Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We condu...Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We conducted a systematic integrative literature review based on a compre-hensive database search. To organise, categorise and synthesise the ex-isting literature, we adopted the affordance actualization theory. To align the literature with our research framework, we used four categories: 1) the functionalities of HIT and how these functionalities are measured;2) use and immediate outcomes of HIT functionalities;3) different perfor-mance indicators and how HIT functionalities affect them;and 4) what hospital characteristics influence the outcome of hospital performance. Results: Fifty-two studies were included. We identified four types of HIT. Only ten studies (19.2%) define the use of HIT by explicitly meas-uring the use rate of HIT. We identified five dimensions of hospital per-formance indicators. Every dimension showed mixed results;however, in general, HIT has a positive impact on mortality and patient readmis-sions. We found several hospital characteristics that may affect the rela-tionship between HIT and hospital-level outcomes. Discussion: Further efforts should focus on embedded research on HIT functionalities, use and effects of HIT implementations with more performance indicators and adjusted for hospital characteristics. Conclusion: The proposed framework could help hospitals and researchers make decisions regard-ing the functionalities, use and effects of HIT implementation in hospi-tals. Given our research outcomes, we suggest future research opportuni-ties to improve understanding of how HIT affects hospital performance. .展开更多
Jordan is one of many countries that intends to reform its public sector by adopting accrual accounting,which is primarily carried out through the International Public Sector Accounting Standards(IPSAS)implementation ...Jordan is one of many countries that intends to reform its public sector by adopting accrual accounting,which is primarily carried out through the International Public Sector Accounting Standards(IPSAS)implementation plan,scheduled to be completed by 2021.Considering the difficulties of adoption,this process cannot be completed without an appropriate Information Technology(IT)system capable of providing the accounting information required for this reform.Therefore,this study aims to examine the influence of IT on accrual accounting adoption in the Jordanian public sector.The study employed the quantitative survey approach.Based on 331 usable questionnaires,the descriptive findings showed that the use of IT in the Jordanian public sector is relevant to daily accounting transactions in general and to accrual accounting in particular.The regression analysis showed a positive,significant relationship between IT use and accrual accounting practice.The IT specialist should be able to understand the needs of public sector in adopting accrual-based accounting.In line with today’s digitalization age,which integrates advanced technologies and numerous techniques,this study suggests that a combination of accounting and IT experts is a value added to sharpen the competitiveness of public sector reform.This study contributes to the extant literature in public sector,concerning the relationship between IT and accrual accounting adoption in the context of Jordan.展开更多
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic...Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance.展开更多
The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent trainin...The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges.展开更多
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution...Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.展开更多
The rapid development of information technology provides a new opportunity and impetus for the reform of education and teaching.Deep integration of information technology and education and teaching is the only way to ...The rapid development of information technology provides a new opportunity and impetus for the reform of education and teaching.Deep integration of information technology and education and teaching is the only way to promote the modernization of education.Starting from the connotation of the deep integration of information technology and education and teaching,this paper analyzes the existing problems in the current integration process,and puts forward innovative strategies from the aspects of concept,resources,model,and evaluation.Through measures such as building a smart teaching environment,enriching high-quality teaching resources,innovating teaching organization models,and establishing multiple evaluation systems,we will realize the deep integration of information technology and teaching,promote the reform of teaching and learning methods,improve the quality of personnel training,and provide strong support for the modernization of education.展开更多
With the acceleration of the social information process,information awareness and information skills have become the basic qualities of every citizen.The establishment of the training mechanism for scientific and tech...With the acceleration of the social information process,information awareness and information skills have become the basic qualities of every citizen.The establishment of the training mechanism for scientific and technological innovation talents from the beginning of higher education is insufficient to meet the needs of the development of the times.It is imperative to improve the training of information technology innovation talents and explore a new training model.This paper describes the general situation of the development of education in the field of information technology from a domestic and international perspective.It then analyzes the existing problems,explores new exploration models and implementation suggestions,and puts forward prospects at the end of the paper.展开更多
In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely ...In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.展开更多
This study aims to investigate how information technology is applied in the administration of the municipality of Ferizaj and what are the challenges with human resources, the work was carried out through a case study...This study aims to investigate how information technology is applied in the administration of the municipality of Ferizaj and what are the challenges with human resources, the work was carried out through a case study in the municipality. This paper highlights that the use of information technology provides higher efficiency for the performance of daily work in the municipality, thus also the provision of better services to citizens. However, the level of use of information technology in the Municipality of Ferizaj leaves much to be desired in terms of efficiency because a significant number of employees have not attended adequate training for the effective and efficient use of various IT applications and have not are still adapted to the digital environment in the municipality. Therefore, the recommendation derived from this paper is that the information technology environment in the municipality of Ferizaj needs to be improved by providing staff with adequate qualifications, while for those who are currently engaged in the municipality and who do not have adequate qualifications, training should be provided in a way that all users of IT applications are fully integrated into the digitized environment in order to be effective and efficient in providing services to citizens. This simultaneously gives the municipal staff job security and motivation for better services for citizens. Also, information technology enables a better control over the activity of the municipality because every action is recorded as data which can then be used to analyze the performance of the municipality.展开更多
Objective To understand the development status of traditional Chinese medicine extraction technology,so as to provide a reference for enterprises and scientific research institutions to determine the direction of tech...Objective To understand the development status of traditional Chinese medicine extraction technology,so as to provide a reference for enterprises and scientific research institutions to determine the direction of technological innovation.Besides,the government can formulate scientific and technological innovation strategies.Methods Based on patent information,statistical methods were applied to analyze the development of traditional Chinese medicine extraction technology.Then,the core technology was identified by constructing a patent citation network.Finally,the main path analysis method was applied to discover the technological evolution path.Results and Conclusion The extraction technology of traditional Chinese medicine is still in the growth stage.At present,its R&D is based on enterprises,supplemented by scientific research institutions.The core technologies are ultrasonic extraction and enzymatic extraction.The main path represented by enzymatic extraction technology reveals the evolution process of traditional Chinese medicine extraction technology.Based on this,relevant suggestions are put forward.Firstly,technological innovation cooperation should be strengthened to explore new models of achievement transformation and cooperation.Secondly,key enterprises of technology clusters should be cultivated to accelerate breakthroughs in core technologies.Thirdly,combined technologies can achieve high-efficiency enzyme-assisted extraction and open up new ways of extracting traditional Chinese medicine.Fourthly,traditional techniques should be improved to develop innovative modern techniques.展开更多
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in...In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.展开更多
Recent research and studies have shown that Information Technology(IT)has a significant impact on service quality,customer satisfaction,and customer relationship development.With the proliferation and penetration of t...Recent research and studies have shown that Information Technology(IT)has a significant impact on service quality,customer satisfaction,and customer relationship development.With the proliferation and penetration of technology in all aspects of life,organizations are responding to the implications and opportunities that IT creates in relation to customer services.The main objective of using information technology in organizations is to increase customer satisfaction,service quality,and customer relationship management,which the authors will focus on here.Enhancing service quality,improving customer satisfaction,and establishing close and sustainable customer relationships are key advantages of leveraging information technology in this field.This article examines the impact of information technology on service quality,customer satisfaction,and customer relationship development and provides strategies and models for organizations to improve customer satisfaction and establish closer connections with them through the use of information technology.Seventy individuals from the IT field were used to evaluate the proposed model.The proposed model was compared with three models:SEM,regression,and decision tree,and the results demonstrated better performance of this approach.展开更多
The safety and reliability of mechatronics systems,particularly the high-end,large and key mechatronics equipment in service,can strongly influence on production efficiency,personnel safety,resources and environment.B...The safety and reliability of mechatronics systems,particularly the high-end,large and key mechatronics equipment in service,can strongly influence on production efficiency,personnel safety,resources and environment.Based on the demands of development of modern industries and technologies such as international industry 4.0,Made-in-China 2025 and Internet + and so on,this paper started from revealing the regularity of evolution of running state of equipment and the methods of signal processing of low signal noise ratio,proposed the key information technology of state monitoring and earlyfault-warning for equipment,put forward the typical technical line and major technical content,introduced the application of the technology to realize modern predictive maintenance of equipment and introduced the development of relevant safety monitoring instruments.The technology will play an important role in ensuring the safety of equipment in service,preventing accidents and realizing scientific maintenance.展开更多
During the pandemic, technological innovation provided a platform with a range of uses, including in the healthcare industry. Technology is currently being used in vaccination drives run by many governments across the...During the pandemic, technological innovation provided a platform with a range of uses, including in the healthcare industry. Technology is currently being used in vaccination drives run by many governments across the world to help spread vaccines quickly and efficiently. The technology makes healthcare personnel more effective at their professions and greatly raises the standard of service in the industry. The researchers undertook this study to create a suitable and long-lasting immunization database with a mapping method to give a better perspective of the immunization status. To gather essential information for this study, the researchers spoke with the local health officer in the targeted area. The obtained data then served as the basis for the system’s capabilities and features, becoming the target problems addressed by the developers. The investigation found that the majority of procedures and interactions are carried out manually and recorded on an unprotected, antiquated Excel spreadsheet. The researchers’ technology also shows to be a superior way to deal with the problems and difficulties while making their health-related transactions and operations quicker, safer, and much more effective.展开更多
Success or failure of an E-commerce platform is often reduced to its ability to maximize the conversion rate of its visitors. This is commonly regarded as the capacity to induce a purchase from a visitor. Visitors pos...Success or failure of an E-commerce platform is often reduced to its ability to maximize the conversion rate of its visitors. This is commonly regarded as the capacity to induce a purchase from a visitor. Visitors possess individual characteristics, histories, and objectives which complicate the choice of what platform features that maximize the conversion rate. Modern web technology has made clickstream data accessible allowing a complete record of a visitor’s actions on a website to be analyzed. What remains poorly constrained is what parts of the clickstream data are meaningful information and what parts are accidental for the problem of platform design. In this research, clickstream data from an online retailer was examined to demonstrate how statistical modeling can improve clickstream information usage. A conceptual model was developed that conjectured relationships between visitor and platform variables, visitors’ platform exit rate, boune rate, and decision to purchase. Several hypotheses on the nature of the clickstream relationships were posited and tested with the models. A discrete choice logit model showed that the content of a website, the history of website use, and the exit rate of pages visited had marginal effects on derived utility for the visitor. Exit rate and bounce rate were modeled as beta distributed random variables. It was found that exit rate and its variability for pages visited were associated with site content, site quality, prior visitor history on the site, and technological preferences of the visitor. Bounce rate was also found to be influenced by the same factors but was in a direction opposite to the registered hypotheses. Most findings supported that clickstream data is amenable to statistical modeling with interpretable and comprehensible models.展开更多
With the rapid development of economic construction, constant improvement of economic level of china, all walks of life have technologically conducted in-depth study on related knowledge applied in their own areas. Am...With the rapid development of economic construction, constant improvement of economic level of china, all walks of life have technologically conducted in-depth study on related knowledge applied in their own areas. Among them, the application of relative technology as well as relative requirements in medical industry is also constantly improving. The application of emerging technology not only plays a significant role in the modernization development of hospital, but also is greatly significant on the improvement of medical quality. Therefore the key point of hospital development is how to use network technique to ensure the rapid, stable and safe operation of hospital's daily work. Starting from the information construction of hospital, this paper has made a discussion on the concept and advantages of VPN technology, and an analysis on the specific application of VPN technology in hospital. According to the discourse of the paper, it's possible to provide valuable references and suggestions for the application of VPN technology on the information construction of hospitals.展开更多
Underresourced or socially excluded communities in Manchester, England demonstrate active use of information technologies despite continuing digital inequalities.A systematic look at 31 grassroots community groups, at...Underresourced or socially excluded communities in Manchester, England demonstrate active use of information technologies despite continuing digital inequalities.A systematic look at 31 grassroots community groups, at how they use IT and who helps them, reveals possible mechanisms towards a more inclusive network society. Social network and social capital theories help make apparent how people are self-organizing with respect to information technology in ways that reach across ethnicity, class, gender, and generations for skilled help, yet stay close to their strong-tie, bonding-social-capital networks, relying largely on people in their own communities. Based on 25 measures of IT use, the groups fall into three progressively more extensive categories: Downloaders(using computers and the Internet, particularly e-mails), uploaders(maintaining a group web presence), and cyberorganizers(helping others to become uploaders or downloaders). These categories align with each individual group's purpose.展开更多
Taking Nanjing as a case, the paper explains the spatial behavior differences existing in the information technology use among different groups of residents and households, by virtue of analyzing the survey data of ur...Taking Nanjing as a case, the paper explains the spatial behavior differences existing in the information technology use among different groups of residents and households, by virtue of analyzing the survey data of urban households in the 11 districts of Nanjing, from the social, spatial, life and other non-technical angles. Also it makes various analyses and evaluation quantitatively and qualitatively on the social and spatial effect of information technology. The results show that the new technology is changing the social spatial behaviors of urban residents. New behavioral spaces of urban family such as telecommuting, email and QQ have begun to emerge. With the help of Internet, the communication scope of families has expanded greatly, and more new forms of publicizing community information have begun to emerge. Telecommunication contact forms have been developing swiftly, and their frequencies of contact have been increasing dramatically.展开更多
Cross-region innovation is widely recognized as an important source of the long-term regional innovation capacity.In the recent past,a growing number of studies has investigated the network structure and mechanisms of...Cross-region innovation is widely recognized as an important source of the long-term regional innovation capacity.In the recent past,a growing number of studies has investigated the network structure and mechanisms of cross-region innovation collaboration in various contexts.However,existing research mainly focuses on physical effects,such as geographical distance and high-speed railway connections.These studies ignore the intangible drivers in a changing environment,the more digitalized economy and the increasingly solidified innovation network structure.Thus,the focus of this study is on estimating determinants of innovation networks,especially on intangible drivers,which have been largely neglected so far.Using city-level data of Chinese patents(excluding Hong Kong,Macao,and Taiwan Province of China),we trace innovation networks across Chinese cities over a long period of time.By integrating a measure on Information and Communications Technology(ICT)development gap and network structural effects into the general proximity framework,this paper explores the changing mechanisms of Chinese innovation networks from a new perspective.The results show that the structure of cross-region innovation networks has changed in China.As mechanisms behind this development,the results confirm the increasingly important role of intangible drivers in Chinese inter-city innovation collaboration when controlling for effects of physical proximity,such as geographical distance.Since digitalization and coordinated development are the mainstream trends in China and other developing countries,these countries'inter-city innovation collaboration patterns will witness dramatic changes under the influence of intangible drivers.展开更多
The aromatic compounds,including o-xylene,m-xylene,p-xylene,and ethylbenzene,primarily originate from the catalytic reforming of crude oil,and have a wide variety of applications.However,because of similar physical an...The aromatic compounds,including o-xylene,m-xylene,p-xylene,and ethylbenzene,primarily originate from the catalytic reforming of crude oil,and have a wide variety of applications.However,because of similar physical and chemical properties,these compounds are difficult to be identified by gas chromatography(GC)without standard samples.With the development of modern nuclear magnetic resonance(NMR)techniques,NMR has emerged as a powerful and efficient tool for the rapid analysis of complex and crude mixtures without purification.In this study,the parameters of one-dimensional(1D)total correlation spectroscopy(TOCSY)NMR techniques,including 1D selective gradient TOCSY and 1D chemicalshift-selective filtration(CSSF)with TOCSY,were optimized to obtain comprehensive molecular structure information.The results indicate that the overlapped signals in NMR spectra of nonpolar aromatic compounds(including o-xylene,m-xylene,p-xylene and ethylbenzene),polar aromatic compounds(benzyl alcohol,benzaldehyde,benzoic acid),and aromatic compounds with additional conjugated bonds(styrene)can be resolved in 1D TOCSY.More importantly,full molecular structures can be clearly distinguished by setting appropriate mixing time in 1D TOCSY.This approach simplifies the NMR spectra,provides structural information of entire molecules,and can be applied for the analysis of other structural isomers.展开更多
文摘Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We conducted a systematic integrative literature review based on a compre-hensive database search. To organise, categorise and synthesise the ex-isting literature, we adopted the affordance actualization theory. To align the literature with our research framework, we used four categories: 1) the functionalities of HIT and how these functionalities are measured;2) use and immediate outcomes of HIT functionalities;3) different perfor-mance indicators and how HIT functionalities affect them;and 4) what hospital characteristics influence the outcome of hospital performance. Results: Fifty-two studies were included. We identified four types of HIT. Only ten studies (19.2%) define the use of HIT by explicitly meas-uring the use rate of HIT. We identified five dimensions of hospital per-formance indicators. Every dimension showed mixed results;however, in general, HIT has a positive impact on mortality and patient readmis-sions. We found several hospital characteristics that may affect the rela-tionship between HIT and hospital-level outcomes. Discussion: Further efforts should focus on embedded research on HIT functionalities, use and effects of HIT implementations with more performance indicators and adjusted for hospital characteristics. Conclusion: The proposed framework could help hospitals and researchers make decisions regard-ing the functionalities, use and effects of HIT implementation in hospi-tals. Given our research outcomes, we suggest future research opportuni-ties to improve understanding of how HIT affects hospital performance. .
文摘Jordan is one of many countries that intends to reform its public sector by adopting accrual accounting,which is primarily carried out through the International Public Sector Accounting Standards(IPSAS)implementation plan,scheduled to be completed by 2021.Considering the difficulties of adoption,this process cannot be completed without an appropriate Information Technology(IT)system capable of providing the accounting information required for this reform.Therefore,this study aims to examine the influence of IT on accrual accounting adoption in the Jordanian public sector.The study employed the quantitative survey approach.Based on 331 usable questionnaires,the descriptive findings showed that the use of IT in the Jordanian public sector is relevant to daily accounting transactions in general and to accrual accounting in particular.The regression analysis showed a positive,significant relationship between IT use and accrual accounting practice.The IT specialist should be able to understand the needs of public sector in adopting accrual-based accounting.In line with today’s digitalization age,which integrates advanced technologies and numerous techniques,this study suggests that a combination of accounting and IT experts is a value added to sharpen the competitiveness of public sector reform.This study contributes to the extant literature in public sector,concerning the relationship between IT and accrual accounting adoption in the context of Jordan.
文摘Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance.
文摘The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges.
文摘Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.
文摘The rapid development of information technology provides a new opportunity and impetus for the reform of education and teaching.Deep integration of information technology and education and teaching is the only way to promote the modernization of education.Starting from the connotation of the deep integration of information technology and education and teaching,this paper analyzes the existing problems in the current integration process,and puts forward innovative strategies from the aspects of concept,resources,model,and evaluation.Through measures such as building a smart teaching environment,enriching high-quality teaching resources,innovating teaching organization models,and establishing multiple evaluation systems,we will realize the deep integration of information technology and teaching,promote the reform of teaching and learning methods,improve the quality of personnel training,and provide strong support for the modernization of education.
文摘With the acceleration of the social information process,information awareness and information skills have become the basic qualities of every citizen.The establishment of the training mechanism for scientific and technological innovation talents from the beginning of higher education is insufficient to meet the needs of the development of the times.It is imperative to improve the training of information technology innovation talents and explore a new training model.This paper describes the general situation of the development of education in the field of information technology from a domestic and international perspective.It then analyzes the existing problems,explores new exploration models and implementation suggestions,and puts forward prospects at the end of the paper.
文摘In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.
文摘This study aims to investigate how information technology is applied in the administration of the municipality of Ferizaj and what are the challenges with human resources, the work was carried out through a case study in the municipality. This paper highlights that the use of information technology provides higher efficiency for the performance of daily work in the municipality, thus also the provision of better services to citizens. However, the level of use of information technology in the Municipality of Ferizaj leaves much to be desired in terms of efficiency because a significant number of employees have not attended adequate training for the effective and efficient use of various IT applications and have not are still adapted to the digital environment in the municipality. Therefore, the recommendation derived from this paper is that the information technology environment in the municipality of Ferizaj needs to be improved by providing staff with adequate qualifications, while for those who are currently engaged in the municipality and who do not have adequate qualifications, training should be provided in a way that all users of IT applications are fully integrated into the digitized environment in order to be effective and efficient in providing services to citizens. This simultaneously gives the municipal staff job security and motivation for better services for citizens. Also, information technology enables a better control over the activity of the municipality because every action is recorded as data which can then be used to analyze the performance of the municipality.
文摘Objective To understand the development status of traditional Chinese medicine extraction technology,so as to provide a reference for enterprises and scientific research institutions to determine the direction of technological innovation.Besides,the government can formulate scientific and technological innovation strategies.Methods Based on patent information,statistical methods were applied to analyze the development of traditional Chinese medicine extraction technology.Then,the core technology was identified by constructing a patent citation network.Finally,the main path analysis method was applied to discover the technological evolution path.Results and Conclusion The extraction technology of traditional Chinese medicine is still in the growth stage.At present,its R&D is based on enterprises,supplemented by scientific research institutions.The core technologies are ultrasonic extraction and enzymatic extraction.The main path represented by enzymatic extraction technology reveals the evolution process of traditional Chinese medicine extraction technology.Based on this,relevant suggestions are put forward.Firstly,technological innovation cooperation should be strengthened to explore new models of achievement transformation and cooperation.Secondly,key enterprises of technology clusters should be cultivated to accelerate breakthroughs in core technologies.Thirdly,combined technologies can achieve high-efficiency enzyme-assisted extraction and open up new ways of extracting traditional Chinese medicine.Fourthly,traditional techniques should be improved to develop innovative modern techniques.
基金supported by the Hainan Provincial Key Laboratory of Philosophy and Social Sciences for Hainan Free Trade Port International Shipping Development and Property Rights Digitization,Hainan Vocational University of Science and Technology(Qiong Social Science[2022]No.26).
文摘In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.
文摘Recent research and studies have shown that Information Technology(IT)has a significant impact on service quality,customer satisfaction,and customer relationship development.With the proliferation and penetration of technology in all aspects of life,organizations are responding to the implications and opportunities that IT creates in relation to customer services.The main objective of using information technology in organizations is to increase customer satisfaction,service quality,and customer relationship management,which the authors will focus on here.Enhancing service quality,improving customer satisfaction,and establishing close and sustainable customer relationships are key advantages of leveraging information technology in this field.This article examines the impact of information technology on service quality,customer satisfaction,and customer relationship development and provides strategies and models for organizations to improve customer satisfaction and establish closer connections with them through the use of information technology.Seventy individuals from the IT field were used to evaluate the proposed model.The proposed model was compared with three models:SEM,regression,and decision tree,and the results demonstrated better performance of this approach.
基金supported by National Natural Science Foundation of China(No.51275052)Beijing Natural Science Foundation(No.3131002)
文摘The safety and reliability of mechatronics systems,particularly the high-end,large and key mechatronics equipment in service,can strongly influence on production efficiency,personnel safety,resources and environment.Based on the demands of development of modern industries and technologies such as international industry 4.0,Made-in-China 2025 and Internet + and so on,this paper started from revealing the regularity of evolution of running state of equipment and the methods of signal processing of low signal noise ratio,proposed the key information technology of state monitoring and earlyfault-warning for equipment,put forward the typical technical line and major technical content,introduced the application of the technology to realize modern predictive maintenance of equipment and introduced the development of relevant safety monitoring instruments.The technology will play an important role in ensuring the safety of equipment in service,preventing accidents and realizing scientific maintenance.
文摘During the pandemic, technological innovation provided a platform with a range of uses, including in the healthcare industry. Technology is currently being used in vaccination drives run by many governments across the world to help spread vaccines quickly and efficiently. The technology makes healthcare personnel more effective at their professions and greatly raises the standard of service in the industry. The researchers undertook this study to create a suitable and long-lasting immunization database with a mapping method to give a better perspective of the immunization status. To gather essential information for this study, the researchers spoke with the local health officer in the targeted area. The obtained data then served as the basis for the system’s capabilities and features, becoming the target problems addressed by the developers. The investigation found that the majority of procedures and interactions are carried out manually and recorded on an unprotected, antiquated Excel spreadsheet. The researchers’ technology also shows to be a superior way to deal with the problems and difficulties while making their health-related transactions and operations quicker, safer, and much more effective.
文摘Success or failure of an E-commerce platform is often reduced to its ability to maximize the conversion rate of its visitors. This is commonly regarded as the capacity to induce a purchase from a visitor. Visitors possess individual characteristics, histories, and objectives which complicate the choice of what platform features that maximize the conversion rate. Modern web technology has made clickstream data accessible allowing a complete record of a visitor’s actions on a website to be analyzed. What remains poorly constrained is what parts of the clickstream data are meaningful information and what parts are accidental for the problem of platform design. In this research, clickstream data from an online retailer was examined to demonstrate how statistical modeling can improve clickstream information usage. A conceptual model was developed that conjectured relationships between visitor and platform variables, visitors’ platform exit rate, boune rate, and decision to purchase. Several hypotheses on the nature of the clickstream relationships were posited and tested with the models. A discrete choice logit model showed that the content of a website, the history of website use, and the exit rate of pages visited had marginal effects on derived utility for the visitor. Exit rate and bounce rate were modeled as beta distributed random variables. It was found that exit rate and its variability for pages visited were associated with site content, site quality, prior visitor history on the site, and technological preferences of the visitor. Bounce rate was also found to be influenced by the same factors but was in a direction opposite to the registered hypotheses. Most findings supported that clickstream data is amenable to statistical modeling with interpretable and comprehensible models.
文摘With the rapid development of economic construction, constant improvement of economic level of china, all walks of life have technologically conducted in-depth study on related knowledge applied in their own areas. Among them, the application of relative technology as well as relative requirements in medical industry is also constantly improving. The application of emerging technology not only plays a significant role in the modernization development of hospital, but also is greatly significant on the improvement of medical quality. Therefore the key point of hospital development is how to use network technique to ensure the rapid, stable and safe operation of hospital's daily work. Starting from the information construction of hospital, this paper has made a discussion on the concept and advantages of VPN technology, and an analysis on the specific application of VPN technology in hospital. According to the discourse of the paper, it's possible to provide valuable references and suggestions for the application of VPN technology on the information construction of hospitals.
基金supported by the Manchester Digital Development Agency,the University of Manchester Ahmed Iqbal Race Relations Resource Center,the University of Michigan Non-Profit and Public Management Center and the Alliance for Community Technology
文摘Underresourced or socially excluded communities in Manchester, England demonstrate active use of information technologies despite continuing digital inequalities.A systematic look at 31 grassroots community groups, at how they use IT and who helps them, reveals possible mechanisms towards a more inclusive network society. Social network and social capital theories help make apparent how people are self-organizing with respect to information technology in ways that reach across ethnicity, class, gender, and generations for skilled help, yet stay close to their strong-tie, bonding-social-capital networks, relying largely on people in their own communities. Based on 25 measures of IT use, the groups fall into three progressively more extensive categories: Downloaders(using computers and the Internet, particularly e-mails), uploaders(maintaining a group web presence), and cyberorganizers(helping others to become uploaders or downloaders). These categories align with each individual group's purpose.
基金Under the auspices of Key Project of National Natural Science Foundation of China (No. 40435013, 40301014)
文摘Taking Nanjing as a case, the paper explains the spatial behavior differences existing in the information technology use among different groups of residents and households, by virtue of analyzing the survey data of urban households in the 11 districts of Nanjing, from the social, spatial, life and other non-technical angles. Also it makes various analyses and evaluation quantitatively and qualitatively on the social and spatial effect of information technology. The results show that the new technology is changing the social spatial behaviors of urban residents. New behavioral spaces of urban family such as telecommuting, email and QQ have begun to emerge. With the help of Internet, the communication scope of families has expanded greatly, and more new forms of publicizing community information have begun to emerge. Telecommunication contact forms have been developing swiftly, and their frequencies of contact have been increasing dramatically.
基金Under the auspices of China Scholarship Council。
文摘Cross-region innovation is widely recognized as an important source of the long-term regional innovation capacity.In the recent past,a growing number of studies has investigated the network structure and mechanisms of cross-region innovation collaboration in various contexts.However,existing research mainly focuses on physical effects,such as geographical distance and high-speed railway connections.These studies ignore the intangible drivers in a changing environment,the more digitalized economy and the increasingly solidified innovation network structure.Thus,the focus of this study is on estimating determinants of innovation networks,especially on intangible drivers,which have been largely neglected so far.Using city-level data of Chinese patents(excluding Hong Kong,Macao,and Taiwan Province of China),we trace innovation networks across Chinese cities over a long period of time.By integrating a measure on Information and Communications Technology(ICT)development gap and network structural effects into the general proximity framework,this paper explores the changing mechanisms of Chinese innovation networks from a new perspective.The results show that the structure of cross-region innovation networks has changed in China.As mechanisms behind this development,the results confirm the increasingly important role of intangible drivers in Chinese inter-city innovation collaboration when controlling for effects of physical proximity,such as geographical distance.Since digitalization and coordinated development are the mainstream trends in China and other developing countries,these countries'inter-city innovation collaboration patterns will witness dramatic changes under the influence of intangible drivers.
基金We thank the Natural Science Foundation of Shanxi Province(202103021224439)National Natural Science Foundation of China(22075308)for financial support.
文摘The aromatic compounds,including o-xylene,m-xylene,p-xylene,and ethylbenzene,primarily originate from the catalytic reforming of crude oil,and have a wide variety of applications.However,because of similar physical and chemical properties,these compounds are difficult to be identified by gas chromatography(GC)without standard samples.With the development of modern nuclear magnetic resonance(NMR)techniques,NMR has emerged as a powerful and efficient tool for the rapid analysis of complex and crude mixtures without purification.In this study,the parameters of one-dimensional(1D)total correlation spectroscopy(TOCSY)NMR techniques,including 1D selective gradient TOCSY and 1D chemicalshift-selective filtration(CSSF)with TOCSY,were optimized to obtain comprehensive molecular structure information.The results indicate that the overlapped signals in NMR spectra of nonpolar aromatic compounds(including o-xylene,m-xylene,p-xylene and ethylbenzene),polar aromatic compounds(benzyl alcohol,benzaldehyde,benzoic acid),and aromatic compounds with additional conjugated bonds(styrene)can be resolved in 1D TOCSY.More importantly,full molecular structures can be clearly distinguished by setting appropriate mixing time in 1D TOCSY.This approach simplifies the NMR spectra,provides structural information of entire molecules,and can be applied for the analysis of other structural isomers.