Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

PDF

Regis University

Theses/Dissertations

2011

MS Information Technology Management

Articles 1 - 9 of 9

Full-Text Articles in Entire DC Network

Continuous Monitoring In The Cloud Environment, Victoria Nyffeler Oct 2011

Continuous Monitoring In The Cloud Environment, Victoria Nyffeler

Regis University Student Publications (comprehensive collection)

The National Institute of Standards and Technology introduced a risk management framework that concludes with a process for continuous monitoring. Continuous monitoring is a way to gain near real-time insight into the security health of an information technology environment. The cloud environment is unique from other environments in the way that resources are virtualized and shared among many cloud tenants. This type of computing has been gaining popularity as a solution for organizations to purchase resources as an on-demand service in the same way that an organization purchases utilities today. In order to experience the benefits promised by the emergence …


An Inquiry Regarding The Development Of An Effectual Architecture Framework Supporting Next Generation 9-1-1, Patrick Purdy Oct 2011

An Inquiry Regarding The Development Of An Effectual Architecture Framework Supporting Next Generation 9-1-1, Patrick Purdy

Regis University Student Publications (comprehensive collection)

The emergency 9-1-1 service is a vital part of our nation"â„¢s emergency response and disaster preparedness systems. At last count there were 6100 Public Safety Answering Points across the United States, 97 of those reside in the State of Colorado, and the citizens of the United States cannot email, text, or instant message these types of non-traditional communication to those Public Safety Answering Points due to technological limitations. The trends in personal communication technologies are accelerating the obsolescence of the current 9-1-1 systems. The Public Safety Answering Point of today is designed to accept and process voice media only; and …


Examining Military Retention Rates Of It Service Members: Research Towards Mitigating The Loss Of It Professional Service Members, Paul B. Warner Aug 2011

Examining Military Retention Rates Of It Service Members: Research Towards Mitigating The Loss Of It Professional Service Members, Paul B. Warner

Regis University Student Publications (comprehensive collection)

The turnover rate for information technology professionals in the military is high due to a demand for skilled information technology (IT) professionals in the private sector that value the IT training professionals receive in the military, and which can offer the compensation to lure military personnel to the civilian market. The Department of Defense consistently invests a great deal of time and money into Information Technology trained service members, only to lose them to attractive job positions with civilian companies which are in demand for their specialized skills. With a MOS (mission of service) field that requires a larger monetary …


Erp Implementation: An Investigation Into Social Capital And Knowledge Extraction In The Public Sector., Corey E. Jensen Aug 2011

Erp Implementation: An Investigation Into Social Capital And Knowledge Extraction In The Public Sector., Corey E. Jensen

Regis University Student Publications (comprehensive collection)

The elements of a successful Enterprise Resource Planning implementation strategy have been widely researched in the information technology field. Many have sought to compile a complete list of attributes that, if utilized, would guarantee a successful ERP implementation while also adhering to relative time and budget constraints. While several critical success factors have been identified and further enabled higher success rates in evolving ERP implementation strategy, there appears to be room for additional improvement. Extracting essential corporate knowledge from existing information systems in effort to implement an ERP solution is often one of the most challenging tasks of the implementation …


Use Of Service Oriented Architecture For Scada Networks, Scott H. Beavers May 2011

Use Of Service Oriented Architecture For Scada Networks, Scott H. Beavers

Regis University Student Publications (comprehensive collection)

Supervisory Control and Data Acquisition (SCADA) systems involve the use of distributed processing to operate geographically dispersed endpoint hardware components. They manage the control networks used to monitor and direct large-scale operations such as utilities and transit systems that are essential to national infrastructure. SCADA industrial control networks (ICNs) have long operated in obscurity and been kept isolated largely through strong physical security. Today, Internet technologies are increasingly being utilized to access control networks, giving rise to a growing concern that they are becoming more vulnerable to attack. Like SCADA, distributed processing is also central to cloud computing or, more …


A Qualitative Study To Explore The Low Number Of Women In Information Technology In The United States, William Baker Apr 2011

A Qualitative Study To Explore The Low Number Of Women In Information Technology In The United States, William Baker

Regis University Student Publications (comprehensive collection)

The number of women in Information Technology in the United States has historically been lower than the number of men in the field. This study explores the reasons behind this disparity and recommends steps that can be taken to increase the number of women in the field. This qualitative study examines why women are not attracted to the Information Technology field and examines reasons why women leave the field. Surveys were conducted with two populations, (1) women who currently work in Information Technology and (2) Information Technology recruiters. The results of these surveys were analyzed to see if there were …


Understanding Data Within The Enterprise To Control Or Reduce Data Storage Growth, Anthony Daubenmerkl Apr 2011

Understanding Data Within The Enterprise To Control Or Reduce Data Storage Growth, Anthony Daubenmerkl

Regis University Student Publications (comprehensive collection)

Data is collected from a number of entities within the business environment; it is the essential component that guides the decision making process. Data management is a topic that continues to be discussed as our ability to collect and store data expands. The purpose of this study was to determine whether the data, in the context of the enterprise and its management, was understood allowing best practice data collection and storage policies to be defined. Data collection and storage are tightly coupled in the discussion of storage growth. The literature review showed that a number of data management lifecycles and …


A Methodology For Capturing Tacit Knowledge Within The Defense Industry, Stephen M. Dokus Apr 2011

A Methodology For Capturing Tacit Knowledge Within The Defense Industry, Stephen M. Dokus

Regis University Student Publications (comprehensive collection)

This study looks at the knowledge management practices used by study participants from the defense industry and offers a methodology for capturing tacit knowledge. Interviews were conducted with stakeholders involved in work teams focused on the development and acquisition of defense systems. Those interviewed held various staff and management positions in Program Management (PM), Enterprise Architecture (EA), and system safety auditing. This researcher conducted primary research in the form of a Case Study. Interviewees in the defense industry supporting the Army, Marine Corps and Military aeronautics were interviewed and asked to provide feedback on their experiences and knowledge of tacit …


Evaluating Best Practices In Document Management, Angela Lokie Apr 2011

Evaluating Best Practices In Document Management, Angela Lokie

Regis University Student Publications (comprehensive collection)

The purpose of this research is to create a knowledgebase of best practices for records managers to select the vendor that best fits the individual needs of the organization. Investigative interviews were conducted with individuals from Association for Information and Image Management (AIIM) and the Project Management Institute (PMI). These project managers were asked questions in regards to the best practices when implementing a document management system. Best practices are relevant when implementing a document management solution. In order to consider best practices when implementing a document management solution, the following research objectives will be taken into consideration: How do …