4 research outputs found

    Ontology of Strategic Information Systems Planning

    Get PDF
    Strategically planning and aligning information systems is still one the most challenging IT tasks for organizations. Literature has contributed to describe and analyze the phenomena labeling the process of Strategic Information Systems Planning (SISP) as the one that pursues the alignment of the IS/IT initiatives to achieve business goals. Statistics reveal, however, that those goals are significantly not being achieved, leaving the discussion open to know whether the SISP models, frameworks and methods are correct, complete, applicable, feasible or not. In order to understand and visualize the potential gaps and biases in the SISP literature, the paper introduces an ontology of the SISP process that allows systematically and symmetrically expand study to contribute to maturation of the scientific field as well as to identify the critical omissions within it. Later, the ontological analysis will allow the visualization of bright, light, and blind/blank areas of knowledge documented on SISP

    Australia's national health programs: An ontological mapping

    Get PDF
    Australia has a large number of health program initiatives whose comprehensive assessment will help refine and redefine priorities by highlighting areas of emphasis, under-emphasis, and non-emphasis. The objectives of our research are to: (a) systematically map all the programs onto an ontological framework, and (b) systemically analyse their relative emphases at different levels of granularity. We mapped all the health program initiatives onto an ontology with five dimensions, namely: (a) Policy-scope, (b) Policy-focus, (c) Outcomes, (d) Type of care, and (e) Population served. Each dimension is expanded into a taxonomy of its constituent elements. Each combination of elements from the five dimensions is a possible policy initiative component. There are 30,030 possible components encapsulated in the ontology. It includes, for example: (a) National financial policies on accessibility of preventive care for family, and (b) Local-urban regulatory policies on cost of palliative care for individual-aged. Four of the authors mapped all of Australia's health programs and initiatives on to the ontology. Visualizations of the data are used to highlight the relative emphases in the program initiatives. The dominant emphasis of the program initiatives is: [National] [educational, personnel-physician, information] policies on [accessibility, quality] of [preventive, wellness] care for the [community]. However, although (a) information is emphasized technology is not and (b) accessibility and quality are emphasized cost, satisfaction, and quality are not. The ontology and the results of the mapping can help systematically reassess and redirect the relative emphases of the programs and initiatives from a systemic perspective

    An Ontological Map for Meaningful Use of Healthcare Information Systems (MUHIS)

    No full text

    Towards a mobile application to aid law enforcement in diagnosing and preventing mobile bully-victim behaviour in Eastern Free State High Schools of South Africa

    Get PDF
    Mobile bully-victim behaviour is one cyber aggression that is escalating worldwide. Bully-victims are people who bully others but are also victimised by peers. The behaviour of bully-victims therefore swings between that of pure bullies and pure victims, making it difficult to identify and prevent. Prevention measures require the involvement of a number of stakeholders, including communities. However, there has been a lack of whole-community participation in the fight against cyberbullying and the roles of stakeholders are often unclear. We expect the law enforcement in particular, the police, to play a key role in curbing all forms of bullying. This is a challenging task in South Africa as these law enforcement agents often lack the skills and appropriate legislation to address particularly cyber-related bullying. Literature shows that law enforcement agents need to advance their technological skills and also be equipped with digital interventions if they are to diagnose and prevent mobile bully-victim behaviour effectively. This is particularly important in South Africa, where the rate of crime remains one of the highest in the world. The aim of this study was to develop a mobile application that can aid law enforcement in diagnosing and preventing mobile bully-victim behaviour in high schools. As part of requirements to the application development, it identified the impediments to the law enforcement effectiveness in combating mobile bully-victim behaviour. Extensive literature review on the factors influencing mobile bullying and mobile bully-victim behaviour was conducted and an integrative framework for understanding this behaviour and its prevention was developed. In so doing, the dominant behavioural theories were consulted, including the social-ecological theory, social learning theory, social information processing theories, and the theory of planned behaviour, as well as the general strain theory, and the role theory. The conceptual framework developed in this study extended and tailored the “Cyberbullying Continuum of Harm”, enabling inclusive and moderated diagnosis of bullying categories and severity assessment. That is, instead of focusing on mobile bully-victims only, bullies, victims, and those uninvolved were also identified. Also the physical moderation of the identification process by the police helped to minimise dishonest reporting. This framework informed the design, development and evaluation of a mobile application for the law enforcement agents. The Design Science Research (DSR) methodology within pragmatic paradigm and literature guided the development of the mobile application named mobile bullyvictims response system (M-BRS) and its evaluation for utility. The M-BRS features included functions to enable anonymous reporting and confidential assessments of mobile bully-victims effects in school classrooms. Findings from this study confirmed the utility of the M-BRS to identify learners' involvement in mobile bully-victims behaviour through peer nomination and self-nomination. This study also showed that use of the M-BRS has enabled empowerment of marginalised learners, and mitigation of learners' fear to report, providing them with control over mobile bully-victim reporting. In addition, learners using the M-BRS were inclined to report perpetrators through a safe (anonymous and confidential) reporting platform. With the M-BRS, it was much easier to identify categories of bullies, i.e. mobile bully-victims, bullies, victims, and uninvolved. The practical contributions of this study were skills enhancements in reducing the mobile bully-victims behaviour. These included improvement of the police's technical skills to safely identify mobile bully-victims and their characterisation as propagators and retaliators that enabled targeted interventions. This was particularly helpful in response to courts' reluctance to prosecute teenagers for cyberbullying and the South African lack of legislation thereon so that the police are enabled to restoratively address this behaviour in schools. Also, the identification information was helpful to strengthen evidence for reported cases, which was remarkable because sometimes perpetrators cannot be found due to their concealed online identities. Furthermore, this study made possible the surveillance of mobile bully-victims through the M-BRS, which provided the police some control to reducing the mobile bully-victim behaviour. This study provided a practical way for implementing targeted prevention and interventions programmes using relevant resources towards a most efficient solution for mobile bully-victims problem. Since there are not many mobile-based interventions for mobile bully-victim behaviour, this study provided a way in which artefacts' development could be informed by theory, as a new, innovative and practical contribution in research. In so doing, this study contributed to technology applications' ability to modify desired behaviour
    corecore