831 resultados para Information Technology Governance ITG
Resumo:
GUEDES, Clediane de Araújo; FARIAS, Gabriela Belmont de. Information literacy: uma análise nas bibliotecas escolares da rede privada em Natal / RN. Revista Digital de Biblioteconomia e Ciência da Informação, Campinas, v. 4, n. 2, p. 110-133, jan./jun. 2007
Resumo:
Los procesos de diseño y construcción tradicionales de la industria de la construcción que se han conservado inalterados durante años, han impedido vislumbrar los impactos positivos que se pueden dar al trabajar en conjunto con las tecnologías de información -- El miedo al cambio hace que las empresas del sector denominen “normal” a la fragmentación del proceso constructivo, y presupuesten desde el inicio de la obra atrasos por incompatibilidades en los diseños causados principalmente por la falta de comunicación y coordinación entre los diferentes participantes del proyecto -- La implementación de tecnologías de información busca no sólo ayudar como una herramienta a los diseños del proyecto, sino que también ofrece elementos para integrar a los participantes y contratistas del proyecto en un equipo de trabajo donde exista mayor interoperabilidad entre las áreas implicadas en el planteamiento, diseño y ejecución del proyecto, y se pueda disminuir de sobremanera la fragmentación que vuelve tan poco competitiva esta industria a nivel mundial -- En el presente trabajo de grado se realizó un estado del arte de la tecnología de información BIM con el fin de sintetizar las enormes cantidades de información disponibles y de posibilitar una mejor comprensión de este -- Con la teoría y los manuales estudiados a profundidad de los software que componen esta tecnología, se procedió a desarrollar un ejercicio exploratorio confrontando los conocimientos adquiridos teóricos con la parte práctica, parte en donde se pudieron vislumbrar las ventajas y desventajas al implementar este software en la industria de la construcción de nuestro país -- Finalmente se exponen los requerimientos y limitaciones que trae consigo la aplicación de esta tecnología a los proyectos de construcción
Resumo:
Problem This dissertation presents a literature-based framework for communication in science (with the elements partners, purposes, message, and channel), which it then applies in and amends through an empirical study of how geoscientists use two social computing technologies (SCTs), blogging and Twitter (both general use and tweeting from conferences). How are these technologies used and what value do scientists derive from them? Method The empirical part used a two-pronged qualitative study, using (1) purposive samples of ~400 blog posts and ~1000 tweets and (2) a purposive sample of 8 geoscientist interviews. Blog posts, tweets, and interviews were coded using the framework, adding new codes as needed. The results were aggregated into 8 geoscientist case studies, and general patterns were derived through cross-case analysis. Results A detailed picture of how geoscientists use blogs and twitter emerged, including a number of new functions not served by traditional channels. Some highlights: Geoscientists use SCTs for communication among themselves as well as with the public. Blogs serve persuasion and personal knowledge management; Twitter often amplifies the signal of traditional communications such as journal articles. Blogs include tutorials for peers, reviews of basic science concepts, and book reviews. Twitter includes links to readings, requests for assistance, and discussions of politics and religion. Twitter at conferences provides live coverage of sessions. Conclusions Both blogs and Twitter are routine parts of scientists' communication toolbox, blogs for in-depth, well-prepared essays, Twitter for faster and broader interactions. Both have important roles in supporting community building, mentoring, and learning and teaching. The Framework of Communication in Science was a useful tool in studying these two SCTs in this domain. The results should encourage science administrators to facilitate SCT use of scientists in their organization and information providers to search SCT documents as an important source of information.
Resumo:
Mestrado em Auditoria
Resumo:
The speed with which data has moved from being scarce, expensive and valuable, thus justifying detailed and careful verification and analysis to a situation where the streams of detailed data are almost too large to handle has caused a series of shifts to occur. Legal systems already have severe problems keeping up with, or even in touch with, the rate at which unexpected outcomes flow from information technology. The capacity to harness massive quantities of existing data has driven Big Data applications until recently. Now the data flows in real time are rising swiftly, become more invasive and offer monitoring potential that is eagerly sought by commerce and government alike. The ambiguities as to who own this often quite remarkably intrusive personal data need to be resolved – and rapidly - but are likely to encounter rising resistance from industrial and commercial bodies who see this data flow as ‘theirs’. There have been many changes in ICT that has led to stresses in the resolution of the conflicts between IP exploiters and their customers, but this one is of a different scale due to the wide potential for individual customisation of pricing, identification and the rising commercial value of integrated streams of diverse personal data. A new reconciliation between the parties involved is needed. New business models, and a shift in the current confusions over who owns what data into alignments that are in better accord with the community expectations. After all they are the customers, and the emergence of information monopolies needs to be balanced by appropriate consumer/subject rights. This will be a difficult discussion, but one that is needed to realise the great benefits to all that are clearly available if these issues can be positively resolved. The customers need to make these data flow contestable in some form. These Big data flows are only going to grow and become ever more instructive. A better balance is necessary, For the first time these changes are directly affecting governance of democracies, as the very effective micro targeting tools deployed in recent elections have shown. Yet the data gathered is not available to the subjects. This is not a survivable social model. The Private Data Commons needs our help. Businesses and governments exploit big data without regard for issues of legality, data quality, disparate data meanings, and process quality. This often results in poor decisions, with individuals bearing the greatest risk. The threats harbored by big data extend far beyond the individual, however, and call for new legal structures, business processes, and concepts such as a Private Data Commons. This Web extra is the audio part of a video in which author Marcus Wigan expands on his article "Big Data's Big Unintended Consequences" and discusses how businesses and governments exploit big data without regard for issues of legality, data quality, disparate data meanings, and process quality. This often results in poor decisions, with individuals bearing the greatest risk. The threats harbored by big data extend far beyond the individual, however, and call for new legal structures, business processes, and concepts such as a Private Data Commons.
Resumo:
The goal was to understand, document and module how information is currently flown internally in the largest dairy organization in Finland. The organization has undergone radical changes in the past years due to economic sanctions between European Union and Russia. Therefore, organization’s ultimate goal would be to continue its growth through managing its sales process more efficiently. The thesis consists of a literature review and an empirical part. The literature review consists of knowledge management and process modeling theories. First, the knowledge management discusses how data, information and knowledge are exchanged in the process. Knowledge management models and processes are describing how knowledge is created, exchanged and can be managed in an organization. Secondly, the process modeling is responsible for visualizing information flow through discussion of modeling approaches and presenting different methods and techniques. Finally, process’ documentation procedure was presented. In the end, a constructive research approach was used in order to identify process’ related problems and bottlenecks. Therefore, possible solutions were presented based on this approach. The empirical part of the study is based on 37 interviews, organization’s internal data sources and theoretical framework. The acquired data and information were used to document and to module the sales process in question with a flowchart diagram. Results are conducted through construction of the flowchart diagram and analysis of the documentation. In fact, answers to research questions are derived from empirical and theoretical parts. In the end, 14 problems and two bottlenecks were identified in the process. The most important problems are related to approach and/or standardization for information sharing, insufficient information technology tool utilization and lack of systematization of documentation. The bottlenecks are caused by the alarming amount of changes to files after their deadlines.
Resumo:
Tese (doutorado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2015.
Resumo:
The information technology - IT- benefits have been more perceived during the last decades. Both IT and business managers are dealing with subjects like governance, IT-Business alignment, information security and others on their top priorities. Talking about governance, specifically, managers are facing it with a technical approach, that gives emphasis on protection against invasions, antivirus systems, access controls and others technical issues. The IT risk management, commonly, is faced under this approach, that means, has its importance reduced and delegated to IT Departments. On the last two decades, a new IT risk management perspective raised, bringing an holistic view of IT risk to the organization. According to this new perspective, the strategies formulation process should take into account the IT risks. With the growing of IT dependence on most of organizations, the necessity of a better comprehension about the subject becomes more clear. This work shows a study in three public organizations of the Pernambuco State that investigates how those organizations manage their IT risks. Structured interviews were made with IT managers, and later, analyzed and compared with conceptual categories found in the literature. The results shows that the IT risks culture and IT governance are weakly understood and implemented on those organizations, where there are not such an IT risk methodology formally defined, neither executed. In addition, most of practices suggested in the literature were found, even without an alignment with an IT risks management process
Resumo:
This study aims to understand the general model of governance of information technology adopted by telecommunication companies operating in Rio Grande do Norte. The research methodology used involved a theoretical and empirical approach prepared, involving two case studies on companies in the telecommunications industry working in the state of Rio Grande do Norte. The study covered the area of IT organizations, through interviews with managers responsible for the area of Telecommunications / IT. To study in accordance with the approach and address the problem of research, this study was based on qualitative criteria, which enabled the understanding of how companies adopt the governance of information technology. In conclusion, it was found that the governance practices of information technology employees are incipient, but that meet the needs of business and that they intend to implement in specific areas and use other practices of IT governance
Resumo:
Companies have always been organized by processes, often imperceptible to its employees. With the advancement of technology, organizational processes currently run an organization through computers, and thus generate immediate information that is available to each sector. With the objective of seeking business information in real time, the government created the SPED - Public System of Digital, which involves three subsystems, which are the Electronic Invoice, Digital Accounting Bookkeeping and Digital Tax Bookkeeping. This system is revolutionizing the business structures when gathering, in an innovative way, all information and interlinked business processes. For the implementation of SPED, a revision in the organizational processes is required, since the information is generated and is sent online to the government, without mistakes. Thus the study aimed to analyze the change brought about by the implementation of the Public System of Digital SPED in the main business processes. In order to do so, we have performed a multiple case study involving three companies in the state of Para, two operate in wholesale and one explores agribusiness. The Data collection was performed by accounting professionals, IT and managers. According to the results obtained, it was found that in two companies, the IT infrastructure was capable of deploying the new system without major problems, while one company had more difficulties to cope with the new system. However, all companies had to examine its processes to make the customizations needed to fit. It was also observed that there is no IT Governance in two companies. Therefore, we recommend the use of an appropriate model, not only for the implementation of SPED, but as a way to manage and extract better results from investment in information technology
Resumo:
This article presents a literature review on current issues in the field of library science, related to competence in the management and use of information, information technology and communication, information society and knowledge among others. It further seeks to highlight the importance of users to acquire these skills so they can deal effectively with decision-making, problem solving, conducting investigations and their own training. This is possible if the information and documentation systems as dynamic agents engaged to distribute scientific and technical knowledge.
Resumo:
Dissertação (mestrado)—Universidade de Brasília, Instituto de Ciências Exatas, Departamento de Ciência da Computação, 2016.
Resumo:
Government call centers (311) were first created to reduce the volume of non-emergency calls that were being placed to emergency 911 call centers. The number of 311 call centers increased from 57 in 2008 to about 300 in 2013. Considering that there are over 2,700 municipal government units across the United States, the adoption rate of the 311 centers is arguably low in the country. This dissertation is an examination of the adoption of 311 call centers by municipal governments. My focus is specifically on why municipal governments adopt 311 and identifying which barriers result in the non-adoption of 311 call centers. This dissertation is possibly the first study to examine the adoption of 311 call centers in the United States. ^ The dissertation study has identified several significant factors in the adoption and non-adoption of 311 government call centers. The following factors were significant in the adoption of 311 government call centers: managerial support, financial constraints, organizational responsiveness, strategic plan placement, and technology champion. The following factors were significant barriers that resulted in the non-adoption of a 311 government call center; no demand from citizens, start up costs, annual operating costs, unavailability of funding, and no obvious need for one. ^ If local government entities that do not have a 311 government call center decide to adopt one, this study will help them identify the conditions that need to be in place for successful adoption to occur. Local government officials would first need to address the barriers in setting up the 311 call centers. ^
Resumo:
Con el fin de la unipolaridad no sólo se fortalecieron mecanismos de gobernanza global como los Regímenes Internacionales, sino también se fortalecieron actores no estatales. A pesar de la importancia que tomaron estos dos elementos aún no existe una teoría que explique exhaustivamente la relación que existe entre ellos. Es por lo anterior que, la investigación busca responder de qué manera el rol de las Redes de Apoyo Transnacional ha incidido en la evolución del régimen de tráfico de personas en la Región del Mekong. Asimismo tiene como objetivo comprender las relación entre el Régimen y las Redes de Apoyo Transnacional a través de la formulación de un caso de estudio basado en metodologías cualitativas, específicamente, en el análisis teórico-constructivista y el análisis de contenido de documentos producidos por actores estatales y no estatales.