首页 > 最新文献

Proceedings of the 6th International Conference on Information Technology and Multimedia最新文献

英文 中文
Software development methodologies: A perspective of different strategies linked to a similar goal 软件开发方法论:与相似目标相关联的不同策略的视角
S. Mohanarajah, M. Jabar
Software development initially used traditional methodologies which have been in the mainstream until the advent of agile methodologies. It is often thought that as traditional methods would be eventually replaced by new methods, it still remains the closest link to a naturally progressive route although the mind-set wants to get rid of the old and get in with the new. But it is not the replacement that is the variable to control. It has to be a dynamic approach which marries the two which is a hybrid methodology where a combination of the old and the new coexist. Interestingly a new strategy also seems to surface which looks at synergies and past pace scenarios, all within the realm of successful software project deliveries. The views and accepted norms from previous research papers are analysed with discussions provided on whether to discourage or encourage the practitioner from a perspective based on what works with and when a certain amount of caveat is imposed.
软件开发最初使用的是传统方法,在敏捷方法出现之前一直是主流。人们通常认为,由于传统的方法最终会被新的方法所取代,尽管人们的心态是想要摆脱旧的,进入新的,但它仍然是最接近自然进步路线的环节。但要控制的变量并不是替代品。它必须是一种动态的方法,将两者结合起来,这是一种新旧并存的混合方法。有趣的是,一种新的策略似乎也浮出水面,它着眼于协同作用和过去的速度场景,所有这些都在成功的软件项目交付范围内。对以前的研究论文中的观点和公认的规范进行了分析,并从基于施加一定数量警告的方式和时间的角度讨论了是劝阻还是鼓励从业者。
{"title":"Software development methodologies: A perspective of different strategies linked to a similar goal","authors":"S. Mohanarajah, M. Jabar","doi":"10.1109/ICIMU.2014.7066625","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066625","url":null,"abstract":"Software development initially used traditional methodologies which have been in the mainstream until the advent of agile methodologies. It is often thought that as traditional methods would be eventually replaced by new methods, it still remains the closest link to a naturally progressive route although the mind-set wants to get rid of the old and get in with the new. But it is not the replacement that is the variable to control. It has to be a dynamic approach which marries the two which is a hybrid methodology where a combination of the old and the new coexist. Interestingly a new strategy also seems to surface which looks at synergies and past pace scenarios, all within the realm of successful software project deliveries. The views and accepted norms from previous research papers are analysed with discussions provided on whether to discourage or encourage the practitioner from a perspective based on what works with and when a certain amount of caveat is imposed.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121413098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of ELM-PSO architectures for modelling surface roughness and power consumption in CNC turning operation ELM-PSO结构在数控车削加工中表面粗糙度和功耗建模中的性能分析
Tiagrajah V. Janahiraman, Nooraziah Ahmad
The turning operation in the Computer Numerical Control (CNC) needs optimal machining parameters to achieve higher machining efficiency. The selection of machining parameters is very important to find the best performances in machining process. In this study, two different architectures of particle swarm optimization based extreme learning machine were analyzed for modelling inputs parameters: feed rate, cutting speed and depth of cut to output parameters: surface roughness and power consumption. The data were collected from 15 experiments using carbon steel AISI 1045 which were separated into training and testing dataset. Our experimental results shows that Architecture II is the most outstanding model with mean absolute percentage error (MAPE) of 0.0469 for predicting the training data and 0.204 for predicting the testing data.
在数控系统中,车削加工需要最优的加工参数来实现更高的加工效率。在机械加工过程中,加工参数的选择对于寻找最佳的加工性能是非常重要的。在本研究中,分析了基于粒子群优化的两种不同架构的极限学习机,将输入参数:进给速度、切削速度和切削深度建模到输出参数:表面粗糙度和功耗。数据来源于碳钢AISI 1045的15个实验数据,分为训练数据集和测试数据集。我们的实验结果表明,架构II是最突出的模型,预测训练数据的平均绝对百分比误差(MAPE)为0.0469,预测测试数据的平均绝对百分比误差为0.204。
{"title":"Performance analysis of ELM-PSO architectures for modelling surface roughness and power consumption in CNC turning operation","authors":"Tiagrajah V. Janahiraman, Nooraziah Ahmad","doi":"10.1109/ICIMU.2014.7066649","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066649","url":null,"abstract":"The turning operation in the Computer Numerical Control (CNC) needs optimal machining parameters to achieve higher machining efficiency. The selection of machining parameters is very important to find the best performances in machining process. In this study, two different architectures of particle swarm optimization based extreme learning machine were analyzed for modelling inputs parameters: feed rate, cutting speed and depth of cut to output parameters: surface roughness and power consumption. The data were collected from 15 experiments using carbon steel AISI 1045 which were separated into training and testing dataset. Our experimental results shows that Architecture II is the most outstanding model with mean absolute percentage error (MAPE) of 0.0469 for predicting the training data and 0.204 for predicting the testing data.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122127096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting bad utility consumers in Malaysia 预测马来西亚的不良公用事业消费者
A. Hoe, J. Dhillon
In many organizations, especially in most utility companies including Company X, revenue collection is a major issue when customers face difficulties in paying their utility bills before the deadline. There are many reasons for this problem but it becomes a serious financial issue for the organizations when the cumulative amount of bad debts reached a staggering figure. This paper reports a study of this issue for Company X involving its customers based in Bangi and Kajang, totaling upto 1,525 customers. The study is conducted to identify the factors of customers who would default payment of their bills. The identification of such factors is important to enable Company X to identify these customers and implement the necessary measures to mitigate the problem. The CRISP-DM (Cross-Industry Standard Process for data mining) model was employed in conducting the study. The results provide an intial understanding of the issue and the solution model generated could be used to resolve the issue for other areas in Malaysia.
在许多组织中,特别是在包括X公司在内的大多数公用事业公司中,当客户在截止日期前面临支付水电费的困难时,收入收集是一个主要问题。造成这一问题的原因有很多,但当坏账累积达到惊人的数字时,它就成为一个严重的财务问题。本文报告了对X公司这一问题的研究,涉及其在Bangi和Kajang的客户,共计1525名客户。这项研究是为了确定客户拖欠账单的因素。识别这些因素对于使X公司能够识别这些客户并实施必要的措施来缓解问题非常重要。采用CRISP-DM(跨行业数据挖掘标准流程)模型进行研究。结果提供了对问题的初步了解,所产生的解决方案模型可用于解决马来西亚其他地区的问题。
{"title":"Predicting bad utility consumers in Malaysia","authors":"A. Hoe, J. Dhillon","doi":"10.1109/ICIMU.2014.7066636","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066636","url":null,"abstract":"In many organizations, especially in most utility companies including Company X, revenue collection is a major issue when customers face difficulties in paying their utility bills before the deadline. There are many reasons for this problem but it becomes a serious financial issue for the organizations when the cumulative amount of bad debts reached a staggering figure. This paper reports a study of this issue for Company X involving its customers based in Bangi and Kajang, totaling upto 1,525 customers. The study is conducted to identify the factors of customers who would default payment of their bills. The identification of such factors is important to enable Company X to identify these customers and implement the necessary measures to mitigate the problem. The CRISP-DM (Cross-Industry Standard Process for data mining) model was employed in conducting the study. The results provide an intial understanding of the issue and the solution model generated could be used to resolve the issue for other areas in Malaysia.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114236734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A preliminary study on online data privacy frameworks 网络数据隐私框架初步研究
Andrew Anthony Rao, L. Chen, J. Dhillon
It cannot be doubted that having a successful framework for an online environment is an exigent task due to the data privacy infringement occurring all around the globe; identities such as the leaking of personal photos, stealing online identities, online scams, bank frauds and the list keeps going and on. Do we want such a predicament to strike us while online? Is our online data privacy out of our reach? Thus ensuring online data privacy is a must for all web users due to the highly valuable personal data conveyed in identifying an individual. In this paper, we critically review three existing online privacy frameworks with regard to their applicability and the manner in which its usage can be brought into the Malaysian online environment. We discuss the strengths and weaknesses of these frameworks and envision a comprehensive framework that would help us in providing a clear path to reduce the major concerns and problems associated with online data privacy in Malaysia. Results from our analyses of existing frameworks indicate that they are not fully being utilized to their fullest potential. The results therein concur different objectives which mostly favour online companies instead of web users.
毫无疑问,由于数据隐私侵权在全球范围内发生,建立一个成功的在线环境框架是一项紧迫的任务;诸如泄露个人照片、窃取网络身份、网络诈骗、银行欺诈等身份信息,此类事件不胜枚举。我们想在上网时遇到这样的困境吗?我们的在线数据隐私是否遥不可及?因此,确保在线数据隐私对于所有网络用户来说都是必须的,因为识别个人身份所传递的个人数据非常有价值。在本文中,我们批判性地审查了三个现有的在线隐私框架,关于它们的适用性和它的使用可以带入马来西亚在线环境的方式。我们讨论了这些框架的优点和缺点,并设想了一个全面的框架,这将有助于我们提供一个明确的途径,以减少与马来西亚在线数据隐私相关的主要问题和问题。我们对现有框架的分析结果表明,它们没有充分发挥其最大潜力。其中的结果与不同的目标一致,这些目标大多有利于在线公司,而不是网络用户。
{"title":"A preliminary study on online data privacy frameworks","authors":"Andrew Anthony Rao, L. Chen, J. Dhillon","doi":"10.1109/ICIMU.2014.7066596","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066596","url":null,"abstract":"It cannot be doubted that having a successful framework for an online environment is an exigent task due to the data privacy infringement occurring all around the globe; identities such as the leaking of personal photos, stealing online identities, online scams, bank frauds and the list keeps going and on. Do we want such a predicament to strike us while online? Is our online data privacy out of our reach? Thus ensuring online data privacy is a must for all web users due to the highly valuable personal data conveyed in identifying an individual. In this paper, we critically review three existing online privacy frameworks with regard to their applicability and the manner in which its usage can be brought into the Malaysian online environment. We discuss the strengths and weaknesses of these frameworks and envision a comprehensive framework that would help us in providing a clear path to reduce the major concerns and problems associated with online data privacy in Malaysia. Results from our analyses of existing frameworks indicate that they are not fully being utilized to their fullest potential. The results therein concur different objectives which mostly favour online companies instead of web users.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133833076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parallel execution of SVM using Symmetrical Multi-Processor (LIBSVM-OMP) 基于对称多处理器的支持向量机并行执行
N. S. Md Salleh, Amirul Shafiq Bin Mohamad Shariff, Muhammad Ikhwan Afiq Bin Kamsani, S. Nazeri
Parallel computing is a simultaneous use of multiple compute resources such as processors to solve difficult computational problems. It has been used in high-end computing areas such as pattern recognition, defense, web search engine, and medical diagnosis. This paper focuses on the implementation of pattern classification technique, Support Vector Machine (SVM) using Symmetric Multi-Processor (SMP) approach. We have carried out a performance analysis to benchmark the sequential SVM program against the SMP approach. The result shows that the parallelization of SVM training achieves a better performance than the sequential code speed-ups by 15.9s.
并行计算是指同时使用多个计算资源(如处理器)来解决复杂的计算问题。它已被应用于模式识别、国防、网络搜索引擎、医疗诊断等高端计算领域。本文重点研究了基于对称多处理器(SMP)方法的模式分类技术支持向量机(SVM)的实现。我们对顺序支持向量机程序进行了性能分析,以对SMP方法进行基准测试。结果表明,支持向量机并行化训练比顺序码加速提高了15.9s。
{"title":"Parallel execution of SVM using Symmetrical Multi-Processor (LIBSVM-OMP)","authors":"N. S. Md Salleh, Amirul Shafiq Bin Mohamad Shariff, Muhammad Ikhwan Afiq Bin Kamsani, S. Nazeri","doi":"10.1109/ICIMU.2014.7066610","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066610","url":null,"abstract":"Parallel computing is a simultaneous use of multiple compute resources such as processors to solve difficult computational problems. It has been used in high-end computing areas such as pattern recognition, defense, web search engine, and medical diagnosis. This paper focuses on the implementation of pattern classification technique, Support Vector Machine (SVM) using Symmetric Multi-Processor (SMP) approach. We have carried out a performance analysis to benchmark the sequential SVM program against the SMP approach. The result shows that the parallelization of SVM training achieves a better performance than the sequential code speed-ups by 15.9s.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132934784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effective and efficient attendance tracking system using secret code 有效和高效的考勤系统使用密码
Teh Jian Zhi, Zailani Ibrahim, Hazleen Aris
Students' attendance taking and tracking are important in order to monitor students' performance in class. More often than not, students' performance is closely related to their attendance. Good attendance usually leads to good performance and vice versa. Therefore, any problems related to students' attendance should be identified as early as possible so that appropriate measures can be taken to address them. However, tracking students' attendance, especially if done manually, can be tedious and time consuming, especially for classes will large number of students. Not to mention issues related to attendance taking such as signatures forgery where other students are signing on behalf of their absence friends. To address this issue, a unique and secure attendance tracking system is proposed. The system automates most of the steps involved in tracking students' attendance. To address the issue of signature forgery, secret code using MD5 hashing algorithm is implemented as part of the system so that each student will be given a unique code each day to be used for signing attendance. Implementation of the system shows that the time taken to track students' attendance using this system can be significantly reduced and the secret code is able to prevent signature forgery amongst students.
学生的出勤和跟踪是重要的,以监测学生在课堂上的表现。通常情况下,学生的成绩与出勤率密切相关。好的出勤率通常会带来好的表现,反之亦然。因此,任何与学生出勤有关的问题都应该尽早发现,以便采取适当的措施来解决这些问题。然而,跟踪学生的出勤情况,尤其是手工完成的情况,可能既繁琐又耗时,特别是对于有大量学生的班级。更不用说与出勤有关的问题,如签名伪造,其他学生代表他们缺席的朋友签名。为了解决这一问题,提出了一种独特而安全的考勤跟踪系统。该系统自动化了跟踪学生出勤的大部分步骤。为了解决签名伪造的问题,使用MD5哈希算法的秘密代码被实现为系统的一部分,以便每个学生每天都会得到一个唯一的代码,用于签名出勤。该系统的实施表明,使用该系统跟踪学生出勤所花费的时间可以大大减少,并且密码能够防止学生之间的签名伪造。
{"title":"Effective and efficient attendance tracking system using secret code","authors":"Teh Jian Zhi, Zailani Ibrahim, Hazleen Aris","doi":"10.1109/ICIMU.2014.7066613","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066613","url":null,"abstract":"Students' attendance taking and tracking are important in order to monitor students' performance in class. More often than not, students' performance is closely related to their attendance. Good attendance usually leads to good performance and vice versa. Therefore, any problems related to students' attendance should be identified as early as possible so that appropriate measures can be taken to address them. However, tracking students' attendance, especially if done manually, can be tedious and time consuming, especially for classes will large number of students. Not to mention issues related to attendance taking such as signatures forgery where other students are signing on behalf of their absence friends. To address this issue, a unique and secure attendance tracking system is proposed. The system automates most of the steps involved in tracking students' attendance. To address the issue of signature forgery, secret code using MD5 hashing algorithm is implemented as part of the system so that each student will be given a unique code each day to be used for signing attendance. Implementation of the system shows that the time taken to track students' attendance using this system can be significantly reduced and the secret code is able to prevent signature forgery amongst students.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132556216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The stakeholders satisfaction about the using social networks in Jordanian hospitals for knowledge sharing 利益相关者对约旦医院使用社会网络进行知识共享的满意度
Zainuddin Bin Hj Hassan, Zaid T. Alhalhouli
User Satisfaction is one of the most important factors studied by many researchers to develop effective application. This paper presents the user satisfaction evaluation of social networks named as Jordanian Medical Social Network (JMSN) which was designed for staff at Jordanian hospitals. This prototype was used and designed based on the enhanced TPB model of knowledge sharing behavior. A survey was conducted with the stakeholders in the Jordanian hospitals, to get their viewpoints about their satisfaction level on JMSN. Usability and User Experience (USE) questionnaires were distributed to 172 stakeholders who used the social networks. The results from the survey indicate that the prototype achieved higher degree of satisfaction among the stakeholders.
用户满意度是许多研究者研究的重要因素之一,以开发有效的应用。本文介绍了约旦医疗社会网络(JMSN)的用户满意度评价,该网络是为约旦医院工作人员设计的。该原型是在知识共享行为的增强型TPB模型的基础上设计使用的。对约旦医院的利益相关者进行了一项调查,以了解他们对JMSN满意度的看法。可用性和用户体验(USE)问卷被分发给172名使用社交网络的利益相关者。调查结果表明,该原型在利益相关者中获得了较高的满意度。
{"title":"The stakeholders satisfaction about the using social networks in Jordanian hospitals for knowledge sharing","authors":"Zainuddin Bin Hj Hassan, Zaid T. Alhalhouli","doi":"10.1109/ICIMU.2014.7066623","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066623","url":null,"abstract":"User Satisfaction is one of the most important factors studied by many researchers to develop effective application. This paper presents the user satisfaction evaluation of social networks named as Jordanian Medical Social Network (JMSN) which was designed for staff at Jordanian hospitals. This prototype was used and designed based on the enhanced TPB model of knowledge sharing behavior. A survey was conducted with the stakeholders in the Jordanian hospitals, to get their viewpoints about their satisfaction level on JMSN. Usability and User Experience (USE) questionnaires were distributed to 172 stakeholders who used the social networks. The results from the survey indicate that the prototype achieved higher degree of satisfaction among the stakeholders.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124005357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Antecedents for safety in health IT: An exploratory investigation 健康信息技术安全的先行因素:一项探索性调查
L. Salahuddin, Z. Ismail
Most of the accidental harm in the healthcare process related to patient safety leads to medical errors. One of the recommendations to prevent medical errors is through information technology (IT). Health IT has the potential to improve the quality of the healthcare services and essentially patient safety. It suggests the healthcare provider to collect, store, retrieve and transfer patient's information electronically. Nevertheless, there are also growing evidence that the health IT can also post a risk to patient safety when it is poorly designed, implemented or adopted. Previous studies primarily focused on the errors or unintended consequences introduced by the health IT. The root cause of the medical errors due to health IT is multifaceted and originated from numerous factors. In spite of that, little focus has been given on the antecedents that influence the safety of health IT. In order to address this gap, this study investigates the antecedents that influence the safety of health IT. Systematic literature review was conducted to identify articles pertinent to safety of health IT. Science Direct database was searched for reviews relevance articles. Thirteen full articles met the eligibility criteria for further analysis. Usability, availability, compatibility, communication, workaround and knowledge were discerned as the significance antecedents influencing safety in health IT. This study may be of significance in providing useful information on how to safely implement health IT adoption. Various stakeholders such as policy makers, government agencies, healthcare providers, health IT developers and researchers may find this study useful for their respective needs.
医疗过程中涉及患者安全的意外伤害大多导致医疗差错。预防医疗事故的建议之一是通过信息技术(IT)。医疗信息技术有可能提高医疗服务的质量,并从根本上提高患者的安全。建议医疗保健提供者以电子方式收集、存储、检索和传输患者信息。然而,也有越来越多的证据表明,如果医疗信息技术设计、实施或采用不当,也会给患者安全带来风险。以前的研究主要集中在医疗信息技术引入的错误或意外后果上。医疗信息技术导致医疗事故的根源是多方面的,其成因是多方面的。尽管如此,很少有人关注影响医疗信息技术安全的因素。为了解决这一差距,本研究调查了影响健康IT安全的前因。通过系统的文献综述,找出与健康信息技术安全相关的文章。在Science Direct数据库中搜索综述相关文章。13篇完整的文章符合进一步分析的资格标准。可用性、可用性、兼容性、沟通、变通和知识被认为是影响医疗IT安全的重要前因。这项研究可能对如何安全实施医疗IT采用提供有用的信息。政策制定者、政府机构、医疗保健提供者、医疗IT开发人员和研究人员等各种利益相关者可能会发现本研究对他们各自的需求很有用。
{"title":"Antecedents for safety in health IT: An exploratory investigation","authors":"L. Salahuddin, Z. Ismail","doi":"10.1109/ICIMU.2014.7066600","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066600","url":null,"abstract":"Most of the accidental harm in the healthcare process related to patient safety leads to medical errors. One of the recommendations to prevent medical errors is through information technology (IT). Health IT has the potential to improve the quality of the healthcare services and essentially patient safety. It suggests the healthcare provider to collect, store, retrieve and transfer patient's information electronically. Nevertheless, there are also growing evidence that the health IT can also post a risk to patient safety when it is poorly designed, implemented or adopted. Previous studies primarily focused on the errors or unintended consequences introduced by the health IT. The root cause of the medical errors due to health IT is multifaceted and originated from numerous factors. In spite of that, little focus has been given on the antecedents that influence the safety of health IT. In order to address this gap, this study investigates the antecedents that influence the safety of health IT. Systematic literature review was conducted to identify articles pertinent to safety of health IT. Science Direct database was searched for reviews relevance articles. Thirteen full articles met the eligibility criteria for further analysis. Usability, availability, compatibility, communication, workaround and knowledge were discerned as the significance antecedents influencing safety in health IT. This study may be of significance in providing useful information on how to safely implement health IT adoption. Various stakeholders such as policy makers, government agencies, healthcare providers, health IT developers and researchers may find this study useful for their respective needs.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126522253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enterprise Content Management technologies supporting unified businesses 支持统一业务的企业内容管理技术
N. Arshad, S. Milton, R. Bosua, M. Mehat
This paper provides a new perspective on Enterprise Content Management Systems (ECMS)-use and identify novel ways in which these technologies can be used to support organizations' unified business processes. The main objective of this study is to understand and explain how unified businesses that employs highly integrated and standardized business operations could use ECMS to support their work operations. Consequently, empirical investigations using a qualitative research design were conducted in two unified organizations. Empirical evidence of the two cases were brought together in a cross-case analysis and the synthesis resulted in four modes of ECMS-use that could support unified businesses, that is, to: (1) collaborate among units on projects, (2) approve project documents and monitor project progress, (3) access standard operating procedures, and (4) provide links and access to information systems. This research fills the gap in the literature on the topic of ECMS-use and extends prior studies by reporting on organizations' experiences in using ECMS and focusing on how ECMS-use can support business processes. Business and IT managers will have a better understanding on how to maximize and gain benefit from this kind of technologies by embedding the use of it to their daily business operations.
本文提供了一个关于企业内容管理系统(ECMS)的新视角——使用并确定这些技术用于支持组织统一业务流程的新方法。本研究的主要目的是理解和解释采用高度集成和标准化业务操作的统一业务如何使用ECMS来支持其工作操作。因此,使用定性研究设计的实证调查在两个统一的组织进行。在跨案例分析中,将两个案例的经验证据结合在一起,综合得出了四种可以支持统一业务的ecms使用模式,即:(1)项目单位之间的协作,(2)批准项目文件并监控项目进度,(3)访问标准操作程序,以及(4)提供信息系统的链接和访问。这项研究填补了关于ECMS使用主题的文献空白,并通过报告组织使用ECMS的经验和关注ECMS的使用如何支持业务流程来扩展先前的研究。业务和IT经理将更好地了解如何通过将这种技术嵌入到日常业务操作中来最大限度地利用这种技术并从中获益。
{"title":"Enterprise Content Management technologies supporting unified businesses","authors":"N. Arshad, S. Milton, R. Bosua, M. Mehat","doi":"10.1109/ICIMU.2014.7066627","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066627","url":null,"abstract":"This paper provides a new perspective on Enterprise Content Management Systems (ECMS)-use and identify novel ways in which these technologies can be used to support organizations' unified business processes. The main objective of this study is to understand and explain how unified businesses that employs highly integrated and standardized business operations could use ECMS to support their work operations. Consequently, empirical investigations using a qualitative research design were conducted in two unified organizations. Empirical evidence of the two cases were brought together in a cross-case analysis and the synthesis resulted in four modes of ECMS-use that could support unified businesses, that is, to: (1) collaborate among units on projects, (2) approve project documents and monitor project progress, (3) access standard operating procedures, and (4) provide links and access to information systems. This research fills the gap in the literature on the topic of ECMS-use and extends prior studies by reporting on organizations' experiences in using ECMS and focusing on how ECMS-use can support business processes. Business and IT managers will have a better understanding on how to maximize and gain benefit from this kind of technologies by embedding the use of it to their daily business operations.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120961509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A review on IT outsourcing practices for e-business transformation among SMEs in Malaysia 马来西亚中小企业电子商务转型的IT外包实践综述
S. M. Sabri, R. Sulaiman, Azhana Ahmad, Alicia Tang
SMEs are major contributors to the Malaysia's economic growth. They constitute about 99.2% of registered companies in Malaysia. E-business is believed could help to increase the SMEs competitiveness by venturing into global and virtual marketplace. However, it is reported that only 20% of SMEs have an Internet presence but not fully e-business. Among the limitations that the SMEs faced are lack of IT skills and resources, thus IT outsourcing is seen as one of potential solutions. This research aims to investigate factors that influence the decision to deploy IT outsourcing approach for e-business transformation among the SMEs. This paper discusses the literature review on e-business and IT outsourcing practices for SMEs. A qualitative method via case study approach is used to gather in-depth understanding of the situation. The expected outcomes from this research will be an IT outsourcing model to assist e-business transformation for SMEs. However, this paper will only discuss findings from the literature review.
中小企业是马来西亚经济增长的主要贡献者。它们占马来西亚注册公司的99.2%。我们相信,电子商务可以帮助中小企业进入全球和虚拟市场,从而提高竞争力。然而,据报道,只有20%的中小企业拥有互联网业务,但没有完全实现电子商务。中小企业面临的限制之一是缺乏IT技能和资源,因此IT外包被视为潜在的解决方案之一。本研究旨在探讨影响中小企业在电子商务转型中采用IT外包方式决策的因素。本文讨论了关于中小企业电子商务和IT外包实践的文献综述。通过案例研究的定性方法来收集对情况的深入了解。本研究的预期结果将是一个协助中小企业进行电子商务转型的IT外包模式。然而,本文将只讨论从文献综述的发现。
{"title":"A review on IT outsourcing practices for e-business transformation among SMEs in Malaysia","authors":"S. M. Sabri, R. Sulaiman, Azhana Ahmad, Alicia Tang","doi":"10.1109/ICIMU.2014.7066616","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066616","url":null,"abstract":"SMEs are major contributors to the Malaysia's economic growth. They constitute about 99.2% of registered companies in Malaysia. E-business is believed could help to increase the SMEs competitiveness by venturing into global and virtual marketplace. However, it is reported that only 20% of SMEs have an Internet presence but not fully e-business. Among the limitations that the SMEs faced are lack of IT skills and resources, thus IT outsourcing is seen as one of potential solutions. This research aims to investigate factors that influence the decision to deploy IT outsourcing approach for e-business transformation among the SMEs. This paper discusses the literature review on e-business and IT outsourcing practices for SMEs. A qualitative method via case study approach is used to gather in-depth understanding of the situation. The expected outcomes from this research will be an IT outsourcing model to assist e-business transformation for SMEs. However, this paper will only discuss findings from the literature review.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129337919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 6th International Conference on Information Technology and Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1