Search results for "Information System"

showing 10 items of 2404 documents

Spatial distribution of brucellosis in sheep and goats in Sicily from 2001 to 2005

2007

Spatial analysis is making an increasingly important contribution to surveillance measures due to its ability to enable immediate visualization of information on the phenomenon studied. The authors describe the spatial distribution of prevalence and incidence of brucellosis in small ruminants in Sicily between 2001 and 2005. the study was conducted by integrating geografic information system (GIS)tecnology (MapInfo Professional 7.0) with SaTscan software to the perform an epidemiological analysis of the municipalities and to locate problem areas. A comparison between the thematic maps produced for brucellosis in small ruminants on the basis of prevalence and incidence data for each individu…

BrucellyosisGeografic information systemIncidencePrevalence Sicily Small ruminant Spatial anlysis
researchProduct

Burrows–Wheeler transform and Sturmian words

2003

Burrows–Wheeler transformSignal ProcessingFormal languageSturmian wordArithmeticWord (computer architecture)Computer Science ApplicationsInformation SystemsTheoretical Computer ScienceMathematicsInformation Processing Letters
researchProduct

Information Systems and Business Strategy

2003

The main purpose of this chapter is to deep into the importance attached to the Information Systems for the proper formulation of the corporate strategy. After introducing the basis of the strategic planning tradition model, which suggests the subordination of the Information Systems (IS) to the Business Strategy, we propose a new model that views the IS as an strategic instrument suited for the strategy formulation stage, rather than operational tools for the strategy control phase. Success in the application of this model we call “Concurrent Business/IS Strategic Planning Model” will closely depend on the consistency, coherence and soundness of the IS, both internal and external. In order…

Business Process Model and NotationKnowledge managementProcess managementArtifact-centric business process modelBusiness rulebusiness.industryBusiness analysisBusiness system planningInformation systemStrategic information systemBusinessBusiness process modeling
researchProduct

From Organization Business Model to Information System: One Approach and Lessons Learned

2011

The system ISTechnology and lessons learned of its use in the business modeling and development of information systems are analyzed in the paper. The system consists of the meta-model and applications. The meta-model enables to define a platform independent business model of the organization. The applications provide the definition and interpretation of the business model. Interpretation of the business model provides functionality of the information system in the selected platform. The lessons learned confirm that the development and maintenance cost of information systems can be significantly reduced by use of the ISTechnology.

Business process discoveryBusiness Process Model and NotationEngineeringKnowledge managementProcess managementArtifact-centric business process modelbusiness.industryBusiness ruleBusiness architectureStrategic information systemBusiness process modelingbusinessBusiness domain
researchProduct

BPM@KMU – Designing e-Learning for the Introduction of BPM in Small- and Medium-Sized Enterprises

2011

Business Process Management (BPM) becomes more and more relevant also for small- and medium-sized companies (SME’s). Today’s strategies and approaches for the implementation of BPM rely on methods and tools mainly developed by and focused on large enterprises but less on the needs of small- and mid-sized organisations. With the BPM@KMU project the Institute of Information Systems of a Bavarian university conducts together with the Virtual University of Bavaria (VHB) and a set of SMEs a project which aims on an efficient implementation of BPM in such organisations. Considering e-Learning as an enabler or tool which matches existing barriers for the implementation of Business Process Manageme…

Business process managementProcess managementStudy reportbusiness.industryComputer scienceE-learning (theory)EnablingInformation systemCyberneticsSet (psychology)businessMaturity (finance)
researchProduct

Information Systems Students’ Impressions on Learning Modeling Enterprise Architectures

2020

This Full Research Paper presents enterprise architecture (EA) modeling tools utilized in an educational context. EA is a well-known and a commonly used approach for organizational development aiming to improve the alignment of business operations and information technology. This high level design of information technology (IT) driven business operations lays the foundations on lower level technical activities such as the design and implementation of application programs and features, system boundary interfaces, database distribution and data pipes, and system recovery. Organizations’ architectures are made visible by creating EA artefacts, such as business process diagrams, data models and…

Business processComputer scienceEnterprise architecture02 engineering and technologytietotekniikkaData modelingHigh-level designcomputinginformation systemUnified Modeling LanguageOrganization development0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation systemCompetence (human resources)computer.programming_languagetietojärjestelmäteducationbusiness.industry05 social sciencesCore competencyInformation technology020207 software engineeringmodelingBusiness operationsyrityksetEngineering managementkoulutusliiketoimintaenterprise architecturebusinesscomputertietomallit050203 business & management
researchProduct

ERP and Organizational Misfits: An ERP Customization Journey

2016

Abstract Enterprise resource planning (ERP) projects are complex and resource demanding. Some ERP projects fail due to what is called ‘misfit’ between the adopting organization's business requirements and the ERP's functionalities. Existing literature has studied how ERP systems match to different organizations and have argued that there always exists a gap between the business rules embedded in the system, and the practices and processes that exist in organizations. Thus, tailoring might be an important procedure during ERP implementations, in which the ERP customization takes place in order to ensure the compliance with the organizations’ critical business processes and requirements. Via …

Business requirementsKnowledge managementTailoringBusiness ruleBusiness processComputer sciencebusiness.industry05 social sciences02 engineering and technologyFitERP SystemsPersonalizationResource (project management)Order (exchange)020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringGeneral Earth and Planetary SciencesMisfitbusinessImplementationEnterprise resource planning050203 business & managementCustomizationGeneral Environmental ScienceProcedia Computer Science
researchProduct

The diffusion and influence of theoretical models of information behaviour : the case of Savolainen's ELIS model

2020

PurposeTo ascertain the diffusion and influence of Savolainen's ELIS model and its use as a theoretical and/or methodological basis for research.Design/methodology/approachA context citation analysis was made of the work where this researcher published his model. Analysis covered the year of publication, the type of work and the subject matter of the citing documents concerned. In-context citations were analysed for their frequency in each citing text, style, location and content cited.FindingsThe ELIS model received 18.5 cites/year. 20.2 per cent of them corresponded to papers published in journals in other areas, mainly computer science. The average of cites per paper was 1.8; 64.5 percen…

CITES05 social sciencesTheoretical modelsContext (language use)Ciències de la informacióLibrary and Information Sciences050905 science studiesPopularityStyle (sociolinguistics)InvestigacióCitation analysisInformació Teoria de la0509 other social sciencesSocial scienceParagraph050904 information & library sciencesSentenceInformation Systems
researchProduct

Managing Multi-center Flow Cytometry Data for Immune Monitoring.

2014

With the recent results of promising cancer vaccines and immunotherapy 1 – 5 , immune monitoring has become increasingly relevant for measuring treatment-induced effects on T cells, and an essential tool for shedding light on the mechanisms responsible for a successful treatment. Flow cytometry is the canonical multi-parameter assay for the fine characterization of single cells in solution, and is ubiquitously used in pre-clinical tumor immunology and in cancer immunotherapy trials. Current state-of-the-art polychromatic flow cytometry involves multi-step, multi-reagent assays followed by sample acquisition on sophisticated instruments capable of capturing up to 20 parameters per cell at a…

Cancer ResearchComputer scienceData managementREST APIdata provenancecomputer.software_genrelcsh:RC254-282automated analysisData modelinglaboratory informatics03 medical and health sciences0302 clinical medicineLaboratory informaticsreproducible analysisFlow cytometry030304 developmental biologyOriginal Research0303 health sciencesApplication programming interfacebusiness.industrymetadatalcsh:Neoplasms. Tumors. Oncology. Including cancer and carcinogensData scienceAutomationMetadataManagement information systemsOncologyData miningdata managementbusinesscomputer030215 immunologyCommunication channelCancer informatics
researchProduct

Credit card incidents and control systems

2012

Abstract Credit and debit cards have spread and skyrocketed all around the world to become the most popular means of payments in many countries. Despite their enormous popularity, cards are not free of risk. Technology development and e-commerce have exponentially increased internal credit card incidents. This paper identifies and quantifies the different types of credit card fraud and puts into question the effectiveness of the role assigned to cardholders in its detection.

Card security codeComputer Networks and Communicationsmedia_common.quotation_subjectCredit card fraudLibrary and Information SciencesPaymentComputer securitycomputer.software_genreATM cardCredit cardBusinesscomputerMerchant servicesChargebackCredit card interestInformation Systemsmedia_commonInternational Journal of Information Management
researchProduct