Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We condu...Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We conducted a systematic integrative literature review based on a compre-hensive database search. To organise, categorise and synthesise the ex-isting literature, we adopted the affordance actualization theory. To align the literature with our research framework, we used four categories: 1) the functionalities of HIT and how these functionalities are measured;2) use and immediate outcomes of HIT functionalities;3) different perfor-mance indicators and how HIT functionalities affect them;and 4) what hospital characteristics influence the outcome of hospital performance. Results: Fifty-two studies were included. We identified four types of HIT. Only ten studies (19.2%) define the use of HIT by explicitly meas-uring the use rate of HIT. We identified five dimensions of hospital per-formance indicators. Every dimension showed mixed results;however, in general, HIT has a positive impact on mortality and patient readmis-sions. We found several hospital characteristics that may affect the rela-tionship between HIT and hospital-level outcomes. Discussion: Further efforts should focus on embedded research on HIT functionalities, use and effects of HIT implementations with more performance indicators and adjusted for hospital characteristics. Conclusion: The proposed framework could help hospitals and researchers make decisions regard-ing the functionalities, use and effects of HIT implementation in hospi-tals. Given our research outcomes, we suggest future research opportuni-ties to improve understanding of how HIT affects hospital performance. .展开更多
This paper systematically reviews the current applications of various spatial information technologies in CO_(2)sequestration monitoring,analyzes the challenges faced by spatial information technologies in CO_(2)seque...This paper systematically reviews the current applications of various spatial information technologies in CO_(2)sequestration monitoring,analyzes the challenges faced by spatial information technologies in CO_(2)sequestration monitoring,and prospects the development of spatial information technologies in CO_(2)sequestration monitoring.Currently,the spatial information technologies applied in CO_(2)sequestration monitoring mainly include five categories:eddy covariance method,remote sensing technology,geographic information system,Internet of Things technology,and global navigation satellite system.These technologies are involved in three aspects:monitoring data acquisition,positioning and data transmission,and data management and decision support.Challenges faced by the spatial information technologies in CO_(2)sequestration monitoring include:selecting spatial information technologies that match different monitoring purposes,different platforms,and different monitoring sites;establishing effective data storage and computing capabilities to cope with the broad sources and large volumes of monitoring data;and promoting collaborative operations by interacting and validating spatial information technologies with mature monitoring technologies.In the future,it is necessary to establish methods and standards for designing spatial information technology monitoring schemes,develop collaborative application methods for cross-scale monitoring technologies,integrate spatial information technologies with artificial intelligence and high-performance computing technologies,and accelerate the application of spatial information technologies in carbon sequestration projects in China.展开更多
Jordan is one of many countries that intends to reform its public sector by adopting accrual accounting,which is primarily carried out through the International Public Sector Accounting Standards(IPSAS)implementation ...Jordan is one of many countries that intends to reform its public sector by adopting accrual accounting,which is primarily carried out through the International Public Sector Accounting Standards(IPSAS)implementation plan,scheduled to be completed by 2021.Considering the difficulties of adoption,this process cannot be completed without an appropriate Information Technology(IT)system capable of providing the accounting information required for this reform.Therefore,this study aims to examine the influence of IT on accrual accounting adoption in the Jordanian public sector.The study employed the quantitative survey approach.Based on 331 usable questionnaires,the descriptive findings showed that the use of IT in the Jordanian public sector is relevant to daily accounting transactions in general and to accrual accounting in particular.The regression analysis showed a positive,significant relationship between IT use and accrual accounting practice.The IT specialist should be able to understand the needs of public sector in adopting accrual-based accounting.In line with today’s digitalization age,which integrates advanced technologies and numerous techniques,this study suggests that a combination of accounting and IT experts is a value added to sharpen the competitiveness of public sector reform.This study contributes to the extant literature in public sector,concerning the relationship between IT and accrual accounting adoption in the context of Jordan.展开更多
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic...Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance.展开更多
In an era dominated by artificial intelligence (AI), establishing customer confidence is crucial for the integration and acceptance of AI technologies. This interdisciplinary study examines factors influencing custome...In an era dominated by artificial intelligence (AI), establishing customer confidence is crucial for the integration and acceptance of AI technologies. This interdisciplinary study examines factors influencing customer trust in AI systems through a mixed-methods approach, blending quantitative analysis with qualitative insights to create a comprehensive conceptual framework. Quantitatively, the study analyzes responses from 1248 participants using structural equation modeling (SEM), exploring interactions between technological factors like perceived usefulness and transparency, psychological factors including perceived risk and domain expertise, and organizational factors such as leadership support and ethical accountability. The results confirm the model, showing significant impacts of these factors on consumer trust and AI adoption attitudes. Qualitatively, the study includes 35 semi-structured interviews and five case studies, providing deeper insight into the dynamics shaping trust. Key themes identified include the necessity of explainability, domain competence, corporate culture, and stakeholder engagement in fostering trust. The qualitative findings complement the quantitative data, highlighting the complex interplay between technology capabilities, human perceptions, and organizational practices in establishing trust in AI. By integrating these findings, the study proposes a novel conceptual model that elucidates how various elements collectively influence consumer trust in AI. This model not only advances theoretical understanding but also offers practical implications for businesses and policymakers. The research contributes to the discourse on trust creation and decision-making in technology, emphasizing the need for interdisciplinary efforts to address societal challenges associated with technological advancements. It lays the groundwork for future research, including longitudinal, cross-cultural, and industry-specific studies, to further explore consumer trust in AI.展开更多
This paper discusses the digital application and benefit analysis of building information model(BIM)technology in the large-scale comprehensive development project of the Guangxi headquarters base.The project covers a...This paper discusses the digital application and benefit analysis of building information model(BIM)technology in the large-scale comprehensive development project of the Guangxi headquarters base.The project covers a total area of 92,100 square meters,with a total construction area of 379,700 square meters,including a variety of architectural forms.Through three-dimensional modeling and simulation analysis,BIM technology significantly enhances the design quality and efficiency,shortens the design cycle by about 20%,and promotes the collaboration and integration of project management,improving the management efficiency by about 25%.During the construction phase,the collision detection and four-dimensional visual management functions of BIM technology have improved construction efficiency by about 15%and saved the cost by about 10%.In addition,BIM technology has promoted green building and sustainable development,achieved the dual improvement of technical and economic indicators and social and economic benefits,set an example for enterprises in digital transformation,and opened up new market businesses.展开更多
The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent trainin...The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges.展开更多
In first aid, traditional information interchange has numerous shortcomings. For example, delayed information and disorganized departmental communication cause patients to miss out on critical rescue time. Information...In first aid, traditional information interchange has numerous shortcomings. For example, delayed information and disorganized departmental communication cause patients to miss out on critical rescue time. Information technology is becoming more and more mature, and as a result, its use across numerous industries is now standard. China is still in the early stages of developing its integration of emergency medical services with modern information technology;despite our progress, there are still numerous obstacles and constraints to overcome. Our goal is to integrate information technology into every aspect of emergency patient care, offering robust assistance for both patient rescue and the efforts of medical personnel. Information may be communicated in a fast, multiple, and effective manner by utilizing modern information technology. This study aims to examine the current state of this field’s development, current issues, and the field’s future course of development.展开更多
With the beginning of the information systems’ spreading, people started thinking about using them for making business decisions. Computer technology solutions, such as the Decision Support System, make the decision-...With the beginning of the information systems’ spreading, people started thinking about using them for making business decisions. Computer technology solutions, such as the Decision Support System, make the decision-making process less complex and simpler for problem-solving. In order to make a high-quality business decision, managers need to have a great deal of appropriate information. Nonetheless, this complicates the process of making appropriate decisions. In a situation like that, the possibility of using DSS is quite logical. The aim of this paper is to find out the intended use of DSS for medium and large business organizations in USA by applying the Technology Acceptance Model (TAM). Different models were developed in order to understand and predict the use of information systems, but the information systems community mostly used TAM to ensure this issue. The purpose of the research model is to determine the elements of analysis that contribute to these results. The sample for the research consisted of the target group that was supposed to have completed an online questionnaire about the manager’s use of DSS in medium and large American companies. The information obtained from the questionnaires was analyzed through the SPSS statistical software. The research has indicated that, this is primarily used due to a significant level of Perceived usefulness and For the Perceived ease of use.展开更多
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution...Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.展开更多
The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the a...The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry.展开更多
The concept of“STEM+”integrates art,humanistic literacy,and social values in the traditional STEM education concept,advocates cross-disciplinary integration,and aims to cultivate compound talents equipped to tackle ...The concept of“STEM+”integrates art,humanistic literacy,and social values in the traditional STEM education concept,advocates cross-disciplinary integration,and aims to cultivate compound talents equipped to tackle future challenges.In 2022,the Ministry of Education issued the“Compulsory Education Information Technology Curriculum(2022 Edition),”emphasizing the core literacy of information science and technology and the integration of interdisciplinary disciplines,and encouraging the teaching mode suitable for discipline characteristics.The 6E teaching mode is a student-centered teaching strategy characterized by active exploration and cross-disciplinary integration.This article innovatively designed the“STEM+”6E teaching mode,which is applied to junior high school information technology teaching,which can better achieve core literacy teaching goals.展开更多
With the rapid development of information technology,higher vocational computer education is facing an unprecedented change.Under the background of information technology,this paper discusses the construction and prac...With the rapid development of information technology,higher vocational computer education is facing an unprecedented change.Under the background of information technology,this paper discusses the construction and practice of blended teaching mode of higher vocational computer education.By analyzing the theoretical basis of the blended teaching mode and combining the actual needs of higher vocational computer education,a blended teaching mode combining online and offline is proposed,aiming at enhancing students’independent learning ability,practical operation skills,and teamwork spirit,and providing new ideas and methods for the development of higher vocational computer education.展开更多
The rapid development of information technology provides a new opportunity and impetus for the reform of education and teaching.Deep integration of information technology and education and teaching is the only way to ...The rapid development of information technology provides a new opportunity and impetus for the reform of education and teaching.Deep integration of information technology and education and teaching is the only way to promote the modernization of education.Starting from the connotation of the deep integration of information technology and education and teaching,this paper analyzes the existing problems in the current integration process,and puts forward innovative strategies from the aspects of concept,resources,model,and evaluation.Through measures such as building a smart teaching environment,enriching high-quality teaching resources,innovating teaching organization models,and establishing multiple evaluation systems,we will realize the deep integration of information technology and teaching,promote the reform of teaching and learning methods,improve the quality of personnel training,and provide strong support for the modernization of education.展开更多
With the acceleration of the social information process,information awareness and information skills have become the basic qualities of every citizen.The establishment of the training mechanism for scientific and tech...With the acceleration of the social information process,information awareness and information skills have become the basic qualities of every citizen.The establishment of the training mechanism for scientific and technological innovation talents from the beginning of higher education is insufficient to meet the needs of the development of the times.It is imperative to improve the training of information technology innovation talents and explore a new training model.This paper describes the general situation of the development of education in the field of information technology from a domestic and international perspective.It then analyzes the existing problems,explores new exploration models and implementation suggestions,and puts forward prospects at the end of the paper.展开更多
Media and Information Literacy(MIL)is one of the most important topics in today’s mediatized world.Under the leadership of United Nations Educational,Scientific and Cultural Organization(UNESCO),many international or...Media and Information Literacy(MIL)is one of the most important topics in today’s mediatized world.Under the leadership of United Nations Educational,Scientific and Cultural Organization(UNESCO),many international organizations in the world,as foreign donors,annually announce many projects and grants for the promotion and development of the field of MIL in the countries of the world.One of the main actors of this movement is DW Akademie with different media and MIL projects several countries of the world.This research paper delves into the role of DW Akademie’s MIL model in shaping a media-savvy generation.The study explores the theoretical underpinnings and practical applications of Deutsche Welle(DW)Akademie’s MIL model,analysing its effectiveness in fostering media literacy skills.The research employs a multi-faceted approach,incorporating case studies to assess the model’s impact across diverse demographics.The paper also considers the model’s alignment with global educational policies and proposes recommendations for its integration into broader frameworks.By investigating DW Akademie’s MIL model,this research contributes to the ongoing discourse on media literacy education,providing valuable insights for educators,policymakers,and researchers.The findings offer a nuanced understanding of the model’s position in cultivating a media-savvy generation poised to navigate the complexities of the information age.展开更多
In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely ...In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.展开更多
This study aims to investigate how information technology is applied in the administration of the municipality of Ferizaj and what are the challenges with human resources, the work was carried out through a case study...This study aims to investigate how information technology is applied in the administration of the municipality of Ferizaj and what are the challenges with human resources, the work was carried out through a case study in the municipality. This paper highlights that the use of information technology provides higher efficiency for the performance of daily work in the municipality, thus also the provision of better services to citizens. However, the level of use of information technology in the Municipality of Ferizaj leaves much to be desired in terms of efficiency because a significant number of employees have not attended adequate training for the effective and efficient use of various IT applications and have not are still adapted to the digital environment in the municipality. Therefore, the recommendation derived from this paper is that the information technology environment in the municipality of Ferizaj needs to be improved by providing staff with adequate qualifications, while for those who are currently engaged in the municipality and who do not have adequate qualifications, training should be provided in a way that all users of IT applications are fully integrated into the digitized environment in order to be effective and efficient in providing services to citizens. This simultaneously gives the municipal staff job security and motivation for better services for citizens. Also, information technology enables a better control over the activity of the municipality because every action is recorded as data which can then be used to analyze the performance of the municipality.展开更多
Objective To understand the development status of traditional Chinese medicine extraction technology,so as to provide a reference for enterprises and scientific research institutions to determine the direction of tech...Objective To understand the development status of traditional Chinese medicine extraction technology,so as to provide a reference for enterprises and scientific research institutions to determine the direction of technological innovation.Besides,the government can formulate scientific and technological innovation strategies.Methods Based on patent information,statistical methods were applied to analyze the development of traditional Chinese medicine extraction technology.Then,the core technology was identified by constructing a patent citation network.Finally,the main path analysis method was applied to discover the technological evolution path.Results and Conclusion The extraction technology of traditional Chinese medicine is still in the growth stage.At present,its R&D is based on enterprises,supplemented by scientific research institutions.The core technologies are ultrasonic extraction and enzymatic extraction.The main path represented by enzymatic extraction technology reveals the evolution process of traditional Chinese medicine extraction technology.Based on this,relevant suggestions are put forward.Firstly,technological innovation cooperation should be strengthened to explore new models of achievement transformation and cooperation.Secondly,key enterprises of technology clusters should be cultivated to accelerate breakthroughs in core technologies.Thirdly,combined technologies can achieve high-efficiency enzyme-assisted extraction and open up new ways of extracting traditional Chinese medicine.Fourthly,traditional techniques should be improved to develop innovative modern techniques.展开更多
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in...In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.展开更多
文摘Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We conducted a systematic integrative literature review based on a compre-hensive database search. To organise, categorise and synthesise the ex-isting literature, we adopted the affordance actualization theory. To align the literature with our research framework, we used four categories: 1) the functionalities of HIT and how these functionalities are measured;2) use and immediate outcomes of HIT functionalities;3) different perfor-mance indicators and how HIT functionalities affect them;and 4) what hospital characteristics influence the outcome of hospital performance. Results: Fifty-two studies were included. We identified four types of HIT. Only ten studies (19.2%) define the use of HIT by explicitly meas-uring the use rate of HIT. We identified five dimensions of hospital per-formance indicators. Every dimension showed mixed results;however, in general, HIT has a positive impact on mortality and patient readmis-sions. We found several hospital characteristics that may affect the rela-tionship between HIT and hospital-level outcomes. Discussion: Further efforts should focus on embedded research on HIT functionalities, use and effects of HIT implementations with more performance indicators and adjusted for hospital characteristics. Conclusion: The proposed framework could help hospitals and researchers make decisions regard-ing the functionalities, use and effects of HIT implementation in hospi-tals. Given our research outcomes, we suggest future research opportuni-ties to improve understanding of how HIT affects hospital performance. .
基金Supported by the CNPC Science and Technology Major Project(2021ZZ01-05).
文摘This paper systematically reviews the current applications of various spatial information technologies in CO_(2)sequestration monitoring,analyzes the challenges faced by spatial information technologies in CO_(2)sequestration monitoring,and prospects the development of spatial information technologies in CO_(2)sequestration monitoring.Currently,the spatial information technologies applied in CO_(2)sequestration monitoring mainly include five categories:eddy covariance method,remote sensing technology,geographic information system,Internet of Things technology,and global navigation satellite system.These technologies are involved in three aspects:monitoring data acquisition,positioning and data transmission,and data management and decision support.Challenges faced by the spatial information technologies in CO_(2)sequestration monitoring include:selecting spatial information technologies that match different monitoring purposes,different platforms,and different monitoring sites;establishing effective data storage and computing capabilities to cope with the broad sources and large volumes of monitoring data;and promoting collaborative operations by interacting and validating spatial information technologies with mature monitoring technologies.In the future,it is necessary to establish methods and standards for designing spatial information technology monitoring schemes,develop collaborative application methods for cross-scale monitoring technologies,integrate spatial information technologies with artificial intelligence and high-performance computing technologies,and accelerate the application of spatial information technologies in carbon sequestration projects in China.
文摘Jordan is one of many countries that intends to reform its public sector by adopting accrual accounting,which is primarily carried out through the International Public Sector Accounting Standards(IPSAS)implementation plan,scheduled to be completed by 2021.Considering the difficulties of adoption,this process cannot be completed without an appropriate Information Technology(IT)system capable of providing the accounting information required for this reform.Therefore,this study aims to examine the influence of IT on accrual accounting adoption in the Jordanian public sector.The study employed the quantitative survey approach.Based on 331 usable questionnaires,the descriptive findings showed that the use of IT in the Jordanian public sector is relevant to daily accounting transactions in general and to accrual accounting in particular.The regression analysis showed a positive,significant relationship between IT use and accrual accounting practice.The IT specialist should be able to understand the needs of public sector in adopting accrual-based accounting.In line with today’s digitalization age,which integrates advanced technologies and numerous techniques,this study suggests that a combination of accounting and IT experts is a value added to sharpen the competitiveness of public sector reform.This study contributes to the extant literature in public sector,concerning the relationship between IT and accrual accounting adoption in the context of Jordan.
文摘Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance.
文摘In an era dominated by artificial intelligence (AI), establishing customer confidence is crucial for the integration and acceptance of AI technologies. This interdisciplinary study examines factors influencing customer trust in AI systems through a mixed-methods approach, blending quantitative analysis with qualitative insights to create a comprehensive conceptual framework. Quantitatively, the study analyzes responses from 1248 participants using structural equation modeling (SEM), exploring interactions between technological factors like perceived usefulness and transparency, psychological factors including perceived risk and domain expertise, and organizational factors such as leadership support and ethical accountability. The results confirm the model, showing significant impacts of these factors on consumer trust and AI adoption attitudes. Qualitatively, the study includes 35 semi-structured interviews and five case studies, providing deeper insight into the dynamics shaping trust. Key themes identified include the necessity of explainability, domain competence, corporate culture, and stakeholder engagement in fostering trust. The qualitative findings complement the quantitative data, highlighting the complex interplay between technology capabilities, human perceptions, and organizational practices in establishing trust in AI. By integrating these findings, the study proposes a novel conceptual model that elucidates how various elements collectively influence consumer trust in AI. This model not only advances theoretical understanding but also offers practical implications for businesses and policymakers. The research contributes to the discourse on trust creation and decision-making in technology, emphasizing the need for interdisciplinary efforts to address societal challenges associated with technological advancements. It lays the groundwork for future research, including longitudinal, cross-cultural, and industry-specific studies, to further explore consumer trust in AI.
基金The 2023 Guangxi University Young and Middle-Aged Teachers’Scientific Research Basic Ability Improvement Project“Research on Seismic Performance of Prefabricated CFST Column-SRC Beam Composite Joints”(2023KY1204)The 2023 Guangxi Vocational Education Teaching Reform Research Project“Research and Practice on the Cultivation of Digital Talents in Prefabricated Buildings in the Context of Deepening the Integration of Industry and Education”(GXGZJG2023B052)The 2022 Guangxi Polytechnic of Construction School-Level Teaching Innovation Team Project“Prefabricated and Intelligent Teaching Innovation Team”(Gui Jian Yuan Ren[2022]No.15)。
文摘This paper discusses the digital application and benefit analysis of building information model(BIM)technology in the large-scale comprehensive development project of the Guangxi headquarters base.The project covers a total area of 92,100 square meters,with a total construction area of 379,700 square meters,including a variety of architectural forms.Through three-dimensional modeling and simulation analysis,BIM technology significantly enhances the design quality and efficiency,shortens the design cycle by about 20%,and promotes the collaboration and integration of project management,improving the management efficiency by about 25%.During the construction phase,the collision detection and four-dimensional visual management functions of BIM technology have improved construction efficiency by about 15%and saved the cost by about 10%.In addition,BIM technology has promoted green building and sustainable development,achieved the dual improvement of technical and economic indicators and social and economic benefits,set an example for enterprises in digital transformation,and opened up new market businesses.
文摘The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges.
文摘In first aid, traditional information interchange has numerous shortcomings. For example, delayed information and disorganized departmental communication cause patients to miss out on critical rescue time. Information technology is becoming more and more mature, and as a result, its use across numerous industries is now standard. China is still in the early stages of developing its integration of emergency medical services with modern information technology;despite our progress, there are still numerous obstacles and constraints to overcome. Our goal is to integrate information technology into every aspect of emergency patient care, offering robust assistance for both patient rescue and the efforts of medical personnel. Information may be communicated in a fast, multiple, and effective manner by utilizing modern information technology. This study aims to examine the current state of this field’s development, current issues, and the field’s future course of development.
文摘With the beginning of the information systems’ spreading, people started thinking about using them for making business decisions. Computer technology solutions, such as the Decision Support System, make the decision-making process less complex and simpler for problem-solving. In order to make a high-quality business decision, managers need to have a great deal of appropriate information. Nonetheless, this complicates the process of making appropriate decisions. In a situation like that, the possibility of using DSS is quite logical. The aim of this paper is to find out the intended use of DSS for medium and large business organizations in USA by applying the Technology Acceptance Model (TAM). Different models were developed in order to understand and predict the use of information systems, but the information systems community mostly used TAM to ensure this issue. The purpose of the research model is to determine the elements of analysis that contribute to these results. The sample for the research consisted of the target group that was supposed to have completed an online questionnaire about the manager’s use of DSS in medium and large American companies. The information obtained from the questionnaires was analyzed through the SPSS statistical software. The research has indicated that, this is primarily used due to a significant level of Perceived usefulness and For the Perceived ease of use.
文摘Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.
文摘The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry.
基金2024 Chongqing Normal University Graduate Research Innovation Project“Construction and Application of Information Technology Knowledge Map based on the Three-Layer Architecture”(CYS240395)。
文摘The concept of“STEM+”integrates art,humanistic literacy,and social values in the traditional STEM education concept,advocates cross-disciplinary integration,and aims to cultivate compound talents equipped to tackle future challenges.In 2022,the Ministry of Education issued the“Compulsory Education Information Technology Curriculum(2022 Edition),”emphasizing the core literacy of information science and technology and the integration of interdisciplinary disciplines,and encouraging the teaching mode suitable for discipline characteristics.The 6E teaching mode is a student-centered teaching strategy characterized by active exploration and cross-disciplinary integration.This article innovatively designed the“STEM+”6E teaching mode,which is applied to junior high school information technology teaching,which can better achieve core literacy teaching goals.
文摘With the rapid development of information technology,higher vocational computer education is facing an unprecedented change.Under the background of information technology,this paper discusses the construction and practice of blended teaching mode of higher vocational computer education.By analyzing the theoretical basis of the blended teaching mode and combining the actual needs of higher vocational computer education,a blended teaching mode combining online and offline is proposed,aiming at enhancing students’independent learning ability,practical operation skills,and teamwork spirit,and providing new ideas and methods for the development of higher vocational computer education.
文摘The rapid development of information technology provides a new opportunity and impetus for the reform of education and teaching.Deep integration of information technology and education and teaching is the only way to promote the modernization of education.Starting from the connotation of the deep integration of information technology and education and teaching,this paper analyzes the existing problems in the current integration process,and puts forward innovative strategies from the aspects of concept,resources,model,and evaluation.Through measures such as building a smart teaching environment,enriching high-quality teaching resources,innovating teaching organization models,and establishing multiple evaluation systems,we will realize the deep integration of information technology and teaching,promote the reform of teaching and learning methods,improve the quality of personnel training,and provide strong support for the modernization of education.
文摘With the acceleration of the social information process,information awareness and information skills have become the basic qualities of every citizen.The establishment of the training mechanism for scientific and technological innovation talents from the beginning of higher education is insufficient to meet the needs of the development of the times.It is imperative to improve the training of information technology innovation talents and explore a new training model.This paper describes the general situation of the development of education in the field of information technology from a domestic and international perspective.It then analyzes the existing problems,explores new exploration models and implementation suggestions,and puts forward prospects at the end of the paper.
文摘Media and Information Literacy(MIL)is one of the most important topics in today’s mediatized world.Under the leadership of United Nations Educational,Scientific and Cultural Organization(UNESCO),many international organizations in the world,as foreign donors,annually announce many projects and grants for the promotion and development of the field of MIL in the countries of the world.One of the main actors of this movement is DW Akademie with different media and MIL projects several countries of the world.This research paper delves into the role of DW Akademie’s MIL model in shaping a media-savvy generation.The study explores the theoretical underpinnings and practical applications of Deutsche Welle(DW)Akademie’s MIL model,analysing its effectiveness in fostering media literacy skills.The research employs a multi-faceted approach,incorporating case studies to assess the model’s impact across diverse demographics.The paper also considers the model’s alignment with global educational policies and proposes recommendations for its integration into broader frameworks.By investigating DW Akademie’s MIL model,this research contributes to the ongoing discourse on media literacy education,providing valuable insights for educators,policymakers,and researchers.The findings offer a nuanced understanding of the model’s position in cultivating a media-savvy generation poised to navigate the complexities of the information age.
文摘In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.
文摘This study aims to investigate how information technology is applied in the administration of the municipality of Ferizaj and what are the challenges with human resources, the work was carried out through a case study in the municipality. This paper highlights that the use of information technology provides higher efficiency for the performance of daily work in the municipality, thus also the provision of better services to citizens. However, the level of use of information technology in the Municipality of Ferizaj leaves much to be desired in terms of efficiency because a significant number of employees have not attended adequate training for the effective and efficient use of various IT applications and have not are still adapted to the digital environment in the municipality. Therefore, the recommendation derived from this paper is that the information technology environment in the municipality of Ferizaj needs to be improved by providing staff with adequate qualifications, while for those who are currently engaged in the municipality and who do not have adequate qualifications, training should be provided in a way that all users of IT applications are fully integrated into the digitized environment in order to be effective and efficient in providing services to citizens. This simultaneously gives the municipal staff job security and motivation for better services for citizens. Also, information technology enables a better control over the activity of the municipality because every action is recorded as data which can then be used to analyze the performance of the municipality.
文摘Objective To understand the development status of traditional Chinese medicine extraction technology,so as to provide a reference for enterprises and scientific research institutions to determine the direction of technological innovation.Besides,the government can formulate scientific and technological innovation strategies.Methods Based on patent information,statistical methods were applied to analyze the development of traditional Chinese medicine extraction technology.Then,the core technology was identified by constructing a patent citation network.Finally,the main path analysis method was applied to discover the technological evolution path.Results and Conclusion The extraction technology of traditional Chinese medicine is still in the growth stage.At present,its R&D is based on enterprises,supplemented by scientific research institutions.The core technologies are ultrasonic extraction and enzymatic extraction.The main path represented by enzymatic extraction technology reveals the evolution process of traditional Chinese medicine extraction technology.Based on this,relevant suggestions are put forward.Firstly,technological innovation cooperation should be strengthened to explore new models of achievement transformation and cooperation.Secondly,key enterprises of technology clusters should be cultivated to accelerate breakthroughs in core technologies.Thirdly,combined technologies can achieve high-efficiency enzyme-assisted extraction and open up new ways of extracting traditional Chinese medicine.Fourthly,traditional techniques should be improved to develop innovative modern techniques.
基金supported by the Hainan Provincial Key Laboratory of Philosophy and Social Sciences for Hainan Free Trade Port International Shipping Development and Property Rights Digitization,Hainan Vocational University of Science and Technology(Qiong Social Science[2022]No.26).
文摘In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.