26 resultados para Serviços de informação - Educação de usuários
Resumo:
The electronic mail service is one of the most Internet services that grow in the corporate environment. This evolution is bringing several problems for the organizations, especially to information that circulates inside of the corporate net. The lack of correct orientation to the people, about the usage and the security importance of these resources, is leaving breaches and causing misusage and overuse of service, for example. In recent literature, it starts to coming out several ideas, which has helped to rganizations how to plain and how to implement the information security system to the electronic mail in computer environment. However, these ideas are still not placed in practice in many companies, public or private. This dissertation tries to demonstrate the results of a research that has like goal, identify the importance that user training has over the information security policy, through a case study inside of private superior education institute in this state. Besides, this work had by basic orientation the ISO/IEC 17799, which talk about People Security. This study was developed over a proposed model to this research, which looked for offer conditions to guide the institution studied, how to plan better a information security policy to the electronic mail. Also, this research has an exploratory and descreptive nature and your type, qualitative. Firstly, it was applied na questionary to the information technology manager, as better way to get some general data and to deepen the contact which still then, it was being kept through e-mail. Thereupon this first contact, eleven interviews were done with the same manager, beside one interview with twenty-four users, among employees e students. After that to collect and transcript the interviews, were review with the manager all informations given, to correct any mistakes and to update that informations, to then, start the data analyze. The research suggests that the institution has a pro attitude about the information security policy and the electronic mail usage. However, it was clear that answers have their perception about information security under a very inexperient way, derived of a planning lack in relation to training program capable to solve the problem
Resumo:
The research objective is explore practices to mutual help between CAPS users from the east and west regions of the city of Natal, RN, in Brazil. In the mental health field, we observe the care from substitutive services is based on technical knowledge where the person of the mental health professional is predominant. The Brazilian psychiatry reform invests in equipments and mental health care protocols, but it is necessary to invest more vigorously in new strategies and actors capable of obtaining resources to achieve this goal, such as the users. If one cornerstone of the psychiatric reform consists of changing the type of relationship established with the person with mental disorders, why this relationship, nowadays, is still dominated by technique and unevenness, where on one side we have a person who knows something and who needs take care of someone, and on other side we have another who knows nothing and thus needs to be cared for? Starting from this problematization of the traditional methods of health/mental health care, an attempt was made to investigate in what ways the mutual help practices between people with mental disorders can realize potential avenues not yet explored within the scope of psychiatric reform. The objective of this research was to map possible mutual help practices among the users, and the technical understanding of such practices. For that, we took part in the daily activities of the CAPS, mapping the experiences of mutual help among users. In addition, we accompanied the users in external activities (such as return home, trips, etc), and we had roundtables with the professionals. The research was guided by theoretical methodological references of the institutional analysis. The results pointed to a lack of behaviors of mutual help or support among users, something that can probably be explained by the service work dynamics, as well as the relationship between technicians and users, which has a tendency to create hurdles for meetings among users, as well as being non-conducive to theirempowerment
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Resumo:
This study aims to analyze tourist information provided by the official websites of the 2014 FIFA World Cup host cities. The framework developed by Díaz (2005) was applied to analyze different aspects, such as: local tourist information, tourist services distribution, communication and interaction between website and users, and website foreign language versions. This dissertation describes how society and tourism are related by analyzing the consequences of technological evolution in the travel and tourism sector, showing the importance of the use of information and communication technology to provide accurate, upto- date and low-cost information to tourist destinations. Because of the nature of the study, the research subjects are the 12 Brazilian host cities represented by their respective official webpages (cities, states and convention bureaus), and also Brazil s official website, totalizing 36 elements to be analyzed. The methodology has been characterized as descriptive and exploratory with quantitative analysis, and also using desk research and survey literature review. In order to analyze the data collected, parametric and nonparametric statistics tests were used, such as: variance analysis (ANOVA and KRUSKAL-WALLIS) to measure means variance between groups combined with multiple comparison tests (Tukey and Games Howell); nonparametric correlations tests (Kendall s Tau b); and cluster analyses. Finally, Microsoft Excel was used to collect data and SPSS for managing data through quantitative analyses tests. Overall, the websites of the south region showed better results than the other Brazilian regions. Despite this result, the data analysis demonstrated that the available tourist information are incomplete as it was verified that tourist host cities websites are unable to provide all the information needed for the web visitors to organize and plan their journey. This means that visitors have to look for more information in other sources
Resumo:
The objective of the current piece of research presents was draw up a list of recommendations for the site of the Instituto do Cérebro da Universidade Federal do Rio Grande do Norte, with an emphasis on fault identification in usability and information architecture, through the application of design techniques with users of the institution. From the use of the following techniques: Cardsorting, applied to a group of six people as target public, such as professor, administrative technicians and graduate student of the institution; Interviews, carried out with the director of the Instituto do Cérebro, secretaries of the undergraduate and graduate courses; Cooperative Evaluation applied in two ways: in group and individually. The evaluation in group was fulfilled in four sessions that occurred with a group composed of six people who are part of the technical staff of the Instituto do Cérebro. In the Individual Cooperative Evaluation, eight users (graduate students and administrative technicians of the Instituto do Cérebro da UFRN) performed tasks which are frequently fulfilled by users from the public target in the site of the Instituto do Cérebro. After each session of the Individual Cooperative Evaluation, a questionnaire of the user´s satisfaction was used about his or her perception in regard to the site usability and utility of the mentioned institute site. Therefore, it was concluded that, by means of the analysis of the results and the triangulation of the obtained data in each one of the techniques applied with the users, in the present piece of research, problems were verified, among others; all related to the unsuitable use of the interface elements, navigation, labeling of some menu terms, and still, the lack of search space and integration with the social networks – besides the lack, positioning and inappropriate formatting of information that would be of high relevance to the users. Finally, a list of recommendations is presented and this can be used in a future interface redesign with the goal to improve the information architecture and the usability of the site of the Instituto do Cérebro da Universidade Federal do Rio Grande do Norte.
Resumo:
The information constitutes one of the most valuable strategic assets for the organization. However, the organizational environment in which it is inserted is very complex and heterogeneous, making emerging issues relevant to the Governance of information technology (IT) and Information Security. Academic Studies and market surveys indicate that the origin of most accidents with the information assets is the behavior of people organization itself rather than external attacks. Taking as a basis the promotion of a culture of safety among users and ensuring the protection of information in their properties of confidentiality, integrity and availability, organizations must establish its Information Security Policy (PSI). This policy is to formalise the guidelines in relation to the security of corporate information resources, in order to avoid that the asset vulnerabilities are exploited by threats and can bring negative consequences to the business. But, for the PSI being effective, it is required that the user have readiness to accept and follow the procedures and safety standards. In the light of this context, the present study aims to investigate what are the motivators extrinsic and intrinsic that affect the willingness of the user to be in accordance with the organization's security policies. The theoretical framework addresses issues related to IT Governance, Information Security, Theory of deterrence, Motivation and Behavior Pro-social. It was created a theoretical model based on the studies of Herath and Rao (2009) and D'Arcy, Hovav and Galletta (2009) that are based on General Deterrence Theory and propose the following influencing factors in compliance with the Policy: Severity of Punishment, Certainty of Detection, Peer Behaviour, Normative Beliefs, Perceived Effectiveness and Moral Commitment. The research used a quantitative approach, descriptive. The data were collected through a questionnaire with 18 variables with a Likert scale of five points representing the influencing factors proposed by the theory. The sample was composed of 391 students entering the courses from the Center for Applied Social Sciences of the Universidade Federal do Rio Grande do Norte. For the data analysis, were adopted the techniques of Exploratory Factor Analysis, Analysis of Cluster hierarchical and nonhierarchical, Logistic Regression and Multiple Linear Regression. As main results, it is noteworthy that the factor severity of punishment is what contributes the most to the theoretical model and also influences the division of the sample between users more predisposed and less prone. As practical implication, the research model applied allows organizations to provide users less prone and, with them, to carry out actions of awareness and training directed and write Security Policies more effective.
Resumo:
RAMOS, A. S. M. ; COSTA, F. S. P. R. . Serviços Bancários pela Internet: um estudo de caso integrando a visão de competidores e clientes. RAC. Revista de Administração Contemporânea, Rio de Janeiro - ANPAD, v. 4, n. 3, p. 133-154, 2000.
Resumo:
SANTOS, Raimunda Fernanda dos; SILVA, Eliane Ferreira da. A importância da Arquitetura da Informação no planejamento de ambientes digitais inclusivos.In: SEMINÁRIO DE PESQUISA DO CENTRO DE CIÊNCIAS SOCIAIS APLICADAS,17.,2012,Natal/RN. Anais... Natal/RN: Centro de Ciências Sociais Aplicadas, 2012. Trabalho oral.
Resumo:
A Literatura de Cordel consiste numa forma de conhecimento que produz conteúdos importantes para serem inseridos nos mais diversos contextos educacionais. Através de sua linguagem simples, o cordel versa sobre os mais variados temas, proporcionando uma leitura prazerosa. Assim, o objetivo geral desse trabalho é utilizar-se do cordel, com sua característica lúdica, para educar usuários e funcionários de bibliotecas, promovendo um espaço de formadores de habilidades e competências no uso consciente do acervo. A metodologia constou de abordagem aos alunos durante a visita guiada à Biblioteca Central da Universidade Federal do Rio Grande do Norte, onde são prestadas informações dos serviços oferecidos e da importância do acervo de uma biblioteca na sua vida acadêmica, bem como de sua preservação. Ao final da visita, cada aluno recebe um folheto de cordel contendo informações sobre o uso consciente do acervo, além da recomendação de que após a leitura do cordel, o mesmo seja repassado sucessivamente para outros membros da comunidade, de forma a alcançar uma maior parcela de leitores. Os resultados apontam que o cordel destaca-se como um poderoso instrumento didático-pedagógico e disseminador de informações. Ademais, ele tem a facilidade de alcançar desde os mercados e feiras, que divulgam a ciência e a arte, bem como as tradições populares. Conclui-se que o uso do cordel, numa perspectiva educativa, permite transmitir para os usuários de uma biblioteca, bem como à comunidade em geral, as boas maneiras de utilização dos suportes informacionais.
Resumo:
The Information Technology (IT) is increasing his applicability to business, both private and public companies. It is necessary the adequate use of the new technologies and get cooperation and technology acceptance of the system. People tend to resist to the changes, contributing so that the technology is rejected or even it is not recognized as promoting of the changes. This study is relevant and aim to evaluate the impacts of new technologies, considering their users as fundamental factors in the change process. The survey analyzed the advantages and the barriers of the system use in three federal special judicial of Rio Grande do Norte, with data collected in May of 2007, through the application of questionnaires to thirty eight users of the virtual system CRETA. The users' perception was evaluated, under the optics of five variables: efficiency, image, agility, ease of use and quality. Starting from the obtained results, it was evidenced that the implementation of the system felt accordingly the expected and it reached the objectives intended that were: the velocity and efficiency in the path of the lawsuits, larger productivity, resulting in a better quality of the final work introduced to the citizen and proportionate an improvement in the organizational image of the judiciary power
Resumo:
The change in the economic world and the emergence of Internet as a tool for communication and integration among the markets have forced organizations to adopt a different structure, process-oriented with a focus on information management. Thus, information technology has gained prominence in the organizational context, increasing its complexity and range of services provided by this function. Moreover, outsourcing has become an important model for flexible corporate structure, helping organizations to achieve better results when carrying out their activities and processes and be more competitive. To make the IT outsourcing, it is necessary to follow certain steps that range from strategic assessment to the management of outsourced service. Such steps can influence the form of contracting services, varying the types of service providers and contractors. Thus, the study aimed to identify how this IT outsourcing process influences the use of models for contracting services. For this, a study was conducted in multiple cases study involving two companies in Rio Grande do Norte State, specifically the health sector. Data collection was carried out with the CIOs of the companies surveyed through semi-structured interviews. According to the results obtained, it was found that the outsourcing process more structured influences the use of a more advanced contracting model. However, there are features found in these steps carrying more clearly this influence, as the goals pursued by outsourcing, the criteria used in selecting the supplier, a contract negotiation, how to transition services and the use of methods management, but can vary depending on the level of maturity in the relationship of the companies examined. Moreover, it was found that the use of contracting model may also influence how it is developed the IT outsourcing process, requiring or not its more formalized and organization