نتایج جستجو برای: information need

تعداد نتایج: 1584976  

2003
Christopher D. Cera Taoseong Kim Ilya Braude JungHyun Han William C. Regli Taeseong Kim Sung Kyun Kwan

Information security and assurance are new frontiers for collaborative design. In this context, information assurance (IA) refers to methodologies to protect engineering information by ensuring its availability, confidentiality, integrity, non-repudiation, authentication, access control, etc. In collaborative design, IA techniques are needed to protect intellectual property, establish security ...

Journal: :Information Polity 2013

As my title for this editorial suggests, this edition provides new research findings in two spheres of profound interest to this journal and its readers: those of the gathering significance of social media to democratic engagements on the one hand, and of how to view and evaluate e-government in the contemporary state, on the other. In some respects these topics are coming more and more into th...

2000

Find the secret to improve the quality of life by reading this oois 2000 6th international conference on object oriented information systems 18 20 december 2000 london u k proceedings. This is a kind of book that you need now. Besides, it can be your favorite book to read after having this book. Do you ask why? Well, this is a book that has different characteristic with others. You may not need...

2011
Eliana Santana Lisbôa Clara Pereira Coutinho

The need to know and explain the human communication phenomena lead to the development of many theories and communication models that gradually evolved through time, in accordance with the cultural and sociopolitical contexts. In this article we will address the transformation from models that approached communication through a “one-to-all” logic, allowed by the spread of printed mass media or ...

2004
Fariborz Farahmand Shamkant B. Navathe Gunter P. Sharp Philip H. Enslow

As organizations adopt increasingly sophisticated information systems, the challenge of protecting those systems becomes enormous. Accordingly, the single critical decision security managers have to make is the amount an organization is willing to spend on security measures to protect assets of the organization. To arrive at this decision, security mangers need to know explicitly about the asse...

Objective: Identifying the strengths and weaknesses of curriculums and updating them in accordance with the future needs of students and the qualifications corresponding to their job positions is of particular importance. This study aims to identify the shortcomings of the current curriculum of Health Information Management for PhD students in Iran. Methods: This descriptive study was conducte...

2004
L. Ronnie M. Johansson Robert Suzić

In this article, we address the rarely discussed problem of connecting high-level information (e.g., aggregated states and enemy intentions) to information acquisition. Our approach is to partition the transition of information need to sensor management into a set of comprehensible entities (information types and functions), which we present in a framework. The framework is stepwise (sequential...

Journal: :Bulletin of the American Society for Information Science and Technology 2005

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید