61 resultados para Technology of the Information
Resumo:
Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
The overall goal of the study was to describe nurses’ acceptance of an Internet-based support system in the care of adolescents with depression. The data were collected in four phases during the period 2006 – 2010 from nurses working in adolescent psychiatric outpatient clinics and from professionals working with adolescents in basic public services. In the first phase, the nurses’ anticipated perceptions of the usefulness of the Internet-based support system before its implementation was explored. In the second phase, the nurses’ perceived ease of computer and Internet use and attitudes toward it were explored. In the third phase, the features of the support system and its implementation process were described. In the fourth phase, the nurses’ experiences of behavioural intention and actual system use of the Internet-based support were described in psychiatric out-patient care after one year use. The Technology Acceptance Model (TAM) was used to structure the various research phases. Several benefits were identified from the nurses’ perspective in using the Internet-based support system in the care of adolescents with depression. The nurses’ technology skills were good and their attitudes towards computer use were positive. The support system was developed in various phases to meet the adolescents’ needs. Before the implementation of the information technology (IT)-based support system, it is important to pay attention to the nurses’ IT-training, technology support, resources, and safety as well as ethical issues related to the support system. After one year of using the system, the nurses perceived the Internet-based support system to be useful in the care of adolescents with depression. The adolescents’ independent work with the support system at home and the program’s systematic character were experienced as conducive from the point of view of the treatment. However, the Internet-based support system was integrated only partly into the nurseadolescent interaction even though the nurses’ perceptions of it were positive. The use of the IT-based system as part of the adolescents’ depression care was seen positively and its benefits were recognized. This serves as a good basis for future IT-based techniques. Successful implementations of IT-based support systems need a systematic implementation plan and commitment from the part of the organization and its managers. Supporting and evaluating the implementation of an IT-based system should pay attention to changing the nurses’ work styles. Health care organizations should be offered more flexible opportunities to utilize IT-based systems in direct patient care in the future.
Resumo:
The future of privacy in the information age is a highly debated topic. In particular, new and emerging technologies such as ICTs and cognitive technologies are seen as threats to privacy. This thesis explores images of the future of privacy among non-experts within the time frame from the present until the year 2050. The aims of the study are to conceptualise privacy as a social and dynamic phenomenon, to understand how privacy is conceptualised among citizens and to analyse ideal-typical images of the future of privacy using the causal layered analysis method. The theoretical background of the thesis combines critical futures studies and critical realism, and the empirical material is drawn from three focus group sessions held in spring 2012 as part of the PRACTIS project. From a critical realist perspective, privacy is conceptualised as a social institution which creates and maintains boundaries between normative circles and preserves the social freedom of individuals. Privacy changes when actors with particular interests engage in technology-enabled practices which challenge current privacy norms. The thesis adopts a position of technological realism as opposed to determinism or neutralism. In the empirical part, the focus group participants are divided into four clusters based on differences in privacy conceptions and perceived threats and solutions. The clusters are fundamentalists, pragmatists, individualists and collectivists. Correspondingly, four ideal-typical images of the future are composed: ‘drift to low privacy’, ‘continuity and benign evolution’, ‘privatised privacy and an uncertain future’, and ‘responsible future or moral decline’. The images are analysed using the four layers of causal layered analysis: litany, system, worldview and myth. Each image has its strengths and weaknesses. The individualistic images tend to be fatalistic in character while the collectivistic images are somewhat utopian. In addition, the images have two common weaknesses: lack of recognition of ongoing developments and simplistic conceptions of privacy based on a dichotomy between the individual and society. The thesis argues for a dialectical understanding of futures as present images of the future and as outcomes of real processes and mechanisms. The first steps in promoting desirable futures are the awareness of privacy as a social institution, the awareness of current images of the future, including their assumptions and weaknesses, and an attitude of responsibility where futures are seen as the consequences of present choices.
Resumo:
There is much enthusiasm about developing eLearning coures in Nigeria, but majority of the eLearning platforms introduced from developed countries to Nigeria hardly resulted in desired outcome. Proposed reasons are lack of infrastructures such as stable electricity, inadequate rate of internet penetration, low bandwidth and low accessibility of undergraduates to sophisticated devices. These seem valid initially, but findings of this study proved otherwise. This study took a deeper evaluation of the scenarios and made viable discoveries which deviate from early findings. First, the former attempts to introduce eLearning for students in Nigeria were implemented with a rural mindset. Secondly, the undergraduate student`s technical readiness were not properly studied, also their technology user acceptance was also not properly checked and the eLearning platforms were not localized. This study conducted interviews among tertiary students at Yaba College of technology and gathered valuable information towards their readiness for eLearning.
Resumo:
Customer knowledge management (CKM) practices enable organizations to create customer competence with systematic use of customer information that is integrated throughout the organization. Nonetheless, organizations are not able to fully exploit the vast amount of data available. Previous research on use of customer information is limited especially in a multichannel environment. The aim of this study was to identify the main obstacles for utilizing customer information efficiently across multiple sales channels. The study was conducted as a single case study in order to gain deeper understanding of the research problem. The empirical findings indicate that lack of CKM practices and a common goal are major challenges obstructing effective utilization of customer information. Furthermore, decentralized organizational structure and insufficient analytical skills create obstacles for information sharing and capabilities to process information and create new knowledge. The implications of the study suggest that in order to create customer competence organizations should shift their focus from technology to the organizational factors affecting use of information and implement CKM practices throughout the organization.
Resumo:
Nowadays global business trends force the adoption of innovative ICTs into the supply chain management (SCM). Particularly, the RFID technology is on high demand among SCM professionals due to its business advantages such as improving of accuracy and veloc-ity of SCM processes which lead to decrease of operational costs. Nevertheless, a question of the RFID technology impact on the efficiency of warehouse processes in the SCM re-mains open. The goal of the present study is to experiment the possibility of improvement order picking velocity in a warehouse of a big logistics company with the use of the RFID technology. In order to achieve this goal the following objectives have been developed: 1) Defining the scope of the RFID technology applications in the SCM; 2) Justification of the RFID technology impact on the SCM processes; 3) Defining a place of the warehouse order picking process in the SCM; 4) Identification and systematization of existing meth-ods of order picking velocity improvement; 5) Choosing of the study object and gathering of the empirical data about number of orders, number of hours spent per each order line daily during 5 months; 6) Processing and analysis of the empirical data; 7) Conclusion about the impact of the RFID technology on the speed of order picking process. As a result of the research it has been found that the speed of the order picking processes has not been changed as time has gone after the RFID adoption. It has been concluded that in order to achieve a positive effect in the speed of order picking process with the use of the RFID technology it is necessary to simultaneously implement changes in logistics and organizational management in 3PL logistics companies. Practical recommendations have been forwarded to the management of the company for further investigation and procedure.
Resumo:
This thesis presents an analysis of recently enacted Russian renewable energy policy based on capacity mechanism. Considering its novelty and poor coverage by academic literature, the aim of the thesis is to analyze capacity mechanism influence on investors’ decision-making process. The current research introduces a number of approaches to investment analysis. Firstly, classical financial model was built with Microsoft Excel® and crisp efficiency indicators such as net present value were determined. Secondly, sensitivity analysis was performed to understand different factors influence on project profitability. Thirdly, Datar-Mathews method was applied that by means of Monte Carlo simulation realized with Matlab Simulink®, disclosed all possible outcomes of investment project and enabled real option thinking. Fourthly, previous analysis was duplicated by fuzzy pay-off method with Microsoft Excel®. Finally, decision-making process under capacity mechanism was illustrated with decision tree. Capacity remuneration paid within 15 years is calculated individually for each RE project as variable annuity that guarantees a particular return on investment adjusted on changes in national interest rates. Analysis results indicate that capacity mechanism creates a real option to invest in renewable energy project by ensuring project profitability regardless of market conditions if project-internal factors are managed properly. The latter includes keeping capital expenditures within set limits, production performance higher than 75% of target indicators, and fulfilling localization requirement, implying producing equipment and services within the country. Occurrence of real option shapes decision-making process in the following way. Initially, investor should define appropriate location for a planned power plant where high production performance can be achieved, and lock in this location in case of competition. After, investor should wait until capital cost limit and localization requirement can be met, after that decision to invest can be made without any risk to project profitability. With respect to technology kind, investment into solar PV power plant is more attractive than into wind or small hydro power, since it has higher weighted net present value and lower standard deviation. However, it does not change decision-making strategy that remains the same for each technology type. Fuzzy pay-method proved its ability to disclose the same patterns of information as Monte Carlo simulation. Being effective in investment analysis under uncertainty and easy in use, it can be recommended as sufficient analytical tool to investors and researchers. Apart from described results, this thesis contributes to the academic literature by detailed description of capacity price calculation for renewable energy that was not available in English before. With respect to methodology novelty, such advanced approaches as Datar-Mathews method and fuzzy pay-off method are applied on the top of investment profitability model that incorporates capacity remuneration calculation as well. Comparison of effects of two different RE supporting schemes, namely Russian capacity mechanism and feed-in premium, contributes to policy comparative studies and exhibits useful inferences for researchers and policymakers. Limitations of this research are simplification of assumptions to country-average level that restricts our ability to analyze renewable energy investment region wise and existing limitation of the studying policy to the wholesale power market that leaves retail markets and remote areas without our attention, taking away medium and small investment into renewable energy from the research focus. Elimination of these limitations would allow creating the full picture of Russian renewable energy investment profile.
Resumo:
Tutkielman aiheena on EU:n kilpailuoikeudellinen lähestymistapa challenge-lausekkeisiin teknologinsiirtosopimuksia koskevassa ryhmäpoikkeusasetuksessa. Teknologian lisensoinnin katsotaan olevan tärkeä väline teknologian kehityksen levittämisessä ja innovaation edistämisessä. Joissakin tapauksissa lisenssisopimus voi sisältää kilpailua rajoittavia lausekkeita, joiden voidaan kuitenkin nähdä hyödyttävän kilpailua kokonaisuutta arvostellen. Tällaisia lausekkeita ovat niin sanotut ”no-challenge” – lauseke, eli sopimusehto, jonka nojalla lisenssinsaaja sitoutuu olemaan haastamatta lisensoidun immateriaalioikeuden pätevyyttä ja ”termination-on-challenge” – lauseke, joka antaa lisensoijalle haastettaessa oikeuden päättää lisenssisopimus. Tutkielmassa perehdytään challenge -lausekkeiden hyväksyttävyyden arviointiin Euroopan unionin kilpailuoikeuden näkökulmasta uuden 1.5.2014 voimaan tulleen ryhmäpoikkeusasetuksen valossa. Muissa kuin yksinoikeuksia luovissa teknologiansiirtosopimuksissa olevat termination-on-challenge – lausekkeita tulee uusimmassa ryhmäpoikkeusetuksessa aina perustua yritysten itse suorittamaan tapauskohtaiseen arviointiin. No-challenge – lausekkeet ovat jatkossakin aiemman käytännön mukaisesti ryhmäpoikkeuksen soveltamisalan ulkopuolella. Komission on perustellut challenge - lausekkeiden jättämistä asetuksen ulkopuolelle julkisella intressillä, joka on päästä eroon mitättömistä immateriaalioikeuksista. Komission on katsonut, että challenge – lausekkeiden kilpailua rajoittava ominaisuus on mitättömien immateriaalioikeuksien esiintyminen markkinoilla, mikä osaltaan vääristää kilpailua ja hidastaa toimijoiden markkinoille pääsyä. Toisaalta lausekkeiden voidaan sanoa edistävän kilpailua, sillä ne usein tarjoavat immateriaalioikeuden haltijalle riittävän oikeussuojan ja kannustimen lisensoida teknologia, mikä lisää kilpailua, keksijöiden kannustimia panostaa innovaatioihin sekä vähentää transaktiokustannuksia. Tutkielman keskeinen tulos on ennen kaikkea challenge-lausekkeiden kilpailuvaikutusten tunnistamisessa ja komission perusteluiden kriittisessä arvioinnissa. Komission linjauksen perustelut eivät saa riittävää tukea ottaen huomioon vaikutustenarvioinnin, EU:n tuomioistuinkäytännön sekä taloustieteellisen lähestymistavan. Tutkielman tulosten pohjalta ja tukeutuen eri oikeuslähteisiin, taloustieteellisiin argumentteihin ja oikeusvertailevaan tutkimukseen, on mahdollista tehdä johtopäätöksiä niistä seikoista ja argumenteista, joilla on merkitystä uuden politiikkalinjauksen kilpailuvaikutuksiin.
Resumo:
In the new age of information technology, big data has grown to be the prominent phenomena. As information technology evolves, organizations have begun to adopt big data and apply it as a tool throughout their decision-making processes. Research on big data has grown in the past years however mainly from a technical stance and there is a void in business related cases. This thesis fills the gap in the research by addressing big data challenges and failure cases. The Technology-Organization-Environment framework was applied to carry out a literature review on trends in Business Intelligence and Knowledge management information system failures. A review of extant literature was carried out using a collection of leading information system journals. Academic papers and articles on big data, Business Intelligence, Decision Support Systems, and Knowledge Management systems were studied from both failure and success aspects in order to build a model for big data failure. I continue and delineate the contribution of the Information System failure literature as it is the principal dynamics behind technology-organization-environment framework. The gathered literature was then categorised and a failure model was developed from the identified critical failure points. The failure constructs were further categorized, defined, and tabulated into a contextual diagram. The developed model and table were designed to act as comprehensive starting point and as general guidance for academics, CIOs or other system stakeholders to facilitate decision-making in big data adoption process by measuring the effect of technological, organizational, and environmental variables with perceived benefits, dissatisfaction and discontinued use.
Resumo:
In the new age of information technology, big data has grown to be the prominent phenomena. As information technology evolves, organizations have begun to adopt big data and apply it as a tool throughout their decision-making processes. Research on big data has grown in the past years however mainly from a technical stance and there is a void in business related cases. This thesis fills the gap in the research by addressing big data challenges and failure cases. The Technology-Organization-Environment framework was applied to carry out a literature review on trends in Business Intelligence and Knowledge management information system failures. A review of extant literature was carried out using a collection of leading information system journals. Academic papers and articles on big data, Business Intelligence, Decision Support Systems, and Knowledge Management systems were studied from both failure and success aspects in order to build a model for big data failure. I continue and delineate the contribution of the Information System failure literature as it is the principal dynamics behind technology-organization-environment framework. The gathered literature was then categorised and a failure model was developed from the identified critical failure points. The failure constructs were further categorized, defined, and tabulated into a contextual diagram. The developed model and table were designed to act as comprehensive starting point and as general guidance for academics, CIOs or other system stakeholders to facilitate decision-making in big data adoption process by measuring the effect of technological, organizational, and environmental variables with perceived benefits, dissatisfaction and discontinued use.
Datenherrschaft – an Ethically Justified Solution to the Problem of Ownership of Patient Information
Resumo:
Patient information systems are crucial components for the modern healthcare and medicine. It is obvious that without them the healthcare cannot function properly – one can try to imagine how brain surgery could be done without using information systems to gather and show information needed for an operation. Thus, it can be stated that digital information is irremovable part of modern healthcare. However, the legal ownership of patient information lacks a coherent and justified basis. The whole issue itself is actually bypassed by controlling pa- tient information with different laws and regulations how patient information can be used and by whom. Nonetheless, the issue itself – who owns the patient in- formation – is commonly missed or bypassed. This dissertation show the problems if the legislation of patient information ownership is not clear. Without clear legislation, the outcome can be unexpected like it seems to be in Finland, Sweden and United Kingdom: the lack of clear regulation has come up with unwanted consequences because of problematic Eu- ropean Union database directive implementation in those countries. The legal ownership is actually granted to the creators of databases which contains the pa- tient information, and this is not a desirable situation. In healthcare and medicine, we are dealing with issues such as life, health and information which are very sensitive and in many cases very personal. Thus, this dissertation leans on four philosophical theories form Locke, Kant, Heidegger and Rawls to have an ethically justified basis for regulating the patient infor- mation in a proper way. Because of the problems of property and ownership in the context of information, a new concept is needed and presented to replace the concept of owning, that concept being Datenherrschaft (eng. mastery over in- formation). Datenherrschaft seems to be suitable for regulating patient infor- mation because its core is the protection of one’s right over information and this aligns with the work of the philosophers whose theories are used in the work. The philosophical argumentation of this study shows that Datenherrschaft granted to the patients is ethically acceptable. It supports the view that patient should be controlling the patient information about themselves unless there are such specific circumstance that justifies the authorities to use patient information to protect other people’s basic rights. Thus, if the patients would be legally grant- ed Datenherrschaft over patient information we would endorse patients as indi- viduals who have their own and personal experience of their own life and have a strong stance against any unjustified paternalism in healthcare. Keywords: patient information, ownership, Datenherrschaft, ethics, Locke, Kant, Heidegger, Rawls
Resumo:
The Finnish legislation requires for a safe and secure learning environment. However, the comprehensive, risk based safety and security management (SSM) and the management commitment in the implementation and development of the SSM are not mentioned in the legislation. Multiple institutions, operators and researchers have studied and developed safety and security in educational institutions over the past decade. Typically the approach has been fragmented and without bringing up the importance of the comprehensive SSM. The development needs of the safety and security operations in universities have been studied. However, in universities of applied sciences (UASs) and in elementary schools (ESs), the performance level, strengths and weaknesses of the comprehensive SSM have not been studied. The objective of this study was to develop the comprehensive, risk based SSM of educational institutions by developing the new Asteri consultative auditing process and study its effects on auditees. Furthermore, the performance level in the comprehensive SSM in UASs and ESs were studied using Asteri and the TUTOR model developed by the Keski-Uusimaa Department for Rescue Services. In addition, strengths, development needs and differences were identified. In total, 76 educational institutions were audited between the years 2011 and 2014. The study is based on logical empiricism, and an observational applied research design was used. Auditing, observation and an electronic survey were used for data collection. Statistical analysis was used to analyze the collected information. In addition, thematic analysis was used to analyze the development areas of the organizations mentioned by the respondents in the survey. As one of the main contributions, this research presents the new Asteri consultative auditing process. Organizations with low performance levels on the audited subject benefit the most from the Asteri consultative auditing process. Asteri may be usable in many different types of audits, not only in SSM audits. As a new result, this study provides new knowledge on attitudes related to auditing. According to the research findings, auditing may generate negative attitudes and the auditor should take them into account when planning and preparing for audits. Negative attitudes can be compensated by producing added value, objectivity and positivity for the audit and, thus, improve the positive effects of auditing on knowledge and skills. Moreover, as the results of this study shows, auditing safety and security issues do not increase feelings of insecurity, but rather increase feelings of safety and security when using the new Asteri consultative auditing process with the TUTOR model. The results showed that the SSM in the audited UASs was statistically significantly more advanced than that in the audited ESs. However, there is still room for improvement in the ESs and the UASs as the approach to the SSM was fragmented. It can be assumed that the majority of Finnish UASs and ESs do not likely meet the basic level of the comprehensive, risk based the SSM.