Web Management and Usage

Author(s):  
Steve Clarke

This chapter seeks to apply learning from the fields of social theory and information systems to the specific context of the Internet. Key to this understanding is the extent to which the scope of information systems (IS) analysis is often seen to be problematic: IS “problems” are frequently “solved” by redefining organizational and human issues in technical terms, and developing the necessary technical solution. Studies on which this chapter are based have raised significant questions regarding such approaches, exposing many IS developments as not susceptible to a technical solution, but exhibiting complexities stemming from high levels of human activity. Arguably, such findings are of particular importance in Web development and management, depending as it does on the understanding and commitment of users who are often remote from and external to the organization. A clue to how such complex, human-centered issues may be dealt with is to be found in the scoping of these studies which, in systems terms, implies a need to assess the system boundary. Within this chapter an approach to such boundary setting is described, together with the way in which this may be used to inform choice of intervention strategy.

Author(s):  
Muhammad Muaaz ◽  
Ali Chelli ◽  
Martin Wulf Gerdes ◽  
Matthias Pätzold

AbstractA human activity recognition (HAR) system acts as the backbone of many human-centric applications, such as active assisted living and in-home monitoring for elderly and physically impaired people. Although existing Wi-Fi-based human activity recognition methods report good results, their performance is affected by the changes in the ambient environment. In this work, we present Wi-Sense—a human activity recognition system that uses a convolutional neural network (CNN) to recognize human activities based on the environment-independent fingerprints extracted from the Wi-Fi channel state information (CSI). First, Wi-Sense captures the CSI by using a standard Wi-Fi network interface card. Wi-Sense applies the CSI ratio method to reduce the noise and the impact of the phase offset. In addition, it applies the principal component analysis to remove redundant information. This step not only reduces the data dimension but also removes the environmental impact. Thereafter, we compute the processed data spectrogram which reveals environment-independent time-variant micro-Doppler fingerprints of the performed activity. We use these spectrogram images to train a CNN. We evaluate our approach by using a human activity data set collected from nine volunteers in an indoor environment. Our results show that Wi-Sense can recognize these activities with an overall accuracy of 97.78%. To stress on the applicability of the proposed Wi-Sense system, we provide an overview of the standards involved in the health information systems and systematically describe how Wi-Sense HAR system can be integrated into the eHealth infrastructure.


2014 ◽  
Vol 20 (1) ◽  
pp. 61-70
Author(s):  
Jacek Borzyszkowski

The purpose – The purpose of the article was an attempt to assess the significance of two spheres connected with the functioning of DMOs, i.e. internet marketing and the development of modern technologies and information systems. Design – The study covers theoretical issues connected with the essence of destination management organizations as the basic organizational structures in the tourism sector, and with the significance of the Internet and modern information technologies in the activities of these organizations. The second part of the study covers the empirical issues of the problem analyzed. Approach and methodology – Apart from theoretical deliberations, it provides the review of previous research. Moreover, the results of the author’s research were used with the aid of the diagnostic survey technique. The results from 53 DMOs that represent 19 European states were obtained. Findings – The quantity of expenditures on information technologies was defined in the structure of the total expenditures on the part of DMOs. The average value for all the organizations under analysis was 10.9%. Owing to the application of the point grading method (Likert scale), it was demonstrated that internet marketing and the development of modern technologies and information systems are becoming increasingly more important areas of the activities. Originality of the research – The originality is evident in the insights it provides about use of modern information technologies and the Internet in the activities of DMO. The empirical deliberations presented in this article should become an important point of reference for many DMOs and should emphasize the growing significance of information technologies.


Author(s):  
Andy Paul Harianja ◽  
Iwada Grawilser Talunohi

The development of the field of information technology is very rapid, therefore many companies, industries, shops and other business entities are using information systems to increase their business. Online sales information systems are used to carry out business processes such as distribution, sales, purchasing, marketing of goods or services by using communication networks and the internet. Online sales information systems can help people who do not have a place or shop to carry out their business. Students in this case, especially at the Catholic University of Santo Thomas, are an opportunity to take advantage of this facility in carrying out their business, especially if they do not have a place or shop to carry out their business. For this reason, an online sales information system was built that can be accessed through the website.


i-com ◽  
2017 ◽  
Vol 16 (2) ◽  
pp. 181-193 ◽  
Author(s):  
Christian Reuter ◽  
Katja Pätsch ◽  
Elena Runft

AbstractThe Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.


2021 ◽  
Vol 4 (2) ◽  
pp. 280-289
Author(s):  
Lian Fawahan ◽  
Ita Marianingsih Purnasari

The occurrence of the Covid-19 pandemic  makes many MSMEs have to lose money and go out of business, whereas in Indonesia the most important joint that sustains the wheels of the country's economy is MSMEs. In addition to the pandemic, the challenge of MSMEs is rise of the digital economy movement is very  rapid  for making    MSMEs  demanded to understand information technology. The covid-19 pandemic is increasingly encouraging human activity through the internet network. One of the simplest steps to build a brand through TikTok social media. In  2020 number of downloads amounted to 63.3 million both in the Apple store and the play store the best-selling application is TikTok. Indonesia  is the downloader of the application amounting to 11% of the total downloads of tiktok application, with tiktok MSME actors can build their product brand, considering it does not require a lot of cost and energy. The potential of the wider market and the future business will also be a consideration because tiktok social media is widely used by millennials who have high consumptive power.  This study uses qualitative descriptive, uses literature studies quoted from book journals as well as relevant websites. The purpose of this study is to encourage MSMEs to have a good brand so that they can compete with other products, and through social media, especially TikTok, the MSME market segment can be wider internationally. Considering that social media has eliminated geography, meaning that when it can go viral social media, everyone can see MSME products. Keywords: MSMEs, Branding, TikTok


2020 ◽  
pp. 2-18
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  

The purpose of the research is to increase the level of security of electronic document metadata in the face of destructive influences from authorized users (insiders). Research methods: new scientific results allowed using a combination of data integrity control method based on the «write once» method and of authentication of HMAС messages (hash-based message authentication, as well as graph theory methods. Research result: a method of cryptographic recursive 2-D control of the integrity of electronic documents metadata is proposed. The analysis of the object of the study was carried out, based on the results of which it was concluded that it is necessary to effectively protect the metadata of electronic documents processed by automated information systems of electronic document management. Developed and described a mathematical model of the proposed method, based on graph theory. The developed technical solution makes it possible to implement the functions of cryptographic recursive twodimensional control of the integrity of the metadata of electronic documents, as well as to provide the possibility of localizing modified (with signs of violation of integrity) metadata records, in conditions of destructive influences of authorized users (insiders). This, in turn, reduces the likelihood of collusion between trusted parties by introducing mutual control over the results of their actions. The proposed solution makes it possible to ensure control of the integrity of data processed by departmental automated information systems of electronic document management, where, due to the peculiarities of their construction, it is impossible to effectively use the currently popular blockchain technology.


10.28945/3116 ◽  
2007 ◽  
Author(s):  
Michael Jones ◽  
Irit Alony

With the increasing levels of multiculturalism in today’s business and the proliferation and essentiality of information systems, development and management of IS needs to be considered in light of the cultural factors which impact upon its utility. Hofstede’s work on culture is the most widely cited in existence. His observations and analysis provide scholars and practitioners a valuable insight into the dynamics of cross-cultural relationships. However, such a groundbreaking body of work does not escape criticism. Hofstede has been dogged by academics discrediting his work in part or whole. Nonetheless, far more scholars exist who support Hofstede than those that don’t. Most quote Hofstede’s work with unabashed confidence, many including his findings as absolute assumptions. This paper takes a critical look at Hofstede’s work and applies his findings to the practical needs of information systems. The paper finds support for the dimensions promoted by Hofstede in regard to information systems, but recommends continued research to provide greater clarity and continued applicability of his espoused dimensions.


2017 ◽  
Vol 10 (3) ◽  
pp. 245-255
Author(s):  
Mitia Frumin

Abstract The Hebrew calendar is a lunisolar calendar. Its months are based on the revolution of the moon about the Earth, as it is said: This is the burnt offering of every new moon throughout the months of the year1 (Num. 28:14) At the present time the moment of the true new moon is approximated mathematically. However during the Second Temple period, the beginning of the new lunar month had to be observed and certified by witnesses. Then the Sanhedrin Court was to make a public proclamation on the first day of the lunar month (ראש חודש). In Mishnah, Tractate Rosh Hashana, Chapter 2 describes the process of communicating the information about the beginning of new month through the chain of beacon fires: “From the Mount of Olives to Sartaba, and from Sartaba to Grofina, and from Grofina to Hauran, and from Hauran to Bet Biltin. From Bet Biltin they did not move, but rather waved back and forth and up and down until he saw the whole of the diaspora before him lit up like one bonfire.”2 Questioning of reliability of the quoted above description, its completeness and exclusiveness of the delineated in the Mishnah route is beyond the scope of the presented research. In this article we’ll apply methods of the geographic information systems (GIS) analysis in order to examine the existed theories regarding localization of Sartaba - the second mentioned station in the chain of beacon fires, reveal their discrepancies and propose an innovative, albeit rather technical, solution for long-known problem.


Sign in / Sign up

Export Citation Format

Share Document