857 resultados para Information Technology Adoption
Resumo:
Government call centers (311) were first created to reduce the volume of non-emergency calls that were being placed to emergency 911 call centers. The number of 311 call centers increased from 57 in 2008 to about 300 in 2013. Considering that there are over 2,700 municipal government units across the United States, the adoption rate of the 311 centers is arguably low in the country. This dissertation is an examination of the adoption of 311 call centers by municipal governments. My focus is specifically on why municipal governments adopt 311 and identifying which barriers result in the non-adoption of 311 call centers. This dissertation is possibly the first study to examine the adoption of 311 call centers in the United States. The dissertation study has identified several significant factors in the adoption and non-adoption of 311 government call centers. The following factors were significant in the adoption of 311 government call centers: managerial support, financial constraints, organizational responsiveness, strategic plan placement, and technology champion. The following factors were significant barriers that resulted in the non-adoption of a 311 government call center; no demand from citizens, start up costs, annual operating costs, unavailability of funding, and no obvious need for one.If local government entities that do not have a 311 government call center decide to adopt one, this study will help them identify the conditions that need to be in place for successful adoption to occur. Local government officials would first need to address the barriers in setting up the 311 call centers.
Resumo:
A gulf has tended to develop between the adoption and usage of information technology by different generations, at the heart of which is different ways of experiencing and relating to the world around us. This research idea is currently being developed following data collection and feedback is sought on ways forward to enable impact. The research focuses on information technology in the form of multimedia. Multimedia meaning ‘media’ and ‘content’ that uses a combination of different content forms; or electronically integrated communication engaging all or most of the senses (e.g. graphic art, sound, animation and full-motion video presented by way of computer or other electronic means) mainly through presentational technologies. Although multimedia is not new, some organization’s particularly those in the non-profit sector do not always have the technical or financial resources to support such systems and consequently may struggle to adopt and support its usage amongst different generations. However non-profit organizations are being forced to pay more attention to the way they communicate with markets and the public due to the professionalism of communication everywhere in society. The case study used for this study is a church circuit comprising of 15 churches in the Midlands region of the United Kingdom which was selected due to the diverse age groups catered for within this type of non-profit organization. Participants in the study also had a range of skills, experiences and backgrounds which adds to the diversity of the population studied. Data gathered focused on the attitudes and opinions of the adoption and use of multimedia amongst different age groups. 395 questionnaires were distributed, comprising of 11 opinion questions and 4 demographic questions. 83% of the questionnaires were returned, representing 35% of the total circuit membership. Three people from each of the following age categories were also interviewed: 1920 – 1946 (Matures); 1947-1964 (Baby Boomers); 1965-1982 (Generation X); 1983-2004 (Net Generation). Results of the questionnaire and comments from the interviews were found not to tally with the widespread assumption that the younger generation is attracted by the use of multimedia in comparison to the older generation. The highest proportion of those who said that they gain more from a service enhanced by multimedia was from the Baby Boomers. Comments from interviews suggested that: ‘we need to embrace multimedia if we are to attract and retain the younger generation’; ‘multimedia often helps children to remain focused and clarifies the objective of the service’. However, because the younger generations’ world tends to be dominated by computer technology the questionnaire showed that they are more likely to have higher standards when it comes to the use of multimedia, such as identifying higher levels of equipment failing to work and annoying use of sounds compared to older age groups. In comparison problems experienced with multimedia for the Matures age group had the highest percentage of difficulty with the size of letters; the colour of letters and background and the sound not loud enough which is to be expected. Since every organization is unique any type of multimedia adopted and used should be specific to their needs, its stakeholders and the physical building in order to enhance that uniqueness and its needs. Giving thought to whether the type of multimedia is the best method for communicating the message to the particular audience alongside how technical and financial resources are best used can assist in accommodating different age groups that need to be catered for.
Resumo:
With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT management. At least since reports about privacy and security breaches, fraudulent accounting practices, and attacks on IT systems appeared in public, organizations have recognized their responsibilities to safeguard physical and information assets. Security standards can be used as guideline or framework to develop and maintain an adequate information security management system (ISMS). The standards ISO/IEC 27000, 27001 and 27002 are international standards that are receiving growing recognition and adoption. They are referred to as “common language of organizations around the world” for information security. With ISO/IEC 27001 companies can have their ISMS certified by a third-party organization and thus show their customers evidence of their security measures.
Resumo:
The main purpose of this paper is to propose and test a model to assess the degree of conditions favorability in the adoption of agile methods to develop software where traditional methods predominate. In order to achieve this aim, a survey was applied on software developers of a Brazilian public retail bank. Two different statistical techniques were used in order to assess the quantitative data from the closed questions in the survey. The first, exploratory factorial analysis validated the structure of perspectives related to the agile model of the proposed assessment. The second, frequency distribution analysis to categorize the answers. Qualitative data from the survey opened question were analyzed with the technique of qualitative thematic content analysis. As a result, the paper proposes a model to assess the degree of favorability conditions in the adoption of Agile practices within the context of the proposed study.
Resumo:
This dissertation consists of three standalone articles that contribute to the economics literature concerning technology adoption, information diffusion, and network economics in one way or another, using a couple of primary data sources from Ethiopia. The first empirical paper identifies the main behavioral factors affecting the adoption of brand new (radical) and upgraded (incremental) bioenergy innovations in Ethiopia. The results highlight the importance of targeting different instruments to increase the adoption rate of the two types of innovations. The second and the third empirical papers of this thesis, use primary data collected from 3,693 high school students in Ethiopia, and shed light on how we should select informants to effectively and equitably disseminate new information, mainly concerning environmental issues. There are different well-recognized standard centrality measures that are used to select informants. These standard centrality measures, however, are based on the network topology---shaped only by the number of connections---and fail to incorporate the intrinsic motivations of the informants. This thesis introduces an augmented centrality measure (ACM) by modifying the eigenvector centrality measure through weighting the adjacency matrix with the altruism levels of connected nodes. The results from the two papers suggest that targeting informants based on network position and behavioral attributes ensures more effective and equitable (gender perspective) transmission of information in social networks than selecting informants on network centrality measures alone. Notably, when the information is concerned with environmental issues.
Resumo:
The text describes a study about the adoption of virtual learning environments and its consequences to the learning process of undergraduate students at the State University of Campinas - Unicamp. These environments can be incorporated in various ways into the academic daily life of students and teachers. One efficient way to promote the adoption of these environments, as observed by the Distance Learning support team, is to train teachers and students in their use. Two training alternatives are described in this text to instruct the academic community in the use of TelEduc, a freeware developed and coordinated by the NIED - Núcleo de Informática Aplicada à Educação (Center for Information Technology Applied to Education), and officially adopted by Unicamp. Training courses are offered in two ways - presence or distance learning - to suit each teacher's preferences. This article compares the two modes of training, showing their strong and weak points. The adoption of TelEduc and its direct consequences to the learning process are described in a study carried out with some engineering undergraduates at Unicamp. The authors' questions and the general views of teachers and students regarding the effectiveness of the use of TelEduc as a supporting tool to presence teaching are presented. This investigation revealed the importance of training teachers in the effective use of these environments.
Resumo:
This article evaluates social implications of the ""SIGA"" Health Care Information System (HIS) in a public health care organization in the city of Sao Paulo. The evaluation was performed by means of an in-depth case study with patients and staff of a public health care organization, using qualitative and quantitative data. On the one hand, the system had consequences perceived as positive such as improved convenience and democratization of specialized treatment for patients and improvements in work organization. On the other hand, negative outcomes were reported, like difficulties faced by employees due to little familiarity with IT and an increase in the time needed to schedule appointments. Results show the ambiguity of the implications of HIS in developing countries, emphasizing the need for a more nuanced view of the evaluation of failures and successes and the importance of social contextual factors.
Resumo:
The purpose is to present a scientific research that led to the modeling of an information system which aimed at the maintenance of traceability data in the Brazilian wine industry, according to the principles of a service-oriented architecture (SOA). Since 2005, traceability data maintenance is an obligation for all producers that intend to export to any European Union country. Also, final customers, including the Brazilian ones, have been asking for information about food products. A solution that collectively contemplated the industry was sought in order to permit that producer consortiums of associations could share the costs and benefits of such a solution. Following an extensive bibliographic review, a series of interviews conducted with Brazilian researchers and wine producers in Bento Goncalves - RS, Brazil, elucidated many aspects associated with the wine production process. Information technology issues related to the theme were also researched. The software was modeled with the Unified Modeling Language (UML) and uses web services for data exchange. A model for the wine production process was also proposed. A functional prototype showed that the adopted model is able to fulfill the demands of wine producers. The good results obtained lead us to consider the use of this model in other domains.
Resumo:
The increasing adoption of information systems in healthcare has led to a scenario where patient information security is more and more being regarded as a critical issue. Allowing patient information to be in jeopardy may lead to irreparable damage, physically, morally, and socially to the patient, potentially shaking the credibility of the healthcare institution. Medical images play a crucial role in such context, given their importance in diagnosis, treatment, and research. Therefore, it is vital to take measures in order to prevent tampering and determine their provenance. This demands adoption of security mechanisms to assure information integrity and authenticity. There are a number of works done in this field, based on two major approaches: use of metadata and use of watermarking. However, there still are limitations for both approaches that must be properly addressed. This paper presents a new method using cryptographic means to improve trustworthiness of medical images, providing a stronger link between the image and the information on its integrity and authenticity, without compromising image quality to the end user. Use of Digital Imaging and Communications in Medicine structures is also an advantage for ease of development and deployment.
Resumo:
We are currently in the midst of a second quantum revolution. The first quantum revolution gave us new rules that govern physical reality. The second quantum revolution will take these rules and use them to develop new technologies. In this review we discuss the principles upon which quantum technology is based and the tools required to develop it. We discuss a number of examples of research programs that could deliver quantum technologies in coming decades including: quantum information technology, quantum electromechanical systems, coherent quantum electronics, quantum optics and coherent matter technology.
Resumo:
Purpose - The purpose of this paper is to provide a framework for radio frequency identification (RFID) technology adoption considering company size and five dimensions of analysis: RFID applications, expected benefits business drivers or motivations barriers and inhibitors, and organizational factors. Design/methodology/approach - A framework for RFID adoption derived from literature and the practical experience on the subject is developed. This framework provides a conceptual basis for analyzing a survey conducted with 114 companies in Brazil. Findings - Many companies have been developing RFID initiatives in order to identify potential applications and map benefits associated with their implementation. The survey highlights the importance business drivers in the RFID implementation stage, and that companies implement RFID focusing on a few specific applications. However, there is a weak association between expected benefits and business challenges with the current level of RFID technology adoption in Brazil. Research limitations/implications - The paper is not exhaustive, since RFID adoption in Brazil is at early stages during the survey timeline. Originality/value - The main contribution of the paper is that it yields a framework for analyzing RFID technology adoption. The authors use this framework to analyze RFID adoption in Brazil, which proved to be a useful one for identifying key issues for technology adoption. The paper is useful to any researchers or practitioners who are focused on technology adoption, in particular, RFID technology.
Resumo:
This paper uses a unique new data set on manufacturing firms in Brazil and India to estimate production functions, augmented by information and communications technology (ICT). We find a strong positive association between ICT capital and productivity in both countries that is robust to several different specification tests. The paper also breaks new ground when using the Indian data to investigate the effect of the institutional and policy environment on ICT capital investment and productivity. We find that poorer infrastructure quality and labor market policy are associated with lower levels of ICT adoption, while poorer infrastructure is also associated with lower returns to investment.
Resumo:
This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background.
Resumo:
With the purpose of at lowering costs and reendering the demanded information available to users with no access to the internet, service companies have adopted automated interaction technologies in their call centers, which may or may not meet the expectations of users. Based on different areas of knowledge (man-machine interaction, consumer behavior and use of IT) 13 propositions are raised and a research is carried out in three parts: focus group, field study with users and interviews with experts. Eleven automated service characteristics which support the explanation for user satisfaction are listed, a preferences model is proposed and evidence in favor or against each of the 13 propositions is brought in. With balance scorecard concepts, a managerial assessment model is proposed for the use of automated call center technology. In future works, the propositions may become verifiable hypotheses through conclusive empirical research.
Resumo:
This article evaluates social implications of the "SIGA" Health Care Information System (HIS) in a public health care organization in the city of São Paulo. The evaluation was performed by means of an in-depth case study with patients and staff of a public health care organization, using qualitative and quantitative data. On the one hand, the system had consequences perceived as positive such as improved convenience and democratization of specialized treatment for patients and improvements in work organization. On the other hand, negative outcomes were reported, like difficulties faced by employees due to little familiarity with IT and an increase in the time needed to schedule appointments. Results show the ambiguity of the implications of HIS in developing countries, emphasizing the need for a more nuanced view of the evaluation of failures and successes and the importance of social contextual factors.