952 resultados para 280107 Global Information Systems


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we consider an information system (IS) to be a set of technologies together with a set of rules about those technologies. An IS is considered to be prone to a privacy incident if it does not fully protect the private information of a user or if a dishonest user can take advantage of the privacy protection offered by the IS. This work identifies the potential privacy incidents that may occur in an IS, and proposes a framework, the MAPI Framework (Manage or Avoid Privacy Incidents), which designs IS to manage or avoid privacy incidents. The MAPI Framework can also be used for evaluating IS by identifying the missing or inappropriate technologies which may lead to privacy incidents.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While the important role of family carers has been increasingly recognized in healthcare service provision, particularly for patients with acute or chronic illnesses, the family carer's information needs have not been well understood or adequately supported by health information systems. In this study, we explore the information needs of a family carer by analyzing the extensive online diary of a Vietnamese family carer supporting his wife, who was a lung cancer patient. The study provides a deep understanding of the information needs of the family carer and suggests a four-stage information journey model including identification, searching, interpretation and information sharing, and collaboration. A number of themes emerge from the study including the key role of the carer, information filtering by the carer, information sharing and collaboration, and the influence of Vietnamese culture. The paper concludes with a discussion of the requirements for health information systems that meet the needs of family carers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The objectives of this study were to investigate the degree to which hospital information systems are aligned with hospital strategies and how they impact on nurses. Semi-structured interviews were conducted with nine hospital staff from a range of disciplines in a large public hospital in Australia. The interviews revealed that the focus of hospital information systems on administration has meant that applications to support the patient's clinical journey have been deemed unaffordable. A consequence is that the historic use of the nurses' station as a source of verbal information about patients has continued, with negative impacts on nurses' perceived role and status, and the possible exacerbation of the clash between administrative and clinical cultures. We conclude that hospitals need clear strategies, with alignment of information systems. To do otherwise can undermine culture and morale, while disrupting workflows and patients' clinical journeys.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Urban expansion is a principal process threatening biodiversity globally. It is predicted that over half of the world's population will reside in urban centres by 2010. If we are to conserve biodiversity, a shift in perspective from traditional ecological studies based in natural environments, to studies based in less natural environments is paramount. To effectively conserve species which occur in urban environments, comprehensive analysis is necessary to determine the processes that are driving this urban usage. Geographical Information Systems (GIS) technology provides a valuable tool for efficient spatial analysis and predictive mapping of species distributions.

This study used GIS to analyze current breeding sites for the powerful owl, a vulnerable top order predator in urban Melbourne, Australia. GIS analysis suggests that a number of ecological attributes were influencing powerful owl usage of urban environments. Using these ecological attributes, predictive mapping was undertaken, which identified a number of potential breeding sites for powerful owls within urbanized Melbourne.

Urban environments are traditionally perceived as “the wastelands” of natural environments, however, this study demonstrates that they have the potential to support apex predators, an important finding for the management of rare and threatened species.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

When referring to the value that IS adds to business and provides to consumers, we often (implicitly or explicitly) pertain to monetary value. However, perspectives exist regarding the notion of value which go beyond the monetary significance and maintain a direct influence on businesses and their performance. This paper explores the concept of value, its importance in IS, and the importance of understanding of how IS stakeholders perceive value. The paper focuses on the challenge of studying value in IS -although value manifests in properties of an information system, it can only be experienced and perceived subjectively through sense perception, experience and judgement of the system stakeholders. To address this challenge, the paper suggests the existence of a clearly shifting trend in the perception of IS technology and comments on the social impacts of end-users (consumers) being absorbed into the value-creation process for an information system in the music industry.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Previous work, in the area of defense systems has focused on developing a firewall like structure, in order to protect applications from attacks. The major drawback for implementing security in general, is that it affects the performance of the application they are trying to protect. In fact, most developers avoid implementing security at all. With the coming of new multicore systems, we might at last be able to minimize the performance issues that security places on applications. In our bodyguard framework we propose a new kind of defense that acts alongside, not in front, of applications. This means that performance issues that effect system applications are kept to a minimum, but at the same time still provide high grade security. Our experimental results demonstrate that a ten to fifteen percent speedup in performance is possible, with the potential of greater speedup.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In disciplines other than IS, the use of covariance-based structural equation modelling (SEM) is the mainstream method for SEM analysis, and for confirmatory factor analysis (CFA). Yet a body of IS literature has developed arguing that PLS regression is a superior tool for these analyses, and for establishing reliability and validity. Despite these claims, the views underlying this PLS literature are not universally shared. In this paper the authors review the PLS and mainstream SEM literatures, and describe the key differences between the two classes of tools. The paper also canvasses why PLS regression is rarely used in management, marketing, organizational behaviour, and that branch of psychology concerned with good measurement – psychometrics. The paper offers some practical options to Australasian researchers seeking greater mastery of SEM, and also acts as a roadmap for readers who want to check for themselves what the mainstream SEM literature has to say.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One of the major challenges of MIS activities is the difficulty in measuring the effectiveness of delivered systems. The principal purpose of my research is to explore this field in order to develop an instrument by which to measure such effectiveness. Conceptualisation of Information System (IS) Effectiveness has been substantially framed by DeLone and McLean's (1992) Success; Model. But with the innovation in Information Technology (IT) over the past decade, and the constant pressure in IT to improve performance, there is merit in undertaking a fresh appraisal of the issue. This study built on the model of IS Success developed by DeLone and MeLean, but was broadened to include related research from the domains of IS, Management and Marketing. This analysis found that an effective IS function is built on three pillars: the systems implemented; the information held and delivered by these systems; and, the service provided in support of the IS function. A common foundation for these pillars is the concept of stakeholder needs. In seeking to appreciate the effectiveness: of delivered IS applications in relation to the job performance of stakeholders, this research developed an understanding of what quality means in an IT context I argue that quality is a more useful criterion for effectiveness than the more customary measures of use and user satisfaction. Respecification of the IS Success Model was then proposed. The second phase of the research was to test this model empirically through judgment panels, focus groups and interviews. Results consistently supported the structure and components of the respecified model. Quality was determined as a multi-dimensional construct, with the key dimensions for the quality of delivered IS differing from those used in the research from other disciplines. Empirical work indicated that end-user stakeholders derived their evaluations of quality by internally evaluating perceived performance of delivered IS in relation to their expectations for such performance. A short trial explored whether, when overt measurement of expectations was concurrent with the measurement of perceptions, a more revealing appraisal of delivered IS quality was provided than when perceptions alone were measured. Results revealed a difference between the two measures. Using the New IS Success Model as the foundation, and drawing upon the related theoretical and empirical research, an instrument was developed to measure the quality/effectiveness of delivered IS applications. Four trials of this instrument, QUALIT, are documented. Analysis of results from preliminary trials indicates promise in terms of business value: the instrument is simple to administer and has the capacity to pinpoint areas of weakness. The research related to the respecification of the New IS Success Model and the associated empirical studies, including the development of QTJALIT, have both contributed to the development of theory about IS Effectiveness. More precisely, my research has reviewed the components of an information system, the dimensions comprising these components and the indicators of each, and based upon these findings, formulated an instrument by which to measure the effectiveness of a delivered IS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

ICT has transformed our working lives. The IS discipline has a great deal to contribute to better understand the employee management issues associated with the implementation of new technologies. This paper analyses the IS literature to ascertain the level of research being undertaken in the area of employee management and human resource management. The analysis illustrates that employee management is currently not a key area of research in the mainstream IS discipline. The antecedents as to why there have not been many papers published in this area are many and as yet unstudied. The paper concludes by suggesting future areas of research addressing employee management issues.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Preliminary research into the critical factors associated with software development/implementation identified three dimensions for successful implementation based on alignment of the requirements engineering process with business needs, change management process and quality of the implementation process. Research results demonstrate the link between the conceptual model for process quality and the process management attributes determined during the research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A study of management information system technology suitable for the job shop environment, highlighting deficiencies in generic software with respect to supplying users the information they actually require. To solve this problem a set of flexible interfaces was developed through the use of object-oriented programming. The methods used were simple enough to be adopted by vendors of any generic MIS application.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many organizations still rely on deterrence to control insider threats and on purely preventive strategies to control outsider threats. Such a simple approach to organizational information security is no longer viable given the increasing operational sophistication of current security threat agents and the complexity of information technology infrastructure. Effective implementation of security requires organizations to select a combination of strategies that work in tandem and best suits their security situation. This paper addresses the identification and classification of factors that influence implementation of security strategies in organizations. In this paper, we develop a preliminary architecture that aims to assist organizations in deciding how strategies can be designed to complement each other to improve the cost-effectiveness of security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Similar to many other countries worldwide, Vietnam is facing a challenge of an ageing population. This challenge is even more difficult to overcome because Vietnam is a developing country lacking an established aged care infrastructure and system. Many aspects of aged care have largely been relied on families of aged people due to a strong influence of Confucian philosophy. Looking after aged parents has always been seen as a responsibility and filial piety of children and their extended families. Therefore, providing healthcare for aged people in their family and community context is important. The paper offers a rich description and an analysis of the current situation of the health state of and healthcare for aged people in Vietnam. The paper also suggests directions for integrating information communication technology into aged care in Vietnam.