Which Theory Applies: an Analysis of Information Systems Research

Total Page:16

File Type:pdf, Size:1020Kb

Which Theory Applies: an Analysis of Information Systems Research Publications 2006 Which Theory Applies: An Analysis of Information Systems Research Leila Halawi Bethune-Cookman University, [email protected] Richard McCarthy Quinnipiac University Follow this and additional works at: https://commons.erau.edu/publication Part of the Management Information Systems Commons, and the Technology and Innovation Commons Scholarly Commons Citation Halawi, L., & McCarthy, R. (2006). Which Theory Applies: An Analysis of Information Systems Research. Issues in Information Systems, 7(2). Retrieved from https://commons.erau.edu/publication/317 This Article is brought to you for free and open access by Scholarly Commons. It has been accepted for inclusion in Publications by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. WHICH THEORY APPLIES: AN ANALYSIS OF INFORMATION SYSTEMS RESEARCH Leila Halawi, Cookman College, [email protected] Richard McCarthy, Quinnipiac University, [email protected] ABSTRACT research, management science, sociology, economics, and psychology. Research in information systems has rapidly expanded during its relatively brief existence. IT Our purpose is to identify the significant IT theories. offers organizations a fundamental decision- We begin with a review of their theoretical enhancing environment that extends new fundamentals. We then highlight their importance opportunities, therefore producing thriving, and discuss their implications. competitive firms, adding business value and offering valuable products and services to customers. CONCEPTUAL DEVELOPMENT Research within the IT domain has produced several new theories, some of which have been used to help The growth of the Internet, the globalization of trade, explain and predict end-user use of technologies. We and the rise of information economies have raised the provide a comprehensive overview of the major IT importance of information systems within theories and review their theoretical fundamentals. organizations. It is imperative that researchers and practitioners recognize how information technologies Keywords: Adaptive Structuration Theory, DeLone shape the business world. The study of management and McLean Information Success Model, Diffusion information systems (MIS) appeared in the 1970s to of Innovation Theory, Task Technology Fit, concentrate on the use of computer-based Technology Acceptance Model, Unified Theory of information systems in business firms and Acceptance and Use of Technology government agencies [10]. INTRODUCTION There are a number of approaches to tackle the conceptual development of the MIS discipline. One is What distinguished societies in the preceding 200 to emphasize those fundamental contributions to the years is the tendency of successive revolutions that MIS literature [4, 16, 26, 33]. A second approach shaped the way people earned their living and at the investigates the growth and evolution of major MIS same time identified the essential utensils to attain textbooks. power. Three eras are apparent. The agricultural era lasted through the late 1800s. The industrial era Information Systems Theories extended from the late 1800s until the early 1960s. The information era began in the 1960s [11]. This The significant information systems theories include newest era has also been called the third wave [39], the following: the digital economy [[38], the network economy [37], the knowledge-based economy [30], and the era of 1. Structuration models explain how technological knowledge-based organizations [6]. change influences organization design over time. Adaptive structuration theory (AST) is based on Interest and writing in the field of information Gidden’s structuration theory. DeSanctis and Poole systems started in the late 1960s and grew throughout [15] adapted Giddens’ theory to investigate the the 1970s. Through this age, educational institutions interface between organizations and information initiated degree programs in MIS along with its systems. AST condemns the technocentric view of curriculum development. The emergence of technology use and stresses the social aspects. AST is conceptual material had immense implications a feasible approach for examining the role of throughout this time. Various perspectives on advanced information technologies in organization information systems demonstrate its study is a change. AST observes the change process from two multidisciplinary field. No definite theory or ends: (1) the variety of structures that are presented perspective rules. The major disciplines that by the advanced technologies and (2) the structures contribute include computer science, operations that surface as individuals interact with these technologies. The AST could be applied to examine Volume VII, No. 2, 2006 252 Issues in Information Systems Which Theory Applies: An Analysis of Information Systems Research the beginning of numerous innovations and objects that result in a new item. Accordingly, demonstrate how the structures of these innovations Diffusion of Innovations identifies “four critical invaded and impacted societies and how the social elements in the diffusion process: (a) the innovation, structures of those societies consecutively influenced (b) its communication from one individual to another, and adapted the innovations’ fundamental objectives. (c) the social system, and (d) over time" [34, p.12]. Rogers [34, 35] presents the notion of adopter 2. DeLone and Mclean’s model is viewed as a categories. Adopter categories are “the classifications comprehensive IS assessment model [12, 29, 36] that of members in a social system on the basis of is based on a review and integration of 180 research innovativeness" [35, p. 22]. These classifications studies. In that study a comprehensive classification include innovators (venturesome), early adopters was introduced that provided six major categories of (respect), early majority (deliberate), late majority information systems success. The six major (skeptical), and laggards (traditional). The rate of categories of IS success include (1) system quality, adoption of innovations is impacted by five factors: (2) information quality, (3) use, (4) user satisfaction, relative advantage, compatibility, trialibility, (5) individual impact, and (6) organizational impact observability, and complexity [35]. Applying this [12]. Each of these variables is a composite of concept, Rogers hypothesized that the innovativeness numerous and diverse constructs and measures. They variable is normally distributed over time and the argue that when measuring IS success, researchers adopter categories divide the distribution by standard should systematically combine measures from their deviations from the average time. Conversely, six IS success categories. They also stress the need Mahajan, Muller, and Srivastava [27] question this for additional research to test the model and for the assumption of normality and state that there is no selection of each IS success dimension. They present empirical evidence or validation on the size of the their results in terms of an IS Success Model as adopter categories being equal. Moore and Benbaset follows: [28] expanded on the five factors, producing eight factors: voluntariness, relative advantage, System quality and information quality impact both compatibility, image, ease of use, result use and user satisfaction. The amount of use can demonstrability, visibility, and trialibility that affect user satisfaction positively or negatively. Use influence the adoption of IT. and user satisfaction are direct antecedents of individual impact which results in impact on the 4. The knowledge-based view of the firm [21, 22] organization [12]. builds upon and extends the resource-based theory of the firm initially promoted by Penrose [32] and Several articles have been published which directly expanded by others [1]. It discusses the facets to or indirectly validate, challenge, critique or extend knowledge integration (efficiency, scope and the model itself [13]. Researchers such as Myers, flexibility) and the four primary mechanisms by Kappelman and Prybutok [29] have proposed which knowledge is coordinated (rules and directives, modification to DeLone and McLean’s IS success sequencing, routines and group problem solving and model to include service quality. The changes in the decision making). The knowledge-based perspective reformulated IS Success Model are largely changes in postulates that the services rendered by tangible degree, not in the scope of the variables that comprise resources depend on how they are combined and the model [13, 14]. applied, which is in turn a function of the firm’s know-how [1]. Knowledge-based resources are 3. Diffusion theory, initially developed for farming usually difficult to imitate and are socially complex; technologies, has been modified and utilized in therefore, the knowledge-based view of the firm several other disciplines and technologies, resulting posits that these knowledge assets may produce long- in a technique that is methodologically and term sustainable competitive advantage [1]. empirically mature [34]. Diffusion of Innovation theory (DIT) perceives innovations as being 5. Goodhue and Thompson [20] postulated that for an communicated through specific channels over time information system to have a positive impact on and within a particular social system. Rogers states, individual performance, the technology should be "diffusion is the process by which an innovation is exploited and must
Recommended publications
  • Information Technology Management 14
    Information Technology Management 14 Valerie Bryan Practitioner Consultants Florida Atlantic University Layne Young Business Relationship Manager Indianapolis, IN Donna Goldstein GIS Coordinator Palm Beach County School District Information Technology is a fundamental force in • IT as a management tool; reshaping organizations by applying investment in • understanding IT infrastructure; and computing and communications to promote competi- • ȱǯ tive advantage, customer service, and other strategic ęǯȱǻȱǯȱǰȱŗşşŚǼ ȱȱ ȱ¢ȱȱȱ¢ǰȱȱ¢Ȃȱ not part of the steamroller, you’re part of the road. ǻ ȱǼ ȱ ¢ȱ ȱ ȱ ęȱ ȱ ȱ ¢ǯȱȱȱȱȱ ȱȱ ȱ- ¢ȱȱȱȱȱǯȱ ǰȱ What is IT? because technology changes so rapidly, park and recre- ation managers must stay updated on both technological A goal of management is to provide the right tools for ȱȱȱȱǯ ěȱ ȱ ě¢ȱ ȱ ȱ ȱ ȱ ȱ ȱȱȱȱ ȱȱȱǰȱȱǰȱ ȱȱȱȱȱȱǯȱȱȱȱ ǰȱȱȱȱ ȱȱ¡ȱȱȱȱ recreation organization may be comprised of many of terms crucial for understanding the impact of tech- ȱȱȱȱǯȱȱ ¢ȱ ȱ ȱ ȱ ȱ ǯȱ ȱ ȱ ȱ ȱ ȱ ǯȱ ȱ - ȱȱęȱȱȱ¢ȱȱȱȱ ¢ȱǻ Ǽȱȱȱȱ¢ȱ ȱȱȱȱ ǰȱ ȱ ȱ ȬȬ ȱ ȱ ȱ ȱȱǯȱȱȱȱȱ ¢ȱȱǯȱȱ ȱȱȱȱ ȱȱ¡ȱȱȱȱȱǻǰȱŗşŞśǼǯȱ ȱȱȱȱȱȱĞȱȱȱȱ ǻȱ¡ȱŗŚǯŗȱ Ǽǯ ě¢ȱȱȱȱǯ Information technology is an umbrella term Details concerning the technical terms used in this that covers a vast array of computer disciplines that ȱȱȱȱȱȱȬȬęȱ ȱȱ permit organizations to manage their information ǰȱ ȱ ȱ ȱ Ȭȱ ¢ȱ ǯȱ¢ǰȱȱ¢ȱȱȱ ȱȱ ǯȱȱȱȱȱȬȱ¢ȱ a fundamental force in reshaping organizations by applying ȱȱ ȱȱ ȱ¢ȱȱȱȱ investment in computing and communications to promote ȱȱ¢ǯȱ ȱȱȱȱ ȱȱ competitive advantage, customer service, and other strategic ȱ ǻȱ ȱ ŗŚȬŗȱ ęȱ ȱ DZȱ ęȱǻǰȱŗşşŚǰȱǯȱřǼǯ ȱ Ǽǯ ȱ¢ȱǻ Ǽȱȱȱȱȱ ȱȱȱęȱȱȱ¢ȱȱ ȱ¢ǯȱȱȱȱȱ ȱȱ ȱȱ ȱȱȱȱ ȱ¢ȱ ȱȱǯȱ ȱ¢ǰȱ ȱȱ ȱDZ ȱȱȱȱǯȱ ȱȱȱȱǯȱ It lets people learn things they didn’t think they could • ȱȱȱ¢ǵ ȱǰȱȱǰȱȱȱǰȱȱȱȱȱǯȱ • the manager’s responsibilities; ǻȱǰȱȱ¡ȱĜȱȱĞǰȱȱ • information resources; ǷȱǯȱȱȱřŗǰȱŘŖŖŞǰȱ • disaster recovery and business continuity; ȱĴDZȦȦ ǯ ǯǼ Information Technology Management 305 Exhibit 14.
    [Show full text]
  • Bioinformatics 1
    Bioinformatics 1 Bioinformatics School School of Science, Engineering and Technology (http://www.stmarytx.edu/set/) School Dean Ian P. Martines, Ph.D. ([email protected]) Department Biological Science (https://www.stmarytx.edu/academics/set/undergraduate/biological-sciences/) Bioinformatics is an interdisciplinary and growing field in science for solving biological, biomedical and biochemical problems with the help of computer science, mathematics and information technology. Bioinformaticians are in high demand not only in research, but also in academia because few people have the education and skills to fill available positions. The Bioinformatics program at St. Mary’s University prepares students for graduate school, medical school or entry into the field. Bioinformatics is highly applicable to all branches of life sciences and also to fields like personalized medicine and pharmacogenomics — the study of how genes affect a person’s response to drugs. The Bachelor of Science in Bioinformatics offers three tracks that students can choose. • Bachelor of Science in Bioinformatics with a minor in Biology: 120 credit hours • Bachelor of Science in Bioinformatics with a minor in Computer Science: 120 credit hours • Bachelor of Science in Bioinformatics with a minor in Applied Mathematics: 120 credit hours Students will take 23 credit hours of core Bioinformatics classes, which included three credit hours of internship or research and three credit hours of a Bioinformatics Capstone course. BS Bioinformatics Tracks • Bachelor of Science
    [Show full text]
  • Information Technology Manager Is a Professional Technical Stand Alone Class
    CITY OF GRANTS PASS, OREGON CLASS SPECIFICATION FLSA Status : Exempt Bargaining Unit : Non-Bargaining INFORMATION TECHNOLOGY Salary Grade : UD2 MANAGER CLASS SUMMARY: The Information Technology Manager is a Professional Technical Stand Alone class. Incumbents are responsible for management of specific applications, computer hardware and software, and development of systems based on detailed specifications. Incumbents apply a broad knowledge base of programming code to City issues and work with systems that link to multiple databases involving complex equations. Based upon assignment, incumbents may manage small information technology projects. The Information Technology Manager is responsible for the full range of supervisory duties including directing work, training and coaching, discipline, and performance evaluation. CORE COMPETENCIES: Integrity/Accountability: Conducts oneself in a manner that is ethical, trustworthy and professional; demonstrates transparency with honest, responsive communication; behaves in a manner that supports the needs of Council, the citizens and co-workers; and conducts oneself in manner that supports the vision and goals of the organization taking pride in being engaged in the community. Vision: Actively seeks to discover and create ways of doing things better using resources and skills in an imaginative and innovative manner; encourages others to find solutions and contributes, regardless of responsibilities, to achieve a common goal; and listens and is receptive to different ideas and opinions while solving problems. Leadership/United: Focuses on outstanding results of the betterment of the individual, the organization and the community; consistently seeks opportunities for coordination and collaboration, working together as a team; displays an ability to adjust as needed to accomplish the common goal and offers praise when a job is done well.
    [Show full text]
  • Use of Bioinformatics Resources and Tools by Users of Bioinformatics Centers in India Meera Yadav University of Delhi, [email protected]
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Library Philosophy and Practice (e-journal) Libraries at University of Nebraska-Lincoln 2015 Use of Bioinformatics Resources and Tools by Users of Bioinformatics Centers in India meera yadav University of Delhi, [email protected] Manlunching Tawmbing Saha Institute of Nuclear Physisc, [email protected] Follow this and additional works at: http://digitalcommons.unl.edu/libphilprac Part of the Library and Information Science Commons yadav, meera and Tawmbing, Manlunching, "Use of Bioinformatics Resources and Tools by Users of Bioinformatics Centers in India" (2015). Library Philosophy and Practice (e-journal). 1254. http://digitalcommons.unl.edu/libphilprac/1254 Use of Bioinformatics Resources and Tools by Users of Bioinformatics Centers in India Dr Meera, Manlunching Department of Library and Information Science, University of Delhi, India [email protected], [email protected] Abstract Information plays a vital role in Bioinformatics to achieve the existing Bioinformatics information technologies. Librarians have to identify the information needs, uses and problems faced to meet the needs and requirements of the Bioinformatics users. The paper analyses the response of 315 Bioinformatics users of 15 Bioinformatics centers in India. The papers analyze the data with respect to use of different Bioinformatics databases and tools used by scholars and scientists, areas of major research in Bioinformatics, Major research project, thrust areas of research and use of different resources by the user. The study identifies the various Bioinformatics services and resources used by the Bioinformatics researchers. Keywords: Informaion services, Users, Inforamtion needs, Bioinformatics resources 1. Introduction ‘Needs’ refer to lack of self-sufficiency and also represent gaps in the present knowledge of the users.
    [Show full text]
  • Establishing the Basis for a CIS (Computer Information Systems) Undergraduate Program: on Seeking the Body of Knowledge
    Information Systems Education Journal (ISEDJ) 13 (5) ISSN: 1545-679X September 2015 Establishing the Basis for a CIS (Computer Information Systems) Undergraduate Program: On Seeking the Body of Knowledge Herbert E. Longenecker, Jr. [email protected] University of South Alabama Mobile, AL 36688, USA Jeffry Babb [email protected] West Texas A&M University Canyon, TX 79016, USA Leslie J. Waguespack [email protected] Bentley University Waltham, Massachusetts 02452, USA Thomas N. Janicki [email protected] University of North Carolina Wilmington Wilmington, NC 28403, USA David Feinstein [email protected] University of South Alabama Mobile, AL 36688, USA Abstract The evolution of computing education spans a spectrum from computer science (CS) grounded in the theory of computing, to information systems (IS), grounded in the organizational application of data processing. This paper reports on a project focusing on a particular slice of that spectrum commonly labeled as computer information systems (CIS) and reflected in undergraduate academic programs designed to prepare graduates for professions as software developers building systems in government, commercial and not-for-profit enterprises. These programs with varying titles number in the hundreds. This project is an effort to determine if a common knowledge footprint characterizes CIS. If so, an eventual goal would be to describe the proportions of those essential knowledge components and propose guidelines specifically for effective undergraduate CIS curricula. Professional computing societies (ACM, IEEE, AITP (formerly DPMA), etc.) over the past fifty years have sponsored curriculum guidelines for various slices of education that in aggregate offer a compendium of knowledge areas in ©2015 EDSIG (Education Special Interest Group of the AITP) Page 37 www.aitp-edsig.org /www.isedj.org Information Systems Education Journal (ISEDJ) 13 (5) ISSN: 1545-679X September 2015 computing.
    [Show full text]
  • An Academic Discipline
    Information Technology – An Academic Discipline This document represents a summary of the following two publications defining Information Technology (IT) as an academic discipline. IT 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information Technology. (Nov. 2008). Association for Computing Machinery (ACM) and IEEE Computer Society. Computing Curricula 2005 Overview Report. (Sep. 2005). Association for Computing Machinery (ACM), Association for Information Systems (AIS), Computer Society (IEEE- CS). The full text of these reports with details on the model IT curriculum and further explanation of the computing disciplines and their commonalities/differences can be found online: http://www.acm.org/education/education/curricula-recommendations) From IT 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information Technology IT programs aim to provide IT graduates with the skills and knowledge to take on appropriate professional positions in Information Technology upon graduation and grow into leadership positions or pursue research or graduate studies in the field. Specifically, within five years of graduation a student should be able to: 1. Explain and apply appropriate information technologies and employ appropriate methodologies to help an individual or organization achieve its goals and objectives; 2. Function as a user advocate; 3. Manage the information technology resources of an individual or organization; 4. Anticipate the changing direction of information technology and evaluate and communicate the likely utility of new technologies to an individual or organization; 5. Understand and, in some cases, contribute to the scientific, mathematical and theoretical foundations on which information technologies are built; 6. Live and work as a contributing, well-rounded member of society. In item #2 above, it should be recognized that in many situations, "a user" is not a homogeneous entity.
    [Show full text]
  • Applications of Social Media in Hydroinformatics: a Survey
    Applications of Social Media in Hydroinformatics: A Survey Yufeng Yu, Yuelong Zhu, Dingsheng Wan,Qun Zhao [email protected] College of Computer and Information Hohai University Nanjing, Jiangsu, China Kai Shu, Huan Liu [email protected] School of Computing, Informatics, and Decision Systems Engineering Arizona State University Tempe, Arizona, U.S.A Abstract Floods of research and practical applications employ social media data for a wide range of public applications, including environmental monitoring, water resource managing, disaster and emergency response, etc. Hydroinformatics can benefit from the social media technologies with newly emerged data, techniques and analytical tools to handle large datasets, from which creative ideas and new values could be mined. This paper first proposes a 4W (What, Why, When, hoW) model and a methodological structure to better understand and represent the application of social media to hydroinformatics, then provides an overview of academic research of applying social media to hydroinformatics such as water environment, water resources, flood, drought and water Scarcity management. At last,some advanced topics and suggestions of water-related social media applications from data collection, data quality management, fake news detection, privacy issues , algorithms and platforms was present to hydroinformatics managers and researchers based on previous discussion. Keywords: Social Media, Big Data, Hydroinformatics, Social Media Mining, Water Resource, Data Quality, Fake News 1 Introduction In the past two
    [Show full text]
  • Use of Hydroinformatics Technology in Central and Eastern Europe During Last Decade K
    Use of Hydroinformatics technology in Central and Eastern Europe during last decade K. Pryl, T. Metelka, M. Suchanek To cite this version: K. Pryl, T. Metelka, M. Suchanek. Use of Hydroinformatics technology in Central and Eastern Europe during last decade. Novatech 2010 - 7ème Conférence internationale sur les techniques et stratégies durables pour la gestion des eaux urbaines par temps de pluie / 7th International Conference on sustainable techniques and strategies for urban water management, Jun 2010, Lyon, France. pp.3. hal-03296498 HAL Id: hal-03296498 https://hal.archives-ouvertes.fr/hal-03296498 Submitted on 22 Jul 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. NOVATECH 2010 Use of Hydroinformatics technology in Central and Eastern Europe during last decade L’utilisation de la technologie hydro-informatique en Europe centrale et orientale au cours de la dernière décennie Tomas Metelka, Karel Pryl, Milan Suchanek DHI a.s., Na Vrsich 5, Prague 10, 100 00, Czech Republic ([email protected], [email protected], [email protected]) RÉSUMÉ Au cours de la dernière décennie, l’hydro-informatique s’est progressivement développée dans le secteur de l’ingénierie de l’eau, complétée par des méthodes adéquates et des approches qui diffèrent souvent beaucoup des normes largement acceptées.
    [Show full text]
  • Information Systems Foundations Theory, Representation and Reality
    Information Systems Foundations Theory, Representation and Reality Information Systems Foundations Theory, Representation and Reality Dennis N. Hart and Shirley D. Gregor (Editors) Workshop Chair Shirley D. Gregor ANU Program Chairs Dennis N. Hart ANU Shirley D. Gregor ANU Program Committee Bob Colomb University of Queensland Walter Fernandez ANU Steven Fraser ANU Sigi Goode ANU Peter Green University of Queensland Robert Johnston University of Melbourne Sumit Lodhia ANU Mike Metcalfe University of South Australia Graham Pervan Curtin University of Technology Michael Rosemann Queensland University of Technology Graeme Shanks University of Melbourne Tim Turner Australian Defence Force Academy Leoni Warne Defence Science and Technology Organisation David Wilson University of Technology, Sydney Published by ANU E Press The Australian National University Canberra ACT 0200, Australia Email: [email protected] This title is also available online at: http://epress.anu.edu.au/info_systems02_citation.html National Library of Australia Cataloguing-in-Publication entry Information systems foundations : theory, representation and reality Bibliography. ISBN 9781921313134 (pbk.) ISBN 9781921313141 (online) 1. Management information systems–Congresses. 2. Information resources management–Congresses. 658.4038 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying or otherwise, without the prior permission of the publisher. Cover design by Brendon McKinley with logo by Michael Gregor Authors’ photographs on back cover: ANU Photography Printed by University Printing Services, ANU This edition © 2007 ANU E Press Table of Contents Preface vii The Papers ix Theory Designing for Mutability in Information Systems Artifacts, Shirley Gregor and Juhani Iivari 3 The Eect of the Application Domain in IS Problem Solving: A Theoretical Analysis, Iris Vessey 25 Towards a Unied Theory of Fit: Task, Technology and Individual, Michael J.
    [Show full text]
  • Information System Owner
    DOE CYBERSECURITY: CORE COMPETENCY TRAINING REQUIREMENTS Key Cybersecurity Role: Information System Owner Role Definition: The Information System Owner (also referred to as System Owner) is the individual responsible for the overall procurement, development, integration, modification, operation, maintenance, and retirement of an information system. The System Owner is a key contributor in developing system design specifications to ensure the security and user operational needs are documented, tested, and implemented. Competency Area: Data Security Functional Requirement: Design Competency Definition: Refers to the application of the principles, policies, and procedures necessary to ensure the confidentiality, integrity, availability, and privacy of data in all forms of media (i.e., electronic and hardcopy) throughout the data life cycle. Behavioral Outcome: The System Owner will understand the policies and procedures required to protect all categories of information as well as have a working knowledge of data access controls required to ensure the confidentiality, integrity, and availability of information. He/she will apply this knowledge during all phases of the System Development Life Cycle (SDLC). Training concepts to be addressed at a minimum: Identify and document the appropriate level of protection for data, including use of encryption. Specify data and information classification, sensitivity, and need-to-know requirements by information type on a system in terms of its confidentiality, integrity, and availability. Utilize DOE M 205.1-5 to determine the information impacts for unclassified information and DOE M 205.1-4 to determine the Consequence of Loss for classified information. Create authentication and authorization system for users to gain access to data based on assigned privileges and permissions.
    [Show full text]
  • Bioinformatics Careers
    University of Pittsburgh | School of Arts and Sciences | Department of Biological Sciences BIOINFORMATICS CAREERS General Information • Bioinformatics is an interdisciplinary field that incorporates computer science and biology to research, develop, and apply computational tools and approaches to manage and process large sets of biological data. • The Bioinformatics career focuses on creating software tools to store, manage, interpret, and analyze data at the genome, proteome, transcriptome, and metabalome levels. Primary investigations consist of integrating information from DNA and protein sequences and protein structure and function. • Bioinformatics jobs exist in biomedical, molecular medicine, energy development, biotechnology, environmental restoration, homeland security, forensic investigations, agricultural, and animal science fields. • Most bioinformatics jobs require a Bachelor’s degree. Post-grad programs, University level teaching & research, and administrative positions require a graduate degree. The following list provides a brief sample of responsibilities, employers, jobs, and industries for individuals with a degree in this major. This is by no means an exhaustive listing, but is simply designed to give initial insight into a particular career field that would employ the skills and knowledge gained through this major. Areas Employers Environmental/Government • BLM • Private • Sequence genomes of bacteria useful in energy production, • DOE Contractors environmental cleanup, industrial processing, and toxic waste • EPA • National Parks reduction. • NOAA • State Wildlife • Examination of genomes dependent on carbon sources to address • USDA Agencies climate change concerns. • USFS • Army Corp of • Sequence genomes of plants and animals to produce stronger, • USFWS Engineers resistant crops and healthier livestock. • USGS • Transfer genes into plants to improve nutritional quality. Industrial • DOD • Study the genetic material of microbes and isolate the genes that give • DOE them their unique abilities to survive under extreme conditions.
    [Show full text]
  • Information System Development Using Augmented Reality Tools*
    Information system development using augmented reality tools* Grigorev Rostislav Aleksandrovich Valijanov Bahrom Adhamdzon-ugli Kazan Federal University Kazan Federal University Kazan, Russia Kazan, Russia [email protected] [email protected] Medvedeva Olga Anatolievna Mustafina Svetlana Anatol’evna Kazan Federal University Bashkir State University Kazan, Russia Ufa, Russia [email protected] [email protected] Abstract This work is devoted to the issues of visualization and information processing, in particular, to improving the visualization of 3D objects using augmented reality technology. The concept of augmented reality offers a more advanced user interface for visualization due to a combination of natural ways to control the change of angle of an object and visualization in a real context. In the process of performing the work, computer graphics, algorithms, and modeling methods were used. The experimental part of the work was carried out using a set of development tools for tracking Vuforia and Unity development tools. Introduction Augmented reality (AR) is an interactive experience of a real-world environment where the objects that reside in the real world are enhanced by computer-generated perceptual information, sometimes across multiple sensory modalities, including visual, auditory, haptic, somatosensory and olfactory. AR can be defined as a system that fulfills three basic features: a combination of real and virtual worlds, real-time interaction, and accurate 3D registration of virtual and real objects. The overlaid sensory information can be constructive (i.e. additive to the natural environment), or destructive (i.e. masking of the natural environment). This experience is seamlessly interwoven with the physical world such that it is perceived as an immersive aspect of the real environment.
    [Show full text]