8 research outputs found

    The Impact of Speech Recognition Systems on The Productivity and The Workflow in Radiology Departments: A Systematic Review

    Get PDF
    Speech Recognition dictation systems are becoming more popular and provide a viable alternative to conventional transcription services. On the other hand, there is a scarcity in the studies that address the impact of speech recognition on productivity and the workflow in the radiology department. To review the most updated literature in the past 10 years regarding the effects of Speech Recognition systems on the productivity and workflow of radiology departments. A systematic literature review was done using PRISMA, including 14 articles in total, and they were divided into four main themes. The finding confirmed the positive effect of Speech Recognition on departmental productivity, with decreased report turnaround time and an increase in the number of reports available per unit of time

    Increasing the Effectiveness of Clinical Practices with Health Informatics: Systematic Literature Review

    Get PDF
    Healthcare informatics involves different areas and activities like data collection, data analysis, and knowledge sharing among health care professionals. Healthcare Informatics scholars have been contending that the advancement in the discipline can enable healthcare professionals to provide better care to patients and the public. The current study goal is to identify the effectiveness of health informatics in improving clinical nursing practice from recent literature. We followed the systematic literature review by reviewing research papers published in the period between 2009 until 2019. The extracted data showed that there are four main themes of the nursing practices that are affected positively by the implementation of healthcare informatics. Namely, they are promoting quality of healthcare, improving electronic documentation of nursing practice, improving technological competencies and leadership practices, and improving clinical decision making. We discuss the findings and identify gaps to better direct future research in this area

    Data Mining Algorithms Predicting Different Types of Cancer: Integrative Literature Review

    Get PDF
    Based on the World Health Organization, cancer is the second leading cause of death globally and is responsible for an estimated 9.6 million deaths in 2018. Globally, about 1 in 6 deaths is due to cancer, and approximately 70% of deaths from cancer occur in low and middle-income countries. with accelerating developments in technologies and the digitization of healthcare, a lot of cancer\u27s data have been collected, and multiple cancer repositories have been created as a result. cancer has become a data-intensive area of research over the last decade. A large number of researchers have used data mining algorithms in predicting different types of cancer to reduce the cost of tests used to predict different types of cancer, especially in low and middle-income countries. This paper reports on a systematic examination of the literature on data mining algorithms predicting different types of cancer through which we provide a thorough review, analysis, and synthesis of research published in the past 10 years. We follow the systematic literature review methodology to examine theories, problems, methodologies, and major findings of related studies on data mining algorithms predicting cancer that were published between 2009 and 2019. Using thematic analysis, we develop a research taxonomy that summarizes the main algorithms used in the existing research in the field, and we identify the most used data mining algorithms in predicting different types of cancer. In addition, to data mining algorithms used in predicting each type of cancer, as mentioned in the reviewed studies. We also identify the most popular types of cancer that researchers tackled using predictive analytics

    The factors that impact the adoption and Usage of Telemedicine in Chronic Diseases: Systematic Review

    Get PDF
    Chronic diseases are one of the most common diseases that pertain to a large number of people. Most people suffer from one or more chronic diseases, such as diabetes, heart failure, rheumatoid arthritis, cancer, and others. According to a recent statistic, 9% of Jordanian have at least one type of chronic disease; it is a high percentage for a country of limited resources. Chronic diseases are costly to manage; the cost is not only associated with the treatment alone but also to monitoring patients, healthcare professionals labor, and continuous lab testing. During the past few years, the world witnessed a significant increase in the number of mobile Health users. This increase also translated into an increase in using Telehealth services. This paper aims to conduct a systematic literature review of the different adoption factors of Telemedicine for chronic diseases. We provide an analysis and a synthesis of recently published research in the past ten years. We follow the methodological literature review proposed by Ramey and Rao to examine and extract related scholarly work. By providing a thematic analysis of relevant literature, we classify the current research into the main themes of the Telehealth in the chronic field. We also develop a taxonomy of positive and negative factors that influence Telehealth. We also highlight the main limitations and gaps in the literature to guide future research

    An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities

    No full text
    PurposeSpear phishing is a fraudulent practice that targets specific and well-researched users in an organization to collect their credentials. Previous studies have addressed the underlying drivers that significantly influence susceptibility to spear phishing. However, findings may not be generalized to other cultures and environments such as the developing Non-English-speaking countries. To fill this knowledge gap, this research investigated the drivers that affect susceptibility to spear phishing in the Middle Eastern culture. We proposed and tested a theoretical model that explains users' behavior toward phishing material in the context of Non-English-speaking countries. Design/Methodology/ApproachWe created the proposed model relying on the perceived risk theory, the theory of planned behavior, and the OSIR decision making model. The proposed model addressed the impact of information privacy risks, information security risks, and information security knowledge on the susceptibility to spear phishing attacks through the moderating trust construct. The study was conducted in Jordan, a developing and Non-English-speaking country in the Middle East. We designed a lab experiment to evaluate the robustness of the proposed model based on a multistage research, where 83 university students used a phishing website then answered a related survey. Collected data were empirically tested and evaluated using Partial Least Square Analysis and Structural Equation Modeling. FindingsThe results demonstrated the influence of the identified factors on the susceptibility to spear phishing. The study may provide an assistance in evaluating and selecting tools, methods and features for handling targeted types of phishing. Originality/ValueThere are several novel aspects in this study. 1) the experimental nature of study, where we used a real-life spear phishing scenario. 2) the nature of the targeted websites. We created spoofed pages of two webpages that provide academic activities, where students’ level of trust in those websites is likely higher than other websites. 3) the investigation of the mediation role of trust construct, particularly within a university environment, is a new direction in susceptibility to spear phishing. Unlike existing models that measure the direct effect of personality characteristics on phishing susceptibility, our model introduces trust attitude as an aggregation of positive and negative security-privacy interpretations. Finally, the study was conducted in a developing country environment where the Arabic Language is used in initiating and executing the attack
    corecore