To see the other types of publications on this topic, follow the link: Computer network - Administration.

Dissertations / Theses on the topic 'Computer network - Administration'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer network - Administration.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Sullivan, Mark P. "Secure remote network administration and power management." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FSullivan.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Raghavan, Veeravalli. "The impact of a computer network on group decision-making: An experimental investigation." Diss., The University of Arizona, 1990. http://hdl.handle.net/10150/185320.

Full text
Abstract:
This dissertation investigates the performance of a problem solving group whose members are constrained to communicate only through a computer network, a situation that has become commonplace with advances in computer technology. The model of group decision making adopted specifies that the group outcome is a function of six independent variables. They are group size, the incentives offered to group members, the decision rule used to combine member inputs, the distribution of information among members, the complexity of the task, and mode of communication (face-to-face or computer network). The dependent variables are group decision quality and members' perceptions of the group process. A laboratory experiment was conducted to study the effect of the computer network on the dependent variables. The group task required the generation and evaluation of alternative production plans for a candy company that has five divisions, each of which was managed by a group member. The five managers worked together as members of the corporate committee to decide on the allocation of a limited amount of Milk and Cocoa to the divisions. After this allocation was accepted, each manager decided on his/her divisional production plan subject to a local constraint. Three treatments were investigated: face-to-face (manual) groups, computer networked groups, and computer networked groups where the group members selected a Chairman to make the allocation decision. Information about the common resources and the overall profit function was public while the division information was private, but could be shared over the network. The decision rule was unanimity and each member of the group received a cash payoff based on successful completion of the task and the amount of company profit. Manual groups achieved the highest profit followed by computer groups, and computer groups with chairman, in that order. Manual groups also achieved the highest distribution efficiency and divisional efficiency suggesting that the average member attained a better understanding of the problem in the manual condition. It appears that the computer network degraded group decision performance and electing a chairman exacerbated the trend. The satisfaction of members was lower in the computer conditions that the manual condition. Contrary to some past research that used roughly similar tasks, participation by group members was not felt to be more even in the computer conditions than the manual condition. Also, manual groups perceived their group process and solutions to be more effective than the computer groups. These results would seem to indicate that if high decision quality is the primary purpose of a group meeting then face-to-face interaction among the group members may be necessary even though creating such conditions may be expensive.
APA, Harvard, Vancouver, ISO, and other styles
3

Scully, Michael N. B. "Network and system security in an information age." Honors in the Major Thesis, University of Central Florida, 2000. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/204.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.<br>Bachelors<br>Business Administration<br>Management Information Systems
APA, Harvard, Vancouver, ISO, and other styles
4

Ghose, Tapu Kumar. "Dynamic Pricing in Electronic Commerce using Neural Network." Thesis, University of Ottawa (Canada), 2010. http://hdl.handle.net/10393/28617.

Full text
Abstract:
There exist intelligent agents to aid online sellers to dynamically calculate a competitive price for their products in online markets. However, these intelligent agents usually make a number of assumptions for dynamic pricing. Some intelligent agents assume that sellers consist of prior knowledge about the online market parameters. In other words, the agents assume that the sellers are well aware of other competitors' pricing strategies, consumers purchase preferences, consumers' reservation price, profit made by other competing sellers etc. In addition, other agents assume that price is the only attribute that determines consumers' purchase decision. On the contrary, in real life sellers have limited or no prior knowledge about the market parameters. In addition, nowadays along with price other attributes such as after sale service, product quality etc. contribute in determining consumers' purchase decision. In this thesis, we propose an approach where sellers have limited knowledge on market parameters. We also assume that buyers' purchase decisions are based on multiple attributes. We are using a feed-forward neural network approach for calculating a competitive price dynamically to increase the sellers' revenue. Product price, product quality, delivery time, after sales service and seller's reputation are taken into consideration while determining the competitive price of the product by our model. In our experimental evaluation we showed that once the sellers, by considering the five attributes, set an initial price of the product, our model adjusts the price of the product automatically with the help of neural network in order to raise the revenue. In setting the initial price of a product, we assume that sellers use their prior knowledge about the prices of the product offered by other competing sellers. Any other prior knowledge like buyer demand or competitor's price setting behaviors is not used in our evaluation. The experimental results portray the effect of considering the five attributes in earning revenue by the sellers. Before concluding with directions for future works, we discuss the value of our approach in contrast with related work.
APA, Harvard, Vancouver, ISO, and other styles
5

Melo, Robson Gomes de. "Proposta de um modelo de ferramenta para auxilio a administração computacional." [s.n.], 2009. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275837.

Full text
Abstract:
Orientador: Paulo Licio de Geus<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação<br>Made available in DSpace on 2018-08-15T04:22:31Z (GMT). No. of bitstreams: 1 Melo_RobsonGomesde_M.pdf: 8729134 bytes, checksum: 194aa4f5e9c1155fb62bd50a8151000c (MD5) Previous issue date: 2009<br>Resumo: Devido ao grande impacto gerado por sistemas e redes de computadores na vida moderna, as atividades dos administradores computacionais têm se tornados fundamentais às organizações. Entretanto, as técnicas e ferramentas utilizadas por esses profissionais não conseguiram acompanhar a evolução de uso do poder computacional. Na tentativa de auxiliar os administradores, várias ferramentas foram desenvolvidas com o intuito de possibilitar uma maneira mais simples, rápida e eficiente de configurar e administrar um parque tecnológico. Porém, muitas delas ainda apresentam impossibilidade, principalmente pela necessidade da presença física do administrador no ambiente que se administre. Deste modo, considera-se que as ferramentas de administração não atendem às necessidades julgadas essenciais aos cenários atuais. Neste contexto, esse trabalho apresenta um estudo das consideradas principais e mais populares ferramentas de administração computacional, analisando-as e comparando-as. Propõe também um novo modelo de ferramenta de administração, que busca solucionar as limitações encontradas nas ferramentas estudadas, como apontar novas possibilidades a esta área<br>Abstract: Due to the huge impact caused by systems and computer networks nowadays, computer administrator's activities have become fundamental to their organizations. On the other hand, the techniques and tools used by these professionals didn't improve as much as the computing power of the machines we have available now.In order to assist computer administrators, several tools were developed to allow a simpler, faster and more efficient way to configure and manage several machines. However, many of these solutions arc still unable to manage and configure their systems and networks without the physical presence of the System Administrator.Therefore, these tools are not of satisfying the requirements considered essentials to the current scenarios. In this context, this work shows a comparative analysis of the main and most popular computer management tools available. It also presents a new approach to remote administration, with the purpose of solving the limitations found in the analysed tools, and indicates the new tendencies and possibilities in this field<br>Mestrado<br>Sistemas de Computação<br>Mestre em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
6

Gunnarsson, Peter. "Role based access control in a telecommunications operations and maintenance network." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2875.

Full text
Abstract:
<p>Ericsson develops and builds mobile telecommunication networks. These networks consists of a large number of equipment. Each telecommunication company has a staff of administrators appointed to manage respective networks. </p><p>In this thesis, we investigate the requirements for an access control model to manage the large number of permissions and equipment in telecommunication networks. Moreover, we show that the existing models do not satisfy the identified requirements. Therefore, we propose a novel RBAC model which is adapted for these conditions. </p><p>We also investigate some of the most common used commercial tools for administrating RBAC, and evaluate their effectiveness in coping with our new proposed model. However, we find the existing tools limited, and thereby design and partly implement a RBAC managing system which is better suited to the requirements posed by our new model.</p>
APA, Harvard, Vancouver, ISO, and other styles
7

Lin, Yu Chu. "E-government website performance evaluation based on BP neural network." Thesis, University of Macau, 2017. http://umaclib3.umac.mo/record=b3691489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Coulter, Darcy Jane. "Improving teacher productivity through the use of computer technology." CSUSB ScholarWorks, 2003. https://scholarworks.lib.csusb.edu/etd-project/2361.

Full text
Abstract:
The purpose of the project was to develop a teacher handbook forusing computer technology and Microsoft Office XP software in the performance of their administrative tasks. The handbook was designed to provide teachers with step-by-step instructions that would enable them to automate many administrative tasks that were previously performed manually, without the benefit of computer technology.
APA, Harvard, Vancouver, ISO, and other styles
9

Kratzsch, Alexander. "An Automated, Operating System-independent and Centralized Hardware Inventory : Keeping track of client computers in the NSA lab environment at the University of Skövde." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-11435.

Full text
Abstract:
Every day system administrators perform many tasks that share one common requirement: information about the system.This information has to be up-to-date and reliable.To collect this information on demand and manually is time consuming and labour intensive.In the Network and Systems Administration (NSA) lab environment at the University of Skövde, there are many computers which need to be administrated.Today this is done by using a shared spreadsheet, a costly method with drawbacks.This project will search for answers to the question ``How can an automated client inventory improve the work of administrators at the NSA lab?''.To answer this question, a prototype will be created and its performance compared with the manual collection of information.In order to create a realistic and useful prototype, a list of requirements for inventories has to be assembled.The prototype has additionally to take the peculiarities of the NSA lab environment into account.The information has to be gathered without any permanent installation of a client, as there are no internal hard drives available.This detail makes it impossible for already existing applications to be deployed.The NSA administrators will then compare the performance of the prototype with the manual collection of data. They will conduct a trial during which they will be observed and afterwards answer some questions about the process. The results of the analysis of this data yielded a number of hypotheses.Common concepts like the time saving by automation get supported by this projects findings, but also less obvious observations are made. With the help of an automated network inventory administrators can become proactive and fix potential issues before they become problems.The extraction of information from a network inventory requires less knowledge about system administration, as the information is presented in an user interface.The user does not need to gather data as this is done by the network inventory.Only the extraction of the right information from the user interface is required.Information useful to the continued development of the prototype was collected as well. Improvements to the user interface as well as more automation should be added to the prototype in order to further improve the efficiency compared to the manual collection of information.
APA, Harvard, Vancouver, ISO, and other styles
10

Lakay, Denise. "An investigation into the effect of power distance as a factor that facilitates the implementation of a computerized hospital information system." Thesis, Peninsula Technikon, 2005. http://hdl.handle.net/20.500.11838/1373.

Full text
Abstract:
Thesis (MTech (Information Technology))--Peninsula Technikon, Cape Town, 2005<br>The overall objective of this study is to identify the importance of culture in the implementation of Information systems and how output influences the success of a system. • The first objective is to assess the organizational culture in each hospital in terms of one of the dimensions of culture on Hofstede's checklist, namely power distance. • The second objective is to determine whether the speed with which a HIS was implemented was a success at the two academic hospitals in the Western Cape using the reduction of the level of backlog (paper based patient registration records) as a measure of implementation progress.
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Zhixiong. "Scalable role & organization based access control and its administration." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3110.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.<br>Vita: p. 121. Thesis directors: Ravi S. Sandhu, Daniel Menascé. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed July 7, 2008). Includes bibliographical references (p. 113-120). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
12

Nagarajan, V. "Topological design of centralized computer networks." Connect to resource, 1991. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1262627949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Nontanakorn, Kritchakorn. "Electronic government: Reforming Thai government for ministry of interior of Thailand." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2454.

Full text
Abstract:
The purpose of this project was to develop an E-government plan to achieve the Ministry of Interior of Thailand's objective to better serve its citizens in the next 5 years by utilizing and taking advantage of the use of information technology and communication networks.
APA, Harvard, Vancouver, ISO, and other styles
14

Jeong, Juyong. "WebSAT: Web-based systems administration tool." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2667.

Full text
Abstract:
Discusses the development of WebSAT (Web-based systems administration tool), a computer network tool that allows systems administrators to create and delete accounts, disable and enable existing accounts, manage disk space conveniently, monitor the status of all network printers, and monitor network security. The WebSAT application was implemented using PHP, a server-side embedded scripting language, with a MySQL database.
APA, Harvard, Vancouver, ISO, and other styles
15

Nicoll, J. Ross. "A web-oriented framework for the development and deployment of academic facing administrative tools and services." Thesis, University of St Andrews, 2015. http://hdl.handle.net/10023/6857.

Full text
Abstract:
The demand for higher education has increased dramatically in the last decade. At the same time, institutions have faced continual pressure to reduce costs and increase quality of education, while delivering that education to greater numbers of students. The introduction of software systems such as virtual learning environments, online learning resources and centralised student record systems has become routine in attempts to address these demands. However, these approaches suffer from a variety of limitations: They do not take all stakeholders' needs into account. They do not seek to reduce administrative overheads in academic processes. They do not reflect institution-specific academic policies. They do not integrate readily with other information systems. They are not capable of adequately modelling the complex authorisation roles and organisational structure of a real institution. They are not well suited to rapidly changing policies and requirements. Their implementation is not informed by sound software engineering practises or data architecture design. Crucially, as a consequence of these drawbacks such systems can increase administrative workload for academic staff. This thesis describes the research, development and deployment of a system which seeks to address these limitations, the Module Management System (MMS). MMS is a collaborative web application targeted at streamlining and minimising administrative tasks. MMS encapsulates a number of user-facing tools for tasks including coursework submission and marking, tutorial attendance tracking, exam mark recording and final grade calculation. These tools are supported by a framework which acts as a form of “university operating system”. This framework provides a number of different services including an institution abstraction layer, role-based views and privileges, security policy support integration with external systems.
APA, Harvard, Vancouver, ISO, and other styles
16

Mkhonto, Mkhonto. "THE EFFECTIVE GOVERNMENT INFORMATION ACCESSIBILITY SYSTEM FOR A COMMUNITY IN THE REMOTE AREAS OF SOUTH AFRICA." Thesis, Bloemfontein: CENTRAL UNIVERSITY OF TECHNOLOGY, FREE STATE, 2014. http://hdl.handle.net/11462/232.

Full text
Abstract:
Thesis ( M. Tech. (School of Information Technology )) - Central University of Technology, Free State, 2014<br>The aim of this study has been to find out how the community in the remote areas of South Africa access government information. The study is based on four villages, two in the Northern Cape Province (Heuningvlei and Galeshewe) and two in Limpopo Province (The Oaks and Finala). A quantitative design was used. Open and closed-ended questionnaires were used to collect data from the community. Out of 200 questionnaires distributed only 144 responses were received. Responses in the questionnaires were tabulated, coded and processed using the Statistical Package for Social Sciences (SPSS) programme. Based on the analysis in Table 4.13, the study showed that 44 percent of the sampled community have access to information through Television which they classified as technology. Shortage of telecentres, distance to telecentres, age, lack of education, monthly income, infrastructure and transport cost were some of the important factors contributing to a lack of access to information. Some of the findings are that most of the telecentres are located far from towns, more than 7 kilometres from the village. Ideally, telecentres should be located near the community, within a short walking distance. It is recommended that provision/establishment for easy access to information and communication services by the Universal Service and Access Agency of South Africa (USAASA) in the remote areas in the Northern Cape and Limpopo province is strongly considered for implementation. This will overcome the gap that exists between the urban and semi-urban communities regarding access to human rights information such as rights to life, equality, freedom of speech, assembly and access to information. It is also assumed that the implementation of telecentres and Internet Cafes, in order to facilitate the adoption of e-government information by people residing in remote areas (semi-urban areas) such as Heuningvlei, Galeshewe, The Oaks and Finala will contribute to better access to human rights. The study also recommends that the service costs charged by the telecentre and Internet Cafes should not be expensive. This will assist the community to afford to pay Internet services. Information is important for decision-making. For this reason, it is recommended that continued campaigns on awareness about the mportance of access to information through telecentres and Internet Cafes should be conducted.
APA, Harvard, Vancouver, ISO, and other styles
17

Escatiola, Joanne Ambat. "How effective are college based websites at providing students with the information necessary to make an informed college choice?" CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3234.

Full text
Abstract:
The purpose of the project was to develop a rubric to assess whether a selected group of college websites, chosen to represent most of what is available to students, meet the requirements necessary for students to make an informed college choice. The project was undertaken as a way to determine if these sites, individually or as a whole, present enough information for students to make a choice that correctly aligns with their college aspirations.
APA, Harvard, Vancouver, ISO, and other styles
18

Islam, Md Samsul, Lin Zhou, and Fei Li. "Application of Artificial Intelligence (Artificial Neural Network) to Assess Credit Risk : A Predictive Model For Credit Card Scoring." Thesis, Blekinge Tekniska Högskola, Sektionen för management, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2099.

Full text
Abstract:
Credit Decisions are extremely vital for any type of financial institution because it can stimulate huge financial losses generated from defaulters. A number of banks use judgmental decisions, means credit analysts go through every application separately and other banks use credit scoring system or combination of both. Credit scoring system uses many types of statistical models. But recently, professionals started looking for alternative algorithms that can provide better accuracy regarding classification. Neural network can be a suitable alternative. It is apparent from the classification outcomes of this study that neural network gives slightly better results than discriminant analysis and logistic regression. It should be noted that it is not possible to draw a general conclusion that neural network holds better predictive ability than logistic regression and discriminant analysis, because this study covers only one dataset. Moreover, it is comprehensible that a “Bad Accepted” generates much higher costs than a “Good Rejected” and neural network acquires less amount of “Bad Accepted” than discriminant analysis and logistic regression. So, neural network achieves less cost of misclassification for the dataset used in this study. Furthermore, in the final section of this study, an optimization algorithm (Genetic Algorithm) is proposed in order to obtain better classification accuracy through the configurations of the neural network architecture. On the contrary, it is vital to note that the success of any predictive model largely depends on the predictor variables that are selected to use as the model inputs. But it is important to consider some points regarding predictor variables selection, for example, some specific variables are prohibited in some countries, variables all together should provide the highest predictive strength and variables may be judged through statistical analysis etc. This study also covers those concepts about input variables selection standards.
APA, Harvard, Vancouver, ISO, and other styles
19

Ashe, James Patrick. "A vulnerability assessment of the East Tennessee State University administrative computer network." [Johnson City, Tenn. : East Tennessee State University], 2004. http://etd-submit.etsu.edu/etd/theses/available/etd-0301104-151512/unrestricted/AsheJ030204b.pdf.

Full text
Abstract:
Thesis (M.S.)--East Tennessee State University, 2004.<br>Title from electronic submission form. ETSU ETD database URN: etd-0301104-151512. Includes bibliographical references. Also available via Internet at the UMI web site.
APA, Harvard, Vancouver, ISO, and other styles
20

Chak, Man-yee Rene, and 翟敏儀. "A study of the Hong Kong government's Electronic Service Delivery Scheme." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31966421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Sundstrom, Linda-Marie. "Internet radio: Identifying administrative and regulatory gaps in a cyberspace world without borders." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2137.

Full text
Abstract:
The purpose of this paper is to identify gaps in regulatory policies resulting from the emergence of Internet radio. To accomplish this purpose, the paper seeks to: 1) provide insights into agencies that may have direct involvement in potentially regulating Internet radio; 2) explore the concepts of jurisdiction in cyberspace; and 3) address the regulatory challenges that exist when traditional country borders no longer apply.
APA, Harvard, Vancouver, ISO, and other styles
22

Narasimhan, Sridhar. "Topological design of networks for data communication systems." Connect to resource, 1987. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1262631254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Žurek, Kamil. "Podnikatelský záměr pro založení firmy v oblasti IT." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2011. http://www.nusl.cz/ntk/nusl-222862.

Full text
Abstract:
This thesis is focused on creation of the business plan for establishing a limited liability company that will operate in the South Moravian Region. Main subject of enterprise of the company is computer network administration and provide complete services related to such business activities such as IT consulting, hardware and software sales, web design and hosting, all with a focus on small and medium companies.
APA, Harvard, Vancouver, ISO, and other styles
24

Laska, William David. "Development of a standards based open environment for the worldwide military command and control system." Master's thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-03302010-020318/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Mitchell, Marsha. "The development of a graduate course on identity management for the Department of Networking, Security, and Systems Administration /." Online version of thesis, 2008. http://hdl.handle.net/1850/8713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kokkinos, Andreas Filippos, and D'Cruze Ricky Stanley. "Cloud Computing: a new approach for Hallstahammar’s IT companies." Thesis, Mälardalens högskola, Akademin för hållbar samhälls- och teknikutveckling, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-11859.

Full text
Abstract:
Thesis Purpose Examine the possibility of small IT companies being benefited from a Cloud Computing transition. Through one case study of a software development company and interviews from five Hallstahmmar’s IT companies, we showed how Cloud Computing can enable organizations to decrease IT investments and related costs. Besides we critically analyzed some drawbacks of this latest concept.   Methodology Primary and secondary data has been collected based on a qualitative method and a structured approach. The collected material of the secondary data was mainly based on latest journals. The interviewing parts have been recorded and summarized.   Theoretical Perspective We have used theories of various aspects of business related to Cloud Computing; e.g. innovation and Cloud Computing, business model and Cloud Computing in order to acquire a complete knowledge base for analyzing our empirical data.   Empirical Foundation A case study of TotalAssist, interview data of LifeCenter AB and interviews of four IT companies of Hallstahammar, are our empirical foundation of the reserach.   Conclusion IT companies of Hallstahammar may adopt the Cloud Computing paradigm. Besides, yet this new concept has its risks. Security remains a concern among many CIO’s. In addition, we recommend means that a company can pursue while implementing a Cloud Computing transition.
APA, Harvard, Vancouver, ISO, and other styles
27

Doshi, Chintan. "An integrated trusted processes framework for consumer-facing B2B networks." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27974.

Full text
Abstract:
With the advent of the Internet, co-operating enterprises are increasingly sharing consumer data to deliver them information-rich online experiences with value-added services. At the same time, technological advances in web services standards based on a Service Oriented Architecture (SOA) design have enabled heterogeneous Business-to-Business (B2B) integration between enterprises. End-to-End business processes that span across multiple enterprises can be developed using the Business Process Execution Language (BPEL). However, such processes must address issues that normally do not arise for processes within a single enterprise. A framework is needed which supports a SOA-enabled business process management approach but also has technical infrastructure to address issues related to identity, privacy, compliance, monitoring and people interaction. In our thesis, we accomplish this using a framework that supports the design, implementation and management of trusted B2B processes defined using the BPEL standard and deployed into Circle of Trust architecture as specified by the Liberty Alliance federated identity standards. A key contribution of our thesis was to extend the Circle of Trust architecture with a new entity that introduces components to help businesses manage their B2B processes. Two use-case scenarios involving information-rich B2B processes were implemented to evaluate our framework.
APA, Harvard, Vancouver, ISO, and other styles
28

Ferreira, Luiz Renato Ribeiro. "Cidades digitais : os processos e implicações politicas da introdução da tecnologia de comunicação e informação em pequenos municipios." [s.n.], 2007. http://repositorio.unicamp.br/jspui/handle/REPOSIP/279463.

Full text
Abstract:
Orientador: Thomas Patrick Dwyer<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Filosofia e Ciências Humanas<br>Made available in DSpace on 2018-08-09T08:08:00Z (GMT). No. of bitstreams: 1 Ferreira_LuizRenatoRibeiro_M.pdf: 2150459 bytes, checksum: 64393db436e20814e741a8fe9d7f583f (MD5) Previous issue date: 2007<br>Resumo: Este estudo apresenta uma reflexão sobre os processos técnicos e políticos encontrados elas administrações públicas municipais de cidades de pequeno e médio portes em suas tentativas de introduzir novas tecnologias de gestão baseadas nos ambientes da cidade digital. Com o uso de entrevistas, observações de campo e estudos bibliográficos, analisa também as relações de poder, os processos decisórios, as implicações políticas e o comportamento do corpo burocrático nesses momentos de transformações e transição do Poder Público Municipal, geradas a partir dos processos de globalização e inovação<br>Abstract: This dissertation presents a reflection on the technical and political processes found by public municipal administrations small-sized to medium-sized cities while trying to introduce new management technologies based on the environments of the digital city. Though the use of interviews, field observations and bibliographical studies, it also analyzes the power relations, the decision-making processes, the political implications and the behavior of the bureaucracy body in these moments of transformation and transition of the Public Municipal Power, which come from the globalization and innovation processes<br>Mestrado<br>Sociedade da Informação<br>Mestre em Ciência Política
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Jing. "The Role of Social Networks in the Success of Open Source Systems: A Theoretical Framework and an Empirical Investigation." [Kent, Ohio] : Kent State University, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=kent1180640710.

Full text
Abstract:
Thesis (Ph. D.)--Kent State University, 2007.<br>Title from PDF t.p. (viewed July 10, 2008). Advisor: Murali Shanker. Keywords: Open-source, Social Networks, Software Success. Includes bibliographical references (p. 154-160).
APA, Harvard, Vancouver, ISO, and other styles
30

Hof, Sonja. "Alternative security approaches in E-government /." Linz : Trauner Verlag, 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014795036&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Jere, Nobert Rangarirai. "Implementation of a rewards based negotiation module for an e commerce platform." Thesis, University of Fort Hare, 2009. http://hdl.handle.net/10353/267.

Full text
Abstract:
Information and Communication Technologies (ICTs) have been widely deployed in developmental programs and this has lead to the creation of a new field – ICT for Development (ICT4D). Within the context of ICT4D, various e-services are being developed, including e-Commerce, e-Government, e-Health and e-Judiciary. ICT4D projects allow Small, Medium and Micro Enterprises (SMMEs) in rural areas to increase sales and gain a market share in the global market. However, many of these ICT4D projects do not succeed, because they fail to bring enough financial value to SMMEs due to the form they currently have. An obvious example is e-Commerce, which should be a source of revenue for business organizations, but most often is not. This thesis presents the design and implementation of a rewarding and negotiation application for a shopping portal to improve the marketing of products for rural entrepreneurs. The shopping portal has been set up for the Dwesa community, a marginalized area in the Eastern Cape province of South Africa. The proposed system, called the Dwesa Rewarding Program (DRP) enables customers buying online to get points for some of the activities carried out on the shopping portal. It also allows customers to negotiate and make offers whilst purchasing and get rewarded for buying online. The novelty of the system is in its flexibility and adaptability. One achievement of this system is the establishment of negotiation rules which allows fairness in rewarding customers. This should in turn lead to increased sales on the e-Commerce platform in marginalized areas and subsequently increased effectiveness of ICT4D for socio-economic development
APA, Harvard, Vancouver, ISO, and other styles
32

Doyle, Molly, Dermot Hikisch, and Shawn Westcott. "Organizational Networks as Catalysts for Strategic Sustainable Development." Thesis, Blekinge Tekniska Högskola, Avdelningen för maskinteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2318.

Full text
Abstract:
In an increasingly connected and interdependent world, the global sustainability challenge needs to be addressed by organizational networks from a whole-systems perspective. This study explores organizations through the lens of network theory and the Framework for Strategic Sustainable Development, with a special focus on networks already considering sustainability issues. The purpose of the research was to identify key factors critical to the success of an organizational network in the sustainability field, as well as define specific barriers to success for these networks. These specific factors and barriers to success are identified and explored across: Academic, Business, and Non-Profit sectors, with the ultimate objective of increasing the performance of Emerging Sustainability Networks (ESNs), removing barriers in the field, and planning strategically to achieve success in the sustainability movement.<br><p>shawn.westcott@gmail.com, doyle.molly@gmail.com, dermco@gmail.com</p>
APA, Harvard, Vancouver, ISO, and other styles
33

Ferreira, Luiz Carlos Branquinho Caixeta 1984. "Proposta de protocolo de roteamento geográfico utilizando algoritmo de localização baseado em medidas de intensidade de sinal." [s.n.], 2014. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259707.

Full text
Abstract:
Orientador: Paulo Cardieri<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação<br>Made available in DSpace on 2018-08-25T07:30:06Z (GMT). No. of bitstreams: 1 Ferreira_LuizCarlosBranquinhoCaixeta_M.pdf: 2124526 bytes, checksum: 37c7efb238fc329c8008231ddd7d0372 (MD5) Previous issue date: 2014<br>Resumo: Este trabalho apresenta uma proposta de roteamento geográfico para Redes de Senso-res sem Fio (RSSF), onde a posição dos nós sensores é encontrada através do uso de um algo-ritmo de localização baseado em valores de RSSI (Received Signal Strength Indication). O objetivo é que o protocolo proposto crie um mapa da rede de sensores, analisando as condi-ções do ambiente de funcionamento, visto que os valores de RSSI são diretamente afetados pelos fenômenos que atuam sobre o sinal de rádio. No contexto deste trabalho, o algoritmo de localização não tem o objetivo de encontrar a posição física exata do nó sensor, mas sim fazer a rede se adaptar ao ambiente, já que as posições calculadas usando os valores de RSSI cole-tados serão afetadas pelos efeitos de degradação de sinal existentes. A proposta visa ser uma alternativa a protocolos adaptativos existentes, que usam o monitoramento dos valores de RSSI entre os sensores existentes em uma rede, buscando se adaptar ao meio. O trabalho é composto de simulação e experimental. Os resultados mostram que a estratégia adotada pelo protocolo descobre rotas de comunicação eficientes, com uma menor quantidade de troca de mensagens de controle e um menor consumo de energia, se comparados à outra técnica que usa o monitoramento dos valores de RSSI entre os enlaces<br>Abstract: This work proposes a geographic routing for Wireless Sensor Network ( WSN ), where the position of sensor nodes is found by the algorithm of a location based on RSSI values ( Received Signal Strength Indication ) . The goal is that the proposed protocol create a net-work map, analyzing the conditions of the operating environment, since the RSSI values are directly affected by phenomena acting on the radio signal . In the context of this work, the location algorithm does not aim to find the exact physical location of the sensor node, but rather make the network adapt to the environment, since the positions calculated using the RSSI values collected will be affected by the effects of signal degradation. The proposal aims to be an alternative to existing adaptive protocols, which use the monitoring of RSSI values between existing sensors in a network , seeking to adapt to the environment . The work con-sists of experimental and simulation . The results show that the strategy adopted by the proto-col discovers routes for efficient communication, with a minor overhead and lower power consumption , compared to the other technique that uses monitoring the RSSI values between sensors<br>Mestrado<br>Telecomunicações e Telemática<br>Mestre em Engenharia Elétrica
APA, Harvard, Vancouver, ISO, and other styles
34

Mdlokovi, Lulama Reuben. "An evaluation of the process and impact of outsourcing information technology (IT) services by Eastern Cape Treasury Department (ECTD) to the State Information Technology Agency (SITA)." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1160/.

Full text
Abstract:
Thesis (M.B.A. (Rhodes Investec Business School)) - Rhodes University, 2008.<br>Submitted in partial fulfilment of the requirements for the degree Master of Business Administration in the Rhodes Investec Business School (RIBS)
APA, Harvard, Vancouver, ISO, and other styles
35

Matondolo, Siyamthanda Luthando. "Utilisation of ICT in healthcare centre to support HIV/AIDS flow of information and service delivery In Khayelitsha." Thesis, Cape Peninsula University of Technology, 2012. http://hdl.handle.net/20.500.11838/2477.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2012.<br>This research is an attempt to investigate the utilisation of Information Communication Technology (ICT) in Healthcare to support the flow of HIV/AIDS patient’s general information in public and private sector. Furthermore, the research examines the detail flow of database information for healthcare service delivery to patients, in particular HIV/AIDS patients, in Khayelitsha Township. Finally, the research will detail the types of technologies currently being utilised to transfer this information, technology utilised for capturing or data collection profile of the patient. The research study data collecting was done in 2009 in mostly private and public healthcare centre in Khayelitsha township. First, the study will concentrate on general utilisation of ICT in healthcare service delivery and flow of information for public and private sector healthcare centres. Additionally, the research also looks at NGOs such as HIV/AIDS Unit in Cape Peninsula University of Technology (CPUT) and Treament Action Campaign (TAC) to find out what ICT equipment is being utilised to transfer this information to adult people to inform and make them to be aware of HIV/AIDS and improve healthcare service delivery to patients and particularly to HIV/AIDS patients. Taking NGO’s such as TAC and CPUT HIV/AIDS Unit that are well informed about HIV/AIDS, nationally and internationally will make our research results to be more precise. The research will also look at the utilisation of ICT in flow of information at healthcare centre such as communication between healthcare providers such as receptionist/clerk, nurses, doctors and medical researchers since they are the first people who deal with HIV/AIDS patient cases when they come for healthcare provision.
APA, Harvard, Vancouver, ISO, and other styles
36

Usberti, Fábio Luiz 1982. "Métodos heurísticos e exatos para o problemas de roteamento em arcos capacitado e aberto = Heuristic and exact approaches for the open capacitated arc routing problem." [s.n.], 2012. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260624.

Full text
Abstract:
Orientadores: André Luiz Morelato França, Paulo Morelato França<br>Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação<br>Made available in DSpace on 2018-08-20T08:47:23Z (GMT). No. of bitstreams: 1 Usberti_FabioLuiz_D.pdf: 2207082 bytes, checksum: 83078a448a40f75c373b989f9af006fb (MD5) Previous issue date: 2012<br>Resumo:O problema de roteamento em arcos capacitado e aberto (open capacitated arc routing problem, OCARP) é um problema de otimização combinatorial NP-difícil em que, dado um grafo não-direcionado, o objetivo consiste em encontrar um conjunto de rotas de custo mínimo para veículos com capacidade restrita que atendam a demanda de um subconjunto de arestas. O OCARP está relacionado com o problema de roteamento em arcos capacitado (capacitated arc routing problem, CARP), mas difere deste pois o OCARP não possui um nó depósito e as rotas não estão restritas a ciclos. Aplicações da literatura para o OCARP são discutidas. Uma formula ção de programação linear inteira é fornecida junto com propriedades do problema. Uma metaheurística GRASP (greedy randomized adaptive search procedure) com reconexão por caminhos (path-relinking) é proposta e comparada com outras metaheurísticas bem-sucedidas da literatura. Algumas características do GRASP são: (i) ajuste reativo de parâmetros, cujos valores são estocasticamente selecionados com viés 'aqueles valores que produziram, em média, as melhores soluções; (ii) um filtro estatístico que descarta soluções iniciais caso estas tenham baixa probabilidade de superar a melhor solução incumbente; (iii) uma busca local infactível que gera soluções de baixo custo utilizadas para explorar fronteiras factíveis/infactíveis do espaço de soluções; (iv) a reconexão por caminhos evolutiva aprimora progressivamente um conjunto de soluções de elevada qualidade (soluções elites). Testes computacionais foram conduzidos com instâncias CARP e OCARP e os resultados mostram que o GRASP é bastante competitivo, atingindo os melhores desvios entre os custos das soluções e limitantes inferiores conhecidos. Este trabalho também propõe um algoritmo exato para o OCARP que se baseia no paradigma branch-and-bound. Três limitantes inferiores são propostos e um deles utiliza o método dos subgradientes para resolver uma relaxação lagrangeana. Testes computacionais comparam o algoritmo branch-and-bound com o CPLEX resolvendo um modelo reduzido OCARP de programa ção linear inteira. Os resultados revelam que o algoritmo branch-and-bound apresentou resultados melhores que o CPLEX no que diz respeito aos desvios entre limitantes e ao número de melhores soluções<br>Abstract: The Open Capacitated Arc Routing Problem (OCARP) is an NP-hard combinatorial optimization problem where, given an undirected graph, the objective is to find a minimum cost set of tours that services a subset of edges with positive demand under capacity constraints. This problem is related to the Capacitated Arc Routing Problem (CARP) but differs from it since OCARP does not consider a depot, and tours are not constrained to form cycles. Applications to OCARP from literature are discussed. An integer linear programming formulation is given, followed by some properties of the problem. A Greedy Randomized Adaptive Search Procedure (GRASP) with path-relinking (PR) solution method is proposed and compared with other successful metaheuristics. Some features of this GRASP with PR are (i) reactive parameter tuning, where the metaheuristic parameters values are stochastically selected biased in favor of those values which produced the best solutions in average; (ii) a statistical filter, which discards initial solutions if they are unlikely to improve the incumbent best solution; (iii) infeasible local search, where high-quality solutions, though infeasible, are used to explore the feasible/infeasible boundaries of the solution space; (iv) evolutionary PR, a recent trend in which a pool of elite solutions is progressively improved by relinking pairs of elite solutions. Computational tests were conducted for both CARP and OCARP instances, and results reveal that the GRASP with PR is very competitive, achieving the best overall deviation from lower bounds. This work also proposes an exact algorithm for OCARP, based on the branch-and-bound paradigm. Three lower bounds are proposed, one of them uses a subgradient method to solve a Lagrangian relaxation. The computational tests compared the proposed branch-and-bound with a commercial state-of-the-art ILP solver. Results reveal that the branch-and-bound outperformed CPLEX in the overall average deviation from lower bounds<br>Doutorado<br>Automação<br>Doutor em Engenharia Elétrica
APA, Harvard, Vancouver, ISO, and other styles
37

Ferreira, Deborah Pimenta. "Desenvolvimento de um Sistema de Informações, em intranet, para uma organização responsável pelo atendimento ao adolescente em conflito com a Lei (Febem/SP)." Universidade de São Paulo, 1999. http://www.teses.usp.br/teses/disponiveis/5/5144/tde-12062007-093106/.

Full text
Abstract:
Construir um sistema de informações para medir e acompanhar o desempenho de uma Organização complexa, sem fim lucrativo, na área social, é uma tarefa muito mais ampla do que simplesmente coletar e analisar alguns indicadores. Esta tese teve como objetivo o desenvolvimento e a análise do processo de implantação de um sistema de informações em uma Organização complexa (Febem/SP), visando dar apoio a uma administração mais eficaz. O processo de produção, tanto na área da saúde quanto na Febem, abrange todas as atividades desenvolvidas pelos profissionais no atendimento aos pacientes/adolescentes. Assim, o prontuário (registro das atividades da linha de produção) torna-se uma importante ferramenta para a avaliação deste processo. Objetivos deste sistema: construir a base de dados do adolescente autor de ato infracional, a fim de permitir um estudo pormenorizado da sua situação jurídica, social, educacional e de saúde, constituindo-se na base do sistema de informações da Febem/SP. Resultados: são apresentados a estrutura do conteúdo de informações, diagramas entidades-relacionamentos, diagramas de dados, exemplos das páginas da WEB, detalhes da rede, além da estratégia de treinamento e implantação utilizados. Aspectos éticos e legais do uso de dados pessoais em meio eletrônico são também abordados. São discutidas as dificuldades de implantação e operação deste sistema, suas semelhanças e diferenças com sistemas de informação em Organizações de saúde e é apontado o papel do médico informata. As principais dificuldades encontradas para a operação do sistema, até agora, referem-se à pouca experiência dos usuários com tecnologia de informação e resistência às mudanças organizacionais, principalmente quanto à implantação de um novo modelo de atendimento. O grande desafio, hoje, é a incorporação de forma eficiente e eficaz de toda esta tecnologia de informação existente à rotina dessas Organizações, com seu complexo sistema produtivo, compreendendo-se suas peculiaridades e limitações decorrentes de suas atividades fins.<br>Development of an information system for monitoring the performance of a complex non-profit organization is a wider work than get and analyze some indicators. The purpose of this thesis was the development and analysis of the implementation of an information system in a complex organization (Febem/SP), aiming to support a more efficacious administration. The process of production in health organizations and at Febem/SP include all professionals activities for patients and adolescents care. Thus, the patient record (information recorded all through production activities) becomes an important tool for process quality assessment. System purposes: development of the delinquent adolescents information data base, enabling a better comprehension of their judicial, social, educational and health situation, becoming the basis for the information system of Febem/SP. Results: information set definition, entityrelationship diagrams, data diagrams, examples of WEB pages and NetWare configuration are presented. Implementation and users training strategy are also presented. Ethical and legal issues about personal data in electronic systems are commented. Difficulties for the implementation of this system and its operation are discussed; it is compared to health organizations systems, the role of the medical informatics professional is pointed. The main problems for this system operation, up to now, can be explained by the inexperience of the users in Information Technology and resistance to organizational changes, especially to a new approach to these adolescents reeducation. The challenge today is incorporating, efficiently and efficaciously, all these Information Technology in these organizations, with their complex process of production, recognizing their particularities and limitations.
APA, Harvard, Vancouver, ISO, and other styles
38

Ling, Meng-Chun. "Senior health care system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2785.

Full text
Abstract:
Senior Health Care System (SHCS) is created for users to enter participants' conditions and store information in a central database. When users are ready for quarterly assessments the system generates a simple summary that can be reviewed, modified, and saved as part of the summary assessments, which are required by Federal and California law.
APA, Harvard, Vancouver, ISO, and other styles
39

Van, Wyk Byron Jay. "E-trust: a building block for developing valuable online platforms in Higher Education." Thesis, Cape Peninsula University of Technology, 2013. http://hdl.handle.net/20.500.11838/1852.

Full text
Abstract:
Thesis submitted in fulfilment of the requirements for the degree Master of Technology Design in the Faculty of Informatics and Design at the Cape Peninsula University of Technology Supervisor: Prof J Messeter Cape Town, 2013<br>The aim of this research project was to provide an answer to the question: “How can an understanding of online trust be used to build valuable online applications in Higher Education?” In order to present an answer to this question, a literature survey was conducted to establish: • An understanding of the phenomenon of online trust • What the factors are that influence a loss of trust in the online environment The literature survey highlighted several factors that influence a loss of trust in the online environment, called trust cues. These factors, however, were often tested within the E-commerce environment, and not in organization-specific contexts, such as online platforms in use in Higher Education. In order to determine whether or not these factors would influence the development of trust in context-specific environments, the author of this research grouped the indentified trust factors into three focus areas, i.e. content, ease of use, and navigation. These factors were then incorporated into a series of nine different prototypes. These prototypes were different versions of a particular online platform currently in use at the Cape Peninsula University of Technology (CPUT). The prototypes were tested over a three week period, with certain staff members at the institution in question recruited as test participants. During each week of user observations, a different focus area was targeted, in order to establish the impact that it would have on the perceived trustworthiness of the platform in question. User observations were conducted while test participants completed a standard process using the various prototypes. Semi-structured interviews were also conducted while participants completed the specific process. Participants were asked to evaluate each screen in the process according to its perceived trust worthiness, by assigning a trust level score. At the completion of the three rounds of user observations, in-depth interviews were conducted with test participants. The participants’ trust level scores for each prototype were captured and graphed. A detailed description for the score given for a particular screen was presented on each graph. These scores were combined to provide an analysis of the focus area tested during the specific round. After the three rounds of user observations were completed, an analysis of all the trust factors tested were done. Data captured during interviews were transcribed, combined with feedback received from questionnaires, and analysed. An interpretation of the results showed that not all trust factors had a similar influence in the development of trust in the online platform under investigation. Trust cues such as content organization, clear instructions and useful content were by far the most significant trust factors, while others such as good visual design elements, professional images of products, and freedom from grammatical and typographical errors had little or no impact in the overall trustworthiness of the platform under investigation. From the analysis done it was clear that the development of trust in organization-specific contexts is significantly different than developing trust in an E-commerce environment and that factors that influence the development of trust in one context might not always be significant in another. In conclusion, it is recommended that when software applications are developed in organization-specific contexts, such as Higher Education, that trust factors such as good content organization, clear instructions and useful content be considered as the most salient. Organization-specific contexts differ quite significantly in that the users of these systems often convey a certain degree of trust toward the online platforms that they work with on a daily basis. Trust factors that are geared toward developing an initial or basic trust in a particular platform, which is often the case with first time users engaging in an E-commerce platform, would therefore not be as significant in the development of a more developed level of trust, which is what is needed within the development of organization-specific online platforms.
APA, Harvard, Vancouver, ISO, and other styles
40

Zhao, Kanghua, University of Western Sydney, College of Health and Science, and School of Computing and Mathematics. "e-Marketplace development and trading agent design for supply chain management." 2006. http://handle.uws.edu.au:8081/1959.7/23527.

Full text
Abstract:
Supply Chain Management (SCM) deals with the planning and coordination of resource procuring, product marketing, production scheduling, and end product delivering across multiple organizations. This thesis considers the problems posed by e-Marketplace development and the design of intelligent trading agents for supply chain management in e-Marketplaces. The primary contribution of this thesis is its detailed analysis of the characteristics and properties of a typical e-Marketplace environment, its exploration of optimal trading agent strategies and its discussions of possible enhancements for the state-of-the-art e-Marketplace development and trading agent design. This research is stimulated by the recently introduced Trading Agent Competition for Supply Chain Management (TAC SCM) game scenario, which is a representation of typical e-Marketplaces. TAC SCM is the only competition-based e-Marketplace simulation system that captures the real challenges present in an integrated procurement, production and customer-bidding environment. The game was designed jointly by a team made up of researchers from the e-Supply Chain Management Lab at Carnegie Mellon University, the University of Minnesota, and the Swedish Institute of Computer Science (SICS), with tremendous inputs from the research community. This thesis starts with a detailed analysis of TAC SCM e-Marketplaces. We present an abstract model of the game, which consists of the market demand and market supply models. A series of experimental results that indicate the correctness and effectiveness of the strategies will then be presented, followed by the presentation of a new negotiation mechanism for the TAC SCM component market and the presentation of a new supplier model to demonstrate how negotiation strategies can be applied in automated negotiation. We explore the areas where the current TAC SCM scenario can be improved, followed by an outline of proposed enhancements to the TAC SCM e-Marketplace mechanism. Finally the thesis concludes with a discussion of future research directions.<br>Master of Science (Hons.)
APA, Harvard, Vancouver, ISO, and other styles
41

Dyer, Gloria Denise. "The development of the Administrative Sciences personal computer network tutorial." Thesis, 1987. http://hdl.handle.net/10945/22745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

"A Vulnerability Assessment of the East Tennessee State University Administrative Computer Network." East Tennessee State University, 2004. http://etd-submit.etsu.edu/etd/theses/available/etd-0301104-151512/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Park, Seong Cheol. "Indianapolis emergency medical service and the Indiana Network for Patient Care : evaluating the patient match process." Thesis, 2014. http://hdl.handle.net/1805/3808.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>In 2009, Indianapolis Emergency Medical Service (I-EMS, formerly Wishard Ambulance Service) launched an electronic medical record system within their ambulances and started to exchange patient data with the Indiana Network for Patient Care (INPC). This unique system allows EMS personnel in an ambulance to get important medical information prior to the patient’s arrival to the accepting hospital from incident scene. In this retrospective cohort study, we found EMS personnel made 3,021 patient data requests (14%) of 21,215 EMS transports during a one-year period, with a “success” match rate of 46%, and a match “failure” rate of 17%. The three major factors for causing match “failure” were (1) ZIP code 55%, (2) Patient Name 22%, and (3) Birth Date 12%. This study shows that the ZIP code is not a robust identifier in the patient identification process and Non-ZIP code identifiers may be a better choice due to inaccuracies and changes of the ZIP code in a patient’s record.
APA, Harvard, Vancouver, ISO, and other styles
44

Massah, Mwale Khalaphuah Agnes. "Impact of culture on the adoption of e-government in African countries." 2014. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001583.

Full text
Abstract:
M. Tech. Business Information Systems<br>Literature shows some gaps that the impact of culture on the adoption of e-government in African countries for citizens is still undeveloped in terms of utilisation, growth as well as managing e-government services. In this 21st century, where Information and Communication Technologies (ICTs) is one of the major drivers of the world economy, it remains a challenge for most governments in developing countries to adapt Information and Communication Technology (ICT) and effectively utilise it in their systems. The purpose of the study is to examine the key drivers of culture that impacts adoption of e-government in African countries: a case study of South Africa.
APA, Harvard, Vancouver, ISO, and other styles
45

Jamalkhan, Nasserkhan. "What is the impact of the Cyber Crime Act on the business community in Mauritius." Thesis, 2004. http://hdl.handle.net/10413/1503.

Full text
Abstract:
At this early age of the internet, the e-business environment is almost like a lawless territory. Fast movers are making fortunes whereas rebels can act with impunity and move on before the legal process can catch up. The fast expansion of cyber crimes in the world has been the motivation to perform this research on its impact on the business community in Mauritius after the devastating effects in developing countries. Organisations that are not keeping pace with these realities are becoming vulnerable to cyber criminals or hackers. An analysis of the situation in the world from the literature review has provided a better understanding of the most common crimes that are causing trouble to the businesses and obstacles to the advancement of e-commerce. Compared to earlier technological changes, the internet has shown a rapid proliferation. Organisations have to be ready to face this challenge or they may face the dangers of being attacked or even prosecuted for not having secured their system properly. While securing the internet remains a major challenge for every country, businesses have to cope with limited protection until an international law become in force to control this wild territory. The reports available on the Crime trend show that there has been a steady increase in Computer related crimes in the world. The research is conducted on a sample of IT literate participants. Interviews and focus group discussion have also contributed in the accuracy of the findings. The results and findings demonstrate that there is room for improvement but there is a lack of awareness on the Cyber crime act. Hopefully, this research will help to shed light on the major concerns of the business community. VI<br>Thesis (MBA)-University of KwaZulu-Natal, Durban, 2004.
APA, Harvard, Vancouver, ISO, and other styles
46

Maluleka, Simon Motlatsi. "A framework for cloud computing adoption in South African public sector : a case of Department of Social Development." 2014. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001588.

Full text
Abstract:
M. Tech. Business Information Systems<br>The adoption of Information and Communication Technology (ICT) solutions offer several potentials for most organisations (private and public) such as enabling effectiveness, efficiency, competitive advantage among others. As a result, we have seen several IT solutions implemented not only by private sectors but also by the backbone of public entities in the drive for efficiencies in service delivery such as the South African (SA) government. The SA government adopted Open Source Software (OSS) with the aim to reduce IT services cost, less dependencies on imported technology, skills, and flexibility. The SA government was less successful in achieving this aim due to OSS implementation challenges. These challenges among other things include support, funding, training, awareness, and human factors. In the midst of the OSS challenges, a potential alternative to address the same objectives aimed by OSS is Cloud Computing adoption. Cloud Computing is the latest phenomena that promises better potentials especially IT cost reduction, effectiveness and efficiency of IT services. The purpose of this study is to explore the feasibility of Cloud Computing adoption in SA government as a cost effective approach for IT services.
APA, Harvard, Vancouver, ISO, and other styles
47

Porogo, Keneilwe Margret. "A strategic framework for digital preservation capability maturity readiness in the context of e-government in the public service in Botswana." Thesis, 2020. http://hdl.handle.net/10500/27542.

Full text
Abstract:
This study assessed the digital preservation capability maturity readiness within the context of e-government in Botswana Public Service with a view to developing a strategic framework that ensures digital continuity. There some studies that have been conducted in Botswana regarding digital preservation but they did not provide a framework which could be used as an assessment to check their capability in digital preservation as e-government progresses so that digital information is continuously being used for decision making over time. The study adopted a pragmatic paradigm and embedded mixed method approach; whereby a cross sectional survey and case study were deployed in each of the 6 selected ministries as a unit of analysis. The target study respondents comprises of 5 Senior Managers, 4 Managers - Human Resources and Administration, 6 ICT Managers, 40 Records Management Officers,12 Information Technology Officers, 1 Performance Improvement Coordinator, 1 Project Manager, 8 Archivists, 1 Assistant Deputy Manager and 1 Deputy Managers- Management Services. The data was collected through interviews, questionnaires, personal observations, and documents analysis. Both qualitative and quantitative data were collected sequentially and simultaneously where one form of data supported or complemented each other so as to have one form of data play a supportive role to the other. Data analysis was achieved through the triangulation of both qualitative and quantitative data in order to yield a single interpretation and conclusion drawn. The findings of the study showed that the Botswana Public Service has no unified national information systems used to manage public sector records leading to some ministries adopting their own electronic records management systems. Currently few ministries have implemented the electronic records management system and majority of the digital records are not preserved due to lack of preservation guidelines and strategies. The study further established the lack of preservation policies and skills in managing and preserving digital records in Botswana Public Service. In that regard, the study developed a strategic framework for digital preservation capability maturity readiness in the context of e-government in the Botswana Public Sector. The ultimate aim of the framework is to ensure digital continuity and make sure that e-government is sustained for the benefit of an open government and increased participatory citizenry.<br>Information Science<br>D. Litt. et Phil. (Information Science)
APA, Harvard, Vancouver, ISO, and other styles
48

Lokwe, Lubabalo. "The effectiveness of implementing on e-government services at the State Information Technology Agency." 2014. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001573.

Full text
Abstract:
M. Tech. Business Administration<br>It has been noted that in developing countries, including South Africa, many projects on e-Government implementation have failed, while others have added very little value to the everyday lives of the citizenry. Broad reasons for the partial success or failure are related, inter alia, to people, policy, process or infrastructure. According to the management report of 2010 SITA (PTY) Ltd, there are many factors affecting the implementation of e-Government services. In terms of governance, there is a lack of both vision and consultation. In addition, there no is centralised budget for e-Government projects. The other challenge faced by SITA is that of skills inefficiency, as well as lack of technological upgrading that affects e-Government. In terms of process, employees are working in silos; there is no collaboration, and e-Government is a non-integrated service delivery process. The research purpose can be stated into the following objective: To identify governance, technology and financial factors that affect effective implementation of e-Government services at SITA (PTY) Ltd.
APA, Harvard, Vancouver, ISO, and other styles
49

"Contingency planning models for Government agencies." University of Technology, Sydney. School of Computing Sciences, 1996. http://hdl.handle.net/2100/245.

Full text
Abstract:
This report describes a research study into the current situation within Federal, State Government and selected private sector agencies, assessing contingency plans for Information Systems and suggests models for state-wide planning against Information Systems disasters. Following a brief look at various phases of contingency plan development, the study looks into the factors that prompt organisations to prepare contingency plans. The project involved a survey of current Information Systems contingency plans in the government agencies in the states of Victoria, Western Australia, South Australia, New South Wales and in the Australian Capital Territory. It also included two major banks, an insurance company and two computer services bureaux in the private sector within New South Wales. The survey determined that particular factors play important roles in the decision by organisations to commence contingency planning. These include actual disaster experience, senior management support, auditor's comments, legal requirements, risk analysis and business impact study, economic considerations, insurance requirements, contract commitment, new staff and introduction of new hardware and software. The critical success factors in contingency planning include regular maintenance and testing of the plan. The project also discusses the current contingency planning environment within New South Wales Government agencies and suggests cost-effective models for state-wide adoption.
APA, Harvard, Vancouver, ISO, and other styles
50

Magwentshu, Anele. "A conceptual model for acceptance and use of e-government in rural South Africa." 2014. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001587.

Full text
Abstract:
M. Tech. Business Information Systems<br>The government's intention is to extend the provision of government services to citizens beyond the traditional boundaries of time and space. Additionally to the face-to-face provision of government services, this could also be achieved through utilization of the Internet and the evolving information and communication technologies. This concept is what has brought about what is called the electronic government or e-government as some would refer to it. E-government is meant to facilitate service provision to citizens and businesses that the government has a mission to serve - including those handicapped due to physical, social, economic, geographical or cultural factors - independent of time and space. Equity and fairness, which drive governments social inclusion, dictate that disadvantaged groups should not experience inferior access to public services compared to other groups. Therefore, no matter what channel is decided upon by government to use to provide these services, it remains government's responsibility to cater for all its citizens and residents. How e-government is accepted and utilized by South African residents, especially in rural areas, is not adequately and properly understood. This study utilized and applied Unified Theory of Acceptance and Use of Technology to explore the acceptance and use of e-government in rural South Africa.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography