Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Management Information Systems (29)
- Computer Sciences (12)
- Physical Sciences and Mathematics (12)
- Databases and Information Systems (11)
- Business Administration, Management, and Operations (7)
-
- Engineering (4)
- Social and Behavioral Sciences (4)
- Education (3)
- Computer Engineering (2)
- Human Resources Management (2)
- Information Security (2)
- Management Sciences and Quantitative Methods (2)
- Medicine and Health Sciences (2)
- Adult and Continuing Education and Teaching (1)
- Agribusiness (1)
- Aviation (1)
- Business Intelligence (1)
- Business and Corporate Communications (1)
- Communication (1)
- Computer and Systems Architecture (1)
- Educational Sociology (1)
- Health Information Technology (1)
- Higher Education (1)
- Higher Education and Teaching (1)
- Industrial Engineering (1)
- Labor Relations (1)
- Library and Information Science (1)
- Management and Operations (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Institution
-
- New Jersey Institute of Technology (5)
- University of Arkansas, Fayetteville (5)
- Air Force Institute of Technology (4)
- Louisiana State University (3)
- Bentley University (2)
-
- Georgia Southern University (2)
- Georgia State University (2)
- Louisiana Tech University (2)
- Nova Southeastern University (2)
- Utah State University (2)
- Walden University (2)
- Clemson University (1)
- Cleveland State University (1)
- Edith Cowan University (1)
- Kennesaw State University (1)
- Lindenwood University (1)
- Old Dominion University (1)
- Universidad de La Salle (1)
- University for Business and Technology in Kosovo (1)
- University of Central Florida (1)
- University of Montana (1)
- University of New Orleans (1)
- University of Texas Rio Grande Valley (1)
- Virginia Commonwealth University (1)
- Western University (1)
- Publication Year
- Publication
-
- Theses and Dissertations (6)
- Dissertations (5)
- Graduate Theses and Dissertations (5)
- LSU Doctoral Dissertations (3)
- 2013 (2)
-
- CCE Theses and Dissertations (2)
- Computer Information Systems Dissertations (2)
- Doctoral Dissertations (2)
- Electronic Theses and Dissertations (2)
- Walden Dissertations and Doctoral Studies (2)
- All Dissertations (1)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- Doctor of Business Administration Dissertations (1)
- ETD Archive (1)
- Electronic Thesis and Dissertation Repository (1)
- Honors College Theses (1)
- Information Technology & Decision Sciences Theses & Dissertations (1)
- Ingeniería Industrial (1)
- Theses (1)
- Theses and Dissertations - UTB/UTPA (1)
- Theses: Doctorates and Masters (1)
- Undergraduate Honors Capstone Projects (1)
- Undergraduate Theses, Professional Papers, and Capstone Artifacts (1)
- University of New Orleans Theses and Dissertations (1)
Articles 1 - 30 of 45
Full-Text Articles in Business
Using Information Systems To Help Chatham County With Dental Services, Taylor Gray
Using Information Systems To Help Chatham County With Dental Services, Taylor Gray
Honors College Theses
Due to the extreme lack of access to dental work in Chatham county, this consulting thesis was formed. I assisted the Chatham County Safety Net Planning Council by using information systems to help with dental assistance in the county both short and long term. This is a very important issue in the county and it has caused many issues among people without dental insurance. I helped by creating a website platform for the Chatham County Safety Net, and used data analysis to help make the event more streamlined.
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Walden Dissertations and Doctoral Studies
Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …
Diseño De Un Prototipo De Sistema De Información Empresarial Para La Gestión Del Conocimiento En Una Mipyme Familiar Del Sector Ferretero En Bogotá, Nicolás Méndez Jiménez, Jonhatan Stiven Olarte Forero
Diseño De Un Prototipo De Sistema De Información Empresarial Para La Gestión Del Conocimiento En Una Mipyme Familiar Del Sector Ferretero En Bogotá, Nicolás Méndez Jiménez, Jonhatan Stiven Olarte Forero
Ingeniería Industrial
En Colombia las micro, pequeñas y medianas empresas - MiPymes constituyen más del 95% del total de negocios establecidos y absorben más del 85% del empleo total en la mayoría de los países de la región (Banco Interamericano para el Desarrollo, 2010); el 65% de estas empresas son familiares, pero solo el 13% logra sobrevivir a primer cambio generacional. Entre otros aspectos, porque la gestión del conocimiento y el manejo de la información en estas organizaciones familiares se ve centralizado por la primera generación de la empresa: el(los) Fundador(es). La teoría de la gestión del conocimiento promueve que este solo …
Improving Employees’ Compliance With Password Policies, Enas Albataineh
Improving Employees’ Compliance With Password Policies, Enas Albataineh
CCE Theses and Dissertations
Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.
The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.
A non-probability convenience sample was employed. The sample consisted of …
Roli Dhe Rëndësia E Sistemeve Të Informacionit Në Kohë Pasigurie, Albion Rexhepi
Roli Dhe Rëndësia E Sistemeve Të Informacionit Në Kohë Pasigurie, Albion Rexhepi
Theses and Dissertations
Punimi shtjellon problemet që u paraqiten me rastin e përhapjes së pandemisë së fundit globale. Problemet janë në shumë aspekte, problemet në menaxhimin e mirë të shëndetsisë, probleme tek kompanitë e fluturimeve, problemet me turizmin, problemet tek aktivetetet sportive, tek ndërmarrjet e mëdha, të mesme dhe të vogla, e të tjera. Problemet tek këta sektorë u shfaqën kur shtetet filluan mbylljen e disa prej veprimtarive. Pasojat ishin të pashmangshme, vetëm se niveli i pasojave do të dallonte prej veprimtarisë në veprimtari, përshembull, tek sektori i ndërtimit dhe sektori i pjesëve të këmbimit. Pra, në këtë punim fokusi do të jetë …
Data Breach Consequences And Responses: A Multi-Method Investigation Of Stakeholders, Hamid Reza Nikkhah
Data Breach Consequences And Responses: A Multi-Method Investigation Of Stakeholders, Hamid Reza Nikkhah
Graduate Theses and Dissertations
The role of information in today’s economy is essential as organizations that can effectively store and leverage information about their stakeholders can gain an advantage in their markets. The extensive digitization of business information can make organizations vulnerable to data breaches. A data breach is the unauthorized access to sensitive, protected, or confidential data resulting in the compromise of information security. Data breaches affect not only the breached organization but also various related stakeholders. After a data breach, stakeholders of the breached organizations show negative behaviors, which causes the breached organizations to face financial and non-financial costs. As such, the …
Assessing Public Health Workforce Informatics Competencies: A Study Of Three Health Departments In Metro Atlanta, Olatanwa Adewale
Assessing Public Health Workforce Informatics Competencies: A Study Of Three Health Departments In Metro Atlanta, Olatanwa Adewale
Electronic Theses and Dissertations
Background: There is a need for the public health workforce to be current and versatile in technology usage. Public health leveraging technology usage in service delivery has the potential to improve efficiency and bring it to the forefront in the provision of healthcare services. The purpose of this study was to assess public health workforce informatics competencies in select Atlanta health districts and determine the correlates of public health informatics proficiency.
Methods: A 10-item instrument adapted from the recommendations of a Working Group document by the Centers for Disease Control and Prevention and the 2015 Informatics Capacity and …
Choosing Information Systems As A Major: Factors That Influence Selection, Carole L. Shook
Choosing Information Systems As A Major: Factors That Influence Selection, Carole L. Shook
Graduate Theses and Dissertations
The purpose of this study was to examine student perceptions of factors affecting the decision to select information systems as an undergraduate major. Additionally, information systems students were compared to other business students to see if significant differences existed between groups. The four factors studied included: (a) personal interest in the major, (b) student competence, (c) value and utility, and (d) external influences of other people and academic experiences.
A convenience sample was used at a public university in the Southeastern region of the United States. Two hundred junior/senior students were selected as participants. One hundred of the students were …
Two Essays On Analytical Capabilities: Antecedents And Consequences, Rishikesh Jena
Two Essays On Analytical Capabilities: Antecedents And Consequences, Rishikesh Jena
Graduate Theses and Dissertations
Although organizations are rapidly embracing business analytics (BA) to enhance organizational performance, only a small proportion have managed to build analytical capabilities. While BA continues to draw attention from academics and practitioners, theoretical understanding of antecedents and consequences of analytical capabilities remain limited and lack a systematic view. In order to address the research gap, the two essays investigate: (a) the impact of organization’s core information processing mechanisms and its impact on analytical capabilities, (b) the sequential approach to integration of IT-enabled business processes and its impact on analytical capabilities, and (c) network position and its impact on analytical capabilities. …
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
CCE Theses and Dissertations
Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.
Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …
Understanding Agile Software Development Assimilation Beyond Acceptance, Corey Wayne Baham
Understanding Agile Software Development Assimilation Beyond Acceptance, Corey Wayne Baham
LSU Doctoral Dissertations
Agile software development methods represent a departure from the heavily regimented and document-driven procedures of traditional, waterfall approaches. Despite the highly touted benefits of employing agile ISD methods and the growth of agile adoption rates over the past two decades, it is not clear why some organizations fail to routinize agile methods, while others do so and realize their promised benefits. Motivated by the need to understand the factors that influence agile routinization, this study empirically examines the deep contextual factors that impact the extent to which agile methods are proliferated throughout an organization. Findings indicate that project success from …
The Value Of Integrated Information Systems For U.S. General Hospitals, Liuliu Fu
The Value Of Integrated Information Systems For U.S. General Hospitals, Liuliu Fu
Information Technology & Decision Sciences Theses & Dissertations
Each year, huge investments into healthcare information systems (HIS) are being made all over the world. Despite the enormous cost for the hospitals, the overall benefits and costs of the healthcare information systems have not been deeply assessed. In recent years, much previous research has investigated the link between the implementation of Information Systems and the performance of organizations. Although the value of Healthcare Information System or Healthcare Information Technology (HIS/HIT) has been found in many studies, some questions remain unclear. Do HIS/HIT systems influence different hospitals the same way? How to understand and explain the mechanism that HIS/HIT improves …
Continuous Monitoring Of Enterprise Risks: A Delphi Feasibility Study, Robert Baksa
Continuous Monitoring Of Enterprise Risks: A Delphi Feasibility Study, Robert Baksa
Dissertations
A constantly evolving regulatory environment, increasing market pressure to improve operations, and rapidly changing business conditions are creating the need for ongoing assurance that organizational risks are continually and adequately mitigated. Enterprises are perpetually exposed to fraud, poor decision making and/or other inefficiencies that can lead to significant financial loss and/or increased levels of operating risk. Increasingly, Information Systems are being harnessed to reinvent the risk management process. One promising technology is Continuous Auditing, which seeks to transform the audit process from periodic reviews of a few transactions to a continuous review of all transactions. However, the highly integrated, rapidly …
An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth
An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth
Doctor of Business Administration Dissertations
This research seeks to better understand an individual’s use of mobile devices and the matching fit between type of mobile device and activity. As mobile devices swiftly progress and alter individuals’ ways of interacting with technology, a more comprehensive understanding of how tasks are impacted may help ensure appropriate device selection. The ability for more targeted device selection may increase use and help mobile device users and designers avoid the pitfalls of pre-existing, traditional technology.
Building on identified antecedents of success from the DeLone & McLean Information Systems Success Model and focusing on the measurement of hedonic and utilitarian tasks …
Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey
Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey
Walden Dissertations and Doctoral Studies
Ineffective communication behavioral constructs in the workplace that lead to information technology (IT) project failure and in some cases organization failure are increasingly becoming a management concern. Despite this trend, there is little research on the communication behavioral constructs that contribute to IT project failure rates. The purpose of this phenomenological study was to explore the lived experiences of business analysts, programmers, and programmer analysts pertaining to the behavioral constructs associated with effective and ineffective communication. The research questions addressed these behaviors from a conceptual framework based on communication theory, organizational information processing theory, and critical social theory. This framework …
The Impact Of User Involvement On Information System Projects, Bradford Reese Eichhorn
The Impact Of User Involvement On Information System Projects, Bradford Reese Eichhorn
ETD Archive
Information systems (IS) development has been studied from many perspectives. Information systems are being viewed as a service as the economy shifts from being industrial-based to service-based. This shift is motivating the business user to become more involved with the development of the system. The once clear roles of user-as-specifier and IT professional-as-developer are blurring. This research addresses three objectives. First, we survey the actual business users themselves for their perception of activities and satisfaction with the completed system. Second, we analyze the separation of business requirements into two constructs representing the functional and presentation dimensions of these requirements to …
Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow
Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow
Graduate Theses and Dissertations
Employers of newly hired higher education graduates report their new workforce is not prepared. Further research was required to discover insights to the workforce readiness gap. This concurrent mixed methods study explored what competencies influenced employer's perceptions of the work-readiness of Information Systems (ISYS) undergraduate students and discovered ISYS graduates' and current ISYS students' perceptions of their work-readiness. Participants consisted of a convenience sample including 69 ISYS program upperclassmen, 20 ISYS program alumni, and 8 employers of the ISYS program graduates. ISYS program alumni completed an online Qualtrics survey to measure the participants' perception of their workforce preparedness. ISYS program …
The Use Of Complexity Theory And Strange Attractors To Understand And Explain Information System Development, Arthur P. Tomasino
The Use Of Complexity Theory And Strange Attractors To Understand And Explain Information System Development, Arthur P. Tomasino
2013
In spite of the best efforts of researchers and practitioners, Information Systems (IS) developers are having problems "getting it right". IS developments are challenged by the emergence of unanticipated IS characteristics undermining managers ability to predict and manage IS change. Because IS are complex, development formulas, best practices or development guides simply will not work. The difficulties in these system developments stem from the complexity of IS arising from the inter-relationship, interaction, and interconnectivity of the elements in the system and its environment. This research uses complexity concepts to help solve the problem with IS development and explain why so …
User Resistance And Trust In A Clinical Rfid Employee Location Tracking Information System, Wilson Wong
User Resistance And Trust In A Clinical Rfid Employee Location Tracking Information System, Wilson Wong
2013
User resistance has been identified as a factor in information systems implementation failures in the health care industry. RFID, radio frequency identification, is being incorporated into new health care information systems in order to effect cost reductions by tracking, identifying and monitoring individuals and medical items. This is the first study to research the relative contributions of vendor trust and IT artifact trust components to user resistance and, as a result, makes a unique contribution to the information systems literature. An understanding of the degree to which technology adoption behavioral beliefs, and particularly system trust, affect user resistance towards information …
Nursing Identity And The Computer: The Impact Of Care Realities On Information Systems Use, Hannah S. Rasmussen
Nursing Identity And The Computer: The Impact Of Care Realities On Information Systems Use, Hannah S. Rasmussen
Electronic Thesis and Dissertation Repository
Driven by developments in technology and communication, and by social, political and economic issues, the introduction of different information systems in nursing has risen significantly in recent years. However, little is known about the understanding of these systems by the nurses who are intended to use them.
Informed by a Symbolic Interactionist approach, this research explored the experience of nurses interacting with information systems. Using grounded theory methods, the main sources of data were interviews, textual analysis and observation with nurses in three Canadian cities.
The key findings of this research are fourfold. First, the core category developed in this …
Undergraduate Information Systems (Is) Curriculum And Career Track Development In United States Colleges And Universities: Assessment Of Adherence To Is 2010 Curriculum Guidelines, Corbin Christopher Bell
Undergraduate Information Systems (Is) Curriculum And Career Track Development In United States Colleges And Universities: Assessment Of Adherence To Is 2010 Curriculum Guidelines, Corbin Christopher Bell
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
The objective of this study was to survey IS curriculum in AACSB-accredited Information Systems programs across the United States, to evaluate current adherence to the IS 2010 Curriculum Guidelines, and to assess the number and type of career track developments initiated as a result of less stringent requirements in the new curriculum guidelines. In addition, an analysis was conducted to see if curriculum in AACSB-accredited Information Systems programs across the United States changed significantly since other similar evaluations reported in 1996, and 2006, and whether it is closer in adherence to the IS 2010 curriculum guidelines.
The findings of this …
Disruptive Innovation In Agribusiness, Tyler Mcgee
Disruptive Innovation In Agribusiness, Tyler Mcgee
Undergraduate Theses, Professional Papers, and Capstone Artifacts
The purpose of this thesis is to analyze how the process of disruptive innovation will impact the agribusiness industry, and how this transition will take place. This analysis will be demonstrated through scenario analysis, with three potential scenarios being demonstrated and explained. This project was developed using research from a broad range of sources over the course of several years, as well as studies conducted within the industry itself through firsthand experience gained while working for one of the largest firms operating in this industry. While disruptive innovation has been a phenomenon studied in several industries and areas, it has …
The Role Of Leadership In Facilitating The Performance Of Dispersed Teamwork, Jaime Beth Newell
The Role Of Leadership In Facilitating The Performance Of Dispersed Teamwork, Jaime Beth Newell
Graduate Theses and Dissertations
A mature body of research on leadership has investigated the impact of a variety of leadership behaviors and styles on team performance. This corpus of work is built on an assumption that team leaders can motivate, direct, and monitor teams by way of sustained, personal contact with team members. However, this assumption is being challenged by recent advances in information and communication technologies (ICTs). Use of ICTs has altered traditional team-based structures, enabling organizations to employ teams composed of members who are dispersed across geographic boundaries, while severing the direct, personal ties leaders have to team members. Recent reviews of …
Business Intelligence Tools In A Developmental Environment: An Academic Module, Landon M. Hemsley
Business Intelligence Tools In A Developmental Environment: An Academic Module, Landon M. Hemsley
Undergraduate Honors Capstone Projects
Business Intelligence (BI), defined here as the creation and use of meaningful business information for management, has over the last 20 years shown over and over again its value to professional industry. The prevalence of BI has also demonstrated that a new brand of worker is needed to take advantage of the sophisticated tools available to modern industry. Evidence suggests modern universities have struggled to educate professionals on the tremendous impact BI can have on an organization if used properly. This work is a step in an endeavor to bridge that educational gap and generate an educational strategic advantage by …
Health Information Systems Affordances: How The Materiality Of Information Technology Enables And Constrains The Work Practices Of Clinicians, Chad Anderson
Computer Information Systems Dissertations
The IT artifact is at the core of the information systems (IS) discipline and yet most IS research does not directly theorize the IT artifact or its nomological network (Benbasat and Zmud 2003; Orlikowski and Iacono 2001). This research seeks to answer a repeated call for more direct engagement with the IT artifact and its nomological net with affordance theory adopted as the basis for this theoretical work. An exploratory case study was conducted to answer the research question, how do the material properties of health information systems enable and constrain the work practices of clinicians? The study was …
The Impact On Organizational Performance Of Contextual Factors, Strategy And Management Control Systems, Nazmi Saeb Jarrar
The Impact On Organizational Performance Of Contextual Factors, Strategy And Management Control Systems, Nazmi Saeb Jarrar
Theses: Doctorates and Masters
This dissertation examined antecedents of the use of contemporary management control systems (MCS) by testing the alignment of strategic and contextual variables with variables of contemporary systems of control in the organization. The study further explored the performance consequences of the implementation of these control systems, and the manner in which strategy can influence the organization’s control culture and management accounting practices. The impact of contextual factors, notably size and structural arrangements, such as decentralization and diversification, on management's choice of control systems were also examined. Hence, the study addressed the need for a better understanding of the association between …
Structural Influences In Information Systems Projects: A Virtual Experiment In A Multi-Agent System, Pierce Hopkins
Structural Influences In Information Systems Projects: A Virtual Experiment In A Multi-Agent System, Pierce Hopkins
LSU Doctoral Dissertations
A virtual experiment (in silico) of a complex social system is conducted in order to investigate the effects of social structure and organizational culture on an information system development project’s outcome. This is performed within the context of user participation and project success. A 2x2 factorial design is employed with the social factor being measured as either low or high initial relationships between the customer and developer groups working on the project. The cultural factor is measured dichotomously with the two groups either having the same or different cultural beliefs. The project success outcome variable is measured as a percentage …
Digital Integration: Understanding The Concept And Its Environmental Predictors, Ricardo M. Checchi
Digital Integration: Understanding The Concept And Its Environmental Predictors, Ricardo M. Checchi
Computer Information Systems Dissertations
This study investigates the impact of environmental factors on the decision to electronically integrate operations with international customers and/or suppliers. The following research question motivates the study: How does the environmental context affect the level of electronic integration of an organization with its international partners? This study elaborates on the concept of electronic integration. Studies on integration in general and electronic integration in particular adopt a loose definition of integration: they all agree in that integration is the opposite of markets, but they define this opposite in different terms: relationship contracting, long-term contracting, coordination, etc. Finally, the study also responds …
The Impact Of Cultural Differences In Temporal Perception On Global Software Development Teams, Richard William Egan
The Impact Of Cultural Differences In Temporal Perception On Global Software Development Teams, Richard William Egan
Dissertations
This dissertation investigated the impact of cultural differences in temporal perception on globally dispersed software development teams. Literature and anecdotal evidence suggest that these temporal differences affect individual communication quality, which in turn will affect individual satisfaction and trust within global teams. Additionally, the temporal dispersion of the team was expected to affect an individual's sense of temporal disruption which, in turn, was expected to affect individual satisfaction and trust. Differences in temporal perception were expected to moderate this impact on perceived temporal disruption. A Fortune 100 Company that carried out software testing in Ireland, the United States, China and …
Power Relationships In Information Systems Security Policy Formulation And Implementation, Michael Stephen Lapke
Power Relationships In Information Systems Security Policy Formulation And Implementation, Michael Stephen Lapke
Theses and Dissertations
This thesis argues that organizational power impacts the development and implementation of Information Systems (IS) Security policy. The motivation for this research stems from the continuing concern of ineffective security in organizations, leading to significant monetary losses. IS researchers have contended that ineffective IS Security policy is a precursor to ineffective IS Security (Loch et al. 1992; Whitman et al. 2001; David 2002; Solms and Solms 2004). Beyond this pragmatic aspect, there is a gap in the literature concerning power relationships and IS Security policy. This research intends to bridge the gap. The dissertation is a two phased study whereby …