To see the other types of publications on this topic, follow the link: Information factors.

Dissertations / Theses on the topic 'Information factors'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information factors.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Fang, Li, and Sylvia Patrecia. "Critical Success Factors in ERP Implementation." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-219.

Full text
Abstract:

ERP systems link together an organization’s strategy, structure, and business processes with the IT system. The different way of handling the process of ERP implementation brings about many success and failure stories. By doing research on 1) what are the critical success factors in the implementation of ERP 2) why are these factors critical 3) what is the criticality degree of each factor 4) how important are these factors for customers, consultants, and vendors, the report aims to to identify the critical success factors in ERP implementation and understand the criticality degree of each factor from the perspectives of three parties (companies, consultants & vendors).

The research is proceeded with combined methods of qualitative and quantitative. The qualitative method for the interviews was chosen in order to get the information in depth. A semi-structured interview helps to provide some basic questions as guideline.

Furthermore, the quantitative approach contributes to manipulating the data for a more comprehensive analysis of empirical findings. This report states 11 CSFs (Critical Success Factors) from three points of view: strategic, tactical, and cultural. They are: Top management support and ERP strategy, Business Process Reengineering, Project team & change management, Retain the experienced employee, Consultant and vendor support, Monitoring and evaluation of performance, Problems anticipation (troubleshooting, bugs, etc.), Organizational culture, Effective communication, and Cultural diversity. By testing the perceived CSFs in six respondents (VSM Group, Scania, Sogeti, SYSteam, Oracle, and SAP), this report puts the 11 factors into three overall ranks (most critical, medium critical, and less critical), gains 3 other new critical factors (testing, business model, and client’s resources), and clarifies the diverse opinions about CSFs from customers/companies, consultants, and vendors. The most critical factors are Top management support, BPR, Project team & change management, and Effective communication. The medium critical factors go to ERP strategy, Consultant and vendor support, and Organizational culture. And the remaining 4 factors belong to less critical category.

For the differences, their agreement comes into the 4 most critical factors. In monitoring and evaluation of performance they agree on its less criticality. All customers, consultants and vendors have quite different opinions about the remaining 6 factors.

Reviewing the research questions, this report has fulfilled the main objectives and purpose. With better understanding of the comprehensive identification of CSFs and criticality rank of each factor, management will be able to judge and allocate essential resources that are required to bring ERP implementation into success.

APA, Harvard, Vancouver, ISO, and other styles
2

Aghaunor, Lavin, and Xavieria Fotoh. "Factors Affecting ecommerce adoption in Nigerian Banks." Thesis, Jönköping University, JIBS, Business Informatics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kfutwa, Fukah. "Motivational Factors for Growth in Small and Medium Sized Enterprises (SMEs) : Information Technology Perspective." Thesis, Jönköping University, JIBS, Business Informatics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-844.

Full text
Abstract:

Small and Medium Size Enterprises (SMEs) constitute the backbone of many economies in the world today. This is because they are creating new jobs and contributing positively to their respective economies in which Sweden is not an exception and par-ticularly the municipality of Jonkoping. SMEs invest in IT to gain access to integration of transactions oriented data and business processes.

This thesis, motivational factors for growth in SMEs – (IT perspective) give an overview of how SMEs grow as a result of the introduction and implementation of IT. Information Technology (IT) is seen to be a motivational factor for the growth of SMEs. This is because it acts like an enabler to their businesses and the current business environment.

To answer the research question, I conducted an empirical study of some companies in Jonkoping that are using IT as a motivational factor for growth. Interviews were con-ducted through the use of a structured questionnaire and to a lesser extent, unstructured questionnaire.

Results from studies portrayed that, these companies introduced and implemented IT as a motivational factor for similar reasons though with different objectives.

APA, Harvard, Vancouver, ISO, and other styles
4

Sehele, Abdulallah A. A. "Success factors in information technology projects." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/14420.

Full text
Abstract:
Concern for project failures and successes have posed a controversial and much debated topic amongst scholars and practitioners alike. IT projects are no exceptions and they too suffer from a high rate of failure. This research aims to explore the reasons why certain IT projects succeed). Besides its academic importance, the research intends to assess the implications for successful implementation of current and future IT projects. The review of the extant literature reveals the enormity of the challenges involved in minimising or avoiding project failures. Present work is contextualizing these issues in a large national organisation with branches throughout the KSA. The Saudi Arabia constitutes the case study for this research. Qualitative methodology was adopted to generate and collect adequate and relevant data. Main instruments were; Semi-structured interviews involving senior managers in five geographical areas who were involved in the management of the IT projects and selected project documents. Thematic analysis was used and led to emergence of seven main ‘themes’, 19 major ‘issues’, and the construction of the first time generic model for success of IT projects. The core issues identified in the model are: Quality, Time and Cost at three levels; individual, organisation and environment with specific order of importance. The implications of the findings for the theory and practice have been identified. It is also recommended that there is a need for further research into individual and contextual factors that influence both managers as well as the circumstances under which IT projects are implemented.
APA, Harvard, Vancouver, ISO, and other styles
5

Fulcher, Áine Bridget. "Information-processing factors in childhood anxiety." Thesis, University of Southampton, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jawad, Ali Qassim. "Factors for success in acquiring information technology." Thesis, Cranfield University, 1995. http://hdl.handle.net/1826/3352.

Full text
Abstract:
The acquisition of new IT systems is expensive and risky. Systems often fail to provide the expected services, or may commit an organisation to a particular long-term solution to its information management needs which can be very costly to change. The purpose of this research was to help organisations to manage the IT acquisition process with greater chances of success. In this research `Acquisition of IT' means the whole process of initiating, implementing and then using an information technology system. The approach taken was to identify success factors for IT acquisition. A large number of actual acquisition cases were examined, and a list was compiled of factors reported by people involved in these cases to affect their success or otherwise. The relative importances of these factors were then measured quantitatively by correlating the degree to which each factor was present in the cases, with the degree of success of the cases. This work has produced: a comprehensive list of factors to be considered; a method of defining what is meant by success for a given project; a description of the acquisition project lifecycle; and an identification of the different roles played by different people within an organisation. It is shown how to integrate these considerations into a structured approach to managing IT acquisitions. This integrated approach is called the Success Map. Three mini case studies were included, and one of these was analysed in the light of the findings. In a supplementary section, fifteen guiding principles for people involved in an IT acquisition are presented.
APA, Harvard, Vancouver, ISO, and other styles
7

Markevičiūtė, Lina. "Information factors of quality management system maturity." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20091024_103844-64497.

Full text
Abstract:
Successful quality management systems proceeding and continual development, that determine systems maturity, is not self-contained phenomenon. Persuading for quality management systems maturity, organization must create suitable conditions for that. Organization must determine maturity factors and tend for these factors suitable impact to quality management system. Information factors are ascribable to factors, that determinate quality management systems maturity. But still now, the whole of information factors is not institutionalized sustaining by information since theoretical base. Characteristics of these information factors are defined insufficiently too. Defined uncertainty direct, why organizations can’t create suitable conditions for quality management systems maturity. These problems incite the research purpose – indicate the whole of informational factors, that impact quality management systems maturity, and clarify theirs influence to system development.
Sėkmingas kokybės vadybos sistemos funkcionavimas, nuolatinis sistemos tobulinimas, sąlygojantis sistemos brandą, nėra savaiminis reiškinys. Siekdamos kokybės vadybos sistemos brandos organizacijos privalo sukuti tam tinkamas sąlygas: identifikuoti brandos veiksnius ir rūpintis jų tinkama įtaka. Informaciniai veiksniai yra priskiriami veiksnių, lemiančių kokybės vadybos sistemos brandą, kategorijai. Tačiau iki šiol, informacinių veiksnių visuma, įtakojanti kokybės vadybos sistemų brandą, nėra identifikuota remiantis informacijos mokslų teorine baze. Nepakankamai apibrėžtos ir veiksnių charakteristikos, užtikrinančios tinkamą įtaką kokybės vadybos sistemoms. Per didelė entropija šiais klausimais lemia tai, kad organizacijos nesugeba sudaryti tinkamų sąlygų savo kokybės vadybos sistemų brandai. Įvardintos problemos skatina formuluoti tokį mokslinio tyrimo tikslą – identifikuoti kokybės vadybos sistemos brandos informacinių veiksnių visumą, išaiškinant jų įtaką sistemos brandai.
APA, Harvard, Vancouver, ISO, and other styles
8

Abrams, David. "Human factors of personal Web information spaces." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ51586.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kaniclides, Antonis. "Critical factors in executive information systems implementation." Thesis, University of York, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.387555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Afolabi, Jonathan Olubunmi. "Initiating Factors Affecting Information Systems Project Success." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4706.

Full text
Abstract:
Information systems (IS) projects are complex and costly, but only a 3rd of IS projects are successful; the Standish Group reported that 32% of IS projects were successful in 2012. Although investments in research have led to improvements in practice, there is a general perception that management failures are responsible for the low rate of IS project success. The effects of initiating factors on project outcome had not been sufficiently explored; few IS researchers have explored the initiation phase. The purpose of this grounded theory study was to explore project initiation factors, including relational, as well as decision-making aspects, and how they might be addressed to enhance the possibility of success. The research questions were oriented at identifying key initiation factors, how they might be managed to promote project success, and how decision-making factors at initiation might facilitate project success. A conceptual framework consisting of chaos theory and Ashby's law of requisite variety was used. Purposive and snowballing sampling techniques were used, and 24 IS managers and project managers were interviewed. A 3-stage data analysis approach was used and included open coding, focused coding, and theoretical coding. Key themes identified included project governance and management, as well as stakeholder engagement. The emergent theory of IS project initiation indicated that the factors represented by the themes must be identified during initiation but implemented throughout the project lifecycle to ensure project success. Positive social change may be realized as IS managers, and project managers apply the findings and recommendations to achieve project success and avoid costly failures thus benefiting both companies and customers.
APA, Harvard, Vancouver, ISO, and other styles
11

Tshabalala, Obediant. "Critical success factors of information security projects." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/10397.

Full text
Abstract:
The research shows the critical success factors when implementing information security projects. Many Information security projects in the past have not been successful because these factors were not identified and emphasised effectively. By identifying these factors the research basically presents a model by which information security projects can be executed with guaranteed success. The factors identified during the study cover the following streams: top management commitment as a factor of success; accountability as a factor of success; responsibility as a factor of success; awareness as a factor of success and an information security policy as a factor of success. For the empirical study, a physical questionnaire was administrated to a pool of experts in project management and information security. The study consisted of 60 participants who were verified to have minimum requirements core for questionnaire completion. The questionnaire requested for biological information of the participants and their perceived relations (based on their experience) between project success versus accountability, information security project success versus responsibilities, information security project success versus training & awareness, information security project success versus top management commitment and information security project success versus information security policy. The participants’ responses were structured according to a Likert-type scale. Participants had to indicate the extent to which they agreed with each of the statements in the questionnaire. The responses obtained from the survey were presented and analysed. The researcher observed in this study that information security projects are so specific that critical success factors need to be emphasised from project inception. With the identified critical success factors, the researcher recommends that a project methodology be structured to include these factors so that there is a standard in running information security projects successfully. The researcher also identified that amongst the critical success factors identified, there are some that need to be emphasised more than the others due to their level of importance in such projects.
APA, Harvard, Vancouver, ISO, and other styles
12

Waly, Nesren Saleh. "Organisational information security management : the impact of training and awareness : evaluating the socio-technical impact on organisational information security policy management." Thesis, University of Bradford, 2013. http://hdl.handle.net/10454/5666.

Full text
Abstract:
Security breaches have attracted attention from corporations and scholars alike. The major organisations are determined to stop security breaches as they are detrimental to their success. Arguably the most common factor contributing to these breaches is employee behaviour, which suggests that changes in employee behaviour can have an impact on improving security. This research aims to study the critical factors (CFs) that impact on employee behaviours toward compliance with their organisation's information security policy. This investigation will focus on the various critical success factors based on their grouping into one of the following three major categories, namely: organisational factors, behavioural factors and training factors. Each of these categories affects a different aspect of information security and the objective is to not only understand the interaction of different factors but also to study further the aims in order to provide practical recommendations for improving organisational information security management. This study has utilised empirical research through the use of both qualitative and quantitative methodologies to inform each stage of the research. This study focused on the health, business and education sectors by empirically evaluating the obstacles and success factors that affect employee compliance to organisational security policies. In addition, this study also evaluated the affect of the socio-technical impact on organisational information security management. The final stage of the research focused on developing an effective training and awareness programme. This training programme was constructed by incorporating the techniques that were identified as enhancing employee perceptions, attitudes and motivations, in order to facilitate a better transference of skills and more sustainable and appropriate behaviours to improve organisational information security management in the workplace. The techniques utilised included: effective communication, knowledge reinforcement, pre- and post-assessment and motivational techniques.
APA, Harvard, Vancouver, ISO, and other styles
13

Sundén, Susanne, and Gudrun Wicander. "Information and Communication Technology Applied for Developing Countries in a Rural Context : Towards a Framework for Analysing Factors Influencing Sustainable Use." Licentiate thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-748.

Full text
Abstract:

Information and Communication Technology (ICT) has been considered a tool that can be used to achieve development goals in developing countries. In the same time, the majority of people living in developing countries, and especially those in rural areas lack access to ICT. Even if there have been many attempts to introduce ICT, they have in general not been long-lasting.

A framework for studying factors that influence use of ICT is desirable. We see it necessary to bring a sustainability aspect into the picture of ICT. In this work the requirement of ‘sustainable ICT use’ stresses that ICT is long-lasting and that ICT meets the needs of the user. Thus, the aim of this work is to develop a tool for conceptualisation that can support the understanding of the conditions for sustainable, and therefore successful, ICT projects in developing countries.

Our theoretical starting point is taken in the Information System (IS) theories. The theoretical base is then broadened to include theories on international development, theories on sustainable development, and theories on diffusion of innovations and transfer of technology. The theoretical foundation, together with four empirical studies, is used to answer the two research questions in this thesis. The first question is: Which are the critical factors influencing sustainable ICT use in developing countries? By using ‘critical factors’ we emphasise a focus on factors which are crucial (even if possibly not sufficient) for bringing about sustainable ICT use. This question is followed by a second question: How would a framework be structured to properly include these factors in order to support analyses of sustainable ICT use?

The framework has evolved through the identification of factors from four empirical studies. Forty-one factors were identified and sorted into fifteen subcategories of five major capital assets. The main contribution of our study is that of a generic framework, which can be used as a guideline for planning, implementation, and evaluation of ICT projects in a rural developing country context achieving sustainable ICT. As argued in this thesis technology is not the key resource; it is the combination and system of different resources distributed along a time and space dimension that is the key. With our framework we have demonstrated that the ICT artefact is not the sustainability tool, it is the combination of different resources that makes it sustainable and competitive.

APA, Harvard, Vancouver, ISO, and other styles
14

Öberg, Lena-Maria. "Traceable Information Systems : Factors That Improve Traceability Between Information and Processes Over Time." Licentiate thesis, Mid Sweden University, Department of Information Technology and Media, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-515.

Full text
Abstract:

Preservation of information is not a new issue but preservation of digital information has a relatively short history. Since the 60’s when computers began to be used within administration, digital information that has had to be preserved over time.The problem addressed in this research is how to preserve understandable information over time. Information is context dependent, which means that without context it is not possible to use the information. Process is one part of the context. And an important issue when preserving information is then to be able to trace an information

object to the process where in it has been created and managed. Associating information to a particular process creates the possibility of relating information objects to each other and also to the context in which the information has been created and used. The aim of this thesis is to identify and structure factors that can improve the traceability between information and processes over time. A set of factors based on case studies and a set of analytical methods are presented that can improve the traceability over time. These factors have been identified and structured by the use of the Synergy-4 model. They have been identified within four different spheres namely: competence, management, organization/procedure and technology. The factors have further been structured in three different time states namely: creation time, short and middle term and long-term. The research concludes that there are a lot of factors influencing ability to preserve information. Preservation issues include selection of metadata standards, organizational culture, lack of understanding from management and formalization of documents. The conclusion is that if an organization wants to succeed in preserving traceable information they have to build strategies that cover the issues from a range of different angles. This thesis suggests that crucial angles are competence, management, organization/procedure

and technology. Furthermore, the strategies must be in place at the stage of creationof the information objects.

APA, Harvard, Vancouver, ISO, and other styles
15

Osmonalieva, Zarina, and Laxmi Rao. "Which factors facilitate the management of external knowledge?" Thesis, Mälardalen University, School of Sustainable Development of Society and Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-776.

Full text
Abstract:

Date: 2008-06-04

Course: EIK 034 Masters Thesis

Authors: Laxmi Rao & Zarina Osmonalieva

Tutor: Ole Liljefors

Title: Which factors facilitate the management of external knowledge?

Introduction: Today more and more organisations are realising that handling internal and external knowledge is a key issue for successful performance. Different theories describe the importance of this topic, for instance, Porter’s Five Forces model and Hedman & Kalling’s General Business Model demonstrate how organizations are strongly influenced by external forces. Hedman & Kalling’s model particularly demonstrates that organizations need to have the competence, capability and resources to effectively manage external knowledge in order to increase their competitiveness and develop and improve their long term survival.

Purpose: Nicholas Carr highlights that for the past decade organizational investment in IT and IS has reached nearly 50% of capital expenditure, while the organizations see little or no performance improvement as a result of this investment. While IT systems are good at storing and retrieving information, the success of the systems heavily relies on the quality of the external and internal knowledge used both during development and usage. A deeper awareness of factors which facilitate the management of external knowledge is relevant to IT managers (indeed all managers) as it will help to facilitate the development and implementation of information systems and technology which are designed to facilitate knowledge management in organisations.

Methodology: In the thesis factors related to effective management of external knowledge are identified and described. The General Business Model was used as a tool to identify and categorize the literature review into key themes.

Conclusions One of the findings is that most published research focuses on factors internal to organizations such as activities and resources and there are few papers dealing with external factors for knowledge management. It was also found that literature which focussed on external factors mainly focused on the role of individuals as resources who cross the boundary of the organization in order to acquire and diffuse the external knowledge. In general the topic of external knowledge management is not studied in a holistic way. The acquisition and diffusion processes have been investigated as separate, but not as the whole process.

APA, Harvard, Vancouver, ISO, and other styles
16

Rudolph, Frederick M. "Human performance during automation : the interaction between automation, system information, and information display in a simulated flying task." Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/36207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Abd, Elkhalek Ahmed. "Critical Factors for Effective Information Systems Risks Management." Thesis, Mälardalens högskola, Akademin för hållbar samhälls- och teknikutveckling, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-12819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Parker, Christopher J. "A human factors perspective on volunteered geographic information." Thesis, Loughborough University, 2012. https://dspace.lboro.ac.uk/2134/10177.

Full text
Abstract:
This thesis takes a multidisciplinary approach to understanding the unique abilities of Volunteered Geographic Information (VGI) to enhance the utility of online mashups in ways not achievable with Professional Geographic Information (PGI). The key issues currently limiting the use of successful of VGI are the concern for quality, accuracy and value of the information, as well as the polarisation and bias of views within the user community. This thesis reviews different theoretical approaches in Human Factors, Geography, Information Science and Computer Science to help understand the notion of user judgements relative to VGI within an online environment (Chapter 2). Research methods relevant to a human factors investigation are also discussed (Chapter 3). (Chapter 5) The scoping study established the fundamental insights into the terminology and nature of VGI and PGI, a range of users were engaged through a series of qualitative interviews. This led the development of a framework on VGI (Chapter 4), and comparative description of users in relation to one another through a value framework (Chapter 5). Study Two produced qualitative multi-methods investigation into how users perceive VGI and PGI in use (Chapter 6), demonstrating similarities and the unique ability for VGI to provide utility to consumers. Chapter Seven and Study Three brought insight into the specific abilities for VGI to enhance the user judgement of online information within an information relevance context (Chapter 7 and 8). In understanding the outcomes of these studies, this thesis discusses how users perceive VGI as different from PGI in terms of its benefit to consumers from a user centred design perspective (Chapter 9). In particular, the degree to which user concerns are valid, the limitation of VGI in application and its potential strengths in enriching the user experiences of consumers engaged within an information search. In conclusion, specific contributions and avenues for further work are highlighted (Chapter 10).
APA, Harvard, Vancouver, ISO, and other styles
19

Kelley, Timothy D. "Systemic effects of human factors in information security." Thesis, Indiana University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3665483.

Full text
Abstract:

This dissertation couples the growing corpus of human subjects and behavioral research in information security with large-scale data and robust quantitative methods. Linking human subject experimentation with theoretical models enables the information security community to reason more effectively about the system-wide effects of user behavior. I examine how users interact with the digital environment, how those interactions affect decision-making, and how aggregate decision-making affects system-wide vulnerabilities. This interdisciplinary challenge requires a combination of techniques from cognitive neuroscience, social network analysis, human-subjects research, dynamical systems, network theory, and agent-based models.

In the first section, eye-tracking data demonstrates the relationships between expertise and online perceptual awareness of security cues. Expertise is shown to be only a small factor in attention to security cues, and task-type proves to be much larger indicator of attention, with tasks requiring the use of personal accounts driving attention to cues. This section uses Bayesian ANOVA to evaluate users' perceptual awareness of security cues as they complete common online tasks, as it relates to user sophistication and task type.

The second section uses a theoretical epidemiological model of malware spread to investigate factors that might mitigate the prevalence of malware in a coupled, two-population model. This both demonstrates that cost is the largest factor for affecting malware prevalence, outside of malware infection rates, and identifies appropriate strategies for system-wide botnet mitigation.

The final section utilizes an agent-based model of mobile application adoption combined with social network data and mobile marketplace policy. The result is an examination of the dynamic effects of user and market behavior on the spread of mobile malware and the second order effects, such as privacy loss, due to that spread. This model reveals that well-regulated markets are effective at limiting malware spread, but user behavior grows in importance as markets become less restricted.

Each study examines ways in which users interact with their technology, the aggregate effects of those behaviors, and identifies possible inflection points to change system-wide behaviors. This dissertation integrates empirical behavioral studies to develop a better understanding of digital behavior, thus enabling a more holistic approach to information security.

APA, Harvard, Vancouver, ISO, and other styles
20

Barnett, Mary Jane 1952. "Factors Influencing Older Adults' Patterns of Information Acquisition." Thesis, University of North Texas, 1989. https://digital.library.unt.edu/ark:/67531/metadc330851/.

Full text
Abstract:
A group of 101 older adults (sixty-five years of age and over) who lived independently in three retirement apartment residences in Denton, Texas, were asked about their patterns of reading, television viewing, and radio listening habits for two periods in their lives: (1) at age forty to fifty-five and (2) at the present. Respondents were asked about their use of external information sources (public library, grocery store, newsstand, etc.) and their use of proximate information sources (radio, friends/relatives, television, etc.) They were also asked about access to transportation, income satisfaction, status of general health, vision, hearing, physical mobility and reasons for utilizing various information sources. Four hypotheses relating changes in health, environment, economic status, and education to reasons for reading and use of information sources were tested through the use of t-tests, regression analysis and analysis of variance. Within this group of older adults, use of external information sources decreased from the past to the present. There was, however, no change in the use of information sources located in or near the residence as difficulties in these areas increased. A relationship was found between educational level and reading for pleasure earlier in life. Also, those with higher educational levels reported fewer differences in their reasons for reading in the present and in the past.
APA, Harvard, Vancouver, ISO, and other styles
21

Tsoi, Pui Man. "Critical success factors for strategic information systems planning." HKBU Institutional Repository, 2001. http://repository.hkbu.edu.hk/etd_ra/283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Aldhaheri, Omar. "Factors influencing information privacy in Abu Dhabi Emirate." Thesis, Loughborough University, 2016. https://dspace.lboro.ac.uk/2134/22485.

Full text
Abstract:
Individuals in the UAE and Abu Dhabi Emirate, in particular, have become increasingly concerned about their private information. This is mainly due to the use of technology, which makes accessing, transmitting and editing personal information faster and easier. Besides the use of technology, and the awareness and understanding of the privacy of expatriates, working in Abu Dhabi Emirate has had an impact on UAE citizens in terms of their rights to privacy. There is a need for organisations to comply with international bodies in protecting individuals rights to privacy and to increase the exploration of culturally sensitive information in the media. These issues have all led to the importance of and need to explore and identify Abu Dhabi Emirate employees perceptions, and the factors influencing their behaviour, towards privacy. The aim of this research was to investigate and analyse factors influencing employees information privacy behaviour and employees perceptions, awareness and behaviour on the handling of private information in the Abu Dhabi Emirate public sector, ADEC, as well as to provide practical recommendations to improve the privacy. The research methods used in this project are based on a mixed-method approach comprising both quantitative and qualitative strategies. Qualitative data collection in this research included face-to-face interviews and focus groups with Abu Dhabi Education Council. Quantitative surveys for all the Abu Dhabi Education Council were also utilised. The research identified the types of information that were considered private and defined privacy in the context of UAE culture. The main factors influencing privacy in Abu Dhabi Emirate employees were identified and analysed such as national culture, organisation culture and perceived benefits as examples. Following this, practical recommendations for changes to promote and enhance privacy in Abu Dhabi Emirate were offered. A model has been developed and designed based on the factors influencing individual information behaviour regarding private information handling, interrelated and influenced. This is essential to provide a practical model capable of acting as a guideline to help organisations, decision makers, and strategic planners in the Abu Dhabi Emirate public sector decide how best to approach privacy policy.
APA, Harvard, Vancouver, ISO, and other styles
23

Bessick, Jacqueline Ruby. "Factors influencing effective information management using information technology systems in a public sector department." University of the Western cape, 2016. http://hdl.handle.net/11394/5559.

Full text
Abstract:
Magister Commercii (Information Management) - MCom(IM)
The Public Sector encounters great challenges in its attempts to strengthen its public services. Public servants are in need of accurate and up-to-date information that can be readily accessible. They need information to be made available for effective and efficient decision-making. In order to improve service delivery, the Public Sector must aim to reach its objectives by increasing and improving accountability, transparency, efficiency, productivity and quality of services. This study focuses on factors, which influence information management in a Public Sector Department in an effective way to manage information properly. An extensive literature review was conducted of information, the role of information management, the possible critical failure and success factors of information management. This led to the discovery of four main categories for critical failure factors: (i) people; (ii) process; (iii) policy and; (iv) technology; and three categories for critical success factors: (i) organizational culture; (ii) top management support; and (iii) strategies. A conceptual model was then developed for these categories with seventeen factors. This model was subsequently tested in the empirical setting of the studied Public Sector Department in South Africa by utilising a qualitative approach through the case-study method. The findings suggest that the following factors would impact the successful implementation of an information management initiative for this Public Sector Department: information management; change management and communication strategies; culture; roles of responsibility for information; information lifecycle process; and information management policy. The intended audience for this study includes both academics and practitioners, as it introduces a conceptual model, as well as guidelines to implement these factors for information management in a Public Sector Department.
APA, Harvard, Vancouver, ISO, and other styles
24

Кубатко, Олександр Васильович, Александр Васильевич Кубатко, Oleksandr Vasylovych Kubatko, and А. В. Ярмак. "Информационная экономика – новый этап развития общества." Thesis, Видавництво СумДУ, 2011. http://essuir.sumdu.edu.ua/handle/123456789/11734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Fang, X. (Xin). "Success factors affecting E-business:case Taobao." Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201508271930.

Full text
Abstract:
E-business has aroused great concern and become a hot topic in both information technology and business field. With many companies’ success in doing e-business, there are also abundant of failure cases. Therefore, the purpose of this study was to investigate the success factors that can affect e-business so as to provide beneficial guidance to companies. Virtually, many researchers have also studied e-business relating to its success from different perspectives and in various areas. However, few studies have been focused on the subject in Chinese context, which provides a giant market that cannot be neglected. Hence, this study adopted the qualitative case study research method to explore e-business success factors with a representative Chinese e-business company. Generalized from the knowledge from the previous literature, 123 e-business success factors have been found, among which four success factors that significantly influence e-business were categorized and identified as trust, effective e-business strategy, customer focus and web design and content. A conceptual framework was built upon the four factors providing reference for the case data interpretation. Content analysis method was employed when conducting the case study method. By comparing with the previous knowledge and analysing the case data, the fifth success factor was discovered as culture. Therefore, added to the previous set of factors, a new set of e-business success factors were proposed as the result of the study, which were trust, effective e-business strategy, customer focus, web design and content and culture.
APA, Harvard, Vancouver, ISO, and other styles
26

Dzokoto, Frank K. "Information behaviour of construction project actors." Thesis, Loughborough University, 2016. https://dspace.lboro.ac.uk/2134/23173.

Full text
Abstract:
Construction is one of the largest industry sectors in terms of size and output in the United Kingdom (UK). The sector contributes about 10% directly to the UK's Gross Domestic Product (GDP) and drives historical GDP growth. However, Construction projects and Organisations continue to underperform at significant levels which is underpinned by actors' Information Behaviours (IBs).
APA, Harvard, Vancouver, ISO, and other styles
27

Farley-Larmour, Kim, and n/a. "Factors influencing students' choice of library and information studies." University of Canberra. Information Management & Tourism, 1999. http://erl.canberra.edu.au./public/adt-AUC20060707.161125.

Full text
Abstract:
This study endeavoured to establish what influences students to undertake library and information studies. Are prospective students of library and information studies choosing their course and future occupation for the same sorts of reasons as in the past? Are prospective students well informed about their future occupation when they choose a course of study? What is the relative importance of some of the factors influencing their choice? Do metropolitan, regional and isolated students have the same understanding and expectations of their course and future occupation? A study of first year undergraduate students of library and information studies at three universities sought to provide answers to these questions. A quantitative and qualitative comparison of first year undergraduate students of Library and Information Studies at the University of Canberra and a random group from the same University was also undertaken in order to provide some comparative data. The findings showed that reasons for choosing library and information studies have generally not changed as much as one might expect. An interest in books and reading still ranks as a relatively important factor in students' choice, though there is some evidence of an increased interest in career and employment issues. Library and information studies students without an occupational background in the discipline generally have a hazy picture of what is involved in their future occupation and this lack of knowledge is compounded where students are located in regional or isolated areas. Generally most library and information studies respondents expressed a desire to enter 'traditional' workplaces in libraries rather than entering the broader information management field.
APA, Harvard, Vancouver, ISO, and other styles
28

Xu, Hongjiang. "Critical success factors for accounting information systems data quality." University of Southern Queensland, Faculty of Business, 2003. http://eprints.usq.edu.au/archive/00001526/.

Full text
Abstract:
Quality information is critical to organisations’ success in today’s highly competitive environment. Accounting information systems (AIS) as a discipline within information systems require high quality data. However, empirical evidence suggests that data quality is problematic in AIS. Therefore, knowledge of critical factors that are important in ensuring data quality in accounting information systems is desirable. A literature review evaluates previous research work in quality management, data quality, and accounting information systems. It was found that there was a gap in the literature about critical success factors for data quality in accounting information systems. Based on this gap in the literature and the findings of the exploratory stage of the research, a preliminary research model for factors influence data quality in AIS was developed. A framework for understanding relationships between stakeholder groups and data quality in accounting information systems was also developed. The major stakeholders are information producers, information custodians, information managers, information users, and internal auditors. Case study and survey methodology were adopted for this research. Case studies in seven Australian organisations were carried out, where four of them were large organisations and the other three are small to medium organisations (SMEs). Each case was examined as a whole to obtain an understanding of the opinions and perspectives of the respondents from each individual organisation as to what are considered to be the important factors in the case. Then, cross-case analysis was used to analyze the similarities and differences of the seven cases, which also include the variations between large organisations and small to medium organisations (SMEs). Furthermore, the variations between five different stakeholder groups were also examined. The results of the seven main case studies suggested 26 factors that may have impact on data quality in AIS. Survey instrument was developed based on the findings from case studies. Two large-scale surveys were sent to selected members of Australian CPA, and Australian Computer Society to further develop and test the research framework. The major findings from the survey are: 1. respondents rated the importance of the factors consistent higher than the actual performance of those factors. 2. There was only one factor, ‘audit and reviews’, that was found to be different between different sized organisations. 3. Four factors were found to be significantly different between different stakeholder groups: user focus, measurement and reporting, data supplier quality management and audit and reviews. 4. The top three critical factors for ensuring data quality in AIS were: top management commitment, education and training, and the nature of the accounting information systems. The key contribution of this thesis is the theoretical framework developed from the analysis of the findings of this research, which is the first such framework built upon empirical study that explored factors influencing data quality in AIS and their interrelationships with stakeholder groups and data quality outcomes. That is, it is now clear which factors impact on data quality in AIS, and which of those factors are critical success factors for ensuring high quality information outcomes. In addition, the performance level of factors was also incorporated into the research framework. Since the actual performance of factors has not been highlighted in other studies, this research adds new theoretical insights to the extant literature. In turn, this research confirms some of the factors mentioned in the literature and adds a few new factors. Moreover, stakeholder groups of data quality in AIS are important considerations and need more attention. The research framework of this research shows the relationship between stakeholder groups, important factors and data quality outcomes by highlighting stakeholder groups’ influence on identifying the important factors, as well as the evaluation of the importance and p erformance of the factors.
APA, Harvard, Vancouver, ISO, and other styles
29

Avgerou, Chrisanthi. "Information systems in social administration : factors affecting their success." Thesis, London School of Economics and Political Science (University of London), 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.261972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Palmer, Judith Marian Penfold. "Factors affecting the information behaviour of agricultural research scientists." Thesis, University of Sheffield, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.392754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

zhang, peng. "An Empirical Study of Health Information Exchange Success Factors." FIU Digital Commons, 2017. https://digitalcommons.fiu.edu/etd/3537.

Full text
Abstract:
The healthcare system in the US faces substantial challenges related to cost, access and quality. Health Information Exchange (HIE) has been widely viewed as a viable solution for dealing with those challenges. Despite the potential contributions to the healthcare system that HIE promises, adoption and use of HIE have always been difficult, and the past two decades have witnessed significant HIE implementation failures. The limited understanding of HIE is a major obstacle for HIE success. Only recently in-depth research about HIE starts to appear in top IS journals. In addition, the uniqueness of healthcare industry adds to the complexity to HIE. Our study attempts to address this research gap by systematically examining multiple factors that influence HIE adoption and use. Using social exchange theory (SET) and diffusion of innovations theory, a research model was developed to empirically test major factors that impact healthcare providers’ relative advantages and risks perceptions for adopting and using HIE. It is further proposed that relative advantages and risks in turn impact organizations’ intentions for adopting and continuously using HIE. As such, we posit that organizations’ assessments of relative advantages and risks associated with HIE mediate the impacts of organizational and technological factors on organizations’ adoption and use intentions. This study uses questionnaire surveys for data collection. Out of a total of 163 responses, 117 surveys were completed and were analyzed using Partial Least Square software SmartPLS 3. Data analysis finds that most of the relationships were in the hypothesized directions with some of the relationships being significant. Specifically, top management support, absorptive capacity, trust, and HIE innovation characteristics positively affect relative advantages and negatively affect risk. Furthermore, relative advantages positively affect adoption/continuance intentions, whereas risk negatively affects adoption/continuance intentions. This study contributes to the literature and offers important practical implications. It is one of the early empirical attempts to understand the key factors that affect HIE’s adoptions and use. The research can also serve as a starting point for more in-depth studies in the future. Moreover, practitioners can use the several newly-developed scales to empirically examine healthcare providers’ adoption and use intentions.
APA, Harvard, Vancouver, ISO, and other styles
32

Harrell, Martha Nanette. "Factors impacting information security noncompliance when completing job tasks." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/21.

Full text
Abstract:
Work systems are comprised of the technical and social systems that should harmoniously work together to ensure a successful attainment of organizational goals and objectives. Information security controls are often designed to protect the information system and seldom consider the work system design. Using a positivist case study, this research examines the user's perception of having to choose between completing job tasks or remaining compliant with information security controls. An understanding of this phenomenon can help mitigate the risk associated with an information system security user's choice. Most previous research fails to consider the work system perspective on this issue. This study is based on the socio-technical system theory, the Leavitt Diamond Model (1965). Using this model as a lens to examine user information security behavior and perspectives, the Synergistic Security Model was developed. The research data indicated that the relationships between the structure, technology, task and people constructs can have an impact on user information security behavior. The research found that a change in the organization's information security policies, technology, or a change in employee processes for task completion can impact a user's information security choice. Some of the information security situations found in the research could be easily changed to lower the risk of a user's choice to circumvent information security. This change could be a technical configuration change, a purchase of a new technology or a change in a process to help impact a user's choice to circumvent information security controls. The Synergistic Security Model can help researchers understand the relationships between the general constructs found in a work system and how those relationships can influence user behaviors. The research presented in the paper examines a triad relationship between each work system construct, consisting of: Structure-Technology-People; Structure-Task-People; Task-Technology-People; and Task-Technology-Structure. The findings indicate that the relationship between the constructs can have a significant impact on user information security behavior and therefore should be a consideration when designing an efficient and effective information security program.
APA, Harvard, Vancouver, ISO, and other styles
33

Munir, Muhammad, Faisal Rahim, and Abrara-ud-Din. "Problems during Implementation of Business Information Systems." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20451.

Full text
Abstract:
In today‟s computerized society every organization need a sophisticated “Information System” to compete in the business world. Some of the organizations outsource their Information Systems and some implements their own custom designed information Systems. Business information systems implementation has been historically bothered by failures for which users resistance has been identified as an important reason. Users‟ satisfaction can be achieved by solving the psychological problems and technical issues which are creating psychological problems during the implementation of IS. Some important aspects during implementation of business information systems like, interdepartmental relationship, knowledge management, independence of tasks and user satisfaction importance is highlighted for organizations. To find the Psychological problems during implementation of business information system and how the resistance from the users can be tackled is the aim of the study. This study also presents suggestions to organizations for enhancing users‟ satisfaction and making the Implementation process of “BIS” a success.
Program: Magisterutbildning i informatik
APA, Harvard, Vancouver, ISO, and other styles
34

Herald, William Joseph. "An analysis of factors influencing general user information satisfaction including system-specific user information satisfaction." Connect to resource, 1996. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1267623116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Morton, Mary Elizabeth Wiedenbeck Susan McCain Katherine Wootton. "Use and acceptance of an electronic health record : factors affecting physician attitudes /." Philadelphia, Pa. : Drexel University, 2008. http://hdl.handle.net/1860/2905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Taskov, Konstantin Vedder Richard Glen. "Organizational factors contributing to an effective information technology intelligence system." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Jamieson, Bruce (Kieren) James, and k. jamieson@cqu edu au. "Information Systems Decision Making: Factors Affecting Decision Makers and Outcomes." Central Queensland University. School of Management and Information Systems, 2007. http://library-resources.cqu.edu.au./thesis/adt-QCQU/public/adt-QCQU20070626.103825.

Full text
Abstract:
Organisations are increasingly reliant on effective information systems (IS) yet little is known about the information and influences that contribute to their selection. Decision makers play an important role in the evaluation, acquisition and implementation of information systems in organisations. Their role during the re-implementation phase of information systems projects is critical, yet little is known about how and why these decisions are made. This thesis explores the influences on these decisions and reports their effects. The aim of this research is to increase the understanding of what occurs during decision making in the critical pre-implementation phase. A cross-disciplinary approach has been employed to develop a research framework informed by literature from information systems, innovation and adoption theory, management decision making and organisational decision making. A qualitative research method was used to develop four exploratory case studies. Research was conducted in private and government organisations that had implemented large information systems. An interpretive hermeneutic text-based analysis technique was used in a cross-case analysis in order to build theory and address the research questions. Fifty-six informational and contextual factors were identified in this research as having effects on information systems pre-implementation decision making. These factors fall into eight broad thematic factor groups: confidence, decision process, opinions, option attributes, organisation, perceptions, politics and vendor attributes. This thesis concludes that there are linkages between decision factors and decision outcomes. It is argued that to achieve positive decision outcomes from information systems preimplementation decisions, conditions for intra- and inter-organisational alignment must exist. It is also argued that information systems re-implementation decision outcomes alter intra- and inter-organisational alignment conditions and affect future decisions.
APA, Harvard, Vancouver, ISO, and other styles
38

Meiring, Natalie. "Factors impacting Tablet PC usage in low-income communities." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/4642.

Full text
Abstract:
The purpose of this research was to identify factors that impact on tablet PC usage in low-income communities. In order to determine and identify these factors a main research question and sub-research questions were formulated. The primary research question of this study was "What factors impact on tablet PC usage in low-income communities?" This main research question was answered by creating three sub-research questions followed by triangulating the results from these questions. The first sub-research question was aimed at determining whether prior exposure to touch screen technology impacts the user experience. In order to reach this objective an extensive literature review was conducted on the tablet PC landscape in South Africa. This literature review, coupled with the case study helped answer this first research question. The second sub-research question was concerned with determining whether existing user experience guidelines are relevant to South African users. A thorough literature review was conducted on user experience guidelines and related studies. This literature review, together with the results from the case study helped answer this second research question. The third sub-research question involved identifying specific factors which help improve the user experience of tablet PC users in a specific context. This research question was addressed in the case study. Each sub-research question provided results which were analysed in order to answer the main research question. The factors which impact on tablet PC usage were thus identified and recommendations were proposed.
APA, Harvard, Vancouver, ISO, and other styles
39

Ikart, Emmanuel Matthew. "Critical success factors for executive information systems usage in organisations /." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060706.111336/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Silburn, Nicholas L. J. "A model of factors affecting professional workers' information behaviours within the context of valuing organisational information." Thesis, University of Reading, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.657998.

Full text
Abstract:
The purpose of this research was to develop a model of factors influencing professional workers' information behaviours within the context of seeing information as a valuable organisational asset. To achieve the purpose, the research set out to answer four questions. What was meant by the value of information, what information related behaviours might be associated with acknowledging information as valuable, how might the behaviours be influenced in the workplace, and how were influencing factors related to the information behaviours. The research came about because of apparent gaps in the literature, particularly around a lack of appropriate models of information behaviour associated with professionals in the workplace and information being seen as valuable (useful, important, of worth and of benefit) by the organisation. The increasing legal and regulatory environment, the expansion of information management standards and the increasing pervasiveness of computer technology add to the mix of how information behaviours might be supported, encouraged or hindered. The literature review looked at articles from the behaviour, information systems, library and information science, and value of information literature. It identified a number of key models from these literature pools that provided some of the information behaviours (such as information seeking, retrieval, use and sharing) and potential influencing factors (for example computer technology, the information behaviours of others, personal values and beliefs, and job design), but found there was no apparent literature that combined these information behaviours and the influences upon them, into a single workplace-related model. The output from the literature review was a conceptual model supported by a set of propositions. The primary research was carried out in two parts, within a pragmatist philosophical position. An initial phase, · using semi-structured in-depth interviews, looked at professionals' interpretations of the value of information and some of the information · behaviours that might be associated with valuing information. From this, a slightly revised version of the conceptual model was produced. A second phase of research was carried out based on the revised conceptual model and using a combination of semi-structured in-depth interviews with repertory grid work. Textual, graphical and numerical data was analysed using repertory grid cluster analysis, and thematic coding. The research found a consistent approach to defining the value of information - valuable information was seen as being useful, important, of some worth, and of benefit. Seven physical behaviours were identified as being relevant to showing that information is valuable. Some twenty influencing factors were identified, with evidence from the interviews supporting those identified from the literature, and other factors being new. A life-cycle relationship was identified for some of the behaviours, whilst the others were identified as information governance behaviours that supported the life-cycle behaviours. Some of the factors were found to have relationships with other factors, as well as with the behaviours. This led to a model being created where some factors could be described as independent variables, whilst others acted as moderating or mediating variables on the relationships of other factors with the information behaviours. Conclusions from .the research included that the information behaviours of professional workers could be influenced by a variety of people, organisational, technology and environmental factors. The model developed can serve as a basis for organisations to improve various facets of the organisation to encourage the treatment of information as a more valuable organisational asset. The contribution of this research to the literature is the development of a model of information behaviours of professional workers, and the factors that influence such behaviours. There is also a contribution to use of the repertory grid literature through the specific way the method was employed. The research took a wholly inductive approach to model building and the subsequent model created can be used as a basis for others to explore this topic in more detail, either inductively or deductively.
APA, Harvard, Vancouver, ISO, and other styles
41

Campbell, Regan Helen. "An age-related comparison of audio and audio plus video presentation modes for conveying technical information." Thesis, Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/28612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Vural, Ilkay. "Success Factors In Public Information Systems Outsourcing: A Case Study." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605139/index.pdf.

Full text
Abstract:
In this thesis, a public IS outsourcing case in Turkey is examined. The case is selected because of its unique characteristics that differentiate it from the other cases studied in the literature. The aim of this study is to understand the success factors in public IS outsourcing and to reveal which ones were applied in this specific case.
APA, Harvard, Vancouver, ISO, and other styles
43

Sissing, Donovan. "Information technology architecture and related strategic factors supporting business advantage." Thesis, University of the Western Cape, 2007. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_1476_1255527907.

Full text
Abstract:

"
Information Technology (IT) architecture is not restricted to technology, but may also address the views of business activities
their processes
data sets and information flows
applications and software
and technology. The objective of this study is to understand the role of IT Architecture and related factors that support competitive business advantage. This study investigates the null hypothesis: IT architecture enhances the competitive advantage of business. This study sets out to explore IT architecture and strategic factorsthat support business advantage. The study findings indicated that business advantage is supported by a sound architecture, by IT and business alignmentand by the enablers of organisations..."

APA, Harvard, Vancouver, ISO, and other styles
44

Gwizdka, Jacek, and Irene Lopatovska. "The Role of Subjective Factors in the Information Search Process." Wiley, 2009. http://hdl.handle.net/10150/105909.

Full text
Abstract:
This is an early access article.
We investigated the role of subjective factors in the information search process. Forty eight participants each conducted six web searches in a controlled setting. We examined relationships between subjective factors (happiness levels, satisfaction with and confidence in the search results, feeling lost during search, familiarity with and interest in the search topic, estimation of task difficulty), and objective factors (search behavior, search outcomes and search task characteristics). Data analysis was conducted using a multivariate statistical test (Canonical Correlations Analysis). The findings confirmed existence of several relationships suggested by prior research, including relationships between objective search task difficulty and the perception of task difficulty; between subjective states and search behaviors and outcomes. One of the original findings suggests that higher happiness levels before the search and during the search correlate with better feelings after the search, but also correlates with worse search outcomes and lower satisfaction, suggesting that, perhaps, it pays off to feel some â painâ during the search in order to â gainâ quality outcomes.
APA, Harvard, Vancouver, ISO, and other styles
45

Cassar, Alexander. "Factors influencing the adoption of strategic inter-organisational information systems." Thesis, Henley Business School, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.340934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Chen, Chun-Wei, and 陳俊瑋. "Assessment of Information Security Influencing Factors." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/hj6jpt.

Full text
Abstract:
碩士
中原大學
資訊管理研究所
104
In recent years, advances in Internet so that people rely on computers increasing influence is also growing, and companies face global competition under the information technology and electronics progress and development, and further the development of e-policy and security policy needed to respond to information security threats. So many organizations have been planning to import information security systems, but large-scale import of funds, so that enterprises in importing do not know the door into the room, or waste a lot of resources on the import, the study will focus on the country through ISO 27001 certification enterprise, the expert questionnaire distributed to businesses, hoping to use AHP level analysis to identify the factors critical to success of ISO 27001. In this study, the experts issued questionnaire method, for all enterprises at all levels of the heavy weight carried feedback information respondents had to identify critical success factors for introducing ISO 27001 re-use AHP AHP, research results, mostly for high-end subjective identity within the enterprise ISO 27001 is the first key to import critical success factors, and with the participation of all employees working in the enterprise is more important critical success factors indicators; advocacy and promotion of IT security policies also have a higher impact on the ranking. The nature of the telecommunications services company, has relied on a relatively good operational goals of information security policy, so the difference in the company compared with the nature of the semiconductor industry, the data would be more intense, and the nature of the semiconductor industry companies will pay more attention to the institutional side , rationality and applicability of the project a key factor in the design of the system will be stronger than information security policy in line with operational objectives, analyzed in this study and the results from the data in order to provide the experience of not introducing ISO 27001 organization Share directions and recommendations. Finally, according to the results of this study were discussed, and the follow-up study suggests.
APA, Harvard, Vancouver, ISO, and other styles
47

Chen, Kuei-Fen, and 陳桂芬. "Factors Affecting Personal Health Information Disclosure." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/25384978199805407706.

Full text
Abstract:
碩士
國立交通大學
資訊管理研究所
103
The implementation of electronic medical record (EMR) exchange is an important tread. However, EMR exchange suffers from some problems. For example, concern for health information privacy may cause individuals unwilling to provide personal health information. To better understand individuals’ intention, we tried to examine the correlation between individuals’ concern for information privacy and their intention. Beside this, based on a social exchange theory perspective, the antecedents in organizational dimension of CFIP were examined. In this study, our proposed model was empirically validated by 138 respondents in Taiwan. Four hypotheses were assessed by Structural Equation Modeling (SEM) via statistical analysis software SmartPLS 3.0. Three hypotheses were significant supported which indicate that all of the components of social exchange theory were critical, and the proposed model is applicable in EMR exchange context.
APA, Harvard, Vancouver, ISO, and other styles
48

MING, PI SHIH, and 皮世明. "Factors Influencing Information Systems Service Quality." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/86781435167223527273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

WANG, YI-CHENG, and 王毅正. "Key Factors in Using Information Appliances to Trigger Information Security Incidents." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/p7af78.

Full text
Abstract:
碩士
世新大學
資訊管理學研究所(含碩專班)
107
The popularization of the network has brought great convenience to mankind. The rapid development of science and technology has greatly improved the quality of life. Modern people have greatly increased the function requirements of household appliances, and IA (Internet/Information Appliance) has been born. The characteristics of information appliance are easy to use, online network function, and hardware that can access and record a lot of information. It can refer to all household appliances that can be accessed online. Home appliance products, information equipment Intelligent modern life, users enjoy the convenience of information appliances but also derived from the risk of information security hazards. Electrical appliances and information devices in the household become tools for hackers to peep or use to attack others; information on family members' eating habits, physical health, rest and time, bank deposits, work contents and so on is being obtained by hackers through the vulnerability and defects of information appliances or devices, and the consequences will be unthinkable. Therefore, this study explores and collate the elements that lead to various information security risks by using information appliances, and provides suggestions for the general public to avoid or effectively prevent information security incidents when using information appliances, and points for attention. Through the collation and analysis of relevant literature, this study summarizes various factors that trigger information security incidents, then helps to screen out the important factors through expert focus discussion, and then uses the hierarchical analysis method to analyze the causal impact degree of the important factors. Finally, sort out the top ten key factors that cause information security events, and put forward expert suggestions on various factors.
APA, Harvard, Vancouver, ISO, and other styles
50

Liu, Meng-Chuan, and 劉孟娟. "Factors Related to Build Nursing information system." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/03981329296624639951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography