Teses / dissertações sobre o tema "Information technology – general and others"

Siga este link para ver outros tipos de publicações sobre o tema: Information technology – general and others.

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Information technology – general and others".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.

1

Le, hir Boris. "Capturing Information and Communication Technologies as a General Purpose Technology". Phd thesis, Ecole Centrale Paris, 2012. http://tel.archives-ouvertes.fr/tel-00997417.

Texto completo da fonte
Resumo:
This thesis aims to study Information and Communication Technologies (ICT) as a General Purpose Technology (GPT) and their role in the labor productivity evolution in the United States and Europe during recent decades. This thesis is organized in three parts corresponding to the fundamental GPT features: the wide possibilities for development, the ubiquity of the technology and the ability to create large technological opportunities. The first part depicts, at first, the innovation in ICT, beginning with a short historical review of ICT inventions followed by the analysis of current data on innovation in this field. In particular, it shows how the US was better than the European countries in inventing ICT until now. Second, this first part makes an inventory of measurement difficulties due to the rate and the nature of the change created by such technologies. The second part of the thesis deals with the ubiquitous nature of ICT. It first describes the ICT diffusion across countries and industries and reviews the economic literature on the direct contribution of ICT on labor productivity growth in the US and Europe. The next chapter studies the factor demand's behaviour in sectors that are either ICT producers or ICT intensive users. The third part focuses on the ICT ability to create opportunities for complementarity innovations. Firstly, it identifies the nature of ICT complementary innovations and the corresponding efforts. It shows, then, that national accounts must be improved in order to take these efforts into account as investments. Secondly, this part shows that, among the eleven European countries studied, the problem is highly concentrated in a few countries that invest less both in ICT and in innovative assets and that these two types of effort are complementary.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Ilharco, Fernando. "Information technology as ontology : a phenomenological investigation into information technology and strategy in-the-world". Thesis, London School of Economics and Political Science (University of London), 2002. http://etheses.lse.ac.uk/299/.

Texto completo da fonte
Resumo:
This dissertation offers a phenomenological approach to the comprehension of Information Technology (IT) and Strategy, and of the relationships between these two phenomena. We argue that in order thoughtfully to understand the manifold connections between IT and Strategy, their contradictions, shortcomings, and possibilities, one has to rely on the essence of each of these phenomena. The rationale of this approach implied the need to make explicit the ontological assumptions on which the investigation relies. An essential uncovering of that which IT and Strategy are can only take place as long as we lay bare a primary position on the nature of that which is. Martin Heidegger's Being and Time and, to a lesser extent, the theory of autopoiesis are the foundations of this investigation. We claim that these theories are paradigmatically consistent and show relevant complementarities, namely in what concerns the issues of action information, and knowledge. The matching of these two theories provides the ontological and epistemological grounds of the investigation. Within this fundamental setting we argue that IT and Strategy will only essentially show up as long as they are accessed in-the-world in which they are. The research applies the phenomenological method of investigation in its original form as developed by Edmund Husserl. However we extend the Husserlian formulation in a last phase by using the arguments of Heidegger on the opening up of possible concealed meanings of phenomena. The method sets the boundaries of the research. IT and strategy are phenomenological analysed not as empirical objects, event, or states of affairs, but as intentional objects of consciousness. These are formally indicated from the outset of the investigation as the ITness of IT and the Strategyness of Strategy. The central conclusions of the investigation are that (1) IT is an ontological phenomenon substantively penetrating the being-in-the-world we, ourselves, are; and, (2) Strategy, essentially choosing to choose, has been unfolding throughout History guided by the concealed meaning of a striving for an authentic identity. These essential notions uncover a complex set of relationships between the phenomena. Those relationships are thus described and characterised. We also show that although phenomenology is not empirical its results have many important implications for the empirical world.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Tanaka, Shunsuke 1965. "Information technology planning framework for Japanese general contractors". Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9012.

Texto completo da fonte
Resumo:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 2000.
Includes bibliographical references (leaves 73-74).
New information technology (IT) developments continue to have a significant impact on the Architectural/Engineering/Construction (A/E/C) industry. However, the issue of whether A/E/C organizations are receiving adequate returns from their IT investments remains an important managerial concern. Recently, Pefia-Mora, Vadhavkar, Perkins, and Weber introduced a strategic IT planning framework for construction companies, which is composed of four steps: environmental scan, internal scrutiny, IT diffusion analysis, and IT investment modeling. It analyzes the external and internal IT conditions of a firm, defines the diffusion stage of IT in a firm and finally, evaluates the effects of investments on IT projects. This thesis examines the validity of applying the above-mentioned framework to the Japanese construction industry and in greater detail to Japanese general contractors, using the Kajima Corporation, one of the largest general contractors in Japan, as a case study. The Kajima Corporation is currently developing an IT project called Linkage of Information for a New Construction System (henceforth LINCS). This synthetic information network system connects design with construction work. By using the strategic IT planning framework, I evaluate LINCS in terms of its strategy and the effects of Kajima's investment on this system.
by Shunsuke Tanaka.
S.M.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Sezgin, Emre. "Itmem - Information Technology Management Enhancement Model: Assessment Of Information Technology Use In Organizations". Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612353/index.pdf.

Texto completo da fonte
Resumo:
This study proposes a new model for the assessment of information technology (IT) use in public and private companies, which is called ITMEM- Information Technology Management Enhancement Model. This model aims to assist decision making processes in information technology management. For this purpose, a tool is developed to explore strengths and weaknesses of a company in IT use. The model was developed upon a three-folded structure including (1) academic studies in technology management, (2) best practices which are developed for control over operations and processes including COBIT, CMMI and ITIL, and (3) standards about IT management and IT security. The conceptual framework of ITMEM is based on technology management process assessment model of M.J. Gregory. Methodological triangulation approach is adopted for the model for retrieving valid and reliable results. Triangulation consists of (1) semi structured interview, (2) presented company documents and (3) questionnaire developed upon relevant academic researches, best practices and standards. ITMEM was practiced on ten domestic and experienced companies in software &
development and manufacturing industries which were appraised in or in progress of being appraised in CMMI. The study revealed the benefits and deficiencies of IT use in the company. It also provided information for decision makers about IT value within companies, and demonstrated the effects of best practices and standards over IT use.The reported findings should be valuable assets to researchers studying on IT management and IT use in organizations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Zhu, Ping. "Quantifying information flow with constraints". Thesis, City University London, 2010. http://openaccess.city.ac.uk/12101/.

Texto completo da fonte
Resumo:
Quantifying flow of information in a program involves calculating how much information (e.g. about secret inputs) can be leaked by observing the program's public outputs. Recently this field has attracted a lot of research interest, most of which makes use of Shannon's information theory, e.g. mutual information, conditional entropy, etc. Computability entails that any automated analysis of information is necessarily incomplete. Thus quantitative flow of analyses aim to compute upper bounds on the sizes of the flows in a program. Virtually all the current quantitative analyses treat program variables independently, which significantly limits the potential for deriving tight upper bounds. Our work is motivated by the intuition that knowledge of the dependencies between program variables should allow the derivation of more precise upper bounds on the size of flows, and that classical abstract interpretation provides an effective mechanism for determining such dependencies in the form of linear constraints. Our approach is then to view the problem as one of constrained optimization (maximum entropy), allowing us to apply the standard technique of Lagrange multiplier method. Application of this technique turns out to require development of some novel methods due to the essential use of non-linear (entropy) constraints, in conjunction with the linear dependency constraints. Using these methods we obtain more precise upper bounds on the size of information flows than is possible with existing analysis techniques.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Le, Hir Boris. "Capturing Information and Communication Technologies as a General Purpose Technology". Thesis, Châtenay-Malabry, Ecole centrale de Paris, 2012. http://www.theses.fr/2012ECAP0046/document.

Texto completo da fonte
Resumo:
Cette thèse a pour objet l'étude des Technologies de l'Information et de la Communication (TIC) en tant que Technologie Générique (TG) ainsi que leur rôle dans l'évolution de la productivité du travail aux Etats-Unis et en Europe durant les dernières décennies. La thèse est constituée de trois parties axées chacune sur l'une des trois propriétés fondamentales des TG: le progrès rapide de la technologie, l'ubiquité de la technologie et la capacité à créer des opportunités technologiques. La première partie décrit, dans un premier chapitre, l'innovation dans le domaine des TIC, en commençant par un bref historique de ces technologies, suivie d'une analyse des données contemporaines sur l'innovation dans ce domaine. Elle montre en particulier comment les Etats-Unis ont été, jusqu'à présent, plus performants que les pays Européens dans le développement des TIC. Dans un deuxième chapitre, cette première partie inventorie les difficultés de mesures induites par la vitesse et la nature du changement généré par ces technologies. La seconde partie de la thèse traite de la nature ubiquitaire des TIC. Elle décrit d'abord la diffusion des TIC au cours du temps à travers les pays et les secteurs économiques, puis, établit une revue de la littérature sur la contribution directe de la diffusion des TIC à la croissance de la productivité du travail aux US et en Europe. Le second chapitre de cette partie s'intéresse au comportement de demande de facteurs de production dans les secteurs producteurs de TIC ou intensifs en utilisation des TIC. Enfin, la troisième partie de la thèse se concentre sur la capacité des TIC à générer des opportunités d'innovation. Pour cela elle identifie d'abord la nature des innovations complémentaires et les efforts menant à ces innovations. Elle montre alors la nécessité d'améliorer la comptabilité nationale afin de prendre en compte ces efforts comme des investissements. Cette partie révèle ensuite que, dans les onze pays européens étudiés, le problème est particulièrement concentré sur quelques pays qui investissent peu en TIC et en actifs innovants et que ces deux types d'efforts sont complémentaires
This thesis aims to study Information and Communication Technologies (ICT) as a General Purpose Technology (GPT) and their role in the labor productivity evolution in the United States and Europe during recent decades. This thesis is organized in three parts corresponding to the fundamental GPT features: the wide possibilities for development, the ubiquity of the technology and the ability to create large technological opportunities. The first part depicts, at first, the innovation in ICT, beginning with a short historical review of ICT inventions followed by the analysis of current data on innovation in this field. In particular, it shows how the US was better than the European countries in inventing ICT until now. Second, this first part makes an inventory of measurement difficulties due to the rate and the nature of the change created by such technologies. The second part of the thesis deals with the ubiquitous nature of ICT. It first describes the ICT diffusion across countries and industries and reviews the economic literature on the direct contribution of ICT on labor productivity growth in the US and Europe. The next chapter studies the factor demand's behaviour in sectors that are either ICT producers or ICT intensive users. The third part focuses on the ICT ability to create opportunities for complementarity innovations. Firstly, it identifies the nature of ICT complementary innovations and the corresponding efforts. It shows, then, that national accounts must be improved in order to take these efforts into account as investments. Secondly, this part shows that, among the eleven European countries studied, the problem is highly concentrated in a few countries that invest less both in ICT and in innovative assets and that these two types of effort are complementary
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Guvence, Cagri Isik. "Information Systems Success And Expectations For Information Technology Investment: Case Study". Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12605995/index.pdf.

Texto completo da fonte
Resumo:
In this thesis, information systems success measurement practices and expectations for information technology investments of four companies in Turkey are examined. The aim of this study is to understand the information systems success measurement practices of the studied companies and the relation between the expectations for IT investment and IS success of these companies in Turkey.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Adetoye, Adedayo Oyelakin. "Secure information flow : analysis and enforcement". Thesis, University of Birmingham, 2009. http://etheses.bham.ac.uk//id/eprint/408/.

Texto completo da fonte
Resumo:
When a computer program requires legitimate access to confidential data, the question arises whether such a program may reveal sensitive information to an unauthorised observer. There is therefore a need to ensure that a program, which processes confidential data, is free of unwanted information flow. This thesis presents a formal framework for the analysis and enforcement of secure information flow in computational systems such as computer programs. An important aspect of the problem of secure information flow is the development of policies by which we can express intended information release. For this reason information lattices and maps on these lattices are presented as models, which capture intuitive notions about information and information flow. A definition of security is given, based on the lattice formalisation of information and information flow, that exploits the partial order of the information lattice. The lattice formalisation gives us a uniform way to enforce information security policies under various qualitative and quantitative representations of information. An input-output relational model, which describes how a system transforms its input to publicly observable outputs with respect to a given attacker model, is presented as a primitive for the study of secure information flow. By using the relational model, various representations of information, which are shown to fit into the lattice model of information, are derived for the analysis of information flow under deterministic and nondeterministic system models. A systematic technique to derive the relational model of a system, under a given attacker model, from the operational semantics in a language-based setting, is also presented. This allows the development of information flow analyses parametrised by chosen attacker models. A flow-sensitive and termination-sensitive static analysis calculus is presented for the analysis of information flow in programs written in a deterministic While language with outputs. The analysis is shown to be correct with respect to an attacker model that is able to observe all program outputs and which can determine the termination or nontermination of program execution. The static analysis also detects certain disjunctive information release. A termination-sensitive dependency analysis is developed which demonstrates how, by employing abstract interpretation techniques, other less precise but possibly more efficient information flow analysis may be obtained. The thesis concludes with further examples to highlight various aspects of the information flow analysis and enforcement framework developed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Saleh, Yasser M. "Information systems/information technology success and evaluation : an evaluation framework and general practitioner model". Thesis, University of Salford, 2002. http://usir.salford.ac.uk/14692/.

Texto completo da fonte
Resumo:
The main goal for IS/IT projects is the successful and timely delivery which meets their planned performance and objectives. However, IS/IT projects frequently fail. It has been reported that, on average, IS systems are delivered one year behind schedule, only I% of projects finish on time and within budget. This highlights the need for a model capable of determining the state of readiness of organisations prior to their implementation of an IS/IT project. This model should be able to show the way of improving organizational readiness to increase the likelihood of a successful implementation of such a project. In spite of the recognition of the main factors which can affect the success of IS/IT, tools do not exist that addresses those factors in an integrated manner. The primary aim of this research is to produce a general practitioner measurement tool that assists organisations in identifying the readiness gap before the initiation of a new ISAT project, and suggests guidelines for improvements. This research is also concerned with the establishment of an evaluation framework for ISAT. This framework presents a measurement of the success of IS/IT projects at the business level. Both the evaluation framework and the general practitioner model would help organizations to predict the level of success of IS/IT projects in meeting their business objectives. In order to achieve the aims and objectives of this research a thorough review of previous related literature from different disciplines was carried out in order to first build the IS/IT evaluation framework. The literature covered fields such as IS/IT success literature, organisational effectiveness, strategic planning, communication thcories, marketing, maturity models and ISAT measurement. The framework was then verified and modified by an exploratory field work in nine organisations from which the general practitioner model was established. To verify and test the model, qualitative non-experimental approach was conducted using in-depth case studies in four different organisations utilising triangulation of data collection methods that uses observation, structured interviews, unstructured interviews, historical data collection, and document review.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Dhillon, Gurpreet. "Interpreting the management of information systems security". Thesis, London School of Economics and Political Science (University of London), 1995. http://etheses.lse.ac.uk/275/.

Texto completo da fonte
Resumo:
The management of adverse events within organisations has become a pressing issue as the perceptions of risk continue to heighten. However the basic need for developing secure information systems has remained unfulfilled. This is because the focus has been on the means of delivery of information, i.e. the technology, rather than on the various contextual factors related to information processing. The overall aim of this research is to increase understanding of the issues and concerns in the management of information systems security. The study is conducted by reviewing the analysis, design and management of computer based information in two large organisations - A British national Health Service Hospital Trust and a Borough Council. The research methodology adopts an interpretive mode of inquiry. The management of information systems security is evaluated in terms of the business environment, organisational culture, expectations and obligations of different roles, meanings of different actions and the related patterns of behaviour. Findings from the two case studies show that an inappropriate analysis, design and management of computer based information systems affects the integrity and wholeness of an organisation. As a result, the probability of occurrence of adverse events increases. In such an environment there is a strong likelihood that security measures may either be ignored or are inappropriate to the real needs of an organisation. Therefore what is needed is coherence between the computer based information systems and the business environment in which they are embedded. In conclusion, this study shows that to resolve the problem of managing information systems security, we need to understand the deep seated pragmatic aspects of an organisation. Solutions to the problem of security can be provided by interpreting the behavioural patterns of the people involved.
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Pourabdollah, Amir. "Theory and practice of the ternary relations model of information management". Thesis, University of Nottingham, 2009. http://eprints.nottingham.ac.uk/10708/.

Texto completo da fonte
Resumo:
This thesis proposes a new, highly generalised and fundamental, information-modelling framework called the TRM (Ternary Relations Model). The TRM was designed to be a model for converging a number of differing paradigms of information management, some of which are quite isolated. These include areas such as: hypertext navigation; relational databases; semi-structured databases; the Semantic Web; ZigZag and workflow modelling. While many related works model linking by the connection of two ends, the TRM adds a third element to this, thereby enriching the links with associative meanings. The TRM is a formal description of a technique that establishes bi-directional and dynamic node-link structures in which each link is an ordered triple of three other nodes. The key features that makes the TRM distinct from other triple-based models (such as RDF) is the integration of bi-directionality, functional links and simplicity in the definition and elements hierarchy. There are two useful applications of the TRM. Firstly it may be used as a tool for the analysis of information models, to elucidate connections and parallels. Secondly, it may be used as a “construction kit” to build new paradigms and/or applications in information management. The TRM may be used to provide a substrate for building diverse systems, such as adaptive hypertext, schemaless database, query languages, hyperlink models and workflow management systems. It is, however, highly generalised and is by no means limited to these purposes.
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Shu, Wesley Szu-Way. "From different angles to solve the puzzle: Macroeconomic and microeconomic analyses of information technology productivity". Diss., The University of Arizona, 1998. http://hdl.handle.net/10150/282679.

Texto completo da fonte
Resumo:
This dissertation addresses one of the most academically intriguing issues in MIS, so-called "IT productivity paradox" which describes the failure of detecting positive contribution in productivity statistics by Information Technology investment while our economy has voraciously and restlessly spent money on them for the last few decades. Recent studies are showing startling contrast with the previous ones and there seems big discrepancy between firm level and national economy analyses. In order to unravel the paradox and the discrepancy observed. The author provides theoretical and methodological discussion and the empirical investigation on the methodologies used by previous research and conducted both firm-level and macro-economic analysis. The background investigation above shows that the recent studies defying the decades-old IT paradox do not pass rigorous methodological test based microeconomic production theories. The firm level analysis confirms our conjectures that the highly positive contributions reported by the recent studies are not reliable and thus shall not be read without caution. Our claim is supplemented by simulation studies as well. In addition to the microeconomic analysis, macroeconomic level study on major developed countries has been conducted. An emphasis is placed at the impact of information technology on the structural change of employment, and at the impact of the structural change on productivity. The potential contribution of this dissertation includes: (i) Using the same data set the prior studies used, we contrasts findings and methodologies with those in the previous studies. It calls for very careful attention to the methodology before we applaud for "positive" findings. (ii) It also provides a rare study in MIS on economic value of IT investment in macroeconomics and international contexts.
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Pazi, Shaban M. "Cost-effective Information and Communication Technology (ICT) infrastructure for Tanziania". Thesis, University of Sussex, 2010. http://sro.sussex.ac.uk/id/eprint/6272/.

Texto completo da fonte
Resumo:
The research conducted an Information and Communication Technology (ICT) field survey, the results revealed that Tanzania is still lagging behind in the ICT sector due to the lack of an internationally connected terrestrial ICT infrastructure; Internet connectivity to the rest of the world is via expensive satellite links, thus leaving the majority of the population unable to access the Internet services due to its high cost. Therefore, an ICT backbone infrastructure is designed that exploits optical DWDM network technology, which un-locks bandwidth bottlenecks and provides higher capacity which will provide ICT services such as Internet, voice, videos and other multimedia interactions at an affordable cost to the majority of the people who live in the urban and rural areas of Tanzania. The research analyses and compares the performance, and system impairments, in a DWDM system at data transmission rates of 2.5 Gb/s and 10 Gb/s per wavelength channel. The simulation results show that a data transmission rate of 2.5 Gb/s can be successfully transmitted over a greater distance than 10 Gb/s with minimum system impairments. Also operating at the lower data rate delivers a good system performance for the required ICT services. A forty-channel DWDM system will provide a bandwidth of 100 Gb/s. A cost analysis demonstrates the economic worth of incorporating existing optical fibre installations into an optical DWDM network for the creation of an affordable ICT backbone infrastructure; this approach is compared with building a completely new optical fibre DWDM network or a SONET/SDH network. The results show that the ICT backbone infrastructure built with existing SSMF DWDM network technology is a good investment, in terms of profitability, even if the Internet charges are reduced to half current rates. The case for building a completely new optical fibre DWDM network or a SONET/SDH network is difficult to justify using current financial data.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Gillespie, Seth J. "Correlational study of risk management and information technology project success". Thesis, Capella University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3610813.

Texto completo da fonte
Resumo:

Many IT projects fail despite the best efforts to keep these projects within budget, schedule, and scope. Few studies have looked at the effect of project risk management tools and techniques on project success. The primary focus of this study was to examine the extent to which utilization of project risk management processes influence project success. A secondary focus of the study was to determine if utilization of project risk management processes correlates with project success more than project manager experience, certification, level of education, and project size, type, or duration. To meet the objectives of the study, a survey instrument was developed and piloted. The final instrument was administered to a group of IT project management practitioners to assess the utilization of specific project risk management tools and techniques on a recently completed project. The answers were combined with the participants' self-reported project success as measured by end-of-project budget, schedule, and scope success metrics. While the results of the study did not point to a specific project risk management tool or technique to predict an IT project's success, valuable insight was gained when stepping back and looking at overall factors that influence project success. When looking at these factors, the researcher found there was a statistical correlation that indicated the use of project risk management processes as a whole are a better predictor of IT project success than a project manager's experience, certification, level of education, and project size, type, or duration in the majority of success areas measured.

Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Mahncke, Rachel J. "Measuring and applying information security governance within general medical practice". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2016. https://ro.ecu.edu.au/theses/1797.

Texto completo da fonte
Resumo:
Australia is in the process of adopting a national approach towards the secure electronic exchange of health information. The health information contributions of general practices as the primary point of patient medical care, will be critical to the success of an interoperable national healthcare system. Sharing information creates vulnerabilities by increasing exposure to information security threats. Consequently, improvement in information security practice within general practice may positively contribute towards improved patient care by providing access to timely and accurate information. There is renewed focus within general practice on information security, inter alia the introduction of: the Royal Australian College of General Practitioners (RACGP, 2014) Computer and Information Security Standards (CISS, 2013); privacy law reform in 2014; an evolving national electronic heath record system; litigation relating to information breaches; and continuing Australian public support for mandatory data breach notification legislation.The implementation of reliable information security procedures within general practices will be critical to secure the exchange of confidential patient information. Protecting patient health information requires appropriate security measures in regards to technologies, policies, and procedures as well as ensuring that staff are well trained and aware of these security activities. Adherence to industry standard security activities will enable general practices to take responsibility for their information security thereby minimising the threat of lost or stolen information. To meet the rising number of information security threats, general practices need to adopt a framework of accountability and control to address and demonstrate effective information security management and governance. The governance component of information security remains insufficiently addressed within Australian general practice at present.This thesis demonstrates an application of international standards at a strategic level, and proposes a functional process improvement framework against which general practices can assess and implement effective information security governance. This interpretation and operationalisation of international governance of information security standard ISO/IEC 27014:2013 (ISO, 2013), had not previously been undertaken. Further, application of information security governance within the Australian general practice environment had not previously been undertaken, and formed the basis for establishing a positive information security culture.A qualitative action research methodology was utilised for the collection of national data. Further, iterative action research cycles were applied to develop the practical information security governance framework for use within general practice. Following a review of the literature, a preliminary framework was developed to include industry best practice standards and information security compliance criteria applicable to general practice. This initial governance framework extends the industry security standards developed by the RACGP CISS (2013), ISACA’s COBIT 5 (2012), NEHTA’s NESAF (2012) governance framework and Williams’ TIGS-CMM model (2007c). Information security experts validated the information security governance framework during focus groups and interview data collections, which included representatives from key Australian healthcare organisations.Following development, the governance framework was applied and tested within general practices during iterative cycles of interviews. General practice participants conducted a self-assessment against the framework, responded to semi-structured interview questions, and policy documentation was analysed. The governance framework was revised following these iterations and cycles of action research. The objective of this research method was to achieve a ‘theoretical saturation’ of the theory whereby the patterns in the general practice interviews indicated when no new information was being yielded (Mason 2010). A final cycle of a general practice interview was conducted to verify the appropriateness of the information security governance framework within Australian general practice.The contribution of this research was both theoretical and practical. A holistic governance framework and process was synthesised and formulated, which aimed to assist general practices to meet their legal and industry related compliance security responsibilities, by securing information assets in an escalating threat environment. The governance approach was designed to be achievable and sustainable for general practices over time, whilst encouraging incremental improvement in security performance. To address the people aspect of security, the governance process incorporated a risk-based structure for the review of security breaches and performance measures, to assist in making the necessary governance decisions by amending policies and processes, and accessing the required training. This strategic approach extends international and industry best practice of information security governance for use in Australian general practice, with the aim of improving the protection of confidential health information
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Bilgen, Baris. "Investigating terminology management for conference interpreters". Thesis, University of Ottawa (Canada), 2009. http://hdl.handle.net/10393/28175.

Texto completo da fonte
Resumo:
Despite recent developments in translation technologies, most existing software programs are designed primarily to cater to the needs of language professionals such as translators and terminologists, while conference interpreters are neglected as a user group with a distinct work profile. Hence, this thesis investigates terminology management in the context of interpreting . A review of literature on interpreting and terminology is complemented by a survey conducted among professional interpreters, in order to identify their terminology management needs and practices and evaluate their experience using computers. Generic guidelines based on survey data are suggested for developing a terminology tool for interpreters, and are implemented in a basic demonstration of the use of database management software (DBMS) in this context.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Gibbs, Graham R. "Learning and qualitative data analysis with information technology : the role of exploration". Thesis, University of Huddersfield, 2015. http://eprints.hud.ac.uk/id/eprint/28414/.

Texto completo da fonte
Resumo:
Over the past 20 years there have been rapid developments in IT to create software that supports both learning and qualitative research. This thesis examines the design and use of that software, and argues that the exploratory approach in both learning and analysis produces superior outcomes. As such, the exploratory approach is seen as one that is particularly well supported by the software. A range of learning software and objects is discussed: Correlation Explorer, coMentor, learning websites, reusable learning objects, open educational resources, and videos. These are successive attempts by myself, and others, to develop software and other objects that support high quality learning. They do this in a variety of ways: by creating learning tools that promote exploration, by encouraging online collaboration and sharing, and by providing materials that can be used in a range of learning contexts. Some of the problems of their use are discussed, such as mistaken conceptions, and finding and adapting learning objects. In a parallel fashion, this thesis argues that the development of software to assist qualitative data analysis has supported a range of analytic approaches. By their very nature these tend to be exploratory – the thesis argues that the core of qualitative analysis involves exploration of the data. The new analytic tools the software offers afford especially good support to exploratory analyses. These tools include text searching, code hierarchies, code queries, and the use of charts and diagrams.
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Smith, Ann. "Characterisation of condition monitoring information for diagnosis and prognosis using advanced statistical models". Thesis, University of Huddersfield, 2017. http://eprints.hud.ac.uk/id/eprint/32609/.

Texto completo da fonte
Resumo:
This research focuses on classification of categorical events using advanced statistical models. Primarily utilised to detect and identify individual component faults and deviations from normal healthy operation of reciprocating compressors. Effective monitoring of condition ensuring optimal efficiency and reliability whilst maintaining the highest possible safety standards and reducing costs and inconvenience due to impaired performance. Variability of operating conditions being revealed through examination of vibration signals recorded at strategic points of the process. Analysis of these signals informing expectations with respect to tolerable degrees of imperfection in specific components. Isolating inherent process variability from extraneous variability affords reliable means of ascertaining system health and functionality. Vibration envelope spectra offering highly responsive model parameters for diagnostic purposes. This thesis examines novel approaches to alleviating the computational burdens of large data analysis through investigation of the potential input variables. Three methods are investigated as follows: Method one employs multivariate variable clustering to ascertain homogeneity amongst input variables. A series of heterogeneous groups being formed from each of which explanatory input variables are selected. Data reduction techniques, method two, offer an alternative means of constructing predictive classifiers. A reduced number of reconstructed explanatory variables provide enhanced modelling capabilities ensuring algorithmic convergence. The final novel approach proposed combines both these methods alongside wavelet data compression techniques. Simplifying number of input parameters and individual signal volume whilst retaining crucial information for deterministic supremacy.
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Gupta, Rakesh K. "The development of an information system for drug misuse using self knowledge elicitation". Thesis, University of Warwick, 1999. http://wrap.warwick.ac.uk/110876/.

Texto completo da fonte
Resumo:
In the past, information systems have been developed by system analysts and programmers with the involvement of end users being at a minimum. For a long time now, researchers (Lucas 1976, Alter 1996) have been stressing the importance of significant user involvement because it brings a number of beneficial results: involvement can be challenging and intrinsically satisfying; involvement usually results in more commitment to change; the user becomes more knowledgeable about change and so is better trained in the use of the system; a better solution to the problem is obtained because users know more about the present system than analysts; involvement means the user has retained much of the control over operations. The contribution that this thesis makes is the concept of self knowledge elicitation as an approach to prototyping, developing and maintaining information systems. A key feature of this concept is the high degree of user involvement in the design and development process. Self knowledge elicitation allows the user to build an information system using his/her own knowledge and expertise, and then also allows him/her to maintain and update this system. This concept initially emerged following a research project which involved the development of an Expert Advisory System for AIDS/HIV using traditional techniques of development, which were found to have a number of deficiencies including the time-factor. Both formal and informal evaluations of the self knowledge elicitation concept were carried out at 20 different sites throughout Central England, over a minimum period of nine months. The results of these trials indicated that this concept was acceptable and could be used as a practical, cost-effective way of developing and maintaining information systems - especially for the purposes of training and education. Significant technological advances in both hardware and software over recent years (advanced word processors, intemet/intranet, web browsers, e-mail, etc.), used appropriately, will increase the availability, functionality and acceptability of the self knowledge elicitation concept.
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

McGown, Alistair. "The communication and recording of conceptual design information by the inclusion of visual data". Thesis, University of Glasgow, 1999. http://theses.gla.ac.uk/4042/.

Texto completo da fonte
Resumo:
This thesis reports the results of a three year, full-time research project investigating the generation and communication of product descriptions within the conceptual phase of the engineering design process. The research pays particular attention to the role played by the designer's sketch in communicating new product ideas. The investigation commences with a literature review of existing design process models (Chapter 2), which helps to define the area under investigation while presenting modern views of the process in relation to classic examples from established design research. Chapter 3 presents a literature review of the methods currently used to support communication of product descriptions. These methods of Specification are assessed and particular attention is given to new computer-based recording methods such as DOORS and Cradle. Suggestions for improving the efficiency of such models are put forward and the text-only bias of such systems is identified. This comparison of the existing systems thus identifies the research questions. Having identified the possible improvement to be gained by the incorporation of visual material in addition to the universal text description, Chapter 4 presents a literature review assessing the roles of the conceptual sketch in engineering design. As well as presenting views of drawing from philosophical, psychological and scientific standpoints, this section compares attempts made to support the engineer's sketching activity by computer means. This chapter concludes that efforts made to provide effective computer support of sketching by freehand methods are preferred to attempts made to replicate the process with current computer tools. The resulting research experiment, the methodology of which is described in Chapter 5, uses students from the final year of the Product Design Engineering course at Glasgow School of Art and the University of Glasgow. The main aim of the experiment is to identify means of including sketching within the kind of text-based support methods discussed in Chapter 3. It also observes the volume and pattern of information produced by sketch activity throughout the conceptual stages of the design process and aims to find methods which would enable sketches to indicate the general progress of a design. The findings are detailed in Chapter 6.
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Nyabando, Chiwaraidzo Judith. "An Analysis of Perceived Faculty and Staff Ccomputing Behaviors That Protect or Expose Them or Others to Information Security Attacks". Digital Commons @ East Tennessee State University, 2008. https://dc.etsu.edu/etd/1972.

Texto completo da fonte
Resumo:
A mixed-methods study, conducted in 2007-2008, designed to quantify and assess behaviors that either protect or expose data at academic institutions to information security attacks. This study focused on computing practices at two academic institutions: East Tennessee State University and Milligan College. Interviews with six information technology professionals and online surveys were used to assess faculty and staff members' awareness and practice of safe computing behaviors. The constant comparison method was used to analyze qualitative data. Descriptive statistics and univariate and multivariate analysis of variance techniques were used to analyze the quantitative data. Overall, the analyses indicated that the faculty and staff members at these institutions were equally aware of information security issues and practices and tended to practice safe computing behaviors--though apparently at a level that was less than commensurate with their awareness of these behaviors. Raised awareness correlated with safe computing behaviors, as did computer usage: those who had used computers for more than 20 years appeared to be more aware of safe practice than those who had used computers for 20 years or less. Password management emerged as a major challenge for the participants. They were also concerned with phishing emails and they tended not to be aware of FERPA regulations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Hammed, Nada Mohammed Abuouf. "Information and communication technology in early childhood education : challenges for effective implementation and integration". Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/4901/.

Texto completo da fonte
Resumo:
This is the first study in the field of Information and Communication Technology (ICT) integration into Early Childhood Education (ECE) to call upon a blended theoretical framework of Bronfenbrenner’s ecological systems theory, Fullan’s concepts of educational change and complexity theory. In drawing the collected data together within the framework of Bronfenbrenner’s ecological systems theory, a range of linear factors that influence practitioners’ use of ICT in the playroom at the micro-level (teachers’ pedagogical beliefs, confidence, technological pedagogical knowledge); meso-level (local school policy, leadership, support) and macro-level (national ECE curriculum and national ICT policy) were identified. Currently, structured research into ICT integration in ECE is extremely limited in Saudi Arabia. This thesis addresses this substantial knowledge gap in the practice of ICT integration in Saudi Arabian ECE settings through a collective case study approach of Saudi Arabian programs. According to the literature, Scotland, for some time, has been at the forefront of developing strategies for the integration of ICT into early years. Policy in Scotland has also been supported by a range of literature, studies and reference to ICT use in the curriculum; that have assisted practitioners in making important pedagogical decisions for using ICT in the playroom. For these reasons, Scotland is included in this research as an example that can provide some insights for improvement in the Saudi Arabian context. Six case studies were used to address the study’s research questions: four in Jeddah city, Saudi Arabia and two in Scotland (located between Glasgow City Council and East Dunbartonshire). As part of the research’s endorsement of a holistic approach, the researcher triangulated multiple research methods (questionnaire, semi-structured interview, playroom observation and documentary analysis) to investigate the status of ICT use in preschool settings and factors that influenced teachers’ ICT practices. The target community was made up of practitioners in ECE settings, including head teachers and practitioners from both private and public preschools. Research findings suggest that practitioners in both locations hold a positive perspective of the importance of ICT integration into ECE. However, enthusiasm and positive attitudes do not always lead to high levels of ICT integration. In Saudi Arabia in particular, much of the integration is achieved in an informational, teacher-centred/traditionalist manner, rather than encouraging child-centred, constructivist approaches. The results revealed that teachers’ pedagogical beliefs and their relationship to teaching practices strongly influenced integration practices. Furthermore, school characteristics were equally, if not more, influential upon integration levels. In general, in the Saudi ECE sector, the journey to ICT integration is at an initial, unstructured stage and observed attempts at integration are largely the result of practitioners’ individual efforts. Investigating ICT integration into teaching and learning in the Scottish preschool case studies provides examples of child-centred learning through ICT that suggest ways of integrating ICT fruitfully into the micro-level of the playroom. The Saudi context can benefit from examining these constructivist practices. Scotland is more advanced in ICT integration than Saudi Arabia because it has a policy for ICT integration into ECE; though, in both sectors there exist similar factors that influence practitioners’ approaches to integration at both the micro- and meso-levels (practitioner confidence, ICT-based activity management skills). Practitioners in both contexts hope for the comprehensive improvement of ICT integration, and there is a clear desire for an explicit educational policy for ICT in preschool education and for continuous teacher training. Overall, this research provides the first detailed picture of Saudi preschool teachers’ ICT practices, perspectives and attitudes toward technology use in ECE and will have the capacity to inform present and future national ECE policy. Furthermore,findings from both case studies provide international stakeholders and practitioners with a series of guidelines for effective ICT integration.
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Strudwick, Laura M. "Prismatic perception an emerging mythology of the millennial mind". Thesis, Pacifica Graduate Institute, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3617628.

Texto completo da fonte
Resumo:

The postmodern worldview wanes as the millennium turns and the Millennial Generation matures; at the same time, we rapidly launch into the digital age. Information technology is developing into a changeable, networked system of devices and interfaces that profoundly shapes our professional, intellectual, and social lives. Online reading and navigation influence epistemology and perception; similarly, engagement with ergodic texts, i. e., print and film texts that require significant effort to traverse, results in enhanced cognition. Prismatic perception is a neologism that describes an emerging mythology of the mind in the information age. This fantasy of omniscient perception is rooted in images of potentiality networked with connecting strands that construct an image of a centerless web, similar to Indra's Net and the World Wide Web.

Literary theory draws on both art and philosophy and therefore directly reflects an era's defining characteristics. Deconstruction as described by Jacques Derrida serves as a precursor to hypertext theory; these two theories work collaboratively to delineate this emerging era. Reader response theory emphasizes the reader's role and correlates with the expanding participation and power of readers, writers, and creators in digital formats. Recombinant art, i. e., collaged and remixed creations that play and interact with other artists' previous works, proliferates as the culture of free and open sharing rises.

This dissertation illustrates the concept of prismatic perception with mythological symbols and images of infinity drawn from literature and film, particularly the works of Jorge Luis Borges, the Chinese classic I Ching, Mark Z. Danielewski's novel House of Leaves, and Christopher Nolan's films Memento and Inception. This work examines current issues concerning social aspects of technology, particularly recent controversies over information access. Postmodernism was characterized by the prefixes post- and de-; the prefixes that best suit the emerging era are meta- and re- as people generate, investigate, contemplate, rework, and participate in the vast accumulation of connecting and interacting information and ideas.

Keywords: Information society; information technology—social aspects—forecasting; technology—social aspects; computers and civilization; Borges, Jorge Luis, 1899-1986; deconstruction; reader-response criticism.

Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Abu, Saad Samieh. "The utilisation of information available in a sensorless control system of an AC induction motor for condition monitoring". Thesis, University of Huddersfield, 2015. http://eprints.hud.ac.uk/id/eprint/28350/.

Texto completo da fonte
Resumo:
Induction motor driven mechanical transmission systems are widely utilised in many applications across numerous sectors including industry, power generation and transportation. They are however subject to common failure modes primarily associated with faults in the driven mechanical components. Notably, gearboxes, couplings and bearings can cause significant defects in both the electrical and mechanical systems. Condition monitoring (CM) undertakes a key role in the detection of potential defects in the early development stages and in turn avoiding catastrophic operational and financial consequences caused by unplanned breakdowns. Meanwhile, variable speed drives (VSDs) have been increasingly deployed in recent years to achieve accurate speed control and higher operational efficiency. Among the different speed control designs, sensorless VSDs deliver improved dynamic performance and obviate speed measurement devices. This solution however results in heightened noise levels and continual changes in the power supply parameters that potentially impede the detection of minute fault features. This study addresses the gap identified through a systematic review of the literature on the monitoring of mechanical systems utilise induction motors (IM) with sensorless VSDs. Specifically, existing techniques prove ineffective for common mechanical faults that develop in gearboxes and friction induced scenarios. The primary aim of this research centres on the development of a more effective and accurate diagnostic solution for VSD systems using the data available in a VSD. An experimental research approach is based to model and simulate VSD systems under different fault conditions and gather in-depth data on changes in electrical supply parameters: current, voltage and power. Corresponding techniques including model based methods and dynamic signature analysis methods were developed for extracting the changes from noise measurements. An observer based detection technique is developed based on speed and flux observers that are deployed to generate power residuals. Both static and dynamic techniques are incorporated for the first time in order to detect the mechanical misalignment and lubrication degradation, each with different degrees of severities. The results of this study demonstrate that observer based approaches utilising power residual signalling can be effective in the identification of different faults in the monitoring of sensorless VSD driven mechanical systems. Specifically, the combination between dynamic and static components of the power supply parameters and control data has proved effective in separating the four types of common faults: shaft misalignment, lubricant shortage, viscosity changes and water contamination. The static data based approach outperforms the dynamic data based approach in detecting shaft misalignments under sensorless operating modes. The dynamic components of power signals, however, records superior results in the detection of different oil degradation problems. Nevertheless, static components of torque related variables, power and voltage can be used jointly in separating the three tested lubricant faults.
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Basevi, Hector Richard Abraham. "Use of prior information and probabilistic image reconstruction for optical tomographic imaging". Thesis, University of Birmingham, 2015. http://etheses.bham.ac.uk//id/eprint/5876/.

Texto completo da fonte
Resumo:
Preclinical bioluminescence tomographic reconstruction is underdetermined. This work addresses the use of prior information in bioluminescence tomography to improve image acquisition, reconstruction, and analysis. A structured light surface metrology method was developed to measure surface geometry and enable robust and automatic integration of mirrors into the measurement process. A mouse phantom was imaged and accuracy was measured at 0.2mm with excellent surface coverage. A sparsity-regularised reconstruction algorithm was developed to use instrument noise statistics to automatically determine the stopping point of reconstruction. It was applied to in silico and in simulacra data and successfully reconstructed and resolved two separate luminescent sources within a plastic mouse phantom. A Bayesian framework was constructed that incorporated bioluminescence properties and instrument properties. Distribution expectations and standard deviations were estimated, providing reconstructions and measures of reconstruction uncertainty. The reconstructions showed superior performance when applied to in simulacra data compared to the sparsity-based algorithm. The information content of measurements using different sets of wavelengths was quantified using the Bayesian framework via mutual information and applied to an in silico problem. Significant differences in information content were observed and comparison against a condition number-based approach indicated subtly different results.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Kräutli, Florian. "Visualising cultural data : exploring digital collections through timeline visualisations". Thesis, Royal College of Art, 2016. http://researchonline.rca.ac.uk/1774/.

Texto completo da fonte
Resumo:
This thesis explores the ability of data visualisation to enable knowl-edge discovery in digital collections. Its emphasis lies on time-based visualisations, such as timelines. Although timelines are among the earliest examples of graphical renderings of data, they are often used merely as devices for linear storytelling and not as tools for visual analysis. Investigating this type of visualisation reveals the particular challenges of digital timelines for scholarly research. In addition, the intersection between the key issues of time-wise visualisation and digital collections acts as a focal point. Departing from authored temporal descriptions in collections data, the research examines how curatorial decisions influence collec-tions data and how these decisions may be made manifest in timeline visualisations. The thesis contributes a new understanding of the knowledge embedded in digital collections and provides practical and conceptual means for making this knowledge accessible and usable. The case is made that digital collections are not simply represen-tations of physical archives. Digital collections record not only what is known about the content of an archive. Collections data contains traces of institutional decisions and curatorial biases, as well as data related to administrative procedures. Such ‘hidden data’ – information that has not been explicitly recorded, but is nevertheless present in the dataset – is crucial for drawing informed conclusions from dig-itised cultural collections and can be exposed through appropriately designed visualisation tools. The research takes a practice-led and collaborative approach, work-ing closely with cultural institutions and their curators. Functional prototypes address issues of visualising large cultural datasets and the representation of uncertain and multiple temporal descriptions that are typically found in digital collections. The prototypes act as means towards an improved understanding of and a critical engagement with the time-wise visualisation of col-lections data. Two example implementations put the design principles that have emerged into practice and demonstrate how such tools may assist in knowledge discovery in cultural collections. Calls for new visualisation tools that are suitable for the purposes of humanities research are widespread in the scholarly community. However, the present thesis shows that gaining new insights into digital collections does not only require technological advancement, but also an epistemological shift in working with digital collections. This shift is expressed in the kind of questions that curators have started seeking to answer through visualisation. Digitisation requires and affords new ways of interrogating collections that depart from putting the collected artefact and its creator at the centre of human-istic enquiry. Instead, digital collections need to be seen as artefacts themselves. Recognising this leads curators to address self-reflective research questions that seek to study the history of an institution and the influence that individuals have had on the holdings of a collection; questions that so far escaped their areas of research.
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Mogotlhwane, T. M. "Barriers to successful application of information technology in Botswana". Thesis, University of Salford, 2008. http://usir.salford.ac.uk/1735/.

Texto completo da fonte
Resumo:
This research looked at barriers to successful applications of information and communication technology (ICT) in Botswana. Botswana has high investments in ICT infrastructure development in the public service. However, there is still concern about service delivery not being satisfactory. Many departmental functions are still performed manually despite the availability of computers and people capable of using them. The research question addressed is why there is lack of exploitation of ICT in the Botswana public sector. Two government departments based in the capital city were selected as case studies and investigated using questionnaires and semi structured interviews to determine the status of employee relations and ICT use. Questionnaires were used to solicit satisfaction perception of the general public about public service using a sample of capital city population. This research revealed a digital divide within Botswana. Within the public sector, computer penetration as well as internet access is very high as there is 1 computer for every 2 employees. For the general public, computer ownership is low as about 28% of the population have computers at home. Despite availability of computers in the public service, members of the public experience delay when they seek service. Motivation and payment are biggest problem regarding employee relations. ICT support is satisfactory though this might be due to low level of ICT use. Fear of change is the main limiting factor to ICT exploitation in Botswana. It was found that maintenance cost of ICT infrastructure is in the order of 8 times the national average salary. A framework is proposed to help policy makers on how best to exploit existing ICT infrastructure. Botswana has remained at the first level of ICT exploitation for over 10 years. Suggestions are made as to how the next level could be reached and future research is also discussed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Glassburner, Aaron. "Creating Supply Chain Resilience with Information Communication Technology". Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157577/.

Texto completo da fonte
Resumo:
Supply chain resilience refers to the capability of a supply chain to both withstand and adapt to unexpected disturbances. In today's turbulent business environment, firms are continually seeking to create more resilience within their supply chain through increased information communication technology use and enhanced business-to-business relationships. The focus of this dissertation is the investigation of how information communication technology creates resilience at the differing process levels of supply chain operations. Past research into information communication technology use within supply chains has often been conducted at the macro-level of supply chain phenomena. As such, there is still much to understand about how decision-makers interact with information communication technology at the micro-level of supply chain decision-making. A more in-depth, broad coverage of this interaction will provide both practitioners and academics a better understanding of how to leverage information communication technology in achieving supply chain resilience. To meet this aim, this dissertation contains three essays that re-orient conceptual thinking about supply chain phenomenon, explore how advances in information communication technology influence business-to-business relationships, and identify how information communication technology effects the decision-making of supply chain managers.
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Morris, Dory L. "Learning Without Onboarding| How Assessing and Evaluating Learning Benefits New Information Technology Hires". Thesis, Walden University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3604725.

Texto completo da fonte
Resumo:

Onboarding ensures learning success through sharing and acquiring knowledge to remain competitive. However, little is known about new Information Technology (IT) hires' learning needs in the absence of onboarding; therefore, the purpose of this case study was to examine, increase, and retain their technical knowledge at the Unified Communications Company (UCC). Following the theoretical model of knowledge management, which holds that knowledge is the key to confirm learning and knowledge sharing, the research questions were used to examine how the company assessed and increased their technical knowledge and how they taught their culture in the absence of onboarding. A qualitative instrumental case study design was employed with a purposeful sample of 4 former employees who were former new IT hires at the UCC. These employees contributed to the study using journals, surveys, and interviews drawn from their experiences as new IT hires at the UCC. Reoccurring themes regarding formal learning were extracted from the data, validated through peer and member checking, and then triangulated with each round of data collection and the themes described in the literature. The themes of culture, onboarding, training, and experience/feedback consistently emerged as areas needing improvement and indicated a need for formalized training. Based on these findings, a job aid was created to provide enhanced performance and learning to offer knowledge throughout training. Companies employing new IT hires can use the results from this study to provide onboarding in addition to their current orientation. The use of these data would positively affect social change by enhancing company competitiveness and job retention while reducing overall unemployment and the skills gap.

Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Magalhaes, Rodrigo Manuel. "The organizational implementation of information systems : towards a new theory". Thesis, London School of Economics and Political Science (University of London), 1999. http://etheses.lse.ac.uk/284/.

Texto completo da fonte
Resumo:
This dissertation provides fundamental conceptual building blocks for a new theory of IS implementation. The main argument presented is for a new perspective to supplement and complement the main existing perspectives on IS implementation: the technological determinist perspective, the managerial imperative perspective, and the socio-technical interactionist perspective. in this the research seeks to overcomes identified shortcomings of these existing approaches to understanding IS implementation. The research methodology emphasizes multidisciplinary theory-building, based on the resource-based approach to strategy, using autopoiesis as the key organizational epistemology. The research explores the concept of organizational climate dimensions as the shapers of organizational contexts, and relates these to information systems research in implementation. The new perspective developed emphasizes managerial action and organizational contexts as a mid-level approach, bridging the gap between top-down, rationalist methods and bottom-up, emergent approaches. Based on this conceptual framework, the context for IS corporate governance is operationalized and presented as a causal model with five independent variables - IS Intent, Discipline, Trust, Support and Structural IS-related factors and one independent variable. IS-Organizational Learning. Data collection is carried out in large Portuguese companies by means of a postal questionnaire. The empirical data is supplemented by five short case studies. The key conclusions of the thesis are: (1) The duality managerial action - organizational contexts opens up whole new possibilities for research and practice of IS implementation. (2) The use of the notion of organizational contexts dimensions as a research tool allows the analysis to go deeper than the vague generalization about organizations found in most current literature. (3) The use of quantitative methods to investigate IS-related organizational contexts is not suitable, except for descriptive purposes; semi-structured interviews and in-depth case studies are recommended. (4) Two specific dimensions of IS-related contexts are suggested as topics for further investigation: IS Intent and IS structural factors.
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

McGrath, Kathy. "Organisational culture and information systems implementation : a critical perspective". Thesis, London School of Economics and Political Science (University of London), 2003. http://etheses.lse.ac.uk/276/.

Texto completo da fonte
Resumo:
This research explores how information systems (IS) implementation is accomplished when cultural change of an organisation is attempted and what this accomplishment means for those touched by it. Efforts of this kind are being made in the UK National Health Service (NHS), Where modernisation programmes involving technological rationalisation and change are aiming to make the NHS more responsive to contemporary public demands. This study focuses on the ambulance services and specifically on a history of IS implementation efforts over 20 year at the largest and most appraised of the English services, the London Ambulance Service (LAS). A perceived need for cultural change involving the use of advanced information technologies is pervasive in managerial and ministerial discourses about modernising the health service. Yet the way that ambulance services are regulated and monitored has given rise to a modernisation programme in which cultural change and IS implementation have been conceived largely instrumentally in terms of achieving performance targets. Moreover, goals to which the modernisation efforts aspire are at most partially realised. Organisational change is uneven, and the performance improvements achieved are contradictory, and this is not only true in London but elsewhere in the UK. Drawing from organisational theory and critical social theory, past IS implementation efforts at the LAS are reinterpreted in light of recent developments, with contributions to theory and practice in mind. The theoretical contribution rests in exploring how emotion as well as rationality may be conceptualised to examine historically and culturally constituted working practices. Implications for practice address how IS implementation can give rise to cultural fragmentation, and also how professional identity can constrain IS innovation. Finally, the research contributes to a current debate about the future for ambulance services and the mechanisms used to evaluate their performance.
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Wong, Whee Yen. "Framework of Six Sigma implementation analysis on SMEs in Malaysia for information technology services, products and processes". Thesis, University of Nottingham, 2015. http://eprints.nottingham.ac.uk/29149/.

Texto completo da fonte
Resumo:
For the past two decades, the majority of Malaysia’s IT companies have been widely adopting a Quality Assurance (QA) approach as a basis for self-improvement and internal-assessment in IT project management. Quality Control (QC) is a comprehensive top-down observation approach used to fulfill requirements for quality outputs which focuses on the aspect of process outputs evaluation. However in the Malaysian context, QC and combination of QA and QC as a means of quality improvement approaches have not received significant attention. This research study aims to explore the possibility of integrating QC and QA+QC approaches through Six Sigma quality management standard to provide tangible and measureable business results by continuous process improvement to boost customer satisfactions. The research project adopted an exploratory case study approach on three Malaysian IT companies in the business area of IT Process, IT Service and IT Product. Semi-structured interviews, online surveys, self-administered questionnaires, job observations, document analysis and on-the-job-training are amongst the methodologies employed in these case studies. These collected data and viewpoints along with findings from an extensive literature review were used to benchmark quality improvement initiatives, best practices and to develop a Six Sigma framework for the context of the SMEs in the Malaysian IT industry. This research project contributed to both the theory and practice of implementing and integrating Six Sigma in IT products, services and processes. The newly developed framework has been proven capable of providing a general and fundamental start-up decision by demonstrating how a company with and without formal QIM can be integrated and implemented with Six Sigma practices to close the variation gap between QA and QC. This framework also takes into consideration those companies with an existing QIM for a new face-lift migration without having to drop their existing QIM. This can be achieved by integrating a new QIM which addresses most weaknesses of the current QIM while retaining most of the current business routine strengths. This framework explored how Six Sigma can be expanded and extended to include secondary external factors that are critical to successful QIM implementation. A vital segment emphasizes Six Sigma as a QA+QC approach in IT processes; and the ability to properly manage IT processes will result in overall performance improvement to IT Products and IT Services. The developed Six Sigma implementation framework can serve as a baseline for SMEs to better manage, control and track business performance and product quality; and at the same time creates clearer insights and un-biased views of Six Sigma implementation onto the IT industries to drive towards operational excellence.
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Heward, Michelle. "Mobile, connected and included : the role of information and communication technology in supporting mobility and independence in later life". Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/208211/.

Texto completo da fonte
Resumo:
Mobility in later life can take various forms, as a result of changes in personal circumstances, such as physical impairments and driving cessation. Therefore, understanding the concept of mobility in later life is complex and challenging. Through an interdisciplinary qualitative approach, this thesis examines the role of information and communication technology in supporting mobility and independence in later life. The research highlights a gap in the theoretical understanding of the concept of mobility, and uses insights from the three thematic areas of transportation, technology and older people, as well as key concepts such as social inclusion and independence, in order to develop a new conceptual framework to study mobility in later life. Research that brings these three areas of transportation, technology and older people together, is largely absent from the study of mobility. The research methodology included two phases of data collection. Firstly, the Mobilisation and Accessibility Planning for PEople with Disabilities (MAPPED) project, which focused on the field trials of tailored handheld navigational devices by older people; and secondly, the Getting Out and About project, which involved older people participating in in-depth semi-structured interviews with hypothetical vignettes. The results highlight the importance of mobility in maintaining independence in later life, whilst recognising the heterogeneity of older people by demonstrating a variety of attitudes, experiences and perceptions towards travel behaviour and information and communication technology in later life. The thesis argues that through the facilitation of virtual mobility, such technologies can offer older people an important alternative to physical mobility, which can be further explored in the future design and implementation of policies aimed at supporting older people and improving their well-being and social inclusion
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Huber, Marsha M. "Measurement of Restaurant Manager Perceptions of Restaurant Management Information Systems". The Ohio State University, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=osu1046698635.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Yetter, Richard B. "Darknets, cybercrime & the onion router| Anonymity & security in cyberspace". Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1586579.

Texto completo da fonte
Resumo:

Anonymizing Internet technologies present unique challenges to law enforcement and intelligence organizations. Tor is an anonymity technology that has received extensive media coverage after a virtual black market hidden by its network was seized by the FBI in 2013. Anonymizing technologies have legitimate purposes, and as states increasingly employ sophisticated Internet censorship and surveillance techniques, they are becoming increasingly relevant. This study examines the creation of the modern Internet, explores the drastic changes that have taken place, and takes an in-depth look at intended and unintended uses of anonymizing technologies.

Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Seibert-Johnston, Rebecca. "History in Your Hand| A Case Study of Digital History and Augmented Reality Using Mound 72". Thesis, Southern Illinois University at Edwardsville, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1560774.

Texto completo da fonte
Resumo:

The use of augmented reality and mobile applications offers a unique and applicable presentation experience for digital historians. This is a case study of such a presentation using Mound 72 at Cahokia Mounds.

Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Urquhart, Lachlan. "Towards user centric regulation : exploring the interface between information technology law and human computer interaction". Thesis, University of Nottingham, 2017. http://eprints.nottingham.ac.uk/41787/.

Texto completo da fonte
Resumo:
This thesis investigates the role of technology designers in regulation. Emerging information technologies are complex to regulate. They require new strategies to support traditional approaches. We focus on the use of technology design as a regulatory tool. Whilst this solution has significant conceptual traction, what it means in practice is not clear. Deeper investigation of the role of the design community in regulation is necessary to move these strategies from theory into practice. We structure our analysis by asking: how can we understand the role of designers in regulation of emerging technologies? We answer this question from four primary perspectives: conceptual, legal, practical and design. We situate our investigation within the context of the domestic internet of things and information privacy by design. We adopt an overtly multidisciplinary approach, critically assessing how to bring together the human computer interaction and information technology law communities. To do this, we utilise a range of qualitative methods, including case studies, documental and legal analysis, semi structured expert interviews, questionnaires, focus groups, workshops, and development, testing and evaluation of a design tool. Our contributions are as follows: Conceptually, we provide a critical investigation of the role of technology designers in regulation by consolidating, evaluating and aligning a range of theoretical perspectives from human computer interaction (HCI) and information technology (IT) law. We draw these together through the concept of user centric regulation. This concept advocates a user focused, interaction led approach to position the role of designers in regulation. It draws on the turn to human values and societal issues in HCI, and the increasing reliance in IT law on design for regulation of emerging technologies. Legally, we present two detailed case studies of emerging technologies (domestic internet of things and smart metering) mapping the emerging legal landscape and challenges therein. We situate the role of designers, as regulators, within this space, and show how they can respond accordingly through their user centric focus. Practically, we analyse experiences from leading experts in technology design and regulation to understand the challenges of doing information privacy by design (PbD) for the IoT. We present our findings within the framing of technological, business and regulatory perspectives. Lastly, we present a design tool, ‘information privacy by design cards’, to support designers in doing PbD. This tool has been designed, tested and refined, providing us with a practical approach to doing user centric regulation. Based on our findings from using the cards, we provide the concept of regulatory literacy to clearly conceptualise the role of designers in regulation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Emiroglu, Sinem. "Information Society: National Science And Technology Policies In Turkey And South Korea". Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12614980/index.pdf.

Texto completo da fonte
Resumo:
This thesis emphasizes the role of being an information society in countries&rsquo
development perspective
furthermore aims to study the economic, social and structural dimensions of information society related policies with the case studies of Turkey and South Korea. Although in 1950s Turkey and South Korea had similar characteristics in terms of basic economic and social indicators, Turkey has lagged behind in South Korea in terms of development perspective and information society parameters. In addition, information society levels of Turkey and South Korea are measured and compared by ICT development index. Information society policies of South Korea and Turkey are analyzed in the scope of national science and technology policies separately. In theoretical perspective, transforming to information society is analyzed on the basis of &ldquo
Deployment policies in the field of ICT&rdquo
and &ldquo
Two models of network policy formation&rdquo
. The findings of the study indicate that, although hegemonic ruler organizations determine science and technology and transforming to information society related policies, government should not apply these policies without considering their internal dynamics. These policies should be re-evaluated and modified in the scope of national advantages and priorities. In addition, this study aims to indicate the importance of the role of science and technology policies on being an information society for 21st century.
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Li, Ning 1962. "The computerized landscape: The potential of utilizing computer integration technology in landscape architecture". Thesis, The University of Arizona, 1990. http://hdl.handle.net/10150/291542.

Texto completo da fonte
Resumo:
In this thesis, computer integration technology and human interfaces will be assessed to determine if it can help in sharing, connecting, and transferring information in Landscape Architecture. Traditional methods of integration using manual techniques need to be modified for computer applications. Existing user friendly computer integration technology was researched and an experimental demonstration based on the Landscape Architectural applications was developed. Other applications and benefit of computer integration technology in Landscape Architectural practice are discussed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Hider, Philip Martin. "User redefinition of search goals through interaction with an information retrieval system". Thesis, City, University of London, 2004. http://openaccess.city.ac.uk/19506/.

Texto completo da fonte
Resumo:
Search goals of users of information retrieval systems have commonly been assumed to be static and well-formed. However, a significant amount of goal redefinition is detected in the studies described. A pilot study examined user behaviour at a library OPAC, showing that search results would quite frequently induce users to reconsider and revise their search goals, sometimes following up with a new search based on this revision (labeled "strong" goal redefinition). The main analysis employed transaction logs from the OCLC FirstSearch service, investigating what factors, if any, might affect the amount of goal redefinition that takes place during a search session. To this end, ten hypotheses were proposed and considered. Within each search session, logged queries were coded according to their conceptual differences or similarities, in order for indices of strong goal redefinition to be constructed: a chronological content analysis was thus performed on the transaction logs. The indices of redefinition for search sessions on different FirstSearch databases were compared. It was found that different databases induced goal redefinition to different extents. Further analysis showed that the metadata displayed by a database appeared to affect the amount of goal redefinition, and that the presence of abstracts in results was a positive factor, as was the presence of descriptors and identifiers, perhaps because of the former's hyperlinking nature on the FirstSearch interface. On the other hand, no evidence was found to indicate that abstract length has much of an effect on goal redefinition, nor hit rate or levels of precision and recall. Of the two indices of redefinition that were produced, the "refined" index showed signs of greater precision. Implications of the findings are discussed. It is suggested that goal redefinition should be considered a positive result of system feedback, and that systems should readily allow users to follow up on redefined goals. Abstracts and summaries of documents should be presented to the user as frequently as possible, and hyperlinks from key terms in the metadata should also be created to assist evolving searches. The importance of how system feedback is encountered by the user is emphasized in a new model of information retrieval, which embraces the nonconscious as part of the "cognitive viewpoint," allowing for nonconscious information wants to enter into a user's consciousness through cues encountered during the scanning of search results, triggering a redefinition of search goal. This thesis paves the way for a considerable amount of potentially important research, including: further testing and development of the index of goal redefinition; deeper transaction log analyses, perhaps using screen recorders, examining semantic content and contextualizing at the level of the query; and further identification and analysis of the factors affecting goal redefinition, across different types of information retrieval system.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Phiri, Lighton. "Investigating the Impact of Organised Technology-driven Orchestration on Teaching". Thesis, University of Cape Town, 2018. http://pubs.cs.uct.ac.za/archive/00001263/.

Texto completo da fonte
Resumo:
Orchestration of learning involves the real-time management of activities performed by educators in learning environments, with a particular focus on the effective use of technology. While different educational settings present unique problems, the common challenges have been noted to primarily be as a result of multiple heterogeneous activities and their associated intrinsic and extrinsic constraints. In addition to these challenges, this thesis argues that the complexities of orchestration are further amplified due to the ad hoc nature of the approaches and techniques used to orchestrate learning activities. The thesis proposes a streamlined approach to technology-driven orchestration of learning, in order to address these challenges and complexities. Specifically, the thesis proposes an organised approach that focuses on three core aspects of orchestration: activity management, resource management and sequencing of learning activities. Orchestration was comprehensively explored in order to identify the core aspects essential for streamlining technology-driven orchestration. Proof-of-concept orchestration toolkits, based on the proposed orchestration approach, were implemented and evaluated in order to assess the feasibility of the approach, its effectiveness and its potential impact on the teaching experience. Comparative analysis and guided orchestration controlled studies were conducted to compare the effectiveness of ad hoc orchestration with streamlined orchestration and to measure the orchestration load, respectively. In addition, a case study of a course that employed a flipped classroom strategy was conducted to assess the feasibility of the proposed approach. The feasibility was further assessed by integrating a workflow, based on the proposed approach, that facilitates the sharing of reusable orchestration packages. The results from the studies suggest that the streamlined approach is more effective when compared to ad hoc orchestration and has a potential to provide a positive user experience. The results also indicate that the approach imposes acceptable orchestration load during scripting of learning activities. Case studies conducted in authentic educational settings suggest that the approach is feasible, and potentially applicable to useful practical usage scenarios. The long-term implications are that streamlining of technology-driven orchestration could potentially improve the effectiveness of educators when orchestrating learning activities.
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Klecun, Elzbieta. "Telehealth and information society : a critical study of emerging concepts in policy and practice". Thesis, London School of Economics and Political Science (University of London), 2002. http://etheses.lse.ac.uk/272/.

Texto completo da fonte
Resumo:
This thesis explores a number of interrelated factors that influence the development of telehealth. Telehealth refers to health-related services that can be provided in electronic form over various telecommunications networks, including applications beyond clinical settings and reaching out to communities and homes. As such this study encompass different disciplines and draws not only on the medical tradition but also on information systems, social theory and ideas of information society. The study is based on the fundamental claim that technology does not follow a pre-determinate path but is shaped by people, who in turn are constrained by historical conditions and current structures. The research takes into consideration a number of such defining structures, including the organisation of healthcare in Britain, the health policy process, strategies for the employment of information and communications technologies (ICTs), conflicting ethical traditions and their manifestations in evaluation processes, and visions of an information society. The theoretical position and research approach is informed by critical theory. Thus the work focuses on the different, often conflicting, interests of varied stakeholders. It also unveils factors constraining social aims to which telehealth could aspire, e.g. reducing social exclusion and supporting empowerment of patients and citizens. Insights into these concepts and their practical manifestations are explored through a set of linked case studies, which investigate a variety of telehealth projects and initiatives in the London Borough of Lewisham. The thesis' contribution is twofold - practical and theoretical. The practical contribution is aimed at those who work in and study telehealth, offering a new approach and focus that is not substantially found in other telehealth studies. In this the thesis makes a contribution to the ongoing debates about telehealth's potential implications for the healthcare process. The theoretical contribution is found in the thesis' re-affirmation of the applicability of critical theory to the development of ICT-based social and organisational innovations, re-conceptualised in the light of post-modern and information society theories.
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Thaldorf, Carey L. "Searching for meaningful use of health information technology a study of cardiovascular disease care in veterans general hospitals". Doctoral diss., University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4710.

Texto completo da fonte
Resumo:
The cost of healthcare in the United States is on an upward trajectory towards an unsustainable level. In order to address this, Congress and the Obama Administration passed the American Recovery and Reinvestment Act (ARRA) of 2009 to begin the process of controlling these costs. Within the ARRA is the Health Information Technology for Economic and Clinical Health (HITECH) section which creates financial incentives to invest in Health Information Technology (HIT) and to develop a means to measure the Meaningful Use of specific functions of Electronic Health Records (EHRs). This research examines the widely used Joint Commission datasets to determine their suitability as a basis of meeting the government mandated measuring of Meaningful Use. The datasets used for this study consists of hospital level performance measures with a sample size of 370 hospital samples of HIT Use Intensity and Cardiovascular Performance attained from the Veterans Health Administration (VHA). An Organizational Network Theoretical approach was applied to the data in a non-experimental, sample-resample design to data collected in 2007. A Structural Equation Model (SEM) was built to test for the strength of the correlation between HIT Use Intensity and Cardiovascular Performance and a Latent Growth Curve Model (LGM) was built to examine the effect of the trajectory of HIT Use Intensity on the trajectory of Cardiovascular Performance. The SEM found a weak (.18) correlation between HIT Use Intensity and Cardiovascular Performance and the model only captured 12 percent of the variance. The LGM found no convergence between the trajectories of HIT Use Intensity and Cardiovascular Performance. This may have been the result of the data being non-normally distributed and heavily skewed to the high end of the scale.; The policy implications of this study indicate that while Joint Commission data capture only a small amount of the variance attributed to HIT Use it does show a weak but positive correlation between increases in HIT Use Intensity and Increases in Cardiovascular Performance at the hospital level. Future research into adjustments to Joint Commission data measures (or others) may prove to be valuable in measuring the Meaningful Use of HIT systems in order to help hospitals make educated decisions on which HIT systems to purchase and the potential benefits associated with them.
ID: 031001544; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Title from PDF title page (viewed August 22, 2013).; Thesis (Ph.D.)--University of Central Florida, 2011.; Includes bibliographical references (p. 125-133).
Ph.D.
Doctorate
Health and Public Affairs
Public Affairs
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Usoro, Abel Akpan Udo. "Reaction to the introduction of information technology (IT) : a case study of the UK general medical practitioners (GPs)". Thesis, London South Bank University, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.240208.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Shaw, Christopher. "How do sociomaterial networks involving large-scale automation come into being, persist and change over time, within a healthcare environment?" Thesis, Northumbria University, 2014. http://nrl.northumbria.ac.uk/21437/.

Texto completo da fonte
Resumo:
The aim of this thesis is to develop a theoretical model to explore how sociomaterial networks, involving large-scale automation, come into being, persist and change over time, within a healthcare environment. It does so by bridging the gap between design, implementation and use of large-scale pathology automation (LSPA) within two United Kingdom (UK) National Health Service (NHS) laboratories. A longitudinal, multi-site, ethnographic approach was used, along with semi-structured interviews, template analysis and participant observation of LSPA ‘in-practice’. This research has suggested that design features, embedded within the material properties of LSPA, were purposefully intended to bring about organisational change. In both user organisations, the material affordances of LSPA resulted in anticipated skill mix changes. However, material constraints required the enforcement of changes to organisational routines, creating operational difficulties, which were then subsequently transferred across organisational boundaries by the researcher/manager. The identification of these sociomaterial affordances and constraints, in conjunction with humans acting as boundary objects, had the unintended consequence of influencing strategic decision making and initiating structural and cultural change. The development and practical application of the resulting SociomANTerial model allowed the researcher to trace the analytical history of these organisational changes over time and consider the impact of broader social structures such as power. Ultimately it is suggested that a greater emphasis on collaboration between users, designers and corporate agents will result in more innovative approaches for technology adoption and improved organisational design.
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Tebbetts, Jo A. "Cable modems' transmitted RF| A study of SNR, error rates, transmit levels, and trouble call metrics". Thesis, Capella University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3556737.

Texto completo da fonte
Resumo:

Hypotheses were developed and tested to measure the cable modems operational metrics response to a reconfiguration of the cable modems' transmitted RF applied to the CMTS. The purpose of this experiment was to compare two groups on the use of non-federal RF spectrum to determine if configuring the cable modems' transmitted RF from 25.2 MHz, at 6.4 MHz Wide, 64 QAM and 31 MHz, at 6.4 MHz Wide, 64 QAM to 34.8 MHz, 6.4 MHz Wide, 64QAM improved the data services operational metrics measured by a wire line service operator to determine the quality of their product. The experiment tests the theory; configuring cable modems' transmitted RF to 34.8 MHz, 6.4 MHz Wide, 64QAM on the CMTS significantly impacted a cable modem's operational metrics, and as a result, increased operational effectiveness.

A randomized experiment on 117,084 cable modems resulted in a significant impact on SNR and transmit rates but did not present a significant impact on error rates and the trouble call metrics. The results showed that reconfiguring the cable modems' transmitted RF from 25.2 MHz, at 6.4 MHz Wide, 64 QAM and 31 MHz, at 6.4 MHz Wide, 64 QAM, to 34.8 MHz, 6.4 MHz Wide, 64QAM did significantly increase the SNR and transmit rates but did not significantly impact error rates and the trouble call truck roll metrics. The results are discussed in relation to other work implicating engineering RF management strategies and the impact on the cable modems operational metrics by reconfiguring the cable modems' RF from the lower ends of the RF spectrum into the middle of the RF spectrum configured on a wire line service operator's CMTS.

Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Allen, Ronald Timothy. "Exploring the Lived Experiences of Program Managers Regarding an Automated Logistics Environment". Thesis, Northcentral University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3579717.

Texto completo da fonte
Resumo:

Automated Logistics Environment (ALE) is a new term used by Navy and aerospace industry executives to describe the aggregate of logistics-related information systems that support modern aircraft weapon systems. The development of logistics information systems is not always well coordinated among programs, often resulting in solutions that cannot be easily integrated or made interoperable with other information systems used within the Department of Defense. A phenomenological approach was used to explore ALE program managers' lived experiences of coordinating defense acquisition programs toward the goal of creating a common environment in which information systems are well integrated and interoperable. The business problems associated with smart aircraft diagnostic, prognostic, health and usage monitoring systems, and the challenges created by the large volumes of data that are being collected by sensors onboard newly deployed smart aircraft also were explored. This qualitative study was accomplished by conducting interviews with 18 logistics and information technology managers from Naval Air Systems Command, Naval Air Station Patuxent River, Maryland with first-hand experience in dealing with ALE. The study results were presented in the form of a composite description derived from the textural-structural descriptions for each study participant. Results of the study included the structures of meaning surrounding ALE and identified social, organizational, and other non-technical components of systems integration that have been largely ignored in the information systems literature. Study results also included the perceived benefits and disadvantages of a common Automated Logistics Environment. Future researchers should consider the rich opportunities available to study other system of systems environments in federal government agencies including the U.S. Department of Defense, military departments, and subordinate defense agencies. While scholars may desire to simplify complex phenomena, future researchers should take care to avoid oversimplification of systems integration constructs in system of systems environments. As shown by this current ALE study, some technical and nontechnical issues may be inseparable in a real world setting. The ALE study results indicated that research that focuses on either technical or non-technical aspects of systems integration may not fully account for dynamic, interrelated (and often subtle) factors and may restrict our understanding of systems integration.

Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Suhonen, Juhani. "Age, Tenure, General Self-Efficacy, and Sales Performance of Salespeople". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7956.

Texto completo da fonte
Resumo:
Companies worldwide spend millions of dollars on sales training but often fail to address the significant effect of personal attributes of salespeople on sales performance. Grounded in Bandura's self-efficacy theory, the purpose of this quantitative correlational study was to examine the relationship between age, tenure, general self-efficacy, and sales performance among face-to-face salespeople of technology companies worldwide. Understanding this relationship is important to sales managers for predicting sales performance to enhance sustainability. Data were collected from 103 participants between July and September 2019 via a survey link in the largest IT sales professional LinkedIn group. Multiple hierarchical linear regression analysis indicated a significant relationship, F(3,92) = 8.64, p < .001, R2 = .22, between age, length of tenure, general self-efficacy, and sales performance of salespeople. Implications for positive social change include the potential for sales managers to understand the correlates of sales performance better to contribute to the reduction of discrimination when recruiting salespeople of various ages and experience.
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Park, Hun Myoung. "How does information and communication technology affect civic engagement? an analysis focusing on electronic government and campaign websites /". [Bloomington, Ind.] : Indiana University, 2007. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3274260.

Texto completo da fonte
Resumo:
Thesis (Ph.D.)--Indiana University, School of Public and Environmental Affairs, 2007.
Source: Dissertation Abstracts International, Volume: 68-07, Section: A, page: 3141. Title from dissertation home page (viewed April 8, 2008). Adviser: James L. Perry.
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Silva, Leiser. "Power and politics in the adoption of information systems by organisations : the case of a research centre in Latin America". Thesis, London School of Economics and Political Science (University of London), 1997. http://etheses.lse.ac.uk/273/.

Texto completo da fonte
Resumo:
This thesis applies contributions from the social sciences to the study of power to examine how and why organisations adopt information systems. Its main concern is the set of events, actions and factors that induce an information system to become routinised in the organisational life; that is how information systems become institutionalised. I argue that the actions and events that lead to the adoption and subsequent institutionalisation of an information system are politically motivated and facilitated by power relations because information systems are chiefly instruments used by organisational actors to achieve their goals. To develop the argument I have adapted and interpreted a model rooted in social and organisational sciences. This model is used as a theoretical framework for the collection and analysis of data of two case studies. the first case centres on the collapse of the London Ambulance Service in 1992. The second and major case study focuses on a research centre in Latin America. This case study accounts for the adoption and institutionalisation of three information systems in that organisation. The application of the theoretical framework constitute a contribution in researching power and politics of information systems because it illustrates how to link data to the theory. This thesis also contributes to the theory of power and information systems because the findings of the two case studies allowed us to make inferences that complement the original theoretical model. Furthermore, those findings are propositions that information systems practitioners might convert into useful principles in assessing the political base and power relationships of the organisation for which they work. The thesis concludes by asserting that the adoption and institutionalisation of an information system necessarily imply the exercise of power of those organisation actors that own or propose the system.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia