The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This conception of an information system, formed for making a decision on a specific problem and temporarily existing only during this period, is proposed. Virtual information system (VI-system). To justify the concept, used a system definition that implements the system-target approach.
In the world of education, the success of knowledge sharing will help students in realizing and developing their potential. Sharing knowledge is the most important and influential process in knowledge management. The importance of knowledge management can produce value that can be used to make decisions or take action. This study aims to analyze individual and technological factors on knowledge sharing...
The article considers approaches to assessing the quality of applications submitted for participation in competitions, which are implemented in the automated project management system. These approaches allow us to evaluate the scientific background of the team of the project executors and the correspondence of the project's keywords with the selected CSCSTI codes (Codes of State Categories Scientific...
Higher education faces many challenges today, primarily those concerning the actual needs of the labor market. There is a high percentage of people with the university degree but considerably smaller percentage of those who are competent for solving actual problems that business world faces. This fact has been recognized as one of the drawbacks of Bologna process, more precisely of its traditional...
The object of research is the electronic educational environment of the university. The purpose of this paper is to present electronic-educational environment of the university in the form of services. The term service is embedded notion of service to the business or service that measured by business indicators. Result of the work a reasoned catalog of services electronically University educational...
The Iraq health sector has witnessed significant progress in recent years with some local hospitals receiving international recognition. However, this has not been accompanied by advancement of the electronic-health (e-health) field, whose applications have become a necessity for hospitals to achieve certain objectives such as enhancing the quality of healthcare, and reducing the time and cost for...
Development of science and technologies dictates need for development of new methods of management of quality. Along with already available methods and the systems of quality management new approaches appear. Some directions of improvement existing and creations of new tools, methods and the systems of quality management taking into account development of digital (information) technologies are shown...
Strategic Planning of information system is now of the key in achieving the institution goals, as must be aligned with the business strategy being executed. Information Systems/Information Technology (IS/IT) is becomes as one of the strategy in the higher education institution to improve the quality of education and services to all stakeholders to be an excellent and competitive Polytechnic. Development...
It discusses the necessity of building college Students' Learning Monitoring and Early Warning System (SLMEWS) as well as points out the importance of parents' participation and assistance considering college students' social environment and background with information acquisition media of digital campus as its method and the school cloud as its technology kernel. It also puts forward a dynamic SLMEWS...
From 11/2016, the VCCI Council started the Self-regulation based on CISPR 32 Ed.2. • The system of the new rules has a pyramid structure and has a hierarchy in the rules. • The technical requirements conformed to CISPR 32 Ed.2, but depending on the circumstances of Japan, there are some additional items. For example, In-situ test. • The applicable scope of the new VCCI rules is mainly MME with the...
Reservation service users and or purchase online based on the marketplace often face difficulties in determining the object or service selected closest to the criteria of potential users. Aside from the rating or rating which features conventional, potential customers can make decisions with the customer review feature that has to wear or purchase items or services. The availability of these features...
The purpose of this study was to evaluate the application system TULIS in the Main Library of UIN Syarif Hidayatulllah Jakarta by using COBIT 5 framework focuses on the process of managing security (APO13) and managed security services and to know the gap and provide recommendations to top management of the Library. This study used Likert scale calculations. The results of this study are as score...
There are some issues with the adoption of information technology of infrastructure library (ITIL). The common issue comes from customers that always need excellent services. On the other hand, there are employees acting as an internal element of enterprise who need to be motivated while delivering the services. It has been known that the pressure at work and employees' personal problem can cause...
Modern students have been brought up on the literature in the style of “fantasy” and computer games, so reading scientific literature and watching science films seems boring to modern students. To solve the problem of increasing students' interest in learning we offer a MOOC in form of “Quest”-style.
Human behavior inside organizations is considered the main threat to organizations. Moreover, in information security the human element consider the most of weakest link in general. Therefore it is crucial to create an information security culture to protect the organization's assets from inside and to influence employees' security behavior. This paper focuses on identifying the definitions and frameworks...
Noteworthy research gap are being perceived on Knowledge Management (KM) in the outlook of Disaster Recovery (DR) in Information Technology (IT) organizations. Preliminary interviews with the organization implied that the organization facing two main challenges in the context of DR, namely (i) DR information hosted in various knowledge repositories, and (ii) lesson learn capturing is being done after...
Used by both information systems designers and security personnel, the Attack Tree method provides a graphical analysis of the ways in which an entity (a computer system or network, an entire organization, etc.) can be attacked and indicates the countermeasures that can be taken to prevent the attackers to reach their objective. In this paper, we built an Attack Tree focused on the goal “compromising...
Organizations are increasingly dependent on Information Technology (IT) and IT Management takes on greater importance each day. However the role of IT Management in many organizations has not gone much beyond being considered as a technological support and not as the strategic ally. Public institutions are no stranger to this reality. The present article presents the characteristics and It governance...
Knowledge is increasingly seen as one of the most important strategic asset in organizations and critical factor for business' success and sustainability. Knowledge management concerns with creating, sharing, and managing organizational knowledge as a key for organizational capabilities. There is a growing recognition that knowledge sharing is a key to leverage learning and performance within organizations...
Social commerce is a new phenomenon of e-commerce that utilizes social medial platforms and applications to conduct e-commerce activities. Uncertainty and high level of risk are the main characteristics of online environment. Trust is always a critical issue influencing people's adoption of e-commerce environment. Most studies focused on trust in e-commerce, but there are a limited number of works...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.