8,417 research outputs found

    Is There an App for That? Electronic Health Records (EHRs) and a New Environment of Conflict Prevention and Resolution

    Get PDF
    Katsh discusses the new problems that are a consequence of a new technological environment in healthcare, one that has an array of elements that makes the emergence of disputes likely. Novel uses of technology have already addressed both the problem and its source in other contexts, such as e-commerce, where large numbers of transactions have generated large numbers of disputes. If technology-supported healthcare is to improve the field of medicine, a similar effort at dispute prevention and resolution will be necessary

    Johnson City, Village of and Village Administrative Support Unit (2007)

    Get PDF

    Report of the Stanford Linked Data Workshop

    No full text
    The Stanford University Libraries and Academic Information Resources (SULAIR) with the Council on Library and Information Resources (CLIR) conducted at week-long workshop on the prospects for a large scale, multi-national, multi-institutional prototype of a Linked Data environment for discovery of and navigation among the rapidly, chaotically expanding array of academic information resources. As preparation for the workshop, CLIR sponsored a survey by Jerry Persons, Chief Information Architect emeritus of SULAIR that was published originally for workshop participants as background to the workshop and is now publicly available. The original intention of the workshop was to devise a plan for such a prototype. However, such was the diversity of knowledge, experience, and views of the potential of Linked Data approaches that the workshop participants turned to two more fundamental goals: building common understanding and enthusiasm on the one hand and identifying opportunities and challenges to be confronted in the preparation of the intended prototype and its operation on the other. In pursuit of those objectives, the workshop participants produced:1. a value statement addressing the question of why a Linked Data approach is worth prototyping;2. a manifesto for Linked Libraries (and Museums and Archives and …);3. an outline of the phases in a life cycle of Linked Data approaches;4. a prioritized list of known issues in generating, harvesting & using Linked Data;5. a workflow with notes for converting library bibliographic records and other academic metadata to URIs;6. examples of potential “killer apps” using Linked Data: and7. a list of next steps and potential projects.This report includes a summary of the workshop agenda, a chart showing the use of Linked Data in cultural heritage venues, and short biographies and statements from each of the participants

    Data Processing Analysis and Recommendations for Hall County Nebraska

    Get PDF
    This report presents an analysis with recommendations regarding the data processing needs of Hall County, Nebraska. It was undertaken pursuant to an agreement dated October, 1983 between the Center for Applied Urban Research of the University of Nebraska at Omaha and the Hall County Board of Supervisors

    A Study of School District Administrative Computer Functions

    Get PDF
    The purpose of this study was to identify information to assist school district administrators in the development of a systems approach to the automation of district-level management. Research data included initial and current computer system(s), level of training, implementation procedures, problems encountered, information sources, future plans for upgrading, and general recommendations. State education department personnel from Iowa, Minnesota, Nebraska, North Dakota, and South Dakota were contacted to identify seven school districts that used computers for administration in each of four student enrollment categories. The study was limited to districts which used IBM or Apple microcomputers and/or any brand of larger computer system. A questionnaire was sent to each district contact person identified. Some of the most important findings were: 1. With one exception, all districts with less than 1,499 students used only microcomputers or time-share systems. 2. Consultants from outside the district were not often used. These consultants primarily assisted with staff training, recommended hardware/software, helped identify district needs, and/or determined initial district computer functions. 3. The greatest number of physical office changes involved electrical, furniture, and telephone line improvements followed by data storage changes, air conditioner installation, and structural alterations. 4. Major start-up problems were software complexities, lack of training, staff resistance, and hardware malfunctions. 5. Major start-up recommendations involved importance of staff training, staff commitment, and good planning. 6. Apple was the most frequently used brand of microcomputer, but there was an increasing number of IBM microcomputers. Other popular equipment included Burroughs and IBM minicomputers and mainframe computers; Okidata, Epson, and Apple printers; Corvus hard disks for microcomputers; and Hayes micromodems. 7. The most popular software packages for the Apple computer were Appleworks, VisiCalc, and PFS File and for the IBM were Lotus 1-2-3 and Negotia Pak. 8. Respondents believed that microcomputers could manage files for approximately 1,500 students. This figure would vary with the types of data being processed and the types of peripherals used. The data were used to develop a computer systems profile for each of the four enrollment categories

    Architecture and Knowledge Modelling for Smart City

    Get PDF

    Trust Account Fraud and Effective Information Security Management

    Get PDF
    The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. We simultaneously carried out a survey to see if the trends identified in our case-studies could be backed up with broader quantitative data. We have also conducted in-depth interviews of five trust account regulators from the Law society of South Australia to know their view points on security threats on trust accounts. An overall finding highlights that law firms were not current with technology to combat computer crime, and inadequate access control was a major concern in safeguarding account data. Our conclusions revealed the urgent need for law firms to adopt security controls, implement information security policies and procedures and obtain cooperation from management to communicate these policies to staff
    • …
    corecore