6 research outputs found

    Digital Strategies to Manage and Transform Maritime Business Operation in Lagos, Nigeria

    Get PDF
    Studies have shown that the maritime sector creates socioeconomic opportunities and contributes significantly to the gross domestic product of Lagos state and Nigeria, but it misses digital opportunities for transformation. A literature gap existed on digital strategies to manage and transform maritime business operations in Lagos. The purpose of this qualitative exploratory multiple case study was to explore digital strategies that business leaders and managers may use to transform maritime business operations in Lagos. The digital business transformation (DBT) concept by Wade and an integrated DBT process concept framed this study. Data from purposefully sampled business leaders and managers in semi-structured interviews, with document review and reflective field notes, were analyzed through content analysis to answer the research question. The findings included the themes of (a) purpose and values of digital strategy inclusion, (b) why integrating digital objectives in the business process, (c) digital strategy as a business management tool, (d) as a transformational tool, (e) digital strategy implementation success factors, (f) DBT barriers, (g) supportive intervention measures, (h) the use of an integrated DBT process, (i) the horizon of digital strategy compliance, and (j) government and stakeholders’ involvement in Lagos’ maritime DBT. Digital strategies in Lagos’ maritime business operations as recommended in this study may influence change in process and management practice for business sustainability in Lagos and better living standards for positive social change

    Portable and Secure Medical Data Management System (semester?), IPRO 304: Portable and Secure Medical Data Management System IPRO 304 Final Report Sp06

    No full text
    The goal of this project is to design software to support the secure use of portable memory as a medium for transferring secure data. Envision yourself carrying around sensitive data (e.g., passwords, account numbers) on a flash drive that: 1. is secure from unauthorized access, and 2. will not attack another machine on installation (e.g., with a virus). A flash drive is initialized to contain user data as well as an application that allows these data to be manipulated in a consistent way by various entities. Depending on the entity, different data are visible and changeable.Deliverables for IPRO 304: Portable and Secure Medical Data Management System for the Fall 2006 semeste

    Portable and Secure Medical Data Management System (semester?), IPRO 304: Portable and Secure Medical Data Management System IPRO 304 IPRO Day Presentation Sp06

    No full text
    The goal of this project is to design software to support the secure use of portable memory as a medium for transferring secure data. Envision yourself carrying around sensitive data (e.g., passwords, account numbers) on a flash drive that: 1. is secure from unauthorized access, and 2. will not attack another machine on installation (e.g., with a virus). A flash drive is initialized to contain user data as well as an application that allows these data to be manipulated in a consistent way by various entities. Depending on the entity, different data are visible and changeable.Deliverables for IPRO 304: Portable and Secure Medical Data Management System for the Fall 2006 semeste

    Portable and Secure Medical Data Management System (semester?), IPRO 304

    No full text
    The goal of this project is to design software to support the secure use of portable memory as a medium for transferring secure data. Envision yourself carrying around sensitive data (e.g., passwords, account numbers) on a flash drive that: 1. is secure from unauthorized access, and 2. will not attack another machine on installation (e.g., with a virus). A flash drive is initialized to contain user data as well as an application that allows these data to be manipulated in a consistent way by various entities. Depending on the entity, different data are visible and changeable.Deliverables for IPRO 304: Portable and Secure Medical Data Management System for the Fall 2006 semeste

    Portable and Secure Medical Data Management System (semester?), IPRO 304: Portable and Secure Medical Data Management System IPRO 304 Abstract Sp06

    No full text
    The goal of this project is to design software to support the secure use of portable memory as a medium for transferring secure data. Envision yourself carrying around sensitive data (e.g., passwords, account numbers) on a flash drive that: 1. is secure from unauthorized access, and 2. will not attack another machine on installation (e.g., with a virus). A flash drive is initialized to contain user data as well as an application that allows these data to be manipulated in a consistent way by various entities. Depending on the entity, different data are visible and changeable.Deliverables for IPRO 304: Portable and Secure Medical Data Management System for the Fall 2006 semeste

    Portable and Secure Medical Data Management System (semester?), IPRO 304: Portable and Secure Medical Data Management System IPRO 304 Poster Sp06

    No full text
    The goal of this project is to design software to support the secure use of portable memory as a medium for transferring secure data. Envision yourself carrying around sensitive data (e.g., passwords, account numbers) on a flash drive that: 1. is secure from unauthorized access, and 2. will not attack another machine on installation (e.g., with a virus). A flash drive is initialized to contain user data as well as an application that allows these data to be manipulated in a consistent way by various entities. Depending on the entity, different data are visible and changeable.Deliverables for IPRO 304: Portable and Secure Medical Data Management System for the Fall 2006 semeste
    corecore