938 resultados para Copyright -- Electronic information resources


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Work domain analysis (WDA) has been applied to a range of complex work domains, but few WDAs have been undertaken in medical contexts. One pioneering effort suggested that clinical abstraction is not based on means-ends relations, whereas another effort downplayed the role of bio-regulatory mechanisms. In this paper it is argued that bio-regulatory mechanisms that govern physiological behaviour must be part of WDA models of patients as the systems at the core of intensive care units. Furthermore it is argued that because the inner functioning of patients is not completely known, clinical abstraction is based on hypothetico-deductive abstract reasoning. This paper presents an alternative modelling framework that conforms to the broader aspirations of WDA. A modified version of the viable systems model is used to represent the patient system as a nested dissipative structure while aspects of the recognition primed decision model are used to represent the information resources available to clinicians in ways that support lsquoif...thenrsquo conceptual relations. These two frameworks come together to form the recursive diagnostic framework, which may provide a more appropriate foundation for information display design in the intensive care unit.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The University of Queensland Cybrary delivers high quality customer focused innovative information resources, services and programs that are integrated with and central to the University’s teaching, learning and research activities. The Cybrary website - www.cybrary.uq.edu.au - enables customers to access information more or less seamlessly anywhere anytime. This paper will go behind the seams to discuss some of the technologies that underpin service delivery and some of the implications for the Cybrary’s human, physical and financial resources.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The goal of evidence-based medicine is to uniformly apply evidence gained from scientific research to aspects of clinical practice. In order to achieve this goal, new applications that integrate increasingly disparate health care information resources are required. Access to and provision of evidence must be seamlessly integrated with existing clinical workflow and evidence should be made available where it is most often required - at the point of care. In this paper we address these requirements and outline a concept-based framework that captures the context of a current patient-physician encounter by combining disease and patient-specific information into a logical query mechanism for retrieving relevant evidence from the Cochrane Library. Returned documents are organized by automatically extracting concepts from the evidence-based query to create meaningful clusters of documents which are presented in a manner appropriate for point of care support. The framework is currently being implemented as a prototype software agent that operates within the larger context of a multi-agent application for supporting workflow management of emergency pediatric asthma exacerbations. © 2008 Springer-Verlag Berlin Heidelberg.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In spite of the increasing significance of broadband, many small and medium enterprises (SMEs) are unaware of or unappreciative of its benefits. This is potentially a problem for governments, Internet Service Providers and other supply side institutions. The current study empirically verifies applicability of an extended IS continuance model controlling for organizational variables based on the Technology-Organization-Environment framework to examine factors influencing broadband post-adoption behavior of SMEs in Singapore. Strong support for the model has been manifested by the results, providing insight into influential factors. Results of the study suggest that perceived usefulness is a strong predictor of users’ continuance intention, followed by satisfaction with broadband usage as a significant but weaker predictor. SMEs in a more competitive business environment and whose key executive possesses greater IT knowledge are more likely to use broadband.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Environmental sustainability is an area of increasing importance for third party logistics (3PL) companies. As the design and implementation of services requires interaction between buyer and 3PL, the 3PLs are in a critical position to support the efforts towards greening operations of different supply chain participants. However the literature in this field reflects a gap between the perspectives of buyers and 3PLs. This chapter attempts to fill this void through an explorative case study analysis on the environmental attitude of 3PLs in order to derive implications for buyers’ behavior. The results indicate that the buyer’s role is critical in different ways in the development of green initiatives among 3PLs. An increased orientation towards longer-term contracts and joint development would likely enhance the level of green initiatives. Indirectly, the buyer has the opportunity to influence its 3PLs through interaction with employees on different levels in the company, including top management.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper is a description of information and software content of a computer knowledge bank on medical diagnostics. The classes of its users and the tasks which they can solve are described. The information content of the bank contains three ontologies: an ontology of observations in the field of medical diagnostics, an ontology of knowledge base (diseases) in medical diagnostics and an ontology of case records, and also it contains three classes of information resources for every division of medicine – observation bases, knowledge bases, and data bases (with data about patients), that correspond to these ontologies. Software content consists of editors for information of different kinds (ontologies, bases of observations, knowledge and data), and also of a program which performs medical diagnostics.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

* This paper was made according to the program of FEBRAS, project "Creating methods and tools for developing intellectual information systems in medicine and public health".

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper considers the problem of finding an optimal deployment of information resources on an InfoStation network in order to minimize the overhead and reduce the time needed to satisfy user requests for resources. The RG-Optimization problem and an approach for its solving are presented as well.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The enterprise management (EM) approach provides a holistic view of organizations and their related information systems. In order to align information technology (IT) innovation with global markets and volatile virtualization, traditional firms are seeking to reconstruct their enterprise structures alongside repositioning strategy and establish new information system (IS) architectures to transform from single autonomous entities into more open enterprises supported by new Enterprise Resource Planning (ERP) systems. This chapter shows how ERP engage-abilities cater to three distinctive EM patterns and resultant strategies. The purpose is to examine the presumptions and importance of combing ERP and inter-firm relations relying on the virtual value chain concept. From a review of the literature on ERP development and enterprise strategy, exploratory inductive research studies in Zoomlion and Lanye have been conducted. In addition, the authors propose a dynamic conceptual framework to demonstrate the adoption and governance of ERP in the three enterprise management forms and points to a new architectural type (ERPIII) for operating in the virtual enterprise paradigm.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the global Internet economy, e-business as a driving force to redefine business models and operational processes is posing new challenges for traditional organizational structures and information system (IS) architectures. These are showing promises of a renewed period of innovative thinking in e-business strategies with new enterprise paradigms and different Enterprise Resource Planning (ERP) systems. In this chapter, the authors consider and investigate how dynamic e-business strategies, as the next evolutionary generation of e-business, can be realized through newly diverse enterprise structures supported by ERP, ERPII and so-called "ERPIII" solutions relying on the virtual value chain concept. Exploratory inductive multi-case studies in manufacturing and printing industries have been conducted. Additionally, it proposes a conceptual framework to discuss the adoption and governance of ERP systems within the context of three enterprise forms for enabling dynamic and collaborative e-business strategies, and particularly demonstrate how an enterprise can dynamically migrate from its current position to the patterns it desires to occupy in the future - a migration that must and will include dynamic e-business as a core competency, but that also relies heavily on ERP-based backbone and other robust technological platform and applications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The phenomenonal growth of the Internet has connected us to a vast amount of computation and information resources around the world. However, making use of these resources is difficult due to the unparalleled massiveness, high communication latency, share-nothing architecture and unreliable connection of the Internet. In this dissertation, we present a distributed software agent approach, which brings a new distributed problem-solving paradigm to the Internet computing researches with enhanced client-server scheme, inherent scalability and heterogeneity. Our study discusses the role of a distributed software agent in Internet computing and classifies it into three major categories by the objects it interacts with: computation agent, information agent and interface agent. The discussion of the problem domain and the deployment of the computation agent and the information agent are presented with the analysis, design and implementation of the experimental systems in high performance Internet computing and in scalable Web searching. ^ In the computation agent study, high performance Internet computing can be achieved with our proposed Java massive computation agent (JAM) model. We analyzed the JAM computing scheme and built a brutal force cipher text decryption prototype. In the information agent study, we discuss the scalability problem of the existing Web search engines and designed the approach of Web searching with distributed collaborative index agent. This approach can be used for constructing a more accurate, reusable and scalable solution to deal with the growth of the Web and of the information on the Web. ^ Our research reveals that with the deployment of the distributed software agent in Internet computing, we can have a more cost effective approach to make better use of the gigantic scale network of computation and information resources on the Internet. The case studies in our research show that we are now able to solve many practically hard or previously unsolvable problems caused by the inherent difficulties of Internet computing. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The information constitutes one of the most valuable strategic assets for the organization. However, the organizational environment in which it is inserted is very complex and heterogeneous, making emerging issues relevant to the Governance of information technology (IT) and Information Security. Academic Studies and market surveys indicate that the origin of most accidents with the information assets is the behavior of people organization itself rather than external attacks. Taking as a basis the promotion of a culture of safety among users and ensuring the protection of information in their properties of confidentiality, integrity and availability, organizations must establish its Information Security Policy (PSI). This policy is to formalise the guidelines in relation to the security of corporate information resources, in order to avoid that the asset vulnerabilities are exploited by threats and can bring negative consequences to the business. But, for the PSI being effective, it is required that the user have readiness to accept and follow the procedures and safety standards. In the light of this context, the present study aims to investigate what are the motivators extrinsic and intrinsic that affect the willingness of the user to be in accordance with the organization's security policies. The theoretical framework addresses issues related to IT Governance, Information Security, Theory of deterrence, Motivation and Behavior Pro-social. It was created a theoretical model based on the studies of Herath and Rao (2009) and D'Arcy, Hovav and Galletta (2009) that are based on General Deterrence Theory and propose the following influencing factors in compliance with the Policy: Severity of Punishment, Certainty of Detection, Peer Behaviour, Normative Beliefs, Perceived Effectiveness and Moral Commitment. The research used a quantitative approach, descriptive. The data were collected through a questionnaire with 18 variables with a Likert scale of five points representing the influencing factors proposed by the theory. The sample was composed of 391 students entering the courses from the Center for Applied Social Sciences of the Universidade Federal do Rio Grande do Norte. For the data analysis, were adopted the techniques of Exploratory Factor Analysis, Analysis of Cluster hierarchical and nonhierarchical, Logistic Regression and Multiple Linear Regression. As main results, it is noteworthy that the factor severity of punishment is what contributes the most to the theoretical model and also influences the division of the sample between users more predisposed and less prone. As practical implication, the research model applied allows organizations to provide users less prone and, with them, to carry out actions of awareness and training directed and write Security Policies more effective.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report evaluates the existing situation in the Celtic Seas sub-region and determines the current state of preparedness for transboundary management of marine ecosystems and MSFD implementation. Recommendations for capacity building are provided through the analysis of the existing conflicts and potential synergies between relevant policies, institutions and information resources for MSFD implementation across the region. This report strives to empower stakeholders through the provision of a sound baseline with accurate and up-to-date information on the current status of MSFD implementation, potential opportunities and suggested approaches for building capacities in their region and across the Celtic Seas. It is evident that there are a number of national marine planning processes currently underway and at different stages throughout the United Kingdom and the pre-planning context for MSP in Ireland. On a similar note, this evaluation of MSFD implementation progress to-date in the United Kingdom, Ireland and France highlights that each Member State has implemented the legal and procedural requirements of preparatory steps in differing manners and using different time scales. This variance across the sub-region has the potential to impact the achievement of GES by 2020 across the Celtic Seas.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the quick advance of web service technologies, end-users can conduct various on-line tasks, such as shopping on-line. Usually, end-users compose a set of services to accomplish a task, and need to enter values to services to invoke the composite services. Quite often, users re-visit websites and use services to perform re-occurring tasks. The users are required to enter the same information into various web services to accomplish such re-occurring tasks. However, repetitively typing the same information into services is a tedious job for end-users. It can negatively impact user experience when an end-user needs to type the re-occurring information repetitively into web services. Recent studies have proposed several approaches to help users fill in values to services automatically. However, prior studies mainly suffer the following drawbacks: (1) limited support of collecting and analyzing user inputs; (2) poor accuracy of filling values to services; (3) not designed for service composition. To overcome the aforementioned drawbacks, we need maximize the reuse of previous user inputs across services and end-users. In this thesis, we introduce our approaches that prevent end-users from entering the same information into repetitive on-line tasks. More specifically, we improve the process of filling out services in the following 4 aspects: First, we investigate the characteristics of input parameters. We propose an ontology-based approach to automatically categorize parameters and fill values to the categorized input parameters. Second, we propose a comprehensive framework that leverages user contexts and usage patterns into the process of filling values to services. Third, we propose an approach for maximizing the value propagation among services and end-users by linking a set of semantically related parameters together and similar end-users. Last, we propose a ranking-based framework that ranks a list of previous user inputs for an input parameter to save a user from unnecessary data entries. Our framework learns and analyzes interactions of user inputs and input parameters to rank user inputs for input parameters under different contexts.