Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Personal information management – Zimbabwe“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Personal information management – Zimbabwe" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Personal information management – Zimbabwe"
Mutsagondo, Samson. „Post-records survey inspections in Zimbabwe“. Records Management Journal 28, Nr. 1 (19.03.2018): 115–27. http://dx.doi.org/10.1108/rmj-01-2017-0001.
Der volle Inhalt der QuelleMoyo, Zvisinei, Juliet Perumal und Philip Hallinger. „Struggling to make a difference against the odds: a synthesis of qualitative research on women leading schools in Zimbabwe“. International Journal of Educational Management 34, Nr. 10 (27.08.2020): 1577–94. http://dx.doi.org/10.1108/ijem-01-2020-0015.
Der volle Inhalt der QuelleChifamba, Ephraim. „Mainstreaming Gender in Pursuit of Millennium Development Goals in Water Resource Governance in Buhera, Zimbabwe“. International Journal of Social Sciences and Management 1, Nr. 1 (15.01.2014): 10–21. http://dx.doi.org/10.3126/ijssm.v1i1.8946.
Der volle Inhalt der QuelleBernard Nkala, Charles Mudimu und Angelbert Mbengwa Mbengwa. „Human resources for health talent management contribution: A case for health systems strengthening in the public health sector“. World Journal of Advanced Research and Reviews 9, Nr. 2 (28.02.2021): 192–201. http://dx.doi.org/10.30574/wjarr.2021.9.2.0062.
Der volle Inhalt der QuelleArth, Janet M. „Personal Information Management:“. Medical Reference Services Quarterly 5, Nr. 1 (20.05.1986): 51–56. http://dx.doi.org/10.1300/j115v05n01_04.
Der volle Inhalt der QuelleJones, William. „Personal Information Management“. Annual Review of Information Science and Technology 41, Nr. 1 (2007): 453–504. http://dx.doi.org/10.1002/aris.2007.1440410117.
Der volle Inhalt der QuelleBolstad, Judy P. „Personal Information Management“. Journal of the American Society for Information Science and Technology 59, Nr. 13 (November 2008): 2192–93. http://dx.doi.org/10.1002/asi.20919.
Der volle Inhalt der QuellePratt, Wanda, Kenton Unruh, Andrea Civan und Meredith M. Skeels. „Personal health information management“. Communications of the ACM 49, Nr. 1 (Januar 2006): 51–55. http://dx.doi.org/10.1145/1107458.1107490.
Der volle Inhalt der QuelleDENG, Chang-Zhi. „Activity-Centered Personal Information Management“. Journal of Software 19, Nr. 6 (21.10.2008): 1428–38. http://dx.doi.org/10.3724/sp.j.1001.2008.01428.
Der volle Inhalt der QuelleFourie, Ina. „Personal information and reference management“. Library Hi Tech 29, Nr. 2 (14.06.2011): 387–93. http://dx.doi.org/10.1108/07378831111138242.
Der volle Inhalt der QuelleDissertationen zum Thema "Personal information management – Zimbabwe"
Layouni, Mohamed. „Privacy-preserving personal information management“. Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.
Der volle Inhalt der QuelleIn this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
Franz, Thomas [Verfasser]. „Semantic Personal Information Management / Thomas Franz“. München : Verlag Dr. Hut, 2010. http://d-nb.info/1009972243/34.
Der volle Inhalt der QuelleGwizdka, Jacek, und Mark Chignell. „Individual Differences in Personal Information Management“. University of Washington Press, 2007. http://hdl.handle.net/10150/105751.
Der volle Inhalt der QuelleLiu, Jamie M. Eng Massachusetts Institute of Technology. „Customizable application for personal information management“. Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61172.
Der volle Inhalt der QuelleCataloged from PDF version of thesis.
Includes bibliographical references (p. 83-84).
As digital content becomes increasingly pervasive in our daily lives, next-generation organizational tools must be developed to help end users curate that information. The information management tools available today are limited in several ways. They are either restrictive in how users define and organize their data, or they offer few options in how users can view and interact with that data. In this thesis, we introduce a new application geared toward the layman end user to help resolve this lack of personalization when managing data. With this tool, users can store any collection of information (i.e. to do lists, address book, DVD collection), customize how they want to view and browse that data, and create any number of visualizations for the same data set or overlapping sets of data. For example, a user might want to manage an address book for a collection of all contacts, and manage a different set of items involving all research-related items, including colleagues, in another visualization. This tool allows her to do this without duplicating the overlapping data set for contact information of colleagues, enabling her to make changes to an item in one visualization and see that change applied to any other visualization that includes the same item. Moreover, users can import data from other sources, as well as share their data with others either with a visualization, such that the receiver can interact with the visualization the user has already created, or as raw data, such that the receiver can create his or her own visualization of the data.
by Jamie Liu.
M.Eng.
Elsweiler, David. „Supporting human memory in personal information management“. Thesis, University of Strathclyde, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488520.
Der volle Inhalt der QuelleKeeble, Richard John. „An adaptive environment for personal information management“. Thesis, Brunel University, 1999. http://bura.brunel.ac.uk/handle/2438/6509.
Der volle Inhalt der QuelleGyllstrom, Karl Stotts P. David. „Enriching personal information management with document interaction histories“. Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2009. http://dc.lib.unc.edu/u?/etd,2727.
Der volle Inhalt der QuelleTitle from electronic title page (viewed Mar. 10, 2010). "... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science." Discipline: Computer Science; Department/School: Computer Science.
Matizirofa, Lazarus. „Information management and dissemination of HIV/AIDS information by NGOs in Zimbabwe: An explanatory study“. Master's thesis, University of Cape Town, 2005. http://hdl.handle.net/11427/8726.
Der volle Inhalt der QuelleThe HIV/AIDS epidemic has become a serious health, social and economic problem in Zimbabwe. Almost 30 percent of the population had been infected by AIDS (Acquired immune Deficiency Syndrome) by 2004. The epidemic has also affected almost the entire population in one way or another - domestically, socially and economically. Zimbabwe faces a long-term development disaster because of the effects of the disease across the societal spectrum. AIDS is threatening every fibre of the nation from food supply to economic productivity, and not least human resource development. Many households have lost their principal source of income to the disease and have become impoverished. The national budget is increasingly under pressure as scarce resources are channelled to fight the HIV/AIDS pandemic. Despite a multitude of interventions aimed at preventing the scourge of the epidemic on the health system, the economy and human development, HIV/AIDS still presents a problem of enormous magnitude in Zimbabwe. It is argued that a major limitation of the various interventions to fight the pandemic has been the failure to extensively and effectively harness knowledge and disseminate information relating to all aspects of HIV/AIDS in Zimbabwe. The NGO sector, because of its grassroots involvement with the disease, is particularly well placed to fulfil such a role. The main aim of this study was to explore information and knowledge management and dissemination by HIV/AIDS NGOS in Zimbabwe. A further objective was to identity in the literature strategies that have been used, vis-a-vis modern information and knowledge management practice, in cognate sectors of development in Zimbabwe and other countries. It is argued that by applying appropriate information and knowledge management practices valuable knowledge and information that relate to how communities experience the problems and the impact associated with HlV/AIDS can be gathered and disseminated. Information and knowledge management is recommended by the United Nations' UNAIDS as the best way to harness both tacit and explicit information related to all aspects of the epidemic. A survey was conducted amongst 64 HIV/AIDS NGOs based in Harare, Zimbabwe. Data was collected using questionnaires, key informant interviews, and observation methods, and this was further supported by data collected from documentary and electronic sources. The main outcome of the study indicates that information and knowledge management is generally not well practised in the HIV/AIDS NGO sector in Zimbabwe. This is despite the fact that 75% of the NGOs had information services in place. Far too few qualified staff have been appointed to manage information services and this lack of professional skills has had a negative impact on HIV/AIDS information dissemination. It is argued that in a society such as in Zimbabwe, effective information dissemination measures are needed to assist social, economic and scientific interventions. It was further established that a sound information and knowledge management policy, and information technology developments were needed to address the information service challenges. The other main outcome showed that NGOS were not networking effectively among themselves, with government and other role players such as the private sector, educational institutions and churches, etc. Lastly, there was a strong indication that information technology, i.e., computers and accessories, the Internet, intranets, databases and audio-visuals, etc.. were not fully utilised, this is despite the fact that in other countries they have been very effective to assist in the creation, generation, gathering and diffusion of information. Based on the research outcomes, the researcher thus proposes that information and knowledge management practices should be set in place in the HIV/AIDS sector of Zimbabwe. NGOs should ensure that information services are run and manned by skilled and trained information officers. It is also suggested that government should be encouraged to become more involved and complement the work done by NGOs by reviewing the 1985 NLDS Act and other policy instruments. The study further recommends that, HIV/AIDS NGOs should work towards networking and providing a single shared dissemination source to the public, such as a national database, which would be hosted via a web-based internet portal. This would also enable NGOs to explore further networking efforts such as communities of practice (expert forums), a national HIV/AIDS bibliography and electronic publishing.
Mago, Shamiso. „The impact of information and communication technologies (ICTs) on rural livelihoods: the case of smallholder farming in Zimbabwe“. Thesis, University of Fort Hare, 2012. http://hdl.handle.net/10353/d1007185.
Der volle Inhalt der QuelleYiu, Kelvin Shek. „Time-based management and visualization of personal electronic information“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0016/MQ29420.pdf.
Der volle Inhalt der QuelleBücher zum Thema "Personal information management – Zimbabwe"
Etzel, Barbara, und Peter Thomas. Personal Information Management. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8.
Der volle Inhalt der Quelle1956-, Taylor Morris, Hrsg. Overcoming information overload. London: Hodder, 2008.
Den vollen Inhalt der Quelle findenManaging information overload. New York: AMACOM, 1996.
Den vollen Inhalt der Quelle findenAgency, Massachusetts Emergency Management. Anti-terrorism personal security planning and information booklet. Boston, Mass: Commonwealth of Massachusetts, Massachusetts Emergency Management Agency, 1996.
Den vollen Inhalt der Quelle findenJ, Thomas Peter, Hrsg. Personal information management: Tools and techniques for achieving professional effectiveness. Houndmills: Macmillan, 1996.
Den vollen Inhalt der Quelle finden1961-, Thomas Peter J., Hrsg. Personal information management: Tools and techniques for achieving professional effectiveness. Washington Square, N.Y: New York University Press, 1996.
Den vollen Inhalt der Quelle findenHunter, Beverly. Guide to managing information with your personal computer. Glenview, Ill: Scott, Foresman, 1986.
Den vollen Inhalt der Quelle findenYiu, Kelvin Shek. Time-based management and visualization of personal electronic information. Ottawa: National Library of Canada = Bibliothèque nationale du Canada, 1999.
Den vollen Inhalt der Quelle findenThe pastor & the personal computer: Information management for ministry. Nashville: Abingdon Press, 1985.
Den vollen Inhalt der Quelle findenEssentials of health information management. 2. Aufl. Boston, MA: Delmar Learning, 2010.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Personal information management – Zimbabwe"
Woodward, Beverly. „Information Management as Risk Management“. In Personal Medical Information, 109–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/978-3-642-59023-8_9.
Der volle Inhalt der QuelleLee, Newton. „Personal Information Management“. In Facebook Nation, 159–68. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5308-6_12.
Der volle Inhalt der QuelleEtzel, Barbara, und Peter Thomas. „Personal information management“. In Personal Information Management, 8–17. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_2.
Der volle Inhalt der QuelleEtzel, Barbara, und Peter Thomas. „‘Information overload’ and information management ‘re-engineering’“. In Personal Information Management, 25–31. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_4.
Der volle Inhalt der QuelleEtzel, Barbara, und Peter Thomas. „Computer software and hardware products“. In Personal Information Management, 43–71. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_7.
Der volle Inhalt der QuelleEtzel, Barbara, und Peter Thomas. „From the industrial age to the information age“. In Personal Information Management, 1–7. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_1.
Der volle Inhalt der QuelleEtzel, Barbara, und Peter Thomas. „Beginning to implement your personal information management strategy“. In Personal Information Management, 95–108. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_10.
Der volle Inhalt der QuelleEtzel, Barbara, und Peter Thomas. „Maintaining your personal information management strategy“. In Personal Information Management, 109–15. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_11.
Der volle Inhalt der QuelleEtzel, Barbara, und Peter Thomas. „Computing technology and your personal information management strategy“. In Personal Information Management, 116–24. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_12.
Der volle Inhalt der QuelleEtzel, Barbara, und Peter Thomas. „Conclusions“. In Personal Information Management, 125–34. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_13.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Personal information management – Zimbabwe"
Bergman, Ofer, Richard Boardman, Jacek Gwizdka und William Jones. „Personal information management“. In Extended abstracts of the 2004 conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/985921.986164.
Der volle Inhalt der QuelleDiehl, Jonathan. „Associative personal information management“. In the 27th international conference extended abstracts. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1520340.1520437.
Der volle Inhalt der QuelleCai, Yuhan, Xin Luna Dong, Alon Halevy, Jing Michelle Liu und Jayant Madhavan. „Personal information management with SEMEX“. In the 2005 ACM SIGMOD international conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1066157.1066289.
Der volle Inhalt der QuelleCHANG, YUN-KE, MIGUEL A. MORALES-ARROYO, CHAN-CHOY CHUM, TIN-SENG LIM und KOK-YUIN YUEN. „PERSONAL INFORMATION MANAGEMENT TOOLS REVISITED“. In Managing Knowledge for Global and Collaborative Innovations. WORLD SCIENTIFIC, 2009. http://dx.doi.org/10.1142/9789814299862_0024.
Der volle Inhalt der QuelleAl-fedaghi, Sabah. „Personal Management of Private Information“. In 2006 Innovations in Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/innovations.2006.301955.
Der volle Inhalt der QuelleBernstein, Michael S., Max Van Kleek, m. c. schraefel und David R. Karger. „Management of personal information scraps“. In CHI '07 extended abstracts. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1240866.1240995.
Der volle Inhalt der QuelleZhong, Chen. „Research on Personal Information Management“. In 2013 Fifth International Conference on Computational and Information Sciences (ICCIS). IEEE, 2013. http://dx.doi.org/10.1109/iccis.2013.105.
Der volle Inhalt der QuelleJones, William. „Session details: Personal information management“. In CHI '09: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2009. http://dx.doi.org/10.1145/3256942.
Der volle Inhalt der QuelleChang, Yun-Ke, Miguel A. Morales-Arroyo, Chan-Choy Chum, Tin-Seng Lim und Kok-Yuin Yuen. „Personal Digital Information Resources Management Behavior“. In 2010 Seventh International Conference on Information Technology: New Generations. IEEE, 2010. http://dx.doi.org/10.1109/itng.2010.201.
Der volle Inhalt der QuelleAl-Fedaghi, Sabah S., und Ali M. Nour Eddine. „MYHEALTH: Personal Management of Health Information“. In Twentieth IEEE International Symposium on Computer-Based Medical Systems (CBMS'07). IEEE, 2007. http://dx.doi.org/10.1109/cbms.2007.76.
Der volle Inhalt der Quelle