Computer Applications In Public Administration Article Review

Information Systems in Healthcare What does the author mean by informatization?

The concept of informatization is predicated on using information technologies (IT) to attain higher levels of process efficiency, performance, collaboration, communication and decision-making throughout an organization (Kernaghaii, Gunraj, 2004). The author continues with five core aspects of informatization to further illustrate this concept and its effects on organizational performance. The first is the development and introduction of IT systems to shape and define the information and data retrieval process as it relates to automated IT systems, while the second is the re-arrangement of information flows and information relationships to enable the more efficient management of IT (Kernaghaii, Gunraj, 2004).The third is one of the most challenging, and that is the change of an organizational structure and its processes based on the information generated and created using IT systems (Kernaghaii, Gunraj, 2004). The fourth point the author makes...

...

On this last point the author notes that the continued adoption of IT systems leads to the development of entire teams of specialists to support the line-of-business and analysis of data so it can be more effectively used in decisions. All of these factors together show how pervasive IT is in completely changing the culture and structure of an organization over time, especially in the government sectors (Kernaghaii, Gunraj, 2004).
Describe what the author says are obstacles to the potentially powerful impact of IT on Public Administration. There are many obstacles that the author mentions for Public Administration to gain the greatest value from IT. The first and most significant is resistance…

Sources Used in Documents:

Reference

Kernaghaii, Kenneth & Gunraj, Justin (2004). Integrating information technology into public administration: conceptual and practical considerations. ADMINISTRATION PUBLIQUE DU CANADA, VOLUME 47,(4) PP.525-546


Cite this Document:

"Computer Applications In Public Administration" (2011, June 22) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/computer-applications-in-public-administration-42695

"Computer Applications In Public Administration" 22 June 2011. Web.25 April. 2024. <
https://www.paperdue.com/essay/computer-applications-in-public-administration-42695>

"Computer Applications In Public Administration", 22 June 2011, Accessed.25 April. 2024,
https://www.paperdue.com/essay/computer-applications-in-public-administration-42695

Related Documents

Abstract This essay will cover information systems and decision-making in public organizations. Information systems management has become part of the decision-making process in the public sector. Public organizations have begun utilizing information systems management in order to provide the statistics and information needed to generate decisions quickly while also maintaining a level of informed policy that allows for evolution of public organization decision-making in today’s world. Although there has been some

1 Five future trends in Public Administration are 1) global interconnectedness and self-sufficiency; 2) changes to public health policy; 3) incorporation of advanced technology into administration; 4) more grassroots advocacy; and 5) emphasis on sustainability (Florida Tech, 2019). The first trend—the global interconnectedness of public administrations and a focus at the same time on self-sufficiency—may seem like two diametrically opposed trends going in opposite directions, but the reality is that global

New Technology That Can Improve the Veteran Benefits Administration Performance And Improve Efficiency Introduction The use of artificial intelligence (AI) in public administration is a concept that is growing around the world. As Dhasarathy, Jain and Khan (2019) show, AI can help governments to solve complex public-sector issues in more effective and efficient ways. This paper will describe AI technology, the goals of its usage, challenges faced with its implementation, how it

public administrator often goes unappreciated because these underrated professionals often work behind the scenes, in offices and in the field. But the work they do invariably affects our lives. One day as I was stopped at a red light, it occurred to me that at some point a person actually decided how many minutes this light would last, and whether or not to place it at this intersection in

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of