Applied Information Management Master's Capstone Projects and Papers
Permanent URI for this collection
This collection contains a selection of the Master's capstone research papers completed by students in the University of Oregon Applied Information Management Master's Degree Program.
For more information on the AIM Program and its requirements, visit the web site at: http://aim.uoregon.edu
Browse
Browsing Applied Information Management Master's Capstone Projects and Papers by Subject "AIM"
Now showing 1 - 20 of 125
Results Per Page
Sort Options
Item Open Access Adopting Software Design Patterns in an IT Organization: An Enterprise Approach to Add Operational Efficiencies and Strategic Benefits(2011-07-07) Knox, JohnSoftware design patterns are recognized as a valuable part of good engineering practices (Buschmann, 2005). Literature published between 1995 and 2011 is examined in order to provide IT professionals with definitions, classifications, and benefits of software design patterns. Design patterns capture experience and provide multiple perspectives on design problems. They support improved communication, flexibility and extensibility, and collaborative and mentoring opportunities. Adoption and implementation are required enterprise wide to realize benefits and efficiencies.Item Open Access Aligning Selected Systems Thinking Tools to Mitigate Key Challenges Encountered During the Initial Stage of Organizational Change(2008-11-13T23:13:52Z) Fallenstein, MeghanThis paper examines the potential for systems thinking tools to provide ways for organizational leaders (Senge, 1999) to address challenges within the organizational change process. Literature published after 1990 is reviewed concerning challenges encountered in the initiating phase of organizational change (Senge, 1999) and selected systems thinking tools: Causal Loop Diagram, Behavior Over Time graph ("Basic" 2004), The Iceberg (Kim, 1999), and Action-to-Outcome (Jones and Seville, 2003). Conclusions are presented for organizational change leaders.Item Open Access Analysis of Three Personalized Search Tools in Relation to Information Search: iGoogle, LeapTag, and Yahoo! MyWeb(2007-06) Tachau, JoelPersonalized search is becoming mainstream with the rollout of iGoogle. While only beginning to impact consumers, these search tools require search experts to retool and rethink how they optimize websites. Three personalized search tools are analyzed to illustrate common features related to the information search stage of the consumer buying process (Kotler & Keller, 2006, p. 191). Conclusions provide a summary of potential SEO (search engine optimization) tactics and five key considerations.Item Open Access Applied Materials Field Operations(University of Oregon, 2013-12) Worth, BillThe purpose of this annotated bibliography is to address how to improve management of data quality within information systems in relation to four categories: accuracy, consistency, currency, and completeness.Item Open Access Applying Aspects of Data Governance from the Private Sector to Public Higher Education(2011-07-07) Poor, MarshaThe purpose of this annotated bibliography is to identify ways to better manage enterprise-wide data assets within institutions of higher education through data quality actions and data governance options. The goal is to present selected data governance practices within the private business sector for consideration by individuals in public higher education who promote and support data quality initiatives. Topics include data quality barriers, data quality models, data quality management practices, and data quality drivers.Item Open Access Applying Lean Thinking Principles to Software Development(2005-06) Tatum, RayLean thinking principles, based on the Japanese concept muda, have been successfully applied in manufacturing and product development organizations since the 1940s. The software development community can realize similar benefits, with potential to eliminate wasted efforts inherent in the serial and structured traditional software development process. This study defines the seven basic principles of lean thinking (Poppendieck and Poppendieck, 2003), examines how they relate to the software development process and suggests techniques for their application.Item Open Access Benefits of Using Automated Software Testing Tools to Achieve Software Quality Assurance(2008-11-13T23:17:08Z) Grater, Michael T.The increasing complexity of software development demands that developers use automated software testing tools. This study analyzes selected literature published between 1997 and 2005 to provide an analysis of benefits of automated software testing tools to increase software quality assurance. Benefits are presented for software engineers and business analysts and classified in relation to five quality factors (in reference to web applications) described by QA Labs, including quality, reliability, recoverability, security, usability and performance.Item Open Access Building a Strong Customer-centric Strategy to Enable CRM and Develop Customer Loyalty(2008-02) Ballard, KristenCustomer Relationship Management (CRM) requires a customer-centric focus that aligns business strategies with customer needs to generate profit through maximizing customer lifetime value. Many business managers implement CRM technology without addressing the customer-centric strategic orientation that must be present for CRM to be successful. This Review of the Literature examines 22 articles published between 1973 and 2007 that emphasize customer-centric business strategy as a foundation for CRM and a facilitator for customer loyalty.Item Open Access Business Intelligence Enables Greater Efficiency When Strategically Designed and Tactically Implemented(2011-07-07) Averett, LeeThis annotated bibliography summarizes 32 articles published between 2000 and 2011 that address the question Why should a company adopt a strategic approach to business intelligence (BI) and business analysis (BA)in addition to specific tactical approaches, to achieve potential efficiency gains? Factors are identified related to system design, employee education, and technology to capture, store and analyze high quality data. The goal is to present upper managers a set of key factors for implementation success.Item Open Access Change Management and Customer Relationship Management (CRM) Implementations: Planning for Success(2005-12) Kanellakis, NicholasThis paper identifies change management practices that facilitate Customer Relationship Management (CRM) (Nykamp, 2001) implementations. Selected literature published between 1994 and 2004 is subjected to grounded theory and constant comparison analysis (Strauss and Corbin, 1990). Results are grouped by four change management areas from Kale (2005): training, leadership, infrastructure change, and performance metrics. The outcome is presented to CIOs and CRM steering committee members, as a decision support tool in planning a CRM implementation.Item Open Access The Changing Role of CIO: From IT Leader to Corporate Strategist(2008-11-13T23:24:20Z) Feldhues, Moritz G.This paper examines the changing role of the Chief Information Officer (CIO) in large technology organizations, from 1995 à ¢ 2005. Using a pre-defined set of nine CIO leadership roles (Gottschalk, 2001), a content analysis is conducted to determine which CIO leadership roles have become more predominant. Conclusions are presented in a timeline graph (Corda, 2004) and a composite set of key job responsibilities in a current CIO job description, for use by executive recruitment teams.Item Open Access Cloud Computing: Key IT-Related Risks and Mitigation Strategies for Consideration by IT Security Practitioners(2010-02-24T19:12:54Z) Betcher, Thomas J.Although the benefits of cloud computing are well known, safety concerns have received less attention (Rash, 2009). This review of selected literature, published between 2007 and 2009, identifies key IT-related cloud computing risks that should be considered by security practitioners. Three types of cloud computing risks are examined: policy and organizational, technical, and legal. Risk mitigation strategies are also explored, and include audit controls, policies and procedures, service level agreements, and other forms of governance.Item Open Access Collective Intelligence for Competitive Advantage: Crowdsourcing and Open Innovation(2010-02-24T19:13:24Z) Lane, SeanThis literature review examines collective intelligence through analysis of literature published between 1985 and 2009. Focus is on (a) definitions and applications of collective intelligence related to crowdsourcing and open innovation, and (b) creation of competitive advantage. The final outcome presents five recommendations for how these two types of collective intelligence may be used to support innovation, including the need to create a collective intelligence (CI) system and use of an open innovation business model.Item Open Access Communication Tactics that Describe Innovation Advocacy Leadership as a Way to Inform Organizational Strategic Planning by Leveraging Networks and Building Consensus(2010-07) Atchley, ConnieThis study presents six communication tactics that describe innovation advocacy leadership. It examines differences in communication abilities and behaviors represented by divergent processes, which develop new directions necessary to support innovative ideas, and convergent processes which represent the dominant organizational view necessary to support formal strategic planning (Pappas, 2004). Tactics provide advocates with a procedural bridge to the new ideas they propose and include defining innovation context, developing dynamic networks, channeling opportunities, and framing perceptions.Item Open Access Computer Instruction and Andragogy: Best Methods to Teach the Elderly E-mail as a Communication Tool(2005-12) Cuciti, J. MichaelEach year 351,000 people become senior citizens (U.S. Census Bureau, 2004). As families disperse geographically, there is a need for older adults to learn to use technology as a communication tool to remain connected to family. This study examines age-related barriers that hinder learning and identifies strategies and design considerations best suited to the elderly. Guidelines, grounded in andragogy (Knowles, in Bean, 2003) are provided to assist instructors who teach the elderly in face-to-face environments.Item Open Access Conducting a Needs Assessment for the Implementation of Computer Based Training within a Corporate Environment(2007-06) Maldonado, BrandonComputer Based Training (CBT) can fail to deliver real business value if implemented on the basis of assumptions alone (Oà ¢ Connor, 2006). A training needs assessment can determine if CBT will address needs prior to implementation. Using content analysis, this study, structured in four steps, provides a guide to conducting a CBT needs assessment. Steps include: (1) conducting a gap analysis, (2) identifying priorities, (3) identifying performance problems, and (4) identifying solutions. CBT benefits and drawbacks are included.Item Open Access Contract Management Techniques: Managing the Progress, Quality and Coordination of Outsourced Software Development(2005-03) Lambert, LorenaAs society's reliance on technology spreads, a growing number of organizations have turned to software development outsourcing to augment their available resources. Using the Capability Maturity Models for Software Engineering and Software Acquisition as a framework, this study identifies practical contract management techniques based on recommendations in selected literature (1990-2005). These techniques are intended for application by project managers to effectively manage the progress, quality and coordination of work in outsourced software development projects.Item Open Access Copyright Law and Massive Book Digitization Projects: A Current Interpretation(2007-06) Baker, DarrenSix pre-selected legal concepts related to copyright law (copyright infringement, fair use, intermediate copy, library exception, property, and transformative use) are examined in relation to massive book digitization projects, such as the Google Book Search (Jeweler, 2005). Content analysis is applied to literature, published between December 2004 to present, in order to develop interpretive narratives for each concept. These concepts present a â snapshot-in-timeâ that covers current discussion for people tracking topics of interest.Item Open Access Corporate Training, Constructivism, and Electronic Performance Support Systems: A Review of Literature(2008-02) Trask, T.A deeper understanding of EPSS website construction has the potential to benefit web developers and the enterprise through improved EPSS practice, and may add consistency to instructional design. The target audience is corporate web authors. Selected literature, published from 2000-2007, examines the following areas: 1) corporate training, including the role of EPSS systems, 2) principles of a Constructivist Learning Theory, and 3) opportunities to align types of EPSS support structures and potential alignment to Constructivist pedagogy, within an EPSS framework.Item Open Access Critical Elements of an Information Security Management Strategy(2008-07) Lomprey, Gary R.Not only is Information Security Strategy crucial to protect information systems, but it is central to organization survival. Harris (2006) believes security strategy should be customized because each organization is unique. Literature published from 2000 to 2008 examines information systems in the context of information security. Conclusions provide discussion of six key security policy components selected from ISO-27002 (2005), spanning definitions, objectives, management goals, controls, risk assessment, policies and standards, compliance requirements, and supporting references.