The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Enterprise-scale information systems are deeply entwined with the networks of social practice that use and support them. Yet “interoperability” between information systems and social communities of practice is not always easily achieved, because these disparate types of entities operate according to different logics and respond differently to innovation processes. In this paper we identify differences...
The ethical, social, and political issues are raised by information systems. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? This paper discusses the ethical issues in the information systems, such as the privacy, security, system quality and relevant techniques. It references the research from the developed countries and related organizations...
Developing a system that helps system administrators to perform their administration task more effectively and efficiently is of great importance to reduce downtime, cost and man power requirement. The Advanced Remote PC Management Suite facilitates centralized management of PC infrastructure employing the Intel Active Management Technology (AMT). This technology enables the system administrators...
In order to define the characteristics of network crime, we studied the type of network crime and explored the great role of the technological possibilities of criminal law in network crime. At present, most network crime concentrates in the theft, fraud, insult, defamation and other traditional crime using computer as a tool. With the international network crime showing the characteristics as sex...
The study purpose is aimed to explore the impact factors of Perceived Ease of Use, Perceived Usefulness, and Attitude toward Using in Technology Acceptance Model on internal rating system for star plan in Taiwan based on the perspective of Human-Computer Interaction. A twenty-six-item questionnaire was developed according to literature review. Path analysis approach was employed for data analysis...
Using P-sets, the concepts of (F, F)-information, (F, F)-search scale and (F, F)-search circle are proposed. Meanwhile, this paper give the search principle of (F, F)-information, the sequence theorem of (F, F)-search scale, the internal-outer point theorem of the unit discrete interval on (F, F)-search scale, and the position theorem of (F, F)-search circle. (F, F)-search circle is a series of concentric...
Attribute reduction is one of the vital research contents of Rough Sets. A method of calculating positive region based on the trie tree has been proposed in the paper. And the time complexity is O (∣ C ∥ U ∣). A complete attribute reduction algorithm has been designed according to the method of calculating positive region. The experiment results show that the reduction algorithm is effective, and...
In service oriented computer audit system, agent technologies are used and a set of components, which have logical functions and are interactive as well as autonomous, are integrated together to form a system framework. Meanwhile, in order to release service to Internet, interaction must be performed between multiple agents with high quality and convenience. We integrate Web-services into intelligent...
In this paper, the current status of port informatization has been analyzed, and the concept, basic properties and characteristics of the cloud computing have been introduced, on which ground we present a port information system based on cloud computing. The framework and functions of the system have also been introduced.
Realization of e-business is based on business process management system (BPMS). In BPMS there are a large number of event logs recording the performers and corresponding activities. Team organization structure is so flexible as to be more suitable for implementation of e-business. However the existing organizational structure modeling methods are difficult to model team structure. This paper design...
With the development of the computer science and the information technology, the network has become a kind of basic infrastructures in our daily life. Kinds of distant learning systems based on Web application appeared, and the Online Teachers' Training System is one of them. The core of MVC pattern is a kind of layers-designing, which separates the whole structure into several layers: Model, View...
Shipbuilding is a complex systematical work, therefore planning and controlling shipbuilding course is a big system engineering. In order to legitimately plan and control ship construction procedure, we employ process modeling technology, process programming technology and conflict resolution mechanism, which are at the base of the time database. We also apply the Kanban management based on WBS (Work...
In this essay, the author analyzes the development and reform trend of the Computer Science and Technology discipline in the global environment, and then he discusses the orientation and characteristics of the professional training target of this discipline. After that, he proposes the basic structure of the course system and at last gives out the course modules for different application directions...
The way Oracle locked data in DML and the reasons for DML lock blocking were introduced in this study. To confirm the successful parallel visits to the same data for users, various lock technologies were adopted to realize the data integrality. The solving methods of Oracle locks blocking in some practical applications were presented.
With the prevalent trend of computer and network in our country, the problem of security about internet information is becoming more and more outstanding. This article analyses the factors about the hidden security troubles of internet information that our country faced with at present, and put out some protecting measures from some aspects, such as technology, management and policy.
Based on the constructionist'learner view that learner is the enabler learning subject, puting forward a hypothesis that the learning expection is of deviation for various stage students of Civil Construction Management Speciality, which is supported by a case study from the the first year of postgraduate student, Senior student and junior student of School of civil engineering, Chang'an University...
In order to reveal “double-edged sword” effect in the information construction of state-owned commercial banks (SCBs), confirmatory factor analysis is used in this paper. By internal control system design in SCBs information system, single-dimension scale test, reliability analysis and validity testing, confirmatory factor analysis can effectively reveal the correlation between the information construction...
Virtual currency has become an increasingly popular business model in famous social networking sites in recent years. (e.g., Facebook, i-part, Tencent QQ). Virtual currency, therefore, users can easily complete their trade online. In this study, a theoretical model based on decomposed Theory of Planned Behaviors(TPB) is proposed to explain and predict users' intentions to continue using virtual currency...
At first, this article reviews the development of information technology applications in enterprise management. And then it analyzes the main types of information technology applications using in enterprise management. Finally, it looks forward the most likely using mode of information technology applications in enterprise management in the future.
Informationalization is one of the most important technology revolutions since the 20th century, and the establishment of social security system is one of the major task for our social construction. The development of social security management service system has post basic requirements to Informationalization construction of social security as informationalization can also facilitate the development...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.