User requirements on the future laboratory information systems

1996 ◽  
Vol 50 (2) ◽  
pp. 87-93 ◽  
Author(s):  
J. Brender ◽  
P. McNair
2011 ◽  
Vol 4 (2) ◽  
pp. 24-28
Author(s):  
Tanner L. Bartholow ◽  
Anil V. Parwani ◽  
Michael J. Becich

1995 ◽  
Vol 34 (03) ◽  
pp. 289-296 ◽  
Author(s):  
B. H. Sielaff ◽  
D. P. Connelly ◽  
K. E. Willard

Abstract:The development of an innovative clinical decision-support project such as the University of Minnesota’s Clinical Workstation initiative mandates the use of modern client-server network architectures. Preexisting conventional laboratory information systems (LIS) cannot be quickly replaced with client-server equivalents because of the cost and relative unavailability of such systems. Thus, embedding strategies that effectively integrate legacy information systems are needed. Our strategy led to the adoption of a multi-layered connection architecture that provides a data feed from our existing LIS to a new network-based relational database management system. By careful design, we maximize the use of open standards in our layered connection structure to provide data, requisition, or event messaging in several formats. Each layer is optimized to provide needed services to existing hospital clients and is well positioned to support future hospital network clients.


2012 ◽  
Vol 27 (2) ◽  
pp. 96-99 ◽  
Author(s):  
Salvatore T. March ◽  
Fred Niederman

We must look ahead at today's radical changes in technology, not just as forecasters but as actors charged with designing and bringing about a sustainable and acceptable world. New knowledge gives us power for change: for good or ill, for knowledge is neutral. The problems we face go well beyond technology: problems of living in harmony with nature, and most important, living in harmony with each other. Information technology, so closely tied to the properties of the human mind, can give us, if we ask the right questions, the special insights we need to advance these goals. Herbert A. Simon (2000)


2017 ◽  
Vol 25 (2) ◽  
pp. 372-388 ◽  
Author(s):  
Morten Hertzum ◽  
Maria Ie Manikas ◽  
Arnvør á Torkilsheyggi

Author(s):  
Olha Husak

The article aims at defining the competence-based approach to training the future professionals in communication security and development of the advanced fields of their high-qualitative training. The main results of the study are represented in the list of specialists’ professional competencies in the field of communication security, which includes: capability to identify communication threats; peculiarities of civilized, manipulative and barbaric influences at the state, corporate and personal levels; categories of manipulators, types of manipulative traps, existing manipulative techniques; capability for using effective means to neutralize or counteract to manipulative influences; skills required for organization, planning and implementation of one’s actions in terms of information attacks; acquisition of communicative, organizational and technical methods of information protection in the existing information systems and networks.


2018 ◽  
Vol 6 (2) ◽  
pp. 112-128
Author(s):  
Elloit Cardozo

Foucault, in his seminal work Discipline and Punish: The Birth of the Prison (1975) discusses Bentham’s architectural design of the Panopticon as a means to exercise power and enforce discipline. He extends this metaphor to speak of Panopticism as a social phenomenon used to discipline work forces through covert strategies. Shoshana Zuboff, in In the Age of the Smart Machine: The Future of Work and Power (1988) contextualizes Foucault’s discussion in an age where the work culture uses Information Systems extensively for surveillance. She calls such a structure an “Information Panopticon”.  This paper aims to bring out the various nuances of the Information Panopticon in Cameron and Colin Cairnes’ film Scare Campaign (2016) and how it facilitates the exercise of power. The paper firstly looks at Zuboff’s Information Panopticon in light of Foucault’s discussion before evaluating the Information Panopticon created in the film and its hierarchal structure. Next it endeavours to demonstrate how the Information Panopticon in the film is not solely reliant on literal visibility. It wraps up with a discussion on the relation between spatiality, visibility and power in the film’s Information Panopticon.


Sign in / Sign up

Export Citation Format

Share Document