To see the other types of publications on this topic, follow the link: Information technology - Other information technology.

Dissertations / Theses on the topic 'Information technology - Other information technology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information technology - Other information technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Coleman, Hollie Brianne. "The Effect of Viewing Advertisements Depicting Information and Communication Technology on Older Adults' Technology Self-Efficacy." TopSCHOLAR®, 2019. https://digitalcommons.wku.edu/theses/3164.

Full text
Abstract:
Information and communication technologies (ICTs) are an important part of society today. Older adults often report ICTs as difficult to use and unhelpful; however, ICTs can support older adults’ ability to stay in touch with family and friends across long distances and help increase their quality of life. Unfortunately, training programs targeted at teaching older adults to use ICTs are often costly and time-consuming. The current study attempts to determine whether advertisements depicting older adults using ICTs can be used to increase self-efficacy without the use of training programs. A within subjects experimental design was completed using an independent variable in which participants viewed two advertisements. Participants were randomly assigned to view an advertisement PowerPoint depicting younger adults using technology first, or randomly assigned to an advertisement PowerPoint depicting older adults using technology first. The dependent variable was a Technology Self-Efficacy Survey developed for the purposes of this study. Results of a paired samples t-test indicated that participants did not rate their selfefficacy higher after viewing the PowerPoint with older adults depicted using technology, as compared to viewing the PowerPoint with younger adults depicted using technology. Although the results were not statistically significant, this research indicated that older adults generally rated their self-efficacy higher after viewing the PowerPoint with older adults versus the PowerPoint with younger adults. Future research could help determine whether advertisements could be used to increase technology self-efficacy in older adults.
APA, Harvard, Vancouver, ISO, and other styles
2

Chuindja, Ngniah Christian. "Application of Web Mashup Technology to Oyster Information Services." ScholarWorks@UNO, 2012. http://scholarworks.uno.edu/td/1568.

Full text
Abstract:
Web mashup is a lightweight technology used to integrate data from remote sources without direct access to their databases. As a data consumer, a Web mashup application creates new contents by retrieving data through the Web application programming interface (API) provided by the external sources. As a data provider, the service program publishes its Web API and implements the specified functions. In the project reported by this thesis, we have implemented two Web mashup applications to enhance the Web site oystersentinel.org: the Perkinsus marinus model and the Oil Spill model. Each model overlay geospatial data from a local database on top of a coastal map from Google Maps. In addition, we have designed a Web-based data publishing service. In this experimental system, we illustrated a successful Web mashup interface that allows outside developers to access the data about the local oyster stock assessment.
APA, Harvard, Vancouver, ISO, and other styles
3

Landers, Kathy Michelle. "Using Simulations to Prepare for College and Careers in Information Technology." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7549.

Full text
Abstract:
While simulators can be used in place of hands-on hardware, there was not a significant body of quantitative research supporting the use of simulators for college and career success at the secondary level in information technology (IT). The purpose of this quantitative, nonexperimental study was to determine if there was a significant difference in college and career readiness of New York state high school students in approved IT content cluster high school programs, between those who use simulations and those who use hands-on hardware. Kolb's theory of experiential learning was the theoretical foundation for this research. The research questions examined whether there was a significant difference in the written exam grades, the hands-on exam grades, and the certification pass rates of students, based on the percentage of simulation used in their coursework. A survey was used to collect data on 60 students. A one-way Welch ANOVA indicated no significant difference in written grades between groups. A Kruskal-Wallis ANOVA showed statistical significance between groups using all simulated labs and less than 50% simulated labs, as well as between all simulated labs and 50% or greater simulated labs for hands-on grades. Fisher's Exact Test indicated that the proportion of students in the less than 50% simulated labs group who earned industry-level certifications was statistically significantly higher than the 50% or greater simulated labs group or the all simulated labs group. Implications for social change are that workers with entry-level IT skills can fill jobs in the growing IT field that offers well-paying jobs with more promising futures.
APA, Harvard, Vancouver, ISO, and other styles
4

Abrahamsson, Henrik, and Anders Nilsson. "Meetia : Framtiden för utbyte av digital information." Thesis, Halmstad University, School of Business and Engineering (SET), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4749.

Full text
Abstract:
<p>I dagens affärssamhälle är utbytet av vanliga visitkort i papper enormt. Det är utan tvekan det ledande sättet för människor som träffas första gången att utbyta information i en affärsrelation. Det finns brister gällande uppföljning och hantering av vanliga visitkort och projektgruppen började då fundera på alternativ till pappersvisitkorten.</p><p>I dagens samhälle flyttas alltmer teknik till mobiltelefoner. En mobiltelefon kan idag användas till allt från att göra bankärenden till att läsa tidningen på nätet, vilket för 15 år sedan skulle låta helt orimligt. Det dyker dagligen upp nya mobilapplikationer som ska underlätta och effektivisera vardagen på något sätt och marknaden är enorm. På denna snabbt växande marknad har projektgruppen valt att ta fram ett koncept som de kallar Meetia.</p><p>Meetia är i huvudsak en mobilapplikation framtagen för att trådlöst utbyta digitala visitkort och förenkla bokning av möten genom att synka användarnas kalendrar. Applikationen har även funktioner som låter användaren enkelt och snabbt skapa nya visitkort direkt i telefonen.</p><p>Projektgruppen har även tagit fram en kompletterande hemsida till mobilapplikationen där användare har möjlighet att lagra och hantera de digitala visitkort som mottagits, för att sedan genom smarta sökfunktioner enkelt hitta de visitkort man söker.</p><p>Meetia kommer vara ett optimalt verktyg för att skapa nya kontakter då hela vägen från första kontakt till möte eller lagring av visitkort enkelt sköts med konceptet Meetia. Meetia kommer framför allt inrikta sig mot mässor där visitkort är vanligt förekommande och mängder affärskontakter skapas. För att nå ut till de stora mässorna i Sverige kommer applikationen finnas med mässfunktioner.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Le, hir Boris. "Capturing Information and Communication Technologies as a General Purpose Technology." Phd thesis, Ecole Centrale Paris, 2012. http://tel.archives-ouvertes.fr/tel-00997417.

Full text
Abstract:
This thesis aims to study Information and Communication Technologies (ICT) as a General Purpose Technology (GPT) and their role in the labor productivity evolution in the United States and Europe during recent decades. This thesis is organized in three parts corresponding to the fundamental GPT features: the wide possibilities for development, the ubiquity of the technology and the ability to create large technological opportunities. The first part depicts, at first, the innovation in ICT, beginning with a short historical review of ICT inventions followed by the analysis of current data on innovation in this field. In particular, it shows how the US was better than the European countries in inventing ICT until now. Second, this first part makes an inventory of measurement difficulties due to the rate and the nature of the change created by such technologies. The second part of the thesis deals with the ubiquitous nature of ICT. It first describes the ICT diffusion across countries and industries and reviews the economic literature on the direct contribution of ICT on labor productivity growth in the US and Europe. The next chapter studies the factor demand's behaviour in sectors that are either ICT producers or ICT intensive users. The third part focuses on the ICT ability to create opportunities for complementarity innovations. Firstly, it identifies the nature of ICT complementary innovations and the corresponding efforts. It shows, then, that national accounts must be improved in order to take these efforts into account as investments. Secondly, this part shows that, among the eleven European countries studied, the problem is highly concentrated in a few countries that invest less both in ICT and in innovative assets and that these two types of effort are complementary.
APA, Harvard, Vancouver, ISO, and other styles
6

Soto, Sadie Lee. "Information and Communications Technology Strategies for Improving Global Virtual Teams' Success Rates." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7079.

Full text
Abstract:
Ineffective strategies to integrate information and communication technology (ICT) to support global virtual teams (GVTs) have adversely affected organizations' performance. The purpose of this multiple case study was to explore the effective strategies participating GVT managers in 2 organizations in the United States used to integrate ICT to support teams' success. The population comprised managers in New York with at least 3 years of service integrating successful strategies in ICT to support GVT success. Transformational leadership theory was used as the conceptual framework for this study. The data collection process included asking 4 participants semistructured interview questions as well as reviewing archival data from the organizations. Data analysis using mind mapping analysis resulted in 5 major themes: forms of communication, redundancy, inclusion, accessibility, and infrastructure. The implications of this study for positive social change include the potential to create economic opportunities in developed and underdeveloped countries by incorporating or adapting some or all these strategies to improve efficiencies using ICT to support the success of GVTs. Improving GVT success rates could enable organizations to maintain and grow jobs benefiting employees, families, and communities.
APA, Harvard, Vancouver, ISO, and other styles
7

Rodriguez, Galvez Borja. "The Information Bottleneck : Connections to Other Problems, Learning and Exploration of the IB Curve." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254421.

Full text
Abstract:
In this thesis we study the information bottleneck (IB) method. This is an informationtheoretic framework which addresses the question of what are the relevant factors of arandom variable X to explain another statistically dependent random variable Y . Thesefactors are embedded into a bottleneck variable T obeying the Markov condition Y $X $ T.The contributions of the thesis are three-fold: (i) The thesis serves as a survey onthe existing connections of the information bottleneck method with rate distortion theoryand with minimal sufficient statistics, for which we also extended the known theory byproving some unproved results and deriving new connections. (ii) The thesis also servesas a survey on the information bottleneck and learning. We recover the main results onsample bounds for learning, prove them insufficient for real-world problems and show theimportance of the recently found ties between information and generalization. Moreover,we provide with a clear intuition of why the information bottleneck is a good objectivefunction for supervised learning tasks. Furthermore, we provide with a new informationtheoretic generalization bound for linear models which, to the extent of our knowledge,is the first one which does not depend on the cardinality of the random variables. (iii)Finally, the main contribution of the thesis are the results regarding the exploration of theIB curve. The IB curve is the set of points describing the solutions of the informationbottleneck optimization in terms of compression of the inputs and explainability of theoutput. We introduce the convex IB Lagrangian, an objective function which allows us toexplore the IB curve (in contrast to the previously used IB Lagrangian). Furthermore, weprove there is a bijective mapping between the Lagrange multiplier used and the obtainedpoint in the IB curve, provided the IB curve shape is known. This means one could designthe Lagrange multiplier to obtain a desired level of compression or explainability.<br>I den här avhandligen studerar vi the information bottleneck method. Detta är ettinformations-teoretiskt ramvärk som tar itu med vilka som är de relevanta faktorerna av enstokastisk variabel X som förklarar en annan, statistiskt beroende, stokastisk variabel Y .Dessa faktorer är inbäddade i en bottleneck variable T, vilken uppfyller Markov-villkoretY $ X $ T.Bidraget av denna avhandling är trefaldigt: (i)Avhandlingen fungerar som en undersökningav existerande kopplingar mellan information bottleneck method och rate distortiontheory samt minimal sufficient statistics. Vi utökar den kända teorin om dessa kopplingargenom att bevisa nya resultat och härleda nya kopplingar. (ii) Avhandlingen fungerar ocksåsom en undersökning av information bottleneck and learning. Vi återfår huvudresultatenom sample bounds for learning, bevisar att de är otillräckliga för moderna problem och visarvikten av de nyligen funna kopplingarna mellan information och generalisering. Vi presenterardessutom en intuition för varför the information bottleneck är en bra målfunktionför supervised learning. Dessutom så hittar vi en ny information-teoretisk generaliseringsgränsför linjära modeller som, så vitt vi vet, är den första sådana som inte beror på kardinalitetenav den stokastiska variabeln. (iii) Slutligen, avhandligens huvudsakliga bidragär resultat angående utforskningen av IB-kurvan. IB-kurvan är mängden av punkter sombeskriver lösningarna av information bottleneck optimiseringen i form av kompression avinsignalerna och förklarlighet av utsignalerna. Vi introducerar the convex IB Lagrangian,en målfunktion som låter oss utforska IB-kurvan (till skillnad från den tidigare användaIB Lagrangian). Vi bevisar dessutom att det finns en bijective mapping mellan de användalagrangemultiplikatorerna och den erhållna punkten på IB-kurvan, så vida IB-kurvansform är känd. Detta innebär att det är möjligt att konstruera lagrangemultiplikatorn så attman för en önskad nivå på kompression och förklarlighet.
APA, Harvard, Vancouver, ISO, and other styles
8

Abdur, Rahman Hafiz Md. "Modelling and simulation of interdependencies between the communication and information technology infrastructure and other critical infrastructures." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/13797.

Full text
Abstract:
Critical infrastructures are the lifelines of modern societies. The Communication and Information Technology Infrastructure (CITI) provides the basic mechanisms for sharing control and decision-making information among different critical infrastructures. Failures in CITI, either due to an accident or malicious action can propagate to other infrastructures and degrade or disrupt their functionality. Conversely, failures in other infrastructures can also propagate to CITI and hence disrupt the operation of many of the interconnected systems. For reliable and consistent operation of critical infrastructure networks, it is important to have tools and techniques to model and simulate CITI related interdependencies. This research is focusing on developing such methods and tools for CITI interdependency modelling and simulation. Our approach is based on system engineering techniques, where critical infrastructures are viewed as a system of systems. Interdependencies between different system components are captured using precise mathematical functions. As such, our approach goes beyond the limitations of agent-based modelling and simulation paradigms, where interdependencies are considered an emergent behavior. In this research, we have used predictive modelling techniques commonly used in power systems, data communication networks and information systems. The approach is based on results from real CITI interdependency related data. In our model, we used these data to identify the origin of different types of CITI failure and their impacts on critical infrastructures. Following that, we developed techniques to estimate interdependencies between CITI and other critical infrastructures. Finally, we developed techniques to simulate CITI interdependencies in a critical infrastructures simulator. The simulation results were validated against real-life failure cases. Our approach gives a comprehensive solution to CITI interdependency modelling and simulation problems and hence is an important step in the critical infrastructure related research. Even though our techniques are developed for CITI interdependency, they will be useful for other critical infrastructure networks as well.
APA, Harvard, Vancouver, ISO, and other styles
9

El-Bannany, Magdi Ahmed. "Investment in information technology systems and other determinants of bank performance in the UK and Egypt." Thesis, Liverpool John Moores University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.521756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Martinez, Diego A. "Informing the Design and Deployment of Health Information Technology to Improve Care Coordination." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5987.

Full text
Abstract:
In the United States, the health care sector is 20 years behind in the use of information technology to improve the process of health care delivery as compared to other sectors. Patients have to deliver their data over and over again to every health professional they see. Most health care facilities act as data repositories with limited capabilities of data analysis or data exchange. A remaining challenge is, how do we encourage the use of IT in the health care sector that will improve care coordination, save lives, make patients more involved in decision-making, and save money for the American people? According to Healthy People 2020, several challenges such as making health IT more usable, helping users to adapt to the new uses of health IT, and monitoring the impact of health IT on health care quality, safety, and efficiency, will require multidisciplinary models, new data systems, and abundant research. In this dissertation, I developed and used systems engineering methods to understand the role of new health IT in improving the coordination, safety, and efficiency of health care delivery. It is well known that care coordination issues may result in preventable hospital readmissions. In this dissertation, I identified the status of the care coordination and hospital readmission issues in the United States, and the potential areas where systems engineering would make significant contributions (see Appendix B). This literature review introduced me to a second study (see Appendix C), in which I identified specific patient cohorts, within chronically ill patients, that are at a higher risk of being readmitted within 30 days. Important to note is that the largest volume of preventable hospital readmissions occurs among chronically ill patients. This study was a retrospective data analysis of a representative patient cohort from Tampa, Florida, based on multivariate logistic regression and Cox proportional hazards models. After finishing these two studies, I directed my research efforts to understand and generate evidence on the role of new health IT (i.e., health information exchange, HIE) in improving care coordination, and thereby reducing the chances of a patient to be unnecessarily readmitted to the hospital. HIE is the electronic exchange of patient data among different stakeholders in the health care industry. The exchange of patient data is achieved, for example, by connecting electronic medical records systems between unaffiliated health care providers. It is expected that HIE will allow physicians, nurses, pharmacists, other health care providers and patients to appropriately access and securely share a patient’s vital medical information electronically, and thereby improving the speed, quality, safety and cost of patient care. The federal government, through the 2009 Health Information Technology for Economic and Clinical Health (HITECH) Act, is actively stimulating health care providers to engage in HIE, so that they can freely exchange patient information. Although these networks of information exchange are the promise of a less fragmented and more efficient health care system, there are only a few functional and financially sustainable HIEs across the United States. Current evidence suggests four barriers for HIE: •Usability and interface issues of HIE systems •Privacy and security concerns of patient data •Lack of sustainable business models for HIE organizations •Loss of strategic advantage of "owning" patient information by joining HIE to freely share data To contribute in reducing usability and interface issues of HIE systems, I performed a user needs assessment for the internal medicine department of Tampa General Hospital in Tampa, Florida. I used qualitative research tools (see Appendix D) and machine learning techniques (see Appendix E) to answer the following fundamental questions: How do clinicians integrate patient information allocated in outside health care facilities? What are the types of information needed the most for efficient and effective medical decision-making? Additionally, I built a strategic gaming model (see Appendix F) to analyze the strategic role of "owning" patient information that health care providers lose by joining an HIE. Using bilevel mathematical programs, I mimic the hospital decision of joining HIE and the patient decision of switching from one hospital to another one. The fundamental questions I tried to answer were: What is the role of competition in the decision of whether or not hospitals will engage in HIE? Our mathematical framework can also be used by policy makers to answer the following question: What are the optimal levels of monetary incentives that will spur HIE engagement in a specific region? Answering these fundamental questions will support both the development of user-friendly HIE systems and the creation of more effective health IT policy to promote and generate HIE engagement. Through the development of these five studies, I demonstrated how systems engineering tools can be used by policy makers and health care providers to make health IT more useful, and to monitor and support the impact of health IT on health care quality, safety, and efficiency.
APA, Harvard, Vancouver, ISO, and other styles
11

Batsos, Epameinondas, and Atta Rabbi. "Clustering and cartographic simplification of point data set." Thesis, KTH, Geodesi och geoinformatik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-79892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hawley, Eric S. "Understanding Unfolding Change and the Value of Strategic Unification in Recent USU Information Technology Functional Realignment." DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/176.

Full text
Abstract:
This is a qualitative case study of the 2005-2008 Utah State University Information Technology reorganization from the perspective of key change advocates. The study identified and documented the unfolding change process involved in the reorganization in terms of dissatisfaction, executive changes, internal executive strategic planning, implementation and initial impacts, and continuous "in situ" strategic planning. The study also answered a set of supporting concluding questions indicating increased value to the institution in areas of customer service and confidence, organization, financial resources, planning and policy, security, and increased/improved services and service functions.
APA, Harvard, Vancouver, ISO, and other styles
13

Mittal, Neeraj. "Efficiency enhancing effects of IT investment on other factor inputs and accounting identity approach to value of IT." Connect to this title online, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1085362216.

Full text
Abstract:
Thesis (Ph. D.)--Ohio State University, 2004.<br>Title from first page of PDF file. Document formatted into pages; contains xi, 120 p.; also includes graphics. Includes bibliographical references (p. 115-120). Available online via OhioLINK's ETD Center.
APA, Harvard, Vancouver, ISO, and other styles
14

Junered, Marcus. "Enabling hardware technology for GNSS software radio research." Licentiate thesis, Luleå : Luleå University of Technology, 2007. http://epubl.ltu.se/1402-1757/2007/32/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

AGORAS, DIMITRIS. "Building Information Modeling (BIM) Adoption Barriers: An Architectural Perspective." Thesis, KTH, Industriell Marknadsföring och Entreprenörskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230639.

Full text
Abstract:
Building Information Modeling (BIM) is the latest development in the Architecture, Engineering and Construction (AEC) Industry. This development can be used for planning, design, construction, operation and maintenance of any facility. The majority of the users of BIM technology are architects. Although its benefits had been highlighted and underlined especially in comparison with older developments such us Computer Aided Design (CAD) tools, its implementation is considered still in an early stage due to low adoption from architects. Right now in Sweden and more specifically in the Stockholm area, the construction sector is booming due to the increased demand for housing.  Thus, there is an increased demand for more houses in a shorter time. BIM is a technology that can enhance the society in terms of design and construction with regard to the building environment. This can be achieved by avoiding human errors, decreasing project costs, increasing the productivity and quality, and reducing the project delivery time. Moreover, BIM can assist the management team in maintaining and operating different facilities. The focus of this research is on the barriers to adopting BIM technology in architectural companies. Furthermore, the attempt will be to investigate the individual, organizational and technical aspects that affect BIM adoption.  This study will implement a qualitative research method by in-depth interviewing four professionals in the area of architectural design. This investigation will be driven by the main research question, which is: What are the barriers to adopting Building Information Modeling (BIM) in architectural companies?
APA, Harvard, Vancouver, ISO, and other styles
16

Powell, Jozan Maria. "School Library Media Specialists' Perceptions of Collaboration, Leadership and Technology." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4747.

Full text
Abstract:
School impact media studies indicate that a well-staffed and funded school library media program with a certified school library media specialist (SLMS) positively correlates with increased student achievement. SLMS must have a shared understanding of their roles and responsibilities to positively impact student success. In an effort to determine prior knowledge and differentiated learning objectives, the method of certification is critical for planning professional development. This dissertation presents a multi-method investigation of differences between Alternatively Certified (AC) and Traditionally Certified (TC) SLMS as it relates to their perceptions of collaboration, leadership and technology described in Information Power: Building Partnerships for Learning (1998). The overall findings were used to generate recommendations for SLMS professional development. Of 2350 total SLMS in Florida, 161 AC and 318 TC SLMS responded to an online job task analysis. The strength of association between method of certification and perceptions of job tasks under the three themes (collaboration, leadership, and technology) were compared using statistical analysis (i.e. variance, standard deviation, t-tests, chi-square tests, and ANOVA). Longitudinal comparisons were made between this study and baselines studies from 1996 and 2006. There were no significant differences between AC and TC overall perceptions of collaboration, leadership and technology as indicated by the job task analysis survey. Two tasks within collaboration and technology themes had large significant differences in AC and TC responses. TC SLMS were more likely to "Assist students and/or teachers with general references services (e.g., answer reference questions)" and to "Evaluate the adequacy and suitability of facilities, equipment, materials, and services with regard to their impact on learning outcomes." TC SLMS were significantly more familiar with IP2, made more attempts to implement IP2, and attended more in-services on IP2. Observations and interviews with two AC and two TC SLMS triangulated the survey data and explored questions related to professional development. Interview participants advocated for content developed by other SLMS and mentorship training. SLMS asserted that professional development should include school and county protocols, evaluation tools and methods, relevant and accessible technologies (i.e. school and district software, Student Information System, Library Databases Standards such as CORE Curriculum). The SLMS indicated a preference for the following professional development methods: SLMS designed and implemented professional development; formal and informal SLMS sharing; differentiation and options to opt-out based on prior experiences and expertise; relevant and accessible technology training; and mentorship. These findings inform ways to effectively recruit, train, certify, and differentiate instruction in SLMS programs and professional development courses. Furthermore, our qualitative findings indicate a need to examine the impact of reduced budgets on school library media programs. Future studies should investigate the impact of increased numbers of non-certified SLMS and cuts to library staff on student achievement and K-12 learning communities. While this study counted the total number of non-certified SLMS in addition to the AC and TC SLMS, results from the sample of non-certified SLMS collected during the job task analysis were not analyzed because it was too small for comparison or generalizability.
APA, Harvard, Vancouver, ISO, and other styles
17

McRae, Brad Marcus. "Technology and Organizational Decision-Making: A Qualitative Case Study Approach." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7490.

Full text
Abstract:
Technology and communication skills simultaneously increase organizational productivity and decision-making. However, excessive use of technology to make decisions can diminish the added benefits that nonverbal communication can bring. The interpersonal sensitivity effects on perception of service quality model, face-to-face communication versus teleconferencing, the technology acceptance model, and decision-making were the conceptual framework of the study. The research questions examined how excessive use of technology to make decisions can diminish the added benefits that nonverbal communication can bring to organizational leadership decision-making. Employing an exploratory multiple case study design, organizational leaders from the Southern California region, ranging in seniority from team-leader through executive, completed 25 member-checked interviews and 15 qualitative questionnaires. Using Yin's 5-step approach to analyzing the data, 8 themes remerged. From these themes, I developed 5 findings regarding technology, non-verbal communication, and decision-making. My study affects positive social change by educating organizational leaders on the importance of distancing themselves from work during nonwork hours, encouraging organizational leaders to develop guidelines around the use of teleconference software, promoting organizational learning with an emphasis on soft-skill training, and acknowledging when there is a misunderstanding in nonverbal communication. Organizational leaders can improve decision-making by using the favorable traits associated with both electronic and nonverbal behavioral communications.
APA, Harvard, Vancouver, ISO, and other styles
18

Powless, Seth J. "College Student Satisfaction: The Impact of Facebook and Other Factors." University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1296829879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Webster, Steve. "Information technology for change : a survey of peace movement organisations and other NGOs in Britain: summary of findings (1995-97)." Thesis, University of Bradford, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.369216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Nilsson, Karin. "Information och funktion i ett kapprum : Examensarbete mot informationsdesign." Thesis, Mälardalen University, Department of Innovation, Design and Product Development, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-720.

Full text
Abstract:
<p>Rapporten beskriver arbetet med att ta fram ett förändringsförslag för ett kappprum. Kapprummet finns i Elimkyrkan i Eskilstuna. Vid framtagandet av förslaget skulle särskild uppmärksamhet ägnas åt information/anslagstavlor, men utan att försumma helheten. Den problemformulering som utformades som en sammanfattning av uppgiften var: Visualisering av förslag som förbättrar kommunikation och funktion i Elimkyrkans kapprum.</p><p>Resultatet visualiserades med hjälp av Open Source programmet Blender.</p>
APA, Harvard, Vancouver, ISO, and other styles
21

Kotte, Hari Babu. "High Speed (MHz) Switch Mode Power Supplies (SMPS) using Coreless PCB Transformer Technology." Licentiate thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-13964.

Full text
Abstract:
The most essential unit required for all the electronic devices is the Power Supply Unit (PSU). The main objective of power supply designers is to reduce the size, cost and weight, and to increase the power density of the converter. There is also a requirement to have a lower loss in the circuit and hence in the improvement of energy efficiency of the converter circuit. Operating the converter circuits at higher switching frequencies reduces the size of the passive components such as transformers, inductors, and capacitors, which results in a compact size, weight, and increased power density of the converter. At present the switching frequency of the converter circuit is limited due to the increased switching losses in the existing semiconductor devices and in the magnetic area, because of increased hysteresis and eddy current loss in the core based transformer. Based on continuous efforts to improve the new semi conductor materials such as GaN/SiC and with recently developed high frequency multi-layered coreless PCB step down power transformers, it is now feasible to design ultra-low profile, high power density isolated DC/DC and AC/DC power converters. This thesis is focussed on the design, analysis and evaluation of the converters operating in the MHz frequency region with the latest semi conductor devices and multi-layered coreless PCB step-down power and signal transformers. An isolated flyback DC-DC converter operated in the MHz frequency with multi-layered coreless PCB step down 2:1 power transformer has been designed and evaluated. Soft switching techniques have been incorporated in order to reduce the switching loss of the circuit. The flyback converter has been successfully tested up to a power level of 10W, in the switching frequency range of 2.7-4 MHz. The energy efficiency of the quasi resonant flyback converter was found to be in the range of 72-84% under zero voltage switching conditions (ZVS). The output voltage of the converter was regulated by implementing the constant off-time frequency modulation technique. Because of the theoretical limitations of the Si material MOSFETs, new materials such as GaN and SiC are being introduced into the market and these are showing promising results in the converter circuits as described in this thesis. Comparative parameters of the semi conductor materials such as the vi energy band gap, field strengths and figure of merit have been discussed. In this case, the comparison of an existing Si MOSFET with that of a GaN MOSFET has been evaluated using a multi-layered coreless PCB step-down power transformer for the given input/output specifications of the flyback converter circuit. It has been determined that the energy efficiency of the 45 to 15V regulated converter using GaN was improved by 8-10% compared to the converter using the Si MOSFET due to the gate drive power consumption, lower conduction losses and improved rise/fall times of the switch. For some of the AC/DC and DC/DC applications such as laptop adapters, set-top-box, and telecom applications, high voltage power MOSFETs used in converter circuits possess higher gate charges as compared to that of the low voltage rating MOSFETs. In addition, by operating them at higher switching frequencies, the gate drive power consumption, which is a function of frequency, increases. The switching speeds are also reduced due to the increased capacitance. In order to minimize this gate drive power consumption and to increase the frequency of the converter, a cascode flyback converter was built up using a multi-layered coreless PCB transformer and this was then evaluated. Both simulation and experimental results have shown that with the assistance of the cascode flyback converter the switching speeds of the converter were increased including the significant improvement in the energy efficiency compared to that of the single switch flyback converter. In order to further maximize the utilization of the transformer, to reduce the voltage stress on MOSFETs and to obtain the maximum power density from the power converter, double ended topologies were chosen. For this purpose, a gate drive circuitry utilising the multi-layered coreless PCB gate drive transformer was designed and evaluated in both a Half-bridge and a Series resonant converter. It was found that the gate drive power consumption using this transformer was less than 0.8W for the frequency range of 1.5-3.5MHz. In addition, by using this gate drive circuitry, the maximum energy efficiency of the series resonant converter was found to be 86.5% with an output power of 36.5W.
APA, Harvard, Vancouver, ISO, and other styles
22

Jonéus, Carl. "Analysis of Scalable Blockchain Technology in the Capital Market." Thesis, Uppsala universitet, Avdelningen för datalogi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-326151.

Full text
Abstract:
Financial interactions on the capital market involve a wide variety of actors and processes. The requirement of security and privacy results to a large extent in non-shared and unintegrated databases among the different parties, leading to complex, time consuming and costly procedures. The last decade's introduction of innovative blockchain technologies such as Bitcoin, has brought attention to the possibilities of decentralized peer-to-peer networking in general, and its potential influence in the financial sector in particular. This master thesis investigates the possibilities for the capital market to adapt such a system from a technical point of view, with main focus on scalability. The analysis covers crucial aspects such as a peer-to-peer application's ability to handle large transaction volumes while maintaining security. The degree project also includes continued work on Visigon's blockchain application prototype with main focus on the network communication, as well as simulations of its performance capability. Results from the simulations showed that the transaction throughput capacity is limited to the time of broadcasting the transaction to the network, and thus decreasing linearly with increasing network size. The required time for handling other parts in the process appears constant and takes up a small fraction of the total time, therefore future work lays in further optimization of the communication protocol.
APA, Harvard, Vancouver, ISO, and other styles
23

Ishmael, Shu Aghanifor. "Information and Communication Technology in developing economies : A literature review on the reasons for failures of ICT; The case of Cameroon." Thesis, Örebro universitet, Handelshögskolan vid Örebro universitet, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-17218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

McIntosh, Linda Anne-Marie. "Reducing Technology Costs for Small Real Estate Businesses Using Cloud and Mobility." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3534.

Full text
Abstract:
Increased client accessibility strategies, awareness of technology cost, and factors of third-party data security capabilities are elements small real estate business (SREB) owners need to know before adopting cloud and mobility technology. The purpose of this multiple case study was to explore the strategies SREB owners use to implement cloud and mobility products to reduce their technology costs. The target population consisted of 3 SREB owners who had experience implementing cloud and mobility products in their businesses in the state of Texas. The conceptual framework of this research study was the technology acceptance model theory. Semistructured interviews were conducted and the data analyzed for emergent themes. Member checking was subsequently employed to ensure the trustworthiness of the findings. Three important themes emerged: client accessibility strategies, product affordability, and transferability of information technology security risks. The findings revealed SREB owners used informal strategies based on the customer-centric necessity to implement cloud and mobility technology costs. The SREB owners' highest strategic priority was the ability to access their clients, followed by cost reduction and securing client information. The findings may contribute to social change by providing possible insights to survivability for SREB owners through cost reduction, reduced security risks, and the increased ability to deliver the dream of home ownership to their clients while contributing to the economy and enhancing the community standards of living.
APA, Harvard, Vancouver, ISO, and other styles
25

Johansson, Marcus. "Soil Moisture Monitoring System Using LoRaWAN Technology." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105670.

Full text
Abstract:
An IoT device measuring soil moisture to help a municipality improve the work surrounding irrigation is deployed for testing and used by the concerned municipal workers. The IoT device is an initial prototype using Pycom’s LoPy4 with expansion board 3.1 and 3xAAA batteries as power supply. The prototype is not suitable for larger-scale testing due to the size, cost, and power consumption. This thesis focuses on decreasing the cost and size while increasing the battery life for the IoT device.The IoT device is communicating using the LoRaWAN protocol. For the device to be as energy-efficient as possible, the LoRa and LoRaWAN protocol are explored to use all possibilities to save energy. Active time and power consumption between different spreading factors are examined and discussed for power consumption and range concerns. The prototype produced by the work performed in this thesis is used to measure soil moisture. The microcontrollers selected and tested will not restrict to that purpose. The microcontrollers can integrate with many kinds of sensors. Integration with other types of sensors is under future work in this thesis. The integration possibilities making the thesis relevant for anyone with an intermediate knowledge inprogramming wanting to get introduced into the IoT development cycle, develop aLoRa node, and learning how to use the LoRaWAN stack with MicroPython.
APA, Harvard, Vancouver, ISO, and other styles
26

Schneider, Stephanie K. "INFORMATION AND COMMUNICATION TECHNOLOGIES IN PUBLIC CHILD WELFARE: A SYSTEMATIC LITERATURE REVIEW." CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/473.

Full text
Abstract:
This systematic literature review synthesizes findings from empirical studies published between 1989 and 2016 to examine types, use, purpose and implementation of information and communication technology in public child welfare to determine if there are thematic reoccurrences in these arenas. Study results yielded information to the field of social work and public child welfare by determining themes in successful usage, purpose and implementation of information and communication technology in public child welfare to better serve those vulnerable populations. This systematic literature review contextualizes and identifies these themes across the literature. Studies included in this review were analyzed and categorized to determine reoccurring themes in information and communication technology use, purpose and implementation.
APA, Harvard, Vancouver, ISO, and other styles
27

Ajuzie, Peter. "Utilization of information and communication technology and educational games in senior secondary schools in Owerri, Imo state Nigeria : Challenges and prospects." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-12929.

Full text
Abstract:
Use of information and communication technology in formal education settings is a fundamental issue in management of education across the globe. But in Africa the issues takes a different turn as it regards to how to apply and utilize technology in education. Facility and technology experts have been on debate across board as the literature implies. Thus, understanding the digital native factors behind individuals’ application and utilization is central to the development of ICT in Nigeria and Africa in general. The main goal of this thesis was to explore factors influencing effective utilization of computer and ICT (Computer laboratories) in the secondary school level. However, in the literature the thesis identify issues affecting utilization of computer and ICT facilities in Sub-Sahara Africa (SSA), Nigeria and secondary schools (SS). The thesis proposed the use of educational games to drive the concept of utilization of computer and ICT facilities in the educational sector. In addition to the main goal of the thesis, use of computer and ICT facilities in secondary schools are explored alongside teachers and students interest in educational games. Qualitative interviews and a questionnaire survey were used in conduct of the study. Thematic and descriptive analysis was used to analyze the qualitative and quantitative data respectively. The results indicate that computer and ICT facilities (Computer laboratories) were poorly utilized by teachers and students due to lack of funds, poor infrastructure and technology knowledge. The results also demonstrate that teachers and students have knowledge about educational games and are willing to apply it in teaching and learning. But the issues of application of educational games into the mainstream could be hindered by Government curriculum policy and infrastructural facilities. The study indicates the relevance of applying educational games in secondary schools to reduce the level of digital divide among graduates. This thesis further argues that the inclusion of educational games would encourage teachers and students to effectively utilization of computer and ICT Facilities (Computer laboratory).
APA, Harvard, Vancouver, ISO, and other styles
28

Nyberg, Dan. "An investigation of qualitative research methodology for perceptual audio evaluation." Licentiate thesis, Luleå tekniska universitet, Medier ljudteknik och upplevelseproduktion och teater, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-17438.

Full text
Abstract:
This thesis investigates whether a qualitative research method, using phenomenological interviews and analysis, can be successfully applied to perceptual audio research, a field heretofore that has mainly used quantitative methods. The method is investigated by studying the types of information elicited by the method and the information’s usefulness and relevance to the conducted study. The qualitative method is applied in three different conditions: a non-experimental condition, an experimental condition, and an experimental condition using mixed-methods. The thesis also identifies implications associated with using a qualitative method in a quantitative field of research, implications that researchers should acknowledge and consider. All scientific criteria in which the quantitative research is judged cannot directly be applied to a qualitative method. A qualitative method has to be judged on its own framework, departure points, and scientific criteria. The information elicited from the qualitative method contains information that supports known knowledge and adds new knowledge. It supplements the accessibility to the subjects’ perceptions and used methods when conducting a perceptual evaluation task. In conclusion, a qualitative research method that consists of phenomenological interviews and analyses can be successfully applied in all the tested conditions.<br><p>Godkänd; 2012; 20121119 (dannyb); LICENTIATSEMINARIUM Ämne: Ljudteknik Examinator: Biträdande professor Jan Berg, Luleå tekniska universitet Diskutant: PhD, Senior Lecturer Natanya Ford, Bucks New University, United Kingdom Tid: Fredag den 18 januari 2013 kl 13.00 Plats: L165, Musikhögskolan Piteå, Luleå tekniska universitet</p>
APA, Harvard, Vancouver, ISO, and other styles
29

Charupa, Thanaporn. "Perspectives on RFID Readiness : A Comparative Analysis Between Skanska and Datema." Thesis, University of Gävle, Department of Technology and Built Environment, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-6350.

Full text
Abstract:
<p>In global supply chain management, radio frequency identification RFID has emerged within the last decade and became a superior technology for information storage. However, the technology has not yet been widely accepted or used in comparison to the barcode.</p><p>The underlying interest is to explore RFID technology, to understand the benefits and drawback that this innovation brings. Once functionality and application comprehension is overviewed, specific models such as SWOT analysis, Real Option Theory, Technology Push-Pull model and RFID Implementation stages can be applied to evaluate a firm’s RFID readiness.</p><p>The findings are based on two Swedish case companies Skanska Maskin AB and Datema. Information from the case companies are consolidated and aggregated to analyze and derive the methods used to discover the firm’s ability to adopt RFID. The analysis will discuss the factors involved with the technology and recommendations for future studies are given.</p>
APA, Harvard, Vancouver, ISO, and other styles
30

Emmel, William M. "Process improvement and information technology illustrated through the Naval Aviation Production Process Improvement (NAPPI) and the Flight Hour (FHP)/Flight Hour Other (FO) programs." Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/9896.

Full text
Abstract:
MBA Professional Report<br>Proper execution of appropriated funds is critical if the Navy hopes to maximize the optimization of their limited resources. The Navy's Flight Hour (FHP) and Flight hour Other (FO) programs are no exception. These programs are being managed by good people, utilizing inefficient and out dated practices that do not adequately take advantage of the many Process Change and Information Technology resources currently available in today's Navy. This project report will highlight the need for change in the FHP/FO budget management process, discuss successful process change efforts within the Navy, demonstrate the functionality of change in the FHP/FO management process through information technology, and provide a roadmap to a solution that is in alignment with the Navy's goals outlined in Naval Power 21p5sA Naval Vision. Process Change using Information Technology is a mandate in DoD. Information Technology can be the enabler to PC that allows more effective and efficient use of the Navy's most powerful resource - its people.
APA, Harvard, Vancouver, ISO, and other styles
31

He, Fang. "DECISION FACTORS FOR THE ADOPTION OF E-FINANCE AND OTHER E-COMMERCE ACTIVITIES." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1791777521&sid=7&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
Abstract:
Thesis (Ph. D.)--Southern Illinois University Carbondale, 2009.<br>"Department of Management." Keywords: E-commerce, E-finance, Information technology adoption, Online banking, Online payment, Online shopping. Includes bibliographical references (p. 172-191). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
32

Sellén, Morgan, Kalle Krantzén, and Andreas Nilsson. "Distansmöten i arbetslivet : Vilka skäl finns det för att hålla möten på distans och hur hanteras distansmöten på bästa sätt?" Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2214.

Full text
Abstract:
<p>När vi skriver detta examensarbete, år 2008, är debatten om miljön stor om hur konsumenten,</p><p>företagen, staten etc. kan minska sin miljöpåverkan genom att jobba smartare. Inom</p><p>företagen bedrivs som bekant ett ständigt arbete med hur man kan reducera sina kostnader.</p><p>Vi har valt att skriva om de möten i arbetslivet som kan hållas på distans, ett område som</p><p>går båda debatterna till mötes.</p><p>Eftersom många mötesdeltagare (deltagare) idag flyger eller åker bil för att komma till och</p><p>från möten så genererar distansmöten fördelar som att det reducerar företagens kostnader</p><p>samtidigt som det ger en minskad miljöpåverkan. Vi har i vår studie närmare undersökt hur</p><p>distansmöten bedrivs idag inom de två företag som vi är verksamma inom, vilka policys</p><p>och verktyg som finns för att främja dessa och hur deltagarna själva ser på saken. Detta för</p><p>att få svar på de forskningsfrågor som vi gemensamt arbetat fram i samråd med vår handledare.</p><p>Forskningsfrågorna är följande, Vilka skäl finns det till att hantera möten på distans</p><p>jämfört med traditionella fysiska möten? Vilka typer av möten kan hanteras på distans? Hur</p><p>kan effektiva och kvalitativa möten hållas på distans? Hur kan en organisation främja distansmöten?</p><p>Vårt syfte är att undersöka om det finns några tydliga mönster angående vilka möten en organisation</p><p>hanterar på distans och i så fall skapa en djupare förståelse för dessa och de riktlinjer</p><p>som idag finns för distansmöten. Ett av våra mål är också att det material vi får fram</p><p>skall kunna fungera stödjande vid utformning av mötespolicys.</p><p>Den metod som vi använt är triangulering där vår insamling av primärdata gjordes med totalt</p><p>16 st intervjuer och en enkät där hela 146 av ca 400 respondenter svarade. Vi har även</p><p>använt sekundärdata genom dokument såsom resepolicys och miljöpolicys. Parallellt med</p><p>vår insamling av empiriskt material har vi studerat relevant litteratur som tar upp ämnesområdet</p><p>distansmöten.</p><p>Vi har i rapporten valt att avgränsa oss och endast fokusera på interna möten i de båda studerade</p><p>företagen eftersom den sociala relationen i externa möten ofta ses som alltför viktig</p><p>för att i större utsträckning hanteras via distans.</p><p>Studien visar att en medvetenhet om de fördelar distansmöten ger kostnadsmässigt och</p><p>miljömässigt finns i de studerade företagen, men att de främsta skälen till att hantera möten</p><p>på distans ur deltagarens perspektiv är kostnadsbesparingen och den tidsvinst de genererar.</p><p>Resultatet pekar också på att alla typer av interna möten kan hanteras via distans, men att</p><p>förhandlingar är den mötestyp som är absolut svårast. Flertalet faktorer som exempelvis</p><p>mötets karaktär, kostnad, tillgänglig teknik och deltagarnas vana vid distansmöten påverkar</p><p>också starkt huruvida ett möte hanteras på distans eller inte.</p><p>För att få till stånd effektiva och kvalitativa distansmöten så visar studien att krav ställs på</p><p>tydlighet i vad som skall avhandlas och hur detta ska skötas, ordförandens egenskaper, de</p><p>tekniska hjälpmedlen samt att tiden för mötet begränsas till max 1-2 timmar. Tydlighet visar</p><p>sig också vara en avgörande faktor ur ett organisatoriskt perspektiv där de policys och</p><p>riktlinjer som sätts indirekt och direkt påverkar hur distansmöten bedrivs i organisationens</p><p>olika delar.</p>
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Tao. "Spatial Data Infrastructure (SDI) in China : Some potentials and shortcomings." Thesis, Gävle : University of Gävle. Department of Business Administration and Economics, 2008. http://www.diva-portal.org/smash/get/diva2:139475/FULLTEXT01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Runvall, Linda, and Satu Parantainen. "Att utforma en teknisk manual : Med tillhörande riktlinjer." Thesis, Mälardalen University, Department of Innovation, Design and Product Development, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-451.

Full text
Abstract:
<p>Vi, Linda Runvall och Satu Parantainen, har gjort vårt examensarbete för företaget Leine & Linde i Strängnäs. De tillverkar pulsgivare som används inom industrin. Examensarbetet bestod av att göra om en befintlig manual och skriva guidelines (riktlinjer) till Leine & Lindes personal.</p><p>Under vårt examensarbete har vi använt oss av våra kunskaper inom informationsdesign. Rune Pettersson, professor i informationsdesign vid Mälardalens högskola, beskriver ämnet informationsdesign såhär:</p><p>”In order to satisfy the information needs of the intended receivers information design comprises analysis, planning, presentation and understanding of a message- its content, language and form. Regardless of the selected medium, a well designed information set will satisfy aesthetic, economic, ergonomic, as well as subject matter requirements” (Pettersson, 2002, preface).</p><p>Syftet med arbetet var att kunna utforma en användbar och lättförståelig manual. Den tekniska beskrivningen ska ge användare som har tillräckliga grundkunskaper information om produkten så att de lättare ska förstå instruktionerna och anvisningarna (STG handbok 169, 1999, s. 16). Vi har förbättrat en befintlig manual och anpassat den till Leine & Lindes målgrupp. Företaget vill kunna använda vår manual tillsammans med guidelines för att utforma alla sina manualer på samma sätt.</p><p>Syftet med guidelines var att instruera personalen om hur de ska skriva sina manualer. Där finns information om hur de ska skriva och utforma manualer.</p><p>Utprovningarna visade att målgruppen föredrog vår manual eftersom den var lättläst och överskådlig.</p>
APA, Harvard, Vancouver, ISO, and other styles
35

Rogstadius, Jakob. "Visualizing the Ethiopian Commodity Market." Thesis, Linköping University, Department of Science and Technology, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-19564.

Full text
Abstract:
<p>The Ethiopia Commodity Exchange (ECX), like many other data intensive organizations, is having difficulties making full use of the vast amounts of data that it collects. This MSc thesis identifies areas within the organization where concepts from the academic fields of information visualization and visual analytics can be applied to address this issue.Software solutions are designed and implemented in two areas with the purpose of evaluating the approach and to demonstrate to potential users, developers and managers what can be achieved using this method. A number of presentation methods are proposed for the ECX website, which previously contained no graphing functionality for market data, to make it easier for users to find trends, patterns and outliers in prices and trade volumes of commodieties traded at the exchange. A software application is also developed to support the ECX market surveillance team by drastically improving its capabilities of investigating complex trader relationships.Finally, as ECX lacked previous experiences with visualization, one software developer was trained in computer graphics and involved in the work, to enable continued maintenance and future development of new visualization solutions within the organization.</p>
APA, Harvard, Vancouver, ISO, and other styles
36

Taylor, Pamela Denise. "Promoting Information Literacy through Teacher - School Library Media Specialist Collaboration." ScholarWorks, 2015. http://scholarworks.waldenu.edu/dissertations/1718.

Full text
Abstract:
Schools that support collaboration between teachers and school library media specialists (SLMS) outperform those that do not. Teachers at a rural Georgia middle school were not using the library media program or being trained on how to collaborate with the SLMS to promote student achievement. Guided by Bruner's socioconstructivist theory of learning, the purpose of this descriptive case study was to investigate teachers' experiences with integrating technology and information literacy into the curriculum and to examine the collaborative services the SLMS could provide to enhance integration. Eight teachers in Grades 6th through 8th comprised the sample. Data sources included teacher lesson plans and interviews. Data analysis included line-by-line coding of interviews and lesson plans to generate themes. According to study results, teachers were limiting the integration of technology and information literacy into the curriculum because of their lack of awareness of the SLMS's role as an instructional partner, students' lack of information literacy skills, fear, and time constraints. The resulting project was a series of professional development sessions to increase awareness among teachers of the role of the SLMS as an instructional partner in promoting technology use and information literacy among students. This project may facilitate social change by promoting a collaborative culture as teachers and SLMS work together to expose students to information literacy and technology, ultimately creating students who are skillful researchers and critical thinkers, better prepared for lifelong learning.
APA, Harvard, Vancouver, ISO, and other styles
37

Nyabando, Chiwaraidzo Judith. "An Analysis of Perceived Faculty and Staff Ccomputing Behaviors That Protect or Expose Them or Others to Information Security Attacks." Digital Commons @ East Tennessee State University, 2008. https://dc.etsu.edu/etd/1972.

Full text
Abstract:
A mixed-methods study, conducted in 2007-2008, designed to quantify and assess behaviors that either protect or expose data at academic institutions to information security attacks. This study focused on computing practices at two academic institutions: East Tennessee State University and Milligan College. Interviews with six information technology professionals and online surveys were used to assess faculty and staff members' awareness and practice of safe computing behaviors. The constant comparison method was used to analyze qualitative data. Descriptive statistics and univariate and multivariate analysis of variance techniques were used to analyze the quantitative data. Overall, the analyses indicated that the faculty and staff members at these institutions were equally aware of information security issues and practices and tended to practice safe computing behaviors--though apparently at a level that was less than commensurate with their awareness of these behaviors. Raised awareness correlated with safe computing behaviors, as did computer usage: those who had used computers for more than 20 years appeared to be more aware of safe practice than those who had used computers for 20 years or less. Password management emerged as a major challenge for the participants. They were also concerned with phishing emails and they tended not to be aware of FERPA regulations.
APA, Harvard, Vancouver, ISO, and other styles
38

Robinette, Jennifer Lynn. "UNDERSTANDING INTERACTIVE EXPERIENCES: PERCEIVED INTERACTIVITY AND PRESENCE WITH AND WITHOUT OTHER AVATARS IN THE ONLINE VIRTUAL WORLD SECOND LIFE." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/145.

Full text
Abstract:
Interactivity research lacks consensus regarding the qualities and consequences of interactive experiences. Empirical proof is needed to substantiate the numerous interactivity theories and provide direction for new media technology developers. Specifically, there is a shortage of research on differences between user experiences of interactivity when technology enables communication versus when it does not. In addition, interactivity research is often confounded by the construct of presence. This study’s objectives included: 1) identifying qualities associated with interactive experiences; 2) disambiguating the constructs of interactivity and presence; and 3) developing a measure of perceived interactivity for VW research. The experimental design measured perceived interactivity and presence following completion of a simple task in the online Virtual World (VW) known as Second Life. It was hypothesized that both perceived interactivity and presence would be greater for subjects encountering avatars believed to be controlled by other people than for subjects encountering no other avatars in the VW. A total of 180 subjects from the University of Kentucky participated in a 2 by 4 factorial experiment. Perceived interactivity was measured by modifying McMillan and Hwang’s Measure of Perceived Interactivity for the VW context. Two essential qualities of interactive experiences were identified: Responsiveness and engagement. These qualities are characteristic of unmediated, FTF conversation, which was perceived as the most interactive communication context above technologies routinely described as interactive. Decreased responsiveness of technology at a second study venue caused significant decline in perceived interactivity, demonstrating the importance of a technology’s reaction speed and control provided to the user. Significant main effects for perceived interactivity due to encountering other avatars were confounded by interaction effects due to differences in technology responsiveness. Interactivity and presence appear to be separate psychological constructs which covary in the context of a new media experience. Implications and directions for future research are discussed.
APA, Harvard, Vancouver, ISO, and other styles
39

Vlisides, James C. "Rendering the Other: Ideologies of the Neo-Oriental in World of Warcraft." Bowling Green State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363105916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Jozsef, Daniel. "User Attitudes around Key Management, and their Impact on Blockchain Technology Adoption." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-77065.

Full text
Abstract:
The following study examines the background of users’ decisions about their behavior concerning online identity, specifically looking at the acceptance or rejection of self-sovereign identity solutions and the technologies that support them: blockchain and asymmetric encryption. A qualitative analysis is presented of typical user narratives concerning online behavior, while exploring the cultural values underlying users’ decisions about accepting or rejecting new, potentially emancipatory technologies. The results include inventories of values and beliefs that played a key part in informing the respondents’ behaviors, and presents four distilled narratives of reasoning about online identity in the form of the archetypes of the ​Pragmatist, the Self-doubter, the ​Cyber-conscious and the ​Futurist user, each representing a specific set of values, beliefs and their interplay resulting in specific intentions and behaviors, along with design guidelines for innovative blockchain technologies based on the user expectations in these narratives. The research concludes with relating the findings to existing theory, and proposing a number of quantitatively testable hypotheses for the refinement of technology acceptance research in the specific domain of online security and identity.
APA, Harvard, Vancouver, ISO, and other styles
41

Demšar, Urška. "Data mining of geospatial data: combining visual and automatic methods." Doctoral thesis, KTH, School of Architecture and the Built Environment (ABE), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3892.

Full text
Abstract:
<p>Most of the largest databases currently available have a strong geospatial component and contain potentially useful information which might be of value. The discipline concerned with extracting this information and knowledge is data mining. Knowledge discovery is performed by applying automatic algorithms which recognise patterns in the data.</p><p>Classical data mining algorithms assume that data are independently generated and identically distributed. Geospatial data are multidimensional, spatially autocorrelated and heterogeneous. These properties make classical data mining algorithms inappropriate for geospatial data, as their basic assumptions cease to be valid. Extracting knowledge from geospatial data therefore requires special approaches. One way to do that is to use visual data mining, where the data is presented in visual form for a human to perform the pattern recognition. When visual mining is applied to geospatial data, it is part of the discipline called exploratory geovisualisation.</p><p>Both automatic and visual data mining have their respective advantages. Computers can treat large amounts of data much faster than humans, while humans are able to recognise objects and visually explore data much more effectively than computers. A combination of visual and automatic data mining draws together human cognitive skills and computer efficiency and permits faster and more efficient knowledge discovery.</p><p>This thesis investigates if a combination of visual and automatic data mining is useful for exploration of geospatial data. Three case studies illustrate three different combinations of methods. Hierarchical clustering is combined with visual data mining for exploration of geographical metadata in the first case study. The second case study presents an attempt to explore an environmental dataset by a combination of visual mining and a Self-Organising Map. Spatial pre-processing and visual data mining methods were used in the third case study for emergency response data.</p><p>Contemporary system design methods involve user participation at all stages. These methods originated in the field of Human-Computer Interaction, but have been adapted for the geovisualisation issues related to spatial problem solving. Attention to user-centred design was present in all three case studies, but the principles were fully followed only for the third case study, where a usability assessment was performed using a combination of a formal evaluation and exploratory usability.</p>
APA, Harvard, Vancouver, ISO, and other styles
42

Larsson, Caroline. "Designbok till Indiskas marknadsavdelning." Thesis, Mälardalen University, Department of Innovation, Design and Product Development, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-551.

Full text
Abstract:
<p>Designboken kan liknas vid en visuell manual där regler bland annat läggs för mallar, teckensnitt och trycksaker. Designboken som tagits fram i detta arbete innehåller en informationsdel och en inspirationsdel för att både förtydliga regler inom företaget samt komma med förslag på arbetssätt och idéer till grafisk formgivning. Den grafiska formgivningen i arbetet behandlar exempel för visitkort, brevpapper och broschyrer, men också förslag på mönster och illustrationer till presentpapper och påsar.</p><p>Syftet har varit att skapa en användarvänlig designbok, där målet är att Indiska ska bli tydlig i sin interna och externa information. Teorier och processer inom informationsdesign har legat som grund för arbetet, då informationsdesign innebär att definiera, planera och utforma innehållet i ett meddelande och förhållandet som det presenteras på.</p>
APA, Harvard, Vancouver, ISO, and other styles
43

HEYDARI, AMANDA. "Enablers of Continuous Improvement When Using a PDCA Cycle Based Information Technology Tool : A Comparative Study of Two Swedish Logistics Centers Within Grocery Retail." Thesis, KTH, Industriell ekonomi och organisation (Inst.), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-237292.

Full text
Abstract:
Logistics centers can implement continuous improvement in order to stay competitive. Enablers of continuous improvement have been widely researched in academia. However, there is a gap regarding research about enablers in organizations using a plan-do-checkact (PDCA) cycle based IT tool to support their continuous improvement process. This study investigates the enablers of employees posting, implementing, and following up continuous improvement suggestions when using a PDCA cycle based IT tool and the support this IT tool provides for a logistics center. This was done by conducting a comparative study of two logistics centers working with grocery retail; one center in Västerås, where the employees had exceeded their goals for amount of posted, implemented, and followed up suggestions for 2017, and another one in Kallhäll, where they did not meet their goal for 2017. Qualitative data was gathered by carrying out eight interviews, four at each logistics center, with employees holding different positions within the organization. The study identified that for a logistics center to succeed with its continuous improvement efforts, it should have a well developed understanding of continuous improvement and the IT Tool. Employees need to be supported by providing them with an easy way to give suggestions and a leadership where improvement initiatives are supported. Employees should also be provided with sufficient resources, examples of successful improvement implementations, and feedback on all their suggestions. The organization must also consider continuous improvement as a long-term commitment and set a clear goal for their work with it. Lastly, employees at all levels need to be involved in all stages of the continuous improvement process and have a committed management team. The study also identified that the PDCA cycle based IT tool supported the organization in their work with continuous improvement by providing them a structure, which the employees were enforced to work by. The structure also enabled the organization to handle a large amount of suggestions and employees to easily post suggestions independently of their location. The tool also supported the organization by acting as a database, sending notifications, and providing the centers with statistics.<br>Ständiga förbättringar kan implementeras för att göra ett logistikcenter konkurrenskraftigt. Det har sedan tidigare bedrivits forskning för att identifiera faktorer som främjar implementationen av ständiga förbättringar. Det finns dock brist på forskning gällande vilka faktorer som främjar ständiga förbättringar i en organisation som använder sig av ett IT verktyg som är baserat på PDCA (planera-göra-studera-agera) cykeln. Den här studien syftar därför till att identifiera vad som främjar medarbetare att föreslå, implementera, och följa upp förbättringsförslag i ett logistikcenter som använder ett PDCAbaserat IT-verktyg och vilket stöd verktyget ger ett logistikcenter. För att besvara forskningsfrågorna gjordes en jämförelsestudie av två logistikcenter inom dagligvaruhandeln; ett center i Västerås där medarbetarna hade överträffat 2017 års mål gällande antalet inlämnade, genomförda, och uppföljda förslag, och ett center i Kallhäll där målen för 2017 inte hade uppnåtts. Kvalitativ data samlades in genom att intervjua åtta personer, fyra på varje center, med olika befattningar inom organisationen. Studien identifierade ett antal faktorer som hjälper en organisation att lyckas med sin satsning på ständiga förbättringar. Bland annat måste medarbetarna ha en förståelse av ständiga förbättringar och IT-verktyget. Medarbetare behöver ett enkelt sätt att ge förslag som är oberoende av var de befinner sig och ett ledarskap som stödjer förbättringsinitiativ. Medarbetare behöver också förses med tillräckliga resurser, exempel på framgångsrika förbättringar, och återkoppling på de förbättringsförslag de lämnat in. Logistikcentret måste dessutom se ständiga förbättringar som en långsiktig satsning och sätta ett tydligt mål för arbetet. Slutligen, borde alla medarbetare involveras i hela förbättringsprocessen och ledningsgruppen måste vara engagerad i frågan. Studien identifierade även att ett IT-verktyg baserat på PDCA-cykeln stödjer ett logistikcenter med deras arbete med ständiga förbättringar genom att förse dem med en struktur som måste efterföljas. Denna struktur möjliggör även för logistikcentret att hantera en stor mängd förbättringsförslag och att ge förslag oberoende av var de befinner sig. IT-verktyget stödjer även logistikcentret genom att skicka notifikationer, förse dem med statistik, och samla alla förbättringsförslag på ett ställe.
APA, Harvard, Vancouver, ISO, and other styles
44

Cox, Tyler L. "Development of ETSU Student Life Android Application." Digital Commons @ East Tennessee State University, 2014. https://dc.etsu.edu/honors/231.

Full text
Abstract:
In this thesis, the author gives a description his journey creating and developing a Student Life Application for East Tennessee State University. This thesis will document his process with development as well as reflect on the struggles and victories in creation of this application.
APA, Harvard, Vancouver, ISO, and other styles
45

Rasool, Muhammad Ahsan, and Shafiq Hafiz Muhammad. "Blockchain Technology : a new domain for Cyber Forensics." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38242.

Full text
Abstract:
Traditional database with no prior security measures is becoming challenging in the era of data technology. Database storage on a central location with single point of failure and vulnerable to cyber attacks is getting exposed to big risk of being hacked with the evolution of powerful machines and modern hacking techniques. Since its commencement, the BlockChain technology has shown a promising performance for application buildup in diversed fields of life from cryptocurrency to smart contracts and decentralized applications. Although multiple studies on privacy, data confidentiality and security issues of BlockChain are performed but a systematic examination is still needs attention. In this thesis work we conduct a systematic study about the vulnerabilities of BlockChain system and review the security enhancement solutions that may point to a good future direction for further research into the area of BlockChain technology and its applications. Smart contracts are self-executable objects hosted on the 2nd generation blockchain like Ethereum, carry billions of SEK worth of cryptocoins and cannot be updated once deployed. Smart contracts are generally considered secure objects but the systematic analysis of technology and source code exposes a new class of vulnerabilities which are more likely an ethical aspect of programming than the software coding errors. Besides the literature review we empower our results with a static code analysis especially with the perspective of cyber forensics.
APA, Harvard, Vancouver, ISO, and other styles
46

Gargett, Ross. "The Use of Automated Speech Recognition in Electronic Health Records in Rural Health Care Systems." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/honors/340.

Full text
Abstract:
Since the HITECH (Health Information Technology for Economic and Clinical Health) Act was enacted, healthcare providers are required to achieve “Meaningful Use.” CPOE (Clinical Provider Order Entry), is one such requirement. Many providers prefer to dictate their orders rather than typing them. Medical vocabulary is wrought with its own terminology and department-specific acronyms, and many ASR (Automated Speech Recognition) systems are not trained to interpret this language. The purpose of this thesis research was to investigate the use and effectiveness of ASR in the healthcare industry. Multiple hospitals and multiple clinicians agreed to be followed through their use of an ASR system to enter patient data into the record. As a result of this research, the effectiveness and use of the ASR was examined, and multiple issues with the use and accuracy of the system were uncovered.
APA, Harvard, Vancouver, ISO, and other styles
47

Henriksson, Sam. "Technology Strategies for Personalized Marketing in the Computer Game Industry." Thesis, KTH, Industriell ekonomi och organisation (Inst.), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170615.

Full text
Abstract:
The computer game industry has during the past years performed a paradigm shift from physical to digital online retailing based on game portals. Due to the many possibilities Big Data in combination with personalized marketing provides, especially in the form on in-game shops in the software, it is interesting for the computer game companies to investigate how this marketing approach can be performed most beneficially. Since the computer game industry has not been thoroughly investigated in relation to personalized marketing and customer integrity, it has in this study been performed as a predictive research, based on how personalized marketing is used in other industries. This benchmark has been combined with a literature study as well as a case study on a Swedish computer game company, Paradox Interactive in the form of personal interviews, a customer survey as well as gathering of internal data. The analysis of the chosen industries, the grocery store industry, the travel and hospitality industry as well the online gambling industry, demonstrates the importance of offering the customers relevant marketing offers that benefits the customers as well as the company. This approach has been shown to imply a positive spiral of increased customer loyalty and raised revenue for the company. The performed customer surveys emphasizes high loyalty, satisfied customers, positive attitude for a loyalty program as well as for an in-game shop as well as a majority of positively minded customers for personalized marketing. The negatively minded was shown to be affected by data security, the feeling of being monitored as well as the fear for data spread. The investigation further shows a high level of technology knowledge among the computer game customers. This increases the importance of offering high data security as well as describes the used approaches for the customers. Based on these results recommendations related to the implementation of personalized marketing was developed for computer game companies. These emphasizes the importance of using secure techniques related to the data security and the explicit information related to this, which is argued to lead to increased trust amongst the customers and an increased willingness to share personal data. Further the data and information related to the customers should be gathered from different sources and be analyzed together in order to increase the deep of the knowledge about the customers, which enables more accurate and relevant offers. This relevance should be high, but well balanced in relation to the negative aspects related to customers’ possible feeling of being monitored.   For increased knowledge about the customers as well improved customer loyalty the computer game companies should implement loyalty programs, which should be well aligned with the image of the company. This study contributes to the theoretical field related to personalized marketing by investigating how current models and theories aligns with, or should be modified in order to match, the computer game industry. Besides from this it contributes with theories related to data security within the field of personalized marketing, focused on personal integrity and privacy. Theories related to the importance of trust from the customers and the relation between trust and loyalty has been verified for the computer game industry. The importance of identifying a well-balanced level of the personalization has been verified, which in turn falsifies the theories emphasizing that maximized personalization is to strive for. Theories related to key aspects to take into consideration related to data security and handling of personal data has been verified for the computer game industry related to the handling of Big Data.<br>Dataspelsindustrin har under åren gjort en resa från fysisk försäljning i butik till digital försäljning via spelportaler på internet. I och med de många möjligheter Big Data i kombination med personlig marknadsföring möjliggör, speciellt i formatet av en inbyggd försäljningskanal inuti mjukvaran, är det av stort intresse för företag i spelbranschen att undersöka hur personlig marknadsföring mest fördelaktigt utförs.  I och med att dataspelinsdustrin ej blivit undersökt med avseende på personlig marknadsföring och kunders integritet tidigare, har detta utförts i form av en förutsägande undersökning baserat på användning av personlig marknadsföring i andra industrier. Denna utvärderande analys har kombinerats med en litteraturstudie samt en fallstudie på det svenska dataspelsföretaget Paradox Interactive i form av intervjuer, en kundenkät samt insamling av intern data. Analysen av de valda industrierna, matvaruhandeln, rese- och hotellindustrin och onlinespelindustrin, påvisar vikten av att erbjuda kunderna relevanta erbjudanden som i längden gynnar såväl kunden som företaget. Detta har påvisats leda till en god spiral av ökad kundlojalitet och ekonomisk vinst för företaget. Utförda kundundersökningar påvisar hög lojalitet, nöjda kunder, positiv attityd till sålväl en inbyggd butik i mjukvaran som ett lojalitetsprogram samt en övervägande andel positiva attityder för personlig marknadsföring. De negativt inställda påverkas av såväl datasäkerheten, känslan av att vara övervakad samt rädslan för att data sprids till tredje part. Undersökningen visar även på en hög kunskapsnivå inom data hos kunderna, vilket höjer vikten av att erbjuda hög säkerhet och även av att förmedla detta till dem. Baserat på dessa resultat har rekommendation gällande implementationen av personlig marknadsföring tagit fram för dataspelsföretag. Dessa framhäver vikten av att ha hög datasäkerhet och förmedla detta till kunderna, vilket i sin tur gör kunderna mer trygga och villiga att dela personlig information. Vidare bör data och information om kunderna skall samlas in från olika kanaler och analyseras tillsammans i syfte att öka kunskapem om kunder, vilket ger möjligheten att erbjuda kunderna mer träffsäkra och relevanta erbjudanden. Denna relevans skall vara hög, men väl avvägd mot den negativa effekten som uppstår om kunden känner sig övervakad.   För utökad kunskap om kunderna och samtidigt generera höjd kundlojalitet skall företag i industrin implementera lojalitetsprogram, vilka skall vara enhetlig med företagets framtoning. Detta arbete bidrar till teorier inom personlig markandsföring genom att undersöka hur rådande teorier och modeller passar eller skall ändras för att matcha dataspelindustrin. Utöver detta bidrar arbetet till teorier gällande datasäkerhet inom området personlig markandsföring, med fokus på integritet och privatliv. Teorier gällande vikten av fötroende från kunderna och sambandet mellan förtroende och lojalitet har påvisats stämma för dataspelindustrin. Vikten av att hitta ett mellanläge för markandsförings relevans har påvisats stämma, vilket i sin tur dementerar teorier som påvisar att maximal relevans är eftertraktat. Teorier gällande huvudaspekter att ta hänsyn till gällande datasäkerhet och behandling av personlig data har påvisats stämma för datapselindustrin relaterat till behandlingen av Big Data.
APA, Harvard, Vancouver, ISO, and other styles
48

Mohammed, Leila, and Matilda Lidén. "Thriving towards extreme openness : A way of facilitating Fuzzy front-end activities by using communication technology." Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79525.

Full text
Abstract:
Purpose – This study has two different purposes. First, we aim to understand and describe the new phenomenon of extreme openness within the area of open innovation by answering the following question: How can this new concept of extreme openness within the Fuzzy front-end be understood and described? The second purpose of this study is to investigate how Fuzzy front-end activities can be held at a distance by answer the following question: Which technology-based communication can facilitate distance-based Fuzzy front-end activities? Method – This study was conducted as an abductive single case-study of the Fuzzy front-end process where extreme openness is performed at a multinational conglomerate company. Interviews have been held with both employees at the case company as well as external actors.  In total, 41 interviews were conducted, where 35 were unique respondents. The results were generated through the use of thematic analysis.  Findings – The findings from the study are summarized in two different frameworks in which the first framework explains the phenomenon of extreme openness and gives insight into why and how large companies provide innovation power to external actors. The second framework illustrates which communication technologies to use in the Fuzzy front-end process and provide necessary information about needed functionality and criteria when having Fuzzy front-end activities distance-based.  Theoretical and practical implications – The study provides implications for research on open innovation by empirically explicating the new phenomenon of extreme openness and connect the open innovation literature with the social exchange theory. Our findings reveal that business-to-business relational exchange can result in future benefits and that top managers can use this strategy to build long-term relationships and achieve financial improvements. Further, we also provide implications into the research on the Fuzzy front-end by empirically clarifying functionality and criteria that are specifically needed when having these activities distance-based. Our result provides implications relevant to both top managers and project managers. Limitations and future research – The study is limited by a single case study of the new phenomenon of extreme openness and which communication technology to use in distance-based Fuzzy front-end activities. We recommend future research to validate and extend findings from this study in new contexts.
APA, Harvard, Vancouver, ISO, and other styles
49

Tarabay, Raymond, and Raphael Eigbire. "To Invest Or Not Invest? : Factors affecting IT investment decisions." Thesis, Jönköping University, JIBS, Business Informatics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-9638.

Full text
Abstract:
<p> </p><p><strong>Introduction</strong></p><p>Many studies indicate that there are numerous factors that promote or hamper the adoption of IT applications and are a prime concern for many researchers and practitioners (Abrahamson, 1991). Two main factors which need to be examined closely when making decisions about IT investments are the internal and external factors. Since these factors play a great role in decision making of IT investments, it is imperative to study their impact on the strategic planning because this forms the founding blocks for IT decision making.</p><p><strong>Problem</strong></p><p>As the business environment keeps on changing, managers need to thoroughly scan the environment before investing in an Information technology system. The reason is to identify the major factors that can be detrimental to the organization from reaping the potential rewards from their IT investments. Sutton, (1998) views the process of environment scanning as a technique to identify threats and opportunities while improving long and short- term planning. With the current financial crisis that started in 2007, there seems to be a pandemic concern in the massive. Inevitably, this has lead to a risen concern for organizations to carefully study this particular factor when deciding on investing in new information technology.<strong></strong></p><p><strong>Purpose</strong></p><p>The aim of this thesis is to establish and evaluate the internal and external factors affecting the decision making in IT investments, in particular ERP systems. It also seeks to contribute to literature on the impact of the current financial crisis on making IT investment decisions.</p><p><strong>Method</strong></p><p>Our research study took a deductive approach with the use of qualitative data that was collected from semi-structured interviews of three respondents. The interviewed companies were Fagerhult Belysning, Sogeti and Professor Mats-Åke Hugosson.</p><p><strong>Conclusion</strong></p><p>The evaluation of the internal and external factors affecting the decision making was analyzed with the SWOT analysis. Each potential factor was categorized under internal, strengths or weakness and external, opportunities or threats and then assisted in reducing the weaknesses in the organization and mitigating the potential threat in order to understand these factors influence on ERP adoption in Fagerhult. An advice for organizations is despite the financial crisis, the question they ought to ponder over is firstly the obvious which is, do we have the available resources? And if that is not a constraint, the next issue is how we can get the optimal value from our IT investments and our correspondents laid it out clearly; organizations need to plan ahead and continue making IT investments that aims at creating a suitable balance/ fit or harmonization between their IT and business strategy.</p>
APA, Harvard, Vancouver, ISO, and other styles
50

Westerberg, Eva-Li, and Johan Hallberg. "Kilometerskatt för tunga fordon : Skapande av en transportmodell för efterlevnadskontroll." Thesis, Linköping University, Department of Science and Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11467.

Full text
Abstract:
<p>Arenaprojektet startades som följd av EU-direktiv och svenska myndigheters påtryckningar att införa kilometerskatt för tunga fordon i Sverige, vilket är tänkt ersätta dagens tidsbaserade vägavgiftssystem. En grundtanke med ett införande är att en stor andel transporter sker på väg och av utlandsregistrerade fordon, det är då mer rättvist och samhällsekonomiskt att de som använder vägarna också betalar för det. Idag finns kilometerskattesystem i drift i Tyskland, Schweiz, Österrike och Tjeckien. Kilometerskatten differentieras bland annat efter antal axlar, miljöklass eller vikt och är mellan 0,12-0,67 EUR/kilometer. Förslag till ett svenskt kilometerskattesystem har arbetats fram av SWECO VBB, genom Arenaprojektet, och inkluderar fyra aktörer Användare, vgiftsförmedlare, Avgiftsupptagare och Blåljusenhet. Kilometerskattesystemet kräver att efterlevnadskontroller genomförs för att skapa ett rättvist och fungerande system.</p><p>Examensarbetet syftar till att skapa ett tillvägagångssätt för visualisering av transportflöde på ett tillförlitligt sätt. En grundlig kartläggning över hur transporterna fördelas på det svenska vägnätet har utförts och utfaller i en transportmodell. Transportmodellen ska användas som indata i ett tillvägagångssätt vid placering av mobila kontrollstationer för efterlevnadskontroll.</p><p>De fem stegen i tillvägagångssättet representerar delar som bör ingå för att på ett tillförlitligt sätt kunna placera ut kontrollerna. Steg 1 - Skapa en OD-matris bestämmer detaljeringsnivån på OD-matrisen, det vill säga antal OD-par, länkar och noder. En kostnadsparameter för varje länk krävs för att bestämma vilka länkar som är mest lämpliga att användas för de olika rutterna. I steg 2 - Implementering av data sker inmatning av insamlad data i transportmodellen, här krävs att indata är i form av rutt- och länkflöde. Steg 3 - Kalibrering utförs med hjälp av ytterligare data för att uppnå en mer tillförlitlig transportmodell. Insamlad data bör vara av hög precision. I steg 4 - Jämför resultat hämtas utdata från transportmodellen, vilka jämförs med inrapporterad data från Avgiftsförmedlaren för att identifiera stora avvikelser. Sista steget - Rikta kontroll innebär att mobila kontroller utplaceras i områden med stora avvikelser.</p><p>Indata till transportmodellen kan vara information ifrån till exempel slangmätningar, resvaneundersökningar, trafiksäkerhetskameror eller färdskrivare. Idag finns dock bara data för implementering i form av slangmätningar och resvaneundersökningar. Ett avgränsat exempelområde valde att studeras på grund av saknad indata och den stora rbetsbelastningen över att skapa en transportmodell för hela Sverige. Vid en verifiering erhölls de svar och beteenden som väntades, vilket tyder på att modellen uppför sig korrekt.</p>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!