Adoption Essays (Examples)

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… trail, and system activity monitoring (Davis & Yen, 2019; Suduc et al., 2010). The abovementioned tasks are not open to primary security measure adoption mechanisms put forward by Suduc and coworkers (2010). These security measures include authenticating principals (including who said it, or which entities have access … to system auditors.
Audit frameworks
i. ISO 27001 Framework
ISO 27001, a kind of taxonomy of potential controls, outlines conditions for the establishment, adoption, monitoring, maintenance, operations, review, and improvement of a documented ISMS (Information Security Management System) for overall organizational risks. This standard aims at ensuring ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Challenges In Management Facing Transformational Leaders Service

Pages: 5 (1606 words) Sources: 5 Document Type:Annotated Bibliography Document #:57833590

… to mobile cloud computing. Computers in Industry, 107, 104-113.
The authors of this article maintain that leadership forms one of the main factors for organizational adoption of successful innovation. But researchers have yet to delve into the subject of leadership elements impacting adoption stages (namely, initiation, implementation, and ‘routinization’). This research involved authors formulating and empirically testing a model based on transformational leadership elements as well ……

References

References

Al Ahmad, S., Easa, N. F., & Mostapha, N. (2019). The Effect of Transformational Leadership on Innovation: Evidence from Lebanese Banks. European Research Studies Journal, 22(4), 215-240.

Aldholay, A. H., Isaac, O., Abdullah, Z., & Ramayah, T. (2018). The role of transformational leadership as a mediating variable in DeLone and McLean information system success model: The context of online learning usage in Yemen. Telematics and Informatics, 35(5), 1421-1437.

Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in Industry, 107, 104-113.

Zappalà, S., & Toscano, F. (2019). Transformational leadership and innovation adoption: Is there a moderation role of personal initiative and job control?. Psychologica, 119.

Zhang, Y., Zheng, J., & Darko, A. (2018). How does transformational leadership promote innovation in construction? The mediating role of innovation climate and the multilevel moderation role of project requirements. Sustainability, 10(5), 1506.

Studyspark

Study Document Study Document

Healthcare Provider Shortage

Pages: 9 (2590 words) Sources: 7 Document Type:Research Proposal Document #:93189886

… providers in the county using MedChi, an organization that provides public health resources in Maryland. MedChi could help address the problem through promoting adoption of technologies like telemedicine and expansion of the scope of practice of non-physician providers. To realize this objective, the organization needs to establish ……

References

References

Antonelli, A.F. (2019, May 14). Does America Have a Physician Shortage – or Are Our Doctors ‘Just Bad at Managing Time’? Retrieved August 5, 2019,  https://www.advisory.com/daily-briefing/2019/05/14/physician-shortage 

Daly, R. (2018, May 22). Healthcare Workforce Shortage Worsening: Senators. Retrieved August 5, 2019, from  https://www.hfma.org/topics/news/2018/05/60811.html 

Desmon, S. (2019, March 1). Doctors in Short Supply in Rural Maryland. Baltimore Sun. Retrieved August 5, 2019, from  https://www.baltimoresun.com/bal-id.rural01mar01-story.html 

Heath, S. (2019, July 11). What Clinician Recruitment Tactics Say About the Physician Shortage. Retrieved August 5, 2019, from https://patientengagementhit.com/news/what-clinician-recruitment-tactics-say-about-the-physician-shortage

Merritt Hawkins. (2019). 2019 Review of Physician and Advanced Practitioner Recruiting Incentives. Retrieved August 5, 2019, from  https://www.merritthawkins.com/uploadedFiles/merritthawkins_2019_incentivereview.pdf 

Western Maryland Health System and Allegany County Health Department. (2011, November). Allegany County Community Health Needs Assessment. Retrieved August 5, 2019, from http://www.alleganyhealthplanningcoalition.com/pdf/ACHD%20Community%20Health%20Needs%20Assessment.pdf

Wolford, H.B. (2018, May 28). Allegany County Sees Shortage of Health Care Workers. Time News. Retrieved August 5, 2019, from  https://www.times-news.com/news/local_news/allegany-county-sees-shortage-of-health-care-workers/article_28b1030d-4403-5d84-aa26-fe17d61b8561.html 

Studyspark

Study Document Study Document

Cloud Computing And Cost Effectiveness

Pages: 5 (1591 words) Sources: 5 Document Type:Annotated Bibliography Document #:36737117

A Study of how Cloud Computing related to Cost-Effectiveness
Annotated Bibliography
Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.
This article ascertains that the major reason why … software. Also, a key feature of cloud computing is its capacity to diminish the financial burden that is placed on firms in technology adoption. The authors also demonstrate that cost reduction can be achieved through the capability to shift from a CAPEX cost structure to an OPEX ……

References

References

Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.

Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.

Elmonem, M. A. A., Nasr, E. S., & Geith, M. H. (2016). Benefits and challenges of cloud ERP systems–A systematic literature review. Future Computing and Informatics Journal, 1(1-2), 1-9.

Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied Management-Jidnyasa, 8(1), 66-73.

Xue, C. T. S., & Xin, F. T. W. (2016). Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing: Services and Architecture, 6(6), 01-15.

Studyspark

Study Document Study Document

Veteran Benefits Administration

Pages: 8 (2465 words) Sources: 3 Document Type:Implementation Paper Document #:56829115

… Training
The relevance of user training in the implementation process cannot be overstated. Lack of training is likely to result in unsatisfactory user adoption of the ERM system. Training will in this case be limited to several factors and/or considerations. Therefore, in this regard, we shall have … does not go contrary to the best practices in as far as agency records creation, maintenance, and access are concerned.
Next, with the adoption of a robust electronic records management (ERM), VBA will have backups that are more reliable. At present, the document management practices at VBA … This is more so the case when it comes to veteran financial records, rehabilitation data, compensation claim files, medical records, etc. With the adoption of superior security practices and implementation of sound controls, all this info would be safe from even the most sophisticated of hackers. This ……

References

References

Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.

National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from  https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf 

U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from  https://www.benefits.va.gov/BENEFITS/about.a sp

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… the effectiveness of the UTAUT model for guiding future research technology acceptance-related analyses (Venkatesh et al., 2003), including the acceptance levels for the adoption of the IoT.
The use of the UTAUT model is also highly appropriate for the purposes of this study because individual acceptance levels … hands-on experience with them (Venkatesh et al., 2016). In this regard, Venkatesh et al. (2016) emphasize that, “There is also research on technology adoption by groups and organizations that holds the premise that one must first use a technology before one can achieve desired outcomes, such as … his associates (2019) also emphasize that, “IoT is now pervasive—new applications are being used in nearly every conceivable environment, which leads to the adoption of device-based interaction and automation. However, IoT has also raised issues about the security and privacy of these digitally augmented spaces” (p. 1). ……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Grade Six Mathematics

Pages: 6 (2529 words) Sources: 2 Document Type:Lesson Plan Document #:85325876

… of instruction and teaching strategies will be used. These include;
a. Strategies
· Guided notes
· Implementation of universal design for learning
· Adoption of a strong behavior management plan
b. Instruction methods
· Direct instruction
· Questions and answer
· Practice
· Discussion
· Inquiry
B. ……

References

References

Spooner, F., Baker, J. N., Harris, A. A., Ahlgrim-Delzell, L., & Browder, D. M. (2007). Effects of training in universal design for learning on lesson plan development. Remedial and special education, 28(2), 108-116.

Wiggins, G. P., & McTighe, J. (2012). The Understanding by design guide to advanced concepts in creating and reviewing units. ASCD.

Studyspark

Study Document Study Document

Creating A Culture Of Diversity Healthcare For Veterans

Pages: 5 (1407 words) Sources: 4 Document Type:Essay Document #:39849745

… while the intervention of the United States government in the matter of welfare for US Veterans is the main goal of…[break]…for a generalized adoption (Taylor et al., 2019). In the case of veteran care, its unique challenges for widespread adoption include things like “integration of veteran care into general health care curriculum, dissemination of training guides across health facilities to ensure its application ……

References

References

Chamorro-Premuzic, T. (2017). Does diversity actually increase creativity? Retrieved from:  https://hbr.org/2017/06/does-diversity-actually-increase-creativity 

Feldman, S., Dickins, M., Browning, C., & DeSoysa, T. (2015). The health and service needs of older veterans: a qualitative analysis. Health Expect, 18(6), 2202-2212. DOI: 10.1111/hex.12190

Olenick, M., Flowers, M., & Diaz, V. (2015). US veterans and their unique issues: enhancing health care professional awareness. Adv Med Educ Pract, 6, 635-639. DOI: 10.2147/AMEP.S89479

Reid, S. (2018). Helping our older veterans. Retrieved from:  https://www.apa.org/monitor/2018/12/job-karel 

Taylor, S. L., Bolton, R., Huynh, A., Dvorin, K., Elwy, A., Kliger, B., Bokhour, B. G. (2019). What should health care systems consider when implementing complementary and integrative health: Lessons from Veterans Health Administration. The Journal of Alternative and Complementary Medicine, 25, S52-S60. DOI:10.1089/acm.2018.0445.

Veterans Health Administration Organizational Excellence. (2018). What’s the forecast for VA innovation in 2018? Retrieved from:  https://www.va.gov/HEALTHCAREEXCELLENCE/diffusion-of-excellence/articles/innovation-forecast-2018.a sp

Studyspark

Study Document Study Document

Application Of Quality And Safety Concepts

Pages: 11 (3179 words) Sources: 8 Document Type:Case Study Document #:72132391

… the safety outcomes of patients.
Sittig and Singh’s (2016) study indicates that HIT is capable of bringing about patient safety improvements, though its adoption has resulted in unintentional outcomes and fresh safety-related concerns. One of the major challenges to improvement of HIT-enabled hospital system safety is: development … particular focus and possibly more inflexible and limiting standards and framework. AST (Adaptive Structuration Theory) improves IT analysis, especially in case of new adoption. Based on the 1984 Structuration Theory of Gidden, Poole and…[break]…assess community-based telemonitoring or remote monitoring of patients have revealed that it enhances patient ……

References

Bibliography

Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.

Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions:  https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/ 

DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.

Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).

Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.

IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.

Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.

Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.

Studyspark

Study Document Study Document

Developing Organizational Practices And Policies

Pages: 5 (1643 words) Sources: 6 Document Type:Essay Document #:58513458

… relevance as has been highlighted above, it should be noted that healthcare organizations have to come to term with the fact that the adoption and implementation of technology is a rather cost intensive exercise. This is particularly the case when it comes to not only the purchase ……

References

References

Agah, A. (Ed.). (2013). Medical Applications of Artificial Intelligence. New York, NY: CRC Press.

Barlow, J. (2016). Managing Innovation in Healthcare. Hackensack, NJ: World Scientific Publishing Company.

Cherry, B. & Jacob, S.R. (2018). Contemporary Nursing: Issues, Trends, & Management (8th ed.). St Louis, MO: Elsevier Health.

Jones, C.B. & Gates, M. (2007). The Costs and Benefits of Nurse Turnover: A Business Case for Nurse Retention. Online Journal of Issues in Nursing, 12(3).

Littlejohn, L., Campbell, J., Collins-McNeil, J. & Khayile, T. (2012). Nursing Shortage: A Comparative Analysis. International Journal of Nursing, 1(1), 22-27.

Kruse, C.S. & Beane, A. (2018). Health Information Technology Continues to Show Positive Effect on Medical Outcomes: Systematic Review. J Med Internet Res, 20(2).

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".