Mobile E-Health Record, is it a “Frankenstein IT system” ?

This paper is a personal reflection as a part of portfolio assignment http://mahara.uowplatform.edu.au/view/view.php?id=60393 on SNPG950- Reflection for practice, UOW School of Nursing

This paper is a personal reflection on Information Technology (IT) in the documentation of nursing care in Indonesia and uses a framework proposed by Rolfe (2001).

Continue reading “Mobile E-Health Record, is it a “Frankenstein IT system” ?”

Mobile E-Health Record, is it a “Frankenstein IT system” ?

Leadership in Healthcare Service

This essay was submitted as an individual assignment on SNPG925- Effective Leadership in Health, UOW School of Nursing

INTRODUCTION

Nursing is one of the key professions in the delivery of health care service in Australia. There were more than 250.000 nurses working in Australia in 2011; the nurse ratio in the population is 1,195.8 per 100,000 persons (ABS 2013). The more competent nurses are, the higher quality of health care service will be provided. Leadership is one of the skills that nurses need to provide the nursing practice (White 2002, p.669). This paper will discuss how nurses’ individual leadership development can impact on health care service.

Keywords: Leadership, nurse, transformational leadership, authentic leadership, aesthetic leadership.

Continue reading “Leadership in Healthcare Service”

Leadership in Healthcare Service

Indonesian Free and Open Source Software (FOSS) Initiatives: Implications for Its Distributed Network Topology and Design

Author: Ima Apriany

This essay was submitted as an individual essay assignment on ISIT925-Network Design.

Abstract

Free and Open Source Software (FOSS) initiative are promising to deliver strategic advantage, especially for Indonesia as a developing country. Despite its impediments in its implementation, the government agencies and higher educational institution are motivated to commit and collaborate in creating FOSS community by underpinning a distributed network. Consequently, there will be some technical requirement implications for its network design and also a need for an enhanced computing strategy that can be utilised so that the FOSS initiative can be implemented efficiently. In this paper, a topology for data transfer process was elaborated that engaged 32 nodes throughout Indonesia while the network requirement analysis was derived from user requirement which is least technical then drilled down into application, device and network as the most technical one.

Keywords – Free Open Source Software (FOSS), Indonesia Higher Education Network (INHERENT), Government Initiatives, Network Topology, Network Design

Continue reading “Indonesian Free and Open Source Software (FOSS) Initiatives: Implications for Its Distributed Network Topology and Design”

Indonesian Free and Open Source Software (FOSS) Initiatives: Implications for Its Distributed Network Topology and Design

GENDER CONSTRUCTION IN VISUAL IMAGES IN TEXTBOOKS FOR PRIMARY SCHOOL STUDENTS

If you are interested in researching visual grammar analysis, please have a look at the one that I did with primary school textbook for teaching English in Indonesia.

Abstract

In the Indonesian context, little has been done to raise awareness of political correctness in gender matters in school textbooks. As an attempt to fill this gap, I conducted a textual analysis on four English language textbooks used in Indonesian primary schools. The focus of the study was on the pictorial texts accompanying the linguistic ones. The ‗Visual Grammar‘, developed by Kress and van Leeuwen, was used as the framework of analysis. The results showed that the illustrations accompanying linguistic texts fortified the representations of gender asymmetry. Females were depicted more dependent than males and were also construed to be admirers of an action carried out by the males. The study recommended conscious efforts to value both genders equally in visualization as meaning construction is multimodal.

Keywords: gender construction, visual grammar, pictorial texts, EFL textbooks Continue reading “GENDER CONSTRUCTION IN VISUAL IMAGES IN TEXTBOOKS FOR PRIMARY SCHOOL STUDENTS”

GENDER CONSTRUCTION IN VISUAL IMAGES IN TEXTBOOKS FOR PRIMARY SCHOOL STUDENTS

Surviving Business With Strategic IT Alignment: A Case Study of Netflix

Much has been written about how Strategic IT Alignment can boost company performance. However, limited study show how these alignment, if succeed, not only boost company performance but beyond that helps a company survive from the downfall, just as Netflix. This study is intended to exhibit how this strategic alignment can help Netflix from a traditional DVD rental company to a video-on-demand company champion.

This study was performed as a group essay on ISIT908 – Information Technology Government

Abstract

This paper attempts to investigate and discover how an organisation achieve a better alignment between business and IT by the implementation of IT governance. Much has been written about how this Strategic IT Alignment can boost company performance. These works have had particular articulation following the alignment of Information Technology Strategy as well as the Business Strategy. However, limited study shows how this alignment, if succeed, help a company survive from the downfall, just like Netflix. This study is intended to exhibit how this strategic alignment can lead Netflix from a traditional DVD rental company to a video-on-demand company champion. This study aims to answer two questions: what are the structure of Strategic IT Alignment on Netflix? In turn, it implies the question related on that: what are the key success factors, aside with Strategic IT Alignment, which helps a company survive on disruptive technology? This study conducted by literature research and draw on Strategic Alignment Model. We found that entrepreneurship and leadership; continuous improvement; and communication help a business survives from disruptive technology. This is positively moderating their Strategic IT Alignment structure.

Keywords – IT Governance; Business – IT Alignment; Strategic IT Alignment; Netflix

Continue reading “Surviving Business With Strategic IT Alignment: A Case Study of Netflix”

Surviving Business With Strategic IT Alignment: A Case Study of Netflix

Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy

members-only

This paper was accepted in the 27th Australasian Conference on Information Systems, Wollongong (December 2016).

Cite it as:

Azmi, R., Tibben, W., and Win, K. T. 2016. “Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy,” in Australasian Conference on Information Systems, Wollongong.

Abstract

Defining the factors that give rise to National Cyber Security Strategy (NCSS) has the potential to better understand information security in a global context. Considering the large number of countries that have developed NCSS, the paper seeks to define common motives that enable NCSS development to be understood as public policy phenomenon.  In order to achieve this, the paper employs qualitative coding to review the NCSS of 54 countries.  Descriptive coding is used to distill common motives, and then pattern coding is employed to develop themes as a way to explain the development and adoption of cyber security strategies by governments. The themes are National Security, Jurisprudence, and Politics. Enabling greater clarity in the motives that lead to cyber security strategies provides policymakers and scholars with additional insights into the development of initiatives that aim to take advantage of the opportunities presented by cyberspace while mitigating its security threats.

Keywords Cyber Space, Cyber Security, Cyber Security Strategy, Cyber Security Strategy Motives, National Cyber Security Strategy, Information Security.

Continue reading “Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy”

Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy