1,095 research outputs found

    Mobile Technology Deployment Strategies for Improving the Quality of Healthcare

    Get PDF
    Ineffective deployment of mobile technology jeopardizes healthcare quality, cost control, and access, resulting in healthcare organizations losing customers and revenue. A multiple case study was conducted to explore the strategies that chief information officers (CIOs) used for the effective deployment of mobile technology in healthcare organizations. The study population consisted of 3 healthcare CIOs and 2 healthcare information technology consultants who have experience in deploying mobile technology in a healthcare organization in the United States. The conceptual framework that grounded the study was Wallace and Iyer\u27s health information technology value hierarchy. Data were collected using semistructured interviews and document reviews, followed by within-case and cross-case analyses for triangulation and data saturation. Key themes that emerged from data analysis included the application of disruptive technology in healthcare, ownership and management of mobile health equipment, and cybersecurity. The healthcare CIOs and consultants emphasized their concern about the lack of cybersecurity in mobile technology. CIOs were reluctant to deploy the bring-your-own-device strategy in their organizations. The implications of this study for positive social change include the potential for healthcare CIOs to emphasize the business practice of supporting healthcare providers in using secure mobile equipment deployment strategies to provide enhanced care, safety, peace of mind, convenience, and ease of access to patients while controlling costs

    Impact of the Increased Use of Telehealth on Health Care Management and Administration: The Case of New Care Management Practices

    Get PDF
    The COVID-19 pandemic has brought unprecedented challenges to healthcare systems worldwide, forcing them to adapt and implement alternative modes of healthcare delivery quickly. Telehealth, the delivery of healthcare services through telecommunication technologies, has become crucial in providing continuous care while reducing the risk of virus transmission. This qualitative study aimed to explore healthcare managers\u27 perceptions of the use of telehealth and its impact on healthcare practices during the pandemic, particularly in terms of provision and quality control. A purposive sample of 10 healthcare managers from different healthcare settings in the United States participated in semi-structured interviews conducted via video conferencing. The interviews were transcribed and analyzed using thematic analysis. The findings revealed six overarching themes: (1) perceived benefits of telehealth, including increased accessibility, convenience, and efficiency; (2) challenges and limitations of telehealth; (3) role of telehealth in shaping healthcare practices; (4) implications for quality control, including the need for standardization, training, and evaluation measures; (5) leadership and innovation in telehealth; and (6) future of telehealth in healthcare management. This study provides insights into how healthcare managers perceive the use of telehealth and how it shapes healthcare practices during the COVID-19 pandemic. The findings suggest that telehealth can potentially improve healthcare provision and quality control, but its implementation requires addressing challenges and limitations and adapting to evolving healthcare needs. Future research can build on these findings by exploring the perspectives of other stakeholders, such as healthcare providers and patients, and examining the long-term effects of telehealth on healthcare practices

    User Interface Challenges of Banking ATM Systems in Nigeria

    Get PDF
    The use of banking automated teller machine (ATM) technological innovations have significant importance and benefits in Nigeria, but numerous investigations have shown that illiterate and semiliterate Nigerians do not perceive them as useful or easy-to-use. Developing easy-to-use banking ATM system interfaces is essential to accommodate over 40% illiterate and semiliterate Nigerians, who are potential users of banking ATM systems. The purpose of this study was to identify strategies software developers of banking ATM systems in Nigeria use to create easy-to-use banking ATM system interfaces for a variety of people with varying abilities and literacy levels. The technology acceptance model was adopted as the conceptual framework. The study\u27s population consisted of qualified and experienced developers of banking ATM system interfaces chosen from 1 organization in Enugu, Nigeria. The data collection process included semistructured, in-depth face-to-face interviews with 9 banking ATM system interface developers and the analysis of 11 documents: 5 from participant case organizations and 6 from nonparticipant case organizations. Member checking was used to increase the validity of the findings from the participants. Through methodological triangulation, 4 major themes emerged from the study: importance of user-centered design strategies, importance of user feedback as essential interface design, value of pictorial images and voice prompts, and importance of well-defined interface development process. The findings in this study may be beneficial for the future development of strategies to create easy-to-use ATM system interfaces for a variety of people with varying abilities and literacy levels and for other information technology systems that are user interface technology dependent

    The architecture and acuity of critical systems thinking

    Get PDF
    This thesis looks at two critical urges in Critical Systems Thinking that both complement and critique each other. Firstly, there is an urge to construct in a critical manner. Secondly, there is an urge to be critical about such constructions. They complement and critique each other in the manner in which the second urge requires the first urge in order to understand what it means when one begins to create by construction, and also in which the first urge requires the second in order to understand the privileged position that construction is given in epistemology. These two urges give two stages.Construction relates to four clear conditions that develop from an Architectural study. This study offers two definitions of Architecture : structural longevity and relational modification. Consequently, a Structure and Process are established (first two stages) which together content an Architecture of Critical Systems Thinking (third stage). This Architecture is then applied to Systems Thinking through a study of five Systems Thinkers, this application offers an Architecture as commensurability (fourth stage). The Architecture is thereby offered as author.De-construction relates to four clear conditions that develop from the Architecture of Critical Systems Thinking. Each condition questions the Architectural authority to construct. The Process (reversed to complement and critique) questions the Structural consistency of the Architecture (first). A Structure of Acuity develops that maintains meaning where the Architecture neutralised meaning (second). A Contentless Acuity follows (third), thereby allowing the contentlessness of paradigm (in)commensurability to be discussed as an application of the Acuity of Critical Systems Thinking. The Acuity is thereby offered as reader.To balance these two urges is to read with authority

    Random Sequence Perception Amongst Finance and Accounting Personnel: Can We Measure Illusion Of Control, A Type I Error, or Illusion Of Chaos, A Type II Error?

    Get PDF
    The purpose of this dissertation was to determine if finance and accounting personnel could distinguish between random and non-random time-series strings and to determine what types of errors they would make. These individuals averaging 13 years of experience were unable to distinguish non-random patterns from random strings in an assessment composed of statistical process control (SPC) charts. Respondents scored no better than guessing which was also assessed with a series of true-false questions. Neither over-alternation (oscillation) nor under-alternation (trend) strategies were able to predict type I or type II error rates, i.e. illusion of control or illusion of chaos. Latent class analysis methods within partial least squares structural equation modeling (PLS-SEM) were successful in uncovering segments or groups of respondents with large explained variance and significant path models. Relationships between desirability of control, personal fear of invalidity, and error rates were more varied than expected. Yet, some segments tended to illusion of control while others to illusion of chaos. Similar effects were also observed when substituting a true-false guessing assessment for the SPC assessment with some loss of explained variance and weaker path coefficients. Respondents also provided their perceptions and thoughts of randomness for both SPC and true-false assessments

    Entropy Generation Results of Convenience But without Purposeful Analysis and Due Comprehension—Guidelines for Authors

    No full text
    There is a growing trend in recently-submitted manuscripts and publications to present calculated results of entropy generation, also known as entropy production, as field quantities in a system or device control volume, based on prior calculation of velocity and temperature fields, frequently using CFD numerical methods. [...

    Supporting the Maintenance of Identifier Names: A Holistic Approach to High-Quality Automated Identifier Naming

    Get PDF
    A considerable part of the source code is identifier names-- unique lexical tokens that provide information about entities, and entity interactions, within the code. Identifier names provide human-readable descriptions of classes, functions, variables, etc. Poor or ambiguous identifier names (i.e., names that do not correctly describe the code behavior they are associated with) will lead developers to spend more time working towards understanding the code\u27s behavior. Bad naming can also have detrimental effects on tools that rely on natural language clues; degrading the quality of their output and making them unreliable. Additionally, misinterpretations of the code, caused by poor names, can result in the injection of quality issues into the system under maintenance. Thus, improved identifier naming increases developer effectiveness, higher-quality software, and higher-quality software analysis tools. In this dissertation, I establish several novel concepts that help measure and improve the quality of identifiers. The output of this dissertation work is a set of identifier name appraisal and quality tools that integrate into the developer workflow. Through a sequence of empirical studies, I have formulated a series of heuristics and linguistic patterns to evaluate the quality of identifier names in the code and provide naming structure recommendations. I envision and working towards supporting developers in integrating my contributions, discussed in this dissertation, into their development workflow to significantly improve the process of crafting and maintaining high-quality identifier names in the source code

    ICSEA 2022: the seventeenth international conference on software engineering advances

    Get PDF
    The Seventeenth International Conference on Software Engineering Advances (ICSEA 2022), held between October 16th and October 20th, 2022, continued a series of events covering a broad spectrum of software-related topics. The conference covered fundamentals on designing, implementing, testing, validating and maintaining various kinds of software. Several tracks were proposed to treat the topics from theory to practice, in terms of methodologies, design, implementation, testing, use cases, tools, and lessons learned. The conference topics covered classical and advanced methodologies, open source, agile software, as well as software deployment and software economics and education. Other advanced aspects are related to on-time practical aspects, such as run-time vulnerability checking, rejuvenation process, updates partial or temporary feature deprecation, software deployment and configuration, and on-line software updates. These aspects trigger implications related to patenting, licensing, engineering education, new ways for software adoption and improvement, and ultimately, to software knowledge management. There are many advanced applications requiring robust, safe, and secure software: disaster recovery applications, vehicular systems, biomedical-related software, biometrics related software, mission critical software, E-health related software, crisis-situation software. These applications require appropriate software engineering techniques, metrics and formalisms, such as, software reuse, appropriate software quality metrics, composition and integration, consistency checking, model checking, provers and reasoning. The nature of research in software varies slightly with the specific discipline researchers work in, yet there is much common ground and room for a sharing of best practice, frameworks, tools, languages and methodologies. Despite the number of experts we have available, little work is done at the meta level, that is examining how we go about our research, and how this process can be improved. There are questions related to the choice of programming language, IDEs and documentation styles and standard. Reuse can be of great benefit to research projects yet reuse of prior research projects introduces special problems that need to be mitigated. The research environment is a mix of creativity and systematic approach which leads to a creative tension that needs to be managed or at least monitored. Much of the coding in any university is undertaken by research students or young researchers. Issues of skills training, development and quality control can have significant effects on an entire department. In an industrial research setting, the environment is not quite that of industry as a whole, nor does it follow the pattern set by the university. The unique approaches and issues of industrial research may hold lessons for researchers in other domains. We take here the opportunity to warmly thank all the members of the ICSEA 2022 technical program committee, as well as all the reviewers. The creation of such a high-quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and effort to contribute to ICSEA 2022. We truly believe that, thanks to all these efforts, the final conference program consisted of top-quality contributions. We also thank the members of the ICSEA 2022 organizing committee for their help in handling the logistics of this event. We hope that ICSEA 2022 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in software engineering advances

    Successful Demand Forecasting Modeling Strategies for Increasing Small Retail Medical Supply Profitability

    Get PDF
    The lack of effective demand forecasting strategies can result in imprecise inventory replenishment, inventory overstock, and unused inventory. The purpose of this single case study was to explore successful demand forecasting strategies that leaders of a small, retail, medical supply business used to increase profitability. The conceptual framework for this study was Winters\u27s forecasting demand approach. Data were collected from semistructured, face-to-face interviews with 8 business leaders of a private, small, retail, medical supply business in the southeastern United States and the review of company artifacts. Yin\u27s 5-step qualitative data analysis process of compiling, disassembling, reassembling, interpreting, and concluding was applied. Key themes that emerged from data analysis included understanding sales trends, inventory management with pricing, and seasonality. The findings of this study might contribute to positive social change by encouraging leaders of medical supply businesses to apply demand forecasting strategies that may lead to benefits for medically underserved citizens in need of accessible and abundant medical supplies

    KEER2022

    Get PDF
    AvanttĂ­tol: KEER2022. DiversitiesDescripciĂł del recurs: 25 juliol 202
    • …
    corecore