We empirically examine the determinants of adoption of information technology by primary healthcare clinics using a large sample of physician clinics from several States in the U.S. Ours is one of the first studies to intensively investigate primary care clinics. These clinics are important as they represent the frontlines in the delivery of services in this large and complex market. Our study generates several interesting results related to the adoption and diffusion of Health Information Technology (HIT), including: (1) the adoption probabilities vary considerably by the specific type of clinic; (2) in contrast to numerous studies in the broader technology adoption literature, we find little evidence to suggest a relationship between firm (clinic) size and the likelihood of adoption; (3) there appears to be no definitive relationship between the age of a clinic and the likelihood of adoption; (4) there is a strong effect of geographic location, as measured by specific types of urban and rural counties, on the likelihood of adoption; (5) market competitive forces appear to have a mixed influence on adoption; (6) there is a distinct State-specific effect suggesting that information privacy, medical malpractice laws and State initiatives may play an important role in adoption; and (7) HIT is diffusing at a faster rate over time. Our findings have the potential to provide a better understanding of the longer-run effectiveness and efficiency in the provision of healthcare, and crafting appropriate policy responses. We note some future extensions of our work.
{"title":"Adoption and Diffusion of Health Information Technology: The Case of Primary Care Clinics","authors":"Brantly Callaway, Vivek Ghosal","doi":"10.2139/ssrn.2137307","DOIUrl":"https://doi.org/10.2139/ssrn.2137307","url":null,"abstract":"We empirically examine the determinants of adoption of information technology by primary healthcare clinics using a large sample of physician clinics from several States in the U.S. Ours is one of the first studies to intensively investigate primary care clinics. These clinics are important as they represent the frontlines in the delivery of services in this large and complex market. Our study generates several interesting results related to the adoption and diffusion of Health Information Technology (HIT), including: (1) the adoption probabilities vary considerably by the specific type of clinic; (2) in contrast to numerous studies in the broader technology adoption literature, we find little evidence to suggest a relationship between firm (clinic) size and the likelihood of adoption; (3) there appears to be no definitive relationship between the age of a clinic and the likelihood of adoption; (4) there is a strong effect of geographic location, as measured by specific types of urban and rural counties, on the likelihood of adoption; (5) market competitive forces appear to have a mixed influence on adoption; (6) there is a distinct State-specific effect suggesting that information privacy, medical malpractice laws and State initiatives may play an important role in adoption; and (7) HIT is diffusing at a faster rate over time. Our findings have the potential to provide a better understanding of the longer-run effectiveness and efficiency in the provision of healthcare, and crafting appropriate policy responses. We note some future extensions of our work.","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2012-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88920229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a novel method of global optimization based on cuckoo-host co-evaluation. It also develops a Fortran-77 code for the algorithm. The algorithm has been tested on 96 benchmark functions (of which the results of 30 relatively harder problems have been reported). The proposed method is comparable to the Differential Evolution method of global optimization.
{"title":"Global Optimization of Some Difficult Benchmark Functions by Cuckoo-Host Co-Evolution Meta-Heuristics","authors":"Sudhanshu K. Mishra","doi":"10.2139/SSRN.2128079","DOIUrl":"https://doi.org/10.2139/SSRN.2128079","url":null,"abstract":"This paper proposes a novel method of global optimization based on cuckoo-host co-evaluation. It also develops a Fortran-77 code for the algorithm. The algorithm has been tested on 96 benchmark functions (of which the results of 30 relatively harder problems have been reported). The proposed method is comparable to the Differential Evolution method of global optimization.","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2012-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90235356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The focus of existing open source software (OSS) research has been on how and why individuals and firms add to the commons of public OSS code - that is, on the “giving” side of this open innovation process. In contrast, research on the corresponding “receiving” side of the innovation process is scarce. We address this gap, studying how existing OSS code is reused and serves as an input to further OSS development. Our findings are based on a survey with 686 responses from OSS developers. As the most interesting results, our multivariate analyses of developers’ code reuse behavior point out that developers with larger personal networks within the OSS community and those who have experience in a greater number of OSS projects reuse more, presumably because both network size and a broad project experience facilitate local search for reusable artifacts. Moreover, we find that a development paradigm that calls for releasing an initial functioning version of the software early - as the “credible promise” in OSS - leads to increased reuse. Finally, we identify developers’ interest to tackle difficult technical challenges as detrimental to efficient reuse-based innovation. Beyond OSS, we discuss the relevance of our findings for companies developing software and for the receiving side of open innovation processes in general.
{"title":"Code Reuse in Open Source Software Development: Quantitative Evidence, Drivers, and Impediments","authors":"M. Sojer, J. Henkel","doi":"10.17705/1JAIS.00248","DOIUrl":"https://doi.org/10.17705/1JAIS.00248","url":null,"abstract":"The focus of existing open source software (OSS) research has been on how and why individuals and firms add to the commons of public OSS code - that is, on the “giving” side of this open innovation process. In contrast, research on the corresponding “receiving” side of the innovation process is scarce. We address this gap, studying how existing OSS code is reused and serves as an input to further OSS development. Our findings are based on a survey with 686 responses from OSS developers. As the most interesting results, our multivariate analyses of developers’ code reuse behavior point out that developers with larger personal networks within the OSS community and those who have experience in a greater number of OSS projects reuse more, presumably because both network size and a broad project experience facilitate local search for reusable artifacts. Moreover, we find that a development paradigm that calls for releasing an initial functioning version of the software early - as the “credible promise” in OSS - leads to increased reuse. Finally, we identify developers’ interest to tackle difficult technical challenges as detrimental to efficient reuse-based innovation. Beyond OSS, we discuss the relevance of our findings for companies developing software and for the receiving side of open innovation processes in general.","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83470892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Biometrics involves recognizing individuals based on the features derived from their Physiological and or behavioral characteristics. Biometric systems provide reliable recognition schemes to determine or confirm the individual identity.Applications of these systems include computer systems security,e-banking, credit card, access to buildings in a secure way. Here the person or object itself is a password. User verification systems that use a single Biometric indicator is disturbed by noisy data,restricted degrees of freedom and error rates. Improving the performance of Unimodal biometric systems now becomes problematic. Multibiometric systems tries to overcome these drawbacks by providing multiple evidences to the same identity hence the performance may be increased. Furthermore intruders trying to hack the biometric identity finds it difficult to work on Multibiometric systems. However an effective fusion scheme is necessary to combine multiple information of an identity. This paper addresses a brief overview of biometric methods both Unimodal and Multimodal as well as their advantages and disadvantages are to be presented.
{"title":"Biometric Methods - A Secure Survey","authors":"Kannammal, P. Balaji","doi":"10.2139/ssrn.1493905","DOIUrl":"https://doi.org/10.2139/ssrn.1493905","url":null,"abstract":"Biometrics involves recognizing individuals based on the features derived from their Physiological and or behavioral characteristics. Biometric systems provide reliable recognition schemes to determine or confirm the individual identity.Applications of these systems include computer systems security,e-banking, credit card, access to buildings in a secure way. Here the person or object itself is a password. User verification systems that use a single Biometric indicator is disturbed by noisy data,restricted degrees of freedom and error rates. Improving the performance of Unimodal biometric systems now becomes problematic. Multibiometric systems tries to overcome these drawbacks by providing multiple evidences to the same identity hence the performance may be increased. Furthermore intruders trying to hack the biometric identity finds it difficult to work on Multibiometric systems. However an effective fusion scheme is necessary to combine multiple information of an identity. This paper addresses a brief overview of biometric methods both Unimodal and Multimodal as well as their advantages and disadvantages are to be presented.","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2009-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84232699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
TRecord linkage is used for preparing sampling frames, deduplication of lists and combining information on the same object from two different databases. If the identifiers of the same objects in two different databases have error free unique common identifiers like personal identification numbers (PID), record linkage is a simple file merge operation. If the identifiers contains errors, record linkage is a challenging task. In many applications, the files have widely different numbers of observations, for example a few thousand records of a sample survey and a few million records of an administrative database of social security numbers. Available software, privacy issues and future research topics are discussed.
{"title":"Record-Linkage from a Technical Point of View","authors":"R. Schnell","doi":"10.2139/ssrn.1462075","DOIUrl":"https://doi.org/10.2139/ssrn.1462075","url":null,"abstract":"TRecord linkage is used for preparing sampling frames, deduplication of lists and combining information on the same object from two different databases. If the identifiers of the same objects in two different databases have error free unique common identifiers like personal identification numbers (PID), record linkage is a simple file merge operation. If the identifiers contains errors, record linkage is a challenging task. In many applications, the files have widely different numbers of observations, for example a few thousand records of a sample survey and a few million records of an administrative database of social security numbers. Available software, privacy issues and future research topics are discussed.","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90312700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates the growth impact of Information and Communication Technologies (ICT) in an economy consisting of three sectors, ICT-producing, ICT-using and non-ICTusing. The ICT progress causes falling prices of the consumption and intermediates produced by the ICT-using sector, providing incentives for investment in the sectors using them. Therefore, the non-ICT-using sector benefits indirectly from ICT, while households' utility increases. The magnitude of the growth transmission mechanism relies on the ICT-using sector production shares. Aggregate economy is on a constant growth path, where growth rates differ across sectors. The model predictions are broadly consistent with the U.S. growth experience.
{"title":"Information and Communication Technologies in a Multi-Sector Endogenous Growth Model","authors":"Evangelia Vourvachaki","doi":"10.2139/ssrn.1424405","DOIUrl":"https://doi.org/10.2139/ssrn.1424405","url":null,"abstract":"This paper investigates the growth impact of Information and Communication Technologies (ICT) in an economy consisting of three sectors, ICT-producing, ICT-using and non-ICTusing. The ICT progress causes falling prices of the consumption and intermediates produced by the ICT-using sector, providing incentives for investment in the sectors using them. Therefore, the non-ICT-using sector benefits indirectly from ICT, while households' utility increases. The magnitude of the growth transmission mechanism relies on the ICT-using sector production shares. Aggregate economy is on a constant growth path, where growth rates differ across sectors. The model predictions are broadly consistent with the U.S. growth experience.","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"96 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85733289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper demonstrates that if we intend to optimally rank order n objects (candidates) each of which has m attributes or rank scores awarded by m evaluators, then the ordinal ranking of objects by the conventional principal component based factor scores turns out to be suboptimal. Three numerical examples have been provided to show that principal component based rankings do not necessarily maximize the sum of squared correlation coefficients between the individual m rank scores arrays, X(n,m), and overall rank scores array, Z(n).
{"title":"A Note on the Sub-Optimality of Rank Ordering of Objects on the Basis of the Leading Principal Component Factor Scores","authors":"Sudhanshu K. Mishra","doi":"10.2139/ssrn.1321369","DOIUrl":"https://doi.org/10.2139/ssrn.1321369","url":null,"abstract":"This paper demonstrates that if we intend to optimally rank order n objects (candidates) each of which has m attributes or rank scores awarded by m evaluators, then the ordinal ranking of objects by the conventional principal component based factor scores turns out to be suboptimal. Three numerical examples have been provided to show that principal component based rankings do not necessarily maximize the sum of squared correlation coefficients between the individual m rank scores arrays, X(n,m), and overall rank scores array, Z(n).","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2008-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77312759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}