Full Text Available Building a global Network Relations with the internet has made huge changes in personal information system and even comments left on a webpage of SNS(Social Network Services are appreciated as important elements that would provide valuable information for someone. Social Network is a relation between individuals or groups, represented in a graph model, which converts the concept of psychological and social relations into a logical structure by using node and link. But, most of the current personalized systems on the basis of Social Network are built and constructed mainly in the PC environment, and the systems are neither designed nor implemented in mobile environment. Hence, the objective of this study is to propose methods of providing Personalized Mobile Information Retrieval System using NFC (Near Field Communication Smartphone, which will be then used for Smartphone users. Besides, this study aims to verify its efficiency through a comparative analysis of existing studies.
Ifenthaler, Dirk; Schumacher, Clara
The purpose of this study was to investigate if students are prepared to release any personal data in order to inform learning analytics systems. Besides the well-documented benefits of learning analytics, serious concerns and challenges are associated with the application of these data driven systems. Most notably, empirical evidence regarding…
Bergman, Ofer; Beyth-Marom, Ruth; Nachmias, Rafi
Explains personal information management (PIM) systems and suggests a user-subjective approach to PIM system design. Advocates that PIM systems relate to the subjective value-added attributes that the user gives the stored data so that the user can find information again, recall it when needed, and use it effectively in the next interaction.…
Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd
Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed.
Bhardwaj, S.; Sain, M.; Lee, H.-J.; Chung, W.Y.; Slezak, D.; et al., xx
Due to recent development in Ubiquitous Healthcare now it’s time to build such application which can work independently and with less interference of Physician. In this paper we are try to build the whole architecture of personal Healthcare information system for ubiquitous healthcare which also
Background. The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in 'Bookmarks' and 'Favourites'. Argument. It is suggested that personal information collections are created in anticipation of some future need for that information-personal, anticipated information need, which also underlies the design of formal information systems. ...
Chung, Wan-Young; Fong, Ee May
Noncontact ECG measurement has gained popularity these days due to its noninvasive and conveniences to be applied on daily life. This approach does not require any direct contact between patient's skin and sensor for physiological signal measurement. The noncontact ECG measurement is integrated with mobile healthcare system for health status monitoring. Mobile phone acts as the personal health information system displaying health status and body mass index (BMI) tracking. Besides that, it plays an important role being the medical guidance providing medical knowledge database including symptom checker and health fitness guidance. At the same time, the system also features some unique medical functions that cater to the living demand of the patients or users, including regular medication reminders, alert alarm, medical guidance, appointment scheduling. Lastly, we demonstrate mobile healthcare system with web application for extended uses, thus health data are clouded into web server system and web database storage. This allows remote health status monitoring easily and so forth it promotes a cost effective personal healthcare system.
Full Text Available Background. The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in 'Bookmarks' and 'Favourites'. Argument. It is suggested that personal information collections are created in anticipation of some future need for that information-personal, anticipated information need, which also underlies the design of formal information systems. Elaboration. Examination of the literature of information needs and information seeking behaviour leads to the formulation of five propositions that elaborate the concept of personal, anticipated information need. These propositions draw upon concepts such as uncertainty, predictability, sensitivity and the valuation of information sources. Conclusion. An individual's understanding of personal, anticipated information need and how this understanding guides the acquisition and management of personal information will determine the effectiveness of that collection.
Kuo, Su-E; Lai, Hui-San; Hsu, Jen-Ming; Yu, Yao-Chang; Zheng, Dong-Zhe; Hou, Ting-Wei
Traditional nutrition evaluations not only require the use of numerous tables and lists to provide sufficient recommendations for patients' diets but are also very time-consuming due to cross-referencing and calculations. To personalize patient assessments, this study implemented a Clinical Nutritional Information System (CNIS) to help hospital dietitians perform their daily work more effectively in terms of time management and paper work. The CNIS mainly targets in-patients who require cancer-nutrition counselling. The development of the CNIS occurred in three phases. Phase 1 included system design and implementation based on the Nutrition Care Process and Model (NCPM) and the Patient Nutrition Care Process. Phase 2 involved a survey to characterize the efficiency, quality and accuracy of the CNIS. In Phase 3, a second survey was conducted to determine how well dietitians had adapted to the system and the extent of improvement in efficiency after the CNIS had been available online for three years. The work time requirements decreased by approximately 58% with the assistance of the CNIS. Of the dietitians who used the CNIS, 95% reported satisfaction, with 91.66% indicating that the CNIS was really helpful in their work. However, some shortcomings were also evident according to the results. Dietitians favoured the standardization of nutritional intervention and monitoring. The CNIS meets the needs of dietitians by increasing the quality of nutritional interventions by providing accurate calculations and cross-referencing for information regarding patients' conditions, with the benefit of decreasing the processing time, such as handwritten documentation. In addition, the CNIS also helps dietitians statistically analyse each patient's personal nutritional needs to achieve nutritional improvement. Copyright © 2017 Elsevier B.V. All rights reserved.
E. I. Goncharov
Full Text Available When personal data exchange between informational systems takes place, one must guarantee the systems are not integrating but just interacting. This task can not be accomplished by using traditional tools such as firewalls, cryptography and so on. To solve the problem we suggest deploying of informational gateway in personal data exchange process.
Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…
Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…
... manager tell me when soliciting personal information? 105-64.104 Section 105-64.104 Public Contracts and... Responsibilities § 105-64.104 What must the system manager tell me when soliciting personal information? When soliciting information from you or a third party for a system of records, system managers must: Cite the...
Asri, S. A.; Sunaya, I. G. A. M.; Rudiastari, E.; Setiawan, W.
Job training is one of the subjects in university or polytechnic that involves many users and reporting activities. Time and distance became problems for users to reporting and to do obligations tasks during job training due to the location where the job training took place. This research tried to develop a web based information system of job training to overcome the problems. This system was developed using Personal Extreme Programming (PXP). PXP is one of the agile methods is combination of Extreme Programming (XP) and Personal Software Process (PSP). The information system that has developed and tested which are 24% of users are strongly agree, 74% are agree, 1% disagree and 0% strongly disagree about system functionality.
Full Text Available The purpose of the article is to analysis of employee system incentive hotel there be source of information for personal controlling. New incentive system fitted look to suggest for notes entered by employee. It pay attention in article, that there is sole form of motivating of forceful employee proprietary form financial motivator. Proper system of motivation effects boost of efficiency of staff aiming at achievement in firm purposes indicated appointee. Besides, it shows revolt of working group about miscellaneous features, requirements, engagement, skilful management leads achievement of fairest effect of work which. We understand control result of taken personal decision through definition personal controlling, structures of employment, system of remuneration, motivation systems, utilization of active time of employee and cost of work. Among others, counteraction belongs to tasks in sphere of management in taking up of erroneous decision human resources controlling, high cost of employment have, helping with fitting human resources for real requirements of firms and through suitable utilization of potential work stimulation. There is in firm personal wanted controlling in order to it were of limited activity of professional employee for forward taking reward only.
Sanchez Hidalgo, M.; Galan Montenegro, P.; Bodineau Gil, C.; Hernandez Rodriguez, R.; Jimenez Nartin, A.; Cano Sanchez, J. J.
One question often raised by the hospital personnel dosimetry is the high incidence in the no monthly turnover of dosimeters, which is currently a high number of administrative dose assignments. The high number of workers with personal dosimetry and in many cases, the dispersion of workplaces makes it impossible to personalized management. To make a more direct and personal, and transmit information quickly and with guaranteed reception, has developed and implemented a system of personalized dosimetric information through messaging Short Message Service (SMS) and access to the history of dosimetric dosimetric and management through web space Service Hospital Radio physics.
Alvarez-Bermejo, J A; Hernández-Capel, D M; Belmonte-Ureña, L J; Roca-Piera, J
Ensuring the quality of services provided in centres where dependent persons are seen by specialist services, by improving and enhancing how information -salary, control of tasks, patients' records, etc.- is shared between staff and carers. A web information system has been developed and experimentally deployed to accomplish this. The accuracy of the system was evaluated by assessing how confident the employees were with it rather than relying on statistical data. It was experimentally deployed since January 2009 in Asociación de Personas con Discapacidad "El Saliente" that manages several day centres in Almeria, for dependent persons over 65 years old, particularly those affected by Alzheimer' disease. Incidence data was collected during the experimental period. A total of 84% of the employees thought that the system helped to manage documents, administrative duties, etc., and 92.4% said they could attend to really important tasks because the system was responsible for alerting them of every task, such as medication timetables, checking all patients were present (to prevent an Alzheimer affected person leaving the centre) etc. During this period the incidences reported were reduced by about a 30%, although data is still partially representative. As the life expectancy of the population gets longer, these centres will increase. Providing systems such as the one presented here would be of great help for administrative duties (sensitive data protection...) as well as ensuring high quality care and attention.
Mohammed Amine Alimam
Full Text Available The use of modern educational technology methods has become an important area of research in order to support learning as well as collaboration. This is especially evident with the rise of internet and web 2.0 platforms that have transformed users’ role from mere content consumers to fully content consumers-producers. Furthermore, people engaged in collaborative learning capitalize on one another’s resources and skills, unlike individual learning. This paper proceeds with a categorization of the main tools and functions that characterize the personalization learning aspect, in order to discuss their trade-offs with collaborative learning systems. It proposes a framework of a personalized information research (IR within a collaborative learning system, incorporating the characterization of the research type carried by the query, as well as modeling and constructing semantic users’ profiles. We use the context of the user query into a prediction mechanism of the search type, based on a previous identification of users’ levels and interests. The paper is concluded by presenting experiment results, revealing that the use of the subject ontology extension approach satisfyingly contributes to improvement in the accuracy of system recommendations.
Dhotre, Prashant Shantaram; Olesen, Henning
providers and websites collects and make an extensive use of personal information. Using different Big Data methods and techniques the knowledge and patterns are generated or extracted from the data. This will lead to a serious problem to privacy breach. Hence, there is a need of embedding privacy...... in the design phase will be the basic principle on which the data security can be provided, and the privacy will be protected. This will give more control and power to user over personal information....
Ye. M. Velykodna
Full Text Available The main purpose of the article is to outline the problems of health and human security in the mediainformation education space. Media education as a system of values formation under conditions of medial information educational environment focused on developing and providing protective functions in their close interdependence. Training is aimed at creating conditions for the development of spiritual subjects of education, promotion of positive changes in their personal development. Protective aimed at improving the social protection of business education in the destructive tendencies in society , to neutralize the impact of negative factors media. The most important part of media education in the context of ensuring the health of the individual is the formation of values education activity as the basis of spiritual health. It is shown that meaningful use sens formative influence of mediainformation space determines the priority position of media education as a factor in providing mental health of the individual. Formation of mental health is associated with the conscious assimilation of certain belief systems of the world. According media education focuses not on broadcast ready «moral absolutes «, and the simulation of specific situations in which the individual is necessary to selfdetermination regarding fundamental values and principles of implementing these values in life.
Czaja, Sara J; Boot, Walter R; Charness, Neil; A Rogers, Wendy; Sharit, Joseph; Fisk, Arthur D; Lee, Chin Chin; Nair, Sankaran N
Technology holds promise in terms of providing support to older adults. To date, there have been limited robust systematic efforts to evaluate the psychosocial benefits of technology for older people and identify factors that influence both the usability and uptake of technology systems. In response to these issues, we developed the Personal Reminder Information and Social Management System (PRISM), a software application designed for older adults to support social connectivity, memory, knowledge about topics, leisure activities and access to resources. This trail is evaluating the impact of access to the PRISM system on outcomes such as social isolation, social support and connectivity. This paper reports on the approach used to design the PRISM system, study design, methodology and baseline data for the trial. The trial is multi-site randomized field trial. PRISM is being compared to a Binder condition where participants received a binder that contained content similar to that found on PRISM. The sample includes 300 older adults, aged 65-98 years, who lived alone and at risk for being isolated. The primary outcome measures for the trial include indices of social isolation and support and well-being. Secondary outcomes measures include indices of computer proficiency, technology uptake and attitudes towards technology. Follow-up assessments occurred at 6 and 12 months post-randomization. The results of this study will yield important information about the potential value of technology for older adults. The study also demonstrates how a user-centered iterative design approach can be incorporated into the design and evaluation of an intervention protocol. Copyright © 2014 Elsevier Inc. All rights reserved.
Maura Alicia Matesic
Full Text Available The appearance of Personal Response Systems (PRS or “clickers” in universityclassrooms has opened an avenue for new forms of communication betweeninstructors and students in large-enrolment classes. Because it allows instructorsto pose questions and receive tabulated responses from students in real-time,proponents of this technology herald it as an innovative means for encouraginghigher levels of participation, fostering student engagement, and streamlining theassessment process. Having already been experimentally deployed acrossdisciplines ranging from business to the arts and sciences, it is also beginning tobe used in the context of information literacy instruction. In this project weemployed the technology not to transfer actual skills, but to advertise theexistence of online library guides, promote the use of the library within thecontext of the course itself, and “provoke” students to adopt a more activeapproach to research as a recursive process. Our findings suggest that studentsadapt easily to the use of this technology and feel democratically empowered torespond to their instructors in a variety of ways that include anonymous clickerresponses as well as more traditional means such as the raising of hands andposing questions verbally. The particular value of this study was to show thatthese broader findings seem equally applicable to pedagogical settings in whichlearning objectives are built around and integrated with the principles ofinformation literacy.
Suryani, Woro Dwi; Sumiyana, Sumiyana
This study raises the issue that information system success could be enhanced by complementingother factors. This study investigates the success of information systems by inducing2the task-technology fit (TTF) and person-job fit (PJF) into the DeLone and McLean model. Thisstudy aims to examine, among the two induced factors, which one is able to explain andimprove the success of the information systems implementation.The results of this study indicate that the TTF explains the models’ goodnes...
Tanabe, Ken-ichi; Akashi, Michio
Nuclear power stations are under strict radiation control. Exposure control for nuclear workers is the most important operation, and so carefully thought out measures are taken. This paper introduces Fuji Electric's personal exposure control system that meets strict exposure control and rationalizes control operations. The system has a merit that it can provide required information in an optimum form using the interconnection of a super minicomputer and exposure control facilities and realizes sophisticated exposure control operations. (author)
Kegel, Roeland Hendrik,Pieter
The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security
The paper extends previous accounts of informational privacy as a contextual notion. Where previous accounts have focused on interpretations of the privacy context itself as being contextual and open for negotiation and interpretation, this paper extends those analyses and shows that personal...... information itself is in fact best understood as contextual and situational—and as such open for interpretation. The paper reviews the notion of information as it has been applied in informational privacy and philosophy of information, and suggests that personal information ought to be regarded...... as communicative acts. The paper suggests a reconceptualization of informational privacy from having its focus on controlling, limiting, and restricting access to material carriers of information to a focus on a regulation of the use, analysis, and interpretation of personal information....
PC Forms Inc. 834-4048
To apply for information under the Privacy Act, complete this form or a written request mentioning the Act. Describe the information being sought and provide any relevant details necessary to help the. International Development Research Centre. (IDRC) find it. If you require assistance, refer to. Info Source (Sources of ...
Rasoul Zavaraqi; Michael Safaie
The aim of this paper was to present detailed texts about necessities of personal information management (PIM) and has been written by literature survey. Historical investigation of this new born research area showed PIM is an extension to primary personal information management in offices and other bureaucratic centers. PIM is the result of new ICT developments and its followings as information overload and pollution, which is combination of information retrieval, database management systems...
Neyens, David M; Childers, Ashley Kay
To determine the barriers and facilitators associated with willingness to use personal health information management (PHIM) systems to support an existing worksite wellness program (WWP). The study design involved a Web-based survey. The study setting was a regional hospital. Hospital employees comprised the study subjects. Willingness, barriers, and facilitators associated with PHIM were measured. Bivariate logit models were used to model two binary dependent variables. One model predicted the likelihood of believing PHIM systems would positively affect overall health and willingness to use. Another predicted the likelihood of worrying about online security and not believing PHIM systems would benefit health goals. Based on 333 responses, believing PHIM systems would positively affect health was highly associated with willingness to use PHIM systems (p < .01). Those comfortable online were 7.22 times more willing to use PHIM systems. Participants in exercise-based components of WWPs were 3.03 times more likely to be willing to use PHIM systems. Those who worried about online security were 5.03 times more likely to believe PHIM systems would not help obtain health goals. Comfort with personal health information online and exercise-based WWP experience was associated with willingness to use PHIM systems. However, nutrition-based WWPs did not have similar effects. Implementation barriers relate to technology anxiety and trust in security, as well as experience with specific WWP activities. Identifying differences between WWP components and addressing technology concerns before implementation of PHIM systems into WWPs may facilitate improved adoption and usage.
Namoğlu, Nihan; Ulgen, Yekta
Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects.
Li, Ya-Pin; Gao, Hong-Wei; Fan, Hao-Jun; Wei, Wei; Xu, Bo; Dong, Wen-Long; Li, Qing-Feng; Song, Wen-Jing; Hou, Shi-Ke
The objective of this study was to build a database to collect infectious disease information at the scene of a disaster through the use of 128 epidemiological questionnaires and 47 types of options, with rapid acquisition of information regarding infectious disease and rapid questionnaire customization at the scene of disaster relief by use of a personal digital assistant (PDA). SQL Server 2005 (Microsoft Corp, Redmond, WA) was used to create the option database for the infectious disease investigation, to develop a client application for the PDA, and to deploy the application on the server side. The users accessed the server for data collection and questionnaire customization with the PDA. A database with a set of comprehensive options was created and an application system was developed for the Android operating system (Google Inc, Mountain View, CA). On this basis, an infectious disease information collection system was built for use at the scene of disaster relief. The creation of an infectious disease information collection system and rapid questionnaire customization through the use of a PDA was achieved. This system integrated computer technology and mobile communication technology to develop an infectious disease information collection system and to allow for rapid questionnaire customization at the scene of disaster relief. (Disaster Med Public Health Preparedness. 2017;11:668-673).
Dunn-Rankin, Derek; Leal, Elisangela Martins; Walther, David C. [Mechanical and Aerospace Engineering Department, University of California, Irvine, CA 92697 (United States)
The lack of compact, efficient, human compatible, lightweight power sources impedes the realization of machine-enhanced human endeavor. Electronic and communication devices, as well as mobile robotic devices, need new power sources that will allow them to operate autonomously for periods of hours. In this work, a personal power system implies an application of interest to an individual person. The human-compatible gravimetric energy density spans the range from 500 to 5000Wh/kg, with gravimetric power density requirements from 10 to 1000W/kg. These requirements are the primary goals for the systems presented here. The review examines the interesting and promising concepts in electrochemical, thermochemical, and biochemical approaches to small-scale power, as well as their technological and physical challenges and limitations. Often it is the limitations that dominate, so that while the technology to create personal autonomy for communications, information processing and mobility has accelerated, similar breakthroughs for the systems powering these devices have not yet occurred. Fuel cells, model airplane engines, and hummingbird metabolism, are three promising examples, respectively, of electrochemical, thermochemical, and biochemical power production strategies that are close to achieving personal power systems' power demands. Fuel cells show great promise as an energy source when relatively low power density is demanded, but they cannot yet deliver high peak powers nor respond quickly to variable loads. Current small-scale engines, while achieving extraordinary power densities, are too inefficient to achieve the energy density needed for long-duration autonomous operation. Metabolic processes of flying insects and hummingbirds are remarkable biological energy converters, but duplicating, accelerating, and harnessing such power for mobility applications is virtually unexplored. These challenges are significant, and they provide a fertile environment for
The electronic medical knowledge data base DOPIS is a compliation of knowledge from various special fields of medicine. Using uniform nomenclature, the data are presented on demand as they would be in a book chapter. Concise updates can be performed at low cost. The primary structure of the concept is the division of medical knowledge into data banks on diagnosis, literature, medication and pharmacology, as well as so-called electronic textbooks. All data banks and electronic textbooks are connected associatively. Visual information is obtained via the image data bank connected to the diagnosis data bank and the electronic books. Moreover, DOPIS has an integrated patient findings system, as well as an image processing and archiving system with research values enabling research functions. The diagnosis and literature data banks can be modified by the user or author, or fed with their own data (a so-called Expert System Shell). For authors from special fields working on the project, an extra Medical Electronic Publishing System has been developed and made available for the electronic textbooks. The model for the knowledge data base has been developed in the field of ENT, the programme implemented and initially ENT data have been stored.
Gray, Kathleen Mary; Clarke, Ken; Alzougool, Basil; Hines, Carolyn; Tidhar, Gil; Frukhtman, Feodor
The use of Internet protocol television (IPTV) as a channel for consumer health information is a relatively under-explored area of medical Internet research. IPTV may afford new opportunities for health care service providers to provide health information and for consumers, patients, and caretakers to access health information. The technologies of Web 2.0 add a new and even less explored dimension to IPTV's potential. Our research explored an application of Web 2.0 integrated with IPTV for personalized home-based health information in diabetes education, particularly for people with diabetes who are not strong computer and Internet users, and thus may miss out on Web-based resources. We wanted to establish whether this system could enable diabetes educators to deliver personalized health information directly to people with diabetes in their homes; and whether this system could encourage people with diabetes who make little use of Web-based health information to build their health literacy via the interface of a home television screen and remote control. This project was undertaken as design-based research in two stages. Stage 1 comprised a feasibility study into the technical work required to integrate an existing Web 2.0 platform with an existing IPTV system, populated with content and implemented for user trials in a laboratory setting. Stage 2 comprised an evaluation of the system by consumers and providers of diabetes information. The project succeeded in developing a Web 2.0 IPTV system for people with diabetes and low literacies and their diabetes educators. The performance of the system in the laboratory setting gave them the confidence to engage seriously in thinking about the actual and potential features and benefits of a more widely-implemented system. In their feedback they pointed out a range of critical usability and usefulness issues related to Web 2.0 affordances and learning fundamentals. They also described their experiences with the system in
Huang, Yong-Ming; Liu, Chien-Hung; Lee, Chun-Yi; Huang, Yueh-Min
Museum learning has received a lot of attention in recent years. Museum learning refers to people's use of museums to acquire knowledge. However, a problem with information overload has caused in engaging in such learning. Information overload signifies that users encounter a mass of information and need to determine whether certain information…
Construction of analysis system on personal computer for slope disaster information using remote sensing technology. Remote sensing wo riyoshita pasokongata no shamen bosai joho kaiseki system no kochiku
Setojima, M [Kokusai Kogyo Co. Ltd., Tokyo (Japan); Goto, K [Nagasaki Universtiy, Nagasaki (Japan). FAculty of Engineering
An analytical system with superposition of images which uses picture elements as a unit was developed to treat information obtained by remote sensing and other geographical information by superposing the images in order to extract the second information which expresses qualitatively and quantitatively the degree of slope disaster in the future, based on the first information about the damage caused by disaster and landform and geology. As necessary function for analytical system of the second information, precise correction of geometrical strain, superposition of images, visual reading treatment, and output of analytical result in map are listed and described respectively. Next, the detailed explanation of hardware and software of pilot system which used personal computer was given. The analytical procedure and result of land conditions around the landslide occurred at Nagano city in 1985 was shown. 3 refs., 1 fig., 1 tab.
ZHANG Qingsheng; QI Yong; ZHAO Jizhong; HOU Di; NIU Yujie
A context-aware privacy protection framework was designed for context-aware services and privacy control methods about access personal information in pervasive environment. In the process of user's privacy decision, it can produce fuzzy privacy decision as the change of personal information sensitivity and personal information receiver trust. The uncertain privacy decision model was proposed about personal information disclosure based on the change of personal information receiver trust and personal information sensitivity. A fuzzy privacy decision information system was designed according to this model. Personal privacy control policies can be extracted from this information system by using rough set theory. It also solves the problem about learning privacy control policies of personal information disclosure.
Nazi, Kim M
Despite significant consumer interest and anticipated benefits, overall adoption of personal health records (PHRs) remains relatively low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications for health care professionals and organizational delivery systems; however, these have received less attention. An exclusive focus on the PHR as a tool for consumer empowerment does not adequately take into account the social and organizational context of health care delivery, and the reciprocal nature of patient engagement. The purpose of this study was to examine the experiences of physicians, nurses, and pharmacists at the Department of Veterans Affairs (VA) using an organizationally sponsored PHR to develop insights into the interaction of technology and processes of health care delivery. The conceptual framework for the study draws on an information ecology perspective, which recognizes that a vibrant dynamic exists among technologies, people, practices, and values, accounting for both the values and norms of the participants and the practices of the local setting. The study explores the experiences and perspectives of VA health care professionals related to patient use of the My HealtheVet PHR portal and secure messaging systems. In-depth interviews were conducted with 30 VA health care professionals engaged in providing direct patient care who self-reported that they had experiences with at least 1 of 4 PHR features. Interviews were transcribed, coded, and analyzed to identify inductive themes. Organizational documents and artifacts were reviewed and analyzed to trace the trajectory of secure messaging implementation as part of the VA Patient Aligned Care Team (PACT) model. Study findings revealed a variety of factors that have facilitated or inhibited PHR adoption, use, and endorsement of patient use by health care professionals. Health care professionals' accounts and analysis of organizational
Full Text Available The aim of this paper was to present detailed texts about necessities of personal information management (PIM and has been written by literature survey. Historical investigation of this new born research area showed PIM is an extension to primary personal information management in offices and other bureaucratic centers. PIM is the result of new ICT developments and its followings as information overload and pollution, which is combination of information retrieval, database management systems (DBMS, information science, human-computer interaction, cognitive psychology, and artificial intelligence. The research area tries to address to old challenges by new mechanisms. The paper introduced the new born research area and discussed about its appearance, definitions, history, benefits, performance and researches which has been done about it.
Omisore, M. O.; Samuel, O. W.
The huge amount of information available online has given rise to personalization and filtering systems. Recommender systems (RS) constitute a specific type of information filtering technique that present items according to user's interests. In this research, a web-based personalized recommender system capable of providing learners with books that…
Almalki, Manal; Gray, Kathleen; Sanchez, Fernando Martin
Self-quantification is seen as an emerging paradigm for health care self-management. Self-quantification systems (SQS) can be used for tracking, monitoring, and quantifying health aspects including mental, emotional, physical, and social aspects in order to gain self-knowledge. However, there has been a lack of a systematic approach for conceptualising and mapping the essential activities that are undertaken by individuals who are using SQS in order to improve health outcomes. In this paper, we propose a new model of personal health information self-quantification systems (PHI-SQS). PHI-SQS model describes two types of activities that individuals go through during their journey of health self-managed practice, which are 'self-quantification' and 'self-activation'. In this paper, we aimed to examine thoroughly the first type of activity in PHI-SQS which is 'self-quantification'. Our objectives were to review the data management processes currently supported in a representative set of self-quantification tools and ancillary applications, and provide a systematic approach for conceptualising and mapping these processes with the individuals' activities. We reviewed and compared eleven self-quantification tools and applications (Zeo Sleep Manager, Fitbit, Actipressure, MoodPanda, iBGStar, Sensaris Senspod, 23andMe, uBiome, Digifit, BodyTrack, and Wikilife), that collect three key health data types (Environmental exposure, Physiological patterns, Genetic traits). We investigated the interaction taking place at different data flow stages between the individual user and the self-quantification technology used. We found that these eleven self-quantification tools and applications represent two major tool types (primary and secondary self-quantification systems). In each type, the individuals experience different processes and activities which are substantially influenced by the technologies' data management capabilities. Self-quantification in personal health maintenance
Gloyd, Stephen; Wagenaar, Bradley H; Woelk, Godfrey B; Kalibala, Samuel
HIV programme data from routine health information systems (RHIS) and personal health information (PHI) provide ample opportunities for secondary data analysis. However, these data pose unique opportunities and challenges for use in health system monitoring, along with process and impact evaluations. Analyses focused on retrospective case reviews of four of the HIV-related studies published in this JIAS supplement. We identify specific opportunities and challenges with respect to the secondary analysis of RHIS and PHI data. Challenges working with both HIV-related RHIS and PHI included missing, inconsistent and implausible data; rapidly changing indicators; systematic differences in the utilization of services; and patient linkages over time and different data sources. Specific challenges among RHIS data included numerous registries and indicators, inconsistent data entry, gaps in data transmission, duplicate registry of information, numerator-denominator incompatibility and infrequent use of data for decision-making. Challenges specific to PHI included the time burden for busy providers, the culture of lax charting, overflowing archives for paper charts and infrequent chart review. Many of the challenges that undermine effective use of RHIS and PHI data for analyses are related to the processes and context of collecting the data, excessive data requirements, lack of knowledge of the purpose of data and the limited use of data among those generating the data. Recommendations include simplifying data sources, analysis and reporting; conducting systematic data quality audits; enhancing the use of data for decision-making; promoting routine chart review linked with simple patient tracking systems; and encouraging open access to RHIS and PHI data for increased use.
Chen, Chih-Han; Karvela, Maria; Sohbati, Mohammadreza; Shinawatra, Thaksin; Toumazou, Christofer
The rise of personalized diets is due to the emergence of nutrigenetics and genetic tests services. However, the recommendation system is far from mature to provide personalized food suggestion to consumers for daily usage. The main barrier of connecting genetic information to personalized diets is the complexity of data and the scalability of the applied systems. Aiming to cross such barriers and provide direct applications, a personalized expert recommendation system for optimized nutrition is introduced in this paper, which performs direct to consumer personalized grocery product filtering and recommendation. Deep learning neural network model is applied to achieve automatic product categorization. The ability of scaling with unknown new data is achieved through the generalized representation of word embedding. Furthermore, the categorized products are filtered with a model based on individual genetic data with associated phenotypic information and a case study with databases from three different sources is carried out to confirm the system.
Nazi, Kim M.
Personal Health Records (PHRs) and PHR systems have been designed as consumer-oriented tools to empower patients and improve health care. Despite significant consumer interest and anticipated benefits, adoption remains low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications…
Report #16-P-0259, August 10, 2016. The EPA has 30 systems that contain sensitive PII. Safeguarding information and preventing system breaches are essential for ensuring the EPA retains the trust of the American public.
Bø, Solvår; Pedersen, Stian; Nyre, Åsmund Ahlmann; Bernsmed, Karin
Smartphones with third-party applications have become very popular. Recently, they have received attention for quietly monitoring and transferring personal information without the users’ knowledge. The objective of this work is to help users to protect their privacy by increasing their consciousness on how personal information is collected and distributed. We propose a design that provides a higher degree of control by allowing users to set preferences that determine what personal information...
Report #16-P-0254, August 1, 2016. CSB has one system that contains sensitive PII. Safeguarding such information in the possession of the government and preventing its breach is essential to ensuring CSB retains the trust of the American public.
Suzuki, Yoshiaki; Nishiyama, Kenji; Ono, Shuuji; Fukuda, Kouin
An overview of the review conducted on H-2 Orbiting Plane (HOPE) is presented. A prototype model was constructed by inputting various technical information proposed by related laboratories. Especially operation flow which enables understanding of correlation between various analysis items, judgement criteria, technical data, and interfaces with others was constructed. Technical information data base and retrieval systems were studied. A Macintosh personal computer was selected for information shaping because of its excellent function, performance, operability, and software completeness.
The new trend on the Web has totally changed today's information access environment. The traditional information overload problem has evolved into the qualitative level beyond the quantitative growth. The mode of producing and consuming information is changing and we need a new paradigm for accessing information. Personalized search is one of…
Tao, Q.; Veldhuis, Raymond N.J.
We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information
to persist in gathering Olympic Games information. In other words, does the relationship between demographics and knowledge about the Beijing 2008 Olympic Games differ according to the use of mobile phones among migrant workers? Results indicate that television became the primary source of Olympic Games news...... of people to enjoy the Olympic Games, and popularizing knowledge....
to persist in gathering Olympic Games information. In other words, does the relationship between demographics and knowledge about the Beijing 2008 Olympic Games differ according to the use of mobile phones among migrant workers? Results indicate that television became the primary source of Olympic Games news...... of people to enjoy the Olympic Games, and popularizing knowledge....
Hart, Nick; Haugli, Hans-C.; Poskett, Peter; Smith, K.
Inmarsat has been providing near global mobile satellite communications since 1982 and Inmarsat terminals are currently being used in more than 130 countries. The terminals have been reduced in size and cost over the years and new technology has enabled the recent introduction of briefcase sized personal telephony terminals (Inmarsat-M). This trend continues and we are likely to see Inmarsat handheld terminals by the end of the decade. These terminals are called Inmarsat-P and this paper focuses on the various elements required to support a high quality service to handheld terminals. The main system elements are: the handheld terminals; the space segment with the associated orbits; and the gateways to terrestrial networks. It is both likely and desirable that personal handheld satellite communications will be offered by more than one system provider and this competition will ensure strong emphasis on service quality and cost of ownership. The handheld terminals also have to be attractive to a large number of potential users, and this means that the terminals must be small enough to fit in a pocket. Battery lifetime is another important consideration, and this coupled with radiation safety requirements limits the maximum radiated EIRP. The terminal G/T is mainly constrained by the gain of the omnidirectional antenna and the noise figure of the RF front end (including input losses). Inmarsat has examined, with the support of industry, a number of Geosynchronous (GSO), Medium Earth Orbit (MEO) and Low Earth Orbit (LEO) satellite options for the provision of a handheld mobile satellite service. This paper describes the key satellite and orbit parameters and tradeoffs which affect the overall quality of service and the space segment costing. The paper also stresses not only the importance of using and sharing the available mobile frequency band allocations efficiently, but also the key considerations affecting the choice of feeder link bands. The design of the gateways
Schreiber, Trine; Harbo, Karen
The aim of the paper is to discuss a new subject called personal knowledge management and to compare it with the better-known concept information literacy. Firstly, the paper describes and discusses the course called personal knowledge management. People from three institutions, the Library...... the participants partly how to manage information in such a way that it supports a learning process, and partly how to negotiate with the colleagues about the information needs, locate the information, and mediate it in such a way that the colleagues will use it. At the end of the course the participants construct...... a ´knowledge map´, which constitutes the mediation of the information to the workplace. The course has got a very positively reception. Secondly, the paper compares the course of personal knowledge management with the concept of information literacy. There exist a number of different definitions of the last...
Thanos, Konstantinos-Georgios; Thomopoulos, Stelios C. A.
wayGoo is a fully functional application whose main functionalities include content geolocation, event scheduling, and indoor navigation. However, significant information about events do not reach users' attention, either because of the size of this information or because some information comes from real - time data sources. The purpose of this work is to facilitate event management operations by prioritizing the presented events, based on users' interests using both, static and real - time data. Through the wayGoo interface, users select conceptual topics that are interesting for them. These topics constitute a browsing behavior vector which is used for learning users' interests implicitly, without being intrusive. Then, the system estimates user preferences and return an events list sorted from the most preferred one to the least. User preferences are modeled via a Naïve Bayesian Network which consists of: a) the `decision' random variable corresponding to users' decision on attending an event, b) the `distance' random variable, modeled by a linear regression that estimates the probability that the distance between a user and each event destination is not discouraging, ` the seat availability' random variable, modeled by a linear regression, which estimates the probability that the seat availability is encouraging d) and the `relevance' random variable, modeled by a clustering - based collaborative filtering, which determines the relevance of each event users' interests. Finally, experimental results show that the proposed system contribute essentially to assisting users in browsing and selecting events to attend.
Today's mobile devices, especially mobile phones, are comparable in computing capability and storage to the desktop computers of a few years ago. The volume and diversity of the information kept on mobile devices has continually increased and users have taken advantage of this. Since information is being stored on multiple devices, searching for and retrieving the desired information has become an important function. This thesis focuses on search with regard to Personal Information Manag...
Shen, Li-Qiong; Zang, Xiao-Ying; Cong, Ji-Yan
Personal digital assistants, technology with various functions, have been applied in international clinical practice. Great benefits in reducing medical errors and enhancing the efficiency of clinical work have been achieved, but little research has investigated nurses' satisfaction with the use of personal digital assistants. To investigate nurses' satisfaction with use of personal digital assistants, and to explore the predictors of this. This is a cross-sectional descriptive study. We conducted a cross-sectional survey targeting nurses who used personal digital assistants in a comprehensive tertiary hospital in Beijing. A total of 383 nurses were recruited in this survey in 2015. The total score of nurses' satisfaction with use of personal digital assistants was 238.91 (SD 39.25). Nurses were less satisfied with the function of documentation, compared with the function of administering medical orders. The time length of using personal digital assistants, academic degree, and different departments predicted nurses' satisfaction towards personal digital assistant use (all P < 0.05). Nurses were satisfied with the accuracy of administering medical orders and the safety of recording data. The stability of the wireless network and efficiency related to nursing work were less promising. To some extent, nurses with higher education and longer working time with personal digital assistants were more satisfied with them. © 2018 John Wiley & Sons Australia, Ltd.
Ahsan, Mahmud; Seldon, H Lee; Sayeed, Shohel
Ubiquitous personal health records, which can accompany a person everywhere, are a necessary requirement for ubiquitous healthcare. Contextual information related to health events is important for the diagnosis and treatment of disease and for the maintenance of good health, yet it is seldom recorded in a health record. We describe a dual cellphone-and-Web-based personal health record system which can include 'external' contextual information. Much contextual information is available on the Internet and we can use ontologies to help identify relevant sites and information. But a search engine is required to retrieve information from the Web and developing a customized search engine is beyond our scope, so we can use Google Custom Search API Web service to get contextual data. In this paper we describe a framework which combines a health-and-environment 'knowledge base' or ontology with the Google Custom Search API to retrieve relevant contextual information related to entries in a ubiquitous personal health record.
Gallant, David T.
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Silvia Susana TOSCANO
Full Text Available The Inter-American System of Protection of Human Rights is composed of microsystems, like the freedom of expression, the right to information and the protection of privacy and of personal data, among others. These rights interrelate and form the standards of the Inter-American system, in accordance with the UN system, to develop these liberties, and to keep the constant balance of these rights in conflict. All of this enhanced by a dynamic and growing massiveness, like the internet and by a new paradigm in which the freedom of expression and the right to information is included: a postmodern society characterized by a “democratization” of connectivity, a multidirectional transmission of the information and a dichotomy between what is public or private. Freedom of expression is developed in both of its two dimensions: individual or collective. When we talk about its individual dimension, we mean the right of each person to express his ideas, thoughts and beliefs aiming at unidirectional, bidirectional or multidirectional communication. The collective or social dimension refers to the right of a person to receive any type of information, to know the thoughts, ideas and information of others and have free access to them. Both dimensions are equally important and are interdependent, thus it is important to protect them simultaneously. New communication technologies have altered the previous system, and the individual dimension of freedom of expression breaks into public debate on the democratization of internet access and its social dimension due to the feasibility a multidirectional communication impossible to conceive in any other technological paradigm entails. The protection scheme of freedom of expression of the Inter-American System is particularly strong as it specifically prohibits prior censorship and rules sanctions and very strict restrictions in relation to discrimination, advocacy of war, violence and hatred. This characteristic
A.A.J. (Jos) van Helvoort
The research described in this paper provides insights into tools and methods which are used by professional information workers to keep and to manage their personal information. A literature study was carried out on 23 scholar papers and articles, retrieved from the ACM Digital Library and Library
US Agency for International Development — PIPS is a system that maintains the Security/Suitability Investigations Index (SII) for OPM. It contains over 11 million background investigation records of Federal...
Amatayakul, Margret K.
This paper examines the current status of “hospital information systems” with respect to the distinction between data systems and information systems. It is proposed that the systems currently existing are incomplete data dystems resulting in ineffective information systems.
Vale, Sérgio Daniel Rodrigues
Dissertação apresentada à Universidade Fernando Pessoa como partes dos requisitos para a obtenção do grau de Mestre em Engenharia Informática, ramo de Computação Móvel Vivemos numa era em que a esperança média de vida tem aumentado, traduzindo-se diretamente num crescimento cada vez mais significativo da população na faixa etária da terceira idade. Este fenómeno faz com que cada vez mais pessoas idosas vivam sozinhas em casa e tenham dificuldade em encontrar pessoas que as possam acompanha...
J. Wang (Jun); M. Clements (Maarten); J. Yang; A.P. de Vries (Arjen); M.J.T. Reinders
htmlabstractSocial media systems have encouraged end user participation in the Internet, for the purpose of storing and distributing Internet content, sharing opinions and maintaining relationships. Collaborative tagging allows users to annotate the resulting user-generated content, and enables
Goodman, P.C.; DiPalo, C.A.
Nuclear power plant safety is dependent upon human performance related to plant operations. To provide improvements in human performance, data collection and assessment play key roles. This paper reports on the Human factors Information System (HFIS) which is designed to meet the needs of the human factors specialists of the United States Nuclear Regulatory Commission. These specialists identify personnel errors and provide guidance designed to prevent such errors. HFIS is a simple and modular system designed for use on a personal computer. It is designed to contain four separate modules that provide information indicative of program or function effectiveness as well as safety-related human performance based on programmatic and performance data. These modules include the Human Factors Status module; the Regulatory Programs module; the Licensee Event Report module; and the Operator Requalification Performance module. Information form these modules can either be used separately or can be combined due to the integrated nature of the system. HFIS has the capability, therefore, to provide insights into those areas of human factors that can reduce the probability of events caused by personnel error at nuclear power plants and promote the health and safety of the public. This information system concept can be applied to other industries as well as the nuclear industry
... requesting certification to apply restricted use pesticides (RUP) under certification plans administered by... certification of RUP applicators. 40 CFR 171.11 further describes certification procedures including the... the system is to track RUP applicator certifications issued by EPA under pesticide applicator...
Project #OA-FY16-0126, March 14, 2016. The EPA OIG plans to begin fieldwork for an audit of the EPA’s compliance with the mandated “Inspector General Report on Covered Systems,” as outlined in the Cybersecurity Act of 2015.
Department of Transportation — The Aeronautical Information System (AIS) is a leased weather automated system that provides a means of collecting and distributing aeronautical weather information...
Simms, Leonard J; Zelazny, Kerry; Yam, Wern How; Gros, Daniel F
Little attention typically is paid to the way self-report measures are translated for use in self-informant agreement studies. We studied two possible methods for creating informant measures: (a) the traditional method in which self-report items were translated from the first- to the third-person and (b) an alternative meta-perceptual method in which informants were directed to rate their perception of the targets' self-perception. We hypothesized that the latter method would yield stronger self-informant agreement for evaluative personality dimensions measured by indirect item markers. We studied these methods in a sample of 303 undergraduate friendship dyads. Results revealed mean-level differences between methods, similar self-informant agreement across methods, stronger agreement for Big Five dimensions than for evaluative dimensions, and incremental validity for meta-perceptual informant rating methods. Limited power reduced the interpretability of several sparse acquaintanceship effects. We conclude that traditional informant methods are appropriate for most personality traits, but meta-perceptual methods may be more appropriate when personality questionnaire items reflect indirect indicators of the trait being measured, which is particularly likely for evaluative traits.
Careless handling of patient information in daily medical practice can result in Health Professions Council of South Africa sanction, breach of privacy lawsuits and, in extreme cases, serious monetary penalty or even imprisonment. This review will focus on the Protection of Personal Information (POPI) Act (No. 4 of 2013) and the implications thereof for healthcare professionals in daily practice. Recommendations regarding the safeguarding of information are made.
addresses, personal and/or work email addresses, personal and/or work or cell telephone numbers); and. • language testing and language assessment results. How Do We Use Your Personal Information? We use the personal information you provide exclusively for the purposes of processing, screening, assessing ...
Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu
The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.
SNEHA KHATWANI; DR. M.B. CHANDAK
The contents of e-Commerce such as music, movies, books and electronics goods are necessary for a modern life style. But, it becomes difficult to find content according to users likes and users preference. An approach which produces desirable results to solve such the problem is to develop "Recommender System." The Recommender System of an e-Commerce site selects and suggests the contents to meet user's preference automatically using data sets of previous users stored in database. There ca...
Blethyn, Stanley G
Designing Information Systems focuses on the processes, methodologies, and approaches involved in designing information systems. The book first describes systems, management and control, and how to design information systems. Discussions focus on documents produced from the functional construction function, users, operators, analysts, programmers and others, process management and control, levels of management, open systems, design of management information systems, and business system description, partitioning, and leveling. The text then takes a look at functional specification and functiona
Kamei, Koji; Funakoshi, Kaname; Akahani, Jun-Ichi; Satoh, Tetsuji
In this paper, we propose an inter-personal information sharing model among individuals based on personalized recommendations. In the proposed model, we define an information resource as shared between people when both of them consider it important --- not merely when they both possess it. In other words, the model defines the importance of information resources based on personalized recommendations from identifiable acquaintances. The proposed method is based on a collaborative filtering system that focuses on evaluations from identifiable acquaintances. It utilizes both user evaluations for documents and their contents. In other words, each user profile is represented as a matrix of credibility to the other users' evaluations on each domain of interests. We extended the content-based collaborative filtering method to distinguish other users to whom the documents should be recommended. We also applied a concept-based vector space model to represent the domain of interests instead of the previous method which represented them by a term-based vector space model. We introduce a personalized concept-base compiled from each user's information repository to improve the information retrieval in the user's environment. Furthermore, the concept-spaces change from user to user since they reflect the personalities of the users. Because of different concept-spaces, the similarity between a document and a user's interest varies for each user. As a result, a user receives recommendations from other users who have different view points, achieving inter-personal information sharing based on personalized recommendations. This paper also describes an experimental simulation of our information sharing model. In our laboratory, five participants accumulated a personal repository of e-mails and web pages from which they built their own concept-base. Then we estimated the user profiles according to personalized concept-bases and sets of documents which others evaluated. We simulated
Hirsch, Michael J; Murphey, Robert
Our understanding of information and information dynamics has outgrown classical information theory. This book presents the research explaining the importance of information in the evolution of a distributed or networked system. It presents techniques for measuring the value or significance of information within the context of a system
Yoshida, Hiroshi; Shimetani, Naoto
The Japanese Society of Laboratory Medicine has been running its own Medical Safety Committee, and holding a symposium on medical safety during the annual meeting. The medical world is filled with a considerable amount of personal information, including genetic information, the ultimate personal information. We, as medical staff, have to manage such personal information not only in times of peace but also during disasters or emergency situations. In Japan, the Act on the Protection of Personal Information is currently being implemented, but a number of problems remain. Human beings have entered the information technology era, including electrical medical record systems, which is useful for research and education besides medical practice. This is why personal information must be more effectively protected from leakage, misconception, and abuse. We should create a sound system to manage personal information, with the spirit of protecting patient information that originated from the Oath of Hippocrates.
Department of Transportation — Aeronautical Information System Replacement is a web-enabled, automation means for the collection and distribution of Service B messages, weather information, flight...
Cogollor, José M; Rojo-Lacal, Javier; Hermsdörfer, Joachim; Ferre, Manuel; Arredondo Waldmeyer, Maria Teresa; Giachritsis, Christos; Armstrong, Alan; Breñosa Martinez, Jose Manuel; Bautista Loza, Doris Anabelle; Sebastián, José María
Neurological patients after stroke usually present cognitive deficits that cause dependencies in their daily living. These deficits mainly affect the performance of some of their daily activities. For that reason, stroke patients need long-term processes for their cognitive rehabilitation. Considering that classical techniques are focused on acting as guides and are dependent on help from therapists, significant efforts are being made to improve current methodologies and to use eHealth and Web-based architectures to implement information and communication technology (ICT) systems that achieve reliable, personalized, and home-based platforms to increase efficiency and level of attractiveness for patients and carers. The goal of this work was to provide an overview of the practices implemented for the assessment of stroke patients and cognitive rehabilitation. This study puts together traditional methods and the most recent personalized platforms based on ICT technologies and Internet of Things. A literature review has been distributed to a multidisciplinary team of researchers from engineering, psychology, and sport science fields. The systematic review has been focused on published scientific research, other European projects, and the most current innovative large-scale initiatives in the area. A total of 3469 results were retrieved from Web of Science, 284 studies from Journal of Medical Internet Research, and 15 European research projects from Community Research and Development Information Service from the last 15 years were reviewed for classification and selection regarding their relevance. A total of 7 relevant studies on the screening of stroke patients have been presented with 6 additional methods for the analysis of kinematics and 9 studies on the execution of goal-oriented activities. Meanwhile, the classical methods to provide cognitive rehabilitation have been classified in the 5 main techniques implemented. Finally, the review has been finalized with
From Fear to Flow explores how personality traits may influence attitude, behaviour and reaction to information. Consideration is made for individual differences in information behaviour and reasons behind individual search differences. The book reviews personality and information behaviour and discusses how personality may influence the attitude towards information. Reaction to information is examined in contexts such as everyday life, decision-making, work, studies and human-computer interaction.Introduces a little researched area which is current and needed in our Informatio
The chapter gives an introduction to Geographical Information Systems (GIS) with particular focus on their application within environmental management.......The chapter gives an introduction to Geographical Information Systems (GIS) with particular focus on their application within environmental management....
Department of Transportation — The Airports Geographic Information System maintains the airport and aeronautical data required to meet the demands of the Next Generation National Airspace System....
Valentijn, E.; Belikov, A. N.
The Lofar Information System is a solution for Lofar Long Term Archive that is capable to store and handle PBs of raw and processed data. The newly created information system is based on Astro-WISE - the information system for wide field astronomy. We review an adaptation of Astro-WISE for the new
Jelena Anđelković Labrović
Full Text Available Personal learning environments are a widely spared ways of learning, especially for the informal learning process. The aim of this research is to identify the elements of studens’ personal learning environment and to identify the extent to which students use modern technology for learning as part of their non-formal learning. A mapping system was used for gathering data and an analysis of percentages and frequency counts was used for data analysis in the SPSS. The results show that students’ personal learning environment includes the following elements: Wikipedia, Google, YouTube and Facebook in 75% of all cases, and an interesting fact is that all of them belong to a group of Web 2.0 tools and applications.
Kim, Jiin; Nam, Changi; Kim, Seongcheol
Personal information is essential in an information-oriented society for societal development and as a valuable business resource. However, because of poor management and a lack of proper protection, leakage of personal information can take place over time, and the standard for compensation is not well established. In order to establish appropriate policies for its protection, we need to know the economic value of personal information. Using conjoint analysis, we analyze the potential value o...
Gu, Y.; Lo, A.; Niemegeers, I.
Recently, indoor positioning systems (IPSs) have been designed to provide location information of persons and devices. The position information enables location-based protocols for user applications. Personal networks (PNs) are designed to meet the users' needs and interconnect users' devices
Larson, R.A.; Jouse, C.A.; Esparza, V.
An information management system for low-level waste shipped for disposal has been developed for the Nuclear Regulatory Commission (NRC). The Disposal Site Information Management System (DSIMS) was developed to provide a user friendly computerized system, accessible through NRC on a nationwide network, for persons needing information to facilitate management decisions. This system has been developed on NOMAD VP/CSS, and the data obtained from the operators of commercial disposal sites are transferred to DSIMS semiannually. Capabilities are provided in DSIMS to allow the user to select and sort data for use in analysis and reporting low-level waste. The system also provides means for describing sources and quantities of low-level waste exceeding the limits of NRC 10 CFR Part 61 Class C. Information contained in DSIMS is intended to aid in future waste projections and economic analysis for new disposal sites
... personal data, a Privacy Act Statement will be added. ...) PRIVACY PROGRAM DEFENSE COMMISSARY AGENCY PRIVACY ACT PROGRAM § 327.6 Collecting personal information (a... third party sources for security or employment suitability determinations; (2) Seeking third party...
The main purpose of the POPI act is to protect the processing of personal information ... a smartphone, iPad or personal computer), digital storage devices. (iCloud, Dropbox ... (vi) Reasonable security regarding the safeguarding, integrity and.
John Sweller; Susan Sweller
Natural information processing systems such as biological evolution and human cognition organize information used to govern the activities of natural entities. When dealing with biologically secondary information, these systems can be specified by five common principles that we propose underlie natural information processing systems. The principles equate: (1) human long-term memory with a genome; (2) learning from other humans with biological reproduction; (3) problem solving through random ...
Blobel, Bernd; Ruotsalainen, Pekka; Lopez, Diego M; Oemig, Frank
Organizational, methodological and technological paradigm changes enable a precise, personalized, predictive, preventive and participative approach to health and social services supported by multiple actors from different domains at diverse level of knowledge and skills. Interoperability has to advance beyond Information and Communication Technologies (ICT) concerns, including the real world business domains and their processes, but also the individual context of all actors involved. The paper introduces and compares personalized health definitions, summarizes requirements and principles for pHealth systems, and considers intelligent interoperability. It addresses knowledge representation and harmonization, decision intelligence, and usability as crucial issues in pHealth. On this basis, a system-theoretical, ontology-based, policy-driven reference architecture model for open and intelligent pHealth ecosystems and its transformation into an appropriate ICT design and implementation is proposed.
Developing countries need mechanisms by which the information they generate themselves and development information from the rest of the world can be retrieved. The international cooperative information system is such a mechanism. Delegates to the Seminar on International Cooperative Information Systems were informed about various existing systems (INIS, AGRIS, INFOTERRA, TCDC/INRES, POPIN, DEVSIS, and INPADROC), some specialized information systems and services (CDS/ISIS and the Cassava Information Centre), and computer programs for information processing (INIS/AGRIS, CDS/ISIS, and MINISIS). The participants suggested some changes that should be made on both the national and the international levels to ensure that these systems meet the needs of developing countries more effectively. (LL)
The basic concepts, structure, and operation of the Agency Safeguards Information System is discussed with respect to its role in accomplishing the overall objectives of safeguards. The basis and purposes of the Agency's information system, the structure and flow of information within the Agency's system, the relationship of the components is the Agency system, the requirements of Member States in respect of their reporting to the Agency, and the relationship of accounting data vis-a-vis facility and inspection data are described
... personal information? 105-64.108 Section 105-64.108 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General... GSA safeguard personal information? (a) System managers will establish administrative, technical, and...
Information is provided on technological and social trends as background for a workshop designed to heighten the consciousness of workers in community information systems. Initially, the basic terminology is considered in its implications for an integrated perspective of community information systems, with particular attention given to the meaning…
Asif, Muhammad; Krogstie, John
Purpose: A mobile student information system (MSIS) based on mobile computing and context-aware application concepts can provide more user-centric information services to students. The purpose of this paper is to describe a system for providing relevant information to students on a mobile platform. Design/methodology/approach: The research…
Metaphors are useful because they are efficient: they transfer a complex of meaning in a few words. Information systems are social constructs. Therefore, metaphors seem to be especially useful for explaining the space of possible meaning complexes or designs of information systems. Three information
Ommen, B. van; Broek, T. van den; Hoogh, I. de; Erk, M. van; Someren, E. van; Rouhani-Rankouhi, T.; Anthony, J.C.; Hogenelst, K.; Pasman, W.; Boorsma, A.; Wopereis, S.
Personalized nutrition is fast becoming a reality due to a number of technological, scientific, and societal developments that complement and extend current public health nutrition recommendations. Personalized nutrition tailors dietary recommendations to specific biological requirements on the
Ulslev Pedersen, Rasmus; Kühn Pedersen, Mogens
such as medical and manufacturing. These new sensor applications have implications for information systems (IS) and, the authors visualize this new class of information systems as fractals growing from an established class of systems; namely that of information systems (IS). The identified applications...... and implications are used as an empirical basis for creating a model for these small new information systems. Such sensor systems are called embedded systems in the technical sciences, and the authors want to couple it with general IS. They call the merger of these two important research areas (IS and embedded...... systems) for micro information systems (micro-IS). It is intended as a new research field within IS research. An initial framework model is established, which seeks to capture both the possibilities and constraints of this new paradigm, while looking simultaneously at the fundamental IS and ICT aspects...
Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.
User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.
Kunze, C; Grossmann, U; Stork, W; Müller-Glaser, K D
A possibility to significantly reduce the costs of public health systems is to increasingly use information technology. The Laboratory for Information Processing Technology (ITIV) at the University of Karlsruhe is developing a personal health monitoring system, which should improve health care and at the same time reduce costs by combining micro-technological smart sensors with personalized, mobile computing systems. In this paper we present how ubiquitous computing theory can be applied in the health-care domain.
Buchauer, A; Werner, R; Haux, R
Health-care professionals have a broad range of needs for information and cooperation while working at different points of care (e.g., outpatient departments, wards, and functional units such as operating theaters). Patient-related data and medical knowledge have to be widely available to support high-quality patient care. Furthermore, due to the increased specialization of health-care professionals, efficient collaboration is required. Personal mobile information tools have a considerable potential to realize almost ubiquitous information and collaborative support. They enable to unite the functionality of conventional tools such as paper forms, dictating machines, and pagers into one tool. Moreover, they can extend the support already provided by clinical workstations. An approach is described for the integration of mobile information tools with heterogeneous hospital information systems. This approach includes identification of functions which should be provided on mobile tools. Major functions are the presentation of medical records and reports, electronic mailing to support interpersonal communication, and the provision of editors for structured clinical documentation. To realize those functions on mobile tools, we propose a document-based client-server architecture that enables mobile information tools to interoperate with existing computer-based application systems. Open application systems and powerful, partially wireless, hospital-wide networks are the prerequisites for the introduction of mobile information tools.
Sarupria, J.S.; Kunte, P.D.
The nature of oceanographic data and the management of inventory level information are described in Integrated Inventory Information System (IIIS). It is shown how a ROSCOPO (report on observations/samples collected during oceanographic programme...
Lemmond, Tracy D; Hanley, William G; Guensche, Joseph Wendell; Perry, Nathan C; Nitao, John J; Kidwell, Paul Brandon; Boakye, Kofi Agyeman; Glaser, Ron E; Prenger, Ryan James
An information extraction system and methods of operating the system are provided. In particular, an information extraction system for performing meta-extraction of named entities of people, organizations, and locations as well as relationships and events from text documents are described herein.
Research on management information systems is illusive in many respects. Part of the basic research problem in MIS stems from the absence of standard...decision making. But the transition from these results to the realization of ’satisfactory’ management information systems remains difficult indeed. The...paper discusses several aspects of research on management information systems and reviews a selection of efforts that appear significant for future progress. (Author)
Full Text Available This study analyzed college students’ reactions toward the issues of personal information. Students’ needs and seeking behaviors for personal information were assessed. Relevant literature was reviewed for framing the research questions and designing the questionnaire items for survey. Survey subjects were students from an university at northern Taiwan. A set of questionnaire items were used to collect research data. Statistical analysis from 252 valid data reveals some items were highly rated: Students reflected highly for their need of knowledge under the security threat of personal information (M = 4.29. They reacted strongly on acquiring knowledge and resources through the Internet (M = 4.24. They preferred the use of resources clear and easy to be understood (M = 4.04. However, most students had low level faith toward either government or non-governmental organizations in securing their personal information (M < 3.0 for most items. More effort among education and government should be emphasized in the future to improve personal use and reduce uncertainty in the use of personal information.
Berg, R. F.; Holcomb, J. E.; Kelroy, E. A.; Levine, D. A.; Mee, C., III
Generalized information storage and retrieval system capable of generating and maintaining a file, gathering statistics, sorting output, and generating final reports for output is reviewed. File generation and file maintenance programs written for the system are general purpose routines.
Department of Transportation — The Integrated Reporting Information System (IRIS) is a flexible and scalable web-based system that supports post operational analysis and evaluation of the National...
Sajtakova, E.; Spisakova, K.
In this presentation the Slovak National Emission Information System (NEIS) is presented. The NEIS represents hierarchical oriented modular system of acquisition, verification, saving and reporting of data about annual emissions and payments for pollution of atmosphere
Lisa S. Parker
Full Text Available Rapidly decreasing costs of genetic technologies—especially next-generation sequencing—and intensifying need for a clinical workforce trained in genomic medicine have increased interest in having students use personal genomic information to motivate and enhance genomics education. Numerous ethical issues attend classroom/pedagogical use of students’ personal genomic information, including their informed decision to participate, pressures to participate, privacy concerns, and psychosocial sequelae of learning genomic information. This paper addresses these issues, advocates explicit discussion of these issues to cultivate students’ ethical reasoning skills, suggests ways to mitigate potential harms, and recommends collection of ethically relevant data regarding pedagogical use of personal genomic information.
management system named Archival Information Management System (AIMS), designed to meet the audit trail requirement for studies completed under the...are to be archived to the extent that future reproducibility and interrogation of results will exist. This report presents a prototype information
This article offers a dynamic view of continuously changes in a specific informational system illustrated through a case study in a small network company. Central aspects of the evolutionary process will be identified and framed in relation to the informational system change. It will be argued th...
Alterescu, S.; Hipkins, K. R.; Friedman, C. A.
On-line interactive information processing system easily and rapidly handles all aspects of data management related to patient care. General purpose system is flexible enough to be applied to other data management situations found in areas such as occupational safety data, judicial information, or personnel records.
Tanaka, Katsuaki; Hori, Koichi; Yamamoto, Masato
The flood of information on the Internet makes a person who surf it without some strong intention strayed into it. One of the ways to control the balance between a person and the flood is a recommender system by computer, and many web sites use it. These systems work on a web site for the same kind of items. However the field of personal activity is not limited to handle the same kind of thing and a web site, but also offline area in the real world. To handle personal offline activities, LifeLog is proposed as method to record it, but the main purpose of LifeLog is recording a personal history. How to use a history has still been studied stage. The authors have developed a recommender system that captures personal context from history of personal online and offline activities, treats information on web sites as a large set of context, and finds out and extends overlap of them, then recommends information located there. The aim of the system is that a person can enjoy waves of information again. The system worked as a part of My-life Assist Service. It was a service for mobile phones provided by NTT DoCoMo, Inc. as a field experiment from Dec. 2007 to Feb. 2008.
Technology is the science that studies processes, methods and operations run or applied onto raw materials, matters or data, in order to obtain a certain product. Information is the material signal able to launch a material reaction of a dynamic auto-tuning system for which the system is conditioned and finalized. Information Technology is the technology needed for handling (procuring, processing, storing converting and transmitting) information, in particular, with the use of computers [Long...
Kostagiolas, Petros; Lavranos, Charilaos; Martzoukou, Konstantina; Papadatos, Joseph
Introduction: This paper explores the relationship between musicians' information seeking behaviour and their personality traits within the context of musical creativity. Although previous research has addressed different socio-technological and behavioral aspects of music information seeking, the role of personality characteristics around…
Huvila, Isto; Eriksen, Jon; Häusner, Eva-Maria; Jansson, Ina-Maria
Introduction: Recent personal information management literature has underlined the significance of the contextuality of personal information and its use. The present article discusses the applicability of the records continuum model and its generalisation, continuum thinking, as a theoretical framework for explicating the overlap and evolution of…
Management information systems (MIS) is a commonly used term in computer profession. The new information technology has caused management to expect more from computer. The process of supplying information follows a well defined procedure. MIS should be capable for providing usable information to the various areas and levels of organization. MIS is different from data processing. MIS and business hierarchy provides a good framework for many organization which are using computers. (A.B.)
Sepulveda, Jorge L; Young, Donald S
Laboratory information systems (LIS) are critical components of the operation of clinical laboratories. However, the functionalities of LIS have lagged significantly behind the capacities of current hardware and software technologies, while the complexity of the information produced by clinical laboratories has been increasing over time and will soon undergo rapid expansion with the use of new, high-throughput and high-dimensionality laboratory tests. In the broadest sense, LIS are essential to manage the flow of information between health care providers, patients, and laboratories and should be designed to optimize not only laboratory operations but also personalized clinical care. To list suggestions for designing LIS with the goal of optimizing the operation of clinical laboratories while improving clinical care by intelligent management of laboratory information. Literature review, interviews with laboratory users, and personal experience and opinion. Laboratory information systems can improve laboratory operations and improve patient care. Specific suggestions for improving the function of LIS are listed under the following sections: (1) Information Security, (2) Test Ordering, (3) Specimen Collection, Accessioning, and Processing, (4) Analytic Phase, (5) Result Entry and Validation, (6) Result Reporting, (7) Notification Management, (8) Data Mining and Cross-sectional Reports, (9) Method Validation, (10) Quality Management, (11) Administrative and Financial Issues, and (12) Other Operational Issues.
Registered nurses with a diploma or an associate's degree are encouraged to return to school to earn a Bachelor of Science in Nursing degree. Until they return to school, many RNs have little need to regularly write, store, and retrieve work-related papers, but they are expected to complete the majority of assignments using a computer when in the student role. Personal information management (PIM) is a system of organizing and managing electronic information that will reduce computer clutter, while enhancing time use, task management, and productivity. This article introduces three PIM strategies for managing school work. Nesting is the creation of a system of folders to form a hierarchy for storing and retrieving electronic documents. Each folder, subfolder, and document must be given a meaningful unique name. Numbering is used to create different versions of the same paper, while preserving the original document. Copyright 2015, SLACK Incorporated.
Potini, Vishnu C; Weerasuriya, Dilani N; Lowery-North, Douglas W; Kellermann, Arthur L
Describe commercially available products and services designed to convey personal health information in emergencies. The search engine Google®, supplemented by print ads, was used to identify companies and organizations that offer relevant products and services to the general market. Disease-specific, health system, and health plan-specific offerings were excluded. Vendor web sites were the primary sources of information, supplemented by telephone and e-mail queries to sales representatives. Perfect inter-rater agreement was achieved. Thirty-nine unique vendors were identified. Eight sell engraved jewelry. Three offer an embossed card or pamphlet. Twelve supply USB drives with various features. Eleven support password-protected web sites. Five maintain national call centers. Available media differed markedly with respect to capacity and accessibility. Quoted prices ranged from a one-time expenditure of $3.50 to an annual fee of $200. Associated features and annual fees varied widely. A wide range of products and services exist to help patients convey personal health information. Health care providers should be familiar with their features, so they can access the information in a disaster or emergency.
Y. G. Gorshkov
Full Text Available The requirements imposed on transfer by the personal biometric information in systems and communication networks according to Federal Law № 152 “Personal data” are defined. Lacks of used decisions protection of such biometric data, as the test speech information, including parameters of a speech path, and also acoustic signals of tones and noise of heart of the person on an example of telemedicine systems construction with the using of a network telephone channels general using and wireless networks Wi-Fi are considered. Directions of works are formulated on safety of the personal biometric data transferred in telecommunication systems.
Ana Serrano Tellería
Full Text Available Data collected from the profiles and the digital identities has become a valuable currency for the mobile ecosystem, especially between users and providers. Services that required them are also described as the ground floor in direct linked with the infrastructures and as intermediate layers between networks, platforms and applications. The frontier debate between innovation and protection of privacy is shown off undefined and unstable. Therefore, a comparative analysis between ‘Privacy Terms and Conditions’ as well as the interrelation between operative systems (Apple iOS, Android, Blackberry and Windows Phone, social media platforms (Facebook, LinkedIn, Twitter and Google + and applications (Instagram, WhatsApp, Line and Vine have been carried out focusing on Privacy issues. Two main tendencies were appreciated in relation with the two principal operative systems: Apple iOS closed environment and Google Android open source. They reconfigure the functional structure and design of platforms and applications in different ways. The liquid spheres observed varied from the first approach that tried to control every action and personal information from the binomial operative system-device and the second one that allowed the user actions and information to be more susceptible to interact with any kind of applications and platforms while the system is linked to information aggregation services to collect the data. Prominent aspects were the various stages of synchronization between the different levels of personal information (contacts, profile, digital identity and localization. Focusing on the case of Portugal, other complementary conclusions obtained from focus group and surveys showed a strong circumstantial pattern behaviour and a concern about privacy issues taking care of some actions while admitted checking if they had the terms and conditions involved - which are too ambiguous - but not reading them. Described also by other international
Limback, Nathan P [Los Alamos National Laboratory; Medina, Melanie A [Los Alamos National Laboratory; Silva, Michelle E [Los Alamos National Laboratory
The Information Systems Analysis and Development (ISAD) Team of the Safeguards Systems Group at Los Alamos National Laboratory (LANL) has been developing web based information and knowledge management systems for sixteen years. Our vision is to rapidly and cost effectively provide knowledge management solutions in the form of interactive information systems that help customers organize, archive, post and retrieve nonproliferation and safeguards knowledge and information vital to their success. The team has developed several comprehensive information systems that assist users in the betterment and growth of their organizations and programs. Through our information systems, users are able to streamline operations, increase productivity, and share and access information from diverse geographic locations. The ISAD team is also producing interactive visual models. Interactive visual models provide many benefits to customers beyond the scope of traditional full-scale modeling. We have the ability to simulate a vision that a customer may propose, without the time constraints of traditional engineering modeling tools. Our interactive visual models can be used to access specialized training areas, controlled areas, and highly radioactive areas, as well as review site-specific training for complex facilities, and asset management. Like the information systems that the ISAD team develops, these models can be shared and accessed from any location with access to the internet. The purpose of this paper is to elaborate on the capabilities of information systems and interactive visual models as well as consider the possibility of combining the two capabilities to provide the next generation of infonnation systems. The collection, processing, and integration of data in new ways can contribute to the security of the nation by providing indicators and information for timely action to decrease the traditional and new nuclear threats. Modeling and simulation tied to comprehensive
The goal of this project is to create responsive design portal with the tools for its administration which lets users to access tourist relevant information. In order to achieve the goal certain tasks were formulated, few technical analysis were done and similar systems which already exist were reviewed. The result is creation of information system with administrative tools, which can be used by several user types which have rights to take adequate actions. The system has account control modu...
Sirintrapun, S Joseph; Artz, David R
This article provides surgical pathologists an overview of health information systems (HISs): what they are, what they do, and how such systems relate to the practice of surgical pathology. Much of this article is dedicated to the electronic medical record. Information, in how it is captured, transmitted, and conveyed, drives the effectiveness of such electronic medical record functionalities. So critical is information from pathology in integrated clinical care that surgical pathologists are becoming gatekeepers of not only tissue but also information. Better understanding of HISs can empower surgical pathologists to become stakeholders who have an impact on the future direction of quality integrated clinical care. Copyright © 2015 Elsevier Inc. All rights reserved.
Full Text Available The objective of this contribution is to characterize alternatives of information systems used for managing, processing and evaluation of information related to company vehicles. Especially we focus on logging, transferring and processing of on-road vehicle movement information in inland and international transportation. This segment of company information system has to monitor the car movement – actively or passively – according to demand of the company and after the processing it has to evaluate and give the complex monitoring of a situation of all the company vehicles to the controller.
Frankowski, J. W.
MIMS, Medical Information Management System is an interactive, general purpose information storage and retrieval system. It was first designed to be used in medical data management, and can be used to handle all aspects of data related to patient care. Other areas of application for MIMS include: managing occupational safety data in the public and private sectors; handling judicial information where speed and accuracy are high priorities; systemizing purchasing and procurement systems; and analyzing organizational cost structures. Because of its free format design, MIMS can offer immediate assistance where manipulation of large data bases is required. File structures, data categories, field lengths and formats, including alphabetic and/or numeric, are all user defined. The user can quickly and efficiently extract, display, and analyze the data. Three means of extracting data are provided: certain short items of information, such as social security numbers, can be used to uniquely identify each record for quick access; records can be selected which match conditions defined by the user; and specific categories of data can be selected. Data may be displayed and analyzed in several ways which include: generating tabular information assembled from comparison of all the records on the system; generating statistical information on numeric data such as means, standard deviations and standard errors; and displaying formatted listings of output data. The MIMS program is written in Microsoft FORTRAN-77. It was designed to operate on IBM Personal Computers and compatibles running under PC or MS DOS 2.00 or higher. MIMS was developed in 1987.
Mesch, Gustavo S.; Beker, Guy
This study investigated whether norms of self-disclosure of one's online and offline identity are linked to online disclosure of personal and intimate information. We expected online disclosure of personal and intimate information to be associated with norms of online disclosure. Secondary analysis of the 2006 Pew and American Life Survey of…
Filman, Robert E.
I flew to Washington last week, a trip rich in distributed information management. Buying tickets, at the gate, in flight, landing and at the baggage claim, myriad messages about my reservation, the weather, our flight plans, gates, bags and so forth flew among a variety of travel agency, airline and Federal Aviation Administration (FAA) computers and personnel. By and large, each kind of information ran on a particular application, often specialized to own data formats and communications network. I went to Washington to attend an FAA meeting on System-Wide Information Management (SWIM) for the National Airspace System (NAS) (http://www.nasarchitecture.faa.gov/Tutorials/NAS101.cfm). NAS (and its information infrastructure, SWIM) is an attempt to bring greater regularity, efficiency and uniformity to the collection of stovepipe applications now used to manage air traffic. Current systems hold information about flight plans, flight trajectories, weather, air turbulence, current and forecast weather, radar summaries, hazardous condition warnings, airport and airspace capacity constraints, temporary flight restrictions, and so forth. Information moving among these stovepipe systems is usually mediated by people (for example, air traffic controllers) or single-purpose applications. People, whose intelligence is critical for difficult tasks and unusual circumstances, are not as efficient as computers for tasks that can be automated. Better information sharing can lead to higher system capacity, more efficient utilization and safer operations. Better information sharing through greater automation is possible though not necessarily easy.
Tuomainen, Mika; Mykkänen, Juha
Personal information management has been proposed as an important enabler for individual empowerment concerning citizens' wellbeing and health information. In the MyWellbeing project in Finland, a strictly citizen-driven concept of "Coper" and related architectural and functional guidelines have been specified. We present a reference architecture and a set of identified application services to support personal wellbeing information management. In addition, the related standards and developments are discussed.
the technology and expertise to process and share ... services. GEHS supports efforts that reach beyond healthcare institutions to capture evidence ... Health information systems are a foundation for quality care, and can increase accountability ...
Home > Building Energy Information Systems and Performance Monitoring (EIS-PM) Building Energy evaluate and improve performance monitoring tools for energy savings in commercial buildings. Within the and visualization capabilities to energy and facility managers. As an increasing number of
Department of Transportation — The Matter Tracking Information System (MTIS) principle function is to streamline and integrate the workload and work activity generated or addressed by our 300 plus...
US Agency for International Development — USAID/OIG has initiated its new Audit Information Management System (AIMS) to track OIG's audit recommendations and USAID's management decisions. OIG's in-house...
Department of Transportation — EIS is an automated management information system that tracks the FAA’s enforcement actions on a nationwide basis. EIS is the FAA’s primary database for tracking...
Bens Pardamean; Anindito; Anjela Djoeang; Nana Tobing
The study designed an information system model for Disease Management (DisMan) that met the specifications and needs of a consumer electronics manufacturer. The diseases monitored by this study were diabetes, hypertension and tuberculosis. Data were collected through interviews with the companyâs human resources department and occupational health provider. As for the model, literature and online research were conducted to collect health standards and information system standards on existing D...
Leising, Daniel; Erbs, Julia; Fritz, Ulrike
In most studies using informant reports of personality, the informants are recruited by the targets. Such informants may tend to like the targets and thus portray them in specific ways (e.g., too positively). Study 1 (N = 403) demonstrated the necessity to distinguish between "liking" and "knowing" in studying the relationships between informants and targets. Informants who liked their targets better described them more positively (i.e., as being more extraverted, agreeable, open, conscientious, and less neurotic). The association between personality ratings and liking was moderated by item evaluativeness. Liked targets were also described as being more similar to each other (range restriction), which would lower correlations of informant ratings of personality with external variables. Study 2 (N = 90) used a within-subjects design to disentangle actual personality differences between targets (substance) from the informants' specific views on the targets (style). Ninety informants were asked to nominate targets they did not like. These targets then nominated informants of their own choice. Target-nominated informants liked the targets very much and described the targets' personalities very positively and in ways that were highly redundant with the average target's self-rating. There was evidence that lower liking may be associated with better accuracy. Higher subjective levels of knowing were not associated with better interrater agreement but with a greater willingness to describe targets negatively. Implications for the field of recruiting are discussed. Where possible, the choice of informants and referees should be made independent of the targets' preferences.
Jones, Gareth J.F.; Gurrin, Cathal; Kelly, Liadh; Byrne, Daragh; Chen, Yi
Emerging personal lifelog (PL) collections contain permanent digital records of information associated with individuals’ daily lives. This can include materials such as emails received and sent, web content and other documents with which they have interacted, photographs, videos and music experienced passively or created, logs of phone calls and text messages, and also personal and contextual data such as location (e.g. via GPS sensors), persons and objects present (e.g. via Bluetooth) and ph...
Full Text Available Technology is the science that studies processes, methods and operations run or applied onto raw materials, matters or data, in order to obtain a certain product. Information is the material signal able to launch a material reaction of a dynamic auto-tuning system for which the system is conditioned and finalized. Information Technology is the technology needed for handling (procuring, processing, storing converting and transmitting information, in particular, with the use of computers [Longley, D. & Shain, M. (1985, p. 164]. The importance of IT in the economic growth and development is widely known, taking into account the impact that technology can have on the success and survival, or the failure of the economic activity of enterprises/organizations, IT offering various management information systems (MIS, executive and feedback segments, which all have important and beneficial implications in management and control.
Full Text Available The South African Advanced Fire Information System (AFIS) is the first near real-time satellite-based fire monitoring system in Africa. It was originally developed for, and funded by, the electrical power utility Eskom, to reduce the impact of wild...
An Australian university architect studying management information systems programs at academic institutions in the United States visited 26 universities and colleges and nine educational and professional associations, including extended visits at the University of Wisconsin and the National Center of Higher Education Management Systems. During these visits, he investigated university and college space utilization programs, gained operational and developmental experience at institutions with education philosophies similar to those in Australia, and examined trends in low cost student housing. This report of his observations focusses on management information systems projects throughout the academic community, resource accountability, energy conservation, facilities planning for the handicapped, student housing, and interdisciplinary approaches to education.
Havn, Erling; Bansler, Jørgen P.
The production of application software is rapidly being industrialized. Computer manufacturers and software houses produce a rapidly growing number of generic software applications and systems, and more and more user companies choose to build their computer-based information systems...... with such generic products, instead of custom made software. We discuss how the move away from traditional in-house development and the increasing use of generic software is likely to transform IS development in the near future. We conclude that these developments will make new demands on the information systems...
Morita, T. [Sharp Corp., Osaka (Japan)
Most of information devices used in the business field use keyboards for the inputting measure, but keyboards are rather awkward for personal use. In contrast to this, the pen input method which everybody can use easily is a product of the latest development. In this articles, on-line handwritten letter recognition is roughly explained which is the basic technique of pen input. Pen input has a demerit that its letter inputting speed is slow, but has much more merits that Chinese ideographs can be directly input, figures, handwritten memoranda, etc. are treated likewise, the device itself can be made compact and no noise is made. The on-line letter recognition methods now used practically can be roughly divided into the pattern matching method and the basic stroke method. Each of them has its own merits and demerits. For the current on-line handwritten letter recognition, the condition is necessary to handwritten a letter in the square style (kaisho) and carefully within the framework for letter entry upon writing, and for this arrangement, input is performed through the work processes of pretreatment/feature extraction, stroke recognition, letter comparison, detail discrimination, and after-treatment. 3 refs., 7 figs.
Arnaudov, D.D.; Govorun, N.N.
The organization of the main files of the JINR Information Retrieval System is described. There are four main files in the System. They are as follows: MD file that consists of abstracts of documents; OMPOD file where the index records of documents are gathered; MZD file that consists of list heads, and OMD file- the file of descriptors. The last three files are considered in some detail. The System is realized in the COBOL language on the CDC computer
Feri Štivan; Janez Benedik; Tomaž Lužar
Introduction: The use of anesthesia information management systems (AIMS) is on the increase. This is particularly true for academic anesthesia departments. The main reasons for slow adoption of these systems in the past are financial barriers associated with implementation of these systems and their not so traditionally obvious potential to improve patient care. In addition, a major obstacle to acceptance of this technology is the concern of users over the impact of the electronic anesthesia...
Rajendra S. Choudhary
Full Text Available Every job demands an employee with some specific qualities in addition to the basic educational qualification. For example, an introvert person cannot be a good leader despite of a very good academic qualification. Thinking and logical ability is required for a person to be a successful software engineer. So, the aim of this paper is to present a novel approach for advising an ideal job to the job seeker while considering his personality trait and educational qualification both. Very well-known theories of personality like MBTI indicator and OCEAN theory, are used for personality mining. For education mining, score based system is used. The score based system captures the information from attributes like most scoring subject, dream job etc. After personality mining, the resultant values are coalesced with the information extracted from education mining. And finally, the most suited jobs, in terms of personality and educational qualification are recommended to the job seekers. The experiment is conducted on the students who have earned an engineering degree in the field of computer science, information technology and electronics. Nevertheless, the same architecture can easily be extended to other educational degrees also. To the best of the author’s knowledge, this is a first e-job advisory system that recommends the job best suited as per one’s personality using MBTI and OCEAN theory both.
Revilla Muñoz, Olga; Alpiste Penalba, Francisco; Fernández Sánchez, Joaquín
Teachers deal with Information and Communications Technology (ICT) every day and they often have to solve problems by themselves. To help them in coping with this issue, an online support program has been created, where teachers can pose their problems on ICT and they can receive solutions from other teachers. A Recommender System has been defined and implemented into the support program to suggest to each teacher the most suitable solution based on her Skills, Competences, and Attitude toward ICT (SCAT-ICT). The support program has initially been populated with 70 problems from 86 teachers. 30 teachers grouped these problems into six categories with the card-sorting technique. Real solutions to these problems have been proposed by 25 trained teachers. Finally, 17 teachers evaluated the usability of the support program and the Recommender System, where results showed a high score on the standardized System Usability Scale.
Kolovou, L; Vatousi, M; Lymperopoulos, D; Koukias, M
The innovative features of an advanced Radiology Information System (RIS) are presented in this paper. The interoperability of RIS with the other Intra-hospital Information Systems that interacts with, dealing with the compatibility and open architecture issues, are accomplished by two novel mechanisms . The first one is the particular message handling system that is applied for the exchange of information, according to the Health Level Seven (HL7) protocol's specifications and serves the transfer of medical and administrative data among the RIS applications and data store unit. The same mechanism allows the secure and HL7-compatible interactions with the Hospital Information System (HIS) too. The second one implements the translation of information between the formats that HL7 and Digital Imaging and Communication in Medicine (DICOM) protocols specify, providing the communication between RIS and Picture and Archive Communication System (PACS). The whole structure ensures the automation of the every-day procedures that the ;medical protocol' specifies and provides its services through a friendly and easy to manage graphical user interface.
The hospital materials management function--ensuring that goods and services get from a source to an end user--encompasses many areas of the hospital and can significantly affect hospital costs. Performing this function in a manner that will keep costs down and ensure adequate cash flow requires effective management of a large amount of information from a variety of sources. To effectively coordinate such information, most hospitals have implemented some form of materials management information system (MMIS). These systems can be used to automate or facilitate functions such as purchasing, accounting, inventory management, and patient supply charges. In this study, we evaluated seven MMISs from seven vendors, focusing on the functional capabilities of each system and the quality of the service and support provided by the vendor. This Evaluation is intended to (1) assist hospitals purchasing an MMIS by educating materials managers about the capabilities, benefits, and limitations of MMISs and (2) educate clinical engineers and information system managers about the scope of materials management within a healthcare facility. Because software products cannot be evaluated in the same manner as most devices typically included in Health Devices Evaluations, our standard Evaluation protocol was not applicable for this technology. Instead, we based our ratings on our observations (e.g., during site visits), interviews we conducted with current users of each system, and information provided by the vendor (e.g., in response to a request for information [RFI]). We divided the Evaluation into the following sections: Section 1. Responsibilities and Information Requirements of Materials Management: Provides an overview of typical materials management functions and describes the capabilities, benefits, and limitations of MMISs. Also includes the supplementary article, "Inventory Cost and Reimbursement Issues" and the glossary, "Materials Management Terminology." Section 2. The
INIS is the abbreviation for the International Nuclear Information System operated by IAEA in cooperation with its member countries. The function of the INIS system whose aim is to provide the member countries with information on nuclear literature is based on the decentralized input data preparation, centralized checking and on the creation of a unified data base and on the decentralized output materials processing. Czechoslovakia is represented in INIS by the Nuclear Information Centre which has been taking active part in the building and development of INIS since its very beginning. It provides for the use of output INIS materials by users in Czechoslovakia, this by means of a computerized network. The Czechoslovak Nuclear Information Centre has since 1978 been using a teleprocessing terminal connected to the IAEA central processor by means of a telephone line, which allows direct access to the INIS data base. (Ha)
New Automated Management Information Center (AMIC) employs innovative microcomputer techniques to create color charts, viewgraphs, or other data displays in a fraction of the time formerly required. Developed under Kennedy Space Center's contract by Boeing Services International Inc., Seattle, WA, AMIC can produce an entirely new informational chart in 30 minutes, or an updated chart in only five minutes. AMIC also has considerable potential as a management system for business firms.
Ortiz, P.; Mrabit, K.; Miaw, S.
In this lecture the principles of the regulatory authority information system (RAIS) are presented. RAIS is a tool currently being developed by the IAEA for the Regulatory Authorities. It is a part of a set of supporting actions designed to assist member states in achieving the objectives of the Model project on radiation and waste safety infrastructure. RAIS is a tool that provides the management of the Regulatory Authority with the key information needed for the planning and implementation of activities and to ensure confidence that resources are optimally used. The RAIS contains five modules: Inventory of installations and radiation sources; Authorization process; Inspection and follow-up actions; Information on personal dosimetry; Assessment of effectiveness by means of performance indicators
Prologue is a health information system developed for underserved communities in Bihar, India. It is aimed at helping people living in poverty and with low literacy to take the right steps to manage their and their family’s health. Bihar suffers from one of the worst healthcare records in the country. This is as much due to the lack of access to the right information as it is due to the economic condition of the region. The inaccessibility of information is aggravated by the complex social se...
Full Text Available This essay assesses the communications and information systems (CIS in support of the civilian and military structures deployed in the European Union led crises management operations and missions. The article emphasizes the specific structure and function of CIS taking in consideration the particularities of EU led missions. The integration of the EU institutional networks and systems with the national systems provided by the EU member states is considered a key element. The analysis-part of this paper starts with the specific EU command and control system for crises management missions based on two autonomous solutions and one relying on NATO capabilities. Further, it continues with the challenges of the classifi ed information exchange at the operational theatre level. The most important contribution of this article is based on the long term vision implementation measures for the CIS structure, roles, functions and services provided and the information management infrastructure. CIS deployment mechanisms are described with references to the practical situation of the CIS deployed in support of crises management operations and missions. Two important defi nitions are provided regarding the CIS for crisis management and their roles in the specific EU operational environment. The system view of the operational CIS is depicted and analysed also, with a focus on the integration aspects of the infrastructure as the information transport layer for the information exchange flow. The last part of the article focuses on the CIS functions for the deployed systems which are detailed alongside with the C2 and Information Exchange Requirements in the EU operational environment. The variety of the theoretical approaches to determine the CIS infrastructure for EU-led civilian and military missions triggers the conclusion that the planning and implementation process is extremely complex especially in the context of the new security environment and requires
followed during a project assignment. The long version of the commonly-used NEO-PI-R test instrument was employed to describe and compare each group member's personality traits at a more detailed level. Data were also collected through a process survey, a diary and an interview. Analysis. The calculation....... Information behaviour associated with personality traits was identified, but the presence of personality effects tended to vary with the perceived presence of the social context. Conclusions. Some matches were identified between group members' personality traits and their actual information behaviour...... but there were also deviations, which were found that seemed to be related to the group-work context. The importance of studying personality traits in context has further been confirmed....
Lafky, Deborah Beranek; Horan, Thomas A
Personal health record (PHR) systems are a subject of intense interest in the move to improve healthcare accessibility and quality. Although a number of vendors continue to put forward PHR systems, user-centered design research has lagged, and it has not been clear what features are important to prospective PHR users. Here, we report on a user-centered design study that combines qualitative and quantitative approaches to investigate several dimensions relevant to PHR design, and to look at the effect of health status on user needs. The results indicate that health status, especially disability and chronic illness, is relevant to PHR design. Further, the results provide empirical evidence about the role of privacy and security in users' attitudes toward PHR use. The exact nature of these attitudes differs from widely held perceptions about consumer values in healthcare information management. © The Author(s) 2011.
Bowers, Dan M
Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed
Robertson, Tina L. (Inventor); Raney, Michael C. (Inventor); Dougherty, Dennis M. (Inventor); Kent, Peter C. (Inventor); Brucker, Russell X. (Inventor); Lampert, Daryl A. (Inventor)
A system and methods through which pictorial views of an object's configuration, arranged in a hierarchical fashion, are navigated by a person to establish a visual context within the configuration. The visual context is automatically translated by the system into a set of search parameters driving retrieval of structured data and content (images, documents, multimedia, etc.) associated with the specific context. The system places ''hot spots'', or actionable regions, on various portions of the pictorials representing the object. When a user interacts with an actionable region, a more detailed pictorial from the hierarchy is presented representing that portion of the object, along with real-time feedback in the form of a popup pane containing information about that region, and counts-by-type reflecting the number of items that are available within the system associated with the specific context and search filters established at that point in time.
This Guide provides guidelines for the design and evaluation of a working safety information system. For the relatively few safety professionals who have already adopted computer-based programs, this Guide may aid them in the evaluation of their present system. To those who intend to develop an information system, it will, hopefully, inspire new thinking and encourage steps towards systems safety management. For the line manager who is working where the action is, this Guide may provide insight on the importance of accident facts as a tool for moving ideas up the communication ladder where they will be heard and acted upon; where what he has to say will influence beneficial changes among those who plan and control his operations. In the design of a safety information system, it is suggested that the safety manager make friends with a computer expert or someone on the management team who has some feeling for, and understanding of, the art of information storage and retrieval as a new and better means for communication
A true Geographic Information System (GIS) is a computer mapping system with spatial analysis ability and cartographic accuracy that will offer many different projections. GIS has evolved to become an everyday tool for a wide range of users including oil companies, worldwide. Other systems are designed to allow oil and gas companies to keep their upstream data in the same format. Among these are the Public Petroleum Data Model developed by Gulf Canada, Digitech and Applied Terravision Systems of Calgary, the system developed and marketed by the Petrotechnical Open Software Corporation in the United States, and the Mercury projects by IBM. These have been developed in an effort to define an industry standard. The advantages and disadvantages of open and closed systems were discussed. Factors to consider when choosing a GIS system such as overall performance, area of use and query complexity, were reviewed. 3 figs
Svengren, Haakan; Meyer, Brita Diskerud
Today's control room systems are designed to operate during power operation, and there is clearly a need for a system to support control room personnel in automatically supervising the status of the plant during the outage period. In order to improve the supervision of Nuclear Power Plants during outages, three prototypes of the Outage Information system have been designed by the Halden Project, one for PWR and two for BWR. The Outage Information System is presented on a large screen, centrally placed in the control room. There will be a PC connected to manage the system. By using signals from the process as input to logic diagrams reflecting the plant's Safety Technical Specifications, the system automatically is supervising that requirements in Safety Technical Specifications are fulfilled during all plant states of the outage period. The system also automatically gives an overview of the status of safety systems and electrical bus bars. Alarm will occur if a requirement in the Safety Technical Specifications is not fulfilled or if a component planned to be ready for operation, is inoperable. In addition, selected measurements being important during the outage period are presented on the large screen. Which measurements and in which way the values will be presented, depends on the plant's control room design and work practice. (Author)
Pratheepa, Maria; Jalali, Sushil Kumar; Arokiaraj, Robinson Silvester; Venkatesan, Thiruvengadam; Nagesh, Mandadi; Panda, Madhusmita; Pattar, Sharath
Insect Barcode Information System called as Insect Barcode Informática (IBIn) is an online database resource developed by the National Bureau of Agriculturally Important Insects, Bangalore. This database provides acquisition, storage, analysis and publication of DNA barcode records of agriculturally important insects, for researchers specifically in India and other countries. It bridges a gap in bioinformatics by integrating molecular, morphological and distribution details of agriculturally important insects. IBIn was developed using PHP/My SQL by using relational database management concept. This database is based on the client- server architecture, where many clients can access data simultaneously. IBIn is freely available on-line and is user-friendly. IBIn allows the registered users to input new information, search and view information related to DNA barcode of agriculturally important insects.This paper provides a current status of insect barcode in India and brief introduction about the database IBIn. http://www.nabg-nbaii.res.in/barcode.
Hauswirth, Manfred; Jazayeri, Mehdi; Miklós, Zoltan; Podnar, Ivana; Di Nitto, Elisabetta; Wombacher, Andreas
The increasing use of the Internet in business and commerce has created a number of new business opportunities and the need for supporting models and platforms. One of these opportunities is information commerce (i-commerce), a special case of ecommerce focused on the purchase and sale of information as a commodity. In this paper we present an architecture for i-commerce systems using OPELIX (Open Personalized Electronic Information Commerce System)  as an example. OPELIX provides an open...
Kearns, Lorna R.; Frey, Barbara A.; Tomer, Christinger; Alman, Susan
The literature suggests that personal information management is a serious challenge for many computer users. Online faculty are especially challenged because of the large number of electronic files necessitated by teaching online. Those who have experience in this environment may offer valuable insights regarding information management challenges…
Kim, Sujin; Sinn, Donghee; Syn, Sue Yeon
With abundant personal health information at hand, individuals are faced with a critical challenge in evaluating the informational value of health care records to keep useful information and discard that which is determined useless. Young, healthy college students who were previously dependents of adult parents or caregivers are less likely to be concerned with disease management. Personal health information management (PHIM) is a special case of personal information management (PIM) that is associated with multiple interactions among varying stakeholders and systems. However, there has been limited evidence to understand informational or behavioral underpinning of the college students' PHIM activities, which can influence their health in general throughout their lifetime. This study aimed to investigate demographic and academic profiles of college students with relevance to PHIM activities. Next, we sought to construct major PHIM-related activity components and perceptions among college students. Finally, we sought to discover major factors predicting core PHIM activities among college students we sampled. A Web survey was administered to collect responses about PHIM behaviors and perceptions among college students from the University of Kentucky from January through March 2017. A total of 1408 college students were included in the analysis. PHIM perceptions, demographics, and academic variations were used as independent variables to predict diverse PHIM activities using a principal component analysis (PCA) and hierarchical regression analyses (SPSS v.24, IBM Corp, Armonk, NY, USA). Majority of the participants were female (956/1408, 67.90%), and the age distribution of this population included an adequate representation of college students of all ages. The most preferred health information resources were family (612/1408, 43.47%), health care professionals (366/1408, 26.00%), friends (27/1408, 1.91%), and the internet (157/1408, 11.15%). Organizational or
Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber
Koponen, B.L.; Hampel, V.E.
The nuclear criticality safety program at LLNL began in the 1950's with a critical measurements program which produced benchmark data until the late 1960's. This same time period saw the rapid development of computer technology useful for both computer modeling of fissile systems and for computer-aided management and display of the computational benchmark data. Database management grew in importance as the amount of information increased and as experimental programs were terminated. Within the criticality safety program at LLNL we began at that time to develop a computer library of benchmark data for validation of computer codes and cross sections. As part of this effort, we prepared a computer-based bibliography of criticality measurements on relatively simple systems. However, it is only now that some of these computer-based resources can be made available to the nuclear criticality safety community at large. This technology transfer is being accomplished by the DOE Technology Information System (TIS), a dedicated, advanced information system. The NCIS database is described
Full Text Available All academic information on the web or elsewhere has its creator, that is, a subject who has created the information. The subject can be an individual, a group, or an institution, and can be a nation depending on the nature of the relevant information. Most information is composed of a title, an author, and contents. An essay which is under the academic information category has metadata including a title, an author, keyword, abstract, data about publication, place of publication, ISSN, and the like. A patent has metadata including the title, an applicant, an inventor, an attorney, IPC, number of application, and claims of the invention. Most web-based academic information services enable users to search the information by processing the meta-information. An important element is to search information by using the author field which corresponds to a personal name. This study suggests a method of efficient indexing and using the adjacent operation result ranking algorithm to which phrase search-based boosting elements are applied, and thus improving the accuracy of the search results of personal names. It also describes a method for providing the results of searching co-authors and related researchers in searching personal names. This method can be effectively applied to providing accurate and additional search results in the academic information services.
Neame, Roderick L B
The protection of personal information privacy has become one of the most pressing security concerns for record keepers: this will become more onerous with the introduction of the European General Data Protection Regulation (GDPR) in mid-2014. Many institutions, both large and small, have yet to implement the essential infrastructure for data privacy protection and patient consent and control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring, has led to the imposition of increasingly significant monetary penalties for failure to protect privacy: these too are set to become more onerous under the GDPR, increasing to a maximum of 2% of annual turnover. There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information. This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy. This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing. REQUIREMENTS FOR PRIVACY: There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers) to keep patient information confidential and to share it only with the authorisation of the patient. To achieve this information storage and retrieval, communication systems must be appropriately configured. There are many components of this, which are discussed in this paper. Patients may consult clinicians anywhere and at any time: therefore, their data must be available for recipient-driven retrieval (i.e. like the World Wide Web) under patient control and kept private: a method for delivering this is outlined.
Roderick L B Neame
Full Text Available Background The protection of personal information privacy has become one of the most pressing security concerns for record keepers. Many institutions have yet to implement the essential infrastructure for data privacy protection and patient control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring has led to the imposition of increasingly significant monetary penalties for failures to protect privacy. Objective There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information. This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy. This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing.Requirements for Privacy There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers to keep patient information confidential and to share it only with the authorisation of the patient. To achieve this information storage and retrieval, and communication systems must be appropriately configured. Patients may consult clinicians anywhere and at any time: therefore their data must be available for recipient-driven retrieval under patient control and kept private.
Svejvig, Per; Pries.Heje, Jan
Outsourcing is now a feasible mean for Enterprise Information Systems (EIS) cost savings, but do however increase the complexity substantially when many organizations are involved. We set out to study EIS outsourcing with many interorganizational partners in a large Scandinavian high-tech organiz......Outsourcing is now a feasible mean for Enterprise Information Systems (EIS) cost savings, but do however increase the complexity substantially when many organizations are involved. We set out to study EIS outsourcing with many interorganizational partners in a large Scandinavian high...... the rational cost saving explanation; but then with a more careful analysis focusing on institutional factors, other explanations "behind the curtain" were revealed, such as management consultants with a "best practice" agenda, people promoting outsourcing thereby being promoted themselves, and outside...
Pries-Heje, Jan; Svejvig, Per
Outsourcing is now a feasible mean for Enterprise Information Systems (EIS) cost savings, but do however increase the complexity substantially when many organizations are involved. We set out to study EIS outsourcing with many interorganizational partners in a large Scandinavian high-tech organ...... Outsourcing is now a feasible mean for Enterprise Information Systems (EIS) cost savings, but do however increase the complexity substantially when many organizations are involved. We set out to study EIS outsourcing with many interorganizational partners in a large Scandinavian high...... the rational cost saving explanation; but then with a more careful analysis focusing on institutional factors, other explanations "behind the curtain" were revealed, such as management consultants with a "best practice" agenda, people promoting outsourcing thereby being promoted themselves, and outside...
Kjærgaard, Annemette Leonhardt; Jensen, Tina Blegind
This paper explores the use of cognitive mapping for eliciting users' sensemaking during information system (IS) appropriation. Despite the potential usefulness of sensemaking, few studies in IS research use it as a theoretical lens to address IS appropriation. A possible reason for this may...... be that sensemaking does not easily lend itself to be used in practice. We introduce cognitive mapping as a way to elicit users' sensemaking and illustrate its value by reporting on findings from an empirical study of the introduction of an Electronic Patient Record (EPR) system. The contribution of the paper...
This contract was for the development of a new range of colliery information computer systems (CIS) using a VAX 11/730 computer. The report details the selection of the system and the set-up of the hardware and software. The first application of these systems was to monitor production and delays from longwall faces. A trial installation was implemented at Shirebrook Colliery and this proved so successful that British Coal are now installing many similar systems. The key features of the production monitoring application are that delays are automatically detected in real time and the operator is prompted for the root cause of the delay. This is done through a linked series of questions and answere from a linked set of possible delay causes. Ad hoc and regular reports are produced giving local colliery management visibility of coal face performance, thus enabling informed decisions and corrective action to be taken. Following the successful application to production monitoring, the system was extended to heading/drivages, coal clearance/conveyors, mine air environment and fixed plant. Those applications were operational during the contract but have since been extended.
Grems, III, Edward G. (Inventor); Henze, James E. (Inventor); Bixby, Jonathan A. (Inventor); Roberts, Mark (Inventor); Mann, Thomas (Inventor)
A disciplinal engineering review computer information system and method by defining a database of disciplinal engineering review process entities for an enterprise engineering program, opening a computer supported engineering item based upon the defined disciplinal engineering review process entities, managing a review of the opened engineering item according to the defined disciplinal engineering review process entities, and closing the opened engineering item according to the opened engineering item review.
This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.
The policy of FDOT is to use the Florida Advance Traveler Information System as the primary method to disseminate timely and important travel information to the public so that the public can make informed decisions regarding their travel plans....
Full Text Available personal information. Like many other countries, South Africa, in 2013 officially approved and enacted the Protection of Personal Information Act, which gives guidelines that should be followed when processing personal information. The Act regards biometric...
Ham, C. H.; Yang, M. H.; Yoon, S. W.
The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime
A four-step model for the hospital pharmacist to use in justifying a computerized information system is described. In the first step, costs are identified and analyzed. Both the costs and the advantages of the existing system are evaluated. A request for information and a request for proposal are prepared and sent to vendors, who return estimates of hardware, software, and support costs. Costs can then be merged and analyzed as one-time costs, recurring annual costs, and total costs annualized over five years. In step 2, benefits are identified and analyzed. Tangible economic benefits are those that directly reduce or avoid costs or directly enhance revenues and can be measured in dollars. Intangible economic benefits are realized through a reduction in overhead and reallocation of labor and are less easily measured in dollars. Noneconomic benefits, some involving quality-of-care issues, can also be used in the justification. Step 3 consists of a formal risk assessment in which the project is broken into categories for which specific questions are answered by assigning a risk factor. In step 4, both costs and benefits are subjected to a financial analysis, the object of which is to maximize the return on investment to the institution from the capital being requested. Calculations include return on investment based on the net present value of money, internal rate of return, payback period, and profitability index. A well-designed justification for an information system not only identifies the costs, risks, and benefits but also presents a plan of action for realizing the benefits.
King, William R
Edited by one of the best-known and most widely respected figures in the field, ""Planning for Information Systems"" is a comprehensive, single source overview of the myriad ideas and processes that are identified with IS planning. While many chapters deal with high level strategic planning, the book gives equal attention to on-the-ground planning issues.Part I, 'Key Concepts of IS Planning', focuses on how IS planning has evolved over the years; business-IS strategic alignment; and the role of dynamic organizational capabilities in leveraging IS competencies. Part II, 'The Organizational IS P
Thijs van Overveld
Full Text Available One aspect of animal personality that has been well described in captivity, but received only little attention in studies in the wild, is that personality types may vary in their behavioural flexibility towards environmental changes. A fundamental factor underlying such differences is believed to be the degree to which individual behavior is guided by environmental stimuli. We tested this hypothesis in the wild using free-ranging great tits. Personality variation was quantified using exploratory behaviour in a novel environment, which has previously been shown to be repeatable and correlated with other behaviours in this and other populations of the same species. By temporarily removing food at feeding stations we examined whether birds with different personality differed in returning to visit empty feeders as this may provide information on how birds continue to sample their environment after a sudden change in conditions. In two summer experiments, we found that fast-exploring juveniles visited empty feeders less often compared to slow-exploring juveniles. In winter, sampling behaviour was sex dependent but not related to personality. In both seasons, we found that birds who sampled empty feeders more often were more likely to rediscover food after we again re-baited the feeding stations, but there was no effect of personality. Our results show that personality types may indeed differ in ways of collecting environmental information, which is consistent with the view of personalities as different styles of coping with environmental changes. The adaptive value of these alternative behavioural tactics, however, needs to be further explored.
Hu, Dawei; Chen, Wei; Zeng, Qingtian; Hao, Tianyong; Min, Feng; Wenyin, Liu
A personalized e-learning framework based on a user-interactive question-answering (QA) system is proposed, in which a user-modeling approach is used to capture personal information of students and a personalized answer extraction algorithm is proposed for personalized automatic answering. In our approach, a topic ontology (or concept hierarchy)…
Lala, J. H.
Design and performance details of the advanced information processing system (AIPS) for fault and damage tolerant data processing on aircraft and spacecraft are presented. AIPS comprises several computers distributed throughout the vehicle and linked by a damage tolerant data bus. Most I/O functions are available to all the computers, which run in a TDMA mode. Each computer performs separate specific tasks in normal operation and assumes other tasks in degraded modes. Redundant software assures that all fault monitoring, logging and reporting are automated, together with control functions. Redundant duplex links and damage-spread limitation provide the fault tolerance. Details of an advanced design of a laboratory-scale proof-of-concept system are described, including functional operations.
Fleury, Laurence; Brissebrat, Guillaume; Boichard, Jean-Luc; Cloché, Sophie; Mière, Arnaud; Moulaye, Oumarou; Ramage, Karim; Favot, Florence; Boulanger, Damien
In the framework of the African Monsoon Multidisciplinary Analyses (AMMA) programme, several tools have been developed in order to boost the data and information exchange between researchers from different disciplines. The AMMA information system includes (i) a user-friendly data management and dissemination system, (ii) quasi real-time display websites and (iii) a scientific paper exchange collaborative tool. The AMMA information system is enriched by past and ongoing projects (IMPETUS, FENNEC, ESCAPE, QweCI, ACASIS, DACCIWA...) addressing meteorology, atmospheric chemistry, extreme events, health, adaptation of human societies... It is becoming a reference information system on environmental issues in West Africa. (i) The projects include airborne, ground-based and ocean measurements, social science surveys, satellite data use, modelling studies and value-added product development. Therefore, the AMMA data portal enables to access a great amount and a large variety of data: - 250 local observation datasets, that cover many geophysical components (atmosphere, ocean, soil, vegetation) and human activities (agronomy, health). They have been collected by operational networks since 1850, long term monitoring research networks (CATCH, IDAF, PIRATA...) and intensive scientific campaigns; - 1350 outputs of a socio-economics questionnaire; - 60 operational satellite products and several research products; - 10 output sets of meteorological and ocean operational models and 15 of research simulations. Data documentation complies with metadata international standards, and data are delivered into standard formats. The data request interface takes full advantage of the database relational structure and enables users to elaborate multicriteria requests (period, area, property, property value…). The AMMA data portal counts about 900 registered users, and 50 data requests every month. The AMMA databases and data portal have been developed and are operated jointly by SEDOO and
Fleury, Laurence; Brissebrat, Guillaume; Boichard, Jean-Luc; Cloché, Sophie; Eymard, Laurence; Mastrorillo, Laurence; Moulaye, Oumarou; Ramage, Karim; Favot, Florence; Roussot, Odile
In the framework of the African Monsoon Multidisciplinary Analyses (AMMA) programme, several tools have been developed in order to facilitate and speed up data and information exchange between researchers from different disciplines. The AMMA information system includes (i) a multidisciplinary user-friendly data management and dissemination system, (ii) report and chart archives associated with display websites and (iii) a scientific paper exchange system. The AMMA information system is enriched by several previous (IMPETUS...) and following projects (FENNEC, ESCAPE, QweCI, DACCIWA…) and is becoming a reference information system about West Africa monsoon. (i) The AMMA project includes airborne, ground-based and ocean measurements, satellite data use, modelling studies and value-added product development. Therefore, the AMMA database user interface enables to access a great amount and a large variety of data: - 250 local observation datasets, that cover many geophysical components (atmosphere, ocean, soil, vegetation) and human activities (agronomy, health). They have been collected by operational networks from 1850 to present, long term monitoring research networks (CATCH, IDAF, PIRATA...) or scientific campaigns; - 1350 outputs of a socio-economics questionnaire; - 60 operational satellite products and several research products; - 10 output sets of meteorological and ocean operational models and 15 of research simulations. All the data are documented in compliance with metadata international standards, and delivered into standard formats. The data request user interface takes full advantage of the data and metadata base relational structure and enables users to elaborate easily multicriteria data requests (period, area, property, property value…). The AMMA data portal counts around 800 registered users and process about 50 data requests every month. The AMMA databases and data portal have been developed and are operated jointly by SEDOO and ESPRI in France
Input preparation for the INIS (International Nuclear Information System) has been performed by Japan Atomic Energy Research Institute since 1970. Instead of the input data preparation done by worksheets make out with the typewriters, new method with which data can be directly inputted into a diskette using personal computers is introduced. According to the popularization of personal computers and word processors, this system is easily applied to other system, so the outline and the future development on it are described. A shortcoming of this system is that spell-checking and data entry using authority files are hardly performed because of the limitation of hardware resources, and that data code conversion is needed because applied code systems between personal computer and main frame computer are quite different from each other. On the other hand, improving the timelyness of data entry is expected without duplication of keying. (author)
Indratmo, J; Vassileva, Julita
Personal information management (PIM) covers a large area of research fragmented into separate sub-areas such as file management, web bookmark organization, and email management. Consequently, it is hard to obtain a unified view of the various approaches to PIM developed in these different sub-areas. In this article, we synthesize and classify existing research on PIM based on the approach used to organize information items. We classify the organizational structures into five categories: hier...
.... (a) General responsibilities. DoD Components shall establish appropriate administrative, technical..., the sensitivity of the personal information stored, the storage medium used and, to a degree, the... automated environment (see appendix A). (5) Tailor safeguards specifically to the vulnerabilities of the...
Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.
Full Text Available The paper introduces a novel Personal Knowledge Management (PKM concept and prototype system. The system’s objective is to aid life-long-learning, resourcefulness, creativity, and teamwork of individuals throughout their academic and professional life and as contributors and beneficiaries of organizational and societal performance. Such a scope offers appealing and viable opportunities for stakeholders in the educational, professional, and developmental context. To further validate the underlying PKM application design, the systems thinking techniques of the transdiscipline of Informing Science (IS are employed. By applying Cohen’s IS-Framework, Leavitt’s Diamond Model, the IS-Meta Approach, and Gill’s and Murphy’s Three Dimensions of Design Task Complexity, the more specific KM models and methodologies central to the PKMS concept are aligned, introduced, and visualized. The extent of this introduction offers an essential overview, which can be deepened and broadened by using the cited URL and DOI links pointing to the available resources of the author’s prior publications. The paper emphasizes the differences of the proposed meme-based PKM System compared to its traditional organizational document-centric counterparts as well as its inherent complementing synergies. As a result, it shows how the system is closing in on Vannevar Bush’s still unfulfilled vison of the ‘Memex’, an as-close-as-it-gets imaginary ancestor celebrating its 70th anniversary as an inspiring idea never realized. It also addresses the scenario recently put forward by Levy which foresees a decentralizing revolution of knowledge management that gives more power and autonomy to individuals and self-organized groups. Accordingly, it also touches on the PKM potential in terms of Kuhn’s Scientific Revolutions and Disruptive Innovations.
A. P. Durakovskiy
Full Text Available The aim is to prove the qualification system of access control systems (ACS as an information system for personal data (ISPDn. Applications: systems of physical protection of facilities.
Demir, I.; Krajewski, W. F.; Goska, R.; Mantilla, R.; Weber, L. J.; Young, N.
The Iowa Flood Information System (IFIS) is a web-based platform developed by the Iowa Flood Center (IFC) to provide access to flood inundation maps, real-time flood conditions, flood forecasts both short-term and seasonal, flood-related data, information and interactive visualizations for communities in Iowa. The key element of the system's architecture is the notion of community. Locations of the communities, those near streams and rivers, define basin boundaries. The IFIS provides community-centric watershed and river characteristics, weather (rainfall) conditions, and streamflow data and visualization tools. Interactive interfaces allow access to inundation maps for different stage and return period values, and flooding scenarios with contributions from multiple rivers. Real-time and historical data of water levels, gauge heights, and rainfall conditions are available in the IFIS by streaming data from automated IFC bridge sensors, USGS stream gauges, NEXRAD radars, and NWS forecasts. Simple 2D and 3D interactive visualizations in the IFIS make the data more understandable to general public. Users are able to filter data sources for their communities and selected rivers. The data and information on IFIS is also accessible through web services and mobile applications. The IFIS is optimized for various browsers and screen sizes to provide access through multiple platforms including tablets and mobile devices. The IFIS includes a rainfall-runoff forecast model to provide a five-day flood risk estimate for around 500 communities in Iowa. Multiple view modes in the IFIS accommodate different user types from general public to researchers and decision makers by providing different level of tools and details. River view mode allows users to visualize data from multiple IFC bridge sensors and USGS stream gauges to follow flooding condition along a river. The IFIS will help communities make better-informed decisions on the occurrence of floods, and will alert communities
Litescu, S.; Viswanathan, V.; Lees, M.; Knoll, A.; Aydt, H.
With a broader distribution of personal smart devices and with an increasing availability of advanced navigation tools, more drivers can have access to real time information regarding the traffic situation. Our research focuses on determining how using the real time information about a
Full Text Available The focus of any educational institution is the content and services of the university library. The mission of the library is to obtain, organize, preserve and update the information with the greatest possible accuracy, minimum effort and time. This requires automation of the library’s operations. This paper presents a software application for managing the activity of the territorial "Vasile Goldiş" West University library. The application is developed using Visual Basic for Application programming language and using the database management system Microsoft Access 2010. The goal of this application is to optimize the inner workings of local library and to meet the requests of the institution and of the readers.
Shibata, Koichi; Goto, Yoshihisa
A radiological information management system, SRIM-10, has been developed using a personal computer, in order to smoothly manage routine works in radiological division of hospitals. Data base is constructed with radiographic data acuqired directly from x-ray apparatus and patient information acquired using ID card. It is possible to record patient information of about 10,000 patients and radiographic data of about 120,000 exposures. This system can be made up as a multi work station system using a local area network. (author)
Shibata, Koichi; Goto, Yoshihisa
A radiological information management system, SRIM-10, has been developed using a personal computer, in order to smoothly manage routine works in radiological division of hospitals. Data base is constructed with radiographic data acuqired directly from x-ray apparatus and patient information acquired using ID card. It is possible to record patient information of about 10,000 patients and radiographic data of about 120,000 exposures. This system can be made up as a multi work station system using a local area network. (author).
Office of Personnel Management — The Labor Agreement Information Retrieval System (LAIRS) is a database containing historical information on labor-management relations in the Federal Government. It...
U.S. Environmental Protection Agency — The Pesticide Product Information System contains information concerning all pesticide products registered in the United States. It includes registrant name and...
Loretta J. Mester
Loretta Mester outlines the components of reform proposals. She then looks at the empirical research on personal bankruptcy to evaluate the rationale for reforming the system and the effectiveness of proposed changes. ; Also issued as Payment Cards Center Discussion Paper No. 02-02
Home; Journals; Sadhana; Volume 31; Issue 3. New methodology for a person identiﬁcation system. R Bremananth A Chitra. Volume 31 Issue 3 June 2006 pp 259-276 ... Experimental results illustrate that the proposed method has been easily espoused in elections, bank transactions and other security applications.
Huang, Song; Tian, Na; Wang, Yan; Ji, Zhicheng
Convergence stagnation is the chief difficulty to solve hard optimization problems for most particle swarm optimization variants. To address this issue, a novel particle swarm optimization using multi-information characteristics of all personal-best information is developed in our research. In the modified algorithm, two positions are defined by personal-best positions and an improved cognition term with three positions of all personal-best information is used in velocity update equation to enhance the search capability. This strategy could make particles fly to a better direction by discovering useful information from all the personal-best positions. The validity of the proposed algorithm is assessed on twenty benchmark problems including unimodal, multimodal, rotated and shifted functions, and the results are compared with that obtained by some published variants of particle swarm optimization in the literature. Computational results demonstrate that the proposed algorithm finds several global optimum and high-quality solutions in most case with a fast convergence speed.
Hellmuth, George F.
The systems engineering process is applied in the development of the preliminary design of a home automation communication protocol. The objective of the communication protocol is to provide a means for a personal computer to communicate with adapted appliances in the home. A needs analysis is used to ascertain that a need exist for a home automation system. Numerous design alternatives are suggested and evaluated to determine the best possible protocol design. Coaxial cable...
Calistri, Paolo; Conte, Annamaria; Freier, Jerome E; Ward, Michael P
The recent exponential growth of the science and technology of geographic information systems (GIS) has made a tremendous contribution to epidemiological analysis and has led to the development of new powerful tools for the surveillance of animal diseases. GIS, spatial analysis and remote sensing provide valuable methods to collect and manage information for epidemiological surveys. Spatial patterns and trends of disease can be correlated with climatic and environmental information, thus contributing to a better understanding of the links between disease processes and explanatory spatial variables. Until recently, these tools were underexploited in the field of veterinary public health, due to the prohibitive cost of hardware and the complexity of GIS software that required a high level of expertise. The revolutionary developments in computer performance of the last decade have not only reduced the costs of equipment but have made available easy-to-use Web-based software which in turn have meant that GIS are more widely accessible by veterinary services at all levels. At the same time, the increased awareness of the possibilities offered by these tools has created new opportunities for decision-makers to enhance their planning, analysis and monitoring capabilities. These technologies offer a new way of sharing and accessing spatial and non-spatial data across groups and institutions. The series of papers included in this compilation aim to: - define the state of the art in the use of GIS in veterinary activities - identify priority needs in the development of new GIS tools at the international level for the surveillance of animal diseases and zoonoses - define practical proposals for their implementation. The topics addressed are presented in the following order in this book: - importance of GIS for the monitoring of animal diseases and zoonoses - GIS application in surveillance activities - spatial analysis in veterinary epidemiology - data collection and remote
Urquhart, Christine; Tbaishat, Dina; Yeoman, Alison
This book adopts a holistic interpretation of information architecture, to offer a variety of methods, tools, and techniques that may be used when designing websites and information systems that support workflows and what people require when 'managing information'.
Full Text Available The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they support. In spite of significant advances in the information security area many information systems are still vulnerable to inside or outside attacks. The existence of an internal audit for information system security increases the probability of adopting adequate security measures and preventing these attacks or lowering the negative consequences. The paper presents an exploratory study on informatics audit for information systems security.
U.S. Environmental Protection Agency — The Reasonable Accommodation Information Tracking System (RAITS) is a case management system that allows the National Reasonable Accommodation Coordinator (NRAC) and...
Tao Kuang; Shanhong Zhu
The study built a simulation model for the study of food security information system relay protection. MATLAB-based simulation technology can support the analysis and design of food security information systems. As an example, the food security information system fault simulation, zero-sequence current protection simulation and transformer differential protection simulation are presented in this study. The case studies show that the simulation of food security information system relay protect...
Full Text Available according to the authors, every day a number of threats to information security increases, and this requires an increase in resources (systems of information protection of organizations and enterprises. There are many information security tools with different functionality, but the main mean of preventing information leakage is the Date Loss Prevention (DLP system. If you need to establish control over the leak of confidential information there appear a number of questions of conformity of decisions with the legislation and regulations. This article describes the issue of compliance functionality of a DLP system the provisions and requirements of the legislation in the sphere of protection of family and personal secrets, as well as compliance with the Constitutional right of citizens to privacy of correspondence.
Full Text Available Lately a lot of research effort is devoted for recognition of a human being using his biometric characteristics. Biometric recognition systems are used in various applications, e. g., identification for state border crossing or firearm, which allows only enrolled persons to use it. In this paper biometric characteristics and their properties are reviewed. Development of high accuracy system requires distinctive and permanent characteristics, whereas development of user friendly system requires collectable and acceptable characteristics. It is showed that properties of biometric characteristics do not influence research effort significantly. Properties of biometric characteristic features and their influence are discussed.Article in Lithuanian
Nielsen, Jens Brehm; Jensen, Bjørn Sand; Hansen, Toke Jansen
Modern audio systems are typically equipped with several user-adjustable parameters unfamiliar to most users listening to the system. To obtain the best possible setting, the user is forced into multi-parameter optimization with respect to the users's own objective and preference. To address this......, the present paper presents a general inter-active framework for personalization of such audio systems. The framework builds on Bayesian Gaussian process regression in which a model of the users's objective function is updated sequentially. The parameter setting to be evaluated in a given trial is selected...
Icek Ajzen; Thomas C. Brown; Lori H. Rosenthal
A laboratory experiment examined the potential for information bias in contingent valuation (CV). Consistent with the view that information about a public or private good can function as a persuasive communication, willingness to pay (WTP) was found to increase with the quality of arguments used to describe the good, especially under conditions of high personal...
Hartzler, A L; Osterhage, K; Demiris, G; Phelan, E A; Thielke, S M; Turner, A M
Older adults apply various strategies to pursue healthy aging, but we know little about their views and use of personal health information to accomplish those ends. As a first step in formulating the role of personal health information management (PHIM) in healthy aging, we explored the perspectives of older adults on health and health information used in their everyday lives through four focus groups with 25 community-dwelling adults aged 60 and over. We found that the concept of wellness-the holistic and multidimensional nature of health and wellbeing-plays prominently in how older adults think about health and health information. Participants expressed wellness from a position of personal strength, rather than health-related deficits, by focusing on wellness activities for staying healthy through: (1) personal health practices, (2) social network support, and (3) residential community engagement. Although these themes involve personal health information, existing PHIM systems that focus on disease management are generally not designed to support wellness activities. Substantial opportunity exists to fill this wellness support gap with innovative health information technology designed for older adults. Findings carry implications for the design of PHIM tools that support healthy aging and methods for engaging older adults as co-producers of this critical support.
Maruyama, Yukio; Mizuno, Hiromi; Shoda, Kohei; Sekine, Yasuhiro.
For the purpose of improving the intelligent productivity in offices, the introduction of PC-LAN system by the initiative of users has been advanced. In this example, by connecting many personal computers, the information service system that possesses the information on the business of power stations in common was constructed, and intelligent productivity was improved. This information service system is that in which all users are the sponsor as the users and the offerer of information are united, therefore, high conscience level is required for individual users, and the attentive device for the easiness of use was exercised so as to always maintain newest information. The background of introducing this system is explained. The information systems in power stations are the system related to operation control, preventive maintenance and so on and the system for helping the routine works of personnel. The main functions are the offer of the operational data of power stations, the offer of the information on the expected visitors to the PR hall of nuclear power stations, electronic information exchange and so on. The constitution and the features of the system are reported. (K.I.)
Lu Fei; Zhao Jia'ning
Based on finished information resources planning scheme for China sodium cooled experimental fast breeder reactor and the advanced information resources management solution concepts were applied, we got the building solution of CEFR information management systems. At the same time, the technical solutions of systems structures, logic structures, physical structures, development platforms and operation platforms for information resources management system in fast breeder reactors were developed, which provided programmatic introductions for development works in future. (authors)
...-01] Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2, Personal... Commerce's approval of Federal Information Processing Standard (FIPS) Publication 201-2, Personal Identity... Information Processing Standards (FIPS). Homeland Security Presidential Directive (HSPD) 12, entitled ``Policy...
Full Text Available Personal learning environments (PLEs and critical information literacies (CILs are two concepts that have been presented as responses to the challenges of the rich and complex information landscape. While both approaches support learners’ critical engagement with new information environments, each was developed within a different field. This paper connects and contrasts PLEs and CILs in order to explore the design of pedagogical responses to the information environment. Through a careful examination of PLE and CIL literature, the paper demonstrates that information literacy education intersects with the concepts and goals of PLEs. As such, the authors suggest that PLE scholarship informed by CIL scholarship, and vice versa, will yield a deeper understanding of modern learning contexts as well as a more holistic and responsive learner framework. The example of the research assignment will be used to demonstrate the viability of this approach. With these propositions, the authors invite educators, librarians and information technologists to engage in a dialogue about these concepts and the potential for pedagogical change.
Full Text Available Productivity growing, as well as reducing of operational costs in a company can be achieved by adopting a document management solutions. Such application will allow management and structured and efficient transmission of information within the organization.
Desai, B.N.; Kunte, P.D.; Bhargava, R.M.S.
Ocean study is inherently interdisciplinary and therefore calls for a controlled and integrated approach for information generation, processing and decision making. In this context, Indian National Oceanographic Data Centre (INODC) of National...
Brennan, Allison A; Watson, Marcus R; Kingstone, Alan; Enns, James T
Does person perception--the impressions we form from watching others--hold clues to the mental states of people engaged in cognitive tasks? We investigated this with a two-phase method: In Phase 1, participants searched on a computer screen (Experiment 1) or in an office (Experiment 2); in Phase 2, other participants rated the searchers' video-recorded behavior. The results showed that blind raters are sensitive to individual differences in search proficiency and search strategy, as well as to environmental factors affecting search difficulty. Also, different behaviors were linked to search success in each setting: Eye movement frequency predicted successful search on a computer screen; head movement frequency predicted search success in an office. In both settings, an active search strategy and positive emotional expressions were linked to search success. These data indicate that person perception informs cognition beyond the scope of performance measures, offering the potential for new measurements of cognition that are both rich and unobtrusive.
. This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information......In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model......—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy...
A customer information system is a typical information management system. It involves three aspects, the backstage database establishment, the application development and the system maintenance. A car insurance information management system is based on browser/server structure. Microsoft SQL Server establishes the backstage database. Active Server Pages, from Microsoft as well is used as the interface layer. The objective of this thesis was to apply ASP to the dynamic storage of a web page...
Lawler, James; Molluzzo, John C.
Bullying is considered to be omnipresent in business firms and prevalent in entrepreneurial firms in information systems and in departments of information systems in industry. Entrepreneurialism and narcissism of personalities in the information systems profession may be perceived as especially predisposed to bullying. The authors of this paper…
Liu, Cong; Ang, Rebecca P; Lwin, May O
The current study aims to understand the factors that influence adolescents' disclosure of personally identifiable information (PII) on social networking sites (SNSs). A survey was conducted among 780 adolescent participants (between 13 and 18) who were Facebook users. Structural equation modeling was used for analyzing the data and obtaining an overarching model that include cognitive, personality, and social factors that influence adolescents' PII disclosure. Results showed privacy concern as the cognitive factor reduces adolescents' PII disclosure and it serves as a potential mediator for personality and social factors. Amongst personality factors, narcissism was found to directly increase PII disclosure, and social anxiety indirectly decreases PII disclosure by increasing privacy concern. Amongst social factors, active parental mediation decreases PII disclosure directly and indirectly by increasing privacy concern. Restrictive parental mediation decreases PII disclosure only indirectly by increasing privacy concern. Implications of the findings to parents, educators, and policy makers were discussed. Copyright © 2013 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
In order to establish an environment in which local public organizations and local business entities intending introduction of new energies can obtain easily the information about the technologies thereof and introduction examples, a 'list of names of persons well informed on new energies' was prepared. At the same time, a system was set up, with which these well-informed people can be introduced on NEDO home pages. The list of the names has collected data of the well-informed people granted with patents related to the fields defined in the new energy law as their specialty fields. The criterion for extracting the persons calls for persons who have experience of writing theses on new energies, and who have give lectures on the subject. Other new energy related experts acting in local areas, who were not able of having been extracted by using the above method, were extracted through hearings by key persons in each area. Questionnaire surveys were performed on the extracted specialists, whereas 495 effective answers permitting disclosure were obtained, and detailed items of information were collected on these specialists individually. The specialty fields include 23 new energy fields. The names of persons were arranged in the order of bureaus listed in the Ministry of International Trade and Industry. The names in the bureaus were arranged in the Japanese alphabetical order. (NEDO)
US Agency for International Development — The EIMS is the Office of Human Resources' web-based employee information system. Direct-hire employees can access and review their USAID personnel information, such...
National Aeronautics and Space Administration — The JPL Tropical Cyclone Information System (TCIS) brings together satellite and in situ data sets from various sources to help you find information for a particular...
Robinson, Robert J.
This paper proposes construction of a separate data base environment for university planning information, distinct from data bases and systems supporting operational functioning and management. The data base would receive some of its input from the management information systems (MIS)/transactional data bases and systems through a process of…
A.F.M. Verbraak (Anton); E.J. Hoorn (Ewout); J. de Vries (Julius); J.M. Bogaard (Jan); A. Versprille (Adrian)
markdownabstractAbstract A lung function information system (LFIS) was developed for the data analysis of pulmonary function tests at different locations. This system was connected to the hospital information system (HIS) for the retrieval of patient data and the storage of the lung function
be availabe and usefu for creating powerful tailored contro and mangeen functions. Mode and Framwork Wirth further elaboration of the EIS portio of...control data and activities of the engineering process. The EIM is a conceptual model of administrative and electroic design information. It records...of the access opeations are derived from the instance variable name and type. An attribute conceptually holds one or more instances of a basic type
Garcia Sanchez, M.
In the 1989s in Nuclenor a large number of application programs were developed, this spread of software was based on the use of the new incoming machine in those years: the PC. The most severe consequences of having such an amount of isolated programs was the breaking up of corporate data and the loss of coherence between applications. The objective since then has been to unify and consolidate the stored information to increase its quality. (Author)
...) at Cornell during the first three years of operation. IISI's mandate is threefold: To perform and stimulate research in computational and data-intensive methods for intelligent decision making systems...
Sullivan, Laurie; Porter, Rebecca
Implementing an enterprise resource planning system is a complex undertaking. Careful planning, management, communication, and staffing can make the difference between a successful and unsuccessful implementation. (Contains 3 tables.)
Full Text Available The increasing complexity of the business environment, growing knowledge requirements, development of information technologies, and competitiveness implies the need of implementation of information management systems. Moreover, welter of information about online customers, their individual behavior, and their expectations force entrepreneurs to manage information in a personalized way. Monitoring Internet users behavior, creating their profiles (based on data about age, sex, lifestyle, interests, family, work, etc., and controlling current traffic on the Web site give wide range of possibilities in creating a real model of potential customers preference and using it in online communication. This study concentrates on possibilities of using personalized communication in the information management by online stores in 4C model.
This thesis explores challenging topic of information system quality assessment and mainly process assessment. In this work the term Information System Quality is defined as well as different approaches in a quality definition for different domains of information systems are outlined. Main methods of process assessment are overviewed and their relationships are described. Process assessment methods are divided into two categories: ISO standards and best practices. The main objective of this w...
Michael S. Gibson
Risk management information systems are designed to overcome the problem of aggregating data across diverse trading units. The design of an information system depends on the risk measurement methodology that a firm chooses. Inherent in the design of both a risk management information system and a risk measurement methodology is a tradeoff between the accuracy of the resulting measures of risk and the burden of computing them. Technical progress will make this tradeoff more favorable over time...
Liu, Zehua; Zhang, Nan; Han, Hongfeng
Personal information has become a valuable commodity in today's society. So our goal aims to develop a price point and a pricing system to be realistic. First of all, we improve the existing BLP system to prevent cascading incidents, design a 7-layer model. Through the cost of encryption in each layer, we develop PI price points. Besides, we use association rules mining algorithms in data mining algorithms to calculate the importance of information in order to optimize informational hierarchies of different attribute types when located within a multi-level trusted system. Finally, we use normal distribution model to predict encryption level distribution for users in different classes and then calculate information prices through a linear programming model with the help of encryption level distribution above.
Full Text Available In Internet era E-mail has become the most important mode of communication in every day life. E-mail offers several advantages like secure delivery, speed, cheaper cost, acknowledgement report, transparent service, and distributed environment. As spammers try to induce large amount of spam or unsolicited mails, managing these E-mails’s in an efficient manner requires huge attention. This paper focus on personalizing the E-mail messages after eliminating the spam messages. The basic step starts with pre-processing the documents and classifying the contents into several folders or categories. The next step is to cluster the documents based on the relativeness they have using cosine similarity metric. This clustering approach is carried out using unsupervised method. The mail messages are the parsed through a filter that would identify the spam immediately. Studies on personalization of mails after spam identification, prioritizing the E-mail’s based on the importance and summarization of were also proposed. The results were quiet promising leading to efficient spam identification providing a platform for further improvements to build a domain independent personalizer system.
Alterescu, S.; Friedman, C. A.; Hipkins, K. R.
An interactive information system is described. It is a general purpose, free format system which offers immediate assistance where manipulation of large data bases is required. The medical area is a prime area of application. Examples of the system's operation, commentary on the examples, and a complete listing of the system program are included.
Department of Transportation — The Aviation Safety Hotline Information System (ASHIS) collects, stores, and retrieves reports submitted by pilots, mechanics, cabin crew, passengers, or the public...
Downing, Gregory J; Boyle, Scott N; Brinner, Kristin M; Osheroff, Jerome A
Advances in technology and the scientific understanding of disease processes are presenting new opportunities to improve health through individualized approaches to patient management referred to as personalized medicine. Future health care strategies that deploy genomic technologies and molecular therapies will bring opportunities to prevent, predict, and pre-empt disease processes but will be dependent on knowledge management capabilities for health care providers that are not currently available. A key cornerstone to the potential application of this knowledge will be effective use of electronic health records. In particular, appropriate clinical use of genomic test results and molecularly-targeted therapies present important challenges in patient management that can be effectively addressed using electronic clinical decision support technologies. Approaches to shaping future health information needs for personalized medicine were undertaken by a work group of the American Health Information Community. A needs assessment for clinical decision support in electronic health record systems to support personalized medical practices was conducted to guide health future development activities. Further, a suggested action plan was developed for government, researchers and research institutions, developers of electronic information tools (including clinical guidelines, and quality measures), and standards development organizations to meet the needs for personalized approaches to medical practice. In this article, we focus these activities on stakeholder organizations as an operational framework to help identify and coordinate needs and opportunities for clinical decision support tools to enable personalized medicine. This perspective addresses conceptual approaches that can be undertaken to develop and apply clinical decision support in electronic health record systems to achieve personalized medical care. In addition, to represent meaningful benefits to personalized
Brinner Kristin M
Full Text Available Abstract Background Advances in technology and the scientific understanding of disease processes are presenting new opportunities to improve health through individualized approaches to patient management referred to as personalized medicine. Future health care strategies that deploy genomic technologies and molecular therapies will bring opportunities to prevent, predict, and pre-empt disease processes but will be dependent on knowledge management capabilities for health care providers that are not currently available. A key cornerstone to the potential application of this knowledge will be effective use of electronic health records. In particular, appropriate clinical use of genomic test results and molecularly-targeted therapies present important challenges in patient management that can be effectively addressed using electronic clinical decision support technologies. Discussion Approaches to shaping future health information needs for personalized medicine were undertaken by a work group of the American Health Information Community. A needs assessment for clinical decision support in electronic health record systems to support personalized medical practices was conducted to guide health future development activities. Further, a suggested action plan was developed for government, researchers and research institutions, developers of electronic information tools (including clinical guidelines, and quality measures, and standards development organizations to meet the needs for personalized approaches to medical practice. In this article, we focus these activities on stakeholder organizations as an operational framework to help identify and coordinate needs and opportunities for clinical decision support tools to enable personalized medicine. Summary This perspective addresses conceptual approaches that can be undertaken to develop and apply clinical decision support in electronic health record systems to achieve personalized medical care. In
Du Plessis, K [Computer Sciences Corporation (CSC), Sydney (Australia)
BHP Billion (BHPB) Cannington has experienced problems in regards to their traffic flow in the decline at the mine. The problems related to reports on near misses of vehicles moving towards each other in the decline. The decline is also to narrow for trucks to pass each other and the operators need to be aware of oncoming traffic in the decline to ensure they could take early evasive steps to ensure the rules of right of way in the decline are adhered to. BHPB Cannington requested CSC to conduct a problem analysis and to provide a solutions proposal to Cannington. The solution was put forward as an augmentation of their current safety procedures used with in the decline. During this phase of the project CSC developed a solutions architecture which involved the use of Active (Radio Frequency Identification) RFID tagging which will enable vehicle movement tracking on a real time basis after which the appropriate traffic movement can be relayed to the operators in the decline. The primary objective of the DTIS is to provide accurate information of traffic movement in the decline and present that information to the operators of the decline IN THE DECLINE upon which they would make their decisions. (orig.)
Chatterjee, Surtirtha; Xiao, Xiao; Elbanna, Amany
Passionate debates regarding the defining characteristic of the “IT artifact” continue. Such debates, and also the lack of explicit consideration of the “information” element in the IT artifact, motivate us to propose a revised conception, drawing upon concepts from General Systems Theory (GST). ...
Mayhew, William H.
The planning and implementation of a computerized management information system at a fictional small college is described. Nine key points are made regarding department involvement, centralization, gradual program implementation, lowering costs, system documentation, and upper-level administrative support. (MSE)
Li, P. Peggy; Knosp, Brian W.; Vu, Quoc A.; Yi, Chao; Hristova-Veleva, Svetla M.
The JPL Tropical Cyclone Infor ma tion System (TCIS) is a Web portal (http://tropicalcyclone.jpl.nasa.gov) that provides researchers with an extensive set of observed hurricane parameters together with large-scale and convection resolving model outputs. It provides a comprehensive set of high-resolution satellite (see figure), airborne, and in-situ observations in both image and data formats. Large-scale datasets depict the surrounding environmental parameters such as SST (Sea Surface Temperature) and aerosol loading. Model outputs and analysis tools are provided to evaluate model performance and compare observations from different platforms. The system pertains to the thermodynamic and microphysical structure of the storm, the air-sea interaction processes, and the larger-scale environment as depicted by ocean heat content and the aerosol loading of the environment. Currently, the TCIS is populated with satellite observations of all tropical cyclones observed globally during 2005. There is a plan to extend the database both forward in time till present as well as backward to 1998. The portal is powered by a MySQL database and an Apache/Tomcat Web server on a Linux system. The interactive graphic user interface is provided by Google Map.
The TLD system uses Li 2 B 4 O 7 :Mn, Si sintered tablets which are heated by hot nitrogen. The slide which holds the tablets is coded by a self adhesive polyester-aluminium tape. This tape is BCD coded in an ordinary tape punch. The information on the punched tape includes a ten digit social-security number and a two digit information on location and type of dosimetry. By this system dosimetric data is directly transfered into a central dose register for Sweden. All personnel doses are there stored on social-security numbers. (author)
Mancilla V., Daniela; Sastoque H., Sebastian; Iregui G., Marcela
Communication is one of the essential needs of human beings. Augmentative and Alternative Communication Systems (AAC) seek to help in the generation of oral and written language to people with physical disorders that limit their natural communication. These systems present significant challenges such as: the composition of consistent messages according to syntactic and semantic rules, the improvement of message production times, the application to social contexts and, consequently, the incorporation of user-specific information. This work presents an original ontology personalization approach for an AAC instant messaging system incorporating personalized information to improve the efficacy and efficiency of the message production. This proposal is based on a projection of a general ontology into a more specific one, avoiding storage redundancy and data coupling, representing a big opportunity to enrich communication capabilities of current AAC systems. The evaluation was performed for a study case based on an AAC system for assistance in composing messages. The results show that adding user-specific information allows generation of enriched phrases, so improving the accuracy of the message, facilitating the communication process.
Hatlelid, John E.; Casey, Larry
The Iridium system is designed to provide handheld personal communications between diverse locations around the world at any time and without prior knowledge of the location of the personal units. This paper provides an overview of the system, the services it provides, its operation, and an overview of the commercial practices and relatively high volume satellite production techniques which will make the system cost effective. A constellation of 66 satellites will provide an orbiting, spherical-shell, infrastructure for this global calling capability. The satellites act as tall cellular towers and allow convenient operation for portable handheld telephones. The system will provide a full range of services including voice, paging, data, geolocation, and fax capabilities. Motorola is a world leader in the production of high volume, high quality, reliable telecommunications hardware. One of Iridium's goals is to apply these production techniques to high reliability space hardware. Concurrent engineering, high performance work teams, advanced manufacturing technologies, and improved assembly and test methods are some of the techniques that will keep the Iridium system cost effective. Mobile, global, flexible personal communications are coming that will allow anyone to call or receive a call from/to anyplace at anytime. The Iridium system will provide communications where none exist today. This connectivity will allow increased information transfer, open new markets for various business endeavors, and in general increase productivity and development.
Schultz, Mark D.
According to one embodiment, a system for removing heat from a rack of information technology equipment may include a sidecar indoor air to liquid heat exchanger that cools warm air generated by the rack of information technology equipment. The system may also include a liquid to liquid heat exchanger and an outdoor heat exchanger. The system may further include configurable pathways to connect and control fluid flow through the sidecar heat exchanger, the liquid to liquid heat exchanger, the rack of information technology equipment, and the outdoor heat exchanger based upon ambient temperature and/or ambient humidity to remove heat from the rack of information technology equipment.
Chanyshev, E.; Chechyotkin, N.; Kondratev, A.; Plyshevskaya, D.
Full text: Radiation safety of personnel at nuclear power plants (NPP) is a priority aim. Degree of radiation exposure of personnel is defined by many factors: NPP design, operation of equipment, organizational management of radiation hazardous works and, certainly, safety culture of every employee. Automated Personal Dosimetry Monitoring System (A.P.D.M.S.) is applied at all nuclear power plants nowadays in Russia to eliminate the possibility of occupational radiation exposure beyond regulated level under different modes of NPP operation. A.P.D.M.S. provides individual radiation dose registration. In the paper the efforts of Design Bureau 'Promengineering' in construction of software and hardware complex of A.P.D.M.S. (S.H.W. A.P.D.M.S.) for NPP with PWR are presented. The developed complex is intended to automatize activities of radiation safety department when caring out individual dosimetry control. The complex covers all main processes concerning individual monitoring of external and internal radiation exposure as well as dose recording, management, and planning. S.H.W. A.P.D.M.S. is a multi-purpose system which software was designed on the modular approach. This approach presumes modification and extension of software using new components (modules) without changes in other components. Such structure makes the system flexible and allows modifying it in case of implementation a new radiation safety requirements and extending the scope of dosimetry monitoring. That gives the possibility to include with time new kinds of dosimetry control for Russian NPP in compliance with IAEA recommendations, for instance, control of the equivalent dose rate to the skin and the equivalent dose rate to the lens of the eye S.H.W. A.P.D.M.S. provides dosimetry control as follows: Current monitoring of external radiation exposure: - Gamma radiation dose measurement using radio-photoluminescent personal dosimeters. - Neutron radiation dose measurement using thermoluminescent
Valentijn, E. A.; Belikov, A. N.; Kleijn, G. A. Verdoes; Williams, O.R.; Radziwill, NM; Chiozzi, G
Astro-WISE is the first information system in astronomy which covers all aspects of data processing, storage and visualization. We show the various concepts behind the Astro-WISE, their realization and use, migration of Astro-WISE to other astronomical and non-astronomical information systems.
Becker, Louise Giovane
Reviews computer applications in judicial, legal, and legislative information activities being used to support litigation and court administration, assist in searching for legislation and laws, aid criminal justice information systems, and provide appropriate bibliographic and reference assistance. Management issues in automating systems are…
Botha, Johannes G
Full Text Available , which occurred in 2012 already, revealed more than 68m user’s credentials (IdentityForce 2016). The Municipal Transportation Agency of San Francisco was infected with malware in November 2016. This attack caused the systems to lock down, allowing... potentially lead to identity theft and other related crimes. PII can include an individual’s government issued identification; contact information; birth date and place; online account information; medical, employment or financial records; biometric...
Matsuyama, S.; Inoue, M.; Sakai, T.
JCOAL has conducted Joint Research on an Underground Communication and Risk Management Information System with CSIRO of Australia under a commissioned study project for the promotion of coal use starting in fiscal 2002. The goal of this research project is the establishment of a new Safety System focusing on the comprehensive risk management information system by the name of Nexsys. The main components of the system are the Ethernet type underground communication system that represents the data communication base, and the risk management information system that permits risk analysis in real-time and provides decision support based on the collected data. The Nexsys is an open system and is a core element of the underground monitoring system. Using a vast amount of underground data, it is capable of accommodating a wide range of functions that were not available in the past. Because of it, it is possible to construct an advanced underground safety system. 14 figs., 4 tabs.
Chen, I.-Ming; Phee, Soo Jay; Luo, Zhiqiang; Lim, Chee Kian
With the advancement in micro- and nanotechnology, electromechanical components and systems are getting smaller and smaller and gradually can be applied to the human as portable, mobile and even wearable devices. Healthcare industry have started to benefit from this technology trend by providing more and more miniature biomedical devices for personalized medical treatments in order to obtain better and more accurate outcome. This article introduces some recent development in non-intrusive and intrusive biomedical devices resulted from the advancement of niche miniature sensors and actuators, namely, wearable biomedical sensors, wearable haptic devices, and ingestible medical capsules. The development of these devices requires carful integration of knowledge and people from many different disciplines like medicine, electronics, mechanics, and design. Furthermore, designing affordable devices and systems to benefit all mankind is a great challenge ahead. The multi-disciplinary nature of the R&D effort in this area provides a new perspective for the future mechanical engineers.
NOE08 Department of Computer Science NOVO 8 1990 University of Maryland S College Park, MD 20742 D Abstract Current user information database technology ...Transactions on Computer Systems, May 1988. [So189] K. Sollins. A plan for internet directory services. Technical report, DDN Network Information Center...2424 A Distributed User Information System DTiC Steven D. Miller, Scott Carson, and Leo Mark DELECTE Institute for Advanced Computer Studies and
Pantelic, J; Tham, K W; Licina, D
The inhalation intake fraction was used as an indicator to compare effects of desktop personalized ventilation and mixing ventilation on personal exposure to directly released simulated cough droplets. A cough machine was used to simulate cough release from the front, back, and side of a thermal manikin at distances between 1 and 4 m. Cough droplet concentration was measured with an aerosol spectrometer in the breathing zone of a thermal manikin. Particle image velocimetry was used to characterize the velocity field in the breathing zone. Desktop personalized ventilation substantially reduced the inhalation intake fraction compared to mixing ventilation for all investigated distances and orientations of the cough release. The results point out that the orientation between the cough source and the breathing zone of the exposed occupant is an important factor that substantially influences exposure. Exposure to cough droplets was reduced with increasing distance between cough source and exposed occupant. The results from this study show that an advanced air distribution system such as personalized ventilation reduces exposure to cough-released droplets better than commonly applied overhead mixing ventilation. This work can inform HVAC engineers about different aspects of air distribution systems’ performance and can serve as an aid in making critical design decisions. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Καραμανλής, Μάνος; Karamanlis, Manos
Secure management of information is becoming critical for any organization because information is one of the most valuable assets in organization’s business operations. An Information security management system (ISMS) consists of the policies, procedures, guidelines, and associated resources and activities, collectively managed by an organization, in the pursuit of protecting its information assets. An ISMS is a systematic approach for establishing, implementing, operating, mon...
Chih-Ming, Chen; Lee, Hahn-Ming; Chen, Ya-Hui
Personalized service is important on the Internet, especially in Web-based learning. Generally, most personalized systems consider learner preferences, interests, and browsing behaviors in providing personalized services. However, learner ability usually is neglected as an important factor in implementing personalization mechanisms. Besides, too…
Thirunavukkarasu, M.; Vani Manasa, N.; Kumar, K. Rajesh; Sundar, S.
The main objective of this work is to create a Health Care monitoring and Guidance system for persons who are travelling in outdoor environments like cars. GSM (Global System for Mobile Communications) and GPS (Global Positioning System) technologies are separately and combined today in many applications in our day to day life. The GSM module will send a message along with the GPS location to the end user through text, and a call is initiated to the user for further instructions. The Global Positioning System (GPS) will give the location of the interested vehicle. This system helps the doctor or anyone to monitor the accident who is outdoor and has less help. This will help the hospital to monitor the accident as well as guide the injured through difficult situations. Using a buzzer, the persons nearby will come to know that the person is in danger or in poor health conditions. This project provides a good two-way communication with the injured and the hospital to assist them to give first aid before an ambulance arrives. So, this paper devices a novel technique to assist the people who just met with accident through GPS and GSM.
Alterescu, Sidney; Friedman, Carl A.; Frankowski, James W.
Medical Information Management System (MIMS) computer program interactive, general-purpose software system for storage and retrieval of information. Offers immediate assistance where manipulation of large data bases required. User quickly and efficiently extracts, displays, and analyzes data. Used in management of medical data and handling all aspects of data related to care of patients. Other applications include management of data on occupational safety in public and private sectors, handling judicial information, systemizing purchasing and procurement systems, and analyses of cost structures of organizations. Written in Microsoft FORTRAN 77.
Vandervalk, Ben; McCarthy, E Luke; Cruz-Toledo, José; Klein, Artjom; Baker, Christopher J O; Dumontier, Michel; Wilkinson, Mark D
Vandervalk, Ben; McCarthy, E Luke; Cruz-Toledo, José; Klein, Artjom; Baker, Christopher J O; Dumontier, Michel
Courtney, Paul K
In 2001, the Institute of Medicine report Crossing the Quality Chasm and the National Committee on Vital and Health Statistics report Information for Health were released, and they provided the context for the development of information systems used to support health-supporting processes. Both had as their goals, implicit or explicit, to ensure the right data are provided to the right person at the right time, which is one definition of "data liquidity." This concept has had some traction in recent years as a shorthand way to express a system property for health information technology, but there is not a well-defined characterization of what properties of a system or of its components give it better or worse data liquidity. This article looks at some recent work that help to identify those properties and perhaps can help to ground the concept with metrics that are assessable.
Publication of this technical document should serve for better understanding of the technical and functional features of the IAEA Safeguards Information System (ISIS) within the Agency, as well as in the National Systems of accounting for and control of nuclear material. It will also serve as a foundation for further development and improvement of the design and modifications of the Safeguards Information System and its services as a function of Safeguards implementation
Tuxen, L. [Environmental Protection Agency, Washington, DC (United States)
The Integrated Risk Information System (IRIS) is an electronic information system developed by the US Environmental Protection Agency (EPA) containing information related to health risk assessment. IRIS is the Agency`s primary vehicle for communication of chronic health hazard information that represents Agency consensus following comprehensive review by intra-Agency work groups. The original purpose for developing IRIS was to provide guidance to EPA personnel in making risk management decisions. This original purpose for developing IRIS was to guidance to EPA personnel in making risk management decisions. This role has expanded and evolved with wider access and use of the system. IRIS contains chemical-specific information in summary format for approximately 500 chemicals. IRIS is available to the general public on the National Library of Medicine`s Toxicology Data Network (TOXNET) and on diskettes through the National Technical Information Service (NTIS).
Hessels, Christel; van den Hanenberg, Danique; de Castro, Bram Orobio; van Aken, Marcel A G
This study seeks to integrate two research traditions that lie at the base of the understanding of personality pathology in adolescents. The first research tradition refers to normal personality according to the Five Factor Model (FFM). The second tradition specifies the key feature of personality disorder as the capacity to mentalize, which can be reflected in Social Information Processing (SIP). In a clinical sample of 96 adolescents, the authors investigated response generation, coping strategy, and memories of past frustrating experiences as part of SIP, as mediator in the relationship between personality and personality pathology, and a possible moderating role of personality on the relationship between SIP and personality pathology. The hypothesized mediation, by which the effects of personality dimensions on personality pathology was expected to be mediated by SIP variables, was found only for the effect of Neuroticism, most specifically on BPD, which appeared to be mediated by memories the patients had about past frustrating conflict situations with peers. Some moderating effects of personality on the relationship between SIP variables and personality pathology were found, suggesting that high Agreeableness and sometimes low Neuroticism can buffer this relationship. These results suggest that personality dimensions and social cognitions both independently and together play a role in adolescents' personality pathology.
Full Text Available The purpose of this research is to evaluate the control of information system savings in the banking and to identify the weaknesses and problem happened in those saving systems. Research method used are book studies by collecting data and information needed and field studies by interview, observation, questioner, and checklist using COBIT method as a standard to assess the information system control of the company. The expected result about the evaluation result that show in the problem happened and recommendation given as the evaluation report and to give a view about the control done by the company. Conclusion took from this research that this banking company has met standards although some weaknesses still exists in the system.Index Terms - Control Information System, Savings
Fernández-Tobías, Ignacio; Braunhofer, Matthias; Elahi, Mehdi; Ricci, Francesco; Cantador, Iván
The final publication is available at Springer via http://dx.doi.org/10.1007/s11257-016-9172-z The new user problem in recommender systems is still challenging, and there is not yet a unique solution that can be applied in any domain or situation. In this paper we analyze viable solutions to the new user problem in collaborative filtering (CF) that are based on the exploitation of user personality information: (a) personality-based CF, which directly improves the recommendation prediction ...
Gharibi, Wajeb; Gharibi, Gharib
In this paper, we discuss a new contact way for exchanging personal information using mobile phones. The idea of this invention depends on allocating a special code called Gharibi Code (GC) for each personal mobile and creating a personal information file called Gharibi Face Card (GFC), which has all specified personal data of the mobile phone user. When you request someone's GC code, the other party's phone will send you the GFC of that person. We think that this approach will facilitate the...
Abstract. Reliable person identification is a key factor for any safety measure. Unlike other biometrics such as the palm, retina, gait, face and fingerprints, the characteristic of the iris is stable in a person's lifetime. Iris patterns are chaotically distributed and well suited for recognizing persons throughout their lifetime with.
Rusch, Roger J.
Personal communications places severe demands on service providers and transmission facilities. Customers are not satisfied with the current levels of service and want improvements. Among the characteristics that users seek are: lower service rates, hand held convenience, acceptable time delays, ubiquitous service, high availability, reliability, and high quality. The space industry is developing commercial space systems for providing mobile communications to personal telephones. Provision of land mobile satellite service is fundamentally different from the fixed satellite service provided by geostationary satellites. In fixed service, the earth based antennas can depend on a clear path from user to satellite. Mobile users in a terrestrial environment commonly encounter blockage due to vegetation, terrain or buildings. Consequently, high elevation angles are of premium value. TRW studied the issues and concluded that a Medium Earth Orbit constellation is the best solution for Personal Communications Satellite Service. TRW has developed Odyssey, which uses twelve satellites in medium altitude orbit to provide personal communications satellite service. The Odyssey communications system projects a multibeam antenna pattern to the Earth. The attitude control system orients the satellites to ensure constant coverage of land mass and coastal areas. Pointing can be reprogrammed by ground control to ensure optimized coverage of the desired service areas. The payload architecture features non-processing, "bent pipe" transponders and matrix amplifiers to ensure dynamic power delivery to high demand areas. Circuit capacity is 3000 circuits per satellite. Each satellite weighs 1917 kg (4226 pounds) at launch and the solar arrays provide 3126 Watts of power. Satellites are launched in pairs on Ariane, Atlas, or other vehicles. Each satellite is placed in a circular orbit at an altitude of 10,354 km. There are three orbit planes inclined at 55° to the equatorial plane
Full Text Available Increasing attention is being paid to what determines the success of an information systems outsourcing arrangement. The current research aims to provide an improved understanding of the factors influencing the outcome of an information systems outsourcing relationship and to provide a preliminary validation of an extended outsourcing relationship model by interviews with information systems outsourcing professionals in both the client and vendor of a major Australian outsourcing relationship. It also investigates whether the client and the vendor perceive the relationship differently and if so, how they perceive it differently and whether the two perspectives are interrelated.
Dardevet, G.; Dardoise, P.; Dreyer, P.; Flahaut, P.
The opening of energy markets to competition requires relevant information systems accessible to all end-users in concern without any discrimination. So, how existing information systems can be changed to become conformable with the requested requirements? Concerning the last step of the opening of energy markets which concerns several millions of clients, how this problem will be overcome considering the huge volume of processing needed? Who will decide or pay the forthcoming upgrades of the information system with respect to the evolution of actors' needs? Four participants were invited to this round table to answer these questions. Their answers are reported in this article. (J.S.)
The three international organizations, IAEA, FAO, and UNESCO, which jointly sponsored the Symposium, share an active interest and involvement in information systems development. The extent of their interest was explained by the Director General of the IAEA, Dr. Sigvard Eklund, when he opened the meeting on behalf of the three co-sponsors: UNESCO in conjunction with the International Council of Scientific Unions (ICSU), took initiatives in 1966 which led to the establishment of its UNISIST programme. Its aims are to co-ordinate existing trends towards international co-operation in the collection, storage and dissemination of information and to act as a catalyst. Its ultimate goal is to establish 'a flexible and loosely connected network of information services based on voluntary co-operation'. A particular concern of UNISIST is to ensure co-ordination of the information activities of the United Nations organizations. The Symposium provided an opportunity for the science information community to assess the progress already made in creating links between diverse national, international, intergovernmental and non-governmental information systems and services. Papers were presented describing current developments in the national information systems of a number of countries, with special emphasis on how these developments were furthering harmonization of national information policies and facilitating interconnection with international systems. INIS and AGRIS figured prominently amongst the international systems discussed. In addition, proposals for two new international systems, to be known as DEVSIS and SPINIS, were outlined. The former will deal with development science information; the latter will cover the information on the administrative, scientific and legal aspects of science policy. There was also discussion of international co-operation in information handling within such international organizations as the CMEA, the Commission of the European Communities and
Full Text Available This work proposes a platform for estimating personality and happiness. Starting from Eysenck's theory about human's personality, authors seek to provide a platform for collecting text messages from social media (Whatsapp, and classifying them into different personality categories. Although there is not a clear link between personality features and happiness, some correlations between them could be found in the future. In this work, we describe the platform developed, and as a proof of concept, we have used different sources of messages to see if common machine learning algorithms can be used for classifying different personality features and happiness.
Discusses issues connected with developing information systems for competitive intelligence support; defines the elements of an effective competitive information system; and summarizes issues affecting system design and implementation. Highlights include intelligence information; information needs; information sources; decision making; and…
Department of Veterans Affairs — Clinical Information Support System (CISS) is a web-based portal application that provides a framework of services for the VA enterprise and supplies an integration...
Grafarend, Erik W
In the context of Geographical Information Systems (GIS) the book offers a timely review of map projections (sphere, ellipsoid, rotational surfaces) and geodetic datum transformations. For the needs of photogrammetry, computer vision, and remote sensing space projective mappings are reviewed.
U.S. Environmental Protection Agency — EPA?s Integrated Risk Information System (IRIS) is a compilation of electronic reports on specific substances found in the environment and their potential to cause...
Hritz, Mike; McGowan, Shirley; Ramos, Cal
This viewgraph presentation lists questions regarding the implementation of System Wide Information Management (SWIM). Some of the questions concern policy issues and strategies, technology issues and strategies, or transition issues and strategies.
van de Walle, B.A.; van den Eede, G.G.P.; Muhren, W.J.; Loffler, J.; Klann, M.
In times of major disasters such as hurricane Katrina or the Sichuan earthquake, the need for accurate and timely information is as crucial as is rapid and coherent coordination among the responding humanitarian community. Effective humanitarian information systems that provide timely access to
Full Text Available The work considers different information systems, includingthe infonnation ~ystems with autonomous units, whichcany all their intelligence around with them, and those withcommunicating units, which infonn the motorist about the currentsituation of the road system by radio or other means. Thesymbols of various messages have three main objectives: to provideinstruction, to warn of oncoming dange1~ or to give adviceregarding parking or looking for altemative routes. When notused for these pwposes, they are used to provide general informationabout the weathe1~ temperature or possible attractions.The in-vehicle information systems fly to assist the motorist indriving, and they are promoted as part of the comprehensive intelligenttransport system.
This thesis looks into the ways subjective dimension of experience could be represented in artificial, non-biological systems, in particular information systems. The pivotal assumption is that experience as opposed to mainstream thinking in information science is not equal to knowledge, so that experience is a broader term which encapsulates both knowledge and subjective, affective component of experience, which so far has not been properly embraced by knowledge representation theories. This ...
This thesis looks into the ways subjective dimension of experience could be represented in artificial, non-biological systems, in particular information systems. The pivotal assumption is that experience as opposed to mainstream thinking in information science is not equal to knowledge, so that experience is a broader term which encapsulates both knowledge and subjective, affective component of experience, which so far has not been properly embraced by knowledge representation theories. Th...
Through a change in philosophy and the development of a new, more efficient information management system, Arizona Public Service Co. (APSW) has, in less than two years, reduced material and service costs by 10 percent. The utility plans to cut these costs form 1993 figures by 25 percent before 2000. The utility is breaking new ground with ongoing implementation of new business processes and the new Materials Logistics Information System (MLIS), which has been co-developed with Texas Instruments Software Division (TISD)
An overview is given of the capabilities and functions of the resource management system (RIMS). It is a simple interactive DMS tool which allows users to build, modify, and maintain data management applications. The RIMS minimizes programmer support required to develop/maintain small data base applications. The RIMS also assists in bringing the United Information Services (UIS) budget system work inhouse. Information is also given on the relationship between the RIMS and the user community.
Environmental monitoring and information systems installed by Dornier are summarized. A broad spectrum of environmental areas from air quality and water to radioactivity is covered. Nuclear power plant monitoring systems, either as remote or plant-internal monitoring systems, form an important element of the work undertaken. The systems delivered covered local, regional or national areas. The range of services provided, and hardware and software platforms are listed. (R.P.)
McCleary, Hunter; Mayer, William J.
Describes the services of Teltech, Inc., which mimic the desirable attributes of artificial intelligence and expert systems via a "database" of 5,000 experts in technical areas and interactive literature searches executed by staff. Advantages and shortcomings of the network are exemplified by sample searches. Several sample menus and…
Visconti di Oleggio Castello, Matteo; Halchenko, Yaroslav O; Guntupalli, J Swaroop; Gors, Jason D; Gobbini, M Ida
Personally familiar faces are processed more robustly and efficiently than unfamiliar faces. The human face processing system comprises a core system that analyzes the visual appearance of faces and an extended system for the retrieval of person-knowledge and other nonvisual information. We applied multivariate pattern analysis to fMRI data to investigate aspects of familiarity that are shared by all familiar identities and information that distinguishes specific face identities from each other. Both identity-independent familiarity information and face identity could be decoded in an overlapping set of areas in the core and extended systems. Representational similarity analysis revealed a clear distinction between the two systems and a subdivision of the core system into ventral, dorsal and anterior components. This study provides evidence that activity in the extended system carries information about both individual identities and personal familiarity, while clarifying and extending the organization of the core system for face perception.
Baillie, Lesley; Thomas, Nicola
Person-centred care is internationally recognised as best practice for the care of people with dementia. Personal information documents for people with dementia are proposed as a way to support person-centred care in healthcare settings. However, there is little research about how they are used in practice. The aim of this study was to analyse healthcare staff 's perceptions and experiences of using personal information documents, mainly Alzheimer's Society's 'This is me', for people with dementia in healthcare settings. The method comprised a secondary thematic analysis of data from a qualitative study, of how a dementia awareness initiative affected care for people with dementia in one healthcare organisation. The data were collected through 12 focus groups (n = 58 participants) and 1 individual interview, conducted with a range of healthcare staff, both clinical and non-clinical. There are four themes presented: understanding the rationale for personal information documents; completing personal information documents; location for personal information documents and transfer between settings; impact of personal information documents in practice. The findings illuminated how healthcare staff use personal information documents in practice in ways that support person-centred care. Practical issues about the use of personal information documents were revealed and these may affect the optimal use of the documents in practice. The study indicated the need to complete personal information documents at an early stage following diagnosis of dementia, and the importance of embedding their use across care settings, to support communication and integrated care.
V. I. Tsymbaliuk
Full Text Available This article is about creating information system for the rehabilitation Department of Neurosurgery. To develop the information system needs to explore the work of department, examine the medical documentation and statistical reporting forms which doctors using in their work. Determine the sequence of making records into documentation. And finally make list of requirements for application with help of medical staff. The software was developed by using C# language and the database server MySQL. It has five major systems and several ancillary subsystems. The major systems are: saving personal and clinical patient information, editing inputted data, showing data, ensuring the integrity and accuracy of database, the implementation of access to the same database from different computers. Auxiliary subsystems include: creating medical documentation, blocking form’s elements, searching for patient through database, making statistic over some period of time, creating folders for every patient and others. There was designed user interface that allows doctors to reduce time for learning functionality of application. Information system has positive effect. It saves time for medical staff and reduces the possibility of inputting wrong information. Application does not require high hardware characteristics of computer.
Discussion of personalized information environments (PIEs) focuses on library personalized interfaces. Describes academic library PIEs and commercial sites, such as Amazon.com that use personalization; explores the Public Library of Charlotte and Mecklenburg's personalized interface; and discusses opportunities and challenges PIEs offer public…
The Hanford Environmental Information System (HEIS) Subject Area manuals are designed as reference guides, that is, each chapter provides the information needed to make best use of each subject area, its tables, and reporting capabilities. Each subject area is documented in a chapter in one of the subject area manuals. Because these are reference manuals, most of the information is also available in the online help system as well. See Section 5.4.2 of the HEIS User's Guide (DOE-RL 1994a) for a detailed description of the online help
Valery Konstantinovich Ablekov
Full Text Available Existing physical security systems has wide range of lacks, including: high cost, a large number of vulnerabilities, problems of modification and support system. This paper covers an actual problem of developing systems without this list of drawbacks. The paper presents the architecture of the information security system, which operates through the network protocol TCP/IP, including the ability to connect different types of devices and integration with existing security systems. The main advantage is a significant increase in system reliability, scalability, both vertically and horizontally, with minimal cost of both financial and time resources.
Nalewajski, Roman F
As well as providing a unified outlook on physics, Information Theory (IT) has numerous applications in chemistry and biology owing to its ability to provide a measure of the entropy/information contained within probability distributions and criteria of their information ""distance"" (similarity) and independence. Information Theory of Molecular Systems applies standard IT to classical problems in the theory of electronic structure and chemical reactivity. The book starts by introducing the basic concepts of modern electronic structure/reactivity theory based upon the Density Functional Theory
Gmelin, W.R.; Parsick, R.
The IAEA safeguards under the Non-Proliferation Treaty is meant to follow the model agreement developed by the Safeguards Committee in 1970 and formulated in document INFCIRC/153, which contains provisions that Member States, having concluded Safeguards Agreements with the Agency, should provide design information and reports on initial inventories, changes in the inventories and material balances in respect of each nuclear facility and material balance area for all nuclear materials subject to safeguards. The Agency, on the other hand, should establish and maintain an accountancy system which would provide the data on the location and the movements of all nuclear material subject to safeguards on the basis of the reported information and information obtained during inspections in order to support the Agency's verification activities in the field, to enable the preparation of safeguards statements and to adjust the inspection intensity. Following these requirements, a computer-based information system has been developed and is being implemented and used routinely for input manipulations and queries on a limited scale. This information system comprises two main parts: Part 1 for processing the information as provided by the States, and Part 2 (still under development) for processing the inspection data obtained during verification. This paper describes the characteristics of the Agency information system for processing data under the Non-Proliferation Treaty as well as recent operational experience. (author)
Full Text Available The main aim of this research is to determine the scope, dynamics, and structure of deaths of persons deprived of their liberty who resided in the penal system due to custody, security measures, serving a prison sentence or an alternative sanction, with regard to their demographic, criminological, penal, and psychological characteristics. Article 111, paragraph b of the United Nations Rules for the Protection of Juveniles Deprived of their Liberty (1990 determines that deprivation of liberty refers to any kind of detention, imprisonment, i.e. placement in a public or private institution which the imprisoned person cannot leave, by order of judicial, administrative or other public authority. The data used included information on persons deprived of their liberty who died in the territory of the Republic of Serbia in the period from 2008 to 2012. The data was obtained from The Directorate for Execution of Criminal Sanctions of the Ministry of Justice of the Republic of Serbia. In the past, researches mainly focused on violence in prisons, death penalty, prison riots, auto-aggressive behavior, i.e. certain forms of mortality such as a suicide. This paper aims to point out the characteristics of deaths which occur while persons deprived of their liberty are under the authority of judicial institutions, both before and after passing a criminal sanction.
Detmer Don E
Full Text Available Abstract Background Improving health in our nation requires strengthening four major domains of the health care system: personal health management, health care delivery, public health, and health-related research. Many avoidable shortcomings in the health sector that result in poor quality are due to inaccessible data, information, and knowledge. A national health information infrastructure (NHII offers the connectivity and knowledge management essential to correct these shortcomings. Better health and a better health system are within our reach. Discussion A national health information infrastructure for the United States should address the needs of personal health management, health care delivery, public health, and research. It should also address relevant global dimensions (e.g., standards for sharing data and knowledge across national boundaries. The public and private sectors will need to collaborate to build a robust national health information infrastructure, essentially a 'paperless' health care system, for the United States. The federal government should assume leadership for assuring a national health information infrastructure as recommended by the National Committee on Vital and Health Statistics and the President's Information Technology Advisory Committee. Progress is needed in the areas of funding, incentives, standards, and continued refinement of a privacy (i.e., confidentiality and security framework to facilitate personal identification for health purposes. Particular attention should be paid to NHII leadership and change management challenges. Summary A national health information infrastructure is a necessary step for improved health in the U.S. It will require a concerted, collaborative effort by both public and private sectors. If you cannot measure it, you cannot improve it. Lord Kelvin
In a time of crisis or in an emergency, a manager is required to make many decisions to facilitate the proper solution and conclusion to the emergency or crisis. In order to make these decisions, it is necessary for the manager to have correct up-to-date information on the situation, which calls for an automated information display and entry process. The information handling needs are identified in terms of data, video, and voice. Studies of existing Emergency Operations Centers and evaluations of hardware and software have been completed. The result of these studies and investigations is the design and implementation of an automated Emergency Management Information System. Not only is the system useful for Emergency Management but for any information management requirement
Annisa Fitri Anggraeni
Full Text Available The aim of this research is to find out the correlation between Information Technology and Management Information System Quality. This research applies literature review from various theories and previously conducted research where controversies between Information Technology and Management Information Systems. The result of this research shows that Information Technology is a part of Management Information System and supports the performance of Management Information Systems.
The specific areas addressed in the study are 1.Management decision support (data presentation, data base management systems â" DBMS, modeling) 2.Text processing, 3.Electronic communication for management purposes, 4.Office automation, 5.Administrative use of Management Information Systems (MIS) and in particular Administrative Data Processing (ADP).
Kovac, A.; Breznik, B.
The Ecological Information System was developed and is used for continuous data collecting from different measuring points as well as for dose calculation in case of emergency. The system collects all the data which are continuously measured in the environment or might have influence to the environment or are necessary for evaluation of impact to the environment. (author)
Depicts the nature and operations of the first truly international, decentralized and computerized information processing and dissemination system, INIS. The products of the system, consisting of various literature indexes issued in both printed form and on magnetic tapes are described and their utility to scientists is demonstrated
Curry, B.; Smith, D. G.
A case study of a South Wales manufacturer illustrates the need for companies to adopt an integrated strategy for computerization and information systems. Lack of management training blending computing and business skills can have a crippling effect on system development and organizational health. (SK)
Sue, Miles K.
A recent study by the National Telecommunications and Information Administration (NTIA) has concluded that the 21st century will be the age of information in which the telecommunication infrastructure will be vital to the social and economic well being of society. To meet the challenge of the coming age, JPL has been performing studies on a personal access satellite system (PASS) for the 21st century. The PASS study can be traced back to a study in which the technical feasibility and potential applications of a high frequency, low data rate satellite system were identified using small fixed terminals. Herein, the PASS concept is described along with the strawman design. Then the key challenges are identified along with possible solutions. Finally, the plan for the future is summarized from the key results.
Liu Ruoxiao; Wu Zhongwang; Xi Shuren
The HTR-10 Management information system (REMIS) strengthens the managerial level and usage of the information of HTR-10, thereby enhances the ability and efficiency of the design and management work. REMIS is designed based on the Client/Server framework. Database management system is SQL Server 6.5 for NT, While the client side is developed by Borland C ++ Builder, and it is based on Windows 95/98. The network protocol is TCP/IP. REMIS collects date of the HTR-10 at four parameters: Reactor properties, Design parameters, Equipment properties Reactor system flow charts. Final discussing extended prospect of REMIS
Crawford William CR
Full Text Available Abstract Background Personally controlled health records (PCHRs, a subset of personal health records (PHRs, enable a patient to assemble, maintain and manage a secure copy of his or her medical data. Indivo (formerly PING is an open source, open standards PCHR with an open application programming interface (API. Results We describe how the PCHR platform can provide standard building blocks for networked PHR applications. Indivo allows the ready integration of diverse sources of medical data under a patient's control through the use of standards-based communication protocols and APIs for connecting PCHRs to existing and future health information systems. Conclusion The strict and transparent personal control model is designed to encourage widespread participation by patients, healthcare providers and institutions, thus creating the ecosystem for development of innovative, consumer-focused healthcare applications.
Park, Seung-Kook; Moon, Jei-Kwon
At the Korea Atomic Energy Research Institute (KAERI), the Korea Research Reactor (KRR-2) and one uranium conversion plant (UCP) were decommissioned. A project was launched in 1997, for the decommissioning of KRR-2 reactor with the goal of completion by 2008. Another project for the decommissioning of the UCP was launched in 2001. The physical dismantling works were started in August 2003 and the entire project was completed by the end of 2010. KAERI has developed a computer information system, named DECOMMIS, for an information management with an increased effectiveness for decommissioning projects and for record keeping for the future decommissioning projects. This decommissioning information system consists of three sub-systems; code management system, data input system (DDIS) and data processing and output system (DDPS). Through the DDIS, the data can be directly inputted at sites to minimize the time gap between the dismantling activities and the evaluation of the data by the project staff. The DDPS provides useful information to the staff for more effective project management and this information includes several fields, such as project progress management, man power management, waste management, and radiation dose control of workers and so on. The DECOMMIS was applied to the decommissioning projects of the KRR-2 and the UCP, and was utilized to give information to the staff for making decisions regarding the progress of projects. It is also to prepare the reference data for the R and D program which is for the development of the decommissioning engineering system tools and to maintain the decommissioning data for the next projects. In this paper, the overall system will be explained and the several examples of its utilization, focused on waste management and manpower control, will be introduced. (author)
Brown, B.; Schweitzer, S.; Adams, C.; White, S. [Tennessee Univ., Knoxville, TN (United States)
The objectives of this paper is design a user friendly information management system using a relational database in order to: allow customers direct access to the system; provide customers with direct sample tracking capabilities; provide customers with more timely, consistent reporting; better allocate costs for analyses to appropriate customers; eliminate cumbersome and costly papertrails; and enhance facility utilization by laboratory personnel. The resultant savings through increased efficiency provided by this system should more than offset its cost in the long-term.
Brown, B.; Schweitzer, S.; Adams, C.; White, S. (Tennessee Univ., Knoxville, TN (United States))
The objectives of this paper is design a user friendly information management system using a relational database in order to: allow customers direct access to the system; provide customers with direct sample tracking capabilities; provide customers with more timely, consistent reporting; better allocate costs for analyses to appropriate customers; eliminate cumbersome and costly papertrails; and enhance facility utilization by laboratory personnel. The resultant savings through increased efficiency provided by this system should more than offset its cost in the long-term.
Sommerville, Ian; Lock, Russell; Storer, Tim
In this paper, we discuss an approach to system requirements engineering, which is based on using models of the responsibilities assigned to agents in a multi-agency system of systems. The responsibility models serve as a basis for identifying the stakeholders that should be considered in establishing the requirements and provide a basis for a structured approach, described here, for information requirements elicitation. We illustrate this approach using a case study drawn from civil emergenc...
DECrad version II was recently tested by members of the Radiology Information System Consortium (RISC) and was found to meet the specifications prepared by the consortium. It is a comprehensive tailorable system that can be interfaced to practically any HIS. This paper provides an overall view of the major functions of the system which include registration, scheduling, tracking, film library management, reporting, statistics, and teaching modules. The evolution of the specification and user experiences is reported
Sun Qiong; Min Liu; Shiming Pang
With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed me...
Schnall, Rebecca; Cimino, James J; Currie, Leanne M; Bakken, Suzanne
The goals of this study were to explore the information needs of case managers who provide services to persons living with HIV (PLWH) and to assess the applicability of the Information Needs Event Taxonomy in a new population. The study design was observational with data collection via an online survey. Responses to open-ended survey questions about the information needs of case managers (n=94) related to PLWH of three levels of care complexity were categorized using the Information Needs Event Taxonomy. The most frequently identified needs were related to patient education resources (33%), patient data (23%), and referral resources (22%) accounting for 79% of all (N=282) information needs. Study limitations include selection bias, recall bias, and a relatively narrow focus of the study on case-manager information needs in the context of caring for PLWH. The study findings contribute to the evidence base regarding information needs in the context of patient interactions by: (1) supporting the applicability of the Information Needs Event Taxonomy and extending it through addition of a new generic question; (2) providing a foundation for the addition of context-specific links to external information resources within information systems; (3) applying a new approach for elicitation of information needs; and (4) expanding the literature regarding addressing information needs in community-based settings for HIV services.
Milan Ž. Dronjak
Full Text Available An adequate logistics information system provides real time automated data processing, distribution and of information according to Terrain Commander's requirements, which leads to timely fulfillment of logistic demands of units. SAP ERP The SAP ERP application is the integrated (ERP software capable of working with complex organisational structures, personnel, equipment, and finance. It enables planning and combining forces for every type of operations. The system also enables the determination of the readiness status of modelled forces. ISL The Information System for Logistics (ISL is a comprehensive information system of the Ministry of Defence (MoD and the Army of the Czech Republic that covers many areas: acquisition, supply, ammunition and equipment maintenance, logistics, etc. The ISL provides support for military logistics in all important areas of consumer and acquisition logistics, satisfaying all kinds of Defence Forces needs in the country and abroad. LOGFAS The information system LOGFAS comprises Logistics Database (LOGBASE, Movement and Transportation software (M&T, Allied Command Europe Resource Optimisation Software System (ACROSS and Logistic Reporting System (LOGREP. The Logistics Database LOGBASE represents a logistics information source and also a database related to assets, forces, geography, infrastructure, targets, supplies, movements and medical data. The main software tools which rely on the LOGBASE are M&T, ACROSS and LOGREP. GCSS-Army The original impetus to create the SALE came in the mid-90s when the United States Department of Defense (DoD started a logistics modernisation programme. One of tasks was to build The Single Army Logistics Enterprise (SALE for the purpose of covering the whole organisational structure of the DoD. There are three components of the SALE: GCSS-Army, PLM+ and LMP. Each of them uses the commercial Enterprise Resource Planning SAP Software with a Web access. The main component, GCSS
Wassom, J.S.; Lu, P.Y. [Oak Ridge National Laboratory, TN (United States)
Society today is faced with new health risk situations that have been brought about by recent scientific and technical advances. Federal and state governments are required to assess the many potential health risks to exposed populations from the products (chemicals) and by-products (pollutants) of these advances. Because a sound analysis of any potential health risk should be based on the use of relevant information, it behooves those individuals responsible for making the risk assessments to know where to obtain needed information. This paper reviews the origins of toxicology information systems and explores the specialized information center concept that was proposed in 1963 as a means of providing ready access to scientific and technical information. As a means of illustrating this concept, the operation of one specialized information center (the Environmental Mutagen Information Center at Oak Ridge National Laboratory) will be discussed. Insights into how toxicological information resources came into being, their design and makeup, will be of value to those seeking to acquire information for risk assessment purposes. 7 refs., 1 fig., 4 tabs.
A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization for taking better decisions for the organization. The MIS data may be derived from various units of the organization or from other sources. However it is very difficult to say the exact structure of MIS as the structure and goals of different types of organizations are different. Hence both the data and structure of MIS is dependent...
Zhang, J. H.; Yang, J.; Sun, Y. S.
This system combines the Mapworld platform and informationization of disabled person affairs, uses the basic information of disabled person as center frame. Based on the disabled person population database, the affairs management system and the statistical account system, the data were effectively integrated and the united information resource database was built. Though the data analysis and mining, the system provides powerful data support to the decision making, the affairs managing and the public serving. It finally realizes the rationalization, normalization and scientization of disabled person affairs management. It also makes significant contributions to the great-leap-forward development of the informationization of China Disabled Person's Federation.
Full Text Available The authors of this article are going to bring into light the significance, the place and the role of information systems in the university education process. At the same time they define the objectives and the target group of the subject named Economic Information Systems and state the competence gained by students by studying this subject. Special attention is given to the curriculum to be taught to students and to a suggestive enumeration of a series of economic applications that can be themes for laboratory practice and for students’ dissertation (graduation thesis.
Pitts, Felix L.
Advanced Information Processing System (AIPS) is a computer systems philosophy, a set of validated hardware building blocks, and a set of validated services as embodied in system software. The goal of AIPS is to provide the knowledgebase which will allow achievement of validated fault-tolerant distributed computer system architectures, suitable for a broad range of applications, having failure probability requirements of 10E-9 at 10 hours. A background and description is given followed by program accomplishments, the current focus, applications, technology transfer, FY92 accomplishments, and funding.
Stucki, Gerold; Bickenbach, Jerome; Melvin, John
A complete understanding of the experience of health requires information relevant not merely to the health indicators of mortality and morbidity but also to functioning-that is, information about what it means to live in a health state, "the lived experience of health." Not only is functioning information relevant to healthcare and the overall objectives of person-centered healthcare but to the successful operation of all components of health systems.In light of population aging and major epidemiological trends, the health strategy of rehabilitation, whose aim has always been to optimize functioning and minimize disability, will become a key health strategy. The increasing prominence of the rehabilitative strategy within the health system drives the argument for the integration of functioning information as an essential component in national health information systems.Rehabilitation professionals and researchers have long recognized in WHO's International Classification of Functioning, Disability and Health the best prospect for an internationally recognized, sufficiently complete and powerful information reference for the documentation of functioning information. This paper opens the discussion of the promise of integrating the ICF as an essential component in national health systems to secure access to functioning information for rehabilitation, across health systems and countries.
Kabata, Piotr; Waldman, Wojciech; Kaletha, Krystian; Sein Anand, Jacek
We describe deployment of electronic toxicological information database in poison control center of Pomeranian Center of Toxicology. System was based on Google Apps technology, by Google Inc., using electronic, web-based forms and data tables. During first 6 months from system deployment, we used it to archive 1471 poisoning cases, prepare monthly poisoning reports and facilitate statistical analysis of data. Electronic database usage made Poison Center work much easier.
Beldad, Ardion Daroca; de Jong, Menno D.T.; Steehouder, M.F.
Although there is near consensus on the need for privacy, the reality is that people's attitude toward their personal information privacy is complex. For instance, even when people claim that they value their information privacy, they often trade their personal information for tangible or intangible
... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to... 32 National Defense 6 2010-07-01 2010-07-01 false Sending personal information over electronic mail. 806b.29 Section 806b.29 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR...
Full Text Available Executive Information Systems are design to improve the quality of strategic level of management in organization through a new type of technology and several techniques for extracting, transforming, processing, integrating and presenting data in such a way that the organizational knowledge filters can easily associate with this data and turn it into information for the organization. These technologies are known as Business Intelligence Tools. But in order to build analytic reports for Executive Information Systems (EIS in an organization we need to design a multidimensional model based on the business model from the organization. This paper presents some multidimensional models that can be used in EIS development and propose a new model that is suitable for strategic business requests.
Fedele, P.; Grandoni, G.; Mammarella, M.C.
The great debate concerning the Italian high-school reform has induced a ferment of activity among the most interested and sensible of people. This was clearly demonstrated by the course 'Innovazione metodologico-didattica e tecnologie informatiche' organized for the staff of the 'lstituto Professionale L. Einaudi' of Lamezia Terme. The course was an interesting opportunity for discussions and interaction between the world of School and computer technology used in the Research field. This three day course included theoretical and practical lessons, showing computer facilities that could be useful for teaching. During the practical lessons some computer tools were presented from the very simple Electronic Sheets to the more complicated information Retrieval on CD-ROM interactive realizations. The main topics will be discussed later. They are: Modelling, Data Base, Integrated Information Systems, Expert Systems, Information Retrieval. (author)
Sarker, Suprateek; Xiao, Xiao; Beaulieu, Tanya
The authors discuss a review of qualitative papers on information systems (IS) published in various journals between 2001 and 2012. They explain trends related to qualitative research in the chosen journals and the key anatomical components of a qualitative research manuscript, including...
Albert Bargeski Page Building 1 2001 Wisconsin Ave., N.W. Washington, DC 20235 (202) 673-5594 DATA: Physical Biological Chemical National Technical...Information Systems Proceedings. ’an Francisco, CA, Oct. 26-30. ASPRS and ACSM. Vol. 1. pp. 1’ - 147. John, N. 1982. Megatrends - Ten New Directions
Thompson, Dale R.; Di, Jia; Daugherty, Michael K.
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
The paper presents International Nuclear Information System (INIS): history of its development; INIS support products (INIS Reference Series, Friendly Inputting of Bibliographic Records software); INIS output products (INIS Atomindex, magnetic tapes, online service, database on CD-ROM, microfiche service); INIS philosophy; input of INIS database by subject areas; and examples of INIS input
To overcome the drawback of difficulties when interchanging a patient's health record among different health information management systems and yet keep the patient's privacy, this invention proposes a method comprising the steps of: extracting, from a certificate, a signature of a first service
Porta, Emilio; Klein, Jennifer; Arcia, Gustavo; Nannyonjo, Harriet
The Education Management Information System (EMIS) country report for Grenada includes the following headings: background which includes education data in Grenada, EMIS staff, facilities and equipment, EMIS data, and publications; prerequisites of quality; assurances of integrity; methodological soundness; accuracy and reliability; serviceability; and accessibility.
On the basis of many years of experience in providing consulting services in the area of management, the author presents the issues regarding the development of information systems to be applied in business. The analysis is conducted within the framework of a field of study introduced by the author and referred to as infornomics.
Tani, Yuichiro; Uchiyama, Akira; Kimura, Hirohito
This is a report on a new type of distributed computer system for radiology departments named 'TOSRIM' (Toshiba radiology information management system), which is designed to be installed between medical diagnosis equipment and a host computer system in a hospital. Recently, a new type of host computer system has been developed which enables doctors to order any of the hospital's entire activities using terminals. By connecting 'TOSRIM' to this type of host computer system, many of the activities of a radiology department can be carried out via terminals without the use of examination requirement forms. As well as being connected to medical diagnosis equipment, 'TOSRIM' can also be connected to a medical imaging system which stores and displays medical images. By means of these connections, doctors will be able to diagnose medical images using display terminals without the need for films. (author)
Tani, Yuichiro; Uchiyama, Akira; Kimura, Hirohito (Toshiba Corp., Kawasaki, Kanagawa (Japan))
This is a report on a new type of distributed computer system for radiology departments named 'TOSRIM' (Toshiba radiology information management system), which is designed to be installed between medical diagnosis equipment and a host computer system in a hospital. Recently, a new type of host computer system has been developed which enables doctors to order any of the hospital's entire activities using terminals. By connecting 'TOSRIM' to this type of host computer system, many of the activities of a radiology department can be carried out via terminals without the use of examination requirement forms. As well as being connected to medical diagnosis equipment, 'TOSRIM' can also be connected to a medical imaging system which stores and displays medical images. By means of these connections, doctors will be able to diagnose medical images using display terminals without the need for films. (author).
Full Text Available Several research programs are tackling the use of Wireless Sensor Networks (WSN at specific fields, such as e-Health, e-Inclusion or e-Sport. This is the case of the project “Ambient Intelligence Systems Support for Athletes with Specific Profiles”, which intends to assist athletes in their training. In this paper, the main developments and outcomes from this project are described. The architecture of the system comprises a WSN deployed in the training area which provides communication with athletes’ mobile equipments, performs location tasks, and harvests environmental data (wind speed, temperature, etc.. Athletes are equipped with a monitoring unit which obtains data from their training (pulse, speed, etc.. Besides, a decision engine combines these real-time data together with static information about the training field, and from the athlete, to direct athletes’ training to fulfill some specific goal. A prototype is presented in this work for a cross country running scenario, where the objective is to maintain the heart rate (HR of the runner in a target range. For each track, the environmental conditions (temperature of the next track, the current athlete condition (HR, and the intrinsic difficulty of the track (slopes influence the performance of the athlete. The decision engine, implemented by means of (m; s-splines interpolation, estimates the future HR and selects the best track in each fork of the circuit. This method achieves a success ratio in the order of 80%. Indeed, results demonstrate that if environmental information is not take into account to derive training orders, the success ratio is reduced notably.
The Geographic Names Information System (GNIS), developed by the U.S. Geological Survey in cooperation with the U.S. Board on Geographic Names (BGN), contains information about physical and cultural geographic features in the United States and associated areas, both current and historical, but not including roads and highways. The database also contains geographic names in Antarctica. The database holds the Federally recognized name of each feature and defines the location of the feature by state, county, USGS topographic map, and geographic coordinates. Other feature attributes include names or spellings other than the official name, feature designations, feature class, historical and descriptive information, and for some categories of features the geometric boundaries. The database assigns a unique feature identifier, a random number, that is a key for accessing, integrating, or reconciling GNIS data with other data sets. The GNIS is our Nation's official repository of domestic geographic feature names information.
Health care information systems must reflect at least two basic characteristics of the health care community: the increasing mobility of patients and the personal liability of everyone giving medical treatment. Open distributed information systems bear the potential to reflect these requirements. But the market for open information systems and operating systems hardly provides secure products today. This 'missing link' is approached by the prototype SECURE Talk that provides secure transmission and archiving of files on top of an existing operating system. Its services may be utilized by existing medical applications. SECURE Talk demonstrates secure communication utilizing only standard hardware. Its message is that cryptography (and in particular asymmetric cryptography) is practical for many medical applications even if implemented in software. All mechanisms are software implemented in order to be executable on standard-hardware. One can investigate more or less decentralized forms of public key management and the performance of many different cryptographic mechanisms. That of, e.g. hybrid encryption and decryption (RSA+DES-PCBC) is about 300 kbit/s. That of signing and verifying is approximately the same using RSA with a DES hash function. The internal speed, without disk accesses etc., is about 1.1 Mbit/s. (Apple Quadra 950 (MC 68040, 33 MHz, RAM: 20 MB, 80 ns. Length of RSA modulus is 512 bit).
Wang, Fenghua; Han, Jiuqiang
Information fusion in biometrics has received considerable attention. This paper focuses on the application of information fusion techniques in iris recognition. To improve the reliability and accuracy of personal identification based on the iris pattern, this paper proposes the schemes of multialgorithmic fusion and multiinstance fusion. Multialgorithmic fusion integrates the improved phase algorithm and the DCT-based algorithm, and multiinstance fusion combines information from the left iris and the right iris of an individual. Both multialgorithmic fusion and multiinstance fusion are carried out at the matching score level and the support vector machine (SVM)-based fusion rule is utilized to generate fused scores for final decision. The experimental results on the noisy iris database UBIRIS demonstrate that the proposed fusion schemes can perform better than the single recognition systems, and further prove that information fusion techniques are feasible and effective to improve the accuracy and robustness of iris recognition especially under noisy conditions
Gostin, L O
Nur Zeina Maya Sari
Full Text Available Abstract Management Information System growth cause change of role from all manager in decision making the information technology. While prima facie reason for the usage of information technology in business to support such a manner so that information system may operate better OBrienamp Marakas 2004. Its meaning with existence of information tekhnology in management information system SIM company management decision making which initially often pursued by many factor of non technical become accurately is relevant complete and on schedule
The PROcurement Management Information System (PROMIS) provides both detailed and summary level information on all procurement actions performed within NASA's procurement offices at Marshall Space Flight Center (MSFC). It provides not only on-line access, but also schedules procurement actions, monitors their progress, and updates Forecast Award Dates. Except for a few computational routines coded in FORTRAN, the majority of the systems is coded in a high level language called NATURAL. A relational Data Base Management System called ADABAS is utilized. Certain fields, called descriptors, are set up on each file to allow the selection of records based on a specified value or range of values. The use of like descriptors on different files serves as the link between the falls, thus producing a relational data base. Twenty related files are currently being maintained on PROMIS.
Van Slyke, D. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)
The project uses system engineering principles to address the need of Boy Scout leaders for an integrated system to facilitate advancement and awards records, leader training and planning for meetings and activities. Existing products to address needs of Scout leaders and relevant stakeholders function to support record keeping and some communication functions but opportunity exists for a better system to fully integrate these functions with training delivery and recording, activity planning along with feedback and information gathering from stakeholders. Key stakeholders for the sytem include Scouts and their families, leaders, training providers, sellers of supplies and awards, content generators and facilities that serve Scout activities. Key performance parameters for the system are protection of personal information, availability of current information, information accuracy and information content that has depth. Implementation concepts considered for the system include (1) owned and operated by Boy Scouts of America, (2) Contracted out to a vendor (3) distributed system that functions with BSA managed interfaces. The selected concept is to contract out to a vendor to maximize the likelihood of successful integration and take advantage of the best technology. Development of requirements considers three key use cases (1) System facilitates planning a hike with training needed satisfied in advance and advancement recording real time (2) Scheduling and documenting in-person training, (3) Family interested in Scouting receives information and can request follow-up. Non-functional requirements are analyzed with the Quality Function Deployment tool. Requirement addressing frequency of backup, compatibility with legacy and new technology, language support, software update are developed to address system reliability and intuitive interface. System functions analyzed include update of activity database, maintenance of advancement status, archive of documents, and
Caiaffa, E. [ENEA, Centro Ricerche Casaccia, Rome (Italy). Dipt. Ambiente
The present paper summarises the activities developed by ETC/MCE, under European Environment Agency (EEA) contract, on the Geographic Information System. The aim of present paper is to introduce some general concepts about the Geographic Information Systems and to investigate the potential of G.I.S. as tool for the assessment of the European seas. Care has also been taken to explain the main technical and educational reasons that led to EUMARIS GIS birth, its evolution in the last year, till to its presentation at the Inter-Regional Forum of the European Conventions held in Venice. GIS is a technological tool phenomenon involving various aspects and different issues; many examples of thematic maps involving that different subjects are shown in the paper. [Italian] Il presente articolo riassume le attivita' svolte, nell'ambito del Geographic Information System, dall'ETC/MCE sotto contratto con l'Agenzia Europea per l'Ambiente (EEA) che ha sede a Copenhagen. Scopo del presente articolo e' quello di introdurre alcuni concetti generali sui Geographic Information System (GIS) e di dimostrare la possibilita' di utilizzare il GIS stesso come strumento per la valutazione dello stato dei mari dell'Europa. Si e' cercato di spiegare le principali ragioni tecniche che hanno portato alla nascita del progeto del GIS EUMARIS, alla sua realizzazione fino alla sua presentazione all'Inter-Regional Forum of European Conventions tenutosi a Venezia. Si e' cercato anche di mostrare come un GIS per sua natura e' uno strumento che coinvolge vari aspetti tecnologici e differenti tipi di dati; nell'articolo vengono mostrati diversi esempi di mappe tematiche che contengono tali differenti argomenti.
Ford, Richard M
Hospital-wide computerized information systems evolved from the need to capture patient information and perform billing and other financial functions. These systems, however, have fallen short of meeting the needs of respiratory care departments regarding work load assessment, productivity management, and the level of outcome reporting required to support programs such as patient-driven protocols. The respiratory care management information systems (RCMIS) of today offer many advantages over paper-based systems and hospital-wide computer systems. RCMIS are designed to facilitate functions specific to respiratory care, including assessing work demand, assigning and tracking resources, charting, billing, and reporting results. RCMIS incorporate mobile, point-of-care charting and are highly configurable to meet the specific needs of individual respiratory care departments. Important and substantial benefits can be realized with an RCMIS and mobile, wireless charting devices. The initial and ongoing costs of an RCMIS are justified by increased charge capture and reduced costs, by way of improved productivity and efficiency. It is not unusual to recover the total cost of an RCMIS within the first year of its operation. In addition, such systems can facilitate and monitor patient-care protocols and help to efficiently manage the vast amounts of information encountered during the practitioner's workday. Respiratory care departments that invest in RCMIS have an advantage in the provision of quality care and in reducing expenses. A centralized respiratory therapy department with an RCMIS is the most efficient and cost-effective way to monitor work demand and manage the hospital-wide allocation of respiratory care services.
LeRouge, Cynthia M; Tao, Donghua; Ohs, Jennifer; Lach, Helen W; Jupka, Keri; Wray, Ricardo
"Baby Boomers" (adults born between the years of 1946 and 1964) make up the largest segment of the population in many countries, including the United States (about 78 million Americans) . As Baby Boomers reach retirement age and beyond, many will have increasing medical needs and thus demand more health care resources that will challenge the healthcare system. Baby Boomers will likely accelerate the movement toward patient self-management and prevention efforts. Consumer Health Information Technologies (CHIT) hold promise for empowering health consumers to take an active role in health maintenance and disease management, and thus, have the potential to address Baby Boomers' health needs. Such innovations require changes in health care practice and processes that take into account Baby Boomers' personal health needs, preferences, health culture, and abilities to use these technologies. Without foundational knowledge of barriers and opportunities, Baby Boomers may not realize the potential of these innovations for improving self-management of health and health outcomes. However, research to date has not adequately explored the degree to which Baby Boomers are ready to embrace consumer health information technology and how their unique subcultures affect adoption and diffusion. This position paper describes an ecological conceptual framework for understanding and studying CHIT aimed at satisfying the personal health needs of Baby Boomers. We explore existing literature to provide a detailed depiction of our proposed conceptual framework, which focuses characteristics influencing Baby Boomers and their Personal Health Information Management (PHIM) and potential information problems. Using our ecological framework as a backdrop, we provide insight and implications for future research based on literature and underlying theories represented in our model.
Harlan, C.; Harrington, M.W.
Environmental Technologies for Remedial Actions Data Exchange (EnviroTRADE) is a graphical/textual information management system being developed for the cleanup program of the U.S. Department of Energy's (DOE) Weapons Complex. Its principal purpose is to provide a single, powerful, interactive database that addresses environmental restoration and waste management (ER/WM) problems and the technologies currently under development or already available to resolve them. Because the volume and complexity of the information is so large, a sophisticated Relational Database Management System (RDBMS) is employed in EnviroTRADE. EnviroTRADE will be a multi-purpose, multi-user system capable of addressing a broad range of environmental assessment and cleanup issues. An early focus for the Beta version of EnviroTRADE has been to find matches between specific environmental problems at particular sites (e.g., in terms of waste composition and form) and available and new technologies suited to solve problems. The current prototype EnviroTRADE database includes both U.S. and foreign problems and technologies. A Beta version was developed and demonstrated during FY92 and was expanded in FY93. This system was delivered to EM-523 as a stand-alone resident system for demonstration and feedback purposes. The resident system demonstrates the feasibility of this kind of multi-purpose system and also provides a test bed for refining the system architecture. As the architecture and database grow, an increasing range of possible applications is envisioned. The ability to import very large quantities of graphical, textual, and numerical information into the database is of particular importance. Since a great deal of appropriate data already exists in various electronic formats, a rapid expansion into EnviroTRADE-accessible data is possible without relying on manual entry methods
Na, Seong Ho; Park, Moon Il; Im, Bok Soo; Lee, Seon Mi; Kim, Hyung Uk; Chae, Eun Yeong
In this study, the construction of Korea Information System of Occupational Exposure (KISOE) system is designed with occupational exposure control system based on information evaluation technology and it makes the reliability of the personal exposure by use of personal dose verification. While the operation of national based radiation worker protection system, this system are settled the control system for radiation worker and ALARA. The purpose of construction and operation of pilot system of KISOE systematically is to derive the master plan of KISOE, stable development of this system, and serve the high quality radiation use internationally
Na, Seong Ho [Korea Institute of Nuclear Safety, Taejon (Korea, Republic of); Park, Moon Il; Im, Bok Soo; Lee, Seon Mi; Kim, Hyung Uk; Chae, Eun Yeong [ADDLAB Co., Ltd., Taejon (Korea, Republic of)
In this study, the construction of Korea Information System of Occupational Exposure (KISOE) system is designed with occupational exposure control system based on information evaluation technology and it makes the reliability of the personal exposure by use of personal dose verification. While the operation of national based radiation worker protection system, this system are settled the control system for radiation worker and ALARA. The purpose of construction and operation of pilot system of KISOE systematically is to derive the master plan of KISOE, stable development of this system, and serve the high quality radiation use internationally.
El Emam, Khaled; Jabbouri, Sam; Sams, Scott; Drouet, Youenn; Power, Michael
With the growing adoption of electronic medical records, there are increasing demands for the use of this electronic clinical data in observational research. A frequent ethics board requirement for such secondary use of personal health information in observational research is that the data be de-identified. De-identification heuristics are provided in the Health Insurance Portability and Accountability Act Privacy Rule, funding agency and professional association privacy guidelines, and common practice. The aim of the study was to evaluate whether the re-identification risks due to record linkage are sufficiently low when following common de-identification heuristics and whether the risk is stable across sample sizes and data sets. Two methods were followed to construct identification data sets. Re-identification attacks were simulated on these. For each data set we varied the sample size down to 30 individuals, and for each sample size evaluated the risk of re-identification for all combinations of quasi-identifiers. The combinations of quasi-identifiers that were low risk more than 50% of the time were considered stable. The identification data sets we were able to construct were the list of all physicians and the list of all lawyers registered in Ontario, using 1% sampling fractions. The quasi-identifiers of region, gender, and year of birth were found to be low risk more than 50% of the time across both data sets. The combination of gender and region was also found to be low risk more than 50% of the time. We were not able to create an identification data set for the whole population. Existing Canadian federal and provincial privacy laws help explain why it is difficult to create an identification data set for the whole population. That such examples of high re-identification risk exist for mainstream professions makes a strong case for not disclosing the high-risk variables and their combinations identified here. For professional subpopulations with published
Full Text Available Online news reading has become a widely popular way to read news articles from news sources around the globe. With the enormous amount of news articles available, users are easily overwhelmed by information of little interest to them. News recommender systems help users manage this flood by recommending articles based on user interests rather than presenting articles in order of their occurrence. We present our research on developing personalized news recommendation system with the help of a popular micro-blogging service, “Twitter.” News articles are ranked based on the popularity of the article identified from Twitter’s public timeline. In addition, users construct profiles based on their interests and news articles are also ranked based on their match to the user profile. By integrating these two approaches, we present a hybrid news recommendation model that recommends interesting news articles to the user based on their popularity as well as their relevance to the user profile.
Wofford, O. Douglas; Timmerman, Ed
A marketing information system approach for college admissions is outlined that includes objectives, information needs and sources, a data collection format, and information evaluation. Coordination with other institutional information systems is recommended. (MSE)
The International Nuclear Information System is operated by the IAEA in close cooperation with its participating countries. Each country is responsible for the acquisition of the literature published within its boundaries. These data are collected by the INIS secretariat in Vienna and the resulting comprehensive data base is available for all member states. On behalf of Austrian Federal Chancellor's Office the Austrian Research Centre Seibersdorf operates the Austrian INIS-Center, which offers information services in form of retrospective searches and current awareness services. (Author) [de
Sustainable information systems development (ISD) in the context of this paper is not about products that support sustainability at large with its environmental, economic and social dimensions and little about the development of sustainable products, which are both without doubt important topics....... This paper is about a prerequisite for such products, namely, a sustainable ISD process, a process which exhibits reasonable and responsible stewardship and utilisation of the existing resources for ISD—people and information in the context of scope, time/schedule, budget/cost, quality and risk....
Win, Khin Than; Susilo, Willy; Mu, Yi
The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.
... 29 Labor 7 2010-07-01 2010-07-01 false Personal fall arrest systems (PFAS). 1915.159 Section 1915... Protective Equipment (PPE) § 1915.159 Personal fall arrest systems (PFAS). The criteria of this section apply to PFAS and their use. Effective January 1, 1998, body belts and non-locking snaphooks are not...
Abu-Dawwas, Waheeb A.; Al-Azzeh, Rashed M.; Abu-Arqoub, Mohammed H.
The paper is an attempted to discuss one of the must important components in the architecture of personalized teaching systems—the testing system. One of the aims of the paper is to propose a definition of cognitive state, which can be used in designing personalized teaching systems.
Labitzke , Sebastian
Part 4: Privacy and Transparency in the Age of Cloud Computing; International audience; The risk involved when users publish information, which becomes available to an unintentional broad audience via online social networks is evident. It is especially difficult for users of social networks to determine who will get the information before it is shared. Moreover, it is impossible to monitor data flows or to control the access to personal data after sharing the information. In contrast to enter...
...-02] Announcing Draft Federal Information Processing Standard (FIPS) 201-2, Personal Identity..., ``Personal Identity Verification of Federal Employees and Contractors Standard.'' Draft FIPS 201-2 amends... Issuing Personal Identity Verification Cards under HSPD-12.'' The purpose of this change is to update the...
The Hanford Environmental Information System (HEIS) is a consolidated set of automated resources that effectively manage the data gathered during environmental monitoring and restoration of the Hanford Site. HEIS includes an integrated database that provides consistent and current data to all users and promotes sharing of data by the entire user community. HEIS is an information system with an inclusive database. Although the database is the nucleus of the system, HEIS also provides user access software: query-by-form data entry, extraction, and browsing facilities; menu-driven reporting facilities; an ad hoc query facility; and a geographic information system (GIS). These features, with the exception of the GIS, are described in this manual set. Because HEIS contains data from the entire Hanford Site, many varieties of data are included and have.been divided into subject areas. Related subject areas comprise several volumes of the manual set. The manual set includes a data dictionary that lists all of the fields in the HEIS database, with their definitions and a cross reference of their locations in the database; definitions of data qualifiers for analytical results; and a mapping between the HEIS software functions and the keyboard keys for each of the supported terminals or terminal emulators
Hartley, D.; Spence, A.C.
The successful application in the United Kingdom of the real time monitoring and control systems (MINOS) for underground mining operations, particularly in coal transport and the development of coalface monitoring (FIDO) in 1980 led naturally to the design of an operational data base for management. A User Group of experienced colliery managers produced a Management Information System (MIS) requirements specification and began the evolution of the systems of today. Twenty-four mines operate MIS in different ways from total dependency to a means of checking their manual reporting system. MIS collects useful data from all the major MINOS applications and provides a means of manually inputting other, relevant information. A wide variety of displays and reports are available to management, adjusted to meet individual requirements. The benefits from the use of MIS are difficult to quantify, since they become part of the management process. Further developments are taking place based on operational experience and requirements and taking advantage of the recent advances in computer technology. MIS is the modern management tool in British coal mining, collecting, storing, analysing and presenting accurate information upon which management decision making is based.
This article presents a framework that maps information system development (ISD) activities on systems for the creation of knowledge. This work addresses the relevant and persisting problem of improving the chances of ISD success. The article builds upon previous research on knowledge aspects...... based on ISD literature and on Churchman's (1971) inquiring systems. The second part presents the use of the framework in an ISD project. The case is used to show the applicability of the framework and to highlight the advantages of this approach. The main theoretical implication is that the framework...
The Automated Information Alarm System is a joint effort between Los Alamos National Laboratory, Lawrence Livermore National Laboratory, and Sandia National Laboratory to demonstrate and implement, on a small-to-medium sized local area network, an automated system that detects and automatically responds to attacks that use readily available tools and methodologies. The Alarm System will sense or detect, assess, and respond to suspicious activities that may be detrimental to information on the network or to continued operation of the network. The responses will allow stopping, isolating, or ejecting the suspicious activities. The number of sensors, the sensitivity of the sensors, the assessment criteria, and the desired responses may be set by the using organization to meet their local security policies.
The Automated Information Alarm System is a joint effort between Los Alamos National Laboratory, Lawrence Livermore National Laboratory, and Sandia National Laboratory to demonstrate and implement, on a small-to-medium sized local area network, an automated system that detects and automatically responds to attacks that use readily available tools and methodologies. The Alarm System will sense or detect, assess, and respond to suspicious activities that may be detrimental to information on the network or to continued operation of the network. The responses will allow stopping, isolating, or ejecting the suspicious activities. The number of sensors, the sensitivity of the sensors, the assessment criteria, and the desired responses may be set by the using organization to meet their local security policies
Duo, Sun; Ying, Zhou Cai
Lack of personalized learning is the key shortcoming of traditional e-Learning system. This paper analyzes the personal characters in e-Learning activity. In order to meet the personalized e-learning, a personalized e-learning system based on intelligent agent was proposed and realized in the paper. The structure of system, work process, the design of intelligent agent and the realization of intelligent agent were introduced in the paper. After the test use of the system by certain network school, we found that the system could improve the learner's initiative participation, which can provide learners with personalized knowledge service. Thus, we thought it might be a practical solution to realize self- learning and self-promotion in the lifelong education age.
The rapid development of accessible computing power in the 1980s has led to the use of machine intelligence in every sphere of engineering. The incredible progress in computing power and availability has also created a tremendous wealth of information available at the touch of few buttons. However, such wealth can easily provoke what is commonly described as 'information overload'. The massive number of connections produced by a single search of the web, for example, can greatly overwhelm users of this new technology. The rapidity of Web searches is due to the synergy between progress made in network connectivity protocols, intelligent search strategies and supporting hardware. This paper will attempt to define the basic elements of machine intelligence in the context of corrosion engineering and examine what has been done or could be done to introduce artificial thinking into daily operations. This paper will also review some modem software systems commonly used for information processing and internet searches. (author)
Morey, Leslie C; Benson, Kathryn T
Beginning with DSM-III, the inclusion of a "personality" axis was designed to encourage awareness of personality disorders and the treatment-related implications of individual differences, but since that time there is little accumulated evidence that the personality disorder categories provide substantial treatment-related guidance. The DSM-5 Personality and Personality Disorders Work Group sought to develop an Alternative Model for personality disorder, and this study examined whether this model is more closely related to clinicians' decision-making processes than the traditional categorical personality disorder diagnoses. A national sample of 337 clinicians provided complete personality disorder diagnostic information and several treatment-related clinical judgments about one of their patients. The dimensional concepts of the DSM-5 Alternative Model for personality disorders demonstrated stronger relationships than categorical DSM-IV/DSM-5 Section II diagnoses to 10 of 11 clinical judgments regarding differential treatment planning, optimal treatment intensity, and long-term prognosis. The constructs of the DSM-5 Alternative Model for personality disorders may provide more clinically useful information for treatment planning than the official categorical personality disorder diagnostic system retained in DSM-5 Section II. Copyright © 2016 Elsevier Inc. All rights reserved.
Oswaldo Moscoso Zea
Full Text Available (Received: 2014/02/14 - Accepted: 2014/03/25Enterprise Architecture (EA has emerged as one of the most important topics to consider in Information System studies and has grown to become an essential business management activity to visualize and evaluate the future direction of a company. Nowadays in the market there are several software tools that support Enterprise Architects to work with EA. In order to decrease the risk of purchasing software tools that do not fulfill stakeholder´s needs is important to assess the software before making an investment. In this paper a literature review of the state of the art of EA will be done. Furthermore evaluation initiatives and existing information systems are analyzed which can support decision makers in the appropriate software tools for their companies.
Since the very beginning of commercial operation of nuclear power plants, the nuclear power industry worldwide has accumulated more than 5000 reactor years of experience. The IAEA has been collecting Operating Experience data for Nuclear Power Plants since 1970 which were computerized in 1980. The Agency has undertaken to make Power Reactor Information System (PRIS) available on-line to its Member States. The aim of this publication is to provide the users of PRIS from their terminals with description of data base and communication systems and to show the methods of accessing the data
Worley, R; Ciotti, V
Despite enormous advances in information systems, the process by which most medical practices select them has remained virtually unchanged for decades: the request for proposal (RFP). Unfortunately, vendors have learned ways to minimize the value of RFP checklists to where purchasers now learn little about the system functionality. The authors describe a selection methodology that replaces the RFP with scored demos, reviews of vendor user manuals and mathematically structured reference checking. In a recent selection process at a major medical center, these techniques yielded greater user buy-in and favorable contract terms as well.
The purpose of the Biota subject area of the Hanford Environmental Information System (HEIS) is to manage the data collected from samples of plants and animals. This includes both samples taken from the plant or animal or samples related to the plant or animal. Related samples include animal feces and animal habitat. Data stored in the Biota subject area include data about the biota samples taken, analysis results counts from population studies, and species distribution maps
The purpose of the Soil subject area of the Hanford Environmental Information System (HEIS) is to manage the data acquired from soil samples, both geologic and surface, and sediment samples. Stored in the Soil subject area are data relevant to the soil samples, laboratory analytical results, and field measurements. The two major types of data make up the Soil subject area are data concerning the samples and data about the chemical and/or radiologic analyses of soil samples
Scottish Nuclear, the company which has owned and operated Scotland's nuclear power generating capacity since privatization, inherited a substantial amount of computer hardware and software from its predecessor, the South of Scotland Electricity Board. Each of the two power stations, Torness and Hunterston, were using Digital Vax clusters as the Scottish Nuclear company was formed. This had a major influence on the information systems strategy which has subsequently been adopted. (UK)
interrelationships of the many aspects of management information systems (MIS); that is, with how analysis, design, operation, evaluation, and user considerations affect management information systems . (Author)
Huang, Pei-wen; Lamm, Alexa J.
Extension educators have diligently educated the general public about water conservation. Incorporating audiences' personal experience into educational programming is recommended as an approach to effectively enhance audiences' adoption of water conservation practices. To ensure the impact on the audiences and environment, understanding the…
Bates, Timothy C.; Rock, Andrew
Raven's matrices and inspection time (IT) were recorded from 56 subjects under five arousal levels. Raven's and IT correlated strongly (r = -0.7) as predicted by processing-speed theories of "g." In line with Eysenck's [Eysenck, H. J. (1967). "The biological basis of personality". Springfield, IL: Thomas] arousal theory of extraversion, there was…
Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C
Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students' use of personal smartphones for clinical work. The intent of the study was to examine final-year medical students' experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Our findings suggest that the use of personal smartphones for clinical work by medical students is prevalent. There is a need to more fully address
Garde - Perik, van de E.M.
Current developments towards Ambient Intelligence and related technological visions of the future are founded on continuous collection of information about individuals and their activities. This collection of information, its potentially persistent storage, dissemination and use raise privacy
Full Text Available With the rapid development of e-commerce, the contradiction between the disorder of business information and customer demand is increasingly prominent. This study aims to make e-commerce shopping more convenient, and avoid information overload, by an interactive personalized recommendation system using the hybrid algorithm model. The proposed model first uses various recommendation algorithms to get a list of original recommendation results. Combined with the customer’s feedback in an interactive manner, it then establishes the weights of corresponding recommendation algorithms. Finally, the synthetic formula of evidence theory is used to fuse the original results to obtain the final recommendation products. The recommendation performance of the proposed method is compared with that of traditional methods. The results of the experimental study through a Taobao online dress shop clearly show that the proposed method increases the efficiency of data mining in the consumer coverage, the consumer discovery accuracy and the recommendation recall. The hybrid recommendation algorithm complements the advantages of the existing recommendation algorithms in data mining. The interactive assigned-weight method meets consumer demand better and solves the problem of information overload. Meanwhile, our study offers important implications for e-commerce platform providers regarding the design of product recommendation systems.
A.A.J. (Jos) van Helvoort
Although most authors on Information Literacy do not really differ in their definitions of the information literacy concept, phenomenographic research makes clear that in the context of education at least two different conceptions can be distinguished: an “Information Problem Solving” conception and
The overwhelming amount of information available today makes it difficult for users to find useful information and as the solution to this information glut problem, recommendation technologies emerged. Among the several streams of related research, one important evolution in technology is to generate recommendations based on users' own social…
Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.
Omata, K.; Fujita, Y.; Yoshikawa, N.; Sekiguchi, M.; Shida, Y.
A versatile and flexible data acquisition system KODAQ (Kakuken Online Data AcQuisition system) has been developed. The system runs with CAMAC and a most popular Japanese personal computer, PC9801 (NEC), similar to the IBM PC/AT. The system is designed to set up easily a data acquisition system for various kinds of nuclear-physics experiments. (author)
Yang, J; Sekhar, S C; Cheong, K W D; Raphael, B
In the context of airborne infection control, it is critical that the ventilation system is able to extract the contaminated exhaled air within the shortest possible time. To minimize the spread of contaminated air exhaled by occupants efficiently, a novel personalized ventilation (PV)-personalized exhaust (PE) system has been developed, which aims to exhaust the exhaled air as much as possible from around the infected person (IP). The PV-PE system was studied experimentally for a particular healthcare setting based on a typical consultation room geometry and four different medical consultation positions of an IP and a healthy person (HP). Experiments using two types of tracer gases were conducted to evaluate two types of PE: Top-PE and Shoulder-PE under two different background ventilation systems: Mixing Ventilation and Displacement Ventilation. Personalized exposure effectiveness, intake fraction (iF) and exposure reduction (ε) were used as indices to evaluate the PV-PE system. The results show that the combined PV-PE system for the HP achieves the lowest intake fraction; and the use of PE system for the IP alone shows much better performance than using PV system for the HP alone. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Iyer, Maithili; Kempton, Willett; Payne, Christopher
A program called ``Innovative Billing?? has been developed to provide individualized energy information for a mass audience?the entireresidential customer base of an electric or gas utility. Customers receive a graph on the bill that compares that customer?s consumption with othersimilar customers for the same month. The program aims to stimulate customers to make ef?ciency improvements. To group as many as severalmillion customers into small ``comparison groups??, an automated method must be developed drawing solely from the data available to the utility.This paper develops and applies methods to compare the quality of resulting comparison groups.A data base of 114,000 customers from a utility billing system was used to evaluate Innovative Billing comparison groups, comparing fouralternative criteria: house characteristics (?oor area, housing type, and heating fuel); street; meter read route; billing cycle. Also, customers wereinterviewed to see what forms of comparison graphs made most sense and led to fewest errors of interpretation. We ?nd that good qualitycomparison groups result from using street name, meter book, or multiple house characteristics. Other criteria we tested, such as entire cycle, entiremeter book, or single house characteristics such as ?oor area, resulted in poor quality comparison groups. This analysis provides a basis forchoosing comparison groups based on extensive user testing and statistical analysis. The result is a practical set of guidelines that can be used toimplement realistic, inexpensive innovative billing for the entire customer base of an electric or gas utility.
use. Large-scale information systems may cover large amounts of information such as the Land Identification and Information Management System (LIMS...small computer in managing the information holdings of a mapping institute. The result is the Cartographic Information Management System (CIMS), a...American countrie.s. 1 .- - _ _ _ _. = _ m m m THE CARTOGRAPHIC INFORMATION MANAGEMENT SYSTEM System Rationale Interactive computer-assisted cartography
The liquid effluent sampling program is part of the effort to minimize adverse environmental impact during the cleanup operation at the Hanford Site. Of the 33 Phase I and Phase II liquid effluents, all streams actively discharged to the soil column will be sampled. The Liquid Effluent Monitoring Information System (LEMIS) is being developed as the organized information repository facility in support of the liquid effluent monitoring requirements of the Tri-Party Agreement. It is necessary to provide an automated repository into which the results from liquid effluent sampling will be placed. This repository must provide for effective retention, review, and retrieval of selected sample data by authorized persons and organizations. This System Construction document is the aggregation of the DMR P+ methodology project management deliverables. Together they represent a description of the project and its plan through four Releases, corresponding to the definition and prioritization of requirements defined by the user
Ramirez J, F.J.; Garcia R, R.; Ramirez N, R.; Torres B, M.A.
It has been developed a Multichannel analyzer system which was added to personal computer of 4096 channels for its use, in nuclear radiations matters, such as X-ray fluorescence analysis, Neutron activation analysis, etc. in that is interesting to know the radiation energy distribution. This system has three modules; a Digital analogical converter of 12 bits, fast (total conversion time of 6 μ s) that use a successive approximation technique with linearity correction by the gliding rule method. A digital card with microprocessor that is useful as an interface with the computer for the acquisition, data storage and the process control. A computer program with extensive use of graphics, friendly with the user in order to facilitate its utilization, also with the option to find peaks, an expansion of an interesting area, information storage in compatible format with spectra analysis programs, etc. Twenty five units of this system have been constructed which all of they were distributed to the ARCAL Member countries and the other 10 units were distributed in the National Institute of Nuclear Research. On the other hand, it has been able to find other applications where the information can be converted to pulses and the interest variable is represented by the pulse amplitude. (Author)
Tewari, Ashish Kumar; Rashi; Wadhwa, Gulshan; Sharma, Sanjeev Kumar; Jain, Chakresh Kumar
Bioterrorism is the intended use of pathogenic strains of microbes to widen terror in a population. There is a definite need to promote research for development of vaccines, therapeutics and diagnostic methods as a part of preparedness to any bioterror attack in the future. BIRS is an open-access database of collective information on the organisms related to bioterrorism. The architecture of database utilizes the current open-source technology viz PHP ver 5.3.19, MySQL and IIS server under windows platform for database designing. Database stores information on literature, generic- information and unique pathways of about 10 microorganisms involved in bioterrorism. This may serve as a collective repository to accelerate the drug discovery and vaccines designing process against such bioterrorist agents (microbes). The available data has been validated from various online resources and literature mining in order to provide the user with a comprehensive information system. The database is freely available at http://www.bioterrorism.biowaves.org.
Ferro, T; Klein, D N
The present study examined the concordance of the Family History Interview for Personality Disorders (FHIPD) with diagnoses based on direct interviews and between pairs of informants. Subjects were 224 probands participating in a series of studies of the familial transmission of mood and personality disorders and their first-degree relatives. Proband informants and relatives provided information about themselves on the Structured Clinical Interview for DSM-III-R (SCID), Personality Disorder Examination (PDE), and Eysenck Personality Questionnaire (EPQ). Information from informants about relatives was collected with the FHIPD. All assessments were made blindly and independently. Using Kappa, concordance between proband informants' family histories and relative direct reports on specific personality disorders was low, ranging from -.01 to .28, with a median of .10. Kappa for a diagnosis of any personality disorder was .16. When two independent informant reports were compared, Kappas for specific Axis II disorders ranged from .10 to .72, with a median of .28. Kappa for a diagnosis of any personality disorder was .36. These data suggest that subjects and informants provide different perspectives on Axis II psychopathology, and support the use of both sources of information whenever possible.
The Well subject area of the Hanford Environmental Information System (HEIS) manages data relevant to wells, boreholes and test pits constructed at the Hanford Site for soil sampling, geologic analysis and/or ground-water monitoring, and sampling for hydrochemical and radiological analysis. Data stored in the Well subject area include information relevant to the construction of the wells and boreholes, structural modifications to existing wells and boreholes, the location of wells, boreholes and test pits, and the association of wells, boreholes and test pits with organization entities such as waste sites. Data resulting from ground-water sampling performed at wells are stored in tables in the Ground-Water subject area. Geologic data collected during drilling, including particle sizing and interpretative geologic summaries, are stored in tables in the Geologic subject area. Data from soil samples taken during the drilling or excavation and sent for chemical and/or radiological analysis are stored in the Soil subject area
Kaelber, David; Pan, Eric C
Personal health records (PHRs) are a rapidly growing area of health information technology despite a lack of significant value-based assessment.Here we present an assessment of the potential value of PHR systems, looking at both costs and benefits.We examine provider-tethered, payer-tethered, and third-party PHRs, as well as idealized interoperable PHRs. An analytical model was developed that considered eight PHR application and infrastructure functions. Our analysis projects the initial and annual costs and annual benefits of PHRs to the entire US over the next 10 years.This PHR analysis shows that all forms of PHRs have initial net negative value. However, at the end of 10 years, steady state annual net value ranging from$13 billion to -$29 billion. Interoperable PHRs provide the most value, followed by third-party PHRs and payer-tethered PHRs also showing positive net value. Provider-tethered PHRs constantly demonstrating negative net value.
Villarino, E.A.; Abbate, P.; Lovotti, O.; Santini, M.
The MTR-PC (Materials Testing Reactors-Personal Computers) system has been developed by the Nuclear Engineering Division of INVAP S.E. with the aim of providing working conditions integrated with personal computers for design and neutronic, thermohydraulic and shielding analysis for reactors employing plate type fuel. (Author) [es
A Grid information system resolves queries that may need to consider all information sources (Grid services), which are widely distributed geographically, in order to enable efficient Grid functions that may utilise multiple cooperating services. Fundamentally this can be achieved by either moving the query to the data (query shipping) or moving the data to the query (data shipping). Existing Grid information system implementations have adopted one of the two approaches. This paper explores the two approaches in further detail by evaluating them to the best possible extent with respect to Grid information system benchmarking metrics. A Grid information system that follows the data shipping approach based on the replication of information that aims to improve the currency for highly-mutable information is presented. An implementation of this, based on an Enterprise Messaging System, is evaluated using the benchmarking method and the consequence of the results for the design of Grid information systems is discu...
This report discusses the procedures that establish the configuration control processes for the Hanford Environmental Information System (HEIS) software. The procedures also provide the charter and function of the HEIS Configuration Control Board (CCB) for maintaining software. The software configuration control items covered under these procedures include the HEIS software and database structure. The configuration control processes include both administrative and audit functions. The administrative role includes maintaining the overall change schedule, ensuring consistency of proposed changes, negotiating change plan adjustments, setting priorities, and tracking the status of changes. The configuration control process audits to ensure that changes are performed to applicable standards
The IAEA has been collecting Operating Experience data for Nuclear Power Plants of the IAEA Member States since 1970. In order to facilitate an analysis of nuclear power plant performance as well as to produce relevant publications, all previously collected data supplied from the questionnaires were computerized in 1980 and the Power Reactor Information System was implemented. PRIS currently contains production records for the years up to and including 1990 and about 98% of the reactors-years operating experience in the world is contained in PRIS. (orig.)
Saitou, Isamu; Kanda, Hiroaki; Asai, Akio; Takeishi, Naoki; Ota, Yoshito [Hitachi Aloka Medical, Ltd., Measuring Systems Engineering Dept., Tokyo (Japan); Hanawa, Nobuhiro; Ueda, Hisao; Kusunoki, Tsuyoshi; Ishitsuka, Etsuo; Kawamura, Hiroshi [Japan Atomic Energy Agency, Oarai Research and Development Center, Oarai, Ibaraki (Japan)
JAEA (Japan Atomic Energy Agency) and HAM (Hitachi Aloka Medical, Ltd) have proposed novel monitoring system for workers of nuclear facility. In these facilities, exposure management for workers is mainly used access control and personal exposure recordings. This system is currently only for reports management but is not confirmative for surveillance when work in progress. Therefore, JAEA and HAM integrate access control and personal exposure recordings and two real-time monitoring systems which are position sensing and vital sign monitor. Furthermore change personal exposure management to real-time management, this system integration prevents workers from risk of accidents, and makes possible take appropriate action quickly. This novel system is going to start for tentative operation, using position sensing and real-time personal dosimeter with database in Apr. 2012. (author)
Information Impact: Journal of Information and Knowledge Management. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 7, No 1 (2016) >. Log in or Register to get access to full text downloads.
In information systems development, end-users have shifted in their role: from consumers of information to informants for requirements to developers of systems. This shift in the role of users has also changed how information systems are developed. Instead of systems developers creating specifications for software or end-users creating small…
... other information of a private and personal nature. (b) Information having a commercial or financial... individuals who have access to such information, (3) the type and degree of risk of financial injury to be... use of nondiscloseable records or information from such records for authorized program purposes...
Animals need to make constant decisions throughout their lives and to make optimal decisions individuals rely on information. Information can be obtained in two distinct ways: personal or social information. The current paradigm in the information theory use in animal ecology assumes that the
Montag, Christian; Panksepp, Jaak
The present article highlights important concepts of personality including stability issues from the perspective of situational demands and stability over the life-course. Following this more introductory section, we argue why individual differences in primary emotional systems may represent the phylogenetically oldest parts of human personality. Our argumentation leads to the need to increasingly consider individual differences in the raw affects/emotions of people to understand human personality in a bottom–up fashion, which can be coordinated with top–down perspectives. In support of this idea, we also review existing evidence linking individual differences in primal emotions as assessed with the Affective Neuroscience Personality Scales and the widely accepted Big Five Model of Personality. In this context, we provide additional evidence on the link between primal emotions and personality in German and Chinese sample populations. In short, this article addresses evolutionary perspectives in the evaluation of human personality, highlighting some of the ancestral emotional urges that probably still control variations in the construction of human personality structures. Moreover, we address how individual differences in primary emotional systems can illuminate linkages to major human psychopathologies and the potential advantages and disadvantages of carrying a certain personality trait within certain cultural/environmental niches. PMID:28443039
Montag, Christian; Panksepp, Jaak
The present article highlights important concepts of personality including stability issues from the perspective of situational demands and stability over the life-course. Following this more introductory section, we argue why individual differences in primary emotional systems may represent the phylogenetically oldest parts of human personality. Our argumentation leads to the need to increasingly consider individual differences in the raw affects/emotions of people to understand human personality in a bottom-up fashion, which can be coordinated with top-down perspectives. In support of this idea, we also review existing evidence linking individual differences in primal emotions as assessed with the Affective Neuroscience Personality Scales and the widely accepted Big Five Model of Personality. In this context, we provide additional evidence on the link between primal emotions and personality in German and Chinese sample populations. In short, this article addresses evolutionary perspectives in the evaluation of human personality, highlighting some of the ancestral emotional urges that probably still control variations in the construction of human personality structures. Moreover, we address how individual differences in primary emotional systems can illuminate linkages to major human psychopathologies and the potential advantages and disadvantages of carrying a certain personality trait within certain cultural/environmental niches.
Full Text Available In this paper we describe a research project to develop an optimal information retrieval system in an Information Operations domain. Information Operations is the application and management of information to gain an advantage over an opponent...
The Economics of Information Systems and Software focuses on the economic aspects of information systems and software, including advertising, evaluation of information systems, and software maintenance. The book first elaborates on value and values, software business, and scientific information as an economic category. Discussions focus on information products and information services, special economic properties of information, culture and convergence, hardware and software products, materiality and consumption, technological progress, and software flexibility. The text then takes a look at a
Mukherjee, Sumitava; Manjaly, Jaison A; Nargundkar, Maithilee
With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure.
Fire, heat, cold, electro-magnetic and ionising radiation, electricity, chemicals, impacts, cuts, abrasion, etc. are the common hazards for arms and hands at work. The gloves chosen for protection of the arm and hand should cover those parts adequately and the material of the gloves should be capable of offering protection against the specific hazard involved. Criteria for choosing arm and hand protection equipment will be based on their shape and part of the arm and hand protected. Guide lines for choosing such personal protection equipment for nuclear facilities are given. (M.K.V.). 3 annexures, 1 appendix
Chen, Badong; Hu, Jinchun; Principe, Jose C
Recently, criterion functions based on information theoretic measures (entropy, mutual information, information divergence) have attracted attention and become an emerging area of study in signal processing and system identification domain. This book presents a systematic framework for system identification and information processing, investigating system identification from an information theory point of view. The book is divided into six chapters, which cover the information needed to understand the theory and application of system parameter identification. The authors' research pr
Full Text Available This paper reports on some findings of the explorations represented at the conference "Information Seeking in Context" (ISIC98. These findings are investigated with the aim to evaluate their practical usefulness for the design of information computer systems. The paper discusses some common problems connected with the conceptual approaches to the information system development.
Zhang Zhiyong; Cheng Chang; Liu Zhengshan; Yang Huating; Deng Changming; Zhang Xiu; Guo Zhanjie
The composition and design of a real-time personal dose measurement and management system are described. Accordingly, some pertinent hardware circuits and software codes including their operation modes are presented
Kobayashi, Hironobu; Kawamura, Takeshi; Inoue, Takayuki
Fuji Electric has developed a system for the higher radiation controlled area in nuclear power plants, in which exposure dose data measured on the wearer's chest, hands, and legs are transferred by wireless to the data control equipment so that the exposure dose can be controlled in real time. The system using a specified low-power radio wave causes no interference to the other types of dosimeters. The data control equipment automatically saves data received from the dosimeters and also has functions of calibration of dosimeters and maintenance of the wireless system. This paper describes the wireless monitoring system that consists of chest and parts dosimeters and data control equipment. (author)
Crawford, Jarret T; Jussim, Lee; Madon, Stephanie; Cain, Thomas R; Stevens, Sean T
This article introduces the political person perception model, which identifies conditions under which perceivers rely on stereotypes (party membership), individuating information (issue position), or both in political person perception. Three studies supported the model's predictions. Study 1 showed that perceivers gave primacy to target information that was narrowly relevant to a judgment, whether that information was stereotypic or individuating. Study 2 found that perceivers relied exclusively on individuating information when it was narrowly relevant to the judgment and relied on both stereotype and individuating information when individuating information was not narrowly relevant to the judgment but did imply a political ideology. Study 3 replicated these findings in a more ecologically valid context and showed that people relied on party information in the absence of narrowly relevant policy positions and when individuating information did not imply a political ideology. Implications for political person perception and theories of stereotyping are discussed.
Ellis, David; Allen, David; Wilson, Tom
Examines the relationship between information science and information-systems (IS) research through analysis of the subject literature of each field and by citation and co-citation analysis of highly cited researchers in each field. Subfields of user studies and information-retrieval research were selected to represent information-science…
Nielsen, Jens Brehm
information about it without imposing a high cognitive load. In the second main chapter, active learning and sequential design are discussed in relation to the challenge of obtaining the setting that maximizes the user’s unobserved internal response function in as few iterations as possible. For the Gaussian...
A computerized legal information management system. ... process through the filling system using the survey research methodology. ... A framework for the design and implementation of a legal information management system was presented.
Gedeon, M.; De Soete, H.
Document available in extended abstract form only. In the framework of the geological disposal of radioactive waste, the characterization of the Boom Clay and its environment has been going on for more than 30 years. During this time, a great quantity of data was collected to support the research on the reference host rock. A geo-scientific information system was built to store the data acquired in this framework,. The aim was to create a central place where all types of data could be looked up for further analyses and interpretation. All data stored in the system are geographically referenced. The GSIS database was created using PostgreSQL database with PostGIS spatial extension. PostgreSQL is an open-source object-relational database management system (ORDBMS) based on POSTGRES, developed at the University of California at Berkeley Computer Science Department. POSTGRES pioneered many concepts that only became available in some commercial database systems much later. PostgreSQL is an open-source descendant of this original Berkeley code. It supports SQL92 and SQL99 and offers many modern features: complex queries, foreign keys, triggers, views, transactional integrity, multi-version concurrency control. PostGIS is an extension to the PostgreSQL object-relational database system which allows GIS (Geographic Information Systems) objects to be stored in the database. PostGIS includes support for GiST-based R-Tree spatial indexes, and functions for analysis and processing of GIS objects. The GSIS database consists of three principal database domains, the objects database domain (ObjectsDB) and the data domain (DataDB). ObjectsDB includes the definitions (including the geometry/ position) and relative hierarchy of the objects. The objects are defined as structures, enclosed areas or scientific instruments with definable geometry (2D or 3D) including samples used to acquire data (boreholes, piezometers, sampling locations, galleries, sensors, etc.). DataDB includes
Park, Dong Kyun; Jung, Eun Young; Jeong, Byung Hui; Moon, Byung Chan; Kang, Hyung Wook; Tchah, Hann; Han, Gi Seong; Cheng, Woo Sung; Lee, Young Ho
In this research, the hospital information system of Gachon University Gil hospital is introduced and a future strategy for hospital information systems is proposed. This research introduces the development conditions of hospital information system at Gachon University Gil hospital, information about the development of the enterprise resource planning (ERP), a medical service process improvement system, and the personal health record (PHR) system. The medical service process and work efficiency were improved through the medical service process improvement system, which is the most common hospital information system at Gachon University Gil hospital and which includes an emergency medical service system, an online evaluation system and a round support system. Gachon University Gil hospital developed medical service improvement systems to increase work efficiency of medical team and optimized the systems to prove the availability of high-quality medical services for patients and their families. The PHR-based personalized health care solution is under development and will provide higher quality medical service for more patients in the future.
In all work places where hazards of various kinds are present and the same cannot be totally controlled by engineering methods, suitable personal protective equipment (PPE) shall be used. There are several types of eye and face protection devices available in the market and it is important that employees use the proper type for the particular job. The main classes of eye and face protection devices required for the industrial operations are as follows: (a) eye protection devices which includes: (i) safety goggles (ii) safety spectacles (iii) safety clipons and eye and face protection devices which are (i) eye shield, (ii) face shield, (iii) wire mesh screen guard. Guide lines for selecting appropriate ear and face protection equipment for nuclear installations are given. (M.K.V.). 4 annexures, 1 appendix
Aeba, Yoichi; Ishikawa, Michio; Enomoto, Toshiaki; Oomori, Katsuyoshi
Falsifications of self-inspection records in the shrouds and of leakage rates for containment vessels at TEPCO nuclear power plants destroyed public trust in nuclear safety. The Nuclear Reactor Regulation Law and Electric Utility Law were amended to enhance the nuclear safety regulation system. The major improvements are that operators are legally required to conduct inspection (periodical operator inspection) and recording and keeping inspection results. The operator performs 'periodical operator inspection' regularly, and Nuclear and Industrial Safety Agency (NISA) performs periodical inspection' about particularly important facilities/function in safety. Sixteen opinions of well-informed persons about the nuclear reactor facility periodical inspection were presented in this special number. Interval of periodical inspection less than thirteen months was disputed. Maintenance activities should be more rationalized based on risk information. (T. Tanaka)
Al-Tunisi, N.; Ghazzawi, A.; Gruyaert, F.; Clarke, D. [Saudi Aramco, Dhahran (Saudi Arabia). Process and Control Systems Dept.
In November 1993, Saudi Aramco management endorsed a proposal to coordinate the development of the Management Information Systems (MISs) of four concurrent projects for its facilities Controls Modernization Program. The affected projects were the Ras Tanura Refinery Upgrade Project, the Abqaiq Plant Controls Modernization and the Shedgum and Uthmaniyah Gas plants Control Upgrade Projects. All of these projects had a significant requirement of MISs in their scope. Under the leadership of the Process and Control Systems Department, and MIS Coordination Team was formed with representatives of several departments. An MIS Applications Evaluation procedure was developed based on the Kepner Tregoe Decisions Analysis Process and general questionnaires were sent to over a hundred potential Vendors. The applications were divided into several categories, such as: Data Capture and Historization, Human User Interface, Trending, Reporting, Graphic Displays, Data Reconciliation, Statistical Analysis, Expert Systems, Maintenance Applications, Document Management and Operations Planning and Scheduling. For each of the MIS Application areas, detailed follow-up questionnaires were used to short list the candidate products. In May and June 1994, selected Vendors were invited to Saudi Arabia for an Exhibition which was open to all Saudi Aramco employees. In conjunction with this, the Vendors were subjected to a rigorous product testing exercise by independent teams of testers. The paper will describe the methods used and the lessons learned in this extensive software evaluation phase, which was a first for Saudi Aramco.
Al-Tunisi, N.; Ghazzawi, A.; Gruyaert, F.; Clarke, D.
In November 1993, Saudi Aramco management endorsed a proposal to coordinate the development of the Management Information Systems (MISs) of four concurrent projects for its facilities Controls Modernization Program. The affected projects were the Ras Tanura Refinery Upgrade Project, the Abqaiq Plant Controls Modernization and the Shedgum and Uthmaniyah Gas plants Control Upgrade Projects. All of these projects had a significant requirement of MISs in their scope. Under the leadership of the Process and Control Systems Department, and MIS Coordination Team was formed with representatives of several departments. An MIS Applications Evaluation procedure was developed based on the Kepner Tregoe Decisions Analysis Process and general questionnaires were sent to over a hundred potential Vendors. The applications were divided into several categories, such as: Data Capture and Historization, Human User Interface, Trending, Reporting, Graphic Displays, Data Reconciliation, Statistical Analysis, Expert Systems, Maintenance Applications, Document Management and Operations Planning and Scheduling. For each of the MIS Application areas, detailed follow-up questionnaires were used to short list the candidate products. In May and June 1994, selected Vendors were invited to Saudi Arabia for an Exhibition which was open to all Saudi Aramco employees. In conjunction with this, the Vendors were subjected to a rigorous product testing exercise by independent teams of testers. The paper will describe the methods used and the lessons learned in this extensive software evaluation phase, which was a first for Saudi Aramco
Md Mamunur Rashid; Kazi Wasif Ahmed; Hasan Mahmud; Md. Kamrul Hasan; Husne Ara Rubaiyeat
Our life is totally engaged by the progressive growth of online social networking. Because, millions of users are interconnecting with each other using different social media sites like Facebook, Twitter, LinkedIn, Google+, Pinterest, Instagram etc. Most of the social sites like Facebook, Google+ allow users to join different groups or communities where people can share their common interests and express opinions around a common cause, problem or activity. However, an information overloading ...
Kalytych, G.; Litosh, G.
The article analyses the approaches to the notions of "information", "state administration system", "administrative information". The article considers the importance of of information for the whole state administration system and reveals the criteria which provide the information with administrative status. Special attention is paid to making of administrative decisions on the level of the sate which are based on effective information management.
During the first long shutdown (LS1) a new safety system will be installed in the primary beam areas of the PS complex in order to bring the standard of personnel radiation protection at the PS into line with that of the LHC. Pierre Ninin, deputy group leader of GS-ASE and responsible for the installation of the new PS complex safety system, in front of a new access control system. The LHC access control systems are state-of-the-art, whereas those of the injection chain accelerators were running the risk of becoming obsolete. For the past two years a project to upgrade the access and safety systems of the first links in the LHC accelerator chain has been underway to bring them into compliance with nuclear safety standards. These systems provide the personnel with automatic protection by limiting access to hazardous areas and by ensuring that nobody is present in the areas when the accelerator is in operation. By the end of 2013, the project teams will ha...
Houben, G.J.P.M.; Barna, P.; Frasincar, F.; Vdovják, R.; Cuella Lovelle, J.M.; et al., xx
As a consequence of the success of the Web, methodologies for information system development need to consider systems that use the Web paradigm. These Web Information Systems (WIS) use Web technologies to retrieve information from the Web and to deliver information in a Web presentation to the
Y. S. Sennik
Full Text Available This work is a generalization of the theoretical propositions related to the life cycle of information systems. There was given the definition of the life cycle, specify which items you should include every step of the cycle. Describes the methodology division of the life cycle on the main stage, including methodology Rational Unified Process. The description of the fundamental standards in this area. Special attention was paid to the work of the basic life cycle models. It was carried out their comparative characteristics. On the basis of the theoretical propositions, it was concluded that the preferred model of the life cycle for the corporate network is a spiral model and the use of international standards in the life cycle saves a lot of effort, time and material resources.
The purpose of the Tank Characterization Data subject area of the Hanford Environmental Information System (HEIS) is to manage data acquired from waste tank characterization efforts. Tank samples provide the data stored in this subject area. Also included are data from tank inventories. These data are analyzed to determine disposal requirements, such as suitability for grout or vitrification. The data provide the basis for developing safety analyses and closure plans, and for establishing and verifying compliance with waste acceptance specifications. Two major sources of data make up the tank characterization data subject area: Data from single-shell and double-shell tank core samples -- core sampling analytical results include physical properties, radionuclides, major chemicals, and hazardous components; and data from waste tank supernatant samples. Four types of data are stored in the TCD subject area. Qualifiers for TCD analytical result data are listed in Appendix A. Data loading and verification procedures are described in Appendix B
-changing planet. This information can be captured, analyzed, and visualized by geographic information systems (GIS) to produce maps, charts, and other tools that can reveal information essential to a wide variety of applications including emergency management. Knowing precise, real-time information about the size, location, environmental conditions, and resulting damage of an event like a flood or wildfire as well as the location and numbers of emergency responders and other resources contributes directly to the effectiveness of disaster mitigation. The need for such information is also evident when responding to homeland security threats, such as a terrorist attack. Recognizing the value of its geospatial information resources for this and other purposes, in 1998 Stennis and the state of Mississippi partnered to form what became the Enterprise for Innovative Geospatial Solutions (EIGS) industry cluster, supporting the growth of remote sensing and GIS-based research and business. As part of EIGS, several companies partnered with NASA through dual use and Small Business Innovation Research (SBIR) contracts. Among those was NVision.
... Section 701.115 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES... information (PPI). (a) Access/disclosure. Access to and disclosure of PPI such as SSN, date of birth, home... notice and understand PA rules. DON activities shall ensure that PPI (e.g., home address, date of birth...
Lambrev, V.G.; Bochkov, P.E.; Gorokhov, S.A.; Nekrasov, V.V.; Tolstikova, L.I.
An automated information retrieval system for radioactivation analysis has been developed. An ES-1022 computer and a problem-oriented software ''The description information search system'' were used for the purpose. Main aspects and sources of forming the system information fund, characteristics of the information retrieval language of the system are reported and examples of question-answer dialogue are given. Two modes can be used: selective information distribution and retrospective search [ru
Based upon the synopsis of system intelligence and information services, this paper puts forward the attributes and the logic structure of information service, sets forth intelligent technology framework of electronic information system, and presents a series of measures, such as optimizing business information flow, advancing data decision capability, improving information fusion precision, strengthening deep learning application and enhancing prognostic and health management, and demonstrates system operation effectiveness. This will benefit the enhancement of system intelligence.
The studies in task-based approaches in second language acquisition claim that controlled and goal convergent tasks such as information gap tasks surpass open-ended conversations such as personal information exchange tasks for the development of the learner's interlanguage, in that the formers promote more repair negotiation. And yet, few studies…
White, David J; Davies, Hayden B; Agyapong, Samuel; Seegmiller, Nora
Brood parasites face considerable cognitive challenges in locating and selecting host nests for their young. Here, we test whether female brown-headed cowbirds, Molothrus ater , could use information acquired from observing the nest prospecting patterns of conspecifics to influence their own patterns of nest selection. In laboratory-based experiments, we created a disparity in the amount of personal information females had about the quality of nests. Females with less personal information about the quality of two nests spent more time investigating the nest that more knowledgeable females investigated. Furthermore, there was a strong negative relationship between individual's ability to track nest quality using personal information and their tendency to copy others. These two contrasting strategies for selecting nests are equally effective, but lead to different patterns of parasitism. © 2017 The Author(s).
De Clercq, Barbara; De Fruyt, Filip; Koot, Hans M; Benoit, Yves
To describe quality of life (QoL) of children surviving cancer in relation to their personality, using self- and maternal reports and examining differences with healthy referents. Sixty-seven children who survived childhood cancer were compared with eighty-one healthy children on QoL and personality characteristics. Children who survived cancer reported higher QoL than healthy children, whereas there were no differences for personality. Two main effects emerged for informant with children rating themselves as less neurotic and more conscientious than their mothers. The correspondence between mothers and children was substantially higher for survivors for QoL and personality ratings. QoL and trait measures share substantial variance, and personality traits significantly predict QoL. Parental personality ratings explained child QoL beyond children's personality ratings. Personality traits contribute to quality of life, indicating that personality significantly influences child's quality of life beyond the experience of a negative life event such as surviving cancer and its treatment. From a diagnostic perspective, parental trait ratings are informative in addition to children's ratings of personality to understand children's QoL.
... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as defined in section 85...
Fearon, Colm; Nachmias, Stefanos; McLaughlin, Heather; Jackson, Stephen
This study investigates the role of personal values as motivational antecedents for understanding higher education (HE) student career decidedness among university business school (UBS) students. We propose a new "protean"-informed HE student career decidedness model for theorizing how both personal values and social capital mediators…
... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5607-N-14] Notice of Proposed Information Collection: Comment Request; Personal Financial and Credit Statement AGENCY: Office of the... Proposal: Personal Financial and Credit Statement. OMB Control Number, if applicable: 2502-0001...
Kaltoft, Mette Kjer; Nielsen, Jesper Bo; Salkeld, Glenn
implicitly segues into the patient having made a 'good decision'. In person-centred health care, whether, in what form, and with what weight, 'information' is included as a criterion of decision quality is a matter for the person involved, to decide in the light of their own values, preferences, and time...
Yeo, Hwan-Ik; Lee, Yekyung Lisa
This study explores the use of blogs for personal information management (PIM) as a learning tool that could bring increased efficiency and academic self-efficacy for carrying out learning tasks. In order to identify the uses and effects of using blogs for PIM by children, a control group that used personal spaces within the class website and an…
... DEPARTMENT OF VETERANS AFFAIRS (CONTINUED) VETERANS SMALL BUSINESS REGULATIONS Records Management § 74.25 What types of personally identifiable information will VA collect? In order to establish owner... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false What types of personally...
In this study, the Big Five factor model of personality traits theory was tested for its ability to predict or explain Employee Information Security Behavior (EISB), when Generational Cohort (GCOHORT) moderated the relationship between the five factors of personality and EISB. The independent variables (IVs) Extraversion, Agreeableness,…
Chapman, Benjamin P.; Hampson, Sarah; Clarkin, John
We describe 2 frameworks in which personality dimensions relevant to health, such as Conscientiousness, can be used to inform interventions designed to promote health aging. First, contemporary data and theory do not suggest that personality is "immutable," but instead focus on questions of who changes, in what way, why, when, and how.…
J.C. Penney Co., Inc., New York, NY.
Insights into Consumer Issues is one of a group of educational publications and teaching units that J.C. Penney provides for consumer educators as a public service. This folder illustrates that although computerized processing of personal information has brought considerable convenience, the potential risk to personal privacy is of increasing…
This chapter reports on the concepts of information privacy and trust in government among citizens in Japan and New Zealand in a transnational, crosscultural study. Data from both countries are presented, and cultural and other factors are sought that might explain differences in attitudes shown. In both countries, citizens display a range of views, not related to age or gender. New Zealand citizens express concern about information privacy in relation to information held by government, but show a higher level of trust in government overall, and most attribute breaches of privacy to incompetence, rather than deliberate malfeasance. Japanese citizens interviewed also indicated that they had major concerns about information privacy, and had considerably less trust in government than New Zealand respondents showed. They were more inclined to attribute breaches of privacy to lax behavior in individuals than government systems. In both countries citizens showed an awareness of the tradeoffs necessary between personal privacy and the needs of the state to hold information for the benefit of all citizens, but knew little about the protection offered by privacy legislation, and expressed overall concern about privacy practices in the modern state. The study also provides evidence of cultural differences that can be related to Hofstede's dimensions of culture.
Full Text Available The problem of experimentation involving subjects whose mental condition prevents them from understanding information and providing proper informed consent has been addressed in various codes, declarations, conventions, treaties and regulations adopted by national, international and supranational institutions and authorities. This article summarizes the basic ethical criteria these documents provide and stresses the historical development from the nearly total exclusion of incapacitated subjects, established in the mid-twentieth century, to their contemporary inclusion in clinical trials on certain ethical conditions. The problem of proxy consent by legal representatives for participation in clinical trials is addressed particularly in reference to current Italian regulations. Exceptions to human experimentation requirements in emergency situations are also briefly discussed.
Muhammad Siddique Ansari
Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers
Liu Baoxu; Mei Jie; Xu Rongsheng; An Dehai; Yu Mingjian; Chen Xiangyang; Zheng Peng
On the basis of analysis of the key elements that will affect the Internet Security Information System, the author takes UNIX Operating System as an example, and provides the important stages that must be considered when implementing the Internet Security Information System. An implemental model of the Internet Security Information System is given
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false System information. 25.3 Section 25.3 Judicial Administration DEPARTMENT OF JUSTICE DEPARTMENT OF JUSTICE INFORMATION SYSTEMS The National Instant Criminal Background Check System § 25.3 System information. (a) There is established at the FBI a...
In response to a need for better management of maintenance and document information at the Argonne Tandem-Linear Accelerating System (ATLAS), the ATLAS Information Management System (AIMS) has been created. The system is based on the relational database model. The system's applications use the Alpha-4 relational database management system, a commercially available software package. The system's function and design are described
... Identifiable Information Protected Under the E-Government Act of 2002, Title V and the Privacy Act of 1974...) and Title V, subtitle A of the E-Government Act of 2002 (CIPSEA) (U.S.C. 3501 note). HUD wishes to... Information Collection, License for the Use of Personally Identifiable Information Protected Under the E...
... information; prohibition on dissemination. 4.37 Section 4.37 Banks and Banking COMPTROLLER OF THE CURRENCY... § 4.37 Persons and entities with access to OCC information; prohibition on dissemination. (a) Current... agreement to abide by, the prohibition on the dissemination of non-public OCC information contained in...
With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…
This study investigated personal information behavior and information needs that 21 adults managing life with Type 2 diabetes identify explicitly and implicitly during discussions of item acquisition and use of health information items that are kept in their homes. Research drew upon a naturalistic lens, in that semi-structured interviews were…
Gary H. Elsner
Permits were first needed for visits to wilderness areas in California during summer 1971. A computerized system for analyzing these permits and summarizing information from them has been developed. It produces four types of summary tables: point-of-origin of visitors; daily variation in total number of persons present; variations in group size; and variations in...
The effect of information systems on supply chain and performance of National Iranian South Oil Company (NISOC) ... Sample population of this research is made up of nisoc's managers and experts that are more than 2043 persons.By applying the cochrane's formula,the sample population of this research determined as ...
Douligeris, C.; Collins, J.; Iakovou, E.; Sun, P.; Riggs, K.R.
This paper presents the architectural design of OSIMS, an Oil Spill Information Management System, which is an integrated information management tool that consists of an object-relational database management system, an adaptive decision support system, an advanced visualization system (AVS) and a geographic information system (GIS). OSIMS will handle large and diverse databases of environmental, ecological, geographical, engineering, and regulatory information and will be used for risk analysis and contingency planning
Douligeris, C.; Collins, J.; Iakovou, E.; Sun, P.; Riggs, K.R. [Univ. of Miami, Coral Gables, FL (United States)
This paper presents the architectural design of OSIMS, an Oil Spill Information Management System, which is an integrated information management tool that consists of an object-relational database management system, an adaptive decision support system, an advanced visualization system (AVS) and a geographic information system (GIS). OSIMS will handle large and diverse databases of environmental, ecological, geographical, engineering, and regulatory information and will be used for risk analysis and contingency planning.
Based on psychoanalytic theory, the Who am I? expert system explains in simple terms the individual's true personality, even it its unconscious or hidden aspects. Our overt personality traits are deeply rooted. The Who am I? expert system gives access to an individual's primary personality, starting from his habitual everyday-life behavior: (1) describes the individual's basic personality, (2) explains this personality through the individual's deeply rooted experience and motivation, and (3) makes links with other people with a similar profile. The following are the primary features of the system: easy individual access, results in <20 minutes, and guaranteed confidentiality. Business applications include the following: (1) Individual training: Self-awareness improves a person's ability to fit in and to succeed within the group. (2) Communication: a homogeneous team has a better chance of success. (3) Human reliability: A close-knit team remains reliable even when faced with serious difficulties. (4) Recruitment: This technique enables the selection of individuals who will fit an existing homogeneous team. The system also enables a psychological diagnosis to be confirmed
Suzuki, Lalita K; Beale, Ivan L
The content of personal Web home pages created by adolescents with cancer is a new source of information about this population of potential benefit to oncology nurses and psychologists. Individual Internet elements found on 21 home pages created by youths with cancer (14-22 years old) were rated for cancer-related self-presentation, information dissemination, and interpersonal connection. Examples of adolescents' online narratives were also recorded. Adolescents with cancer used various Internet elements on their home pages for cancer-related self-presentation (eg, welcome messages, essays, personal history and diary pages, news articles, and poetry), information dissemination (e.g., through personal interest pages, multimedia presentations, lists, charts, and hyperlinks), and interpersonal connection (eg, guestbook entries). Results suggest that various elements found on personal home pages are being used by a limited number of young patients with cancer for self-expression, information access, and contact with peers.
Kaurin, Aleksandra; Sauerberger, Kyle S; Funder, David C
Diagnoses of personality disorders (PD) must rely on judgments of observers-either clinicians or acquaintances-because personality disorders are primarily defined in terms of maladaptive interpersonal behavior. Little is known, however, about how closely acquaintances' judgments of PD traits relate to self-reports of theoretically relevant Big Five traits or directly observed behavioral outcomes in interpersonal situations. The present study examines associations between judgments of the 10 PD traits provided by close acquaintances, self-reports of PD-relevant Big Five personality traits, and observed interpersonal behaviors across three different three-person laboratory interactions (i.e., unstructured chat, cooperative task, competitive game). The sample consisted of 256 undergraduate students (130 females; M age = 19.83, SD = 1.25). Four unacquainted observers independently rated participants' behaviors from video recordings. In line with previous work, informant reports of PD traits demonstrate strong convergent validity with relevant self-reported Big Five traits (as identified by Lynam & Widiger, 2001). Directly observed behavior is meaningfully associated with acquaintances' judgments and self-reports of PD-relevant traits, and the associations between these judgments and behavior are strongest for traits associated with histrionic and schizoid PD. Vector correlations between behavioral profiles associated with informant and self-reports show that both assessments have similar behavioral correlates. Associations between PD trait ratings and behavior appeared to differ as a function of gender, with males showing more and stronger correlations. Informants' ratings of PD traits are impressively accurate, converging both with self-reports of relevant traits and directly observed interpersonal behavior. Therefore, a comprehensive understanding of PDs and associated traits can be augmented by information from multiple acquaintances who have the
Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C
Background Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students’ use of personal smartphones for clinical work. Objective The intent of the study was to examine final-year medical students’ experience with and attitudes toward using per...
Full Text Available It’s fair to say that all human life is based on communication; passive and active, verbal and nonverbal. No matter which media type you consider, the importance of the so-called first impression cannot be overstated. Currently, as the world becomes more open and accessible, the individual character of the way we create our look takes a different form, but still remains an important messenger. In my thesis, I would like to present the outfit as a carrier of vital information about people. In parallel, I will analyze the clothing itself, researching both historic and contemporary sources. Finally, I attempt to decipher the language of fashion.
Tonheim, Aleksander Nygård; Babic, Ankica
This paper presents a prototype of a mobile application for patient self-management within the field of Multiple Sclerosis (MS). Five study subjects provided information needs by suggesting functionalities and evaluating three existing MS applications. Prominent functionalities were to collect data about symptoms, physical activities, mood and goals in a form of a mobile diary. Collected data would be visually presented in a graph to support self-management and motivation. A low-fidelity prototype relies in first hand on four selected modules, two Diary modules, one Visualisation module and a Physical activity module. A high-fidelity prototype is being implemented and will be further evaluated by the experts.
Consumer concerns over the safety of their personal information and the violation of their privacy rights are described as being the single overwhelming barrier to rapid growth of e- commerce. This paper explores the problems for e-commerce users when there is collection, use, and disclosure of personal information that are based on implied consent in e- commerce transactions. It questions the assumption that consent is sufficient to waive privacy interests in relation to e-commerce transacti...
Khodambashi, Soudabeh; Haugland, Dagrun; Ellingsberg, Anette; Kottum, Hanne; Sund, Janne Kutschera; Nytrø, Øystein
Providing patients with specific information about their own drugs can reduce unintentional misuse and improve compliance. Searching for information is time-consuming when information is not personalized and is written using medical vocabulary that is difficult for patients to understand. In this study we explored patient information needs regarding visualizing of drug information and interrelationships by conducting a total of four co-design workshops with patients, other users and pharmacists. We developed a prototype and drug ontology to support reasoning about drug interactions. We evaluated individual performance in finding information, understanding the drug interactions, and learning from the provided information in the prototype compared to using patient information leaflets (PILs). We concluded that interactive visualization of drug information helps individuals find information about drugs, their side effects and interactions more quickly and correctly compared to using PILs. Our study is limited to co-morbid patients with transient ischaemic attack with several chronic diseases.
Full Text Available In this paper, we propose a design for a personalized medication management system model MyMediMan that provides medication information for different stakeholders. The focus of the paper is on the system’s features and personalized information provided for the consumers as primary users of the proposed solution. The presented design introduces the consumers to different aspects of the medications they take and their overall health condition. The personalized information should increase the consumers’ awareness about the positive benefits of taking the medications as well as the consequences that particular medication can have on their health condition. By obtaining this information, the consumers will be aware of various medications’ characteristics and different ways to improve their health, and thus be more actively involved in their healthcare.
Stegwee, R.A.; Spil, Antonius A.M.
Information technologies of the past two decades have created significant fundamental changes in the delivery of healthcare services by healthcare provider organizations. Many healthcare organizations have been in search of ways and strategies to keep up with continuously emerging information
Scanff, P.; Crescini, D.; Vial, E.
The SISERI information system was developed and brought into use in order to meet a workplace health objective aimed at reducing and controlling exposure of workers to ionising radiation in France. Dosimetric monitoring of workers in France annually concerns 280.000 people who are exposed to ionising radiation as part of their work. This system centralizes, verifies and preserves all dosimetric data relating to each worker in accordance with the confidentiality required by the personal nature of this information. The SISERI data are made available to occupational doctors and experts in radiation protection to assist them in monitoring exposure of workers. The data are also intended for statistical processing with the aim of optimizing radiation protection for workers. They may also be used for epidemiological studies. The system has been gradually developed since it came into service in February 2005 and is now operating normally so that it is possible to guarantee that all doses received by each worker, anywhere on French territory, are recorded. If this system can be extended outside French borders it will be easier to monitor workers who have to travel to different European countries. The slides of the presentation have been added at the end of the paper. (authors)
Lemire, Marc; Paré, Guy; Sicotte, Claude; Harvey, Charmian
To understand the personal, social and cultural factors likely to explain recourse to the Internet as a preferred source of personal health information. A cross-sectional survey was conducted among a population of 2923 Internet users visiting a firmly established website that offers information on personal health. Multiple regression analysis was performed to identify the determinants of site use. The analysis template comprised four classes of determinants likely to explain Internet use: beliefs, intentions, user satisfaction and socio-demographic characteristics. Seven-point Likert scales were used. An analysis of the psychometric qualities of the variables provided compelling evidence of the construct's validity and reliability. A confirmatory factor analysis confirmed the correspondence with the factors predicted by the theoretical model. The regression analysis explained 35% of the variance in Internet use. Use was directly associated with five factors: perceived usefulness, importance given to written media in searches for health information, concern for personal health, importance given to the opinions of physicians and other health professionals, and the trust placed in the information available on the site itself. This study confirms the importance of the credibility of information on the frequency of Internet use as a preferred source of information on personal health. It also shows the potentially influential role of the Internet in the development of personal knowledge of health issues.
Abdulhamid, Shafii Muhammad; Usman, Gana
The use of information and communication technology in our day to day activities is now unavoidable. In tourism developments, destination information and management systems are used to guide visitors and provide information to both visitors and management of the tour sites. In this paper, information and navigation system was designed for tourists, taking some Niger state of Nigeria tourism destinations into account. The information management system was designed using Java Applet (NetBeans I...
Full Text Available This article explores the factors that contribute to the children living in Zama Zama informal settlement�s spiritual development. Postfoundational practical theology and the narrative approach function as paradigm and methodology. Themes and/or discourses like power, poverty, nutrition, health and school enrolment were identified. The faith development theory is discussed, as well as a reflection on children�s spirituality. The research shows that the faith community, cr�che and other partners play a crucial role in the spiritual development of the children.Intradisciplinary and/or interdisciplinary implications: This study was performed in the field of practical theology. The article is interdisciplinary, covering the fields of religion, psychology, social work, sociology and health studies.
Anisenkov, A; The ATLAS collaboration; Klimentov, A; Oleynik, D; Petrosyan, A
In this paper we describe ATLAS Grid Information System (AGIS), the system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing applications and services.
Anisenkov, A; Di Girolamo, A; Klimentov, A; Oleynik, D; Petrosyan, A
In this paper we describe ATLAS Grid Information System (AGIS), the system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing applications and services.
Indian National Oceanographic Data Centre (INODC) is engaged in developing a marine biological data and information management system (BIODIMS). This system will contain the information on zooplankton in the water column, zoobenthic biomass...
Hughes, Dureen Jean
Current models for understanding both Multiple Personality Disorder and human mentation in general are both linear in nature and self-perpetuating insofar as most research in this area has been informed and shaped by extant psychological concepts, paradigms and methods. The research for this dissertation made use of anthropological concepts and methods in an attempt to gain a richer understanding of both multiple personality and fundamental universal processes of the mind. Intensive fieldwork using in-depth, open-ended interviewing techniques was conducted with people diagnosed with Multiple Personality Disorder with the purpose of mapping their personality systems in order to discover the nature of the relationships between the various alternate personalities and subsystems comprising the overall personality systems. These data were then analyzed in terms of dynamical systems theory ("Chaos Theory") as a way of understanding various phenomena of multiple personality disorder as well as the overall structure of each system. It was found that the application of the formal characteristics of nonlinear models and equations to multiple personality systems provided a number of new perspectives on mental phenomena. The underlying organizational structure of multiple personality systems can be understood as a phenomenon of spontaneous self-organization in far-from -equilibrium states which characterizes dissipative structures. Chaos Theory allows the perspective that the nature of the process of the self and the nature of relationship are one and the same, and that both can be conceived as ideas in struggle at a fractal boundary. Further, such application makes it possible to postulate an iterative process which would have as one of its consequences the formation of a processural self who is conscious of self as separate self. Finally, given that the iterative application of a few simple rules (or instructions) can result in complex systems, an attempt was made to discern
Moon, Chankook; Yoo, Keunbae; Lee, Jinkie; Park, Jaemoon
Information management system(IMS) is under development by Korea Electric Power COrporation(KEPCO) joined with KOrea Power Engineering Company(KOPEC) since early 1993 in accordance with Korean Next Generation Reactor(KNGR) project schedule, which is divided into three phases: Phase I(1993-1994), Phase II(1995-Feb.1998), Phase III(1998-2001). Necessity of creating IMS comes from two main purposes: one is from client requirement as described on Electric Power Research Institute(EPRI) Utility Requirement Document(URD) top-tier, the other is from supplier's need to improve productivity whatever it is motivated by management or working group. To satisfy both consumer's and producer's requirements we have set up goals of IMS, to provide configuration management based on network and reliable integrated data base through KNGR's life cycle: i.e.,chronologically, siting, designing, construction, operation and maintenance, and decommissioning. This paper will show what we have done to make the concept during Phase I, and what is a current problem and what will be done through Phase II and III
Moon, Chankook; Yoo, Keunbae; Lee, Jinkie [Korea Electric Power Corporation, Seoul (Korea, Republic of); Park, Jaemoon [Korea Power Engineering Co., Inc., Daejeon (Korea, Republic of)
Information management system(IMS) is under development by Korea Electric Power COrporation(KEPCO) joined with KOrea Power Engineering Company(KOPEC) since early 1993 in accordance with Korean Next Generation Reactor(KNGR) project schedule, which is divided into three phases: Phase I(1993-1994), Phase II(1995-Feb.1998), Phase III(1998-2001). Necessity of creating IMS comes from two main purposes: one is from client requirement as described on Electric Power Research Institute(EPRI) Utility Requirement Document(URD) top-tier, the other is from supplier's need to improve productivity whatever it is motivated by management or working group. To satisfy both consumer's and producer's requirements we have set up goals of IMS, to provide configuration management based on network and reliable integrated data base through KNGR's life cycle: i.e.,chronologically, siting, designing, construction, operation and maintenance, and decommissioning. This paper will show what we have done to make the concept during Phase I, and what is a current problem and what will be done through Phase II and III.
Vdovják, R.; Frasincar, F.; Houben, G.J.P.M.; Barna, P.
The success of the World Wide Web has caused the concept of information system to change. Web Information Systems (WIS) use from the Web its paradigm and technologies in order to retrieve information from sources on the Web, and to present the information in terms of a Web or hypermedia
Bandelow, Borwin; Schmahl, Christian; Falkai, Peter; Wedekind, Dirk
The neurobiology of borderline personality disorder (BPD) remains unclear. Dysfunctions of several neurobiological systems, including serotoninergic, dopaminergic, and other neurotransmitter systems, have been discussed. Here we present a theory that alterations in the sensitivity of opioid receptors or the availability of endogenous opioids…
Soares, Filipe de Sá; Soares, Delfina de Sá; Arnaud, José
Information systems outsourcing risks are a vital component in the decision and management process associated to the provision of information systems and technology services by a provider to a customer. Although there is a rich literature on information systems outsourcing risks, the accumulated knowledge on this area is fragmented. In view of this situation, an argument is put forward on the usefulness of having a theory that integrates the various constructs related to information systems o...
Systems of systems are coalitions of autonomous and heterogeneous systems that collaborate to achieve a common goal. The component systems of a system of systems often belong to different security domains, which are governed by different authorities (hereafter called parties). Furthermore, systems
Inui, Daisuke; Nakashima, Sadao
Radiation workers working in radiation controlled area in nuclear power plants etc., are required to carry a dosimeters by regulation law. The workers are controlled daily on personal exposure dose by reading out the exposure dose information of the dosimeters with an area access control gate installed at the entrance of the radiation controlled area. This type of personal dose monitoring system has a problem that each worker can get his personal dose data only at the entrance of the radiation controlled area several times a day. We developed a system to get the real-time acquisition of personal dose data especially for workers working in a high dose area. This system is generally composed of a dosimeter with a wireless attachment, relay station, and monitor. Some relay stations set in main work places in the radiation controlled area can collect real-time personal dose data of each dosimeter carried by workers at the work place with the relay stations, and transmit it to the monitor to get personal dose data of individual workers. A wireless communication system between dosimeters and relay stations is applied to collect efficiently all personal dose data in the work place. (author)
Western Nevada Regional Education Center, Lovelock.
The necessary handbooks for use of the Student Information System (SIS), developed and tested by the Western Nevada Regional Education Center under a 1968-71 Title III (Elementary and Secondary Education Act) grant, are presented in this volume. As noted, the purpose of the SIS is to supply data and information to persons or organizations who make…
Abdelhamid, Mohamed; Gaia, Joana; Sanders, G Lawrence
Health care providers are driven by greater participation and systemic cost savings irrespective of benefits to individual patients derived from sharing Personal Health Information (PHI). Protecting PHI is a critical issue in the sharing of health care information systems; yet, there is very little literature examining the topic of sharing PHI electronically. A good overview of the regulatory, privacy, and societal barriers to sharing PHI can be found in the 2009 Health Information Technology for Economic and Clinical Health Act. This study investigated the factors that influence individuals' intentions to share their PHI electronically with health care providers, creating an understanding of how we can represent a patient's interests more accurately in sharing settings, instead of treating patients like predetermined subjects. Unlike privacy concern and trust, patient activation is a stable trait that is not subject to change in the short term and, thus, is a useful factor in predicting sharing behavior. We apply the extended privacy model in the health information sharing context and adapt this model to include patient activation and issue involvement to predict individuals' intentions. This was a survey-based study with 1600+ participants using the Health Information National Trends Survey (HINTS) data to validate a model through various statistical techniques. The research method included an assessment of both the measurement and structural models with post hoc analysis. We find that privacy concern has the most influence on individuals' intentions to share. Patient activation, issue involvement, and patient-physician relationship are significant predictors of sharing intention. We contribute to theory by introducing patient activation and issue involvement as proxies for personal interest factors in the health care context. Overall, this study found that although patients are open to sharing their PHI, they still have concerns over the privacy of their PHI
Trapeznikov, E. V.
Currently, the threat of various attacks increases significantly as automated systems become more widespread. On the basis of the conducted analysis the information protection level assessment system establishing objective was identified. The paper presents the information protection level assessment software implementation in the information system by applying the programming language C #. In conclusions the software features are identified and experimental results are represented.
... compounded by the increasingly international nature of information systems, this responsibility still rests with managers only. This paper looks at security concerns related to information systems, identifies the threats and suggests how the security of information systems should be handled. African Journal of Finance and ...
Full Text Available Efficient information systems when using fewer resources or minimal in achieving organizational goals are expected. Effective information system capable of completing the organizations objectives. Audit information systems necessary to know the needs of users whether it is in line with the preparation of the decision-making process
Koesuma, Sorja; Riantana, Rio; Siswanto, Budi; Aji Purnomo, Fendi; Lelono, Sarjoko
There are three timing of disaster mitigation which is pre-disaster, emergency response and post-disaster. All of those is important in disaster mitigation, but emergency response is important when we are talking about time. Emergency response has limited time when we should give help. Rapid assessment of kind of logistic, the number of survivors, number children and old people, their gender and also for difable person. It should be done in emergency response time. Therefore we make a mobile application for logistics management system. The name of application is dLOGIS, i.e. Disaster Logistics Information System. The application is based on Android system for mobile phone. Otherwise there is also website version. The website version is for maintenance, data input and registration. So the people or government can use it directly when there is a disaster. After login in dLOGIS, there is five main menus. The first main menu shows disaster information, refugees conditions, logistics needed, available logistics stock and already accepted logistics. In the second menu is used for entering survivors data. The field coordinator can enter survivors data based on the rapid assessment in disaster location. The third menu is used for entering kind of logistic. Number and kind of logistics are based on the BNPB needed standard for the survivor. The fourth menu displays the logistics stock available in field coordinator. And the last menu displays the logistics help that already accepted and sent by donation. By using this application when a disaster happened, field coordinator or local government can use maintenance distribution of logistics base on their needs. Also for donor people who will give help to survivor, they can give logistics with the corresponding of survivor needs.
Glass Badge using silver activated phosphate glass dosemeter was specially developed for large scale personal monitoring. And dosimetry systems such as an automatic leader and a dose equipment calculation algorithm were developed at once to achieve reasonable personal monitoring. In large scale personal monitoring, both of precision for dosimetry and confidence for lot of personal data handling become very important. The silver activated phosphate glass dosemeter has basically excellent characteristics for dosimetry such as homogeneous and stable sensitivity, negligible fading and so on. Glass Badge was designed to measure 10 keV - 10 MeV range of photon. 300 keV - 3 MeV range of beta, and 0.025 eV - 15 MeV range of neutron by included SSNTD. And developed Glass Badge dosimetry system has not only these basic characteristics but also lot of features to keep good precision for dosimetry and data handling. In this presentation, features of Glass Badge dosimetry systems and examples for practical personal monitoring systems will be presented. (Author)
Zhang Zhiyong; Cheng Chang; Yang Huating; Liu Zhengshan; Deng Changming; Li Mei
This paper mainly describes a real-time personal dose monitoring and management system. The system is composed of three parts that include SDM-98 semiconductor detector personal dosimeters, Data Readers and a Management System Software. It can be used for personal dose monitoring and management and other controlling actions in a radioactive controlled area. Adopting semiconductor detector and microcontroller, SDM-98 Personal Dosimeter is used to measure personal accumulated dose equivalent and dose rate caused by X-ray and Gamma ray. The results can be read directly on LCD. All the data stored in dosimeter can be transmitted into a data reader by infrared optical link. The alarm threshold can be adjusted successively in whole range of dose or dose rate. The Data Reader is an intelligent interface between the dosimeter and master computer. The data received from dosimeter will be sent to a master computer through RS-232 serial interface. According to the master computer's order, the Data Reader can turn on the dosimeter's power at entrance and shutdown it at exit. The Management System Software which written by Visual BASIC 5.0 runs on MS Win95. All the measuring data from dosimeters can be analyzed and treated according to requirements and stored in database. Therefore, some figures and tables relative to dose or rate can be shown on screen or printed out. (author)
Irina Mikhaylovna Nekipelova
Full Text Available The paper is devoted to research of the language system as an information system. The language is not the information itself. It contains information minimum and has information restrictions. Under the information should be understood texts and speech, created by using a language. Modern forms of existence of living natural language are distributed databases with multiple accesses, because bearers of language constantly and concurrently use it. Language and speech always exchange information, creating a unified information environment, where a human is. At any stage of information exchange the change of self-descriptiveness takes place one way or the other. When a human try to reflect world around him, some part of reflected information is lost due to conversion into language and saving into it in formalized form. These processes of storing information are related to the fact that in the production and perception of the statements optimization mechanisms of human thinking are made. When we perceive information its preservation can happen without information loss and with the loss of information.
Manzano de Armas, Jose; Diaz Bernal, Efren; Capote Ferrera, Eduardo; Molina Perez, Daniel; Lopez Bejerano, Gladys
The storage and control of the data of a service of personal dosimetry is a task that requires specify care in data handling and manipulation. This activity becomes more annoying of making manually when the volume of users of the service is significant. The External Dosimetric Laboratory of the Center for Radiation Protection and Hygiene has developed a system of administration of data that allows the storage, control and analysis of the data generated by the Service of Personal Dosimetry in an efficient and reliable way. This paper describes the characteristics of the System for Administration of Data in Personal Dosimetry 'Dosis', as well as their design and programming. The importance of this System for the laboratory and the advantages of their application are described. The characteristics of the different modules are also described. (author)
Durao, Frederico; Dolog, Peter
-based recommender system which suggests similar Web pages based on the similarity of their tags from a Web 2.0 tagging application. The proposed approach extends the basic similarity calculus with external factors such as tag popularity, tag representativeness and the affinity between user and tag. In order...... to study and evaluate the recommender system, we have conducted an experiment involving 38 people from 12 countries using data from Del.icio.us , a social bookmarking web system on which users can share their personal bookmarks......Tagging activity has been recently identified as a potential source of knowledge about personal interests, preferences, goals, and other attributes known from user models. Tags themselves can be therefore used for finding personalized recommendations of items. In this paper, we present a tag...
Man must dream to achieve progress. That this applies to the complex task of making scientific information easily and rapidly available to scientists was the clear message of rapporteurs summing up an Agency symposium held in Vienna during February on the handling of nuclear information. It was attended by more than 150 specialists in the work. (author)
Man must dream to achieve progress. That this applies to the complex task of making scientific information easily and rapidly available to scientists was the clear message of rapporteurs summing up an Agency symposium held in Vienna during February on the handling of nuclear information. It was attended by more than 150 specialists in the work. (author)