863 resultados para Risorse umane, cambiamento organizzativo, HRMS, Information technology


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: Evidence demonstrates self-management programs are an effective approach to assist patients with chronic diseases such as type 2 diabetes or cardiac conditions to modify their lifestyle for better managing their conditions. Using information technology (IT) has great potential to support self-management programs and assist patients to fulfill their goals in managing their conditions more efficiently and effectively. Examples of different types of technology used in self-management programs that have limited research support include: text messages, telephone followup, web-based programs, and other internet-assisted education. But little is known about the applicability and feasiability of different forms of technology for patients with chronic diseases such as those with type 2 diabetes and critical cardiac conditions. Furthermore, although there is some evidence of the benefits of using IT in supporting self-management programs, further research on the use of IT in such programs is recommended. Objective: To develop and pilot test an integrated Cardiac- Diabetes Self-Management Program (CDSMP) incorporating telephone and text-message follow-up. Methods: A pilot study using randomised controlled trial is conducted in the coronary care unit (CCU) in a Brisbane metropolitan hospital in Australia to collect data on patients with type 2 diabetes admitted to CCU. The main outcomes included self-efficacy levels, knowledge, and quality of life. Results: Initial results reveal that patients with diabetes admitted to the CCU in the experimental group did improve their self-efficacy, and knowledge levels. Acknowledgements: This Project is funded by QUT Early Career Researcher Research Grant

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Service research in information systems (IS) has received attention over many years (e.g. Kettinger and Lee, 1994), but more recently has increased substantially in both diversity and volume (Rai and Sambamurthy, 2006). A service-oriented view of information technology (IT) is gradually taking hold in both academia and industry. This is concomitant with the growth of service-related phenomena and concepts (Lusch and Vargo, 2006), stimulating a global discourse about 'service science' as a new, cross-disciplinary field of research (Chesbrough and Spohrer, 2006).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The availability of health information is rapidly increasing; its expansion and proliferation is inevitable. At the same time, breeding of health information silos is an unstoppable and relentless exercise. Information security and privacy concerns are therefore major barriers in the eHealth socio-eco system. We proposed Information Accountability as a measurable human factor that should eliminate and mitigate security concerns. Information accountability measures would be practicable and feasible if legislative requirements are also embedded. In this context, information accountability constitutes a key component for the development of effective information technology requirements for health information system. Our conceptual approach to measuring human factors related to information accountability in eHealth is presented in this paper with some limitations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Availability of health information is rapidly increasing and the expansion and proliferation of health information is inevitable. The Electronic Healthcare Record, Electronic Medical Record and Personal Health Record are at the core of this trend and are required for appropriate and practicable exchange and sharing of health information. However, it is becoming increasingly recognized that it is essential to preserve patient privacy and information security when utilising sensitive information for clinical, management and administrative processes. Furthermore, the usability of emerging healthcare applications is also becoming a growing concern. This paper proposes a novel approach for integrating consideration of information accountability with a perspective from usability engineering that can be applied when developing healthcare information technology applications. A social networking user case in the healthcare information exchange will be presented in the context of our approach.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The idea of information literacy, broadly deÞned as the ability to recognise information needs and identify, evaluate and use information e¤ectively, has been of growing concern in the education sectors for a number of years; whilst in the workplace, employers and managers have perhaps attended more to the need for computer and information technology skill. New descriptions of information literacy, that may be of value to the business sector, are now beginning to appear as a result of qualitative research into how professional employees experience the e¤ective use of information. This paper summarises the outcomes of an investigation into the experience of information literacy amongst various types of professionals; and explores the possible di¤erences and interrelations between individual and organisational information literacy suggested by these outcomes. Seven di¤erent ways of experiencing information literacy were identiÞed. These experiences are closely related to important workplace processes such as environmental scanning, information management, corporate memory, and research and development; conÞrming that information literacy should be considered a signiÞcant part of the character of learning organisations as well as being a key characteristic of the organisationÕs employees. Implications of individual and organisational information literacy for beginning and continuing professional education are explored.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is an increasing interest in the use of information technology as a participatory planning tool, particularly the use of geographical information technologies to support collaborative activities such as community mapping. However, despite their promise, the introduction of such technologies does not necessarily promote better participation nor improve collaboration. In part this can be attributed to a tendency for planners to focus on the technical considerations associated with these technologies at the expense of broader participation considerations. In this paper we draw on the experiences of a community mapping project with disadvantaged communities in suburban Australia to highlight the importance of selecting tools and techniques which support and enhance participatory planning. This community mapping project, designed to identify and document community-generated transport issues and solutions, had originally intended to use cadastral maps extracted from the government’s digital cadastral database as the foundation for its community mapping approach. It was quickly discovered that the local residents found the cadastral maps confusing as the maps lacked sufficient detail to orient them to their suburb (the study area). In response to these concerns and consistent with the project’s participatory framework, a conceptual base map based on resident’s views of landmarks of local importance was developed to support the community mapping process. Based on this community mapping experience we outline four key lessons learned regarding the process of community mapping and the place of geographical information technologies within this process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of the current study was to develop a measurement of information security culture in developing countries such as Saudi Arabia. In order to achieve this goal, the study commenced with a comprehensive review of the literature, the outcome being the development of a conceptual model as a reference base. The literature review revealed a lack of academic and professional research into information security culture in developing countries and more specifically in Saudi Arabia. Given the increasing importance and significant investment developing countries are making in information technology, there is a clear need to investigate information security culture from developing countries perspective such as Saudi Arabia. Furthermore, our analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. Our research aims to fill this gap by developing and validating a measurement model of information security culture, as well as developing initial understanding of factors that influence security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. In the qualitative phase, eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness, security compliance and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, policy maintenance, training and ethical conduct policies. These factors were confirmed by the literature review as being critical and important for the creation of security culture and formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model through Exploratory Factor Analysis (EFA), followed by Confirmatory Factor Analysis (CFA.) In addition, using Structural Equation Modelling (SEM) we were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture. The current study contributes to the existing body of knowledge in two major ways: firstly, it develops an information security culture measurement model; secondly, it presents empirical evidence for the nomological validity for the security culture measurement model and discovery of factors that influence information security culture. The current study also indicates possible future related research needs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Beginning in 1974, the State of Maryland created spatial databases under the MAGI (Maryland's Automated Geographic Information) system. Since that early GIS, other state and local agencies have begun GISs covering a range of applications from critical lands inventories to cadastral mapping. In 1992, state agencies, local agencies, universities, and businesses began a series of GIS coordination activities, resulting in the formation of the Maryland Local Geographic Information Committee and the Maryland State Government Geographic Information Coordinating Committee. GIS activities and system installations can be found in 22 counties plus Baltimore City, and most state agencies. Maryland's decision makers rely on a variety of GIS reports and products to conduct business and to communicate complex issues more effectively. This paper presents the status of Maryland's GIS applications for local and state decision making.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The complex supply chain relations of the construction industry, coupled with the substantial amount of information to be shared on a regular basis between the parties involved, make the traditional paper-based data interchange methods inefficient, error prone and expensive. The successful information technology (IT) applications that enable seamless data interchange, such as the Electronic Data Interchange (EDI) systems, have generally failed to be successfully implemented in the construction industry. An alternative emerging technology, Extensible Markup Language (XML), and its applicability to streamline business processes and to improve data interchange methods within the construction industry are analysed, as is the EDI technology to identify the strategic advantages that XML technology provides to overcome the barriers to implementation. In addition, the successful implementation of XML-based automated data interchange platforms for a large organization, and the proposed benefits thereof, are presented as a case study.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Lean construction and building information modeling (BIM) are quite different initiatives, but both are having profound impacts on the construction industry. A rigorous analysis of the myriad specific interactions between them indicates that a synergy exists which, if properly understood in theoretical terms, can be exploited to improve construction processes beyond the degree to which it might be improved by application of either of these paradigms independently. Using a matrix that juxtaposes BIM functionalities with prescriptive lean construction principles, 56 interactions have been identified, all but four of which represent constructive interaction. Although evidence for the majority of these has been found, the matrix is not considered complete but rather a framework for research to explore the degree of validity of the interactions. Construction executives, managers, designers, and developers of information technology systems for construction can also benefit from the framework as an aid to recognizing the potential synergies when planning their lean and BIM adoption strategies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the developing digital economy, the notion of traditional attack on enterprises of national significance or interest has transcended into different modes of electronic attack, surpassing accepted traditional forms of physical attack upon a target. The terrorist attacks that took place in the United States on September 11, 2001 demonstrated the physical devastation that could occur if any nation were the target of a large-scale terrorist attack. Therefore, there is a need to protect criticalnational infrastructure and critical information infrastructure. In particular,this protection is crucial for the proper functioning of a modern society and for a government to fulfill one of its most important prerogatives – namely, the protection of its people. Computer networks have many benefits that governments, corporations, and individuals alike take advantage of in order to promote and perform their duties and roles. Today, there is almost complete dependence on private sector telecommunication infrastructures and the associated computer hardware and software systems.1 These infrastructures and systems even support government and defense activity.2 This Article discusses possible attacks on critical information infrastructures and the government reactions to these attacks.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Researchers are increasingly grappling with ways of theorizing social media and its use. This review essay proposes that the theory of Information Grounds (IG) may provide a valuable lens for understanding how social media fosters collaboration and social engagement among information professionals. The paper presents literature that helps us understand how social media can be seen as IG, and maps the characteristics of social media to the seven propositions of IG theory. This work is part of a wider study investigating the ways in which Information Technology (IT) professionals experience social media.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose This paper seeks to answer two research questions which are “What are key factors which influence Chinese to adopt mobile technology?” and “Do these key factors differ from factors which are identified from Western context?” Design/methodology The findings from a pilot study with 45 in-depth interviews are used to develop questionnaires and test across 800 residents from the three research cities. The data were analyzed by Structural Equation Modelling together with Multi-group Analysis. Findings Our data suggest eight important concepts, i.e. utilitarian expectation, hedonic expectation, status gains, status loss avoidance, normative influence, external influence, cost, and quality concern, are influential factors affecting users’ intentions to adopt 3G mobile technology. Differences are found between the samples in the three research cities in the effect of hedonic expectation, status gains, status loss avoidance, and normative influence on mobile technology adoption intention. Research limitations/implications: As the stability of intentions may change over time, only measuring intentions might be inadequate in predicting actual adoption behaviors. However, the focus on potential users is thought to be appropriate, given that the development of 3G is still in its infancy in China. Originality/value Previous research into Information Technology (IT) adoption among Chinese users has not paid attention to regional diversity. Some research considered China as a large single market and some was conducted in only one province or one city. Culturally, China is a heterogeneous country.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Solving indeterminate algebraic equations in integers is a classic topic in the mathematics curricula across grades. At the undergraduate level, the study of solutions of non-linear equations of this kind can be motivated by the use of technology. This article shows how the unity of geometric contextualization and spreadsheet-based amplification of this topic can provide a discovery experience for prospective secondary teachers and information technology students. Such experience can be extended to include a transition from a computationally driven conjecturing to a formal proof based on a number of simple yet useful techniques.