315,124 research outputs found
Recommended from our members
Towards an evaluation framework for medical web applications
Copyright @ 2013 EMCIS.The main aim of this study is to review and analyse various evaluation frameworks used to assess the operational effectiveness of various Information Technology (IT) processes/applications and identify their strengths in order to form a new holistic framework for economic evaluation of web applications. This research aims to address the need for a new holistic evaluation framework for the purpose of the evaluation of the medical web applications. Over the last decade more and more, companies used accountancy techniques such as the frameworks analysed in this research. This new holistic framework that was developed will include also steps regarding the indirect and intangible costs and benefits identification and their incorporation in the evaluation process. Moreover the new emerging market of the medical websites and the embedded on them web applications requires also a new evaluation framework that will provide accurate results in the estimation of the efficiency of an investment on them. The paper first presents an introduction about why economic evaluation is important when evaluating the Information Technology in organizations. Various studies are reviewed, which highlight the ever increasing importance of integrating economic evaluation processes, such as Cost Benefit Analysis (CBA) and Return on Investment (ROI), into systems and processes of organizations and economic organizations, and analyse the factors that govern their role. Finally, the evaluation frameworks and methods that are found in these studies should be used as a part of a proactive systematic action plan that the organizations could use to avoid budget reduction due to incorrect planning. The next part of this study includes a comprehensive presentation and review of past frameworks used to evaluate Information Technology. The frameworks that are reviewed are the Framework for evaluation of information systems, the Information Technology Adoption Model (ITAM), the Total Evaluation and Acceptance Methodology (TEAM) framework, the ROI Process Model and HOT-fit evaluation framework for Health Information Systems
Community Development Evaluation Storymap and Legend
Community based organizations, funders, and intermediary organizations working in the community development field have a shared interest in building stronger organizations and stronger communities. Through evaluation these organizations can learn how their programs and activities contribute to the achievement of these goals, and how to improve their effectiveness and the well-being of their communities. Yet, evaluation is rarely seen as part of a non-judgemental organizational learning process. Instead, the term "evaluation" has often generated anxiety and confusion. The Community Development Storymap project is a response to those concerns.Illustrations found in this document were produced by Grove Consultants
Recommended from our members
An architecture for certification-aware service discovery
Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust domain (e.g., a single organization). Also, some of the key promises of service-orientation - such as the dynamic orchestration of externally provided software services, using runtime service discovery and deployment - are still unachieved. One of the main reasons for this is the trust gap that normally arises when software services, offered by previously unknown providers, are to be selected at run-time, without any human intervention. To close this gap, the concept of machine-readable security certificates (called asserts) has been recently introduced, which paves the way to automated processing about security properties of services. Similarly to current security certification schemes, the assessment of the security properties of a service is delegated to an independent third party (certification authority), who issues a corresponding assert, bound to the service. In this paper, we propose an architecture, which exploits the assert concept to realise a certification-aware service discovery framework. The architecture supports the discovery of single services based on certified security properties (in additional to the usual functional properties), as well as the dynamic synthesis of service compositions, that satisfy the given security properties. The architecture is extensible, thus allowing for a range of domain specific matchmaking components, to cover dimensions related to, e.g., performance, cost and other non-functional characteristics
Developing a goal-oriented SDI assessment approach using GIDEON - the Dutch SDI implementation strategy - as a case study
In 2008, the Dutch government approved the GIDEON document as a policy aiming at the implementation of the National Spatial Data Infrastructure (NSDI) in the Netherlands. The execution of GIDEON should take place by pursuing seven implementation strategies which lead to the achievement of the GIDEON goals. GIDEON also expresses the need to monitor the progress of implementing its strategies and realization of its goals. Currently, the work has been started on monitoring the GIDEON implementation strategies. However, there is still a lack of knowledge and methods to monitor GIDEON goals realization. The challenge is to come up with an approach to assess to what extent these goals are achieved. As a response to the challenge of assessing the GIDEON goals, this paper explores the possibility of using the Multi-view SDI assessment framework (Grus et al., 2007). This paper presents and discusses the method that applies the Multi-view SDI assessment framework, its indicators and measurement methods to create a GIDEON assessment approach. The method of creating a GIDEON assessment approach consists of several procedural steps: formulating specific GIDEON objectives, organizing a one-day workshop involving focus group of specific stakeholders responsible for creation and execution of NSDI, asking the workshop participants to select from a long list those indicators that best measure the achievement of each GIDEON goals. The key step of GIDEON approach is a one-day workshop. The workshop participants represented all organizations that cooperated and/or created GIDEON. The workshop consisted of two parts: first part explained the context of a challenge of assessing GIDEON, second part included participants activity to select and come to the consensus on the list of indicators that would best measure GIDEON goals realization. Additionally, the participants were asked to evaluate and express feedback on the usefulness of the method of creating GIDEON assessment approach. The results show that several indicators that relate to specific SDI goals could be selected by a significant number of workshop participants. The indicators that have been selected are not the final ones yet, but provide a guideline and form a base of what has to be measured when assessing GIDEON goals. Involving the representatives of all parties committed to GIDEON into the process of GIDEON assessment approach creation will strengthen its robustness and acceptance. The results of the feedback form filled by each participant show that the presented method is useful or very useful to create GIDEON assessment approach. Additionally, some of the participants provided already their own indicators which are very specific for Dutch SDI monitoring.The method presented in this research, assuming that SDI goals are defined and the organizations that participate in SDI creation are known, can be applied in any other country to develop country-specific and practical SDI assessment approach
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Search engines are the prevalently used tools to collect information about
individuals on the Internet. Search results typically comprise a variety of
sources that contain personal information -- either intentionally released by
the person herself, or unintentionally leaked or published by third parties,
often with detrimental effects on the individual's privacy. To grant
individuals the ability to regain control over their disseminated personal
information, the European Court of Justice recently ruled that EU citizens have
a right to be forgotten in the sense that indexing systems, must offer them
technical means to request removal of links from search results that point to
sources violating their data protection rights. As of now, these technical
means consist of a web form that requires a user to manually identify all
relevant links upfront and to insert them into the web form, followed by a
manual evaluation by employees of the indexing system to assess if the request
is eligible and lawful.
We propose a universal framework Oblivion to support the automation of the
right to be forgotten in a scalable, provable and privacy-preserving manner.
First, Oblivion enables a user to automatically find and tag her disseminated
personal information using natural language processing and image recognition
techniques and file a request in a privacy-preserving manner. Second, Oblivion
provides indexing systems with an automated and provable eligibility mechanism,
asserting that the author of a request is indeed affected by an online
resource. The automated ligibility proof ensures censorship-resistance so that
only legitimately affected individuals can request the removal of corresponding
links from search results. We have conducted comprehensive evaluations, showing
that Oblivion is capable of handling 278 removal requests per second, and is
hence suitable for large-scale deployment
- …