778 resultados para bk: Information systems: other
Resumo:
A thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Systems.
Resumo:
The recent technological advancements and market trends are causing an interesting phenomenon towards the convergence of High-Performance Computing (HPC) and Embedded Computing (EC) domains. On one side, new kinds of HPC applications are being required by markets needing huge amounts of information to be processed within a bounded amount of time. On the other side, EC systems are increasingly concerned with providing higher performance in real-time, challenging the performance capabilities of current architectures. The advent of next-generation many-core embedded platforms has the chance of intercepting this converging need for predictable high-performance, allowing HPC and EC applications to be executed on efficient and powerful heterogeneous architectures integrating general-purpose processors with many-core computing fabrics. To this end, it is of paramount importance to develop new techniques for exploiting the massively parallel computation capabilities of such platforms in a predictable way. P-SOCRATES will tackle this important challenge by merging leading research groups from the HPC and EC communities. The time-criticality and parallelisation challenges common to both areas will be addressed by proposing an integrated framework for executing workload-intensive applications with real-time requirements on top of next-generation commercial-off-the-shelf (COTS) platforms based on many-core accelerated architectures. The project will investigate new HPC techniques that fulfil real-time requirements. The main sources of indeterminism will be identified, proposing efficient mapping and scheduling algorithms, along with the associated timing and schedulability analysis, to guarantee the real-time and performance requirements of the applications.
Resumo:
Thesis submitted to the Universidade Nova de Lisboa, Faculdade de Ciências e Tecnologia for the degree of Doctor of Philosophy in Environmental Engineering
Resumo:
Dissertação apresentada como requisito parcial para obtenção do grau de Mestre em Estatística e Gestão de Informação
Resumo:
The processes of mobilization of land for infrastructures of public and private domain are developed according to proper legal frameworks and systematically confronted with the impoverished national situation as regards the cadastral identification and regularization, which leads to big inefficiencies, sometimes with very negative impact to the overall effectiveness. This project report describes Ferbritas Cadastre Information System (FBSIC) project and tools, which in conjunction with other applications, allow managing the entire life-cycle of Land Acquisition and Cadastre, including support to field activities with the integration of information collected in the field, the development of multi-criteria analysis information, monitoring all information in the exploration stage, and the automated generation of outputs. The benefits are evident at the level of operational efficiency, including tools that enable process integration and standardization of procedures, facilitate analysis and quality control and maximize performance in the acquisition, maintenance and management of registration information and expropriation (expropriation projects). Therefore, the implemented system achieves levels of robustness, comprehensiveness, openness, scalability and reliability suitable for a structural platform. The resultant solution, FBSIC, is a fit-for-purpose cadastre information system rooted in the field of railway infrastructures. FBSIC integrating nature of allows: to accomplish present needs and scale to meet future services; to collect, maintain, manage and share all information in one common platform, and transform it into knowledge; to relate with other platforms; to increase accuracy and productivity of business processes related with land property management.
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.
Resumo:
The Institute of Public Health in Ireland is an all-island body which aims to improve health in Ireland by working to combat health inequalities and influence public policies in favour of health. The Institute promotes North-South co-operation in research, training, information and policy. The Institute commends the Department of Health and Children for producing the Discussion Paper on Proposed Health Information Bill (June 2008) and welcomes the opportunity to comment on it. The first objective of the Health Information: A National Strategy (2004) is to support the implementation of Quality and Fairness: A Health System for You (2001).The National Health Goals - such as ‘Better health for everyone’, ‘Fair access’ and ‘Responsive and appropriate care delivery’ - are expressed in terms of the health of the public as well as patients. The Discussion Paper focuses on personal information, and the data flows within the health system, that are needed to enhance medical care and maximise patient safety. The Institute believes that the Health Information Bill should also aim to more fully support the achievement of the National Health Goals and the public health function. This requires the development of more integrated information systems that link the healthcare sector and other sectors. Assessment of health services performance - in terms of the public’s health, health inequalities and achievement of the National Health Goals - require such information systems. They will enable the construction of public health key performance indicators for the healthcare services.
Resumo:
Reliable information is a crucial factor influencing decision-making and, thus, fitness in all animals. A common source of information comes from inadvertent cues produced by the behavior of conspecifics. Here we use a system of experimental evolution with robots foraging in an arena containing a food source to study how communication strategies can evolve to regulate information provided by such cues. The robots could produce information by emitting blue light, which the other robots could perceive with their cameras. Over the first few generations, the robots quickly evolved to successfully locate the food, while emitting light randomly. This behavior resulted in a high intensity of light near food, which provided social information allowing other robots to more rapidly find the food. Because robots were competing for food, they were quickly selected to conceal this information. However, they never completely ceased to produce information. Detailed analyses revealed that this somewhat surprising result was due to the strength of selection on suppressing information declining concomitantly with the reduction in information content. Accordingly, a stable equilibrium with low information and considerable variation in communicative behaviors was attained by mutation selection. Because a similar coevolutionary process should be common in natural systems, this may explain why communicative strategies are so variable in many animal species.
Resumo:
We use subjects actions in modified dictator games to perform a within-subject classification ofindividuals into four different types of interdependent preferences: Selfish, Social Welfaremaximizers, Inequity Averse and Competitive. We elicit beliefs about other subjects actions inthe same modified dictator games to test how much of the existent heterogeneity in others actions is known by subjects. We find that subjects with different interdependent preferences infact have different beliefs about others actions. In particular, Selfish individuals cannotconceive others being non-Selfish while Social Welfare maximizers are closest to the actualdistribution of others actions. We finally provide subjects with information on other subjects actions and re-classify individuals according to their (new) actions in the same modified dictatorgames. We find that social information does not affect Selfish individuals, but that individualswith interdependent preferences are more likely to change their behavior and tend to behavemore selfishly.
Resumo:
This thesis examines coordination of systems development process in a contemporary software producing organization. The thesis consists of a series of empirical studies in which the actions, conceptions and artifacts of practitioners are analyzed using a theory-building case study research approach. The three phases of the thesis provide empirical observations on different aspects of systemsdevelopment. In the first phase is examined the role of architecture in coordination and cost estimation in multi-site environment. The second phase involves two studies on the evolving requirement understanding process and how to measure this process. The third phase summarizes the first two phases and concentrates on the role of methods and how practitioners work with them. All the phases provide evidence that current systems development method approaches are too naïve in looking at the complexity of the real world. In practice, development is influenced by opportunity and other contingent factors. The systems development processis not coordinated using phases and tasks defined in methods providing universal mechanism for managing this process like most of the method approaches assume.Instead, the studies suggest that managing systems development process happens through coordinating development activities using methods as tools. These studies contribute to the systems development methods by emphasizing the support of communication and collaboration between systems development participants. Methods should not describe the development activities and phases in a detail level, butshould include the higher level guidance for practitioners on how to act in different systems development environments.
Resumo:
The management of port-related supply chains is challenging due to the complex and heterogeneous operations of the ports with several actors and processes. That is why the importance of information sharing is emphasised in the ports. However, the information exchange between different port-related actors is often cumbersome and it still involves a lot of manual work and paper. Major ports and port-related actors usually have advanced information systems in daily use but these systems are seldom interoperable with each other, which prevents economies of scale to be reached. Smaller ports and companies might not be equipped with electronic data transmission at all. This is the final report of the Mobile port (MOPO) project, which has sought ways to improve the management and control of port-related sea and inland traffic with the aid of ICT technologies. The project has studied port community systems (PCS) used worldwide, evaluated the suitability of a PCS for the Finnish port operating environment and created a pilot solution of a Finnish PCS in the port of HaminaKotka. Further, the dry port concept and its influences on the transportation system have been explored. The Mobile Port project comprised of several literature reviews, interviews of over 50 port-related logistics and/or ICT professionals, two different kinds of simulation models as well as designing and implementing of the pilot solution of the Finnish PCS. The results of these multiple studies are summarised in this report. Furthermore, recommendations for future actions and the topics for further studies are addressed in the report. The study revealed that the information sharing in a typical Finnish port-related supply chain contains several bottlenecks that cause delays in shipments and waste resources. The study showed that many of these bottlenecks could be solved by building a port community system for the Finnish port community. Almost 30 different kinds of potential services or service entities of a Finnish PCS were found out during the study. The basic requirements, structure, interfaces and operation model of the Finnish PCS were also defined in the study. On the basis of the results of the study, a pilot solution of the Finnish PCS was implemented in the port of HaminaKotka. The pilot solution includes a Portconnect portal for the Finnish port community system (available at https://www.portconnect.fi) and two pilot applications, which are a service for handling the information flows concerning the movements of railway wagons and a service for handling the information flows between Finnish ports and Finland-Russian border. The study also showed that port community systems can be used to improve the environmental aspects of logistics in two different ways: 1) PCSs can bring direct environmental benefits and 2) PCSs can be used as an environmental tool in a port community. On the basis of the study, the development of the Finnish port community system should be continued by surveying other potential applications for the Finnish PCS. It is also important to study if there is need and resources to extend the Finnish PCS to operate in several ports or even on a national level. In the long run, it could be reasonable to clarify whether there would be possibilities to connect the Finnish PCS as a part of Baltic Sea wide, European-wide or even worldwide maritime and port-related network in order to get the best benefit from the system
Resumo:
Fast changing environment sets pressure on firms to share large amount of information with their customers and suppliers. The terms information integration and information sharing are essential for facilitating a smooth flow of information throughout the supply chain, and the terms are used interchangeably in research literature. By integrating and sharing information, firms want to improve their logistics performance. Firms share information with their suppliers and customers by using traditional communication methods (telephone, fax, Email, written and face-to-face contacts) and by using advanced or modern communication methods such as electronic data interchange (EDI), enterprise resource planning (ERP), web-based procurement systems, electronic trading systems and web portals. Adopting new ways of using IT is one important resource for staying competitive on the rapidly changing market (Saeed et al. 2005, 387), and an information system that provides people the information they need for performing their work, will support company performance (Boddy et al. 2005, 26). The purpose of this research has been to test and understand the relationship between information integration with key suppliers and/or customers and a firm’s logistics performance, especially when information technology (IT) and information systems (IS) are used for integrating information. Quantitative and qualitative research methods have been used to perform the research. Special attention has been paid to the scope, level and direction of information integration (Van Donk & van der Vaart 2005a). In addition, the four elements of integration (Jahre & Fabbe-Costes 2008) are closely tied to the frame of reference. The elements are integration of flows, integration of processes and activities, integration of information technologies and systems and integration of actors. The study found that information integration has a low positive relationship to operational performance and a medium positive relationship to strategic performance. The potential performance improvements found in this study vary from efficiency, delivery and quality improvements (operational) to profit, profitability or customer satisfaction improvements (strategic). The results indicate that although information integration has an impact on a firm’s logistics performance, all performance improvements have not been achieved. This study also found that the use of IT and IS have a mediocre positive relationship to information integration. Almost all case companies agreed on that the use of IT and IS could facilitate information integration and improve their logistics performance. The case companies felt that an implementation of a web portal or a data bank would benefit them - enhance their performance and increase information integration.
Resumo:
Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.
Datenherrschaft – an Ethically Justified Solution to the Problem of Ownership of Patient Information
Resumo:
Patient information systems are crucial components for the modern healthcare and medicine. It is obvious that without them the healthcare cannot function properly – one can try to imagine how brain surgery could be done without using information systems to gather and show information needed for an operation. Thus, it can be stated that digital information is irremovable part of modern healthcare. However, the legal ownership of patient information lacks a coherent and justified basis. The whole issue itself is actually bypassed by controlling pa- tient information with different laws and regulations how patient information can be used and by whom. Nonetheless, the issue itself – who owns the patient in- formation – is commonly missed or bypassed. This dissertation show the problems if the legislation of patient information ownership is not clear. Without clear legislation, the outcome can be unexpected like it seems to be in Finland, Sweden and United Kingdom: the lack of clear regulation has come up with unwanted consequences because of problematic Eu- ropean Union database directive implementation in those countries. The legal ownership is actually granted to the creators of databases which contains the pa- tient information, and this is not a desirable situation. In healthcare and medicine, we are dealing with issues such as life, health and information which are very sensitive and in many cases very personal. Thus, this dissertation leans on four philosophical theories form Locke, Kant, Heidegger and Rawls to have an ethically justified basis for regulating the patient infor- mation in a proper way. Because of the problems of property and ownership in the context of information, a new concept is needed and presented to replace the concept of owning, that concept being Datenherrschaft (eng. mastery over in- formation). Datenherrschaft seems to be suitable for regulating patient infor- mation because its core is the protection of one’s right over information and this aligns with the work of the philosophers whose theories are used in the work. The philosophical argumentation of this study shows that Datenherrschaft granted to the patients is ethically acceptable. It supports the view that patient should be controlling the patient information about themselves unless there are such specific circumstance that justifies the authorities to use patient information to protect other people’s basic rights. Thus, if the patients would be legally grant- ed Datenherrschaft over patient information we would endorse patients as indi- viduals who have their own and personal experience of their own life and have a strong stance against any unjustified paternalism in healthcare. Keywords: patient information, ownership, Datenherrschaft, ethics, Locke, Kant, Heidegger, Rawls