Dissertationen zum Thema „Information Technology|Engineering, System Science|Operations Research“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Information Technology|Engineering, System Science|Operations Research.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Information Technology|Engineering, System Science|Operations Research" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Koc, Levent. „Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection“. The George Washington University, 2013.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Mullaseril, Paul Abraham 1959. „Capacitated rural postman problem with time windows and split delivery“. Diss., The University of Arizona, 1997. http://hdl.handle.net/10150/282300.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
The importance of effective and efficient distribution is evident from its associated costs. Transportation and shipping alone comprise roughly 15 percent of a product's sales in the U.S. Physical distribution is very energy and labor intensive, which have both become relatively more expensive in the last 10-15 years. Not surprisingly, there is a growing demand for automated planning systems that produce economical routes. Other than the cost savings, introduction of these systems enables companies to maintain a higher level of service for their customers, it makes them less dependent on human planners, it supplies better management information facilities and it makes distribution planning work faster and simpler.
3

Frazier, Eugene. „Small Business Leadership and Organizational Culture, Job Satisfaction and Performance| Correlational Research“. Thesis, University of Phoenix, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3569145.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:

This study investigated the relationship among organizational leadership styles (criterion variables), organizational culture, and employee job satisfaction, and organizational performance (predictor variables). The study research method was the quantitative method using a correlational research design that investigated the relationship among the variables. The data indicated relationships existed among the criterion variable, transformational leadership and the predictor variables, culture and employee job satisfaction. Correlation tests and regression analysis reflected the existence of significant relationships. The MLQ survey instrument facilitated data collection on leadership styles and on employee job satisfaction. In addition, the MLQ survey facilitated the collection of data concerning outcomes or behaviors of the leadership styles. Outcomes included cultural artifacts, extra effort from employees, and employee job satisfaction. In addition, the amended survey included supplementary demographic questions. Transformational and transactional leadership positively correlated with increased employee job satisfaction correlated with organizational performance. The findings of this study supported the literature review findings. The results may illuminate the relationship among organizational leadership styles and organizational culture and organizational job satisfaction and performance thereby facilitating organizational success.

4

Atkins, Cynthia. „An Investigation of the Impact of Requirements Engineering Skills on Project Success“. Digital Commons @ East Tennessee State University, 2013. https://dc.etsu.edu/etd/1515.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
A survey of project managers and requirements engineers was conducted to determine what skills, qualifications, and experiences were associated with project success. Survey results indicated that projects using Joint Application Development (JAD) sessions, use cases, and prototypes to engineer requirements were most successful. Other indicators of project success, according to participants, included an adequate allotment of time for requirements engineering—at least 15% of a project's time—and the use of project managers and requirements engineers with professional work experience. In particular, data indicated that Project Managers with at least five years of experience in Information Technology resulted in more successful projects.
5

Aldhaban, Fahad Abdulaziz. „Exploratory Study of the Adoption and Use of the Smartphone Technology in Emerging Regions: Case of Saudi Arabia“. PDXScholar, 2016. http://pdxscholar.library.pdx.edu/open_access_etds/2651.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Users' acceptance of a new information technology (IT) is considered to be a key determinant factor of its success. Also, studying users' adoption and use of new IT plays an important role in determining users' needs and reducing business risk, especially in industry segments with rapid changes in IT such as Smartphone technology. Such rapid evolution is influencing consumers' behaviors, their daily lifestyle, the manner of conducting their activities and their ways of consuming and using information. Smartphone technology holds a promising future with an expected global market that could reach US $258 billion by the end of year 2015 [1]. Besides the mobile industry, Smartphone technology introduces a wide range of opportunities and challenges for many related industries that participate directly or indirectly in producing and providing Smartphone services/products to the end users. Moreover, the Smartphone technology is relatively new technology with plenty of room for improvement. Better understanding of users' intentions and their behaviors regarding the adoption and use of the Smartphone technology plays a critical role in determining its success and benefiting all stakeholders. Significant efforts have been made to study and explain users' adoption and use of Smartphone technology. However, most of the empirical research focused on only a limited number of Smartphone aspects or on a specific profession such as doctors and nurses which may neglect other important factors. In emerging regions such as Jordan and China, cultural and social influence showed significant relationships with users' adoption and use of the Smartphone and its related technologies. Saudi Arabia is a developing country that has different cultural and social contexts that could influence users' intention to adopt and use the Smartphone technology. The key factors that influence general users' intention to adopt and use Smartphone technology in Saudi Arabia have not yet been studied and explored in a comprehensive manner. Therefore, the main purpose of this dissertation is to empirically study and explore the key factors that influence general users' adoption and use of the Smartphone in a comprehensive manner in Saudi Arabia. This dissertation starts with a literature review of existing research related to the adoption and use of Smartphone technology. Taxonomy is developed that includes factors that were identified as important in previous research and related to the adoption and use of the Smartphone technology. By using the developed taxonomy and reviewing literature related to the IT adoption theories, a preliminary theoretical research model is developed based on the Unified Theory of Acceptance and Use of Technology (UTAUT). A number of qualitative methods, namely brainstorming, focus group and individual interviews, have been conducted to evaluate, select and validate the existing factors, as well as introduce new factors, and to identify only the most related factors to be included in the preliminary research model. A survey questionnaire has been developed and validated to survey general users of the Smartphone in Saudi Arabia. A web-based survey has been designed and sent through email to 5,000 randomly selected smartphones users in Saudi Arabia. Data has been statistically analyzed using Structural Equation Modeling (SEM). The results indicate that performance expectancy factor, effort expectancy factor, brand influence factor, perceived enjoyment factor and design factor have a positive and significant relationship with users' intention to adopt and use smartphones in Saudi Arabia. Also, the results indicate that the social influence factor has a significant and positive relationship with use behavior or actual use of smartphones in Saudi Arabia. The results of this dissertation provide more insights to practitioners in the smartphones domain and information that contributes to the body of knowledge regarding information technology adoption and its related research, especially in Saudi Arabia.
6

Calliess, Jan-Peter. „Conservative decision-making and inference in uncertain dynamical systems“. Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:b7206c3a-8d76-4454-a258-ea1e5bd1c63e.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
The demand for automated decision making, learning and inference in uncertain, risk sensitive and dynamically changing situations presents a challenge: to design computational approaches that promise to be widely deployable and flexible to adapt on the one hand, while offering reliable guarantees on safety on the other. The tension between these desiderata has created a gap that, in spite of intensive research and contributions made from a wide range of communities, remains to be filled. This represents an intriguing challenge that provided motivation for much of the work presented in this thesis. With these desiderata in mind, this thesis makes a number of contributions towards the development of algorithms for automated decision-making and inference under uncertainty. To facilitate inference over unobserved effects of actions, we develop machine learning approaches that are suitable for the construction of models over dynamical laws that provide uncertainty bounds around their predictions. As an example application for conservative decision-making, we apply our learning and inference methods to control in uncertain dynamical systems. Owing to the uncertainty bounds, we can derive performance guarantees of the resulting learning-based controllers. Furthermore, our simulations demonstrate that the resulting decision-making algorithms are effective in learning and controlling under uncertain dynamics and can outperform alternative methods. Another set of contributions is made in multi-agent decision-making which we cast in the general framework of optimisation with interaction constraints. The constraints necessitate coordination, for which we develop several methods. As a particularly challenging application domain, our exposition focusses on collision avoidance. Here we consider coordination both in discrete-time and continuous-time dynamical systems. In the continuous-time case, inference is required to ensure that decisions are made that avoid collisions with adjustably high certainty even when computation is inevitably finite. In both discrete-time and finite-time settings, we introduce conservative decision-making. That is, even with finite computation, a coordination outcome is guaranteed to satisfy collision-avoidance constraints with adjustably high confidence relative to the current uncertain model. Our methods are illustrated in simulations in the context of collision avoidance in graphs, multi-commodity flow problems, distributed stochastic model-predictive control, as well as in collision-prediction and avoidance in stochastic differential systems. Finally, we provide an example of how to combine some of our different methods into a multi-agent predictive controller that coordinates learning agents with uncertain beliefs over their dynamics. Utilising the guarantees established for our learning algorithms, the resulting mechanism can provide collision avoidance guarantees relative to the a posteriori epistemic beliefs over the agents' dynamics.
7

Panokarren, Clifford L. „Information model for engineering change management“. FIU Digital Commons, 2004. https://digitalcommons.fiu.edu/etd/3949.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Managing engineering changes is a critical task for organizations to remain competitive. In a manufacturing organization there are innumerable engineering change requests. This thesis is focused on the development of an information model that defines the engineering change process. This research developed an activity model in IDEF0, an object model in IDEF1X and a dynamic model using state diagrams. The activity model captures the business process for executing an engineering change in terms of its constituting activities and sub-activities. The object model defines each object and its attributes identified in the activity model. The dynamic model captures the status change of each object in the engineering change process. This study concludes with a summary, implementation issues and future work that can be done in the direction of implementing a system based \ on the information model developed.
8

Brown, Jill A. „Examining Strategic Information Technology in Relationship to the Need for Technology Modernization“. TopSCHOLAR®, 2009. http://digitalcommons.wku.edu/theses/129.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Strategic planning can be a critical business process for today’s organizations, especially for IT organizations that are facing continually changes in technology. This research was designed to investigate IT organizations’ use of strategic planning and determine if the organization uses their strategic plan to set project priorities. The second part of this research was to determine if the IT strategic plans are aligned with the overall organization’s strategic plan. This research was conducted using a mail-type survey to IT Executives from organizations with sales/revenues under 100 million dollars, a maximum of 5000 employees, and SIC codes of 201 thru 399. The selected organizations were mailed a survey packet followed by a phone call for all non-responding organizations. The findings that resulted from this research showed that there is statistical evidence to support that organizations do perform the business process of developing a strategic plan. This research also showed that IT organizations do develop an IT strategic plan. However, there is not a high correlation between the organization’s strategic plan and the IT strategic planning process. If the IT organization has a strategic plan, then the plan is reviewed on a regular basis, referenced for project prioritization, and the IT employees are familiar with the plan.
9

Raje, Satyajeet. „ResearchIQ: An End-To-End Semantic Knowledge Platform For Resource Discovery in Biomedical Research“. The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1354657305.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Quintero, Michael C. „Constructing a Clinical Research Data Management System“. Thesis, University of South Florida, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10640886.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:

Clinical study data is usually collected without knowing what kind of data is going to be collected in advance. In addition, all of the possible data points that can apply to a patient in any given clinical study is almost always a superset of the data points that are actually recorded for a given patient. As a result of this, clinical data resembles a set of sparse data with an evolving data schema. To help researchers at the Moffitt Cancer Center better manage clinical data, a tool was developed called GURU that uses the Entity Attribute Value model to handle sparse data and allow users to manage a database entity’s attributes without any changes to the database table definition. The Entity Attribute Value model’s read performance gets faster as the data gets sparser but it was observed to perform many times worse than a wide table if the attribute count is not sufficiently large. Ultimately, the design trades read performance for flexibility in the data schema.

11

Fullenkamp, Steven Charles. „The Effect of Cue and Target Similarity on Visual Search Response Times: Manipulation of Basic Stimulus Characteristics“. Wright State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=wright1388500646.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Talwar, Sonia. „Spatializing science and technology studies : exploring the role of GIS and interactive social research“. Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/755.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
This thesis is an interdisciplinary study based on the interplay between science, technology and society in order to inform the design of knowledge exploration systems. It provides a rationale for the integration of science knowledge, geographic information, with digital libraries to build knowledge and awareness about sustainability. A theoretical reconceptualization of knowledge building is provided that favours interactive engagement with information and argues against a traditional model of science production and communication that is linear and unidirectional. The elements of contextualization, classification and communication form the core of the reconceptualization. Since many information systems entrench the traditional model of science production, the three elements are considered in light of library and information science and geographic information science. The use of geographic information systems is examined to identify how they can be used as part of a social learning model for scientific, social, cultural, and environmental issues to further assist people in connecting to place and sustainability. Empirical data was collected from four case studies. One case study centred on the design and development of a web-based digital library called the Georgia Basin Digital Library, another two case studies focused on the use of part of this digital library with youth, senior and environmental groups in south-western British Columbia. The remaining case study observed a community deliberation to consider how knowledge exploration systems might support deliberation in future processes. The case study research confirms that collaborative research with communities is a fruitful way to engage with sustainability issues. Such collaborations require consideration of institutional arrangements, information collections, relationship building, technology transfer and capacity building.
13

Kim, Sung Han. „Computing Research in Academia: Classifications, Keywords, Perceptions, and Connections“. BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/5893.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
The Association for Computing Machinery (ACM) recognizes five computing disciplines: Computer Science (CS), Computer Engineering (CE), Information Technology (IT), Information Systems (IS), and Software Engineering (SE). Founded in 1947 the ACM is the world's largest society for computing educators, researchers, and professionals. While Computer Science has been a degree program since 1962, the other four are relatively new. This research focuses on understanding the graduate research in four of the five ACM disciplines (CS, CE, IT, and IS) using a large body of thesis and dissertation metadata. SE is not found in the metadata and graduate work in SE is not included. IS is no longer officially found in the metadata so its representative ProQuest replacement, Information Science although not an ACM recognized discipline is used based on the commonality of the associated ProQuest Classification code. The research is performed using co-word and graph analysis of author-supplied Classifications, Departments, and keywords. Similarities and differences between the disciplines are identified. Whether the computing discipline is the primary or the secondary focus of the research makes a large difference in the connections it makes with other academic disciplines. It was found that the Departments from which computing research originates varies widely but the majority come from computing-related Departments. Finally, gaps are apparent from the practitioners' views of the computing disciplines versus the public's view.
14

Javanmardian, Kia. „Diabetes Research Vortex : a novel information management system for Type I diabetes“. Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33309.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.
Includes bibliographical references (leaf 69).
Information management is becoming a necessary task for modem research laboratories. As scientific research within a particular domain progresses, the amount of data and publications in the domain increases drastically. Type one diabetes (TID) research is no exception. The DRV (Diabetes Research Vortex) addresses the information management challenge. The DRV's main objective is to provide a web accessible information management system for diabetes related publications and experimental data. The DRV was inspired by current T1D research paradigms. A user can choose to upload a publication or experimental data under one of four research categories: a strain, gene, Idd (Insulin Dependent Diabetic) genetic region, or custom keyword. The effectiveness of the DRV lies in the biological concepts it encapsulates. The DRV allows a user to view the system's contents by browsing a strain, gene, Idd, or custom keyword. Furthermore, the DRV allows a user to seamlessly browse among related strains, genes, and Idd's. The DRV links information between each of these domains and allows a user to intuitively acquire knowledge about a specific interest. The system can also be asked to mine publications from PubMed based the terms stored in the -four aforementioned categories. Furthermore, the system complies with the MIAME standard (Minimum Information About Microarray Experiment). Therefore, the system allows a systematic way to upload and retrieve microarray data. The DRV presents a starting point for a TID information management system. The concepts governing the overall design of the DRV should also be relevant and applicable to many other research fields.
(cont.) Therefore, the potential impact of the DRV may stretch beyond the domain of T1D.
by Kia Javanmardian.
M.Eng.
15

Todoroki, Christine Louisa. „Primary and secondary log breakdown simulation“. Thesis, University of Auckland, 1997. http://wwwlib.umi.com/dissertations/fullcit/9913695.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Log breakdown by sawing can be viewed as a multi-phase process that converts logs into boards by a series of cutting operations. In the primary phase, logs are sawn into s labs of wood known as flitches or cants. These are further processed by secondary operations, that resaw, edge (cut lengthwise) and trim (cut widthwise) the raw material, resulting in the manufacture of the board product whose value is influenced by its composite dimensions and quality (as indicated by a grade). Board grade is in turn determined by the number, type, size, and location of defects. Owing to its biological origins, each log, and subsequent board, is unique. Furthermore, as each sawmill, and processing centre within the mill, has a unique configuration, the problem of determining how each log entering a mill should be sawn is very complex. Effective computer simulation of log breakdown processes must therefore entail detailed descriptions of both geometry and quality of individual logs. Appropriate strategies at each breakdown phase are also required. In this thesis models for emulating log breakdown are developed in conjunction with an existing sawing simulation system which requires, as input, detailed three-dimensional descriptions of both internal and external log characteristics. Models based on heuristic and enumerative procedures, and those based upon the principles of dynamic programming (DP) are formulated, encoded, and compared. Log breakdown phases are considered both independently and in a combined integrated approach-working backwards from the board product through to the primary log breakdown phase. This approach permits methodology developed for the later processes to be embedded within the primary phase thus permitting the determination of a global rather than local solution to the log breakdown problem whose objective is to seek the highest possible solution quality within the minimum possible time. Simulation results indicate that solution quality and processing speeds are influenced by both solution methodology and degree of data complexity. When the structure of either factor is simplified, solutions are generated more rapidly-but with an accompanying reduction in solution quality. A promising compromise that combines DP techniques with mathematical functions based on a subset of the original data is presented.
Subscription resource available via Digital Dissertations only.
16

Zheng, Xin. „The office automatic system research based on workflow technology“. Thesis, University of Macau, 2005. http://umaclib3.umac.mo/record=b1445898.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Harvey, Glenn B. „Design and implementation of a microcomputer based Laboratory and Operations Information System (LOIS) for wastewater treatment plants“. Thesis, Virginia Tech, 1989. http://hdl.handle.net/10919/44644.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
The requirements for a wastewater treatment plant microcomputer based Laboratory and Operations Information System (LOIS) were considered. Emphasis was placed on combining data generated by the laboratory and the operations divisions of the Alexandria Sanitation Authority. Goals were established to meet the information needs of key decision makers within the Authority and external information consumers such as regulatory authorities and design engineers. Integration of laboratory analysis and plant operational data was of prime importance.

A series of related computer programs was developed to manage laboratory and operational data and calculate results derived from both sources. The programs stressed data integrity, flexible report generation, statistical and graphical data analysis, and ease of use. A program was developed to address laboratory quality control data management and the production of quality control charts.

The computer programs were written in a generic fashion so as to be applicable to other water or wastewater treatment plants and to provide maximum flexibility for future expansion. Programs were developed in a modular fashion to allow greater ease of maintenance and revision in the future. Common subroutines were employed wherever possible. Some report generation subprograms were written specifically to the requirements of the Alexandria Sanitation Authority.
Master of Science

18

Dobrzykowski, David D. „Linking Antecedents and Consequences of Value Density in the Healthcare Delivery Supply Chain“. University of Toledo / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1289833170.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Conradie, Pieter Wynand. „The use and effectiveness of information system development methodologies in health information systems / Pieter Wynand Conradie“. Thesis, North-West University, 2010. http://hdl.handle.net/10394/4277.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Abstract The main focus of this study is the identification of factors influencing the use and effectiveness of information system development methodologies (Le., systems development methodologies) in health information systems. In essence, it can be viewed as exploratory research, utilizing a conceptual research model to investigate the relationships among the hypothesised factors. More specifically, classified as behavioural science, it combines two theoretical models, namely the Unified Theory of Acceptance and Use of Technology and the Expectancy Disconfirmation Theory. The main aim of behavioural science in information systems is to assist practitioners (Le., social actors) in improving business processes and competitiveness, thus the effective use of information systems. A wider view of behavioural science incorporates other social actors (e.g., end users) and organisational actors (e.g., executives). In health information systems, the effective use of information systems is especially relevant Health information systems are vital in the area of health care, since only by having access to pertinent health information, can the correct decisions relating to diagnostics and curative procedures be made. The use of systems development methodologies in health information systems development is therefore crucial, since they can make the development process more effective, while improving software quality. By empirically evaluating the conceptual research model, utilizing a survey as the main research method and structural equation modelling as the main statistical technique, meaningful results were obtained. Focussing on the factors influencing the individual's behavioural intent, it was found that the compatibility of systems development methodologies to the developer's pre-existing software development style is vital. Furthermore, performance expectancy, self-efficacy, organisational culture, policies, customer influence, voluntariness and facilitating conditions, all directly influenced the use of systems development methodologies, with policies and customer influence playing a significant role, especially in relation to health information systems. No significant direct effects or indirect effects could be established for the factors effort expectancy, personal innovativeness and social influence. It appears that individuals working in the health care software development discipline are more autonomous, less influenced by others. Also, the lack of support for the factor effort expectancy may indicate that systems development methodologies have entered a mature state, with less concern on the effort required for use. Furthermore, with regard to effectiveness and the continued use of information systems methodologies, satisfaction had a significant direct effect, with confirmation having a significant indirect effect. Keywords: behavioural science; conceptual research model; direct effect; exploratory research; Expectancy Disconfirmation Theory; indirect effect; Unified Theory of Acceptance and Use of Technology; structural equation modelling; survey; systems development methodologies.
Thesis (Ph.D. (Computer Science))--North-West University, Potchefstroom Campus, 2010.
20

Albinsson, Pär-Anders. „Interacting with command and control systems : Tools for operators and designers“. Licentiate thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8425.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:

Command and control is central in all distributed tactical operations such as rescue operations and military operations. It takes place in a complex system of humans and artefacts, striving to reach common goals. The command and control complexity springs from several sources, including dynamism, uncertainty, risk, time pressure, feedback delays and interdependencies. Stemming from this complexity, the thesis approaches two important and related problem areas in command and control research. On a general level, the thesis seeks to approach the problems facing the command and control operators and the problems facing the designers in the associated systems development process.

We investigate the specific problem of operators losing sight of the overall perspective when working with large maps in geographical information systems with limited screen area. To approach this problem, we propose high-precision input techniques that reduce the need for zooming and panning in touch-screen systems, and informative unit representations that make better use of the screen area available. The results from an experimental study show that the proposed input techniques are as fast and accurate as state-of-the-art techniques without the need to resort to zooming. Furthermore, results from a prototype design show that the proposed unit representation reduces on-screen clutter and makes use of off-screen units to better exploit the valuable screen area.

Developing command and control systems is a complex task with several pitfalls, including getting stuck in exhaustive analyses and overrated reliance on rational methods. In this thesis, we employ a design-oriented research framework that acknowledges creative and pragmatic ingredients to handle the pitfalls. Our approach adopts the method of reconstruction and exploration of mission histories from distributed tactical operations as a means for command and control analysis. To support explorative analysis of mission histories within our framework, we propose tools for communication analysis and tools for managing metadata such as reflections, questions, hypotheses and expert comments. By using these tools together with real data from live tactical operations, we show that they can manage large amounts of data, preserve contextual data, support navigation within data, make original data easily accessible, and strengthen the link between metadata and supporting raw data. Furthermore, we show that by using these tools, multiple analysts, experts, and researchers can exchange comments on both data and metadata in a collaborative and explorative investigation of a complex scenario.


Report code: LiU-Tek-Lic-2004:61.
21

Eichhorn, Bradford Reese. „THE IMPACT OF USER INVOLVEMENT ON INFORMATION SYSTEM PROJECTS“. Cleveland State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=csu1410793063.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Sims, Zack A. „Deployment, Management, & Operations of Internet Routers for Space-Based Communication“. Ohio University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1429033241.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Geltz, Rebecca L. „Using Data Mining to Model Student Success“. Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1264697709.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Chow, Angelina. „A research on virtual money exchange systems“. Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2130125.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Raje, Satyajeet. „Data Fusion Ontology:Enabling a Paradigm Shift from Data Warehousing to Crowdsourcing for Accelerated Pace of Research“. The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1460993523.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Dahlstedt, Åsa G. „Requirements Managements from a Life Cycle Perspective : Overview and Research Areas“. Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-631.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:

Requirements Engineering (RE) is nowadays considered to be an activity, that aims at supporting the whole lifecycle of an information system by: eliciting, documenting, validating, and managing the requirements of the system. This thesis aims at providing an overview of the area of Requirements Management (RM) and to identify important and interesting issues or areas where further research is needed.

RM includes two major areas; organising requirements and requirements change management. Organising requirements is concerned with structuring the requirements and storing additional relevant information about them e.g. attributes and traceability information. Requirements change management is concerned with dealing with changing requirement in a systematic way i.e. making informed decisions whether to implement a certain change or not, and support the implementation of approved changes.

In order to provided a broader view of RM, the literature study were complemented by an interview study of how RM is conducted in practice. This interview study shows that the effort resources spent on RM differs substantially between different organisations. Various reasons for these discrepancies are elaborated in the work, but one of the main reasons are the type of software development that is conducted in the organisation. There is a tendency that organisations that develop software products and continuously releases new versions of there products are more likely to spend resources on RM, compared with organisations that develop customers specific solutions in one shoot projects. The need to reuse requirements and knowledge, as well as the maturity of the RE/RM process, are other factors that affects the resources spent on RM. The RM activities performed in practice are concordant with the activities found in literature.

A number of areas where further research is needed were identified: requirements change management, dependencies between requirements, RM tools, and information management

27

Saleck, Pay Babak. „Decomposition Algorithms in Stochastic Integer Programming: Applications and Computations“. VCU Scholars Compass, 2017. http://scholarscompass.vcu.edu/etd/5027.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
In this dissertation we focus on two main topics. Under the first topic, we develop a new framework for stochastic network interdiction problem to address ambiguity in the defender risk preferences. The second topic is dedicated to computational studies of two-stage stochastic integer programs. More specifically, we consider two cases. First, we develop some solution methods for two-stage stochastic integer programs with continuous recourse; second, we study some computational strategies for two-stage stochastic integer programs with integer recourse. We study a class of stochastic network interdiction problems where the defender has incomplete (ambiguous) preferences. Specifically, we focus on the shortest path network interdiction modeled as a Stackelberg game, where the defender (leader) makes an interdiction decision first, then the attacker (follower) selects a shortest path after the observation of random arc costs and interdiction effects in the network. We take a decision-analytic perspective in addressing probabilistic risk over network parameters, assuming that the defender's risk preferences over exogenously given probabilities can be summarized by the expected utility theory. Although the exact form of the utility function is ambiguous to the defender, we assume that a set of historical data on some pairwise comparisons made by the defender is available, which can be used to restrict the shape of the utility function. We use two different approaches to tackle this problem. The first approach conducts utility estimation and optimization separately, by first finding the best fit for a piecewise linear concave utility function according to the available data, and then optimizing the expected utility. The second approach integrates utility estimation and optimization, by modeling the utility ambiguity under a robust optimization framework following \cite{armbruster2015decision} and \cite{Hu}. We conduct extensive computational experiments to evaluate the performances of these approaches on the stochastic shortest path network interdiction problem. In third chapter, we propose partition-based decomposition algorithms for solving two-stage stochastic integer program with continuous recourse. The partition-based decomposition method enhance the classical decomposition methods (such as Benders decomposition) by utilizing the inexact cuts (coarse cuts) induced by a scenario partition. Coarse cut generation can be much less expensive than the standard Benders cuts, when the partition size is relatively small compared to the total number of scenarios. We conduct an extensive computational study to illustrate the advantage of the proposed partition-based decomposition algorithms compared with the state-of-the-art approaches. In chapter four, we concentrate on computational methods for two-stage stochastic integer program with integer recourse. We consider the partition-based relaxation framework integrated with a scenario decomposition algorithm in order to develop strategies which provide a better lower bound on the optimal objective value, within a tight time limit.
28

Hodosi, Georg. „Information Technology Outsourcing in Large Companies in Sweden : A Perspective on Risks, Relationships and Success Factors“. Doctoral thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-141707.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
This thesis investigates large private companies in Sweden that have outsourced their information technology (IT). A considerable proportion of IT outsourcing (ITO) is unsuccessful. For IT service buyers, this could cause IT that does not fully work, entailing problems with the network, application, infrastructure and security, with serious consequences such as a loss of customers’ confidence and significantly increased costs. Therefore, the main research goal was to analyse and define ways to improve ITO for buyer organizations. This main research goal was accomplished through three research goals that are the followings: 1) To develop a method for risk assessment in IT outsourcing; 2) To identify the important factors in IT outsourcing relationship; and 3) To identify the success factors in IT outsourcing.                       The research strategies applied in conducting this research were design science research and survey research. To achieve the first research goal, a method was developed for assessing the ITO risks, including support for mitigating these risks. This method could help both researchers and practitioners in estimating the ITO risks and in this way improve ITO. An application based on the developed method was used to facilitate the testing of this method by several ITO decision makers in large companies concerning its usability, correctness and functionality. Moreover, a study was performed to explore ITO decision makers’ acceptance of the developed method and their use of it for assessing the ITO risks.             The second research goal investigated how to improve service buyers’ ITO relationship with their providers. A well-working ITO relationship is a critical determinant of successful ITO and is relevant to the whole ITO life cycle. This research goal was achieved by identifying and analysing the most important factors in ITO relationships, including a prioritized list of those factors that are highly recommended for use in creating and maintaining a good ITO relationship.                       The third research goal examined how to improve ITO by identifying and prioritizing the success factors (SFs) in ITO. This research identified the ITO SFs in large companies and provided a prioritized list of them to be applied in these companies with a description of the value that they could create from implementation during the ITO life cycle. Moreover, the SFs identified in large companies were compared with those identified in medium-sized companies, which could give an indication to the researchers in this field that company size matters in regard to the implementation order of the identified SFs.               In summary, the research presented in this thesis contributes with: 1) a method for assessing the risks of outsourcing IT and, in the case that IT has been outsourced, suggested ways to mitigate them; 2) the important factors that could improve ITO relationships and 3) a prioritized list of success factors that could improve IT outsourcing.
Denna avhandling undersöker stora privata företag i Sverige som har outsourcat sin IT verksamhet. Som vi uppmärksammade har en stor del av IT-outsourcingen (ITO) misslyckats. För köparen av IT-tjänsten kan det leda till bristande IT funktionalitet med allvarliga konsekvenser som i värsta fall leder till förlorade kunder och betydande kostnadsökningar. Därför är det övergripande forskningsmålet är att analysera och fastställa hur ITO:n för köparen av IT tjänsten kan förbättras. För att lösa det övergripande forskningsmålet forskningen undersökte: 1) Utvecklingen av en metod för att bedöma riskerna med IT-outsourcing; 2) Identifiering av de viktiga faktorerna inom IT-outsourcingsrelationer; och 3) Identifiering av en lista över framgångsfaktorer i IT-outsourcing. De använda forskningsstrategierna för att genomföra forskningen var ”design science research" och kartläggning. För att uppnå först huvudforskningsmålet, har en metod tagits fram för att bedöma riskerna och vägleda hur man kan minska dem. Den här metoden kan hjälpa både forskare och de som utövar IT-outsourcing med att bedöma ITO-riskerna och på så sätt förbättra sina IT-outsourcing.  En programvara baserad på den metoden har utvecklats för att underlätta testningen av metoden vilket har genomförts med IT beslutsfattare på stora organisationer, beträffande användbarhet, korrekthet och funktionalitet. Dessutom har en studie utförts för att bedöma om programvaran kan accepteras av IT beslutsfattare och få reda på om de skulle använda metoden för att bedöma ITO riskerna. Det andra forskningsmålet har undersökt hur köparna av den outsourcade IT-tjänsten kan förbättra relationen med sina leverantörer. En bra ITO-relation är en avgörande faktor för en framgångsrik ITO och den är viktig för hela livscykeln. Forskningsmålet har uppnåtts genom analys för att hitta de viktigaste faktorerna ITO-relationsfaktorer, som studien rekommenderar för att skapa och underhålla en bra ITO relation. Det tredje forskningsmålet har undersökt hur ITO kan förbättras genom att identifiera och prioritera framgångsfaktorerna i ITO. Studien har identifierat framgångsfaktorerna i stora företag och tagit fram en lista med prioriterade framgångsfaktorer som bör implementeras i de undersökta företagen. Dessutom så har nyttan av dessa framgångsfaktorer beskrivits under ITO livscykeln. Dessutom har de identifierade framgångsfaktorerna från stora företag jämförts med framgångsfaktorerna som har identifierats för medelstora företag. Denna jämförelse ger en indikation till forskarna på det här området att prioriteringen av framgångsfaktorerna är beroende av företagsstorlek. Sammanfattningsvis, den beskrivna forskningen i den här uppsatsen bidrar med: 1) En metod för att bedöma risker och förslag på hur minska dessa risker; 2) En lista med de viktiga faktorerna för att förbättra ITO relationen inom IT-outsourcing och; 3) En prioriterad lista av framgångsfaktorer som kan förbättra IT outsourcing.
29

Luo, Yan. „Radical Architecture, Collective Mindfulness, and Information Technology: A Dialectical Analysis of Risk Control in Complex Socio-Technical Systems“. online version, 2009. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=case1228450166.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Thesis (Ph. D.)--Case Western Reserve University, 2009.
Department of Information Systems, Weatherhead School of Management. Includes bibliographical references. Available online via OhioLINK's ETD Center.
30

Ghosh, Suvankar. „Essays on Emerging Practitioner-Relevant Theories and Methods for the Valuation of Technology“. Kent State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=kent1246573195.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Viberg, Olga. „Design and use of mobile technology in distance language education : Matching learning practices with technologies-in-practice“. Doctoral thesis, Högskolan Dalarna, Informatik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:du-20356.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
This thesis focuses on the adaptation of formal education to people’s technology- use patterns, theirtechnology-in-practice, where the ubiquitous use of mobile technologies is central. The research question is: How can language learning practices occuring in informal learning environments be effectively integrated with formal education through the use of mobile technology? The study investigates the technical, pedagogical, social and cultural challenges involved in a design science approach. The thesis consists of four studies. The first study systematises MALL (mobile-assisted language learning) research. The second investigates Swedish and Chinese students’ attitudes towards the use of mobile technology in education. The third examines students’ use of technology in an online language course, with a specific focus on their learning practices in informal learning contexts and their understanding of how this use guides their learning. Based on the findings, a specifically designed MALL application was built and used in two courses. Study four analyses the app use in terms of students’ perceived level of self-regulation and structuration. The studies show that technology itself plays a very important role in reshaping peoples’ attitudes and that new learning methods are coconstructed in a sociotechnical system. Technology’s influence on student practices is equally strong across borders. Students’ established technologies-in-practice guide the ways they approach learning. Hence, designing effective online distance education involves three interrelated elements: technology, information, and social arrangements. This thesis contributes to mobile learning research by offering empirically and theoretically grounded insights that shift the focus from technology design to design of information systems.
32

Leong, Ka Seng. „Research and implementation of Chinese segmentation algorithms and its application to Chinese-Portuguese machine translation system“. Thesis, University of Macau, 2008. http://umaclib3.umac.mo/record=b1942876.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Swaminathan, Selvakumar. „Critical Success Factors of ERP Implementation“. University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1302248857.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Trevethan, Thomas J. „Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles that Facilitate the Effective Construction and Evaluation of a Cloud-Based Lab Environment“. NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/56.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
The problem explored in this dissertation report was that at the time of this study, there were no design principles or methodologies based on design science research (DSR) available to use for artifact construction, implementation, and effective evaluation of cloud-based networking lab environments that can be used to foster hands-on technology skills in students. Primarily based on Hevner’s 7 guidelines of DSR, Peffer’s design science research methodology (DSRM), and Gregor’s IS design theory, this study forms the groundwork for the development of procedures and specifications derived from DSR literature to facilitate the construction, implementation, and evaluation of a comprehensive cloud-based computer and information systems (CIS) laboratory artifact that is globally accessible 24 hours a day and 7 days a week. Secondarily, this study guided the construction and implementation of a prototype cloud-based lab environment using the procedures and specifications derived from DSR. The cloud-based lab environment was then evaluated based on the skill level attained by students enrolled in courses that leveraged the proposed system. Results of this study showed that the overwhelming majority of the students who participated in the experiment using the cloud-based lab environment showed statistically significant gains in pretest and posttest scores compared to the students who participated in the experiment using the classroom-based physical equipment. These results fully supported the first hypothesis for this study, that participation in the cloud-based lab environment would promote positive student outcomes. The second hypothesis also was supported. The majority of the experimental group students completed most of the labs and significantly spent more time on the system compared to the control group students using the traditional classroom-based physical lab equipment, which indicated the specifications derived from DSR positively influenced the use of the cloud-based system. An argument was made that the proposed study advances IS and education research through artifact construction and evaluation by correlating Hevner’s 7 steps of effective DSR theory, Peffer’s DSRM, and Gregor’s IS design theory to the problem statement, research questions, and hypothesis in order to develop guiding principles and specifications for building and assessing a cloud-based lab environment.
35

Dhar, Samir. „Addressing Challenges with Big Data for Maritime Navigation: AIS Data within the Great Lakes System“. University of Toledo / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1479391944819196.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Abukar, Ghassan. „SYSTEM INFLUENCE FRAMEWORK: IT PROJECT MANAGERS’ INFLUENCE TO FORM CRITICAL STAKEHOLDER ALIGNMENTS AND PROMOTE VALUE REALIZATION“. Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1626795218031468.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Vat, Kam Hou. „REALSpace AKE : an appreciative knowledge environment architected through soft systems methodology and scenario-based design“. Thesis, University of Macau, 2011. http://umaclib3.umac.mo/record=b2492481.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Soy, Emmy C. „A Spatial Cluster and Socio-demographic analysis of COVID-19 infection determinants in Ohio, Michigan and Kentucky“. Youngstown State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1628701363423652.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Kayondo-Ndandiko, Lydia Mazzi. „Geographical Information Technologies – Decision Support for Road Maintenance in Uganda“. Doctoral thesis, Blekinge Tekniska Högskola, Sektionen för planering och mediedesign, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-00539.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
This study set out to develop a framework within which the use of Geographical Information Technologies (GITs) can be enhanced in Road Infrastructure Maintenance (RIM) in Uganda. Specifically it was guided by 3 objectives; 1. To assess the gaps in the use of GITs for RIM in Uganda and the limitations to accessing these technologies, 2. To develop a methodological framework to enhance the use of GITs in RIM and 3. To develop a Geographical Information Systems for Transportation (GIS-T) data model based on the road maintenance data requirements. A participatory approach through a series of interviews, focus group discussions, workshop & conferences, document reviews, field observations & measurements and GIS analysis were employed. Based on the Spatial Data Infrastructure (SDI) concept and the principle of Causality, the gaps and limitations were established to mainly be concerned with data and organisational constraints as opposed to technical issues. They were classified to include; inadequate involvement of GITs in organisational activities, inappropriate institutional arrangements, absence of data sharing frameworks, budget constraints, insufficient geospatial capacity, digital divide in the perception, adoption & affordability of GITs among the stakeholders and the absence of a road maintenance Spatial Data Infrastructure (SDI). A methodological framework, comprising of 6 strategic components was developed to enhance the use of GITs in RIM. This included enactment of relevant policy components to guide GIT use, continuous capacity building, establishment of a road maintenance SDI, fostering collaboration and spatial data sharing frameworks, budgetary allocation based on defined activities inclusive of GIT initiatives, and adoption of a dynamic segmentation data model. Conceptual and logical data models were developed and proposed for the Sector. The conceptual model, presented using an entity relationship diagram, relates the road network to the point and line events occurring on it. The logical object relational model developed using the ESRI provided template represents the road and the point and line events in a total of 19 object classes. The Study concludes that in order to ground GIT benefits in the sector; technical, data and organisational concerns involved in GIT undertakings should be accorded equal emphasis. Institutionalisation and diffusion of GITs as aspects of the component strategies are regarded capacity building mechanisms earmarked to boost success in GIT initiatives. Further research on diffusion and funding models for GIT initiatives is recommended. It is suggested that aspects of the proposed model be considered when establishing GIT standards for the sector. The RIM sector is encouraged to embrace Science and Technology and to participate in Research and Development and particularly to adopt the culture of innovation considering the ready availability of off the shelf equipment, freeware and open source software that can foster informed decision making.
40

Bazile, Emmanuel Patrick. „Electronic Medical Records (EMR): An Empirical Testing of Factors Contributing to Healthcare Professionals’ Resistance to Use EMR Systems“. NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/964.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
The benefits of using electronic medical records (EMRs) have been well documented; however, despite numerous financial benefits and cost reductions being offered by the federal government, some healthcare professionals have been reluctant to implement EMR systems. In fact, prior research provides evidence of failed EMR implementations due to resistance on the part of physicians, nurses, and clinical administrators. In 2010, only 25% of office-based physicians have basic EMR systems and only 10% have fully functional systems. One of the hindrances believed to be responsible for the slow implementation rates of EMR systems is resistance from healthcare professionals not truly convinced that the system could be of substantive use to them. This study used quantitative methods to measure the relationships between six constructs, namely computer self-efficacy (CSE), perceived complexity (PC), attitude toward EMR (ATE), peer pressure (PP), anxiety (AXY), and resistance to use of technology (RES), are predominantly found in the literature with mixed results. Moreover, they may play a significant role in exposing the source of resistance that exists amongst American healthcare professionals when using Electronic Medical Records (EMR) Systems. This study also measured four covariates: age, role in healthcare, years in healthcare, gender, and years of computer use. This study used Structural Equation Modeling (SEM) and an analysis of covariance (ANCOVA) to address the research hypotheses proposed. The survey instrument was based on existing construct measures that have been previously validated in literature, however, not in a single model. Thus, construct validity and reliability was done with the help of subject matter experts (SMEs) using the Delphi method. Moreover, a pilot study of 20 participants was conducted before the full data collection was done, where some minor adjustments to the instrument were made. The analysis consisted of SEM using the R software and programming language. A Web-based survey instrument consisting of 45 items was used to assess the six constructs and demographics data. The data was collected from healthcare professionals across the United States. After data cleaning, 258 responses were found to be viable for further analysis. Resistance to EMR Systems amongst healthcare professionals was examined through the utilization of a quantitative methodology and a cross-sectional research measuring the self-report survey responses of medical professionals. The analysis found that the overall R2 after the SEM was performed, the model had an overall R2 of 0.78, which indicated that 78% variability in RES could be accounted by CSE, PC, ATE, PP, and AXY. The SEM analysis of AXY and RES illustrated a path that was highly significant (β= 0.87, p < .001), while the other constructs impact on RES were not significant. No covariates, besides years of computer use, were found to show any significance differences. This research study has numerous implications for practice and research. The identification of significant predictors of resistance can assist healthcare administrators and EMR system vendors to develop ways to improve the design of the system. This study results also help identify other aspects of EMR system implementation and use that will reduce resistance by healthcare professionals. From a research perspective, the identification of specific attitudinal, demographic, professional, or knowledge-related predictors of reference through the SEM and ANCOVA could provide future researchers with an indication of where to focus additional research attention in order to obtain more precise knowledge about the roots of physician resistance to using EMR systems.
41

MATONGO, Tanguy, und Auriol DEGBELO. „APPLYING ENTERPRISE MODELS AS INTERFACE FOR INFORMATION SEARCHING“. Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-11091.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:

Nowadays, more and more companies use Enterprise Models to integrate and coordinate their business processes with the aim of remaining competitive on the market. Consequently, Enterprise Models play a critical role in this integration enabling to improve the objectives of the enterprise, and ways to reach them in a given period of time. Through Enterprise Models, companies are able to improve the management of their operations, actors, processes and also to improve communication within the organisation.

This thesis describes another use of Enterprise Models. In this work, we intend to apply Enterprise Models as interface for information searching. The underlying needsfor this project lay in the fact that we would like to show that Enterprise Models canbe more than just models but it can be used in a more dynamic way which is through a software program for information searching. The software program aimed at, first,extracting the information contained in the Enterprise Models (which are stored into aXML file on the system). Once the information is extracted, it is used to express a query which will be sent into a search engine to retrieve some relevant document to the query and return them to the user.

The thesis was carried out over an entire academic semester. The results of this workare a report which summarizes all the knowledge gained into the field of the study. A software has been built to serve as a proof of testing the theories.

42

Winter, Roberto Antonio. „Gestão de lições aprendidas em projetos de tecnologia da informação – avaliação de um modelo suportado por tecnologias colaborativas 2.0“. Universidade Nove de Julho, 2016. http://bibliotecadigital.uninove.br/handle/tede/1491.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Submitted by Nadir Basilio (nadirsb@uninove.br) on 2016-07-01T21:32:07Z No. of bitstreams: 1 Roberto Antonio Winter.pdf: 2306529 bytes, checksum: a8d1cdc9ad22f45147be60e7a42ca592 (MD5)
Made available in DSpace on 2016-07-01T21:32:07Z (GMT). No. of bitstreams: 1 Roberto Antonio Winter.pdf: 2306529 bytes, checksum: a8d1cdc9ad22f45147be60e7a42ca592 (MD5) Previous issue date: 2016-02-22
Organizational learning process is part of the quest for competitiveness and it is also present on the project’s results, summing up together with several organization projects in order to make up its result. The learned lessons support managers in their projects with the successful and unsuccessful experiences through the registry stored and provided in a centralized and organized way. The learned lessons registry in any project stage helps the project members to meditate about the process, achievements, stimulating the sharing of tacit and explicit knowledge created. On this process of storing and retrieving learned lessons, the web’s 2.0 collaborative tools are present, and in this context the wiki platform is one of the most cited when storing and retrieving learned lessons. Add up the fact that there are no process on the most used references (PMBOK-PMI and ICB-IPMA) to these factors and it is identified a gap on the studies. This scenario motivates the quest for a model that helps the learned lessons management in Information Technology projects and Information Systems. This dissertation aims to evaluate a learned lesson management model on IT/IS project utilizing web 2.0 tools. This model supports the management of learned lessons: gathering, verification, dissemination and reusing. This study has an explanatory and prescriptive approach using an abductive, inductive and deductive method. The Design Science Research is the research’s approach. This study looks for contributing towards the project’s practice and its results and creating academic knowledge with the accuracy that the study requires in its method. The Target 2.0 was instantiated in the implementation phase of an IT project, demonstrating that the model achieved its expected results, solving while searching the company's problem with the GLA. The result emerged evidence of the sociomaterial relations, the quality of relations between people and the model, under present social theory. The research contributes to the GLA practice in projects, helps with project managers in GLA, besides contributing to the Administration allowing expand the use of the organization's knowledge management model. The research contributes to the theory and use of GLA model in the implementation phase of an IT project, in a small business, with improvements in GLA.
O resultado dos diversos projetos de uma empresa contribui para o resultado estratégico do negócio, para a aprendizagem nos projetos, e para o processo de aprendizagem organizacional. Em adição a aprendizagem em projetos, com as lições aprendidas, apoiam os gestores em seus projetos, com o registro das experiências bem sucedidas e de fracassos, coletando e reutilizando as experiências de forma organizada e centralizada. Esta pesquisa explora a gestão de lições aprendidas (GLA), com apoio de uma plataforma wiki, em uma empresa de médio porte, no ramo de TI, especializada em sistemas de logística e transporte. Na relevância do tema, encontram-se as necessidades das empresas, a pouca atenção ao tema nos guias mais utilizados em projetos (PMBOK-PMI e ICB-IPMA). Esse cenário motiva a busca de um modelo que auxilie a GLA em projetos de Tecnologia da Informação e Sistemas de Informação (TI/SI). Essa dissertação tem como objetivo avaliar a instanciação de um modelo de gestão de lições aprendidas em projetos de TI/SI, utilizando uma wiki. Este modelo suporta os processos de GLA: conscientização; coleta; verificação; armazenamento; disseminação e reuso. Este estudo adota o paradigma Design Science Research e o método Technical Action Research, têm uma abordagem exploratória e prescritiva, com uso dos métodos abdutivo, indutivo e dedutivo. A pesquisa instanciou o modelo Target 2.0 na fase de execução de um projeto de TI, demonstrando que o modelo atingiu seus resultados, contribuindo durante a pesquisa para a solução do problema da empresa com a GLA. No resultado emergiu evidências da relação sócio material, na qualidade das relações entre as pessoas e o modelo, sob uma presente teoria social. A pesquisa contribui para a prática de GLA em projetos, contribui com gestores de projetos na GLA, além de contribuir com a Administração permitindo expandir o uso do modelo gestão do conhecimento da empresa. A pesquisa contribui na teoria com uso do modelo na GLA da fase de execução de um projeto de TI, apresentando melhorias na GLA. As seis proposições elaboradas pelo pesquisador, foram confirmadas pela análise dos resultados da pesquisa de campo, sendo que uma possui ressalva que sugere melhorias na elaboração das páginas wiki.
43

Fundin, August. „Generating Datasets Through the Introduction of an Attack Agent in a SCADA Testbed : A methodology of creating datasets for intrusion detection research in a SCADA system using IEC-60870-5-104“. Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-175911.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Gaskin, James E. „Evolution and Variation of Digitally-enabled Design Routines: An extended event-sequencing approach“. Case Western Reserve University School of Graduate Studies / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=case1332172409.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

McCutcheon, Angela M. „Impact of Publishers’ Policy on Electronic Thesis and Dissertation (ETD) Distribution Options within the United States“. Ohio University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1273584209.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Vlisides, James C. „Rendering the Other: Ideologies of the Neo-Oriental in World of Warcraft“. Bowling Green State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363105916.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Cassidy, Christopher. „A Comparison of Fatigue during Cardiocerebral Resuscitation with Different Compression Rates Among Layperson and Professional Rescuers“. DigitalCommons@CalPoly, 2014. https://digitalcommons.calpoly.edu/theses/1299.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Quality chest compressions during Cardiopulmonary Resuscitation (CPR) are vital to maintaining adequate perfusion of oxygenated blood to the organs of the body to sustain life. Over the years, the compression rate recommended in Basic Life Support (BLS)/ Advanced Cardiac Life Support (ACLS) protocols for the best possible outcome has risen, and with that increase there are questions regarding rescuer fatigue and the effectiveness of compressions. Layperson and professional rescuers, answering to an emergency, both maintain continuous chest compressions until advanced life support arrives. Depending on the location, this arrival time would most likely be longer than the two minute standard time given to rotate rescuers before fatigue compromises performance. The objective of this research was to investigate the level of rescuer fatigue associated with continuous compressions, varying compression rates, physical fitness, gender, and among layperson versus professional rescuers. Sixty-one participants performed uninterrupted chest compressions on a manikin for 15 minutes. Before performing compressions, physical fitness was evaluated using a YMCA bench press for an assessment of upper body strength/endurance and a 3-minute step test to evaluate aerobic fitness. Subjects performed two trials at compression rates of greater or equal to 80 and greater or equal to 100 per minute with a 5-minute rest between trials. Male professional rescuers had a greater strength/endurance, and thus were able to perform compressions for a longer period of time compared to their female counterparts. Compression duration and the YMCA Bench Press test score were significantly correlated (p = .0135). Cardiocerebral Resuscitation providers should maintain an adequate upper body strength, particularly if they may be required to perform continuous chest compressions at high rates for more than a few minutes.
48

Pathak, Amit. „Forecasting Models to Predict EQ-5D Model Indicators for Population Health Improvement“. Ohio University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1480959312370497.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Amster, Brian D. „The Process by which Physicians Extract Information from Electronic Progress Notes During Handoffs“. 2012. https://scholarworks.umass.edu/theses/890.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
A handoff requires that the responsibility for patient patient’s care is transferred from one healthcare professional to another. The goals of this research were to identify, evaluate, and use analytical methods to describe how physicians (n=10) extracted information from electronic progress notes, one important source of information used during handoffs. Participants also verbally summarized the notes as they would during handoffs. Six methods were used to analyze how participants read progress notes, each uniquely contributing to our understanding of physicians’ visual attention patterns during this process. The participants focused their visual attention on the Impression and Plan section of the progress notes in that over 60% of the participants’ total time was spent reading that section. Physicians could miss an error or critical piece of information if the information is not located in the Impression and Plan. The importance given by the participants to the Impression and Plan section was confirmed in that the majority of participants’ verbal handoff content focused primarily on information that could be found in the Impression and Plan. Participants relied on the Medication Profile section quite heavily if it was present in the progress note. We determined that if the participant was currently reading in one section (s)he most likely would transition his/her visual attention to the physically closest section in the note, meaning the format of progress notes may dictate how notes are read. We determined what the most likely paths were through the progress notes, which could be a first step in reordering of the progress note for evaluation in future studies. Participants’ responses to debriefing questions suggested that they were aware of their reliance on the Impression and Plan, but that they thought the way they read notes is context-specific, depending on factors such as their use of the note and the reputation of the author of the note. These findings suggest a need for more research that evaluates how different note structures and content affect how physicians and other health providers extract and use information in varied clinical contexts.
50

Lin, Tsai-Feng, und 林彩鳳. „Information seeking behavior of defense technologist- A case study of Aeronautical System Research Division(ASRD) of Chung-Shan Institute of Science Technology(CSIST)“. Thesis, 2007. http://ndltd.ncl.edu.tw/handle/36091327243649467926.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
碩士
國立中興大學
圖書資訊學研究所
95
Abstract The research on information seeking behavior has a profound and direct influence on the effectiveness of a library information service system. and a questionnaire survey is one of the methods to understand the user’s information need . In this research focus have been put on defense technologists’ information needs and seeking behaviors so as to figure out specified characteristics in their information needs, how do they utilize those formal and informal channels, their obstacles and solutions during information seeking process. The research results may serve as a reference for libraries of similar nature to improve customer services. In this case study, needed data were collected from the July 2005 and 368 copies of questionnaire were administrated to defense technologists who worked for Aeronautical Systems Research Division (ASRD) of CSIST, 256 returned valid (69.6% return rate). Ten most or least frequent users were selected for in-depth interviews. The major findings were as follows: 1. Defense technologists are largely male. 65% of them worked over 16 years and 60%, never published. Their information need came from research and project implementation, mostly for team works. They were most concerned about access to full-text databases. 2. Technologists relied heavily on internet to iron out problems and gain new technological knowledge. Availability is a main factor that affected information seeking. 3. The internet resource is the most important formal channel. ASRD defense technologists would look for assistance by communicating with their colleagues should all formal channels fail to meet their information need. 4. The most annoying obstacle encountered by the technologists was unable to get badly needed information during their seeking process. If needed information couldn’t be found at ASRD library, technologists will mostly purchase from bookstores. University and research institute libraries are the primary outer-source for external information services. Based on the final results of this study, six suggestions are proposed for improving libraries’ information service quality and offering possible perspectives for follow-on researches:1. Establishing the technology database under knowledge management architecture. 2. Improving library’s inter/intranet services. 3. Utilizing information technology (IT) Optimizing the use of information collecting and filtering techniques for technology-related information. 4. Enhancing personalized information services. 5. Providing training courses such as inter/intranet exploitation, database index familiarizing to educate technologists and familiarize them with information seeking skills. 6. Removing some restrictions to facilitate utilization of inter/intranet resources as well as improving inter/intranet accessibility. Keywords Information Needs, Information Seeking Behavior, Defense Technologists

Zur Bibliographie