期刊文献+
共找到89,423篇文章
< 1 2 250 >
每页显示 20 50 100
Smart City Rail Transit Operation and Management Information Construction Strategy
1
作者 Jing Sun 《Journal of World Architecture》 2024年第2期7-11,共5页
Rail transit is considered one of the safest and most efficient modes of transportation.Ticketing,vehicle dispatching,and passenger flow control during rail transit operations in China have been improving over the yea... Rail transit is considered one of the safest and most efficient modes of transportation.Ticketing,vehicle dispatching,and passenger flow control during rail transit operations in China have been improving over the years.Smart city construction and intelligent management models has also been increasingly emphasized with the rapid development of information and internet technology.Therefore,it is essential to conduct relevant research and discussions to improve the overall efficiency and quality of urban rail transit operation and management.This article provides an overview of smart city rail transit operation and management informatization,the principles of construction,and the functions of smart city rail transit operation and management informatization.Additionally,it discusses the strategies for the construction of smart city rail transit operation and management information and its development prospects. 展开更多
关键词 Smart city Rail transit operation and management information construction
下载PDF
Evaluating and Addressing Interoperability Constraints in Health Information Systems for Enhanced Healthcare Delivery in Zimbabwe
2
作者 Prosper Tafadzwa Denhere Nelson Matanana +2 位作者 Munyaradzi Zhou Caleb Manjeese Talent Mawere 《Journal of Computer and Communications》 2024年第7期133-154,共22页
Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and ... Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and address these constraints to enhance healthcare delivery. The study examines the current state of interoperability in health information systems, identifies the key constraints, and explores their impact on healthcare outcomes. Various approaches and strategies for addressing interoperability constraints are discussed, including the adoption of standardized data formats, implementation of interoperability frameworks, and establishment of robust data governance mechanisms. Furthermore, the study highlights the importance of stakeholder collaboration, policy development, and technical advancements in achieving enhanced interoperability. The findings emphasize the need for a comprehensive evaluation of interoperability constraints and the implementation of targeted interventions to promote seamless data exchange, improve care coordination, and enhance patient outcomes in healthcare settings. 展开更多
关键词 Health information System INTEROPERABILITY Interoperability Constraints
下载PDF
Dynamic Update Scheme of Spectrum Information Based on Spectrum Opportunity Incentive in the Database-Assisted Dynamic Spectrum Management
3
作者 Zhang Yu Chen Yong +1 位作者 He Panfeng Cai Yueming 《China Communications》 SCIE CSCD 2024年第3期75-90,共16页
To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic upd... To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic update mechanism of SI based on spectrum opportunity incentive is established, in which spectrum users are encouraged to actively assist the database to update SI in real time. Secondly, the information update contribution(IUC) of spectrum opportunity is defined to describe the cost of accessing spectrum opportunity for heterogeneous spectrum users, and the profit of SI update obtained by the database from spectrum allocation. The process that the database determines the IUC of spectrum opportunity and spectrum user selects spectrum opportunity is mapped to a Hotelling model. Thirdly, the process of determining the IUC of spectrum opportunities is further modelled as a Stackelberg game by establishing multiple virtual spectrum resource providers(VSRPs) in the database. It is proved that there is a Nash Equilibrium in the game of determining the IUC of spectrum opportunities by VSRPs. Finally, an algorithm of determining the IUC based on a genetic algorithm is designed to achieve the optimal IUC. The-oretical analysis and simulation results show that the proposed method can quickly find the optimal solution of the IUC, and ensure that the spectrum resource provider can obtain the optimal profit of SI update. 展开更多
关键词 database-assisted dynamic spectrum management HOTELLING information updating contribution spectrum information updating STACKELBERG
下载PDF
Attribute Reduction of Hybrid Decision Information Systems Based on Fuzzy Conditional Information Entropy
4
作者 Xiaoqin Ma Jun Wang +1 位作者 Wenchang Yu Qinli Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2063-2083,共21页
The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attr... The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data. 展开更多
关键词 Hybrid decision information systems fuzzy conditional information entropy attribute reduction fuzzy relationship rough set theory(RST)
下载PDF
Weighted Forwarding in Graph Convolution Networks for Recommendation Information Systems
5
作者 Sang-min Lee Namgi Kim 《Computers, Materials & Continua》 SCIE EI 2024年第2期1897-1914,共18页
Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been ... Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets. 展开更多
关键词 Deep learning graph neural network graph convolution network graph convolution network model learning method recommender information systems
下载PDF
Whole-Process Project Cost Management Based on Building Information Modeling (BIM)
6
作者 Liping Yan 《Journal of Architectural Research and Development》 2024年第4期57-62,共6页
The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the a... The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry. 展开更多
关键词 Building information Modeling(BIM) Project cost management Data integration information sharing Cost control
下载PDF
Application of Electronic Information Engineering in Hospital Management
7
作者 Jun Xiao Zhilan Yang 《Journal of Electronic Research and Application》 2024年第4期1-6,共6页
To further enhance the overall service quality of China’s hospitals and improve the trust of the majority of patients in hospitals,this paper takes intelligent hospital management as the object of study,analyzes the ... To further enhance the overall service quality of China’s hospitals and improve the trust of the majority of patients in hospitals,this paper takes intelligent hospital management as the object of study,analyzes the importance of electronic information engineering technology applied in hospital management,and discusses the specific application methods of electronic information engineering in hospital management.This aims the existing problems in the current hospital management,such as insufficient degree of informatization,data sharing difficulties,lack of professionals,etc.Corresponding improvement measures are proposed,including strengthening the construction of informatization,promoting data sharing,and cultivating professionals.It is hoped that this study will enable the majority of hospital managers to make better use of electronic information engineering technology to effectively solve the current problems faced by hospitals and to continuously improve the comprehensive competitiveness of China’s hospitals. 展开更多
关键词 Electronic information engineering Hospital management INTELLIGENCE
下载PDF
Foundations and Applications of Information Systems Dynamics
8
作者 Jianfeng Xu Zhenyu Liu +4 位作者 Shuliang Wang Tao Zheng Yashi Wang Yingfei Wang Yingxu Dang 《Engineering》 SCIE EI CAS CSCD 2023年第8期254-265,共12页
Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to d... Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to describe information and the lack of an analytical framework to evaluate information systems.The value of ISD lies in its ability to guide the design,development,application,and evaluation of largescale information system-of-systems(So Ss),just as mechanical dynamics theories guide mechanical systems engineering.This paper reports on a breakthrough in these fundamental challenges by proposing a framework for information space,improving a mathematical theory for information measurement,and proposing a dynamic configuration model for information systems.In this way,it establishes a basic theoretical framework for ISD.The proposed theoretical methodologies have been successfully applied and verified in the Smart Court So Ss Engineering Project of China and have achieved significant improvements in the quality and efficiency of Chinese court informatization.The proposed ISD provides an innovative paradigm for the analysis,design,development,and evaluation of large-scale complex information systems,such as electronic government and smart cities. 展开更多
关键词 System-of-systems engineering information theory information measurement information systems dynamics Judicial informatization
下载PDF
Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management
9
作者 Lizhe Zhang Yongqiang Huang +1 位作者 Jia Nie Kenian Wang 《Computers, Materials & Continua》 SCIE EI 2023年第11期1467-1488,共22页
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai... System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing. 展开更多
关键词 System-wide information management(SWIM) consortium blockchain consistent hash cross-domain authentication load balancing
下载PDF
Information Management in Disaster and Humanitarian Response: A Case in United Nations Office for the Coordination of Humanitarian Affairs
10
作者 Solomon M. Zewde 《Intelligent Information Management》 2023年第2期47-65,共19页
To guarantee a unified response to disasters, humanitarian organizations work together via the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Although the OCHA has made great strides to imp... To guarantee a unified response to disasters, humanitarian organizations work together via the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Although the OCHA has made great strides to improve its information management and increase the availability of accurate, real-time data for disaster and humanitarian response teams, significant gaps persist. There are inefficiencies in the emergency management of data at every stage of its lifecycle: collection, processing, analysis, distribution, storage, and retrieval. Disaster risk reduction and disaster risk management are the two main tenets of the United Nations’ worldwide plan for disaster management. Information systems are crucial because of the crucial roles they play in capturing, processing, and transmitting data. The management of information is seldom discussed in published works. The goal of this study is to employ qualitative research methods to provide insight by facilitating an expanded comprehension of relevant contexts, phenomena, and individual experiences. Humanitarian workers and OCHA staffers will take part in the research. The study subjects will be chosen using a random selection procedure. Online surveys with both closed- and open-ended questions will be used to compile the data. UN OCHA offers a structure for the handling of information via which all humanitarian actors may contribute to the overall response. This research will enable the UN Office for OCHA better gather, process, analyze, disseminate, store, and retrieve data in the event of a catastrophe or humanitarian crisis. 展开更多
关键词 information systems management information management UNOCHA (United Nations Office for Coordination of Humanitarian Affairs) Humanitarian Emergency Actors DISASTER Risk Reduction RESPONSE Emer-gency management
下载PDF
Cybersecurity Requirements for Management Information Systems
11
作者 Nadia K. Samara 《Journal of Information Security》 2023年第3期212-226,共15页
Cybersecurity is therefore one of the most important elements of security in developed countries. Especially since there is an overall trend towards cybersecurity in all aspects of life, I have found that the idea of ... Cybersecurity is therefore one of the most important elements of security in developed countries. Especially since there is an overall trend towards cybersecurity in all aspects of life, I have found that the idea of cybersecurity is based on protecting critical facilities: The nation’s information infrastructure. Information systems, including e-government management systems, are managed by key state agencies. As with economic, scientific, commercial, and other systems, threats are threats to a nation’s national security. We have therefore found that many countries are preparing institutions capable of integrating cybersecurity into protection, development, and information security. This concept has become the most important concern of developed countries, which have secured all scientific possibilities and systems to achieve it. The electronic information network has become an integral part of today’s daily lives in all places. In addition to personal uses, digital information is used, processed, stored, and shared. As this information increases and spreads, we have found that its protection has become more vital and has an effective impact on national security and technical progress. 展开更多
关键词 CYBERSECURITY SECURITY information systems
下载PDF
Analysis of the Standardization of Administrative Management in Colleges and Universities Under the Background of Information Technology
12
作者 Wei Wang 《Journal of Contemporary Educational Research》 2023年第4期72-77,共6页
In the development of the information age,universities should recognize the significant impact of information technology on their own development.In practice,it is possible to effectively improve the efficiency and qu... In the development of the information age,universities should recognize the significant impact of information technology on their own development.In practice,it is possible to effectively improve the efficiency and quality of work by dealing with and constructing information-based methods,innovating administrative management models,and adopting more efficient and scientific methods to address various problems and shortcomings encountered in work.As an important part of university management,administrative management is a complex task.Establishing a standardized management model through information technology can further improve the comprehensive efficiency of administrative management.In this regard,the administrative standardization in universities under the background of information technology is analyzed and studied in this paper. 展开更多
关键词 information background UNIVERSITIES Administrative management Standardization Online publication:April 27 2023
下载PDF
Research and Application of Management Information Systems 被引量:1
13
作者 Xiaolin Zhang Bo Zhang Yuehua Wang 《Chinese Business Review》 2005年第5期74-77,共4页
Management Information System provides an effective way for enterprises to improve their competitive abilities. It presents a framework for improving the management models through the design and implementation of effe... Management Information System provides an effective way for enterprises to improve their competitive abilities. It presents a framework for improving the management models through the design and implementation of effective and high-quality MIS. So it is very important to the modem management of corporations. ERP (Enterprise Resource Planning) system is one of the core parts of MIS, which solves the matter of management model mainly. ERP is a popular method enabling the business processes required to compete with the globalization. The thesis cites SAP R/3 to introduce the general structure and function of ERP. Global Enterprise Resource Planning Implementation is increasingly becoming the successful choice of MIS. 展开更多
关键词 management information System (MIS) Enterprise Resource Planning (ERP) information technology system development system structure
下载PDF
Airport Information Systems—Landside Management Information Systems
14
作者 Adam Marks Kees Rietsema Maytha AL-Ali 《Intelligent Information Management》 2015年第3期130-138,共9页
Research on the intersection of the areas of aviation and management information systems is sparse. Just as within other economic sectors, members of the aviation sector must incorporate new and existing technologies ... Research on the intersection of the areas of aviation and management information systems is sparse. Just as within other economic sectors, members of the aviation sector must incorporate new and existing technologies as they grow to maintain their competitive edge whether in aircraft systems, airports or other aerospace and aviation related industries. A proper classification is a prerequisite to systems alignment. This paper reviews landside airport information management systems, and their connections and interoperability with other systems and who the key airport users are. The information presented in this paper is based on interviews and data collection at a number of representative airports across the United States. Airport size and function are key considerations in the acquisition of information management system airside or land side. The implication is that not all airports are equipped in the same manner and therefore these systems can only be considered as representative of what exists “on the ground”. This paper represents a point of departure or a reference for those researchers interested in a more indepth study of airport information systems on the landside. 展开更多
关键词 AIRPORT AVIATION management information systems Landside
下载PDF
Towards an Efficient Information Systems Development Process and Management: A Review of Challenges and Proposed Strategies
15
作者 Achimugu Philip Babajide Afolabi +2 位作者 Oluwaranti Adeniran Oluwagbemi Oluwatolani Gambo Ishaya 《Journal of Software Engineering and Applications》 2010年第10期983-989,共7页
Before Information Systems are developed, they must have undergone a process called Systems Development Life Cycle (SDLC) using appropriate methodology. The SDLC consists of phases varying from author to author. Howev... Before Information Systems are developed, they must have undergone a process called Systems Development Life Cycle (SDLC) using appropriate methodology. The SDLC consists of phases varying from author to author. However, an information systems project can only be successful with intense interaction amongst project manager, systems analyst, system designers and the end users. Viewed from the project manager’s perspective, the SDLC lacks the essence of project management activities. Similarly, end users involvement is not clearly specified. The main aim of this paper is to propose a framework for information systems management and development process which accommodates the views of the different participants. Furthermore, the paper sharpens the concept of conventional SDLC, on the basis of the proposed framework. In addition, tools and methods that are appropriate for the implementation of the framework are herein discussed. 展开更多
关键词 SDLC information systems Framework Project management Development END USERS
下载PDF
An Application of a Multi-Tier Data Warehouse in Oil and Gas Drilling Information Management 被引量:2
16
作者 张宁生 王志伟 《Petroleum Science》 SCIE CAS CSCD 2004年第4期1-5,共5页
Expenditure on wells constitute a significant part of the operational costs for a petroleum enterprise, where most of the cost results from drilling. This has prompted drilling departments to continuously look for wa... Expenditure on wells constitute a significant part of the operational costs for a petroleum enterprise, where most of the cost results from drilling. This has prompted drilling departments to continuously look for ways to reduce their drilling costs and be as efficient as possible. A system called the Drilling Comprehensive Information Management and Application System (DCIMAS) is developed and presented here, with an aim at collecting, storing and making full use of the valuable well data and information relating to all drilling activities and operations. The DCIMAS comprises three main parts, including a data collection and transmission system, a data warehouse (DW) management system, and an integrated platform of core applications. With the support of the application platform, the DW management system is introduced, whereby the operation data are captured at well sites and transmitted electronically to a data warehouse via transmission equipment and ETL (extract, transformation and load) tools. With the high quality of the data guaranteed, our central task is to make the best use of the operation data and information for drilling analysis and to provide further information to guide later production stages. Applications have been developed and integrated on a uniform platform to interface directly with different layers of the multi-tier DW. Now, engineers in every department spend less time on data handling and more time on applying technology in their real work with the system. 展开更多
关键词 drilling information management multi-tier data warehouse information processing application system
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
17
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
IAM Excellence: Exploring Saviynt’s Role in Modern Information Technology
18
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期40-52,共13页
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution... Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path. 展开更多
关键词 information Technology (IT) Identity and Access management (IAM) Saviynt User Identities Access Privileges Authentication Processes Risk management
下载PDF
An Optimized Method for Accounting Information in Logistic Systems
19
作者 Ahmad Mohammed Alamri Ahmad Ali AlZubi 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1595-1609,共15页
In the era of rapid information development,with the popularity of computers,the advancement of science and technology,and the ongoing expansion of IT technology and business,the enterprise resource planning(ERP)syste... In the era of rapid information development,with the popularity of computers,the advancement of science and technology,and the ongoing expansion of IT technology and business,the enterprise resource planning(ERP)system has evolved into a platform and a guarantee for the fulfilment of company management procedures after long-term operations.Because of developments in information technology,most manual accounting procedures are being replaced by computerized Accounting Information Systems(AIS),which are quicker and more accurate.The primary factors influencing the decisions of logistics firm trading parties are investigated in order to enhance the design of decision-supporting modules and to improve the performance of logistics enterprises through AIS.This paper proposed a novel approach to calculate the weights of each information element in order to establish their important degree.The main purpose of this research is to present a quantitative analytic approach for determining the important information of logistics business collaboration response.Furthermore,the idea of total orders and the significant degrees stated above are used to identify the optimal order of all information elements.Using the three ways of marginal revenue,marginal cost,and business matching degree,the information with cumulative weights is which is deployed to form the data from the intersection of the best order.It has the ability to drastically reduce the time and effort required to create a logistics business control/decision-making system. 展开更多
关键词 Accounting information systems decisions systems corporate accounting logistic system
下载PDF
Analysis of Secured Cloud Data Storage Model for Information
20
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 CLOUD DATA information Model Data Storage Cloud Computing Security System Data Encryption
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部