Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2966)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Arkansas, Fayetteville (42)
- University of Wisconsin Milwaukee (42)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2872)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- Graduate Theses and Dissertations (33)
- All Capstone Projects (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 3571 - 3600 of 6727
Full-Text Articles in Physical Sciences and Mathematics
Metalogic Notes, Saverio Perugini
Metalogic Notes, Saverio Perugini
Computer Science Working Papers
A collection of notes, formulas, theorems, postulates and terminology in symbolic logic, syntactic notions, semantic notions, linkages between syntax and semantics, soundness and completeness, quantified logic, first-order theories, Goedel's First Incompleteness Theorem and more.
Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles That Facilitate The Effective Construction And Evaluation Of A Cloud-Based Lab Environment, Thomas J. Trevethan
Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles That Facilitate The Effective Construction And Evaluation Of A Cloud-Based Lab Environment, Thomas J. Trevethan
CCE Theses and Dissertations
The problem explored in this dissertation report was that at the time of this study, there were no design principles or methodologies based on design science research (DSR) available to use for artifact construction, implementation, and effective evaluation of cloud-based networking lab environments that can be used to foster hands-on technology skills in students. Primarily based on Hevner’s 7 guidelines of DSR, Peffer’s design science research methodology (DSRM), and Gregor’s IS design theory, this study forms the groundwork for the development of procedures and specifications derived from DSR literature to facilitate the construction, implementation, and evaluation of a comprehensive cloud-based …
An Empirical Investigation Into The Role That Boredom, Relationships, Anxiety, And Gratification (Brag) Play In A Driver’S Decision To Text, Nathan White
CCE Theses and Dissertations
Texting while driving is a growing problem that has serious, and sometimes fatal, consequences. Despite laws enacted to curb this behavior, the problem continues to grow. Discovering factors that can reduce such risky behavior can significantly contribute to research, as well as save lives and reduce property damage. This study developed a model to explore the motivations that cause a driver to send messages. The model evaluates the effects that boredom, social relationships, social anxiety, and social gratification (BRAG) have upon a driver’s frequency of typing text messages. In addition, the perceived severity of the consequences and the presence of …
Data Privacy Preservation In Collaborative Filtering Based Recommender Systems, Xiwei Wang
Data Privacy Preservation In Collaborative Filtering Based Recommender Systems, Xiwei Wang
Theses and Dissertations--Computer Science
This dissertation studies data privacy preservation in collaborative filtering based recommender systems and proposes several collaborative filtering models that aim at preserving user privacy from different perspectives.
The empirical study on multiple classical recommendation algorithms presents the basic idea of the models and explores their performance on real world datasets. The algorithms that are investigated in this study include a popularity based model, an item similarity based model, a singular value decomposition based model, and a bipartite graph model. Top-N recommendations are evaluated to examine the prediction accuracy.
It is apparent that with more customers' preference data, recommender systems …
Privacy Preserving Data Mining For Numerical Matrices, Social Networks, And Big Data, Lian Liu
Privacy Preserving Data Mining For Numerical Matrices, Social Networks, And Big Data, Lian Liu
Theses and Dissertations--Computer Science
Motivated by increasing public awareness of possible abuse of confidential information, which is considered as a significant hindrance to the development of e-society, medical and financial markets, a privacy preserving data mining framework is presented so that data owners can carefully process data in order to preserve confidential information and guarantee information functionality within an acceptable boundary.
First, among many privacy-preserving methodologies, as a group of popular techniques for achieving a balance between data utility and information privacy, a class of data perturbation methods add a noise signal, following a statistical distribution, to an original numerical matrix. With the help …
Exploring Critical Success Factors For Managing Complex Information Technology Projects In Federal Agencies, Kyle Dean Boyles
Exploring Critical Success Factors For Managing Complex Information Technology Projects In Federal Agencies, Kyle Dean Boyles
Walden Dissertations and Doctoral Studies
The problem addressed in this study was the lack of understanding about failures of government leadership in accomplishing complex information technology (IT) projects and the ways such failures can negatively affect organizational performance. The purpose was to query subject matter experts and leaders with the intent to identify methods to reduce complex IT project failure rates in government organizations. This qualitative study drew on the technology acceptance model and the capability maturity model integration framework to evaluate organizations' abilities to manage complex IT projects. The research questions focused on exploring senior managers' experiences, the tacit knowledge of project management methodologies, …
The Role Of Information Technology Organizational Design In Firms' Ability To Innovate, Hassan S. Halimi
The Role Of Information Technology Organizational Design In Firms' Ability To Innovate, Hassan S. Halimi
Walden Dissertations and Doctoral Studies
Information technology (IT) organizations have become an integral part of many firms, with increasing strategic significance. Consequently, investments in IT represent a significant percentage of a firm's expenditure. Despite the investment, the business value of IT has been difficult to quantify, creating uncertainty about a firm's investments in IT innovation. The purpose of this nonexperimental study was to examine relationships between a firm's innovativeness and 3 IT organizational design factors: knowledge creation, dynamic capabilities, and communication structures. The research questions addressed the relationships between a firm's ability to innovate and specific design elements of the IT organization. The study was …
A Client-Vendor Relationship Perspective Of Cultural Differences On Cross-Border Information Technology Outsourcing, John Kennedy Bosire
A Client-Vendor Relationship Perspective Of Cultural Differences On Cross-Border Information Technology Outsourcing, John Kennedy Bosire
Walden Dissertations and Doctoral Studies
Cross-border information technology (IT) outsourcing continues to rise due to the demand for business process outsourcing. Issues such as miscommunication and management problems have emerged because of cross-cultural disparities between clients and vendors across national borders. The theoretical framework of this study was based on the organizational culture model studies of Meek, Spradley, Smith, and Draft for examining and understanding complex organizational practices. The purpose of this mixed-methods explanatory sequential case study was to qualitatively identify and quantitatively determine the management approaches that are effective in managing cross-cultural differences and the constitution of the elements of global adjustment, motivation, mindset, …
An Application Of The Autism Management Platform To Tracking Student Progress In The Special Education Environment, Ryan Thomas Burns
An Application Of The Autism Management Platform To Tracking Student Progress In The Special Education Environment, Ryan Thomas Burns
Computational and Data Sciences Theses
In the age of online courses and digital textbooks, several areas of academia, such as special education, are far behind in the technological revolution. Some teachers use long unstructured digital documents, while others maintain large physical files for students containing every piece of information or coursework they have ever received. Could these extremely unstructured approaches to data collection and aggregation be streamlined with a software platform built specifically for this purpose? Could this platform also be built to accommodate multiple integrations and practical new features? Most importantly, in terms of usability, would this software be enjoyable to use? The Autism …
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …
Faces: Diversity-Aware Entity Summarization Using Incremental Hierarchical Conceptual Clustering, Kalpa Gunaratna, Krishnaprasad Thirunarayan, Amit P. Sheth
Faces: Diversity-Aware Entity Summarization Using Incremental Hierarchical Conceptual Clustering, Kalpa Gunaratna, Krishnaprasad Thirunarayan, Amit P. Sheth
Kno.e.sis Publications
Semantic Web documents that encode facts about entities on the Web have been growing rapidly in size and evolving over time. Creating summaries on lengthy Semantic Web documents for quick identification of the corresponding entity has been of great contemporary interest. In this paper, we explore automatic summarization techniques that characterize and enable identification of an entity and create summaries that are human friendly. Specifically, we highlight the importance of diversified (faceted) summaries by combining three dimensions: diversity, uniqueness, and popularity. Our novel diversity-aware entity summarization approach mimics human conceptual clustering techniques to group facts, and picks representative facts from …
Extracting City Traffic Events From Social Streams, Pramod Anantharam, Payam Barnaghi, Krishnaprasad Thirunarayan, Amit P. Sheth
Extracting City Traffic Events From Social Streams, Pramod Anantharam, Payam Barnaghi, Krishnaprasad Thirunarayan, Amit P. Sheth
Kno.e.sis Publications
Cities are composed of complex systems with physical, cyber, and social components. Current works on extracting and understanding city events mainly rely on technology enabled infrastructure to observe and record events. In this work, we propose an approach to leverage citizen observations of various city systems and services such as traffic, public transport, water supply, weather, sewage, and public safety as a source of city events. We investigate the feasibility of using such textual streams for extracting city events from annotated text. We formalize the problem of annotating social streams such as microblogs as a sequence labeling problem. We present …
Understanding Social Effects In Online Networks, Huda Alhazmi, Swapna S. Gokhale, Derek Doran
Understanding Social Effects In Online Networks, Huda Alhazmi, Swapna S. Gokhale, Derek Doran
Kno.e.sis Publications
Understanding the motives behind people’s interactions online can offer sound bases to predict how a social network may evolve and also support a host of applications. We hypothesize that three offline social factors, namely, stature, relationship strength, and egocentricity may also play an important role in driving users’ interactions online. Therefore, we study the influence of these three social factors in online interactions by analyzing the transitivity in triads or three-way relationships among users. Analyzing transitivity through the lens of triad census for four popular social networks, namely, Facebook, Twitter, YouTube and Slashdot, we find that: (i) users’ interactions are …
Semantic Gateway As A Service Architecture For Iot Interoperability, Pratikkumar Desai, Amit P. Sheth, Pramod Anantharam
Semantic Gateway As A Service Architecture For Iot Interoperability, Pratikkumar Desai, Amit P. Sheth, Pramod Anantharam
Kno.e.sis Publications
The Internet of Things (IoT) is set to occupy a substantial component of future Internet. The IoT connects sensors and devices that record physical observations to applications and services of the Internet. As a successor to technologies such as RFID and Wireless Sensor Networks (WSN), the IoT has stumbled into vertical silos of proprietary systems, providing little or no interoperability with similar systems. As the IoT represents future state of the Internet, an intelligent and scalable architecture is required to provide connectivity between these silos, enabling discovery of physical sensors and interpretation of messages between things. This paper proposes a …
Mining Behavior Of Citizen Sensor Communities To Improve Cooperation With Organizational Actors, Hemant Purohit
Mining Behavior Of Citizen Sensor Communities To Improve Cooperation With Organizational Actors, Hemant Purohit
Kno.e.sis Publications
Web 2.0 (social media) provides a natural platform for dynamic emergence of citizen (as) sensor communities, where the citizens generate content for sharing information and engaging in discussions. Such a citizen sensor community (CSC) has stated or implied goals that are helpful in the work of formal organizations, such as an emergency management unit, for prioritizing their response needs. This research addresses questions related to design of a cooperative system of organizations and citizens in CSC. Prior research by social scientists in a limited offline and online environment has provided a foundation for research on cooperative behavior challenges, including ‘ …
Using Ehrs For Heart Failure Therapy Recommendation Using Multidimensional Patient Similarity Analytics, Maryam Panahiazar, Vahid Taslimitehrani, Naveen L. Pereira, Jyotishman Pathak
Using Ehrs For Heart Failure Therapy Recommendation Using Multidimensional Patient Similarity Analytics, Maryam Panahiazar, Vahid Taslimitehrani, Naveen L. Pereira, Jyotishman Pathak
Kno.e.sis Publications
Electronic Health Records (EHRs) contain a wealth of information about an individual patient’s diagnosis, treatment and health outcomes. This information can be leveraged effectively to identify patients who are similar to each for disease diagnosis and prognosis. In recent years, several machine learning methods 1 have been proposed to assessing patient similarity, although the techniques have primarily focused on the use of patient diagnoses data from EHRs for the learning task. In this study, we develop a multidimensional patient similarity assessment technique that leverages multiple types of information from the EHR and predicts a medication plan for each new patient …
Value Oriented Big Data Processing With Applications, Krishnaprasad Thirunarayan
Value Oriented Big Data Processing With Applications, Krishnaprasad Thirunarayan
Kno.e.sis Publications
We discuss the nature of Big Data and address the role of semantics in analyzing and processing Big Data that arises in the context of Physical-Cyber-Social Systems. To handle Volume, we advocate semantic perception that can convert low-level observational data to higher-level abstractions more suitable for decision- making. To handle Variety, we resort to semantic models and annotations of data so that intelligent processing can be done independent of heterogeneity of data formats and media. To handle Velocity, we seek to use continuous semantics capability to dynamically create event or situation specific models and recognize relevant new concepts, entities and …
Evaluation Of The Signature Molecular Descriptor With Blosum62 And An All-Atom Description For Use In Sequence Alignment Of Proteins, Lindsay M. Aichinger
Evaluation Of The Signature Molecular Descriptor With Blosum62 And An All-Atom Description For Use In Sequence Alignment Of Proteins, Lindsay M. Aichinger
Williams Honors College, Honors Research Projects
This Honors Project focused on a few aspects of this topic. The second is comparing the molecular signature kernels to three of the BLOSUM matrices (30, 62, and 90) to test the accuracy of the mathematical model. The kernel matrix was manipulated in order to improve the relationship by focusing on side groups and also by changing how the structure was represented in the matrix by increasing the initial height distance from the central atom (Height 1 and Height 2 included).
There were multiple design constraints for this project. The first was the comparison with the BLOSUM matrices (30, 62, …
Knowledge Enabled Approach To Predict The Location Of Twitter Users, Revathy Krishnamurthy, Pavan Kapanipathi, Amit P. Sheth, Krishnaprasad Thirunarayan
Knowledge Enabled Approach To Predict The Location Of Twitter Users, Revathy Krishnamurthy, Pavan Kapanipathi, Amit P. Sheth, Krishnaprasad Thirunarayan
Kno.e.sis Publications
Knowledge bases have been used to improve performance in applications ranging from web search and event detection to entity recognition and disambiguation. More recently, knowledge bases have been used to analyze social data. A key challenge in social data analysis has been the identification of the geographic location of online users in a social network such as Twitter. Existing approaches to predict the location of users, based on their tweets, rely solely on social media features or probabilistic language models. These approaches are supervised and require large training dataset of geo-tagged tweets to build their models. As most Twitter users …
Knowledge-Driven Personalized Contextual Mhealth Service For Asthma Management In Children, Pramod Anantharam, Tanvi Banerjee, Amit P. Sheth, Krishnaprasad Thirunarayan, Surendra Marupudi, Vaikunth Sridharan
Knowledge-Driven Personalized Contextual Mhealth Service For Asthma Management In Children, Pramod Anantharam, Tanvi Banerjee, Amit P. Sheth, Krishnaprasad Thirunarayan, Surendra Marupudi, Vaikunth Sridharan
Kno.e.sis Publications
Wide adoption of smartphones and availability of low-cost sensors has resulted in seamless and continuous monitoring of physiology, environment, and public health notifications. However, personalized digital health and patient empowerment can become a reality only if the complex multisensory and multimodal data is processed within the patient context. Contextual processing of patient data along with personalized medical knowledge can lead to actionable information for better and timely decisions. We present a system called kHealth capable of aggregating multisensory and multimodal data from sensors (passive sensing) and answers to questionnaire (active sensing) from patients with asthma. We present our preliminary data …
Gender-Based Violence In 140 Characters Or Fewer: A #Bigdata Case Study Of Twitter, Hemant Purohit, Tanvi Banerjee, Andrew Hampton, Valerie L. Shalin, Nayanesh Bhandutia, Amit P. Sheth
Gender-Based Violence In 140 Characters Or Fewer: A #Bigdata Case Study Of Twitter, Hemant Purohit, Tanvi Banerjee, Andrew Hampton, Valerie L. Shalin, Nayanesh Bhandutia, Amit P. Sheth
Kno.e.sis Publications
Public institutions are increasingly reliant on data from social media sites to measure public attitude and provide timely public engagement. Such reliance includes the exploration of public views on important social issues such as gender-based violence (GBV). In this study, we examine big (social) data consisting of nearly fourteen million tweets collected from Twitter over a period of ten months to analyze public opinion regarding GBV, highlighting the nature of tweeting practices by geographical location and gender. We demonstrate the utility of Computational Social Science to mine insight from the corpus while accounting for the influence of both transient events …
Archive - A Data Management Program, James H. Devilbiss, C. Steven Whisnant, Yasmeen Shorish
Archive - A Data Management Program, James H. Devilbiss, C. Steven Whisnant, Yasmeen Shorish
Department of Physics and Astronomy - Faculty Scholarship
To meet funding agency requirements, a portable data management solution is presented for small research groups. The database created is simple, searchable, robust, and can reside across multiple hard drives. Employing a standard metadata schema for all data, the database ensures a high level of standardization, findability, and organization. The software is written in Perl, runs on UNIX, and presents a web-based user interface. It uses a fast, portable log-in scheme, making it easy to export to other locations. As research continues to move towards more open data sharing and reproducibility, this database solution is agile enough to accommodate external …
Exploring Knowledge Management Practices In Service-Based Small Business Enterprises, Orlando Skelton
Exploring Knowledge Management Practices In Service-Based Small Business Enterprises, Orlando Skelton
Walden Dissertations and Doctoral Studies
Small business enterprises (SBEs) are significant contributors to business growth and employment in the United States, but despite governmental support, the failure rate of SBEs is high. Some small business leaders lack the critical management skills to detect or discover when underperformance in revenue-generation is due to gaps in organizational knowledge or business practices associated with managing knowledge assets. Guided by the knowledge-based view of the firm, the purpose of this multiple case study was to address that gap by exploring the skills needed by leaders to understand how deficiencies in their knowledge management practices contribute to underperformance. Semistructured interview …
Exploring Government Contractor Experiences Assessing And Reporting Software Development Status, Putnam P. Texel
Exploring Government Contractor Experiences Assessing And Reporting Software Development Status, Putnam P. Texel
Walden Dissertations and Doctoral Studies
Reports from academic, commercial, and government organizations have documented software-intensive system cost and schedule overruns for decades. These reports have identified lack of management insight into the software development process as one of many contributing factors. Multiple management mechanisms exist. However, these mechanisms do not support the assessment, and subsequent reporting, of software completion status. Additionally, the conceptual framework, based on industry standards, is limited in its relevance to this study due to an emphasis on what is needed while deferring implementation details. The purpose of this phenomenological study was to explore U.S. government contractors' lived experiences of assessing and …
Exploring Strategies For Retaining Information Technology Professionals: A Case Study, Shannon J. Thomas
Exploring Strategies For Retaining Information Technology Professionals: A Case Study, Shannon J. Thomas
Walden Dissertations and Doctoral Studies
In the 21st century, retaining information technology (IT) professionals is critical to a company's productivity and overall success. Senior IT leaders need effective strategies to retain skilled IT professionals. Guided by the general systems theory and the transformational leadership theory, the purpose of this qualitative exploratory case study was to explore the retention strategies used by 2 senior IT leaders in Atlanta, Georgia to retain IT professionals. Semistructured interviews were employed to elicit detailed narratives from these IT leaders on their experiences in retaining IT professionals. A review of company documents, as well as member-checking of initial interview transcripts, helped …
Distinguishing Leadership Of Information Assurance Teams, Bamidele Adetokunbo Bankole
Distinguishing Leadership Of Information Assurance Teams, Bamidele Adetokunbo Bankole
Walden Dissertations and Doctoral Studies
Information assurance (IA) projects are essential components of the information technology industry and often fail due to budget overruns, missed deadlines, and lack of performance by the project teams. The purpose of this phenomenological study was to explore the strategies necessary to improve IA project team performance. Lewin's situational leadership theory was used as the conceptual framework for this study. Interviews were conducted with 20 IA professionals located in the Washington, DC Metropolitan area. The data were transcribed, coded, and clustered for the identification of common patterns based on the Moustakas' modified van Kaam analysis. The major themes that emerged …
Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan
Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan
Open Access Theses & Dissertations
This Dissertation aims to investigate the global diversity in information systems by studying three distinctive phenomena. The first essay investigates the existence of "IT Productivity Paradox" within firms operating in developing countries using an empirical approach. IT Productivity Paradox has been a widely investigated topic within the context of developed countries and primarily studied within the context of developing countries using a single country. Our research addresses a gap in the literature, which is the study of IT Productivity Paradox across several developing countries with diverse characteristics. The second essay studies the contextual factors (firm characteristics and perception of external …
Employees' Perceptions Of Managerial Transformational Leadership Behaviors And Effectiveness Among Information Technology Managers, Olusesan Ogunsakin
Employees' Perceptions Of Managerial Transformational Leadership Behaviors And Effectiveness Among Information Technology Managers, Olusesan Ogunsakin
Walden Dissertations and Doctoral Studies
The selection of effective leaders is critical to improving organizations' performance in the current dynamic global business landscape; however, the inadequacy of leadership selection criteria in many organizations had led to an increase in the rate of chief executive officers' dismissals within the last 3 decades in the United States. The purpose of this correlational study was to examine the relationship between employees' assessments of their managers' transformational leadership behaviors and employees' perceptions of managerial leadership effectiveness for improved leadership selection. Bass' transformational leadership theory and Herzberg's motivation-hygiene theory guided the study with data gathered, using an online survey, from …
Sustainability Of Enterprise Resource Planning (Erp) Benefits Postimplementation: An Individual User Perspective, Mohamed Abdalla Mohamed Badreldin Lotfy
Sustainability Of Enterprise Resource Planning (Erp) Benefits Postimplementation: An Individual User Perspective, Mohamed Abdalla Mohamed Badreldin Lotfy
Walden Dissertations and Doctoral Studies
Although there is research about the use of enterprise resource planning (ERP) from a management perspective, the research is not clear as to whether the ERP benefits justify the costs, not only in dollars, but also in effort, from the end user's perspective. Using the theory of diffusion of innovation (DOI), the purpose of this quantitative research was to identify the set of postimplementation sustainability factors that maximized ERP user value, which are major issues for management, and measured their relative significance. The study's structural model incorporated the technology-organization-environment (TOE) framework, which is a conceptualization of the theory of diffusion …
Impacts On Faculty Workload During A Learning Management System Transition, Karla Page Jones
Impacts On Faculty Workload During A Learning Management System Transition, Karla Page Jones
Walden Dissertations and Doctoral Studies
Management professionals at many colleges are transitioning to new learning management systems (LMS), such as Moodle, for reasons such as lower costs, greater outreach, and student preference. Transitioning to a new LMS may result in faculty problems with learning a new technology platform in addition to teaching. The purpose of this study was to explore the impact that an LMS transition had on faculty attitudes, experiences, and workload. The conceptual framework of the study was the unified theory of acceptance and use of technology and the diffusion of innovation theory. A phenomenological design was employed with a purposeful sample of …