821 resultados para Information systems implementation
Resumo:
Although in the late 1990s there was much discussion as to whether the idea of information literacy was necessary or had longevity, global interest in the phenomenon has increased rather than diminished. In the midst of all this activity, what has happened to the way in which we interpret the idea of information literacy in the last decade or more? The label of information literacy has certainly become widely applied, especially to library based programs and remains more popular in formal learning environments.Ultimately information literacy is about peoples’ experience of using information wherever they happen to be. Information literacy is about people interacting, engaging, working with information in many contexts, either individually or in community. Emerging technologies may transform the kinds of information available and how it is engaged with. Nevertheless, we continue to need to understand the experience of information use in order to support people in their information environments. We continue to need to develop programs which reflect and enhance peoples’ experiences of using information to learn in ever widening and more complex settings (Bruce, 2008; Bruce & Hughes, 2010).
Resumo:
This position paper provides an overview of work conducted and an outlook of future directions within the field of Information Retrieval (IR) that aims to develop novel models, methods and frameworks inspired by Quantum Theory (QT).
Resumo:
This paper presents some theoretical perspectives that might inform the design and development of information and communications technology (ICT) tools to support integrated (in-session) reflection and deep learning during e-learning. The role of why questioning provides the focus of discussion and is informed by the literature on critical thinking, sense-making, and reflective practice, as well as recent developments in knowledge management, computational linguistics and automated question generation. It is argued that there exists enormous scope for the development of ICT scaffolding targeted at supporting reflective practice during e-learning. The first generations of e-Portfolio tools provide some evidence for the significance of the benefits of integrating reflection into the design of ICT systems; however, following the review of a number of such systems, as well as a range of ICT applications and services designed to support e-learning, it is argued that the scope of implementation is limited.
Resumo:
For more than a decade research in the field of context aware computing has aimed to find ways to exploit situational information that can be detected by mobile computing and sensor technologies. The goal is to provide people with new and improved applications, enhanced functionality and better use experience (Dey, 2001). Early applications focused on representing or computing on physical parameters, such as showing your location and the location of people or things around you. Such applications might show where the next bus is, which of your friends is in the vicinity and so on. With the advent of social networking software and microblogging sites such as Facebook and Twitter, recommender systems and so on context-aware computing is moving towards mining the social web in order to provide better representations and understanding of context, including social context. In this paper we begin by recapping different theoretical framings of context. We then discuss the problem of context- aware computing from a design perspective.
Resumo:
Given the substantial investment in information technology (IT), and the significant impact IT has on organizational success, organizations consume considerable resources to manage acquisition and use of their IT resources. While various arguments proposed suggest which IT governance arrangements may work best, our understanding of the effectiveness of such initiatives is limited. We examine the relationship between the effectiveness of IT steering committee driven IT governance initiatives and firm's IT management and IT infrastructure related capabilities. We further propose that firm's ITrelated capabilities generated through IT governance initiatives should improve its business processes and firm-level performance. We test these relationships empirically by a field survey. Results suggest that firms' effectiveness of IT steering committee driven IT governance initiatives positively relates to the level of their IT-related capabilities. We also found positive relationships between IT-related capabilities and internal process-level performance. Our results also support that improvement in internal process-level performance positively relates to improvement in customer service and firm-level performance.
Resumo:
Understanding how IT investments contribute to business value is an important issue, and this assists in the efficient use of technology resources in businesses. While there is an agreement that IT contributes to business value, we are unsure of how IT contributes to business value in the wider context, including developing countries. With the view that understanding the interaction between IT resources and the users may provide better insights on the potential of IT investments, this study investigates the businesses’ perception of the intangible benefits of their IT investments. The results indicate that businesses in developing countries perceive that their IT investments provide intangible benefits, especially at the process level, and this contributes to business value.
Resumo:
Drawing on the example of a recent study (Wang, 2010), this paper discusses the application of a sociocultural approach to information literacy research and curriculat design. First, it describes the foundation of this research approach in sociocultural theories, in particular Vygotsky's sociocultural theory. Then it presents key theoretical principles arising from the research and describes how the sociocultural approach enabled the establishment of collaborative partnerships between information professionals and academic and teaching support staff in a community of practice for information literacy integration.
Resumo:
As access to networked digital communities increases, a growing number of teens participate in digital communities by creating and sharing a variety of content. The affordances of social media - ease of use, ubiquitous access, and communal nature - have made creating and sharing content an appealing process for teens. Teens primarily learn the practices of encountering and using information through social interaction and participation within digital communities. This article adopts the position that information literacy is the experience of using information to learn. It reports on an investigation into teens experiences in the United States, as they use information to learn how to create content and participate within the context of social media. Teens that participate in sharing art on sites such as DeiviantArt, website creation, blogging, and/or posting edited videos via YouTube and Vimeo, were interviewed. The interviews explored teens' information experiences within particular social and digital contexts. Teens discussed the information they used, how information was gathered and accessed, and explored the process of using that information to participate in the communities.
Resumo:
Background: Access to cardiac services is essential for appropriate implementation of evidence-based therapies to improve outcomes. The Cardiac Accessibility and Remoteness Index for Australia (Cardiac ARIA) aimed to derive an objective, geographic measure reflecting access to cardiac services. Methods: An expert panel defined an evidence-based clinical pathway. Using Geographic Information Systems (GIS), a numeric/alpha index was developed at two points along the continuum of care. The acute category (numeric) measured the time from the emergency call to arrival at an appropriate medical facility via road ambulance. The aftercare category (alpha) measured access to four basic services (family doctor, pharmacy, cardiac rehabilitation, and pathology services) when a patient returned to their community. Results: The numeric index ranged from 1 (access to principle referral center with cardiac catheterization service ≤ 1 hour) to 8 (no ambulance service, > 3 hours to medical facility, air transport required). The alphabetic index ranged from A (all 4 services available within 1 hour drive-time) to E (no services available within 1 hour). 13.9 million (71%) Australians resided within Cardiac ARIA 1A locations (hospital with cardiac catheterization laboratory and all aftercare within 1 hour). Those outside Cardiac 1A were over-represented by people aged over 65 years (32%) and Indigenous people (60%). Conclusion: The Cardiac ARIA index demonstrated substantial inequity in access to cardiac services in Australia. This methodology can be used to inform cardiology health service planning and the methodology could be applied to other common disease states within other regions of the world.
Resumo:
Comprehensive BCM plan testing for complex information systems is difficult and expensive, if not infeasible. This paper suggests that a simulator could be employed to ameliorate these problems. A general model for such a BCM simulator is presented, and the implementation of a prototype simulator is described. The simulator reacts to system disturbances by seeking alternative configurations provided within the BCM plan, reporting the resource availabilities in the updated system and identifying any failure to meet the requirements placed on the system. The simulator then explores any changes in data security introduced by the proposed post disturbance configuration and reports any enhanced risk.
Resumo:
With the large diffusion of Business Process Managemen (BPM) automation suites, the possibility of managing process-related risks arises. This paper introduces an innovative framework for process-related risk management and describes a working implementation realized by extending the YAWL system. The framework covers three aspects of risk management: risk monitoring, risk prevention, and risk mitigation. Risk monitoring functionality is provided using a sensor-based architecture, where sensors are defined at design time and used at run-time for monitoring purposes. Risk prevention functionality is provided in the form of suggestions about what should be executed, by who, and how, through the use of decision trees. Finally, risk mitigation functionality is provided as a sequence of remedial actions (e.g. reallocating, skipping, rolling back of a work item) that should be executed to restore the process to a normal situation.
Resumo:
As computers approach the physical limits of information storable in memory, new methods will be needed to further improve information storage and retrieval. We propose a quantum inspired vector based approach, which offers a contextually dependent mapping from the subsymbolic to the symbolic representations of information. If implemented computationally, this approach would provide exceptionally high density of information storage, without the traditionally required physical increase in storage capacity. The approach is inspired by the structure of human memory and incorporates elements of Gardenfors’ Conceptual Space approach and Humphreys et al.’s matrix model of memory.
Resumo:
Exploring information use within everyday or community contexts is a recent area of interest for information literacy research endeavors. Within this domain, health information literacy (HIL) has emerged as a focus of interest due to identified synergies between information use and health status. However, while HIL has been acknowledged as a core ingredient that can assist people to take responsibility for managing and improving their own health, limited research has explored how HIL is experienced in everyday community life. This article will present the findings of ongoing research undertaken using phenomenography to explore how HIL is experienced among older Australians within everyday contexts. It will also discuss how these findings may be used to inform policy formulation in health communication and as an evidence base for the design and delivery of consumer health information resources and services.
Resumo:
Exploring information use within everyday or community contexts is a recent area of interest for information literacy research endeavours. Within this domain, health information literacy (HIL) has emerged as a focus of interest due to identified synergies between information use and health status. However, while HIL has been acknowledged as a core ingredient that can assist people to take responsibility for managing and improving their own health, limited research has explored how HIL is experienced in everyday community life. This article will present the findings of ongoing research undertaken using phenomenography to explore how HIL is experienced among older Australians within everyday contexts. It will also discuss how these findings may be used to inform policy formulation in health communication and as an evidence base for the design and delivery of consumer health information resources and services.
Resumo:
The emergence of semantic technologies to deal with the underlying meaning of things, instead of a purely syntactical representation, has led to new developments in various fields, including business process modeling. Inspired by artificial intelligence research, technologies for semantic Web services have been proposed and extended to process modeling. However, the applicablility of semantic Web services for semantic business processes is limited because business processes encompass wider requirements of business than Web services. In particular, processes are concerned with the composition of tasks, that is, in which order activities are carried out, regardless of their implementation details; resources assigned to carry out tasks, such as machinery, people, and goods; data exchange; and security and compliance concerns.