Results for ' Management of Computing and Information Systems'

951 found
Order:
  1. (1 other version)Information ethics: on the philosophical foundation of computer ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
    The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of environmental ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is (...)
    Download  
     
    Export citation  
     
    Bookmark   119 citations  
  2. Just consequentialism and computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.
    Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics.
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  3. A phenomenology and epistemology of large language models: transparency, trust, and trustworthiness.Richard Heersmink, Barend de Rooij, María Jimena Clavel Vázquez & Matteo Colombo - 2024 - Ethics and Information Technology 26 (3):1-15.
    This paper analyses the phenomenology and epistemology of chatbots such as ChatGPT and Bard. The computational architecture underpinning these chatbots are large language models (LLMs), which are generative artificial intelligence (AI) systems trained on a massive dataset of text extracted from the Web. We conceptualise these LLMs as multifunctional computational cognitive artifacts, used for various cognitive tasks such as translating, summarizing, answering questions, information-seeking, and much more. Phenomenologically, LLMs can be experienced as a “quasi-other”; when that happens, users (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Editorial introduction – ethics of new information technology.Philip Brey, Luciano Floridi & Frances Grodzinsky - 2005 - Ethics and Information Technology 7 (3):109–109.
    This special issue of Ethics and Information Technology focuses on the ethics of new and emerging information technology (IT). The papers have been selected from submissions to the sixth international conference on Computer Ethics: Philosophical Enquiry (CEPE2005), which took place at the University of Twente, the Netherlands, July 17–19, 2005. -/- .
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. MANAGEMENT OF INFORMATION SECURITY OF THE ENTERPRISE.Tryashchenko Vitaliy & Tytar Tetiana - 2022 - Економіка Та Суспільство 44:1-7.
    The article highlights the current issues related to the management of information provision of the enterprise. It has been specified that complete and reliable information support of business processes is a necessary condition for the effective functioning of the enterprise. It was determined that the information support mechanism for managing the development of business processes should include available information resources, technologies, systems and platforms, software, and qualified personnel responsible for this work. The article examines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. The Reality of Applying Human Resources Information Systems in Major Hospitals in the Southern Palestinian Governorates.Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (5):46-71.
    The study aimed to study the reality of the application of human resource information systems in the major hospitals in the southern Palestinian governorates. Department directors, department heads, and computer engineers), totaling (320) male and female employees during the year (2022), where the researchers prepared a questionnaire to achieve the purpose of the study on human resource information systems (Individual Performance Assessment, Organizational Performance Assessment, Performance Management, Training Development, And Knowledge Management). The most important (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Autonomous weapons systems and the moral equality of combatants.Michael Skerker, Duncan Purves & Ryan Jenkins - 2020 - Ethics and Information Technology 22 (3):197-209.
    To many, the idea of autonomous weapons systems (AWS) killing human beings is grotesque. Yet critics have had difficulty explaining why it should make a significant moral difference if a human combatant is killed by an AWS as opposed to being killed by a human combatant. The purpose of this paper is to explore the roots of various deontological concerns with AWS and to consider whether these concerns are distinct from any concerns that also apply to long-distance, human-guided weaponry. (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  9. Cognition as management of meaningful information. Proposal for an evolutionary approach (IACAP Aarhus July 2011).Christophe Menant - manuscript
    Humans are cognitive entities. Our ongoing interactions with the environment are threaded with creations and usages of meaningful information. Animal life is also populated with meaningful information related to survival constraints. Information managed by artificial agents can also be considered as having meanings, as derived from the designer. Such perspective brings us to propose an evolutionary approach to cognition based on meaningful information management. We use a systemic tool, the Meaning Generator System (MGS), and apply (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Computerized Management Information Systems Resources and their Relationship to the Development of Performance in the Electricity Distribution Company in Gaza.Samy S. Abu Naser & Mazen J. Al Shobaki - 2016 - European Academic Research 4 (8):6969-7002.
    This paper aims to identify computerized management information systems resources and their relationship to the development of performance in the Electricity Distribution Company in Gaza. This research used two dimensions. The first dimension is computerized management information systems and the second dimension the Development of Performance. The control sample was (063). (360) questioners were distributed and (306) were retrieved back with a percentage of (85%). Several statistical tools were used for data analysis and hypotheses (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  11. The case for e-trust.Mariarosaria Taddeo & Luciano Floridi - 2011 - Ethics and Information Technology 13 (1):1–3.
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  12. Introduction to: Norms, Logics and Information Systems: New Studies on Deontic Logic and Computer Science.Paul McNamara & Henry Prakken - 1999 - In Henry Prakken & Paul McNamara (eds.), Norms, Logics and Information Systems: New Studies on Deontic Logic and Computer Science. Amsterdam/Oxford/Tokyo/Washington DC: IOS Press. pp. 1-14.
    (See also the separate entry for the volume itself.) This introduction has three parts. The first providing an overview of some main lines of research in deontic logic: the emergence of SDL, Chisholm's paradox and the development of dyadic deontic logics, various other puzzles/challenges and areas of development, along with philosophical applications. The second part focus on some actual and potential fruitful interactions between deontic logic, computer science and artificial intelligence. These include applications of deontic logic to AI knowledge representation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. The value of responsibility gaps in algorithmic decision-making.Lauritz Munch, Jakob Mainz & Jens Christian Bjerring - 2023 - Ethics and Information Technology 25 (1):1-11.
    Many seem to think that AI-induced responsibility gaps are morally bad and therefore ought to be avoided. We argue, by contrast, that there is at least a pro tanto reason to welcome responsibility gaps. The central reason is that it can be bad for people to be responsible for wrongdoing. This, we argue, gives us one reason to prefer automated decision-making over human decision-making, especially in contexts where the risks of wrongdoing are high. While we are not the first to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. In Defense of (Some) Online Echo Chambers.Douglas R. Campbell - 2023 - Ethics and Information Technology 25 (3):1-11.
    In this article, I argue that online echo chambers are in some cases and in some respects good. I do not attempt to refute arguments that they are harmful, but I argue that they are sometimes beneficial. In the first section, I argue that it is sometimes good to be insulated from views with which one disagrees. In the second section, I argue that the software-design principles that give rise to online echo chambers have a lot to recommend them. Further, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Managing the Ethical Dimensions of Brain-Computer Interfaces in eHealth: An SDLC-based Approach.Matthew E. Gladden - 2016 - In Demetris Vrontis, Yaakov Weber & Evangelos Tsoukatos (eds.), Proceedings of the 9th Annual EuroMed Academy of Business Conference: Innovation, Entrepreneurship and Digital Ecosystems (EUROMED 2016). EuroMed Press. pp. 889-902.
    A growing range of brain-computer interface (BCI) technologies is being employed for purposes of therapy and human augmentation. While much thought has been given to the ethical implications of such technologies at the ‘macro’ level of social policy and ‘micro’ level of individual users, little attention has been given to the unique ethical issues that arise during the process of incorporating BCIs into eHealth ecosystems. In this text a conceptual framework is developed that enables the operators of eHealth ecosystems to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. A Kantian response to the Gamer’s Dilemma.Samuel Ulbricht - 2023 - Ethics and Information Technology 25 (3):1-11.
    The Gamer’s Dilemma consists of three intuitively plausible but conflicting assertions: (i) Virtual murder is morally permissible. (ii) Virtual child molestation is morally forbidden. (iii) There is no relevant moral difference between virtual murder and virtual child molestation in computer games. Numerous attempts to resolve (or dissolve) the Gamer’s Dilemma line the field of computer game ethics. Mostly, the phenomenon is approached using expressivist argumentation: Reprehensible virtual actions express something immoral in their performance but are not immoral by themselves. Consequentialists, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Management Information System of Public Secondary Schools in Sagbayan District: A Proposed Implementation.Fernando Enad & Nestor Balicoco - 2023 - Psychology and Education: A Multidisciplinary Journal 13 (1):1-7.
    This research tackled the challenges public secondary schools in Sagbayan District, Bohol, faced regarding records management. The study employed a mixed research design, combining both descriptive-qualitative and descriptive- quantitative methods. The qualitative phase involved conducting in-depth interviews and focus group discussions with relevant stakeholders involved in records management. On the other hand, the quantitative phase utilized survey questionnaires to gather data from relevant stakeholders to determine the acceptability of the proposed MIS among end-users. The first phase findings revealed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The emergence of “truth machines”?: Artificial intelligence approaches to lie detection.Jo Ann Oravec - 2022 - Ethics and Information Technology 24 (1):1-10.
    This article analyzes emerging artificial intelligence (AI)-enhanced lie detection systems from ethical and human resource (HR) management perspectives. I show how these AI enhancements transform lie detection, followed with analyses as to how the changes can lead to moral problems. Specifically, I examine how these applications of AI introduce human rights issues of fairness, mental privacy, and bias and outline the implications of these changes for HR management. The changes that AI is making to lie detection are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Human achievement and artificial intelligence.Brett Karlan - 2023 - Ethics and Information Technology 25 (3):1-12.
    In domains as disparate as playing Go and predicting the structure of proteins, artificial intelligence (AI) technologies have begun to perform at levels beyond which any humans can achieve. Does this fact represent something lamentable? Does superhuman AI performance somehow undermine the value of human achievements in these areas? Go grandmaster Lee Sedol suggested as much when he announced his retirement from professional Go, blaming the advances of Go-playing programs like AlphaGo for sapping his will to play the game at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Reasons for Meaningful Human Control.Herman Veluwenkamp - 2022 - Ethics and Information Technology 24 (4):1-9.
    ”Meaningful human control” is a term invented in the political and legal debate on autonomous weapons system, but it is nowadays also used in many other contexts. It is supposed to specify conditions under which an artificial system is under the right kind of control to avoid responsibility gaps: that is, situations in which no moral agent is responsible. Santoni de Sio and Van den Hoven have recently suggested a framework that can be used by system designers to operationalize this (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  21. Information Systems Governance and Industry 4.0 - epistemology of data and semiotic methodologies of IS in digital ecosystems.Ângela Lacerda Nobre, Rogério Duarte & Marc Jacquinet - 2018 - Advances in Information and Communication Technology 527:311-312.
    Contemporary Information Systems management incorporates the need to make explicit the links between semiotics, meaning-making and the digital age. This focus addresses, at its core, pure rationality, that is, the capacity of human interpretation and of human inscription upon reality. Creating the new real, that is the motto. Humans are intrinsically semiotic creatures. Consequently, semiotics is not a choice or an option but something that works like a second skin, establishing limits and permeable linkages between: human thought (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. From agency to apperception: through kinaesthesia to cognition and creation.Susan A. J. Stuart - 2008 - Ethics and Information Technology 10 (4):255-264.
    My aim in this paper is to go some way towards showing that the maintenance of hard and fast dichotomies, like those between mind and body, and the real and the virtual, is untenable, and that technological advance cannot occur with being cognisant of its reciprocal ethical implications. In their place I will present a softer enactivist ontology through which I examine the nature of our engagement with technology in general and with virtual realities in particular. This softer ontology is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  49
    A Portrait of the Artist as a Young Algorithm.Sofie Vlaad - 2024 - Ethics and Information Technology 26 (3):1-11.
    This article explores the question as to whether images generated by Artificial Intelligence such as DALL-E 2 can be considered artworks. After providing a brief primer on how technologies such as DALL-E 2 work in principle, I give an overview of three contemporary accounts of art and then show that there is at least one case where an AI-generated image meets the criteria for art membership under all three accounts. I suggest that our collective hesitancy to call AI-generated images art (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Natural morphological computation as foundation of learning to learn in humans, other living organisms, and intelligent machines.Gordana Dodig-Crnkovic - 2020 - Philosophies 5 (3):17-32.
    The emerging contemporary natural philosophy provides a common ground for the integrative view of the natural, the artificial, and the human-social knowledge and practices. Learning process is central for acquiring, maintaining, and managing knowledge, both theoretical and practical. This paper explores the relationships between the present advances in understanding of learning in the sciences of the artificial, natural sciences, and philosophy. The question is, what at this stage of the development the inspiration from nature, specifically its computational models such as (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  25. Computation on Information, Meaning and Representations. An Evolutionary Approach (World Scientific 2011).Christophe Menant - 2011 - In Gordana Dodig Crnkovic & Mark Burgin (eds.), Information and computation: Essays on scientific and philosophical understanding of foundations of information and computation. World Scientific. pp. 255-286.
    Understanding computation as “a process of the dynamic change of information” brings to look at the different types of computation and information. Computation of information does not exist alone by itself but is to be considered as part of a system that uses it for some given purpose. Information can be meaningless like a thunderstorm noise, it can be meaningful like an alert signal, or like the representation of a desired food. A thunderstorm noise participates to (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  26. The Requirements of Computerized Management Information Systems and Their Role in Improving the Quality of Administrative Decisions in the Palestinian Ministry of Education and Higher Education.Mazen J. Al Shobaki & Samy S. Abu-Naser - 2017 - International Journal of Information Technology and Electrical Engineering 6 (6):7-35.
    The purpose of this study is to identify the requirements of computerized Management Information Systems and their role in improving the quality of administrative decisions in the Palestinian Ministry of Education and Higher Education. The authors used the descriptive analytical method and the questionnaire method to collect the data. (247) questionnaires were distributed on the study sample and (175) questionnaires were collected back with a recovery rate of (70.8). The study showed a number of results, the most (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The Impact of Management Requirements and Operations of Computerized Management Information Systems to Improve Performance (Practical Study on the employees of the company of Gaza Electricity Distribution).Samy S. Abu Naser & Mazen J. Al Shobaki - 2016 - Al-Azhar University, Gaza 1 (1):1-28.
    The research aims to identify the impact of the management requirements on operating of computerized management information systems to improve performance, and discuss the perceptions of respondents to develop the performance of employees in the Gaza Electricity Distribution Company, the researchers used the stratified sample method, (360) questionnaires were distributed on the study sample, (306) questionnaires were recoved with a percentage of (85%). The most important findings of the study: computerized MI have a positive impact on (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  28. Emergence and Computation at the Edge of Classical and Quantum Systems.Ignazio Licata - 2008 - In World Scientific (ed.), Physics of Emergence and Organization.
    The problem of emergence in physical theories makes necessary to build a general theory of the relationships between the observed system and the observing system. It can be shown that there exists a correspondence between classical systems and computational dynamics according to the Shannon-Turing model. A classical system is an informational closed system with respect to the observer; this characterizes the emergent processes in classical physics as phenomenological emergence. In quantum systems, the analysis based on the computation theory (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  29. Performance development and its relationship to demographic variables among users of computerized management information systems in Gaza electricity Distribution Company.Mazen J. Al Shobaki & Samy S. Abu Naser - 2016 - International Journal of Humanities and Social Science Research 2 (10):21-30.
    This paper aims to identify Performance development and its relationship to demographic variables among users of computerized management information systems in Gaza Electricity Distribution Company. This research used two dimensions. The first dimension is demographic variables among users of computerized management information systems and the second dimension the Development of Performance. The control sample was (360) questioners were distributed and (306) were retrieved back with a percentage of (85%). Several statistical tools were used for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Tracing app technology: an ethical review in the COVID-19 era and directions for post-COVID-19. [REVIEW]Ehsan Hajiramezanali, Shahriar Esmaeili, Kambiz Rasoulkhani, Ali Akbari, Ali Mostafavi, Amir Esmalian & Saleh Afroogh - 2022 - Ethics and Information Technology 24 (3):1-15.
    We conducted a systematic literature review on the ethical considerations of the use of contact tracing app technology, which was extensively implemented during the COVID-19 pandemic. The rapid and extensive use of this technology during the COVID-19 pandemic, while benefiting the public well-being by providing information about people’s mobility and movements to control the spread of the virus, raised several ethical concerns for the post-COVID-19 era. To investigate these concerns for the post-pandemic situation and provide direction for future events, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Situatedness and Embodiment of Computational Systems.Marcin Miłkowski - 2017 - Entropy 19 (4):162.
    In this paper, the role of the environment and physical embodiment of computational systems for explanatory purposes will be analyzed. In particular, the focus will be on cognitive computational systems, understood in terms of mechanisms that manipulate semantic information. It will be argued that the role of the environment has long been appreciated, in particular in the work of Herbert A. Simon, which has inspired the mechanistic view on explanation. From Simon’s perspective, the embodied view on cognition (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Use of Educational Management Information System in University of Lagos Distance Learning Education.Olatunbosun Odusanya - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (4):66-70.
    Abstract: This paper examined the use of educational management information system in distance learning education University of Lagos. Descriptive Survey research method was adopted for the purpose of this study. A total of one hundred and twenty students participated and returned questionnaire were found useful for analysis. The test of hypothesis was done using simple percentage. This article revealed that EMIS will help to properly measure and evaluate the performance of distance learning education University of Lagos, that EMIS (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Effectiveness of Enhanced Basic Education Information System (EBEIS)/ Learner Information System (LIS)Data and School Management.Alven Lopez & Rufino Lorejo - 2023 - International Journal of Interdisciplinary Organizational Studies 18 (1):689-707.
    Accessing reliable and accurate information is essential to the proliferation of information through various channels. This can help individuals make informed decisions and avoid misinformation or disinformation. In such a case, creating an online information system should be prioritized to provide available data and information for planning, budgeting, and allocating resources and operational targets. This study assessed the level of satisfaction with the usability of EBEIS/LIS data and school management by the Department of Education among (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Ontological theory for ontological engineering: Biomedical systems information integration.James M. Fielding, Jonathan Simon, Werner Ceusters & Barry Smith - 2004 - In Fielding James M., Simon Jonathan, Ceusters Werner & Smith Barry (eds.), Proceedings of the Ninth International Conference on the Principles of Knowledge Representation and Reasoning (KR2004), Whistler, BC, 2-5 June 2004. pp. 114–120.
    Software application ontologies have the potential to become the keystone in state-of-the-art information management techniques. It is expected that these ontologies will support the sort of reasoning power required to navigate large and complex terminologies correctly and efficiently. Yet, there is one problem in particular that continues to stand in our way. As these terminological structures increase in size and complexity, and the drive to integrate them inevitably swells, it is clear that the level of consistency required for (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  35. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. The Impact of Obstacles to the Application of Knowledge Management to Performance Excellence.Samer M. Arqawi, Amal A. Al Hila, Samy S. Abu-Naser & Mazen J. Al Shobaki - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (10):32-50.
    The aim of this study was to identify the obstacles facing the application of knowledge management and its impact on performance at Palestine Technical University-Kadoorei from the point of view of employees and to detect the differences between the average views of the study sample on the subject of the study according to some variables such as (gender, nature of work, Education Level, specialization, years of experience). The study followed the descriptive analytical method and the questionnaire as a tool (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  37. Creational Change and the Management of Human Systems.Michael Elstob & C. M. Elstob - 1991 - Systems Research and Information Science 4 (3):165-176.
    Management involves change. The aim of this paper is to introduce a threefold classification of change with the purpose of making clear how the third type, creational change, is distinctive compared to the other two types. Four types of management situation are introduced, based on the type of change involved in the managed domain and in the management system. The role of creational change in management is discussed and a number of guidelines or suggestions relevant to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Philosophy of computing and information: 5 Questions.Luciano Floridi - 2008 - Copenhagen, Denmark: Automatic Press/VIP.
    Computing and information, and their philosophy in the broad sense, play a most important scientific, technological and conceptual role in our world. This book collects together, for the first time, the views and experiences of some of the visionary pioneers and most influential thinkers in such a fundamental area of our intellectual development.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  39. A Comparative Analysis of the Acquisition Transaction of Management Information Systems through Virtual and Face-to-Face Negotiations—The Perspective of Green IT Industry in Poland.Bartosz Wachnik, Aleksandra Krupa & Krzysztof Santarek - 2022 - Sustainability 14 (15):9531.
    The COVID-19 pandemic that began in 2020 has significantly impacted businesses, regardless of size or industry. The hybrid and remote working models have moved all meetings with potential and existing suppliers to an online environment. This also applies to small- and medium-sized enterprises (SMEs), which have had to adapt themselves to the new situation and implement the solutions necessary to survive on the market. On the other hand, clients have become more aware of the environment and its changes. Customers are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. The biosemiosis of prescriptive information.David L. Abel - 2009 - Semiotica 2009 (174):1-19.
    Exactly how do the sign/symbol/token systems of endo- and exo-biosemiosis differ from those of cognitive semiosis? Do the biological messages that integrate metabolism have conceptual meaning? Semantic information has two subsets: Descriptive and Prescriptive. Prescriptive information instructs or directly produces nontrivial function. In cognitive semiosis, prescriptive information requires anticipation and “choice with intent” at bona fide decision nodes. Prescriptive information either tells us what choices to make, or it is a recordation of wise choices already (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. Availability of Digital Resources and Institutional Compliance with COVID-19 Mitigation Measures in a Nigerian University: A Descriptive Study.Valentine Joseph Owan & Mercy Valentine Owan - 2022 - Electronic Journal of Medical and Educational Technologies 15 (4):Article em2208.
    The state of the availability of digital resources and institutional compliance to COVID-19 mitigation measures was evaluated by the researchers in this study. Informed by the need to answer two research questions, the study adopted the descriptive survey design. A sample of 409 participants was drawn from a population of 2,410 academic staff at the University of Calabar, leveraging the multistage sampling process. “Availability of digital resources and institutional compliance with COVID-19 mitigation measures questionnaire” was used for data collection. After (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. The university computer based assessment and the technology.Carolina Asuaga, Ana Golpe & Esther Hochsztain - 2012 - XIV Jornadas de Educacion de FCEA, 2012.
    The changes that have occurred as a result of the possibility of accessing the technologies of information inclouds the teaching-learning processes. The objective of this work is to show a project to carry out assesstment using the Moodle platform, whith the implementation of a pilot plan in the first half of 2013. Methodologically, the paper start whith a literature review about the computer-based assessment systems (CBA), then its describe the characteristics of the questionnaires on the Moodle platform. Finally, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. European Computing and Philosophy.Gordana Dodig-Crnkovic - 2009 - The Reasoner 3 (9):18-19.
    European Computing and Philosophy conference, 2–4 July Barcelona The Seventh ECAP (European Computing and Philosophy) conference was organized by Jordi Vallverdu at Autonomous University of Barcelona. The conference started with the IACAP (The International Association for CAP) presidential address by Luciano Floridi, focusing on mechanisms of knowledge production in informational networks. The first keynote delivered by Klaus Mainzer made a frame for the rest of the conference, by elucidating the fundamental role of complexity of informational structures that can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Case for Continuous Auditing of Management Information Systems.Robert E. Davis - 2012 - Effective Auditing for Corporates: Key Developments in Practice and Procedures (Key Concepts).
    In the wake of the recent financial crisis, increasing the effectiveness of auditing has weighed heavily on the minds of those responsible for governance. When a business is profitable and paying healthy dividends to its stockholders, fraudulent activities and accounting irregularities can go unnoticed. However, when revenue and cash flow decline, internal costs and operations may be scrutinized more diligently, and discrepancies can emerge as a result. Effective Auditing for Corporates provides you with proactive advice to ...
    Download  
     
    Export citation  
     
    Bookmark  
  45. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin (ed.), The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm: SIPRI. pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Nonstandard set theories and information management.Varol Akman & Mujdat Pakkan - 1996 - Journal of Intelligent Information Systems 6:5-31.
    The merits of set theory as a foundational tool in mathematics stimulate its use in various areas of artificial intelligence, in particular intelligent information systems. In this paper, a study of various nonstandard treatments of set theory from this perspective is offered. Applications of these alternative set theories to information or knowledge management are surveyed.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. A Thought of Legal Research with Examples and Demonstrations.Kiyoung Kim - 2015 - SSRN.
    The policy makers or lawyers may face the need of legal research for reasons. The congressmen may plan to make new laws to address the challenges of their constituent or to the interest of nation. The lawyers may need to serve their clients who like to know the legal issues involved, the strategies to deal with their loss and recovery, and prospect for winning the case if the dispute has gotten worse. The lawyers may practice in a solo business or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. An Intelligent Tutoring System for Learning Computer Network CCNA.Izzeddin A. Alshawwa, Mohammed Al-Shawwa & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):28-36.
    Abstract: Networking is one of the most important areas currently used for data transfer and enterprise management. It also includes the security aspect that enables us to protect our network to prevent hackers from accessing the organization's data. In this paper, we would like to learn what the network is and how it works. And what are the basics of the network since its emergence and know the mechanism of action components. After reading this paper - even if you (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Current issues of the management of socio-economic systems in terms of globalization challenges.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that the management of socio-economic systems in the terms of global challenges requires the use of mechanisms to ensure security, optimise the use of resource potential, increase competitiveness, and provide state support to economic entities. Basic research focuses on assessment of economic entities in the terms of global challenges, analysis of the financial system, migration flows, logistics and product exports, territorial development. The research results have been implemented (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Bibliometric mapping of computer and information ethics.Richard Heersmink, Jeroen van den Hoven, Nees Jan van Eck & Jan van den Berg - 2011 - Ethics and Information Technology 13 (3):241-249.
    This paper presents the first bibliometric mapping analysis of the field of computer and information ethics (C&IE). It provides a map of the relations between 400 key terms in the field. This term map can be used to get an overview of concepts and topics in the field and to identify relations between information and communication technology concepts on the one hand and ethical concepts on the other hand. To produce the term map, a data set of over (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 951