Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Arizona" +contributor:("Durcikova, Alexandra"). Showing records 1 – 8 of 8 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Arizona

1. Liu, Jun. W7 MODEL OF PROVENANCE AND ITS USE IN THE CONTEXT OF WIKIPEDIA .

Degree: 2011, University of Arizona

 Data provenance refers to the lineage or pedigree of data, including information such as its origin and key events that affect it over the course… (more)

Subjects/Keywords: Collaboration; Data provenance; Ontology; Wikipedia

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, J. (2011). W7 MODEL OF PROVENANCE AND ITS USE IN THE CONTEXT OF WIKIPEDIA . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/145314

Chicago Manual of Style (16th Edition):

Liu, Jun. “W7 MODEL OF PROVENANCE AND ITS USE IN THE CONTEXT OF WIKIPEDIA .” 2011. Doctoral Dissertation, University of Arizona. Accessed December 05, 2020. http://hdl.handle.net/10150/145314.

MLA Handbook (7th Edition):

Liu, Jun. “W7 MODEL OF PROVENANCE AND ITS USE IN THE CONTEXT OF WIKIPEDIA .” 2011. Web. 05 Dec 2020.

Vancouver:

Liu J. W7 MODEL OF PROVENANCE AND ITS USE IN THE CONTEXT OF WIKIPEDIA . [Internet] [Doctoral dissertation]. University of Arizona; 2011. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10150/145314.

Council of Science Editors:

Liu J. W7 MODEL OF PROVENANCE AND ITS USE IN THE CONTEXT OF WIKIPEDIA . [Doctoral Dissertation]. University of Arizona; 2011. Available from: http://hdl.handle.net/10150/145314


University of Arizona

2. Burns, Mary B. Examining Multiple Stages of Protective Behavior of Information System End-Users .

Degree: 2012, University of Arizona

 The adage, "old habits die hard", is especially relevant when humans learn new protective behaviors (i.e., dental flossing, IS security behaviors). The foundation that underlies… (more)

Subjects/Keywords: Phishing; Stage models; Management Information Systems; IS end-users; IS Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Burns, M. B. (2012). Examining Multiple Stages of Protective Behavior of Information System End-Users . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/243094

Chicago Manual of Style (16th Edition):

Burns, Mary B. “Examining Multiple Stages of Protective Behavior of Information System End-Users .” 2012. Doctoral Dissertation, University of Arizona. Accessed December 05, 2020. http://hdl.handle.net/10150/243094.

MLA Handbook (7th Edition):

Burns, Mary B. “Examining Multiple Stages of Protective Behavior of Information System End-Users .” 2012. Web. 05 Dec 2020.

Vancouver:

Burns MB. Examining Multiple Stages of Protective Behavior of Information System End-Users . [Internet] [Doctoral dissertation]. University of Arizona; 2012. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10150/243094.

Council of Science Editors:

Burns MB. Examining Multiple Stages of Protective Behavior of Information System End-Users . [Doctoral Dissertation]. University of Arizona; 2012. Available from: http://hdl.handle.net/10150/243094


University of Arizona

3. Chen, Yi-Da. The Dynamics of Task-related Discussion in the Pursuit of Radical Innovation: Innovation Project Teams as Interpretation Systems .

Degree: 2013, University of Arizona

 As global competition is increasingly intensified, radical innovation has become more and more important for corporations in high-velocity industries. Thanks to the advances of information… (more)

Subjects/Keywords: Communication Media; Information Systems; Innovation project team; Interpretation Systems; Radical innovation; Management Information Systems; Collaboration Dynamics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2013). The Dynamics of Task-related Discussion in the Pursuit of Radical Innovation: Innovation Project Teams as Interpretation Systems . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/311106

Chicago Manual of Style (16th Edition):

Chen, Yi-Da. “The Dynamics of Task-related Discussion in the Pursuit of Radical Innovation: Innovation Project Teams as Interpretation Systems .” 2013. Doctoral Dissertation, University of Arizona. Accessed December 05, 2020. http://hdl.handle.net/10150/311106.

MLA Handbook (7th Edition):

Chen, Yi-Da. “The Dynamics of Task-related Discussion in the Pursuit of Radical Innovation: Innovation Project Teams as Interpretation Systems .” 2013. Web. 05 Dec 2020.

Vancouver:

Chen Y. The Dynamics of Task-related Discussion in the Pursuit of Radical Innovation: Innovation Project Teams as Interpretation Systems . [Internet] [Doctoral dissertation]. University of Arizona; 2013. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10150/311106.

Council of Science Editors:

Chen Y. The Dynamics of Task-related Discussion in the Pursuit of Radical Innovation: Innovation Project Teams as Interpretation Systems . [Doctoral Dissertation]. University of Arizona; 2013. Available from: http://hdl.handle.net/10150/311106

4. Jenkins, Jeffrey Lyne. Alleviating Insider Threats: Mitigation Strategies and Detection Techniques .

Degree: 2013, University of Arizona

 Insider threats – trusted members of an organization who compromise security – are considered the greatest security threat to organizations. Because of ignorance, negligence, or malicious intent,… (more)

Subjects/Keywords: Information Systems; Insider Threat; Mouse Movements; Passwords; Security; Management; Experiment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jenkins, J. L. (2013). Alleviating Insider Threats: Mitigation Strategies and Detection Techniques . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/297023

Chicago Manual of Style (16th Edition):

Jenkins, Jeffrey Lyne. “Alleviating Insider Threats: Mitigation Strategies and Detection Techniques .” 2013. Doctoral Dissertation, University of Arizona. Accessed December 05, 2020. http://hdl.handle.net/10150/297023.

MLA Handbook (7th Edition):

Jenkins, Jeffrey Lyne. “Alleviating Insider Threats: Mitigation Strategies and Detection Techniques .” 2013. Web. 05 Dec 2020.

Vancouver:

Jenkins JL. Alleviating Insider Threats: Mitigation Strategies and Detection Techniques . [Internet] [Doctoral dissertation]. University of Arizona; 2013. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10150/297023.

Council of Science Editors:

Jenkins JL. Alleviating Insider Threats: Mitigation Strategies and Detection Techniques . [Doctoral Dissertation]. University of Arizona; 2013. Available from: http://hdl.handle.net/10150/297023


University of Arizona

5. Zhang, Yiwen. Channel Preference of Knowledge Sourcing .

Degree: 2008, University of Arizona

 Knowledge is the critical success factor for organizations to compete in the contemporary business world. Organizations that can make full use of their collective expertise… (more)

Subjects/Keywords: channel preference; knowledge sourcing; discussion forums; knowledge repository; face-to-face communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Y. (2008). Channel Preference of Knowledge Sourcing . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/195296

Chicago Manual of Style (16th Edition):

Zhang, Yiwen. “Channel Preference of Knowledge Sourcing .” 2008. Doctoral Dissertation, University of Arizona. Accessed December 05, 2020. http://hdl.handle.net/10150/195296.

MLA Handbook (7th Edition):

Zhang, Yiwen. “Channel Preference of Knowledge Sourcing .” 2008. Web. 05 Dec 2020.

Vancouver:

Zhang Y. Channel Preference of Knowledge Sourcing . [Internet] [Doctoral dissertation]. University of Arizona; 2008. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10150/195296.

Council of Science Editors:

Zhang Y. Channel Preference of Knowledge Sourcing . [Doctoral Dissertation]. University of Arizona; 2008. Available from: http://hdl.handle.net/10150/195296


University of Arizona

6. Song, Theo Sagita. Identity Verification and Conflict in Distributed Teams .

Degree: 2007, University of Arizona

 Previous studies have explored self-verification theory to explain the relationship between self-verification and relationship conflict in collocated teams. This study expanded the application of self-verification… (more)

Subjects/Keywords: Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, T. S. (2007). Identity Verification and Conflict in Distributed Teams . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/194805

Chicago Manual of Style (16th Edition):

Song, Theo Sagita. “Identity Verification and Conflict in Distributed Teams .” 2007. Doctoral Dissertation, University of Arizona. Accessed December 05, 2020. http://hdl.handle.net/10150/194805.

MLA Handbook (7th Edition):

Song, Theo Sagita. “Identity Verification and Conflict in Distributed Teams .” 2007. Web. 05 Dec 2020.

Vancouver:

Song TS. Identity Verification and Conflict in Distributed Teams . [Internet] [Doctoral dissertation]. University of Arizona; 2007. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10150/194805.

Council of Science Editors:

Song TS. Identity Verification and Conflict in Distributed Teams . [Doctoral Dissertation]. University of Arizona; 2007. Available from: http://hdl.handle.net/10150/194805


University of Arizona

7. Currim, Sabah. Towards Improving Conceptual Modeling: An Examination of Common Errors and Their Underlying Reasons .

Degree: 2008, University of Arizona

 Databases are a critical part of Information Technology. Following a rigorous methodology in the database lifecycle ensures the development of an effective and efficient database.… (more)

Subjects/Keywords: conceptual modeling; Bloom's taxonomy; databases; learning; training; ER modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Currim, S. (2008). Towards Improving Conceptual Modeling: An Examination of Common Errors and Their Underlying Reasons . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/195586

Chicago Manual of Style (16th Edition):

Currim, Sabah. “Towards Improving Conceptual Modeling: An Examination of Common Errors and Their Underlying Reasons .” 2008. Doctoral Dissertation, University of Arizona. Accessed December 05, 2020. http://hdl.handle.net/10150/195586.

MLA Handbook (7th Edition):

Currim, Sabah. “Towards Improving Conceptual Modeling: An Examination of Common Errors and Their Underlying Reasons .” 2008. Web. 05 Dec 2020.

Vancouver:

Currim S. Towards Improving Conceptual Modeling: An Examination of Common Errors and Their Underlying Reasons . [Internet] [Doctoral dissertation]. University of Arizona; 2008. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10150/195586.

Council of Science Editors:

Currim S. Towards Improving Conceptual Modeling: An Examination of Common Errors and Their Underlying Reasons . [Doctoral Dissertation]. University of Arizona; 2008. Available from: http://hdl.handle.net/10150/195586


University of Arizona

8. Velasquez, Nicole Forsgren. An Examination of Work Practices and Tool Use in High Risk Environments .

Degree: 2008, University of Arizona

 This research presents an in-depth investigation and description of a single user group, system administrators. Following an overview of these computing professionals and their complex,… (more)

Subjects/Keywords: work practice; system administrator; user satisfaction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Velasquez, N. F. (2008). An Examination of Work Practices and Tool Use in High Risk Environments . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/195045

Chicago Manual of Style (16th Edition):

Velasquez, Nicole Forsgren. “An Examination of Work Practices and Tool Use in High Risk Environments .” 2008. Doctoral Dissertation, University of Arizona. Accessed December 05, 2020. http://hdl.handle.net/10150/195045.

MLA Handbook (7th Edition):

Velasquez, Nicole Forsgren. “An Examination of Work Practices and Tool Use in High Risk Environments .” 2008. Web. 05 Dec 2020.

Vancouver:

Velasquez NF. An Examination of Work Practices and Tool Use in High Risk Environments . [Internet] [Doctoral dissertation]. University of Arizona; 2008. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10150/195045.

Council of Science Editors:

Velasquez NF. An Examination of Work Practices and Tool Use in High Risk Environments . [Doctoral Dissertation]. University of Arizona; 2008. Available from: http://hdl.handle.net/10150/195045

.