Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Chief Information officer (CIOs) (1)
- Computerization (1)
- Court processes (1)
- Cybersecurity (1)
- Diffusion of Innovation Theory (1)
-
- Digitization (1)
- Documentation and Implementation plan (1)
- Experimental design (1)
- IT Officers (1)
- Industrial internet of things (1)
- Information security (1)
- Internet of things (1)
- Manufacturing (1)
- Missing data theory (1)
- Missing value (1)
- Network Function Virtualization (NFV) (1)
- Operational costs and Efficiency (1)
- Regional Economic Community (1)
- Software cost estimation (1)
- Software effort estimation (1)
- Software-Defined Networking (SDN) (1)
- Statistical imputation (1)
- Strategies (1)
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo
The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo
Walden Dissertations and Doctoral Studies
Despite information technology (IT) officers’ multiple efforts to develop reliable and efficient electronic justice (e-justice) systems, digitizing court processes still presents several quality challenges associated with IT infrastructure and literacy issues. Grounded in the principles of total quality management, the purpose of this qualitative multiple case study was to identify strategies and best practices IT officers in African regional economic communities (REC) use for digitizing regional and subregional court processes to improve African e-justice systems. The participants included four IT officers working as assistant computer system analysts (ACSA), computer system analysts (CSA), and heads of IT (HIT) in regional and …
Predictability Of Missing Data Theory To Improve U.S. Estimator’S Unreliable Data Problem, Tomeka S. Williams
Predictability Of Missing Data Theory To Improve U.S. Estimator’S Unreliable Data Problem, Tomeka S. Williams
Walden Dissertations and Doctoral Studies
Since the topic of improving data quality has not been addressed for the U.S. defense cost estimating discipline beyond changes in public policy, the goal of the study was to close this gap and provide empirical evidence that supports expanding options to improve software cost estimation data matrices for U.S. defense cost estimators. The purpose of this quantitative study was to test and measure the level of predictive accuracy of missing data theory techniques that were referenced as traditional approaches in the literature, compare each theories’ results to a complete data matrix used in support of the U.S. defense cost …
Network Function Virtualization Technology Adoption Strategies, Abdlrazaq Ayodeji Adeyi Shittu
Network Function Virtualization Technology Adoption Strategies, Abdlrazaq Ayodeji Adeyi Shittu
Walden Dissertations and Doctoral Studies
Network function virtualization (NFV) is a novel system adopted by service providers and organizations, which has become a critical organizational success factor. Chief information officers (CIOs) aim to adopt NFV to consolidate and optimize network processes unavailable in conventional methods. Grounded in the diffusion of innovation theory (DOI), the purpose of this multiple case research study was to explore strategies chief information officers utilized to adopt NFV technology. Participants include two CIOs, one chief security information officer (CSIO), one chief technical officer (CTO), and two senior information technology (IT) executives. Data were collected through semi-structured telephone interviews and eight organizational …
Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez
Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez
Walden Dissertations and Doctoral Studies
The Internet of Things (IoT) has been exploited as a threat vector for cyberattacks in manufacturing environments. Manufacturing industry leaders are concerned with cyberattacks because of the associated costs of damages and lost production for their organizations. Grounded in the general systems theory, the purpose of this multiple case study was to explore strategies electrical controls engineers use to implement secure IoT devices in manufacturing environments. The study participants were eight electrical controls engineers working in three separate manufacturing facilities located in the Midwest region of the United States. The data were collected by semistructured interviews and 15 organizational documents. …