Dissertations / Theses on the topic 'Information factors'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Information factors.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Fang, Li, and Sylvia Patrecia. "Critical Success Factors in ERP Implementation." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-219.
Full textERP systems link together an organization’s strategy, structure, and business processes with the IT system. The different way of handling the process of ERP implementation brings about many success and failure stories. By doing research on 1) what are the critical success factors in the implementation of ERP 2) why are these factors critical 3) what is the criticality degree of each factor 4) how important are these factors for customers, consultants, and vendors, the report aims to to identify the critical success factors in ERP implementation and understand the criticality degree of each factor from the perspectives of three parties (companies, consultants & vendors).
The research is proceeded with combined methods of qualitative and quantitative. The qualitative method for the interviews was chosen in order to get the information in depth. A semi-structured interview helps to provide some basic questions as guideline.
Furthermore, the quantitative approach contributes to manipulating the data for a more comprehensive analysis of empirical findings. This report states 11 CSFs (Critical Success Factors) from three points of view: strategic, tactical, and cultural. They are: Top management support and ERP strategy, Business Process Reengineering, Project team & change management, Retain the experienced employee, Consultant and vendor support, Monitoring and evaluation of performance, Problems anticipation (troubleshooting, bugs, etc.), Organizational culture, Effective communication, and Cultural diversity. By testing the perceived CSFs in six respondents (VSM Group, Scania, Sogeti, SYSteam, Oracle, and SAP), this report puts the 11 factors into three overall ranks (most critical, medium critical, and less critical), gains 3 other new critical factors (testing, business model, and client’s resources), and clarifies the diverse opinions about CSFs from customers/companies, consultants, and vendors. The most critical factors are Top management support, BPR, Project team & change management, and Effective communication. The medium critical factors go to ERP strategy, Consultant and vendor support, and Organizational culture. And the remaining 4 factors belong to less critical category.
For the differences, their agreement comes into the 4 most critical factors. In monitoring and evaluation of performance they agree on its less criticality. All customers, consultants and vendors have quite different opinions about the remaining 6 factors.
Reviewing the research questions, this report has fulfilled the main objectives and purpose. With better understanding of the comprehensive identification of CSFs and criticality rank of each factor, management will be able to judge and allocate essential resources that are required to bring ERP implementation into success.
Aghaunor, Lavin, and Xavieria Fotoh. "Factors Affecting ecommerce adoption in Nigerian Banks." Thesis, Jönköping University, JIBS, Business Informatics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-477.
Full textKfutwa, Fukah. "Motivational Factors for Growth in Small and Medium Sized Enterprises (SMEs) : Information Technology Perspective." Thesis, Jönköping University, JIBS, Business Informatics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-844.
Full textSmall and Medium Size Enterprises (SMEs) constitute the backbone of many economies in the world today. This is because they are creating new jobs and contributing positively to their respective economies in which Sweden is not an exception and par-ticularly the municipality of Jonkoping. SMEs invest in IT to gain access to integration of transactions oriented data and business processes.
This thesis, motivational factors for growth in SMEs – (IT perspective) give an overview of how SMEs grow as a result of the introduction and implementation of IT. Information Technology (IT) is seen to be a motivational factor for the growth of SMEs. This is because it acts like an enabler to their businesses and the current business environment.
To answer the research question, I conducted an empirical study of some companies in Jonkoping that are using IT as a motivational factor for growth. Interviews were con-ducted through the use of a structured questionnaire and to a lesser extent, unstructured questionnaire.
Results from studies portrayed that, these companies introduced and implemented IT as a motivational factor for similar reasons though with different objectives.
Sehele, Abdulallah A. A. "Success factors in information technology projects." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/14420.
Full textFulcher, AÌine Bridget. "Information-processing factors in childhood anxiety." Thesis, University of Southampton, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423224.
Full textJawad, Ali Qassim. "Factors for success in acquiring information technology." Thesis, Cranfield University, 1995. http://hdl.handle.net/1826/3352.
Full textMarkevičiūtė, Lina. "Information factors of quality management system maturity." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20091024_103844-64497.
Full textSėkmingas kokybės vadybos sistemos funkcionavimas, nuolatinis sistemos tobulinimas, sąlygojantis sistemos brandą, nėra savaiminis reiškinys. Siekdamos kokybės vadybos sistemos brandos organizacijos privalo sukuti tam tinkamas sąlygas: identifikuoti brandos veiksnius ir rūpintis jų tinkama įtaka. Informaciniai veiksniai yra priskiriami veiksnių, lemiančių kokybės vadybos sistemos brandą, kategorijai. Tačiau iki šiol, informacinių veiksnių visuma, įtakojanti kokybės vadybos sistemų brandą, nėra identifikuota remiantis informacijos mokslų teorine baze. Nepakankamai apibrėžtos ir veiksnių charakteristikos, užtikrinančios tinkamą įtaką kokybės vadybos sistemoms. Per didelė entropija šiais klausimais lemia tai, kad organizacijos nesugeba sudaryti tinkamų sąlygų savo kokybės vadybos sistemų brandai. Įvardintos problemos skatina formuluoti tokį mokslinio tyrimo tikslą – identifikuoti kokybės vadybos sistemos brandos informacinių veiksnių visumą, išaiškinant jų įtaką sistemos brandai.
Abrams, David. "Human factors of personal Web information spaces." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ51586.pdf.
Full textKaniclides, Antonis. "Critical factors in executive information systems implementation." Thesis, University of York, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.387555.
Full textAfolabi, Jonathan Olubunmi. "Initiating Factors Affecting Information Systems Project Success." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4706.
Full textTshabalala, Obediant. "Critical success factors of information security projects." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/10397.
Full textWaly, Nesren Saleh. "Organisational information security management : the impact of training and awareness : evaluating the socio-technical impact on organisational information security policy management." Thesis, University of Bradford, 2013. http://hdl.handle.net/10454/5666.
Full textSundén, Susanne, and Gudrun Wicander. "Information and Communication Technology Applied for Developing Countries in a Rural Context : Towards a Framework for Analysing Factors Influencing Sustainable Use." Licentiate thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-748.
Full textInformation and Communication Technology (ICT) has been considered a tool that can be used to achieve development goals in developing countries. In the same time, the majority of people living in developing countries, and especially those in rural areas lack access to ICT. Even if there have been many attempts to introduce ICT, they have in general not been long-lasting.
A framework for studying factors that influence use of ICT is desirable. We see it necessary to bring a sustainability aspect into the picture of ICT. In this work the requirement of ‘sustainable ICT use’ stresses that ICT is long-lasting and that ICT meets the needs of the user. Thus, the aim of this work is to develop a tool for conceptualisation that can support the understanding of the conditions for sustainable, and therefore successful, ICT projects in developing countries.
Our theoretical starting point is taken in the Information System (IS) theories. The theoretical base is then broadened to include theories on international development, theories on sustainable development, and theories on diffusion of innovations and transfer of technology. The theoretical foundation, together with four empirical studies, is used to answer the two research questions in this thesis. The first question is: Which are the critical factors influencing sustainable ICT use in developing countries? By using ‘critical factors’ we emphasise a focus on factors which are crucial (even if possibly not sufficient) for bringing about sustainable ICT use. This question is followed by a second question: How would a framework be structured to properly include these factors in order to support analyses of sustainable ICT use?
The framework has evolved through the identification of factors from four empirical studies. Forty-one factors were identified and sorted into fifteen subcategories of five major capital assets. The main contribution of our study is that of a generic framework, which can be used as a guideline for planning, implementation, and evaluation of ICT projects in a rural developing country context achieving sustainable ICT. As argued in this thesis technology is not the key resource; it is the combination and system of different resources distributed along a time and space dimension that is the key. With our framework we have demonstrated that the ICT artefact is not the sustainability tool, it is the combination of different resources that makes it sustainable and competitive.
Öberg, Lena-Maria. "Traceable Information Systems : Factors That Improve Traceability Between Information and Processes Over Time." Licentiate thesis, Mid Sweden University, Department of Information Technology and Media, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-515.
Full textPreservation of information is not a new issue but preservation of digital information has a relatively short history. Since the 60’s when computers began to be used within administration, digital information that has had to be preserved over time.The problem addressed in this research is how to preserve understandable information over time. Information is context dependent, which means that without context it is not possible to use the information. Process is one part of the context. And an important issue when preserving information is then to be able to trace an information
object to the process where in it has been created and managed. Associating information to a particular process creates the possibility of relating information objects to each other and also to the context in which the information has been created and used. The aim of this thesis is to identify and structure factors that can improve the traceability between information and processes over time. A set of factors based on case studies and a set of analytical methods are presented that can improve the traceability over time. These factors have been identified and structured by the use of the Synergy-4 model. They have been identified within four different spheres namely: competence, management, organization/procedure and technology. The factors have further been structured in three different time states namely: creation time, short and middle term and long-term. The research concludes that there are a lot of factors influencing ability to preserve information. Preservation issues include selection of metadata standards, organizational culture, lack of understanding from management and formalization of documents. The conclusion is that if an organization wants to succeed in preserving traceable information they have to build strategies that cover the issues from a range of different angles. This thesis suggests that crucial angles are competence, management, organization/procedure
and technology. Furthermore, the strategies must be in place at the stage of creationof the information objects.
Osmonalieva, Zarina, and Laxmi Rao. "Which factors facilitate the management of external knowledge?" Thesis, Mälardalen University, School of Sustainable Development of Society and Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-776.
Full textDate: 2008-06-04
Course: EIK 034 Masters Thesis
Authors: Laxmi Rao & Zarina Osmonalieva
Tutor: Ole Liljefors
Title: Which factors facilitate the management of external knowledge?
Introduction: Today more and more organisations are realising that handling internal and external knowledge is a key issue for successful performance. Different theories describe the importance of this topic, for instance, Porter’s Five Forces model and Hedman & Kalling’s General Business Model demonstrate how organizations are strongly influenced by external forces. Hedman & Kalling’s model particularly demonstrates that organizations need to have the competence, capability and resources to effectively manage external knowledge in order to increase their competitiveness and develop and improve their long term survival.
Purpose: Nicholas Carr highlights that for the past decade organizational investment in IT and IS has reached nearly 50% of capital expenditure, while the organizations see little or no performance improvement as a result of this investment. While IT systems are good at storing and retrieving information, the success of the systems heavily relies on the quality of the external and internal knowledge used both during development and usage. A deeper awareness of factors which facilitate the management of external knowledge is relevant to IT managers (indeed all managers) as it will help to facilitate the development and implementation of information systems and technology which are designed to facilitate knowledge management in organisations.
Methodology: In the thesis factors related to effective management of external knowledge are identified and described. The General Business Model was used as a tool to identify and categorize the literature review into key themes.
Conclusions One of the findings is that most published research focuses on factors internal to organizations such as activities and resources and there are few papers dealing with external factors for knowledge management. It was also found that literature which focussed on external factors mainly focused on the role of individuals as resources who cross the boundary of the organization in order to acquire and diffuse the external knowledge. In general the topic of external knowledge management is not studied in a holistic way. The acquisition and diffusion processes have been investigated as separate, but not as the whole process.
Rudolph, Frederick M. "Human performance during automation : the interaction between automation, system information, and information display in a simulated flying task." Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/36207.
Full textAbd, Elkhalek Ahmed. "Critical Factors for Effective Information Systems Risks Management." Thesis, Mälardalens högskola, Akademin för hållbar samhälls- och teknikutveckling, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-12819.
Full textParker, Christopher J. "A human factors perspective on volunteered geographic information." Thesis, Loughborough University, 2012. https://dspace.lboro.ac.uk/2134/10177.
Full textKelley, Timothy D. "Systemic effects of human factors in information security." Thesis, Indiana University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3665483.
Full textThis dissertation couples the growing corpus of human subjects and behavioral research in information security with large-scale data and robust quantitative methods. Linking human subject experimentation with theoretical models enables the information security community to reason more effectively about the system-wide effects of user behavior. I examine how users interact with the digital environment, how those interactions affect decision-making, and how aggregate decision-making affects system-wide vulnerabilities. This interdisciplinary challenge requires a combination of techniques from cognitive neuroscience, social network analysis, human-subjects research, dynamical systems, network theory, and agent-based models.
In the first section, eye-tracking data demonstrates the relationships between expertise and online perceptual awareness of security cues. Expertise is shown to be only a small factor in attention to security cues, and task-type proves to be much larger indicator of attention, with tasks requiring the use of personal accounts driving attention to cues. This section uses Bayesian ANOVA to evaluate users' perceptual awareness of security cues as they complete common online tasks, as it relates to user sophistication and task type.
The second section uses a theoretical epidemiological model of malware spread to investigate factors that might mitigate the prevalence of malware in a coupled, two-population model. This both demonstrates that cost is the largest factor for affecting malware prevalence, outside of malware infection rates, and identifies appropriate strategies for system-wide botnet mitigation.
The final section utilizes an agent-based model of mobile application adoption combined with social network data and mobile marketplace policy. The result is an examination of the dynamic effects of user and market behavior on the spread of mobile malware and the second order effects, such as privacy loss, due to that spread. This model reveals that well-regulated markets are effective at limiting malware spread, but user behavior grows in importance as markets become less restricted.
Each study examines ways in which users interact with their technology, the aggregate effects of those behaviors, and identifies possible inflection points to change system-wide behaviors. This dissertation integrates empirical behavioral studies to develop a better understanding of digital behavior, thus enabling a more holistic approach to information security.
Barnett, Mary Jane 1952. "Factors Influencing Older Adults' Patterns of Information Acquisition." Thesis, University of North Texas, 1989. https://digital.library.unt.edu/ark:/67531/metadc330851/.
Full textTsoi, Pui Man. "Critical success factors for strategic information systems planning." HKBU Institutional Repository, 2001. http://repository.hkbu.edu.hk/etd_ra/283.
Full textAldhaheri, Omar. "Factors influencing information privacy in Abu Dhabi Emirate." Thesis, Loughborough University, 2016. https://dspace.lboro.ac.uk/2134/22485.
Full textBessick, Jacqueline Ruby. "Factors influencing effective information management using information technology systems in a public sector department." University of the Western cape, 2016. http://hdl.handle.net/11394/5559.
Full textThe Public Sector encounters great challenges in its attempts to strengthen its public services. Public servants are in need of accurate and up-to-date information that can be readily accessible. They need information to be made available for effective and efficient decision-making. In order to improve service delivery, the Public Sector must aim to reach its objectives by increasing and improving accountability, transparency, efficiency, productivity and quality of services. This study focuses on factors, which influence information management in a Public Sector Department in an effective way to manage information properly. An extensive literature review was conducted of information, the role of information management, the possible critical failure and success factors of information management. This led to the discovery of four main categories for critical failure factors: (i) people; (ii) process; (iii) policy and; (iv) technology; and three categories for critical success factors: (i) organizational culture; (ii) top management support; and (iii) strategies. A conceptual model was then developed for these categories with seventeen factors. This model was subsequently tested in the empirical setting of the studied Public Sector Department in South Africa by utilising a qualitative approach through the case-study method. The findings suggest that the following factors would impact the successful implementation of an information management initiative for this Public Sector Department: information management; change management and communication strategies; culture; roles of responsibility for information; information lifecycle process; and information management policy. The intended audience for this study includes both academics and practitioners, as it introduces a conceptual model, as well as guidelines to implement these factors for information management in a Public Sector Department.
Кубатко, Олександр Васильович, Александр Васильевич Кубатко, Oleksandr Vasylovych Kubatko, and А. В. Ярмак. "Информационная экономика – новый этап развития общества." Thesis, Видавництво СумДУ, 2011. http://essuir.sumdu.edu.ua/handle/123456789/11734.
Full textFang, X. (Xin). "Success factors affecting E-business:case Taobao." Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201508271930.
Full textDzokoto, Frank K. "Information behaviour of construction project actors." Thesis, Loughborough University, 2016. https://dspace.lboro.ac.uk/2134/23173.
Full textFarley-Larmour, Kim, and n/a. "Factors influencing students' choice of library and information studies." University of Canberra. Information Management & Tourism, 1999. http://erl.canberra.edu.au./public/adt-AUC20060707.161125.
Full textXu, Hongjiang. "Critical success factors for accounting information systems data quality." University of Southern Queensland, Faculty of Business, 2003. http://eprints.usq.edu.au/archive/00001526/.
Full textAvgerou, Chrisanthi. "Information systems in social administration : factors affecting their success." Thesis, London School of Economics and Political Science (University of London), 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.261972.
Full textPalmer, Judith Marian Penfold. "Factors affecting the information behaviour of agricultural research scientists." Thesis, University of Sheffield, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.392754.
Full textzhang, peng. "An Empirical Study of Health Information Exchange Success Factors." FIU Digital Commons, 2017. https://digitalcommons.fiu.edu/etd/3537.
Full textHarrell, Martha Nanette. "Factors impacting information security noncompliance when completing job tasks." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/21.
Full textMunir, Muhammad, Faisal Rahim, and Abrara-ud-Din. "Problems during Implementation of Business Information Systems." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20451.
Full textProgram: Magisterutbildning i informatik
Herald, William Joseph. "An analysis of factors influencing general user information satisfaction including system-specific user information satisfaction." Connect to resource, 1996. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1267623116.
Full textMorton, Mary Elizabeth Wiedenbeck Susan McCain Katherine Wootton. "Use and acceptance of an electronic health record : factors affecting physician attitudes /." Philadelphia, Pa. : Drexel University, 2008. http://hdl.handle.net/1860/2905.
Full textTaskov, Konstantin Vedder Richard Glen. "Organizational factors contributing to an effective information technology intelligence system." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9733.
Full textJamieson, Bruce (Kieren) James, and k. jamieson@cqu edu au. "Information Systems Decision Making: Factors Affecting Decision Makers and Outcomes." Central Queensland University. School of Management and Information Systems, 2007. http://library-resources.cqu.edu.au./thesis/adt-QCQU/public/adt-QCQU20070626.103825.
Full textMeiring, Natalie. "Factors impacting Tablet PC usage in low-income communities." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/4642.
Full textIkart, Emmanuel Matthew. "Critical success factors for executive information systems usage in organisations /." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060706.111336/index.html.
Full textSilburn, Nicholas L. J. "A model of factors affecting professional workers' information behaviours within the context of valuing organisational information." Thesis, University of Reading, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.657998.
Full textCampbell, Regan Helen. "An age-related comparison of audio and audio plus video presentation modes for conveying technical information." Thesis, Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/28612.
Full textVural, Ilkay. "Success Factors In Public Information Systems Outsourcing: A Case Study." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605139/index.pdf.
Full textSissing, Donovan. "Information technology architecture and related strategic factors supporting business advantage." Thesis, University of the Western Cape, 2007. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_1476_1255527907.
Full text"
Information Technology (IT) architecture is not restricted to technology, but may also address the views of business activities
their processes
data sets and information flows
applications and software
and technology. The objective of this study is to understand the role of IT Architecture and related factors that support competitive business advantage. This study investigates the null hypothesis: IT architecture enhances the competitive advantage of business. This study sets out to explore IT architecture and strategic factorsthat support business advantage. The study findings indicated that business advantage is supported by a sound architecture, by IT and business alignmentand by the enablers of organisations..."
Gwizdka, Jacek, and Irene Lopatovska. "The Role of Subjective Factors in the Information Search Process." Wiley, 2009. http://hdl.handle.net/10150/105909.
Full textWe investigated the role of subjective factors in the information search process. Forty eight participants each conducted six web searches in a controlled setting. We examined relationships between subjective factors (happiness levels, satisfaction with and confidence in the search results, feeling lost during search, familiarity with and interest in the search topic, estimation of task difficulty), and objective factors (search behavior, search outcomes and search task characteristics). Data analysis was conducted using a multivariate statistical test (Canonical Correlations Analysis). The findings confirmed existence of several relationships suggested by prior research, including relationships between objective search task difficulty and the perception of task difficulty; between subjective states and search behaviors and outcomes. One of the original findings suggests that higher happiness levels before the search and during the search correlate with better feelings after the search, but also correlates with worse search outcomes and lower satisfaction, suggesting that, perhaps, it pays off to feel some â painâ during the search in order to â gainâ quality outcomes.
Cassar, Alexander. "Factors influencing the adoption of strategic inter-organisational information systems." Thesis, Henley Business School, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.340934.
Full textChen, Chun-Wei, and 陳俊瑋. "Assessment of Information Security Influencing Factors." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/hj6jpt.
Full text中原大學
資訊管理研究所
104
In recent years, advances in Internet so that people rely on computers increasing influence is also growing, and companies face global competition under the information technology and electronics progress and development, and further the development of e-policy and security policy needed to respond to information security threats. So many organizations have been planning to import information security systems, but large-scale import of funds, so that enterprises in importing do not know the door into the room, or waste a lot of resources on the import, the study will focus on the country through ISO 27001 certification enterprise, the expert questionnaire distributed to businesses, hoping to use AHP level analysis to identify the factors critical to success of ISO 27001. In this study, the experts issued questionnaire method, for all enterprises at all levels of the heavy weight carried feedback information respondents had to identify critical success factors for introducing ISO 27001 re-use AHP AHP, research results, mostly for high-end subjective identity within the enterprise ISO 27001 is the first key to import critical success factors, and with the participation of all employees working in the enterprise is more important critical success factors indicators; advocacy and promotion of IT security policies also have a higher impact on the ranking. The nature of the telecommunications services company, has relied on a relatively good operational goals of information security policy, so the difference in the company compared with the nature of the semiconductor industry, the data would be more intense, and the nature of the semiconductor industry companies will pay more attention to the institutional side , rationality and applicability of the project a key factor in the design of the system will be stronger than information security policy in line with operational objectives, analyzed in this study and the results from the data in order to provide the experience of not introducing ISO 27001 organization Share directions and recommendations. Finally, according to the results of this study were discussed, and the follow-up study suggests.
Chen, Kuei-Fen, and 陳桂芬. "Factors Affecting Personal Health Information Disclosure." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/25384978199805407706.
Full text國立交通大學
資訊管理研究所
103
The implementation of electronic medical record (EMR) exchange is an important tread. However, EMR exchange suffers from some problems. For example, concern for health information privacy may cause individuals unwilling to provide personal health information. To better understand individuals’ intention, we tried to examine the correlation between individuals’ concern for information privacy and their intention. Beside this, based on a social exchange theory perspective, the antecedents in organizational dimension of CFIP were examined. In this study, our proposed model was empirically validated by 138 respondents in Taiwan. Four hypotheses were assessed by Structural Equation Modeling (SEM) via statistical analysis software SmartPLS 3.0. Three hypotheses were significant supported which indicate that all of the components of social exchange theory were critical, and the proposed model is applicable in EMR exchange context.
MING, PI SHIH, and 皮世明. "Factors Influencing Information Systems Service Quality." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/86781435167223527273.
Full textWANG, YI-CHENG, and 王毅正. "Key Factors in Using Information Appliances to Trigger Information Security Incidents." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/p7af78.
Full text世新大學
資訊管理學研究所(含碩專班)
107
The popularization of the network has brought great convenience to mankind. The rapid development of science and technology has greatly improved the quality of life. Modern people have greatly increased the function requirements of household appliances, and IA (Internet/Information Appliance) has been born. The characteristics of information appliance are easy to use, online network function, and hardware that can access and record a lot of information. It can refer to all household appliances that can be accessed online. Home appliance products, information equipment Intelligent modern life, users enjoy the convenience of information appliances but also derived from the risk of information security hazards. Electrical appliances and information devices in the household become tools for hackers to peep or use to attack others; information on family members' eating habits, physical health, rest and time, bank deposits, work contents and so on is being obtained by hackers through the vulnerability and defects of information appliances or devices, and the consequences will be unthinkable. Therefore, this study explores and collate the elements that lead to various information security risks by using information appliances, and provides suggestions for the general public to avoid or effectively prevent information security incidents when using information appliances, and points for attention. Through the collation and analysis of relevant literature, this study summarizes various factors that trigger information security incidents, then helps to screen out the important factors through expert focus discussion, and then uses the hierarchical analysis method to analyze the causal impact degree of the important factors. Finally, sort out the top ten key factors that cause information security events, and put forward expert suggestions on various factors.
Liu, Meng-Chuan, and 劉孟娟. "Factors Related to Build Nursing information system." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/03981329296624639951.
Full text