Journal articles on the topic 'Information Systems Planning (ISP)'

To see the other types of publications on this topic, follow the link: Information Systems Planning (ISP).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information Systems Planning (ISP).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lee, Gwo-Guang, and Tom Gough. "An Integrated Framework for Information Systems Planning and Its Initial Application." Journal of Information Technology 8, no. 4 (December 1993): 227–40. http://dx.doi.org/10.1177/026839629300800404.

Full text
Abstract:
This paper outlines an approach to information systems planning (ISP) that addresses not just the technical problems encountered in ISP but the whole range of problems which derive from social systems, organizational processes, formal organizational arrangements, technology and the external environment. The approach is designed to improve the effectiveness of the high-level planning processes for information systems (IS). A five-phase framework is proposed. The first phase, the perception phase, aims to provide the managers with an environment that enables them to recognize the strategic value of IS and that activates them to participate in strategy formulation. The second phase, the evaluation phase, involves the evaluation of the organization's systems. The third phase, the selection phase, is focused on analysing the data collected from previous phases in order to select feasible projects. The fourth phase, the construction phase, is responsible for producing a set of preliminary IS plans. The fifth phase, the review phase, aims to ensure that ISP effectiveness is further enhanced by ongoing adjustments to the plans. The paper includes brief comments on the initial application of the framework in the Mingchi Institute of Technology.
APA, Harvard, Vancouver, ISO, and other styles
2

Kamariotou, Maria, Fotis Kitsios, and Michael Madas. "E-Business Strategy for Logistics Companies: Achieving Success through Information Systems Planning." Logistics 5, no. 4 (October 11, 2021): 73. http://dx.doi.org/10.3390/logistics5040073.

Full text
Abstract:
Background: E-business and Information Technology (IT) are critical components in the improvement of logistics functions. As logistics contributes to the entire strategic planning of a firm, e-business and IT applications support the implementation of strategic planning in a more efficient and effective manner. According to this view, previous scholars have ignored the importance of Information Systems (IS) planning in the selection and implementation of appropriate IS as per situation. This paper explores the Information Systems Planning (ISP) phases that influence the success of the process. Methods: Data were collected and analyzed using Regression Analysis by 73 IT managers for Greek Small and Medium Enterprises (SMEs) in the logistics sector. Results: The outcomes of the analysis show that executives ought to be informed about the strategic utilization of IS planning in order to improve competitive advantage. Furthermore, managers must also select the suitable IT facilities to align business strategy with the business structure. Conclusions: The outcomes support managers to focus on logistics functions and realize the importance of such ISP in logistics. As a result, selecting appropriate IS leads to increased competitive advantage, faster communication, support for the storage and retrieval of more accurate data, cost reduction and increased customer value.
APA, Harvard, Vancouver, ISO, and other styles
3

Kamariotou, Maria, Fotis Kitsios, Chrysanthi Charatsari, Evagelos D. Lioutas, and Michael A. Talias. "Digital Strategy Decision Support Systems: Agrifood Supply Chain Management in SMEs." Sensors 22, no. 1 (December 30, 2021): 274. http://dx.doi.org/10.3390/s22010274.

Full text
Abstract:
The specific attributes of agrifood supply chains, along with their importance for the economy and society, have led to an increased interest in the parameters that enhance their effectiveness. Recently, numerous digital tools aimed at improving supply chain effectiveness have been developed. The majority of existing research focuses on optimizing individual processes rather than the overall growth of a food supply chain. This study aims to identify the stages of the information systems planning (ISP) process that affect the success of developing a strategic decision support system (DSS) for improving the decision-making process in the agrifood supply chains. Data were collected from 66 IT executives from Greek small and medium-sized enterprises (SMEs) in the agrifood sector and analyzed using regression analysis. The results revealed that situation analysis is the only stage of ISP that predicts ISP success. These findings can assist managers in appreciating the critical role of ISP for improving the performance of agrifood supply chain operations. Implementing the most appropriate information systems (IS) and digital tools results in increased competitive advantage, cost savings, and increased customer value.
APA, Harvard, Vancouver, ISO, and other styles
4

Hong, Soon-Goo, Keng Siau, and Jong-Weon Kim. "The impact of ISP, BPR, and customization on ERP performance in manufacturing SMEs of Korea." Asia Pacific Journal of Innovation and Entrepreneurship 10, no. 1 (December 5, 2016): 39–54. http://dx.doi.org/10.1108/apjie-12-2016-008.

Full text
Abstract:
Purpose This paper aims to assess how enterprise resource planning (ERP) performance of Korean small and medium enterprises in manufacturing differs according to different levels of business process reengineering (BPR), information strategic planning (ISP) and ERP customization. Design/methodology/approach A questionnaire survey was carried out in this research. Responses from 96 small and medium manufacturing companies that have adopted ERP systems were analyzed. Findings The results of this study suggest that ISP and BPR implementation are positively correlated to ERP performance. Originality/value While consulting and customization costs have positive impacts on ERP performance, the level of customization does not influence performance. As one of the pioneering studies that investigate the impact of BPR, ISP and ERP customization on small and medium manufacturing companies, this research contributes to both theory and practice.
APA, Harvard, Vancouver, ISO, and other styles
5

Jakimavičius, Marius, and Marija Burinskienė. "ROUTE PLANNING METHODOLOGY OF AN ADVANCED TRAVELLER INFORMATION SYSTEM IN VILNIUS CITY." TRANSPORT 25, no. 2 (June 30, 2010): 171–77. http://dx.doi.org/10.3846/transport.2010.21.

Full text
Abstract:
As a subsystem of an Intelligent Transportation System (ITS), an Advanced Traveller Information System (ATIS) disseminates real‐time traffic information to travellers. To help them with making better decisions on choosing their routes, a strong need to predict traffic congestion and to disseminate the predicted congestion information relating to travellers can be seen. This paper describes a methodology used by drivers for calculating an optimal driven route in Vilnius. The paper discusses how ATIS systems will likely evolve the experience of Information Service Providers (ISP) and optimal route planning calculations. A few methods of route planning have been taken into account. The paper presents the following types of route calculation: 1) the shortest route; 2) the quickest route; 3) the quickest forecasted route according to historical traffic information. Also, the paper deals with the architecture of the WEB based information system for drivers in Vilnius and analyzes data on traffic workflow. Furthermore, a comprehensive route planning procedure that forecasts data on driving time considering historical traffic is followed.
APA, Harvard, Vancouver, ISO, and other styles
6

Madhusudan, Therani. "An Intelligent Mediator-Based Framework for Enterprise Application Integration." Journal of Computing and Information Science in Engineering 4, no. 4 (December 1, 2004): 294–304. http://dx.doi.org/10.1115/1.1818686.

Full text
Abstract:
Enterprise Application Integration (EAI) is a major problem confronting manufacturing organizations that have deployed large-scale enterprise information systems and aim to coordinate inter- and intraorganizational product development, supply-chain, and customer management activities. Successful EAI is a key enabling step toward implementation of viable Product Life-cycle Management (PLM) strategies. Extant EAI technologies, such as distributed object and messaging technologies for communication and ontology-based database schema integration, are tedious to develop and maintain in an organization. Though workflow management systems have enabled process coordination of both manual and system-oriented tasks in organizations, coping with the lack of adaptability and inter-operability in workflow systems is a manual and resource intensive effort. Recent advances in (i) standardized, modular, and distributed software delivery frameworks, such as web services; (ii) standard semantic markup languages for developing domain ontologies; and (iii) intelligent process coordination frameworks promise the development of flexible, responsive, integrated, and organic process management architectures. In this paper, we present an intelligent mediator-based architecture for enabling EAI. Intraorganizational information sources and services are made available via a web-services framework. An Integrated Service Planning and Execution (ISP&E) framework interleaves service composition and execution at the mediator to fulfill service requests. Processes that interleave information gathering and transactional tasks are generated using domain-independent Hierarchical Task Network (HTN) AI planning and a domain-specific ontology and then executed in a scalable and reliable manner. Benefits and limitations of mediator-based frameworks for EAI and topics for further research are discussed based on a prototype development experience.
APA, Harvard, Vancouver, ISO, and other styles
7

Qiao, Li Hong, and Jin Zhang. "Integrated Process Planning Based on 3D Product Models." Key Engineering Materials 407-408 (February 2009): 298–302. http://dx.doi.org/10.4028/www.scientific.net/kem.407-408.298.

Full text
Abstract:
One of the major barriers to the integration of CAD, CAPP and CAM is insufficiency and incompatibility of product model data among various application systems. This paper presented an effective approach to achieve integrated process planning with CAD and CAM under a product data management environment based on 3D product models. The system architecture and the processes of an integrated process planning system (3D-IPP) were constructed using feature information and specific CAD/CAPP/CAM integration technologies based on feature. A feature-based product information model is designed as the information source for the 3D-IPP. A feature-based integrated process planning method was developed based on group technology, intelligent decision-making algorithms and parametric operation templates in numerically controlled (NC) programming. The procedures of intelligent process route planning and parametric NC operation planning were addressed. The 3D-IPP system and its implementation provide an effective solution to strive for complete information sharing among application systems of CAD, CAPP and CAM.
APA, Harvard, Vancouver, ISO, and other styles
8

Appel, Marcus, Michael Walther, and Ulrich Konigorski. "Distributed trajectory planning for multi-agent discrete event systems." at - Automatisierungstechnik 67, no. 9 (September 25, 2019): 751–61. http://dx.doi.org/10.1515/auto-2018-0127.

Full text
Abstract:
Abstract Many systems like manufacturing systems, biological processes and even stock markets can be seen as networks of coupled decision makers and thus be described as networked discrete event systems (DES) or multi-agent discrete event systems (MADES). Information interchange between agents is usually performed indirectly via competition for shared resources. The problem of trajectory planning for MADES is about finding an optimal sequence of decisions for the particular agents. The planning process can be performed in a distributed manner. To encode the trajectory planning problem, we utilize Petri net models and present a formal way to derive integer linear programs (ILPs) that exhibit a bordered block-diagonal structure. We apply Dantzig’s decomposition method to decompose the LP-relaxed problem into multiple subproblems that can be solved locally by their corresponding agents. In general, the obtained LP solutions are non-integer. Therefore, we ensure feasibility to the original ILP using a superior Branch-and-Bound algorithm. Hence, we end up with a so called Branch-and-Price algorithm, tailored to solve trajectory planning problems for general MADES via distributed optimization.
APA, Harvard, Vancouver, ISO, and other styles
9

Goncharenko, S. N., and A. B. Avdeev. "Problem-oriented information analytical system development for management, planningand mining enterprise production activities optimization." Issues of radio electronics, no. 11 (November 20, 2019): 82–86. http://dx.doi.org/10.21778/2218-5453-2019-11-82-86.

Full text
Abstract:
The paper considers the scenario analysis tool in the form initial scenarios set simulation and optimal option selection enterprise development on the basis information analytical system – integrated planning system (IPS) is considered. The IPS practical application field as a tool of simulation modeling for optimization the enterprise activity in terms the main technical and economic indicators, strategic planning and production system development, valuation and structuring assets is shown. Such tasks in the IPS framework will improve the plan recosting speed and planning accuracy, model multiple enterprise development scenarios, taking into account changes in macroeconomic indicators and solve the task choosing the optimal one, which will significantly affect the quality and speed of management decisions. This system will allow data consolidation and integration with other information and industrial enterprise analytical systems. The IPS contains applications for creating and viewing reports, as well as data preparation and analysis functionality, tools for developing and editing program code, analytical solutions for studying data structure and building analytical models, including scenario models, and is a complete analytical platform that provides a secure multi-user environment for simultaneous access to data. The system provides a specialized data warehouse section, the logical and physical structure which is designed to create a special report or a group reports for a specific section the subject area.
APA, Harvard, Vancouver, ISO, and other styles
10

Beydina, T., and A. Kukharsky. "INFORMATION SECURITY POLICY: A CRITICAL STUDY OF THE CONTENT OF UNIVERSITY POLICY." Transbaikal State University Journal 27, no. 4 (2021): 55–72. http://dx.doi.org/10.21209/2227-9245-2021-27-4-55-72.

Full text
Abstract:
The article is relevant, as it provides an assessment of the information security of universities. Ensuring the security of corporate information, which is increasingly stored, processed and disseminated using information and communication technologies (ICT). This is a particularly important problem for knowledge-intensive organizations such as universal ones; the effective conduct of their main educational activities and research activities increasingly depends on the availability, integrity and accuracy of computer information resources. One of the more important mechanisms to reduce the number of security breaches, and thus corporate information, is the development and implementation of a formal information security policy (ISP). Although much has now been written about the importance and role of information security policies and approaches to formulating them, there is relatively little empirical material that is incorporated into the structure or content of security policies. The purpose of the article is to fill this gap in the literature through this method of using the structure and methods of authentic information security policies. Having established the parameters and key features of university policies, the article critically examines the concept of information security embedded in the policy. Two important conclusions can be drawn from this study: 1) the wide variety of disparate policies and standards used, whether there will be a consistent approach to security management; and 2) the range of specific issues explicitly covered by university policy, a surprisingly low and highly technocentric view of information security management. This article is one of the first to objectively, rigorously and independently assess the content of authentic information security policies and information security documentation frameworks in a well-organized organizational environment. The article notes that there are four different levels of information policy: “system security policy, product security policy, community security policy, and corporate information security policy.” All policies involve: personal use of information systems, information disclosure, physical security, breaches and hacks, viruses, system access control, mobile computing, internet access, software development, encryption and contingency planning
APA, Harvard, Vancouver, ISO, and other styles
11

FERREIRA, HUGO M., and DIOGO R. FERREIRA. "AN INTEGRATED LIFE CYCLE FOR WORKFLOW MANAGEMENT BASED ON LEARNING AND PLANNING." International Journal of Cooperative Information Systems 15, no. 04 (December 2006): 485–505. http://dx.doi.org/10.1142/s0218843006001463.

Full text
Abstract:
The ability to describe business processes as executable models has always been one of the fundamental premises of workflow management. Yet, the tacit nature of human knowledge is often an obstacle to eliciting accurate process models. On the other hand, the result of process modeling is a static plan of action, which is difficult to adapt to changing procedures or to different business goals. In this article, we attempt to address these problems by approaching workflow management with a combination of learning and planning techniques. Assuming that processes cannot be fully described at build-time, we make use of learning techniques, namely Inductive Logic Programming (ILP), in order to discover workflow activities and to describe them as planning operators. These operators will be subsequently fed to a partial-order planner in order to find the process model as a planning solution. The continuous interplay between learning, planning and execution aims at arriving at a feasible plan by successive refinement of the operators. The approach is illustrated in two simple scenarios. Following a discussion of related work, the paper concludes by presenting the main challenges that remain to be solved.
APA, Harvard, Vancouver, ISO, and other styles
12

Mustafayeva, A. M., and G. S. Bakhshiyeva. "An innovative approach in the study of mechatronic devices." Informatics and Control Problems, no. 1(3) (May 25, 2022): 39–45. http://dx.doi.org/10.54381/icp.2022.1.06.

Full text
Abstract:
Innovation in industry is the organization of the principles of operation of robotic devices in accordance with the new challenges of modern times. This is due to the distortion and noise contamination of signals during the transmission of information in the control systems of robotic devices operating in conditions of uncertainty. Therefore, one of the main requirements of the industry is to build innovative robotic systems with high robustness, adaptability and stability that can adapt to any conditions. The main purpose of this work is to create a system for planning the future motion of the robot depending on the intensity of the input signals. Before discussing the methods of studying robotic devices, the article analyzes the generations of robotic devices and the process of modeling a motion planning system of third-generation robotic devices with the use of artificial intelligence.
APA, Harvard, Vancouver, ISO, and other styles
13

Shaikh, Masood A. "Nurses' Use of Global Information Systems for Provision of Outreach Reproductive Health Services to Internally Displaced Persons." Prehospital and Disaster Medicine 23, S1 (June 2008): s35—s38. http://dx.doi.org/10.1017/s1049023x00024079.

Full text
Abstract:
AbstractIntroduction:A long and protracted civil war compounded by the occurrence of nature-related disasters have forced thousands of Somalis to take refuge in camps for internally displaced persons (IDPs) to escape violence and seek shelter. Dwellers of these camps have limited accessibility to and affordability of the fractured healthcare facilities located in nearby towns. A free, outreach, mobile, reproductive healthcare delivery system staffed with nurses and using an ambulance guided by a global information systems (GIS) map was established to address the accessibility and affordability issues hindering provision of quality reproductive healthcare to the women in the IDP camps and in the outskirts of Baidoa City, Somalia.Methods:All 14 IDP camps in Baidoa City were visited to determine the number of families/huts, and to acquire their global positioning system (GPS) central point locations. Global information systems (GIS) shape files containing major roads, river, and dwellings, and straight-line distances from the base clinic to each IDP camp were computed. The objective of creating and using this specially designed map was to help nurses in determining which camps realistically could be visited on a given day, and how best to access them considering the security situation and the condition of rain-affected areas in the city.Results:Use of the GIS map was instrumental in facilitating the delivery of healthcare services to IDPs and ensuring that resources were adequately utilized. Free healthcare services were provided each work day for the month long duration of the project; 3,095 consultations were provided, inclusive of 948 consultations for children under the age of 16 years, and delivery of three babies.Conclusions:Creation and use of a simple, need-specific GIS map in this pilot project effectively aided the logistical planning and delivery of mobile, outreach reproductive health services by directing the ambulance and nurses safely to accessible IDP camps in an area marred with long and protracted disasters from both natural and human causes.
APA, Harvard, Vancouver, ISO, and other styles
14

Muskat, Judd. "The Evolution of Applied Geographic Information Systems for Oil Spill Response in California: Rapid Data Dissemination for Informed Decision Making." International Oil Spill Conference Proceedings 2014, no. 1 (May 1, 2014): 1583–95. http://dx.doi.org/10.7901/2169-3358-2014.1.1583.

Full text
Abstract:
ABSTRACT Computing technology has advanced to the point where it is now standard practice to employ complex Geographic Information Systems (GIS) within the Incident Command Post (ICP). Simultaneously, field data collection has been migrating to mobile computing applications which output GIS files that are quickly displayed for real-time situational awareness. From the initial emergency response through clean-up and sign-off much data with a spatial component is generated and many disparate data sets are collected. More efficient data integration, management and visual analysis affords Incident Commanders and Section Chiefs the ability to make informed and timely planning, operational and strategic decisions. Traditionally GIS maps were created in the ICP from field sketches, field notes and verbal reports. Processing of these data by the GIS Unit is very time consuming and prone to error. Preliminary efforts to streamline and automate field data collection by the California Department of Fish and Wildlife (CDFW, formerly the California Department of Fish and Game), Office of Spill Prevention and Response (OSPR) utilized Global Positioning System (GPS) receivers to record waypoints and track lines. Since then more elegant electronic field data collection applications installed on small, handheld computers have been developed including those for “Wildlife Recovery and Transport”, “Resources at Risk” over flights, and the “Shoreline Cleanup and Assessment Technique” (SCAT). Other recent advancements allow for real-time aerial remote sensing for oil slick detection and detailed mapping of its properties, and displaying the output from coastal High Frequency (HF) radar installations for real-time visualization of local ocean surface current fields. These field data collection applications are explained in more detail in the body of this paper. Once these data are incorporated into the GIS a web-based Common Operational Picture (COP) is utilized for timely dissemination of relevant geospatial data. OSPR has worked closely with the National Oceanic and Atmospheric Agency (NOAA) to develop “Southwest ERMA” (Environmental Response Management Application) as California's COP for web-based data dissemination and incident situational awareness. At the Deepwater Horizon (MC-252) Incident Command Post (ICP) in Houma, Louisiana many responders were from outside of the region and unfamiliar with the local geography. Area base maps with a standardized coast line and place names were not readily available for several days which added unnecessary confusion to the mix. As a lesson learned and in order to avoid this situation for an oil spill response in California, OSPR and NOAA have pre-loaded Southwest ERMA with pertinent base maps, charts and spill response planning data from the three California Area Contingency Plans (ACPs). These data are deliberately made freely available to the general public via the Southwest ERMA web-viewer without any user login credentials required.
APA, Harvard, Vancouver, ISO, and other styles
15

Gitelman, Lazar D., Vladimir V. Dobrodey, and Mikhail V. Kozhevnikov. "Tools for Sustainable Development of Regional Energy Systems." Economy of Region 16 (December 2020): 1208–23. http://dx.doi.org/10.17059/ekon.reg.2020-4-14.

Full text
Abstract:
Nowadays, it is relevant to consider changes in the structure of the fuel and energy balance of industrial regions and the availability of imported fuel and energy resources, especially in the areas that lack energy sources. The ongoing structural shifts in energy consumption systems and the growing uncertainty in energy markets encourage the development of tools for improving the sustainable development of regional energy systems. To refine the theoretical and methodological basis of the study, we defined its conceptual framework, described the difference s betwee n sustainabl e functionin g an d developmen t o f th e energy sector and determined the factors of its regional differentiation and manifestations of the energy crisis. Further, we identified the shortcomings of the existing methods for forecasting the demand for electricity. We paid special attention to quality factors of strategic planning in the region, in particular, the used statistics and documents. Based on the analysis of integrated resource planning (IRP) methodology, our experience in forecasting fuel and energy balances, assessment of sectoral indicators of energy efficiency and energy demand in the region, we proposed a model for predictive and analytical justification of regional programmes for energy development. Such a model significantly increases the information reliability of these programmes’ implementation. Considering organisational tools to support sustainable development, we developed a regional energy management scheme and a mechanism stimulating local energy companies to improve energy efficiency in the consumption sector, enhance regional competition and attract investments in the renewal of fixed assets. The study has practical significance due to recommendations and tools for adjusting regional energy policy based on the coordination of the predicted parameters for various participants in the energy supply process.
APA, Harvard, Vancouver, ISO, and other styles
16

Gitelman, Lazar D., Vladimir V. Dobrodey, and Mikhail V. Kozhevnikov. "Tools for Sustainable Development of Regional Energy Systems." Economy of Region 16 (December 2020): 1208–23. http://dx.doi.org/10.17059/ekon.reg.2020-4-14.

Full text
Abstract:
Nowadays, it is relevant to consider changes in the structure of the fuel and energy balance of industrial regions and the availability of imported fuel and energy resources, especially in the areas that lack energy sources. The ongoing structural shifts in energy consumption systems and the growing uncertainty in energy markets encourage the development of tools for improving the sustainable development of regional energy systems. To refine the theoretical and methodological basis of the study, we defined its conceptual framework, described the difference s betwee n sustainabl e functionin g an d developmen t o f th e energy sector and determined the factors of its regional differentiation and manifestations of the energy crisis. Further, we identified the shortcomings of the existing methods for forecasting the demand for electricity. We paid special attention to quality factors of strategic planning in the region, in particular, the used statistics and documents. Based on the analysis of integrated resource planning (IRP) methodology, our experience in forecasting fuel and energy balances, assessment of sectoral indicators of energy efficiency and energy demand in the region, we proposed a model for predictive and analytical justification of regional programmes for energy development. Such a model significantly increases the information reliability of these programmes’ implementation. Considering organisational tools to support sustainable development, we developed a regional energy management scheme and a mechanism stimulating local energy companies to improve energy efficiency in the consumption sector, enhance regional competition and attract investments in the renewal of fixed assets. The study has practical significance due to recommendations and tools for adjusting regional energy policy based on the coordination of the predicted parameters for various participants in the energy supply process.
APA, Harvard, Vancouver, ISO, and other styles
17

Minhas, Akshay, Mitasha Singh, Nerella Satya Narayana Prasad, and Ashok Bhardwaj. "Geospatial Epidemiology of chicken-pox disease in India between 2015-2021: A GIS based analysis." Indian Journal of Community Health 34, no. 1 (March 31, 2022): 78–81. http://dx.doi.org/10.47203/ijch.2022.v34i01.015.

Full text
Abstract:
Introduction: In this paper, we introduce geographical information systems (GIS) as a tool to study trends in disease spread in time and space. Based on data gathered by the integrated disease surveillance programme (IDSP), we can see where outbreaks of Chickenpox have occurred. Objective: The aim of this study is to assess the trends in chickenpox diseases in India between January 2015 and April 2021 using GIS maps. Methods: For the collection of secondary data relating to chickenpox, a free app called collect 5 was used for collecting data weekly from the IDSP website and then storing them in an online server. In this project, variables that needed to be processed with QGIS were combined with table attributes of many shapefiles of India and presented as maps. Results: Between Jan 2015 and May 2021, 1269 chickenpox outbreaks (27,257 cases) have been recorded. Thirty-one deaths have been confirmed, with most occurring in Bihar and Uttar Pradesh. Nineteen states did not report any deaths. According to the seasonally adjusted trend, the number of cases was highest during the months of January and March. Conclusion: In summary, geographic information systems have become an invaluable tool for mapping the hotspots of acute epidemics and planning public health interventions to prevent the spread of these diseases.
APA, Harvard, Vancouver, ISO, and other styles
18

Amankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "Establishing information security policy compliance culture in organizations." Information & Computer Security 26, no. 4 (October 8, 2018): 420–36. http://dx.doi.org/10.1108/ics-09-2017-0063.

Full text
Abstract:
Purpose This paper aims to establish that employees’ non-compliance with information security policy (ISP) could be addressed by nurturing ISP compliance culture through the promotion of factors such as supportive organizational culture, end-user involvement and compliance leadership to influence employees’ attitudes and behaviour intentions towards ISP in organizations. This paper also aims to develop a testable research model that might be useful for future researchers in predicting employees’ behavioural intentions. Design/methodology/approach In view of the study’s aim, a research model to show how three key constructs can influence the attitudes and behaviours of employees towards the establishment of security policy compliance culture (ISPCC) was developed and validated in an empirical field survey. Findings The study found that factors such as supportive organizational culture and end-user involvement significantly influenced employees’ attitudes towards compliance with ISP. However, leadership showed the weakest influence on attitudes towards compliance. The overall results showed that employees’ attitudes and behavioural intentions towards ISP compliance together influenced the establishment of ISPCC for ISP compliance in organizations. Practical implications Organizations should influence employees’ attitudes towards compliance with ISP by providing effective ISP leadership, encouraging end-user involvement during the draft and update of ISP and nurturing a culture that is conducive for ISP compliance. Originality/value The study provides some insights on how to effectively address the problem of non-compliance with ISP in organizations through the establishment of ISPCC, which has not been considered in any past research.
APA, Harvard, Vancouver, ISO, and other styles
19

Amankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "Information Security Policy Compliance Culture." International Journal of Technology and Human Interaction 17, no. 4 (October 2021): 75–91. http://dx.doi.org/10.4018/ijthi.2021100105.

Full text
Abstract:
Information security policy (ISP) noncompliance is a growing problem that accounts for a significant number of security breaches in organizations. Existing strategies for changing employees' behavior intentions towards compliance have not been effective. It is therefore imperative to identify other effective strategies to address the problem. This article investigates the effect accountability constructs on employees' attitudes and behavior intentions towards establishing ISP compliance as a culture. In addition, the authors validate a testable research model for predicting employees' compliance behavior intentions in a field survey involving 313 employees from selected Ghanaian companies. The overall effect showed that measures of accountability significantly influenced employees' attitudes and behavior intentions to ISP compliance while the establishment of ISP compliance culture largely depended on the existence of a conducive information security culture and positive employee behavior intentions.
APA, Harvard, Vancouver, ISO, and other styles
20

Rostami, Elham, Fredrik Karlsson, and Ella Kolkowska. "The hunt for computerized support in information security policy management." Information & Computer Security 28, no. 2 (January 8, 2020): 215–59. http://dx.doi.org/10.1108/ics-07-2019-0079.

Full text
Abstract:
Purpose The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been suggested, and the way in which the suggested support has been brought about. Design/methodology/approach The results are based on a literature review of ISP management research published between 1990 and 2017. Findings Existing research has focused mostly on manual support for managing ISPs. Very few papers have considered computerised support. The entire complexity of the ISP management process has received little attention. Existing research has not focused much on the interaction between the different ISP management phases. Few research methods have been used extensively and intervention-oriented research is rare. Research limitations/implications Future research should to a larger extent address the interaction between the ISP management phases, apply more intervention research to develop computerised support for ISP management, investigate to what extent computerised support can enhance integration of ISP management phases and reduce the complexity of such a management process. Practical implications The limited focus on computerised support for ISP management affects the kind of advice and artefacts the research community can offer to practitioners. Originality/value Today, there are no literature reviews on to what extent computerised support the ISP management process. Findings on how the complexity of ISP management has been addressed and the research methods used extend beyond the existing knowledge base, allowing for a critical discussion of existing research and future research needs.
APA, Harvard, Vancouver, ISO, and other styles
21

Turel, Ofir, Qinghua He, and Yatong Wen. "Examining the Neural Basis of Information Security Policy Violations: A Noninvasive Brain Stimulation Approach." MIS Quarterly 45, no. 4 (October 14, 2021): 1715–44. http://dx.doi.org/10.25300/misq/2021/15717.

Full text
Abstract:
Nonmalicious information security policy (ISP) violations can cause organizations significant harm. Here, we aim to extend the understanding of why employees engage in such acts. A large body of ISP violation research is based on the tenet that people violate ISPs to obtain personal benefits, as explained by rational choice and expectancy theories. But this assumption has only been weakly tested, using mostly correlational approaches. Our objective is to improve the causal basis for this argument by using a noninvasive brain stimulation (NIBS) technique, which actually modulates brain activity in regions of the brain that process value/gain assessments. Therefore, it can substantially increase the claim of causality—that expected rewards lead to ISP violations. To do so, we build on expectancy theory and neuroscience knowledge to theorize why reducing the excitability of neurons in the left dorsolateral prefrontal cortex (L DLPFC) can lower the endorsement of ISP violations. We test this idea in four experiments in which we use a NIBS technique called high-definition direct current stimulation (HD-tDCS). Our findings support the assertion that the L DLPFC is likely involved in the expectancy theory of ISP violations, and that endorsing such violations can be experimentally adjusted with NIBS techniques. These findings extend the understanding of cybersecurity behaviors, improve the causal support for the common assumption made by rational choice theory studies that ISP violations are motivated through perceived benefits, point to the need to consider the L DLPFC in research on positively valenced (or attractive) technology-mediated actions, and pave the way for future use of brain stimulation techniques for stronger causality claims in information systems research.
APA, Harvard, Vancouver, ISO, and other styles
22

Tsohou, Aggeliki, and Philipp Holtkamp. "Are users competent to comply with information security policies? An analysis of professional competence models." Information Technology & People 31, no. 5 (October 1, 2018): 1047–68. http://dx.doi.org/10.1108/itp-02-2017-0052.

Full text
Abstract:
Purpose Information security policies (ISPs) are used by organizations to communicate rules on the use of information systems (IS). Research studies show that compliance with the ISPs is not a straightforward issue and that several factors influence individual behavior toward ISP compliance, such as security awareness or individual perception of security threats. The purpose of this paper is to investigate the competencies associated with users’ ISP compliance behavior. Design/methodology/approach In order to reveal the competencies that are associated with the users’ ISP compliance behavior, the authors systematically analyze the ISP compliance literature and the authors develop an ISP compliance competency model. The authors then target to explore if IS users are equipped with these competencies; to do so, the authors analyze professional competence models from various industry sectors and compare the competencies that they include with the developed ISP compliance competencies. Findings The authors identify the competencies associated with ISP compliance and the authors provide evidence on the lack of attention in information security responsibilities demonstrated in professional competence frameworks. Research limitations/implications ISP compliance research has focused on identifying the antecedents of ISP compliance behavior. The authors offer an ISP compliance competency model and guide researchers in investigating the issue further by focusing on the professional competencies that are necessary for IS users. Practical implications The findings offer new contributions to practitioners by highlighting the lack of attention on the information security responsibilities demonstrated in professional competence frameworks. The paper also provides implications for the design of information security awareness programs and information security management systems in organizations. Originality/value To the best of the authors’ knowledge, the paper is the first study that addresses ISP compliance behavior from a professional competence perspective.
APA, Harvard, Vancouver, ISO, and other styles
23

Schilling, Jannik, and Jens Tränckner. "Generate_SWMM_inp: An Open-Source QGIS Plugin to Import and Export Model Input Files for SWMM." Water 14, no. 14 (July 20, 2022): 2262. http://dx.doi.org/10.3390/w14142262.

Full text
Abstract:
SWMM is an open-source model and software developed by the US EPA for the simulation of rainfall-runoff and routing in water bodies, sewer systems and wastewater infrastructures. It has been applied in numerous practical works and research projects. For a new SWMM model, objects such as nodes, links and catchments can either be drawn via SWMM’s graphical user interface (GUI) or specified manually in a plain text file in “.inp” format (“input file”). Since the required data regarding sewer geometries and river systems are usually available as spatial data in a GIS environment, there is a need for user-friendly interfaces for the model setup. SWMM contains neither an import function for geodata nor processing tools as provided in geographic information systems (GIS) such as the open-source software QGIS. Existing approaches were script-based or required commercial all-in-one products. We developed a free and open-source QGIS plugin to generate SWMM models from geodata and to import existing SWMM input files into QGIS. An application example is presented to demonstrate the basic features and usage of the plugin.
APA, Harvard, Vancouver, ISO, and other styles
24

Koohang, Alex, Jonathan Anderson, Jeretta Horn Nord, and Joanna Paliszkiewicz. "Building an awareness-centered information security policy compliance model." Industrial Management & Data Systems 120, no. 1 (December 4, 2019): 231–47. http://dx.doi.org/10.1108/imds-07-2019-0412.

Full text
Abstract:
Purpose The purpose of this paper is to build an awareness-centered information security policy (ISP) compliance model, asserting that awareness is the key to ISP compliance and that awareness depends upon several variables that influence successful ISP compliance. Design/methodology/approach The authors built a model with seven constructs, i.e., leadership, trusting beliefs, information security issues awareness (ISIA), ISP awareness, understanding resource vulnerability, self-efficacy (SE) and intention to comply. Seven hypotheses were stated. A sample of 285 non-management employees was used from various organizations in the USA. The authors used path modeling to analyze the data. Findings The findings indicated that IS awareness depends on effective organizational leadership and elevated employees’ trusting beliefs. The understanding of resource vulnerability (URV) and SE are influenced by IS awareness resulting from effective leadership and elevated employees’ trusting beliefs which guide employees to comply with ISP requirements. Practical implications Practical implications were aimed at organizations embracing an awareness-centered information security compliance program to secure organizations’ assets against threats by implementing various security education and training awareness programs. Originality/value This paper asserts that awareness is central to ISP compliance. Leadership and trusting beliefs variables play significant roles in the information security awareness which in turn positively affect employees’ URV and SE variables leading employees to comply with the ISP requirements.
APA, Harvard, Vancouver, ISO, and other styles
25

Song, Yu Chuan, Y. J. Wang, J. X. Yin, Fei Liu, and L. H. Jiang. "A Kind of Information System Planning Model: The Application in an Automobile Manufacturing Enterprise." Materials Science Forum 626-627 (August 2009): 645–50. http://dx.doi.org/10.4028/www.scientific.net/msf.626-627.645.

Full text
Abstract:
Information System Planning (ISP) plays an important role in IT strategy. ISP not only faces complicated and dynamic business environment but also lacks of integrated optimization of enterprise strategy, business strategy and IT strategy. This paper proposes an information system planning model, which considers enterprise forming strategic advantages as the core,and emphasizes that strategy layer should adapt to competitive environment dynamically in strategic whole life cycle, and emphasizes that collaborative interaction inside strategy layer should be achieved among enterprise strategy, business strategy and IT strategy. On this basis, make use of this model to plan agile information system of an automobile manufacturing enterprise and achieve important application effects
APA, Harvard, Vancouver, ISO, and other styles
26

Obaid, Ahmed J., and Firas Thamer Al-Rawi. "3rd International Conference on Smart Cities and Sustainable Planning (SCSP 2022)." IOP Conference Series: Earth and Environmental Science 1129, no. 1 (January 1, 2023): 011001. http://dx.doi.org/10.1088/1755-1315/1129/1/011001.

Full text
Abstract:
SCSP_2022 Conference Proceeding is the 3rd edition of the SCSP Conference series; this volume Involved Our Peer-Reviewed Papers that are reviewed and presented through this Conference which focuses on Smart Cities and Sustainable Planning; SCSP 2022 is held in a Hybrid manner at the Center of Urban and Regional Planning, University of Baghdad, Iraq, 26-27 April 2022. SCSP aims to latest and new trends in topics covered under broad areas such as Smart Cities and Urban Planning. Many cities have made a qualitative leap in their different living systems through several technical systems and applications that have entered various areas of life. Therefore, it has become an essential issue to study the technical elements involved in planning and designing modern cities to transform them into smart cities. It uses information and communication technology to make the components of cities, infrastructure, facilities, and services more effective and interactive with people to reach cooperative cities that achieve maximum benefits for the residents. Our Conference addresses the issue of new city designs and the development of existing contemporary cities based on modern standards that stimulate technological growth and scientific progress by introducing artificial intelligence into the urban environment. To ensure a high quality of life for its residents and meet the basic needs to achieve social, economic, and environmental well-being. All submitted papers are based on double-blind reviews. Only accepted papers based on reviewers’ comments and editorial board decisions will be considered for possible publication in our Conference Proceeding with IOP Conference Series: Earth and Environmental Science (EES). SCSP Conference got significant interest from authors from many countries like the UK, Poland, France, India, Syria, and others. The authors have successfully presented their works and attended our conference sessions Via ZOOM Software. Conference Sessions were managed by our scientific and organizing committee members, who answered all the questions attendees or Session chairs asked. We successfully held this Conference within 2-Days (26 and 27 April 2022); on the first day, we successfully listened to the keynote speakers’ presentations; then, 6 sessions started from 12:30 pm in Iraq Standard Time till 02:30 pm, and the total number of papers presented on the first day was 30 papers, 5 papers for each Session. We want to thank all our session chairs for their hard work and attend our (6) sessions over two days and more than 6 hours per day to deliver the presented outcomes successfully. List of Venue of the Conference, Conference Chairs, Conference Editors, Scientific Committee, Organizing Committee, Invited Speakers, Organizing Institutions, Conference Partners are available in this Pdf.
APA, Harvard, Vancouver, ISO, and other styles
27

Costanzo, Don. "AUTOMATED ICS: A FRAMEWORK FOR SUCCESS." International Oil Spill Conference Proceedings 2001, no. 2 (March 1, 2001): 1033–34. http://dx.doi.org/10.7901/2169-3358-2001-2-1033.

Full text
Abstract:
ABSTRACT Over the years, many organizations have attempted to automate the Incident Command System (ICS). These attempts have ranged from computerizing T-cards to a nationwide spill operations system. Over time, these systems have had varying degrees of success. While certain inherent reasons exist for not automating ICS, they are outweighed by the tremendous potential of successful automation. The need to produce documentation, the integration of ICS sections, and the rapid change of information all lend themselves to automation. Successful ICS automation does not start with computerizing ICS forms. The hey to automating ICS is to automate both ICS and response processes. In a response effort, many separate and distinct processes occur daily. The requisitioning of resources, the planning and application of the response organization, cost accounting, and the development of an Incident Action Plan (IAP) occur many times during an incident. This paper describes a framework for automating and integrating these processes. This framework offers organizations a road map for successful ICS automation. The poster presentation includes a software demonstration that illustrates the benefits of integrated automation.
APA, Harvard, Vancouver, ISO, and other styles
28

Guan, Bowen, and Carol Hsu. "The role of abusive supervision and organizational commitment on employees' information security policy noncompliance intention." Internet Research 30, no. 5 (May 2, 2020): 1383–405. http://dx.doi.org/10.1108/intr-06-2019-0260.

Full text
Abstract:
PurposeThe purpose of this paper is to investigate the association between abusive supervision and employees' information security policy (ISP) noncompliance intention, building on affective commitment, normative commitment and continuance commitment. The study also examines the moderating effect of perceived certainty and severity of sanctions on the relationship between the three dimensions of organizational commitment and ISP noncompliance intention.Design/methodology/approachSurvey methodology was used for data collection through a well-designed online questionnaire. Data was analyzed using the structural equation model with Amos v. 22.0 software.FindingsThis study demonstrates that abusive supervision has a significant, negative impact on affective, normative and continuance commitment, and the three dimensions of organizational commitment are negatively associated with employees' ISP noncompliance intention. Results also indicate that the moderating effect of perceived severity of sanctions is significant, and perceived certainty of sanctions plays a positive moderating role in the relationship between affective commitment and employees' ISP noncompliance intention.Practical implicationsFindings of this research are beneficial for organizational management in the relationships between supervisors and employees. These results provide significant evidence that avoiding abusive supervision is important in controlling employees' ISP noncompliance behavior.Originality/valueThis research fills an important gap in examining employees' ISP noncompliance intentions from the perspective of abusive supervision and the impact of affective, normative and continuance commitment on ISP noncompliance. The study is also of great value for information systems research to examine the moderating role of perceived certainty and severity of sanctions.
APA, Harvard, Vancouver, ISO, and other styles
29

Carmi, Golan, and Dan Bouhnik. "The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel." Interdisciplinary Journal of Information, Knowledge, and Management 15 (2020): 109–25. http://dx.doi.org/10.28945/4596.

Full text
Abstract:
Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is explored. Background: The study focuses on employees’ attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial Corporation Contribution: As far as we know, this is the first paper to thoroughly explore employees’ awareness of information system procedures, among financial organizations in Israel, and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. The main contribution of this study is that it investigates compliance with information security practices among employees of a defined financial corporation operating under rigid regulatory governance, confidentiality and privacy of data, and stringent requirements for compliance with information security procedures. Findings: Our results indicate that employees’ attitudes, normative beliefs and personal capabilities to comply with firm’s ISP, have positive effects on the firm’s ISP compliance. Also, employees’ general awareness of IS, as well as awareness to ISP within the firm, positively affect employees’ ISP compliance. Recommendations for Practitioners: This study can help information security managers identify the motivating factors for employee behavior to maintain information security procedures, properly channel information security resources, and manage appropriate information security behavior. Recommendation for Researchers: Researchers can see that corporate rewards and sanctions have significant effects on employee security behavior, but other motivational factors also reinforce the ISP’s compliance behavior. Distinguishing between types of corporations and organizations is essential to understanding employee compliance with information security procedures. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from another type of corporation from other fields and should apply qualitative analysis to explore other aspects of behavioral patterns related to the subject matter.
APA, Harvard, Vancouver, ISO, and other styles
30

Aurigemma, Salvatore, and Thomas Mattson. "Deterrence and punishment experience impacts on ISP compliance attitudes." Information & Computer Security 25, no. 4 (October 9, 2017): 421–36. http://dx.doi.org/10.1108/ics-11-2016-0089.

Full text
Abstract:
Purpose The paper aims to examine the inconclusive impacts of sanction-related deterrence on employee information security policy (ISP) compliance from the extant literature. It proposes that the disparate findings can be partially explained by two factors: investigating the mediating impact of attitudes on sanction effects instead of directly on behavioral intentions and examining employees with and without previous punishment experiences separately. Design/methodology/approach The paper relied upon survey data from 239 employees of a large governmental organization with a robust ISP and security education and training awareness program. Findings The paper provides empirical evidence that the rational estimation of sanction effects impacts the cognitive component of attitudes to develop a positive or negative attitude toward performing the ISP directed behavior. Furthermore, this attitudinal effect (created by sanction threats) will be biased depending on whether the employee has experienced, personally or vicariously, any previous punishment for violating the ISP. Research limitations/implications Because of the chosen research approach (self-reported survey data) and context (single hierarchical organization and a very specific security threat), the research results may lack generalizability. Therefore, researchers are encouraged to test the proposed propositions further in different organizational and threat contexts. Practical implications Organizations should have a thorough understanding of how their employees’ perceive sanctions in relationship to their prior experiences before implementing such policies. Originality/value The paper addresses previous research calls for examining possible mediation variables for deterrence effects and impacts of punishment experiences on employee ISP compliance.
APA, Harvard, Vancouver, ISO, and other styles
31

Topa, Ioanna, and Maria Karyda. "From theory to practice: guidelines for enhancing information security management." Information & Computer Security 27, no. 3 (July 8, 2019): 326–42. http://dx.doi.org/10.1108/ics-09-2018-0108.

Full text
Abstract:
Purpose This study aims to identify the implications of security behaviour determinants for security management to propose respective guidelines which can be integrated with current security management practices, including those following the widely adopted information security standards ISO 27001, 27002, 27003 and 27005. Design/methodology/approach Based on an exhaustive analysis of related literature, the authors identify critical factors influencing employee security behaviour and ISP compliance. The authors use these factors to perform a gap analysis of widely adopted information security standards ISO 27001, 27002, 27003 and 27005 and identify issues not covered or only partially addressed. Drawing on the implications of security behaviour determinants and the identified gaps, the authors provide guidelines which can enhance security management practices. Findings The authors uncover the factors shaping security behaviour barely or partly considered in the ISO information security standards ISO 27001, 27002, 27003 and 27005, including top management participation, accommodating individual characteristics, embracing the cultural context, encouraging employees to comply out of habit and considering the cost of compliance. Furthermore, the authors provide guidelines to security managers on enhancing their security management practices when implementing the above ISO Standards. Practical implications This study offers guidelines on how to create and design security management practices whilst implementing ISO standards (ISO 27001, ISO 27002, ISO 27003, ISO 27005) so as to enhance ISP compliance. Originality/value This study analyses the role and implications of security behaviour determinants, discusses discrepancies and conflicting findings in related literature, provides a gap analysis of commonly used information security standards (ISO 27001, 27002, 27003 and 27005) and proposes guidelines on enhancing security management practices towards improving ISP compliance.
APA, Harvard, Vancouver, ISO, and other styles
32

Shih, Hung-Pin, Kee-hung Lai, Xitong Guo, and T. C. E. Cheng. "Believe It or Not." Journal of Global Information Management 29, no. 6 (November 2021): 1–18. http://dx.doi.org/10.4018/jgim.294329.

Full text
Abstract:
Most theories of information security policy (ISP), except a few focused on the insider-centric view, are grounded in the control-centric perspective, and most ISP compliance models stem from Western countries. Regulatory focus theory (RFT) proposes two modes of motivational regulation, promotion and prevention focused that are supposed to motivate employee compliance in a trade-off. Culture is crucial to the study of ISP that puts control over human connections. Chinese guanxi, a specific dimension of Chinese culture, is better understood underlying the trust-distrust frame. To bridge the theoretical gap between the control-centric and the insider-centric perspectives, we develop an ISP behavioral model by taking an integrated approach from RFT and the trust-distrust frame. We employed scenario-based events about information security misconduct in the workplace to examine employees’ compliance intention and non-violation choice of ISP upon counterfactual thinking. Our empirical results improve the theoretical and practical implications of security practices.
APA, Harvard, Vancouver, ISO, and other styles
33

Kuo, Kuang-Ming, Paul C. Talley, and Dyi-Yih Michael Lin. "Hospital Staff’s Adherence to Information Security Policy: A Quest for the Antecedents of Deterrence Variables." INQUIRY: The Journal of Health Care Organization, Provision, and Financing 58 (January 2021): 004695802110295. http://dx.doi.org/10.1177/00469580211029599.

Full text
Abstract:
Information security has come to the forefront as an organizational priority since information systems are considered as some of the most important assets for achieving competitive advantages. Despite huge capital expenditures devoted to information security, the occurrence of security breaches is still very much on the rise. More studies are thus required to inform organizations with a better insight on how to adequately promote information security. To address this issue, this study investigates important factors influencing hospital staff’s adherence to Information Security Policy (ISP). Deterrence theory is adopted as the theoretical underpinning, in which punishment severity and punishment certainty are recognized as the most significant predictors of ISP adherence. Further, this study attempts to identify the antecedents of punishment severity and punishment certainty by drawing from upper echelon theory and well-acknowledged international standards of IS security practices. A survey approach was used to collect 299 valid responses from a large Taiwanese healthcare system, and hypotheses were tested by applying partial least squares-based structural equation modeling. Our empirical results show that Security Education, Training, and Awareness (SETA) programs, combined with internal auditing effectiveness are significant predictors of punishment severity and punishment certainty, while top management support is not. Further, punishment severity and punishment certainty are significant predictors of hospital staff’s ISP adherence intention. Our study highlights the importance of SETA programs and internal auditing for reinforcing hospital staff’s perceptions on punishment concerning ISP violation, hospitals can thus propose better internal strategies to improve their staff’s ISP compliance intention accordingly.
APA, Harvard, Vancouver, ISO, and other styles
34

Genuis, Shelagh K. "Kuhlthau’s Classic Research on the Information Search Process (ISP) Provides Evidence for Information Seeking as a Constructivist Process." Evidence Based Library and Information Practice 2, no. 4 (December 7, 2007): 80. http://dx.doi.org/10.18438/b88d0c.

Full text
Abstract:
A review of: Kuhlthau, Carol C. “Inside the Search Process: Information Seeking from the User's Perspective.” Journal of the American Society for Information Science 42.5 (1991): 361-71. Objective – To extend understanding of purposeful information seeking and to present a model of the information search process (ISP) from the perspective of the user. Design – Review of theoretical foundation, summing up of qualitative and quantitative data from a series of five foundational studies, and presentation of ISP model. Setting – Summarised research was conducted primarily in high school and college environments where subjects were investigating an assigned topic. A small proportion of public libraries were used in the fifth study within the reviewed series. Subjects – The ISP model as presented in this ‘classic’ article is based on studies involving a total of 558 participants. The first study involved 26 academically advanced high school seniors, and the 2 subsequent studies involved respectively 20 and 4 of the original participants following their completion of 4 years of college. The final 2 studies involved respectively 147 high, middle and low achieving high school seniors, and 385 academic, public and school library users. Methods – This paper presents the foundation for the ISP model by reviewing the relationship between Kelly’s personal construct theory, Belkin, Brooks, and Oddy’s investigation of cognitive aspects of the constructive information seeking process, and Taylor’s work on levels of information need (“Question-negotiation”) and value-added information (“Value-added”). This is followed by a review of Kuhlthau’s five foundational studies, which investigated the common information seeking experiences of users who were seeking to expand knowledge related to a particular topic or problem. The first of these studies was a small-scale exploration in which participants were given two assignments. Questionnaires, journaling, search logs, and reflective writing were used to collect data throughout the process of assignment completion. Data collection was augmented by case studies involving in-depth interviews and construction of timelines and flowcharts with six study participants. The six-stage ISP model was developed from qualitative content analysis of participants’ perceptions and experiences (Kuhlthau, “Library Research Process”). In the second study, the same questionnaire was used to determine how students’ perceptions of the ISP had changed over time. Post-college responses were compared to responses given in high school and statistical significance was determined through t Tests (Kuhlthau, Perceptions). Four of the original 6 case study participants were interviewed in the third study, in which interview data and search process timelines were compared with high school case studies (Kuhlthau, Longitudinal). In the fourth and fifth studies, large-scale field studies were conducted to verify the ISP model. Process surveys elicited participants’ thoughts and feelings at initiation, midpoint, and closure of a search task. Data were analysed using descriptive and inferential statistics including measures of significance and analysis of variance (Kuhlthau, Information Search; Kuhlthau et al.). Following a summation of these 5 research studies, this article details and discusses the ISP model. Main results – Based on the data from the five studies, the ISP presents a constructivist approach to information seeking and incorporates affective, cognitive, and physical dimensions at each of six information searching stages: initiation, topic selection, pre-focus exploration, focus formulation, information collection, and presentation. Individuals become aware of an information need at initiation. Feelings of uncertainty and apprehension are common as wide-ranging task exploration begins. At topic selection a general topic is selected and users frequently experience initial optimism, which is commonly followed by confusion and doubt as pre-focus exploration commences and users struggle to extend personal knowledge through initial investigation of the general topic. A turning point occurs during focus formulation as constructs become clearer and uncertainty decreases. During information collection the user is able to articulate focused need and is able to interact effectively with intermediaries and systems. Relief is commonly experienced at presentation stage when findings are presented or used. Although stages are laid out sequentially, Kuhlthau notes that the ISP is an iterative process in which stages merge and overlap. Central to this model is the premise that uncertainty is not due merely to a lack of familiarity with sources and technologies, but is an integral and critical part of a process of learning that culminates in finding meaning through personal synthesis of topic or problem. Conclusion – Kuhlthau provides evidence for a view of information seeking as an evolving, iterative process and presents a model for purposeful information searching which, if understood by users, intermediaries and information system designers, provides a basis for productive interaction. While users will benefit from understanding the evolving nature of focus formulation and the affective dimensions of information seeking, intermediaries and systems are challenged to improve information provision in the early formative stages of a search. Although Kuhlthau identifies this research on the ISP as exploratory in nature, this article affords methodological insight into the use of mixed methods for exploring complex user-oriented issues, presents a model that effectively communicates an approximation of the common information-seeking process of users, and provides ongoing impetus for exploring the user’s perspective on information seeking.
APA, Harvard, Vancouver, ISO, and other styles
35

Rafikov, Rafik, and Mikhail Kulikov. "PROCESS ENGINEERING OF LOCOMOTIVE REPAIR." Transport engineering 2022, no. 8 (August 7, 2022): 33–43. http://dx.doi.org/10.30987/2782-5957-2022-8-33-43.

Full text
Abstract:
The study objective is to show the importance of process engineering in traction rolling stock repair under the conditions of reforming the domestic locomotive repair complex in terms of the transition to service maintenance and repair. The paper is devoted to the description of production preparation to the repair of new types of traction rolling stock for planning, organizing and effectively managing the process engineering at a stated time. As part of the study, the theories of information and technical systems, the theory of queuing, optimization of technological processes and experiment planning, system analysis are applied. The novelty of the work is in identifying the main stages of process engineering, in making a business process model of the algorithm for forming a network plan for production design engineering (PDE), allowing to show any production process not only from the side of control and providing it with inventory resources, technical documentation, qualified employees, but also from the side of verifying the technology of performing operations. It is found out that in the conditions of reforming the domestic locomotive repair complex, the issue of performing PDE for the repair of traction rolling stock (TPS) is urgent. The main PDE stages are highlighted. The main purpose of process engineering is to develop an optimal technological process (TP) that would ensure the repair of products of a given quality with minimal costs. At the preparatory stage, the exact organization and production preparation itself is of key importance. These costs are constantly increasing with the continuous complication of the locomotive structures themselves and the need to reduce the time for repairs. PDE advantages and disadvantages in IPS Techcard system are noted.
APA, Harvard, Vancouver, ISO, and other styles
36

Rafikov, Rafik, and Mikhail Kulikov. "PROCESS ENGINEERING OF LOCOMOTIVE REPAIR." Transport engineering 2022, no. 8 (August 7, 2022): 33–43. http://dx.doi.org/10.30987/2782-5957-2022-8-33-43.

Full text
Abstract:
The study objective is to show the importance of process engineering in traction rolling stock repair under the conditions of reforming the domestic locomotive repair complex in terms of the transition to service maintenance and repair. The paper is devoted to the description of production preparation to the repair of new types of traction rolling stock for planning, organizing and effectively managing the process engineering at a stated time. As part of the study, the theories of information and technical systems, the theory of queuing, optimization of technological processes and experiment planning, system analysis are applied. The novelty of the work is in identifying the main stages of process engineering, in making a business process model of the algorithm for forming a network plan for production design engineering (PDE), allowing to show any production process not only from the side of control and providing it with inventory resources, technical documentation, qualified employees, but also from the side of verifying the technology of performing operations. It is found out that in the conditions of reforming the domestic locomotive repair complex, the issue of performing PDE for the repair of traction rolling stock (TPS) is urgent. The main PDE stages are highlighted. The main purpose of process engineering is to develop an optimal technological process (TP) that would ensure the repair of products of a given quality with minimal costs. At the preparatory stage, the exact organization and production preparation itself is of key importance. These costs are constantly increasing with the continuous complication of the locomotive structures themselves and the need to reduce the time for repairs. PDE advantages and disadvantages in IPS Techcard system are noted.
APA, Harvard, Vancouver, ISO, and other styles
37

Kucera, Kristen L., Dustin W. Currie, Erin B. Wasserman, Zachary Y. Kerr, Leah Cox Thomas, Stephen Paul, and R. Dawn Comstock. "Incidence of Sport-Related Internal Organ Injuries Due to Direct-Contact Mechanisms Among High School and Collegiate Athletes Across 3 National Surveillance Systems." Journal of Athletic Training 54, no. 2 (February 1, 2019): 152–64. http://dx.doi.org/10.4085/1062-6050-271-17.

Full text
Abstract:
Context Although sport-related internal organ injuries among athletes are relatively infrequent, combining data sources enables a more comprehensive examination of their incidence. Objective To describe the incidence and characteristics of sport-related internal organ injuries due to direct-contact mechanisms among high school (HS) and collegiate athletes from 2005–2006 through 2014–2015. Design Descriptive epidemiology study. Setting United States HS and collegiate sports data from 3 national sports injury-surveillance systems: High School Reporting Information Online (HS RIO), the National Collegiate Athletic Association Injury Surveillance Program (ISP), and the National Center for Catastrophic Sport Injury Research. Patients or Other Participants High school and collegiate athletes in organized sports. Main Outcome Measure(s) Characteristics of the athlete, event, and injury were examined and stratified by data source and sport. Descriptive statistics of internal organ injuries via direct-contact mechanisms consisted of frequencies and incidence rates (IRs) per 1 000 000 athlete-exposures and 95% confidence intervals (CIs). Results During the 10-year period, 174 internal organ injuries were captured: 124 in HS RIO and 41 in the ISP; 9 were catastrophic. Most noncatastrophic injuries occurred among males (RIO = 85%, ISP = 89%), in football (RIO = 65%, ISP = 58%), and during competitions (RIO = 67%, ISP = 49%) and were due to player-player contact (RIO = 78%, ISP = 68%). The highest injury rates were in male contact sports: RIO football (IR = 11.7; 95% CI = 9.1, 14.2) and lacrosse (IR = 10.0; 95% CI = 3.1, 16.9); ISP: football (IR = 8.3; 95% CI = 5.0, 11.6) and ice hockey (IR = 7.9; 95% CI = 1.0, 14.7). A quarter of noncatastrophic injuries were season ending (RIO = 25%, ISP = 23%). Of the 9 catastrophic injuries, most occurred in HS (7/9) and football (7/9) and were due to player-player contact (6/9). Four resulted in death. Conclusions Direct-contact internal organ injuries occur infrequently; yet when they do occur, they may result in severe outcomes. These findings suggest that early recognition and a better understanding of the activities associated with the event and use or nonuse of protective equipment are needed.
APA, Harvard, Vancouver, ISO, and other styles
38

Li, Han, Xin (Robert) Luo, and Yan Chen. "Understanding Information Security Policy Violation from a Situational Action Perspective." Journal of the Association for Information Systems 22, no. 3 (2021): 739–72. http://dx.doi.org/10.17705/1jais.00678.

Full text
Abstract:
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in organizations. As most of the extant studies have largely examined insider threats at a high level of abstraction, the role of situational moral reasoning for information security policy (ISP) violations in specific situations has received little attention. To advance this line of research, this paper opens up a potentially fruitful path for IS researchers by applying situational action theory (SAT) to contextually examine why employees violate ISPs in particular situations. We consider the violations of password security policy, internet use policy, and confidential data security policy, and examine specific violation intents ranging from altruistic to malicious. The results support most of the assertions derived from SAT. We found situational moral beliefs to be the predominant driver for ISP violations across three situations in an organizational setting. However, the moderation effect of moral beliefs was only significant in situations involving sharing passwords and selling confidential data. Sanction certainty and sanction severity were also found to have different effects across situations. We conclude by presenting implications for IS security practitioners and suggestions for future research.
APA, Harvard, Vancouver, ISO, and other styles
39

NAZARI-SHIRKOUHI, S., A. ANSARINEJAD, SS MIRI-NARGESI, V. MAJAZI DALFARD, and K. REZAIE. "INFORMATION SYSTEMS OUTSOURCING DECISIONS UNDER FUZZY GROUP DECISION MAKING APPROACH." International Journal of Information Technology & Decision Making 10, no. 06 (November 2011): 989–1022. http://dx.doi.org/10.1142/s0219622011004683.

Full text
Abstract:
During the last decade, information system (IS) outsourcing has emerged as a major issue for organizations. As outsourcing decisions are often based on multicriteria approaches and group decisions, this paper proposes a structured methodology based on Fuzzy group decision making approach to evaluate and select the appropriate information system project (ISP) in an actual case. To achieve our purpose, we argue that seven criteria consisting of risk, management, economics, technology, resource, quality, and strategy and five ISPs should be considered for outsourcing decisions. Fuzzy analytic hierarchy process (fuzzy AHP) to find the priority and ranking of each ISP is considered. Using fuzzy theory for selecting the proper IS project can reduce ambiguities and uncertainties that are inherent in the selection procedure. A sensitivity analysis is performed to check the steadiness of the priority ranking and help decision makers to understand different scenarios that show alternative potential developments or different viewpoints concerning the relative importance of the criteria. Our proposed methodology can be applied by a cross-functional team of practitioners and IT managers to select the proper IS project. Also, the proposed approach can effectively consider complex and qualitative decision variables involved in the IS outsourcing decision-making problem. Finally, conclusion and potential issues for future research are presented. The main findings of this research have showed that the combination of AHP method and fuzzy concept to rank and prioritize of IS projects to outsource is a useful and practical tool to make traceable and reliable decision. According to results, a priority of overall score for the five candidates of IS projects reflects that project of "development of the supplier relationship management information system" performs the best, and project of "facilities management" performs the worst according to the experts' judgment in case study.
APA, Harvard, Vancouver, ISO, and other styles
40

Park, Keumsun, Minah Chae, and Jae Hyuk Cho. "Image Pre-Processing Method of Machine Learning for Edge Detection with Image Signal Processor Enhancement." Micromachines 12, no. 1 (January 11, 2021): 73. http://dx.doi.org/10.3390/mi12010073.

Full text
Abstract:
Even though computer vision has been developing, edge detection is still one of the challenges in that field. It comes from the limitations of the complementary metal oxide semiconductor (CMOS) Image sensor used to collect the image data, and then image signal processor (ISP) is additionally required to understand the information received from each pixel and performs certain processing operations for edge detection. Even with/without ISP, as an output of hardware (camera, ISP), the original image is too raw to proceed edge detection image, because it can include extreme brightness and contrast, which is the key factor of image for edge detection. To reduce the onerousness, we propose a pre-processing method to obtain optimized brightness and contrast for improved edge detection. In the pre-processing, we extract meaningful features from image information and perform machine learning such as k-nearest neighbor (KNN), multilayer perceptron (MLP) and support vector machine (SVM) to obtain enhanced model by adjusting brightness and contrast. The comparison results of F1 score on edgy detection image of non-treated, pre-processed and pre-processed with machine learned are shown. The pre-processed with machine learned F1 result shows an average of 0.822, which is 2.7 times better results than the non-treated one. Eventually, the proposed pre-processing and machine learning method is proved as the essential method of pre-processing image from ISP in order to gain better edge detection image. In addition, if we go through the pre-processing method that we proposed, it is possible to more clearly and easily determine the object required when performing auto white balance (AWB) or auto exposure (AE) in the ISP. It helps to perform faster and more efficiently through the proactive ISP.
APA, Harvard, Vancouver, ISO, and other styles
41

Park, Keumsun, Minah Chae, and Jae Hyuk Cho. "Image Pre-Processing Method of Machine Learning for Edge Detection with Image Signal Processor Enhancement." Micromachines 12, no. 1 (January 11, 2021): 73. http://dx.doi.org/10.3390/mi12010073.

Full text
Abstract:
Even though computer vision has been developing, edge detection is still one of the challenges in that field. It comes from the limitations of the complementary metal oxide semiconductor (CMOS) Image sensor used to collect the image data, and then image signal processor (ISP) is additionally required to understand the information received from each pixel and performs certain processing operations for edge detection. Even with/without ISP, as an output of hardware (camera, ISP), the original image is too raw to proceed edge detection image, because it can include extreme brightness and contrast, which is the key factor of image for edge detection. To reduce the onerousness, we propose a pre-processing method to obtain optimized brightness and contrast for improved edge detection. In the pre-processing, we extract meaningful features from image information and perform machine learning such as k-nearest neighbor (KNN), multilayer perceptron (MLP) and support vector machine (SVM) to obtain enhanced model by adjusting brightness and contrast. The comparison results of F1 score on edgy detection image of non-treated, pre-processed and pre-processed with machine learned are shown. The pre-processed with machine learned F1 result shows an average of 0.822, which is 2.7 times better results than the non-treated one. Eventually, the proposed pre-processing and machine learning method is proved as the essential method of pre-processing image from ISP in order to gain better edge detection image. In addition, if we go through the pre-processing method that we proposed, it is possible to more clearly and easily determine the object required when performing auto white balance (AWB) or auto exposure (AE) in the ISP. It helps to perform faster and more efficiently through the proactive ISP.
APA, Harvard, Vancouver, ISO, and other styles
42

Savarnejad, Atoosa. "ISP security consortium formed." Network Security 1997, no. 6 (June 1997): 4. http://dx.doi.org/10.1016/s1353-4858(97)89518-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Pambudi, Ryo, and Much Aziz Muslim. "Implementasi Policy Base Routing dan Failover Menggunakan Router Mikrotik untuk Membagi Jalur Akses Internet di FMIPA Unnes." Jurnal Teknologi dan Sistem Komputer 5, no. 2 (May 2, 2017): 57. http://dx.doi.org/10.14710/jtsiskom.5.2.2017.57-61.

Full text
Abstract:
Increasing requirement for information in every year become an important requirement for every society, organizations, and others institution. Semarang State University (Unnes) had using online information systems in every aspect. It needs high speed and reliable internet connection, so the using of two Internet Service Provider (ISP) or public pathways are highly commended. Internet access point density due to the number of users such as students, faculty, and employees to be one of the factors that can interfere with such information systems. Routing settings on Mikrotik router become one of the solutions to reduce density access of internet. The useful of policy-base routing is to separate the path which will be passed when the accessing the Internet and the useful of failover technique is to move path automatically if one access point (ISP) impaired / down. Comparison before and after applying these two techniques while accessing the Unnes information systems results increasing access speed with 4 ms response time faster than before used policy base routing.Pertumbuhan dan kebutuhan akan informasi semakin tahun menjadi sebuah kebutuhan vital bagi setiap masyarakat pada umumnya dan bagi organisasi maupun lembaga pendidikan pada khususnya. Universitas Negeri Semarang (Unnes) yang telah lama menggunakan sistem informasi secara online dalam setiap aspek, membutuhkan internet yang cepat dan handal sehingga penggunaan dua Internet Service Provider (ISP) atau jalur publik sangat dianjurkan. Kepadatan jalur akses internet akibat banyaknya pengguna yaitu mahasiswa, dosen, dan karyawan menjadi salah satu faktor yang dapat mengganggu sistem-sistem informasi tersebut. Pengaturan routing pada router Mikrotik menjadi salah satu solusi untuk mengurangi kepadatan jalur akses internet. Policy base routing dapat berguna untuk memisahkan jalur mana yang akan dilewati pengguna saat mengakses internet dan teknik failover berguna untuk memindahkan jalur otomatis jika salah satu jalur akses (ISP) mengalami gangguan/down. Perbandingan sebelum dan setelah menerapkan kedua teknik tersebut saat mengakses sistem-sistem informasi milik Unnes menunjukkan tingkat hasil kecepatan akses yang berbeda, yang menghasilkan waktu response lebih cepat 4 ms dibandingkan sebelum penggunaan policy base routing.
APA, Harvard, Vancouver, ISO, and other styles
44

Rowley, Jennifer. "Strategic information systems planning." Information Services & Use 15, no. 1 (January 1, 1995): 57–66. http://dx.doi.org/10.3233/isu-1995-15108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hackney, Ray, John Kawalek, and Gurpreet Dhillon. "Strategic Information Systems Planning." Journal of Organizational and End User Computing 11, no. 2 (April 1999): 3–12. http://dx.doi.org/10.4018/joeuc.1999040101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Lederer, Albert L., and Veronica Gardiner. "STRATEGIC INFORMATION SYSTEMS PLANNING." Information Systems Management 9, no. 3 (January 1992): 13–20. http://dx.doi.org/10.1080/10580539208906877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Pourreza, Saba, Misagh Faezipour, and Miad Faezipour. "Eye-SCOR: A Supply Chain Operations Reference-Based Framework for Smart Eye Status Monitoring Using System Dynamics Modeling." Sustainability 14, no. 14 (July 20, 2022): 8876. http://dx.doi.org/10.3390/su14148876.

Full text
Abstract:
This work is a unique integration of three different areas, including smart eye status monitoring, supply chain operations reference (SCOR), and system dynamics, to explore the dynamics of the supply chain network of smart eye/vision monitoring systems. Chronic eye diseases such as glaucoma affect millions of individuals worldwide and, if left untreated, can lead to irreversible vision loss. Nearly half of the affected population is unaware of the condition and can be informed with frequent, accessible eye/vision tests. Tonometry is the conventional clinical method used in healthcare settings to determine the intraocular pressure (IOP) level for evaluating the risk of glaucoma. There are currently very few (under development) non-contact and non-invasive methods using smartphones to determine the risk of IOP and/or the existence of other eye-related diseases conveniently at home. With the overall goal of improving health, well-being, and sustainability, this paper proposes Eye-SCOR: a supply chain operations reference (SCOR)-based framework to evaluate the effectiveness of smartphone-based eye status monitoring apps. The proposed framework is designed using system dynamics modeling as a subset of a new causal model. The model includes interaction/activities between the main players and enablers in the supply chain network, namely suppliers/service providers, smartphone app/device factors, customers, and healthcare professionals, as well as cash and information flow. The model has been tested under various scenarios and settings. Simulation results reveal the dynamics of the model and show that improving the eye status monitoring device/app factors directly increases the efficiency/Eye-SCOR level. The proposed framework serves as an important step towards understanding and improving the overall performance of the supply chain network of smart eye/vision monitoring systems.
APA, Harvard, Vancouver, ISO, and other styles
48

Caesar, M., and J. Rexford. "BPG routing policies in ISP networks." IEEE Network 19, no. 6 (November 2005): 5–11. http://dx.doi.org/10.1109/mnet.2005.1541715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Chandran, Avinash, Sarah N. Morris, Erin B. Wasserman, Adrian J. Boltz, and Christy L. Collins. "Methods of the National Collegiate Athletic Association Injury Surveillance Program, 2014–2015 Through 2018–2019." Journal of Athletic Training 56, no. 7 (July 1, 2021): 616–21. http://dx.doi.org/10.4085/1062-6050-406-20.

Full text
Abstract:
Background Since 1982, the National Collegiate Athletic Association (NCAA) has collaborated with athletic trainers (ATs) to create the largest ongoing collegiate sports injury database in the world. This report provides an operational update of the NCAA Injury Surveillance Program (NCAA ISP) during the academic years 2014–2015 through 2018–2019. Surveillance system structure The NCAA ISP used a convenience sampling technique via a rolling recruitment model. The ATs at contributing institutions voluntarily submitted data into their respective electronic medical record systems; common data elements were pushed to and maintained by the Datalys Center. The ATs provided information about all team-related activities, even if no injury occurred during that activity, as well as detailed reports on each injury, including condition and circumstances. Summary The NCAA ISP has a long-standing role in supplying NCAA stakeholders with crucial injury surveillance data, playing a critical part in safeguarding student-athletes participating in collegiate sports.
APA, Harvard, Vancouver, ISO, and other styles
50

Masri, Akram, and James E. Moore II. "Integrated Planning Information Systems: Disaster Planning Analysis." Journal of Urban Planning and Development 121, no. 1 (March 1995): 19–39. http://dx.doi.org/10.1061/(asce)0733-9488(1995)121:1(19).

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography