Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Keyword
-
- Activity theory (1)
- Banking standards (1)
- Data Base Review (1)
- Delayed Observations (1)
- Education (1)
-
- Email interviewing (1)
- Information Literacy Tutorial (1)
- Information literacy (1)
- Information security (1)
- Information security administration (1)
- Information security governance (1)
- Information security planning (1)
- Interpretative phenomenological analysis (1)
- Middle managers (1)
- Partially Observable Markov Decision Process (1)
- RDS (1)
- Risk management (1)
- Social sciences (1)
- Strategic management (1)
- Strategy implementation (1)
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Business
Perception Of African Youth On Personal Computer Utilization: The Case Of Ethiopia And Rwanda, S. Negash
Perception Of African Youth On Personal Computer Utilization: The Case Of Ethiopia And Rwanda, S. Negash
Faculty and Research Publications
The tendency to pursue innovativeness and adopt new technologies has been found more likely with younger individuals and a strong relationship between attitude and personal computer (PC) utilization has been found. However, research in these areas is mainly focused on high-income countries. Do these findings hold for low-income countries? What are the perceptions of African youth on the factors that impact PC use? There is a dearth of micro-level studies that promote understanding about the behavior of individuals in low-income countries. This study looked at demographic data including age, gender, grade level, region, and prior experience among 228 youth from …
Banking Standards - Submission From Professor Stella Fearnley (Bournemouth University) And Professor Shyam Sunder (Yale School Of Management) (S037), Shyam Sunder, Stella Fearnley
Banking Standards - Submission From Professor Stella Fearnley (Bournemouth University) And Professor Shyam Sunder (Yale School Of Management) (S037), Shyam Sunder, Stella Fearnley
Shyam Sunder
Swot Analysis (Using Bsp And Lexisnexis), Larry Sheret
Swot Analysis (Using Bsp And Lexisnexis), Larry Sheret
Larry Sheret
A SWOT analysis looks at a company's strengths, weaknesses, opportunities and threats. This three minute video will show you where and how to search for a company's SWOT. (30 MB 3min 1 sec)
Delayed Observation Planning In Partially Observable Domains, Pradeep Reddy Varakantham, Janusz Marecki
Delayed Observation Planning In Partially Observable Domains, Pradeep Reddy Varakantham, Janusz Marecki
Research Collection School Of Computing and Information Systems
Traditional models for planning under uncertainty such as Markov Decision Processes (MDPs) or Partially Observable MDPs (POMDPs) assume that the observations about the results of agent actions are instantly available to the agent. In so doing, they are no longer applicable to domains where observations are received with delays caused by temporary unavailability of information (e.g. delayed response of the market to a new product). To that end, we make the following key contributions towards solving Delayed observation POMDPs (D-POMDPs): (i) We first provide an parameterized approximate algorithm for solving D-POMDPs efficiently, with desired accuracy; and (ii) We then propose …
A Middle Management Perspective On Strategy Implementation, Ahmad Salih
A Middle Management Perspective On Strategy Implementation, Ahmad Salih
Presidential Alumni Research Dissemination Award
Strategic management researchers have established the key role middle managers play in the implementation of organizational strategies. However, there is little information regarding middle managers' views and perceptions of strategy implementation and the challenges associated with implementing organizational strategies. Drawing from activity theory and inspired by the strategy-as-practice perspective, the purpose of this qualitative phenomenological study was to understand the views and perceptions of 12 middle managers and 3 management consultants on the factors influencing organizational strategy implementation. The research questions addressed in this study included the views of middle managers on: (a) the key challenges associated with strategy implementation, …
Threats To Information Security Revisited, Michael Whitman, Herbert J. Mattord
Threats To Information Security Revisited, Michael Whitman, Herbert J. Mattord
Faculty and Research Publications
The battle for the protection of information assets continues to rage at all organizations, big and small. In the ever-changing world of information security, new threats emerge, and old threats remain potent risks to poorly prepared organizations. It is critical to the ongoing protection of valuable information assets to understand these threats, new and old. This study seeks to inform organizations and researchers about the characteristics of specific threat categories and the relative dangers they pose. In addition, the study provides updated findings of a study conducted in 2002. New findings reveal the more things change, the more they stay …