On the relation between information technology and socio-economic systems

The developments over the last decade in digital switching data networks and intelligent signal processing suggest an almost unbounded future in terms of opportunity. But who needs it? Information technology appears to act upon our socio-economic system in a manner that is quite different from the way other technologies affected earlier socio-economic systems. In those earlier instances a reasonable balance was maintained between the intensive, or extrapolative interactions and the extensive or transformative ones. Today, we can establish a non-trivial hypothesis that states that the extensive or transformative interactions between information technology and our socio-economic system are being somehow constrained and hence denying us considerable economic and social benefits. The hypothesis stands up under the Socratic test, in that the conclusions deduced from the hypothesis match what we see in the real world. If one takes the hypothesis as given, is there any real potential that is being constrained, what is the value of that potential, and what might be the nature of the constraint? Research suggests that the potential exists, that it may be very significant, and that the constraint is of a fundamental linguistic nature. Some strategies are set forth to avoid or move the constraint. If the hypothesis is valid and the important benefits of information technology are inhibited from flowering, of what significance is all our fine technology? The prediction is made that unless we address that fundamental constraint, the future for information technology is at the best rather bleak and intensely competitive, for our capacity to produce sophisticated communications will outstrip our needs.

2021 ◽  
Author(s):  
Edward Yourdon

A t the beginning of this paper, the decentralized world (DW) and decentralized world economy (DeWe) were defined. And the blockchain industry was pointed out to be at the initial stage of the decentralized world parallel to the real world. Then a set of systematicsolutions, named Electronical Material Information Technology (EMIT), was proposed, after which the development direction and path of the decentralized world economy was put forward, from its limitations, by arguing how to provide sufficient and necessary basic conditions for the decentralized world development. In the end, the EMIT was proved to be an effective reference for building the decentralized world from the basic level to the application level and enabling its sustainable development.


Author(s):  
Xiaotong Li

Many information resource managers have learned to be proactive in today’s highly competitive business environment. However, limited financial resources and many uncertainties require them to maximize their shareholders’ equity while controlling the risks incurred at an acceptable level. As the unprecedented development in information technology continuously produces great opportunities that are usually associated with significant uncertainties, technology adoption and planning become more and more crucial to companies in the information era. In this study, we attempt to evaluate IT investment opportunities from a new perspective, namely, the real options theory. Its advantage over other capital budgeting methods like static discounted cash flow analysis has been widely recognized in analyzing the strategic investment decision under uncertainties (Amram & Kulatilaka, 1999; Luehrman, 1998a, 1998b). Smith and McCardle (1998, 1999) further show that option pricing approach can be integrated into standard decision analysis framework to get the best of the both worlds. In fact, some previous IS researches have recognized the fact that many IT investment projects in the uncertain world possess some option-like characteristics (Clemsons, 1991; Dos Santos, 1991; Kumar, 1996). Recently, Benaroth and Kauffman (1999) and Taudes, Feurstein and Mild (2000) have applied the real options theory to real-world business cases and evaluated this approach’s merits as a tool for IT investment planning. As all real options models inevitably depend on some specific assumptions, their appropriateness should be scrutinized under different scenarios. This study aims to provide a framework that will help IS researchers to better understand the real options models and to apply them more rigorously in IT investment evaluation. As the technology changes, the basic economic principles underlying the real options theory do not change. We do need to integrate the IT dimension into the real options based investment decision-making process. Using electronic brokerage’s investment decision in wireless technology as a real-world example, we show the importance of adopting appropriate real options models in IT investment planning. By specifically focusing on the uncertainties caused by IT innovation and competition, our study also gives some intriguing results about the dynamics between IT adoption and the technology standard setting process.


Author(s):  
Dr. V. Tulasi Das ◽  
Mrs. R.V.Naga Sailaja

The ability of entrepreneurs to produce new products is fundamental, because the organisational environment changes rapidly. Changes in socio-economic systems, changes in the expectations and needs and desires of customers, are challenges faced by organisations through new products or services as well. Innovations created by companies are the key to competitive advantage that determines the success of an organisation (Kuratko, 2015; Urbancova, 2012). Talent development is the driver of innovation. Therefore, current research focuses on to study the employee perception talent development impact on innovation. KEY WORDS: Strategy, Structure, Climate, Culture, Socio-Economic System.


2014 ◽  
Vol 1 (2) ◽  
pp. 236
Author(s):  
Kulakov ◽  
Smirnov ◽  
Lipatov ◽  
Latipov

2021 ◽  
Vol 9 (1) ◽  
pp. 30-41
Author(s):  
Rerin Maulinda

A work has a distinctive existence by showing the differences of human fajta, namely the social and economic system. In addition, a work containing cultural undue will be closely related to the customs of certain norms and beliefs. This can be seen in the novel titled KKN In Dancer Village which contains mystical and mythical values using the study of literary anthropology nyoman Kutha Ratna theory. One form of the author's expression is his imaginative thinking and intuition about the points of mystical values and myths that exist in the novel and what it has to do with the real world. Literary anthropology is used to analyze these oin-points. The method used in this research is qualitative descriptive method. Data collection techniques using note-reading techniques and library study techniques. The results of literary anthropology research with mimesis approach show as follows. First, some of the pieces of the story experienced by the characters are directed at mystical things that then give rise to myths that are finally believed by the characters in the story. Second, the mystical values and myths that occur in each piece of the story sometimes occur and appear in the real world. That means it does happen in the real world, not just fiction. Abstrak Sebuah karya memiliki eksistensi yang khas dengan memperlihatkan perbedaan dari fakta manusia, yaitu sistem sosial dan ekonomi. Selain itu, sebuah karya yang mengandung unsur kebudayaan akan berkaitan erat dengan adat istiadat norma-norma dan kepercayaan tertentu. Hal ini terlihat dalam novel berjudul KKN Di Desa Penari yang memuat nilai mistis dan mitos dengan menggunakan kajian antropologi sastra teori Nyoman Kutha Ratna. Salah satu wujud ekspresi pengarang ialah pemikiran dan intuisi imajinatifnya mengenai poin-poin nilai mistis dan mitos yang ada dalam novel dan apa saja hubungannya dengan dunia nyata. Antropologi sastra digunakan untuk menganalisis poin-poin tersebut. Metode yang digunakan dalam penelitian ini adalah metode deskriptif kualitatif. Teknik pengumpulan data menggunakan teknik baca catat dan teknik studi pustaka. Hasil penelitian antropologi sastra dengan pendekatan mimesis menunjukkan sebagai berikut. Pertama, beberapa penggalan cerita yang dialami oleh para tokoh mrngarah pada hal mistis yang kemudian menimbulkan mitos yang akhirnya diyakini oleh para tokoh dalam cerita. Kedua, nilai mistis dan mitos yang terjadi dalam setiap penggalan cerita terkadang terjadi dan muncul pada dunia nyata. Itu artinya hal tersebut memang terjadi pula dalam dunia nyata bukan hanya cerita fiksi saja. Kata Kunci : Antropologi Sastra, Nilai Mistis, Dan Mitos


Author(s):  
Shreyasi Pranjal

Work-life balance refl ects an individual’s orientation across career roles and non-carrier life roles as an incompatible inter-role phenomenon. In the transition to an information-based global economy, the lines between work and home are blurring as technology reshapes the work place and the nature of home life evolves. Information technology (IT) has become a vital and integral part of every individual’s life. From a teenager who loves technologically advanced cum latest gadgets and an adult who is addicted of using cloud-computing technology as for data’s storing. The reasons for the omnipresent use of computer technology in the real world can best be determined by looking at how it is being used across the real world. Role of IT in balancing work-life is all about delivering ease, effi ciency and maintaining individual’s healthy environment. There are numerous roles of IT which makes us integrally prominent, smart and active, and makes an effective aura in between work-life. Role of IT in work-life balance has been an electrifying current investigation subject from the recent years; the purpose of the research role of IT in work-life balance shows the how IT makes individuals life convenient, promising, stressless, and relatively safe.


2021 ◽  
Vol 5 (3) ◽  
pp. 1179
Author(s):  
Fikry Ali Sya’ Dani ◽  
M Iwan Wahyuddin ◽  
Winarsih Winarsih

Information technology today, is very developed and easy to find. Especially in information on Bogor tourist attractions such as the Bogor Palace, Tugu Kujang, and Pakansari Stadium. However, the data information held is not completely valid. Because many tourists get data that is not suitable, due to the lack of information obtained. Therefore, the researchers tried to make an android-based "Tourism Object in Bogor" application using Augmented Reality (AR) technology and the Lucas Kanade Algorithm, as well as Marker Based Tracking efforts to make it easier to get the information desired by tourism. Bogor is one of the cities in West Java Province that attracts many tourists, especially domestic tourists. However, there are still many tourist attractions in Bogor that are still many tourist attractions that have not been visited and are still not widely known by tourists. Until now, researchers have tried to make an android-based "Tourism Object in Bogor" application so that tourists know the shape of objects and information such as the Bogor Palace, Tugu Kujang, and Pakansari Stadium. Using Augmented Reality (AR) technology, the technology itself has photos, sounds, and 3d objects that can bring virtual 3d objects into the real world. The "Tourism Object in Bogor" application uses Android Studio, Unity, Sketchup, Vuforia, and Visual Studio. In order to make it easier for tourists to identify data on tourist attractions they want to visit. The application "Tourism Objects in Bogor" serves to share data information for local and foreign tourists, because this is an opportunity for the Bogor Regional Government to improve services and facilities in Bogor, so that tourists feel safe arriving and visiting Bogor.


Author(s):  
Khalid Mansour ◽  
Khaled Mahmoud

Textual passwords are still widely used as an authentication mechanism. This paper addresses the problem of textual password hardening and proposes a mechanism to make textual passwords harder to be used by unauthorized persons. The mechanismintroduces time gaps between keystrokes (latency times) that would add a second protection line to the password. Latency times are converted into discrete representation (symbols) where the sequence of these symbols is added to the password. For accessing system, an authorized person needs to type his/her password with a certain rhythm. This rhythm is recorded at the sign-up time.This work is an extension to a previous work that elaborates more on the local approach of discretizing time gaps between every two consecutive keystrokes. In addition, more experimental settings and results are provided and analyzed. The local approach considers the keying pattern of each user to discretize latency times. The average, median and min-max are tested thoroughly.Two experimental settings are considered here: laboratory and real-world. The lab setting includes students studying information technology while the other group are not. On the other hand, information technology professional individuals participated in the real-world experiment. The results recommend using the local threshold approach over the global one. In addition, the average method performs better than the other methods. Finally, the experimental results of the real-world setting support using the proposed password hardening mechanism.


Sign in / Sign up

Export Citation Format

Share Document