IT System Management: A Service Provider Perspective

ITNOW ◽  
2021 ◽  
Vol 63 (3) ◽  
pp. 64-65
Author(s):  
Naveen Madhavan

Abstract The adoption of digitisation has transformed organisations to become entirely reliant on information systems to function, writes Naveen Madhavan PhD MBCS, Senior Product Specialist (pathology) at Digital Health and Care Wales.

2020 ◽  
Vol 26 (2) ◽  
pp. 149-154
Author(s):  
I Made Sudana ◽  
Syaad Patmanthara ◽  
Dhega Febiharsa ◽  
Benti Gandisa

Social distancing policy is applied during the Covid-19 virus pandemic including in Batik Professional Certification Institution in Indonesia. The management should provide services for the participants without meeting them directly. This study aims to reveal the management of Batik competence tests during the Covid-19 virus pandemic. The observation focused on the performance of the administrative staff, assessors, and management staff of the Batik Professional Certification Institutions (PCI). This is a qualitative study. The data were collected through questionnaires distributed to the participants, assessors, and administrators. The research concerns on the role and impact of the use of information system management in the interaction between prospective assessment, participants, assessors, and management of PCI in the professional certification competency test (PCCT). The findings showed that the use of information systems to manage vocational assessment has been effective to inform the assessment schedule to the assessor and participant, bridging the assessment reports, and reminding license expiration to management, so the management has an efficient way to manage the information with this system automation.


2022 ◽  
pp. 205-224
Author(s):  
Dhiviya Ram

One of the most unique forms of contracting is apparent in cloud computing. Cloud computing, unlike other conventional methods, has adopted a different approach in the formation of binding contract that will be used for the governance of the cloud. This method is namely the clickwrap agreement. Click wrap agreement follows a take it or leave it basis in which the end users are provided with limited to no option in terms of having a say on the contract that binds them during the use of cloud services. The terms found in the contract are often cloud service provider friendly and will be less favourable to the end user. In this article, the authors examine the terms that are often found in the cloud computing agreement as well as study the benefit that is entailed in adopting this contracting method. This chapter has undertaken a qualitative study that comprises interviews of cloud service providers in Malaysia. Hence, this study is a novel approach that also provides insight in terms of the cloud service provider perspective regarding the click wrap agreement.


Author(s):  
Pekka Ruotsalainen ◽  
Bernd Blobel

Digital health information systems (DHIS) are increasingly members of ecosystems, collecting, using and sharing a huge amount of personal health information (PHI), frequently without control and authorization through the data subject. From the data subject’s perspective, there is frequently no guarantee and therefore no trust that PHI is processed ethically in Digital Health Ecosystems. This results in new ethical, privacy and trust challenges to be solved. The authors’ objective is to find a combination of ethical principles, privacy and trust models, together enabling design, implementation of DHIS acting ethically, being trustworthy, and supporting the user’s privacy needs. Research published in journals, conference proceedings, and standards documents is analyzed from the viewpoint of ethics, privacy and trust. In that context, systems theory and systems engineering approaches together with heuristic analysis are deployed. The ethical model proposed is a combination of consequentialism, professional medical ethics and utilitarianism. Privacy enforcement can be facilitated by defining it as health information specific contextual intellectual property right, where a service user can express their own privacy needs using computer-understandable policies. Thereby, privacy as a dynamic, indeterminate concept, and computational trust, deploys linguistic values and fuzzy mathematics. The proposed solution, combining ethical principles, privacy as intellectual property and computational trust models, shows a new way to achieve ethically acceptable, trustworthy and privacy-enabling DHIS and Digital Health Ecosystems.


2020 ◽  
Vol 21 (1) ◽  
pp. 142-166
Author(s):  
Mirkhon Nurullaev ◽  
RAKHMATILLO DJURAEVICH ALOEV

The article provides a brief description of the cryptography service provider software developed by the authors of this article, which is designed to create encryption keys, create private and public keys of electronic digital signature, create and confirm authenticity of digital signatures, hashing, encrypting, and simulating data using the algorithms described in the State Standards of Uzbekistan. It can be used in telecommunications networks, public information systems, and government corporate information systems by embedding into applications that store, process, and transmit information that does not contain information related to state secrets, as well as in the exchange of information, and ensuring the legal significance of electronic documents. The cryptography service provider includes the following functional components: a dynamically loadable library that implements a biophysical random number sensor; a dynamic library that implements cryptographic algorithms in accordance with the State Standards of Uzbekistan; a module supporting work with external devices; an installation module that provides the installation of a cryptography service provider in the appropriate environment of operation (environment). ABSTRAK: Artikel ini memberikan penerangan ringkas tentang perisian penyedia perkhidmatan kriptografi yang dibangunkan oleh pengarang artikel ini, yang direka untuk membuat kunci penyulitan, kunci persendirian dan awam tandatangan digital elektronik, membuat dan mengesahkan kesahihan tandatangan digital, hashing, penyulitan dan simulasi data menggunakan algoritma yang dinyatakan dalam Standard Negeri Uzbekistan. Ia boleh digunakan dalam rangkaian telekomunikasi, sistem maklumat awam, sistem maklumat korporat kerajaan dengan memasukkan aplikasi aplikasi yang menyimpan, memproses dan menghantar maklumat yang tidak mengandungi maklumat yang berkaitan dengan rahsia negara, serta pertukaran maklumat dan memastikan undang-undang kepentingan dokumen elektronik. Penyedia perkhidmatan kriptografi termasuk komponen berfungsi sebagai berikut: perpustakaan dinamik yang boleh dimuatkan yang melaksanakan sensor nombor rawak biofisika; perpustakaan dinamik yang melaksanakan algoritma kriptografi mengikut Standard Negeri Uzbekistan; modul menyokong kerja dengan peranti luaran; modul pemasangan yang menyediakan pemasangan penyedia perkhidmatan kriptografi dalam persekitaran operasi yang sesuai (persekitaran).


2018 ◽  
Author(s):  
Afua Adjekum ◽  
Alessandro Blasimme ◽  
Effy Vayena

BACKGROUND Information and communication technologies have long become prominent components of health systems. Rapid advances in digital technologies and data science over the last few years are predicted to have a vast impact on health care services, configuring a paradigm shift into what is now commonly referred to as digital health. Forecasted to curb rising health costs as well as to improve health system efficiency and safety, digital health success heavily relies on trust from professional end users, administrators, and patients. Yet, what counts as the building blocks of trust in digital health systems has so far remained underexplored. OBJECTIVE The objective of this study was to analyze what relevant stakeholders consider as enablers and impediments of trust in digital health. METHODS We performed a scoping review to map out trust in digital health. To identify relevant digital health studies, we searched 5 electronic databases. Using keywords and Medical Subject Headings, we targeted all relevant studies and set no boundaries for publication year to allow a broad range of studies to be identified. The studies were screened by 2 reviewers after which a predefined data extraction strategy was employed and relevant themes documented. RESULTS Overall, 278 qualitative, quantitative, mixed-methods, and intervention studies in English, published between 1998 and 2017 and conducted in 40 countries were included in this review. Patients and health care professionals were the two most prominent stakeholders of trust in digital health; a third—health administrators—was substantially less prominent. Our analysis identified cross-cutting personal, institutional, and technological elements of trust that broadly cluster into 16 enablers (altruism, fair data access, ease of use, self-efficacy, sociodemographic factors, recommendation by other users, usefulness, customizable design features, interoperability, privacy, initial face-to-face contact, guidelines for standardized use, stakeholder engagement, improved communication, decreased workloads, and service provider reputation) and 10 impediments (excessive costs, limited accessibility, sociodemographic factors, fear of data exploitation, insufficient training, defective technology, poor information quality, inadequate publicity, time-consuming, and service provider reputation) to trust in digital health. CONCLUSIONS Trust in digital health technologies and services depends on the interplay of a complex set of enablers and impediments. This study is a contribution to ongoing efforts to understand what determines trust in digital health according to different stakeholders. Therefore, it offers valuable points of reference for the implementation of innovative digital health services. Building on insights from this study, actionable metrics can be developed to assess the trustworthiness of digital technologies in health care.


Sign in / Sign up

Export Citation Format

Share Document