Browse Titles

You are viewing titles for CAPELLA UNIVERSITY in the Computer science subject available through the ProQuest Dissertations & Theses Gradworks site.


"Chief integration officer": A study of success factors in the implementation of clinical information technology A Delphi study of security issues related to school-issued laptop computers in South Dakota K--12 public schools A case study exploring the effectiveness of ERP integration towards managerial performance A correlational study on the absence of incentives to share knowledge in a virtual community A grounded theory study of the risks and benefits associated with the use of online social networking applications in a military organization A mixed method case study investigation of the digital divide in West Virginia: Residential broadband saturation levels and obstacles to adoption A non-experimental investigation on the impact of gender, academic skills and computer skills on online course completion rates A qualitative case study of perceptions in secure systems development A quantitative experimental study of the effectiveness of systems to identify network attackers A quantitative study of Open Source Information Security software success A quantitative study of biometric attendance tracking system's responsiveness, accessibility, usefulness, and effectiveness in organizations A quantitative study to explore the relationship between technostress symptoms and technostress among Puerto Rican university students A study of soft skills for IT workers in recruitment advertising A synthesis and survey of critical success factors for computer technology projects A taxonomy of network -perpetrated criminal activity: Developing an empirically-based model for recourse strategies An analysis of open source security software products downloads An analysis of security, cost-effectiveness, and it compliance factors influencing cloud adoption by it managers An assessment of security vulnerabilities comprehension of cloud computing environments: A quantitative study using the unified theory of acceptance and use An empirical investigation of critical success factors in agile software development projects An examination of the explicit costs of sensitive information security breaches An exploration of the success factors as perceived by IT Executives and Managers in implementing mobile devices for business use An exploratory qualitative inquiry of key indicators on IT disaster recovery planning Analysis of the automated vulnerability scanning framework: An experimental study Assessing the relationship among server virtualization adoption, strategic alignment, and information technology effectiveness Assessing the relationship of virtualization, strategic alignment, and information technology effectiveness Assessing the relationships among information technology flexibility, IT-business strategic alignment, and information technology effectiveness: An investigation of business intelligence implementation Assessing variations among strategic alignment factors based on industry type: Correlational and comparative study Avatar coaching: A case study on the perceptions of virtual reality coaching interventions with an avatar coach Beyond technology, an analysis of the perceived impact of transformational leadership and contingent rewards as extrinsic motivation on virtual team member satisfaction and leadership effectiveness: A quantitative study Business intelligence within commercial real estate: An application of the Motivation and Acceptance Model Corporate strategy and technology alignment factors that contribute to strategy and technology alignment Cyber security governance - a view of selected organizations within the U.S. Department of Defense Data warehouse implementation strategies: A mixed method analysis of critical success factors Demographic-based perceptions of adequacy of software security's presence within individual phases of the software development life cycle Doc-assist: A case study of developing an effective policy document using usability precepts and methodology for assisting healthcare professionals comply with HIPAA E -learning design 2.0: Emergence, connected networks and the creation of shared knowledge Electronic identification using radio frequency systems in academic environments: A quantitative study involving RFID technology to enhance academic processes Electronic medical records (EMR) adoption, patient mortality, and patient safety in U.S. hospitals: A longitudinal study (2008-2014) Embracing security in all phases of the software development life cycle: A Delphi study Enterprise 2.0: An extended technology acceptance model Estimating the effort costs of information technology disaster recovery projects: A model based on a mixed methodology investigation Ethics and morality in software development: A developer's perspective Evaluating processing speed in a distributed database environment: A quantitative approach Examine the relationship between information technology governance, control objectives for information and related technologies, ISO 27001/27002, and risk management Examining continued use of software as a service in organizations Factors influencing F/OSS Cloud Computing software product success: A quantitative study Factors influencing cloud-computing technology adoption in developing countries Factors influencing the adoption of cloud computing by decision making managers Factors influencing the adoption of cloud computing by medical facility managers Factors that influence adoption of multi-factored authentication within large organizations Government funding for electronic health information and relationship to healthcare data security breaches Impact of information technology governance structures on strategic alignment Implementing an ERP system in the Guam public sector: A survey of the membership of the Association of Government Accountants Implicit and explicit measures of coordination effectiveness as predictors of agile software development project success: A regression approach Information security policies in HIPAA and SOX environments in California: An investigation of challenges, design processes, and implementation strategies Information technology investment and the relationship to key hospital operational metrics: An exploratory analysis Innovative cyber attacks; A federal contractor's paradigm changer and driving factor for innovation Introductory computer programming course teaching improvement using immersion language, extreme programming, and education theories Leadership and technology offshoring in India beyond cost reduction Multiagent system technology: A quantitative stepwise regression study of the influences related to the growth of its use Network cybersecurity indicators: Determining cybersecurity indicators that accurately reflect the state of cybersecurity of a network Network risk assessment and the assigned level of accepted risk Novamente artificial general intelligence: Design science research towards a designing / prototyping model Nursing faculty experiences of virtual learning environments for teaching clinical reasoning Online privacy and security of Internet digital certificates: A study of the awareness, perceptions, and understanding of Internet users Open source software in medium size organizations: Key factors for adoption Predicting cloud computing technology adoption by organizations: An empirical integration of technology acceptance model and theory of planned behavior Presence of optimistic bias and illusion of control in information security risk perceptions Public Wi-Fi usage and identity theft: A correlational study Quantifying the discoverability of identity attributes in Internet-based public records: Impact on identity theft and knowledge-based authentication Quantitative factors influencing the adoption of IP network infrastructure convergence by telco /ISP engineers Revenue recognition fraud: Effective and efficient detection Sarbanes-Oxley and it security: An exploratory case study investigating the impact of section 404 on information security Software development project rejection: A quantitative Q-factor analysis to measure cognitive learning styles of medical doctors and programmers The adoption of grid computing technology by organizations: A quantitative study using technology acceptance model The challenges and factors that determine female career choices in information technology professions: An exploratory investigation The cybercitizen dimension: A quantitative study using a threat avoidance perspective The effects and interactions, of age, gender, and computer familiarity on presence during a virtual reality activity The effects of an Internet2 implementation at the food and drug administration: A case study The effects of cognitive-affective states on performance, workload, and knowledge acquisition in synthetic military training environments The effects of ethnicity, age, gender, and education on the adoption of mobile computing: A correlational study The effects of organizational culture traits on information security principles for organizations located in the United States: An exploratory quantitative study The effects of strategic typology model and strategic alignment on the delivery capability of an it organization The impact of consumer security awareness on adopting the Internet of Things: A correlational study The impact of cultures on global virtual teams of India and the United States: A case study The implementation of e -government in the Republic of Yemen: An empirical evaluation of the technical and organizational readiness The lived experience of senior registered nurses working with health information technology in their daily practice The ontological architectures in the application of a knowledge management system for curricular assessment The role of the Project Management Office on Information Technology project success User perceptions of computerized physician order entry effects on adverse drug events Using innovation diffusion theory and the technolgy acceptance model to evaluate the security of wireless mobile devices at a post secondary institution Utilizing agile software development as an effective and efficient process to reduce development time and maintain quality software delivery Wiring the wiregrass: A case study of information technology success factors' role in west Georgia economic development