Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We condu...Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We conducted a systematic integrative literature review based on a compre-hensive database search. To organise, categorise and synthesise the ex-isting literature, we adopted the affordance actualization theory. To align the literature with our research framework, we used four categories: 1) the functionalities of HIT and how these functionalities are measured;2) use and immediate outcomes of HIT functionalities;3) different perfor-mance indicators and how HIT functionalities affect them;and 4) what hospital characteristics influence the outcome of hospital performance. Results: Fifty-two studies were included. We identified four types of HIT. Only ten studies (19.2%) define the use of HIT by explicitly meas-uring the use rate of HIT. We identified five dimensions of hospital per-formance indicators. Every dimension showed mixed results;however, in general, HIT has a positive impact on mortality and patient readmis-sions. We found several hospital characteristics that may affect the rela-tionship between HIT and hospital-level outcomes. Discussion: Further efforts should focus on embedded research on HIT functionalities, use and effects of HIT implementations with more performance indicators and adjusted for hospital characteristics. Conclusion: The proposed framework could help hospitals and researchers make decisions regard-ing the functionalities, use and effects of HIT implementation in hospi-tals. Given our research outcomes, we suggest future research opportuni-ties to improve understanding of how HIT affects hospital performance. .展开更多
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution...Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.展开更多
With the acceleration of the social information process,information awareness and information skills have become the basic qualities of every citizen.The establishment of the training mechanism for scientific and tech...With the acceleration of the social information process,information awareness and information skills have become the basic qualities of every citizen.The establishment of the training mechanism for scientific and technological innovation talents from the beginning of higher education is insufficient to meet the needs of the development of the times.It is imperative to improve the training of information technology innovation talents and explore a new training model.This paper describes the general situation of the development of education in the field of information technology from a domestic and international perspective.It then analyzes the existing problems,explores new exploration models and implementation suggestions,and puts forward prospects at the end of the paper.展开更多
The safety and reliability of mechatronics systems,particularly the high-end,large and key mechatronics equipment in service,can strongly influence on production efficiency,personnel safety,resources and environment.B...The safety and reliability of mechatronics systems,particularly the high-end,large and key mechatronics equipment in service,can strongly influence on production efficiency,personnel safety,resources and environment.Based on the demands of development of modern industries and technologies such as international industry 4.0,Made-in-China 2025 and Internet + and so on,this paper started from revealing the regularity of evolution of running state of equipment and the methods of signal processing of low signal noise ratio,proposed the key information technology of state monitoring and earlyfault-warning for equipment,put forward the typical technical line and major technical content,introduced the application of the technology to realize modern predictive maintenance of equipment and introduced the development of relevant safety monitoring instruments.The technology will play an important role in ensuring the safety of equipment in service,preventing accidents and realizing scientific maintenance.展开更多
During the pandemic, technological innovation provided a platform with a range of uses, including in the healthcare industry. Technology is currently being used in vaccination drives run by many governments across the...During the pandemic, technological innovation provided a platform with a range of uses, including in the healthcare industry. Technology is currently being used in vaccination drives run by many governments across the world to help spread vaccines quickly and efficiently. The technology makes healthcare personnel more effective at their professions and greatly raises the standard of service in the industry. The researchers undertook this study to create a suitable and long-lasting immunization database with a mapping method to give a better perspective of the immunization status. To gather essential information for this study, the researchers spoke with the local health officer in the targeted area. The obtained data then served as the basis for the system’s capabilities and features, becoming the target problems addressed by the developers. The investigation found that the majority of procedures and interactions are carried out manually and recorded on an unprotected, antiquated Excel spreadsheet. The researchers’ technology also shows to be a superior way to deal with the problems and difficulties while making their health-related transactions and operations quicker, safer, and much more effective.展开更多
In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely ...In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.展开更多
This study aims to investigate how information technology is applied in the administration of the municipality of Ferizaj and what are the challenges with human resources, the work was carried out through a case study...This study aims to investigate how information technology is applied in the administration of the municipality of Ferizaj and what are the challenges with human resources, the work was carried out through a case study in the municipality. This paper highlights that the use of information technology provides higher efficiency for the performance of daily work in the municipality, thus also the provision of better services to citizens. However, the level of use of information technology in the Municipality of Ferizaj leaves much to be desired in terms of efficiency because a significant number of employees have not attended adequate training for the effective and efficient use of various IT applications and have not are still adapted to the digital environment in the municipality. Therefore, the recommendation derived from this paper is that the information technology environment in the municipality of Ferizaj needs to be improved by providing staff with adequate qualifications, while for those who are currently engaged in the municipality and who do not have adequate qualifications, training should be provided in a way that all users of IT applications are fully integrated into the digitized environment in order to be effective and efficient in providing services to citizens. This simultaneously gives the municipal staff job security and motivation for better services for citizens. Also, information technology enables a better control over the activity of the municipality because every action is recorded as data which can then be used to analyze the performance of the municipality.展开更多
Objective To understand the development status of traditional Chinese medicine extraction technology,so as to provide a reference for enterprises and scientific research institutions to determine the direction of tech...Objective To understand the development status of traditional Chinese medicine extraction technology,so as to provide a reference for enterprises and scientific research institutions to determine the direction of technological innovation.Besides,the government can formulate scientific and technological innovation strategies.Methods Based on patent information,statistical methods were applied to analyze the development of traditional Chinese medicine extraction technology.Then,the core technology was identified by constructing a patent citation network.Finally,the main path analysis method was applied to discover the technological evolution path.Results and Conclusion The extraction technology of traditional Chinese medicine is still in the growth stage.At present,its R&D is based on enterprises,supplemented by scientific research institutions.The core technologies are ultrasonic extraction and enzymatic extraction.The main path represented by enzymatic extraction technology reveals the evolution process of traditional Chinese medicine extraction technology.Based on this,relevant suggestions are put forward.Firstly,technological innovation cooperation should be strengthened to explore new models of achievement transformation and cooperation.Secondly,key enterprises of technology clusters should be cultivated to accelerate breakthroughs in core technologies.Thirdly,combined technologies can achieve high-efficiency enzyme-assisted extraction and open up new ways of extracting traditional Chinese medicine.Fourthly,traditional techniques should be improved to develop innovative modern techniques.展开更多
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in...In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.展开更多
Recent research and studies have shown that Information Technology(IT)has a significant impact on service quality,customer satisfaction,and customer relationship development.With the proliferation and penetration of t...Recent research and studies have shown that Information Technology(IT)has a significant impact on service quality,customer satisfaction,and customer relationship development.With the proliferation and penetration of technology in all aspects of life,organizations are responding to the implications and opportunities that IT creates in relation to customer services.The main objective of using information technology in organizations is to increase customer satisfaction,service quality,and customer relationship management,which the authors will focus on here.Enhancing service quality,improving customer satisfaction,and establishing close and sustainable customer relationships are key advantages of leveraging information technology in this field.This article examines the impact of information technology on service quality,customer satisfaction,and customer relationship development and provides strategies and models for organizations to improve customer satisfaction and establish closer connections with them through the use of information technology.Seventy individuals from the IT field were used to evaluate the proposed model.The proposed model was compared with three models:SEM,regression,and decision tree,and the results demonstrated better performance of this approach.展开更多
Information systems and information technology (IS/IT) play an important role in supporting the organization to conduct its business processes. The research was conducted at the University of Satya Christian Wacana (S...Information systems and information technology (IS/IT) play an important role in supporting the organization to conduct its business processes. The research was conducted at the University of Satya Christian Wacana (SWCU). Business processes in perceived walking SWCU are not optimal in using IS/IT in the organization. The planning process/IT has not been done in all business units and SWCU does not have an Executive Information System that can help in the decision making process. The process of strategic planning of information systems and information technology using The Open Group Architecture Framework (TOGAF) has compiled a few methods of strategic planning. The results obtained by the study of the needs of IS/IT in SWCU generating application portfolio will be implemented in the institution.展开更多
Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvemen...Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvement philosophies and methodologies for addressing customer demands for better quality service and organizational demands for improving the profit margins through cost reduction. Many companies around the world have already implemented Information Technology Infrastructure Library (ITIL) as a way to manage and control their Information Technology (IT) Departments more effectively. These companies are now willing to improve their ITIL processes in order to become even more efficient. Lean Six Sigma is a methodology that has been suggested as a means to resolve these problems, reducing costs and improving quality. Its application in the IT Services area is becoming increasingly popular among researchers and academicians and can be used to conduct these improvements. Despite the application of lean six sigma approaches to different contexts in the service sector, the application of Lean Six Sigma approaches in service delivery specific to Information Technology Service Management (ITSM) remains largely untested. The purpose of this paper is to implement Integrated Lean Six Sigma for Software application support services and evaluate the benefits of continual service improvement over ITIL.展开更多
The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures...The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures. The impact of ICT has accelerated the progress of the United Nation’s Sustainable Development Goals (UN SDGs) and influenced the evolution of smart, sustainable, stable society development. Making the trustworthy information and communication technologies infrastructure widely available will promote the community innovation needed to stimulate domestic economics, provide decent work, and reduce inequalities. This article attempts to outline a big picture about the International Telecommunication Union (ITU)’s trust provisioning framework, including its motivation, current status, and application for achieving the UN SDGs by 2030. This article first describes the purpose of the UN SDGs and the evolution of the industrial revolution, then demonstrates the challenges of global risks affecting the fourth industrial revolution and the need for trustworthy ICT infrastructures. Subsequently, the article evaluates the ITU trust provisioning framework and assesses its applications in the future knowledge society, trust provisioning ecosystem, and cyber, physical, and social infrastructure toward achieving UN SDGs. Use cases are also presented in this article to show the effectiveness of the ITU trust provisioning framework on achieving UN SDGs.展开更多
Network information communication technology in power systems is the key to ensuring the safe and efficient operation of power grids.The network information communication technology itself has advantages in automation...Network information communication technology in power systems is the key to ensuring the safe and efficient operation of power grids.The network information communication technology itself has advantages in automation operation and information transmission,thus is widely applied to the power system.In the case of ensuring that the power system is compatible with the network information communication technology,the control of the power system can be strengthened,and the operational efficiency of the power system can be improved.This paper mainly analyzes the specific application of network information communication technology in power system.展开更多
Information technology and information system today play major roles in companies who are competitive in the global market. In this paper, we will study how Suning Appliance Chain changes her operations by using infor...Information technology and information system today play major roles in companies who are competitive in the global market. In this paper, we will study how Suning Appliance Chain changes her operations by using information technology and information system. Suning’s Strategy, operations structure, especially her logistics system are discussed firstly; how information technology and information system support her operation and logistics to gain competitive capabilities are further discussed. Finally, the operation system transformation through IT/IS in Suning is studied by the use of a stochastic inventory model.展开更多
文摘Objective: To review, categorise, and synthesise findings from literature on health information technology (HIT) functionalities, HIT use, and the impact of HIT on hospital performance. Materials and Methods: We conducted a systematic integrative literature review based on a compre-hensive database search. To organise, categorise and synthesise the ex-isting literature, we adopted the affordance actualization theory. To align the literature with our research framework, we used four categories: 1) the functionalities of HIT and how these functionalities are measured;2) use and immediate outcomes of HIT functionalities;3) different perfor-mance indicators and how HIT functionalities affect them;and 4) what hospital characteristics influence the outcome of hospital performance. Results: Fifty-two studies were included. We identified four types of HIT. Only ten studies (19.2%) define the use of HIT by explicitly meas-uring the use rate of HIT. We identified five dimensions of hospital per-formance indicators. Every dimension showed mixed results;however, in general, HIT has a positive impact on mortality and patient readmis-sions. We found several hospital characteristics that may affect the rela-tionship between HIT and hospital-level outcomes. Discussion: Further efforts should focus on embedded research on HIT functionalities, use and effects of HIT implementations with more performance indicators and adjusted for hospital characteristics. Conclusion: The proposed framework could help hospitals and researchers make decisions regard-ing the functionalities, use and effects of HIT implementation in hospi-tals. Given our research outcomes, we suggest future research opportuni-ties to improve understanding of how HIT affects hospital performance. .
文摘Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.
文摘With the acceleration of the social information process,information awareness and information skills have become the basic qualities of every citizen.The establishment of the training mechanism for scientific and technological innovation talents from the beginning of higher education is insufficient to meet the needs of the development of the times.It is imperative to improve the training of information technology innovation talents and explore a new training model.This paper describes the general situation of the development of education in the field of information technology from a domestic and international perspective.It then analyzes the existing problems,explores new exploration models and implementation suggestions,and puts forward prospects at the end of the paper.
基金supported by National Natural Science Foundation of China(No.51275052)Beijing Natural Science Foundation(No.3131002)
文摘The safety and reliability of mechatronics systems,particularly the high-end,large and key mechatronics equipment in service,can strongly influence on production efficiency,personnel safety,resources and environment.Based on the demands of development of modern industries and technologies such as international industry 4.0,Made-in-China 2025 and Internet + and so on,this paper started from revealing the regularity of evolution of running state of equipment and the methods of signal processing of low signal noise ratio,proposed the key information technology of state monitoring and earlyfault-warning for equipment,put forward the typical technical line and major technical content,introduced the application of the technology to realize modern predictive maintenance of equipment and introduced the development of relevant safety monitoring instruments.The technology will play an important role in ensuring the safety of equipment in service,preventing accidents and realizing scientific maintenance.
文摘During the pandemic, technological innovation provided a platform with a range of uses, including in the healthcare industry. Technology is currently being used in vaccination drives run by many governments across the world to help spread vaccines quickly and efficiently. The technology makes healthcare personnel more effective at their professions and greatly raises the standard of service in the industry. The researchers undertook this study to create a suitable and long-lasting immunization database with a mapping method to give a better perspective of the immunization status. To gather essential information for this study, the researchers spoke with the local health officer in the targeted area. The obtained data then served as the basis for the system’s capabilities and features, becoming the target problems addressed by the developers. The investigation found that the majority of procedures and interactions are carried out manually and recorded on an unprotected, antiquated Excel spreadsheet. The researchers’ technology also shows to be a superior way to deal with the problems and difficulties while making their health-related transactions and operations quicker, safer, and much more effective.
文摘In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.
文摘This study aims to investigate how information technology is applied in the administration of the municipality of Ferizaj and what are the challenges with human resources, the work was carried out through a case study in the municipality. This paper highlights that the use of information technology provides higher efficiency for the performance of daily work in the municipality, thus also the provision of better services to citizens. However, the level of use of information technology in the Municipality of Ferizaj leaves much to be desired in terms of efficiency because a significant number of employees have not attended adequate training for the effective and efficient use of various IT applications and have not are still adapted to the digital environment in the municipality. Therefore, the recommendation derived from this paper is that the information technology environment in the municipality of Ferizaj needs to be improved by providing staff with adequate qualifications, while for those who are currently engaged in the municipality and who do not have adequate qualifications, training should be provided in a way that all users of IT applications are fully integrated into the digitized environment in order to be effective and efficient in providing services to citizens. This simultaneously gives the municipal staff job security and motivation for better services for citizens. Also, information technology enables a better control over the activity of the municipality because every action is recorded as data which can then be used to analyze the performance of the municipality.
文摘Objective To understand the development status of traditional Chinese medicine extraction technology,so as to provide a reference for enterprises and scientific research institutions to determine the direction of technological innovation.Besides,the government can formulate scientific and technological innovation strategies.Methods Based on patent information,statistical methods were applied to analyze the development of traditional Chinese medicine extraction technology.Then,the core technology was identified by constructing a patent citation network.Finally,the main path analysis method was applied to discover the technological evolution path.Results and Conclusion The extraction technology of traditional Chinese medicine is still in the growth stage.At present,its R&D is based on enterprises,supplemented by scientific research institutions.The core technologies are ultrasonic extraction and enzymatic extraction.The main path represented by enzymatic extraction technology reveals the evolution process of traditional Chinese medicine extraction technology.Based on this,relevant suggestions are put forward.Firstly,technological innovation cooperation should be strengthened to explore new models of achievement transformation and cooperation.Secondly,key enterprises of technology clusters should be cultivated to accelerate breakthroughs in core technologies.Thirdly,combined technologies can achieve high-efficiency enzyme-assisted extraction and open up new ways of extracting traditional Chinese medicine.Fourthly,traditional techniques should be improved to develop innovative modern techniques.
基金supported by the Hainan Provincial Key Laboratory of Philosophy and Social Sciences for Hainan Free Trade Port International Shipping Development and Property Rights Digitization,Hainan Vocational University of Science and Technology(Qiong Social Science[2022]No.26).
文摘In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.
文摘Recent research and studies have shown that Information Technology(IT)has a significant impact on service quality,customer satisfaction,and customer relationship development.With the proliferation and penetration of technology in all aspects of life,organizations are responding to the implications and opportunities that IT creates in relation to customer services.The main objective of using information technology in organizations is to increase customer satisfaction,service quality,and customer relationship management,which the authors will focus on here.Enhancing service quality,improving customer satisfaction,and establishing close and sustainable customer relationships are key advantages of leveraging information technology in this field.This article examines the impact of information technology on service quality,customer satisfaction,and customer relationship development and provides strategies and models for organizations to improve customer satisfaction and establish closer connections with them through the use of information technology.Seventy individuals from the IT field were used to evaluate the proposed model.The proposed model was compared with three models:SEM,regression,and decision tree,and the results demonstrated better performance of this approach.
文摘Information systems and information technology (IS/IT) play an important role in supporting the organization to conduct its business processes. The research was conducted at the University of Satya Christian Wacana (SWCU). Business processes in perceived walking SWCU are not optimal in using IS/IT in the organization. The planning process/IT has not been done in all business units and SWCU does not have an Executive Information System that can help in the decision making process. The process of strategic planning of information systems and information technology using The Open Group Architecture Framework (TOGAF) has compiled a few methods of strategic planning. The results obtained by the study of the needs of IS/IT in SWCU generating application portfolio will be implemented in the institution.
文摘Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvement philosophies and methodologies for addressing customer demands for better quality service and organizational demands for improving the profit margins through cost reduction. Many companies around the world have already implemented Information Technology Infrastructure Library (ITIL) as a way to manage and control their Information Technology (IT) Departments more effectively. These companies are now willing to improve their ITIL processes in order to become even more efficient. Lean Six Sigma is a methodology that has been suggested as a means to resolve these problems, reducing costs and improving quality. Its application in the IT Services area is becoming increasingly popular among researchers and academicians and can be used to conduct these improvements. Despite the application of lean six sigma approaches to different contexts in the service sector, the application of Lean Six Sigma approaches in service delivery specific to Information Technology Service Management (ITSM) remains largely untested. The purpose of this paper is to implement Integrated Lean Six Sigma for Software application support services and evaluate the benefits of continual service improvement over ITIL.
文摘The advancement of the fourth industrial revolution has shaped the integration and interaction of different information, communication and technologies (ICTs) in the merging cyber, physical, and social infrastructures. The impact of ICT has accelerated the progress of the United Nation’s Sustainable Development Goals (UN SDGs) and influenced the evolution of smart, sustainable, stable society development. Making the trustworthy information and communication technologies infrastructure widely available will promote the community innovation needed to stimulate domestic economics, provide decent work, and reduce inequalities. This article attempts to outline a big picture about the International Telecommunication Union (ITU)’s trust provisioning framework, including its motivation, current status, and application for achieving the UN SDGs by 2030. This article first describes the purpose of the UN SDGs and the evolution of the industrial revolution, then demonstrates the challenges of global risks affecting the fourth industrial revolution and the need for trustworthy ICT infrastructures. Subsequently, the article evaluates the ITU trust provisioning framework and assesses its applications in the future knowledge society, trust provisioning ecosystem, and cyber, physical, and social infrastructure toward achieving UN SDGs. Use cases are also presented in this article to show the effectiveness of the ITU trust provisioning framework on achieving UN SDGs.
文摘Network information communication technology in power systems is the key to ensuring the safe and efficient operation of power grids.The network information communication technology itself has advantages in automation operation and information transmission,thus is widely applied to the power system.In the case of ensuring that the power system is compatible with the network information communication technology,the control of the power system can be strengthened,and the operational efficiency of the power system can be improved.This paper mainly analyzes the specific application of network information communication technology in power system.
基金Supported by the National Natural Science Foundation of China (No.70271015,70328001)Jiangsu Soft Science (No.BR2004025)
文摘Information technology and information system today play major roles in companies who are competitive in the global market. In this paper, we will study how Suning Appliance Chain changes her operations by using information technology and information system. Suning’s Strategy, operations structure, especially her logistics system are discussed firstly; how information technology and information system support her operation and logistics to gain competitive capabilities are further discussed. Finally, the operation system transformation through IT/IS in Suning is studied by the use of a stochastic inventory model.