Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (2)
- Databases and Information Systems (2)
- Physical Sciences and Mathematics (2)
- Archival Science (1)
- Business Administration, Management, and Operations (1)
-
- Cataloging and Metadata (1)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
- Data Storage Systems (1)
- Digital Communications and Networking (1)
- Engineering (1)
- Graphics and Human Computer Interfaces (1)
- Health Information Technology (1)
- Health and Medical Administration (1)
- Information Security (1)
- Library and Information Science (1)
- Management Sciences and Quantitative Methods (1)
- Medicine and Health Sciences (1)
- Social and Behavioral Sciences (1)
- Technology and Innovation (1)
- Institution
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Management Information Systems
Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr
Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr
Central Plains Network for Digital Asset Management
Presented from the perspective of someone responsible for creating the digital objects that will eventually be included in a digital preservation program, this poster session will identify common issues that make the management and preservation of digital objects more challenging. Digital preservation needs to be talked about within the digitization workflow, because it takes a lot of work to produce the best digital objects possible. We are often focused on the immediate use of the digital objects and less focused on their long-term use. Even with best practices in mind, there is often an immediate need (patron orders, for example) …
Empowerment Of The Few And Disempowerment Of The Many - Disempowerment In Thai ‘One Tambon One Product' Organizations (Otops), Thomas Diefenbach
Empowerment Of The Few And Disempowerment Of The Many - Disempowerment In Thai ‘One Tambon One Product' Organizations (Otops), Thomas Diefenbach
The South East Asian Journal of Management
Thai ‘One Tambon One Product’ organisations (OTOPs) have had considerable economic suc-cess since their initiation by the Thai government in 2001. However, in contrast to their ever-increasing economic relevance, OTOPs’ contributions to social development have been acknowl-edged and interrogated only very little. In particular the issue of empowerment, a key component of any social development whether within organisations, at community or even societal level, is strangely absent from any discourse about OTOPs. This article looks at how far the idea of em-powerment is realised within Thai OTOPs – or how far it is not realised. For this, a three-dimensional concept …
Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew
Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew
CCE Theses and Dissertations
As the bulk of medical health records shift from paper-based file systems to electronic formats, the promise of the transformation process called healthcare reform included adding efficiencies to medical practice workflows, lower costs, improved quality of care and most important, and the freeing of patient information from traditional propriety silos. With this incoming largess of protected health information data now viewable through online patient portals, patients can be empowered to become educated and active in their own health care decisions, but only if they have admission to their information. A digital divide currently exists in many medical practices where only …
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
CCE Theses and Dissertations
Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.
Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …