Academic literature on the topic 'Theses – Information systems and technology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Theses – Information systems and technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Theses – Information systems and technology"

1

Holmberg, Melissa, and Mark McCullough. "Plagiarism in science and technology master's Theses: a follow-up study." New Review of Information Networking 12, no. 1-2 (May 2006): 41–45. http://dx.doi.org/10.1080/13614570601136255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Piscoya Hermoza, Luis A. "El compromiso valorativo de la tecnología." Crítica (México D. F. En línea) 24, no. 71 (December 14, 1992): 53–71. http://dx.doi.org/10.22201/iifs.18704905e.1992.846.

Full text
Abstract:
This paper is a critical analysis of technology as understood today. The author tries to prove three theses: 1) Prescriptive meaning of technological rules, and efficient-inefficient statements are based on expressing what is socially good. 2) Information contained in technological rules is based on scientific-theoretical statements-true in some sense. 3) Technological rules dependence upon systems of value has been avoided because it places emphasis on the artifact and forgets the language. The three theses are based on the analysis of scientific language. They present technology language as action rules of non-scientific nature, and they approach the valorative commitment of technology as if it was an inherent consequence of the logical nature of its own rules. [Carolina Celorio]
APA, Harvard, Vancouver, ISO, and other styles
3

Amlung, Joseph, Hannah Huth, Theresa Cullen, and Thomas Sequist. "Modernizing health information technology: lessons from healthcare delivery systems." JAMIA Open 3, no. 3 (September 3, 2020): 369–77. http://dx.doi.org/10.1093/jamiaopen/ooaa027.

Full text
Abstract:
Abstract Objective To identify recurrent themes, insights, and process recommendations from stakeholders in US organizations during the health information technology (HIT) modernization of an existing electronic health record (EHR) to a commercial-off-the-shelf product in both resource-plentiful settings and in a resource-constrained environment, the US Indian Health Service. Materials and Methods Thirteen qualitative interviews with stakeholders in various organizations were conducted about HIT modernization efforts. Using a Theory of Change framework, recurring themes were identified and analyzed. Results The interviewees emphasized the importance of organizational and process revision during modernization, converting historical data, and clinical and leadership involvement. HIT implementation required technological and infrastructure redesign, additional training, and workflow reconfiguration. Motivations for modernization included EHR usability dissatisfaction, revenue enhancements, and improved clinical operations. Decision-making strategies, primarily during HIT selection, included meetings with stakeholders. Successful modernization resulted in improvements in clinical operations, patient experience, and financial outlay. Discussion Existing implementation frameworks fail to provide experiential feedback, such as implementation challenges, like data conversion, regulatory, functionality, and interoperability requirements. Regardless of the healthcare environment, HIT modernization requires the engagement of leadership and end-users during HIT selection and through all stages of the implementation to prepare people, processes, and technology. Organizations must iteratively define the technological, infrastructure, organizational, and workflow changes required for a successful HIT modernization effort. Conclusions HIT modernization is an opportunity for organizational and technological change. Successful modernization requires a comprehensive, intentional, well-communicated, and multidisciplinary approach. Resource-constrained environments have the additional challenges of financial burdens, limited staffing, and unstable infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
4

Gonçalves, Marcos André, and Edward A. Fox. "Technology and research in a global Networked University Digital Library (NUDL)." Ciência da Informação 30, no. 3 (December 2001): 13–23. http://dx.doi.org/10.1590/s0100-19652001000300003.

Full text
Abstract:
Digital Libraries (DLs) are extremely complex information systems that support the creation, management, distribution, and preservation of complex information resources, while allowing effective and efficient interaction among the several societies that benefit from DL content and services. In this paper, we focus on our experience facing challenges of building, maintaining, and developing the Networked University Digital Library (<A HREF="http://www.nudl.org/">www.nudl.org</A>), an extension of the Networked Digital Library of Theses and Dissertations (<A HREF="http://www.ndltd.org/">www.ndltd.org</A>). NUDL is a worldwide initiative that addresses making the intellectual property produced in universities more accessible, stimulating international collaboration across all disciplines. We detail technological aspects of our solutions and research activities carried out to provide powerful and enriched services for the communities served by this initiative.
APA, Harvard, Vancouver, ISO, and other styles
5

Nerur, S., and W. Raghupathi. "Research Themes and Trends in Health Information Systems." Methods of Information in Medicine 47, no. 05 (2008): 435–42. http://dx.doi.org/10.3414/me0516.

Full text
Abstract:
Summary Objectives: The health information systems (HIS) field is characterized as being associated with health care and information systems. Drawing on several disciplines, a body of knowledge has come together that help define the core internal structure of the field. This study attempts to identify the emerging sub-fields using the bibliometric technique of author-cocitation analysis. Methods: Co-citation data for members of editorial boards of several health information systems journals for the period of 1998-2006 was collected and analyzed (N = 166). We performed numerous multivariate analyses, including cluster analysis, factor analysis and multidimensional scaling to extract the sub-fields. Results: Our findings indicate the presence of several strong sub-fields, including HIS evaluation, communication and e-health, and clinical DSS. In addition, we identified other sub-fields that are distinct but still emerging, such as adoption, outcome and policy, and use and impact of HIS. The study also confirms the existence of several historical sub-fields and contrasts technology-oriented sub-fields with managementoriented sub-fields. Topics on the periphery of HIS provide links to other disciplines as well. Conclusions: The study provides a unique perspective on the field of HIS, and the results indicate opportunities for further research that explores collaborations and social networks among the sub-fields.
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Jia Rong, Dong Feng Yan, Fang Guo, and Xiao Xu He. "Reforming Instruction of Forestry Specialty with Information Technology." Advanced Materials Research 271-273 (July 2011): 1463–67. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.1463.

Full text
Abstract:
Forestry informationization is an important part of Forestry ecological construction, which needs a large number of high-level mastery of information technology expertise of forestry specialty, so exploration of effective way to integrate instruction of forestry specialty and information technology is the important task of teaching reforms. This paper describes the basic objectives of forestry specialty training and the importance and necessity of the integration of information technology and forestry specialty, and detailed objectives and integration method. The integration methods are to establish the course systems of computer expertise and forestry specialty special knowledge, to improve the contents of information technology courses, to combine information technology courses with practical teaching considering all levels of forestry production, operation and management information needs. Meanwhile, The platform can be established for students to master the ability of information technology through graduation thesis, innovative project, teachers ' scientific research, other non-curricular teaching and laboratory opening session, and network platform, database technology, multimedia technology, and test database systems, teaching methods.
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Le, Kenny Ketner, Scott Luker, and Matthew Patterson. "A complete system for publishing music-related ETDs." Library Hi Tech 34, no. 1 (March 21, 2016): 151–63. http://dx.doi.org/10.1108/lht-10-2015-0096.

Full text
Abstract:
Purpose – There is no proposed solution to address the unresolved issues of publishing music-related electronic theses and dissertations (ETDs) pertaining to technology availability, copyright, and preservation. The purpose of this paper is to propose a complete system, including technology development and publishing model, which addresses the existing issues of publishing music-related ETDs. The paper shares the practice of utilizing the system developed by Texas Tech University Libraries known as Streaming Audio and Video Experience (SAVE), and proposes it as a solution for other multimedia collections. Design/methodology/approach – The proposed system includes a technology solution and a publishing model. The technology solution, SAVE, contains an authenticated streaming multimedia player, a responsive-design user interface, and a web-based submission and management system. The publishing model combines a DSpace-based institutional repository (IR) with SAVE and preservation strategies. Findings – The integrated system of SAVE and DSpace-based IR expands the access of music-related ETDs and other multimedia collections to patrons, benefits the distance education students as well as the local students, facilitates professors’ classroom teaching, and helps to preserve physical multimedia items by avoiding check-outs. Originality/value – The SAVE solution resolves issues of publishing music-related ETDs, fulfills the local needs of publishing hundreds of music-related ETDs from the College of Visual and Performing Arts, and supports the publishing of other multimedia collections. The software will be released open source to the public for other universities’ use. The publishing model is also useful for those universities that intend to integrate an IR with the streaming player platform.
APA, Harvard, Vancouver, ISO, and other styles
8

Ash, J., M. Berg, and E. Coiera. "The Unintended Consequences of Health Information Technology Revisited." Yearbook of Medical Informatics 25, no. 01 (August 2016): 163–69. http://dx.doi.org/10.15265/iy-2016-014.

Full text
Abstract:
Summary Introduction: The introduction of health information technology into clinical settings is associated with unintended negative consequences, some with the potential to lead to error and patient harm. As adoption rates soar, the impact of these hazards will increase. Objective: Over the last decade, unintended consequences have received great attention in the medical informatics literature, and this paper seeks to identify the major themes that have emerged. Results: Rich typologies of the causes of unintended consequences have been developed, along with a number of explanatory frameworks based on socio-technical systems theory. We however still have only limited data on the frequency and impact of these events, as most studies rely on data sets from incident reporting or patient chart reviews, rather than undertaking detailed observational studies. Such data are increasingly needed as more organizations implement health information technologies. When outcome studies have been done in different organizations, they reveal different outcomes for identical systems. From a theoretical perspective, recent advances in the emerging discipline of implementation science have much to offer in explaining the origin, and variability, of unintended consequences. Conclusion: The dynamic nature of health care service organizations, and the rapid development and adoption of health information technologies means that unintended consequences are unlikely to disappear, and we therefore must commit to developing robust systems to detect and manage them.
APA, Harvard, Vancouver, ISO, and other styles
9

Alvite-Díez, María-Luisa, and Leticia Barrionuevo. "Confluence between library and information science and digital humanities in Spain. Methodologies, standards and collections." Journal of Documentation 77, no. 1 (July 28, 2020): 41–68. http://dx.doi.org/10.1108/jd-02-2020-0030.

Full text
Abstract:
PurposeThe purpose of this paper is to study the relevance of heritage collections and the convergence of methodologies and standards traditionally linked to Library and Information Science (LIS) in the development of digital humanities (DH) research in Spain.Design/methodology/approachThis paper is based on a systematic review of scientific publications that are representative of DH in Spain and were published between 2013 and 2018. The analysis considered doctoral theses, journal articles and conference papers.FindingsThe results highlight the synergies between documentary heritage, LIS and DH. However, it appears that there is a scarcity of scientific literature to support the confluence of LIS and DH and a limited formal connection between heritage institutions and the areas of academia that reuse and enrich these source collections.Research limitations/implicationsThe review of representative scholarly DH publications was mainly based on the metadata that describe the content of articles, thesis and conference papers. This work relies on the thematic indexing (descriptors and keywords) of the analysed documents but their level of quality and consistency is very diverse.Originality/valueThe topic of the study has not been explored before and this work could contribute to the international debate on the interrelation and complementarity between LIS and DH. In addition, this paper shows the contribution that standards and documentary methodologies make to projects in which technology is applied to humanities disciplines. The authors propose that there is an urgent need to strengthen the “scientific relationships” between heritage institutions, as well as enhancing links between the academic field of DH and LIS in order to improve teaching and research strategies in conjunction.
APA, Harvard, Vancouver, ISO, and other styles
10

Ba, Sulin, and Barrie R. Nault. "Emergent Themes in the Interface Between Economics of Information Systems and Management of Technology." Production and Operations Management 26, no. 4 (November 1, 2016): 652–66. http://dx.doi.org/10.1111/poms.12644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Theses – Information systems and technology"

1

Brown, Jill A. "Examining Strategic Information Technology in Relationship to the Need for Technology Modernization." TopSCHOLAR®, 2009. http://digitalcommons.wku.edu/theses/129.

Full text
Abstract:
Strategic planning can be a critical business process for today’s organizations, especially for IT organizations that are facing continually changes in technology. This research was designed to investigate IT organizations’ use of strategic planning and determine if the organization uses their strategic plan to set project priorities. The second part of this research was to determine if the IT strategic plans are aligned with the overall organization’s strategic plan. This research was conducted using a mail-type survey to IT Executives from organizations with sales/revenues under 100 million dollars, a maximum of 5000 employees, and SIC codes of 201 thru 399. The selected organizations were mailed a survey packet followed by a phone call for all non-responding organizations. The findings that resulted from this research showed that there is statistical evidence to support that organizations do perform the business process of developing a strategic plan. This research also showed that IT organizations do develop an IT strategic plan. However, there is not a high correlation between the organization’s strategic plan and the IT strategic planning process. If the IT organization has a strategic plan, then the plan is reviewed on a regular basis, referenced for project prioritization, and the IT employees are familiar with the plan.
APA, Harvard, Vancouver, ISO, and other styles
2

Grogan, D. Michael. "Information Technology Implementation Decisions to Support the Kentucky Mesonet." TopSCHOLAR®, 2010. http://digitalcommons.wku.edu/theses/171.

Full text
Abstract:
The Kentucky Mesonet is a high-density, mesoscale network of automated meteorological and climatological sensing platforms being developed across the commonwealth. Data communications, collection, processing, and delivery mechanisms play a critical role in such networks, and the World Meteorological Organization recognizes that “an observing system is not complete unless it is connected to other systems that deliver the data to the users.” This document reviews the implementation steps, decisions, and rationale surrounding communications and computing infrastructure development to support the Mesonet. A general overview of the network and technology-related research is provided followed by a review of pertinent literature related to in situ sensing network technology. Initial infrastructure design considerations are then examined followed by an in-depth review of the Mesonet communications and computing architecture. Finally, some general benefits of the Mesonet to the citizens of Kentucky are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
3

Winter, Mervyn. "Investigation into project management failure within information technology systems projects." Thesis, Stellenbosch : Stellenbosch University, 2006. http://hdl.handle.net/10019.1/20837.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2006.
ENGLISH ABSTRACT: Information technology systems are an integral part of many sectors of business and the application of information technology in new sectors of business is increasing continually. Businesses believe that by applying information technology systems in their business processes they will ultimately improve on the profits through increased operational efficiency, reduction of costs and improved ability to make informed decisions. However implementing an information technology system is usually a complex affair involving the technology supplier, client organisation and other stakeholders. The common method of implementing information technology systems is to set up a project in an attempt to manage the cross organisational and cross departmental issues as best as possible. Industry reports that the success of information technology project implementation is low. This study project has analysed 16 sources of literature pertaining to failures in information technology projects, in order to ascertain how the various authors define a project failure and whether project management failure is a major contributor to these failures. Also to examine areas within project management which are deemed to make the most significant contribution to project failure. The study concludes that most of the authors examined define project failure in terms of project management criteria, being cost, time and function (quality). Furthermore it concludes that project management failure is a significant factor in information technology project failure and that the facets of project management failure encountered with information systems implementation projects are not that different from other forms of projects. The main contributing factors being lack of executive support, lack of business case or user requirements, lack of project management expertise, lack of planning, lack of user involvement and changing requirements. The study recommends that organisations need to be aware of the cross functional and cross organisational requirements of information technology project management and that all levels of management in stakeholder organisations need to have the relevant knowledge and experience to deal with these requirements.
AFRIKAANSE OPSOMMING: Inliglings legnologie slelsels inlegrale uil menigle besigheids seklore en die loepassing daarvan (ITS) in nuwe seklore voorldurend Besighede mel loepassing van ITS in hulle besigheids prosesse dil aanleiding sou gee 101 die graei doellreffenheid, die afname in bedryfskosle en ook verbelerde besluitneming . Die daarslelling van 'n ITS is gewoonlik 'n baie moeilike proses wal onder andere insluil die verskaller van legnologie, die klienlorganisasie asook ander deelnemers. Die algemene melode van implemenlering van ITS kan geskied deurmiddel van 'n projek in die poging om kruisorganisasie en kruisdeparlemenlele funksies/werkings Ie beharlig. Terugvoering van bedryf dui aan dal die implemenlerings sukses van inligling legnologie projekle eintiik baie laag is. Hierdie sludie hel in lolaal lileraluur mel belrekking 101 inliglings legnologie projekle, ontieed om sodoende Ie bepaal hoe verskeie skrywers 'n projek mislukking definieer en of die mislukking projek besluur enigsins 'n bydraende faklor kon wees. Asook die ondersoek van areas binne die beslek van projek besluur wal wei 'n noemenswaardige inwerking kon he 101 die mislukking van projekle. iv Opsemming Inligtings tegnologie stelsels (ITS) maak 'n integrale deel uit van menigte sektore toepassing sektore is voortdurend aan die groei. 8esighede glo met die toepassing prose sse dit tot greei van wins. Laasgenoemde as gevolg van verhoogde bedryfs doeltreffenheid, bedryfskoste verbeterde vermoens vir insiggewende besluitneming. daarstelling wat insluit verskaffer tegnologie, klientorganisasie metode implementering kruisdepartementele te behartig . dat implementerings in li gting tegnologie projekte studie het totaal 16 literatuur bronne, met betrekking tot die faal/mislukking van inligtings tegnologie projekte, te van bestuur faktor bestek bestuur wat tot projekte. As gevolg van die navorsing kom hierdie studie tot die slotsom dat skrywers projek-mislukking definieer in terme van projek bestuur kriteria wat 5005 volg lui; koste, tyd en funksie (gehalte). Verder is ook gese dat projek bestuur mislukking 'n groot bydraende faktor uitmaak aangaande inligtings tegnologie projek- mislukking en dat faseUe van projek bestuur mislukking gesien met inligtings stelsel implementering projekte, nie te vee I verskil van ander vorms van projekte nie. Die hoof bydraende faktore kan toegeskryf word aan die gebrek van uitvoerende bestuur ondersteuning, gebrek aan besigheids saak of verbruikers vereistes, gebrek aan projek bestuur kennis, gebrek aan beplanning, gebrek aan deelname van verbruikers asook die voortdurende verandering van vereistes. Hierdie studie beveel aan dat organisasies bewus moet raak van die kruiswerking/kruisfunksionering en kruisorganisie vereistes van inligtings tegnologie projek bestuur en dat aile bestuurs vlakke van deelnemende organisasies ook genoegsaam toepaslike kenn is en ondervinding moet he om sodoende die vereistes te behartig .
APA, Harvard, Vancouver, ISO, and other styles
4

Goméz, Villanueva Daniel. "Secure E-mail System for Cloud Portals : Master Thesis in Information and Communication Systems Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108080.

Full text
Abstract:
Email is a well established technology used worldwide for enterprise and private communication through the Internet. It allows people to communicate using text, but also other information formats used either as HTML or attached files. The communication is performed without the need of synchronized endpoints, based on the use of email servers that take care of storing and forwarding email letters. All these properties and much more standardized ones do not include security, which makes the choice of service provider hard when the letters sent in the email system include sensitive information. In the last few years there has been a big interest and growth in the area of cloud computing. Placing resources (computers, applications, information) out of local environments, thanks to the high speed connections in the Internet, provides countless possibilities. Actually, even email systems can be deployed in cloud computing environments, including all the email services (interface, client, and server) or a part of them. From a security point of view, the use of cloud computing leads to many threats generated by external parties and even the cloud providers. Because of these reasons, this work intends to present an innovative approach to security in a cloud environment, focusing on the security of an email system. The purpose is to find a solution for an email system deployable in a cloud environment, with all the functionality deployed on a external machine. This email system must be completely protected, minimizing the actions taken by the user, which should just connect to a portal through a web browser. Along this report there are details about the foundations, progress and findings of the research that has been carried out. The main objectives involve: researching on the concepts and state of the art of cloud computing, email systems and security; presenting a cloud computing architecture that will take care of the general aspects of security; designing an email system for that architecture that contains mechanisms protecting it from the possible security threats; and finally, implementing a simplified version of the design to test and prove the feasibility of it. After all the mentioned activities, the findings are commented, mentioning the applicability of research results to the current situation. Obviously, there is place for more research in depth of several topics related to cloud computing and email, that is why some of them are suggested.
APA, Harvard, Vancouver, ISO, and other styles
5

Houliston, Bryan. "Factors influencing the adoption of RFID technology in the New Zealand hospital environment dissertation [thesis] submitted to Auckland University of Technology in partial fulfilment of the degree of Master of Information Technology, Semester 2, 2004." Full thesis. Abstract, 2004. http://puka2.aut.ac.nz/ait/theses/HoulistonB.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kasi, Vijay. "Escalation of Commitment in Information Technology Projects: A Goal Setting Theory Perspective." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-12032007-190226/.

Full text
Abstract:
Thesis (Ph. D.)--Georgia State University, 2007.
Title from file title page. Mark Keil, committee chair; Henry Moon, Arun Rai, Detmar Straub, committee members. Electronic text (190 p. : ill. (some col.)) : digital, PDF file. Description based on contents viewed Feb. 22, 2008. Includes bibliographical references (p. 156-168).
APA, Harvard, Vancouver, ISO, and other styles
7

Van, Zyl Pierre. "A description of information system technologies and implementations of project information management systems for use in the South African Government." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/49714.

Full text
Abstract:
Thesis (MEng)--University of Stellenbosch, 2002.
ENGLISH ABSTRACT: This thesis focuses on information systems for project management in the South African Government with special attention to the Consolidated Municipal Infrastructure Programme. Project data exchange standards and the suitability of these standards for project information management in the South African Government is reviewed. Information system technologies applicable to project management, with reference to computer programming languages, markup languages, communication technologies, Internet technologies, database technologies and document manipulation tools are discussed. Project information management forms are then discussed, followed by an overview of the flow of project information during the lifecycle of a project. The standards development organisation, ActionIt, and the project information management models developed by it are highlighted. A description of applications and a system that was implemented to illustrate the work covered in this thesis is provided with examples of the applications and the system. Hierna tesis fokus op inligting sisteme vir projekbestuur in die Suid Afrikaanse Regering met spesifieke verwysing na die Gekonsolideerde Munisipale Infrastruktuur Program. Standaarde vir die uitruil van projek inligting sowel as die toepaslikheid van hierdie standaarde vir die bestuur van projek inligting in die Suid Afrikaanse Regering word bespreek. Informasie sisteem tegnologiee wat van toepassing is op die bestuur van projek inligting word behandel en sluit in: rekenaar programerings tale, 'markup' tale, kommunikasie tegnologiee, Internet tegnologiee, databasis tegnologiee en gereedskap om dokumente te manipuleer. Verskillende projek vorms word behandel gevolg deur 'n beskrywing van die vloei van data gedurende 'n projek se leeftyd. "n Beskrywing van ActionIT, 'n organisasie vir die neerle van standaarde vir gebruik in die Suid Afrikaanse regering, sowel as die modelle wat deur ActionIT ontwikkel is vir die bestuur van projek inligting word gegee. Die toepassings en sisteem wat geimplimenteer is om die werk wat in hierdie tesis behandel is te demonstreer word gegee met voorbeelde van die toepassings en sisteem.
AFRIKAANSE OPSOMMING: geen opsomming
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Cheon-Pyo. "AN EMPIRICAL STUDY OF ORGANIZATIONAL UBIQUITOUS COMPUTING TECHNOLOGY ADOPTION: THE CASE OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE HEALTHCARE INDUSTRY." MSSTATE, 2008. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10172008-090051/.

Full text
Abstract:
Advances in wireless networking and the Internet move us toward ubiquitous and embedded computing. Ubiquitous and embedded computing enhances computer use by making computers available throughout the physical environment while making them effectively invisible to the user. In the ubiquitous and embedded computing era, computers in the traditional sense gradually fade, and information mediated by computers is available anywhere and anytime through devices that are embedded in the environment. Radio Frequency Identification (RFID) is one of the key technologies of the ubiquitous and embedded computing era. RFID is a technology used to identify, track, and trace a person or object and enables the automated collection of important business information. RFID minimizes human intervention in the person and object identification process by using electronic tags and is expected to complement or replace traditional barcode technology. RFID is a highly beneficial technological advancement which ultimately may change the way of doing business. This study examines the RFID adoption decision process and proposes a model predicting the likelihood of adopting RFID within organizations in the healthcare industry. A considerable number of studies have been conducted regarding organizational information technology (IT) adoption, but the nature of the organizational IT adoption process is still not well understood. It is even posited that the only consistency found in the organizational adoption literature is the inconsistency of research results. The inconsistency of results is partially explained by changes in technological, organizational, and environmental statuses. Therefore, factors explaining traditional IT adoption may not justify RFID adoption and should be revisited and revalidated. In addition, given the ongoing importance of RFID, it is very important to identify the unique factors that contribute to the likelihood of adopting RFID. In this study, an organizational RFID adoption model is proposed and empirically tested by a survey using a sample of 865 senior executives in U. S. hospitals. The model posits that three categories of factors, technology push, need pull, and decision maker characteristics, determine the likelihood of adopting RFID within organizations. The relationships between those three categories and the likelihood of adopting RFID are strengthened or weakened by organizational readiness. This study may serve as the theoretical and empirical basis for research on other forms of ubiquitous and embedded computing systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Murthy, Sindhu Dharani. "Ikriya: Simulating Software Quality Enhancement With Selected Replacement Policies." TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1247.

Full text
Abstract:
The quality of information systems in any organization helps to determine theefficiency of the organization. Many organizations maintain a custom software portfolio, whose quality is important to the organization. Management would like to optimize the portfolio’s quality. Decisions about software replacement or enhancement are made based on organizational needs and priorities. The development resources allocated help in determining the quality of new software, and should be put to optimal use. Enhancing existing software might sound cheap and easy but it is not always efficient. This thesis proposes a simulation model - iKriya - for this problem. It explores the consequences of various development and maintenance policies which might be applied.These depend on the state of existing software portfolio, the queue and properties of proposed projects, and the resources available. Optimal decisions are made by the simulator by taking the above mentioned factors into consideration.
APA, Harvard, Vancouver, ISO, and other styles
10

Whitney, John. "A comprehensive review of competency assessment for computer information systems instruction." Online version, 2002. http://www.uwstout.edu/lib/thesis/2002/2002whitneyj.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Theses – Information systems and technology"

1

Carugati, Andrea. Emerging Themes in Information Systems and Organization Studies. Heidelberg: Springer-Verlag Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Malaga, Ross A. Information systems technology. Upper Saddle River, NJ: Pearson Prentice Hall, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hart, Dennis N. Information Systems Foundations: Theory Building in Information Systems. Canberra: ANU Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rocha, Álvaro, Carlos Ferrás, Carlos Enrique Montenegro Marin, and Víctor Hugo Medina García, eds. Information Technology and Systems. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-40690-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rocha, Álvaro, Carlos Ferrás, and Manolo Paredes, eds. Information Technology and Systems. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11890-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rocha, Álvaro, Carlos Ferrás, Paulo Carlos López-López, and Teresa Guarda, eds. Information Technology and Systems. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68418-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rocha, Álvaro, Carlos Ferrás, Paulo Carlos López-López, and Teresa Guarda, eds. Information Technology and Systems. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68285-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Information and information systems. New York: Praeger, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Information and information systems. New York: Greenwood Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sahni, Vishal. Quantum information systems. New Delhi: Tata McGraw-Hill Education, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Theses – Information systems and technology"

1

Maggiolini, Piercarlo. "Information Technology Benefits: A Framework." In Emerging Themes in Information Systems and Organization Studies, 281–92. Heidelberg: Physica-Verlag HD, 2011. http://dx.doi.org/10.1007/978-3-7908-2739-2_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bayona-Oré, Sussy. "Limitations in Thesis Development of Systems Engineering: Knowledge and Skills." In Proceedings of Fifth International Congress on Information and Communication Technology, 596–603. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5856-6_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hartsock, Ralph, and Daniel G. Alemneh. "Electronic Theses and Dissertations (ETDs)." In Encyclopedia of Information Science and Technology, Fourth Edition, 6748–55. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2255-3.ch584.

Full text
Abstract:
Electronic Theses and Dissertations (ETDs) have been a recent addition to the library's online access system, or digital project. This chapter traces the history of dissertations, from their printed form and issuance in microform by various agencies. It examines the changes in textual content and its presentation from the pre-digital to digitized documents, and the relation to software developed for music and other fields. It then examines the evolution of audio and video formats for the accompanying materials, particularly in the performing arts, and the content of these materials. It concludes with issues in ETDs Management and Ensuring Long-Term Access and Preservation, such as digital quality and copyright.
APA, Harvard, Vancouver, ISO, and other styles
4

Boudreau, Marie-Claude, and Jonny Holmström. "Understanding Information Technology Implementation Failure." In Enterprise Information Systems, 1496–512. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61692-852-0.ch606.

Full text
Abstract:
This chapter uses the theory of loose coupling to explain failure in the adoption of an information technology aimed at improving collaboration across one organization’s internal boundaries. The research details an interpretive case study of a single organization, MacGregor Crane, in which relatively autonomous individuals are only loosely connected in terms of their daily interactions. The company implemented Lotus Notes© in an attempt to increase collaboration. However, this effort failed because employees in various units, particularly engineering, were reluctant to share information across unit boundaries. In light of these findings, it is suggested that the successful implementation of a collaborative IT within a loosely coupled organization should involve the reconsideration of the organizational members’ roles and functions.
APA, Harvard, Vancouver, ISO, and other styles
5

Rose, Jeremy. "Information Systems and Technology Outsourcing." In Cases on Information Technology Series, 265–76. IGI Global, 2006. http://dx.doi.org/10.4018/978-1-59904-408-8.ch016.

Full text
Abstract:
This case concerns an information systems and technology (IS/IT) action research intervention into a train operating company in the newly privatized rail industry in the United Kingdom. Having operated for many years as a nationalized industry under government control, but outside the strictly commercial sector, the new company found itself in the position of having many of its important IS/IT systems being run by separate companies — it was outsourced without ever having made an outsourcing decision. The project involved information management in the maintenance wing of the company. After the event, analysis of the problem situation revealed the extent of the company’s IS/IT management difficulties. Many of these problems were directly attributable to privatization and the outsourcing arrangements imposed upon the new company. The lessons from the case cast serious doubts upon the long-term benefits of outsourcing key systems and are believed to represent a significant learning vehicle relating to IS/IT adoption and exploitation.
APA, Harvard, Vancouver, ISO, and other styles
6

Doldan Tie, Felix, Paula Luna Huertas, Francisco Jose Martinez Lopez, and Carlos Pineiro Sanchez. "Information Systems/Information Technology Outsourcing in Spain." In IT Outsourcing, 1333–59. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-770-6.ch082.

Full text
Abstract:
The practice of information systems/information technology (IS/IT) outsourcing is a major issue which has received much attention, as shown by the extensive literature on the topic. However, most works on outsourcing have focused on theoretical topics, and there are but a few empirical, quantitative studies. This chapter presents an empirical study of IS/IT outsourcing in Spain, which has been conducted along the lines of prior research carried out in different countries, and which focuses on the types, functions and targets of outsourcing contracts. We also attempt to examine the influence that this practice may have on the organizations’ management structure. A survey carried out on 530 Spanish firms has shown that 50% of Spanish large firms have outsourced part of their IS/IT, whereas outsourcing is practiced by 20% of medium-sized enterprises. Finally, it has been observed that the most frequently outsourced activities in Spain are hosting and Internet-related services.
APA, Harvard, Vancouver, ISO, and other styles
7

Griffiths, Gareth, and Ray Hackney. "Strategic Information Systems for Competitive Advantage." In Strategic Information Technology, 185–99. IGI Global, 2001. http://dx.doi.org/10.4018/978-1-878289-87-2.ch009.

Full text
Abstract:
This chapter describes three critically important features for the planning, sustainability and implementation of strategic information systems (SIS). The literature identifies a consistent lack of success by organisations in achieving business benefits from their SIS investments and in particular the difficulties of obtaining a sustained competitive advantage over rivals. There appears to be little evidence that this record has improved as organisations increasingly rely on SIS to support their business strategy. The chapter focuses upon the need for appropriate SIS planning, the role of unique, causally ambiguous ‘isolating mechanisms’ in order to sustain SIS-derived competitive advantages and concludes by summarising the implementation factors deemed to be of real practical importance for the success of large-scale SIS projects based upon recent empirical research. The high failure rate of SIS applications in business is deemed to be largely of a managerial rather than a technical causation (Earl, 1989;Burn, 1993; Galliers et al., 1994;Barnett and Burgelman, 1996; Powell and Dent-Micallef 1997; Willcocks and Lester 1999; Watson et al., 2000). This chapter identifies and considers three components which are critical in this respect to enable an IT strategy fusion with the rest of the business (Papp, 1998).
APA, Harvard, Vancouver, ISO, and other styles
8

Rajagopal, Dr. "Internet, Reengineering and Technology Applications in Retailing." In Business Information Systems, 1324–42. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-969-9.ch082.

Full text
Abstract:
The rapid growth in computer technology and commercial needs have allowed significant changes in the information management systems. There emerged in early nineties many commercial network backbones to link with the NSFnet to provide market information to the business firms. The Internet today is a combination of NSFnet and commercially available backbone services disseminating information on the decentralized networks all over the world. It is estimated that there are over 30,000 computer networks connecting over 2 million computers with each other on the Web. In view of the increasing use of electronic information sources through the networks the Transmission Control Protocol/Internet Protocol (TCP/IP) has been designed and made essential for each user networks to abide with the protocol standards which enables the data transfer and retrieval at source.
APA, Harvard, Vancouver, ISO, and other styles
9

Burbach, Ralf, and Tony Dundon. "Assessing Information Technology Capability versus Human Resource Information System Utilization." In Enterprise Information Systems, 1370–78. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61692-852-0.ch513.

Full text
Abstract:
The ever-increasing capabilities of human resource information technology (HRIT) and human resource information systems (HRIS) have presented HR departments with an opportunity to generate and analyze vast amounts of employee information that could potentially be used for strategic decision-making purposes and to add value to the HR department and ultimately theentire organization. Research in this area has frequently highlighted that most organizations merely deploy HRIT to automate routine administrative tasks. In general, these studies assume the existence of IT capabilities and sophistication without further investigating what these consist of and how or whether existing IT capabilities could be related to the different uses of HR information, that is, strategic decision-making as opposed to automation. In this article, we introduce and discuss a model that aids the categorization of firms regarding their HRIT capabilities vs. their use of HR information. Furthermore, we will explore the factors that determine the utilization of HR information for strategic decision-making purposes.
APA, Harvard, Vancouver, ISO, and other styles
10

Stanton, Jeffrey M. "Information Technology and Privacy." In Socio-Technical and Human Cognition Elements of Information Systems, 79–103. IGI Global, 2003. http://dx.doi.org/10.4018/978-1-59140-104-9.ch005.

Full text
Abstract:
With the rising popularity of the Internet and some widely publicized occurrences of privacy loss due to information technology, many individuals have recently become more concerned with the privacy and security of sensitive information. These concerns have special relevance within work organizations because of the substantial amounts of data that organizations typically collect about the work and non-work activities of their employees. This chapter presents a new theoretical perspective called Information Boundary Theory, that describes whether, when, and why employees care about the privacy and security of sensitive information at work. Analysis of interview data from N=25 non-managerial U.S. workers provided preliminary support for four of the new theory’s research propositions. The chapter describes implications of the theory and the research findings for the design and deployment of information technology systems within organizations and maps a research agenda for future uses of the theory.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Theses – Information systems and technology"

1

Hardono, Isti Surjandari, Amar Rachman, Yantine Arsita Br Panjaitan, and Asma Rosyidah. "Development of theses categorization system search engine using PHP and MySQL." In 2017 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2017. http://dx.doi.org/10.1109/icitsi.2017.8267942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dong, Wei. "A web service based management system of degree theses: research and implementation." In International conference on Management Innovation and Information Technology. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/miit130991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ore, Sussy Bayona. "Supervisors performance and thesis development on information technology: Graduate students perceptions." In 2018 13th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2018. http://dx.doi.org/10.23919/cisti.2018.8399224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nikolic, Bozo, and Ljiljana Ruzic-Dimitrijevic. "Risk Assessment of Information Technology Systems." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3368.

Full text
Abstract:
Risk assessment is a structured and systematic procedure, which is dependent upon the correct identification of hazards and an appropriate assessment of risks arising from them, with a view to making inter-risk comparisons for purposes of their control and avoidance. There are differences in the methodology used to conduct risk assessments. This paper presents some methodologies of risk management in the IT (information technology) area. In addition, a method of risk assessment created and applied by our expert team in this area is described. As there is a similarity between these methodologies, the paper presents the use of methods from the occupational health area in the IT area. All items in the risk assessment methodology for working environment and workplace are modified to IT as working environment and to an application as a workplace. In that way, the risk assessment process in the safety analysis of an IT system is carried out by an original method from the occupational health area.
APA, Harvard, Vancouver, ISO, and other styles
5

Yaqin, Ainul, Akhmad Dahlan, and Reno Diandika Hermawan. "Implementation of Algorithm Rabin-Karp for Thematic Determination of Thesis." In 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE). IEEE, 2019. http://dx.doi.org/10.1109/icitisee48480.2019.9003867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Winer, Charles, and Thomas W. Pavkov. "Human Services Information Technology." In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2380.

Full text
Abstract:
From surveyed responses and evolving technologies, technical issues related to developing a secure county/regional based human services information systems solution are identified. Components of such a system are identified and discussed as to their viability to successfully design and implement shared data between government agencies and non-profit groups throughout Lake County and the State of Indiana. Some of these components are a common intake function, master client/family index to including client education, training and history components, a master provider index, case coordination/management system, and the use of E-forms to reduce traditional paper processing and encourage more efficient usage of data storage and retrieval technologies within a clientcentric environment.
APA, Harvard, Vancouver, ISO, and other styles
7

Lindstedt, Juha, Raine Kauppinen, and Altti Lagstedt. "Personalizing the learning process with Wihi." In Enabling Technology for a Sustainable Society. University of Maribor Press, 2020. http://dx.doi.org/10.18690/978-961-286-362-3.21.

Full text
Abstract:
Societies are changing rapidly because of automation and digitalization, but local and global business environments are also becoming more volatile. Changing societies also place requirements on education: the number of atypical learners is growing all the time, and lifelong careers have been changed to lifelong learning. Traditional education approaches do not support part-time learners or lifelong learning; personalizing the learning process for every student separately is too laborious. In this paper, we study a flexible, personalized learning approach and an information system (Wihi) to support it. Wihi is a thesis management tool for students to plan and schedule their theses and for the thesis supervisor to centrally monitor the progress of different theses. In addition, it allows curriculum management to follow the whole thesis situation. Although Wihi was developed for a specific need, the personalized learning assumptions behind it are also applicable in other education cases.
APA, Harvard, Vancouver, ISO, and other styles
8

Guarda, Graziela Ferreira. "ANALYSIS OF CONTRACTS OF IT OUTSOURCING SERVICES IN TCU AND LEGISLATION GOVERNING THESE CONTRACTS IN FEDERAL PUBLIC ADMINISTRATION." In 11th CONTECSI International Conference on Information Systems and Technology Management. TECSI, 2014. http://dx.doi.org/10.5748/9788599693100-11contecsi/ps-1028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Flatau, Alison, Usha Varshney, and Peter Chang. "Future Trends in Sensed-Information Technology and Sensor Systems Research." In ASME 2002 International Mechanical Engineering Congress and Exposition. ASMEDC, 2002. http://dx.doi.org/10.1115/imece2002-33177.

Full text
Abstract:
Advances in MEMs, wireless, information technology and other enabling technologies are leading to new sensor system functionality and access to more accurate data and information than heretofore realizable. These advances are crucial for realizing the full potential of the on-going transition from data-poor to data-rich and information-poor to information-rich science and engineering practices. With decreases in size and cost of sensors resulting from advances in microsystem technologies, ubiquitous sensing is becoming both physically realizable and economically feasible. New developments in sensed-information technologies offer the promise of novel insights and advances in areas that have previously lacked the technology base for acquiring high resolution and highly specific assessments of state (biologic, chemical, physical, optical, etc.). Increased research and education are needed in new technologies addressing research issues relating to new hardware and software for efficient acquisition of data and information, and in new decision and control theory as tools for managing and using available data and information. New sensor system functionality will be realized through countless different design concepts. This paper examines some of the needs, opportunities, and trends for research and education in the area of sensed-information and sensor systems research.
APA, Harvard, Vancouver, ISO, and other styles
10

Minovski, Zoran, Bojan Malchev, and Todor Tocev. "NEW PARADIGM IN ACCOUNTING INFORMATION SYSTEMS – THE ROLE OF THE LATEST INFORMATION TECHNOLOGY TRENDS." In Economic and Business Trends Shaping the Future. Ss Cyril and Methodius University, Faculty of Economics-Skopje, 2020. http://dx.doi.org/10.47063/ebtsf.2020.0004.

Full text
Abstract:
The purpose of this paper is to identify the impact and benefits of the latest information technologies on Accounting Information Systems (AIS). Taking into account the numerous papers related to new technologies and their application in the accounting profession within Industry 4.0, and conducted survey about perception of practitioners in Republic of North Macedonia, this paper summarizes the characteristics and key benefits of some of the new technologies for the functioning of AIS in the digital age. First of all, the evolution of AIS is elaborated, based on theoretical and empirical analysis of the accounting process from the appearance of the first AIS up to nowadays’ services and techniques available for supporting the accounting function. The first technology to be elaborated is Big Data and its potential to change the business landscape, especially in the field of automating operation processes, customer engagements, and predictive decision-making process. Secondly, the Blockchain Technology as an example of Distributed Ledger Technology (DLT), which adoption brings new possibilities in eliminating or redefining the role of entities external to the company. Cloud Computing i.e. Cloud Accounting is the third technology which is elaborated in this paper through the services it offers on the cloud, especially the way AIS process, store and backup the sensitive and confidential data. Last but not least, Artificial Intelligence (AI), a technology that could change the professional services, the need, and opportunities that are provided for a solution to the current accounting issues. In summary, taking into account the relevant literature and the perception of the respondents-practitioners, increased use of these technologies is necessary because their application reduces costs; increases transparency and confidence in information; flexibility, i.e. no time and space restrictions on their use, etc., which is especially useful in the current state of Pandemic, caused by the virus COVID-19.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Theses – Information systems and technology"

1

Karam, Sofia, Morteza Nagahi, Vidanelage Dayarathna, Junfeng Ma, Raed Jaradat, and Michael Hamilton. Integrating systems thinking skills with multi-criteria decision-making technology to recruit employee candidates. Engineer Research and Development Center (U.S.), June 2021. http://dx.doi.org/10.21079/11681/41026.

Full text
Abstract:
The emergence of modern complex systems is often exacerbated by a proliferation of information and complication of technologies. Because current complex systems challenges can limit an organization's ability to efficiently handle socio-technical systems, it is essential to provide methods and techniques that count on individuals' systems skills. When selecting future employees, companies must constantly refresh their recruitment methods in order to find capable candidates with the required level of systemic skills who are better fit for their organization's requirements and objectives. The purpose of this study is to use systems thinking skills as a supplemental selection tool when recruiting prospective employees. To the best of our knowledge, there is no prior research that studied the use of systems thinking skills for recruiting purposes. The proposed framework offers an established tool to HRM professionals for assessing and screening of prospective employees of an organization based on their level of systems thinking skills while controlling uncertainties of complex decision-making environment with the fuzzy linguistic approach. This framework works as an expert system to find the most appropriate candidate for the organization to enhance the human capital for the organization.
APA, Harvard, Vancouver, ISO, and other styles
2

Lenfant, Babette M. Protecting Our Critical Information Technology Systems. Fort Belvoir, VA: Defense Technical Information Center, May 2004. http://dx.doi.org/10.21236/ada427670.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stoneburner, Gary, Alice Goguen, and Alexis Feringa. Risk management guide for information technology systems :. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Swanson, Marianne, Amy Wohl, Lucinda Pope, Tim Grance, Joan Hash, and Ray Thomas. Contingency planning guide for information technology systems :. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Grance, T., J. Hash, S. Peck, J. Smith, and K. Korow-Diks. Security guide for interconnecting information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Swanson, M., N. Bartol, J. Sabato, J. Hash, and L. Graffo. Security metrics guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hendrickson, David A., and Gregory W. Bayer. Environment, safety, and health information technology systems integration. Office of Scientific and Technical Information (OSTI), February 2006. http://dx.doi.org/10.2172/877731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Swanson, Marianne. Security self-assessment guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Swanson, Marianne. Guide for developing security plans for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 1998. http://dx.doi.org/10.6028/nist.sp.800-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Swanson, Marianne, and Barbara Guttman. Generally accepted principles and practices for securing information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.sp.800-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography