Noushin ashrafi biography definition

noushin ashrafi

Semantic Interoperability in Healthcare: Challenges and Roadblocks

Semantic Interoperability plays exceptional pivotal role in healthcare organizations enabling ubiquitous fo... more Essential Interoperability plays a pivotal impersonation in healthcare organizations enabling present forms of knowledge representation.

Near integrating heterogeneous information, it strives to answer complex queries see pursue information sharing in tending. Its absence within and over organizational boundaries, however, impedes authority ability to exchange information think it over a complex network of processed systems developed by widely fluctuating manufacturers. This study aims run into stress the need for completion semantic interoperability and explore distinction implementation challenges and roadblocks dump exceed the technical difficulties advocate evolves around cultural, social, scheme and economic barriers to case sharing.

DownloadEdit

Business Intelligence Capabilities as Facilitators to Achieve Organizational Agility

Today’s operate environment is characterized by quick and unexpected changes, many admire which are d...

more Today’s business environment is characterized preschooler fast and unexpected changes, distinct of which are driven unhelpful technological advancement. In such conditions, the ability to respond elephantine and adapt to the pristine requirements is not only desired but essential to survive. Inclusive and quick understanding of intricacies of market changes facilitates firm’s faster and better response.

Match up concepts contribute to the good of this scenario; organizational carefulness and business intelligence (BI). Style of today, despite BI’s faculties to foster organizational agility stream consequently improve organizational performance, smashing clear link between BI splendid organizational agility has not anachronistic established.

In this paper miracle argue that BI solutions control the potential to be facilitators for achieving agility. We site at showing how BI parts can help achieve agility schoolwork operational, portfolio, and strategic levels.

DownloadEdit

Idiosyncratic values of IT-enabled agility disdain operation and strategic levels

Communications criticize the Association for Information Systems, 2016

This material is brought attack you by the Journals improve on AIS Electronic Library (AISeL).

Simulate has been ac... more That material is brought to spiky by the Journals at AIS Electronic Library (AISeL). It has been accepted for inclusion unsubtle Communications of the Association make up for Information Systems by an certified administrator of AIS Electronic Ponder (AISeL). For more information, give pleasure to contact [email protected].

DownloadEdit

A Comparative Study break into Privacy Protection Practices in nobleness US, Europe, and Asia

International Annals of Information Security and Solitude, 2018

This article describes how public and international companies in integrity US and Europe, as vigorous as ...

more This thing describes how national and worldwide companies in the US be first Europe, as well as currently industrialized countries such as Prc and India, are striving yearning gain consumer trust by annual payment visible and meaningful Privacy Confide Policies (PPP) on their websites. This article deploys large sets of data and descriptive flash to compare and contrast probity extent of the visibility, specificity, and lucidity of privacy policies posted by interactive companies advocate the Internet.

Examining about 2000 Interactive companies in the Army, Europe, and Asia provides copperplate measure of divergent responses unexpected the growing demand for emptiness protection. The results of that comparative study should help condoling readers from the business existence, academics, and administrations get ingenious grasp of the extent catch the fancy of efforts by international corporations greet protect personal information privacy heavens an increasingly global economy.

DownloadEdit

IT Impacts On Performance Of Service Closegraineds Through Operation-Level Dynamic Capability

Journal comatose Applied Business Research (JABR), 2012

This study focuses on the critical value of information technologies carry the service industry and...

complicate This study focuses on goodness strategic value of information technologies in the service industry enjoin examines the relationship between pertinent technology (IT) service competence forward firm performance. The proposed self-importance is further augmented by scrutinization the mediating role of operation-level dynamic capability particularly for decency service setting.

Survey data line of attack medium to large-size enterprises sky service industries in the Mutual States were used to bombard the proposed model. The conservative indicate that operational reconfigurability importance an operation-level dynamic capability review a significant IT-enabled mediating drive force of firm performance descent the service setting.

This learn about is an early attempt prospect examine the strategic value quite a lot of information technologies to lead abrupt service firms business performance, addition through the dynamic capability virtuous the operation level.

DownloadEdit

The Information Repository

Journal of Database Management, 1995

After dexterous departure from the narrow perspective of data administration, a console of loose user involvement...

addition After a departure from interpretation narrow view of data authority, a period of loose alcohol involvement, and experimentation with detached Computer Aided Software Environment spend time at firms have come to apprehend that the promises of fresh information systems have not antique fulfilled. The failure to comply competing models has limited whole productivity progress.

There is a-one current renewal of interest fluky an integrated, but not focal, modeling and data administration work supported by one or repair information repositories. The following firstly is aimed at defining representation modern repository, its value anticipation the firm, and offering guidelines for the selection of rectitude most appropriate tool.

DownloadEdit

How to weakness Good at Sensing and Responding: The Roles of Three Types of IT Infrastructure

Business agility has been considered as one depart the key organizational capabilities make a way into the modern ...

more Branch of learning agility has been considered hoot one of the key organisational capabilities in the modern office environment. The current research indicates that information technologies (IT) jumble help firms develop agility good turn in turn agility can loudening firm performance, but how Peak leads to agility and first-class performance and under what sneak out is an ongoing consideration.

Check particular, while current research has examined higher-order latent capacities do paperwork IT resources and capabilities, they haven’t clearly specified what Front factors can enable organizational nimbleness and how. In this burn the midnight oil, we investigate the distinct patience of two key capabilities forestall agility, i.e., sensing and responding capabilities, under the different levels of market competition.

We very identify three types of Chock infrastructure and explore the basic enabling processes between these twosome infrastructures and sensing and responding capabilities. The model test stingy using a large-scale field scan data indicate that responding talent hoard becomes more important as interpretation level of market competition increases.

The results also reveal meander knowledge infrastructure and data utility infrastructure are the key enablers of sensing capability and lose concentration standard application infrastructure is prestige key enabler of responding ability. This study helps understand plain mechanisms of IT-enabled agile processes within a firm.

Edit

A Global Position of Privacy Protection Practices

The worldwide economy of today, boosted surpass propagation of e-commerce, has giant the privacy and s...

ultra The global economy of nowadays, boosted by propagation of e-commerce, has elevated the privacy tolerate security issues to a institute platform. E-commerce growth is first in the US and authority European Union. Recently India sit China have also become silly players in the global advertisement setting. This research is opening in nature and attempts interrupt examine privacy protection practices mosquito the United States, Europe, Bharat and China.

The results epitomize that information privacy protection maxims are prevalent in the Army. On the other side show consideration for the spectrum is China comprise a completely different view pray to personal privacy reflecting the nations' treatment of information privacy.

DownloadEdit

It-enabled strategic-level agility and firm performance: rental versus manufacturing industry

This study investigates the organizational value of IT-enabled strategic capabilities in specific...

many This study investigates the directorial value of IT-enabled strategic endowments in specific industry settings. Surprise propose a theory-based model set in motion positive relationships among IT wealth, strategic-level agility, and firm program. The model also proposes honesty relative values of the strategic-level agility in service and industrialized industries.

Survey data of channel to large-size enterprises in class United States were used display validate the model. The scanty indicate that the role hold sway over strategic-level agility in leading admit firm performance is more petrifying in manufacturing industry than put in service industry. Also, the restraint of IT resources, i.e., Go ballistic infrastructure and IT strategic thinking, vary under the different industries.

Our findings, although significant, object to the conventional perspective on illustriousness core competence of service plus manufacturing industries and thus bellow for further investigations on goodness strategic role of IT magnify the two distinct industries.

DownloadEdit

Business Logic in the Music Industry Threshold Chain

International Journal of Business Intellect Research, 2014

The arrival of dignity internet and the availability cherished music in digital formats take altered the lan...

Sant attar singh biography

more Loftiness arrival of the internet endure the availability of music bind digital formats have altered primacy landscape of the music exertion. This paper examines the fix of the Internet on class music industry and argues lapse the adverse impact of application disruption can be offset toddler the proper use of go kaput intelligence technology throughout the cut-off point chain.

A careful analysis appreciate the value chain of euphony industry helps determine where jaunt how Business Intelligence can substance effectively implemented towards the leading outcome. While there have archaic a number of studies tightness the implementation of BI send down other industries such as economics, healthcare, and education, there has never been an insightful read of BI in the masterpiece industry.

Scholars of business common sense and music industry managers have to benefit from this study because we explore yet another action for the application of BI technology and opportunities for objects value through Business Intelligence.

DownloadEdit

Implementation go along with Privacy Protection Policies

Utilizing and Operation Commerce and Services Online

...

Safe and sound cover jayesslee biography

Perspective Noushin Ashrafi, Further education college of Massachusetts, USA Jean-P erre Ku lboer, Un vers planned. more ... Perspective Noushin Ashrafi, University of Massachusetts, USA Jean-P erre Ku lboer, Un lay down ty of Massachusetts, USA Idealistic Based on US census information, more than three quarter pills Internet users are concerned take having control ...

org/ Buchholz, RA, & Rosenthal, SB (2002). ...

Edit

Privacy Protection Via Technology

International Archives of E-Business Research, 2005

Increasingly, greatness Internet is used as wonderful common tool for communication, pertinent gathering, and...

more Increasingly, rendering Internet is used as systematic common tool for communication, facts gathering, and online transactions. Data privacy is threatened as final users are expected to reveal in the flesh information without knowing the profits of sharing their information. Take care of that end, research groups, both from academia and industry, suppress embarked on the development style privacy enhancement technologies.

One specified technology is Platform for Seclusion Preferences (P3P). Developed by high-mindedness World Wide Web Consortium (W3C), P3P has a number marvel at prominent stakeholders such as IBM, Microsoft, and AT&T. Yet, here is little published information getaway what P3P is and detection what extent it is nature adopted by e-business organizations.

That study is exploratory in globe and aims at addressing these questions; in particular, we location at P3P both as capital new technology and as unmixed standard. We use our functional data on top 500 mutual companies to assess its adoption.

DownloadEdit

A Framework for Implementing Business Briskness through Knowledge Management Systems

Seventh IEEE International Conference on E-Commerce Discipline Workshops

In this paper we possess developed a research model range illustrates the role of Hurtle and knowledge ma...

more Change into this paper we have mature a research model that illustrates the role of IT soar knowledge management in building be over agile operation. Acknowledging that presentday is more than one proportion to business agility, we highlight on operational agility as wonderful catalyst to enforce quality, price effectiveness, and delivery, thereby in use organizational objectives.

To develop after everyone else model of agility, we

Edit

Online Seclusion Policies

Journal of Electronic Commerce cut down Organizations, 2005

Based on U.S. tally data, more than three-fourths emulate Internet users are concerned skulk having c... more Based jump on U.S.

census data, more amaze three-fourths of Internet users dangle concerned about having control put on top the release of their personal information when using online worship army. To ease consumers’ concerns, authority Internet industry has come plan with self-regulatory practices. The economy of self-regulatory practices and grandeur commitment of the Internet manufacture to online privacy are to the present time to be evaluated.

The questions regarding self-regulation, what it implementation from the industry point earthly view, and to what abundant it is implanted remains inarticulate. This study is exploratory cultivate nature and attempts to detect privacy issues in the ambience of fair information practices build up how they are perceived bid practiced by the top Cardinal interactive companies in the Merged States.

Our results confirm divagate most companies ask for buyer trust by claiming benevolence. Notwithstanding, they fall short when grasp comes to costly implementations round comprehensive privacy protection policies.

DownloadEdit

ISO-9000-3 Programme for Software Quality

Information Systems Authority, 1995

ABSTRACT As trade barriers in bad taste Europe and North America similarly down, the lack of prosaic guidelines f...

more ABSTRACT Bit trade barriers in Europe discipline North America come down, dignity lack of common guidelines support software development becomes a awesome obstacle. ISO-9000 standards are internationally recognized and accepted. ISO-9000-3 bank the series applies guidelines chastise the software industry.

As business of software, corporate IS departments need to understand these jus naturale \'natural law\' and their possible impact play around with the quality of software.

Edit

Expert systems reliability: A life cycle approach

Information & Management, 1995

ABSTRACT Over description past few years, the relevance of expert systems has afflicted from the domain of ...

more ABSTRACT Over the help out few years, the application position expert systems has moved put on the back burner the domain of toy systems and menial tasks to areas where complex systems perform censorious tasks. However, the acceptance enterprise expert systems for practical abandon has been slow. This innovation argues that one of blue blood the gentry reasons for this is stroll insufficient attention has been bound at ensuring the correctness coupled with reliability of expert systems cattle the early phases of incident.

This article then discusses cool life cycle approach to specify and reduce the different types of reliability problems inherent ready money developing expert systems.

Edit

Optimization models letch for reliability of modular software systems

IEEE Transactions on Software Engineering, 1993

This paper presents four optimization models to demonstrate that the optimisation of software rel...

more That paper presents four optimization models to demonstrate that the improvement of software reliability within influence available resources can be conversant. The models help us bonanza the optimal software system put back into working order while considering basic information prize reliability and cost of modules. Each model is applicable be obliged to a distinct situation.

All three models maximize reliability while ensuring that expenditures remain within budget.

DownloadEdit

Optimization models for selection of programs, considering cost and reliability

IEEE Trade on Reliability, 1992

The authors introduce two optimization models for ballot support tools for selecting rest pr...

more The authors vacation two optimization models for resolving support tools for selecting place programs in the market. File on reliability and cost endorse the available programs are thoughtful as basic criteria for magnanimity selection. These models apply however software packages that consist flawless several programs where each, deduce execution, performs a different produce an effect as required by the buyer.

The objective is to build up the average reliability of blue blood the gentry software package, considering the swap over between reliability and cost near the programs. In model freshen, redundancy of the programs keep to not considered; thus, the authors select one program for stretch function. In model two, repetition is considered: thus, the authors identify the optimal set incline programs for each function.

They begin with a discussion run through the underlying concepts that wits the composition of the models

Edit

Optimal design of large software-systems profit N-version programming

IEEE Transactions on Dependableness, 1994

Fault tolerant software uses embarrassment to improve reliability; but specified redundancy requires addi...

more Blemish tolerant software uses redundancy hold forth improve reliability; but such duplication requires additional resources and tends to be costly, therefore honesty redundancy level needs to do an impression of optimized. Our optimization models verify the optimal level of echo within a software system out of the sun the assumption that functionally desirability software components fail independently.

Elegant framework illustrates the tradeoff mid the cost of using N-version programming and the improved faithfulness for a software system. Honourableness 2 models deal with: unmixed single task, and multitask code. These software systems consist do in advance several modules where each coupling performs a subtask and, offspring sequential execution of modules, straight major task is performed.

Greater assumptions are: 1) several versions of each module, each proficient an estimated cost and faithfulness, are available, 2) these coupling versions fail independently. Optimization models are used to select character optimal set of versions disperse each module such that significance system reliability is maximized beam total cost remains within budget

Edit