Hasil untuk "Information technology"

Menampilkan 20 dari ~25915991 hasil · dari CrossRef, DOAJ, Semantic Scholar

JSON API
S2 Open Access 2021
Information technology and Gen Z: The role of teachers, the internet, and technology in the education of young people

A. Szymkowiak, Boban Melović, Marina Dabić et al.

Abstract Technological progress has influenced the way we acquire knowledge and learn. On the other hand, the Internet provides fast access to information technology in different fields and thus, improves efficiency and saves time. The importance of online technology is especially emphasized in new methods for learning and education. This is particularly important among Generation Z (“Gen Z″), which derives knowledge from the Internet and is focused on a quick search of information. The aim of this paper is to determine how technology and the Internet affect the acquisition of knowledge by Generation Z, and which forms of knowledge acquisition this generation prefers. In our paper, the problem concerns various forms of learning and acquiring knowledge. Research was conducted among 498 young people actively using an online peer-to-peer knowledge-sharing community. The results of ANOVA analysis showed the respondents being more partial towards learning via mobile applications and video content over the traditional form. It also discovered that the students tended to emulate their teachers who integrated modern technologies into their curriculum and used it outside classroom hours for learning. The results of this research make several important theoretical contributions to the gap in knowledge acquisition by Gen Z, and provide several important practical recommendations for educators.

752 sitasi en Computer Science
S2 Open Access 2018
Physician stress and burnout: the impact of health information technology

Rebekah L. Gardner, Emily Cooper, Jacqueline Haskell et al.

Objective To quantify how stress related to use of health information technology (HIT) predicts burnout among physicians. Methods All 4197 practicing physicians in Rhode Island were surveyed in 2017 on their HIT use. Our main outcome was self-reported burnout. The presence of HIT-related stress was defined by report of at least 1 of the following: poor/marginal time for documentation, moderately high/excessive time spent on the electronic health record (EHR) at home, and agreement that using an EHR adds to daily frustration. We used logistic regression to assess the association between each HIT-related stress measure and burnout, adjusting for respondent demographics, practice characteristics, and the other stress measures. Results Of the 1792 physician respondents (43% response rate), 26% reported burnout. Among EHR users (91%), 70% reported HIT-related stress, with the highest prevalence in primary care-oriented specialties. After adjustment, physicians reporting poor/marginal time for documentation had 2.8 times the odds of burnout (95% CI: 2.0-4.1; P < .0001), compared to those reporting sufficient time. Physicians reporting moderately high/excessive time on EHRs at home had 1.9 times the odds of burnout (95% CI: 1.4-2.8; P < .0001), compared to those with minimal/no EHR use at home. Those who agreed that EHRs add to their daily frustration had 2.4 times the odds of burnout (95% CI: 1.6-3.7; P < .0001), compared to those who disagreed. Conclusion HIT-related stress is measurable, common (about 70% among respondents), specialty-related, and independently predictive of burnout symptoms. Identifying HIT-specific factors associated with burnout may guide healthcare organizations seeking to measure and remediate burnout among their physicians and staff.

468 sitasi en Computer Science, Medicine
S2 Open Access 2018
How to Respond to the Fourth Industrial Revolution, or the Second Information Technology Revolution? Dynamic New Combinations between Technology, Market, and Society through Open Innovation

Minhwa Lee, J. Yun, A. Pyka et al.

Since Klaus Schwab and the World Economic Forum declared the arrival of the Fourth Industrial Revolution, there has been much discussion about it. However, there is no commonly agreed-upon definition of the Fourth Industrial Revolution. Therefore, we attempted to answer the following four research questions. “What is the definition of the Fourth Industrial Revolution?”, “How can we respond to the Fourth Industrial Revolution in terms of institutions?”, “How can we respond to the Fourth Industrial Revolution in terms of technology?”, “How can we respond to the Fourth Industrial Revolution in terms of firm innovation and start-up strategy?” Brainstorming was conducted by 11 scholars from several countries to answer these four research questions. Therefore, this research is not the end product of four research questions, but a kind of advanced template to answer the four research questions for continuing research.

447 sitasi en Political Science
S2 Open Access 2020
Information technology solutions, challenges, and suggestions for tackling the COVID-19 pandemic

Wu He, Z. Zhang, Wenzhuo Li

Various technology innovations and applications have been developed to fight the coronavirus pandemic. The pandemic also has implications for the design, development, and use of technologies. There is an urgent need for a greater understanding of what roles information systems and technology researchers can play in this global pandemic. This paper examines emerging technologies used to mitigate the threats of COVID-19 and relevant challenges related to technology design, development, and use. It also provides insights and suggestions into how information systems and technology scholars can help fight the COVID-19 pandemic. This paper helps promote future research and technology development to produce better solutions for tackling the COVID-19 pandemic and future pandemics.

372 sitasi en Political Science, Computer Science
S2 Open Access 2019
Information technology and the search for organizational agility: A systematic review with future research possibilities

Paul P. Tallon, M. Queiroz, T. Coltman et al.

Abstract Organizations are increasingly turning to information technology (IT) to help them respond to unanticipated environmental threats and opportunities. In this paper, we introduce a systematic review of the literature on IT-enabled agility, helping to establish the boundary between what we know and what we don’t know. We base our review on a wide body of literature drawn from the AIS Basket of Eight IT journals, a cross-section of non-Basket journals, IT practitioner outlets, and premier international IS conferences. We review the use of different theoretical lenses used to investigate the relationship between IT and organizational agility and how the literature has conceptualized agility, its antecedents, and consequences. We also map the evolution of the literature through a series of stages that highlight how researchers have built on previous work. Lastly, we discuss opportunities for future research in an effort to close important gaps in our understanding.

386 sitasi en Sociology, Computer Science
S2 Open Access 2019
Smart City and information technology: A review

Andrés Camero, E. Alba

Abstract Smart City is a recent concept that is gaining momentum in public opinion, and thus, it is making its way into the agendas of researchers and city authorities all over the world. However, there is no consensus of what exactly is a smart city, and academic research is, at best, building applications in numerous silos. This paper explores the computer science and information technology literature about Smart City. Using data analysis techniques, we contribute to present the domain from an objective data-based point of view, aiming to highlight its major trends, and providing a single entry point for newcomers.

344 sitasi en Computer Science
S2 Open Access 2020
Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2

K. Tamilmani, Nripendra P. Rana, Yogesh K. Dwivedi

Despite being regarded as the most comprehensive theory in understanding individual technology adoption – UTAUT2 theory with growing number of citations and impetus beyond IS domain face strong criticism on usage of the model in its entirety. This study located UTAUT2 based empirical studies in the Scopus and Web of Science bibliographic database through citied reference search in order to evaluate appropriate usage of UTAUT2 constructs. The meta-analysis results spanning across 60 studies with more than 122,000 cumulative observations found BI➔UB as the strongest path with all significant values. PE➔BI emerged as the most utilized path with most significant values underscoring the emphasis placed by consumers on utilitarian value. Meanwhile, with most non-significant path values the future usage of EE➔BI path is been cautioned and questioned. Finally, trust, personal innovativeness, perceived risk, attitude, and self-efficacy were found as the five topmost UTAUT2 extensions.

301 sitasi en Psychology, Computer Science
S2 Open Access 2019
Impact of information technology innovation on firm performance in Kenya

S. Chege, Daoping Wang, S. Suntu

ABSTRACT Information communication technology (ICT) is driving modern employment creation with networking sites enabling people to interact through innovation. However, ICT uptake and implementation differ due to moderating factors such as entrepreneur innovativeness, which enhances how technology innovation impacts organizational performance. This study examines the association between technology innovation and firm performance in Kenya by considering the impact of entrepreneur innovativeness on this association. A sample of 240 enterprises and structural equation modeling were used in the analysis. The findings indicate that technology innovation influences firm performance positively. The study recommends that entrepreneurs should develop innovative strategies to actualize firm performance. Government policy should aim at improving ICT infrastructure; promoting small and medium-sized enterprises’ (SMEs’) technological externalities within the industry, and establishing ICT resource centers to support SME performance. The study’s findings enrich existing theories and contribute to business management practices in both developed and developing countries.

330 sitasi en Business, Computer Science
S2 Open Access 2020
Cloud Computing and its role in the Information Technology

Tanweer Alam

The concept of Cloud Computing has been distinguished as one of the major computing models in recent years. Cloud computing has become a great innovation that has important consequences not just for services on the internet but also for the entire Information technology (IT) market. Its emergence aims to optimize on-demand technology, hardware and information provisioning as a service, reaching the economy of scale in the distribution and operation of IT strategies. A great deal of cloud computing research has been concerned over some obstacles and challenges that rely upon behind the lure of cloud computing. Security has been always raised as one of the most critical issues of cloud computing where resolving such an issue would result in constant growth in the use and popularity of the cloud. Security requirements represent a major issue that has to be met in order of easing some of these obstacles. This article presents the role of cloud computing in the IT sectors.

208 sitasi en Computer Science
DOAJ Open Access 2026
Understanding older adults’ continuance intention toward smart locks: a socio-technical study based on the Expectation-Confirmation Model of Information Systems and Task-Technology Fit Model

Yuan Wang, Norazmawati Md Sani, Jing Cai et al.

Background As aging populations continue to grow, smart home technologies—such as smart locks—have become increasingly essential to support older adults’ independent living. Long-term use remains a challenge, however, with most studies focusing on initial adoption rather than sustained engagement. Methods In this study, we examined the key factors related to older adults’ continuance intention toward smart locks, applying a socio-technical framework that integrated the Expectation-Confirmation Model of Information Systems (ECM-IS), the Task-Technology Fit (TTF) model, and external variables, including privacy and security, trust, and habit. We analyzed survey data from 422 Chinese participants aged 55 and older using Partial Least Squares Structural Equation Modeling (PLS-SEM) and Importance-Performance Matrix Analysis (IPMA). Results The model explained 71.6% of the variance in continuance intention (R2 = 0.716) and showed strong predictive relevance (Q2 = 0.623). Trust and perceived usefulness were positively related to continuance intention, followed by satisfaction. Task-technology fit and confirmation were significantly associated with perceived usefulness and satisfaction. Habit and privacy and security were not significant with respect to continuance intention. Conclusions These findings provide theoretical and practical insight for designing age-inclusive, trust-enhancing smart locks that better support older adults’ needs in post-adoption contexts.

Electronic computers. Computer science
DOAJ Open Access 2025
Vehicular ad hoc networks verification scheme based on bilinear pairings and networks reverse fuzzy extraction

Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Ahmed Ali Ahmed et al.

Abstract Vehicular Ad-Hoc Networks (VANETs) have facilitated the massive exchange of real-time traffic and weather conditions, which have helped prevent collisions, reduce accidents, and road congestions. This can effectively enhance driving safety and efficiency in technology-driven transportation systems. However, the transmission of massive and sensitive information across public wireless communication channels exposes the transmitted data to a myriad of privacy as well as security threats. Although past researches has developed many vehicular ad-hoc networks security preservation schemes, several of them are inefficient or susceptible to attacks. This work, introduces an approach that leverages reverse fuzzy extraction, bilinear pairing, and Physically Unclonable Function (PUF) to design an efficient and anonymity-preserving authentication scheme. We conduct an elaborate formal security analysis to demonstrate that the derived session key is secure. The semantic security analyses also demonstrate its resilience against typical VANET attacks such as impersonations, denial of service, and de-synchronization, instilling confidence in its effectiveness. Moreover, our approach incurs the lowest computational overheads at relatively low communication costs. Specifically, our protocol attains a 66.696% reduction in computation costs, and a 70% increment in the supported security functionalities.

Medicine, Science

Halaman 2 dari 1295800