Information Management Strategies in Manual Assembly

Author(s):  
Sven Hinrichsen ◽  
Benjamin Adrian ◽  
Manfred Bornewasser
2021 ◽  
Vol 12 ◽  
Author(s):  
Hyunjin Kang ◽  
Wonsun Shin

This study examines how three different motivations for using an SNS (i.e., self-expression, belonging, and memory archiving) influence multi-facets of privacy boundary management on the platform mediated by self-extension to it. In recognition of the fact that information management on SNSs often goes beyond the “disclosure-withdrawal” dichotomy, the study investigates the relationships between the three SNS motives and privacy boundary management strategies (i.e., collective boundary and boundary turbulence management). An online survey with Facebook users (N = 305) finds that the three Facebook motivations are positively correlated to users’ self-extension to Facebook. The motivations for using Facebook are positively associated with the management of different layers of privacy boundaries (i.e., basic, sensitive, and highly sensitive), when Facebook self-extension is mediated. In addition, the three motives have indirect associations with potential boundary turbulence management mediated by Facebook self-extension. Extending the classic idea that privacy is deeply rooted in the self, the study demonstrates that perceiving an SNS as part of the self-system constitutes a significant underlying psychological factor that explains the linkage between motives for using SNSs and privacy management.


2019 ◽  
Vol 37 (4) ◽  
pp. 244-249
Author(s):  
Akshay Rajaram ◽  
Trevor Morey ◽  
Sonam Shah ◽  
Naheed Dosani ◽  
Muhammad Mamdani

Background: Considerable gains are being made in data-driven efforts to advance quality improvement in health care. However, organizations providing hospice-oriented palliative care for structurally vulnerable persons with terminal illnesses may not have the enabling data infrastructure or framework to derive such benefits. Methods: We conducted a pilot cross-sectional qualitative study involving a convenience sample of hospice organizations across North America providing palliative care services for structurally vulnerable patients. Through semistructured interviews, we surveyed organizations on the types of data collected, the information systems used, and the challenges they faced. Results: We contacted 13 organizations across North America and interviewed 9. All organizations served structurally vulnerable populations, including the homeless and vulnerably housed, socially isolated, and HIV-positive patients. Common examples of collected data included the number of referrals, the number of admissions, length of stay, and diagnosis. More than half of the organizations (n = 5) used an electronic medical record, although none of the record systems were specifically designed for palliative care. All (n = 9) the organizations used the built-in reporting capacity of their information management systems and more than half (n = 6) augmented this capacity with chart reviews. Discussion: A number of themes emerged from our discussions. Present data collection is heterogeneous, and storage of these data is highly fragmented within and across organizations. Funding appeared to be a key enabler of more robust data collection and use. Future work should address these gaps and examine opportunities for innovative ways of analysis and reporting to improve care for structurally vulnerable populations.


2016 ◽  
Vol 39 (3) ◽  
pp. 602-621 ◽  
Author(s):  
Elizabeth Babskie ◽  
Aaron Metzger

The current study investigated associations among adolescents’ reports of harmfulness and family decision-making beliefs regarding potentially problematic cyber behaviors (e.g., talking to strangers online), cyber-specific information management strategies (disclosure, secrecy, concealment), and family rules regarding adolescents’ use of information and communication technology (ICT). The sample consisted of 159 adolescents aged 12 to 18 years ( M = 14.45, SD = 1.72, 59% female, 80% Caucasian). Youth were more likely to disclose their ICT behavior when they recognized the harm associated with cyber risks and viewed their family as less restrictive about ICT activities. Age differences indicated that older adolescents’ ICT beliefs were more strongly related to their information management strategies, whereas families’ ICT rules were more predictive of cyber disclosure for younger adolescents. Results demonstrate that both adolescents’ conceptualization of ICT risks and families’ ICT-specific rules contribute to adolescents’ choice of information management strategies regarding ICT behaviors.


2016 ◽  
Vol 72 (6) ◽  
pp. 1078-1113 ◽  
Author(s):  
Pauline Joseph

Purpose The purpose of this paper is to explore the leisure information behaviour of motor sport enthusiasts, examining: their information needs; their information seeking and sharing; what personal information they had; and their satisfaction with their information seeking and personal information management efforts. Design/methodology/approach This exploratory study examined participants’ information behaviour from a postpositivist and inductive research approach. An online survey was completed by 81 motor sport enthusiasts. The quantitative survey data were analysed using descriptive statistics, whilst the qualitative data were analysed using thematic coding. Findings The research findings highlighted that enthusiasts engaged in mixed serious leisure. They required information before, during and after race events, and sought this primarily from online sources, as well as from other individuals. Totally, 90 participants shared information about their interest in motor sport with family, friends and fellow enthusiasts, primarily via e-mails (69 per cent) and Facebook (49 per cent). They also gathered information about motor sport, including photographs and memorabilia. Participants were satisfied with their information management strategies for their personal collections. Research limitations/implications Participants were limited to motor sport enthusiasts in Australia, hence findings cannot be generalised more broadly. Practical implications Understandings of enthusiasts’ information behaviour provide information management professionals with insights to work with this user community. Originality/value This study fills a gap in the literature about leisure information behaviour of motor sport enthusiasts in Australia. It identifies and provides a typology of the 12 categories of information needed by enthusiasts. Provides a preliminary motor sport information behaviour model guided by the conceptual frameworks of the everyday life information seeking model; general models on information behaviour; and the information problem solving behaviour model.


2014 ◽  
Vol 18 (1) ◽  
Author(s):  
Lorna R. Kearns ◽  
Barbara A. Frey ◽  
Christinger Tomer ◽  
Susan Alman

The literature suggests that personal information management is a serious challenge for many computer users. Online faculty are especially challenged because of the large number of electronic files necessitated by teaching online. Those who have experience in this environment may offer valuable insights regarding information management challenges and practices. Faculty who teach online courses as part of the WISE (Web-based Information Science Education) Consortium responded to a survey that questioned the ways they manage email, computer desktop, Web-based information and learning management systems. The authors concluded that “filter failure” rather than information overload is the key issue in information management. The study concludes with a list of recommendations for faculty to manage their personal information.


2008 ◽  
pp. 2641-2649
Author(s):  
Katherine M. Hollis ◽  
David M. Hollis

This chapter provides an introductory overview of identity management as it relates to data networking and enterprise information management systems. It looks at the strategic value of identity management in corporate and government environments. It defines the terms, concepts, and technologies associated with identity management. This chapter is a capstone to other chapters that deal with the specific technologies (strong identification and authentication, PKI, encryption, LDAP, etc…). Federated identity management is a strategic concept that encapsulates and integrates these disparate technologies into a coordinated, comprehensive strategy to accomplish enterprise-wide goals. This chapter introduces some practical business case concepts to assists the reader in putting together their own identity management strategies using ROI and success criteria.


Sign in / Sign up

Export Citation Format

Share Document