Information and Communication Technology (ICT) for Emergency Services

2013 ◽  
Vol 4 (3) ◽  
pp. 30-43
Author(s):  
Dianne Rahm ◽  
Christopher G. Reddick

While most would suggest that more effective use of ICT bodes well for emergency services, there are issues associated with the introduction of such use. To explore these issues in Texas, the authors administered a survey of Texas Emergency Services Districts (ESDs). These districts are charged with delivery of emergency and medical services throughout the state and receive modest tax revenue to fund operations. The results show that in Texas ESDs political and organizational factors are important. Budgets are closely related to the political process in the ESDs, so politics plays a central role. Organizational culture and prevailing sentiments in Texas ESDs are generally supportive of ICT adoption and use. While ICT is seen as essential to service delivery, survey results show that problems of interoperability of communication systems is an issue. The most commonly used ICTs include email, GPS, Google Maps, standard web pages, Wi-Fi networks, smart phones, reverse 911, emergency alerts, Facebook, and database management. GIS, You Tube, VOIP, Cloud Computing, Twitter, LinkedIn, Digital Billboards, 311 for non-emergency disaster, 3D mapping, blogs, podcasts, and Wikis were used by few ESDs. When social media are used, they are not used in such a way as to encourage wider participation of the community in information gathering rather they are used only as an alternative traditional delivery service from the ESDs to the community. Data analysis of past events is used to improve performance. Data management issues of significant concerns include privacy and security.

2005 ◽  
Vol 1 (1) ◽  
Author(s):  
Tony Salvador ◽  
John Sherry

In this essay, we explore some of the details of what it takes to own, use and derive benefit from information and communication technologies, with a focus on regions where ICT adoption and use is especially low. We begin with a fairly meticulous description from our ethnographic work to which we'll refer throughout the paper. Though we consider this particular instance, we note that it represents of a wide range of instances from our ethnographic work in homes and businesses over several years in Brazil, Costa Rica, Chile, Ecuador, Bolivia, Peru, Korea and India. Our goal in this paper, however, is to change the conversation from discussions of infrastructure and capacity building to considerations of local, lived conditions in actual homes and actual businesses to suggest design alternatives that make effective use of ICTs more amenable to various locales. We offer two design directions especially for high tech corporations: Designing for Locus of Control and Designing for Local Participation. Along the way, we'll argue to re-frame of the current conception of "digital divide", putting the burden not on those with limited access, but on limited understanding within the high tech industry.


GIS Business ◽  
2020 ◽  
Vol 14 (6) ◽  
pp. 1147-1155
Author(s):  
J.Nithya Jayaseeli ◽  
T. Devi

The purpose of this study is to examine how Knowledge level augmented parameters impact on the effective adoption of information and communication technology (ICT) by onion farmers in Perambalur district of Tamil Nadu. Data were gathered from a focus group made up of 60 Farmers in Perambalur district. The paper finds that a willingness of indigenous ICT users is particularly influenced by the recognition and incorporation of visible social imperatives during the adoption process. Research limitations/implications – The outcome of this study highlights important issues for ICT adoption. One particular area that must be taken into consideration is the adoption channel. Perceptions of ICT adoption will differ significantly among adopters. For this reason, the need for developing an appropriate adoption channel that ensures successful diffusion of the innovation should be recognized. The paper also demonstrates that Knowledge Management System among farmers using ICT to yield more profit in onion Production form knowledge distributed by the experts. Hence the research work carried out to acquire, represent, and distribute the knowledge Management system to the Farming community.


2018 ◽  
Vol 28 (4) ◽  
pp. 1361-1365
Author(s):  
Ilhan Istikbal Ibryam ◽  
Byulent Mustafa Mustafa ◽  
Atti Rashtid Mustafa

With the introduction of Information Technology in educational process we need more often to use electronic evaluation. The examples of test variants in the secondary school are often prepared with the help of word processing editors as WordPad that has good opportunities for elementary text formatting. Another part of the teachers often use Microsoft Word when preparing their tests. It is true that Microsoft Word has much more editing and formatting instruments than WordPad. For access to electronic educational resources suggested by the school teachers two or more computer networks are built (teachers' and learners'). Using these networks and their access rights, each user, learner or teacher, has the opportunity to add files and directories into the school database (DB). Learners can add files with the exercises they have done during their classes. Teachers suggest through the database the electronic lessons they have developed. At the end of each unit each teacher prepares an electronic test. In it there are described the evaluation criteria depending on the number of points the student has gathered through correct responses. In most cases we notice that in the teachers' network files with the responses of the tests are added later on. Not always the means for defence offered by the system administrators at the school can guarantee the safety of our files and more exactly the manipulation of the answers of the electronic forms of check up. Aiming at more effective defence of the text files, this article views an algorithm created by us for cryptographic defence of text files and it's application in secondary school. The effective use of cryptographic information defence minimises the opportunity to decipher the coded information aiming at its misuse by the learners. Providing safe defence against unsanctioned access in computer communication is a complex and extensive task which is solved by means of a set of measures of organisation and programme-technical character. The defence of the process of submitting data requires utmost attention because it concerns the most vulnerable and accessible for violation points in the communication systems.


2021 ◽  
Vol 4 (4) ◽  
pp. 41-46
Author(s):  
Ra’no Parpieva ◽  
◽  
Nafisa Norboyeva ◽  
Adiba Turayeva

This article will serve to select the system required for the effective use of information and communication technologies in the banking system and the impact of national payment systems in the banking sector on modern society, the effective use of new modern information technologies in the system.Study of foreign experience to select information and communication technologies that should be used in modern banks with information and communication technologies in the banking system, which have been used before.


Author(s):  
Oleksandra Bazko ◽  
◽  
Nataliia Yushchenko ◽  

The article proposes a conceptual model for improving the efficiency of project activities at the local level. The essence of project activity efficiency is determined and the basic approaches to the analysis of criteria and factors of project activity success in general are analyzed. The factors during the organization of group project activities are generalized and analyzed, including social-psychological, external-organizational factors and the level of readiness of territorial communities for project activities. It is determined that the level of readiness of territorial communities to carry out project activities is a set of motives, knowledge, skills, abilities, methods of project actions, personal qualities that ensure the successful interaction of its subjects. It is substantiated that the concept of the offered model consists in the most effective use of possibilities of group project activity for maintenance of qualitative formation of communicative competence of territorial communities, their personal and professional development. The key components of the proposed model are: conceptual-target, functional, structural, diagnostic. It is determined that the main purpose of the conceptual-target component is to form communicative competence, mastering the methods of solving problem-oriented tasks by means of project activities. The functional component of the model includes the identification of the entities on which the effectiveness of the project activity depends, and which carry out its evaluation. It was found that the structural component of the model contains the stages according to which project activities should be organized at the local level. The diagnostic component of the model contains criteria and indicators, levels, means of evaluating the effectiveness of project activities. Within this component, three levels of project activity efficiency (low, medium, high) are defined on the basis of taking into account the results achieved in the project activity process.


Author(s):  
С.А. БАГРЕЦОВ ◽  
Э.А. БУДАРИН ◽  
О.С. ЛАУТА ◽  
М.В. МИТРОФАНОВ

Сетевой трафик, проходящий через современные вычислительные системы, представляет собой огромный информационный поток, который содержит сведения различной степени важности. Показана необходимость использования наиболее рациональных приемов повышения устойчивости сети в радиоэлектронной борьбе, чтобы заставить противника затрачивать больше времени на подбор новых принципов воздействия на системы связи. Network traffic passing through modern computing systems is a huge information flow, which contains information of varying degrees of importance. It is shown the necessity of using the most rational methods of increasing the stability of the network in electronic warfare to force the enemy to spend more time on selecting new principles of influence on communication systems.


Sign in / Sign up

Export Citation Format

Share Document