Analysis of an information network

被引:0
|
作者
Ruiz, A
机构
关键词
communication; complementarity; information; network; partnership;
D O I
10.1016/S1246-7820(00)80023-3
中图分类号
R5 [内科学];
学科分类号
1002 ; 100201 ;
摘要
This study, performed in the Loire-Atlantique region, gives a full list of the positions responsible for the transfer of information and the methods of implementation. It demonstrates that mobile blood collection units and numerous blood donor associations, although in close contact with donors, represent the weak link in the information network. This weakness has its origins in a lack of communication with the central sources of information, and in the absence of participation in various projects. The study emphasizes the importance of communication in addition to the responsibilities of the members of the organization. (C) 2000 Editions scientifiques et medicales Elsevier SAS.
引用
收藏
页码:80S / 83S
页数:4
相关论文
共 50 条
  • [41] Comparative Analysis of Similarity Measures in Heterogeneous Information Network
    Patil, Vaishali
    Vasappanavara, Ramesh
    Ghorpade, Tushar
    PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 297 - 301
  • [42] The Analysis of Information Security of Campus Network of Scientific Research
    Shi De-Qin
    Lin Qin-Ying
    Zhong Qi-Yuan
    Li Qiu-ni
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 890 - 892
  • [43] Social network analysis in accounting information systems research
    Worrell, James
    Wasko, Molly
    Johnston, Allen
    INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 2013, 14 (02) : 127 - 137
  • [44] Value of information analysis for typical bridge network topologies
    Malings, C.
    Pozzi, M.
    MAINTENANCE, MONITORING, SAFETY, RISK AND RESILIENCE OF BRIDGES AND BRIDGE NETWORKS, 2016, : 334 - 334
  • [45] Network Algorithms for Information Analysis Using the Titan Toolkit
    McLendon, William C., III
    Shead, Timothy M.
    Wilson, Andrew
    Wylie, Brian
    Baumes, Jeffrey
    44TH ANNUAL 2010 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2010, : 103 - 111
  • [46] The development of risk analysis methodology for information asset on network
    Jung, Y
    Kim, I
    Lee, N
    Park, J
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 258 - 261
  • [47] Information Retrieval from Facebook for Social Network Analysis
    Persia, Fabio
    D'Auria, Daniela
    2023 IEEE 17TH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING, ICSC, 2023, : 329 - 336
  • [48] Analysis and Design of an Authentication Protocol for Space Information Network
    Zhao, Weiwei
    Zhang, Aixin
    Li, Jianhua
    Wu, Xinghua
    Liu, Yuchen
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 43 - 48
  • [49] Analysis and detection of covert information transfers in MLS network
    Cai, Zhi-Yong
    Zhang, Xing
    Shen, Chang-Xiang
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2011, 37 (08): : 1226 - 1230
  • [50] Network analysis of research fields in library and information science
    Song, Yanhui (syh687@163.com), 1600, Editorial Board of Medical Journal of Wuhan University (39):