Ograniczanie wyników
Czasopisma help
Autorzy help
Lata help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 183

Liczba wyników na stronie
first rewind previous Strona / 10 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  information systems
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 10 next fast forward last
EN
Background: Supply chain information systems (SCIS) have turned into a key success factor for the proper management of the automotive supply chain. Therefore, the scope of this paper is to explore the impact of SC information system infrastructure (SCISI) and SC information sharing (ISSC) on interorganizational trust (IOT), SC collaboration (SCC), SC agility (SCA), and SC performance (SCP) in the Moroccan automotive industry context. Methods: The dataset was drawn from a selected sample of Moroccan automotive industry firms through an online survey. Furthermore, the partial least squares (PLS-SEM) procedure was applied to test the conceptual model. Results: The findings support the positive influence of SCIS infrastructure on IOT and SC agility. Similarly, information sharing in SC positively affects the collaboration between IOT and automotive SC. The results also provide evidence that IOT plays a significant role in improving SC agility. Lastly, agility and SC collaboration were identified as key drivers of SC of performance. Conclusions: The findings extend the existing literature on SC management and management information systems by providing empirical verification of how information sharing and IS infrastructure can influence collaboration, agility, and SC performance. These findings are useful in guiding SC managers through the process of improving SC performance.
PL
W artykule przedstawiono podstawowe informacje na temat koncepcji „Zero Trust Architecture” oraz projekt i wykonane na jego podstawie narzędzie do wspomagania migracji systemów informacyjnych do „Zero Trust Architecture”. We wstępnej części artykułu opisano zwięźle koncepcję Zero Trust oraz przedstawiono wykonaną na bazie NSC 800-207 listę czynności niezbędnych do migracji systemów informacyjnych do wyżej wymienionej architektury. Następnie zaprezentowano procedurę praktycznego wykorzystania tej listy. Na końcu artykułu krótko opisano sposób implementacji wspomnianej procedury do postaci narzędzia wspomagającego migrację.
EN
The paper presents basic information on the „Zero Trust Architecture” concept and a project involving a tool designed to support the migration of information systems to this architecture. Initially, the Zero Trust concept is briefly described, followed by the presentation of steps based on NSC 800-207 necessary for migrating information systems to this architecture. Subsequently, the procedure for practically using this list is outlined. Finally, the implementation of this procedure into a migration support tool is described.
EN
European Commission has published a nearly 50-page-long document on cybersecurity in transport called the Transport cybersecurity toolkit. As part of the work of ISAC-Kolej (the Information Sharing and Analysis Center for the railway transport sub-sector), guidelines in terms of cybersecurity for the employees of the railway entities have been developed and adopted. This article briefly discusses the European and Polish activities taken in order to protect railway transport against cyberthreats and shares the guidelines for employees adopted by ISAC-Kolej. Considering the increasingly widespread use of digital solutions, both for supporting operations of the business entities that constitute the railway system and for railway traffic management and supervision, these guidelines should be disseminated to the maximum possible extent among railway employees that use computers in their work.
PL
Artykuł dotyczy monitorowania współczesnych sieci komputerowych. Działanie to umożliwia natychmiastową reakcję na różne nieprawidłowości w funkcjonowaniu infrastruktury teleinformatycznej czy naruszenia zasad bezpieczeństwa. Systemy monitoringu są obecnie wdrażane w każdej organizacji, niezależnie od jej wielkości czy profilu działania. Monitorowanie sieci jest niezbędnym wymogiem zwłaszcza w firmach, w których praca opiera się głównie na systemach informatycznych. Wiele firm wdraża tego typu rozwiązania w celu zminimalizowania problemów z infrastrukturą teleinformatyczną oraz poprawy wydajności sieci komputerowych i produktywności pracowników. W artykule przedstawiono proces implementacji jednego z najpopularniejszych systemów monitorowania współczesnych sieci komputerowych Nagios Core w wersji 4.4.5.
EN
The paper concerns contemporary computer networks monitoring. This enables immediate reaction to various irregularities in the functioning of the ICT infrastructure or breaches of security rules. Currently, monitoring systems are implemented in every organization, regardless of its size or activity profile. Network monitoring is a necessary requirement, especially in companies where the work is based mainly on IT systems. Many companies implement such solutions to minimize problems with the ICT infrastructure, and to improve computer network performance and employee productivity. The paper presents the implementation process of Nagios Core in version 4.4.5 –one of the most popular monitoring systems of modern computer networks.
5
Content available remote Innowacyjne rozwiązania w transporcie kontenerów
PL
W artykule przedstawiono historyczne ujęcie rozwoju technologii transportowej jaką jest kontener. Wskazano jakie rozwiązania są obecnie stosowane na terminalach aby skracać czas obsługi jednostek intermodalnych oraz zapewnić wzrost efektywności operacji manipulacyjnych. Przedstawiono inteligentne kontenery, które wyposażone są w liczne czujniki, które m.in. mogą śledzić trasę przejazdu kontenera. Autor przybliżył jakie działania są obecnie prowadzone przez organizacje rządowe i międzynarodowe w celu zapewnienia bezpieczeństwa ładunku podczas operacji transportowych. Zasygnalizowano kierunki zmian w zakresie konstrukcji kontenerów i systemów wspomagania informatycznego oraz jak branża logistyczna reaguje i powinna postępować w dobie rozprzestrzeniania się koronawirusa w przypadku kiedy wiele strategii firm będzie zrewidowanych o nowe zachowania konsumenckie.
EN
The article presents a historical perspective on the development of transport technology, i.e. a container. It was indicated what solutions are currently used on terminals in order to shorten the service time of intermodal units and ensure an increase in the efficiency of handling operations. Intelligent containers are presented, which are equipped with numerous sensors, which include can follow the route of the container. The author outlined what activities are currently carried out by governmental and international organizations to ensure cargo safety during transport operations. The directions of changes in the design of containers and IT support systems have been signaled, and how the logistics industry reacts and should proceed in the era of the spread of the coronavirus in the event that many companies' strategies will be revised with new consumer behavior
EN
To determine the memory volume of information systems (IS), it was proposed to use a stochastic model, based on the use of a queueing network with bypasses, known as an HM-network. This model includes the servicing of heterogeneous requests along with their volumes, the ability to change the volume of such requests with their passage of time and the possibility of finding computer viruses in them, and therefore servicing requests can be interrupted at some random time. The expressions were obtained for the expected total values of the volume of requests in IS nodes.
7
Content available remote Extended distributive contact lattices and extended contact algebras
EN
The notion of contact algebra is one of the main tools in mereotopology. This paper considers a generalisation of contact algebra (called extended distributive contact lattice) and the so called extended contact algebras which extend the language of contact algebras by the predicates covering and internal connectedness.
8
Content available remote Concept Blueprints Serving More Focused User Queries
EN
Information Retrieval is about user queries and strategies executed by machines to find the documents that best suit the user's information need. However, this need reduced to a couple of words gives the retrieval system (IRS) a lot room for interpretation. In order to zero in on the user's need many a IRS expands the user query by implicitly adding or explicitly recommending the users further useful terms that help to specify their information need. Queries often do not comprise more than a handful of terms, which, in turn, do not sufficiently represent the user's need. In this paper, we propose and demonstrate an approach that enables users to resort to implicitly more complex query expressions. We call these semantic structures concept blueprints. Furthermore, users have the possibility to define the blueprints on their own. The purpose of the blueprints is to spot more precisely the text passage that fits the user's information need.
9
Content available remote Computing Duals of Finite Gödel Algebras
EN
We introduce an algorithm that computes and counts the duals of finite G\"odel-Dummett algebras of k ≥ 1 elements. The computational cost of our algorithm depends on the factorization of k, nevertheless a Python implementation is sufficiently fast to compute the results for very large values of k.
10
Content available remote A simple crime hotspot forecasting algorithm
EN
Crime hotspot forecasting is an important part of crime prevention and reducing the delay between a 911 call and the physical intervention. Current developments in the field focus on enriching the historical data and sophisticated point process analysis methods with a fixed grid. In the paper we present a simple spatio-temporal point process allowing one to perform exhaustive (literal) grid searches. We then show that this approach can compete with more complex methods, as evidenced by the results on data collected by the Portland Bureau of Police. Finally, we discuss the advantages and potential implications of the new method.
11
Content available remote Outstanding Issues of Military Logistics in Ukraine
EN
The article presents an analysis of the definition of military logistics and historical and developmental analysis of military logistics in Ukraine. The current state and problems of military logistics in Ukraine are revealed. The approaches to application of Blockchain technology to military logistics are given. The article highlights the projected development of military logistics.
PL
Artykuł zawiera analizę koncepcji treści logistyki wojskowej, analizy historycznej i ewolucyjnej logistyki wojskowej na Ukrainie. Aktualny stan i problemy logistyki wojskowej na Ukrainie zostały ujawnione. Podano podejścia do stosowania blokady w logistyce wojskowej. Artykuł dotyczy prognozy dalszego rozwoju logistyki wojskowej.
EN
In the era of globalization, more and more threats to the IT systems of many global companies will be observed. More and more attacks are effective and the losses caused by intrusions are systematically growing. The problem of ensuring the security of networks and computer systems is one of the most important issues of modern computer science. Today, more research is being done around the world to ensure the security of operating systems and applications.
EN
To solve the problem of determining the volume of memory of information systems (IS), it was suggested to use a stochastic model based on the use of HM (Howard-Matalytski) - a queueing network with revenues. This model allows you to take into account the dependencies of the processing times of messages (claims) on their volumes, the possibility of changing the volume of messages over time, and also the possibility of getting computer viruses into it. In such cases the processing of messages in nodes can be interrupted for some random time. Expressions are obtained for the mean (expected) values of the total message volumes in the IS nodes.
EN
The intellectual information system for student knowledge assessment designed for owners of mobile devices based on Android operating system. The main purpose of the system is to make the process of student knowledge assessment faster and easier through automation of passing the test. The system also provides an additional opportunity for students to test their knowledge by themselves and receive explanations to the questions.
EN
One of the contemporary problems, and at the same time a challenge, with development und usage of supply chain Information Systems are the issues associated with privacy and cyber security, which emerged due to new requirements of legal regulations and directives. The human factor belongs to the biggest risks within these issues. Leak of information, phishing, unauthorized access are the main problems. Also vulnerability of the systems due to new information technologies is an important topic. In this paper we discuss development and usage of Information Systems with regard to the security aspects associated to the software development lifecycle. We present our approach on examples of a user authentication process in logistics.
PL
Przedstawiono pojęcie niezawodności systemów informacyjnych (SI) w organizacji. Niezawodność ta wpływa na zdolność rozwijania potencjału organizacji (zwłaszcza tego związanego z wykorzystaniem SI). W oparciu o teoretyczny model niezawodności SI w organizacji opracowany przez autorkę zaproponowano definicję pojęcia. Zweryfikowano model za pomocą badań empirycznych przeprowadzonych w 400 organizacjach działających w Polsce.
EN
The notion of information systems (IS) reliability in organization is discussed in the paper. Nowadays, when almost every organization operates using some kind of IS, its reliability seems to be one of the key factors influencing organization’s potential to develop. Definition of IS reliability in organization is proposed based on theoretical model of IS reliability in organization developed by the author. The model is verified using the empirical research based on statistical analysis of factors building IS reliability in organizations operating in Poland. The analysis is based on survey conducted among 400 organizations from Poland.
PL
W pracy omówiono zagadnienie kształtowania przestrzeni organizacyjnej jako odpowiedzi na zmiany wynikające z trendów rynkowych. Bodźcami rozwojowymi są innowacje, a w tym cyfryzacja, które są konsekwencją współpracy B+R+I. Systemy informacyjne mają zapewnić przewagę konkurencyjną zarówno w przemyśle, jak i usługach. Realizacja wsparcia w zakresie wymiany informacji rozwiązaniami informatycznymi wymaga zmian organizacyjnych. Rozwiązania te obejmując całość zagadnienia informatycznego wspomagania funkcjonowania podmiotu powinny uwzględniać jego specyfikę. Różne są oczekiwania poszczególnych uczestników rynku, wszyscy jednak oczekują efektywnego wsparcia informatycznego. Rozwój branż wymaga zróżnicowanych narzędzi. W usługach istotne są aplikacje wspierające obsługę klienta, a w przemyśle systemy zapewniające realizację procesów podstawowych. Korzystne dla podmiotu są rozwiązania dedykowane (IRI), które odpowiadając na rozpoznane potrzeby, umożliwiają sprawną organizację wymiany informacji. Ma to zapewnić podmiotowi efektywną obsługę końcowego odbiorcy.
EN
The work discusses the issue of shaping the organizational space as a response to changes resulting from market trends. Developmental stimuli are innovations, including digitalization, which is a consequence of R & D & I cooperation. Information systems are to provide a competitive advantage in both industry and services. The implementation of support in the field of information exchange with IT solutions requires organizational changes. These solutions, encompassing the entirety of the IT problem supporting the functioning of the entity, should take into account its specificity. The expectations of individual market participants are different. However, everyone expects effective IT support. The development requires various tools. In the services are important applications supporting customer service. In industry are important systems that ensure the supporting of basic processes. Beneficial for the entity are dedicated solutions (IRI) that respond to identified needs, enable efficient organization of information exchange. This is to provide the entity with effective service to the final recipient.
18
Content available Social perception of digitization in Germany
EN
Today’s industry is historically shaped by the transformation from a seller’s market to a buyer’s market. Taylor and Ford are the pioneers of mass production. This principle is still used today in the production of goods. However, in this time companies face the increasing competitive pressure and the circumstances of this buyer’s market through strong product differentiation and the development of new markets. Within this change, new challenges arose which made economic production more difficult. These include, for example, decreasing batch sizes and the parallel coordination of various orders due to the strong diversification of the product range. The consequences are increased throughput times and a decreasing adherence to delivery dates [20]. Digitalization enables the planning and control of production to be simplified and made more agile in order to meet the requirements of customer-specific production. Business processes can be made transparent, more efficient and more effective through digitalization and should allow companies to increasingly deal with the actual value-adding activities such as product development in the future [18]. This review examines the understanding of digitization in german economy. Furthermore, the importance of digitization in society is presented.
EN
This study provides a systematic review of the existing academic literature describing the key components of eMaintenance. The current literature is reviewed by utilizing a number of academic databases including Scopus, SpringerLink and ScienceDirect, and Google Search is used to find relevant academic and peer-reviewed journal articles concerning eMaintenance. The literature describes eMaintenance as an advanced maintenance strategy that takes advantage of the Internet, information and communication technologies, wireless technologies and cloud computing. eMaintenance systems are used to provide real time analyses based on real time data to offer a number of solutions and to define maintenance tasks. The collection and analysis of appropriate maintenance and process data are critical to create robust ‘maintenance intelligence’ and finally improvements in manufacturing costs, safety, environmental impact, and equipment reliability. This paper describes how the scientific discussion on eMaintenance has expanded significantly during the last decade, creating a need for an up-to-date review. As a conclusion, three research gaps in the area of eMaintenance are identified, including evaluating the benefits of eMaintenance, agreeing on a comprehensive definition, and developing tools and structures for cooperative eMaintenance.
EN
To solve the problem of determining the memory capacity of the information systems (IS), it was proposed to use a stochastic model, based on the use of HM (Howard-Matalytski) - queueing networks with incomes. This model takes into account the servicing of requests along with their volumes, the ability to change the volumes of the requests over time and the possibility of damaging IS nodes and their repairs, so servicing of demands can be interrupted randomly. The expressions are generated for the mean (expected) values of total requests volumes in the IS nodes.
first rewind previous Strona / 10 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.