2,899 research outputs found
Information Outlook, May 1997
Volume 1, Issue 5https://scholarworks.sjsu.edu/sla_io_1997/1004/thumbnail.jp
An architecture of a user-centred digital library for the academic community
An architecture of a user-centred digital library, designed to lead users of an academic community to the required information resources based on their tasks, is proposed. Information resources include full-text articles, databases, theses and dissertations, e-journals, e-books, multimedia databases, and so on. Other information resources such as university course calendars, university statutes, course registration, thesis and dissertation guidelines, style guides, and so on, are also needed by users. A prototype has been designed and developed using the School of Computer Engineering at Nanyang Technological University (NTU) as an example of such an environment to provide access to these information resources which are spread across different servers and in different home pages This prototype provides links to various information resources according to users' needs, as well as a personal work space to record/store his/her publications, frequently used or favorite hyperlinks and references or notes. Various stages of the prototype design and development are described and future works on this line are highlighted
Digital Paradigm in Medical Libraries of Bangladesh with Special Reference to icddr,b Library: Key Observations and Future Directions
Medical libraries are facing new challenges and opportunities due to dynamic changes in the digital era for offering excellent services to health scientists and professionals. The usage of information and communication technology (ICT) has become increasingly important in various fields, including the healthcare industry. Medical libraries, in particular, have also witnessed a significant transformation in terms of their functions and services due to the adoption of the digital revolution. This article aims to investigate the usage of ICT in the selected medical libraries in Bangladesh, with a special reference to the icddr,b Library. In this connection, a comparative study is made based on six major medical libraries of Bangladesh. These libraries are compared in terms of ICT use for providing library services through library websites. Collected data are analyzed in quantitative as well as qualitative methods to explore better results. Results are shown in the form of tables and figures. This paper gives a snapshot of ICT use in medical libraries of Bangladesh
Cyber security picture 2013
Summary: This report summarises cyber intrusion activity identified by or reported to the Cyber Security Operations Centre (CSOC) during 2013. It provides a broad overview of cyber threats to Australian government networks, as observed by the CSOC.
The Strategies to Mitigate Targeted Cyber Intrusions remain your best defence against the cyber threat. Implementing the Top 4 strategies as a package is at the core of this protection, as they mitigate at least 85% of cyber intrusions responded to by the CSOC. The Top 4 strategies prevent execution of malicious software, and minimise software vulnerabilities and the ability of a cyber adversary to propagate across a network. The remaining 31 strategies form an excellent basis from which to assess further network security initiatives based on a risk assessment. Your risk assessment processes should take into account the specific risks faced by your agency, the information you are protecting, and your current network security posture.
While socially-engineered emails remain the most prevalent threat to Australian government networks, the CSOC observed the emergence of several new techniques used in these emails during 2013, such as the use of cloud storage providers, Java files, and the repurposing of genuine emails. The increasing skill and resourcefulness of cyber adversaries highlights the importance of being continually vigilant and up-to-date in your network security. The Strategies to Mitigate Targeted Cyber Intrusions have been updated in 2014 to reflect the evolution of the threat environment.
Although the initial cost of implementing the Strategies to Mitigate Targeted Cyber Intrusions can seem high for some agencies, they actually represent an important investment in your organisation, reducing long-term costs and risk. If you experience a network compromise, not only will you be faced with the cost of implementing these strategies to prevent further compromise, but you will also incur both higher direct and indirect costs associated with remediating the compromise. These costs include, but are not limited to, investigating the compromise, tactical remediation, reputational costs, opportunity costs from the loss of information, and lost productivity
Development of a 3G Authentication Based Mobile Access of Health Records: A Mobile Telemedicine Application
As our country progresses in its aim to be a developed country by the Year 2020, the
field of Information and Communications Technology or ICT is fast becoming the
forerunner for the vision. The Internet is used in almost all aspects of life. As for the
communications sector, according to Global Mobile Subscriber Database December
2002 report, there are 8,814,700 mobile subscribers in Malaysia with an Annual
Growth of 16.6%. Withthe adoption of 3G-communication technology in the coming
years, compelling high speed services, reaching up to 2 Mb/s together with improved
security features would soon be possible.
Through these years in the mobile industry, the health sector has always been
neglected. Reason being, the technology could not support the application and it is
not so much of a revenue generating business compared to mobile games or sports
news. With globalization where the society is always on the move across borders,
together with degrading environment conditions and the need for time, instant health
services are becoming crucial. Looking into these conditions of mobile adoption and
health status, the author intends to develop a solution for a mobile telemedicine
application. Kevin Hung (2003) defines telemedicine as the utilization of
telecommunication technology for medical diagnosis, treatment and patient care.
Thus, the main aim of this project was to develop an application that could be used
for medical purposes. This project integrates the latest mobile telecommunication
technologies together with medical services with the idea of providing a highly
secured personalize medical system and database query as mobile handsets are
becoming a necessity to individuals. This would make updating and retrieving
medical health records hassle free, anytime and anywhere. This project has also laid
the groundwork for future expansion by incorporating the basic audio and video
streaming features.
This report accounts for all the concepts, design works and results of the mobile
telemedicine application that has been developed successfully
ICT Governance: Towards Federalized Structure and Solution
The ICT (Information and Communication Technology) Governance means actively identifying the service needs of the Government and her customers and to focus on planning and delivering these services to meet availability, performance, and security requirements. It also aims at managing service level agreements to meet agreed-upon security, quality and cost targets. Successful operation of an ICT unit of the government would require it to be fully integrated with the complete lifecycle of Government’s processes, improving service quality and Government agility. The paper identifies appropriate international standards for ICT Governance, and ICT Management around which solutions for ICT governance should be built.ict; governance; management; service delivery
Information Outlook, February 2007
Volume 11, Issue 2https://scholarworks.sjsu.edu/sla_io_2007/1001/thumbnail.jp
Information Outlook, February 2007
Volume 11, Issue 2https://scholarworks.sjsu.edu/sla_io_2007/1001/thumbnail.jp
Information Interface - Volume 35, Issue 1 - January/February 2007
News and information about Himmelfarb Health Sciences Library of interest to users
- …