Dissertations / Theses on the topic 'Information technology – Ethiopia – Management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Information technology – Ethiopia – Management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Adem, Lishan. "The impact of information technology in sub Saharan Africa with a particular reference to Ethiopia : a constructionist approach." Thesis, University of Sheffield, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.284979.
Full textRastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Full textDe, Jongh Henk. "Information technology outsourcing." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53467.
Full textENGLISH ABSTRACT: The study project examines the concept of information technology (IT) outsourcing to external service providers. It is a relatively new concept in the South African scenario and there are many risks associated with the process that can cause a company to loose large amounts of money if outsourcing is not done right. The study project will aim to examine the most important aspects regarding IT outsourcing in order to reduce the risks associated with the process. The definition of IT outsourcing is the practice of transferring an organisation's computer centre operations, telecommunications networks, or applications development to external vendors of these services. There are different variations of outsourcing applicable to IT, for example: contracting out, outsourcing, in sourcing and co-sourcing. Companies have different reasons for outsourcing and the risks associated with the process have to be taken into account when embarking on an outsourcing initiative. With IT outsourcing there are different services that can be outsourced, for example: mainframe services, desktop computer services, security services and different application services. The decision to outsource a specific area of IT is a strategic issue and the risks, costs, and selection of the service provider are all very important factors to take into account. One of the main factors that any company should take into account when embarking on a big initiative is of course costs. The aim is the reduction of costs of the specific outsourced area. Therefore the necessary measures need to be in place to measure costs before and after the outsourcing process. It could happen that the outsourcing process do not provide the reduced cost benefits envisaged initially. This could be due to hidden costs that were not taken into account when the outsourcing initiative was planned. Normally the outsourcing process is driven by a structured project and numerous important factors need to be taken into account when managing the whole process. The factors include: the vendor evaluation process, setup of the service level agreement, the request for proposal, relationship with the supplier, communication of the whole process inside the company, the contract between the two parties, and the transition period with the measuring of results thereafter. The current IT skills shortage in South Africa is causing companies to rethink their IT strategies and make use of external service providers to supply them with the necessary skills to get the job done. The research illustrates this fact that IT consulting has one of the highest adoption rates currently and with regard to the future. Full blown outsourcing is still a relatively new concept in South Africa and companies will only adopt the concept as soon as it has proved to be successful and cost effective. As mentioned it is important that a structured methodology should be used to drive an outsourcing process. It is important that the approach is structured around proven project management principles with the correct measures in place to support and sustain the whole process. Outsourcing of IT services is a strategic decision that a company must take and the risks associated with the process mean that it must be planned and executed very carefully. Outsourcing has various risks associated with it like the appointment of the wrong service provider. However, the outsourcing process can also have its merits and the most important of these are most probably lower costs, new IT skills, and better service. The shortage of IT skills in South Africa makes the idea of outsourcing more and more attractive because of the fact that companies can now "buy" the skills without having to commit to long term permanent employment contracts for permanent staff.
AFRIKAANSE OPSOMMING: Die navorsingsverslag handel oor die konsep van uitkontraktering van inligtingstegnologie(IT) dienste aan eksterne diensverskaffers. Aangesien dit 'n relatiewe nuwe tendens in Suid Afrika se IT bedryf is, en die risiko bestaan dat 'n maatskappy groot geldelike verliese kan ly indien dit nie reg aangepak word nie, word daar gepoog om na die belangrikste aspekte van uitkontraktering te kyk om die risikos daaraan verbonde so laag as moontlik te hou. Die definisie van IT uitkontraktering is die oordrag van 'n organisasie se rekenaar sentrum operasies, telekommunikasie netwerk, of toepassing ontwikkeling na 'n eksterne verskaffer van hierdie dienste. Daar is verskillende variasies van uitkontraktering van toepassing op IT soos byvoorbeeld: uitkontraktering, inkontraktering, en gesamentlike kontraktering. Maatskappye het verskillende redes om 'n diens uit te kontrakteer en die risikos verbonde aan die proses moet sorgvuldig in gedagte gehou word wanneer die uitkontrakteringsproses aangepak word. Met IT uitkontraktering is daar verskillende dienste wat uitgekontrakteer kan word soos byvoorbeeld: hoofraam dienste, persoonlike rekenaar dienste, sekuriteitsdienste en verskeie rekenaar applikasie dienste. Die besluit om 'n spesifieke area van IT uit te kontrakteer is 'n strategiese kwessie vir die maatskappy en die risikos, kostes en keuse van eksterne diensverskaffer is almal baie belangrike faktore wat in gedagte gehou moet word. Een van die vernaamste faktore wat enige maatskappy in ag behoort te neem wanneer 'n groot inisiatief aangepak word, is natuurlik kostes. Die doel van uitkontraktering is om die kostes van die spesifieke area te verlaag. Daarom moet die nodige maatreëls in plek wees om die kostes vooraf en na die uitkontrakteringsproses te meet. Die uitkontraktering inisiatief kan die maatskappy egter baie duur te staan kom en glad nie die koste voordele bied wat aanvanklik beplan is nie. Dit kan wees as gevolg van verskuilde kostes wat nie met die beplanning van die proses in ag geneem is nie. Gewoonlik word die uitkontrakteringsproses gedryf deur 'n gestruktureerde projek en verskeie belangrike faktore moet in ag geneem word vir die hele proses. Die faktore sluit in: die evaluasieproses om die regte diensverskaffer aan te stel, die opstel van die regte dokumentasie in terme van die diensvoorstel voorlegging, verhouding met die diensverskaffer, die opstel van die diensvlak ooreenkoms, kommunikasie oor die hele proses binne die maatskappy, die kontrak tussen die twee partye, oorgangstadium en die meting van voordele daarna. Die huidige tekort aan IT vaardighede in Suid Afrika veroorsaak dat maatskappye hul IT strategie moet herdink en die opsie van eksterna diensverskaffers wat die nodige vaardighede kan verskaf, oorweeg word. Die studie illustreer hierdie feit dat IT konsultasie een van die hoogste vlakke van ingebruikneming tans en vir die toekoms het. Volledige IT funksie uitkontraktering is nog 'n relatiewe nuwe konsep in Suid Afrika en maatskappye sal slegs die idee aanneem sodra uitkontraktering as suksesvol en koste effektief bewys is. Soos reeds genoem is dit belangrik dat 'n gestruktureerde metodologie gebruik word om 'n uitkontrakteringsinisiatief te dryf. Dit is belangrik dat die aanslag geskoei is rondom bewese projekbestuursbeginsels en dat die regte maatreëls getref is om die proses te ondersteun. Uitkontraktering van IT dienste is 'n strategiese besluit wat 'n maatskappy moet neem. Die risikos daaraan verbonde veroorsaak dat die beplanning en aanpak van die proses baie deeglik en noukeurig gedoen moet word. Uitkontraktering het verskeie risikos soos om die verkeerde eksterne diensverskaffer te kies, maar kan ook voordelig vir die maatskappy wees en die grootste voordele wat 'n maatskappy kan verwag is verlaagde kostes en nuwe IT vaardighede. Die probleem van 'n tekort aan goed opgeleide IT personeel in Suid Afrika maak die idee van uitkontraktering al meer aanlokliker omdat dit 'n goeie manier is om goeie vaardighede in te "koop".
Duffy, Juliet (Juliet Maria). "Information management using Web 2.0 technology." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/50100.
Full textIncludes bibliographical references.
Web 2.0, the ultimate platform for tacit based knowledge work has finally arrived. User driven, collaborative platform based tools including wikis, web mash-ups, discussion boards, linkage based search engines, and tagging have the potential to vastly change how information is managed and how knowledge work is captured. This thesis investigates how the new paradigms and tools of Web 2.0 can be applied to the Pharmaceutical Industry and assist with information management at The Novartis Institute for BioMedical Research (NIBR). Applying Web 2.0 tools to NIBR's chemical compounds, targets, assays, people, and projects in a well thought out framework has the potential to yield tremendous productivity improvements in the drug discovery process. Effectively harnessing the collective intelligence of thousands of scientists within Novartis's worldwide research network will enable a paradigm shift. A large, extremely knowledgeable user community can more effectively annotate metadata, hyperlink to important content, establish tags, and collectively author content. Such activities will not only improve the search ability of information but also allow important scientific connections to emerge linking biology to chemistry and furthering Novartis's understanding of disease.
by Juliet Duffy.
S.M.
M.B.A.
Tessema, Ermyas Arega. "The relation between ICT and poverty reduction : the Central Statistical Agency of Ethiopia." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/5275.
Full textENGLISH ABSTRACT: National Statistical offices (NSOs) are the sources of wide ranges of socio-economic, demographic and agricultural data and information that are used to monitor and evaluate development programs and formulate policies. The data generated by NSOs is used as basis for making decisions and also used to assess the extent and causes of poverty. Various stakeholders such as researchers, the World Bank, the International Monetary Fund, the UN, and various NGOs prepare and release research materials and annual reports using data and information obtained from NSOs and line ministries. For example, Deneulin and Shahani state that one of the intentions of the annual Human Development Report (HDR) prepared by the UNDP is “to assess the quality of life of a population and be an advocacy tool for its improvement with a political purpose of raising awareness and generating debate on public issues and concerns which would otherwise not be on the political agenda”1. Based on the different approaches to poverty, different sets of data and information are produced and used for poverty measurement. Mostly, poverty is measured using data obtained from nationally representative household surveys which focus on income and expenditure, ownership, access to and use of some basic services. Another approach uses data on mental satisfaction; still others assume poverty to be multi-dimensional and argue that income alone is not enough. They view poverty as deprivation of basic capabilities due to high rates of mortality, illiteracy, malnourishment, unemployment, ill health, lack of education and social exclusion, etc2. The quality of data and information (such as integrity, methodological soundness, accuracy and reliability, serviceability and accessibility) generated by data-producingagencies therefore needs to be preserved and improved in order to obtain meaningful results from the measurement of poverty in any of the approaches and to satisfy the growing data quality demands of stakeholders. Loshin states that “strategic decisions based on untrustworthy information are likely to result in poor decisions”3. This study focuses on the role played by national statistical offices in poverty reduction in general. It examines the various activities, players, interactions, and ICTs used at the various stages of the statistical process in the Ethiopian Central Statistical Agency (CSA) to generate poverty-related data and information and how the quality of this data can be preserved and improved. The purpose of this research is therefore to identify poverty related data quality problems with respect to the IMF’s DQAF and assess where in the statistical process specific types of ICTs can improve data quality. For this reason interpretive case study method with the researcher as participant observer was adopted to study how poverty related data and information is produced. It was found out that some of the data quality problems can be addressed using appropriate ICTs with the availability of reliable power infrastructures.
AFRIKAANSE OPSOMMING: Nasionale Statistiekkantore (NSOs) is die bron van ‘n wye reeks sosio-ekonomiese, demografiese en landboukundige data en inligting wat gebruik word om ontwikkelingsprogramme te monitor en te evalueer. Die data wat deur NSOs geskep word, word aangewend as grondslag vir besluitneming. Die data word ook gebruik om die omvang en oorsake van armoede te bepaal. Verskeie betrokkenes soos navorsers, die Wêreldbank (WB), Internasionale Monetêre Fonds (IMF) en die VN en NSOs skep en versprei verskillende navorsingsuitsette en jaarverslae wat gebruik maak van die data en inligting wat verkry word van NSOs en ministeries. So konstateer Deneulin en Shahani dat een van die doelstellings van die Verslag op Menslike Ontwikkeling (HDR), soos opgestel deur die VNDP, is om “die lewensgehalte van ‘n bevolking te skat en om as werktuig en voorspraak vir die verbetering daarvan op te tree, met die politiese doelwit om bewustheid te verhoog en debatvoering oor openbare sake en kwessies, wat andersins nie op die agenda sou verskyn nie, aan te voor”.4. Na gelang van die verskillende benaderings tot armoede word verskillende stelle data en inligting geproduseer en gebruik vir die meting van armoede. Armoede word gewoonlik gemeet deur data te gebruik wat bekom word van landswye opnames van huishoudings en ingestel is op inkomste en besteding, besitreg, toegang tot en die gebruik van ‘n paar basiese dienste. ‘n Ander benadering gebruik data oor geestelike bevrediging; ander weer aanvaar dat armoede multidimensioneel is en voer aan dat inkomste alleen nie genoeg is nie. Hulle beskou armoede as die ontbering van basiese vermoëns weens ‘n hoë sterftesyfer, ongeletterdheid, ondervoeding, siekte, gebrekkige onderwys, sosiale uitsluiting en dies meer5. Die gehalte van data en inligting (soos integriteit, metodologiese deeglikheid, akkuraatheid en betroubaarheid, bruikbaarheid en toeganklikheid) wat deur agentskappe opgelewer word moet dus bewaar en verbeter word ten einde ‘n beduidende resultaat te bekom uit die meting van armoede deur enige van die benaderings en ook om belanghebbendes se groeiende aandrang op datagehalte te bevredig. Loshin beweer dat “strategiese besluite gebaseer op onbetroubare inligting waarskynlik swak besluitneming tot gevolg sal hê”.6. Hierdie ondersoek konsentreer op die rol wat gespeel word deur nasionale statistiekkantore in die algemene bekamping van armoede. Dit ondersoek die verskillende aktiwiteite, rolspelers, interaksies en ICTs wat op verskeie stadiums van die statistiese proses deur die Etiopiese Sentrale Statistiekagentskap (CSA) gebruik word om data en inligting oor armoede te skep en hoe die betroubaarheid van data behou en verbeter kan word. Die doel van hierdie navorsing is dus om kwaliteitsprobleme wat verband hou met armoededata ten opsigte van die IMF se DQAF te identifiseer en om te besluit waar in die statistiese proses bepaalde soort ICT’s die gehalte van data kan identifiseer. Om hierdie rede is die interpretiewe gevallestudiemetode aanvaar om te bepaal hoe armoede-verwante data en inligting geskep word. Die slotsom was dat sommige van die probleme in datagehalte aangespreek kan word deur die gebruik van gepaste ICT’s met die beskikbaarheid van betroubare mag-infrakstrukture.
Sezgin, Emre. "Itmem - Information Technology Management Enhancement Model: Assessment Of Information Technology Use In Organizations." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612353/index.pdf.
Full textdevelopment and manufacturing industries which were appraised in or in progress of being appraised in CMMI. The study revealed the benefits and deficiencies of IT use in the company. It also provided information for decision makers about IT value within companies, and demonstrated the effects of best practices and standards over IT use.The reported findings should be valuable assets to researchers studying on IT management and IT use in organizations.
McGee, Mary Jane. "Information Technology Management Strategies to Implement Knowledge Management Systems." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4156.
Full textAral, Sinan. "Essays on information, technology and information worker productivity." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/39003.
Full textIncludes bibliographical references.
I examine how information technology (IT) skills and use, communication network structures, and the distribution and flow of information in organizations impact individual information worker productivity. The work is divided into three essays based on the task level practices of information workers at a midsize executive recruiting firm: Essay 1: "Information, Technology and Information Worker Productivity: Task Level Evidence." I develop and econometrically test a multistage model of production and interaction activities at the firm, and analyze correlations among network structure, characteristics of information flow and real economic output. I find that (a) IT use is positively correlated with non-linear drivers of productivity; (b) the structure and size of workers' communication networks are highly correlated with performance; (c) an inverted-U shaped relationship exists between multitasking and productivity such that, beyond an optimum, more multitasking is associated with declining project completion rates and revenue generation; and (d) asynchronous information seeking such as email and database use promotes multitasking while synchronous information seeking over the phone shows a negative correlation. These data demonstrate a strong correspondence among technology use, social networks, and productivity for project-based information workers.
(cont.) Essay 2: "Network Structure and Information Advantage: Structural Determinants of Access to Novel Information and their Performance Implications." I examine relationships between social network structure, information structure, and individual performance. I build and validate a Vector Space Model of information diversity, develop hypotheses linking two key aspects of network structure - size and diversity - to the distribution of novel information among actors, and test the theory using data on email communication patterns, message content and performance. Results indicate that access to diverse, novel information is related to network structure in non-linear ways, and that network diversity contributes to performance even when controlling for the positive performance effects of access to novel information, suggesting additional benefits to network diversity beyond those conferred through information advantage.
(cont.) Essay 3: "Organizational Information Dynamics: Drivers of Information Diffusion in Organizations." I examine drivers of the diffusion of different types of information through organizations by observing several thousand diffusion processes of two types of information -'event news' and 'discussion topics' - from their original first use to their varied recipients over time. I then test the effects of network structure and functional and demographic characteristics of dyadic relationships on the likelihood of receiving each type of information and receiving it sooner. Discussion topics exhibit more shallow diffusion characterized by 'back-and-forth' conversation and are more likely to diffuse vertically up and down the organizational hierarchy, across relationships with a prior working history, and across stronger ties; while news, characterized by a spike in communication and rapid, pervasive diffusion through the organization, is more likely to diffuse laterally as well as vertically, and without regard to the strength or function of relationships. The findings highlight the importance of simultaneous considerations of structure and content in information diffusion studies.
by Sinan Aral.
Ph.D.
Kuan, Chan Hong. "Management of information technology for competitive advantage." Thesis, University of Macau, 1996. http://umaclib3.umac.mo/record=b1636729.
Full textCheng, Man-fai, and 鄭文輝. "Utitlization in information technology in housing management." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B4500920X.
Full textRich, Martin. "Information and communication technology in management learning." Thesis, City University London, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.410151.
Full textZhu, Ying 1975. "Information technology application in intermodal terminal management." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/84783.
Full textPage 125 blank.
Includes bibliographical references (p. 119-124).
by Ying Zhu.
S.M.
Hammar, Tora. "eMedication – improving medication management using information technology." Doctoral thesis, Linnéuniversitetet, Institutionen för medicin och optometri (MEO), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37167.
Full textLäkemedel förbättrar och förlänger livet för många och utgör en väsentlig del av dagens hälso- och sjukvård men om läkemedel tas i fel dos eller kombineras felaktigt med varandra kan behandlingen leda till en försämrad livskvalitet, sjukhusinläggningar och dödsfall. En del av dessa problem skulle kunna förebyggas med rätt information till rätt person vid rätt tidpunkt och i rätt form. Informationsteknik i läkemedelsprocessen har potentialen att öka kvalitet, effektivitet och säkerhet genom att göra information tillgänglig och användbar men kan också innebära problem och risker. Det är dock en stor utmaning att i läkemedelsprocessen föra in effektiva och användbara IT-system som stödjer och inte stör personalen inom sjukvård och på apotek, skyddar den känsliga informationen för obehöriga och dessutom fungerar tillsammans med andra system. Dagens IT-stöd i läkemedelsprocessen är otillräckliga. Till exempel saknar läkare, farmaceuter och patienter ofta tillgång på fullständig och korrekt information om en patients aktuella läkemedel; det händer att fel läkemedel blir utskrivet eller expedierat på apotek; och bristande eller långsamma system skapar frustration hos användarna. Dessutom är det flera delar av läkemedelsprocessen som fortfarande är pappersbaserade. Därför är det viktigt att utvärdera IT-system i läkemedelsprocessen. Vi har studerat IT i olika delar av läkemedelsprocessen, före eller efter införandet, framför allt utifrån användarnas perspektiv. Sverige har lång erfarenhet och tillhör de ledande länderna i världen när det gäller eRecept, det vill säga recept som skickas och lagras elektroniskt. I två studier fann vi att eRecept är väl accepterat och uppskattat av farmaceuter (Studie I) och patienter (Studie II), men att det finns behov av förbättringar. När apoteksmarknaden omreglerades 2009 infördes fyra nya receptexpeditionssystem på apoteken. Vi fann att det efter införandet uppstod problem med användbarhet, tillförlitlighet och funktionalitet som kan ha inneburit en risk för patientsäkerheten (Studie III). I Sverige har man inom flera sjukvårdsregioner infört gemensamma elektroniska läkemedelslistor. I en av studierna kunde vi visa att detta har inneburit en ökad tillgänglighet av information, men att en gemensam lista inte alltid blir mer korrekt och kan innebära en ökad risk att känslig information nås av obehöriga (Studie IV). I två av studierna undersöktes beslutsstödssystemet elektroniskt expertstöd (EES):s potential som stöd för läkare att upptäcka läkemedelsrelaterade problem till exempel om en patient har två olika läkemedel som inte passar ihop, eller ett läkemedel som kanske är olämpligt för en äldre person. Studierna visade att EES gav signaler för potentiella problem hos de flesta patienter med dosdispenserade läkemedel i Sverige (Studie V), och läkarna ansåg att majoriteten av signalerna är kliniskt relevanta och att några av signalerna kan leda till förändringar i läkemedelsbehandlingen (Studie VI). Sammantaget visar avhandlingen att IT-stöd har blivit en naturlig och nödvändig del i läkemedelsprocessen i Sverige men att flera problem är olösta. Vi fann svagheter med användbarhet, tillförlitlighet och funktionalitet i de använda IT-systemen. Patienterna är inte tillräckligt informerade och delaktiga i sin läkemedelsbehandling. Läkare och farmaceuter saknar fullständig och korrekt information om patienters läkemedel, och de har i dagsläget inte tillräckliga beslutsstöd för att förebygga läkemedelsrelaterade problem. Eftersom läkemedelsprocessen är komplex med många aspekter som påverkar utfall behöver vi ett helhetstänkande när vi planerar, utvecklar, implementerar och utvärderar IT-lösningar där vi väger in både tekniska, sociala och organisatoriska aspekter. Avhandlingens resultat visar på ett behov av ökad koordination och utbildning samt förtydligande av ansvaret för inblandade aktörer. Vi föreslår gemensamt strategiskt arbete och att inblandade myndigheter tar fram vägledning och krav för IT i läkemedelsprocessen.
Isaksson, Ulrika, Karin Kvarnström, and Malin Nilsson. "Challenges with Incident Management : In Information Technology." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1634.
Full textIT-säkerhet är ett globalt problem och över världen skapas Computer Emergency Respons Teams (CERT) för att försöka att lösa olika problem. Den vanliga uppfattningen är att IT-säkerhet är viktigt men att inga direkta guidelines finns för hur man skall hantera det. SITIC som är det svenska IT-incident centret, startade 1 januari, 2003. Det är en svensk lösning på ett internationellt problem. För ett IT-incident center finns det utmaningar att hantera såsom organisations form, verksamhet och resultat. Vi tror att en generell lösning av hanteringen IT-incidenter som skulle passa alla parter i samhället blir svårt för SITIC att klara av som det ser ut idag. Vad vi kan härleda från vår utredning är att det inte finns något större behov av SITIC för de globala företagen. Vi tror att en av anledningarna är att företagen själva i framtiden tänker starta egna CERT-funktioner. Detta i sin tur kan bero på att företagen inte har något större förtroende för SITIC, de kan inte se någon fördel men verksamheten, de ser endast rapporteringsdelen. Företagen tror inte att de kommer att få något tillbaka när dom rapporterar sina incidenter till SITIC. Slutsats: Incident hantering handlar inte bara om att rapportera incidenter, utan det är en kontinuerlig livscykel innehållande faserna: upptäcka, rapportera, åtgärda och följa upp.
Ho, Wai-cheong. "Business and information technology alignment /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2071807X.
Full textCarey, David R. "Information technology : attitudes and implementation." Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/14534.
Full textMylonopoulos, Nikolaos. "The governance of information technology service provision." Thesis, University of Warwick, 1999. http://wrap.warwick.ac.uk/34705/.
Full textKalissery, Biju. "Managing agile information technology infrastructure." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/42363.
Full textIncludes bibliographical references (leaves 43-44).
Information technology (IT) can be a key contributor for the successful implementation of business strategies. However, companies normally find it hard to synchronize their evolving business strategies with the capabilities in IT. This thesis analyzes the key contributors to the problems in synchronizing business strategy and Information Technology and suggests both management and technical frameworks for an agile IT infrastructure that can stay in sync with the evolving business strategy. Agility in IT infrastructure means the ability for the infrastructure to accommodate evolving needs and business strategies without significant re-architecture. There is no magic bullet that could induce agility into an IT infrastructure and its management. But, this thesis studies the best practices in management and technology which are being used by industry leaders successfully.
by Biju Kalissery.
S.M.
Speed-Crittle, Sharita Dianthe. "Healthcare Organization Change Management Strategies to Guide Information Technology With for Information Technology Change Initiatives." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6679.
Full textLima, Luis A. C. "LEADERSHIP IN THE INFORMATION AGE: HOW CHIEF INFORMATION OFFICERS LEAD INFORMATION TECHNOLOGY WORKERS." Connect to this title online, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=bgsu1151093030.
Full textRyan, Cynthia A. (Cynthia Anne) 1961. "Sustainable competitive advantage through information technology." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9193.
Full textAlso available online on DSpace at MIT.
Includes bibliographical references (leaf 48).
This paper discusses the difficulty of achieving sustainable competitive advantage through information technology. While information technology proliferates and innovations arise frequently, few companies have been able to use IT to remain leaders in their industries. Using a framework proposed by Michael Scott Morton, this paper examines how one firm, Capital One Financial, has created sustainable competitive advantage through a powerful combination of its information technology, strategic planning, and organizational design. The first section provides an introduction and information about the Scott Morton framework. Section two provides background information about the credit card industry and Capital One;s history. The third section analyzes why Capital One's advantage has been sustainable to date and includes discussion of strategic, economic, organizational and technical reasons. Section four analyzes the risks to Capital One's advantage in the future and includes discussion of technicalogical risks, organizational risks and customer risks. The final section includes a summary and some conclusions.
by Cynthia A. Ryan.
M.B.A.
Bhansali, Sumit Milap. "Essays on impact of information technology." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/40861.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references.
The five essays in this dissertation look at how specific information technologies (such as Electronic Document Management (EDM), Semantic Web and RuleML) and IT in general can be used to automate and standardize data and processes, enable faster and more accurate information flow, and improve individual as well as firm performance. The first essay is an analytical review-type study in which we provide a comprehensive survey of research literature about different complementary organizational assets that when coupled with IT can lead to higher firm performance. In the second essay, we study the causal effects of digitizing work on information workers' time- use and performance at a large insurance firm. We make causal inferences and obtain unbiased estimates by exploiting a quasi-experiment: the phased introduction of Electronic Document Management (EDM) across multiple offices at different dates. In addition to large changes in time-use and performance, we find that digitization leads to a decline in the substitutable routine labor input and an increase in complementary non-routine cognitive labor input at the information worker level. We also uncover a new micro-level mechanism, "IT-enabled slack", that explains how exactly IT can lead to payoff in terms of information worker productivity. In the third essay, we examine the IT productivity relationship using a large primary source firm-level dataset about IT investments that spans the 2003-2005 period. Given results from previous studies, we present evidence of an inverted U-shaped returns curve, with returns now close to what they were in pre-Internet era. The fourth essay explores what high-performing firms specifically do to gain the greatest benefits from their IT investments.
(cont.) Through a set of matched interviews with multiple respondents at 138 firms, we find that data/process standardization and systems integration, level of application integration and several IT-specific cultural elements are positively correlated with IT impact on customer satisfaction. The fifth essay shows the first detailed realistic e-business application scenario that exploits capabilities of the SweetRules V2.1 toolset for e-contracting using the SweetDeal approach. SweetRules is a powerful integrated set of tools for semantic web rules and ontologies. SweetDeal is a rule-based approach to representation of business contracts.
by Sumit Milap Bhansali.
Ph.D.
Liao, Kenny Ghen-yue 1966, and Luis Alberto 1967 Reátegui. "Information technology outsourcing in emerging markets." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/26892.
Full textIncludes bibliographical references (leaves 84-85).
Information Technology (IT) firms can better differentiate themselves and achieve improved profitability through IT outsourcing business. This can be explained by using Hax and 'Wilde's Delta Model. Several IT firms have successfully achieved these objectives in well-developed countries. However, this thesis argues that developing successful IT outsourcing business in emerging markets cannot be achieved simply by replicating previous experiences in well developed countries, as IT outsourcing is greatly influenced by the cultural factors and the macro environment of the local markets. This thesis discusses the factors through two perspectives. The first encompasses the factors influencing a firm's decision whether or not to outsource its IT functions. Those factors can be categorized into five different concerns: financial, resource, strategic, managerial, and cultural. The second perspective focuses on the eight critical factors for IT outsourcing projects to be successful, four inside and four outside the firm. For emerging markets, we use Michael Porter's Diamond Model to analyze how IT outsourcing business is influenced by the environment in which it is operating. To give an example of an emerging market, we have studied IT outsourcing business in China. We have conducted in-depth interviews locally with a variety of IT firms and corporate customers, and applied once more Michael Porter's Diamond Model to analyze our findings. This thesis identifies the market segments and reviews the critical success factors in each of them, and concludes with recommendations to IT firms on strategies for the IT outsourcing business development in China.
by Kenny Ghen-yue Liao and Luis Alberto Reátegui.
M.B.A.
Lan, Yi-chen 1969, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Management of information technology issues in enterprise globalisation." THESIS_CSTE_CIT_Lan_Y.xml, 2003. http://handle.uws.edu.au:8081/1959.7/314.
Full textDoctor of Philosophy (PhD)
Staples, Douglas Sandfield. "Management of remote workers, an information technology perspective." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/nq21317.pdf.
Full textLan, Yi-Chen. "Management of information technology issues in enterprise globalisation /." View thesis, 2003. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20031217.130842/index.html.
Full textAllen, James D. "Information technology program management: is there a difference?" Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42573.
Full textThe federal government spends billions of dollars on information technology (IT) projects each year. Despite spending billions on IT, the government has achieved little of the productivity improvements that private industry has realized from IT. Too often, federal IT projects run over budget, behind schedule, or fail to deliver promised functionality. The March 2009 Defense Science Board concluded that three root causes emerged from a review of major IT acquisition programs where cost, schedule, and performance were issues. First, senior leaders lacked experience and understanding. Second, the program executive officers and program managers had inadequate experience. Third, the acquisition process was bureaucratic and cumbersome, where many who were not accountable had to say yes before authority to proceed. To address these concerns, the U.S. Chief Information Officer, the Office of Personnel Management, and the Office of Management and Budget launched an initiative to strengthen program management by designing a formal IT Program Management career path. This research analyzes the need for IT Program Managers (PM) within the federal government by comparing the differences between IT PMs and non-IT PMs.
Foote, Alan Richard. "Exploring Knowledge Management Models on Information Technology Projects." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2028.
Full textWilliams, Andrew Stephen. "Effective Stakeholder Management Strategies for Information Technology Projects." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4580.
Full textTedder, Derek. "Effective management of an information technology professional's career." Thesis, Rhodes University, 2005. http://hdl.handle.net/10962/d1004543.
Full textKanagwa, James R. "Establishing Mobile Financial Services in Ethiopia." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2319.
Full textHo, Wai-cheong, and 何偉昌. "Business and information technology alignment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31268833.
Full textCragg, Paul B. "Information technology and small firm performance." Thesis, Loughborough University, 1990. https://dspace.lboro.ac.uk/2134/6953.
Full textHa, T. H. "Information management, information technology and their implications in the Korean banking industry." Thesis, Swansea University, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.637192.
Full textHitt, Lorin M. (Lorin Moultrie). "Economic analysis of information technology and organization." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/10711.
Full textSaunders, Adam. "Essays on information technology and intangible capital." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/68967.
Full textCataloged from PDF version of thesis. Vita.
Includes bibliographical references.
This thesis consists of three essays related to information technology and intangible capital. The first essay, "Valuing IT-Related Intangible Capital," examines the value of intangible assets in the firm. Using a panel of 130 firms from 2003-2006, we find that intangible assets are correlated with significantly higher market values beyond their cost-based measures. Moreover, we estimate that there is a 30-55% premium in market value for the firms with the highest organizational IT capabilities as compared to those with the lowest organizational IT capabilities. The second essay, "Has Information Technology Leveled the Competitive Playing Field?" analyzes the relationship between IT and ordinary (non-IT) capital and the competitive dynamics within U.S. industries. Using a panel of industry data from 1998-2005, when an industry becomes more IT intensive, there is more entry and expansion of firms (including entry of new small firms and expansion of large firms from the same and other industries). Yet there is also more turnover of small firms in the industry as well as concentration of the industry into large firms. In contrast, as an industry becomes more ordinary capital-intensive, there is less entry of small firms and fewer establishment openings by large firms; a lower rate of turnover by small firms; and fragmentation of the industry into small firms. In the third essay, "The Value and Durability of Patents in High-Tech Firms" (co-authored with Erik Brynjolfsson and Lorin Hitt), we use data on publicly traded high-tech companies from 1984-2002 to examine the relationship between the firms' market value and their patent-based intangible assets. We find that high-tech firms with patents that are cited by a wide variety of other patents in different patent classes are worth significantly more than firms with patents that are cited by a narrow range of patents. Patent generality is especially valuable in periods of change, when firms are no longer at the leading edge of innovation in a particular year. In these periods, we find that the value of diverse patents across technology categories is positive but not significant and that generality is comparatively more valuable than diversity.
by Adam Saunders.
Ph.D.
Dhillon, Gurpreet. "Interpreting the management of information systems security." Thesis, London School of Economics and Political Science (University of London), 1995. http://etheses.lse.ac.uk/275/.
Full textShah, Akhtar H. "Examining the perceived value of integration of earned value management with risk management-based performance measurement baseline." Thesis, Capella University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3612243.
Full textMany projects fail despite the use of evidence-based project management practices such as Performance Measurement Baseline (PMB), Earned Value Management (EVM) and Risk Management (RM). Although previous researchers have found that integrated project management techniques could be more valuable than the same techniques used by themselves, these findings do not address the benefits of integrated EVM with PMB created from RM-based Work Breakdown Structures (WBS) that could positively influence project results. The success of a project is partly dependent on accurately forecasting the performance of future states of current projects. The focus of this quantitative descriptive study is to improve current project management knowledge by identifying whether the integration of EVM with PMB created from RM-based WBS adds project value in accurately predicting the future performance of current projects. This study was conducted by surveying project leaders who have had some experience in EVM with project management. The results of this research significantly support the belief that integration of EVM with PMB created from RM-based WBS adds value to a project.
Burkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management." Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.
Full textThe security of digital information is paramount to the success of private organizations. Violating that security is a multi-billion-dollar criminal business and exploiting these vulnerabilities creates a single point of failure for operations. Thus, understanding the detection, identification, and response to information security incidents is critical to protecting all levels of infrastructure. The lived experiences of current professionals indicate 10 unique themes in regards to how information security incidents are addressed in private organizations. These unique themes led the researcher to offer several conclusions related to the importance of planning, communication, offensive capabilities, and integration with third-party organizations. Information security incident management is accomplished as an escalation process with multiple decision points leading to a restoration of services or security. The source of the incident is not often sought beyond the first external IP address but their purpose and intent are essential to information security incident management. The key lessons learned from professionals include the importance of having a plan, training the plan, and incorporating the human elements of security into information security incident response. Penetration testing as well a knowledge about threat and attack patterns are important to information security incident management for detection, containment, and remediation. External organizations play a major role in the management of information security incidents as fear, incompetence, and jurisdictional issues keep the private sector from working with government, military, and law enforcement organizations. These themes have wide reaching implications for practical application and future research projects.
Burlingame, Stanley G. "The impact of information technology on organizations : implications for organizational integration and the management of information technology." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA345908.
Full textThesis Advisor(s): Frank Barrett, Erik Jansen. "March 1998." Includes bibliographical references (p. 87-88). Also available online.
YANG, YANQING. "Information Technology in Supply Chain Management at apparel industry." Thesis, Uppsala universitet, Institutionen för informatik och media, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-202781.
Full textexcellent presentation and informative thesis
Flodström, Raquel. "A Framework for the Strategic Management of Information Technology." Licentiate thesis, Linköping University, Linköping University, Department of Management and Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7595.
Full textStrategy and IT research has been extensively discussed during the past 40 years. Two scientific disciplines Management Science (MS) and Management Information Science (MIS) investigate the importance of IT as a competitive factor. However, although much research is available in both disciplines, it is still difficult to explain how to manage IT to enable competitive advantages. One reason is that MS research focuses on strategies and competitive environments but avoids the analysis of IT. Another reason is that MIS research focuses on IT as a competitive factor but avoids the analysis of the competitive environment. Consequently, there is a gap of knowledge in the understanding of the strategic management of information technology (SMIT).
The strategic analysis of IT as a competitive factor is important for achieving the competitive advantages of IT. This thesis explores factors related to strategy and IT that should be considered for the strategic analysis of IT as a competitive factor, and proposes a framework for SMIT. The research is conducted by means of a qualitative analysis of theoretical data from the disciplines of MS and MIS. Data is explored to find factors related to SMIT.
The results of the analysis show that the strategic management of information technology is a continuous process of evaluation, change, and alignment between factors such as competitive environment, competitive strategies (business and IT strategies), competitive outcome, and competitive factors (IT). Therefore, the understanding of the relationships between these factors is essential in order to achieve the competitive advantages of using IT.
This thesis contributes to strategic management research by clarifying the relationships between strategic management, competitive environment, and IT as competitive factor into a holistic framework for strategic analysis. The framework proposed is valuable not only for business managers and for IT managers, but also for academics. The framework is designed to understand the relationship between competitive elements during the process of strategic analysis prior to the formulation of competitive strategies. Moreover, it can also be used as a communication tool between managers, in order to achieve alignment among company strategies. To academics, this thesis presents the state-of-the-art related to strategic management research; it can also be a valuable reference for strategic managers, as well as researchers interested in the strategic management of IT.
Report code: LiU-Tek-Lic.2006:53.
Stewart, Rodney Anthony, and r. stewart@griffith edu au. "Lifecycle Management of Information Technology (IT) Projects in Construction." Griffith University. School of Engineering, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030423.122317.
Full textGuiney, Andrew, and aguiney@smsmt com. "Information Technology Project Management Team Building for Project Success." RMIT University. Graduate School of Business, 2009. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20100122.121228.
Full textFlodström, Raquel. "A framework for the strategic management of information technology /." Linköping : Department of Computer and Information Science, Linköpings universitet, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7595.
Full textMcConnell, Patrick J. "Information technology for market risk management in international banks." Thesis, Henley Business School, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.320861.
Full text劉淑賢 and Shuk-yin Josephine Lau. "Management of public housing estates: competitiveness and information technology." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31968909.
Full textWaring, Alan Edward. "Management of change and information technology : three case studies." Thesis, University of Westminster, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385553.
Full textLau, Shuk-yin Josephine. "Management of public housing estates : competitiveness and information technology /." Hong Kong : University of Hong Kong, 2002. http://sunzi.lib.hku.hk/hkuto/record.jsp?
Full textUeno, Yoshinobu 1965. "Information technology as competitive advantage in supply chain management." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9981.
Full textIncludes bibliographical references (leaves 73-77).
by Yoshinobu Ueno.
S.M.M.O.T.