748 resultados para teaching in information technology
Resumo:
This paper introduces the findings of a recent study on the use of information technology (IT) among the quantity surveying (QS) organisations in Hong Kong. The study was conducted through a structured questionnaire survey among 18 QS organisations registered in Hong Kong, representing around 53% of the total number of organisations in the profession. The data set generated from this study provided rich information about what information technology the QS profession used, what the perceived benefits and barriers experienced by the users in the industry were. The survey concluded that although IT had been widely used in QS organisations in Hong Kong, it is mainly used to support various individual tasks of the QS services at a basic level, rather than to streamline the production of QS services as a whole through automation. Most of the respondents agreed that IT plays an important role in the QS profession but they had not fully taken advantage of IT to improve their competitive edge in the market. They usually adopted a more passive “wait and see” approach. In addition, very few QS organisations in Hong Kong have a comprehensive policy in promoting the use of IT within the organisations. It is recommended that the QS profession must recognise the importance of IT and take appropriate actions to meet the challenges of ever-changing and competitive market place.
Resumo:
This article describes work undertaken by the VERA project to investigate how archaeologists work with information technology (IT) on excavation sites. We used a diary study to research the usual patterns of behaviour of archaeologists digging the Silchester Roman town site during the summer of 2007. Although recording had previously been undertaken using pen and paper, during the 2007 season a part of the dig was dedicated to trials of IT and archaeologists used digital pens and paper and Nokia N800 handheld PDAs to record their work. The goal of the trial was to see whether it was possible to record data from the dig whilst still on site, rather than waiting until after the excavation to enter it into the Integrated Archaeological Database (IADB) and to determine whether the archaeologists found the new technology helpful. The digital pens were a success, however, the N800s were not successful given the extreme conditions on site. Our findings confirmed that it was important that technology should fit in well with the work being undertaken rather than being used for its own sake, and should respect established work flows. We also found that the quality of data being entered was a recurrent concern as was the reliability of the infrastructure and equipment.
Resumo:
Objective To undertake a process evaluation of pharmacists' recommendations arising in the context of a complex IT-enabled pharmacist-delivered randomised controlled trial (PINCER trial) to reduce the risk of hazardous medicines management in general practices. Methods PINCER pharmacists manually recorded patients’ demographics, details of interventions recommended, actions undertaken by practice staff and time taken to manage individual cases of hazardous medicines management. Data were coded and double entered into SPSS v15, and then summarised using percentages for categorical data (with 95% CI) and, as appropriate, means (SD) or medians (IQR) for continuous data. Key findings Pharmacists spent a median of 20 minutes (IQR 10, 30) reviewing medical records, recommending interventions and completing actions in each case of hazardous medicines management. Pharmacists judged 72% (95%CI 70, 74) (1463/2026) of cases of hazardous medicines management to be clinically relevant. Pharmacists recommended 2105 interventions in 74% (95%CI 73, 76) (1516/2038) of cases and 1685 actions were taken in 61% (95%CI 59, 63) (1246/2038) of cases; 66% (95%CI 64, 68) (1383/2105) of interventions recommended by pharmacists were completed and 5% (95%CI 4, 6) (104/2105) of recommendations were accepted by general practitioners (GPs), but not completed at the end of the pharmacists’ placement; the remaining recommendations were rejected or considered not relevant by GPs. Conclusions The outcome measures were used to target pharmacist activity in general practice towards patients at risk from hazardous medicines management. Recommendations from trained PINCER pharmacists were found to be broadly acceptable to GPs and led to ameliorative action in the majority of cases. It seems likely that the approach used by the PINCER pharmacists could be employed by other practice pharmacists following appropriate training.
Resumo:
This paper describes the development of a new approach to the use of ICT for the teaching of courses in the interpretation and evaluation of evidence. It is based on ideas developed for the teaching of science to school children, in particular the importance of models and qualitative reasoning skills. In the first part, we make an analysis of the basis of current research into “evidence scholarship” and the demands such a system would have to meet. In the second part, we introduce the details of such a system that we developed initially to assist police in the interpretation of evidence.
Resumo:
Includes bibliography
Resumo:
This paper examines the current level of adoption of Supply Chain Management (SCM) practices in the electro-electronic sector in Brazil and aims to identify the management and Information Technology (IT) actions that have been implemented to support the adoption of those practices. An e-mail survey was conducted. Descriptive statistics techniques were employed for data analysis. This study makes contributions to the electro-electronics sector and to the topics related to SCM, such as identifi cation and level of adoption of SCM practices. Another contribution of this research is the investigation of whether approaches such as Enterprise Resources Planning (ERP), Workshop with Customers, Electronic Data Interchange (EDI), Workshop with Suppliers and electronic Kanban are commonly used to support SCM practices. So far, this is the fi rst research on SCM practices in the electro-electronics sector in Brazil. Copyright © 2012 Inderscience Enterprises Ltd.
Resumo:
Includes bibliography
Resumo:
Includes bibliography
Resumo:
The objective of this report is to understand the rationality that underpins public and business policies for promoting the IT and SIS industries and to determine whether they incorporate gender equality and/or provide incentives for women’s participation. The report also explores how this group of women is symbolically constructed within the firms, what issues are emphasized by the women themselves and what solutions or resources they propose for overcoming the problems. It then contrasts this discourse and intervention with the experiences, visions and demands of women leaders in the SIS sector. For this purpose, the policies, programmes and best practices of Europe are analysed and compared with instruments currently in place in Latin America and the Caribbean, in terms of their specific characteristics and degree of progress. Special attention is given to the cases of Argentina, Costa Rica and Colombia.
Resumo:
UNATI (Open University of the Third Age), UNESP, Marília campus, has offered subsidies for the development of this work aimed at researching the existing relationships between information mediation processes and technological devices, especially computers, assuming that reading practices and textual construction in online environments could help the “third age” population to have access to these devices, thus promoting digital inclusion in this group. Mediation was presented as an interventionist action that, by introducing an intermediate element in the learning process, causes a rupture in the ways of living and personal digital inclusion processes hitherto experienced. In the context of a workshop, we found out that there is a physical relationship between subjects and technological supports and such a contact proved to be necessary, considering that handling a computer required knowledge of procedures, thus furthering a logic of use. It turned out to be necessary to develop actions that would enable the handling of a computer so as to bring about acceptance of these supports. Accordingly, activities were developed so as to articulate reminiscent processes, memories of older adults, the writing down of such memories and the creation of a blog to bring enhanced visibility to the content produced by older people. Such actions have shown that remembering, writing down and posting can reshape not only social relations but somehow significantly promote digital inclusion among older adults.
Resumo:
Chapter 1 studies how consumers’ switching costs affect the pricing and profits of firms competing in two-sided markets such as Apple and Google in the smartphone market. When two-sided markets are dynamic – rather than merely static – I show that switching costs lower the first-period price if network externalities are strong, which is in contrast to what has been found in one-sided markets. By contrast, switching costs soften price competition in the initial period if network externalities are weak and consumers are more patient than the platforms. Moreover, an increase in switching costs on one side decreases the first-period price on the other side. Chapter 2 examines firms’ incentives to invest in local and flexible resources when demand is uncertain and correlated. I find that market power of the monopolist providing flexible resources distorts investment incentives, while competition mitigates them. The extent of improvement depends critically on demand correlation and the cost of capacity: under social optimum and monopoly, if the flexible resource is cheap, the relationship between investment and correlation is positive, and if it is costly, the relationship becomes negative; under duopoly, the relationship is positive. The analysis also sheds light on some policy discussions in markets such as cloud computing. Chapter 3 develops a theory of sequential investments in cybersecurity. The regulator can use safety standards and liability rules to increase security. I show that the joint use of an optimal standard and a full liability rule leads to underinvestment ex ante and overinvestment ex post. Instead, switching to a partial liability rule can correct the inefficiencies. This suggests that to improve security, the regulator should encourage not only firms, but also consumers to invest in security.