Panel 9 Are There Barbarians at the Gates of Information Systems?

نویسندگان

  • Jane Fedorowicz
  • Denis Lee
  • John J. Sviokla
  • Bruce Weber
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Novel Defect Terminolgy Beside Evaluation And Design Fault Tolerant Logic Gates In Quantum-Dot Cellular Automata

Quantum dot Cellular Automata (QCA) is one of the important nano-level technologies for implementation of both combinational and sequential systems. QCA have the potential to achieve low power dissipation and operate high speed at THZ frequencies. However large probability of occurrence fabrication defects in QCA, is a fundamental challenge to use this emerging technology. Because of these vari...

متن کامل

Investigating Challenges of agricultural knowledge and information systems (AKIS) in Iran with Delphi technique

Sustainable agricultural and rural development requires knowledge and information, skills, attitudes and technologies, which run through a network of actors to produce, distribute and use it in a particular place. The model of the Agriculture Knowledge and Information Systems (AKIS) is designed based on this recognition. In Iran, There are about decades of experience in the development of this ...

متن کامل

Factors Affecting the Technical Efficiency of Health Systems: A Case Study of Economic Cooperation Organization (ECO) Countries (2004–10)

Background Improving efficiency of health sector is of particular importance in all countries. To reach this end, it is paramount to measure the efficiency. On the other hand, there are many factors that affect the efficiency of health systems. This study aimed to measure the Technical Efficiency (TE) of health systems in Economic Cooperation Organization (ECO) countries during 2004–10 and to d...

متن کامل

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996