- Full text PDF available (6)
- This year (0)
- Last 5 years (1)
- Last 10 years (6)
Journals and Conferences
The major benefits of knowledge management, particularly as it pertains to security measures, makes it critical that organizations have a mechanism for defining and identifying knowledge needs.
BACKGROUND In this exploratory research, we use panel data analysis to examine the correlation between Information and Communication Technology (ICTs) and public health delivery at the country level. OBJECTIVE The goal of this exploratory research is to examine the strategic association over time between ICTs and country-level public health. METHODS… (More)
The digital automation of health information has traditionally focused on the formal implementation of electronic health records (EHRs). Most of these EHR systems are relational databases that focus on intra-enterprise applications; very few have become fully functional, scalable, distributed systems with interoperability. This article identifies the design… (More)
Communication networks now play a critical role in our lives. The failure of these networks can cause serious financial and other losses in our lives. Therefore, it is imperative that communication networks are properly planned and designed. In this paper, we use the Network Development Life Cycle (NDLC) to facilitate a critical review of some of the… (More)
A model for software maintenance based on the Human Information Processing (HIP) model has been developed and tested. Based on the results, recommendations for further research as well as for practitioners have been made.
Security threats to IT systems have become extremely dynamic, requiring a rapid response. Because of this, traditional life cycle approaches to IT security may not work. Agile methodologies provide a framework for rapid response in a dynamic environment. This paper discusses the fundamentals of agile methodologies and how they can be applied to IT security.