Mohammadreza Najaftorkaman

Learn More
One of the main applications of information and communication technologies in healthcare sector is Electronic Medical Record (EMR). EMR systems are expected to make benefits for healthcare providers, professionals and the health population as a whole. Actually, the EMR benefits cannot be achieved without the adoption of the system by users in the(More)
In the past three decades, several studies have extracted antecedents to the user adoption of health information systems (HIS). This study proposes a reflective pause on the HIS adoption literature to broaden our understanding of factors contributing to the user adoption of electronic medical record (EMR). This paper provides a comprehensive taxonomy of the(More)
The purpose of this paper is to systematically analyze the knowledge management research within small and medium-sized companies. The study includes a systematic review of 30 peer reviewed papers on knowledge management advantages for SMEs. Balanced scorecard perspectives cover all aspects of the organization, and, consequently, the balanced scorecard(More)
DNA cryptography is a relatively new paradigm that has attracted great interest in the field of information security. Although there are many problems in DNA cryptography, scientists are trying to solve them because they believe that, with the extraordinary information density and the vast parallelism that are inherent in DNA computers, it is possible to(More)
Strategic Information System Planning (SISP) has been a major concern for business and information systems (IS) managers since the 1980s. Past research has proposed several methodologies, processes and models which facilitate development of SISP in organisations. This paper employs a systematic literature review approach and studies 84 papers (which(More)
Computer-based decision support information systems have been promoted for their potential to improve physician performance and patient outcomes and support clinical decision making. The current case study reported design and implementation of a high-level decision support system (DSS) which facilitated the flow of data from operational level to top(More)
Intrusion Detection System (IDS) is the tool that is able to detect occurrences of intrusion at host, network, as well as application. One of the most common network attacks is Denial of Service (DoS) attack. In DoS attack, a single host will send huge number of packets to one machine and thus make the operating of the network and host slow. There are(More)
  • 1