Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 47

Full-Text Articles in Entire DC Network

Defining Value Based Information Security Governance Objectives, Sushma Mishra Dec 2008

Defining Value Based Information Security Governance Objectives, Sushma Mishra

Theses and Dissertations

This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine and interpret the significance of the proposed objectives in an organizational context. The results suggest three …


Work Is Fun: The Phenomenon Of Boys Enjoying Work In A Camp Setting, Zina Lenore Bennion Dec 2008

Work Is Fun: The Phenomenon Of Boys Enjoying Work In A Camp Setting, Zina Lenore Bennion

Theses and Dissertations

The purpose of this study was to examine the perceived outcomes of participation in a summer camp that included physical work and service as a major component. A qualitative data analysis approach was used. A convenience sample of 10 male adolescents and 10 parents were selected. The data was analyzed using open, axial, and selective coding. Data analysis was used to ascertain perceived outcomes from the program from both boys and their parents. Analysis of the data showed the emergence of a core theme of boys learning to work and enjoying work. Enjoying work was the term chosen to represent …


Why Do People Use Or Not Use An Information Technology: An Interpretive Investigation On The Adoption And Use Of An Electronic Medical Records System, Li Long Dec 2008

Why Do People Use Or Not Use An Information Technology: An Interpretive Investigation On The Adoption And Use Of An Electronic Medical Records System, Li Long

Theses and Dissertations

In the literature of information technology acceptance, much empirical evidence exists that is inconsistent with Technology Acceptance (TA) Models. The purpose of this study is to find out why the extant TA models fail to predict in reality as they purport to in theory. This research argues that the extant literature has not been able to explain how individuals actually form their perceptions about using an information technology. Since past research attempting to do this has been unsuccessful or empirically refuted, this research uses an interpretive case study to investigate the experiences of professionals’ adoption and use of an information …


Increasing The Effectiveness Of Central Public Administration In Republic Of Kosovo, Florina Mehaj Kosumi Dec 2008

Increasing The Effectiveness Of Central Public Administration In Republic Of Kosovo, Florina Mehaj Kosumi

Theses and Dissertations

No abstract provided.


Contribution Of Family Leisure To Family Functioning Among Families With Adolescents In Mental Health Treatment, Jasmine Aileen Nutter Nov 2008

Contribution Of Family Leisure To Family Functioning Among Families With Adolescents In Mental Health Treatment, Jasmine Aileen Nutter

Theses and Dissertations

The purpose of this study was to examine the relationship between family leisure involvement and family functioning among families with an adolescent in mental health treatment. The sample (N=181) was obtained by sampling parents and adolescents enrolled in mental health treatment at Heritage Schools. Of the 181 participants, 52 cases consisted of matched parent and youth responses, 24 cases consisted of just parent responses, and 53 cases consisted of just adolescent responses. It was hypothesized that there would be a relationship between family leisure involvement and family functioning among families with youth in mental health treatment, and that when comparing …


Lean Six Sigma As A Source Of Competitive Advantage, Alessandro Giorgio Cavallini Nov 2008

Lean Six Sigma As A Source Of Competitive Advantage, Alessandro Giorgio Cavallini

Theses and Dissertations

Anecdotal data affirms that companies applying Lean Six Sigma in their operations not only deliver higher quality products and services, but also obtain superior financial results. The goal of this research was to empirically verify anecdotal data. The study proposed to analyze a group of publicly traded manufacturing companies with the intent of verifying if a correlation exists between companies being lean and the attainment of superior returns on investments. The researcher performed a series of statistical tests comparing key Financial Performance Indicators (FPI) extracted from annual reports (10-K) from a large pool of companies. The outcome of this study …


An Integrated Knowledge Discovery And Data Mining Process Model, Sumana Sharma Sep 2008

An Integrated Knowledge Discovery And Data Mining Process Model, Sumana Sharma

Theses and Dissertations

Enterprise decision making is continuously transforming in the wake of ever increasing amounts of data. Organizations are collecting massive amounts of data in their quest for knowledge nuggets in form of novel, interesting, understandable patterns that underlie these data. The search for knowledge is a multi-step process comprising of various phases including development of domain (business) understanding, data understanding, data preparation, modeling, evaluation and ultimately, the deployment of the discovered knowledge. These phases are represented in form of Knowledge Discovery and Data Mining (KDDM) Process Models that are meant to provide explicit support towards execution of the complex and iterative …


The Effects Of Reputation Threat And Whistle-Blowing Report Source On Chief Audit Executives' Investigation Decisions, Cynthia Guthrie Sep 2008

The Effects Of Reputation Threat And Whistle-Blowing Report Source On Chief Audit Executives' Investigation Decisions, Cynthia Guthrie

Theses and Dissertations

This study examines the effects of reputation threats and anonymous whistle-blowing channels on Chief Audit Executives’ (CAEs) decisions to investigate whistle-blowing allegations. Participants were 94 CAEs and Deputy CAEs from publicly traded companies in the eastern half of the United States. Participants received whistle-blowing reports from either an anonymous or a non-anonymous source. In the high reputation threat condition the whistle-blowing report alleged that the wrongdoing was perpetrated by the exploitation of substantial weaknesses in internal controls that had been previously evaluated by external auditors and the internal audit function. The report in the lower threat condition alleged that the …


The Performance Effects Of Latent Factors On Assimilation Of Commercial Open-Source Erp Software On Small-Medium Enterprises, Sandra Cereola Sep 2008

The Performance Effects Of Latent Factors On Assimilation Of Commercial Open-Source Erp Software On Small-Medium Enterprises, Sandra Cereola

Theses and Dissertations

This study tests a theoretical model developed to investigate the impact of assimilation of commercial open source enterprise resource planning software (COSES) in small and medium sized enterprises (SMEs). Specifically, the model explains how the top management team’s (TMT’s) information technology (IT) knowledge and experience impact both assimilation and firm performance. The hypotheses were tested using survey data from SMEs that have implemented COSES. Results from structural equation modeling suggest that SMEs benefit, through higher levels of assimilation and performance, from adopting innovative enterprise resource planning (ERP) systems such as COSES when they have a TMT that has experience with …


Software Acquisition Improvement In The Aeronautical Systems Center, William A. Pogorzelski Sep 2008

Software Acquisition Improvement In The Aeronautical Systems Center, William A. Pogorzelski

Theses and Dissertations

In the past 20 years, over 150 recommendations have been made to improve software systems development by organizations such as the Defense Science Board, National Research Council and the U.S. General Accountability Office. It has been discovered that many of these recommendation have remained unimplemented. This research had the purpose of confirming the application of these previous recommendations to improve software acquisition in the Aeronautical Systems Center. This was accomplished through interviews with 20 software practitioners in the acquisition community and the review of relevant literature. Through the analysis of the interviews and literature, this research was able to confirm …


Paid Volunteerism: The Effects Of Monetary Rewards On University Students' Intrinsic Motivation To Participate In A Volunteerism Activity, Derence W. Walk Aug 2008

Paid Volunteerism: The Effects Of Monetary Rewards On University Students' Intrinsic Motivation To Participate In A Volunteerism Activity, Derence W. Walk

Theses and Dissertations

Volunteerism is positively associated with various benefits to university students. Perhaps for this reason, some educational institutions are paying students to participate in volunteerism. Conversely, the cognitive evaluation theory suggests that monetary rewards may undermine intrinsic motivation and decrease the likelihood of future participation in volunteerism. However, there has been little empirical research done regarding this issue. Therefore, the purpose of this study was to examine the effects of monetary rewards on university students' intrinsic motivation to participate in a volunteerism activity. While the findings indicated a subtle trend supporting the cognitive evaluation theory, an analysis of the data demonstrated …


A Qualitative And Quantitative Assessment Of Readiness For Organizational Change Literature, Andrew B. Burris Jun 2008

A Qualitative And Quantitative Assessment Of Readiness For Organizational Change Literature, Andrew B. Burris

Theses and Dissertations

The purpose of this thesis is to take a step in integrating the change literature and accumulate the empirical results using meta-analytic techniques. First, a literature review of existing research on organizational change was conducted. Second, existing models of organizational change were integrated to create a theoretical structure. Third, a meta-analysis was performed to derive the corrected correlation values for each relationship in that structure. Finally, the readiness for change literature was qualitatively assessed. In addition, a quantitative review was done by accumulating the results across 25 studies in an effort to provide a current quantitative assessment of change management …


Forecasting Flying Hour Costs Of The B-1, B-2, And B-52 Bomber Aircraft, Stefanie L. Van Dyk Jun 2008

Forecasting Flying Hour Costs Of The B-1, B-2, And B-52 Bomber Aircraft, Stefanie L. Van Dyk

Theses and Dissertations

This thesis both evaluates, and presents improvements to, the current method of forecasting flying costs of Air Force aircraft. It uses depot level repairable (DLR) and consumable (CONS) data for the Air Force's bomber platforms: B-1B, B-2, and B-52H. The current forecasting method assumes a proportional relationship between costs and flying hours such that 1) when no hours are flown costs are zero, and 2) a 1% increase in flying hours will increase costs by 1%. The findings of this research indicate that applying log-linear ordinary least squares regression techniques may be an improved fit of flying cost data over …


Shaping Strategic Information Systems Security Initiatives In Organizations, Gurvirender Tejay May 2008

Shaping Strategic Information Systems Security Initiatives In Organizations, Gurvirender Tejay

Theses and Dissertations

Strategic information systems security initiatives have seldom been successful. The increasing complexity of the business environment in which organizational security must be operationalized presents challenges. There has also been a problem with understanding the patterns of interactions among stakeholders that lead to instituting such an initiative. The overall aim of this research is to enhance understanding of the issues and concerns in shaping strategic information systems security initiative. To be successful, a proper undertaking of the content, context and process of the formulation and institutionalization of a security initiative is essential. It is also important to align the interconnections between …


Project Management Of Road Contruction In Kosova, Vjollca Aliti May 2008

Project Management Of Road Contruction In Kosova, Vjollca Aliti

Theses and Dissertations

No abstract provided.


The Military Decision Making Process, Kadri Berisha Apr 2008

The Military Decision Making Process, Kadri Berisha

Theses and Dissertations

No abstract provided.


Position Characteristics And Their Relationship To Selection For Promotion, Juan A. Kays Mar 2008

Position Characteristics And Their Relationship To Selection For Promotion, Juan A. Kays

Theses and Dissertations

It is clear that job characteristics are key selection criteria for upward mobility. However, there are questions as to what types of position details facilitate individual objective success within an organization like the United States Air Force that relies solely on an internal labor market. While it is an individual responsibility to develop an employment plan, there are particular duties that are more desirable for continuation. This thesis looked at the professional records of a sample of officers to assess what position characteristics led to more advancement opportunities. It examined what duty experiences fared well for one measure of career …


Forecasting Expeditionary Training For Company Grade Logistics Readiness Officers: A Delphi Study, Phillip Kirk Larson Mar 2008

Forecasting Expeditionary Training For Company Grade Logistics Readiness Officers: A Delphi Study, Phillip Kirk Larson

Theses and Dissertations

Since the development of the Expeditionary Airman concept and the start of combat operations in the Global War on Terrorism, the Logistics Readiness Officer’s (LRO) duty environment has expanded beyond traditional garrison-based duties. This expansion can arguably incorporate current topics of joint operations, irregular warfare, and cultural intelligence. The intent of this study is to determine what training, if any, future company grade LROs will require on these three topics. The research uses Delphi methodology, utilizing an expert panel of twelve LROs with experience in joint operations within a deployed environment, and interactions with foreign nationals. The study applies two …


Strategies For Minimizing Monetary Loss In The Department Of Defense Budget Through Use Of Financial Derivatives, Michael T. Edwards Mar 2008

Strategies For Minimizing Monetary Loss In The Department Of Defense Budget Through Use Of Financial Derivatives, Michael T. Edwards

Theses and Dissertations

The purpose of this research was to examine whether it would be in the best interest of the Department of Defense to consider using currency hedging as a way to protect its budget from negative currency fluctuations in the US Dollar. Specifically, the use of futures and options contracts was examined. Overseas expenditure data was collected on the YEN and the EURO for Fiscal Years 2001 to 2007 and cross-referenced with the contract prices for the aforementioned hedges during the same period of time. Using an ex post facto analysis with the gathered data, the results show that hedging with …


An Empirical Investigation Of Factors Influencing Knowledge Management System Success, John F. Whitfield Jr. Mar 2008

An Empirical Investigation Of Factors Influencing Knowledge Management System Success, John F. Whitfield Jr.

Theses and Dissertations

Knowledge has been viewed as a critical component for organizations. Consequently, organizations implement Knowledge Management Systems (KMSs) to seek competitive advantages, but they may encounter mixed results. This research draws on previous information system and knowledge management system success-related literature and selects eight factors that are believed to be critical for the successful implementation of a KMS. These factors were derived through a literature search of current KMS success-related literature. The purpose of this study is to identify factors that could have a clear influence on the development and implementation of KMSs. The study presents the empirical examination of a …


Assessment Of The Current Cultural Awareness And Training For The Air Force Contingency Contracting Officer, Reza A. Grigorian Mar 2008

Assessment Of The Current Cultural Awareness And Training For The Air Force Contingency Contracting Officer, Reza A. Grigorian

Theses and Dissertations

This study examined the current cultural awareness of contracting officers and the effectiveness of cross-cultural training provided to contracting officers through the Defense Acquisition University (DAU), and their monthly training at the base level. Current training in culture is fairly limited - only 2 days of the 9 day course in contingency contracting is dedicated to cultural training. Nevertheless, a comparison of means of 38 students before and after the DAU CON 234 course showed a statistically significant increase in Cultural Intelligence (CQ) on the cognitive and behavioral dimensions, but not on the motivational dimension. In addition, more experienced contracting …


Risk Propensity And Knowledge Sharing Intentions Of Individuals In A Downsized Organization, Ward G. Willis Mar 2008

Risk Propensity And Knowledge Sharing Intentions Of Individuals In A Downsized Organization, Ward G. Willis

Theses and Dissertations

Downsizing can be a traumatic event for any organization. Using Affective Events Theory (AET), this study examined how the emotional reactions of employees to downsizing can impact organizational outcomes. It concludes that the use of downsizing activities decreases organizational commitment while increasing perceived psychological contract violation. Further, it shows that these constructs have a respective positive and negative relationship with knowledge sharing behavior. It also concludes that these relationships hold true not only for individuals most vulnerable to downsizing, but also for those who the organization would consider immune to such actions. These results suggest that organizational downsizing activities not …


Blending The Battlefield: An Analysis Of Using Private Military Companies To Support Military Operations In Iraq, Heather L. Gallup Mar 2008

Blending The Battlefield: An Analysis Of Using Private Military Companies To Support Military Operations In Iraq, Heather L. Gallup

Theses and Dissertations

Over the past fifteen years, the Department of Defense has experienced an increasing trend in the outsourcing and privatization of military operations. Key factors contributing to the growth include declines in military budgets, reductions in active duty end-strength, increases in operational deployments, advancements in weapon system technology, and evolutions in the nature of warfare. However, the continued escalation of incorporating Private Military Companies (PMCs) on the battlefield creates unique challenges. The purpose of this exploratory and descriptive research is to identify utilization rates, describe the types of roles being fulfilled, and synthesize the challenges of augmenting military manpower with civilian …


An Analysis Of Competencies For Managing Science And Technology Programs, Sidney W. Goehring Mar 2008

An Analysis Of Competencies For Managing Science And Technology Programs, Sidney W. Goehring

Theses and Dissertations

The purpose of this research is to analyze competencies needed for successful program management of Research and Development (R&D) programs -- also known as Science and Technology (S&T) programs -- within the Department of Defense (DoD). Current competency models are in development for the DoD Acquisition, Technology, and Logistics (AT&L) functional areas. Using an interim competency model developed for the Program Manager career field comprised of 36 technical competencies and 27 professional competencies, the research compares competencies' criticality scores rated by traditional acquisition program managers (PMs) with those rated by S&T program managers. In 42 out of 63 instances (67%), …


A Case-Based Exploration Of Task/Technology Fit In A Knowledge Management Context, Michael W. Moseley Mar 2008

A Case-Based Exploration Of Task/Technology Fit In A Knowledge Management Context, Michael W. Moseley

Theses and Dissertations

Task/Technology Fit (TTF) posits that as the intersection of the task domain and the capabilities of an information system (IS) increases in magnitude, the performance gains experienced by user through use of the IS will be positively impacted. While rooted in the traditional IS literature, this research proposes that TTF be extended to incorporate additional factors unique to the context of Knowledge Management (KM). Based upon the findings of this research, it is reasonable to conclude that when employing the TTF model to determine KMS fitness, additional factors other than the task requirements and KMS capabilities should be considered. This …


Afmc Customer Satisfaction Study At The Air Logistics Centers, Kelly D. Kendall Mar 2008

Afmc Customer Satisfaction Study At The Air Logistics Centers, Kelly D. Kendall

Theses and Dissertations

The purpose of this research was to determine Air Force Material Command’s (AFMCs) external customer issues and satisfaction levels as measured and compared by Air Logistics Center. Specifically, this project sought to answer how AFMC’s Air Logistics Centers were performing based on survey criteria chosen by AFMC’s A4 Logistics division. This research was guided by a previous Graduate Research Project (GRP) effort, which sought to determine how customer relationship management (CRM) initiatives varied in the private and public sectors, and to determine an appropriate means of capturing and measuring this type of data for AFMC. The research question was answered …


Project Manager Personality As A Factor For Success, John D. Bedingfield Mar 2008

Project Manager Personality As A Factor For Success, John D. Bedingfield

Theses and Dissertations

Much has been written regarding project success, and one of the factors contributing to project success is the role of the project manager. Furthermore, project success can be enhanced by selecting the best project manager, and by assigning project managers whose attributes best align with project type. We investigated the role of the project manager's personality on project success using the "Big Five" personality model. We surveyed United States Department of Defense project managers to determine specific "Big Five" personality traits which were more likely to positively predict project manager success. The findings indicate conscientiousness and openness to experience were …


An Ontology Centric Architecture For Mediating Interactions In Semantic Web-Based E-Commerce Environments, Manoj Thomas Mar 2008

An Ontology Centric Architecture For Mediating Interactions In Semantic Web-Based E-Commerce Environments, Manoj Thomas

Theses and Dissertations

Information freely generated, widely distributed and openly interpreted is a rich source of creative energy in the digital age that we live in. As we move further into this irrevocable relationship with self-growing and actively proliferating information spaces, we are also finding ourselves overwhelmed, disheartened and powerless in the presence of so much information. We are at a point where, without domain familiarity or expert guidance, sifting through the copious volumes of information to find relevance quickly turns into a mundane task often requiring enormous patience. The realization of accomplishment soon turns into a matter of extensive cognitive load, serendipity …


Establishing The Human Firewall: Reducing An Individual's Vulnerability To Social Engineering Attacks, Jamison W. Scheeres Mar 2008

Establishing The Human Firewall: Reducing An Individual's Vulnerability To Social Engineering Attacks, Jamison W. Scheeres

Theses and Dissertations

Hackers frequently use social engineering attacks to gain a foothold into a target network. This type of attack is a tremendous challenge to defend against, as the weakness lies in the human users, not in the technology. Thus far, methods for dealing with this threat have included establishing better security policies and educating users on the threat that exists. Existing techniques aren’t working as evidenced by the fact that auditing agencies consider it a given that will be able to gain access via social engineering. The purpose of this research is to propose a better method of reducing an individual’s …


Role Of The Facilities Management In Improving Business Performance, Andin Halimi Mar 2008

Role Of The Facilities Management In Improving Business Performance, Andin Halimi

Theses and Dissertations

No abstract provided.