13 research outputs found

    Representational Indeterminancy and Enterprise Search: The Importance of Subject Indexes

    Get PDF
    The proposed research examines the impact that adding context – via the use of subject indexes – to a query has on search results. This design science research is motivated by the need for a solution to the well-documented failure of enterprise search. Preliminary experimental data is presented that indicates that the use of subject indexes to augment full-text search may indeed be a valid solution and thereby encourages continued investigation. Continuing the research, we propose an experiment where we simulate the search for randomly selected (single) documents in a collection. We will use the comparison of search results between full-text only and full-text plus subject metadata searches to evaluate search performance. The primary dependent variable used will be the rank of the searched-for document in the result set returned by the search engine for each search

    Managing Government Regulatory Requirements for Security and Privacy Using Existing Standard Models

    Get PDF
    This paper posits the use of a well-established standard approach to Federal compliance, which can be easily adapted to satisfy all legal and regulatory requirements for protection of patient personally identifiable information (PII) in health organizations. This approach is embodied in the three standards that dictate how to comply with the Federal Information Security Management Act (FISMA). These standards also provide an excellent foundation for organizing a secure operation anywhere. The discussion revolves around the application of the FIPS 199 and FIPS 200/NIST 800-53(4) standard approach to the satisfaction of the present and upcoming legal and regulatory requirements for health care PII. The outcome would provide a proven, systematically secure and cost efficient solution to those protection needs. The general approach will be explained and justified

    Order of Magnitude Reductions in the Size of Enterprise Search Result Sets Through the Use of Subject Indexes

    Get PDF
    Keyword search has failed to adequately meet the needs of enterprise users. This is largely due to the indeterminate nature of languages. We argue a different approach needs to be taken, and draw on the success of previous library indexing concepts to propose a solution. We test our solution by performing search queries on a large research database. By incorporating readily available subject indexes into the search process, we obtain order of magnitude improvements in the performance of search queries. Our performance measure is the ratio of the number of documents returned without using subject indexes to the number of documents returned when subject indexes are used. We explain why the observed tenfold improvement in search performance on our research database can be expected to occur for searches on a wide variety of enterprise document stores

    Effectiveness of Shallow Hierarchies for Document Stores

    Get PDF
    Employees spend as much as 4.4 hours every week searching for documents that they never find. Despite this cost, most managers continue to believe that there is no viable alternative to keyword search. In this paper we present the results of an experiment which uses the eight level hierarchy of ABI/Inform to test how many levels are necessary to retrieve one specific paper. Our findings demonstrate empirically that a browsable subject hierarchy of just four levels provides almost as accurate a search result at deeper layers. Therefore the cost of implementing and maintaining a browsable hierarchy is not nearly as high as is frequently estimated. This has significant implications for both researchers and practitioners

    Gender Difference on Students’ Email Security Behaviors

    No full text
    This research aims to understand the gender difference on the email security perceptions and behaviors of undergraduate students at one midwestern public, master’s granting university by surveying students in an introductory computing course about their email security behavior. The survey questions are developed based on the Health Belief Model including behavior, perceived barriers to practice, self-efficacy, cues to action, prior security experience, perceived vulnerability, perceived benefits, and perceived severity. We found evidence of gender differences in self-efficacy and perceived benefits responses; and in the determinants of security behavior (model fit). This study provides a foundation upon which further investigation into gender differences in security behaviors can be based. Suggestions for explanations and implications for researchers and educators are discussed

    A Critical Success Factor Model to Assess Quality Initiatives in Healthcare

    No full text
    PURPOSE: Since the 1980s, formalized methodologies for increasing quality and efficiency such as Total Quality Management, Six Sigma, Lean, etc. have proven successful in reducing costs, increasing production, and improving quality. With the help of this poster, we aim to find a research model that can prove that identical critical success factors can be incorporated in both healthcare and manufacturing industry for the successful implementation of lean in an organization. PROCEDURES: We searched for these articles by using keywords such as ‘Lean Principle’, ‘Healthcare’, and ‘Critical Success Factors’. After thoroughly going through the search results, we found about 150 articles that were relevant to our topic. Then we screened these articles by checking their research question, research models, methods, and findings. Later we performed the first screening where we found ninety-seven articles pertaining to our topic. These were further narrowed down to approximately twenty-six articles by focusing on factors used to measure the performance. These articles helped us narrow down to the following critical support factors: Leadership, Culture, Finance, Lean Tools, Communication and Human Resource Handling. OUTCOME: The research summarizes factors used in manufacturing and healthcare to measure the depth of these Quality Improvement Initiatives in the organizations. It proposes a research model that relates six critical success factors to healthcare outcomes impacted by those factors. IMPACT: Our intention is to use the model to examine the impact quality improvement initiatives have on healthcare outcomes

    Location Based Services and the Health Belief Model Based Investigation of Student Intentions and Behaviors

    No full text
    This research aims to understand the information security and privacy perceptions and behaviors of undergraduate students at one midwestern public, master’s granting university regarding their use of built-in location-based services (LBS) in mobile devices. We surveyed students in an introductory computing course about their use of such services. The eight factors of the Health Belief Model are used as the basis for survey questions: LBS behavior, perceived barriers to practice, self-efficacy, cues to action, prior security experience, perceived vulnerability, perceived benefits, and perceived severity. Perceived severity, barriers to entry, and perceived benefits were found to have a significant impact on students’ LBS security behaviors. This study provides a foundation upon which further investigation into security behaviors related to the use of LBS can be based. The findings and implications for researchers and educators are discussed
    corecore