574 results
Search Results
2. THE INTERNET AS A SOURCE FOR DOCUMENTING ACADEMIC PAPERS.
- Author
-
IONIŢĂ, Mirela and ASAN, Doina
- Subjects
INTERNET in education ,REFERENCE sources ,UNDERGRADUATES ,INFORMATION resources ,VIRTUAL reality - Abstract
The starting point for our paper is a stereotype that is still true of the academic environment, stressing the pre- eminence of books in the process of gathering reference material. Some experts even advise resorting to online resources only after all the traditional ways of documenting a topic have been exhausted. In practice, these approaches prove to be superannuated, as even the most conservative fields of knowledge have shown interest in what the internet has to offer. The way undergraduate students usually gather supporting documentation shows that most scientific papers can be drawn up at an acceptable level by resorting uniquely to online resources. In this paper we are going to examine the way of doing effective documenting work, but we will also shift the focus on some practical aspects, and analyze the right approach to quoting internet sources. Researching bibliographical sources is important in the students' scientific activity, since each statement within a scientific text must be accounted for. The purpose of documenting a topic is to identify those sources of information that prove useful both in the structuring of the theoretical framework of any paper, and in providing the scientific basis for practical applications. All the theoretical premises in the literature in the field must be indicated in all honesty, so that any reader can identify them , and any suspicion of plagiarism is ruled out. We will review the principles of documenting, focusing on those which aim the subject matter, objectives, directions, and methods of doing documenting work, particularly with reference to online sources . We will show what the differences in approach consist in, when we no longer do research in libraries, but look for information by exploiting the inexhaustible potential of the virtual environment. In addition, we will uncover some of the tricks that can be used in order to make more effective the results of search engines, and we will also give some tips on the credibility, and opportune times of various categories of online documenting resources. If the information provided by the internet has proven useful, and been organically integrated within the body of the paper, then it will have to be acknowledged in the critical apparatus of any scientific text. The ways of recording online sources differ from those used for classical bibliographical resources, only to the extent that there is no counterpart in the printed format, no matter which of the standard quotation systems has been chosen. Taking into account the ever growing trend towards using online resources as sources of information for research and documentation in a formative education system, the present paper has a pronounced practical character. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
3. ORGANIZATIONAL COMMUNICATION AND INFORMATION SYSTEMS Conference Paper Abstracts.
- Subjects
ORGANIZATIONAL communication ,ORGANIZATION ,INFORMATION resources ,ABSTRACTS ,COMMERCIAL products ,INFORMATION resources management ,TEAMS in the workplace ,ORGANIZATIONAL behavior - Abstract
This section presents various conference paper abstracts on organizational communication and information systems, including a study of the processes that lead to success or failure in teams with functional heterogeneity, an investigation of conflict, its antecedents and its effect that fester longer and resist resolutions, and an evaluation of how community organizing dimensions may impact product and service innovation and commercialization.
- Published
- 2004
- Full Text
- View/download PDF
4. E-BOOK, MODERN FORM OF DOCUMENT STORAGE AND COMMUNICATION.
- Author
-
SERBAN, Mihai and SERBAN, Ionica
- Subjects
ELECTRONIC books ,INFORMATION resources ,SOCIAL development ,ACCESS to information ,PAPER industry - Abstract
Undoubtedly writing contributed to the perception of history from other perspectives. Starting from clay tablets from Summer or Tartaria and until so known editing programs for today's format text , the writing was obviously the most important form of communication of ideas, concepts and theories. One of the most popular concepts to which we refer when we refer to writing, is the book. Books were for centuries the only means of passing on information, regardless of their(religious, scientific, etc..), reflecting their technological evolution of humankind. Therefore, long time, books were written by hand, and then they have multiplied copyists. But the invention of printing (in Europe around 1450, China and Korea it was known long before), the flow of information has been simplified and books have become an accessible element for public, more than hitherto. There was a long pause in the evolution of the concept book that has remained virtually unchanged, despite the fact that printing technology has changed radically. The so-called break ended a few years ago, because books have entered in a new stage of development -the electronic book or eBook. This is the digital version of a work (either already existing in print or broadcast only in digital format) the version whose content can be viewed either through a computer or through other devices that allow the compatibilization of the systems. Several centuries the printing on led to accelerating evolution of the process of social development. This required a rapid and massive development of paper-making industry which led to the emergence and overcome of serious environmental problems. In efforts to replace paper, the technique successfully identified substitutes: radio, television, teletext, fax, computers, Internet, magnetic or optical supports, microfilms and photographs. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
5. TECHNOLOGY & INNOVATION MANAGEMENT Conference Paper Abstracts.
- Subjects
MANAGEMENT ,TECHNOLOGICAL innovations management ,HIGH technology industries ,KNOWLEDGE management - Abstract
The article presents abstracts on technology and innovation management topics which include the way modularity works in real world organizations, the effect of external learning on radical innovation in the high-technology industry, and the organizational antecedents and consequences of absorbing technological knowledge.
- Published
- 2010
- Full Text
- View/download PDF
6. “Sem livros não há instrução”: Literatura contabilística portuguesa do século XVIII (Identificação, novos dados e síntese).
- Author
-
Gonçalves, Miguel, Duarte, Cecília, and Góis, Cristina
- Subjects
HISTORY of accounting ,EIGHTEENTH century ,PORTUGUESE history ,INFORMATION resources ,MERCHANTS - Abstract
Copyright of International Conference on Applied Business & Management is the property of ISAG: European Business School and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
7. Image steganography using reversible data hiding approach.
- Author
-
Subramanian, Poorani, Santhanam, Swetha, and Karunanithi, Harilatha
- Subjects
REVERSIBLE data hiding (Computer science) ,CRYPTOGRAPHY ,CRYPTOCURRENCIES ,INFORMATION resources - Abstract
Image steganography is technique which is used to hide information like audio, image, or text in an image or video. Reversible-Data-Hiding (RDH) approach is the extensively used approach for image steganography where data can be implanted in images and then the actual data can be retrieved by pulling out the concealed data from the respective image. In this paper we propose the image steganography technique based on reversible texture-synthesis method. Reversible data hiding is used for embedding clandestine communication into a wrap image. In this paper, the input image used is relative to the dimension of crypto-texture image for its entrenching ability. An index table is generated to divide the image into patches and store it in a matrix format. Patch based texture combination assists in maintaining the eminence of the image. This permits us to extort the furtive information and source surface from a crypto mock surface. The message is embedded inside the blank workbench based on the index table. In the receiving side, receiver can extract original message by reversing the above process. Investigational results confirm that the proposed algorithm can afford improved concert in image steganography. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
8. Prevention and Detection of Plagiarism in Elaboration of Bachelor's Work by Students.
- Author
-
MITREA, Ioan
- Subjects
ELECTRONIC books ,PLAGIARISM prevention ,BIBLIOGRAPHIC databases ,SOFTWARE development tools ,STREAMING video & television ,INFORMATION resources ,COLLEGE environment - Abstract
This paper describes the ways of preventing and detecting plagiarism in the contemporary time among students in the licensing process (in which online we take more time and resources than offline, traditional books and magazines in a printed form on paper). How can we deal with the current challenges of the tendency of plagiarism and how we can show originality in everything we do, even when we "post on the wall" online. First of all, avoiding plagiarism is achieved by honestly acknowledge the contribution of the author (s) who formed the basis of inspiring your own creation, and this can be achieved through the proper use of existing citation methods. Therefore, we intend to present the advantages and disadvantages of different citation styles of information sources used by students, including: APA Style, MLA Style, Chicago Style, Turabian Style, ISO 690 Style; as well as citation methods, namely: citations in the text, page footers, bibliographic references, web publications, online video, etc. And last but not least, we present software tools to support and simplify the release of information sources, including: EndNote, Reference manager; those with open access and those for a fee. One of the greatest benefits of globalization is to simplify and facilitate access to information and automatically identify student plagiarism in the elaboration of the licenses works. Identifying plagiarism through various software continues to challenge IT specialists in close collaboration with the university environment. This goal desires to eliminate as far as possible the plagiarized works and to open the gates of the original authors through the contribution to knowledge. Romanian universities have begun to grasp the need to align with global university education, and as a result of various exchanges of experiences, they have begun to test and even acquire various software to identify and prevent plagiarism among students. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
9. Modeling and optimization of information resources in aerospace systems.
- Author
-
Lvovich, Igor, Lvovich, Yakov, Preobrazhenskiy, Andrey, and Preobrazhenskiy, Yuriy
- Subjects
INFORMATION modeling ,INFORMATION resources ,DECISION making ,PERFORMANCE management - Abstract
The paper discusses the features of managing aerospace systems, taking into account the improving management performance. In the aerospace system, there are two levels - for making decisions and collecting information. To make a management decision, an appropriate amount of information is required. These restrictions are related to the management of activities, computing resources, time expenditures, and the guaranteed amount of information. It is shown how the selection procedure for the best option and the implementation of the solution to the dual problem are implemented. When using an aerospace system associated with the collection of information, there are opportunities to determine the optimal parameters. The results of the paper are useful for using in the management of aerospace systems while making the procedures of control. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
10. Information Use in Group Decision Making Teams.
- Author
-
Lu Xiao and Eastmure, Vanessa
- Subjects
PUBLICATIONS ,INFORMATION resources ,DECISION making ,RESEARCH ,INFORMATION sharing - Abstract
We reviewed 22 papers to identify the most prominently studied factors related to information use in group decision making processes and explore the research gaps in this topic. We identified eight main factors of information use in the process: sense of group identity and group diversity, group heterogeneity or homogeneity, task perception, and personality/individual viewpoints; and access to information, argument analysis, communication medium, and decision rule. Our literature review suggested several research directions: investigations of the members' motivations in sharing information; studies that use mixed research methods to examine a topic; and exploration of various information sharing and use modes besides verbal and written information channels. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
11. PERSONALIZING VIRTUAL REALITY EXPERIENCES FOR RESIDENTS IN AGED CARE HOMES: LESSONS FROM A CASE STUDY.
- Author
-
Thach, Kong Saoane, derman, Reeva Le, and Waycott, Jenny
- Subjects
VIRTUAL reality ,ELDER care ,RESIDENTS (Medicine) ,INFORMATION resources ,DIGITAL technology - Abstract
Virtual Reality (VR) has been increasingly adopted in residential aged care facilities (RACFs) for enriching residents' experience. Previous research has indicated that VR experiences can be especially valuable when they are personalized - that is, tailored to individual interests and circumstances. However, resources guiding how personalized VR experiences should be introduced in RACFs are limited. This paper reports an in-depth case study with a care assistant working across RACFs, who has significant experience in introducing personalized VR for people with dementia. The paper provides insights into vital steps in introducing personalized VR, using available information sources and the opportunities and challenges brought about by this approach for this population. Findings reveal that personalized VR should be introduced with respect and care. However, this could create tension for staff facilitating VR activities in resource-stretched aged care organizations. This paper identifies opportunities for designing systems to make personalized VR more effective in RACFs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
12. Automated information collection for thematic interpretation of a Quranic term.
- Author
-
Abu Safiya, Majed
- Subjects
INFORMATION resources ,REFERENCE books ,DATA mining ,THEMATIC mapper satellite ,COLLECTIONS - Abstract
Thematic interpretation of Quran is a new approach to Quranic interpretation where a holistic view of a Quranic term is explored and characterized. Such interpretation requires extensive collection of information from a large number of book references. Luckily, these references are freely and widely available on the web, which opens the door for automated information extraction. In this paper, an automated collection of information from these sources is investigated and implemented to ease the thematic interpretation process. Information sources that are considered in this research are (1) electronic files of these books and (2) websites that host the contents of these books in a structured searchable manner. The main contribution of this paper is that it shows by example that this automation can be easily implemented. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. Historical Narrative in Contemporary Blogger Practices vs History Textbook.
- Author
-
Tokareva, Elena A.
- Subjects
NARRATIVES ,HISTORY textbooks ,BLOGGERS ,INFORMATION resources ,PUBLIC sphere - Abstract
Introduction. This paper continues to explore the characteristics of contemporary blogosphere, which has become one of the ways to spread historical knowledge. Blog creators have become direct participants in the formation of our country's history. The purpose of this paper is to examine the ways in which history is presented on contemporary websites, on blogs, and the features of presenting history in contemporary school textbooks. The focus on education in the study of blogs on historical subjects is necessary and topical: historical narrative is embedded in the public space, including the Internet, which is a more attractive source of information for modern schoolchildren than books. Results. There are anonymous blogs on the Internet whose creators claim that their content is historical. The content of such resources is of course not related to public history. Narrative of public history is linked to collective memory, to history as academic discipline, and has a fundamental historical significance. In a modern history textbook linear historical narrative is fragmented into separate stories by means of a special design; an attempt has been made to create the situation of getting information in a way familiar to the individual with fragmented thinking. Direct participation of professional historians in the creation of public history, its development, including the information and telecommunication network of the Internet will reduce the threat of chaotic development of public history, will significantly improve the quality of the historical narrative in the public sphere, will make modern blogs and history textbooks mutually complementary ways of presenting history. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
14. Video based human activities recognition using deep learning.
- Author
-
Roubleh, A. A., Khalifa, O. O., Shariffudin, Shafinaz Sobihana, Herman, Sukreen Hana, and Hashim, Hashimah
- Subjects
HUMAN activity recognition ,DEEP learning ,COMPUTER vision ,MOTION capture (Human mechanics) ,HUMAN behavior ,INFORMATION resources - Abstract
Human activities recognition from motion capture data is a challenging problem in the computer vision due to the fact that, in various human activities, different body components have distinctive characteristics in terms of the moving pattern. In this paper, a learning method of detecting an activity from different angles based on various sources of information is proposed. with high accuracy. The bottom up approach is used in OpenPose which is the tool used in this paper's experiments. The proposed method achieves promising results on Berkeley Multimodal Human Action Database (MHAD) datasets at 98% accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
15. The GreyLit Report: Understanding the Challenges of Finding Grey Literature.
- Author
-
Aloia, Danielle and Naughton, Robin
- Subjects
GREY literature ,SCIENTIFIC community ,PUBLIC health research ,INFORMATION resources ,MEDICAL sciences - Abstract
Searching for and finding grey literature can be difficult. Grey literature, by its nature, is not commercially published and as a result, it requires multiple search strategies to identify and curate quality literature on a subject. Our study into how researchers share grey literature (Aloia and Naughton, 2015) found that researchers speak with colleagues, subscribe to listservs/newsletters, and go to organization websites to find current grey literature. In order to better understand the needs of the health sciences research community, we interviewed GreyLit Report users about their challenges, tools and methods for finding grey literature. The Grey Literature Report (GreyLit Report), developed in 1999 by The New York Academy of Medicine, is a centralized location that makes it easier for health researchers to find grey literature in their field. Speaking directly to librarians and researchers about their needs helped us to better understand how the GreyLit Report website can be enhanced to respond to those needs. Over the course of a week, we conducted online interviews with national and international users of the GreyLit Report. Based on this study, the researchers learned how the GreyLit Report can be enhanced to better serve the grey literature community and add to the growing need for a centralized location to find grey literature. In addition, the paper provides a template for planning and reporting of grey literature searches based on extensive analysis of the research literature. [ABSTRACT FROM AUTHOR]
- Published
- 2016
16. Comparison of accuracy for conditional random field algorithm and multilayer perceptron in pathological voice detection.
- Author
-
Mukhey, J. Y., Logu, K., and Ramasenderan, N.
- Subjects
INFORMATION resources ,RESPECT ,ARTIFICIAL intelligence ,EXHIBITIONS ,HUMAN voice - Abstract
The point of this study is to create and analyze the exhibition of two different AI calculations for the discovery of obsessive voices on medical services frameworks and virtual entertainment applications. The dataset utilized in this paper is the Pathology Voice Identification Values dataset, which incorporates 41,090 preparation voice documents. In this review, the dataset is alluded to as the Voice Discovery dataset. The information source connection can be gotten to from ("Kaggle" 2022) site. Two gatherings were utilized in this article for execution. Bunch 1 is the Restrictive Irregular Field calculation and Gathering 2 is the Multi-facet Perceptron calculation. The example size is determined utilizing G power 80% for two gatherings and there are 20 examples utilized in this work for every one of the calculations. The CRF acquired an exactness of (80.50%) when contrasted with Multi-facet Perceptron with a precision of (71.26%). The importance esteem between the two gatherings is p=0.000 (Autonomous Example T-test p<0.05). The CRF calculation acquired higher exactness with 80.50% when contrasted with the Multi-facet Perceptron calculation with 71.26%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Implementation of simple K-medoids in high schools clustering based on quality of resources for computer-based national assessment readiness.
- Author
-
Irsalina, Syafira, Kariyam, and Dini, Sekti Kartika
- Subjects
COMPUTERS in education ,HIGH schools ,INFORMATION technology ,PREPAREDNESS ,INFORMATION resources ,HUMAN resources departments - Abstract
The computer-based national assessment (ANBK) is a program for assessing the quality of the school, including the high secondary level formal education pathway. This paper will discuss the clustering of 165 high schools in Yogyakarta province based on 13 components of human resources and information technology quality for ANBK readiness. The optimal number of clusters is two groups according to the silhouette index and medoid shadow value. Implementing the simple k-medoids algorithm with Gower distance for mixed data, namely binary, ordinal, and numerical, placed the 83 high schools in the same group. The cluster of 83 schools has excellence in teacher and student numbers, compatibility with computer specifications, bandwidth, switch hubs and Wi-Fi readiness. The public school also dominates this group with accredited level A, and the mode of independent IT is semi-online with electricity from state companies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Information systems of resource planning.
- Author
-
Plakhin, A., Ogorodnikova, E., and Khokholush, M.
- Subjects
INFORMATION storage & retrieval systems ,INFORMATION resources ,ENTERPRISE resource planning ,INDUSTRIAL costs ,FACTOR analysis ,MANUFACTURING industries - Abstract
The relevance of the paper is due to the need for theoretical understanding of the formation of resource planning systems, their evolution and the possibility of using them for the purposes of modern industrial enterprises. The results of the study show that in Russian practice, the level of use of resource planning systems does not exceed thirty percent for manufacturing industries. The data of the dynamics analysis of the implementation of resource planning systems show that the largest increase in the use of Russian enterprises occurred in 2018, which is explained by the growth in the informatization costs of industrial enterprises. A review of studies on the analysis of factors stimulating the growth of the implementation of resource planning systems showed that the main factor is the availability of highly qualified personnel, which is explained by the complexity of the current use of systems. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. A comparative study on web page ranking algorithms.
- Author
-
Sharma, Sachin and Jain, Vinod
- Subjects
WEBSITES ,INVISIBLE Web ,WEB search engines ,ALGORITHMS ,HYPERLINKS ,SEARCH engines ,INFORMATION resources - Abstract
The Internet is the source of information that first comes to mind for a large number of people today. Over the years the size of the internet has significantly increased. While the size of the surface web is estimated to be over fifty billion web pages, the deep web, on the other hand, is estimated to be more than thrice it's size. While it's impossible to list every URL that has ever existed or go through it for a single user, it is also highly inefficient to apply brute force while going through it. Search engine ranking algorithms are the tools that help the user reach the relevant content based upon their respective queries. While search engines can randomly pick the web URLs by just comparing the titles orsome random words, it's not recommended as not only is it unfair, it can also lead to performance issues, getting irrelevant data, but also a huge security threat and waste of the user's precious time. What's relevant today might just become irrelevant tomorrow. Not only that but also we can't use human employees to verify every web page either. Various search engine ranking algorithms come into play here and help the users to get the relevant information based on various factors like hyperlinks, popularity, distance between pages, relevance, compatibility, time etc. In the given paper we compare several such algorithms to find out their limitations and advantages that can help us in further research of relevant and more efficient web page ranking algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. Making Your Way Through Grey: Metadata, MARC and User Tools.
- Author
-
Cooke, Meagan and Costigan, Sean S.
- Subjects
METADATA ,GREY literature ,INFORMATION organization ,DATABASES ,PUBLICATIONS ,INFORMATION resources - Abstract
Columbia International Affairs Online (CIAO) is the largest online collection of grey literature on international relations. Online since 1997, CIAO has grown to encompass both grey literature and published materials from over 200 contributing institutions. Currently the database contains over 10,000 papers and, as with anything of this magnitude, the challenge is not only continued growth in terms of content aggregation but also achieving successful user experiences and wider integration with other services. Our metadata is based on a small, controlled vocabulary that was developed in-house over the lifetime of the service. Pursuing an overhaul of CIAO's metadata for improved consistency has allowed for finer granularity in search results while also creating opportunities for the deployment of citation tools and rich cross-linking. In addition, the development of MARC records will allow for further integration with library resources and OPACs. This paper will discuss the impetus for the development of user and contextualization tools and our experiences in creating them. [ABSTRACT FROM AUTHOR]
- Published
- 2005
21. Collaborative Filtering Enhanced by Demographic Information for Tourist Sites Recommendations.
- Author
-
Febre, Luis, Valdiviezo-Diaz, Priscila, and Reátegui, Ruth
- Subjects
RECOMMENDER systems ,INFORMATION overload ,TOURISM ,DATA extraction ,INFORMATION resources - Abstract
Recommender systems are very applicable in the tourism domain to alleviate the information overload problem. These systems are being developed to help tourists find sites and services that are of interest to them. To promote tourism in a city, this paper presents an enhanced user-based collaborative filtering approach with demographic information for recommending touristic sites, which provides precise recommendations. The collaborative filtering approach recommends touristic sites considering two user types: new tourist and registered tourist. In this way, the recommendations of tourist sites are generated according to the user's historical rating or based on the user's demographic information. The approach is evaluated on a tourist sites dataset extracted from the TripAdvisor platform that contains historical ratings, and demographic information of the tourist. To measure the performance of the proposed approach, RMSE is used to evaluate predictions accuracy, and Precision and Recall measures to evaluate the quality of recommendations. The results showed an improvement in the prediction accuracy and a significant performance with precision and recall, especially in the presence of the cold-start problem. [ABSTRACT FROM AUTHOR]
- Published
- 2022
22. State of the art in Game Based Learning: Dimensions for Evaluating Educational Games.
- Author
-
Tahir, Rabail and Wang, Alf Inge
- Subjects
EDUCATIONAL games ,META-analysis ,INFORMATION resources ,RESEARCH personnel ,EDUCATIONAL technology - Abstract
An increased use of educational games makes it essential to verify these tools for a sound impact by evaluating them from multiple dimensions. This paper presents a Systematic Literature Review (SLR) on state of the art in Game based Learning (GBL) evaluation. Our research examines the current trends and evaluation practices based on data drawn from search in four open databases along with a manual search of 4 journals proceedings. The paper begins with the context for our study, followed by a depiction of the analysis grid that is used to generate a database of existing literature, and methodology adopted to conduct systematic review of this literature. From initial sample of 1929 articles, a total of 58 relevant articles were identified and further examined for the extent of research carried out in GBL evaluation, highlighting the research topics, type of resources, the highly-cited articles, and the existing evaluation approaches and criteria used for evaluation of GBL. It then analyses the selected studies for outlining the dimensions for evaluating educational games. The findings of this papers provide insights for researchers and evaluators into current trends, evaluation practices and multiple dimensions for which an educational game must be evaluated. [ABSTRACT FROM AUTHOR]
- Published
- 2017
23. Organizing Common Bean (Phaseolus vulgaris) Research: A Model for Information Resources Integration.
- Author
-
Shobhanee, Mahbub and Ram, Shri
- Subjects
COMMON bean ,INFORMATION resources ,INFORMATION science ,INFORMATION retrieval ,DATA management - Abstract
Common Bean (Phaseolus vulgaris L.) an essential nutrition source for protein and is quite common in the Indian subcontinent, China, Brazil, and the USA. Common Bean contains nutritional component which will contribute to the reduction of food scarcity worldwide in the coming years (Nadeem et al. 2021). In recent years, the research trends applying informatics techniques have given opportunities to harness genomic level information for better sequencing, generating a large volume of data. The data is generally being utilized for better crop production and improved varieties. The generated data are stored and developed as databases, web servers, publications, and patents. However, managing data in a helpful way is a challenge. This paper proposes a model for developing an integrated platform that comprehends various Common bean information. The proposed model shall provide curated information resources about Common Bean, facilitating the single platform access. The intended benefits can be visualized as the researcher can find all information in one place to showcase the progress of research taking place in this field. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. From Information to Knowledge Creation in the Archive: Observing Humanities Researchers' Information Activities.
- Author
-
Leigh, Alexandra, Makri, Stephann, Taylor, Alex, Mulinder, Alec, and Hamdi, Sarra
- Subjects
INFORMATION resources ,HUMANITIES ,THEORY of knowledge ,EMPIRICAL research ,SCHOLARS - Abstract
As primary sources, archival records are a unique information source at the very heart of humanities research. However, how humanities researchers move from information to knowledge creation by making meaning from archival records has not been the focus of previous empirical research. This is surprising, as creating new knowledge through (re)interpretation of records is a core motivation and outcome of humanities research; as representations of historical and social occurrences, archival records rely on researchers' interpretation of content, context, and structure to establish an 'archival' meaning of the record, before applying this meaning within their own work. Therefore, constructing knowledge from archival materials necessitates a dual process of knowledge creation to create novel insights from a hybrid interpretation of archival meaning and the researcher's own interests. This paper presents findings from a naturalistic empirical observation of 11 humanities researchers engaging in research at a national archive, centring on key information activities that facilitate knowledge creation from archival records: Scanning, Relating, Capturing and Organising. Through these activities, scholars integrate their research aims and objectives with archival meaning to generate new insights. Deeper understanding of the nature of knowledge creation in archives can benefit archivists, archive users and systems designers alike. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
25. Investigation of modular boring tool setups.
- Author
-
Maslov, Andrey Ruffovich and Tivirev, Evgeny Gennadievich
- Subjects
INFORMATION resources ,CUTTING tools ,FASTENERS - Abstract
In automated manufacturing, cutting process monitoring is vital, because without an operator, significant machine downtime associated with cutting tool failures is possible. The vibroacoustic signal parameters during cutting have long been used as a source of information about the cutting process state. This paper presents the results of the investigation of the spectral composition changes of vibrations over time during the cutting process due to changes in the quality of fastening of cutting inserts and modules of a modular boring tool setup with a large number of elements. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
26. Organizational bases of ensuring information security of the organization in the conditions of digitalization of the economy.
- Author
-
Agafonova, M. S., Shchegoleva, T. V., Volodina, N. L., Netyaga, N. N., and Osipov, A. A.
- Subjects
DIGITAL technology ,INFORMATION organization ,DIGITAL transformation ,INFORMATION superhighway ,INFORMATION technology security ,INFORMATION resources - Abstract
This paper discusses the concepts and organizational foundations of ensuring the information security of an organization in the context of the digitalization of the economy. The relevance of the study of the problem posed has been proved, since in modern realities there is a widespread introduction of information and software technologies. It is shown that the digital economy is one of the main directions of the strategic development of Russia - the digital transformation of various spheres of human life requires the most careful measures to ensure cybersecurity and protect the confidentiality of information resources. The role of the latest technologies for processing "big data", the implementation of high-tech solutions in order to ensure reliable, timely, long-term and safe storage of databases is clarified. It is shown that the modern information environment is unprecedented in terms of the presence of threats and risks that can manifest themselves in various forms; in this regard, it was proved that it is extremely important to timely and constantly identify and analyze emerging threats and risks, as well as ongoing changes in the information infrastructure. It was also proved that only with this in mind, it is possible to design and build an effective information security system based on the formation of an extensive information infrastructure that allows to provide timely and secure access to information that organizations need. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
27. Reframing the Role of Novelty within Social HRI: from Noise to Information.
- Author
-
Smedegaard, Catharina Vesterager
- Subjects
SOCIAL robots ,HUMAN-robot interaction ,SOCIAL interaction ,NOISE control ,INFORMATION resources - Abstract
Social robots, understood as the category of embodied robots extending into social domains through reciprocal social interaction, are still a practical novelty in most of these domains today. However, the phenomenon of novelty effects is only eclectically and peripherally addressed within most research into social human-robot interaction, and even when treated more extensively, it is usually framed as a source of noise in need of reduction. In this paper, I will argue a reframing of novelty effects that posits the phenomenon as a valuable source of information. In the first part of the paper, I present a tentative account of what I call experiential novelty in order to illustrate (1) that novelty should be understood as an 'original feature of experience', (2) that novelty arises in the engagement between an experiencer and an experience where the experiencer's possessed knowledge is inadequate in making sense of the experience, and (3) that novelty effects should be seen as cognitive and behavioural expressions of a 'search for meaning'. In the latter part of the paper, I discuss some of the current research lines within social human-robot interaction research from the perspective of this account of novelty. Most notably, I argue that retrospectively, the account holds explanatory utility in analyzing many of the findings in this research-field, and prospectively, the account holds generative utility in pointing to new ways in which participant experiences of novelty may be employed in research. [ABSTRACT FROM AUTHOR]
- Published
- 2019
28. Transitions and social interaction: Making sense of self and situation through engagement with others.
- Author
-
McKenzie, Pam and Willson, Rebekah
- Subjects
SOCIAL interaction ,INFORMATION-seeking behavior ,INFORMATION resources ,INFORMATION sharing ,GROUNDED theory - Abstract
This short paper examines social interaction (e.g. asking colleagues for help in the lunchroom) as an informative experience, a way to understand oneself and situation. The process of coming to an understanding is frequently hidden, but may be brought to light by examining the experiences of individuals undergoing a transition – a change that requires them to redefine their sense of self and situation. Using exemplars from previous research and drawing on Lave and Wenger's (1991) theory of situated learning, this paper explores the importance of social interaction to information practices. The role of social interaction will be discussed, including: information seeking to become part of a community, and social interaction as a source of information and as a site for information comparison (a type of information use) to situate oneself in a new environment. The paper proposes making social interaction a focus of study to better understand how individuals use information to change perception about and situate themselves. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
29. Designing Innovative Business Models based on ICT.
- Author
-
Olszak, Celina M.
- Subjects
BUSINESS models ,VALUE creation ,BUSINESS development ,DYNAMICAL systems ,INFORMATION resources - Abstract
The paper carries out a scientific discussion on ICT as an important driver for change and innovation. The thesis was put forward that ICT and information resources can have a significant impact on the development of innovative business models. The paper is of a theoretical and methodological nature, and its main goal is to propose an outline of designing an innovative business model based on ICT. While developing the model, the assumptions underlying the resource approach and the value creation theory were adopted. The proposed model enables organisations to go beyond traditional business functions and processes, integrate internal and external processes, expand existing capabilities and skills, and transform the supply chain into a dynamic system. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
30. Design and implementation of the system for dynamic generation of accessible web content.
- Author
-
Hristov, Hristo, Bliznakov, Milen, Somova, Elena, and Valkanov, Vladimir
- Subjects
INTERNET content ,WEB accessibility ,DYNAMICAL systems ,WEBSITES ,INFORMATION resources - Abstract
This paper presents a system for generating of accessible web content. The system dynamically generates web content from various sources of databases with the information resources being modeled and visualized in already existing web page views. A common system concept model is built as well as a model of the process of dynamic generation and visualization of web content. The architectural frame with the core modules of the system are presented as well as the approaches and scenarios for the process of generating accessible web content, the functional and non-functional requirements for the system and the model of interaction for the system's components. The main features and value of the system are related to extracting and merging data from two different databases, software styling data for the end user and visualizing data in an existing layout of web page. The extraction, merging, styling and visualizing processes are automatic and dynamic, and the data displayed on the web page complies in accordance with EU's Web Accessibility Directive and the requirements in the Web Content Accessibility Guidelines 2.1 standard. The system is integrated in the web infrastructure of the University of Plovdiv "Paisii Hilendarski". [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Interpreting Laboratory Results with Complementary Health Information: A Human Factors Perspective.
- Author
-
JOSEPH, Amanda L., MONKMAN, Helen, MACDONALD, Leah, and LAI, Claudia
- Subjects
PATHOLOGICAL laboratories ,MEDICAL information storage & retrieval systems ,RESEARCH methodology ,PATIENT portals ,CONSUMER attitudes ,CONFERENCES & conventions ,INTERVIEWING ,HEALTH ,INFORMATION resources ,ACCESS to information ,DESCRIPTIVE statistics ,RESEARCH funding ,CLINICAL medicine ,ELECTRONIC health records ,CONTENT analysis ,THEMATIC analysis ,TELEMEDICINE ,COVID-19 pandemic - Abstract
The desire to access personal and high-quality health information electronically is increasing, not only in Canada, but globally. With the advent of the COVID - 19 pandemic the desire and demand for telemedicine and timely access to personal health data such as online laboratory (lab) results has increased substantially. This study examines citizens' perspectives of being provided with high-quality information about a specific lab test (i.e., potassium) in the same display as a trend graph. Therefore, the objective of this study is to test how participants managed this additional information about the context of the test, understood, and applied it. The researchers analyzed the responses of semistructured interviews with Canadian participants (N=24) using conventional content analysis. This paper examined four themes related to providing complementary information concurrently with lab results in the same display: 1) Benefits of Collocated Information, 2) Information Overload, 3) Misinterpretation, 4) Confusion. This study provided examples of some of the difficulties that the participants faced accessing their lab values online, while navigating and discerning complimentary high-quality health information available in their patient portal. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
32. Direct Secure Messaging in Practice: Addressing Workflow Challenges.
- Author
-
MCCORMACK, James, LEHMANN, Christoph U., LUSK, Katherine G., AYERS WICKENHAUSER, Kathryn, ARVISAIS-ANHALT, Simone, and FETERIK, Kristian
- Subjects
ELECTRONIC data interchange ,CONFERENCES & conventions ,WORKFLOW ,ORGANIZATIONAL change ,DATA security ,COMMUNICATION ,HEALTH ,INFORMATION resources ,ELECTRONIC health records ,INFORMATION technology - Abstract
Direct Secure Messaging (DSM) is a sender-initiated communication technology for exchanging patient-specific information among clinicians and disparate healthcare organizations. As DSM adoption increases it becomes more difficult for clinicians and staff to manage the volume and variety of external data received. This can lead to information hazards that can produce cognitive overload and decrease the ability of clinicians to process patient data when reviewing multiple sources. While DSM is one of many options for electronically exchanging health information, we have found that poor user awareness of DSM features and variable EHR capabilities for sending, receiving, and managing messages and their contents demonstrate that additional work is needed to achieve DSM's potential as a lowbarrier, ubiquitous option for clinical interoperability. This paper reviews these problems from end-user perspective and offers best-practices for both senders and recipients of DSM. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. NGO ACCOUNTING REGULATION IN LATVIA - RECENT INNOVATIONS.
- Author
-
Bumane, Inga and Jeremejeva, Diana
- Subjects
ACCOUNTING ,NONGOVERNMENTAL organizations ,TECHNOLOGICAL innovations ,INFORMATION resources - Abstract
Accounting is an integral part for the management of any organisation and an essential information source for all users. The regulation plays the main role in the process of formation and presentation of accounting information. The aim of the paper is on the basis of the studies of Latvian NGO accounting regulation and special literature to evaluate the innovations to Latvian NGO accounting regulation and to advance proposals for its improvement. The objectives set to achieve the aim are to: 1. Perform the literature review in the field of NGO accounting, 2. Describe and analyze the development of Latvian NGO sector, 3. Evaluate the recent regulatory changes in Latvian NGO accounting. In the studied special literature very few studies could be found in relation to NGO accounting. Latvian NGO sector demonstrates the developmental tendency during the last five years (2017-2021). The performance of NGOs has an important role for the achievement of Latvia's strategic goals, and it is surely expected that the NGO sector in Latvia will continue to develop. All-in-all, the authors evaluate as positive the recent innovations to the Latvian NGO accounting regulation, and believe that the innovations impove procedures of NGO accounting. However, the authors have identified a shortcoming in the new Latvian NGO accounting regulation as well and recommend to the Ministry of Finance of the Republic of Latvia to elaborate amendments to the regulatory framework of NGO accounting. [ABSTRACT FROM AUTHOR]
- Published
- 2023
34. A Signal Theory Model for Security Monitoring using CheckMK.
- Author
-
IONEL, Iliuță-Alexandru
- Subjects
INTERNET security ,INFORMATION retrieval ,INFORMATION resources ,SIGNAL theory ,DATA analysis - Abstract
Continuous monitoring of intelligent systems is used to analyze data and text from various sources. They usually monitor things such as risk, controls, opportunities, competition, and other concerns. While there exists literature that provides information on the capabilities of this kind of system, there has been a limited theoretical development in this field. The information sources monitored by these systems provide signals related to events, activities, or issues. However, selecting the appropriate information sources is not a simple task, because it is influenced by factors such as time, cost, redundancy, reliability, or weak signals. Furthermore, for the monitored signals, it is recommended to generate some analytics to study the flow and have a traceability of the issue we are dealing with. In this paper, a signal theory model is introduced and applied to address some of these issues regarding the SSH brute-force attacks. I will use a tool called CheckMK and its capabilities to implement a signal theory model used for monitoring security of a system [1]. [ABSTRACT FROM AUTHOR]
- Published
- 2023
35. How Organizations Sustain and Navigate Between (De)centralization Equilibria: A Process Model.
- Author
-
Hartwich, Eduard, Rieger, Alexander, Fridgen, Gilbert, Hoess, Alexandra, Roth, Tamara, and Young, Amber Grace
- Subjects
INFORMATION services ,DECENTRALIZATION in management ,INFORMATION resources ,ORGANIZATIONAL behavior ,BUSINESS models - Abstract
Finding the ‘right’ balance between centralization and decentralization in organizational processes, governance, and IT can be difficult. To navigate this tension field, organizations need to find (de)centralization equilibria that are often dynamic and depend on organizational strategy and context. However, little is known about how organizations should respond once an old equilibrium is punctuated or breaks down. In this paper, we thus conduct an inductive multiple-case study to investigate how organizations sustain and transition between (de)centralization equilibria. We synthesize our insights into a process model that paints the transition as an iterative recalibration process subject to centralization and decentralization tensions. Often, this process will require local and temporary compromises. Our work contributes a muchneeded process perspective to the IS literature on (de)centralization. [ABSTRACT FROM AUTHOR]
- Published
- 2023
36. ChatGPT Is A User-Generated Knowledge-Sharing Killer.
- Author
-
Junzhi Xue, Lizheng Wang, Yongjun Li, Jinyang Zheng, and Yong Tan
- Subjects
CHATGPT ,LANGUAGE models ,INFORMATION sharing ,INFORMATION resources ,USER-generated content - Abstract
Large Language Models (LLMs), e.g., ChatGPT, is expected to reshape a broad spectrum of domains. This study examines the impact of ChatGPT on question aksing in Q&A communitits via the natural experiment. Safe-guided by supporting evidence of parallel trends, a difference-in-difference (DID) analysis suggests the launching trigger an average 2.6% reduction of question-asking on Stack Overflow, confirming a lower-search-cost-enabled substitution. Our further analysis suggests that, this substitution effect has resulted in more longer, less readable and less cognitive and hence more sophisticated questions on average. Finally, the insignificant change in the score given by viewers per question suggests no improvement in the question quality and decreased platform-wide engagement. Our moderation analysis further ascertain the types of individuals who are more susceptible to ChatGPT. Taken together, our paper suggests LLMs may threaten the survival of user-generated knowledge-sharing communities, which may further threaten the sustainable learning and long-run improvement of LLMs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
37. CRISIS MANAGEMENT AND CARTOGRAPHY.
- Author
-
Župan, Robert, Frangeš, Stanislav, Kljajić, Ivka, and Stanić, Marta
- Subjects
CRISIS management ,CRISIS communication ,CARTOGRAPHY ,HELP-seeking behavior ,INFORMATION resources - Abstract
In the last two years, given the frequent occurrence of crisis situations, we are becoming more aware of them and the need for proper management of emerging crisis situations and prediction of possible crises in the near future is becoming a necessity. Crisis management is a complex process consisting of several phases that will be explained in this paper. Within each phase there is room for the use of cartographic support. It speeds up communication and provides an indispensable source of information for predicting risks and dangers and analyzing the impact of the crisis on a particular area. Nowadays, the basic source of information is the Internet, so people first look for solutions and instructions on the Internet during crisis situations. It emphasizes the role of online cartographic bases that can be a visualization tool to direct people to safe places and shelters and a source of communication to seek help and mark endangered sites immediately after a crisis situation occurs. After studying the available online views for the Republic of Croatia, a web map and cartographic application for the Republic of Croatia and crisis situations relevant to its area were created as an example of cartographic representations in crisis situations that are missing, which would enable a comprehensive analysis of crisis situations in Croatia by counties. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
38. Transition to Open Access and its Implications on Grey Literature Resources.
- Author
-
Ćirković, Snježana
- Subjects
GREY literature ,OPEN access publishing ,INSTITUTIONAL repositories ,INFORMATION resources ,INFORMATION storage & retrieval systems - Abstract
This paper describes the transition to Open Access and its implications on grey literature resources. In this paper we will present current Open Access models, known as "offsetting deals", which main intention is to avoid "double dipping". This part will also review the role of library consortia in this process, as well as current Open Access policies in Europe. The second part of this paper will explore the role of grey literature in transition process to Open Access. Grey literature is an important source of original research and up to date information, although the lack of peer review and formal publication standards must be taken into account during an evaluation process. Grey literature plays an important role in the rapid and timely distribution of in-depth, recent, scientific and technical information, and also provides access to a broad range of information and often contains new ideas. Research that is not published in journals but available in other formats (such as reports, theses or conference proceedings) is often more detailed, more recent and sometimes more rapidly disseminated. Due to the competitive and time consuming nature of publishing in peerreviewed academic journals, some research may never make into journals and would, therefore, be inaccessible to interested parties without the grey literature. We will present possible ways of increasing the visibility of grey literature repositories, their inclusion in open access databases, and how to connect these institutional grey literature repositories with current research information systems. [ABSTRACT FROM AUTHOR]
- Published
- 2016
39. The Messy World of Grey Literature in Cyber Security.
- Author
-
Erwin, Patricia A.
- Subjects
GREY literature ,PRINTED ephemera ,NONBOOK materials ,ELECTRONIC security systems ,INFORMATION resources - Abstract
The foundation of my paper is based on four observations: 1) Research is messy; 2) Traditional collection development policies are structured documents aimed at assuring a level of quality in the collection, but also to satisfy the administrative need to justify the expense of providing resources to an academic or research community; 3) Grey literature doesn't fit the formal model of scholarly communication, therefore the quality is suspect and is not adequately addressed in most collection development policies; 4) The research process and grey literature share similar attributes. Libraries, by focusing on the formal products of research, miss the fertile, albeit more messy grey literature. I will use the I3P's focus on grey literature in cyber security as illustrative of how we need a broader definition of what constitutes the ‘fruits’ of research. When we think of library collections we tend to think in terms of systems, order, and prescribed ways of tending to our collections. Our academic and research libraries are bound by the orderly world of academic departments, curriculum development, and the infrastructure of academia. Our collection development policies reflect that sense of order, clearly articulating the subject areas in which we actively collect, formats to be collected, and most importantly, the quality of the resources that will grace our shelves and gain a spot in our catalogs. What a tidy world we live in. The truth is that research is messy. It is that intersection of the serendipity, randomness, and discovery that lends excitement to the research process. The chance merging of two seemingly unrelated concepts moves research into new areas of knowledge. These early findings and concepts do not appear in the standard scholarly communications vehicles, but rather in lab notebooks, concept papers, and technical reports, i.e. grey literature. There is a perception that grey literature is of less value than resources published through the more traditional and formal models of scholarly communications. In fact it has been noted that ‘scientific research is recognizable as such not because of the conditions under which it is performed but because of the way it is presented and published’ (Pierce 1990, p. 55). To better support research efforts, our collections must mirror that messiness of research. Traditionally, most collection development policies have not reflected the value of grey literature in the areas of computer science, and specifically cyber security. In support of my observations, I will report on a sampling of collection development policies from the I3P Consortium members' libraries. Our members represent academic research institutions, federal research labs, and not-for-profit research organizations. While much grey literature is collected internally, either by individual researchers or as part of an organizations institutional assets, the impetus for making this research widely available is mired in financial constraints, ‘ownership’ issues, and an underlying suspicion by some librarians that grey literature is not very quite as valuable and other resources that have moved through the publication process. [ABSTRACT FROM AUTHOR]
- Published
- 2006
40. Awareness and empowerment in document production and distribution as a "must" for open access: experiences from the "Nancy style" to guarantee quality.
- Author
-
de Castro, Paola, Salinetti, Sandra, and Banks, Marcus
- Subjects
DOCUMENTATION ,GUIDELINES ,TECHNICAL reports ,SCIENTIFIC literature ,INFORMATION resources - Abstract
The paper aims to reflect on the necessity of update the Guidelines for the production of scientific and technical reports, taking into consideration the rapid changes in the information market. The Guidelines are to be considered as a suggested model rather than a model in itself and represent a basic step to improve the quality in the different stages of GL production in view of its wide electronic circulation.
- Published
- 2006
41. Database-less Extraction of Event Logs from Redo Logs.
- Author
-
Bano, Dorina, Lichtenstein, Tom, Klessascheck, Finn, and Weske, Mathias
- Subjects
DATA mining ,BUSINESS process management ,INFORMATION resources ,DIGITAL Object Identifiers ,AUTOMATION ,FEATURE extraction - Abstract
Process mining is widely adopted in organizations to gain deep insights about running business processes. This can be achieved by applying different process mining techniques like discovery, conformance checking, and performance analysis. These techniques are applied on event logs, which need to be extracted from the organization’s databases beforehand. This not only implies access to databases, but also detailed knowledge about the database schema, which is often not available. In many real-world scenarios, however, process execution data is available as redo logs. Such logs are used to bring a database into a consistent state in case of a system failure. This paper proposes a semi-automatic approach to extract an event log from redo logs alone. It does not require access to the database or knowledge of the database schema. The feasibility of the proposed approach is evaluated on two synthetic redo logs. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
42. Patient Safety Informatics: Meeting the Challenges of Emerging Digital Health.
- Author
-
McInerney, Ciarán, Benn, Jonathan, Dowding, Dawn, Habli, Ibrahim, Jenkins, David A., McCrorie, Carolyn, Peek, Niels, Randell, Rebecca, Williams, Richard, and Johnson, Owen A.
- Subjects
DIGITAL technology ,DIGITAL health ,CONFERENCES & conventions ,HEALTH ,INFORMATION resources ,RESEARCH funding ,MEDICAL informatics ,LITERATURE reviews ,PATIENT safety ,ADULT education workshops ,TRUST - Abstract
The fourth industrial revolution is based on cyber-physical systems and the connectivity of devices. It is currently unclear what the consequences are for patient safety as existing digital health technologies become ubiquitous with increasing pace and interact in unforeseen ways. In this paper, we describe the output from a workshop focused on identifying the patient safety challenges associated with emerging digital health technologies. We discuss six challenges identified in the workshop and present recommendations to address the patient safety concerns posed by them. A key implication of considering the challenges and opportunities for Patient Safety Informatics is the interdisciplinary contribution required to study digital health technologies within their embedded context. The principles underlying our recommendations are those of proactive and systems approaches that relate the social, technical and regulatory facets underpinning patient safety informatics theory and practice. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
43. A SOCIO-TECHNICAL PERSPECTIVE ON ORGANIZATIONAL INTERACTION WITH AI: A LITERATURE REVIEW.
- Author
-
Niehaus, Florian and Wiesche, Manuel
- Subjects
SOCIOTECHNICAL systems ,ARTIFICIAL intelligence ,DECISION making ,INFORMATION resources ,KNOWLEDGE management - Abstract
This paper serves as an overview of IS research on artificial intelligence and the organizational interaction with such systems, from a socio-technical perspective. Therefore, we conduct a structured literature review of relevant outlets (journals and conferences). We show that the literature can be synthesized into four groups: decision-making, interaction, knowledge management, and economic effects of AI. Further focusing on the second group, we identify certain dimensions of interaction research: technological implementation, collaborative factors, interface design, task allocation, task support, process allocation, and learning. From this analysis, a framework is derived. With this article, we contribute to the AI, the socio-technical systems, and the organizational interactions-literature in IS research, but most importantly, we offer a novel socio-technical perspective on AI. [ABSTRACT FROM AUTHOR]
- Published
- 2021
44. Art and everyday information behavior: Sources of understanding.
- Author
-
Gorichanaz, Tim
- Subjects
INFORMATION-seeking behavior ,INFORMATION resources ,PSYCHOLOGY of artists ,PHENOMENOLOGY ,INFORMATION science - Abstract
In our efforts to design an ethical information future, we must develop a deeper understanding of the information phenomena in everyday lived experience. Based on work in cultural theory and philosophy, art seems to present an illuminating domain for the study of everyday life. This paper presents findings from an exploratory, phenomenology‐of‐practice study of the information behavior of artists. These findings serve as an entryway to information phenomena that have largely gone unexplored in information behavior. The study builds on the literature of everyday information behavior and artists' information behavior, and it draws on a nascent information behavior theory that recognizes understanding as an epistemic aim and conceptualizes understanding as an information constellation. In this study, seven local artists documented their process creating self‐portraits, and semi‐structured follow‐up interviews were conducted. This paper reports on the findings from four of these artists, demonstrating how memories, the lived environment, profound experiences, and online browsing were informative and contributed to the artists' understandings. It closes by discussing the meaning of these findings for the future of information science, suggesting that the information employed by artists might be recognized and appreciated more widely throughout society. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
45. Challenges in the Emergence of Data Ecosystems.
- Author
-
Gelhaar, Joshua and Otto, Boris
- Subjects
DATA ,INFORMATION resources ,DIGITAL technology ,INFORMATION technology ,VALUE creation - Abstract
The importance of data as a resource for innovation and value creation is increasing steadily. As a result, organizations must adapt their strategies and develop methods for integrating data into their value creation processes. At the same time, data-driven value is less and less created by one company alone but rather through the sharing of data in socalled data ecosystems. The data ecosystem field is, however, not well understood yet. For example, it is unclear how data ecosystems emerge and evolve further. To address this research gap, this paper focuses on the challenges in the emergence phase of data ecosystems. By conducting a multiple case study of eleven use cases, we find that, among other challenges, building trust between the ecosystem participants is one of the major challenges a data ecosystem has to overcome in its emergence phase. [ABSTRACT FROM AUTHOR]
- Published
- 2020
46. Data type and data source preferences for six social sciences subjects in quantitative data reuses.
- Author
-
Lin, Chi‐Shiou and Wang, Yi‐Yu
- Subjects
DATA types (Computer science) ,INFORMATION resources ,QUANTITATIVE research ,SOCIAL science periodicals - Abstract
In this paper we describe an analysis of the most frequently used data types intersecting data sources in quantitative data re‐ uses in six major social science subject disciplines. Using a sample of 1,319 papers from 40 social sciences journals in Taiwan, this study reveals the reuse patterns among the subjects for a time span of 15 years. The finding shows that the six sub‐ jects formed three groups, each with similar data reuse patterns. It also shows that business data from governments, series surveys from academic institutions, and series surveys from governments are the three most important kinds of data for social scientists, but the major users of those data differed. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
47. Crisis management in a connected world – Can we beat the information delays?
- Author
-
Markovska, Veneta and Kabaivanov, Stanimir
- Subjects
CRISIS management ,COVID-19 pandemic ,INFORMATION resources ,POLITICAL change ,SCARCITY - Abstract
Recent economic, political and behavioral changes have put both traditional and modern management methods under stress. When facing supply shortages, high volatility and uncertainty about near future, it becomes crucial to be able to decide and act quickly. Unfortunately, the information that we need to decide is rarely available and requires substantial efforts and time to be collected and preprocessed. In this paper we discuss an automated system that can track and verify different information sources in order to extract valuable details and support the decision-making process. To demonstrate the benefits of such approach we analyze it the context of migration tracking in terms of crises – such like recent COVID pandemic. This process impacts not only the disease development, but it also influences industrial managers by depriving them of resources and forcing them to plan for peaks in number of sick leaves, unexpected resource shortages and delivery problems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Impact of modern information technologies on construction management.
- Author
-
Alzubi, Yazan and Khatatbeh, Ahmed
- Subjects
INFORMATION technology ,CONSTRUCTION project management ,DATA management ,INFORMATION resources ,MODERN society - Abstract
There is no doubt that the construction industry is heavily reliant on information, and the success of its projects requires efficient access to and automated management of data. Hence, it is essential to manage information resources accurately in the building's field because it influences individuals' productivity and project execution on time and within budget limitations. Typically, most data are shared during project phases to facilitate decision-making, even though each lifecycle stage has its data and is managed separately. In recent years, information technology has had a profound effect on modern society, where its progress has prompted numerous initiatives to pay sharp attention to developing powerful tools to manage a broad variety of duties across the construction process. However, effective implementation of information technologies' concepts in the framework of construction project management is still faced with various obstacles. This paper aims to review literature related to information technology application in the construction sector to identify difficulties preventing its usage and highlight its impacts on project stakeholders, including improving visualization, data exchange, productivity, and enhancing sustainability and safety. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
49. Investigation of access control mechanisms and classification in cloud environment.
- Author
-
Osari, Ranjeet, Singhai, Rahul, and Upreti, Kamal
- Subjects
CLOUD computing ,ACCESS control ,SOFTWARE as a service ,RESEARCH personnel ,INFORMATION resources ,CLASSIFICATION ,RESOURCE management - Abstract
One of the most burning issues is to secure the information that is available on the cloud. Now a day's services like storage, platform, virtualization, resource management, and software services that are available on the cloud and connected through the internet, and handling of those devices on a public platform is having high risk. There may be malicious nodes that increase the malicious activities. Preventing such kind activities of cloud services should achieve security goals. The malicious node in general can perform two types of attack one is active and the other is a passive attack due to the open access. Some gen-eral issues faced in cloud computing environments are security management, administrative issues, access controls, and security awareness. Since in cloud environment, a huge amount of data and various resources are available. That can be accessed by mul-tiple users simultaneously. Hence it is required to provide some explicit mechanism to control such access. In this paper, we study various cloud access control management features and outcomes. We are expecting to evaluate comparisons of access control models and classification methodology to give a direction for resolving a problem in the current methodology. This sur-vey highlights challenges and gives direction to researchers so they introduce some novel approaches and mechanisms to prevent the information and other resources from any physical damage and unauthorized access. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
50. Searching resources in peer-to-peer network using friend and path result - Sharing searching concepts.
- Author
-
Anbu, S., Veeralakshmi, P., Sowmiya, S., Kapilavani, R. K., and Kannan, K. Nattar
- Subjects
INTERNET protocol address ,INFORMATION resources ,PEER-to-peer architecture (Computer networks) ,SEARCH algorithms ,COST control ,SHARING - Abstract
A new searching technique is proposed in this paper for unstructured Peer-to- Peer file sharing system which uses the search path result sharing concept and also uses the friend concept. As per this new concepts, a friend set or groups are formed by joining the closely neighbor nodes in the unstructured peer to peer network system. Many friend sets can be formed and each friend set has one Head node, heading all other nodes. This head node is not a centralized node and just maintains a list of all other nodes in that friend set and their meta data in its own table. The friend set can be formed within certain radius and the head node contains the IP addresses of all nodes in own friend group or friend set. The search radius is seven hop count distance. Since the head node contains the meta data of all nodes in its friend set, it knows which resource or file is available in which node in its own group. Whenever a source node finds a resource by sending queries, it stores that path information of that resource in its own path table and also shares that path information with all other nodes in its friend set and head node. When searching, if the source node itself has the searching resource, it will directly display that resource or file to user so that he can use it or if at least it has that path information of that resource in its own path table, it will take that path information from the table and display that link on the screen so that user download it. If not, it will route the query messages only to all head nodes in the network simultaneously. The head nodes, send query to all nodes in its own set and will response to the source node on behalf of all other nodes in their own set. Inside the network, the generation of query messages is greatly reduced. Similarly, as far as reply is concerned, the head node bundled all the reply messages belong to its set and send to source as a single response message. Thus the response message going back to source is also reduced. But if a head node fails due to some reasons, the entire set of nodes in that friend set cannot be searched. So this algorithm uses dynamic search algorithm to search the uncovered nodes. The main advantage of this algorithm is all nodes in friend set gets information about resources from their friend nodes without searching. This algorithm also reduces the search time, search cost and bandwidth consumption. This algorithm achieved 75 % reduction of query messages, 50 % reduction of response messages, 50 % reduction in bandwidth and 50 % reduction in search cost. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.