information technology managers
Recently Published Documents


TOTAL DOCUMENTS

19
(FIVE YEARS 2)

H-INDEX

3
(FIVE YEARS 0)

2021 ◽  
Vol 26 (1) ◽  
pp. 24-31
Author(s):  
Maurice Dawson

Abstract In today’s modern digitizing manufacturing landscape, new and emerging technologies can shape how an organization can compete, while others will view this as a necessity to survive as manufacturing has been identified as a critical infrastructure. Universities struggle to hire university professors that are adequately trained or willing to enter academia due to competitive salary offers in the industry. Meanwhile, the demand for fields such as Artificial Intelligence, data science, and cybersecurity continuously rises with no foreseeable drop in demand in the next several years. This results in organizations deploying technologies with an inadequate staff that understands what new cybersecurity risks they are introducing into the company. Examined are how organizations can potentially mitigate some of the risk associated with integrating these new technologies and developing their workforce to be better prepared for looming changes in technological skill need. With the over a 10 % growth in organizations deploying Artificial Intelligence, the current cybersecurity workforce needs are over half a million. A struggle to find a viable workforce this research paper aims to serve as a guide for Information Technology managers and senior management to foresee the cybersecurity risks that will result from the incorporation of these new technological advances into the organization.


2018 ◽  
Vol 7 (3.7) ◽  
pp. 266
Author(s):  
Seri Intan Idayu Binti Shahrul Asari ◽  
Nurussobah Binti Hussin ◽  
Ahmad Zam Hariro Bin Samsudin ◽  
Mohd Nizam Bin Yunus

Electronic Health Records (EHRs) are beneficial in improving patient care, promoting safe practice, as well as enhancing patients and multiple providers’ communication and risk error reduction. However, it seems that the adoption of EHR system is happening very slowly to become fully integrated in both primary care and within hospital settings. In Malaysia, the implemented system still has limited integration and interoperability for supporting clinical operations among other Ministry of Health Malaysia (MOHM) hospitals, health centres, and clinics. Therefore, the objective of this paper is to discuss about this scenario and strain the need for solution through the consideration towards metadata standard establishment in health records system integration. Method used in this study is literature review analysis and face-to-face interview. The paper begins with discussions from various literatures highlighting the need of metadata standard for recordkeeping system integration. Subsequently, the face-to-face interview is done to explore the real situation in Malaysia to encounter the scenario discuss in the literatures. The finding of this study reveals that there is significant need for further research on record keeping metadata standard development for realization of electronic health records system integration. This study is significant for records managers, information technology managers, system developers and record keeping audit.   


2017 ◽  
Vol 16 (3) ◽  
pp. 1009-1034
Author(s):  
Júlio Cesar Pereira da Silva ◽  
Tereza Cristina Batista de Lima ◽  
Luis Eduardo Brandão Paiva ◽  
Marcos Antônio Martins Lima

ResumoNeste estudo objetivou-se analisar a aprendizagem empreendedora dos gestores de Tecnologia da Informação (TI) da região metropolitana de Fortaleza, CE. Foi adotado o modelo de Politis (2005). Usou-se o método qualitativo de natureza descritiva. Para a sua execução, foi realizada entrevista com 10 gestores de TI, com apoio de um questionário semiestruturado. Para tratamento dos dados, utilizou-se o método de Análise de Conteúdo de natureza temática. Os resultados da pesquisa mostraram que a aprendizagem empreendedora tem papel de meio, contínuo e experiencial na formação em negócios do gestor de TI, isso porque as experiências prévias em negócios foram sendo aprimoradas no modo contínuo de novas experiências empresariais, nos seus primeiros empreendimentos, trabalhando nestes e, em seguida, nos de terceiros. Os dois modos de transformação de experiências de carreira empreendedora, tanto o exploitation (conhecimentos preexistentes) quanto o exploration (novas possibilidades) influenciam e aprimoram o desenvolvimento dos conhecimentos em negócios do gestor de TI.Palavras-chave: Aprendizagem empreendedora. Gestores. Tecnologia da Informação. Entrepreneurial learning: study with managers of Information TechnologyAbstract This study aimed to analyze the entrepreneurial learning of managers of Information Technology in the metropolitan area of Fortaleza, CE. Politis model was adopted (2005). The research used the qualitative method of descriptive nature. For its implementation, an interview was held with ten Information Technology managers, supported by a semi-structured questionnaire. For processing the data, we used the content analysis method of thematic nature. The survey results showed that Entrepreneurial Learning has role of medium, continuous and experiential in the training in IT business manager, because previous experiences in business, were being improved continuously in new business experiences, both in their early projects, working on these and, then, in the third ones. The two ways of transforming entrepreneurial career experiences, both the exploitation (foreground) and the exploration (new opportunities) influence and enhance the development of knowledge in the IT business manager.Keywords: Entrepreneurial learning. Managers. Information technology.


2017 ◽  
Vol 8 (4) ◽  
pp. 711-731 ◽  
Author(s):  
Mohamed Salih Yousif Ali

Purpose The purpose of the study is to examine the moderating effects of support service quality (SSQ) on marketing information services sophistication (MISS) and bank’s core competencies within banking sector. Design/methodology/approach To collect the data, the questionnaire approach and random sampling are chosen. The survey sample consisted of 180 banking branches information technology managers in Sudan’s banking industry. Findings The study evidenced that the effect of SSQ on the relationship between MISS and bank’s core competencies is a quasi-moderator and also indicate that the two components of MISS are positively and significantly associated with bank’s core competencies. Research limitations/implications The study is conducted in Sudan banking industry and generalization could be limited. Future studies will replicate the study in different industries or countries. Practical implications For the managers’ practice, the findings showed that MISS can deliver superior performance and efficiency (such as proper work flow, employee satisfaction, reducing complaints or enquiries and competitive capabilities) if it reinforced or strengthened by SSQ. Originality/value Empirical results support the positive link between MISS, SSQ and top core competencies. The benefit of that contribution is performance excellence competencies at the market.


2017 ◽  
Vol 11 (1) ◽  
pp. 37-43 ◽  
Author(s):  
Haleh Ayatollahi ◽  
Ghazal Shagerdi

Background: To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. Objective: The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. Method: This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). Results: The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). Conclusion: The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies.


Author(s):  
JYOTHI GANIG B S ◽  
RAMESH NAMBURI

Data centers manage complex server environments, including physical and virtual machines, across a wide variety of platforms, and often in geographically dispersed locations. Information Technology managers are responsible for ensuring that servers in these increasingly complex environments are properly configured and monitored throughout the IT life cycle. They also face challenges managing the physical and virtual environments and the fact that we must centralize, optimize and maintain both. If the variation and complexity can be taken out of a process to make it more consistent, it can be automated. Through the use of virtual provisioning software, provisioning and re-purposing of infrastructure will become increasingly automatic. Staff will physically rack once, cable once, and thereafter (remotely) reconfigure repeatedly, effortlessly, as needed. An automatic infrastructure will rapidly change which servers are running what software and how those servers are connected to network and storage. It will re-purpose machines according to the real-time demands of the business. It will enable capacity to be "dialed up" or "dialed down". And it will bring up a failed server on new hardware, with the same network and storage access and addressing, within minutes. All without needing to make physical machine, cable, LAN connection or SAN access changes.


Sign in / Sign up

Export Citation Format

Share Document