scholarly journals Javaslat a terhesgondozás és perinatológiai ellátás egységes minőségkontrollját célzó, Europeristat-konform adatszolgáltatási rendszer bevezetésére Magyarországon

2016 ◽  
Vol 157 (18) ◽  
pp. 687-694
Author(s):  
Péter Berkő

It is a regrettable deficiency in the Hungarian healthcare that the culture and the system of quality control of cure have not been formed (except for a few subspecialties, units or wards). If hospital wards do not have a national, professionally unified and modern information system presenting the most important quantity and quality indicators of their medicinal activity annually, a stable basis for definition of future tasks is absent. The author puts forward a proposal for the establishment of the information systems for different professional fields. On the basis of experience of perinatological information system operating for over 3 decades in Borsod-Abaúj-Zemplén county, he also proposes introduction of a nationally unified, Europeristat-compatible information system following Tauffer-statistics which may serve as a uniform quality control of obstetrics and perinatological care, as well as introduction of its base, the dataform “TePERA” (Form of Obstetrics and Perinatological Care Risk). Orv. Hetil., 2016, 157(18), 687–694.

2017 ◽  
Vol 32 (3) ◽  
pp. 91-111
Author(s):  
Yair Wand ◽  
Ron Weber

ABSTRACT Controls must be changed when information systems are modified. Audit, assurance, and quality-control (AAQC) personnel must evaluate the reliability of controls in the new system versions. Based on Bunge (1977, 1979) and Wand and Weber (1989a, 1990), we describe a model and search-space algorithm that AAQC personnel can use to determine where required control changes are likely to be located in the new system version, thereby mitigating the need for an exhaustive evaluation of all controls. To use the model and algorithm, AAQC personnel must have (1) accurate and complete requirements specifications for the old and new versions of the system, (2) a controls specification for the old version that covers all errors and irregularities that might occur, (3) evidence to conclude all controls for the old version are in place, adequate, and working, and (4) specifications for the new version expressed as a level structure of systems and subsystems.


Author(s):  
Semir Ibrahimović ◽  
Nijaz Bajgoric

The IS availability is an essential requirement that business presents to its IT departments. Ibrahimovic (2016) concluded that, with a very low investment in “monitoring of the relevant components”, it is possible to achieve a significant improvement in IS availability. This chapter starts with a brief introduction of the IS availability. Authors provide a short definition of BBN modeling and address different aspects of IS monitoring, particularly: network monitoring, server monitoring, application, security and business process monitoring. As main artifact of this chapter authors proposed the monitoring. Since the framework emphases importance of governance and management layer, chapter contains overview of COBIT 5 and ITIL V3 from the IS monitoring aspect. In the final part of the chapter, authors address the challenges that a monitoring tool needs to address in modern information systems, especially but not limited to DevOps, Cloud and Hybrid IT architectures.


2015 ◽  
Vol 6 (2) ◽  
pp. 30-58 ◽  
Author(s):  
Pankaj Chaudhary ◽  
Micki Hyde ◽  
James A Rodger

Information Systems (IS) agility is a current topic of interest in the IS industry. The study follows up on work on the definition of the construct of IS agility and attributes for sensing and diagnosis in an agile IS. IS agility is defined as the ability of an IS to sense a change in real time; diagnose it in real time; and select and execute an action in real time. This paper explores the attributes for selecting and executing a response in an Agile Information System. A set of attributes were initially derived using the practitioner literature and then refined using interviews with practitioners. The attributes' importance and validity was established using a survey of the industry. All attributes derived in this study were deemed pertinent for selecting and executing a change in an agile information system. Dimensions underlying these attributes were identified using Exploratory Factor Analysis. This list of attributes can form the basis for assessing and establishing execution mechanisms to increase IS Agility.


2019 ◽  
Author(s):  
Jorge Revez

Objective - The CRIS (Current Research Information System) systems implemented in Portugal are discussed and the role that libraries have played in the development of these information systems is sought. Methodology - A qualitative methodology was adopted through the study of two cases, providing a point of view on the relationship between libraries and researchers in science and technology. Results - The increasingly significant presence of CRIS systems in Portugal stands out but with a timid participation of libraries in their implementation and development process. Discussion - The relevance of libraries in new information contexts, the definition of science management policies that consider the context and the various actors involved in the development of information systems and the effectiveness of national coordination structures that organize information of researchers in science and technology are discussed. Limitations - The data obtained are partial and of a secondary nature. Originality - An unprecedented point of view is provided on the relationship in Portugal between the scientific community and libraries as information and support services for the organization of science. Objetivo – Abordam-se os sistemas CRIS (Current Research Information System) implementados em Portugal e procura-se conhecer o papel que as bibliotecas têm desempenhado no desenvolvimento destes sistemas de informação. Metodologia – Foi adotada uma metodologia qualitativa, através do estudo de dois casos, fornecendo um ponto de vista sobre a relação entre as bibliotecas e os investigadores em ciência e tecnologia. Resultados – Destaca-se a presença cada vez mais significativa dos sistemas CRIS em Portugal mas uma participação tímida das bibliotecas no seu processo de implementação e desenvolvimento. Discussão – Problematiza-se a relevância das bibliotecas nos novos contextos informacionais, a definição de políticas de gestão da ciência que considerem o contexto e os diversos atores envolvidos no desenvolvimento de sistemas de informação e a eficácia das estruturas de coordenação nacional que organizam a informação relativa aos investigadores em ciência e tecnologia. Limitações – Os dados obtidos são parcelares e de natureza secundária. Originalidade – É fornecido um ponto de vista inédito sobre a relação existente em Portugal entre a comunidade científica e as bibliotecas enquanto serviços de informação e de suporte à organização da ciência.


Author(s):  
Allan Mori ◽  
Eduardo Figueiredo ◽  
Elder Cirilo

Software metrics provide basic means to quantify several quality aspects of information systems. However, the effectiveness of the measurement process is directly dependent on the definition of reliable thresholds. To define appropriate thresholds, we need to consider characteristics of the information systems, such as their size and domain. There are several studies to propose methods to derive thresholds and evaluate them. However, we still lack empirical knowledge about whether and how thresholds vary across different information system domains. To tackle this limitation, this paper investigates specific thresholds in four information system domains: accounting, e-commerce, health, and restaurant. Our study relies on 40 information systems to derive domain-specific thresholds for 9 well-known software metrics. Our results indicate that lower-bound thresholds (e.g., 15% smaller classes) usually do not significantly vary across domains. However, for all analyzed metrics, upper-bound thresholds (e.g., 5% largest classes) are different in some domains. Moreover, our study also suggests that domain-specific thresholds are more appropriated than generic ones. For instance, we observed in our analysis that the more appropriated threshold to select the 5% largest classes is 290 LOC in health systems and 147 LOC in accounting systems.


2021 ◽  
Vol 15 (1) ◽  
pp. 19-29
Author(s):  
Eugeni Isaev ◽  
Dmitry Pervukhin ◽  
Georgy Rytikov ◽  
Ekaterina Filyugina ◽  
Diana Hayrapetyan

The implementation of information systems is aimed at improving the financial performance of a company, creating a transparent reporting system and improving many other competitive factors. However, the acquisition of these benefits does not negate the complexity of making a decision whether or not to implement a particular IT project. The total cost of ownership of the information system throughout the life cycle is usually not considered in comparison with the expected benefits from the use of the system, due to the uncertainty of such benefits. Comparative certainty of approaches and methods is present only in terms of costs, both for a priori (planned) and a posteriori (actual) assessment. It is possible to determine both capital and operating costs accurately enough. Indirect definition of the positive influence of an information system on the activity of the organization also seems possible. However, there are currently no generally recognized methods for analyzing the expected positive effect of an IT project. At the same time, large companies, in accordance with the requirements of the respective regulators and / or due to internal management considerations, build a risk management system to determine the level of capabilities, losses and to prevent adverse events. This study considers the feasibility of an approach to analyze the effectiveness of the implementation of the information system on the basis of the company’s risk reduction, leading to a decrease in economic benefits. It takes into account the internal risks of the information system that occur during the installation of the system, its operation and the termination of work with the system.


2020 ◽  
Vol 220 ◽  
pp. 01017
Author(s):  
Anatoliy Ovodenko ◽  
Yan Ivakin ◽  
Elena Frolova ◽  
Maria Smirnova

In the context of the digital transformation of the economy, the effective development of corporate information systems of research and production holdings of aerospace instrumentation is becoming one of the decisive factors in ensuring the high quality of domestic avionics. This article is devoted to the analysis of the influence factor of digitalization and informatization processes in scienceintensive industries of modern aerospace instrumentation, as well as the definition of a qualimetric model for assessing its impact on the quality of domestic avionics products in the current economic and technological conditions. The influence of the level of development of corporate information systems of aerospace instrumentation enterprises on the quality of domestic avionics products is assessed in the article on the basis of the corresponding hierarchy of quality indicators. The proposed model of the influence of the level of development of corporate information systems on the quality of aerospace instrumentation products assumes the choice of the form of the integral criterion depending on the external requirements for the efficiency of the assessment, the sensitivity of the system of quality indicators.


2019 ◽  
Vol 6 (2) ◽  
pp. 150-158
Author(s):  
Angelika Pechyonkina ◽  
Valentin Selifanov

It’s impossible to imagine a modern information system without virtualized components – servers, remote workstations (VDI), network equipment. The competent approach is necessary to protect these environments. If information system of a company processes information that is subjected to mandatory protection in accordance with requirements of Russian legislation (for example, personal data or information processed in state information systems), then only certified security devices that have passed the procedure of compliance assessment by regulators – the Federal Security Service of Russia and the FSTEC of Russia. The use of these protection means will ensure the required level of information security.


Author(s):  
V.M. Dzhulij ◽  
V.A. Boychuk ◽  
V.Y. Titova ◽  
O.V. Selyukov ◽  
O.V. Miroshnichenko

The article proposes an approach to the development of protection methods against threatening programs in modern information systems, which consists in the development of security methods based on the implementation of access control to files by their types, which can be identified by file extensions that significantly exceed the known methods of antivirus protection, such as on the effectiveness of protection, as well as the impact on the load of computing resources of the information system. It is shown that the most important for protection are executable binary and script files, and that these classes of malware require mandatory storage of the threatening file on the hard disk before its execution (read). This led to the conclusion that protection against threatening programs can be built by implementing control (delineation) of access to files. A general approach to the implementation of protection against threatening programs is proposed, based on the implementation of control of access to files by their types, which can be identified by file extensions. The possibility of using such an approach is substantiated by a study of remedies. Methods of protection against threatening programs allow to protect the information system, both from loading, and from execution of binary and scripted threat files, differing in the possibility of taking into account the location of executable files, the possibility of administration with a working security system, the ability to control the modification of access objects, renaming access features, the ability to protect against scripted threat programs, including the ability to give threatening properties to interpreters (virtual x machines). Models of access control have been developed, which allowed the built-in access matrices to formulate requirements for building a secure system, the implementation of which prevents the leakage of given access rights of subjects to objects.


2018 ◽  
pp. 231-235
Author(s):  
Kateryna Kompanets

The article deals with the types of modern information systems. It proves their application in the activities of enterprises. The basic definitions of the concept of a marketing information system are presented. Its role in the enterprise management is established. The realities, which influence the development of services enterprises in the conditions of European integration of the country's economy, are explored.


Sign in / Sign up

Export Citation Format

Share Document