139,752 research outputs found

    A safety analysis approach to clinical workflows : application and evaluation

    Get PDF
    Clinical workflows are safety critical workflows as they have the potential to cause harm or death to patients. Their safety needs to be considered as early as possible in the development process. Effective safety analysis methods are required to ensure the safety of these high-risk workflows, because errors that may happen through routine workflow could propagate within the workflow to result in harmful failures of the system’s output. This paper shows how to apply an approach for safety analysis of clinic al workflows to analyse the safety of the workflow within a radiology department and evaluates the approach in terms of usability and benefits. The outcomes of using this approach include identification of the root causes of hazardous workflow failures that may put patients’ lives at risk. We show that the approach is applicable to this area of healthcare and is able to present added value through the detailed information on possible failures, of both their causes and effects; therefore, it has the potential to improve the safety of radiology and other clinical workflows

    ArchOptions: A Real Options-Based Model for Predicting the Stability of Software Architectures

    Get PDF
    Architectural stability refers to the extent an architecture is flexible to endure evolutionary changes in stakeholders\' requirements and the environment. We assume that the primary goal of software architecture is to guide the system\'s evolution. We contribute to a novel model that exploits options theory to predict architectural stability. The model is predictive: it provides \"insights\" on the evolution of the software system based on valuing the extent an architecture can endure a set of likely evolutionary changes. The model builds on Black and Scholes financial options theory (Noble Prize wining) to value such extent. We show how we have derived the model: the analogy and assumptions made to reach the model, its formulation, and possible interpretations. We refer to this model as ArchOptions

    Distributed generation on rural electricity networks - a lines company perspective : a thesis presented in partial fulfillment of the requirements for the degree of Master of Engineering in Energy Management at Massey University

    Get PDF
    CD held with Reference copyA number of electricity assets used in rural New Zealand yield a very low return on investment. According to the provisions of the Electricity Act 1992, after 01 April 2013, lines companies may terminate supply to any customer to whom they cannot provide electricity lines services profitably. This research was undertaken to assist the policy makers, lines companies, rural investors on the viability of distributed generation in a rural setting from the point of view of the lines company and the investor as well as to provide recommendations to the problem areas. A dynamic distributed generation model was developed to simulate critical distributed generation scenarios relevant to New Zealand, such as diverse metering arrangements, time dependent electricity prices, peak shaving by load control, peak lopping by dispatchable distributed generation and state subsides, which are not addressed in commercial software. Data required to run the model was collected from a small rural North Island sheep and beef farming community situated at the end of a 26km long radial distribution feeder. Additional operational data were also collected from the community on distributed resources such as solar hot water systems. A number of optimum distributed generation combinations involving a range of technologies under different metering arrangements and price signals were identified for the small and the medium investor. The effect of influencing factors, such as state initiatives and technological growth, on the investor and the lines companies were discussed. Recommendations for future implementation in order to integrate distributed generation on to rural networks were also given. Several key research areas were identified and discussed including low cost micro hydro, wind resource assessment, diversification of the use of the induction generators, voltage flicker and dynamic distributed generation techno-economic forecasting tools

    Responsibility modelling for civil emergency planning

    Get PDF
    This paper presents a new approach to analysing and understanding civil emergency planning based on the notion of responsibility modelling combined with HAZOPS-style analysis of information requirements. Our goal is to represent complex contingency plans so that they can be more readily understood, so that inconsistencies can be highlighted and vulnerabilities discovered. In this paper, we outline the framework for contingency planning in the United Kingdom and introduce the notion of responsibility models as a means of representing the key features of contingency plans. Using a case study of a flooding emergency, we illustrate our approach to responsibility modelling and suggest how it adds value to current textual contingency plans

    Requirements traceability in model-driven development: Applying model and transformation conformance

    Get PDF
    The variety of design artifacts (models) produced in a model-driven design process results in an intricate relationship between requirements and the various models. This paper proposes a methodological framework that simplifies management of this relationship, which helps in assessing the quality of models, realizations and transformation specifications. Our framework is a basis for understanding requirements traceability in model-driven development, as well as for the design of tools that support requirements traceability in model-driven development processes. We propose a notion of conformance between application models which reduces the effort needed for assessment activities. We discuss how this notion of conformance can be integrated with model transformations

    IT in construction: aligning IT and business strategies

    Get PDF
    The extent to which information technology (IT) infrastructures and strategies are aligned with business processes and strategies varies widely along firms. The objective of this paper is to explain the success or failure of IT in construction firms by focusing on the alignment (or lack of it) between business strategy, IT strategy, organizational infrastructure, and IT infrastructure. It is hypothesized that the ‘fit’ among these elements, the domains of the Strategic Alignment Model, is positively related to the Business Value of IT in Construction. The IT Business Value is evaluated in terms of efficiency, effectiveness and business performance. By applying the Strategic Alignment Model to the Dutch construction industry, it is shown that the inadequate alignment between these domains is a major reason for the modest added business value from IT investments in this industry. The first lack of alignment is the technology shortfall: hence IT contributes in an inadequate way to strategic processes of construction firms. The second lack of alignment is the strategy-shortfall: hence the firm strategy impedes the implementation of IT that could generate a high business value

    Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science

    Get PDF
    e-Science projects face a difficult challenge in providing access to valuable computational resources, data and software to large communities of distributed users. Oil the one hand, the raison d'etre of the projects is to encourage members of their research communities to use the resources provided. Oil the other hand, the threats to these resources from online attacks require robust and effective Security to mitigate the risks faced. This raises two issues: ensuring that (I) the security mechanisms put in place are usable by the different users of the system, and (2) the security of the overall system satisfies the security needs of all its different stakeholders. A failure to address either of these issues call seriously jeopardise the success of e-Science projects.The aim of this paper is to firstly provide a detailed understanding of how these challenges call present themselves in practice in the development of e-Science applications. Secondly, this paper examines the steps that projects can undertake to ensure that security requirements are correctly identified, and security measures are usable by the intended research community. The research presented in this paper is based Oil four case studies of c-Science projects. Security design traditionally uses expert analysis of risks to the technology and deploys appropriate countermeasures to deal with them. However, these case studies highlight the importance of involving all stakeholders in the process of identifying security needs and designing secure and usable systems.For each case study, transcripts of the security analysis and design sessions were analysed to gain insight into the issues and factors that surround the design of usable security. The analysis concludes with a model explaining the relationships between the most important factors identified. This includes a detailed examination of the roles of responsibility, motivation and communication of stakeholders in the ongoing process of designing usable secure socio-technical systems such as e-Science. (C) 2007 Elsevier Ltd. All rights reserved
    corecore