This paper conducted a comprehensive research of communications encryption method in the power informationsystem. We firstly designed the encrypted application architecture. Afterwards, we studied the confidentiality and non- repudiation protection methods for the communication data. And last, we discussed the communication mode for the power informationsystem. It was proved that communication encryption technology can effectively protect communication data from being tampered or eavesdropped and can improve the overall safety level of the power information systems.
reporting and data storage is likely to be inefficient. Similarly, the implementation of accounting and reporting systems as well as the application of informationtechnology. The use of too many digits that lead to waste in preparing the report and accounting as well as in the use of memory on a variety of IT devices. From the facts above, Jams A.Hall (2011: 11) argues that the information is not just a set of facts which are processed and arranged in a formal report, the information allows users to take action in addressing the problem, reduce uncertainty, and in making decisions. Understanding the economic events that occur as a result of the company's interaction with the environment can be done by the company day to day organization (Azhar Susanto, 2003: 64). The purpose of accounting information systems, namely as a provider of information for daily operations (Wilkinson, 1996: 5). InformationSystem is designed properly, can add value to the organization by: improving the quality and reducing the cost of the product or service, increase efficiency, knowledge sharing, improve the efficiency and effectiveness of the supply chain, improve the internal control structure and improve decision making (Romney, 2015: 37 -38). More (Nanci, 2010: 15) argues that the main purpose of financial accounting informationsystem is to provide relevant information to individuals and groups outside the organization-for example, investors, federal and state tax agencies, and creditors. Sub SIA system to process a wide range of financial transactions and non-financial transactions which directly affect the processing of financial transactions consist of transaction processing systems, general ledger system / Priok financial statement, management reporting system (Hall, 2011: 7-9
ABSTRACT: Accounting InformationSystem is essential to all type of organizations nowadays. The economic and industrial scenario in the recent past has been changing rapidly both in India and elsewhere. Especially, the growing intensity of competition has forced corporate sector to establish more innovative production and communication systems. To the modern business, the information flows are as important to the life and health of the business as the flow of blood is to the life and the health of the individual. As such the managerial functions centers around its decision making capabilities of the organization towards its cherished goal. This would not be possible without having adequate knowledge which in turn depends on relevant information. All over the world, Information and communication Technology (ICT) is playing an increasingly important role in both business and individual’s private lives. This is the era of Information and Communication technology and informational technology has touched
The AIS should be tailored to the company's circumstances. The existence of such systems can assist the tasks of related organizational units. Good AIS can be done manually, can also use technology in accordance with the size and needs of the company (Hall, 2011). As a consequence of human limitations and growing companies, nowadays AIS almost exclusively he use of computer technology and software to This study examines the problems encountered by one of Four Stars hotel in Bali. The hotel now has been using computerized AIS for more than ten years. Two gement decided to change its accounting informationsystem and started using new software. However, currently, the company management feels the need to assess the quality of information generated by the new system, as changing of system incurs high cost. This study aims to assess the quality of informationtechnology from AIS used by this hotel and will refer to methodology that was . The method used is an AIMQ that is modified to fit the needs of the Hotel. AIMQ method provides ous and pragmatic basis for IQ assessments and benchmarks (Lee, Et, al., 2000).
Business processes in the organisations are increasingly dependent on information systems (IS) to capture all business activities that occur daily. The IS implemented in the organisation must be of sufficiently high quality that use of the system fulfil the need of all interested parties. For example, user acceptance can leads to system usage. It is because the primary nature of users' work has changed, converting manual into computerised processes, that qualify of use becomes every more important. Hodgson & Aiken (1998) and Keil et al. (1995) make it clear that informationsystem managers must consider the human issues as well as technical issues. 'Users' here means those who use the system directly as part of their job function or those who make use of the outcomes produced by the system (Hartwick & Barki, 1994). User acceptance of informationtechnology in the workplace remains complex and an important issue (Venkatesh & Davis, 2000). If the everyday experience of using IS is poor, user acceptance becomes low and the relationship between investment in informationtechnology and organisational effectiveness will be jeopardised (Agarwal & Prasad, 1997).
According to Odunfunwa (2008), informationtechnology is a body of tools, with the convergence of communication and computer. Goldberg (2008) describes informationtechnology as series of machine, which can execute sequences of instructions. The sequence of instructions is a programmed made particularly flexible and not rigid and can be changed depending on the information being processed. Explains that the phrase “information technologies” used to encompass a range of new technologies and their applications, including all aspects of the use of computers, micro-electronic devices, satellite and communication technology. What is news, is that many professions in developing countries like Nigeria do not seem to be ready or prepared to embraced this informationtechnology or revolution and join its superhighway as a means for survival and that many practitioners are among such laggards. Ehindiamen (2008) describes this as quite unfortunate because the world of business and governance in the information age is further complicated by such concepts like democratization, competition, deregulation, privatization, commercialization, liberation, globalization, internalization and computerization. That makes it impossible for an organization or country to survive and develop. Apparently, Laudon and Laudon (1999) states that computer and other technologies have found their way into all areas of business,
Data integration is a critical process in an Integrity Management Plan (IMP). It will still take several years to have a fully implemented pipeline integrity process. GIS technology has already proven itself as a key-element to successfully manage the data necessary for a pipeline integrity management program (Palmer, 2004; and Mahmud & Chai, 2003b), such as wave modelling (Yaakob, 2003); internal inspection with PIGs (Porter & Parsons, 2000; and Czyz, et al, 2000); sonar scanned images (Rasmussen, 1998) and external video tracking system (Rasmussen, 1998).
Response time on orders of customers is becoming a critical issue to achieve a competitive advantage. This thesis presents an Expert System for simulating order processing activities, providing control over the order processes and reporting the orders status online. Managers would have control on orders transactions, and workshop floor supervisors could monitor and control the orders processing online. An informationsystem model is to be designed, and a prototype is to be developed. A case study is to be conducted to prove the developed prototype system. The assumed activities to be covered within this system; procurement, inventory control, accounting, shipping and customer relationship management (CRM).
Information systems are essential tool affect on the organization as a whole. There are many theories in information systems adoption such as Technology Acceptance Model (TAM), Delone and McLean IS success model , Theory of Planned Behavior, unified theory of acceptance and use of technology (UTAUT), diffusion on innovation theory (DOI), technology organization and environment framework (TOF), computer usage model, and personal computing acceptance model. In this study, we will use the theories that focus only on technology characteristics, organizational characteristics, and people characteristics .The used theories in this study are technology acceptance model ,IS success model ,computer usage model, and personal computing acceptance model . Optional reason for TAM model and Delone and Mclean model is these models is the popular models in informationsystem success and technology adoption. Optional reason for personal computing acceptance model ,and computer usage model is these model is most related to this study.
It can be concluded that technical factor of a healthcare organization is an important variable that explains, to a great extent, the variation in integrating HMIS in Kenya. Therefore Integration of HMIS in Kenya can be achievable if all the identified study variables were taken into account and improved. The main reason as to why integration of HMIS in Kenya Healthcare organization has not been achieved is because paper based information systems are still greatly in use, therefore hindering systems interoperability. Internet connectivity, power, skilled staff, computer hardware and software are still inadequate in the facilities in Kenya, yet technical factor is the foundation of getting health management information systems integrated. This means that those HCO that are able to adapt to technology in line with the changes in the environment are able to achieve efficiency in their operations by getting there systems integrated. Therefore the HCO should always endeavor to properly develop the IT infrastructure and adopt electronic health management informationsystem.
The main of InformationTechnology policies is controlling the accessibility of information where the rules and regulations of the company apply in the control. It also ensures the reliability and the authenticity of the information gotten from the company. The policy makes sure that the information can be easily accessed by the people who are authorized to access it when they need it. In an aim of determining the impact of informationsystem security policies and controls on firm operation enhancement for Kenyan Small and Medium Enterprises, Ogalo (2012) conducted a study in Kisumu central business district where he surveyed a targeted population of 481 SMEs in Kisumu. In his findings, he discovered the need for organizations to create strategies that give importance to ICT infrastructure investment and management. After formulating the strategies there follows the establishment of directions on putting into action and controlling them. In addition, regular checkups are important for early detection of any problem that may arise and adversely affect the ICT programs (Ogalo, 2012)
This research utilised existing spatial geographic informationsystem (GIS) technology to develop a data management system that was beneficial to health care practitioners and organisations. The research focused primarily on a public hospital environment by addressing the complexity of patient flow and/or patient allocation to a hospital bed and to provide an understanding of how to better manage the needs for future demands.
Based on technology diffusion or adoption process theories , the critical issue is related to the mental process of accepting new ideas and practices. Therefore, it is important to better understand the user acceptance of factors that could influence user acceptance of e-Government system. As explained above, there are several acceptance models that have been widely used to explain the user acceptance of InformationSystem such as TAM, UTAUT, etc. TAM is still one of the most frequently tested models in informationsystem literature and has been applied in various samples of users in a wide range of informationtechnology . Many scholars have revised the TAM to enhance its interpretation abilities. In the e-Government context, Putra (2008) examines the behaviour of interest in city government officials in using e-government system with TAM approach. Putra (2008) mentions that the TAM model can be used in the context of e-Government considering that e-Government is also part of the informationsystem . Jaeger & Matteson (2009) and Al-adawi (2005) seeks the technology acceptance factors to understand the process government agencies adopting e-Government . Navarro (2014) extended TAM framework to confirm the explanatory power of attitude towards a technology on citizen engagement in e- Government services .
exchange and sharing of resources between the various libraries, to form a covering of a huge network of information resources. This can not only make the library itself improved, but also provide customers with more comprehensive information services. On the other hand, build is people- oriented service social institutions. The library itself is the public agency to provide services for the community, after establish informationtechnology library, the library should use their own system of information management services provide users with a variety of personalized services to meet community information different needs.
telecommunications, transportation, environmental protection, planning, land, natural resources, national defense, public security, aerospace, commercial and other fields, and has become a number of local government departments to manage geographic information standards. This paper uses ESRI's ArcGIS Server to realize Web-based campus geographic information visualization management and analysis. ArcGIS Server is ESRI's Web Map Server product, which represents the cutting-edge development of today's WebGIS technology and enables developers and system designers to implement a centrally managed GIS. A single, centrally managed GIS application (web application) can reduce development costs, support multiple users, and reduce the cost of installing and managing desktop applications on client machines.
Farmers are plagued by myriad issues such as timely and reliable access to farm inputs, access to markets, access to reliable information at the right time and cheap access to credit. The proliferation of mobile phones across the globe has impinged on agriculture in various ways. Mobiles are being used to help raise farmers’ incomes, making agricultural marketing more efficient, lowering information costs, reducing transport costs, and providing a platform to deliver services and innovate. The role of mobiles in enhancing food security and supporting rural livelihoods is increasingly being recognized and was officially endorsed at the World Summit on the Information Society (2003-2005). Several countries in Africa and Asia are now using mobiles for the dissemination of agricultural knowledge and information. Ethio Telecom currently provides mobile telephone service to approximately 50 million subscribers and aims to provide mobile telephone service to a total of 91 million subscribers, which is nearly double the number of current mobile users. Broadband internet data subscription will grow to 39 million from the current 1.46 million subscribers. Mobile internet data coverage will also grow from 8 million to 16.9 million users, while overall internet data coverage will grow to 10 per cent from the current 3.3 percentage. The most notable opportunity in Ethiopia is the presence of ICT infrastructure called the Woredanet that can be easily extended to reach most of the rural farmers and to further strengthen the research-extension- farmer linkage. The challenges of access to ICT can be divided into two: (i) access to ICT infrastructure and (ii) access to ICT services. The access to ICT infrastructure in Ethiopia is still very low despite some noticeable improvements registered in recent years. Damages on fibre optic cables and power interruptions are among the challenges the service provider faced in its expansion and network quality improvement efforts. However, the power of mobile phone technology in agriculture is its ability to catalyse a wide range of interventions that are core to transforming the sector.
As shown in Table 6, the event unavailability of the main Internet access was classified with a low probability, due to having occurred only twice in the period from 2012 to 2018. The consequence of this event, according to the criteria set out in Table 3, was classified as mean, since one of the impacts will be the unavailability of access to the judicial process system (e-Proc) by the external public. Although the e-Proc is one of the main systems of the Judiciary Tocantinense and its unavailability generate delays in the process progress, in general the risk of the unavailability of the main Internet link was considered medium because it is not of difficult recovery. Another example of the event listed in Table 6 is fire in the Data Center. Its probability of occurrence was classified as mean because there are no efficient and effective controls to mitigate this threat. Although it has never occurred before, it is not impossible that at some point this will occur, since the recent history of fires in the building of the Court of Justice of the State of Tocantins brings an incident that occurred in August 2018. Its consequences were classified as high, because they generate a significant impact on the objectives of the Judiciary Tocantinense. Thus, by applying the established criteria, the risk is considered high and impacts in an important way in the jurisdictionalservices. For the evaluation process, criteria were established for prioritization and treatment associated with risk levels as exemplified in Table 7. The documentation of this step usually consists of a list of the risks that require treatment, with their respective classifications and priorities. For each risk classified in the analysis stage, the criteria contained in Table 7 were applied. They were prioritized according to the level of risk and their probability
Secondly the number of teachers sampled in both public and private schools appear to lack necessary skills and computer literacy that would have enabled them develop interest, confidence and imperative motivational acumen for a typical 21 st century Physics teacher. The above scenario leaves one with no other alternatives than to revert to the old traditional monde system of teaching and learning that had reduced the educational system in Eleme in particular and Nigeria at large to its current “apparent low standard”. It was observed that hypothesis 2, Table 4.8 which states “there is no significant effect between the level of the qualifications and skills of instructors in the use of ICT resources in electronic learning- education compared with traditional course system” succeeded due to its relative comparison with traditional methods of knowledge delivery. It points out that with the traditional mode of teaching and learning physics, skills and qualifications in computer or any other ICT are insignificant. Hypothesis 3 in Table 4.9 concludes that “there is no significant effect on applications of ICT resources to teaching and learning by Physics teachers in both public and private secondary schools in Eleme LGA” and it buttressed the above fact with particular reference to Eleme. Lastly the investigation identified an array of challenges that are hindering the progress of ICT applications by Physics teachers to secondary schools in Eleme LGA. They are listed below in Table 5.1.
The Internet of things control system security mainly includes three aspects. The first is access security. Due to the widespread of Internet of things, anyone, at any time and any place, can access to the control system of service providers through the Internet of things, and monitor and operate the bottom generating equipment, which is obviously not reasonable. This requires shielding of unauthorized users and only allowing authorized users to access security. The second is transmission security. In the communication process of control system of authorized users and service provid- ers, illegal attacker can monitor the transmission information of cable network and wireless network, and steel and tamper important information. It leads to a leakage and relief of trade secrets and decrease in manufacturers’ credit, which will bring a huge threat to authorized users and manufacturers. To solve this problem is one of the basic things to implement Internet of things control system. The last one is the stabil- ity and the safety of delay. In the process of Internet of things transmission, infor- mation will go through the wireless network and wired network. Therefore, it will bring the transmission delay and decision treatment time delay. As a result, it may cause a threat to the stability of the whole control system, which is one of the prob- lems that need to be solved for implementing Internet of things control system.
The JUS ISO 9001:2001 standard has been used as the basis or the starting point for the analysis and the requirements that have been identified as the most critical and of highest priority from the point of view of the nonconformities emergence in support of the improvement. An accurate picture of the weaknesses in organizations, i.e., of places where the advancement should be done for the purpose of improving the overall quality management systems performance is