scholarly journals Formalized Risk-Oriented Model of the Information Technology System

2020 ◽  
pp. 69-76
Author(s):  
Roman Anosov ◽  
◽  
Sergey Anosov ◽  
Igor Shakhalov ◽  
◽  
...  

Abstract. The aim of the study is to systematize the principles of building information technologies that are essential from the point of view of information risk assessment, and to form, on this basis, a model that provides the ability to analyze risk factors when building secure information systems. Methods: when developing the model, the methods of game theory and set theory were used. The result: the model is focused on taking into account the conflicting nature of interaction between information technologies and sources of threats to information security The information technology system is considered as an interconnected set of technologies of the warring parties, providing the processes of practical activity of one of them, which allows, on a unified methodological basis, to analyze the vulnerabilities of information technologies, scenarios for the implementation of threats, as well as to optimize technological solutions for information protection. The model is characterized by a high degree of generalization, since its main elements are abstract entities: a set of information technologies used by the parties; sets of information operations, implemented by technologies; information and control relationships on sets of technologies and operations. To use the model requires a preliminary development of the list and characteristics of these sets and relations in relation to specific information technologies

Author(s):  
Д. Ш. Цырендоржиева ◽  

The monograph reveals the main provisions of the theories of the information society from the point of view of the safe use of information technology. System- atic negative effects, the dangers, the threat of the use of information technology, highlighted the key areas of information security as a core component of national security. A system of social measures to ensure information security, laying the socio-philosophical foundations of the General scientific theory of information se- curity. The publication is intended for all those interested in philosophical issues.


Author(s):  
Bagas Hidayat Putra

The application of immigration information technology at the Immigration Checkpoint (TPI) is a very important matter to always be considered and developed in the very long term in the future, one of them is to focus on developing the autogate system. With some literacy regarding immigration information technology at TPI in several countries, it can result in several comparisons between the immigration information technology system in Indonesia with the immigration information technology system in several foreign countries. This can be used as study or learning material in seeing some of the shortcomings or gaps that the immigration technology information system in Indonesia has. The results of the study carried out with this qualitative research method have explained that the immigration information technology system in TPI Indonesia still has several gaps or shortcomings when compared to the existing systems in several other countries. So, it is very necessary to make several further studies or research related to the development of an immigration information technology system at TPI Indonesia that can adapt several existing systems in several countries.


Author(s):  
Henry Antonius Eka Widjaja

The purpose of this study is to analyze the company's business processes and make strategic planning and information technology system that is suitable for supporting the goals and vision of the company's mission. The research method is data collection in the form of interviews with the company management and staff, field observations, literature research related to strategic planning and information technology systems. The results of this study prove that the company has a weakness in the implementation of information systems which is not maximized , while the strength of the company has not been fully supported by the use of information technology . This shows that the need for strategic planning and information technology systems to support achievement of business strategy at the company over the next five years. Thus, this research produced a strategic plan in the form of application architecture, hardware architecture, network architecture, organizational development, implementation schedule and cost estimates. 


Author(s):  
Jeanne Gaakeer

With the German jurist-philosopher-author Juli Zeh chapter 13 asks the jurist to consider the effects of contemporary information technologies on the human. It discusses topics such as privacy, surveillance and control societies in relation to individual autonomy and free will. With Zeh’s novel The Method it shows the consequences of state ideology writ large and it asks the reader to consider in which ways humans are being nudged into complacency by modern technologies that provide all our modern conveniences. It shows that as a result of modern technologies human beings run the risk of being reduced to objects ready to be used for further ordering by others.


2015 ◽  
Vol 23 (1) ◽  
pp. 94-104 ◽  
Author(s):  
Elizabeth Kaziunas ◽  
David A Hanauer ◽  
Mark S Ackerman ◽  
Sung Won Choi

Abstract Background Patient-centered care has been shown to improve patient outcomes, satisfaction, and engagement. However, there is a paucity of research on patient-centered care in the inpatient setting, including an understanding of unmet informational needs that may be limiting patient engagement. Pediatric hematopoietic stem cell transplantation (HSCT) represents an ideal patient population for elucidating unmet informational needs, due to the procedure’s complexity and its requirement for caregiver involvement. Methods We conducted field observations and semi-structured interviews of pediatric HSCT caregivers and patients to identify informational challenges in the inpatient hospital setting. Data were analyzed using a thematic grounded theory approach. Results Three stages of the caregiving experience that could potentially be supported by a health information technology system, with the goal of enhancing patient/caregiver engagement, were identified: (1) navigating the health system and learning to communicate effectively with the healthcare team, (2) managing daily challenges of caregiving, and (3) transitioning from inpatient care to long-term outpatient management. Discussion We provide four practical recommendations to meet the informational needs of pediatric HSCT patients and caregivers: (1) provide patients/caregivers with real-time access to electronic health record data, (2) provide information about the clinical trials in which the patient is enrolled, (3) provide information about the patient’s care team, and (4) properly prepare patients and caregivers for hospital discharge. Conclusion Pediatric HSCT caregivers and patients have multiple informational needs that could be met with a health information technology system that integrates data from several sources, including electronic health records. Meeting these needs could reduce patients’ and caregivers’ anxiety surrounding the care process; reduce information asymmetry between caregivers/patients and providers; empower patients/caregivers to participate in the care process; and, ultimately, increase patient/caregiver engagement in the care process.


Sign in / Sign up

Export Citation Format

Share Document