The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms ...and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Information technology (IT) and space are sociomaterial dimensions of organizations that Human Resource Management (HRM) often take for granted, discounting how workers enact them in practice. With ...digital technologies rapidly changing the spaces of work, this paper proposes a framework for HRM to appreciate the role of the lived, affective experience of IT-enabled (physical and virtual) hybrid workspaces. We integrate the information systems (IS) literature on sociomaterial practices and insights on organizational space to suggest implications for HRM practice and pathways for future research on how virtual and physical spaces are related and lived in the emergence of new hybrid workplaces and practices.
Although different types of teams increasingly employ embodied physical action (EPA) robots as a collaborative technology to accomplish their work, we know very little about what makes such teams ...successful. This paper has two objectives: the first is to examine whether a team's emotional attachment to its robots can lead to better team performance and viability; the second is to determine whether robot and team identification can promote a team's emotional attachment to its robots. To achieve these objectives, we conducted a between-subjects experiment with 57 teams working with robots. Teams performed better and were more viable when they were emotionally attached to their robots. Both robot and team identification increased a team's emotional attachment to its robots. Results of this study have implications for collaboration using EPA robots specifically and for collaboration technology in general.
•We analyze the effects of ICT on economic performance and energy consumption of selected South Asian economies.•In the long-run, ICT significantly and positively contributed to the economic growth ...of India only.•India is the only country in South Asia that has achieved energy efficiency as a result of increased use of ICT.•GDP per capita has a positive and significant impact on energy consumption in both Pakistan and India.•South Asian economies try to follow their regional partner, India.
This study contributes to the literature by analyzing the effects of information and communication technology (ICT) on economic performance and energy consumption of selected South Asian economies i.e. Bangladesh, India, Pakistan and Sri Lanka for the period of 1990–2018. For empirical analysis, we employed the bounds testing approach of cointegration and error correction modelling. The findings of the study confirm that, in the long-run, ICT significantly and positively contributed to the economic growth of India only. Similarly, India is the only country in South Asia that has achieved energy efficiency as a result of increased use of ICT. However, energy consumption proved to be an important determinant of GDP per capita in India and Pakistan. Also, GDP per capita has a positive and significant impact on energy consumption in both India and Pakistan. These results imply that South Asian economies try to follow their regional partner, India, in increasing the role of ICT in their economies, which on one side will boost their economic growth and on the other side will help them in achieving energy efficiency. Moreover, the energy conservation policy could prove detrimental to South Asian economies.
The world data volume will increase 10 times by 2025 to equal 163 ZettaByte. More than 95% of data will be transmitted in real time by the devices incorporated into network, which is the key feature ...of new industrial base formation 1. Even today the information technology gap between economies of the developed and developing countries spells not only a reduction of competitiveness of organizations and individual branches of economy, but the loss of national technological sovereignties. This article considers a system of providing competitiveness of an organization, which is connected with the innovative business model of development and is supported by such a component of entrepreneurial business, as the information technology interaction of entities of social and economic relations.
At present, most of the economic, commercial, cultural, social and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and ...government and governmental institutions, are carried out in cyberspace. Recently, many private companies and government organizations around the world are facing the problem of cyber-attacks and the danger of wireless communication technologies. Today’s world is highly dependent on electronic technology, and protecting this data from cyber-attacks is a challenging issue. The purpose of cyber-attacks is to harm companies financially. In some other cases, cyber-attacks can have military or political purposes. Some of these damages are: PC viruses, knowledge breaks, data distribution service (DDS) and other assault vectors. To this end, various organizations use various solutions to prevent damage caused by cyber-attacks. Cyber security follows real-time information on the latest IT data. So far, various methods had been proposed by researchers around the world to prevent cyber-attacks or reduce the damage caused by them. Some of the methods are in the operational phase and others are in the study phase. The aim of this study is to survey and comprehensively review the standard advances presented in the field of cyber security and to investigate the challenges, weaknesses and strengths of the proposed methods. Different types of new descendant attacks are considered in details. Standard security frameworks are discussed with the history and early-generation cyber-security methods. In addition, emerging trends and recent developments of cyber security and security threats and challenges are presented. It is expected that the comprehensive review study presented for IT and cyber security researchers will be useful.
To date, there have been very few studies that have explored the relationship between headaches and computer use. The chief aim of this study is to investigate the prevalence of primary headache ...disorders among informational technology staff and identify the potential factors contributing to it.
This is a cross-sectional study based on annual health checks of employees from the information technology industry. We identified 2216 information technology staff members from Beijing by stratified random sampling who met the inclusion criteria. All participants were initially required to have a physical examination, after which they complete a general situation questionnaire that included a headache screening question. Those who had suffered from headache within the previous year also completed the questionnaire developed by Lifting the Burden. The International Classification of Headache Disorders 3(ICHD-3) criteria was used for the diagnosis of headache.
A total of 2012 valid questionnaires (males, 1544 76.7%; females, 468 23.3%) were obtained from 2216 participants for a response rate of 90.8%. A total of 619 participants were diagnosed with primary headache, the one-year prevalence of which was 30.8%. Regarding the classification of the primary headache, 152 participants suffered from migraine, with a one-year prevalence of 7.6%; 440 and 27 suffered from tension-type headache and unclassified headaches, with one-year prevalences of 21.9 and 1.3%, respectively. Multivariate regression analysis showed that female gender was a risk factor for migraine and tension-type headache (OR 3.2195% CI 2.28-4.53 and 1.8895% CI 1.47-2.40, respectively). Age was also related to migraine and tension-type headache. The 41-50 age group had 2.02 times the probability of migraine, and the 31-40 age group had 1.89 times the probability of tension-type headaches compared to the 18-30 age group. Obesity and excessive computer use (more than 12 h per day) were also factors contributing to tension-type headache (OR: 2.6195% CI 1.91-3.56 and 1.6395% CI 1.18-2.25, respectively).
The one-year prevalence of primary headache in this population was 30.8%. The prevalence of tension-type headache in this population was higher than that in the general Chinese population. The occurrence of primary headache is correlated with many factors, among which excessive computer use significantly contributed to the risk of tension-type headache.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
Background: Health information systems offer many potential benefits for healthcare, including financial benefits and for improving the quality of patient care. The purpose of District Health ...Information Systems (DHIS) is to document data that are routinely collected in all public health facilities in a country using the system.
Objective: The aim of this study was to examine the strengths and operational challenges of DHIS2, with a goal to enable decision makers in different counties to more accurately evaluate the outcomes of introducing DHIS2 into their particular country.
Method: A review of the literature combined with the method of meta-synthesis was used to source information and interpret results relating to the strengths and operational challenges of DHIS2. Databases (Embase, PubMed, Scopus and Google Scholar) were searched for documents related to strengths and operational challenges of DHIS2, with no time limit up to 8 April 2017. The review and evaluation of selected studies was conducted in three stages: title, abstract and full text. Each of the selected studies was reviewed carefully and key concepts extracted. These key concepts were divided into two categories of strengths and operational challenges of DHIS2. Then, each category was grouped based on conceptual similarity to achieve the main themes and sub-themes. Content analysis was used to analyse extracted data.
Results: Of 766 identified citations, 20 studies from 11 countries were included and analysed in this study. Identified strengths in the DHIS were represented in seven themes (with 21 categories): technical features of software, proper management of data, application flexibility, networking and increasing the satisfaction of stakeholders, development of data management, increasing access to information and economic benefits. Operational challenges were identified and captured in 11 themes (with 18 categories): funds; appropriate communication infrastructure; the need for the existence of appropriate data; political, cultural, social and structural infrastructure; manpower; senior managers; training; using academic potentials; definition and standardising the deployment processes; neglect to application of criteria and clinical guidelines in the use of system; data security; stakeholder communications challenges and the necessity to establish a pilot system.
Conclusion: This study highlighted specific strengths in the technical and functional aspects of DHIS2 and also drew attention to particular challenges and concerns. These results provide a sound evidence base for decision makers and policymakers to enable them to make more accurate decisions about whether or not to use the DHIS2 in the health system of their country.
The acceleration in science, technology, communication, and production that began in the second half of the twentieth century— developments which make up the concept of the “digital”—has brought us ...to what might be the most contradictory moment in human history. The digital revolution has made it possible not only to imagine but to actually realize a world in which social inequality and poverty are vanquished. But instead these developments have led to an unprecedented level of accumulation of private profits. Rather than the end of social inequality we are witness to its global expansion. In The Digital Condition, Rob Wilkie advances a groundbreaking analysis of digital culture which argues that the digital geist—which has its genealogy in such concepts as the “body without organs,” “spectrality,” and “différance”—has obscured the implications of class difference with the phantom of a digital divide.
Optical parametric amplification is a second-order nonlinear process whereby an optical signal is amplified by a pump via the generation of an idler field1. This mechanism is inherently related to ...spontaneous parametric down-conversion, which currently constitutes the building block for entangled photon pair generation2, a process that is exploited in modern quantum technologies. Here we demonstrate single-pass optical parametric amplification at the ultimate thickness limit; using semiconducting transition metal dichalcogenides3,4, we show that amplification can be attained over propagation through a single atomic layer. Such a second-order nonlinear interaction at the two-dimensional limit bypasses phase-matching requirements5 and achieves ultrabroad amplification bandwidths. In agreement with first-principle calculations, we observe that the amplification process is independent of the in-plane polarization of signal and pump fields. By the use of AA-stacked multilayers, we present a clear pathway towards the scaling of conversion efficiency. Our results pave the way for the development of atom-sized tunable sources of radiation with potential applications in nanophotonics and quantum information technology.Single-pass optical parametric amplification is demonstrated following propagation though an atomically thin semiconducting transition metal dichalcogenide. The demonstration may lead to atom-sized tunable light sources.