Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Information science (3)
- Information technology (3)
- Business (1)
- Business Strategy (1)
- CIO (1)
-
- Chief Information Officer (1)
- Classification (1)
- Compliance (1)
- Computer science (1)
- Data Mining (1)
- Design (1)
- Effectiveness (1)
- Exceptional (1)
- Experimental (1)
- Externalization (1)
- Feature Selection (1)
- IS Strategy (1)
- Information System Strategy (1)
- Knowledge Sharing (1)
- Motivation (1)
- Organization Mindfulness (1)
- Performance Measures (1)
- Policy (1)
- Psychology (1)
- Self-determination Theory (1)
- Tacit Knowledge (1)
- Theory of Reasoned Action (1)
Articles 1 - 4 of 4
Full-Text Articles in Business
Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou
Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou
CCE Theses and Dissertations
An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to …
Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen
Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen
CCE Theses and Dissertations
While several U. S. firms have invested in Knowledge Management (KM) tools and software, it has become apparent that investments must be made in additional facets of KM, such as knowledge sharing (KS), thought by many researchers to be the most important component of KM. Of the two types of KS, explicit and tacit, the sharing of tacit knowledge has been shown to contribute the most to an organization’s performance. However, since tacit knowledge is difficult to both convey and acquire, this unshared tacit knowledge may ultimately harm an organization when, without the appropriate knowledge, individuals cannot effectively perform their …
Feature Selection And Classification Methods For Decision Making: A Comparative Analysis, Osiris Villacampa
Feature Selection And Classification Methods For Decision Making: A Comparative Analysis, Osiris Villacampa
CCE Theses and Dissertations
The use of data mining methods in corporate decision making has been increasing in the past decades. Its popularity can be attributed to better utilizing data mining algorithms, increased performance in computers, and results which can be measured and applied for decision making. The effective use of data mining methods to analyze various types of data has shown great advantages in various application domains. While some data sets need little preparation to be mined, whereas others, in particular high-dimensional data sets, need to be preprocessed in order to be mined due to the complexity and inefficiency in mining high dimensional …
An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden
An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden
CCE Theses and Dissertations
Although empirical research has shown that a clearly defined information system (IS) strategy has a positive impact to a firm’s performance and a poorly defined IS strategy has a negative impact to a firms’ performance, firms still develop poorly defined IS strategies. Further compounding the problem, research has revealed that 87% of the business executives believe information systems are a critical enabler to their firms' strategic realization, yet only 33% of business executives involve the Chief Information Officer (CIO) in their firm’s business strategy development. The main goal of this research study is to empirically identify factors which impact development …