Academic literature on the topic '220302 Electronic information storage and retrieval services'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic '220302 Electronic information storage and retrieval services.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "220302 Electronic information storage and retrieval services"

1

Vancea, Florin, Codruţa Vancea, Daniela Elena Popescu, Doina Zmaranda, and Gianina Gabor. "Secure Data Retention of Call Detail Records." International Journal of Computers Communications & Control 5, no. 5 (December 1, 2010): 961. http://dx.doi.org/10.15837/ijccc.2010.5.2260.

Full text
Abstract:
In today’s world communication is relying heavily on electronic means, both for voice and other native data. All these communication sessions leave behind journaling information by the very nature of the underlying services. This information is both sensitive with respect to user’s rights and important for law enforcement purposes, so proper storage and retrieval techniques have to be taken into consideration. The paper discusses such techniques in relation with recent EU recommendations and suggests some methods for achieving good performance while preserving the required security levels.
APA, Harvard, Vancouver, ISO, and other styles
2

Araujo, Aleteia Patricia Favacho, Antonio M. A. Ferreira, and André C. Drummond. "Comparison of Performance, Availability and Scalability of a Private Cloud Storage Infrastructure Service for Document Preservation." Journal on Advances in Theoretical and Applied Informatics 3, no. 1 (August 30, 2017): 68. http://dx.doi.org/10.26729/jadi.v3i1.2449.

Full text
Abstract:
Cloud computing platforms provide easy and transparent access to a company’s storage infrastructure through services. it allows users to store their data at remote disks and access them anytime from any place. On the other hand, with the deployment of Electronic Document Management (EDM) to manage the insertion, sharing, and retrieval of information assigned to a digital document it is necessary that the processes of searching, indexing and storage of digital documents are carried out efficiently. Besides the use of computational tools focused on archiving digital documents, the storage solution must provide reliability and authenticity on the availability of digital documents. With object storage systems being increasingly accepted as replacements for traditional file or block systems and recognized as a preferred way to expose one’s storage infrastructure, it is important to effectively measure the performance of these services. This paper addresses the deployment project of a content-addressable storage infrastructure in a large company and conducts performance, availability and scalability evaluation to measure the gains in r/w access of the proposed solution in different scenarios proposed.
APA, Harvard, Vancouver, ISO, and other styles
3

Fitri, Arzetya, Gading Gamaputra, Agus Prasetyawan, Prasetyo Isbandono, Weni Rosdiana, Yuni Lestari, Noviyanti, Dian Arlupi Utami, Isnaini Fitri Effendi, and Naufal Hanif Ramadhan. "Electronic Archives Management to Realizing the Development of Information and Communication Technology in Achieve SDGs in Kendal Village, Sekaran District, Lamongan Regency." JKMP (Jurnal Kebijakan dan Manajemen Publik) 10, no. 2 (September 12, 2022): 27–39. http://dx.doi.org/10.21070/jkmp.v10i2.1699.

Full text
Abstract:
Archiving activities are part of the dministrative activities in an organization, which are very important. Archival management is a major factor in supporting the course of administrative activities in an organization. However, in practice, there are still organizations that are lacking in managing archives, so it can also affect the service process to the community. The purpose of this study was to determine the application of electronic mail archiving applications in the form of APEL SISA in Kendel Village to realize the development of information and communication technology in achieving the Village SDGs. The method used is descriptive qualitative. The focus of this research refers to the theory of Muhidin and Winata (2016) that digital archive management activities include two things, namely archive storage and archive retrieval. The data collection techniques in this study were through interviews and observation. The results of this study indicate that by using APEL SISA, archive storage in Kendal Village, which was originally manual, becomes more effective and efficient in providing services to the community, and electronic retrieval of archives can facilitate archive management at the Kendal Village office. Based on this, the management of archives in Kendal Village needs to be done all electronically to make it easier to manage archives that are stored and find back archives when needed.
APA, Harvard, Vancouver, ISO, and other styles
4

Arunkumar, R. Josephius, and R. Anbuselvi. "An Enhanced Methodology to Protect the Patient Healthcare Records Using Multi-Cloud Approach." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 239. http://dx.doi.org/10.23956/ijarcsse.v7i8.57.

Full text
Abstract:
Now-a-days, most hospitals and medical centers is to manage huge volume of patient’s medical records into database. It is essential to collect and access this information everywhere, to increase productivity and improve quality of health cares. Need to access electronic health information across the world and improve the quality of healthcare to patients will highlight importance of using cloud computing architecture in this area. But, despite the benefits of cloud computing applications for health care, the security challenges of cloud should be addressed. In this paper, we introduce and describe a new proposed model called Electronic Health Record with Multi-Clouds Databases. This model will ensure the privacy of persons in a network and multi-cloud environment using cryptographic algorithm and distributed storage. This model is able to store any type of data such as number, string, image, etc. in a cloud environment. The Electronic Health Record with Multi-Clouds Database prevent from illegal intrusion and access to data in cloud environment and provide services such as data integrity, confidentiality and permanent availability of data in a safe and secure way. The evaluation results of proposed method show that despite increasing time of information storage and retrieval and System overhead
APA, Harvard, Vancouver, ISO, and other styles
5

Lazim Lafta, Ali, and Ayad I. Abdulsada. "SMPP-CBIR: shorted and mixed aggregated image features for privacy-preserving content-based image retrieval." Bulletin of Electrical Engineering and Informatics 11, no. 5 (October 1, 2022): 2930–37. http://dx.doi.org/10.11591/eei.v11i5.4323.

Full text
Abstract:
Thanks to recent breakthroughs in photographic and digital technology, enormous amounts of image data are generated daily. Many content-based image retrieval (CBIR) systems have been developed for searching image collections. However, these systems need more computer and storage resources that can be met by cloud servers, since they supply a lot of processing power at a reasonable price. The protection of users' personal information is a worry for image owners since cloud services are not exactly trustworthy. In this paper, we suggest and put into practice a CBIR (SMPP-CBIR) technique for searching and retrieving ciphertext information that protects security. Asymmetric scalar-product-preserving encryption process (ASPE) is used to preserve aggregated mixed feature vectors while still enabling computation between them to describe the related picture collection. The k-means clustering algorithm is used to recursively arrange all encrypted attributes into a tree index in order to speed up search times. The findings show that SMPP-CBIR is more scalable, more precise, and faster in indexing and retrieval than earlier systems.
APA, Harvard, Vancouver, ISO, and other styles
6

Dotasara, Monika, and Anand Sharma. "MDAS_DBRCC: Data Backup and Recovery Technique in Cloud Computing for Education Industry." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 6 (June 30, 2022): 31–36. http://dx.doi.org/10.17762/ijritcc.v10i6.5621.

Full text
Abstract:
Cloud computing also offers several services to its clients in departments such as education, healthcare, military, government, and sports. The storage of each service, which keeps a huge amount of electronic data in a cloud database, is one of the services provided by cloud infrastructure. In the main cloud, this type computes massive amounts of private data. As a result, information retrieval solutions that are both effective and efficient are required. When the server deletes the lost data and cannot transmit any information to the client, the recovery method's main goal is to assist the user in collecting data from each server backup. Users can benefit from cloud computing by storing data, accessing data from anywhere, and retrieving data at any time. As data on the cloud is generated at such a quick rate, speed is one of the most important aspects of cloud computing. It's simple to save files in the cloud and then retrieve it again. However, the difficult problem is to safely store and retrieve data from the cloud. We suggested a way for securely storing data in the cloud utilizing encryption and decryption methods in this work. We also employed a compression module to compress data before putting it in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
7

Zimina, Elena I. "Systems and Methods of Document Delivery in the Foreign Libraries." Bibliotekovedenie [Russian Journal of Library Science] 70, no. 6 (December 21, 2021): 615–24. http://dx.doi.org/10.25281/0869-608x-2021-70-6-615-624.

Full text
Abstract:
In the modern digital society, innovative technologies are coming to the fore in the activities of libraries; with their help the libraries can focus on the value of their role in culture and education, meet information needs in the context of digital transformation. At the same time, libraries try to facilitate the work of their employees as much as possible and simplify the efforts of readers in obtaining the necessary literature. This can be achieved by automation of the process of delivery and return of library materials ordered by users within the premises of the library. As a rule, for such purposes there is used telelift — an automated monorail handling system designed for the delivery of goods up to 50 kg (documents, books, magazines, etc.) inside buildings and premises. Telelift is installed in many large libraries, including national libraries in many countries. In addition to telelifts, national libraries use some other document delivery systems. So, the national library of the Netherlands, which is located in one building, has three reading rooms and several storages in the same building, uses the automated storage and retrieval systems of Swisslog company. The article is based on studying the materials of websites of the national libraries, the appeals to the library virtual reference services Ask a Librarian, correspondence with employees of the departments of storage and library and information services of national libraries, as well as additional questionnaire surveys of libraries on the issues related to the storage of library materials. The questionnaire covered the following topics: conducting complete or partial audit, types of audit, use of RFID tags, delivery of material to reading rooms, including, from the remote repositories, the preferred format for issuing a document to the user if this document has a copy (microfilm, microfiche, electronic copy, etc.), as well as statistics of binding and restoration work, ordering necessary materials by readers, etc. The article presents the questionnaire survey responses of the national libraries of Switzerland, Korea, the Royal Library of Netherlands, the British Library, as well as the the Library and Archives of Canada.
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmad Bukhori S. "DESAIN SISTEM: VISUAL BASIC FOR APPLICATION EXCEL 2010 UNTUK PENGGAJIAN GURU MADRASAH ALIYAH MUHAMMADIYAH I MALANG." INTAJ : Jurnal Penelitian Ilmiah 3, no. 1 (October 16, 2019): 155–85. http://dx.doi.org/10.35897/intaj.v3i1.209.

Full text
Abstract:
In the world of education in Indonesia, computers have been introduced and used in schools ranging from basic education to tertiary institutions. Computers make it easy to find and provide learning materials can also be obtained, for example by the concept of electronic libraries (e-libraries) or electronic books (e-books). MA Muhammadiyah I Malang is a school that is equivalent to a high school (SMA) that has used a computer as a tool for the process of teaching and learning activities, finance, administration and so forth. Computers are tools that help humans in making reports or in producing information that can be achieved as a basis for decision making and can contribute more to data storage and data retrieval processes. Currently in the financial section for the processing of teaching fees and employee honorariums still use Microsoft Excel. Separate financial data in several sheets that require separate data input for each sheet so that financial calculations and reporting are less efficient and fast. The bookkeeping process is sometimes very difficult, complicated or even troublesome for some people. But today's computer technology has been able to change this process to be easier, simpler, faster and more efficientPayroll system is a computer application created to make it easier for employees in the financial department to make, calculate, report and analyze school financial turnover so that the application can provide optimal services to teachers and employees as a support for timely decision making.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Miye, Sheyu Li, Tao Zheng, Nan Li, Qingke Shi, Xuejun Zhuo, Renxin Ding, and Yong Huang. "Big Data Health Care Platform With Multisource Heterogeneous Data Integration and Massive High-Dimensional Data Governance for Large Hospitals: Design, Development, and Application." JMIR Medical Informatics 10, no. 4 (April 13, 2022): e36481. http://dx.doi.org/10.2196/36481.

Full text
Abstract:
Background With the advent of data-intensive science, a full integration of big data science and health care will bring a cross-field revolution to the medical community in China. The concept big data represents not only a technology but also a resource and a method. Big data are regarded as an important strategic resource both at the national level and at the medical institutional level, thus great importance has been attached to the construction of a big data platform for health care. Objective We aimed to develop and implement a big data platform for a large hospital, to overcome difficulties in integrating, calculating, storing, and governing multisource heterogeneous data in a standardized way, as well as to ensure health care data security. Methods The project to build a big data platform at West China Hospital of Sichuan University was launched in 2017. The West China Hospital of Sichuan University big data platform has extracted, integrated, and governed data from different departments and sections of the hospital since January 2008. A master–slave mode was implemented to realize the real-time integration of multisource heterogeneous massive data, and an environment that separates heterogeneous characteristic data storage and calculation processes was built. A business-based metadata model was improved for data quality control, and a standardized health care data governance system and scientific closed-loop data security ecology were established. Results After 3 years of design, development, and testing, the West China Hospital of Sichuan University big data platform was formally brought online in November 2020. It has formed a massive multidimensional data resource database, with more than 12.49 million patients, 75.67 million visits, and 8475 data variables. Along with hospital operations data, newly generated data are entered into the platform in real time. Since its launch, the platform has supported more than 20 major projects and provided data service, storage, and computing power support to many scientific teams, facilitating a shift in the data support model—from conventional manual extraction to self-service retrieval (which has reached 8561 retrievals per month). Conclusions The platform can combine operation systems data from all departments and sections in a hospital to form a massive high-dimensional high-quality health care database that allows electronic medical records to be used effectively and taps into the value of data to fully support clinical services, scientific research, and operations management. The West China Hospital of Sichuan University big data platform can successfully generate multisource heterogeneous data storage and computing power. By effectively governing massive multidimensional data gathered from multiple sources, the West China Hospital of Sichuan University big data platform provides highly available data assets and thus has a high application value in the health care field. The West China Hospital of Sichuan University big data platform facilitates simpler and more efficient utilization of electronic medical record data for real-world research.
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Hsiu-An, Hsin-Hua Kung, Jai Ganesh Udayasankaran, Boonchai Kijsanayotin, Alvin B Marcelo, Louis R. Chao, and Chien-Yeh Hsu. "An Architecture and Management Platform for Blockchain-Based Personal Health Record Exchange: Development and Usability Study." Journal of Medical Internet Research 22, no. 6 (June 9, 2020): e16748. http://dx.doi.org/10.2196/16748.

Full text
Abstract:
Background Personal health record (PHR) security, correctness, and protection are essential for health and medical services. Blockchain architecture can provide efficient data retrieval and security requirements. Exchangeable PHRs and the self-management of patient health can offer many benefits to traditional medical services by allowing people to manage their own health records for disease prevention, prediction, and control while reducing resource burdens on the health care infrastructure and improving population health and quality of life. Objective This study aimed to build a blockchain-based architecture for an international health record exchange platform to ensure health record confidentiality, integrity, and availability for health management and used Health Level 7 Fast Healthcare Interoperability Resource international standards as the data format that could allow international, cross-institutional, and patient/doctor exchanges of PHRs. Methods The PHR architecture in this study comprised 2 main components. The first component was the PHR management platform, on which users could upload PHRs, view their record content, authorize PHR exchanges with doctors or other medical health care providers, and check their block information. When a PHR was uploaded, the hash value of the PHR would be calculated by the SHA-256 algorithm and the PHR would be encrypted by the Rivest-Shamir-Adleman encryption mechanism before being transferred to a secure database. The second component was the blockchain exchange architecture, which was based on Ethereum to create a private chain. Proof of authority, which delivers transactions through a consensus mechanism based on identity, was used for consensus. The hash value was calculated based on the previous hash value, block content, and timestamp by a hash function. Results The PHR blockchain architecture constructed in this study is an effective method for the management and utilization of PHRs. The platform has been deployed in Southeast Asian countries via the Asia eHealth Information Network (AeHIN) and has become the first PHR management platform for cross-region medical data exchange. Conclusions Some systems have shown that blockchain technology has great potential for electronic health record applications. This study combined different types of data storage modes to effectively solve the problems of PHR data security, storage, and transmission and proposed a hybrid blockchain and data security approach to enable effective international PHR exchange. By partnering with the AeHIN and making use of the network’s regional reach and expert pool, the platform could be deployed and promoted successfully. In the future, the PHR platform could be utilized for the purpose of precision and individual medicine in a cross-country manner because of the platform’s provision of a secure and efficient PHR sharing and management architecture, making it a reasonable base for future data collection sources and the data analytics needed for precision medicine.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "220302 Electronic information storage and retrieval services"

1

Hall, Shirley L. "Information processing instruction in Virginia Community Colleges." Thesis, Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/94455.

Full text
Abstract:
This was a study of the information processing instruction in Virginia Community Colleges. The purposes of the study were (a) to obtain baseline information about the information processing instruction programs, and (b) to evaluate the information processing programs using the information processing"content" portion of the Standards for Excellence in Business Education. The respondents in the study were secretarial science program directors in the Virginia community colleges. Responses to the survey instrument were received from 22 of the 32 mailed (69%). For the responding institutions, 2314 students were enrolled in courses that involve word processing. Sixty-six percent of the students were younger than 25. There were 57 instructors of information processing in the community colleges; two male and 55 female. Fifteen were full time, 42 part-time. Six of the faculty had doctor's degrees, 42 had master's degrees, six had bachelor's degrees. Of the 419 computers used for word processing, over one-half were IBM compatible. In addition, 106 dedicated word processors were in use. WordStar computer software was used by one-half of the community colleges. Other software most used included WordPerfect and Display Write. Word processing was the most-offered secretarial science course. The secretarial science program directors rated their information processing instruction programs to"meet" or"exceed the standard" in 112 of the 113 items in the"content" portion of the Standards published by the U. S. Department of Education. The one item that was rated"below standard" was an item dealing with data communications instruction. The Standards items were divided into 12 subtopics. The subtopic to receive the highest rating was"Employability Traits and Attitudes." The subtopic to receive the lowest rating was"Computer Programming."
M.S.
APA, Harvard, Vancouver, ISO, and other styles
2

Georgiou, Andrew. "The organisational and communication implications of electronic ordering systems for hospital pathology services." University of Sydney, 2009. http://hdl.handle.net/2123/4653.

Full text
Abstract:
Doctor of Philosophy
Computerised Provider Order Entry (CPOE) systems provide clinicians with the ability to electronically enter hospital orders for laboratory tests and services. CPOE is able to integrate with hospital information systems and provide point of care decision support to users thereby making a potentially significant contribution to the efficiency and effectiveness of care delivery. The evidence of the impact of CPOE systems on pathology services is not extensive and insufficient attention has been paid to their effect on organisational and communication processes. This thesis aimed to investigate the implications of CPOE systems for pathology laboratories, their work processes and relationships with other hospital departments, using comparative examinations to identify the tasks they are involved in and the particular needs the laboratories expect to be filled by the new system. This longitudinal study of a CPOE system was carried out over three years using multiple cases from a hospital pathology service based at a large Sydney teaching hospital. Multi-methods using quantitative and qualitative data were employed to achieve triangulation of data, theory and methods. The findings provide evidence of a significant 14.3% reduction of laboratory turnaround times from 42 to 36 minutes when laboratory data for two months were compared before and after CPOE implementation. The findings also reveal changes in the pattern and organisation of information communication, highlighting transformations in the way that work is planned, negotiated and synchronised. These findings are drawn together in a comprehensive organisational communication framework that is highly relevant for developing a contingent and situational understanding of the impact of CPOE on pathology services.
APA, Harvard, Vancouver, ISO, and other styles
3

Wagner, Pamela Jean, and Christal June Quam. "Electronic access to academic records by Department of Children's Services social workers." CSUSB ScholarWorks, 2003. https://scholarworks.lib.csusb.edu/etd-project/2184.

Full text
Abstract:
The purpose of this study was to examine whether or not DCS social workers would obtain client's educational records if they had electronic access to these records. If a social worker could access client school records quickly and easily and then enter the information into the case management computer system, the school history would travel with the client to their new environment. This information would insure that the foster child with special education needs was placed in the proper classroom, giving the child a better chance to succeed.
APA, Harvard, Vancouver, ISO, and other styles
4

Xiong, Li. "Resilient Reputation and Trust Management: Models and Techniques." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7483.

Full text
Abstract:
The continued advances in service-oriented computing and global communications have created a strong technology push for online information sharing and business transactions among enterprises, organizations and individuals. While these communities offer enormous opportunities, they also present potential threats due to a lack of trust. Reputation systems provide a way for building trust through social control by harnessing the community knowledge in the form of feedback. Although feedback-based reputation systems help community participants decide who to trust and encourage trustworthy behavior, they also introduce vulnerabilities due to potential manipulations by dishonest or malicious players. Therefore, building an effective and resilient reputation system remains a big challenge for the wide deployment of service-oriented computing. This dissertation proposes a decentralized reputation based trust supporting framework called PeerTrust, focusing on models and techniques for resilient reputation management against feedback aggregation related vulnerabilities, especially feedback sparsity with potential feedback manipulation, feedback oscillation, and loss of feedback privacy. This dissertation research has made three unique contributions for building a resilient decentralized reputation system. First, we develop a core reputation model with important trust parameters and a coherent trust metric for quantifying and comparing the trustworthiness of participants. We develop decentralized strategies for implementing the trust model in an efficient and secure manner. Second, we develop techniques countering potential vulnerabilities associated with feedback aggregation, including a similarity inference scheme to counter feedback sparsity with potential feedback manipulations, and a novel metric based on Proportional, Integral, and Derivative (PID) model to handle strategic oscillating behavior of participants. Third but not the least, we develop privacy-conscious trust management models and techniques to address the loss of feedback privacy. We develop a set of novel probabilistic decentralized privacy-preserving computation protocols for important primitive operations. We show how feedback aggregation can be divided into individual steps that utilize above primitive protocols through an example reputation algorithm based on kNN classification. We perform experimental evaluations for each of the schemes we proposed and show the feasibility, effectiveness, and cost of our approach. The PeerTrust framework presents an important step forward with respect to developing attack-resilient reputation trust systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Ani, Okon Edet. "Accessibility and utilization of electronic information resources for research and its effect on productivity of academic staff in selected Nigerian universities between 2005 and 2012." Thesis, 2013. http://hdl.handle.net/10500/13057.

Full text
Abstract:
The study investigated the effect of accessibility and utilization of electronic resources by academic staff on productivity at the University of Calabar and the University of Ibadan, Nigeria. In order to determine the effect of accessibility and utilization of e-resources on productivity of academic staff, a lone hypothesis was formulated thus: there is no significant correlation between accessibility and utilization of e-resources and productivity of academic staff in Nigerian universities. The study adopted quantitative approach as research paradigm; with survey and bibliometrics as research methods. Questionnaire was used as the primary instrument for data collection on accessibility and utilization of e-resources and productivity of academic staff in the study. The population of 2035 academic staff and sample size of 586 academic staff were used for the study, and a response rate of 55.29% was obtained for data analysis. The data for the study were analysed with SPSS. The finding of the study revealed that there is significant correlation between accessibility and utilization of e-resources and productivity of academic staff at the surveyed universities (r=0.135; p=0.004), especially at the level of international publication (r=0.158; p=0.004). The study concluded that there is a positive effect due to accessibility and utilization of e-resources on productivity at the surveyed universities. Further findings of the study revealed a low level of electronic information environment at the surveyed universities in relation to global practices; although, the University of Ibadan was found to have a better electronic information environment than the University of Calabar. The result from questionnaire survey revealed that the University of Calabar was more productive than the University of Ibadan; the converse was obtained with bibliometric analysis as the University of Ibadan was found to be more productive than the University of Calabar. From the findings of the study the influence of demographic variables (discipline, gender, age, education and professional rank) on accessibility and utilization of e-resources was not significant at the surveyed universities. The study recommended increased investment in ICT facilities at the surveyed universities to promote increase in accessibility and utilization of e-resources by academic staff in research.
Information Science
D.Litt et. Phil. (Information Science)
APA, Harvard, Vancouver, ISO, and other styles
6

Nevhutalu, Ntsako Fikile. "Improving patient referral processes through electronic health record system : a case study of rural hospitals in Limpopo province." Diss., 2013. http://hdl.handle.net/10500/14352.

Full text
Abstract:
In the last decade, the deployment of Electronic Health Records has increased tremendously in many developed countries. This increasing trend intensifies the need for developing countries like South Africa to implement electronic health record systems in state owned hospitals to facilitate e-referral processes to improve health care delivery. The aim of this research was to investigate the current process of patient record keeping, management, and the referral process of patients within the same hospital and to other hospitals and based on the findings compile an Electronic Health Record (EHR) framework to facilitate e- referral processes. This research study was based on a qualitative case study approach. A multiple data collection technique was used which included group interviews, questionnaires, document analysis and informal discussions with the hospital workers. Data were analysed by categorization and thematic approach. The findings obtained from state hospitals indicated that there is no EHR system which accommodates patient health record systems to facilitate e-referral processes. These findings led to a compilation of the Limpopo Electronic Health Record System (LEHRS) to aid e-referral processes in state hospitals. The increasing need for accurate, reliable, available and accessible EHR will be addressed by the implementation of LEHRS as information will be stored in a central database in a useable format and will be easily accessed.
Computing
M. Tech. (Information Technology)
APA, Harvard, Vancouver, ISO, and other styles
7

Chuma, Kabelo Given. "Security of electronic personal health information in a public hospital in South Africa." Diss., 2020. http://hdl.handle.net/10500/27239.

Full text
Abstract:
The adoption of digital health technologies has dramatically changed the healthcare sector landscape and thus generates new opportunities to collect, capture, store, access and retrieve electronic personal health information (ePHI). With the introduction of digital health technologies and the digitisation of health data, an increasing number of hospitals and peripheral health facilities across the globe are transitioning from a paper-based environment to an electronic or paper-light environment. However, the growing use of digital health technologies within healthcare facilities has caused ePHI to be exposed to a variety of threats such as cyber security threats, human-related threats, technological threats and environmental threats. These threats have the potential to cause harm to hospital systems and severely compromise the integrity and confidentiality of ePHI. Because of the growing number of security threats, many hospitals, both private and public, are struggling to secure ePHI due to a lack of robust data security plans, systems and security control measures. The purpose of this study was to explore the security of electronic personal health information in a public hospital in South Africa. The study was underpinned by the interpretivism paradigm with qualitative data collected through semi-structured interviews with purposively selected IT technicians, network controllers’, administrative clerks and records management clerks, and triangulated with document and system analysis. Audio-recorded interviews were transcribed verbatim. Data was coded and analysed using ATLAS.ti, version 8 software, to generate themes and codes within the data, from which findings were derived. The key results revealed that the public hospital is witnessing a deluge of sophisticated cyber threats such as worm viruses, Trojan horses and shortcut viruses. This is compounded by technological threats such as power and system failure, network connection failure, obsolete computers and operating systems, and outdated hospital systems. However, defensive security measures such as data encryption, windows firewall, antivirus software and security audit log system exist in the public hospital for securing and protecting ePHI against threats and breaches. The study recommended the need to implement Intrusion Protection System (IPS), and constantly update the Windows firewall and antivirus program to protect hospital computers and networks against newly released viruses and other malicious codes. In addition to the use of password and username to control access to ePHI in the public hospital, the study recommends that the hospital should put in place authentication mechanisms such as biometric system and Radio Frequency Identification (RFID) system restrict access to ePHI, as well as to upgrade hospital computers and the Patient Administration and Billing (PAAB) System. In the absence of security policy, there is a need for the hospital to put in place a clear written security policy aimed at protecting ePHI. The study concluded that healthcare organisations should upgrade the security of their information systems to protect ePHI stored in databases against unauthorised access, malicious codes and other cyber-attacks.
Information Science
M. Inf. (Information Security)
APA, Harvard, Vancouver, ISO, and other styles
8

Ludwick, Dave. "What is the effect of information and computing technology on healthcare?" Phd thesis, 2009. http://hdl.handle.net/10048/703.

Full text
Abstract:
Thesis (Ph.D.)--University of Alberta, 2009.
A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Engineering Management, Department of Mechanical Engineering. Title from pdf file main screen (viewed on October 23, 2009). Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
9

Cottrell, Genevieve Lee. "The development of a reference database of health information resources to facilitate informed lifestyle choice." Thesis, 2008. http://hdl.handle.net/10500/2018.

Full text
Abstract:
This study investigates, within the current health care situation, the interrelationship of the user, resources and tool in the design of a prototype WELLNESS database-driven web site. A shift has taken place in health care, in which the base of conventional medicine has broadened to integrate other systems, practices and worldviews. These include complementary and alternative medicine, health promotion, disease prevention and wellness. Emphasis is placed on the need to take personal responsibility for one's own health and wellness. The global burden of chronic disease, reaching epidemic proportions, is increasingly linked to risk factors resulting from personal lifestyle choices. The growing evidence of the user's need to make personal, informed, lifestyle choices and their reliance on the Web for health information, required investigation. WELLNESS, a specific orientation to health and wellness, formed the framework within which the user and resources were defined and the tool designed. The user was profiled as the WELLNESS health information seeker, hereby contributing significantly to an understanding of the user in this new context. The user profile informed the establishment of resource selection criteria and tool design. The identification of WELLNESS content selection criteria, within a five-dimensional model, was required to ensure quality, relevant and credible resources. The tool is comprised of the WELLNESS thesaurus and WELLNESS database-driven web site. The WELLNESS thesaurus was constructed based on a combination of relevant thesauri. It will be used as an indexing tool. An investigation of existing health information web sites highlighted the importance of designing a specific WELLNESS database-driven web site. A database host was identified against which the original study's conceptual schema was assessed. A low-fidelity prototype web site was designed as the interface between the WELLNESS health information seeker and the database of WELLNESS health information resources. This study has epidemiological, philosophical, epistemological, sociological and psychological relevance. The provision of access to WELLNESS health information resources, made available in the WELLNESS database-driven web site, for personal, informed lifestyle choice by the WELLNESS health information seeker could potentially contribute to the reduction of the global burden of chronic disease.
Information Science
D.Litt. et Phil. (Information Science)
APA, Harvard, Vancouver, ISO, and other styles
10

Gadabu, Oliver Jintha. "Prescribing cotrimoxazole prophylactic therapy (CPT) before and after an electronic medical record system implementation in two selected hospitals in Malawi." Diss., 2013. http://hdl.handle.net/10500/14404.

Full text
Abstract:
Opportunistic infections (OIs) have been identified as a leading cause of poor outcomes in the ARV therapy (ART) programme. In order to reduce OIs, the Malawi, MoH introduced routine prescription of cotrimoxazole preventive therapy (CPT) in 2005. The MoH also started scaling up a point-of-care electronic medical record (EMR) system in 2007 to improve monitoring and evaluation. This study had the following objectives: i) to quantify prescription of CPT before and after implementing EMR; ii) to compare the difference in CPT prescription before and after implementing EMR. A historically controlled study design was used to compare CPT prescriptions one year before, and one year after implementation of the EMR at two health facilities. The data indicated that there was a significant (P <0.001) decrease in CPT prescribing at one health facility and a significant increase in CPT prescription at another.
Health Studies
M.A. (Public Health)
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "220302 Electronic information storage and retrieval services"

1

F, Schantz Herbert, ed. Document management: New technologies for the information services manager. London: Bowker Saur, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Food and Nutrition Information Center (U.S.) and National Agricultural Library (U.S.), eds. Electronic sources for food and nutrition information. Beltsville, Md. (10301 Baltimore Boulevard, Beltsville 20705-2351): Food and Nutrition Information Center, National Agricultural Library, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Infomania: The guide to essential electronic services. Boston: Houghton Mifflin, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wasik, John F. The electronic business information sourcebook. New York: Wiley, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

E-resources and digital services. New Delhi: Ess Ess Publications, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Semantic interoperability of distributed geo-services. Enschede, The Nethrlands: ITC, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stewart, Janet M. Electronic sources of information for business in Australia. Melbourne: Royal Melbourne Institute of Technology, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Smith, Pamela Ann. Information technology in the Middle East. London: Economist Intelligence Unit, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Information technology in the Middle East. London: Economist Intelligence Unit, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

A, Steinke Cynthia, ed. Electronic information systems in sci-tech libraries. New York: Haworth Press, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "220302 Electronic information storage and retrieval services"

1

T.M., Kalpana, and S. Gopalakrishnan. "Green Economic and Secure Libraries on Cloud." In Web-Based Services, 945–63. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9466-8.ch042.

Full text
Abstract:
Libraries are considered storehouses of knowledge in the form of books and other resources. Introduction of computers and information and communication technology paved the way for resources in electronic format. Hence, storage of library resources is categorized in two ways namely physical storage and electronic storage. The advantages of e-format are multiple users, increasing availability of free resource, sharing, storing, accessibility, retrieval, flexibility, compatibility, and so forth. As an evolutionary change in adapting to the electronic dissemination, electronic data can be stored virtually, externally, and retrieved in cloud computing. For cloud storage users, service providers and tools are considered as major components of the service architecture. Tool connects cloud storage server and thin client platform through the Internet. Green computing and green production technology are utilizing minimum resources and maximum production in an eco-friendly way. Data warehousing is collection of data, categorizing, filtering, eliminating replica data, format compatibility; security of data retrieval gives economic storage of files. Warehoused data with extract, transform, and load (ETL) tools are retrieved by data mining. This chapter discusses various architecture, service providers, models of service, certifications, billing models, security issues, solutions to security issues and eco-friendly economic storage.
APA, Harvard, Vancouver, ISO, and other styles
2

Kehinde, Adetola. "Digital Libraries and the Role of Digital Librarians." In Research Anthology on Collaboration, Digital Services, and Resource Management for the Sustainability of Libraries, 17–38. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8051-6.ch002.

Full text
Abstract:
This chapter presents a holistic view of digital libraries and the role of digital librarians. Technological changes and the use of electronic storage and retrieval information systems have changed the way students and researchers are able to access, retrieve and use information. Key topics presented in the chapter include the concept of digitization, reasons for digitization, definitions of digital library, features of digital library, characteristics of digital libraries, advantages and disadvantages of digital library, collection development and content creation, digital librarianship, role of librarians in digital libraries, issues of concern to digital librarians, process of digitization of library resources, digital library components, and digital rights management.
APA, Harvard, Vancouver, ISO, and other styles
3

Rastogi, Etika, Kajal Gupta, and Mukesh Rawat. "Automatic Suggestion Model for Tourist Using Efficient BST Searching." In Recent Developments in Artificial Intelligence and Communication Technologies, 1–17. BENTHAM SCIENCE PUBLISHERS, 2022. http://dx.doi.org/10.2174/9781681089676122010003.

Full text
Abstract:
The traditional artificial guide service can be substituted by the advancedintelligent tourism guide system, which can help many developing tourism industries asthe demand for tourism is going higher in today's world. An intelligent tourism guidesystem can create automatic recommendations according to the preferences [1]. Withthe instantaneous evolution of computer technology and electronic informationtechnology as the basis, this chapter combines the tree-based algorithm and associatedknowledge of tree theory to implement an algorithm and processing plan. The objectiveof our approach is to build a relationship between the user and the system. Theapplication provides many services to the user meeting their needs and the purpose ofgaining information about the places. The application mainly represents a mobile tourguide system with augmented reality. The main objective of the application is to makea system that runs on most of the mobile devices and becomes helpful to the user whilevisiting new places. The system should find a place using user preferences, likebeaches, historical monuments, hill stations, temples, adventurous places, etc. Thesystem should show recommendations about those places along with the descriptionand images. This application will help the people who love to travel and want to travelto new places without having previous information about the place. This model [2-5]makes the use of efficient BST Searching as compared to the database. The informationabout various places is stored in the tree data structure, and it becomes easy to store alot of data in the tree as compared to the database because it requires more memory andtime to store lots of information into the database. The main advantage of using thesystem is to make the searching process easier and to ease the process of storing thedata in the tree rather than the database. The tree-based algorithm is efficient in termsof storage and retrieval of data so that the performance of the system is enhanced. Theapplication takes less time to fetch the data using a tree-based algorithm according toadded preferences by the user as compared to the database, which takes more time tofetch the data and to display it as required.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography