Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Data management

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 13 of 13

Full-Text Articles in Business

End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn Dec 2019

End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn

Communications of the IIMA

Business information, held within information systems, is critical for most organizations. To protect these critical information assets, security controls should be deployed which might come as a hindrance for the end-users. The Information Security Policies (ISP) give direction to their behaviors. Organizations can focus on conditions likely to promote so-called motivational factors influencing the end-users intentions to perform the desired behavior of compliance to ISP in order to protect these information assets.

In total, six motivational factors, applicable to intentions on compliance, are found during research and are measured within five organizational contexts. From the measurements and analysis is learned, …


The Application Of Paperless Processes To Improve Data Management Within Small To Medium Businesses, Kelley D. Nemec May 2019

The Application Of Paperless Processes To Improve Data Management Within Small To Medium Businesses, Kelley D. Nemec

Honors College Theses

Businesses are creating new value by implementing new processes built on modern tools. Small businesses, though, with much fewer resources than the most significant competitors, cannot follow the same path. How can these businesses use standard, widely available tools and techniques to improve their processes and create value within their business? This paper discusses the implementation of paperless processes using the electronic form technology, Google Forms, within the Honors Program at Georgia Southern University over two years. Action research methods were used to guide the research and implementation of new processes. Through the introduction of cloud-based electronic forms and process …


Examining The Role Of Business Intelligence And Analytics In Hospitality Revenue Management, Anna I. Kharitonova May 2019

Examining The Role Of Business Intelligence And Analytics In Hospitality Revenue Management, Anna I. Kharitonova

UNLV Theses, Dissertations, Professional Papers, and Capstones

Most hospitality revenue management forecasting systems were built prior to the business intelligence and analytics movement. Only recently these systems have been enhanced to offer contemporary business intelligence and analytics functionalities. In addition, revenue management professionals are receiving support from standalone, supplementary business intelligence and analytics platforms. The purpose of this dissertation was to produce a holistic review of and establish the role of business intelligence and analytics within hospitality revenue management. Data was collected from twenty-three interviews; all participants were employed by hospitality organizations in revenue management specific positions. Grounded theory methodology was utilized. The results show that nearly …


Audubon Data Project Final Report, Askhat Beygenov, Valinur Kutlambetov, Shrikant Patel, Phoebe Roberts, Ulfat Sayyed, Shriram Sivaraman Jan 2018

Audubon Data Project Final Report, Askhat Beygenov, Valinur Kutlambetov, Shrikant Patel, Phoebe Roberts, Ulfat Sayyed, Shriram Sivaraman

School of Professional Studies

The Audubon Data Project was initiated as a Clark University Capstone project. The project’s client, Mass Audubon’s Shaping the Future of Your Community program, had identified a need to improve their data management methods and make better use of their data. The Capstone team, composed of Clark University graduate students, met with the client regularly to review the current state of the data and potential improvements to be made. The process began with a data review. During the review we worked with the client to explicitly define the purposes and requirements of the data, the current process for updating and …


Data Breaches In Higher Education Institutions, Samantha Mello Jan 2018

Data Breaches In Higher Education Institutions, Samantha Mello

Honors Theses and Capstones

No abstract provided.


Green Freight Asia (C): The Road Ahead, Jason Woodard, Christopher Dula Jan 2015

Green Freight Asia (C): The Road Ahead, Jason Woodard, Christopher Dula

C. Jason Woodard

Green Freight Asia is a three-part case series featured in the 2014 APEX Business-IT Global Case Challenge. The case is best used for group projects or workshop assignments concerning business-IT related topics. In this case, students take on the role of a small firm pitching to collaborate with GFA on an IT solution partnership to support GFA’s programme for the adoption of green freight practices in the Asia Pacific region. The case could also be adapted for classroom facilitation with adequate preparation.


Green Freight Asia (C): The Road Ahead is the third and final part of the case series. It …


Green Freight Asia (A): Driving The Adoption Of Sustainable Supply Chain Practices, Jason Woodard, Christopher Dula Jan 2015

Green Freight Asia (A): Driving The Adoption Of Sustainable Supply Chain Practices, Jason Woodard, Christopher Dula

C. Jason Woodard

Green Freight Asia is a three-part case series featured in the 2014 APEX Business-IT Global Case Challenge. The case is best used for group projects or workshop assignments concerning business-IT related topics. In this case, students take on the role of a small firm pitching to collaborate with GFA on an IT solution partnership to support GFA’s programme for the adoption of green freight practices in the Asia Pacific region. The case could also be adapted for classroom facilitation with adequate preparation. The first part, Green Freight Asia (A): Driving the Adoption of Sustainable Supply Chain Practices, chronicles the formation …


Green Freight Asia (B): Navigating Toward A Successful Partnership, Jason Woodard, Christopher Dula Jan 2015

Green Freight Asia (B): Navigating Toward A Successful Partnership, Jason Woodard, Christopher Dula

C. Jason Woodard

Green Freight Asia is a three-part case series featured in the 2014 APEX Business-IT Global Case Challenge. The case is best used for group projects or workshop assignments concerning business-IT related topics. In this case, students take on the role of a small firm pitching to collaborate with GFA on an IT solution partnership to support GFA’s programme for the adoption of green freight practices in the Asia Pacific region. The case could also be adapted for classroom facilitation with adequate preparation. The second part, Green Freight Asia (B): Navigating Toward A Successful Partnership, explores how a collaborative partnership between …


Swimming Upstream: Challenges To Working Throughout The Data Life Cycle, Lisa Zilinski Oct 2012

Swimming Upstream: Challenges To Working Throughout The Data Life Cycle, Lisa Zilinski

Lisa Zilinski

This presentation explores some of the challenges librarians face in working upstream in the research data life cycle and proposes an outline for a possible training workshop.


An Examination Of Information Technology Valuation Models For The Air Force, Todd A. Peachey Sep 1998

An Examination Of Information Technology Valuation Models For The Air Force, Todd A. Peachey

Theses and Dissertations

Information technology investment has become a significant part of the Department of Defense's budget. The Information Technology Management Reform Act requires that government quantitatively evaluate future information technology investments. Quantitative evaluation of IT investments present special problems for agencies that do not generate incoming cash flows. This thesis is designed to examine models that are currently being used in the public and private sector of the economy to evaluate Information Technology investments to learn which ones might serve the needs of the United States Air Force. The methodology is an exploratory study based on Criterion based Congruence Analysis. This technique …


An Exploratory Study On The Strategic Use Of Information Technology In The Source Selection Decision-Making Process, Kathy L. Spainhower Sep 1998

An Exploratory Study On The Strategic Use Of Information Technology In The Source Selection Decision-Making Process, Kathy L. Spainhower

Theses and Dissertations

The strategic use of Information Technology in the acquisition field can be very useful in the decision making process of evaluating alternative solutions during a Government source selection. Current implementation of information technology provides a more tactical approach to systems development. The use of Electronic Commerce/Electronic Data Interchange and the internet to electronically transfer information is only the beginning of the shift towards a more strategic design process for information systems within Government procurement agencies. A schematic model was designed to demonstrate how information technology, such as Decision Support Systems, Expert Systems, and Shared Data Warehousing could assist the SSA …


Get Your Hands Out Of My Drawers: A Survey Of Information Ownership And Stewardship At The Air Force Institute Of Technology, Keith E. Kolekofski Jr. Dec 1997

Get Your Hands Out Of My Drawers: A Survey Of Information Ownership And Stewardship At The Air Force Institute Of Technology, Keith E. Kolekofski Jr.

Theses and Dissertations

Despite beliefs in the benefits of good Information Resources Management (IRM) practices, executives still find their organizations plagued by outdated, inconsistent, and unavailable information. This information is often stored in disparate, standalone systems spread throughout the business. The Air Force Institute of Technology (AFIT) fails to reap the synergistic benefits of shared information despite its bounty of information systems and proclamations for IRM principles. Previous researcher postulated that this disconnect may be explained, in part, by an ownership attitude at the functional level. Empirical evidence gathered from a survey of AFIT's members failed to support Plant's hypothesis. Exploratory factor analysis …


Information Resource Management: An Analysis Of The Critical Skills, Training Sources, And Training Adequacy As Perceived By Air Force Communications And Information Officers, Donald A. Schmidt Dec 1997

Information Resource Management: An Analysis Of The Critical Skills, Training Sources, And Training Adequacy As Perceived By Air Force Communications And Information Officers, Donald A. Schmidt

Theses and Dissertations

This study explores what Information Resource Management (IRM) skills are required as perceived by the Air Force officers performing IRM duties. The following questions set the stage for this research: (1) What does current literature say about the required skills needed for IRM professionals? (2) What IRM skills do officers in the field perceive as important to the IRM mission? (3) What is the primary source of any IRM training received by the officers? (4) How adequate was this training, if any? The results suggest that Air Force officers have a grasp of IRM concepts and know what skills are …