Computerized Information Systems in Personnel—A Comparative Analysis of the State of the Art in Government and Business

1974 ◽  
Vol 17 (1) ◽  
pp. 168-172 ◽  
Author(s):  
Edward A. Tomeski ◽  
Harold Lazarus
i-com ◽  
2017 ◽  
Vol 16 (2) ◽  
pp. 181-193 ◽  
Author(s):  
Christian Reuter ◽  
Katja Pätsch ◽  
Elena Runft

AbstractThe Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.


2011 ◽  
pp. 240-270 ◽  
Author(s):  
Allen S. Lee

A conventional “trends” chapter on qualitative research in information systems (IS) would review the state of the art (the methods and findings) of such research, laud its achievements, criticize its shortcomings, and then specify what it should do in the future to add to its achievements and rectify its shortcomings. However, I will write this chapter unconventionally instead, so that the reader will be able to gain a sense of my own engagement with issues in qualitative IS research. Furthermore, although the editor of this volume originally commissioned me to write a chapter on trends, the chapter has evolved as a critical commentary on qualitative IS research. The chapter’s turn in this direction resulted from the editor’s guidance to me about how to account for the comments of the anonymous reviewers of the initial draft.


2016 ◽  
Vol 40 (2) ◽  
pp. 70-83 ◽  
Author(s):  
Valerio Velardo ◽  
Mauro Vallati ◽  
Steven Jan

Fostered by the introduction of the Music Information Retrieval Evaluation Exchange (MIREX) competition, the number of systems that calculate symbolic melodic similarity has recently increased considerably. To understand the state of the art, we provide a comparative analysis of existing algorithms. The analysis is based on eight criteria that help to characterize the systems, highlighting strengths and weaknesses. We also propose a taxonomy that classifies algorithms based on their approach. Both taxonomy and criteria are fruitfully exploited to provide input for new, forthcoming research in the area.


Author(s):  
Parikshit Mahalle ◽  
Asmita B. Kalamkar ◽  
Nilanjan Dey ◽  
Jyotismita Chaki ◽  
Aboul ella Hassanien ◽  
...  

When new virus and its respective disease cause more infections, it is very important to decide the strategies to control the spread and determine its impact. Considering the recent example of Coronavirus initially identified in Wuhan China has now targeted Italy badly, It is very important to study different forecasting models to control this pandemic. In the view of this, this study present the comparative analysis of various forecasting models, their classification and the techniques used. The detail analysis of forecasting models with respect to the parameters like data source, techniques, algorithms, mathematical parameters is also presented in this study. In the sequel, this study also presents useful recommendations to help government and healthcare community in designing better strategies and in taking productive decisions to control this outbreak.<div><br></div>


Author(s):  
Parikshit Mahalle ◽  
Asmita B. Kalamkar ◽  
Nilanjan Dey ◽  
Jyotismita Chaki ◽  
Aboul ella Hassanien ◽  
...  

When new virus and its respective disease cause more infections, it is very important to decide the strategies to control the spread and determine its impact. Considering the recent example of Coronavirus initially identified in Wuhan China has now targeted Italy badly, It is very important to study different forecasting models to control this pandemic. In the view of this, this study present the comparative analysis of various forecasting models, their classification and the techniques used. The detail analysis of forecasting models with respect to the parameters like data source, techniques, algorithms, mathematical parameters is also presented in this study. In the sequel, this study also presents useful recommendations to help government and healthcare community in designing better strategies and in taking productive decisions to control this outbreak.<div><br></div>


Author(s):  
Rui Pedro Figueiredo Marques

In the current organizational context, in which there is a fierce competitiveness and a constant need for more timely, relevant and reliable information to support the decision making and achieve the strategic and operational objectives, Continuous Assurance has assumed an important role as a management goal and in ensuring improved effectiveness of organizations. This works provides the concept of Continuous Assurance, its objectives and components, and a model which allows both to evaluate information systems with Continuous Assurance services and to help design the requirements of new ones. Finally, some implementations are also presented providing a comprehensive understanding the state-of-the-art and the benefits of Continuous Assurance.


Author(s):  
Rui Pedro Figueiredo Marques

In the current organizational context, in which there is a fierce competitiveness and a constant need for more timely, relevant, and reliable information to support the decision making and achieve the strategic and operational objectives, continuous assurance has assumed an important role as a management goal and in ensuring improved effectiveness of organizations. This chapter provides the concept of continuous assurance, its objectives and components, and a model that allows both to evaluate information systems with continuous assurance services and to help design the requirements of new ones. Finally, some implementations are also presented providing a comprehensive understanding of the state of the art and the benefits of continuous assurance.


Sign in / Sign up

Export Citation Format

Share Document