Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 25 |
Descriptor
Information Technology | 25 |
Structural Equation Models | 25 |
Foreign Countries | 8 |
Models | 8 |
Information Systems | 6 |
Surveys | 6 |
Adoption (Ideas) | 5 |
Correlation | 5 |
Intention | 5 |
Influences | 4 |
Least Squares Statistics | 4 |
More ▼ |
Source
ProQuest LLC | 25 |
Author
Publication Type
Dissertations/Theses -… | 25 |
Education Level
Higher Education | 4 |
Adult Education | 1 |
Audience
Location
United States | 3 |
Africa | 2 |
Taiwan | 2 |
Asia | 1 |
Brazil | 1 |
California | 1 |
Cameroon | 1 |
Canada | 1 |
India | 1 |
Kentucky | 1 |
Louisiana | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wright, Sarah R. – ProQuest LLC, 2018
The computing industry has advanced at a rapid pace from desktops and laptops to mobile devices that can be held or worn including smart phones, tablets, and smart watches. These mobile technologies have become a part of every facet of life from banking and health care to new ways to communicate with family and peers. While business and industry…
Descriptors: Telecommunications, Handheld Devices, Higher Education, College Faculty
Song, Changsoo – ProQuest LLC, 2014
Public and non-profit organizations are operating different types of programs to help micro-enterprises appropriately adopt and utilize information technology (IT) for their businesses. Some programs provide mentoring or consultation services; some simply deliver discounted hardware and software; and some offer training services. However, it is…
Descriptors: Information Technology, Small Businesses, Influences, Adoption (Ideas)
Edwards, Charles K. – ProQuest LLC, 2013
Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant…
Descriptors: Governance, Information Security, Models, Compliance (Legal)
Nworji, Alexander O. – ProQuest LLC, 2013
Most organizations spend millions of dollars due to the impact of improperly implemented database application systems as evidenced by poor data quality problems. The purpose of this quantitative study was to use, and extend, the technology acceptance model (TAM) to assess the impact of information quality and technical quality factors on database…
Descriptors: Databases, Adoption (Ideas), Models, Influences
Mansouri-Rad, Parand – ProQuest LLC, 2012
Telemedicine improves access to information and healthcare services. Not only more cost effective and more efficient method of providing health care than the traditional methods, telemedicine is the most convenient method of delivering healthcare. However, the adoption of telemedicine has been challenging. The purpose of this dissertation is to…
Descriptors: Foreign Countries, Telecommunications, Health Services, Delivery Systems
Stewart, Jeffrey E. – ProQuest LLC, 2013
Leadership in information technology (IT) firms remains a topic for study. Understanding how IT professionals react to leadership styles creates an opportunity for IT leaders to better lead by matching expectation to leadership style. Previous research has linked transformation leadership to the learning organization in the pharmaceutical sector,…
Descriptors: Leadership Styles, Information Technology, Organizational Culture, Models
Sonthiprasat, Rattanawadee – ProQuest LLC, 2014
THE PROBLEM. The purpose of this quantitative correlation study was to assess the relationship between different Cloud service levels of effective business innovation for SMEs. In addition, the new knowledge gained from the benefits of Cloud adoption with knowledge sharing would enhance the decision making process for businesses to consider the…
Descriptors: Decision Making, Small Businesses, Information Storage, Information Technology
Akuta, Eric Agwe-Mbarika – ProQuest LLC, 2012
The past decade has projected much of Africa as a haven for cybercrime perpetration. This view was widely evidenced in Cameroon, a country regarded as a miniature Africa due to its diverse socio-cultural, economic and political characteristics. In spite of efforts by government to curb cybercrime, the perpetration rate has not declined due to a…
Descriptors: Foreign Countries, Computer Security, Internet, Criminals
Kang, Juhee – ProQuest LLC, 2014
Over the last decade, mobile communication has become increasingly available, affordable and accessible even to the poor and disadvantaged at the Bottom of the Pyramid (BOP) in developing countries. This unprecedented connectivity at the BOP introduces not only an untapped group of media users for communication researchers, but also a new hope…
Descriptors: Low Income, Information Technology, Telecommunications, Social Change
Tran, Kiet T. – ProQuest LLC, 2012
This study examined the relationship between information technology (IT) governance and software reuse success. Software reuse has been mostly an IT problem but rarely a business one. Studies in software reuse are abundant; however, to date, none has a deep appreciation of IT governance. This study demonstrated that IT governance had a positive…
Descriptors: Computer Software, Models, Success, Information Systems
Nchise, Abinwi C. – ProQuest LLC, 2012
The exponential growth of the Internet and mobile phone usage in sub-Saharan Africa (SSA) within the last decade has created many different platforms for citizens' political participation. This appears to be changing the political landscape of most countries within the region as governments are increasingly held responsible for their actions.…
Descriptors: Foreign Countries, Information Technology, Democracy, Citizen Participation
Parker, Sharon L. – ProQuest LLC, 2013
This research explored IT governance framework adoption, leveraging established IS theories. It applied both the technology acceptance model (TAM) and the technology, organization, environment (TOE) models. The study consisted of developing a model utilizing TOE and TAM, deriving relevant hypotheses. Interviews with a group of practitioners…
Descriptors: Information Systems, Information Technology, Governance, Adoption (Ideas)
Behkami, Nima A. – ProQuest LLC, 2012
It has been shown that the use of Health Information Technology (HIT) is associated with reduced cost and increased quality of care. This dissertation examined the use of registries in Patient Centered Medical Home (PCMH) practices. A survey questionnaire was sent to a nationwide group of clinics certified for being a PCMH. They were asked to…
Descriptors: Health Services, Patients, Information Technology, Barriers
Hall, Jacqueline Huynh – ProQuest LLC, 2011
In today's modern business world, most organizations use information as a critical business asset to gain competitive advantage and create market value. Increasingly, an organization's ability to protect information assets plays a critical role in its ability to meet regulatory compliance requirements, increase customer trust, preserve brand…
Descriptors: Organizations (Groups), Institutional Characteristics, Information Technology, Computer Security
Gardner, John Wallace – ProQuest LLC, 2012
This dissertation examines the effects of safety culture, including operational climate and practices, as well as the adoption and use of information systems for delivering high quality healthcare and improved patient experience. Chapter 2 studies the influence of both general and outcome-specific hospital climate and quality practices on process…
Descriptors: National Surveys, Hospitals, Patients, Safety
Previous Page | Next Page ยป
Pages: 1 | 2