863 resultados para Risorse umane, cambiamento organizzativo, HRMS, Information technology


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objectives The intent of this paper is in the examination of health IT implementation processes – the barriers to and facilitators of successful implementation, identification of a beginning set of implementation best practices, the identification of gaps in the health IT implementation body of knowledge, and recommendations for future study and application. Methods A literature review resulted in the identification of six health IT related implementation best practices which were subsequently debated and clarified by participants attending the NI2012 Research Post Conference held in Montreal in the summer of 2012. Using the framework for implementation research (CFIR) to guide their application, the six best practices were applied to two distinct health IT implementation studies to assess their applicability. Results Assessing the implementation processes from two markedly diverse settings illustrated both the challenges and potentials of using standardized implementation processes. In support of what was discovered in the review of the literature, “one size fits all” in health IT implementation is a fallacy, particularly when global diversity is added into the mix. At the same time, several frameworks show promise for use as “scaffolding” to begin to assess best practices, their distinct dimensions, and their applicability for use. Conclusions Health IT innovations, regardless of the implementation setting, requires a close assessment of many dimensions. While there is no “one size fits all”, there are commonalities and best practices that can be blended, adapted, and utilized to improve the process of implementation. This paper examines health IT implementation processes and identifies a beginning set of implementation best practices, which could begin to address gaps in the health IT implementation body of knowledge.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents findings from an empirical study of key aspects of the teaching and research priorities, beliefs and behaviours of 72 professorial and associate professorial academics in Science, Information Technology and Engineering across four faculties in three Australian universities. The academics ranked 16 research activities and 16 matched learning and teaching (L&T) activities from three perspectives: job satisfaction, role model behaviour and perceptions of professional importance. The findings were unequivocally in favour of research in all three areas and remarkably consistent across the universities. The only L&T activity that was ranked consistently well was 'improving student satisfaction ratings for teaching', an area in which academics are increasingly held accountable. Respondents also indicated that their seniors encourage research efforts more than L&T efforts. Recommendations include that higher education rewards for quality L&T are maintained or improved and that recognition of L&T research domains is further strengthened.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: To understand the journey of advanced prostate cancer patients for supporting development of an innovative patient journey browser. Background: Prostate cancer is one of the common cancers in Australia. Due to the chronic nature of the disease, it is important to have effective disease management strategy and care model. Multi-disciplinary care is a well-proven approach for chronic disease management. The Multi-disciplinary team (MDT) can function more effectively if all the required information is available for the clinical decision support. The development of innovative technology relies on an accurate understanding of the advanced prostate cancer patient’s journey over a prolonged period. This need arises from the fact that advanced prostate cancer patients may follow various treatment paths and change their care providers. As a result of this, it is difficult to understand the actual sources of patient’s clinical records and their treatment patterns. The aim of the research is to understand variable sources of clinical records, treatment patterns, alternative therapies, over the counter (OTC) medications of advanced prostate cancer patients. This study provides better and holistic understanding of advanced prostate cancer journey. Methods: The study was conducted through an on-line survey developed to seek and analyse the responses from the participants. The on-line questionnaire was carefully developed through consultations with the clinical researchers at the Australian Prostate Cancer Research Centre-Queensland, prostate cancer support group representatives and health informaticians at the Australian e-Health Research Centre. The non-identifying questionnaire was distributed to the patients through prostate cancer support groups in Queensland, Australia. The pilot study was carried out between August 2010 and December 2010. Results: The research made important observations about the advanced prostate cancer journey. It showed that General Practitioner (GP) was the common source of patient’s clinical records (41%) followed by Urologist (14%) and other clinicians (14%). The data analysis also showed that selenium was the common complementary supplement (55%) used by the patients and about 48% patients did not use any OTC drugs. The most common OTC used by the patients was Paracetamol (about 45%). Conclusion: The results have provided a foundation to the architecture of the proposed technology solution. The outcomes of this study are incorporated in design of the proposed patient journey browser system. A basic version of the system is currently being used at the advanced prostate cancer MDT meetings.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Almost half of all game players are now women. However, women only represent a small proportion of game developers. There is a lack of previous research to suggest why women don't pursue careers in games and how we can attract more women to the industry. In this paper, we investigate the issues and barriers that prevent women from entering the games industry, as well as the solutions and steps that can be taken to attract more women to the industry. We draw on the lessons learned by the information technology industry and report on a program of events that was conducted at the Queensland University of Technology in 2011. These events provided some insight into the issues surrounding the lack of women in the games industry, as well as some initial steps that we can take as an industry to attract and support more female developers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this research paper, we study a simple programming problem that only requires knowledge of variables and assignment statements, and yet we found that some early novice programmers had difficulty solving the problem. We also present data from think aloud studies which demonstrate the nature of those difficulties. We interpret our data within a neo-Piagetian framework which describes cognitive developmental stages through which students pass as they learn to program. We describe in detail think aloud sessions with novices who reason at the neo-Piagetian preoperational level. Those students exhibit two problems. First, they focus on very small parts of the code and lose sight of the "big picture". Second, they are prone to focus on superficial aspects of the task that are not functionally central to the solution. It is not until the transition into the concrete operational stage that decentration of focus occurs, and they have the cognitive ability to reason about abstract quantities that are conserved, and are equipped to adapt skills to closely related tasks. Our results, and the neo-Piagetian framework on which they are based, suggest that changes are necessary in teaching practice to better support novices who have not reached the concrete operational stage.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent research from within a neo-Piagetian perspective proposes that novice programmers pass through the sensorimotor and preoperational stages before being able to reason at the concrete operational stage. However, academics traditionally teach and assess introductory programming as if students commence at the concrete operational stage. In this paper, we present results from a series of think aloud sessions with a single student, known by the pseudonym “Donald”. We conducted the sessions mainly over one semester, with an additional session three semesters later. Donald first manifested predominately sensorimotor reasoning, followed by preoperational reasoning, and finally concrete operational reasoning. This longitudinal think aloud study of Donald is the first direct observational evidence of a novice programmer progressing through the neo-Piagetian stages.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this paper is to empirically examine the state of cloud computing adoption in Australia. I specifically focus on the drivers, risks, and benefits of cloud computing from the perspective of IT experts and forensic accountants. I use thematic analysis of interview data to answer the research questions of the study. The findings suggest that cloud computing is increasingly gaining foothold in many sectors due to its advantages such as flexibility and the speed of deployment. However, security remains an issue and therefore its adoption is likely to be selective and phased. Of particular concern are the involvement of third parties and foreign jurisdictions, which in the event of damage may complicate litigation and forensic investigations. This is one of the first empirical studies that reports on cloud computing adoption and experiences in Australia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Several websites utilise a rule-base recommendation system, which generates choices based on a series of questionnaires, for recommending products to users. This approach has a high risk of customer attrition and the bottleneck is the questionnaire set. If the questioning process is too long, complex or tedious; users are most likely to quit the questionnaire before a product is recommended to them. If the questioning process is short; the user intensions cannot be gathered. The commonly used feature selection methods do not provide a satisfactory solution. We propose a novel process combining clustering, decisions tree and association rule mining for a group-oriented question reduction process. The question set is reduced according to common properties that are shared by a specific group of users. When applied on a real-world website, the proposed combined method outperforms the methods where the reduction of question is done only by using association rule mining or only by observing distribution within the group.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The enabling role of Information technology (IT) makes it a critical resource to invest in to achieve higher economic growth. Consequently, the pervasive use of IT amongst organizations in developing countries is gaining rapid momentum. Today, IT is no longer a support tool; it is a strategic asset that fosters sustainable competitive advantage and a driver for improved business performance. At the national level, the effective use of IT drives economic performance and social transformation. This makes IT resources a revolutionizing mechanism that is capable of bringing efficiency to all levels of the economy. But, evolution in IT is occuring at a very rapid pace. Despite the many opportunities that arise from these new developments, there is a growing concern that such rapid innovations can be detrimental to the environment. This situation puts a critical question on the table – Is Your IT Green?

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction When it comes to sustainable economic development, it is hard to go past the thought of investment in information technology (IT). The foundation of sustainable economic development is sustainable infrastructure. This situation means that investment in IT is about developing sustainable IT infrastructure. An IT infrastructure is a set of IT tools on which organisations could develop applications to manage their varying business processes. At a national economic level, this is all about developing a national IT infrastructure to provide social and economic services to the various stakeholders. Current troubling economic times call for collaboration and centrality in IT infrastructure development. This notion has led to the idea of national broadband networks, sustainable telecommunication platforms, and national IT development plans and goals. However, these thoughts and actions do not directly impact the critical social and economic processes of organisations. That is, these thoughts set the tone and direction of actions

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A Remote Sensing Core Curriculum (RSCC) development project is currently underway. This project is being conducted under the auspices of the National Center for Geographic Information and Analysis (NCGIA). RSCC is an outgrowth of the NCGIA GIS Core Curriculum project. It grew out of discussions begun at NCGIA, Initiative 12 (I-12): 'Integration of Remote Sensing and Geographic Information Systems'. This curriculum development project focuses on providing professors, teachers and instructors in undergraduate and graduate institutions with course materials from experts in specific subject matter for areas use in the class room.