2,924 research outputs found

    Integrating Competency-Based Education in Interactive Learning Systems

    Full text link
    Artemis is an interactive learning system that organizes courses, hosts lecture content and interactive exercises, conducts exams, and creates automatic assessments with individual feedback. Research shows that students have unique capabilities, previous experiences, and expectations. However, the course content on current learning systems, including Artemis, is not tailored to a student's competencies. The main goal of this paper is to describe how to make Artemis capable of competency-based education and provide individual course content based on the unique characteristics of every student. We show how instructors can define relations between competencies to create a competency relation graph, how Artemis measures and visualizes the student's progress toward mastering a competency, and how the progress can generate a personalized learning path for students that recommends relevant learning resources. Finally, we present the results of a user study regarding the usability of the newly designed competency visualization and give an outlook on possible improvements and future visions.Comment: 4 pages, 2 figures. Best Practitioner Report Awar

    Security Enhanced Applications for Information Systems

    Get PDF
    Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments

    Decision Support Systems

    Get PDF
    Decision support systems (DSS) have evolved over the past four decades from theoretical concepts into real world computerized applications. DSS architecture contains three key components: knowledge base, computerized model, and user interface. DSS simulate cognitive decision-making functions of humans based on artificial intelligence methodologies (including expert systems, data mining, machine learning, connectionism, logistical reasoning, etc.) in order to perform decision support functions. The applications of DSS cover many domains, ranging from aviation monitoring, transportation safety, clinical diagnosis, weather forecast, business management to internet search strategy. By combining knowledge bases with inference rules, DSS are able to provide suggestions to end users to improve decisions and outcomes. This book is written as a textbook so that it can be used in formal courses examining decision support systems. It may be used by both undergraduate and graduate students from diverse computer-related fields. It will also be of value to established professionals as a text for self-study or for reference

    The Second International Conference on Health Information Technology Advancement

    Get PDF
    TABLE OF CONTENTS I. Message from the Conference Co-Chairs B. Han and S. Falan …………………………....….……………. 5 II. Message from the Transactions Editor H. Lee …...………..………….......………….……….………….... 7 III. Referred Papers A. Emerging Health Information Technology and Applications The Role of Mobile Technology in Enhancing the Use of Personal Health Records Mohamed Abouzahra and Joseph Tan………………….……………. 9 Mobile Health Information Technology and Patient Care: Methods, Themes, and Research Gaps Bahae Samhan, Majid Dadgar, and K. D. Joshi…………..…. 18 A Balanced Perspective to Perioperative Process Management Jim Ryan, Barbara Doster, Sandra Daily, and Carmen Lewis…..….…………… 30 The Impact of Big Data on the Healthcare Information Systems Kuo Lane Chen and Huei Lee………….…………… 43 B. Health Care Communication, Literacy, and Patient Care Quality Digital Illness Narratives: A New Form of Health Communication Jofen Han and Jo Wiley…..….……..…. 47 Relationships, Caring, and Near Misses: Michael’s Story Sharie Falan and Bernard Han……………….…..…. 53 What is Your Informatics Skills Level? -- The Reliability of an Informatics Competency Measurement Tool Xiaomeng Sun and Sharie Falan.….….….….….….…. 61 C. Health Information Standardization and Interoperability Standardization Needs for Effective Interoperability Marilyn Skrocki…………………….…….………….… 76 Data Interoperability and Information Security in Healthcare Reid Berryman, Nathan Yost, Nicholas Dunn, and Christopher Edwards.…. 84 Michigan Health Information Network (MiHIN) Shared Services vs. the HIE Shared Services in Other States Devon O’Toole, Sean O’Toole, and Logan Steely…..……….…… 94 D. Health information Security and Regulation A Threat Table Based Approach to Telemedicine Security John C. Pendergrass, Karen Heart, C. Ranganathan, and V.N. Venkatakrishnan …. 104 Managing Government Regulatory Requirements for Security and Privacy Using Existing Standard Models Gregory Schymik and Dan Shoemaker…….…….….….… 112 Challenges of Mobile Healthcare Application Security Alan Rea………………………….……………. 118 E. Healthcare Management and Administration Analytical Methods for Planning and Scheduling Daily Work in Inpatient Care Settings: Opportunities for Research and Practice Laila Cure….….……………..….….….….… 121 Predictive Modeling in Post-reform Marketplace Wu-Chyuan Gau, Andrew France, Maria E. Moutinho, Carl D. Smith, and Morgan C. Wang…………...…. 131 A Study on Generic Prescription Substitution Policy as a Cost Containment Approach for Michigan’s Medicaid System Khandaker Nayeemul Islam…….…...……...………………….… 140 F. Health Information Technology Quality Assessment and Medical Service Delivery Theoretical, Methodological and Practical Challenges in Designing Formative Evaluations of Personal eHealth Tools Michael S. Dohan and Joseph Tan……………….……. 150 The Principles of Good Health Care in the U.S. in the 2010s Andrew Targowski…………………….……. 161 Health Information Technology in American Medicine: A Historical Perspective Kenneth A. Fisher………………….……. 171 G. Health Information Technology and Medical Practice Monitoring and Assisting Maternity-Infant Care in Rural Areas (MAMICare) Juan C. Lavariega, Gustavo Córdova, Lorena G Gómez, Alfonso Avila….… 175 An Empirical Study of Home Healthcare Robots Adoption Using the UTUAT Model Ahmad Alaiad, Lina Zhou, and Gunes Koru.…………………….….………. 185 HDQM2: Healthcare Data Quality Maturity Model Javier Mauricio Pinto-Valverde, Miguel Ángel Pérez-Guardado, Lorena Gomez-Martinez, Martha Corrales-Estrada, and Juan Carlos Lavariega-Jarquín.… 199 IV. A List of Reviewers …………………………..…….………………………208 V. WMU – IT Forum 2014 Call for Papers …..…….…………………20

    Procedural-Reasoning Architecture for Applied Behavior Analysis-based Instructions

    Get PDF
    Autism Spectrum Disorder (ASD) is a complex developmental disability affecting as many as 1 in every 88 children. While there is no known cure for ASD, there are known behavioral and developmental interventions, based on demonstrated efficacy, that have become the predominant treatments for improving social, adaptive, and behavioral functions in children. Applied Behavioral Analysis (ABA)-based early childhood interventions are evidence based, efficacious therapies for autism that are widely recognized as effective approaches to remediation of the symptoms of ASD. They are, however, labor intensive and consequently often inaccessible at the recommended levels. Recent advancements in socially assistive robotics and applications of virtual intelligent agents have shown that children with ASD accept intelligent agents as effective and often preferred substitutes for human therapists. This research is nascent and highly experimental with no unifying, interdisciplinary, and integral approach to development of intelligent agents based therapies, especially not in the area of behavioral interventions. Motivated by the absence of the unifying framework, we developed a conceptual procedural-reasoning agent architecture (PRA-ABA) that, we propose, could serve as a foundation for ABA-based assistive technologies involving virtual, mixed or embodied agents, including robots. This architecture and related research presented in this disser- tation encompass two main areas: (a) knowledge representation and computational model of the behavioral aspects of ABA as applicable to autism intervention practices, and (b) abstract architecture for multi-modal, agent-mediated implementation of these practices

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    2019 Abstract Booklet

    Get PDF
    Complete Schedule of Events for the 21st Annual Undergraduate Research Symposium at Minnesota State University, Mankato

    Strategies Information and Communication Technology Managers Use to Build Employee Competencies

    Get PDF
    The World Economic Forum (WEF) found that Botswana\u27s information and communication technology (ICT) networked readiness index (NRI) had declined from position 89 in 2012 to 104 in 2015. A decline in Botswana\u27s ICT NRI resulted in a modest gross domestic product (GDP) growth increasing from 4.2% in 2012 to 5.0% in 2015. The purpose of this qualitative multiple case study was to explore strategies ICT service provider managers use to build employee competencies to address ICT infrastructure performance deficiencies. The target population for this study consisted of over 120 managers from 2 ICT service providers located in Gaborone and Francistown in Botswana. The conceptual framework for this study was information technology (IT) competency model. Face-to-face interviews with 15 managers and a review of 12 company documents were gathered and all interpretations from the data were subjected to member checking to ensure the trustworthiness of the study findings. The thematic analyses of participants\u27 interviews and company documents resulted in the emergence of 3 common themes: developing professional employee competencies through training, promoting knowledge acquisition and skills transfer, and developing budgets for funding the development of employee competencies. Participants cited training and professional development as a reason for ICT infrastructure performance deficiencies. Social implications from this study include developing strategies business managers can use to build employee competencies to improve ICT infrastructure performance, which could result in improved services to citizens and enhanced national development, social transformation, and economic diversification
    corecore