Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Information Technology

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 31 - 47 of 47

Full-Text Articles in Databases and Information Systems

Challenges And Implications Of Implementing Strategic Intelligence Systems In Mexico, Hector De Jesus Rivera Ochoa Jan 2016

Challenges And Implications Of Implementing Strategic Intelligence Systems In Mexico, Hector De Jesus Rivera Ochoa

Walden Dissertations and Doctoral Studies

Business intelligence (BI) allows companies to make faster and better-informed decisions. Unfortunately, implementing BI systems in companies in developing countries is minimal. Limited and costly access to the technology, coupled with the cultural background affecting how people perceive BI, has restricted such implementations. The purpose of this phenomenological study was to explore and describe the lived experiences of chief executive officers (CEOs) in northern Mexico to obtain insight into the challenges of implementing BI systems. Research questions focused on the reasons behind the lack of BI systems implementation and the challenges faced by these officers when implementing a new system. …


Adoption Of Information And Communication Technology In Nigerian Small- To Medium-Size Enterprises, Kessington Enaye Okundaye Jan 2016

Adoption Of Information And Communication Technology In Nigerian Small- To Medium-Size Enterprises, Kessington Enaye Okundaye

Walden Dissertations and Doctoral Studies

Small- to medium-size enterprises (SMEs) play a vital role in a dynamic economy through job creation, poverty alleviation, and socioeconomic development in developed and developing countries. The purpose of this multiple case study was to explore how SME leaders in Lagos, Nigeria, adopted information and communication technology (ICT) as a business strategy to increase profitability and compete globally. Organizational leaders have adopted ICT so that their organizations can become more efficient, effective, innovative, and globally competitive. This study involved 4 SMEs that had successfully implemented ICT. The participants included 5 SME leaders from each of the SMEs. The data collection …


Effect Of Retiring Custom Web Applications On Business And Information Technology Alignment, Shubhashree Thekahally Nov 2015

Effect Of Retiring Custom Web Applications On Business And Information Technology Alignment, Shubhashree Thekahally

Shubhashree Thekahally 7340504

Web applications provide the information technology (IT) implementation of business and align IT with business. Retirement of IT applications should ensure stability of business and IT alignment. The current study investigated the alignment gaps created between business and IT resulting from retiring IT software applications. The purpose of this study was to identify IT integration points with business and provide a process-based solution that sustained IT alignment with business after retiring IT applications. The theoretical framework strategic alignment model aided in identifying 3 IT domains as the IT integration points with business: enterprise architecture, configuration management database, and service-level agreement. …


Socioeconomic Challenges Faced By African American Men Entering The Information Technology Industry, Melvin Smith Jan 2015

Socioeconomic Challenges Faced By African American Men Entering The Information Technology Industry, Melvin Smith

Walden Dissertations and Doctoral Studies

African American men experience impediments when entering the field of Information Technology (IT), which may portend the disappearance of this ethnic group from the technology-driven work force of the future. The purpose of this phenomenological study was to investigate the socioeconomic factors faced by African American men from their own viewpoints. With this goal in mind, three research questions were studied focusing on the availably of IT resources; the quality of science, technology, engineering, and math (STEM) based education; and existing hiring practices within the IT industry. The conceptual framework for this study was the critical theory perspective, which provided …


A Comprehensive Analysis Of Computer Use Among African Americans, Kandice Lauren Smith Jan 2015

A Comprehensive Analysis Of Computer Use Among African Americans, Kandice Lauren Smith

Walden Dissertations and Doctoral Studies

On average, African Americans receive lower wages in the workplace due to lack of advanced technical skills. The reason for technical deficiency among some African Americans is often lack of exposure to IT resources at an early age. The purpose of this ethnographic study was to identify and explore the factors that contribute to lack of IT resources available to some African Americans to cultivate IT skills. Information literacy theory formed the conceptual framework, which focused on information resources that African American and Caucasians use in the workforce for problem solving and retrieving information. Data were collected by conducting face-to-face …


Employees' Perceptions Of Managerial Transformational Leadership Behaviors And Effectiveness Among Information Technology Managers, Olusesan Ogunsakin Jan 2015

Employees' Perceptions Of Managerial Transformational Leadership Behaviors And Effectiveness Among Information Technology Managers, Olusesan Ogunsakin

Walden Dissertations and Doctoral Studies

The selection of effective leaders is critical to improving organizations' performance in the current dynamic global business landscape; however, the inadequacy of leadership selection criteria in many organizations had led to an increase in the rate of chief executive officers' dismissals within the last 3 decades in the United States. The purpose of this correlational study was to examine the relationship between employees' assessments of their managers' transformational leadership behaviors and employees' perceptions of managerial leadership effectiveness for improved leadership selection. Bass' transformational leadership theory and Herzberg's motivation-hygiene theory guided the study with data gathered, using an online survey, from …


Exploring Strategies For Retaining Information Technology Professionals: A Case Study, Shannon J. Thomas Jan 2015

Exploring Strategies For Retaining Information Technology Professionals: A Case Study, Shannon J. Thomas

Walden Dissertations and Doctoral Studies

In the 21st century, retaining information technology (IT) professionals is critical to a company's productivity and overall success. Senior IT leaders need effective strategies to retain skilled IT professionals. Guided by the general systems theory and the transformational leadership theory, the purpose of this qualitative exploratory case study was to explore the retention strategies used by 2 senior IT leaders in Atlanta, Georgia to retain IT professionals. Semistructured interviews were employed to elicit detailed narratives from these IT leaders on their experiences in retaining IT professionals. A review of company documents, as well as member-checking of initial interview transcripts, helped …


Mind & Matter: The Discursive Construction Of The Iphone In Apple's Advertising, Nicholas Stratton Dec 2014

Mind & Matter: The Discursive Construction Of The Iphone In Apple's Advertising, Nicholas Stratton

Theses and Dissertations

The widespread adoption of smartphone technology in the contemporary United States requires critical reflection on its role within society. This thesis compares the way Apple's television advertising discourse, from 2007 to 2011, frames the iPhone to consumers with the way Apple's iAd promotional material frames the iPhone to advertisers, and considers what the disparity between these two frameworks says about the still-evolving role of smartphone technology in society. It argues that the disparity between these two frameworks is indicative of a fundamental tension within smartphone technology. This tension is reflected in Apple's ability to discursively construct the iPhone as a …


Google Books As Infrastructure Of In/Justice: Towards A Sociotechnical Account Of Rawlsian Justice, Information, And Technology, Anna Lauren Hoffmann May 2014

Google Books As Infrastructure Of In/Justice: Towards A Sociotechnical Account Of Rawlsian Justice, Information, And Technology, Anna Lauren Hoffmann

Theses and Dissertations

The Google Books project is germane for examining underappreciated dimensions of social justice and access to information from a Rawlsian perspective. To date, however, the standard account of Rawls as applied to information and technology has focused almost exclusively on rights to access and information as a primary good (Drahos 1996; van den Hoven and Rooksby 2008; Duff 2011). In this dissertation, the author develops an alternative to the standard account--the sociotechnical account--that draws on underappreciated resources available within discussions of Rawls' work. Specifically, the author focuses on the importance of Rawls' basic structure argument and the value of self-respect--two …


Supporting And Securing Personal Mobile Devices Within An Existing Information Technology Environment, George Allen Patton Jan 2014

Supporting And Securing Personal Mobile Devices Within An Existing Information Technology Environment, George Allen Patton

Walden Dissertations and Doctoral Studies

Personal mobile devices are becoming integrated into the daily operations of business. Managers are realizing that employees who are allowed to use personal mobile devices to access corporate information systems may reduce costs as users buy their own devices. The problem was that managers have a limited understanding of the need to secure or support personal mobile devices. The purpose of this survey study was to examine the relationship between employees' desire to use personal mobile devices and corporation needs for security and support. Hypotheses were tested by examining the relationships between the requirement to support and secure personal mobile …


Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper Aug 2013

Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper

University of New Orleans Theses and Dissertations

A simulation algorithm based on biological references points proposed by Powell and Klink (2007) is implemented for predicting the total allowable catch of eastern oysters (Crassostrea virginica) from Louisiana’s coast. The model accepts initial per-square-meter shell mass and oyster size distributions as input. Fishing effort is provided as fractions removed of each resource for each month of the season. The model outputs the expected remaining shell mass and harvests of sack and seed oysters after discrete fishing months. Oyster mortality credits the shell budget, while fishing fractions debit oyster and shell resources. Surviving oysters grow larger along a …


Hybrid Methods For Feature Selection, Iunniang Cheng May 2013

Hybrid Methods For Feature Selection, Iunniang Cheng

Masters Theses & Specialist Projects

Feature selection is one of the important data preprocessing steps in data mining. The feature selection problem involves finding a feature subset such that a classification model built only with this subset would have better predictive accuracy than model built with a complete set of features. In this study, we propose two hybrid methods for feature selection. The best features are selected through either the hybrid methods or existing feature selection methods. Next, the reduced dataset is used to build classification models using five classifiers. The classification accuracy was evaluated in terms of the area under the Receiver Operating Characteristic …


Ikriya: Simulating Software Quality Enhancement With Selected Replacement Policies, Sindhu Dharani Murthy May 2013

Ikriya: Simulating Software Quality Enhancement With Selected Replacement Policies, Sindhu Dharani Murthy

Masters Theses & Specialist Projects

The quality of information systems in any organization helps to determine the
efficiency of the organization. Many organizations maintain a custom software portfolio, whose quality is important to the organization. Management would like to optimize the portfolio’s quality. Decisions about software replacement or enhancement are made based on organizational needs and priorities. The development resources allocated help in determining the quality of new software, and should be put to optimal use. Enhancing existing software might sound cheap and easy but it is not always efficient. This thesis proposes a simulation model - iKriya - for this problem. It explores the …


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty and Research Publications

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …


An Information Technology Therapy Approach To Micro-Enterprise Adoption Of Icts, Peter Wolcott, Sajda Qureshi, Mehruz Kamal Aug 2007

An Information Technology Therapy Approach To Micro-Enterprise Adoption Of Icts, Peter Wolcott, Sajda Qureshi, Mehruz Kamal

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

The advent of Information and Communication Technologies (ICTs) has opened up new opportunities for micro-enterprises to improve their businesses. However the challenges to using ICTs are impeding these businesses from growing into the drivers for development that they can be. This suggests that a potentially important driver of development needs to be supported. This paper investigates the adoption of ICTs in eight micro-enterprises in an underserved community of Omaha, Nebraska. Following an action research study, this research provides insight into the key challenges and opportunities facing micro-enterprises in their use of ICTs to create value for their businesses. Its contribution …


Java Performance Of The Rijndael Encryption Algorithm Across Compilers And Virtual Machines, Gregory Leavitt Orgill Jan 2005

Java Performance Of The Rijndael Encryption Algorithm Across Compilers And Virtual Machines, Gregory Leavitt Orgill

Theses and Dissertations

The Rijndael encryption algorithm has recently been published as the Advanced Encryption Standard (AES), a Federal Information Processing Standard, and is being accepted by developers and designers as the algorithm of choice where encryption is required. Java is becoming the language of choice for E-Business applications, many of which require cryptography. The performance of any Java application is dependent on the compiler and virtual machine used to compile and interpret. Prior research has provided performance information for the Rijndael algorithm in Java for specific virtual machines. This research includes the development of a Rijndael implementation in Java. Using Java system …


Electronic Commerce Application Development: A Comparison Of User And It Professional Perspectives, Douglas Havelka, Deepak Khazanchi Aug 2001

Electronic Commerce Application Development: A Comparison Of User And It Professional Perspectives, Douglas Havelka, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Based on the theory of reasoned action and previous research identifying differences in beliefs between IS specialists and IS users, this paper outlines a proposed study to investigate differences/similarities in beliefs of users and developers in the context of electronic commerce application development projects. The authors are currently in the process of collecting data to address research question posed in this proposal.