Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Adoption of security analytics (1)
- Analytics (1)
- Archives (1)
- BI (1)
- Big Data (1)
-
- Big data analytics (1)
- Big data security analytics (1)
- Competitive Intelligence (1)
- Data mining (1)
- Extraversion (1)
- FFM (1)
- Framework (1)
- Graph (1)
- Information systems (1)
- Knowledge sharing (1)
- Literature-based discovery (LBD) (1)
- Memento (1)
- Outsourcing (1)
- Personality traits (1)
- Predication (1)
- Privacy (1)
- Security (1)
- Semantic (1)
- Small business (1)
- Small business adoption of technology (1)
- Social networking (1)
- TAM (1)
- Task conflict (1)
- Team atmosphere (1)
- Team performance (1)
Articles 1 - 8 of 8
Full-Text Articles in Library and Information Science
Aggregating Private And Public Web Archives Using The Mementity Framework, Matthew R. Kelly
Aggregating Private And Public Web Archives Using The Mementity Framework, Matthew R. Kelly
Computer Science Theses & Dissertations
Web archives preserve the live Web for posterity, but the content on the Web one cares about may not be preserved. The ability to access this content in the future requires the assurance that those sites will continue to exist on the Web until the content is requested and that the content will remain accessible. It is ultimately the responsibility of the individual to preserve this content, but attempting to replay personally preserved pages segregates archived pages by individuals and organizations of personal, private, and public Web content. This is misrepresentative of the Web as it was. While the Memento …
The Influence Of Identifiable Personality Traits On Nurses’ Intention To Use Wireless Implantable Medical Devices, Vincent Molosky
The Influence Of Identifiable Personality Traits On Nurses’ Intention To Use Wireless Implantable Medical Devices, Vincent Molosky
CCE Theses and Dissertations
Technically-driven medical devices such as wireless implantable medical devices (WIMD) have become ubiquitous within healthcare. The use of these devices has changed the way nurses administer patient care. Consequently, the nursing workforce is large and diverse, and with it comes an expected disparity in personalities. Research involving human factors and technology acceptance in healthcare is not new. Yet due to the changing variables in the manner of which patient care is being administered, both in person and in the mechanism of treatment, recent research suggests that individual human factors such as personality traits may hold unknown implications involving more successful …
Citationally Enhanced Semantic Literature Based Discovery, John David Fleig
Citationally Enhanced Semantic Literature Based Discovery, John David Fleig
CCE Theses and Dissertations
We are living within the age of information. The ever increasing flow of data and publications poses a monumental bottleneck to scientific progress as despite the amazing abilities of the human mind, it is woefully inadequate in processing such a vast quantity of multidimensional information. The small bits of flotsam and jetsam that we leverage belies the amount of useful information beneath the surface. It is imperative that automated tools exist to better search, retrieve, and summarize this content. Combinations of document indexing and search engines can quickly find you a document whose content best matches your query - if …
Examining Task Conflict And Team Atmosphere In Virtual Teams Engaged In Outsourced Project Work, Harold Carr Osborn
Examining Task Conflict And Team Atmosphere In Virtual Teams Engaged In Outsourced Project Work, Harold Carr Osborn
CCE Theses and Dissertations
Global teams have become commonplace. As teams have become more dispersed, leveraging outsourced resources has gained popularity. Outsourcing can be a prudent move financially; however, when it is inappropriately applied, the damage it produces can easily overshadow any financial gains. Such ill effects can include impaired employee performance and morale caused by decreased job security. Moreover, it can lead to a less favorable team atmosphere and increased task conflict.
This study examined the effects of team virtuality along with the strategic alignment of outsourcing on team performance. The research utilized the intervening processes theory (IPT). The IPT posits that the …
An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham
An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham
CCE Theses and Dissertations
Today we are experiencing a rapidly increasing trend to use social networking in ways that dramatically affect both our personal and our public lives. This is a global phenomenon being experienced around the world. Exactly how this technology is being used and by whom is of great interest. The problem is that not a lot of research has been conducted to investigate the role social networking sites play to influence a person’s attitude toward sharing knowledge at work. In light of the marked increase in the use of social networking sites and how it is changing the way we live, …
Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias
Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias
Walden Dissertations and Doctoral Studies
Despite the increased cost of data breaches due to advanced, persistent threats from malicious sources, the adoption of big data security analytics among U.S. small businesses has been slow. Anchored in a diffusion of innovation theory, the purpose of this correlational study was to examine ways to increase the adoption of big data security analytics among small businesses in the United States by examining the relationship between small business leaders' perceptions of big data security analytics and their adoption. The research questions were developed to determine how to increase the adoption of big data security analytics, which can be measured …
Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe
Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe
Walden Dissertations and Doctoral Studies
In retail, the explosion of data sources and data has provided incentive to invest in information systems (IS), which enable leaders to understand the market and make timely decisions to improve performance. Given that users’ perceptions of IS affects their use of IS, understanding the factors influencing user acceptance is critical to acquiring an effective business intelligence system (BIS) for an organization. Grounded in the technology acceptance model theory, the purpose of this correlational study was to examine the relationship between perceived usefulness (PU), perceived ease of use (PEOU), and user acceptance of business intelligence systems (BIS) in retail organizations. …
Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey
Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey
Walden Dissertations and Doctoral Studies
There is a significant technology deficiency within the U.S. manufacturing industry compared to other countries. To adequately compete in the global market, lean manufacturing organizations in the United States need to look beyond their traditional methods of evaluating their processes to optimize their assembly cells for efficiency. Utilizing the task-technology fit theory this quantitative correlational study examined the relationships among software using probabilistic algorithms, lean methodology techniques, and manufacturer cell optimization results. Participants consisted of individuals performing the role of the systems analyst within a manufacturing organization using lean methodologies in the Southwestern United States. Data were collected from 118 …