241,690 research outputs found
E-Business Curriculum Development
The emergence of e-Business has been both rapid and pervasive. Few can deny that the technology has dramatically disrupted all types of business in recent years. To effectively add value in this new business environment, today\u27s managers must understand the fundamental issues associated with e-Business, whether one is pursuing a career in supply-chain management, customer relationship management, content creation and management, enterprise resources planning, transaction processing systems, or network security, etc. This paper discusses the need for an interdisciplinary e-business program and how the program addresses the need of the marketplace. The paper also describes the experience of California State Polytechnic University, Pomona in designing such a program
Stuck in a Loop: Individual and System Barriers for Job Seekers with Disabilities
Research conducted within Temporary Assistance to Needy Families (Personal Responsibility and Work Opportunity Reconciliation Act of 1996) and Workforce Investment Act of 1998 systems indicates pervasive issues hindering program effectiveness for job seekers with disabilities. This population frequently experiences employment barriers beyond those of able-bodied job seekers, including significantly lower self-esteem. Service providers need and want information about disability but do not know how to obtain it. Program staff and job seekers with disabilities get stuck in a loop wherein each questions their ability and neither feels empowered to make meaningful changes to improve outcomes. Career counselors may need to expand their role to be more culturally relevant for these clients
Taking the Pulse: A Case Study of Racial Disparities in Nursing Education
This qualitative study, using a case study methodology, explores the experiences of students of color in a nursing program. In particular, I sought to uncover how students of color conceptualize their experience and racial identity in a nursing program in the northern suburbs of Minneapolis, Minnesota. The purpose of this study is to document the experiences of students of color in a nursing program to advance educational opportunities in nursing education and develop meaningful practices in the classroom. This case study identifies the need to graduate nurses of color and prepare them to work alongside communities of color with an intent to combat social determinants of health and health inequities throughout the health care system. The use of interviews data from nursing program graduates as well as non-graduates, make the case for the need to address the issues that lie within our systems, pedagogy, and pervasive implicit bias in higher education, specifically, in nursing education. This case study details the strength and sacrifices students of color had to endure in a nursing program and how each student navigated the difficulties of being racially marginalized and targeted.
This study explores the personal stories of non-white students and how they recognized the unsaid rules and implications within higher education and the imbalance of power that affects their performance, cultural emotional health, and academic experience in nursing school. Using student development and critical race theories to unpack negative peak experiences or “racial disparities,” this study recommends additional training for administrators, faculty and staff
Towards a Tool-based Development Methodology for Pervasive Computing Applications
Despite much progress, developing a pervasive computing application remains a
challenge because of a lack of conceptual frameworks and supporting tools. This
challenge involves coping with heterogeneous devices, overcoming the
intricacies of distributed systems technologies, working out an architecture
for the application, encoding it in a program, writing specific code to test
the application, and finally deploying it. This paper presents a design
language and a tool suite covering the development life-cycle of a pervasive
computing application. The design language allows to define a taxonomy of
area-specific building-blocks, abstracting over their heterogeneity. This
language also includes a layer to define the architecture of an application,
following an architectural pattern commonly used in the pervasive computing
domain. Our underlying methodology assigns roles to the stakeholders, providing
separation of concerns. Our tool suite includes a compiler that takes design
artifacts written in our language as input and generates a programming
framework that supports the subsequent development stages, namely
implementation, testing, and deployment. Our methodology has been applied on a
wide spectrum of areas. Based on these experiments, we assess our approach
through three criteria: expressiveness, usability, and productivity
Pervasive computing at tableside : a wireless web-based ordering system
Purpose – The purpose of this paper is to introduce a wireless web-based ordering system called iMenu in the restaurant industry. Design/methodology/approach – By using wireless devices such as personal digital assistants and WebPads, this system realizes the paradigm of pervasive computing at tableside. Detailed system requirements, design, implementation and evaluation of iMenu are presented.Findings – The evaluation of iMenu shows it explicitly increases productivity of restaurant staff. It also has other desirable features such as integration, interoperation and scalability. Compared to traditional restaurant ordering process, by using this system customers get faster and better services, restaurant staff cooperate more efficiently with less working mistakes, and enterprise owners thus receive more business profits. Originality/value – While many researchers have explored using wireless web-based information systems in different industries, this paper presents a system that employs wireless multi-tiered web-based architecture to build pervasive computing systems. Instead of discussing theoretical issues on pervasive computing, we focus on practical issues of developing a real system, such as choosing of web-based architecture, design of input methods in small screens, and response time in wireless web-based systems.<br /
Entangled Stakeholder Roles and Perceptions in Health Information Systems: A Longitudinal Study of the U.K. NHS N3 Network
The combination of pervasive and complex technology and an increasingly challenging healthcare environment is the setting for this research study. As a longitudinal case study, the research tracked the development and implementation of a large private information systems network in the U.K. National Health Service (NHS). Using stakeholder theory, we unpacked the story of a complex network of stakeholder roles and perceptions and how they changed over time. Our findings suggest that favorable and unfavorable positions held by multiple stakeholder groups become entangled and that even the same focal group may adopt competing positions that undermine the adoption of the health network. As this situation develops, the policy and implementation of the broader health IT program becomes confused and destabilized. This study makes three contributions. First, it expands the literature on stakeholder theory in the IS domain. Second, it extends the managerial focus of stakeholder approaches to include policymaking in the diverse multi-stakeholder setting of healthcare. Third, it demonstrates how IS research can employ stakeholder analysis by adopting a broader, dynamic approach to identify different stakeholder groups and by focusing on their varied roles and views during the course of a large-scale health IT program
Reading between the lines of code : visualising a program’s lifetime
Visual representations of systems or processes are rife in all fields of science and engineering due to the concise yet effusive descriptions such representations convey. Humans’ pervasive tendency to visualise has led to various methods being evolved through the years to represent different aspects of software. However visualising running software has been fraught with the challenges of providing a meaningful representation of a process which is stripped of meaningful cues and reduced to manipulating values and the field has consequently evolved very slowly. Visualising running software is particularly useful for analysing the behaviour of software (e.g. software written to make use of late binding) and to gain a better understanding of the ever-important assessment of how well the final product is fulfilling the initial request. This paper discusses the significance of gaining improved insight into a program’s lifetime and demonstrates how attributing a geometric sense to the design of computer languages can serve to make it easier to visualise the execution of software by shifting the focus of semantics towards the spatial organisation of program parts.peer-reviewe
Federated Embedded Systems – a review of the literature in related fields
This report is concerned with the vision of smart interconnected objects, a vision that has attracted much attention lately. In this paper, embedded, interconnected, open, and heterogeneous control systems are in focus, formally referred to as Federated Embedded Systems. To place FES into a context, a review of some related research directions is presented. This review includes such concepts as systems of systems, cyber-physical systems, ubiquitous
computing, internet of things, and multi-agent systems. Interestingly, the reviewed fields seem to overlap with each other in an increasing number of ways
Design and Implementation of S-MARKS: A Secure Middleware for Pervasive Computing Applications
As portable devices have become a part of our everyday life, more people are unknowingly participating in a pervasive computing environment. People engage with not a single device for a specific purpose but many devices interacting with each other in the course of ordinary activity. With such prevalence of pervasive technology, the interaction between portable devices needs to be continuous and imperceptible to device users. Pervasive computing requires a small, scalable and robust network which relies heavily on the middleware to resolve communication and security issues. In this paper, we present the design and implementation of S-MARKS which incorporates device validation, resource discovery and a privacy module
- …