Together with cloud computing, service orientation has the capability to industrialize IT such that IT can be exploited by businesses in much the same way that industrial manufacturing technology has been exploited. This paper critically examines how IT solutions are built today and highlights some of the benefits that service-oriented architecture (SOA) and cloud computing have brought in recent years. This is followed by a brief examination of key innovations that occurred in the evolution of industrial manufacturing from fitting to assembly of interchangeable parts to mass production/customization. We then argue that some of the remaining barriers to the industrialization of IT can be overcome if the innovations and concepts behind the evolution of industrial manufacturing are adapted for the IT domain. These innovations and concepts could serve as catalysts that accelerate the industrialization of IT.
{"title":"Applicability of Industrial Manufacturing Innovations and Concepts for the Industrialization of IT","authors":"Harirajan Padmanabhan, M. Kamath","doi":"10.1109/SRII.2012.90","DOIUrl":"https://doi.org/10.1109/SRII.2012.90","url":null,"abstract":"Together with cloud computing, service orientation has the capability to industrialize IT such that IT can be exploited by businesses in much the same way that industrial manufacturing technology has been exploited. This paper critically examines how IT solutions are built today and highlights some of the benefits that service-oriented architecture (SOA) and cloud computing have brought in recent years. This is followed by a brief examination of key innovations that occurred in the evolution of industrial manufacturing from fitting to assembly of interchangeable parts to mass production/customization. We then argue that some of the remaining barriers to the industrialization of IT can be overcome if the innovations and concepts behind the evolution of industrial manufacturing are adapted for the IT domain. These innovations and concepts could serve as catalysts that accelerate the industrialization of IT.","PeriodicalId":110778,"journal":{"name":"2012 Annual SRII Global Conference","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125260881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sujoy Basu, S. Singhal, Jun Yu Li, Bryan Stephenson, W. Yao
In the IT Outsourcing industry, a complex transition and transformation process is required for on-boarding large enterprise customers. The process begins after the customer signs a contract, and ends when steady-state operation is attained by the service provider. Large outsourcing deals may last several years, involve several hundred million dollars, and are traditionally highly customized. In this paper, we provide recommendations for a governance framework that can manage the on-boarding stage of large, customized deals. There are no existing governance frameworks that work well from the perspective of the service provider, at the scale and diversity observed in these deals. The framework must standardize a set of processes to direct, control, and measure on-boarding activities and enable a governance organization to create and maintain a single data, process and program management instance for each customer. It must also maintain a well-defined and comprehensive view of the key entities in the transition and transformation process, and their relationships. These entities may include projects, people, roles and responsibilities, process metrics, services, and the multiple internal and partner organizations and their operational level agreements (OLAs). Finally, the framework must improve repeatability across service deals, enforce adoption of best practices that are distilled from historical deals, and better avoid known problems and issues.
{"title":"Governance Framework for IT Transformation Projects in Outsourcing","authors":"Sujoy Basu, S. Singhal, Jun Yu Li, Bryan Stephenson, W. Yao","doi":"10.1109/SRII.2012.31","DOIUrl":"https://doi.org/10.1109/SRII.2012.31","url":null,"abstract":"In the IT Outsourcing industry, a complex transition and transformation process is required for on-boarding large enterprise customers. The process begins after the customer signs a contract, and ends when steady-state operation is attained by the service provider. Large outsourcing deals may last several years, involve several hundred million dollars, and are traditionally highly customized. In this paper, we provide recommendations for a governance framework that can manage the on-boarding stage of large, customized deals. There are no existing governance frameworks that work well from the perspective of the service provider, at the scale and diversity observed in these deals. The framework must standardize a set of processes to direct, control, and measure on-boarding activities and enable a governance organization to create and maintain a single data, process and program management instance for each customer. It must also maintain a well-defined and comprehensive view of the key entities in the transition and transformation process, and their relationships. These entities may include projects, people, roles and responsibilities, process metrics, services, and the multiple internal and partner organizations and their operational level agreements (OLAs). Finally, the framework must improve repeatability across service deals, enforce adoption of best practices that are distilled from historical deals, and better avoid known problems and issues.","PeriodicalId":110778,"journal":{"name":"2012 Annual SRII Global Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123481081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eldercare is one of the most important healthcare concerns, particularly in countries whose populations are rapidly aging. This paper proposes the use of a robot system to improve the quality of life of elderly people in two ways, first by monitoring their home care services using image and sound sensors in the robots, and the second by assisting elders by understanding social situations using face authentication technology. This paper presents a concrete set of security policies to protect the privacy of the care-receiver of such home care services. An IT system architecture is also presented to monitor the data in a secure manner. Experimental results show the effectiveness and the practicality of the proposed robot system for typical home care services.
{"title":"Robot-Assisted Healthcare Support for an Aging Society","authors":"M. Kudo","doi":"10.1109/SRII.2012.36","DOIUrl":"https://doi.org/10.1109/SRII.2012.36","url":null,"abstract":"Eldercare is one of the most important healthcare concerns, particularly in countries whose populations are rapidly aging. This paper proposes the use of a robot system to improve the quality of life of elderly people in two ways, first by monitoring their home care services using image and sound sensors in the robots, and the second by assisting elders by understanding social situations using face authentication technology. This paper presents a concrete set of security policies to protect the privacy of the care-receiver of such home care services. An IT system architecture is also presented to monitor the data in a secure manner. Experimental results show the effectiveness and the practicality of the proposed robot system for typical home care services.","PeriodicalId":110778,"journal":{"name":"2012 Annual SRII Global Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122430319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The service sector is the most important and fastest growing business sector of developed countries nowadays. However, a lack of conceptual foundation for service science and service innovation is identified. This paper aims at closing this gap, indicating important topics for future research in the field of service innovation. A research portfolio, classifying research questions to be addressed, is developed on the basis of a conceptual framework for service innovation research. The portfolio characterizes research topics and challenges regarding "rigor and relevance", thus enhancing the scientific base of service innovation. A three step approach is utilized to generate the portfolio. First, a general service innovation and transformation model is developed. This model is based on general systems theory, following an ITO (input - throughput - output) approach, including a feedback loop as well as environmental aspects. The model outlines relevant aspects for the generation and exploitation of service innovations. Second, related research questions are derived from literature and interviews with experts. The research questions are assigned to corresponding sections of the service innovation transformation model. Third, a wide-spread survey among service researchers is conducted. The survey provides the basis to build the research portfolio, allocating each single research question. Summarizing the findings from the survey and the insights depicted in the research portfolio, specific research challenges to enhance the knowledge base of service innovation are shown. Among other important topics, the results reveal a need for further research regarding strategic foresight, design thinking, technology adaption, and service innovation evaluation.
{"title":"A Conceptual Framework of Service Innovation and Its Implications for Future Research","authors":"Sven Schwarz, Carolin Durst, F. Bodendorf","doi":"10.1109/SRII.2012.116","DOIUrl":"https://doi.org/10.1109/SRII.2012.116","url":null,"abstract":"The service sector is the most important and fastest growing business sector of developed countries nowadays. However, a lack of conceptual foundation for service science and service innovation is identified. This paper aims at closing this gap, indicating important topics for future research in the field of service innovation. A research portfolio, classifying research questions to be addressed, is developed on the basis of a conceptual framework for service innovation research. The portfolio characterizes research topics and challenges regarding \"rigor and relevance\", thus enhancing the scientific base of service innovation. A three step approach is utilized to generate the portfolio. First, a general service innovation and transformation model is developed. This model is based on general systems theory, following an ITO (input - throughput - output) approach, including a feedback loop as well as environmental aspects. The model outlines relevant aspects for the generation and exploitation of service innovations. Second, related research questions are derived from literature and interviews with experts. The research questions are assigned to corresponding sections of the service innovation transformation model. Third, a wide-spread survey among service researchers is conducted. The survey provides the basis to build the research portfolio, allocating each single research question. Summarizing the findings from the survey and the insights depicted in the research portfolio, specific research challenges to enhance the knowledge base of service innovation are shown. Among other important topics, the results reveal a need for further research regarding strategic foresight, design thinking, technology adaption, and service innovation evaluation.","PeriodicalId":110778,"journal":{"name":"2012 Annual SRII Global Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129289143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we describe a knowledge management approach for addressing enterprise-level risks and present our experiences in piloting its implementation within a large, multi-organizational enterprise. Our approach facilitates cross organizational discussion and enables enterprise-level perspectives in risk identification, analysis and management thereby avoiding the dangerous pitfalls of silo-approach to risk management. Our tool consists of two parts: (1) a knowledge management tool that enables the collection, and visualization, of risk data and collaboration among risk managers of various organizations within an enterprise (2) an Enterprise Risk Management (ERM) risk assessment and analysis workbench that enables risk managers to (a) qualitatively analyze the interrelationships among various risk elements, and their impact on business objectives and (b) quantitatively assess the risk exposure, and the impact of risk mitigation projects. To the best of our knowledge this is the first of its kind of a tool that provides a knowledge management based approach to enterprise risk management.
{"title":"Knowledge Driven Enterprise Risk Management","authors":"N. Nayak, R. Akkiraju","doi":"10.1109/SRII.2012.69","DOIUrl":"https://doi.org/10.1109/SRII.2012.69","url":null,"abstract":"In this paper we describe a knowledge management approach for addressing enterprise-level risks and present our experiences in piloting its implementation within a large, multi-organizational enterprise. Our approach facilitates cross organizational discussion and enables enterprise-level perspectives in risk identification, analysis and management thereby avoiding the dangerous pitfalls of silo-approach to risk management. Our tool consists of two parts: (1) a knowledge management tool that enables the collection, and visualization, of risk data and collaboration among risk managers of various organizations within an enterprise (2) an Enterprise Risk Management (ERM) risk assessment and analysis workbench that enables risk managers to (a) qualitatively analyze the interrelationships among various risk elements, and their impact on business objectives and (b) quantitatively assess the risk exposure, and the impact of risk mitigation projects. To the best of our knowledge this is the first of its kind of a tool that provides a knowledge management based approach to enterprise risk management.","PeriodicalId":110778,"journal":{"name":"2012 Annual SRII Global Conference","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Saikaew, Nantachai Jirandorn, Nuntapon Juntaranon, Supree Ariyadech, V. Sa-Ing, W. Pattara-Atikom, S. Thongvigitmanee
Nowadays computed tomography (CT) becomes very popular and useful in both medical and dental areas. Due to the standard DICOM (Digital Imaging and Communications in Medicine) file format of CT images containing special headers of image, patient and device information, dentists or specialists require to use DICOM viewer software to display those images. After acquiring a CT scan, a traditional way to transfer the CT images from the CT workstation to another place is by having someone carry a CD containing DICOM images with or without viewer software. To accommodate or speed up this process, especially when an interpreting radiologist and a referring dentist are in different places, we have developed a CT image management and communication service process which provides online dental image management as well as viewer software available for the invocation by web and mobile applications. Our system can support image stream, online CT scan request and image download services. The web and mobile applications allow dentists or specialists to view and analyze images at anywhere anytime. This complete system would gain high benefits to not only a dental CT service center but also other medical imaging service centers as well.
{"title":"CT Image Management and Communication Services","authors":"K. Saikaew, Nantachai Jirandorn, Nuntapon Juntaranon, Supree Ariyadech, V. Sa-Ing, W. Pattara-Atikom, S. Thongvigitmanee","doi":"10.1109/SRII.2012.79","DOIUrl":"https://doi.org/10.1109/SRII.2012.79","url":null,"abstract":"Nowadays computed tomography (CT) becomes very popular and useful in both medical and dental areas. Due to the standard DICOM (Digital Imaging and Communications in Medicine) file format of CT images containing special headers of image, patient and device information, dentists or specialists require to use DICOM viewer software to display those images. After acquiring a CT scan, a traditional way to transfer the CT images from the CT workstation to another place is by having someone carry a CD containing DICOM images with or without viewer software. To accommodate or speed up this process, especially when an interpreting radiologist and a referring dentist are in different places, we have developed a CT image management and communication service process which provides online dental image management as well as viewer software available for the invocation by web and mobile applications. Our system can support image stream, online CT scan request and image download services. The web and mobile applications allow dentists or specialists to view and analyze images at anywhere anytime. This complete system would gain high benefits to not only a dental CT service center but also other medical imaging service centers as well.","PeriodicalId":110778,"journal":{"name":"2012 Annual SRII Global Conference","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128598261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A lot of information has recently been collected and the need to put it to secondary use is expanding. This is because a lot of useful knowledge is contained in it. There are always privacy concerns with the secondary use of personal information. k-anonymization is a tool that enables us to release personal information in a manner that is privacy-protected. In classical k-anonymization, side information, which is termed generalization hierarchies, is always needed. In addition, the quality of k-anonymized data has always been a central problem in the area because information loss is an inherent feature of anonymization. This paper proposes a new scheme in which generalization hierarchies are automatically constructed by input information. This scheme not only contributes to reducing the cost of operations for preparing side information, but also to increasing the quality of k-anonymization results. Experiments have demonstrated that k-anonymization with automatically constructed hierarchies sacrifices 38% less data (measured by information entropy) than that with complete binary trees (introduced as classically-used hierarchies).
{"title":"Reducing Amount of Information Loss in k-Anonymization for Secondary Use of Collected Personal Information","authors":"Kunihiko Harada, Yoshinori Sato, Yumiko Togashi","doi":"10.1109/SRII.2012.18","DOIUrl":"https://doi.org/10.1109/SRII.2012.18","url":null,"abstract":"A lot of information has recently been collected and the need to put it to secondary use is expanding. This is because a lot of useful knowledge is contained in it. There are always privacy concerns with the secondary use of personal information. k-anonymization is a tool that enables us to release personal information in a manner that is privacy-protected. In classical k-anonymization, side information, which is termed generalization hierarchies, is always needed. In addition, the quality of k-anonymized data has always been a central problem in the area because information loss is an inherent feature of anonymization. This paper proposes a new scheme in which generalization hierarchies are automatically constructed by input information. This scheme not only contributes to reducing the cost of operations for preparing side information, but also to increasing the quality of k-anonymization results. Experiments have demonstrated that k-anonymization with automatically constructed hierarchies sacrifices 38% less data (measured by information entropy) than that with complete binary trees (introduced as classically-used hierarchies).","PeriodicalId":110778,"journal":{"name":"2012 Annual SRII Global Conference","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117221799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Dhanapal, K. Deepak, Saurabh Sharma, S. Joglekar, Aditya Narang, Aditya Vashistha, Paras Salunkhe, Harikrishna G. N. Rai, A. Somasundara, S. Paul
Application testing is an integral part of the application life cycle. This testing effort is more for the 3rd party applications in the mobile phone market, due to the wide number of handsets available on which the application needs to be tested before being released. At the same time, majority of the applications use the cellular network, necessitating the tester1 (along with the handset) to be present in the service area of the cellular network. We present a remote testing system, wherein the handset is in the cellular network service area, but the tester is present in a remote location. The tester controls the handset over the Internet. This gives opportunities to leverage the potential of the global outsourcing business model in mobile application testing domain. In addition, the system is agnostic to the Operating System & application running on the mobile phone, and is also non-intrusive. Further, we present preliminary results on automating this remote testing process itself.
{"title":"An Innovative System for Remote and Automated Testing of Mobile Phone Applications","authors":"K. Dhanapal, K. Deepak, Saurabh Sharma, S. Joglekar, Aditya Narang, Aditya Vashistha, Paras Salunkhe, Harikrishna G. N. Rai, A. Somasundara, S. Paul","doi":"10.1109/SRII.2012.16","DOIUrl":"https://doi.org/10.1109/SRII.2012.16","url":null,"abstract":"Application testing is an integral part of the application life cycle. This testing effort is more for the 3rd party applications in the mobile phone market, due to the wide number of handsets available on which the application needs to be tested before being released. At the same time, majority of the applications use the cellular network, necessitating the tester1 (along with the handset) to be present in the service area of the cellular network. We present a remote testing system, wherein the handset is in the cellular network service area, but the tester is present in a remote location. The tester controls the handset over the Internet. This gives opportunities to leverage the potential of the global outsourcing business model in mobile application testing domain. In addition, the system is agnostic to the Operating System & application running on the mobile phone, and is also non-intrusive. Further, we present preliminary results on automating this remote testing process itself.","PeriodicalId":110778,"journal":{"name":"2012 Annual SRII Global Conference","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114500888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we present a conceptual model of employee engagement (EE). We outline various factors that influence EE. Contrary to the common practice of measuring EE by surveys and measuring EE collectively for large groups (usually corresponding to different lines of business), we propose using direct and sensed data for each individual to compute a personalized measure of EE. We show how the data collected through surveys can be mapped to already existing enterprise data and how this can reduce the size of such surveys or eliminate them altogether. The framework also allows us to capture the differences between employees based on personal factors like the number of years of experience and the business unit with which they are associated in computing EE. Since the computation is based on an employee's data, we can point to exact data dimensions that resulted in a low EE score. This enables the organization to take personalized actions for each employee to improve his/her employee engagement. Additionally, with our approach, EE measurement can be a continuous process, as opposed to an irregular periodic one where we might conduct surveys once or twice a year. Thus, we can help reduce the IT and administrative cost of conducting surveys.
{"title":"Employee Engagement: Conceptual Model and Computation Framework","authors":"Mayuri Duggirala, S. Mehta, N. Kambhatla, P. Arya","doi":"10.1109/SRII.2012.111","DOIUrl":"https://doi.org/10.1109/SRII.2012.111","url":null,"abstract":"In this paper we present a conceptual model of employee engagement (EE). We outline various factors that influence EE. Contrary to the common practice of measuring EE by surveys and measuring EE collectively for large groups (usually corresponding to different lines of business), we propose using direct and sensed data for each individual to compute a personalized measure of EE. We show how the data collected through surveys can be mapped to already existing enterprise data and how this can reduce the size of such surveys or eliminate them altogether. The framework also allows us to capture the differences between employees based on personal factors like the number of years of experience and the business unit with which they are associated in computing EE. Since the computation is based on an employee's data, we can point to exact data dimensions that resulted in a low EE score. This enables the organization to take personalized actions for each employee to improve his/her employee engagement. Additionally, with our approach, EE measurement can be a continuous process, as opposed to an irregular periodic one where we might conduct surveys once or twice a year. Thus, we can help reduce the IT and administrative cost of conducting surveys.","PeriodicalId":110778,"journal":{"name":"2012 Annual SRII Global Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123653687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we describe the design, development, and evaluation of a general human-machine interaction search system, and its potential and use in the context of a collaboration project with SAP and Saffron. The objective of a specialized version of the system is to provide medical and healthcare information services to users via interactive search for personalized patient needs. Patients usually have questions regarding healthcare, including those which concern illness symptoms, duration and types of treatment, possible drug effects, and more. Authorized personnel would often be ideal in responding to such needs; however they could potentially be very expensive, and not easy to support and maintain. If patients could have access to information at their home, by means of i-phone or online access, this could save time, doctor office visit expenses, as well as valuable and restricted medical time. What is more, information concerning other anonymized and similar patient cases provides knowledge and perspective on a wide range of patient issues. From the doctors' perspective, they typically need to spend time on differential analysis about new patient cases: study symptoms, research possible causes, rank results by emergency priority and treat them accordingly. A search system that would direct a doctor (or patient/user) to similar patient cases would save significant amount of manual search time. The powerful new feature of this system is the storage and mining of past patient cases knowledge, to create metadata to be used in the subsequent retrieval of relevant documents. Finally, the interactive search system would speed up identification of rare cases; for instance, symptoms that do not appear commonly in past cases may require special treatment or expert referral. We build a model which dynamically learns medical needs of interacting MDs and patients. The model works on free or unstructured text, allowing disambiguation of vague words and flexibility in describing medical needs. In addition, both experts with an advanced knowledge of medical terminology, and beginning users using basic medical terms, can achieve high search relevance. Furthermore, our approach obviates the need for the assignment of tags or labels, such as treatment, symptoms, causes, to documents, to respond effectively to user queries. In particular, we build a temporal difference algorithm to predict user's information needs by incorporating both current and predicted knowledge into learning the user profile. Our source of information about the user consists of submitted queries and feedback on the returned results. We tested our system on publicly available medical data (OhsuMed TREC dataset 2002) and we achieved a significant improvement in retrieval accuracy, compared to the literature. We provide quantitative results as well as demonstration screenshots which illustrate a) the value of interaction (user time spent with system versus results accuracy), b) the value of u
{"title":"A Fast Interactive Search System for Healthcare Services","authors":"Maria Daltayanni, Chunye Wang, R. Akella","doi":"10.1109/SRII.2012.65","DOIUrl":"https://doi.org/10.1109/SRII.2012.65","url":null,"abstract":"In this paper we describe the design, development, and evaluation of a general human-machine interaction search system, and its potential and use in the context of a collaboration project with SAP and Saffron. The objective of a specialized version of the system is to provide medical and healthcare information services to users via interactive search for personalized patient needs. Patients usually have questions regarding healthcare, including those which concern illness symptoms, duration and types of treatment, possible drug effects, and more. Authorized personnel would often be ideal in responding to such needs; however they could potentially be very expensive, and not easy to support and maintain. If patients could have access to information at their home, by means of i-phone or online access, this could save time, doctor office visit expenses, as well as valuable and restricted medical time. What is more, information concerning other anonymized and similar patient cases provides knowledge and perspective on a wide range of patient issues. From the doctors' perspective, they typically need to spend time on differential analysis about new patient cases: study symptoms, research possible causes, rank results by emergency priority and treat them accordingly. A search system that would direct a doctor (or patient/user) to similar patient cases would save significant amount of manual search time. The powerful new feature of this system is the storage and mining of past patient cases knowledge, to create metadata to be used in the subsequent retrieval of relevant documents. Finally, the interactive search system would speed up identification of rare cases; for instance, symptoms that do not appear commonly in past cases may require special treatment or expert referral. We build a model which dynamically learns medical needs of interacting MDs and patients. The model works on free or unstructured text, allowing disambiguation of vague words and flexibility in describing medical needs. In addition, both experts with an advanced knowledge of medical terminology, and beginning users using basic medical terms, can achieve high search relevance. Furthermore, our approach obviates the need for the assignment of tags or labels, such as treatment, symptoms, causes, to documents, to respond effectively to user queries. In particular, we build a temporal difference algorithm to predict user's information needs by incorporating both current and predicted knowledge into learning the user profile. Our source of information about the user consists of submitted queries and feedback on the returned results. We tested our system on publicly available medical data (OhsuMed TREC dataset 2002) and we achieved a significant improvement in retrieval accuracy, compared to the literature. We provide quantitative results as well as demonstration screenshots which illustrate a) the value of interaction (user time spent with system versus results accuracy), b) the value of u","PeriodicalId":110778,"journal":{"name":"2012 Annual SRII Global Conference","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}