scholarly journals Implementation of CVR / IT Methodology on Outsourced Applied Research to Internship Environment, Case, Information Technology Directorate of Bina Nusantara Foundation

Author(s):  
Renan Prasta
Healthcare ◽  
2016 ◽  
Vol 4 (2) ◽  
pp. 80-83 ◽  
Author(s):  
Jason J. Saleem ◽  
Laura G. Militello ◽  
Alissa L. Russ ◽  
Nancy R. Wilck

2021 ◽  
Vol 2 (2) ◽  
pp. 78-86
Author(s):  
Ade Kornelia ◽  
Dedi Irawan

Information is a very valuable asset for a university institution. Utilization of information technology offers various conveniences in obtaining the information needed. Good information management can make universities have good managerial skills. protecting information security means that it also requires efforts to pay attention to the security factors of all supporting assets such as networks, as well as other facilities that are directly or indirectly related to the process of organizing information. Bina Darma University is an institution that is engaged in the field of education and science, which has a vision that is to become an International Standard University Based on Information Technology By 2025, to realize this there are several efforts prepared, one of which is to improve information security by implementing the ISO 27001 certification process. :2013. So in the context of Bina Darma University will implement ISO 27001: 2013. Using the method of Applied Research (applied research) the author took the initiative to conduct research with the title ANALYSIS OF INFORMATION SECURITY USING OUR INDEX TOOLS 4.1 So as to produce Knowing the maturity level of information security with a status of Inappropriate, Needs improvement , Enough and Good at Bina Darma University.


2021 ◽  
Vol 11 (4) ◽  
Author(s):  
Maristela Inês Osawa Vasconcelos ◽  
Yanka Alcântara Cavalcante ◽  
Gabriel Pereira Maciel ◽  
Milena Melo Vieira ◽  
Paulo Roberto Lopes ◽  
...  

Objetivo: Validar o aplicativo móvel HelpTeen como tecnologia educativa para prevenção da violência contra adolescentes. Método: Trata-se de uma pesquisa de validação ou metodológica aplicada, com abordagem quantitativa, cuja coleta de dados aconteceu no mês de agosto de 2019, em duas escolas públicas de ensino fundamental e médio de Sobral-Ceará. A validação de conteúdo e aparência foi realizada com 106 adolescentes de 14 a 18 anos. Os dados foram submetidos a estatística descritiva e expressos por meio do Índice de Validade de Conteúdo (IVC). Para fins de validação foi considerado o percentual mínimo de 75% de concordância para cada item. Resultados: os 17 itens de avaliação foram validados alcançando o referencial exigido com IVC>0,75, sendo avaliados com os menores índices, os itens: C 1.2 (=0,77) sobre se as funções eram suficientes ao alcance de objetivos; o C1.4 (=0,76) que trata do aprendizado de um novo conteúdo; C 2.3 (=0,77) quanto a quantidade apropriada de informação em cada tela; e D 1.3 (=0,77) sobre a exploração de conteúdos consistentes. Conclusão: Conclui-se que o aplicativo HelpTeen foi validado pelo público adolescente, embora ainda necessite aperfeiçoar algumas funções relacionadas ao aprendizado, como também no quesito da usabilidade visando maior interesse do aplicativo como ferramenta educativa para o público adolescente.Palavras-chave: Estudos de validação; Tecnologia da Informação; Ensino-aprendizagem. Saúde do Adolescente. VALIDATION OF THE HELPTEEN APPLICATION TO PREVENT VIOLENCE AGAINST ADOLESCENTSObjective: To validate the HelpTeen mobile application as an educational technology for preventing violence against adolescents. Method: This is an applied research, with a quantitative approach, whose data collection took place in August 2019 in two public elementary and high schools in Sobral-Ceará. The content and appearance validation was performed with 106 adolescents (14-18 years old). The data were submitted to descriptive statistics and expressed through the Content Validity Index (CVI). For validation purposes, the minimum percentage of 75% agreement for each item was considered. Results: the 17 evaluation items were validated reaching the required benchmark with CVI> 0.75, and the items were evaluated with the lowest indexes: C 1.2 (= 0.77) on whether the functions were sufficient to achieve objectives; o C1.4 (= 0.76) that deals with the learning of new content; C 2.3 (= 0.77) regarding the appropriate amount of information on each screen; and D 1.3 (= 0.77) on the exploration of consistent content. Conclusion: It is concluded that the HelpTeen application was validated by the adolescent public, although it still needs to improve some functions related to learning, as well as in terms of usability, aiming at the greater interest of the application as an educational tool for the adolescent public.Keywords: Validation studies; Information Technology; Teaching-learning; Adolescent Health. VALIDACIÓN DE LA APLICACIÓN HELPTEEN PARA PREVENIR LA VIOLENCIA CONTRA LOS ADOLESCENTESObjetivo: validar la aplicación móvil HelpTeen como tecnología educativa para prevenir la violencia contra los adolescentes. Método: Esta es una investigación aplicada, con un enfoque cuantitativo, cuya recopilación de datos tuvo lugar en agosto de 2019, en dos escuelas públicas primarias y secundarias en Sobral-Ceará. La validación de contenido y apariencia se realizó con 106 adolescentes de 14 a 18 años. Los datos se enviaron a estadísticas descriptivas y se expresaron a través del Índice de Validez del Contenido (CVI). Para fines de validación, se consideró el porcentaje mínimo de 75% de acuerdo para cada artículo. Resultados: los 17 ítems de evaluación fueron validados alcanzando el punto de referencia requerido con CVI> 0.75, y los ítems fueron evaluados con los índices más bajos: C 1.2 (= 0.77) sobre si las funciones eran suficientes para lograr los objetivos; o C1.4 (= 0.76) que se ocupa del aprendizaje de nuevos contenidos; C 2.3 (= 0.77) con respecto a la cantidad apropiada de información en cada pantalla; y D 1.3 (= 0.77) sobre la exploración de contenido consistente. Conclusion:Se concluye que la aplicación HelpTeen fue validada por el público adolescente, aunque todavía necesita mejorar algunas funciones relacionadas con el aprendizaje, así como en términos de usabilidad, con el objetivo de un mayor interés de la aplicación como una herramienta educativa para el público adolescente.Palabras clave: estudios de validación; Tecnología de la informacion; Enseñanza-aprendizaje. Salud del adolescente. 


Author(s):  
А.Н. Сухов

В статье раскрывается актуальность исследования информационной безопасности, а также рассматриваются внешние и внутренние угрозы для ее обеспечения, анализируются возникающие сложности. С данным видом безопасности связана позитивная модель развития общества, поэтому не случайно наиболее важной задачей является создание полноценной теории информационной безопасности. Без этого невозможно вести речь об эффективном устранении ряда негативных последствий информатизации общества. Важной задачей является обеспечение защиты личности и общества в целом от информационно-психологических, деструктивных угроз, в том числе преодоление интернет- и других видов информационной зависимости. Теория информационной безопасности — составная часть социальной психологии безопасности. Для ее полного оформления предстоит еще немало сделать как в теоретическом, так и прикладном плане. Прежде всего имеется в виду создание национальной информационной платформы. В настоящее время существует настоятельная потребность в развитии компетентности в области информационной безопасности не только среди профессионалов, но и различных групп населения. The article focuses on a relevant issue of investigating information security. It treats internal and external threats that affect information security and problems that are associated with information security retention. Effective information security policy is a prerequisite for efficient social development, therefore it is essential to develop a full-fledged information security theory, otherwise it is impossible to efficiently eliminate negative effects of community informatization. It is essential to ensure information security of an individual and society, to protect people and community from destructive informational and psychological threats, to help people overcome their internet addiction and other disorders related to information technology addiction. Information security theory is a branch of social security psychology. It requires a lot of theoretical and applied research. The creation of a nationwide information platform is the first step to make. Nowadays there is an urgent necessity to improve information security competence of both cyber security specialists and laymen.


2014 ◽  
Vol 919-921 ◽  
pp. 1531-1536
Author(s):  
Guang Li

Xinjiang Uygur architectural technology has unique ethnic art forms and traditional crafts features, especially brick mill mosaic decoration techniques which make full use of local resources, with local natural conditions, the use of the building features for life and customs of the nation designed by demand. In this paper, parquet architectural technology type characterization and application of traditional brick mill Uygur, leads to the development and application of traditional Uygur architectural technology and modern information technology. By combining technology development of information technology, architectural technology makes the Uighurs have a foundation and modern design, modern construction more closely, so as to find a way in modern society, the continuation and development of national culture and national economy.


2014 ◽  
Vol 584-586 ◽  
pp. 46-51
Author(s):  
Guang Li

Xinjiang Uygur architectural technology has unique ethnic art forms and traditional crafts features, especially plaster floral decoration techniques which make full use of local resources, with local natural conditions, the demand for the nation's living habits and the use of functional buildings designed by. In this paper, plaster floral Uygur traditional architectural characterization and application of technology, research and development and application conditions analysis of traditional Uygur architectural technology and modern information technology. By combining technology development of information technology, architectural technology makes the Uighurs have a foundation and modern design, modern construction more closely, so as to find a way to continue the development of the national economy and national culture in modern society.


2020 ◽  
Vol 17 (3) ◽  
pp. 229-236
Author(s):  
Viktor S. Kornilov

Problem and goal. The success of a variety of applied research based on achievements in applied mathematics presupposes the existence of highly qualified professionals with not only fundamental knowledge in applied mathematics, but applied mathematical thinking and the world of information, able to apply environmental technologies in applied research, to formulate and justify inferences about the results of the study. Such specialists in applied mathematics are able to identify and understand the new information obtained as a result of research in terms of its scientific and humanitarian value. That is why much attention is paid to the training of such highly professional specialists in the field of applied mathematics in Russia. Methodology. In the process of teaching applied mathematics to students of physics and mathematics and natural science areas of higher education, it is advisable to integrate natural science, humanities, and information technology. At the same time, it is necessary to attract specialists in the field of applied mathematics who have experience in using information technologies to solve applied mathematical problems. Results. The integration of natural science, humanities, and information technologies in the process of teaching applied mathematics allows students to develop a scientific worldview and information culture, to better understand the approaches and methods of applied mathematics as well as the scientific potential of applied mathematics. In addition, this integration allows to identify the fundamental concepts of scientific disciplines, which may not be the basic disciplines for teaching in the field of applied mathematics, but at the same time, play an important role in the methodology of applied mathematics. For example, such disciplines include computer science, philosophy, etc. Conclusion. Training classes with students in applied mathematics, which integrates natural science, humanities, information technology allows to identify the humanitarian, scientificeducational and scientific-educational potential of teaching applied mathematics to justify the positive contribution of information technology to develop students ICT competence.


Sign in / Sign up

Export Citation Format

Share Document