scholarly journals System Potential Estimation with Regard to Digitalization: Main Ideas and Estimation Example

Information ◽  
2020 ◽  
Vol 11 (3) ◽  
pp. 164 ◽  
Author(s):  
Alexander Geyda ◽  
Igor Lysenko

The article outlines the main concept and examples of mathematical models needed to estimate system potential and digitalization performance indicators. Such an estimation differs in that it is performed with predictive mathematical models. The purpose of such an estimation is to enable a set of problems of system design and functional design of information technologies to be solved as mathematical problems, predictively and analytically. The hypothesis of the research is that the quality of system functioning in changing conditions can be evaluated analytically, based on predictive mathematical models. We suggested a property of the system potential (or system capability) that describes the effects of the compliance of changing system functioning with changing conditions analytically and predictively. Thus, it describes the performance of the use of information operations to realize functioning in changing conditions. The example includes system’s environment graph-theoretic models and system’s models regarding IT use to react to changing environments. As a result of the suggested models and methods, the quantitative estimation of system potential regarding information technology use becomes possible depending on the parameters and variables of the problems to be solved. Use cases of problems decision with the use of such indicators include choosing optimal information technology implementation and the synthesis of information operation characteristics.

BMC Nursing ◽  
2021 ◽  
Vol 20 (1) ◽  
Author(s):  
Vicki Koltsida ◽  
Lise-Lotte Jonasson

Abstract Background The work of registered nurses in home health care is complicated and extensive, and information technology (IT) is used in everyday activities. Coordination between care and resource efficiency is important. There is a wealth of information that supports the notion of sustainable development, but what sustainable development means from the perspective of the registered nurse in home health care when using IT is limited. The term “sustainable development” is not clearly defined and is poorly researched in nursing. Sustainable development in this study includes the ecological, economic, social, technical and ethical dimensions. The aim of this study was to describe registered nurses’ experience of IT use in home health care through a sustainable development model. Methods This study was conducted using ten semi-structured lifeworld interviews with registered nurses. The method employed was a qualitative content analysis with a deductive approach. The deductive approach consisted of a model of sustainable development. Results Analysis of the interviews and the model of sustainable development provided categories: using IT from an ecological dimension, the registered nurses experienced reduced consumption and damage to the environment; using IT in the economical dimension, saving of time and resources was experienced; the use of IT affected social aspects such as the work environment and patient safety, and positive consequences, such as accessibility, were also mentioned; using IT from a technical dimension was characterized by the nurse’s attitude towards it – the registered nurses felt it improved the quality of care and gave users an overview of the organization; and from an ethical dimension, the registered nurses expressed the need for IT to be adaptable to the patient’s well-being and indicated that more awareness of risks in the care meeting may be needed. Conclusion The findings are discussed based on the synergies and conflicts that arise between the different dimensions of sustainable development. IT intertwines and overlaps with, and within, the environment, economy, society, technology and ethics. Registered nurses in home health care want to conduct good and safe care, while using IT could benefit patients.


Author(s):  
Kirils Dubinins ◽  
Kristīne Mārtinsone

Provision of remote services became relevant all over the world, during the 2020 COVID-19 pandemic. Latvian supervisors were also forced to transfer their practice to the digital space as well. COVID-19 pandemic challenges opened a wider range of opportunities for improvement remote practice. Pandemic also highlighted the risks associated with lack of relevant competences. At the global level over the last decade, risks associated with remote counselling summarized in guidelines, providing professionals with examples of best practice. In Latvia, on other hand, such guidelines have not adopted yet.This study developed with the aim to find out the awareness of Latvian supervisors about the risks (cyber security) of using information technology and the protection of personal data in the conditions created by the COVID-19 pandemic.To find out how Latvian supervisors are aware about the risks of using information technology (cyber security) and personal data protection, a survey conducted among Latvian supervisors and organizing an expert panel discussion, scientific strength of the study ensured by data triangulation.The obtained results allowed to conclude that the COVID-19 pandemic highlighted the need for supervision remote practice, at the same time the research data show that the awareness of Latvian supervisors about the risks of information technology use (cyber security) and personal data protection is medium to low.The results of the research show that in the education of Latvian supervisors it is necessary to allocate place for the acquisition of information technology (cyber security) risk and personal data protection regulation.This research emphasizes the importance of several supervisors’ competences such as digital knowledge and personal data protection, however further research is needed to find the most effective methods how to improve these competences.  


2000 ◽  
Vol 1719 (1) ◽  
pp. 94-102 ◽  
Author(s):  
Krishnan Viswanathan ◽  
Konstadinos G. Goulias ◽  
Paul P. Jovanis

Recent developments in information technologies, providing new ways to disseminate and use information, may help alleviate congestion, reduce user cost and time, and enhance safety. This influence of technology use, however, is mediated by telecommunication and information technology ownership and use. A multivariate probit model specification is used to determine how these parameters influence traveler decision making when one is confronted with information about traffic problems before making a trip to work or school, en route to or from work or school, and before making a trip from work or school. Addressed is the key relationship between telecommunication and information technology ownership and use with travel decisions when information about traffic problems is available. Data from the Puget Sound region for 1997 are used in the analysis. The results suggest technology ownership and use influence travel decision making in different ways for each stage of travel—before leaving home, en route, and returning home.


Author(s):  
Huub J.M. Ruel

Office technology projects are not a “quick and easy fix”. They often fail to meet their objectives. This is probably due to a lack of attention for the non-technical element in office technology projects. To develop this non-technical side, in this chapter we introduce the concepts of spirit and appropriation, adopted from Adaptive Structuration Theory (AST). Spirit concerns the intention of a certain technology. Advanced information technology use must be considered as a matter of appropriation. In theory, office technology carries a certain spirit, which should guide users, but this spirit can only be materialized when users work with, or appropriate, the technology. A precondition is that users have to have a clear image of this spirit. In this chapter, we report about the results of a study that show that if users of office technology find the spirit of the technology clear, they incorporate the technology better in their day-to-day tasks. Based upon these results we come up with a number of recommendations for office technology implementation and use.


2005 ◽  
Vol 48 (1) ◽  
pp. 105-133 ◽  
Author(s):  
Hiroshi Ono ◽  
Madeline ZavodnY

This study examines whether there are differences in men's and women's use of computers and the Internet in the United States and Japan and, if so, how this gender gap has changed over time. We focus on these two countries because information technology is widely used in both, but there are substantial differences in institutions and social organizations. We use microdata from several surveys during 1997–2001 to examine differences and trends in computer and Internet usage in the two countries. Controlling for socioeconomic characteristics, our results indicate that there were significant gender differences in computer and Internet usage in both countries during the mid-1990s. By 2001 these gender differences had disappeared or were even reversed in the United States but persisted in Japan. People not currently working have lower levels of information technology (IT) use and skills in both countries regardless of gender, but working women in Japan have lower levels of IT use and skills than working men, a difference that generally does not occur in the United States. This suggests that employment status per se does not play a large role in the gender gap in Japan, but type of employment does. The prevalence of nonstandard employment among female workers in Japan can explain much of the gender gap in information technology use and skills in that country.


Author(s):  
Kamil Yağcı ◽  
Süreyya Akçay ◽  
Mahmut Efendi ◽  
Hande Mutlu Öztürk

With the increase in information technology use, problems related to the security of these technologies have become significant. Businesses are required to acquire information, use information technologies, and rely on the information they collected to continue their presence. The requirement of information technology use and related security problems cannot be ignored by both individuals and businesses. One of the industries with large data pools is the tourism industry. Thus, the protection of personal or corporate information is a process that should be managed especially for businesses. In order for this management process to be successful, it is necessary for the corporations to have security policies that are supported by the senior management, possible to implement and understand, and accepted at all corporate levels. Thus, the present study aimed to explain the significance of information security, especially the security of the information in the tourism industry, which is as an important part of the service industry.


2018 ◽  
Vol 7 (8) ◽  
pp. 124 ◽  
Author(s):  
Farida Veerankutty ◽  
Thurasamy Ramayah ◽  
Noor Ali

The concept of Industry 4.0 has considerably altered the way organisations operate and has impacted every aspect of life. Furthermore, the fast-growing trend of information technology (IT) transformation in organisations and huge IT investment by Malaysian government have triggered the significance of IT risk and its related controls. Besides, technology-enabled auditing and IT-oriented audit procedures have become crucial when performing audit tasks in an electronic environment. Although many initiatives are being implemented to improve technology usage, audit technology use among auditors is still low and auditors are not attaining sufficient progress in the use of technology. This implies the current strategies and policies may not effectively support technology implementation. In the same vein, the under-utilisation of technologies was reported due to inadequate governance. Thus, this study intends to investigate the impact of IT governance on audit technology performance. IT governance is a mechanism to stimulate anticipated behavior in the use of technology among the employees of an organisation. Surveys using closed-ended questionnaires were distributed to approximately 309 Malaysia public sector auditors. The results show that IT governance mechanisms such as IT strategy and management support significantly influence the audit technology performance. IT governance does play a significant role in assuring the successful utilisation of audit technology.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Henri Pirkkalainen ◽  
Monideepa Tarafdar ◽  
Markus Salo ◽  
Markus Makkonen

PurposeExcessive use of work-related information technology (IT) devices can lead to major performance and well-being concerns for organizations. Extant research has provided evidence of the incidence of such problematic IT use in organizations. We extend the understanding of problematic IT use by examining its individual (proximal) and organizational (distal) antecedents.Design/methodology/approachDrawing from the self-worth theory and the concept of fear of being left behind, we address proximal antecedents that lead to problematic IT use. Drawing from the concept of autonomy paradox, we address distal antecedents of problematic IT use through a positive association with the two proximal antecedents. We report the results of a field study involving 846 individuals who use IT for work. Structural equation modeling was employed to analyze the data.FindingsThe results indicate that the proximal antecedents (IT insecurity and fear of missing out) are positively associated with problematic IT use. The distal antecedents (IT use autonomy and involvement facilitation) are positively associated with the proximal antecedents except for the relationship between IT use autonomy and IT insecurity, which was found statistically non-significant. Furthermore, fear of missing out fully mediates the effect of IT use autonomy on problematic IT use, whereas IT insecurity and fear of missing out fully mediate the effects of involvement facilitation on problematic IT use.Originality/valueThe paper theoretically extends the understanding of problematic IT use and identifies novel its proximal and distal antecedents.


2021 ◽  
Vol 42 (II) ◽  
pp. 76-83
Author(s):  
R. RUDYI ◽  
◽  
Iu KYSELOV ◽  
Ia. KOROBEINIKOVA ◽  
V. KYRYLIUK ◽  
...  

The purpose of research. The current state of the tourism industry is characterized by growing demand for tourism services by using GIS technologies and increasing attraction for tourism. Specialists in this field are increasingly using geographic information technology to solve various problems of tourism. This article represents studies and possibilities of comprehensive information technology use in the field of tourism, such as, using of the avalanche pass for a tourist attraction. The information obtained from GIS technologies may have been used not only for travel agencies, but also to be useful for forestry workers but also (because it is an avalanche), should be taken by correspondent rescue services in the winter. Therefore, these studies currently remain relevant for scientific and practical issues. The goal of the work. Show how GIS technology performs the functions of spatial analysis and specific user tasks, such as, data processing, mapping, visualization of tourist routes and areas, etc. Thus, the most common usage of geographic information technologies for the formation of databases and filling mapping atributes about the tourist object and infrastructure of the tourist destination. Improving the informativeness is achieved by visualizing the various characteristics of the object, that is showing the avalanche area, avalanche path and power, which led to the destruction of the forest, and futher on. Method. A tourist route passing through the village of Chernyk, Nadvirna district, Ivano-Frankivsk region, north of Mount Polensky (Polenskaya) was used for this study. The research in this article is based on the use of the extremely destructive snow avalanche that came down from Polensky Mountain in the Ukrainian Carpathians on March 24, 2006 and led to destruction in a large part of the forest in the Gorgany Nature Reserve. Geoinformation modeling methods were used on the territory of the avalanche slope from Polensky Mountain. Results. A digital terrain model of the study area was created. Geotourism route was developed within Gorgan, also some additional studies were performed related to detailed mapping and surface modeling in terms of route safety. Experimental studies were performed based on materials (DEM) provided by the Research Institute, Geodesy and Cartography , also the SURFAR software package was used. On its way, the avalanche destroys not only a large amount of forest (lumber), but also young trees. By cutting and capturing the soil and forest, the avalanche carries all this material (vegetation, top soil, rocks, debris)to the foot of the mountain and changing the terrain as well. According to our estimates, the forest losses caused by this avalanche were as follows: about 2,500 trees were destroyed, or 1,575 cubic meters of lamber. Different models were created for Mount Polenska, which are shown in the relevant figures. The obtained visual images that will be interesting for tourists and enhance the attractiveness of the object. Scientific novelty and practical value. The performed researches doesn’t have only descriptive nature, but also can be applied for the rescue service to protect of tourists on the route. The development of modern transport information systems and the creation of tourist maps and guides are another goals of this research. The creation and accurate mapping of tourist routes with the use of digital electronic maps is especially important, as the existing cartographic material is very inaccurate and the information is outdated. The use of geographic information technologies in tourism will also expand to solve specific engineering problems related to tourism. In addition, the images shown can serve as a warning of possible dangers. Conclusions. Thus, the use of geological objects in the tourism industry is promising, specially for mountainous and upland areas, which are very attractive for tourism. Because the formation of geotourism routes on the basis of correspondent and trusted geological data, and also involves a detailed study of geolocations, the route of the group, taking into account the safety aspects of travel. These tasks are efficiently implemented with the help of geographic information systems and technologies.


Sign in / Sign up

Export Citation Format

Share Document