113 resultados para Academic management information system
Resumo:
This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.
Resumo:
As technology has developed it has increased the number of data produced and collected from business environment. Over 80% of that data includes some sort of reference to geographical location. Individuals have used that information by utilizing Google Maps or different GPS devices, however such information has remained unexploited in business. This thesis will study the use and utilization of geographically referenced data in capital-intensive business by first providing theoretical insight into how data and data-driven management enables and enhances the business and how especially geographically referenced data adds value to the company and then examining empirical case evidence how geographical information can truly be exploited in capital-intensive business and what are the value adding elements of geographical information to the business. The study contains semi-structured interviews that are used to scan attitudes and beliefs of an organization towards the geographic information and to discover fields of applications for the use of geographic information system within the case company. Additionally geographical data is tested in order to illustrate how the data could be used in practice. Finally the outcome of the thesis provides understanding from which elements the added value of geographical information in business is consisted of and how such data can be utilized in the case company and in capital-intensive business.
Resumo:
The target of this thesis is to evaluate a bid, project and resource management IT tool for service delivery process via proof-of-concept (POC) project to assess, if the tested software is an appropriate tool for the Case Company’s business requirements. Literature suggests that IT projects implementation is still a grey area in scientific research. Also, IT projects have a notably high rate of failure, one significant reason for this being insufficient planning. To tackle this risk, the Case Company decided to perform a POC project, which involved a hands-on testing period of the assessed system. End users from the business side feel that current, highly tailored project management tool is inflexible, difficult to use, and sets unnecessary limitations for the business. Semi-structured interviews and a survey form are used to collect information about current business practices and business requirements related to the IT tool. For the POC project, a project group involving members from each of the Case Company’s four business divisions was established to perform the hands-on testing. Based on data acquired during the interviews and the hands-on testing period, a target state was defined and a gap analysis was carried out by comparing the features provided by the current tool and the tested tool to the target state, which are, together with the current state description, the most important result of the thesis.
Resumo:
Several companies are trying to improve their operation efficiency by implementing an enterprise resource planning (ERP) system that makes it possible to control the resources of the company in real time. However, the success of the implementation project is not a foregone conclusion; a significant part of these projects end in a failure, one way or another. Therefore it is important to investigate ERP system implementation more closely in order to increase understanding about factors influencing ERP system success and to improve the probability of a successful ERP implementation project. Consequently, this study was initiated because a manufacturing case company wanted to review the success of their ERP implementation project. To be exact, the case company hoped to gain both information about the success of the project and insight for future implementation improvement. This study investigated ERP success specifically by examining factors that influence ERP key-user satisfaction. User satisfaction is one of the most commonly applied indicators of information system success. The research data was mainly collected by conducting theme interviews. The subjects of the interviews were six key-users of the newly implemented ERP system. The interviewees were closely involved in the implementation project. Furthermore, they act as representative users that utilize the new system in everyday business processes. The collected data was analyzed by thematizing. Both data collection and analysis were guided by a theoretical frame of reference. This frame was based on previous research on the subject. The results of the study aligned with the theoretical framework to large extent. The four principal factors influencing key-user satisfaction were change management, contractor service, key-user’s system knowledge and characteristics of the ERP product itself. One of the most significant contributions of the research is that it confirmed the existence of a connection between change management and ERP key-user satisfaction. Furthermore, it discovered two new sub-factors influencing contractor service related key-user satisfaction. In addition, the research findings indicated that in order to improve the current level of key-user satisfaction, the case company should pay special attention to system functionality improvement and enhancement of the key-users’ knowledge. During similar implementation projects in the future, it would be important to assure the success of change management and contractor service related processes.
Resumo:
Julkinen terveydenhuolto on muutoksen ja monien haasteiden edessä, kun palveluiden kysyntä ja laatuvaatimukset kasvavat. Julkisen sektorin taloudellinen tilanne aiheuttaa paineita kustannusten pienentämiseksi ja toimintojen keskittämiseen. Muutoksista huolimatta terveydenhuollon henkilökunnalla tulee olla mahdollisimman helppo ja nopea pääsy potilasta koskeviin ajantasaisiin ja olennaisiin tietoihin. Tämä diplomityö tarkastelee tietojärjestelmän käyttöönottoprosessia, paperisten potilasasiakirjojen digitalisointia ja niiden hyödyntämistä hoitoprosessissa. Tutkimuksessa esitellään paperilähetteiden käsittely, skannausratkaisun käyttöönotto ja integrointi HUS:n XDS-yleisarkistoon. Tutkimuksen teoreettinen viitekehys koostuu käyttöönottoprosessista ja siihen liittyvistä haasteista, onnistumiseen vaikuttavista tekijöistä sekä onnistumiseen mittaamiseen käytettävissä olevista malleista ja mittareista. Tietojärjestelmän käyttöönoton onnistumiseen vaikutti erityisesti ennakkosuunnittelu ja muutosvastarinnan ymmärtäminen. Tietojärjestelmän käyttöönotossa havaittiin, että muutos hyväksytään käyttäjien osalta, kun se vastaa käyttäjien todelliseen tarpeeseen. Erityisesti lähetteiden käsittely sähköisessä muodossa koettiin hyödylliseksi ja tarpeelliseksi, koska tämä mahdollisti potilastietojen saatavuuden paikasta ja ajasta riippumatta ja tuki potilaan hoitoprosessia. Käyttöönotossa havaittiin, että skannausprosessi ei voi olla samanlainen kaikkialla, koska eri yksiköissä tapahtuva skannaus voi olla potilaskeskeistä tai asiakirjatyyppien mukaan tai kompeksista ja suuriin määriin perustuvaa.
Resumo:
Uuden tietojärjestelmän hankinta on paitsi tekninen myös sosiaalinen muutos. Tieteelliset teoriat sekä tutkimukset osoittavat, että uuden tietojärjestelmän onnistunut käyttöönotto edellyttää sosioteknistä systeemiajattelua muutoksen läpivientiin. Tämän tutkimuksen tavoitteena oli osallistua yhteiskunnalliseen keskusteluun muutosjohtamisen tärkeydestä otettaessa käyttöön uutta teknologiaa sekä tutkia Case-yrityksen ERP-projektin muutosjohtamisen onnistumista. Tutkimuksen konteksti koostuu sosioteknisestä muutoksesta, jossa muutosjohtaminen nousee keskiöön. Tutkimuksessa kartoitettiin uuden ERP-järjestelmän käyttöönoton onnistumisen kannalta keskeiset muutosjohtamisen elementit: muutostarve, projektitiimi, visio ja tavoitteet, viestintä, koulutus, osallistaminen, sitouttaminen, johdon ja projektiryhmän tuki sekä muutoksen arviointi ja vakiinnuttaminen. Tutkimuksen empiirisessä osassa arvioitiin Case-yrityksen ERP-projektin muutosjohtamista henkilöstön näkökulmasta. Tutkimus toteutettiin laadullisena tapaustutkimuksena, jossa pääasiallisena aineistonkeruumenetelmänä käytettiin sähköistä puolistrukturoitua kyselylomaketta. Tulosten analysoinnin perusteella Case-yrityksen ERP-järjestelmän käyttöönotto sujui tyydyttävästi.
Resumo:
Nyky-yhteiskunta nojautuu vahvasti tietojärjestelmiin luoden laajemman arkkitehtuurisen kokonaisuuden, kybertoimintaympäristön. Liiketoimintaa tukevat tietojärjestelmät tukevat myös organisaatioiden prosesseja kokonaisvaltaisesti. Jotta näitä tärkeitä kyberympäristön tietojärjestelmä- sekä liiketoimintaympäristöresursseja pystytään käyttämään, tulee järjestelmien olla luotettavia ja sovellusten saatavilla vuorokauden ympäri tai aina tarvittaessa. Tilanteet, joissa järjestelmän käytettävyys vaarantuu, voivat eskaloitua yllättäen suuremmiksi, jos poikkeustilanteisiin ei ole varauduttu. Poikkeustilanteisiin varautumiseen tarvitaan jatkuvuudenhallintaa, joka on kiinteästi osa kattavampaa IT-strategiaa ja koko yhteiskunta-/yrityskulttuuria. Työ on toteutettu yhdistäen empiriaa ja teoriaa eli tavoitteena on teoreettisen tietämyksen ja käytännön kokemuksellisen oppimisen ja tietämyksen kautta luoda konstruktiivisella otteella toipumissuunnitelman testauksessa käytettävä simulaatiotestausmalli. Dynamics AX -toiminnanohjausjärjestelmän toipumissuunnitelman simulaatiotestausmallista rakentui selkeä ja kevyt työkalu asiakasyritysten toipumissuunnitelman simulaatiotestauksiin. Diplomityössä kuvatuilla keinotekoisilla järjestelmän häiriötilanteilla pystytään simuloimaan Dynamics AX:n toipumissuunnitelman testauksissa oikeita häiriötilanteita suhteellisen kattavalla tasolla.
Resumo:
Tuija Lehtikunnas: Intensive care patient handover document in support of decision-making in nursing work - Retrospective document analysis for the period 2001–2013 University of Turku, Faculty of Medicine, Nursing Science Annales Universitatis Turkuensis Turku 2016 ABSTRACT The continuity of care and flow of information must be ensured when transferring the responsibility of care, whether this is done within an organisation or from one organisation to another. The purpose of this study was to describe and compare the nursing handover documents of long-term intensive care patients and changes to these documents during the years 2001–2013. Research data comprehended long-term intensive care patient handover documents (N = 250). Data was gathered from one university hospital intensive care unit and subjected to a content analysis of technical implementation, structure and content at five different time points. In addition to this, the nursing handover documents were analysed from a nursing decision-making standpoint. Sub-data (n = 5 x 50) from the years 2001, 2002, 2004, 2006 and 2013 was gathered. The first sub-data was manual, written on paper with a pen. The rest of the sub-data obtained was entered in a dedicated intensive care information system. The study developed an intensive care patient nursing handover document analysis framework, which was used to deductively analyse the research data. The results indicated that the transitioning to electronic records reinforced structure and identification improving the reusability of data was increased. Although intensive care nursing was recorded on nursing handover documents more comprehensively in more recent sub-data, it was done selectively with regard to overall patient care, e.g. there are no entries concerning the psychological support and counselling of patients or family members. Nursing handover documents do not contain a systematic description of the patient's communication and functional capacity at the moment of transfer. The patient's condition at the moment of transfer is not clearly indicated on the handover documents. Plans for follow-up treatment are not recorded at all. Nursing decision-making is difficult to find on the nursing handover documents used as research data. The study developed a handover document model for intensive care nursing that supports nursing decision-making and the continuity of care. Developmental recommendations focus on the management of co-operation within organisations for ensuring the continuity of care and enhancing each area of nursing in recording nursing handover documents by planning nursing for the patient, taking follow-up treatment resources into consideration. Keywords: Intensive care nursing, nursing decision-making, nursing records, information flow, nursing handover document, continuity of care