2,924 research outputs found
Integrating Competency-Based Education in Interactive Learning Systems
Artemis is an interactive learning system that organizes courses, hosts
lecture content and interactive exercises, conducts exams, and creates
automatic assessments with individual feedback. Research shows that students
have unique capabilities, previous experiences, and expectations. However, the
course content on current learning systems, including Artemis, is not tailored
to a student's competencies. The main goal of this paper is to describe how to
make Artemis capable of competency-based education and provide individual
course content based on the unique characteristics of every student. We show
how instructors can define relations between competencies to create a
competency relation graph, how Artemis measures and visualizes the student's
progress toward mastering a competency, and how the progress can generate a
personalized learning path for students that recommends relevant learning
resources. Finally, we present the results of a user study regarding the
usability of the newly designed competency visualization and give an outlook on
possible improvements and future visions.Comment: 4 pages, 2 figures. Best Practitioner Report Awar
Security Enhanced Applications for Information Systems
Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments
Decision Support Systems
Decision support systems (DSS) have evolved over the past four decades from theoretical concepts into real world computerized applications. DSS architecture contains three key components: knowledge base, computerized model, and user interface. DSS simulate cognitive decision-making functions of humans based on artificial intelligence methodologies (including expert systems, data mining, machine learning, connectionism, logistical reasoning, etc.) in order to perform decision support functions. The applications of DSS cover many domains, ranging from aviation monitoring, transportation safety, clinical diagnosis, weather forecast, business management to internet search strategy. By combining knowledge bases with inference rules, DSS are able to provide suggestions to end users to improve decisions and outcomes. This book is written as a textbook so that it can be used in formal courses examining decision support systems. It may be used by both undergraduate and graduate students from diverse computer-related fields. It will also be of value to established professionals as a text for self-study or for reference
The Second International Conference on Health Information Technology Advancement
TABLE OF CONTENTS
I. Message from the Conference Co-Chairs
B. Han and S. Falan …………………………....….……………. 5
II. Message from the Transactions Editor
H. Lee …...………..………….......………….……….………….... 7
III. Referred Papers
A. Emerging Health Information Technology and Applications
The Role of Mobile Technology in Enhancing the Use of Personal Health Records
Mohamed Abouzahra and Joseph Tan………………….……………. 9
Mobile Health Information Technology and Patient Care: Methods, Themes, and Research Gaps
Bahae Samhan, Majid Dadgar, and K. D. Joshi…………..…. 18
A Balanced Perspective to Perioperative Process Management
Jim Ryan, Barbara Doster, Sandra Daily, and Carmen Lewis…..….…………… 30
The Impact of Big Data on the Healthcare Information Systems
Kuo Lane Chen and Huei Lee………….…………… 43
B. Health Care Communication, Literacy, and Patient Care Quality
Digital Illness Narratives: A New Form of Health Communication
Jofen Han and Jo Wiley…..….……..…. 47
Relationships, Caring, and Near Misses: Michael’s Story
Sharie Falan and Bernard Han……………….…..…. 53
What is Your Informatics Skills Level? -- The Reliability of an Informatics Competency Measurement Tool
Xiaomeng Sun and Sharie Falan.….….….….….….…. 61
C. Health Information Standardization and Interoperability
Standardization Needs for Effective Interoperability
Marilyn Skrocki…………………….…….………….… 76
Data Interoperability and Information Security in Healthcare
Reid Berryman, Nathan Yost, Nicholas Dunn, and Christopher Edwards.…. 84
Michigan Health Information Network (MiHIN) Shared Services vs. the HIE Shared Services in Other States
Devon O’Toole, Sean O’Toole, and Logan Steely…..……….…… 94
D. Health information Security and Regulation
A Threat Table Based Approach to Telemedicine Security
John C. Pendergrass, Karen Heart, C. Ranganathan, and V.N. Venkatakrishnan
…. 104
Managing Government Regulatory Requirements for Security and Privacy Using Existing Standard Models
Gregory Schymik and Dan Shoemaker…….…….….….… 112
Challenges of Mobile Healthcare Application Security
Alan Rea………………………….……………. 118
E. Healthcare Management and Administration
Analytical Methods for Planning and Scheduling Daily Work in Inpatient Care Settings:
Opportunities for Research and Practice
Laila Cure….….……………..….….….….… 121
Predictive Modeling in Post-reform Marketplace
Wu-Chyuan Gau, Andrew France, Maria E. Moutinho, Carl D. Smith, and Morgan C. Wang…………...…. 131
A Study on Generic Prescription Substitution Policy as a Cost Containment Approach for Michigan’s Medicaid System
Khandaker Nayeemul Islam…….…...……...………………….… 140
F. Health Information Technology Quality Assessment and Medical Service Delivery
Theoretical, Methodological and Practical Challenges in Designing Formative Evaluations of Personal eHealth Tools
Michael S. Dohan and Joseph Tan……………….……. 150
The Principles of Good Health Care in the U.S. in the 2010s
Andrew Targowski…………………….……. 161
Health Information Technology in American Medicine: A Historical Perspective
Kenneth A. Fisher………………….……. 171
G. Health Information Technology and Medical Practice
Monitoring and Assisting Maternity-Infant Care in Rural Areas (MAMICare)
Juan C. Lavariega, Gustavo Córdova, Lorena G Gómez, Alfonso Avila….… 175
An Empirical Study of Home Healthcare Robots Adoption Using the UTUAT Model
Ahmad Alaiad, Lina Zhou, and Gunes Koru.…………………….….………. 185
HDQM2: Healthcare Data Quality Maturity Model
Javier Mauricio Pinto-Valverde, Miguel Ángel Pérez-Guardado, Lorena Gomez-Martinez, Martha Corrales-Estrada, and Juan Carlos Lavariega-Jarquín.… 199
IV. A List of Reviewers …………………………..…….………………………208
V. WMU – IT Forum 2014 Call for Papers …..…….…………………20
Procedural-Reasoning Architecture for Applied Behavior Analysis-based Instructions
Autism Spectrum Disorder (ASD) is a complex developmental disability affecting as many as 1 in every 88 children. While there is no known cure for ASD, there are known behavioral and developmental interventions, based on demonstrated efficacy, that have become the predominant treatments for improving social, adaptive, and behavioral functions in children.
Applied Behavioral Analysis (ABA)-based early childhood interventions are evidence based, efficacious therapies for autism that are widely recognized as effective approaches to remediation of the symptoms of ASD. They are, however, labor intensive and consequently often inaccessible at the recommended levels.
Recent advancements in socially assistive robotics and applications of virtual intelligent agents have shown that children with ASD accept intelligent agents as effective and often preferred substitutes for human therapists. This research is nascent and highly experimental with no unifying, interdisciplinary, and integral approach to development of intelligent agents based therapies, especially not in the area of behavioral interventions.
Motivated by the absence of the unifying framework, we developed a conceptual procedural-reasoning agent architecture (PRA-ABA) that, we propose, could serve as a foundation for ABA-based assistive technologies involving virtual, mixed or embodied agents, including robots. This architecture and related research presented in this disser- tation encompass two main areas: (a) knowledge representation and computational model of the behavioral aspects of ABA as applicable to autism intervention practices, and (b) abstract architecture for multi-modal, agent-mediated implementation of these practices
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
2019 Abstract Booklet
Complete Schedule of Events for the 21st Annual Undergraduate Research Symposium at Minnesota State University, Mankato
Strategies Information and Communication Technology Managers Use to Build Employee Competencies
The World Economic Forum (WEF) found that Botswana\u27s information and communication technology (ICT) networked readiness index (NRI) had declined from position 89 in 2012 to 104 in 2015. A decline in Botswana\u27s ICT NRI resulted in a modest gross domestic product (GDP) growth increasing from 4.2% in 2012 to 5.0% in 2015. The purpose of this qualitative multiple case study was to explore strategies ICT service provider managers use to build employee competencies to address ICT infrastructure performance deficiencies. The target population for this study consisted of over 120 managers from 2 ICT service providers located in Gaborone and Francistown in Botswana. The conceptual framework for this study was information technology (IT) competency model. Face-to-face interviews with 15 managers and a review of 12 company documents were gathered and all interpretations from the data were subjected to member checking to ensure the trustworthiness of the study findings. The thematic analyses of participants\u27 interviews and company documents resulted in the emergence of 3 common themes: developing professional employee competencies through training, promoting knowledge acquisition and skills transfer, and developing budgets for funding the development of employee competencies. Participants cited training and professional development as a reason for ICT infrastructure performance deficiencies. Social implications from this study include developing strategies business managers can use to build employee competencies to improve ICT infrastructure performance, which could result in improved services to citizens and enhanced national development, social transformation, and economic diversification
- …