Results 61 to 70 of about 157,729 (225)

Getting to the COR of Workarounds: A Resource Perspective on Deviating Usage of Critical Care Information Systems

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT Workarounds in high‐hazard environments like intensive care units (ICUs) compromise safety and regulatory compliance. While prior research attributes these deviations to technology misfits and notes self‐reinforcing dynamics, the underlying mechanisms of aggravating workaround spirals remain understudied.
Pauline Kuss   +6 more
wiley   +1 more source

Uma interpretação do impacto da intranet sobre a vida no trabalho

open access: yesCiência da Informação, 2009
Na última década, os sistemas de comunicação conhecidos sob o título de Intranet se estabeleceram como padrão na maioria das organizações. Mesmo as empresas e órgãos governamentais de menor porte fazem uso destes sistemas.
Hermano Roberto Thiry-Cherques
doaj  

ICT and cooperative work

open access: yesAgricultural Economics (AGRICECON), 2005
This article deals with the possibilities of making usage of ICT (Information and communication technology) to support cooperation among teams. There are two main approaches: systems based on the www technologies (intranets), and specialised systems ...
Z. Havlíček, J. Vaněk
doaj   +1 more source

Sosiaalinen media intraneteissä [PDF]

open access: yes, 2010
Opinnäytetyö käsittelee miten sosiaalista median työkaluja voidaan käyttää osana yrityksen intranetiä. Työssä tutkitaan mikä on intranetin rooli yrityksessä, ja mitä muutoksia siihen tulee sosiaalisen median myötä.
Kaipila, Matti
core  

Applying Behaviour Change Theory to Develop an Implementation Strategy for Nurse‐Initiated Protocols in the Emergency Department

open access: yesJournal of Advanced Nursing, EarlyView.
ABSTRACT Background Emergency Departments face increasing pressure due to rising patient demand, complex presentations, and resource constraints, resulting in long waits and extended stays. Nurse‐initiated protocols enable nurses to commence investigations and treatments based on clinical guidelines, improving care and efficiency.
Julie Gawthorne   +5 more
wiley   +1 more source

Intranet Anomaly Detection Method Using Flow Mining and Graph Mining

open access: yesJisuanji kexue yu tansuo, 2020
Evidence of malicious activity on the intranet is often hidden in large data streams, such as system logs that accumulate over months or years, whereas data flows are often unbounded, changing, and unlabeled.
SUN Wei, ZHANG Yu
doaj   +1 more source

Getting information to the public and our users : the OECD Experience [PDF]

open access: yes, 2002
The Organisation for Economic Co-operation and Development (OECD) has opened a web site called SourceOECD that allows the purchase of its publications over the Internet. SourceOECD has the facility to allow clients to purchase parts of a publication, for
Raggett, Peter
core  

Evaluating Procedure Videos to Support Clinical Nurses With Rare Procedures: Impact on Anxiety and Clinical Reasoning in a Pre‐Post Study

open access: yesJournal of Advanced Nursing, EarlyView.
ABSTRACT Aims To evaluate clinical nurses' perceptions and acceptability of procedure videos developed to support them during rare clinical procedures. In addition, a secondary aim was to investigate whether these videos reduce anxiety and enhance clinical reasoning.
Jacqueline Colgan   +4 more
wiley   +1 more source

VIEWS OF THE COMPANIES IN CENTRAL REGION REGARDING THE OPPORTUNITIES AND LIMITATIONS OF INFORMATION TECHNOLOGIES USED FOR PROCESSING AND ANALYSIS OF ACCOUNTING INFORMATION [PDF]

open access: yesAnnals of the University of Petrosani: Economics, 2015
In the context of manual processing of data and the transmission of information by conventional means, many of the information valences of accounting remain unexploited because of deficiencies that may occur (delays in processing, redundancy, overloading
ALINA-TEODORA CIUHUREANU
doaj  

Internet technology as an environment for information systems development

open access: yesVojnotehnički Glasnik, 2000
Development and the organization of the Internet as a global computing network have been discussed including the institutions which provide coordination and functioning of its services.
Miloš Pejanović
doaj   +1 more source

Home - About - Disclaimer - Privacy