Panel 9 Are There Barbarians at the Gates of Information Systems?
نویسندگان
چکیده
منابع مشابه
Novel Defect Terminolgy Beside Evaluation And Design Fault Tolerant Logic Gates In Quantum-Dot Cellular Automata
Quantum dot Cellular Automata (QCA) is one of the important nano-level technologies for implementation of both combinational and sequential systems. QCA have the potential to achieve low power dissipation and operate high speed at THZ frequencies. However large probability of occurrence fabrication defects in QCA, is a fundamental challenge to use this emerging technology. Because of these vari...
متن کاملInvestigating Challenges of agricultural knowledge and information systems (AKIS) in Iran with Delphi technique
Sustainable agricultural and rural development requires knowledge and information, skills, attitudes and technologies, which run through a network of actors to produce, distribute and use it in a particular place. The model of the Agriculture Knowledge and Information Systems (AKIS) is designed based on this recognition. In Iran, There are about decades of experience in the development of this ...
متن کاملThe opium war 1840–1842. Barbarians in the Celestial Empire in the early part of the nineteenth century and the war by which they forced her gates ajar
متن کامل
Factors Affecting the Technical Efficiency of Health Systems: A Case Study of Economic Cooperation Organization (ECO) Countries (2004–10)
Background Improving efficiency of health sector is of particular importance in all countries. To reach this end, it is paramount to measure the efficiency. On the other hand, there are many factors that affect the efficiency of health systems. This study aimed to measure the Technical Efficiency (TE) of health systems in Economic Cooperation Organization (ECO) countries during 2004–10 and to d...
متن کاملUsers as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کامل