Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (22)
- Business Administration, Management, and Operations (9)
- Management Sciences and Quantitative Methods (9)
- Social and Behavioral Sciences (5)
- Arts and Humanities (4)
-
- Medicine and Health Sciences (4)
- Organizational Behavior and Theory (4)
- Communication (2)
- Education (2)
- Engineering (2)
- Entrepreneurial and Small Business Operations (2)
- Health and Medical Administration (2)
- Library and Information Science (2)
- Software Engineering (2)
- African American Studies (1)
- Artificial Intelligence and Robotics (1)
- Educational Administration and Supervision (1)
- Information Security (1)
- Instructional Media Design (1)
- International and Area Studies (1)
- Latin American Languages and Societies (1)
- Latin American Studies (1)
- Management Information Systems (1)
- Mass Communication (1)
- Mechanical Engineering (1)
- Numerical Analysis and Scientific Computing (1)
- Other Communication (1)
- Institution
- Publication Year
- Publication
- Publication Type
Articles 31 - 47 of 47
Full-Text Articles in Databases and Information Systems
Challenges And Implications Of Implementing Strategic Intelligence Systems In Mexico, Hector De Jesus Rivera Ochoa
Challenges And Implications Of Implementing Strategic Intelligence Systems In Mexico, Hector De Jesus Rivera Ochoa
Walden Dissertations and Doctoral Studies
Business intelligence (BI) allows companies to make faster and better-informed decisions. Unfortunately, implementing BI systems in companies in developing countries is minimal. Limited and costly access to the technology, coupled with the cultural background affecting how people perceive BI, has restricted such implementations. The purpose of this phenomenological study was to explore and describe the lived experiences of chief executive officers (CEOs) in northern Mexico to obtain insight into the challenges of implementing BI systems. Research questions focused on the reasons behind the lack of BI systems implementation and the challenges faced by these officers when implementing a new system. …
Adoption Of Information And Communication Technology In Nigerian Small- To Medium-Size Enterprises, Kessington Enaye Okundaye
Adoption Of Information And Communication Technology In Nigerian Small- To Medium-Size Enterprises, Kessington Enaye Okundaye
Walden Dissertations and Doctoral Studies
Small- to medium-size enterprises (SMEs) play a vital role in a dynamic economy through job creation, poverty alleviation, and socioeconomic development in developed and developing countries. The purpose of this multiple case study was to explore how SME leaders in Lagos, Nigeria, adopted information and communication technology (ICT) as a business strategy to increase profitability and compete globally. Organizational leaders have adopted ICT so that their organizations can become more efficient, effective, innovative, and globally competitive. This study involved 4 SMEs that had successfully implemented ICT. The participants included 5 SME leaders from each of the SMEs. The data collection …
Effect Of Retiring Custom Web Applications On Business And Information Technology Alignment, Shubhashree Thekahally
Effect Of Retiring Custom Web Applications On Business And Information Technology Alignment, Shubhashree Thekahally
Shubhashree Thekahally 7340504
Web applications provide the information technology (IT) implementation of business and align IT with business. Retirement of IT applications should ensure stability of business and IT alignment. The current study investigated the alignment gaps created between business and IT resulting from retiring IT software applications. The purpose of this study was to identify IT integration points with business and provide a process-based solution that sustained IT alignment with business after retiring IT applications. The theoretical framework strategic alignment model aided in identifying 3 IT domains as the IT integration points with business: enterprise architecture, configuration management database, and service-level agreement. …
Socioeconomic Challenges Faced By African American Men Entering The Information Technology Industry, Melvin Smith
Socioeconomic Challenges Faced By African American Men Entering The Information Technology Industry, Melvin Smith
Walden Dissertations and Doctoral Studies
African American men experience impediments when entering the field of Information Technology (IT), which may portend the disappearance of this ethnic group from the technology-driven work force of the future. The purpose of this phenomenological study was to investigate the socioeconomic factors faced by African American men from their own viewpoints. With this goal in mind, three research questions were studied focusing on the availably of IT resources; the quality of science, technology, engineering, and math (STEM) based education; and existing hiring practices within the IT industry. The conceptual framework for this study was the critical theory perspective, which provided …
A Comprehensive Analysis Of Computer Use Among African Americans, Kandice Lauren Smith
A Comprehensive Analysis Of Computer Use Among African Americans, Kandice Lauren Smith
Walden Dissertations and Doctoral Studies
On average, African Americans receive lower wages in the workplace due to lack of advanced technical skills. The reason for technical deficiency among some African Americans is often lack of exposure to IT resources at an early age. The purpose of this ethnographic study was to identify and explore the factors that contribute to lack of IT resources available to some African Americans to cultivate IT skills. Information literacy theory formed the conceptual framework, which focused on information resources that African American and Caucasians use in the workforce for problem solving and retrieving information. Data were collected by conducting face-to-face …
Employees' Perceptions Of Managerial Transformational Leadership Behaviors And Effectiveness Among Information Technology Managers, Olusesan Ogunsakin
Employees' Perceptions Of Managerial Transformational Leadership Behaviors And Effectiveness Among Information Technology Managers, Olusesan Ogunsakin
Walden Dissertations and Doctoral Studies
The selection of effective leaders is critical to improving organizations' performance in the current dynamic global business landscape; however, the inadequacy of leadership selection criteria in many organizations had led to an increase in the rate of chief executive officers' dismissals within the last 3 decades in the United States. The purpose of this correlational study was to examine the relationship between employees' assessments of their managers' transformational leadership behaviors and employees' perceptions of managerial leadership effectiveness for improved leadership selection. Bass' transformational leadership theory and Herzberg's motivation-hygiene theory guided the study with data gathered, using an online survey, from …
Exploring Strategies For Retaining Information Technology Professionals: A Case Study, Shannon J. Thomas
Exploring Strategies For Retaining Information Technology Professionals: A Case Study, Shannon J. Thomas
Walden Dissertations and Doctoral Studies
In the 21st century, retaining information technology (IT) professionals is critical to a company's productivity and overall success. Senior IT leaders need effective strategies to retain skilled IT professionals. Guided by the general systems theory and the transformational leadership theory, the purpose of this qualitative exploratory case study was to explore the retention strategies used by 2 senior IT leaders in Atlanta, Georgia to retain IT professionals. Semistructured interviews were employed to elicit detailed narratives from these IT leaders on their experiences in retaining IT professionals. A review of company documents, as well as member-checking of initial interview transcripts, helped …
Mind & Matter: The Discursive Construction Of The Iphone In Apple's Advertising, Nicholas Stratton
Mind & Matter: The Discursive Construction Of The Iphone In Apple's Advertising, Nicholas Stratton
Theses and Dissertations
The widespread adoption of smartphone technology in the contemporary United States requires critical reflection on its role within society. This thesis compares the way Apple's television advertising discourse, from 2007 to 2011, frames the iPhone to consumers with the way Apple's iAd promotional material frames the iPhone to advertisers, and considers what the disparity between these two frameworks says about the still-evolving role of smartphone technology in society. It argues that the disparity between these two frameworks is indicative of a fundamental tension within smartphone technology. This tension is reflected in Apple's ability to discursively construct the iPhone as a …
Google Books As Infrastructure Of In/Justice: Towards A Sociotechnical Account Of Rawlsian Justice, Information, And Technology, Anna Lauren Hoffmann
Google Books As Infrastructure Of In/Justice: Towards A Sociotechnical Account Of Rawlsian Justice, Information, And Technology, Anna Lauren Hoffmann
Theses and Dissertations
The Google Books project is germane for examining underappreciated dimensions of social justice and access to information from a Rawlsian perspective. To date, however, the standard account of Rawls as applied to information and technology has focused almost exclusively on rights to access and information as a primary good (Drahos 1996; van den Hoven and Rooksby 2008; Duff 2011). In this dissertation, the author develops an alternative to the standard account--the sociotechnical account--that draws on underappreciated resources available within discussions of Rawls' work. Specifically, the author focuses on the importance of Rawls' basic structure argument and the value of self-respect--two …
Supporting And Securing Personal Mobile Devices Within An Existing Information Technology Environment, George Allen Patton
Supporting And Securing Personal Mobile Devices Within An Existing Information Technology Environment, George Allen Patton
Walden Dissertations and Doctoral Studies
Personal mobile devices are becoming integrated into the daily operations of business. Managers are realizing that employees who are allowed to use personal mobile devices to access corporate information systems may reduce costs as users buy their own devices. The problem was that managers have a limited understanding of the need to secure or support personal mobile devices. The purpose of this survey study was to examine the relationship between employees' desire to use personal mobile devices and corporation needs for security and support. Hypotheses were tested by examining the relationships between the requirement to support and secure personal mobile …
Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper
Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper
University of New Orleans Theses and Dissertations
A simulation algorithm based on biological references points proposed by Powell and Klink (2007) is implemented for predicting the total allowable catch of eastern oysters (Crassostrea virginica) from Louisiana’s coast. The model accepts initial per-square-meter shell mass and oyster size distributions as input. Fishing effort is provided as fractions removed of each resource for each month of the season. The model outputs the expected remaining shell mass and harvests of sack and seed oysters after discrete fishing months. Oyster mortality credits the shell budget, while fishing fractions debit oyster and shell resources. Surviving oysters grow larger along a …
Hybrid Methods For Feature Selection, Iunniang Cheng
Hybrid Methods For Feature Selection, Iunniang Cheng
Masters Theses & Specialist Projects
Feature selection is one of the important data preprocessing steps in data mining. The feature selection problem involves finding a feature subset such that a classification model built only with this subset would have better predictive accuracy than model built with a complete set of features. In this study, we propose two hybrid methods for feature selection. The best features are selected through either the hybrid methods or existing feature selection methods. Next, the reduced dataset is used to build classification models using five classifiers. The classification accuracy was evaluated in terms of the area under the Receiver Operating Characteristic …
Ikriya: Simulating Software Quality Enhancement With Selected Replacement Policies, Sindhu Dharani Murthy
Ikriya: Simulating Software Quality Enhancement With Selected Replacement Policies, Sindhu Dharani Murthy
Masters Theses & Specialist Projects
The quality of information systems in any organization helps to determine the
efficiency of the organization. Many organizations maintain a custom software portfolio, whose quality is important to the organization. Management would like to optimize the portfolio’s quality. Decisions about software replacement or enhancement are made based on organizational needs and priorities. The development resources allocated help in determining the quality of new software, and should be put to optimal use. Enhancing existing software might sound cheap and easy but it is not always efficient. This thesis proposes a simulation model - iKriya - for this problem. It explores the …
Database Security: What Students Need To Know, Meg C. Murray
Database Security: What Students Need To Know, Meg C. Murray
Faculty and Research Publications
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …
An Information Technology Therapy Approach To Micro-Enterprise Adoption Of Icts, Peter Wolcott, Sajda Qureshi, Mehruz Kamal
An Information Technology Therapy Approach To Micro-Enterprise Adoption Of Icts, Peter Wolcott, Sajda Qureshi, Mehruz Kamal
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
The advent of Information and Communication Technologies (ICTs) has opened up new opportunities for micro-enterprises to improve their businesses. However the challenges to using ICTs are impeding these businesses from growing into the drivers for development that they can be. This suggests that a potentially important driver of development needs to be supported. This paper investigates the adoption of ICTs in eight micro-enterprises in an underserved community of Omaha, Nebraska. Following an action research study, this research provides insight into the key challenges and opportunities facing micro-enterprises in their use of ICTs to create value for their businesses. Its contribution …
Java Performance Of The Rijndael Encryption Algorithm Across Compilers And Virtual Machines, Gregory Leavitt Orgill
Java Performance Of The Rijndael Encryption Algorithm Across Compilers And Virtual Machines, Gregory Leavitt Orgill
Theses and Dissertations
The Rijndael encryption algorithm has recently been published as the Advanced Encryption Standard (AES), a Federal Information Processing Standard, and is being accepted by developers and designers as the algorithm of choice where encryption is required. Java is becoming the language of choice for E-Business applications, many of which require cryptography. The performance of any Java application is dependent on the compiler and virtual machine used to compile and interpret. Prior research has provided performance information for the Rijndael algorithm in Java for specific virtual machines. This research includes the development of a Rijndael implementation in Java. Using Java system …
Electronic Commerce Application Development: A Comparison Of User And It Professional Perspectives, Douglas Havelka, Deepak Khazanchi
Electronic Commerce Application Development: A Comparison Of User And It Professional Perspectives, Douglas Havelka, Deepak Khazanchi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
Based on the theory of reasoned action and previous research identifying differences in beliefs between IS specialists and IS users, this paper outlines a proposed study to investigate differences/similarities in beliefs of users and developers in the context of electronic commerce application development projects. The authors are currently in the process of collecting data to address research question posed in this proposal.