This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation,...We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation, and functionality, and robustness refers to the ability to handle incomplete and/or corrupt adversarial information, on one side, and image and or device variability, on the other side. The proposed methodology is model-free and non-parametric. It draws support from discriminative methods using likelihood ratios to link at the conceptual level biometrics and forensics. It further links, at the modeling and implementation level, the Bayesian framework, statistical learning theory (SLT) using transduction and semi-supervised lea- rning, and Information Theory (IY) using mutual information. The key concepts supporting the proposed methodology are a) local estimation to facilitate learning and prediction using both labeled and unlabeled data;b) similarity metrics using regularity of patterns, randomness deficiency, and Kolmogorov complexity (similar to MDL) using strangeness/typicality and ranking p-values;and c) the Cover – Hart theorem on the asymptotical performance of k-nearest neighbors approaching the optimal Bayes error. Several topics on biometric inference and prediction related to 1) multi-level and multi-layer data fusion including quality and multi-modal biometrics;2) score normalization and revision theory;3) face selection and tracking;and 4) identity management, are described here using an integrated approach that includes transduction and boosting for ranking and sequential fusion/aggregation, respectively, on one side, and active learning and change/ outlier/intrusion detection realized using information gain and martingale, respectively, on the other side. The methodology proposed can be mapped to additional types of information beyond biometrics.展开更多
Rumors are a type of false information, a consequence of an asymmetrical informational structure. This paper focuses on the social mechanisms of rumor fulfilling. Rumors with important contents related to people’s pe...Rumors are a type of false information, a consequence of an asymmetrical informational structure. This paper focuses on the social mechanisms of rumor fulfilling. Rumors with important contents related to people’s personal interests win acceptance through changing people’s expected payoffs, misleading people to the belief that acceptance of the rumor would beneficially outperform rejection of it. Nevertheless, it is risky to believe rumors; therefore, people make their decision whether to believe a rumor or not by referring to other people’s choices. An analysis was performed first within a game model that incorporated the variables of an individual’s expectancy and other people’s impact to predict whether the individual would accept or reject a rumor. Another analysis followed to further examine the functions of some dynamic mechanisms in rumor fulfilling when group pressure and network effects were introduced. Finally, an exploratory discussion on how to prevent rumors and erase their effects via information management strategies was presented.展开更多
The development of scientific inquiry and research has yielded numerous benefits in the realm of intelligent traffic control systems, particularly in the realm of automatic license plate recognition for vehicles. The ...The development of scientific inquiry and research has yielded numerous benefits in the realm of intelligent traffic control systems, particularly in the realm of automatic license plate recognition for vehicles. The design of license plate recognition algorithms has undergone digitalization through the utilization of neural networks. In contemporary times, there is a growing demand for vehicle surveillance due to the need for efficient vehicle processing and traffic management. The design, development, and implementation of a license plate recognition system hold significant social, economic, and academic importance. The study aims to present contemporary methodologies and empirical findings pertaining to automated license plate recognition. The primary focus of the automatic license plate recognition algorithm was on image extraction, character segmentation, and recognition. The task of character segmentation has been identified as the most challenging function based on my observations. The license plate recognition project that we designed demonstrated the effectiveness of this method across various observed conditions. Particularly in low-light environments, such as during periods of limited illumination or inclement weather characterized by precipitation. The method has been subjected to testing using a sample size of fifty images, resulting in a 100% accuracy rate. The findings of this study demonstrate the project’s ability to effectively determine the optimal outcomes of simulations.展开更多
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo...As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.展开更多
In Saint-Louis, Senegal, a constructed wetland with horizontal flow reed beds (FHa and FHb) has demonstrated significant efficacy in treating municipal wastewater. Analyzing various treatment stages, the system showed...In Saint-Louis, Senegal, a constructed wetland with horizontal flow reed beds (FHa and FHb) has demonstrated significant efficacy in treating municipal wastewater. Analyzing various treatment stages, the system showed only a slight temperature variation, from an influent average of 26.3°C to an effluent of 24.7°C. Electrical conductivity decreased from 1331 mS/cm to 974.5 mS/cm post-primary treatment, with suspended solids (SS) dramatically reduced from 718.9 mg/L to 5.7 mg/L in the final effluent. Biochemical oxygen demand (BOD5) and chemical oxygen demand (COD) saw a notable decrease, from initial levels of 655.6 mg/L and 1240 mg/L to 2.3 mg/L and 71.3 mg/L, respectively. Nitrogenous compounds (N-TN) and phosphates () also decreased significantly, indicating the system’s nutrient removal capacity. Microbiological analysis revealed a reduction in fecal coliforms from 7.5 Ulog/100ml to 1.8 Ulog/100ml and a complete elimination of helminth eggs. The presence of Phragmites and Typha was instrumental in enhancing these reductions. The system’s compliance with the Senegalese standards for disposal into natural environments, WHO recommendations for unrestricted water reuse in irrigation, and the European legislation for water reuse was established. The effluent quality met the stringent criteria for various classes of agricultural reuse, illustrating the system’s potential for sustainable water management. This wetland model presents a robust solution for water-stressed regions, ensuring environmental protection while supporting agricultural needs. The study calls for ongoing research to further refine the system for optimal, reliable wastewater treatment and water resource sustainability.展开更多
To guarantee a unified response to disasters, humanitarian organizations work together via the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Although the OCHA has made great strides to imp...To guarantee a unified response to disasters, humanitarian organizations work together via the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Although the OCHA has made great strides to improve its information management and increase the availability of accurate, real-time data for disaster and humanitarian response teams, significant gaps persist. There are inefficiencies in the emergency management of data at every stage of its lifecycle: collection, processing, analysis, distribution, storage, and retrieval. Disaster risk reduction and disaster risk management are the two main tenets of the United Nations’ worldwide plan for disaster management. Information systems are crucial because of the crucial roles they play in capturing, processing, and transmitting data. The management of information is seldom discussed in published works. The goal of this study is to employ qualitative research methods to provide insight by facilitating an expanded comprehension of relevant contexts, phenomena, and individual experiences. Humanitarian workers and OCHA staffers will take part in the research. The study subjects will be chosen using a random selection procedure. Online surveys with both closed- and open-ended questions will be used to compile the data. UN OCHA offers a structure for the handling of information via which all humanitarian actors may contribute to the overall response. This research will enable the UN Office for OCHA better gather, process, analyze, disseminate, store, and retrieve data in the event of a catastrophe or humanitarian crisis.展开更多
This article identifies the role of library and information science (LIS) education in the development of community health information services for people living with HIV/AIDS (PLWHA). Preliminary findings are present...This article identifies the role of library and information science (LIS) education in the development of community health information services for people living with HIV/AIDS (PLWHA). Preliminary findings are presented from semi- structured qualitative interviews that were conducted with eleven directors and managers of local branches in the Knox County Public Library (KCPL) System that is located in the East Tennessee region in the United States. Select feedback reported by research participants is summarized in the article about strategies in LIS education that can help local public librarians and others in their efforts to become more responsive information providers to PLWHA. Research findings help better understand the issues and concerns regarding the development of digital and non-digital health information services for PLWHA in local public library institutions.展开更多
Objective: The purpose of this study was to clarify the collaborative activities and mutual recognition between community comprehensive care unit nurses (Ns) and care managers (CM) in supporting the discharge of the e...Objective: The purpose of this study was to clarify the collaborative activities and mutual recognition between community comprehensive care unit nurses (Ns) and care managers (CM) in supporting the discharge of the elderly from the hospital. Methods: A total of 300 nurses working in community comprehensive care wards and 360 care managers working in B City in A Prefecture were surveyed using an anonymous self-administered questionnaire. Results: The highest percentage of responses regarding necessary collaborative activities with multiple professions in supporting hospital discharge were the same for Ns and CMs. The items regarding practice with the highest percentages were “relationship as a team” for Ns, and “user-centered awareness” for CM. While these professionals were willing to share information about their patients’ lives after discharge, the percentage of those explaining their expertise was low. It is thought that collaborative activities focusing on these aspects would lead to more appropriate discharge support.展开更多
Unit nurse managers in Malawi experience many challenges in the course of performing their roles. This affects their performance and service delivery including the quality of nursing care to patients. This study was c...Unit nurse managers in Malawi experience many challenges in the course of performing their roles. This affects their performance and service delivery including the quality of nursing care to patients. This study was conducted to determine the factors that hindered performance of unit managers in relation to expected quality of nursing services at two referral facilities (Kamuzu and Queen Elizabeth Central hospitals) in Malawi. These two central hospitals have the same structural settings and both offer specialized tertiary health services. A quantitative descriptive design was used to guide the planning and implementation of the study. Purposive sampling was used to select the two major hospitals in Malawi and all available 37 unit nurse managers during the time of the study at the two hospitals participated in the study. Data were collected using semi-structured questionnaires after seeking consent from the participants and were analyzed using SPSS version 16.0. The major roles identified by the unit managers were supervision (75.6%, n = 28) and coordination (70.3%, n = 26). Other roles such as team leader, liaison officer, research allocator, monitor and facilitator were rated by very few participants. Findings of the study showed that performance of unit nurse managers was affected by inadequate material (86.4%, n = 32) and human resources (94.5%, n = 35) and lack of managerial skills (5.4%, n = 2). In addition, the unit managers perceived their role to be stressful (38.9%, n = 14) and challenging (47.2%, n = 17). Therefore, there is a need to provide adequate material and human resources to the wards of the two central hospitals to enable the unit managers perform their duties efficiently.展开更多
This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the p...This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA.展开更多
The aim of this study was to verify the existence of business and strategic intelligence policies at the level of Congolese companies and at the state level, likely to foster progress and healthy development in the ea...The aim of this study was to verify the existence of business and strategic intelligence policies at the level of Congolese companies and at the state level, likely to foster progress and healthy development in the east of the DRC. The study was based on a mixed perspective consisting of objective analysis of quantitative data and interpretative analysis of qualitative data. The results showed that business and strategic intelligence policies have not been established at either company or state level, as this is an area of activity that is not known to the players in companies and public departments, and there are no units or offices in their organizational structures responsible for managing strategic information for competitiveness on the international market. In addition, there is a real need to establish strategic information management units within companies, upstream, and to set up a national strategic information management department or agency to help local companies compete in the marketplace, downstream. This reflects the importance and timeliness of building business and strategic intelligence policies to ensure economic progress and development in the eastern DRC. Business and strategic intelligence provides companies with an appropriate tool for researching, collecting, processing and disseminating information useful for decision-making among stakeholders, in order to cope with a crisis or competitive situation. The study suggests a number of key recommendations based on its findings. To the government, it is recommended to establish the national policy of business and strategic intelligence by setting up a national agency of strategic intelligence in favor of local companies;and to companies to establish business intelligence units in their organizational structures in favor of stakeholders to foster advantageous decision-making in the competitive market and achieve progress. Finally, the study suggests that studies be carried out to fully understand the opportunities and impact of business and strategic intelligence in African countries, particularly in the DRC.展开更多
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation, and functionality, and robustness refers to the ability to handle incomplete and/or corrupt adversarial information, on one side, and image and or device variability, on the other side. The proposed methodology is model-free and non-parametric. It draws support from discriminative methods using likelihood ratios to link at the conceptual level biometrics and forensics. It further links, at the modeling and implementation level, the Bayesian framework, statistical learning theory (SLT) using transduction and semi-supervised lea- rning, and Information Theory (IY) using mutual information. The key concepts supporting the proposed methodology are a) local estimation to facilitate learning and prediction using both labeled and unlabeled data;b) similarity metrics using regularity of patterns, randomness deficiency, and Kolmogorov complexity (similar to MDL) using strangeness/typicality and ranking p-values;and c) the Cover – Hart theorem on the asymptotical performance of k-nearest neighbors approaching the optimal Bayes error. Several topics on biometric inference and prediction related to 1) multi-level and multi-layer data fusion including quality and multi-modal biometrics;2) score normalization and revision theory;3) face selection and tracking;and 4) identity management, are described here using an integrated approach that includes transduction and boosting for ranking and sequential fusion/aggregation, respectively, on one side, and active learning and change/ outlier/intrusion detection realized using information gain and martingale, respectively, on the other side. The methodology proposed can be mapped to additional types of information beyond biometrics.
文摘Rumors are a type of false information, a consequence of an asymmetrical informational structure. This paper focuses on the social mechanisms of rumor fulfilling. Rumors with important contents related to people’s personal interests win acceptance through changing people’s expected payoffs, misleading people to the belief that acceptance of the rumor would beneficially outperform rejection of it. Nevertheless, it is risky to believe rumors; therefore, people make their decision whether to believe a rumor or not by referring to other people’s choices. An analysis was performed first within a game model that incorporated the variables of an individual’s expectancy and other people’s impact to predict whether the individual would accept or reject a rumor. Another analysis followed to further examine the functions of some dynamic mechanisms in rumor fulfilling when group pressure and network effects were introduced. Finally, an exploratory discussion on how to prevent rumors and erase their effects via information management strategies was presented.
文摘The development of scientific inquiry and research has yielded numerous benefits in the realm of intelligent traffic control systems, particularly in the realm of automatic license plate recognition for vehicles. The design of license plate recognition algorithms has undergone digitalization through the utilization of neural networks. In contemporary times, there is a growing demand for vehicle surveillance due to the need for efficient vehicle processing and traffic management. The design, development, and implementation of a license plate recognition system hold significant social, economic, and academic importance. The study aims to present contemporary methodologies and empirical findings pertaining to automated license plate recognition. The primary focus of the automatic license plate recognition algorithm was on image extraction, character segmentation, and recognition. The task of character segmentation has been identified as the most challenging function based on my observations. The license plate recognition project that we designed demonstrated the effectiveness of this method across various observed conditions. Particularly in low-light environments, such as during periods of limited illumination or inclement weather characterized by precipitation. The method has been subjected to testing using a sample size of fifty images, resulting in a 100% accuracy rate. The findings of this study demonstrate the project’s ability to effectively determine the optimal outcomes of simulations.
文摘As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.
文摘In Saint-Louis, Senegal, a constructed wetland with horizontal flow reed beds (FHa and FHb) has demonstrated significant efficacy in treating municipal wastewater. Analyzing various treatment stages, the system showed only a slight temperature variation, from an influent average of 26.3°C to an effluent of 24.7°C. Electrical conductivity decreased from 1331 mS/cm to 974.5 mS/cm post-primary treatment, with suspended solids (SS) dramatically reduced from 718.9 mg/L to 5.7 mg/L in the final effluent. Biochemical oxygen demand (BOD5) and chemical oxygen demand (COD) saw a notable decrease, from initial levels of 655.6 mg/L and 1240 mg/L to 2.3 mg/L and 71.3 mg/L, respectively. Nitrogenous compounds (N-TN) and phosphates () also decreased significantly, indicating the system’s nutrient removal capacity. Microbiological analysis revealed a reduction in fecal coliforms from 7.5 Ulog/100ml to 1.8 Ulog/100ml and a complete elimination of helminth eggs. The presence of Phragmites and Typha was instrumental in enhancing these reductions. The system’s compliance with the Senegalese standards for disposal into natural environments, WHO recommendations for unrestricted water reuse in irrigation, and the European legislation for water reuse was established. The effluent quality met the stringent criteria for various classes of agricultural reuse, illustrating the system’s potential for sustainable water management. This wetland model presents a robust solution for water-stressed regions, ensuring environmental protection while supporting agricultural needs. The study calls for ongoing research to further refine the system for optimal, reliable wastewater treatment and water resource sustainability.
文摘To guarantee a unified response to disasters, humanitarian organizations work together via the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Although the OCHA has made great strides to improve its information management and increase the availability of accurate, real-time data for disaster and humanitarian response teams, significant gaps persist. There are inefficiencies in the emergency management of data at every stage of its lifecycle: collection, processing, analysis, distribution, storage, and retrieval. Disaster risk reduction and disaster risk management are the two main tenets of the United Nations’ worldwide plan for disaster management. Information systems are crucial because of the crucial roles they play in capturing, processing, and transmitting data. The management of information is seldom discussed in published works. The goal of this study is to employ qualitative research methods to provide insight by facilitating an expanded comprehension of relevant contexts, phenomena, and individual experiences. Humanitarian workers and OCHA staffers will take part in the research. The study subjects will be chosen using a random selection procedure. Online surveys with both closed- and open-ended questions will be used to compile the data. UN OCHA offers a structure for the handling of information via which all humanitarian actors may contribute to the overall response. This research will enable the UN Office for OCHA better gather, process, analyze, disseminate, store, and retrieve data in the event of a catastrophe or humanitarian crisis.
文摘This article identifies the role of library and information science (LIS) education in the development of community health information services for people living with HIV/AIDS (PLWHA). Preliminary findings are presented from semi- structured qualitative interviews that were conducted with eleven directors and managers of local branches in the Knox County Public Library (KCPL) System that is located in the East Tennessee region in the United States. Select feedback reported by research participants is summarized in the article about strategies in LIS education that can help local public librarians and others in their efforts to become more responsive information providers to PLWHA. Research findings help better understand the issues and concerns regarding the development of digital and non-digital health information services for PLWHA in local public library institutions.
文摘Objective: The purpose of this study was to clarify the collaborative activities and mutual recognition between community comprehensive care unit nurses (Ns) and care managers (CM) in supporting the discharge of the elderly from the hospital. Methods: A total of 300 nurses working in community comprehensive care wards and 360 care managers working in B City in A Prefecture were surveyed using an anonymous self-administered questionnaire. Results: The highest percentage of responses regarding necessary collaborative activities with multiple professions in supporting hospital discharge were the same for Ns and CMs. The items regarding practice with the highest percentages were “relationship as a team” for Ns, and “user-centered awareness” for CM. While these professionals were willing to share information about their patients’ lives after discharge, the percentage of those explaining their expertise was low. It is thought that collaborative activities focusing on these aspects would lead to more appropriate discharge support.
文摘Unit nurse managers in Malawi experience many challenges in the course of performing their roles. This affects their performance and service delivery including the quality of nursing care to patients. This study was conducted to determine the factors that hindered performance of unit managers in relation to expected quality of nursing services at two referral facilities (Kamuzu and Queen Elizabeth Central hospitals) in Malawi. These two central hospitals have the same structural settings and both offer specialized tertiary health services. A quantitative descriptive design was used to guide the planning and implementation of the study. Purposive sampling was used to select the two major hospitals in Malawi and all available 37 unit nurse managers during the time of the study at the two hospitals participated in the study. Data were collected using semi-structured questionnaires after seeking consent from the participants and were analyzed using SPSS version 16.0. The major roles identified by the unit managers were supervision (75.6%, n = 28) and coordination (70.3%, n = 26). Other roles such as team leader, liaison officer, research allocator, monitor and facilitator were rated by very few participants. Findings of the study showed that performance of unit nurse managers was affected by inadequate material (86.4%, n = 32) and human resources (94.5%, n = 35) and lack of managerial skills (5.4%, n = 2). In addition, the unit managers perceived their role to be stressful (38.9%, n = 14) and challenging (47.2%, n = 17). Therefore, there is a need to provide adequate material and human resources to the wards of the two central hospitals to enable the unit managers perform their duties efficiently.
文摘This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA.
文摘The aim of this study was to verify the existence of business and strategic intelligence policies at the level of Congolese companies and at the state level, likely to foster progress and healthy development in the east of the DRC. The study was based on a mixed perspective consisting of objective analysis of quantitative data and interpretative analysis of qualitative data. The results showed that business and strategic intelligence policies have not been established at either company or state level, as this is an area of activity that is not known to the players in companies and public departments, and there are no units or offices in their organizational structures responsible for managing strategic information for competitiveness on the international market. In addition, there is a real need to establish strategic information management units within companies, upstream, and to set up a national strategic information management department or agency to help local companies compete in the marketplace, downstream. This reflects the importance and timeliness of building business and strategic intelligence policies to ensure economic progress and development in the eastern DRC. Business and strategic intelligence provides companies with an appropriate tool for researching, collecting, processing and disseminating information useful for decision-making among stakeholders, in order to cope with a crisis or competitive situation. The study suggests a number of key recommendations based on its findings. To the government, it is recommended to establish the national policy of business and strategic intelligence by setting up a national agency of strategic intelligence in favor of local companies;and to companies to establish business intelligence units in their organizational structures in favor of stakeholders to foster advantageous decision-making in the competitive market and achieve progress. Finally, the study suggests that studies be carried out to fully understand the opportunities and impact of business and strategic intelligence in African countries, particularly in the DRC.