916 research outputs found
Performing Under Pressure: Annual Findings of a 50-State Survey of Eligibility, Enrollment, Renewal, and Cost-Sharing Policies in Medicaid and CHIP, 2011-2012
Analyzes findings on state trends in maintaining or expanding eligibility for public coverage and improving enrollment and renewal procedures. Highlights some states' expansion of Medicaid eligibility and the use of technology to achieve efficiencies
Recommended from our members
Information systems and healthcare XXIV: Factors affecting the EAI adoption in the healthcare sector
Recent developments in the field of integration technologies like Enterprise Application Integration (EAI) have emerged to support organizations towards improving the quality of services and reducing integration costs. Despite the importance of EAI, there is limited empirical research reported on its adoption in the healthcare sector. Khoumbati et al. [2006] developed a model for the evaluation of EAI in healthcare organizations. In doing so, the causal interrelationship of EAI adoption factors was identified by using fuzzy cognitive mapping. This paper is a progression of previous work in the area and seeks to contribute by validating the model through a different case environment. Thus, this paper contributes by deriving and proposing the MAESTRO model for EAI adoption. MAESTRO identifies a set of factors that influence EAI adoption and it is evaluated through a real-life case study. It provides an understanding of the EAI adoption process through its grounding on empirical data. In doing so, the MAESTRO model supports the management of healthcare organizations during the decision-making process for EAI adoption
Three IT-Business Alignment Profiles: Technical Resource, Business Enabler, and Strategic Weapon
There is a growing recognition among alignment researchers and IT professionals that one size does not fit all. In this article, we provide an important extension of alignment research that shows three profiles linking IT to different business objectives. We address the need to identify the appropriate types of IT alignment by using a multi-method study including interviews and cases. Two dimensions define the three alignment profiles: internal IT-business integration and external market engagement. The technical resource profile calls for low levels of IT-business integration and IT-market engagement. The business enabler profile deploys IT in some business processes and begins engaging IT with customers and suppliers. The strategic weapon profile uses IT to mobilize and extend the enterprise, which requires extensive IT deployment, both internally and externally. Each profile differs in strategies, criteria, capabilities, and mental models. Importantly, IT decision-makers should not adopt stage-model thinking which assumes that technical resource profiles naturally progress up the chain. Rather, successful use of IT requires specifying the requisite alignment profile as an initial design decision so that appropriate levels of resource allocation and management involvement occur
The Advocate, Vol. 24, No. 1, 1993
https://dc.suffolk.edu/ad-mag/1068/thumbnail.jp
VIRTUAL PLC PLATFORM FOR SECURITY AND FORENSICS OF INDUSTRIAL CONTROL SYSTEMS
Industrial Control Systems (ICS) are vital in managing critical infrastructures, including nuclear power plants and electric grids. With the advent of the Industrial Internet of Things (IIoT), these systems have been integrated into broader networks, enhancing efficiency but also becoming targets for cyberattacks. Central to ICS are Programmable Logic Controllers (PLCs), which bridge the physical and cyber worlds and are often exploited by attackers. There\u27s a critical need for tools to analyze cyberattacks on PLCs, uncover vulnerabilities, and improve ICS security. Existing tools are hindered by the proprietary nature of PLC software, limiting scalability and efficiency.
To overcome these challenges, I developed a Virtual PLC Platform (VPP) for forensic analyses of ICS attacks and vulnerability identification. The VPP employs the packet replay technique, using network traffic to create a PLC template. This template guides the virtual PLC in network communication, mimicking real PLCs. A Protocol Reverse Engineering Engine (PREE) module assists in reverse-engineering ICS protocols and discovering vulnerabilities. The VPP is automated, supporting PLCs from various vendors, and eliminates manual reverse engineering. This dissertation highlights the architecture and applications of the VPP in forensic analysis, reverse engineering, vulnerability discovery, and threat intelligence gathering, all crucial to bolstering the security and integrity of critical infrastructure
Hard-Real-Time Computing Performance in a Cloud Environment
The United States Department of Defense (DoD) is rapidly working with DoD Services to move from multi-year (e.g., 7-10) traditional acquisition programs to a commercial industrybased approach for software development. While commercial technologies and approaches provide an opportunity for rapid fielding of mission capabilities to pace threats, the suitability of commercial technologies to meet hard-real-time requirements within a surface combat system is unclear. This research establishes technical data to validate the effectiveness and suitability of current commercial technologies to meet the hard-real-time demands of a DoD combat management system. (Moreland Jr., 2013) conducted similar research; however, microservices, containers, and container orchestration technologies were not on the DoD radar at the time. Updated knowledge in this area will inform future DoD roadmaps and investments. A mission-based approach using Mission Engineering will be used to set the context for applied research. A hypothetical yet operationally relevant Strait Transit scenario has been established to provide context for definition of experimental parameters to be set while assessing the hypothesis. System models federated to form a system-of-systems architecture and data from a cloud computing environment are used to collect data for quantitative analysis
Environmental Management Information Systems (EMIS) for Sustainable Development: A Conceptual Overview
Environmental management information systems (EMIS) is defined as \u27organizational-technical systems for systematically obtaining, processing, and making available relevant environmental information available in companies\u27. Such systems evolved out of a growing need to manage environmental information in response to internal and external pressures such as regulations, consumers, stockholders, and changes in the business environments. While over the past decade EMIS have proliferated in the corporate landscape, these systems have received little attention within the information systems research community as whole. The objective of this paper is to serve as a tutorial providing a conceptual overview of EMIS, highlighting organizational and technical issues, as well as research opportunities. In this paper we suggest that there are significant and relatively untapped research synergies existing between information systems and environmental management for sustainable development at the organizational and technical levels
- …