the management of knowledge for through life capability • Recognising that the enterprise is a capability SoS. In order to successfully delivery capability, knowledge about and within the components needs to be managed. Other findings include: • Management of knowledge for TLCM puts the focus on managing knowledge for future capability requirements rather than on retention of knowledge products, bringing in aspects such as business continuation planning and consequently impacting on the organisation's future development. • There is a strong relationship between knowledge conservation, human resource management and company policies. • Managing changes in design and/or function requires a good understanding of the different processes used within the various disciplines involved across the capability components and how they contribute to the final product and to each other. • An organisation's goals and the manner in which it organises itself to achieve them with regard to the management of knowledge does not appear linked. Instead, focus falls on the organisational architecture and the human resource polices that it implies. • 'Knowing' is an individual capability and also a social one; communities of practice and networking are necessary components of an organisation's knowledge base. • Knowing whom to ask and where to look is in a knowledge retrieval perspective nearly as important as knowing what to look for. • 'Individuals know while documents, processes and tools support knowing'. This emphasises the need for a close connection between humans and IT-based knowledge repositories. • The role of IT in knowledge management can either be to correlate knowledge in people's heads to relevant projects or to correlate individuals and knowledge in relevant projects depending on the key questions asked in the management of knowledge within the organisation. • The role of IT in determining issues related to the relevance and location of documentation differs depending of the organisation's reliance on face to face interactions between employees as a means for communicating this information. • The capability end user is in some instances hard to define. How the end user is defined determines where the SoS boundaries are defined. It is probably better to define the boundary as a broad fuzzy border. The indeterminacy implied by this view becomes a complexity issue for management of knowledge. • The impetus to manage knowledge and how is influenced legal requirements and by the organisation's relationships with its stakeholders including the extent it is subject to external scrutiny. Based on the research, a number of recommendations are made.
APA, Harvard, Vancouver, ISO, and other styles
7

Garcia, Alberto A. "Improving life cycle management through simulation and efficient design." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FGarcia.pdf.

Full text
Abstract:
Thesis (M.S. in Operations Research)--Naval Postgraduate School, September 2008.
Thesis Advisor(s): Lucas, Thomas W. "September 2008." Description based on title screen as viewed on November 6, 2008. Includes bibliographical references (p. 89-90). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
8

McAlpine, Hamish. "Improving the management of informal engineering information through electronic logbooks." Thesis, University of Bath, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.519921.

Full text
Abstract:
In modern organisations, the effective use of information and knowledge is a prerequisite for sustaining competitive advantage. To support this, considerable work has been undertaken by both academia and industry to improve the representation, organisation and access of information across and between organisations. This improved information and communication management has had a positive impact on business processes, improved decision making and – importantly – increased levels of innovation. However, one area that has received less attention is personal information such as logbooks, maintained by a majority of engineers. Many of these logbooks could contain significant amount of design information and knowledge which is not recorded elsewhere, such as design rationale and records of alternatives considered. Indeed, much of what we know about the work of historically important engineers and scientists such as Leonardo da Vinci (1452-1519) has come from their personal collections of notes. Despite this, logbooks are rarely formally managed, with the content usually only available to the authoring engineer. It is arguable that such potentially valuable information should be more easily accessible to the individual and wider organisation, where it could be of benefit as a personal productivity aid, a design record and also for intellectual property and audit/traceability purposes. It follows that there is a need to create improved methods for managing logbook content, which is the challenge that this research addresses. This research first seeks to establish the reasons for the stubborn persistence of paper logbooks as such a common feature of engineering work, despite almost every other aspect being undertaken in the digital domain. Various studies are undertaken, revealing that logbooks are used for a wide range of purposes, such as the critical role of ‘mediating’ between various information sources. The requirements arising from these studies are used together with a review of existing e-logbook technologies to produce a comprehensive requirement specification for an engineering electronic-logbook. At its core is a novel information management strategy based combination of templates to pre-structure entries and a lightweight information classification schema to structure the information. They key features of the specification are the ability for logbook information to be searched, shared and integrated with other information systems, whilst retaining important characteristics of paper logbooks (such as sketching support). The contributions of this thesis are the fundamental understanding of logbook use and content, together with a comprehensive specification for an engineering e-logbook to improve logbook information management for both the individual and wider organisation.
APA, Harvard, Vancouver, ISO, and other styles
9

Francomme, Bastien. "Improving Validation & Verification data management by deploying a life cycle management tool." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-285946.

Full text
Abstract:
Managing data can be a challenge for large scale projects involving dozens of collaborators with different expertise. Data could be requirements, test procedures or product breakdown structures (PBS) for example. The deployment of an Application Life cycle Management (ALM) platform marks the beginning of the transition from the document-centric approach to new object-oriented methods such as Model-Based Systems Engineering (MBSE) to store data. This thesis evaluates the deployment of Polarion ALM tool to improve validation & verification (V&V) processes’ time and cost. An action research methodology has been implemented on the case study of aeronautical projects. A data management prototype has been developed. It consisted in (a) designing a database structure, (b) designing workflows and processes to handle data, (c) designing reporting views to compute, sort and display information, and (d) developing import/export templates depending on the pre-defined formats. An anonymous survey addressed to the prototype users showed that the respondents are eager to work with such a tool and predict time and cost saving on the long term for V&V processes. There is indeed no answer with a mean or median lower than 3 over 5 on the satisfaction scale, meaning that the participants globally agree that the new approach is at least equal or better than the previous methodologies. However, configuration management has been a challenging feature to implement and does not meet all users’ expectations. Using a more recent version of Polarion ALM tool could enable those needs to be fulfilled. The assessment has also shown that a successful ALM tool deployment relies on both the implemented data structure and the management of change (also called change management). Including the future users during tool development facilitates the adoption of the ALM platform. Thus, it necessitates strong interactions with the company collaborators through defined communication channels and a proper training program.
Hantering av data är en utmaning för storskaliga ingenjörsprojekt projekt som involverar dussintals medarbetare med olika expertis och arbetsuppgifter. Exempel på data kan vara kravspecifikationer, testförfaranden eller ett projekts uppdelning och struktur. Genom att implementera en Applikation för Livscykel Hantering ALH påbörjas en övergång från dokumentbaserad till objektorienterad metod för datalagring i modellbaserade ingenjörsprojekt. I denna avhandling bedöms införandet av Polarions ALH-verktyg för att minska tid och kostnad vid validering & verifiering (V&V). Metoden har aktivt testats och utvärderats på ett projekt i flygindustrin. En prototyp för datahantering har utvecklats med hjälp utav Polarions ramverk. Arbetet med prototypen delades upp i fyra delar, (a) utforma en databasstruktur, (b) bestämma arbetsflöden och processer för att samla och hantera data, (c) att utforma rapport-gränssnitt för beräkning, sortering och förmedling utav information och slutligen (d) skapa import-/exportmallar beroende på föregående definierade format. En anonym undersökning hos prototypanvändarna visade en önskan att arbeta med ett sådant datahanteringssystem och få en prognos över tid och kostnadsbesparingar på lång sikt för V&V-processer. Vid utvärderingen över hur tillfredsställda användarna var med verktyget så var samtliga median och medelvärden minst 3 på en skala av 5, där 5 motsvarar ”högsta” nöjdhetsgrad med verktyget. Testet gjordes för användare globalt och visar på att deltagarna minst tyckte verktyget var likvärdigt med systemet som fanns tidigare men oftast bättre. Hanteringen av olika konfigurationer har dock varit en utmanande funktionalitet att implementera och uppfyller inte alla användares förväntningar. Troligt skulle dessa krav uppfyllas genom att använda en nyare version av Polarion. Bedömningen har också visat att ett framgångsrikt införande av ALH är beroende av både den implementerade datastrukturen och hanteringen av förändringar. Att inkludera framtida användare under verktygsutveckling underlättar antagandet av ALH-plattformen. Därför krävs det starka interaktioner med företagets medarbetare genom definierade kommunikationskanaler och ett ordentligt träningsprogram.
APA, Harvard, Vancouver, ISO, and other styles
10

Amien, Ishtiaq. "Learning from risk : facilitating organisational learning through enterprise risk management." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86517.

Full text
Abstract:
Thesis (MPhil)--Stellenbosch University, 2014.
ENGLISH ABSTRACT: Modern business environments are characterized by rapid changes and organizations that are able to survive and to thrive in such environments must be able to adapt and respond to this environmental change. Risk management is an activity that strives to continuously evaluate and deal with changes to the environment. Organisational learning is the capability of organizations to evaluate stimuli from the environment, to interpret the signals and to learn. Organisational learning can thus be seen as the capability to adapt to environmental change. First the thesis considers the concepts of risk and risk management by looking at its historical development as a discipline. The concept is situated in a broader societal perspective of the risk society in which the individual is expected to carry a much greater burden of risk, where self-criticism is an inherent feature of life and risk management is essential for everyone. Current risk management practice has seen the establishment of enterprise-wide risk management as an extension of traditional risk management practice, which seeks to manage all the risks facing the organization, but also to manage it in an integrated manner. Increased regulation and policies, as a result of organizational failures such as Enron, has called for organizations to better manage risk in order to establish more resilient organizations and to protect shareholder value in an increasingly turbulent business environment. As a result we see development of enterprise risk management frameworks and standards. Most of these standards and frameworks recommend similar risk management activities, such as objective and context setting; risk assessment (risk identification, analysis and evaluation); risk treatment or response determination; and risk communication, monitoring and reporting. Next the thesis considers some of the defining features of organizational learning, such as the differences between organizational learning and learning organizations, the individual and organizational perspective on learning, and the role of the individual in organizational learning. Selected organizational learning models are described that focus on scanning, interpreting and learning, and the aspects that have an impact on organizational learning, including organizational memory and mental models, organizational culture, uncertainty and ambiguity, single and double loop learning, and tacit and explicit knowledge. Lastly the thesis identifies points of convergence in theory and practice between enterprise risk management and organizational learning. It is shown that principles and processes governing enterprise risk management activities and techniques can be utilized as management activities to formalise and support organizational learning.
AFRIKAANSE OPSOMMING: Die moderne besigheidsomgewing word deur vinnige veranderinge gekenmerk en organisasies wat in staat is om te oorleef in sulke omgewings moet noodwendig op omgewingsverandering kan reageer en aanpas. Risiko-bestuur is 'n aktiwiteit wat probeer om veranderinge in die omgewing deurlopend te monitor en daarop te reageer. Organisatoriese leer is die vermoë van organisasies om stimuli uit die omgewing te kan opmerk, evalueer en interpreteer ten einde te leer. Organisatoriese leer kan dus gesien word as die vermoë om by omgewingsverandering aan te pas. Die tesis oorweeg ten eerste die konsepte van risiko en risiko-bestuur deur na die historiese ontwikkeling van die dissipline te kyk. Die konsep word gesitueer in 'n breër samelewingsperspektief, naamlik die risiko samelewing wat gekenmerk word deur 'n groter risiko las vir individue, waar self-kritiek 'n inherente kenmerk van die lewe is en risikobestuur vir almal relevant word. Huidige risiko-bestuurspraktyk sluit die vestiging van ondernemingswye risiko-bestuur as 'n verlengde van tradisionele risiko-bestuur, wat poog om alle risikos waaraan 'n onderneming blootgestel is op 'n geïntegreerde manier te bestuur. Toenemende regulasie en strenger beleid, as 'n gevolg van organisatoriese skandale soos Enron, vra van organisasies om risiko beter te bestuur en sodoende meer volhoubare organisasies te bewerkstelling en aandeelhouers se waarde te beskerm in turbulente besigheidsomgewings. Die resultaat was die ontwikkeling van ondernemingsrisiko-bestuur raamwerke en standaarde. Die meeste van hierdie raamwerke en standaarde stel soortgelyke risiko-bestuursaktiwiteite voor, soos doel- en kontekstelling, risiko identifikasie, -analise, en –evaluasie, risiko behandeling of responsbepaling, en risiko kommunikasie, -monitering, en –verslagdoening. Die tesis oorweeg van die uitstaande kenmerke van organisatoriese leer, soos die verskil tussen organisatoriese leer en die lerende organisasie, die individuele en organisatoriese perspektiewe op leer, en die rol van die individu in organisatoriese leer. Geselekteerde organisatoriese leer modelle word beskryf wat fokus op skandering, interpretasie en leer, en die aspekte wat impak het op organisatoriese leer, insluitend organisatoriese geheue en wêreldbeelde, organisasie kultuur, onsekerheid en dubbelsinnigheid, enkel- en dubbellusleer , en versweë en eksplisiete kennis. Laastens word sameloopspunte in die teorie en praktyk tussen ondernemingsrisiko-bestuur en organisatoriese leer geïdentifiseer. Daar word getoon hoe beginsels en prosesse wat ondernemingsrisiko-bestuur se aktiwiteite en tegnieke onderlê, ook gebruik kan word as bestuurspraktyke om organisatoriese leer te formaliseer en te ondersteun.
APA, Harvard, Vancouver, ISO, and other styles
11

Courtney, Nigel. "Executive learning in the information management domain through IT mediated methods." Thesis, City University London, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.269357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Nard, Karen D. "Improving Information Systems Security Through Management Practices: A Non-technical Approach." NSUWorks, 2004. http://nsuworks.nova.edu/gscis_etd/745.

Full text
Abstract:
Most organizations have acknowledged the importance of information systems security, yet in this environment of heightened awareness many organizations focus on technology and overlook the non-technical security resources available to them. This project focused on the non-technical side of security and the management practices that can be used to establish an important layer in a comprehensive security solution. A security planning matrix was developed by drawing from the theoretical and practical body of knowledge in the information systems security field. The matrix was designed to support generally accepted security principles, standards, and legislation so that information systems management can use the product to protect information systems using non-technical controls and techniques such as people, policies, practices, training, awareness, and the organizational structure and culture. A hybrid waterfall/spiral process model, Microsoft Solutions Framework (MSF) was used to develop the security planning matrix. Specific procedures emulated those used by the National Institute of Standards and Technology (NIST) based on their experience and expertise in developing security guidelines and other security tools. A prototype of the product was developed early in the process based on requirements abstracted from security standards, legislation, and industry best practices. The prototype was then reviewed by an expert panel to refine both product requirements and design. One round of feedback and two versions of the prototype were required before the panel approved the prototype for use in the pilot study. The pilot was performed in a real-world setting at Republic Mortgage Insurance Corporation (RMIC), where user acceptance testing, success criteria evaluation, and security performance improvement testing were all performed to evaluate and stabilize the product. The research improved professional practice and added to the body of information systems security knowledge by identifying and demonstrating methods for defining requirements of, developing, and evaluating a product such as the security planning matrix. Results of the research also showed that the product's features and functions were acceptable to both subject matter experts and real-world users and that implementation and use of the security planning matrix could improve the level of security preparedness as evidenced by pilot study results at RMIC.
APA, Harvard, Vancouver, ISO, and other styles
13

Zhou, Bin S. M. Massachusetts Institute of Technology. "Enterprise information technology project portfolio selection through system dynamics simulations." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/43107.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2007.
Includes bibliographical references (p. 166-169).
As companies are increasingly relying on information technologies (IT) to help maintain their existing and develop new competitive advantages, investing effectively in IT is becoming more and more important. One of the biggest challenges facing an enterprise IT organization is how to select a project portfolio that is best aligned with the business strategies and to deliver highest value using limited IT resources. In this research paper, I examined in detail a recently proposed IT governance framework, designed a System Dynamics model based on this framework, and developed a simulation application to investigate constructs, relationships and scenarios suggested by the framework. My research identified and examined several levers through which IT managers can achieve better alignment with business goals and more efficient use of IT resources. I examined alternative IT governance regimes (combinations of rules and policies for selecting among opportunities and retaining existing systems) in terms of their effects on efficiency, feature satisfaction, and cost of the resulting legacy asset base. By choosing the right combination of relatively straightforward selection and retention policies, IT managers can steer their legacy assets toward a desired efficiency or satisfaction goal in concert with company strategies.
by Bin Zhou.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
14

Brooke, Carole. "Journeys through the quality gap : information technology in two organisations." Thesis, City University London, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.316041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Adebonojo, Leslie G., Kathy Campbell, and Mark Ellis. "Reaching the Masses through Your Content Management System." Digital Commons @ East Tennessee State University, 2011. https://dc.etsu.edu/etsu-works/6328.

Full text
Abstract:
Using your institution's content management system to distribute a module on the library's resources creates an effective venue for reaching students. Our goal was to get the word out about our resources and teach our students a few techniques about searching by using our institution's course management system. We created a Desire2Learn (D2L) module for release to all faculty consisting of short films and documents about the library as well as websites of interest. If the professor decides to incorporate the module into their course site, it becomes part of the course's class content. We are currently monitoring 67 courses.
APA, Harvard, Vancouver, ISO, and other styles
16

Rowe, Andre N. "Computer and voice network management through low Earth orbiting satellites." Thesis, Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2846.

Full text
Abstract:
en the connection is idle. Research into available amateur radio satellite assets lead to testing Automated Position Reporting System (APRS) satellites and terrestrial networks for common operational picture development in large geographical areas either too remote for common infrastructure or affected by disasters. The expansion of CENETIX's research opportunities led us to explore DIRECWAY and iDirect technologies as methods for expanding the Tactical Network Topology (TNT) network, and to test Nemesis' new DIRECWAY functionality. Additionally, we explored potential communications usage for future satellites in The Office of the Secretary of Defense's TacSat program.
APA, Harvard, Vancouver, ISO, and other styles
17

Hughes, Michael Wesley. "Implementing ERP in manufacturing organizations : improving success through managing organizational change." Thesis, Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/29332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Nichols, Valenta Eunice. "Exploring Welfare Recipients' Self-Sufficiency Barriers through Information Management Systems in Tennessee." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6075.

Full text
Abstract:
Families living on welfare in low-income impoverished neighborhoods encounter multiple barriers that need mitigating before seeking work to reach self-sufficiency. Many welfare recipients' self-sufficiency barriers are unnoticeable to caseworkers due to lack of data sharing to assess clients' needs through information technology processes. The purpose of this exploratory descriptive phenomenological qualitative study was to understand welfare recipients' viewpoints on socioeconomic barriers to living self-sufficiently and gain perspectives from human services caseworkers and technical resources on data sharing issues that impact recipients' ability to live independently from government assistance. Data collection and observational field notes resulted from in-depth interviews of 11 participants to capture welfare recipients' lived experience on human services barriers to achieve self-sufficiency, as well as, caseworker and technical resources views on welfare systems data sharing issues. The analysis of semistructured interviews revealed that welfare systems data sharing is an enhancement needed to help caseworkers identify and mitigate welfare recipients' self-sufficiency barriers. The common assessment framework model provided a contextual view to exploring research questions to elicit participants' perceptions of data sharing in welfare systems processes. The data analysis showed that the lack of data sharing impacts caseworkers' ability to assist recipients with self-sufficiency barriers. Results indicated the need for caseworkers to use data sharing to understand client's socioeconomic barriers and to make effective decisions to lead them to self-sufficiency. The impact on positive social change is using automated data sharing to identify and mitigate recipients' barriers to self-sufficiency.
APA, Harvard, Vancouver, ISO, and other styles
19

Weldon, Rodney H. "Aging Automotive Technicians Extend Their Work Life Through Service Teams Seeking Total Service Excellence." OpenSIUC, 2012. https://opensiuc.lib.siu.edu/theses/856.

Full text
Abstract:
AN ABSTRACT OF THE THESIS OF RODNEY H. WELDON, for the Masters of Science degree in WORKFORCE EDUCATION, presented on APRIL 28, 2012, at Southern Illinois University Carbondale. TITLE: AGING AUTOMOTIVE TECHNICIANS EXTEND THEIR WORK LIFE THROUGH SERVICE TEAMS SEEKING TOTAL SERVICE EXCELLENCE MAJOR PROFESSOR: Dr. Elizabeth Freeburg The purpose of this paper was to contribute to the body of knowledge about the automotive technician's work life. More specifically, the study addressed the identification of change in technician production, how this change affects and was affected by the issues through out their work life. The author analyzed automotive technician productivity and efficiency calculations of automotive dealership technician production and the issues that impacted change. 40 years of hands on service department management recalled from the researchers personal records applied what worked and redefined what did not.
APA, Harvard, Vancouver, ISO, and other styles
20

Aljarman, Moshabab. "Emerging risk from the application of building information modelling through the life cycle of projects." Thesis, University of Liverpool, 2016. http://livrepository.liverpool.ac.uk/2007262/.

Full text
Abstract:
Over the last decade, the use of BIM methodology, both in terms of technology and process, has experienced a rapid growth in the construction industry, there is a worldwide increase trend on the use and investment in this new technologies. Although, the benefits associated with the use of BIM in the construction industry, the literature has been demonstrated that BIM as a digital collaborative environment between construction stakeholders is here to stay. However, some aspects of the technology are still unfamiliar within the industry, several problems associated with BIM application and adaptation has been surfaced. Unsurprisingly when new technologies are used, such of these problems will appear, this is because BIM approaches represent new concepts and untested in construction industry. Therefore the challenge to overcome problems facing a using BIM, and identify the key risk factors becomes tangible more than any time before. From this perspective, the aim of this study is to identify the emerging risk that influence BIM use in the projects, investigate these risks based on the perception of academics and professionals from the Western world. In this research was to identify 128 of the risk factors based on a review of previous literature, these factors have been categorized into five key clusters (contractual, legal, technical, managerial, application and security). The study employs an online survey, which was sent to 426 respondents. The respondents were drawn from websites and professional networks. The statistical techniques of descriptive statistics, reliability analysis, ANOVA analysis, and analysis of variance were used for data analysis. The analysis findings show that four contractual risks were assessed to be important: LC2 "Trades on site may not be working from the model", LC1"Unclear how to deal with BIM documents’ precedence", and LC5 “Misplaced assumptions that the design team, with a “push of a button” is able to produce a perfectly coordinated series of documents through BIM”. In the legal risk cluster, the respondents agreed on the importance of L.IPR1 "Lack of clarity of the ownership of the BIM objects"; LD4 "Lack of knowledge of the missing data" and likewise, LP1 “Modelling participant does not meet the standard of care required” risk factors. The research findings also indicate that four technical risks will have an influence on BIM usage: TC1 “Complexity of transferring modelling data between programs from one program to another", TI2 "Lack of understanding of BIM for the different software platforms", TI3 "Interoperability shortcomings", TQ9 "Failure to discover errors in the model", and TI1 "Risks of different software platforms”. The results appear to show that the respondents thought ten managerial risk factors are of relevance: MX5 "Lack of understanding of the expectations from BIM modelling"; MX4 "Lack of experience and skilled personnel”; MC4 "Lack of clarity on integration BIM with the current business practice"; MS1 "Conflict due to dissimilar expectations from BIM"; MS4 "Lack of collaborative work processes and standards"; MX7 "Lack of understanding of BIM processes"; MX6 "Lack of understanding of modelling behaviors"; MX8 "Lack of expertise within the project team"; MX9 "Lack of expertise within the organizations"; and MS3 "Lack of criteria for BIM project implementation". Only three application risks were deemed important: PS6 "Implications of amendments are unclear or not defined"; PT10 "Lack of updating the designed model to incorporate the BIM changes made during construction"; and PT11 "Model not updated along with progress reviews" risk factors. The results showed that the respondents strongly agreed that eight out of ten BIM security risks are relevant in BIM application and are very likely to emerge: S9 "Disclosure of confidential information that need to integrate with BIM programs"; S6 "Lack of understanding or ignoring security policies"; S3 "Disclosure of BIM data"; S10 "Unauthorised access and remote access"; S5 "Weakness in technical controls"; S4 "Weakness in security procedures"; S8 "Corporate surveillance"; and S7 "Opening non-trusted e-mail" risk factors. The ANOVA analysis results revealed a variety of interrelationships between the identified risks based on respondents’ profiles, affect in adapting with application and the use of BIM, this requires to be considered by BIM stakeholders, and developing an international standard for BIM risk management, finding optimal solutions for such these identified factors, in addition to further studies and researches in this field. This thesis investigates the emerging risks from BIM application and delivers an original contribution to knowledge in the form of identifying and classifying BIM application risks, which will enhance the level of stakeholder awareness and avoid any risks associated with usage of BIM in the future projects and assist in the maturity of BIM usage.
APA, Harvard, Vancouver, ISO, and other styles
21

Johnston, Steven. "Encouraging collaboration through a new data management approach." Thesis, University of Southampton, 2006. https://eprints.soton.ac.uk/65549/.

Full text
Abstract:
The ability to store large volumes of data is increasing faster than processing power. Some existing data management methods often result in data loss, inaccessibility or repetition of simulations. We propose a framework which promotes collaboration and simplifies data management. In particular we have demonstrated the proposed framework in the scenario of handling large scale data generated from biomolecular simulations in a multiinstitutional global collaboration. The framework has extended the ability of the Python problem solving environment to manage data files and metadata associated with simulations. We provide a transparent and seamless environment for user submitted code to analyse and post-process data stored in the framework. Based on this scenario we have further enhanced and extended the framework to deal with the more generic case of enabling any existing data file to be post processed from any .NET enabled programming language.
APA, Harvard, Vancouver, ISO, and other styles
22

Wyatt, Tim, of Western Sydney Nepean University, and Faculty of Education. "Rationality, reporting and indicators : improving school and systemic effectiveness through better information management." THESIS_FE_XXX_Wyatt_T.xml, 1997. http://handle.uws.edu.au:8081/1959.7/700.

Full text
Abstract:
The papers in this portfolio are part of the author's efforts to 'make things better' in education, and are the products of over a decade's thinking and research. While most of the papers are written from within the context of the state school system in NSW, their messages apply equally well to school systems elsewhere. The papers reflect an eclectic mix of research perspectives and methodological paradigms. It is suggested that student learning outcomes may be improved if schools specify goals and objectives, make the necessary resources available and establish accountability mechanisms for monitoring and measuring performance. The analysis and synthesis generates critical knowledge, that is, knowledge which is explanatory and interpretive. The desire to assist schools to achieve a position where they are able to (firstly) assemble their own data systems, and secondly to conduct their own analysis of this data and report this to the school community has been the common theme underpinning all the professional work of the author. The works evolved in this portfolio document an evolving process, and one which is far from concluded. There is much further work that could be done. An analysis of the macro and micro-politics of school improvement processes, for example, would be a useful contribution to the literature. For the present purposes, there is a practical need to limit the scope and number of the works presented. The works included all address, in some way, the common theme of improving school and systemic effectiveness through better information management. Hopefully, they have made some small contribution to better understanding the phenomenon, and will in turn positively impact on the performance of schools and school systems
Doctor of Education
APA, Harvard, Vancouver, ISO, and other styles
23

Chien, Li-ching Chang Kai-Hsiung. "Promulgating graduate research and disseminating student information through web applications and database management." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Spring/master's/CHIEN_LI-CHING_2.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Baker, Ali M. "An Investigation of the Interaction between Organizational Culture and Knowledge Sharing through Socialization| A Multi-Level Perspective." Thesis, Nova Southeastern University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10829376.

Full text
Abstract:

Knowledge management (KM) has been determined by many researchers as one of the most important domains within the information systems (IS) field, and knowledge sharing (KS) has been identified as the most vital component of KM. Lack of KS within organizations has been approached from many perspectives. One perspective that has been outlined in recent studies is the organizational culture (OC) perspective, which examines the interaction between OC and KS behaviors.

Although research has been conducted on OC and KS, the findings of recent studies have been contradictory. These conflicts were due to the different operationalization of KS. The purpose of this research was to conduct a multi method study to investigate the interaction between KS and OC in detail. A case study within a Fortune 50 organization was undertaken to address the problem. By focusing on socialization adopted from the socialization, externalization, combination, internalization (SECI) model, the iceberg theory, and the Competing Values Framework (CVF), two questions were explored to address an unexamined area within the body of knowledge. Per the recent calls for research, the questions addressed KS itemized into knowledge seeking and knowledge contributing, and investigated the phenomenon at multiple levels of the organization. The first question examined the interaction between OC and KS via socialization amongst peers for: (a) overall organization, (b) non-managers, (c) first level managers, and (d) second-level managers. The second question examined the interaction between OC and KS via socialization amongst various levels for: (a) subordinates and managers in overall organization, (b) non-managers and first level managers, and (c) first level managers and second level managers.

Data were collected through 82 surveys, 23 interviews, 23 observations, and company records for the calendar year of 2017 to provide multiple types of data for triangulation. The quantitative data were analyzed through descriptive statistics, correlation tables, multivariate analysis of covariance (MANCOVA), and visualization. The qualitative data were analyzed through open coding, axial coding, and selective coding. The combined results were triangulated to reach the conclusions.

The MANCOVA displayed a significant interaction between OC and KS via socialization. Furthermore, the triangulated results showcased that perceived bureaucratic culture and perceived competitive- bureaucratic culture had a negative relationship with KS via socialization amongst peers, knowledge seeking for manager to subordinate, and subordinate to manager, but not for between level knowledge contributing. While perceived clan culture had a positive relationship with KS via socialization amongst peers, and for knowledge seeking from managers, but not for between level knowledge contributing. Perceived competitive culture was only discovered to have a negative relationship with knowledge seeking for level two managers, while having a positive relationship with knowledge contributing to employees, and knowledge contributing amongst peers with knowledge seeking as moderating variable. The various organizational levels also showcased distinct results which requires further investigation. Future research suggestions were made to extend the body of knowledge through various directions, alongside an IS solution recommendation for organizations to improve KS.

APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Yu-Hsiang. "Reinforce customer satisfaction through enterprise resource planning and supply chain management integration." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3276.

Full text
Abstract:
The purpose of this project is to try and establish a blueprint for integrating Enterprise Resource Planning (ERP) and Supply Chain Management (SCM). ERP and SCM have become popular in many industries because they help companies improve their Information Systems (IS) which helps support their operational goals. New technology is being used in resource planning and e-commerce and a stable supply chain helps corporations integrate many basic applications. This helps facilitate smooth supplier-customer interactions while minimizing transaction costs. This project is trying to provide a way in which to implement ERP systems properly into SCM. It should result in improved business performance and client satisfaction.
APA, Harvard, Vancouver, ISO, and other styles
26

Arora, Savinder S. "A symbolic model for the enterprise integration of information technology through strategic alignment." Thesis, University of East London, 2002. http://roar.uel.ac.uk/1292/.

Full text
Abstract:
The widespread recognition of Information Technology (IT) as either an agent of enterprise transformation or as a driver of new enterprise forms is due to several factors. Grove (1996) and Lewis (2000) suggests that chief amongst them is the ceaseless and pace of change in both the qualitative and quantitative nature of IT with its use at every level of the enterprise hierarchy, This research study analyses the rise and fall of strategic IT planning tools and with an aim to achieve business impact. The study identifies new approaches for achieving alignment, by considering the concept of the `adaptive enterprise. ' Impact factors are developed from previous research studies covering effectiveness, efficiency, user needs, synergy and market competitiveness. Adaptation behaviours are derived from studies performed by Haekel (1999) with enterprise cultures types researched developed by Trompenaars (2000). Hypothesis aimed at investigating the relationships between these factors are then derived. Initial complex statistical analysis reveal limited significances in the enterprises capability of interpreting and actioning IT solutions effectively to deliver improvements in competitiveness, and derive both internal and external synergy (collaboration), respectively. The research conducted then takes a new path, discovering a new 'middle ground' between reductionist and holistic approaches. For example, Chia (1998) proposes that IT research has tended to focus on the consequences of IT with models based on attempts to algorithmically compress the elements of an enterprise, implying modelling is a reductionist approach. This research discovers new areas of adaptation behaviours and the associated the need to balance the polarisation of views between internal communities of enterprises it also suggests optimum adaptation conditions for both fulfilment and project driven cultures. The research study concludes with implications and suggestions for new approaches and tools to assist IT researchers and consultancy organisations.
APA, Harvard, Vancouver, ISO, and other styles
27

Nenova, Karamfilka Krasimirova. "Towards effective biomedical knowledge discovery through subject-centric semantic integration of the life-science information space." kostenfrei, 2009. http://mediatum2.ub.tum.de/node?id=676627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Penev, Tsvetan [Verfasser]. "Supporting the Aircraft Access to System Wide Information Management through Data Compression / Tsvetan Penev." München : Verlag Dr. Hut, 2018. http://d-nb.info/1164294008/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Salamntu, Lumka Thami. "Understanding the achievement of benefits through use of Enterprise Content Management (ECM) systems in public sector organisations." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/20946.

Full text
Abstract:
Public sector organisations are implementing the Enterprise Content Management (ECM) system because of their large volume of unstructured content which led to documents being stored in various repositories. This made it difficult for such organisations to access, control and locate documents. ECM systems are therefore implemented to address the uncontrolled manner in which documents are saved, stored and accessed by employees. There were a number of other anticipated benefits. This study aims to explore and understand the achievement of benefits through the use of ECM systems and to determine the barriers preventing the benefits from being achieved in public sector organisations. The study used a qualitative research approach. Two cases of the public sector organisations were investigated in a cross-sectional study. Data was collected through semi-structured interviews and by viewing organisational documentation. Data was analysed using thematic analysis with elements of deductive and inductive approaches. An ERP benefits framework and the Enhanced Impact framework formed a theoretical base and were used as a lens for collecting and analysing data.
APA, Harvard, Vancouver, ISO, and other styles
30

Groepe, Westonio Sarien. "SARS's IKM strategy : an external perception through the eyes of the media." Thesis, Stellenbosch : University of Stellenbosch, 2006. http://hdl.handle.net/10019.1/3481.

Full text
Abstract:
Thesis (MPhil (Information Science))--University of Stellenbosch, 2006.
South Africa held its first democratic election in 1994. At the moment, government has to address many injustices of the past. For this they need funds. The years before 1994 saw South Africa isolated from the rest of the world as a result of its human rights track record. As a result of this isolation, the government has not only inherited injustices that need to be addressed, but it also inherited debt, which needs to be repaid with interest. Therefore, the South African Revenue Service is tasked with the responsibility to ensure an inflow into government coffers. The South African Revenue Service has been constituted as an autonomous body in 1997. Although the task of revenue collection seems mundane, its enormity cannot be over-emphasised. The revenue it collects is needed to address issues of inequality such as: • equality of education; • restoration of basic living conditions, such as shelter and health care; and • upgrading and retaining skills in order to compete globally. The general perception is that the South African Revenue Service has achieved much through transformation projects in a very short period. Furthermore, the President is embarking on a mission to unite the African continent through various initiatives. Currently, perception gained from the media is that Africa is corrupt and lacks the economic will to change. The current study was undertaken to establish whether the model used by the South African Revenue Service, as perceived by the media, is well received. A positive media perception could pave the way for other government organisations as well as South Africa’s neighbours to enter into an information and knowledge sharing partnership with the South African Revenue Service to the benefit, not only of the country, but also of the continent as a whole. The conclusion drawn is that the South African Revenue Service is indeed an example to be proud of. They seem to have formed partnerships with business, professional bodies and foreign agents as well as with the ordinary man in the street to engage successfully in discussions, which will ultimately lead to the mutual benefit of all its stakeholders, internal and external. Finally, from a media perspective, the organisation is perceived to have done South Africans proud; however, it is also clear from media reports that room for improvement exists.
APA, Harvard, Vancouver, ISO, and other styles
31

Berger, Monica. "Critical Thinking is a Life Relevancy: A Hospitality Management Student Case Study." Haworth, 2008. http://hdl.handle.net/10150/299602.

Full text
Abstract:
This article describes a library workshop for freshman hospitality management students enrolled at New York City College of Technology, CUNY, which features a focus on critical thinking. An active learning experience uses an element of surprise. Students evaluate the website of a bankrupt company where information about the company’s situation is hidden or not present. When the instructor guides the class to find unbiased information from newspapers, many students begin to think critically about sources.
APA, Harvard, Vancouver, ISO, and other styles
32

Harris, Mark. "THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAINING." VCU Scholars Compass, 2010. http://scholarscompass.vcu.edu/etd/2208.

Full text
Abstract:
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition, managers creating security policies rely heavily on security guidelines, which are also technically oriented. This study created a series of information security training videos that were viewed by four groups of managers. One video discussed the socio-technical aspects of security, another discussed only the social aspects of security, the third detailed only the technical aspects of security, and the fourth was a control video unrelated to information security. Each group was shown the video, and after this viewing, each group’s values toward information security were ascertained and converted into security objectives following Keeney (1992)’s value-focused thinking approach. Each group’s list of security objectives were used as the input to Schmidt (1997)’s ranking Delphi methodology, which yielded a more concise and ranked list of security objectives. The results thus obtained, indicate that manager’s objectives towards information security are affected by the nature and scope of the information security training they receive. Information security policy based on each group’s value-based security objectives indicate that manager’s receiving socio-technical training would produce the strongest information security policy when analyzing the value-focused thinking list of security objectives. However, the quality of security policy decreases when analyzing the ranked Delphi list of security objectives, thus providing mixed results. The theoretical contribution of this research states that technically oriented information security training found in corporations today affects manager’s values and security objectives in a way that leads them to create and support technically oriented security policies, thus ignoring the social aspects of security. The practical contribution of this research states that managers should receive socio-technical information security training as a part of their regular job training, which would affect their values and lead to socio-technical information security policy based on the manager’s socio-technical security objectives. The methodological contribution of this research demonstrates the successful use of the value-focused thinking approach as the input to the ranking of the Delphi methodology.
APA, Harvard, Vancouver, ISO, and other styles
33

Kirstein-Jost, Simone. "Auflösung von Anaphern im Rahmen der Informationsextraktion für Ontologie-Management im Bereich Life Sciences." Hamburg Kovač, 2009. http://d-nb.info/999217755/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Jao, Irwin Yui-Wen. "Capability enhancement through cross-border contract manufacturing alliances : a study of Taiwanese information technology firms." Thesis, London Business School (University of London), 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.244179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Tsagdis, Dimitrios. "Rehabilitating process and knowledge management through research for sustainable organisational benefits (Bringing the lab to life)." Thesis, University of Lincoln, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.393071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Jeong, Jin Su. "Web-based feedback system: the life cycle management as continuous maintenance of apartment facility information." Thesis, Texas A&M University, 2006. http://hdl.handle.net/1969.1/4268.

Full text
Abstract:
This research investigates the feasibility of web technology as a means of delivering facility information for better support of facility operations and maintenance. This study proposes a web-based feedback system as a pragmatic solution to the limitations of current facility management (FM) processes, increasing the efficiency of these processes via web technology. In practice, work orders and records are often misplaced, resulting in reduced efficiencies, redundancies, and time-consuming, costly tasks. This problem may be overcome by use of a system that stores information digitally and provides a web-based interface. The interface could allow operations personnel to create documentation, share and monitor work orders, provide feedback for service online, and facilitate communication between facility teams. The benefit for a FM department is that it can receive feedback on performance, which would improve the quality of service and build a record of practical experiences. In this research, the software was tested using two types of prototype testing: first, system testing to evaluate functionality, usability and capability; and second, a post-task questionnaire survey was conducted to test and review the concept, interface, and usability of the system. Facility Management Industry Advisor Council (FMIAC) members answered the questionnaires after using the system posted on the web. By using web-based feedback system, a facility web site can be created and maintained easily through a standard web browser. The questionnaires from the FMIAC members were analyzed to test research questions. The tests show that the software aids facilities managers in maintaining living documents of their facilities.
APA, Harvard, Vancouver, ISO, and other styles
37

Kamal, Khurram. "Utilisation of embedded information devices to support a sustainable approach to product life-cycle management." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/8137.

Full text
Abstract:
The huge landfills from solid waste generated by the massive utilisation of different products from domestic sources are badly affecting the environment. About 70% of the solid municipal waste, two thirds of which comprises of household waste, is dumped as landflll all over the world. For efficient product lifecycle management via upgrade, maintenance, reuse, refurbishment, and reclamation of components etc., storage of product related information throughout its lifecycle is indispensable. Efficient use of information technology integrated with product design can enable products to manage themselves in a semiautomatic and intelligent manner. It means that products themselves should contain informationú that what to do with them when they are of no use. More advanced products may locate themselves and communicate with their recyclers through internet or some other communication technology. In this regard, different types of technologies have been investigated. These technologies are broadly classified as passive embedded information devices and active embedded information devices. Methods of automatic identification in combination with information technology can act as passive Embedded Information Devices (EID) to make products intelligent enough in order to manage associated information throughout their life cycles. Barcodes, Radio Frequency Identification tags, and a new technology called i-button technology were investigated as possible candidates for passive EIDs. The ibutton technology from the perspective of product lifecycle management is presented for the very first time in the literature. Experiments demonstrated that RFID and i-button technologies have potential to store not only the static but dynamic data up to some extent, such as small maintenance logs. As passive EIDs are unable to store the sensory data and detailed maintenance logs regarding a product, therefore, in addition to these demonstrators for passive EIDs, an advanced active EID demonstrator for lifecycle management of products with high functional complexity is also presented. Initially, the idea is presented as smart EID system that r~cords the sensory data of a refrigerator compressor and stores the detailed maintenance logs into the product itself. However, this idea is extended as intelligent EID that is implemented on a gearbox in order to predict the gearbox lifetime under an accelerated life test. This involves developmen,t of a novel on-chip life prediction algorithm to predict the gearbox lifetime under accelerated life testing scenario. The algorithm involves a combination of artificial neural networks and an appropriate reliability distribution. Results of accelerated life testing, simulation for the choice of appropriate reliability distribution and the life prediction algorithm are presented. Bi-directional communication software that is developed in order to retrieve lifecycle data from the intelligent EID and to keep intelligent EID updated is also explained. Overall, embedded information devices can be proposed as a good solution to support a sustainable approach to lifecycle management.
APA, Harvard, Vancouver, ISO, and other styles
38

Shariat, Zadeh Navid. "Standardized architectures for information integration and life cycle management in the domain of production engineering." Doctoral thesis, KTH, Industriell produktion, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-206381.

Full text
Abstract:
While design and management of production systems based on digital models brings benefits, the communication of models comes with challenges since models typically reside in a distributed heterogeneous IT environment using different syntax and semantics. Coping with heterogeneity requires an appropriate integration strategy and methodology. One main paradigm to integrate information and consequently IT-systems is to deploy standardized information models. In particular, ISO 10303 STEP has been endorsed as a suitable standard to exchange a wide variety of product manufacturing data. The representation and integration of product, process and production resources information using different STEP application protocols are well covered and extensively investigated by many researchers. However, the information representation and integration of logical relations of material flow such as product routing, and its integration with factory layout information has been less subject of research focuses. Hence, this thesis first contributes to identifying, describing and clarifying information requirements for an integrated representation of material flow logic and plant layout using the STEP standard. One the other hand, service-oriented IT-tool integration solutions are increasingly deployed for the data and tool interoperability, especially with the evolution of Open Services for Lifecycle Collaboration (OSLC) whose focus is on the linking of data from heterogeneous software tools. OSLC focuses on the integration of the most common concepts across domains. Assuming a loosely coupled distributed architecture of IT-tools and services, OSLC adopts the Linked Data (LD) approach to ensure data consistency across the data sources. Thus the thesis studies the use of OSLC for tool integration and has found that it cannot be practiced independently for all types of integration in the production engineering domain. Therefore, in practice, there should be a combination of the standardized information and linked data approaches to facilitate the integration process. Thus, this thesis investigates the integration applicability of linked data and OSLC, the principles behind them, and criteria to identify where to use which approach. In addition, the thesis explores the synergy between the standardized information and linked data approaches and consequently suggests an approach based on a combination of these. Further, different computer applications in industrial cases were implemented to verify the suggested approaches. Finally the thesis is concluded with a discussion and suggestions for future work.

QC 20170503

APA, Harvard, Vancouver, ISO, and other styles
39

Ketcham, Barbara Lynn. "Incorporating information value into Navy tactical data system system configuration management through the Delphi method." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25994.

Full text
Abstract:
There is a difficulty in incorporating information value judgments into configuration management decisions regarding command control systems. This thesis reviews two command and control process models, decision theory as it relates to command and control and the current tactical data link configuration management method. The Delphi method is discussed and a means of incorporating its use into configuration management is introduced. The Delphi method allows a systematic gathering of subjective information from selected respondents which then enables formulation of a group position. Use of this method would enable subjective assessments, such as perceived operational impact of tactical data link changes, to be systematically considered in Navy tactical data link configuration management decisions
APA, Harvard, Vancouver, ISO, and other styles
40

Banks, Alan Drew. "Deriving competitive advantage through a sophisticated information technology infrastructure : a look at Federal Express and UPS." Thesis, Massachusetts Institute of Technology, 1989. http://hdl.handle.net/1721.1/14503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Komoroski, Christine L. "Reducing cycle time and increasing value through the application of knowledge value added methodology to the U.S. Navy Shipyard planning process." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Dec%5FKomoroski.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, December 2005.
Thesis Advisor(s): Thomas Housel. Includes bibliographical references (p. 65-66). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
42

Ansah, Yaw Boamah. "Enhancing Profitability of Pond Aquaculture in Ghana through Resource Management and Environmental Best Management Practices." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/51122.

Full text
Abstract:
The accelerating pace of growth of aquaculture in sub-Saharan Africa has received much positive appraisal because of the potential of the industry to contribute to economic development and food security by providing jobs and animal protein. Adoption of best management practices (BMPs) holds the potential to ameliorate the related environmental impacts of aquaculture, such as in the amounts of nutrients and sediment that will enter natural water bodies from earthen pond effluents. The goals of this study were to characterize adoption of aquaculture BMPs on small-scale, pond-based farms in Ghana, and to assess selected economic, social, and environmental outcomes of BMP adoption. Two BMPs: 1) water reuse, and 2) commercial floating feeds, were investigated for adoption by pond-based fish farmers in Ghana. I conducted my study in Ghana using on-farm experiments involving intensive monitoring of water quality and growth of Nile tilapia (Oreochromis niloticus) over two production cycles. Additionally, I administered a baseline survey to 393 (and a follow-up survey to 160) fish farmers. I determined the best model for modelling farmed Nile tilapia growth with multi-model inference based on Akaike information criterion (AIC), the profitability of adopting BMPs with stochastic enterprise budgets and, social welfare impact with the Economic-Surplus model. I used a Markov model to predict the equilibrium rate of adoption of the two BMPs and determined the impact of BMP adoption on the reduction of pollutant loading with the Minimum-Data method of the Tradeoffs Analysis (TOA-MD). My results showed that the logistic model is a better alternative to the von Bertalanffy model for modelling the growth of Oreochromis niloticus under pond aquaculture conditions. There were no significant differences in fish weight between the water re-use BMP and the use of new water. Adoption of the commercial floating feed BMP resulted in a 100% increase in fish final weight and yield, and in higher profitability, compared to the sinking feed type. Probability of making a profit was highest (72%) in the scenario with commercial feed and self-financing. Net present values (NPV) of about US$ 11 million and US$ 375 million could be obtained from the adoption of commercial floating feed and Genetically-Improved Farm Tilapia (GIFT) strain, respectively, in Ghana. Hence, any innovation that has a significant impact on fish yield also will have a significant impact on mean NPV and social welfare. However, I identified a number of potential negative ecological and genetic impacts exist from introducing the GIFT strain into Africa from Asia. Although considered low-intensity production systems, nutrients and solids in study ponds were found to be higher than levels expected in intensive culture ponds by wide margins. Pond water quality was significantly higher with commercial floating feed. The water-reuse BMP also prevented pollutants from leaving ponds altogether for the number of cycles for which pond water was reused, especially if associated BMPs such as rainfall capture and avoidance of water exchange are observed. Significant reductions in the loading of all water quality variables (nitrogen, phosphorus, solids, and BOD5) could be achieved with the adoption of the recommended feed type in Ghana. Adoption of the water reuse BMP has the potential to cause pollution reductions of 200% - 3,200% above that from the floating feed BMP. The strongest influence on the combined adoption of these BMPs were from : farmer's awareness of the feed BMP, perceived necessity and relative profitability of the water reuse BMP, and farmer's years of experience. A combination of central media (workshops), demonstrations, and lateral diffusion was found to be the most effective channel for disseminating these BMPs. Maximum adoption rate of the feed BMPs was estimated to be 38% - 58%. Also, US$ 6,000/year and US$12,000/year need to be paid per 0.6 ha pond surface area to push adoption of the feed BMP to 50% and 70%, respectively. Hence, to ensure the successful adoption of aquaculture BMPs, I recommend that regular well-planned workshops be organized to create awareness and a conducive atmosphere to target farmers at multiple stages of the innovation decision process. Incentives and effective dissemination will encourage the adoption of these and other environmental BMPs. Feed costs need to be lowered in order to encourage the adoption of commercial floating feed in Ghana. Future analyses could quantify the differences in production costs between using the two water types, to reveal the possible higher relative profitability of pond water reuse over draining ponds after each production cycle. Also, African governments are advised to commission rigorous baseline and ecological risk analyses before adoption of the GIFT strain. Improvements in management practices and infrastructure could increase the yield and profitability of the local strains even if genetically-improved strains are not introduced.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
43

Lomas, Elizabeth. "An autoethnography exploring the engagement of records management through a computer mediated communication focused co-operative inquiry." Thesis, Northumbria University, 2013. http://nrl.northumbria.ac.uk/14398/.

Full text
Abstract:
This thesis is an autoethnography exploring the engagement of records management (RM) through the vehicle of a computer mediated communication (CMC) focused co-operative inquiry. CMC is defined as, “communication that takes place between human beings via the instrumentality of computers” (Herring, 1996, p.81). The PhD stance was that with the advent of new technologies, such as CMC, the role and place of RM has been challenged. RM practitioners needed to evaluate their principles and practice in order to discover why RM is not uniformly understood and also why it fails to engage many CMC users and information professionals. The majority of today’s information is generated as the result of unstructured communications (AIIM, 2005 and 2006) that no longer have a fixed reality but exist across fragmented globalised spaces through the Cloud, Web 2.0 and software virtualisation. Organisational boundaries are permanently perforated and the division between public and private spaces are blurred. Traditional RM has evolved in highly structured organisational information environments. Nevertheless, RM could lie at the heart of the processes required for dealing with this splintered data. RM takes a holistic approach to information management, establishing the legislative requirements, technical requirements and the training and support for individuals to communicate effectively, simultaneously transmitting and processing the communications for maximum current and ongoing organisational benefits. However RM is not uniformly understood or practiced. The focus of the thesis was to understand how RM engagement can and should be achieved. The research was conducted by establishing a co-operative inquiry consisting of 82 international co-researchers, from a range of disciplines, investigating the question, ‘How do organisations maximise the information potential of CMC for organisational benefit, taking into account the impact of the individual?” The PhD established a novel approach to co-operative inquiry by separating, managing and merging three groups of co-researchers (UK Records Managers, UK CMC users, international Records Managers and CMC users). I was embedded as a co-researcher within this wider inquiry personally exploring as an autoethnography the relevance of RM to the wider research question, the ability of RM practitioners to advocate for RM and the co-researchers’ responses to the place of RM within this context. The thesis makes several contributions to the research field. It examines how records managers and RM principles and practice engaged through the inquiry, articulating the reasons why users sometimes failed to engage with RM principles and practice, and what assists users to successfully engage with RM. It was found that national perspectives and drivers were more significant as to whether or not individuals engaged with RM concepts than age, gender or professional experience. In addition, users engaged with RM when it was naturally embedded within processes. In addition, as a result of the inquiry’s discussions and actions, the thesis suggests that RM principles and practice need to be refined, for example in regards to the characteristics that define a record. In this respect it concludes that there is rarely likely to be an original archival record surviving through time given the need for migration. The research delivered a novel approach to co-operative inquiry whereby merging groups through time produced new learning at each merger point. The thesis recommends further research to build upon its findings.
APA, Harvard, Vancouver, ISO, and other styles
44

Doucette, Wendy C. "Organized at Last!: Free, Immediate Time and Project Management Hacks That Will Transform Your Life." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etsu-works/5361.

Full text
Abstract:
Change the way you manage your time and your work for good, right now, today! If your desktop is covered with icons, you have multiple flash drives, you never back up anything or you re-do work you're pretty sure you've already done because you can't find it or aren't sure which is the latest version, this is for you! Using easy, practical principles from knowledge and project management, we'll talk about PC file structure and versioning; physical and virtual storage and backups; bookmark management; feeds and alerts; effective e-mail; time management; and cloud computing. The secret to never procrastinating again will also be revealed!
APA, Harvard, Vancouver, ISO, and other styles
45

Winkler, Christian [Verfasser]. "Nomadic projection within reach - overcoming deficiencies in nomadic information management through mobile projected interfaces / Christian Winkler." Ulm : Universität Ulm. Fakultät für Ingenieurwissenschaften und Informatik, 2016. http://d-nb.info/1082509558/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Schuster, Alfons. "Supporting data analysis and the management of uncertainty in knowledge-based systems through information aggregation processes." Thesis, University of Ulster, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.264825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Ehlin, Max. "An overview of Product Service System through Integrated Vehicle Health Management in an information sensitive industry." Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75861.

Full text
Abstract:
Purpose – The research purpose is to enhance knowledge of how organizations can form a PSS through an IVHM system when information is sensitive. Method – A single case study design of abductive approach was used, with data collection through six semi-structured interviews. Findings – A system combining IVHM and PSS has many potential benefits, however there are several challenges that need to be overcome in order to implementing a successful model. Theoretical implications – This study treads a new area not previously explored in the literature when it combines PSS and IVHM, which relies heavily on information flow to succeed, with a case of information sensitivity. This study hence explores a problematic area for either PSS or IVHM, expanding the current literature and providing initial suggestions of how to navigate this. Practical implications – Firstly, it shows managers the challenges that comes with implementing PSS-IVHM and increasing involvement in the customers’ processes. Secondly, this study shows the theoretical and general challenges of PSS-IVHM and applies the case study’s perspective of information management, granting managers a larger foundation of knowledge before starting their initiatives of PSS-IVHM. Limitations and future research – This study provides a limited amount of empirical data. Therefore, future research should focus on increasing and widening data collection. The study suggests there is a considerable challenge in conservatism within the defence industry and therefore future research is suggested to explore how change management can combat this challenge.
APA, Harvard, Vancouver, ISO, and other styles
48

Mallo, Christine Vera. "An exploratory study into the current status of knowledge management within an academic library / by Christine Vera Mallo." Thesis, University of Pretoria, 2001. http://hdl.handle.net/10394/3692.

Full text
Abstract:
Aim of study: The purpose of this study is to investigate the current knowledge management status within the Academic Information Service at the University of Pretoria. Research method: A literature study was conducted to establish the nature and value of knowledge management for organizations. A questionnaire was used to obtain reliable information with regard to the current value and nature of knowledge management within the Academic Information Service at the University of Pretoria. Core findings: Within an academic library like the Academic Information Service at Pretoria, there exist a certain misconception that libraries are already doing knowledge management for years. The management of knowledge for clients, and providing knowledge and information to the client are seen as knowledge management. It was indicated that within the Academic Information Service there is not much attention given to the management of tacit knowledge within the organization. This shows that libraries aren’t doing knowledge management for years. They are doing explicit management of knowledge but not tacit management of organizational knowledge. Within this study it is stressed why this tacit knowledge is so important for an organization to exist and compete within these turbulent times we live in. The academic information service is not managing their tacit knowledge to the fullest potential and for benefit of the organization. There is no culture or incentives conducive to knowledge sharing within the library. The existing technology namely the intranet and portal aren’t re ally enablers for knowledge management. There exist a lot of barriers to knowledge management within the AIS that should be attended to. A knowledge management strategy is suggested with a lot of shifts in connection to the culture of the organization, incentives and information technology.
Thesis (MIT)--University of Pretoria, 2002.
APA, Harvard, Vancouver, ISO, and other styles
49

Grosshans, Brett. "Strategies for Reducing Professional Turnover in Information Technology." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6033.

Full text
Abstract:
The information technology (IT) industry workforce in the United States is expected to increase by approximately 50,000 jobs through the year 2024, creating opportunities for employees to change jobs if they are not satisfied. Replacing talented IT professionals can cost a business as much as 150% of the salary of the outgoing employee. The purpose of this descriptive single case study was to identify strategies successful IT business leaders used to reduce voluntary turnover among IT professionals. The research population was 4 leaders from an IT business in southeastern Virginia, who oversee supervisory and hiring. The conceptual framework was Herzberg's 2-factor theory. The data were collected using semistructured interviews and reviews of applicable organization documents. Yin's 5 phases of analysis were the means to process the data resulting in the 5 themes of flexibility, individual, recognition, team, and work-life balance. Recognition and flexibility were the 2 key themes that made significant contributions to the organizational culture and success for the business. The implications for social change include companies using unspent replacement cost dollars to invest in local communities, improve the local economic growth, and provide incentives for employee quality of life and improved work environment.
APA, Harvard, Vancouver, ISO, and other styles
50

Twisdale, Jerry Allen. "Exploring SME Vulnerabilities to Cyber-criminal Activities Through Employee Behavior and Internet Access." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5428.

Full text
Abstract:
Cybercriminal activity may be a relatively new concern to small and medium enterprises (SMEs), but it has the potential to create financial and liability issues for SME organizations. The problem is that SMEs are a future growth target for cybercrime activity as larger corporations begin to address security issues to reduce cybercriminal risks and vulnerabilities. The purpose of this study was to explore a small business owner's knowledge about to the principal elements of decision making for SME investment into cybersecurity education for employees with respect to internet access and employee vulnerabilities. The theoretical framework consisted of the psychological studies by Bandura and Jaishankar that might affect individual decision making in terms of employee risks created through internet use. This qualitative case study involved a participant interview and workplace observations to solicit a small rural business owner's knowledge of cybercriminal exploitation of employees through internet activities such as social media and the potential exploitation of workers by social engineers. Word frequency analysis of the collected data concluded that SME owners are ill equipped to combat employee exploitation of their business through social engineering. Qualitative research is consistent with understanding the decision factors for cost, technical support, and security threat prevention SME organizational leadership use and is the focus of this study as emergent themes. The expectation is that this study will aid in the prevention of social engineering tactics against SME employees and provide a platform for future research for SMEs and cybercriminal activity prevention.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography