Journal articles on the topic 'Information systems philosophy, research methods and theory'

To see the other types of publications on this topic, follow the link: Information systems philosophy, research methods and theory.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information systems philosophy, research methods and theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Li, Guowu. "Information Philosophy in China: Professor Wu Kun’s 30 Years of Academic Thinking in Information Philosophy." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (October 30, 2011): 316–21. http://dx.doi.org/10.31269/triplec.v9i2.279.

Full text
Abstract:
Professor Wu Kun, from Xi'an Jiaotong University of China, has been studying information philosophy for 30 years. He thinks information conception is one of the most fundamental areas in philosophy and has founded information philosophy. He has done original and pioneering research in information ontology, epistemology, social information theory, information production theory, information evolution theory, information value, and information thinking directions. He is the first scholar to develop a completely new view of theories, systems, and methods about information philosophy.
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Guowu. "Information Philosophy in China: Professor Wu Kun’s 30 Years of Academic Thinking in Information Philosophy." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (October 30, 2011): 316–21. http://dx.doi.org/10.31269/vol9iss2pp316-321.

Full text
Abstract:
Professor Wu Kun, from Xi'an Jiaotong University of China, has been studying information philosophy for 30 years. He thinks information conception is one of the most fundamental areas in philosophy and has founded information philosophy. He has done original and pioneering research in information ontology, epistemology, social information theory, information production theory, information evolution theory, information value, and information thinking directions. He is the first scholar to develop a completely new view of theories, systems, and methods about information philosophy.
APA, Harvard, Vancouver, ISO, and other styles
3

Breu, Karin, and Joe Peppard. "Useful Knowledge for Information Systems Practice: The Contribution of the Participatory Paradigm." Journal of Information Technology 18, no. 3 (September 2003): 177–93. http://dx.doi.org/10.1080/0268396032000122141.

Full text
Abstract:
Information systems research has become methodologically pluralistic, not least in the hope of achieving greater relevance of scholarly output to practice. Although interventionist approaches have considerable potential for bridging the theory–practice gap, they are dismissed as unscientific because of the purported absence of a philosophical foundation that would justify the interactive research process and the co-productive relationships between researchers and practitioners that are so defining of this type of inquiry. The intention in this paper is to demonstrate that philosophical foundations for interventionist research strategies do exist. This task is pursued by the introduction of the participatory worldview, as articulated in the fields of sociology, philosophy and organization studies. The paper shows its distinctness to other, non-positivist paradigms, describes the participatory research process, presents participatory inquiry methods and extrapolates the distinctness of the knowledge they produce. The application of its paradigmatic principles is illustrated through an empirical example of a participatory research programme and the challenges that this approach presents for research practice are indicated. … most of our knowledge, and all our primary knowledge, arises as an aspect of activities that have practical, not theoretical objectives; and it is this knowledge, itself an aspect of action, to which all reflective theory must refer. (Macmurray, 1957, p. 12)
APA, Harvard, Vancouver, ISO, and other styles
4

Lea French, Rebecca, and Kirsty Williamson. "The information practices of welfare workers." Journal of Documentation 72, no. 4 (July 11, 2016): 737–54. http://dx.doi.org/10.1108/jdoc-08-2015-0100.

Full text
Abstract:
Purpose – The purpose of this paper is to explore the nature of information practices of welfare workers and how they fit into daily work of welfare work within a small community sector organisation in Victoria, Australia. Design/methodology/approach – The study was constructivist (interpretivist) in its underpinning philosophy, drawing on both personal constructivist and social constructionist theories. The research methods used, with a sample of 14 welfare workers and two clients, were organisational ethnography and grounded theory. Data collection techniques were interview and participant observation, along with limited document analysis. Data analytic techniques, drawn from grounded theory method, provided a thorough way of coding and analysing data, and also allowed for the development of theory. Findings – Key findings centre on the role of information in welfare work. Welfare workers mostly used resources to hand, “making do” with resources they already had rather than seeking new ones. They also recombined or re-purposed existing resources to make new resources or to suit new circumstances. Their information practices were found to be fluid, consultative and collaborative. The findings of the research have led to a deep exploration of bricolage as a way to describe both the use of resources and the processes inherent in welfare worker information practices. Originality/value – The fact that there is a paucity of research focused on information practices of welfare workers in Australia makes the research significant. The bricolage theoretical framework is an original contribution which has implications for exploring other groups of workers and for the design of information systems and technology.
APA, Harvard, Vancouver, ISO, and other styles
5

Zeynali-Tazehkandi, Mahdi, and Mohsen Nowkarizi. "A Dialectical Approach to Search Engine Evaluation." Libri 70, no. 3 (September 25, 2020): 227–37. http://dx.doi.org/10.1515/libri-2019-0142.

Full text
Abstract:
AbstractEvaluation of information retrieval systems is a fundamental topic in Library and Information Science. The aim of this paper is to connect the system-oriented and the user-oriented approaches to relevant philosophical schools. By reviewing the related literature, it was found that the evaluation of information retrieval systems is successful if it benefits from both system-oriented and user-oriented approaches (composite). The system-oriented approach is rooted in Parmenides’ philosophy of stability (immovable) which Plato accepts and attributes to the world of forms; the user-oriented approach is rooted in Heraclitus’ flux philosophy (motion) which Plato defers and attributes to the tangible world. Thus, using Plato’s theory is a comprehensive approach for recognizing the concept of relevance. The theoretical and philosophical foundations determine the type of research methods and techniques. Therefore, Plato’s dialectical method is an appropriate composite method for evaluating information retrieval systems.
APA, Harvard, Vancouver, ISO, and other styles
6

Adriaenssen, Daniel Joh, and Jon-Arild Johannessen. "Developing a general scientific methodology on tenets from Mario Bunges philosophy." Kybernetes 45, no. 4 (April 4, 2016): 622–36. http://dx.doi.org/10.1108/k-02-2015-0039.

Full text
Abstract:
Purpose – The purpose of this paper is to present a general scientific methodology on tenets from Mario Bunge’s philosophy. Design/methodology/approach – Systemic thinking and conceptual generalisation. Findings – A general scientific methodology based on tenets from Mario Bunge’s philosophy of social science. Research limitations/implications – Using quantitative methods to conduct a research to test Asplunds motivation theory and North’s action theory. Practical implications – How to conduct a research based on a systemic perspective. Social implications – An advantage of linking a systemic perspective to organisational psychology studies is that it may result in new ways of looking at old problems and bring new perspectives to the methods used. One explanation may be the fact that while researchers within various organisational psychology subject fields are largely specialists, the systemic perspective is oriented towards general scientific methodology. Originality/value – The authors have not seen anybody who have tried to apply systemic thinking as a general methodology for research.
APA, Harvard, Vancouver, ISO, and other styles
7

Shevchenko, Svitlana, Pavlo Skladannyi, Olena Nehodenko, and Vitalii Nehodenko. "STUDY OF APPLIED ASPECTS OF CONFLICT THEORY IN SECURITY SYSTEMS." Cybersecurity: Education, Science, Technique 2, no. 18 (2022): 150–62. http://dx.doi.org/10.28925/2663-4023.2022.18.150162.

Full text
Abstract:
The problem of conflicts and conflict situations has always been in the center of attention of scientists, first of all, sociologists. However, the current state of these theories includes a large number of currents in various fields of knowledge. We meet them in history, philosophy, psychology, jurisprudence, biology, medicine, pedagogy, cultural studies, economics, military affairs, technical systems, in particular in security and cyber security systems. In addition, there are attempts to apply a mathematical apparatus for modeling and solving certain issues in the decision-making process. This determines the relevance of this study, which is devoted to the analysis of ways of introducing the theoretical foundations of the theory of conflicts into the information security system. The article analyzes the views of scientists regarding the application of conflict theory in various sciences and disciplines. A review of literary sources in the context of the theory of conflicts in information systems was carried out, the definition of "information conflict" and its characteristics were highlighted. It is justified to carry out research through the interaction of the planes of the theory of conflict theory and the theory of information and cybernetic security in three perspectives: "subject - subject" or "person - person"; "subject - object" or "man - machine"; "object - object" or "machine - machine". To determine the main characteristics of conflicts in security systems, the general structure and stages of conflicts were highlighted. The structure of conflicts in security systems includes the definition of boundaries; state and activity variables; causal relationships and feedback; several interconnected subsystems; conflict delay (or conflict resolution). The following stages are distinguished in the dynamics of the conflict: emergence of a conflict situation; latent stage; active stage; stage of ending the conflict. In the process of conflict management in information security, the opportunity to apply analytical methods is outlined: differential equations, decision-making theory, operations research, and game theory. This study is an introduction to the theory of conflicts in security systems and can be used in the educational process of students of the specialty 125 Cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
8

Nahotko, Marek. "Application of Interdisciplinary Theory of Genres in LIS." Zagadnienia Informacji Naukowej - Studia Informacyjne 58, no. 1A(115A) (November 20, 2020): 57–74. http://dx.doi.org/10.36702/zin.723.

Full text
Abstract:
Purpose/Thesis: The article presents the possibilities of using the interdisciplinary theory of genres, developed in the study of linguistics, literary studies, rhetoric, sociology, philosophy, psychology and other disciplines, in library and information science (LIS). The article argues the application of genre theory to LIS offers a new and interesting interdisciplinary perspective.Approach/Methods: A critical analysis of the literature on the subject introduces the basic premises of the interdisciplinary theory of text/information genres in its historical development in the world and in Poland. A similar method was used to present the most important directions genre theory opens to LIS.Results and conclusions: Before genre theory was first applied to LIS, it was developed in disciplines such as linguistics, literature, rhetoric, communication and media, discourse analysis, sociology, pedagogy and others and in many countries on all continents (mainly in the USA, Australia, Brazil and Scandinavian countries). The theory’s success is a result of its interdisciplinary development, beginning from linguistic and classical rhetorical genres approach and problems of categorizing texts to “de facto genres” and their function in everyday communication activities (social/rhetoric approach). Applied to LIS, it frames information objects as social constructs whose meaning is constructed in social discourse, driven by genre knowledge. The library and other information systems should be treated as a social communication activity in the recurrent situation of organizing and retrieving information. It means that the work of a librarian (or other information organizers) involves rhetorical activity of creating information objects, as does the work of other information creators, e.g. authors of scholarly publications. The functioning of information system, i.e. production and organization of textual information should be investigated using methods applied in other disciplines, especially humanities and social sciences, as it allows for a broader research perspective.Originality/Value: The article describes the possibilities of applying genre theory in LIS research, which still do not receive the attention they merit. A wider knowledge of the genre theory would make possible collaborative research involving scholars of other disciplines such as linguistics and sociology.
APA, Harvard, Vancouver, ISO, and other styles
9

Adriaenssen, Daniel J., and Jon-Arild Johannessen. "Paradigms in information science." Kybernetes 45, no. 1 (January 11, 2016): 51–69. http://dx.doi.org/10.1108/k-01-2015-0028.

Full text
Abstract:
Purpose – The purpose of this paper is the conceptual expansion of the science-theoretical foundations of information science, i.e. to develop new thought schemes for information science. Design/methodology/approach – The design of the paper is as follows: first, the paper will discuss the foundation of the systemic paradigm (SP). Then the authors will consider the history of information science related to the philosophy of science. In the remaining part of the paper, the authors will investigate information science and its relation to the philosophy of science, focusing on SP. Findings – In conclusion, the authors will summarise the seven criteria for the application of SP in information science. Research limitations/implications – Paradigms in information science have rarely reflected upon the use of a SP in information science. Practical implications – The practical use of the seven criteria in information science Criterion 1: make your premises, suppositions, prerequisites and motives explicit. Criterion 2: make your moral/ethical results and consequences explicit. Criterion 3: research should be evaluated in relation to the transcendence of knowledge. Criterion 4: emphasise methodical pluralism, i.e. empirical generalisations and conceptual generalisations. Criterion 5: emphasise proximity and in-depth studies. Criterion 6: look for patterns and patterns which combine. Criterion 7: look for the power behind the patterns. Social implications – The opinion is that scientists to a great extent should seek knowledge on the basis of a belief, a specific way of thinking, and by means of specific methods. To make the authors belief explicit makes the way of thinking visible. What the authors achieve, and possibly the only thing the authors can achieve, is to reaffirm the conscious belief. This does not make reality more real, but it could put the authors in a better position to see through the authors way of thinking when faced with scientific problems. This indicates that a scientific study should emphasise all three entities: “The Context of Discovery”, “The Context of Justification” and “The Context of Solution”. These three entities, according to SP, make up the unity of the scientific process. Originality/value – The seven criteria entail that Kuhn’s argumentative chain (where he tries to find out why theory A is preferred to theory B on a rational pretext) does not concur with SP. This indicates that a scientific study should emphasise all three entities: “The Context of Discovery”, “The Context of Justification” and “The Context of Solution”. These three entities, according to SP, make up the unity of the scientific process.
APA, Harvard, Vancouver, ISO, and other styles
10

Pushkar, Mikhail. "The concept of the information field in the development of accounting science." Herald of Economics, no. 1 (June 1, 2022): 143. http://dx.doi.org/10.35774/visnyk2022.01.143.

Full text
Abstract:
Introduction. According to T. Kuhn’s theory of scientific revolutions, there are tendencies in modern accounting normative knowledge that lead to the accumulation of contradictions between the achievements of information sciences and imperfect practice of obtaining information resources for business. This indicates the need to develop a new accounting paradigm for the needs of post-industrial society.Goal is to develop a new concept of accounting science, in which the central place should belong to the theoretical basis formed on the basis of laws of philosophy, sociology, information theory, management theory, psychology, systems theory, expanding methods of collecting and processing business facts past, present, future position of the enterprise in a rapidly changing environment and adaptation to change, which contributes to its long- term existence.Research methods. The article uses not only those methods that are traditionally inherent in accounting, but also those borrowed from other sciences in order to expand the methodological apparatus of research accounting problems - the laws of dialectics, logic, historical and systematic methods, analysis, synthesis and more. The choice of methods involves the creation of the concept of management accounting based on the disclosure of the category of «information field» of the enterprise, which helps employees understand the management system, what additional information they need to manage and can generate for them accounting information service.The results of the author’s work are devoted to the problem of developing the structure of the concept of management accounting, as modern publications on this issue, in fact, are based on personal subjective ideas about management accounting models. Unfortunately, apart from general maxims regarding the organization and methods of accounting for costs and revenues in terms of structural units of the enterprise (cost centers), responsible persons (places or areas of responsibility), certain products and calculation methods, such publications do not provide any theoretical generalizations.It is time to develop, at least in the first version, the conceptual foundations of management accounting, given the typical structure of the information field, which can be adapted to the individual needs of specific enterprises.Perspectives for further research on the problems of management accounting are related to the definition of its boundaries and methods of regulation within the enterprise. This accounting should not be endowed with the prognostic function performed by strategic accounting in the controlling system. Its role is more modest - serving the information needs of managers of the operational level of management in real time.
APA, Harvard, Vancouver, ISO, and other styles
11

Nikolaieva, Sofiia Yu, and Tamara I. Koval. "ВИКОРИСТАННЯ ІНФОРМАЦІЙНО-КОМУНІКАЦІЙНИХ ТЕХНОЛОГІЙ ДЛЯ ФОРМУВАННЯ НАУКОВО-ДОСЛІДНИЦЬКОЇ КОМПЕТЕНТНОСТІ МАЙБУТНІХ ДОКТОРІВ ФІЛОСОФІЇ." Information Technologies and Learning Tools 70, no. 2 (April 27, 2019): 237. http://dx.doi.org/10.33407/itlt.v70i2.2739.

Full text
Abstract:
The article deals with the problem of the information and communication technologies (ICT) use for the scientific and research competency formation of the future doctors of philosophy (PhD) in specialty 011 "Educational, pedagogical sciences", specialization "Theory and teaching methods: Germanic / Romance languages". The analysis of approaches to the definition of the scientific research competency content and structure has been carried out. The research oriented general and special competencies set needed to the PhD in methodology of teaching foreign languages and cultures, which are formed mainly in the process of studying the academic disciplines "Methodology and the scientific research technologies in the methods of teaching foreign languages and cultures" and "Information technologies in scientific research practice" has been specified. It has also been determined that there is a certain difficulty in finding the optimal way of transferring knowledge from the field of ICT to the future PhD professionally oriented practical activity, which requires a well-grounded selection of cloud, multimedia, projection, information search, analytical research technologies and computer-based tools as a purpose of their study, and further use by postgraduate students at all stages of the dissertation preparation (design, information search, analytical-modeling, experimental-research, narrative, practical). The examples of the postgraduate students use of the Web-sites, blogs, Wiki, cloud services for data storage, scientific search systems, Smart-technologies, the Internet information resources, educational electronic editions and video services in the process of self-preparation for interactive lectures and practical classes in the discipline "Methodology and the scientific research technologies in the methods of teaching foreign languages and cultures" have been given.
APA, Harvard, Vancouver, ISO, and other styles
12

Horiashchenko, Yuliia H. "PHENOMENOLOGY OF INNOVATIVE DEVELOPMENT OF ENTREPRENEURSHIP." Economies' Horizons, no. 3(21) (September 27, 2022): 41–52. http://dx.doi.org/10.31499/2616-5236.3(21).2022.263569.

Full text
Abstract:
The material presented in the article in order of logical presentation and content reveals the author's approach to the phenomenology of innovative development of socio-economic systems. The article examines the phenomenon of innovative development in socio-economic and philosophical discourse. The main goal of the study is to improve the system-functional approach to the innovative development of entrepreneurship using the phenomenological method. The application of the phenomenological model is proposed for the development of quick management decisions at enterprises that face non-standard problems in conditions of incomplete information, in particular, those that produce innovations. The research is based on empirical and theoretical, as well as special methods, namely, description and observation (innovative development is considered as the result of a combination of intellectual resources and information), analysis and synthesis, abstraction, generalization, induction, deduction, explanation and classification (improved philosophical – economic understanding of innovative development of targeted (socio-economic) systems, including entrepreneurship, classification features and types of innovative development are given). The main theories of innovative development include the basic and latest provisions of the theory of social development, systemology, economic theory of information, constructive logico-mathematical theories, institutional and neo-institutional economic theory, structural functionalism, management theory, strategic, production and innovation management, theory of values and costs. Scientific approaches to the definition of the concept of «innovative development» were analyzed, and the author's interpretation of this concept was developed on this basis.The author's definition of the category «innovative development» and «philosophy of innovative development» is provided. Conceptual support for innovative development of entrepreneurship is systematized.
APA, Harvard, Vancouver, ISO, and other styles
13

Gai, Junyue. "Buffett’s Value Investment Theory Based on Improved DCF Model." Wireless Communications and Mobile Computing 2022 (August 1, 2022): 1–7. http://dx.doi.org/10.1155/2022/4293248.

Full text
Abstract:
With the development of global economy, the investment theory of capital market needs to be further developed in order to provide investors with various references in the process of value investment. Value theory is very important for international investors. Since Graham put forward the theory of value investment, he has always emphasized the importance of discounted cash flow model (DCF model) in investment evaluation. Therefore, the DCF model has great influence on investment. In order to provide some domestic investors with value-added analysis methods when investing, we will investigate the practical theory of improving the DCF model in extreme environment. Based on the theory of value investment, time series analysis is introduced to improve the DCF model. The improved DCF model can estimate the original value of an enterprise by combining the factors that affect the change of enterprise value. In the research of securities investment, considering that the existing DCF model based on the American capital market has some shortcomings in domestic capital market, it needs to be improved. To forecast the future cash flow, the time series analysis method should be used instead of the sales ratio method. American investor Warren Buffett’s philosophy and practice of value investment have been paid attention to and studied by the world. Value theory is a series of famous theories put forward by Graham and applied and developed by Buffett. By combining the improved DCF model with Buffett’s personal business experience, this paper analyzes and summarizes the relevant contents of Buffett’s value investment theory based on the improved DCF model and puts forward some suggestions worthy of reference for Chinese investors.
APA, Harvard, Vancouver, ISO, and other styles
14

Aeni, Safitri Nur, Edy Prihantoro, and Diana Sari. "FORMATION OF WOMEN'S BODY IMAGE IN THE “IMPERFECT” FILM FOR GENERATION Z IN INDONESIAN." Journal of Digital Media Communication 1, no. 1 (2022): 50–58. http://dx.doi.org/10.35760/dimedcom.2022.v1i1.6538.

Full text
Abstract:
“Imperfect” is one of the inspirational films for generation Z women in Indonesia today. The film is a medium to provide information and entertainment to the community. Films can provide education, knowledge, and entertainment for the audience so that they can influence the audience to change according to the film's purpose. This study aimed to determine the effect of exposure and information quality of “Imperfect” films on the body image formation of Indonesian Z-generation women. The research method used is quantitative research methods. The theory used is the theory of Uses and Gratification and the Theory of Social Comparison, which helps support body image formation. The results of the study indicate that there is an effect of exposure to “Imperfect” films and the quality of the film's information on the body image formation of Indonesian generation Z women. People who get information about the “Imperfect” film are interested in watching the film, in getting entertainment as well as information from the “Imperfect” film, especially the generation Z female group. Indonesia.
APA, Harvard, Vancouver, ISO, and other styles
15

Mahinda, Wamuyu. "Influence of Team Information Sharing on Collaborative Value Within Ashoka Fellows' Organizations in Africa." International Journal of Leadership and Governance 2, no. 2 (November 11, 2022): 1–16. http://dx.doi.org/10.47604/ijlg.1694.

Full text
Abstract:
Purpose: The study sought to determine the influence of team information sharing on collaborative value within Ashoka Fellows' Organizations in Africa Methodology: The study applied pragmatism philosophy to offer several ways to bridge dichotomies in mixed methods approaches to social science. Explanatory sequential mixed-method research design consisting of two distinct phases, namely quantitative and qualitative, was adopted. Both qualitative and quantitative study methods were adopted. In the quantitative study, the target population constituted all the 154 Ashoka Fellows' Organizations working in 19 countries in Africa. Data was collected using a structured questionnaire administered online to the founders (Ashoka Fellows) or the Ashoka Fellows' Organizations' CEOs. One hundred responded by filling out the questionnaire, which translated to a 64.9% response rate. Additionally, qualitative data applied purposive sampling and selected six Ashoka regional team leaders in Africa for in-depth interviews. They all were available for the interviews translating to a 100% response rate. Data analysis techniques combined descriptive and inferential statistics. Statistical Package for Social Sciences and SmartPLS 3 software were used to analyze the collected data. Findings: Results revealed that the results confirm that team information sharing significantly influences collaborative value within Ashoka Fellows’ Organizations in Africa. Team Information Sharing has a significant influence on collaborative value witn an R2 = 0.300, chi-square X2 (10, N=100) = 63.010, p<.05, SRMR=0.088, Rms-theta=0.224 and NFI=0.805. The null hypothesis was rejected. Unique Contribution to Theory, Practice and Policy: The study recommends that Team members should ensure the team's information exchange is of good quality as the quality of information sharing that develops collaboration must go beyond necessary factual information to a point where team members can transfer their unique understanding. Also, team members should be willing to share information and engage in sequences of interpretation sharing to build on each other's interpretations and collectively make sense. Teams should embrace timely information sharing, which is critical for collaborative value and the use of technology. To ensure quality and timeliness of information shared, teams should consider both investments in information systems as sharing appropriate information allows the linkage of internal and external knowledge sources by facilitating information flow and providing effective data retrieval mechanisms
APA, Harvard, Vancouver, ISO, and other styles
16

Sotnyk, Iryna, Kostiantyn Zavrazhnyi, Volodymyr Kasianenko, Hynek Roubík, and Oleksandr Sidorov. "Investment Management of Business Digital Innovations." Marketing and Management of Innovations, no. 1 (2020): 95–109. http://dx.doi.org/10.21272/mmi.2020.1-07.

Full text
Abstract:
This paper considers the issue of investment management of digital innovations in modern business. The main purpose of the research is the development of approaches to the investment management of the innovative digitalisation processes of the enterprises and justification of the economic efficiency of investment projects on innovative information technologies use in the context of their relationship with existing information solutions for enterprise management. The relevance of the research is the necessity to change the methods of doing and managing the modern business, taking into account the achievements of the Third and Fourth Industrial Revolutions, which form innovative business philosophy based on informatisation and digitalisation of manufacturing and delivery processes. The implementation of innovative digital technology in business processes requires significant costs and it raises the issue on their minimization. Systematization of literary sources and approaches for the investment management of industrial digitalisation indicates the absence of complex solutions for this problem. In this regard, based on a comparative analysis, the authors have revealed the features of business development in the conditions of the Fourth Industrial Revolution and justified the need for modern information systems integration for enterprise management on the platform of business processes digitalisation. In order to create the road map of business digital innovations, it is suggested that the Theory of Constraints should be used to determine which of the operating information systems of the enterprise (Business intelligence – BI; Enterprise Resource Planning – ERP; Manufacturing Execution System – MES; Industrial Internet of Things – IIoT) is to begin the digital transformation with. The stages of the project development for the digital transformation of an enterprise are designed based on the structural approach. The economic justification for the selection of alternative digitalisation projects is based on an assessment of the labour costs for implementing two variants of digital innovation of a business entity: a complex automation project with up-front modelling and an integration automation project with the gradual implementation of a new information system. The assessment results have shown the economic benefits of implementing the integration project as it provides 1.58 times fewer labour costs and can be realized by use of universal package solutions such as Business Automaton Software (BAS). The analysis of the results of the implemented business digitalisation projects in Ukraine and the world as well as the potential of planned ones has allowed generalising the effects of their implementation and confirmed the need for further development of the mechanisms for the investment management of business digital innovations. Keywords automation, business, digitalisation, efficiency, greening, ERP, information technology, innovation, investment management, project.
APA, Harvard, Vancouver, ISO, and other styles
17

Voronkova, Valentina, Vitalina Nikitenko, and Natalya Metelenko. "AGILE-ECONOMY AS A FACTOR IN IMPROVING THE DIGITAL SOCIETY." Baltic Journal of Economic Studies 8, no. 2 (March 25, 2022): 51–58. http://dx.doi.org/10.30525/2256-0742/2022-8-2-51-58.

Full text
Abstract:
The subject of the study is the stabilization of the digital society as a complex social phenomenon, which is dynamically evolving. The purpose of the study is to analyze the theoretical and practical principles of Agile-economy as a factor influencing the stabilization of the digital society, combined with the leverage of managerial influence on its development. To form the concept of Agile-economy as a set of methods of nonlinearity, the authors use the theory of complex systems, flexible approaches, self-organization and demonstrate the influence of various factors – stochastic information, instability and uncertainty, which must be overcome to achieve its stability. The methodology of the study includes a set of methods and principles of Agile methodology as a type of flexibility and adaptability to the complex conditions of economic development as a complex system under conditions of instability and identifying mechanisms of managerial impact on its changes to improve the digital society. Methodology also includes general philosophical methods such as analysis and synthesis, generalization, systematics, structure, historical-logical and comparative analysis. Research result. It is defined that the essence of Agile-economy is to become flexible, mobile, smart and to help overcome the problems of modern society in today's unstable and crisis conditions. It is revealed that nonlinear thinking leads to flexible approaches to contemporary problems – economic, environmental, social, cultural and requires the development of the concept of Agile-philosophy, which was created by the Club of Rome and is based on a holistic approach to understanding society and addressing the deep crisis of values. The basis of Agile-economy is the reorientation of management from hierarchies to network structures, because the 21st century is the era of network structures and network economy, which requires flexible approaches to complex social systems. The practical significance of the study is that Agile-economy as a factor in stabilizing society under conditions of instability will contribute to sustainability based on the programming of society based on the balance between man, nature, society on the basis of frugality and inclusiveness. The concept of an agile economy as a stabilizing factor will help unleash the energy of innovation and creativity to stabilize the economy and further its digital development.
APA, Harvard, Vancouver, ISO, and other styles
18

Hakim, Fahmil, and Karina Jayanti. "THE EFFECTIVENESS OF GOVERNMENT INSTAGRAM ACCOUNT TO FULFILL THE INFORMATION NEEDS STUDY ON @HUMASKOTATANGSEL." Journal of Digital Media Communication 1, no. 1 (2022): 10–19. http://dx.doi.org/10.35760/dimedcom.2022.v1i1.6509.

Full text
Abstract:
South Tangerang City has official government social media accounts as their information media through the Communication and Informatics Service work unit @humaskotatangsel. This account is a medium that provides information to the public. The purpose of this study was to see the effectiveness of the @humaskotatangsel Instagram account in meeting the information needs of its people. This research uses quantitative research methods and the positivism paradigm. The data collection technique was carried out using a survey method using a questionnaire with a quota sampling technique. The respondents in this study were followers of the Instagram account @humaskotatangsel, which was calculated using the Slovin formula so that the total sample was 100 respondents. This study uses the uses and gratification theory, which assumes that media users play an active role in choosing and using which media is appropriate to meet their needs. In this case, the information needs of 48.3% of the fulfillment of the information needs of the people of Tangerang. And it is known from the results of the T-test that the value of t count (9.563) > t table (1.660). This figure shows Ho is rejected and Ha is accepted, which means there is an influence on the effectiveness of the @humaskotatangsel Instagram account in meeting the information needs of the Tangerang people.
APA, Harvard, Vancouver, ISO, and other styles
19

Hapsari, Ramita, and Nurul Fadilah Sandy. "HE EFFECT OF GLINTS INDONESIA YOUTUBE CONTENT TO FULFILL THE INFORMATION NEEDS OF SUBSCRIBERS." Journal of Digital Media Communication 1, no. 2 (2022): 88–97. http://dx.doi.org/10.35760/dimedcom.2022.v1i2.7223.

Full text
Abstract:
The existence of social media Youtube as a medium for seeking various information provides an interesting fact of how influential Youtube is so that it can be accepted by the public as information with various contents. Glint Indonesia's Youtube content as a means to find career development content such as discussing content about the world of work and job hacks that are usually needed by job seekers to be successful at the interview stage or when they have to adapt to the world of work. The purpose of this study was to see the Effect of Glints Indonesia Youtube Content to Fulfill the Information Needs on Subscriber. This research uses quantitative research methods and the positivism paradigm. The data collection technique was carried out using a survey method using a questionnaire with a sample of 400 respondents referring to the slovin formula. The respondents in this study were subscriber Glint Indonesia’s Youtube channel. This study uses the Uses and Gratification Theory with the basic assumption that the audience is active and selective in sorting the media, so that it raises the motive for using the media and satisfaction with that motive. The results of this study stated that exposure to Glints Youtube content has a strong enough to Fulfill the Information Needs of Glints Youtube channel on subscribers with a percentage of 40.7% so it can be concluded that there is an effect of exposure to Glints Youtube content on the fulfillment of information needs of subscribers.
APA, Harvard, Vancouver, ISO, and other styles
20

Purwitasari, Endah, Ardiya Putra Mahardika, and Fitri Dwi Lestari. "THE EFFECT OF MERRY RIANA YOUTUBE CHANNEL ON THE EPISODE “SMARTNESS ALONE IS NOT ENOUGH FOR YOU TO BE SUCCESSFUL” ON STUDENT LEARNING MOTIVATION." Journal of Digital Media Communication 1, no. 1 (2022): 20–31. http://dx.doi.org/10.35760/dimedcom.2022.v1i1.6511.

Full text
Abstract:
The development of this technology eventually led to a more creative audio-visual era. The era of social media that is increasingly dominant makes the needs of users or internet users meet their information needs and search for information to satisfy these needs, which can be obtained and fulfilled audio and visually through YouTube. Content creators have the opportunity to be able to attract audience segmentation with lots of videos uploaded on their YouTube channel accounts. This study aims to determine how much influence Merry Riana's YouTube channel shows on the episode "smartness alone is not enough for you to be successful" on student learning motivation. The theory used in this research is the cognitive-behavioral theory, where this theory explains the pattern of human behavior. In this theory, individuals tend to form their conceptions which will directly influence their behavior. This study uses quantitative methods by distributing questionnaires to 100 student respondents from Gunadarma University. The analysis technique used is simple linear regression analysis. Respondents are students who have watched Merry Riana's video in the episode "smartness alone is not enough for you to be successful." The results of this study stated that the magnitude of the influence of Merry Riana's YouTube channel on the episode "change difficult to success" on student learning motivation was 56.8%. Based on these results, the hypothesis in this study was accepted with an explanation that there was an influence from Merry Riana's YouTube channel shows on the episode "smartness alone is not enough for you to be successful" on student learning motivation.
APA, Harvard, Vancouver, ISO, and other styles
21

Park, Sohyun, and Kihan Kwon. "A Study on the Nail Research Trend of the Domestic Society Based on Network Theory." Korean Society of Culture and Convergence 44, no. 9 (September 30, 2022): 635–47. http://dx.doi.org/10.33645/cnc.2022.9.44.9.635.

Full text
Abstract:
This study analyzed the research trends centered on 192 keywords, with 96 keywords for 20 years, 60 keywords for 21 years, and 36 keywords for 22 years from 5 academic societies up to the last 3 years (20-22 years) according to the Korean Journal Standards (KCI). The keywords for 22 years are written only in the first half of June. The number of simultaneous occurrences of keywords by year was analyzed for frequency, and network analysis was performed using NodeXL to derive research keywords that are being studied in common at 5 conferences. the results are as follow. First, the research keywords that appeared the most in 20 years were nail design, three-dimensional art, and flat art. In 21, it was nail design, nail art, and three-dimensional art, and in 2022, it appeared as nail design, self-nail, and consumer value. In common, nail design was the center of research. As a result of the network analysis, the sub-elements of nail design showed expression methods, techniques, expression diversity, and patterns.
APA, Harvard, Vancouver, ISO, and other styles
22

Rudas, Imre J. "Intelligent Engineering Systems." Journal of Advanced Computational Intelligence and Intelligent Informatics 4, no. 4 (July 20, 2000): 237–39. http://dx.doi.org/10.20965/jaciii.2000.p0237.

Full text
Abstract:
The "information revolution" of our time affects our entire generation. While a vision of the "Information Society," with its financial, legal, business, privacy, and other aspects has emerged in the past few years, the "traditional scene" of information technology, that is, industrial automation, maintained its significance as a field of unceasing development. Since the old-fashioned concept of "Hard Automation" applicable only to industrial processes of fixed, repetitive nature and manufacturing large batches of the same product1)was thrust to the background by keen market competition, the key element of this development remained the improvement of "Machine Intelligence". In spite of the fact that L. A. Zadeh already introduced the concept of "Machine Intelligence Quotient" in 1996 to measure machine intelligence2) , this term remained more or less of a mysterious meaning best explicable on the basis of practical needs. The weak point of hard automation is that the system configuration and operations are fixed and cannot be changed without incurring considerable cost and downtime. Mainly it can be used in applications that call for fast and accurate operation in large batch production. Whenever a variety of products must be manufactured in small batches and consequently the work-cells of a production line should be quickly reconfigured to accommodate a change in products, hard automation becomes inefficient and fails due to economic reasons. In these cases, new, more flexible way of automation, so-called "Soft Automation," are expedient and suitable. The most important "ingredient" of soft automation is its adaptive ability for efficiently coping with changing, unexpected or previously unknown conditions, and working with a high degree of uncertainty and imprecision since in practice increasing precision can be very costly. This adaptation must be realized without or within limited human interference: this is one essential component of machine intelligence. Another important factor is that engineering practice often must deal with complex systems of multiple variable and multiple parameter models almost always with strong nonlinear coupling. Conventional analysis-based approaches for describing and predicting the behavior of such systems in many cases are doomed to failure from the outset, even in the phase of the construction of a more or less appropriate mathematical model. These approaches normally are too categorical in the sense that in the name of "modeling accuracy," they try to describe all structural details of the real physical system to be modeled. This significantly increases the intricacy of the model and may result in huge computational burden without considerably improving precision. The best paradigm exemplifying this situation may be the classic perturbation theory: the less significant the achievable correction is, the more work must be invested for obtaining it. Another important component of machine intelligence is a kind of "structural uniformity" giving room and possibility to model arbitrary particular details a priori not specified and unknown. This idea is similar to that of the ready-to-wear industry, whose products can later be slightly modified in contrast to the custom-tailors' made-to-measure creations aiming at maximum accuracy from the beginning. Machines carry out these later corrections automatically. This "learning ability" is another key element of machine intelligence. To realize the above philosophy in a mathematically correct way, L. A. Zadeh separated Hard Computing from Soft Computing. This revelation immediately resulted in distinguishing between two essential complementary branches of machine intelligence: Hard Computing based Artificial Intelligence and Soft Computing based Computational Intelligence. In the last decades, it became generally known that fuzzy logic, artificial neural networks, and probabilistic reasoning based Soft Computing is a fruitful orientation in designing intelligent systems. Moreover, it became generally accepted that soft computing rather than hard computing should be viewed as the foundation of real machine intelligence via exploiting the tolerance for imprecision, uncertainty and partial truth to achieve tractability, robustness, low solution cost and better rapport with reality. Further research in the past decade confirmed the view that typical components of present soft computing such as fuzzy logic, neurocomputing, evolutionary computation and probabilistic reasoning are complementary and best results can be obtained by their combined application. These complementary branches of Machine Intelligence, Artificial Intelligence and Computational Intelligence, serve as the basis of Intelligent Engineering Systems. The huge number of scientific results published in journals and conference proceedings worldwide substantiates this statement. Three years ago, a new series of conferences in this direction was initiated and launched with the support of several organizations including the IEEE Industrial Electronics Society and IEEE Hungary Section in technical cooperation with IEEE Robotics & Automation Society. The first event of the series hosted by Bdnki Dondt Polytechnic, Budapest, Hungary, was called "19997 IEEE International Conference on Intelligent Engineering Systems " (INES'97). The Technical University of Vienna, Austria hosted the next event of the series in 1998, followed by INES'99 held by the Technical University of Kosice, Slovakia. The present special issue consists of the extended and revised version of the most interesting papers selected out of the presentations of this conference. The papers exemplify recent development trends of intelligent engineering systems. The first paper pertains to the wider class of neural network applications. It is an interesting report of applying a special Adaptive Resonance Theory network for identifying objects in multispectral images. It is called "Extended Gaussian ARTMAP". The authors conclude that this network is especially advantageous for classification of large, low dimensional data sets. The second paper's subject belongs to the realm of fuzzy systems. It reports successful application of fundamental similarity relations in diagnostic systems. As an example failure detection of rolling-mill transmission is considered. The next paper represents the AI-branch of machine intelligence. The paper is a report on an EU-funded project focusing on the storage of knowledge in a corporate organizational memory used for storing and retrieving knowledge chunks for it. The flexible structure of the system makes it possible to adopt it to different SMEs via using company-specific conceptual terms rather than traditional keywords. The fourth selected paper's contribution is to the field of knowledge discovery. For this purpose in the first step, cluster analysis is done. The method is found to be helpful whenever little or no information on the characteristics of a given data set is available. The next paper approaches scheduling problems by the application of the multiagent system. It is concluded that due to the great number of interactions between components, MAS seems to be well suited for manufacturing scheduling problems. The sixth selected paper's topic is emerging intelligent technologies in computer-aided engineering. It discusses key issues of CAD/CAM technology of our days. The conclusion is that further development of CAD/CAM methods probably will serve companies on the competitive edge. The seventh paper of the selection is a report on seeking a special tradeoff between classical analytical modeling and traditional soft computing. It nonconventionally integrates uniform structures obtained from Lagrangian Classical Mechanics with other simple elements of machine intelligence such as saturated sigmoid transition functions borrowed from neural nets, and fuzzy rules with classical PID/ST, and a simplified version of regression analysis. It is concluded that these different components can successfully cooperate in adaptive robot control. The last paper focuses on the complexity problem of fuzzy and neural network approaches. A fuzzy rule base, be it generated from expert operators or by some learning or identification schemes, may contain redundant, weakly contributing, or outright inconsistent components. Moreover, in pursuit of good approximation, one may be tempted to overly assign the number of antecedent sets, thereby resulting in large fuzzy rule bases and much problems in computation time and storage space. Engineers using neural networks have to face the same complexity problem with the number of neurons and layers. A fuzzy rule base and neural network design, hence, have two important objectives. One is to achieve a good approximation. The other is to reduce the complexity. The main difficulty is that these two objectives are contradictory. A formal approach to extracting the more pertinent elements of a given rule set or neurons is, hence, highly desirable. The last paper is an attempt in this direction. References 1)C. W. De Silva. Automation Intelligence. Engineering Application of Artificial Intelligence. Vol. 7. No. 5. 471-477 (1994). 2)L. A. Zadeh. Fuzzy Logic, Neural Networks and Soft Computing. NATO Advanced Studies Institute on Soft Computing and Its Application. Antalya, Turkey. (1996). 3)L. A. Zadeh. Berkeley Initiative in Soft Computing. IEEE Industrial Electronics Society Newsletter. 41, (3), 8-10 (1994).
APA, Harvard, Vancouver, ISO, and other styles
23

Simmons, Odis E. "Some Professional and Personal Notes on Research Methods, Systems Theory, and Grounded Action." World Futures 62, no. 7 (October 2006): 481–90. http://dx.doi.org/10.1080/02604020600912772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hicks, Alison. "Developing the methodological toolbox for information literacy research: Grounded theory and visual research methods." Library & Information Science Research 40, no. 3-4 (July 2018): 194–200. http://dx.doi.org/10.1016/j.lisr.2018.09.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Primiero, Giuseppe, Balbir Barn, and Ravinder Barn. "Value-Sensitive Co-Design for Resilient Information Systems." Studies in Logic, Grammar and Rhetoric 63, no. 1 (September 1, 2020): 141–64. http://dx.doi.org/10.2478/slgr-2020-0032.

Full text
Abstract:
AbstractIn Information Systems development, resilience has often been treated as a non-functional requirement and little or no work is aimed at building resilience in end-users through systems development. The question of how values and resilience (for the end-user) can be incorporated into the design of systems is an on-going research activity in user-centered design. In this paper we evaluate the relation of values and resilience within the context of an ongoing software development project and contribute a formal model of co-design based on a significant extension of Abstract Design Theory. The formal analysis provides a full and clear-cut definition of the co-design space, its objectives and processes. On the basis of both, we provide an abstract definition of resilient system (for the end-user). We conclude that value-sensitive co-design enforces better resilience in end-users.
APA, Harvard, Vancouver, ISO, and other styles
26

Jamali, Hamid R. "Does research using qualitative methods (grounded theory, ethnography, and phenomenology) have more impact?" Library & Information Science Research 40, no. 3-4 (July 2018): 201–7. http://dx.doi.org/10.1016/j.lisr.2018.09.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Skinner, Richard J., R. Ryan Nelson, and Wynne Chin. "Synthesizing Qualitative Evidence: A Roadmap for Information Systems Research." Journal of the Association for Information Systems 23, no. 3 (2022): 639–77. http://dx.doi.org/10.17705/1jais.00741.

Full text
Abstract:
Qualitative synthesis research is an approach that consolidates the output of different qualitative studies to create new subject knowledge. Such work can help reveal more powerful explanations than that seen in a single study, thereby generating increased levels of understanding of a given phenomenon and greater research finding generalizability. Based on a review of the literature and a survey of qualitative researchers, we found that the information systems (IS) domain lacks a clear understanding of qualitative synthesis methods and, as a result, has largely failed to take advantage of this powerful, high-potential methodological opportunity. To address this shortcoming, this paper is the first to provide a rigorous overview of the full suite of 35 qualitative synthesis methods, as well as guidelines that include a three-tiered selection framework. By using the guidelines and framework in tandem, IS researchers are able to select the qualitative synthesis method most appropriate for a given research study, particularly when the research objective involves knowledge integration/aggregation, interpretation/theory development, and/or informing IS practice.
APA, Harvard, Vancouver, ISO, and other styles
28

Galliers, Robert D., and Jimmy C. Huang. "The teaching of qualitative research methods in information systems: an explorative study utilizing learning theory." European Journal of Information Systems 21, no. 2 (March 2012): 119–34. http://dx.doi.org/10.1057/ejis.2011.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Gorichanaz, Tim, Jonathan Furner, Lai Ma, David Bawden, Lyn Robinson, Dominic Dixon, Ken Herold, Sille Obelitz Søe, Betsy Van der Veer Martens, and Luciano Floridi. "Information and design: book symposium on Luciano Floridi’s The Logic of Information." Journal of Documentation 76, no. 2 (January 15, 2020): 586–616. http://dx.doi.org/10.1108/jd-10-2019-0200.

Full text
Abstract:
Purpose The purpose of this paper is to review and discuss Luciano Floridi’s 2019 book The Logic of Information: A Theory of Philosophy as Conceptual Design, the latest instalment in his philosophy of information (PI) tetralogy, particularly with respect to its implications for library and information studies (LIS). Design/methodology/approach Nine scholars with research interests in philosophy and LIS read and responded to the book, raising critical and heuristic questions in the spirit of scholarly dialogue. Floridi responded to these questions. Findings Floridi’s PI, including this latest publication, is of interest to LIS scholars, and much insight can be gained by exploring this connection. It seems also that LIS has the potential to contribute to PI’s further development in some respects. Research limitations/implications Floridi’s PI work is technical philosophy for which many LIS scholars do not have the training or patience to engage with, yet doing so is rewarding. This suggests a role for translational work between philosophy and LIS. Originality/value The book symposium format, not yet seen in LIS, provides forum for sustained, multifaceted and generative dialogue around ideas.
APA, Harvard, Vancouver, ISO, and other styles
30

Zhu, Yiping, and Zan Zhou. "Research on Power Demand Side Information Quality Indicators and Evaluation Based on Grounded Theory Approach." Information 11, no. 10 (October 12, 2020): 477. http://dx.doi.org/10.3390/info11100477.

Full text
Abstract:
High-quality power demand side information is necessary for scientific decision-making of power grid construction projects. Literature research shows that the current demand side management (DSM) information quality theories and methods need to be improved, and the information quality indicators and evaluation work are essential. In this paper, based on the grounded theory, about 250 copies of relevant literatures and interview records are reviewed. Through open coding, spindle coding, and selective coding, 105 initial concepts are finally extracted to 35 categories and 10 main categories. On this basis, four information dimensions including load extraction, monitoring, management, and government planning are summarized. An index system containing 34 indicators for DSM information quality evaluation on the power demand side is constructed. Finally, using matter-element extension evaluation method, a case study in China is performed to verify the feasibility and scientificity of the indexes. The results show that DSM information quality evaluation indexes are effective, and the evaluation method is also applicable. The establishment of DSM information quality indicators and the evaluation methods in this paper can provide a reference for similar information quality evaluation work in power systems.
APA, Harvard, Vancouver, ISO, and other styles
31

Marin-Garcia, Juan A., Amable Juarez-Tarraga, and Cristina Santandreu-Mascarell. "Kaizen philosophy." TQM Journal 30, no. 4 (June 11, 2018): 296–320. http://dx.doi.org/10.1108/tqm-12-2017-0176.

Full text
Abstract:
Purpose The purpose of this paper is to perform a context analysis about a specific Kaizen program, suggestion systems in permanent teams, and identified the barriers and facilitators that companies encounter while implementing them from the workers’ perspective. Design/methodology/approach The authors applied an inductive method, the Grounded Theory, to develop a specific context theory using the information that emerged from a convenience sample of 182 workers in several countries. Findings The facilitators and barriers identified for the workers in the field study are aligned with those identified in previous studies, generally obtained using information provided by managers. The methodology enabled us to identify the relationships between them and their level of relevance. Research limitations/implications The main limitations were linked with the source of the data as the authors worked with a convenience sample and only analyzed the information provided by the workers. Practical implications The identified facilitators, their relationships and their relevance, contribute to understand the functioning phenomena of suggestion systems in permanent teams to facilitate organizations using this continuous improvement program more effectively. Originality/value The originality of this study, apart from identifying facilitators from the workers’ perspective, is that the used method enabled us to identify the relationships between them and know how the operators perceived their relevance.
APA, Harvard, Vancouver, ISO, and other styles
32

Adam, Alison. "Exploring the gender question in critical information systems." Journal of Information Technology 17, no. 2 (June 2002): 59–67. http://dx.doi.org/10.1080/02683960210145959.

Full text
Abstract:
This paper addresses ways in which theorizing gender may be important in forming an understanding of the topic of emancipation, which is central to the new critical information systems (IS) based on the thinking of Habermas. After briefly discussing some problems with current research on gender and IS the paper argues that appropriate feminist theory may be useful in augmenting our understanding of foundational issues such as emancipation. The development of feminist philosophy and epistemology is briefly introduced. Habermas’ ‘ideal speech situation’ is problematized in relation to feminist writing on male and female communication juxtaposed with recent research in computer-mediated communications. The paper continues by exploring the concept of emancipation through feminist epistemology and it closes with a preliminary consideration of how these concerns may be applied to critical IS.
APA, Harvard, Vancouver, ISO, and other styles
33

Cebi, Selcuk, and Cengiz Kahraman. "A new weighted fuzzy information axiom method in production research." Journal of Enterprise Information Management 32, no. 1 (February 11, 2019): 170–90. http://dx.doi.org/10.1108/jeim-03-2017-0046.

Full text
Abstract:
Purpose The purpose of this paper is to propose a novel weighting algorithm for fuzzy information axiom (IA) and to apply it to the evaluation process of 3D printers. Design/methodology/approach As a decision-making tool, IA method is presented to evaluate the performance of any design. Then, weighted IA methods are investigated and a new weighting procedure is introduced to the literature. Then, the existing axiomatic design methods and the proposed new method are classified into two groups: weighting based on information content and weighting based on design ranges. The weighting based on information content approach consists of four methods including pessimistic and optimistic approaches. The philosophy of the weighting based on design ranges is to narrow design ranges in order to decrease fuzziness in the model. To prove the robustness and the performance of the proposed weighting method, the results are compared with the existing methods in the literature. Then, the new approach is applied to evaluate 3D printers. Findings The results of the proposed study show that the proposed weighting algorithm has better performance than the old ones for IA. Therefore, the proposed weighting algorithm should be used for the weighting tool of IA thereafter. Originality/value An effective weighting method compatible with the philosophy of IA method has been proposed. Furthermore, the performances of 3D printers are compared by using the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
34

Mamonchikova, A. S. "FORMALIZATION OF INFORMATION CONFLICT BASED ON DYNAMIC SYSTEMS THEORY." H&ES Research 12, no. 6 (2020): 68–75. http://dx.doi.org/10.36724/2409-5419-2020-12-6-68-75.

Full text
Abstract:
Setting the task: the progressive development of means of destabilizing effects on the telecommunication system requires improvement of the scientific and methodological apparatus for modeling effects from such effects. To date, dynamic processes of information conflict remain insufficiently studied in conditions of joint influence of means of destabilizing effects and technical means of exploration on telecommunication system. Problem situation: presence of integral effects on telecommunication system of technical means of exploration and means of destabilizing effects, in the absence of models formalizing such tripartite interactions. The direction of formalization of information conflict on the basis of the theory of dynamic systems taking into account the time parameters of its development is not sufficiently developed. The goal is to build a model of a three-way dynamic information conflict. Methods used: mathematical apparatus of dynamic systems theory is used to construct a mathematical model of information conflict and its research. The model itself is represented as a system of differential equations. The subject of the study is the ratio of competitive distribution of information resources between the parties to the information conflict. Object of research: telecommunication system under the influence of destabilizing effects and technical means of exploration. Scientific novelty: for the first time for the developed model three sides of dynamic conflict are presented, taking into account the dynamics of development of information conflict in time, different degrees of conflict interaction between individual parties are taken into account, synthesis of universal approaches generalizing dynamic information conflict between the three sides is presented. Practical significance: The proposed model can be used to explore a broad class of conflict interactions in application areas in different spheres. It will be useful in dealing with such dynamic conflicts involving three or more parties.
APA, Harvard, Vancouver, ISO, and other styles
35

Avtushenko, Oleksandr, Vira Hyrda, Yuliia Kozhedub, and Andrii Maksymets. "ANALYSIS OF METHODS, METHODS, MECHANISMS, TOOLS THEORIES OF DECISION-MAKING FOR MODELING INFORMATION PROTECTION SYSTEM." Cybersecurity: Education, Science, Technique 16, no. 4 (2022): 159–71. http://dx.doi.org/10.28925/2663-4023.2022.16.159171.

Full text
Abstract:
The article presents a detailed analysis of methods, methods, mechanisms, tools of decision theory for modeling information security systems. The basic terminological concepts are given, and their detailed definition is given. The combination of elements of decision theory with information security systems is shown. The connecting link for this is probability theory. The issue of decision-making procedure as a process is studied. Emphasis is placed on the qualitative parameters of the decision-making procedure that may be suitable for information protection purposes. Analogies have been made that indicate the applicability of decision theory methods to create a model of information security system. Implementation mechanisms are shown in decision-making algorithms. With the help of decision-making theory tools, it has been established that the modeling process can be formalized since both mathematical icons and verbalization. In general, the step-by-step process of designing an information security system is described. It is concluded that formalization as a type of symbolic modeling simultaneously with the application of decision theory is the best option for the descriptive part of the information security system. Modeling has been found to be the best scientific tool for combining theoretical calculations and the practical application of a wide range of research issues, including information security. To support the decision-making of the decision-maker, in other words the offender, in the field of information protection, it is important that the security officer or system administrator has experience and skills in regulated actions. Such actions are both well-known developments in this field of activity and a synthesis of already known algorithms to achieve the state of information security in general. Automation in decision-making is possible through the introduction of a decision support system that is widely used in automated systems: computer systems and networks, especially where there is a need to analyze significant data flows.
APA, Harvard, Vancouver, ISO, and other styles
36

Yang, Xiao Long. "Difference and Identity in Piano Performance Information." Proceedings 47, no. 1 (June 2, 2020): 59. http://dx.doi.org/10.3390/proceedings2020047059.

Full text
Abstract:
With the arrival of the information society, the research on the philosophy of music art has been paid more and more attention to, and the difference and identity in the information of piano performance is worth our deep thinking. In the new era of social information, it is a timely topic which breaks through the traditional research methods of piano art and utilizes the research system of information philosophy. Based on the perspective of information philosophy, this paper attempts to reveal the difference and identity of the main body of piano performance information by observing the ontology and law of music art research and applying the basic principle of information philosophy theory. Thus, the guiding significance of information philosophy in piano performance is discussed and further analyzed.
APA, Harvard, Vancouver, ISO, and other styles
37

Xie, Jian Min, Bing Yao, Ming Yao, and Xiang En Chen. "Research on Information Process with a Computational Approach to Some Odd-Graceful Trees." Advanced Materials Research 1022 (August 2014): 207–10. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.207.

Full text
Abstract:
Graph labeling theory has important applications in coding theory, communication networks, logistics and other aspects. In Operations Research or Systems Engineering Theory and Methods, one very often use graph colorings/labellings to divide large systems into subsystems. One can use colorings/labellings to distinguish vertices and edges between vertices in order to find fast algorithms to imitate some effective transmissions and communications in information networks. In this paper we present a computational approach to the odd-graceful labelings for some olive trees.
APA, Harvard, Vancouver, ISO, and other styles
38

Aliyeva, Gulshan. "Attitudes toward elderly inmates in correctional facilities." International Journal of Social Sciences 11, no. 2 (September 21, 2022): 1–12. http://dx.doi.org/10.52950/ss.2022.11.2.000.

Full text
Abstract:
Objective: Psychological well-being and mental health of elderly inmates are investigated by international organization, committees and researchers. One of the main factors that influence their quality of life, daily mood and well-being is interpersonal relationship. Numerous empirical data confirm the importance of interpersonal relationship and attitudes toward aging. An attitude can be defined as an evaluation of a stimulus as reflected in our cognitive, emotional and behavioral responses to the problem (Fiske &Taylor, 1991). In the field of geriatric psychology, research has focused on the problem of interpersonal relationship between elderly people and workers in prison environment. Prison officers are responsible for the safety and security of the prison facility (Bezerra et al., 2016), for supporting offender rehabilitation efforts and for managing organizational demands (Schaufeli & Peeters, 2000). Despite their importance to the running of the prison system, the health and wellbeing of prison officers remains poor. Hypotheses: H0: There isn’t any correlation between the social support inmates have, and their quality of life H1: The more social support correlate the higher level of inmates’ quality of life Methods: The systematic review of research and policy papers, articles that published on interpersonal relationship between elderly inmates and officers in correctional facilities, also effective programs outcomes were conducted. The main symptoms of the problem were measured with special checklist and questionnaires. Results: The elderly inmates experience emotional instability; tendency to self-accusations; anxiety-depressive response; low tolerance for frustration; mistrust and heightened criticism of others; intra and interpersonal conflict. A systematic approach in psychological work with elderly prisoners, also officers allows for the transition from a symptomatic to a personality-oriented level of psychological impact. Psychological emotional support can renew their hope on life, influence positive outcomes of the support program. According to the results of repeated psychological research, the patient's condition was characterized by positive dynamics: the level of psychological distress and the intensity of psychological distress significantly decreased, the general internality of the personality increased, as well as the subjective assessment of personal well-being. Conclusion: It is necessary to focus the attention of specialists on the advisability of using psycho-educational programs in a prison environment, providing information about the aging dynamically. Such programs, used at the initial stages of work with patients, contribute to the creation of motivation for personal psychotherapy and significantly increase its effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
39

Skyba, Hanna, Oksana Tsimoshynska, and Inna Bezhenar. "Implementation of information accounting systems." Ekonomika APK 313, no. 11 (November 27, 2020): 74–79. http://dx.doi.org/10.32317/2221-1055.202011074.

Full text
Abstract:
The purpose of the article is to define accounting information systems as an element of enterprise information resource management, compare the criteria for the content of regulated (financial) and management reporting for the formation of an enterprise information resource. Research methods. General and special methods of scientific knowledge were used: system approach and system analysis (in determining the essence and basic elements of the assessment of information flows); historical and logical method (in the study of the formation, development and development of theoretical and methodological provisions for the formation and implementation of information accounting systems); analysis and synthesis (when developing proposals for the implementation of accounting information systems in the practical activities of the enterprise); monographic (when assessing the results of adaptation of employees of the enterprise, who should be responsible for the implementation of the platform). Research results. The great importance of the obtained theoretical and practical developments on the formation and use of information accounting systems as the basis for the formation of an enterprise information resource for the development of accounting theory and the introduction of its provisions into the practical activities of business entities has been proved. A number of practical situations that may accompany the implementation of information accounting systems for information support of effective management are stated. Scientific novelty. Review of the possibility of choosing an information platform on which the collection, processing and transmission of information will be carried out in order to make management decisions. Practical significance. The necessity of introducing accounting information systems at the enterprise is substantiated with the prediction of a number of methodological measures for the division of information, depending on its discreteness. It also identified the need to foresee a number of organizational paths for the implementation of platforms. Figs.: 1. Refs.: 12.
APA, Harvard, Vancouver, ISO, and other styles
40

Nazarova, Iryna. "Evolution of accounting and information systems cashless payments." Herald of Economics, no. 4 (March 16, 2022): 211. http://dx.doi.org/10.35774/visnyk2021.04.211.

Full text
Abstract:
Introduction. Digitalization of the market economy creates conditions for minimizing cash payments. The abandonment from cash payments is justified by positive trends in: distancing e-commerce, the use of cashless payment systems and pandemic changes in socio-economic processes. Changes in the cash payments methods require the introduction of accounting and information systems for electronic recording of money operations, accounting and reporting of payment transactions, guarantees for the safety and control of cashless money.Purpose. The aim of the article is to research the evolution of accounting and information systems in the implementation of cashless payments in international and domestic markets for payment services, theoretical justification of the definition of «cashless payments» and develop proposals for their streamlining.Method. Methods of scientific research are: systematic approach to the study of economic processes, elements of the theory of scientific knowledge, dialectical method to determine the essence of cashless payments; historical - to research the evolution of cashless payments; analytical - to assess modern information systems for the organization and accounting of cashless payments.Results. The research of the cashless payments evolution shown the permanence changes in the methods of conducting money transactions. The accounting and information system of enterprises and corporations must timely respond on innovative transformations. The article improves and regulates the elements of the conceptual apparatus for cashless payments using bank payment cards, electronic money and other modern payment methods for the developing of their registration and reflection in accounting and reporting. Perspectives. Technological progress and the COVID-19 pandemic have become the driving force of society’s transition to expanding the cashless payment regime. Technologies for remote banking and non-banking payment systems are permanently improving. Accounting and information systems for providing complete and objective information to business and society should be in line with this progress.
APA, Harvard, Vancouver, ISO, and other styles
41

Enßlin, Torsten. "Information Field Theory and Artificial Intelligence." Entropy 24, no. 3 (March 7, 2022): 374. http://dx.doi.org/10.3390/e24030374.

Full text
Abstract:
Information field theory (IFT), the information theory for fields, is a mathematical framework for signal reconstruction and non-parametric inverse problems. Artificial intelligence (AI) and machine learning (ML) aim at generating intelligent systems, including such for perception, cognition, and learning. This overlaps with IFT, which is designed to address perception, reasoning, and inference tasks. Here, the relation between concepts and tools in IFT and those in AI and ML research are discussed. In the context of IFT, fields denote physical quantities that change continuously as a function of space (and time) and information theory refers to Bayesian probabilistic logic equipped with the associated entropic information measures. Reconstructing a signal with IFT is a computational problem similar to training a generative neural network (GNN) in ML. In this paper, the process of inference in IFT is reformulated in terms of GNN training. In contrast to classical neural networks, IFT based GNNs can operate without pre-training thanks to incorporating expert knowledge into their architecture. Furthermore, the cross-fertilization of variational inference methods used in IFT and ML are discussed. These discussions suggest that IFT is well suited to address many problems in AI and ML research and application.
APA, Harvard, Vancouver, ISO, and other styles
42

Scheuring, Sylvia Tidwell, and Arvin Agah. "An Emotion Theory Approach to Artificial Emotion Systems for Robots and Intelligent Systems: Survey and Classification." Journal of Intelligent Systems 23, no. 3 (September 1, 2014): 325–43. http://dx.doi.org/10.1515/jisys-2013-0069.

Full text
Abstract:
AbstractTo assist in the evaluation process when determining architectures for new robots and intelligent systems equipped with artificial emotions, it is beneficial to understand the systems that have been built previously. Other surveys have classified these systems on the basis of their technological features. In this survey paper, we present a classification system based on a model similar to that used in psychology and philosophy for theories of emotion. This makes possible a connection to thousands of years of discourse on the topic of emotion. Five theories of emotion are described based on an emotion theory model proposed by Power and Dalgleish. The paper provides classifications using a model of 10 new questions, for 14 major research projects that describe implementations or designs for systems that use artificial emotions for either robotics or general artificial intelligence. We also analyze the trends in the usage of various theories and complexity changes over time.
APA, Harvard, Vancouver, ISO, and other styles
43

MINYAEV, ANDREY A. "MODELING INFORMATION SECURITY THREATS IN TERRITORIAL-DISTRIBUTED INFORMATION SYSTEMS." H&ES Research 13, no. 2 (2021): 52–65. http://dx.doi.org/10.36724/2409-5419-2021-13-2-52-65.

Full text
Abstract:
Introduction: in the design of information security systems importance is the modeling of security threats, which implies the definition of a list of software threats to the information system, on the basis of which decisions are made to neutralize actual threats. Today the number of urgent threats to information security is increasing, due to the complexity of the infrastructure, information processing technologies, and unprotected communication channels. In this regard, the goal is to simulate security threats in geographically distributed information systems. The analysis of foreign and Russian methodologies for threat modeling showed problems associated with a large amount of data for modeling, as well as expert methods. It has been established that to solve the problem posed use machine learning methods, the theory of adaptive fuzzy neural production systems with fuzzy inference algorithms and the use of Data Science technologies when processing large amounts of data. The paper uses such data protection methods as data protection tools, based on fuzzy neural security systems, it is proposed to determine the actual threats to information security. The proposed methodology is automated and hypothetically eliminates expert errors, increases the number of frequently used topical threats to information security, reduces financial costs for the purchase of information security tools, differs in that the process is automated, has low computational complexity, there is no need attracting highly qualified specialists, allows you to determine the list of actual threats in systems of various types and classes, can be adapted to work with databases. The practical significance lies in the automation of the process — the development of a computer program that implements the proposed methodology. Discussion: further research is advisable to continue determining the best parameters of adaptive fuzzy neural production systems and fuzzy inference algorithms.
APA, Harvard, Vancouver, ISO, and other styles
44

Hamilton, Mark A., and Kristine L. Nowak. "Information Systems Concepts across Two Decades: An Empirical Analysis of Trends in Theory, Methods, Process, and Research Domains." Journal of Communication 55, no. 3 (September 1, 2005): 529–53. http://dx.doi.org/10.1111/j.1460-2466.2005.tb02684.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Bukharov, Valery M., Vyacheslav V. Onoshko, Natalya F. Kryukova, and Andrey V. Ivanov. "Formation of information competence with the help of automated systems for linguists-translators." Perspectives of Science and Education 60, no. 6 (January 1, 2022): 68–84. http://dx.doi.org/10.32744/pse.2022.6.4.

Full text
Abstract:
Introduction. The rapid increase in the volume of information, the expansion of international contacts, the emergence of new branches of science and technology pose new challenges to modern translators. In this regard, computerization of the translation process is an integral part of the translation sphere. The purpose of the presented article is to analyze cloud translation systems, determine their advantages and disadvantages with the subsequent possibility of their application in the educational process of translator training. Research methods. The empirical study involved 60 respondents – undergraduate students of Vyatka State University, Kirov (Russian Federation). The main research methods are observation (project creation practices, setting up project parameters, connecting terminological databases and translation memory databases, checking the quality of the translation performed), questioning (identifying the attitude of students to the use of a particular cloud system, generalized assessment of the functionality of desktop and cloud CAT systems, etc.) and interpretation of the results (implementation features students of translation projects using CAT cloud systems, a comparative analysis of the functional parameters of these systems, identification of the feasibility of including the cloud systems used in the translator training program). Research results. As a result of the consideration of the modern process of teaching translation students, the role and importance of studying and mastering automated and cloud translation systems for the formation of professional information competence are established. According to surveys, 74% of respondents approve of the expediency of studying CAT systems. 92% of students understand the need to master CAT cloud systems at the current stage for successful further professional activity. The analyzed CAT cloud systems (MemSource, Wordfast, XTM Cloud) were positively evaluated in terms of interface clarity (50%), ease of creating a translation project (54%), support for the translation process (44%) and presented as an important tool for preparing and executing translation projects, which is confirmed by the results of automatic data calculation – Pearson's chi-squared test. In the course of the work, the factors that form the professional information competence of VYATSU students were also identified: the functionality and parameters of the system versions, continuity in training, skills needed to work with databases, the creation of specialized translation tools. Conclusions. An important aspect of the process of forming an information competence of a translator is to determine the list and type of basic translation tools that should be mastered in the learning process. The introduction of CAT cloud systems into the content of the training of future translators is one of the urgent problems at the present stage of the development of the translation industry.
APA, Harvard, Vancouver, ISO, and other styles
46

Еськов, Valeriy Eskov, Хромушин, Viktor Khromushin, Хетагурова, and A. Khetagurova. "Innovative methods of analyzing, processing and information management in health system." Journal of New Medical Technologies. eJournal 10, no. 1 (May 19, 2016): 0. http://dx.doi.org/10.12737/18446.

Full text
Abstract:
The review presents the results of a long-term collaboration of three research teams from Surgut, Tula and Moscow, which carried out the development of innovative methods of analyzing, processing and information management to ensure the adoption of optimal solutions and to improve the efficiency of the health system. Research teams have created an intelligent system to work with semi-structured data arrays. Creating the theory of chaos and self-organization of systems, based on compartment and cluster approach, is justified. It was shown the possibility of controlling the functional systems of the human body by methods of regenerative medi-cine. The authors have developed a system of databases formation and intelligent decision-making and imple-mentation, proving the versatility of neural network approach and adaptation it to the information processing, obtained in the course of medical research. The vastness of the received information has led to the brevity of presentation with a sufficient number of references to the realized works.
APA, Harvard, Vancouver, ISO, and other styles
47

Jordan, S. "Charles Harvey and Jon Press, Databases in Historical Research. Theory, Methods and Applications." Literary and Linguistic Computing 11, no. 2 (June 1, 1996): 107–8. http://dx.doi.org/10.1093/llc/11.2.107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

SADRZADEH, MEHRNOOSH, and ROY DYCKHOFF. "POSITIVE LOGIC WITH ADJOINT MODALITIES: PROOF THEORY, SEMANTICS, AND REASONING ABOUT INFORMATION." Review of Symbolic Logic 3, no. 3 (August 12, 2010): 351–73. http://dx.doi.org/10.1017/s1755020310000134.

Full text
Abstract:
We consider a simple modal logic whose nonmodal part has conjunction and disjunction as connectives and whose modalities come in adjoint pairs, but are not in general closure operators. Despite absence of negation and implication, and of axioms corresponding to the characteristic axioms of (e.g.) T, S4, and S5, such logics are useful, as shown in previous work by Baltag, Coecke, and the first author, for encoding and reasoning about information and misinformation in multiagent systems. For the propositional-only fragment of such a dynamic epistemic logic, we present an algebraic semantics, using lattices with agent-indexed families of adjoint pairs of operators, and a cut-free sequent calculus. The calculus exploits operators on sequents, in the style of “nested” or “tree-sequent” calculi; cut-admissibility is shown by constructive syntactic methods. The applicability of the logic is illustrated by reasoning about the muddy children puzzle, for which the calculus is augmented with extra rules to express the facts of the muddy children scenario.
APA, Harvard, Vancouver, ISO, and other styles
49

Jacucci, Edoardo, Ole Hanseth, and Kalle Lyytinen. "Introduction: Taking complexity seriously in IS research." Information Technology & People 19, no. 1 (January 1, 2006): 5–11. http://dx.doi.org/10.1108/09593840610649943.

Full text
Abstract:
PurposeTo give an overview of the papers contained in this Special Issue.Design/methodology/approachLooks at how each of the papers reflects the theme of the Special Issue, “Complexity and IT design and evolution”.FindingsThe collection of papers in this Special Issue addresses complexity, drawing on multi‐faceted, multi‐theoretical lines of inquiry.Originality/valueFrameworks from complexity science, institutional theory, social science, philosophy, and recent thinking in science and technology studies (STS) are used as theoretical lenses to conceptualize and analyze complexity in IS and to offer ways to mitigate it.
APA, Harvard, Vancouver, ISO, and other styles
50

Johan Lor, Peter. "Revitalizing comparative library and information science: theory and metatheory." Journal of Documentation 70, no. 1 (January 7, 2014): 25–51. http://dx.doi.org/10.1108/jd-10-2012-0129.

Full text
Abstract:
Purpose – This article is intended to stimulate theoretical reflection in international comparative studies in library and information science (comparative LIS). Design/methodology/approach – The need for theory is emphasized and shortcomings in comparative LIS in respect of theory are identified. On the basis of literature from other comparative disciplines, a framework for examining issues of metatheory, methodology and methods is constructed. Against this background the role of theory and metatheory in the literature of comparative LIS is evaluated. General observations are illustrated using examples selected from comparative studies in LIS. Findings – Much of the literature of comparative LIS is atheoretical and based on assumptions that reflect naive empiricism. Most comparativists in LIS fail to link their work to that of colleagues, so that no body of theory is built up. Insufficient use is made of theory from other social science disciplines. There is a little evidence of awareness of metatheoretical assumptions in the sociological, teleological, ontological, epistemological and ethical dimensions. Research limitations/implications – While general observations are presented about the literature of comparative LIS, this is not a bibliometric study. Issues of methodology and method are not dealt with. Practical implications – Recommendations are made for improving teaching and research in comparative LIS. Concepts presented here are of value to the wider LIS community, particularly in internationally oriented research and practice. Originality/value – Since the 1980s there has been very little conceptual and methodological reflection on comparative LIS. This article alerts the LIS profession to new thinking in other comparative disciplines.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography