Abstract Purpose Ever since National Health Insurance was introduced in 1995, the number of insurants increased to over 96% from 50 to 60%, with a continuous satisfaction rating of about 70%. ...However, the premium accounted for 5.77% of GDP in 2001 and the Bureau of National Health Insurance had pressing financial difficulties, so it reformed its expenditure systems, such as fee for service, capitation, case payment and the global budget system in order to control the rising medical costs. Since the change in health insurance policy, most hospitals attempted to reduce their operating expenses and improve efficiency. Introducing the electronic logistics information system is one way of reducing the cost of the department of central warehouse and the nursing stations. Hence, the study proposes a technology acceptance research model and examines how nurses’ acceptance of the e-logistics information system has been affected in the medical industry. Methods This research combines innovation diffusion theory, technology acceptance model and added two research parameters, trust and perceived financial cost to propose a new hybrid technology acceptance model. Taking Taiwan's medical industry as an experimental example, this paper studies nurses’ acceptance of the electronic logistics information system. The structural equation modeling technique was used to evaluate the causal model and confirmatory factor analysis was performed to examine the reliability and validity of the measurement model. Results The results of the survey strongly support the new hybrid technology acceptance model in predicting nurses’ intention to use the electronic logistics information system. Conclusion The study shows that ‘compatibility’, ‘perceived usefulness’, ‘perceived ease of use’, and ‘trust’ all have great positive influence on ‘behavioral intention to use’. On the other hand ‘perceived financial cost’ has great negative influence on behavioral intention to use.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
The paper examines the mediating effect of supply chain (SC) practices on the relationship between agile supply chain (ASC) strategy and SC performance. It further examines the moderating effect of ...information systems (IS) capability for agility on this mediated relationship. Using the theoretical lenses of complementarity and the information processing view of the supply chain, we hypothesise that strategic supplier partnership, customer relationship, postponement and lean practices, mediate the relationship between ASC strategy and SC performance. We further hypothesise that IS capability for agility moderates each of these mediated relationships. We empirically test the hypotheses using survey data from members of senior and executive management in the logistics/supply chain functions of 205 firms. The paper contributes to the literature on ASCs by theoretically explaining and empirically demonstrating how SC practices and IS capability for agility act together to effect a positive relationship between ASC strategy and supply chain performance.
Full text
Available for:
BFBNIB, GIS, IJS, IZUM, KILJ, KISLJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
Employees' failure to comply with information systems security policies is a major concern for information technology security managers. In efforts to understand this problem, IS security researchers ...have traditionally viewed violations of IS security policies through the lens of deterrence theory. In this article, we show that neutralization theory, a theory prominent in Criminology but not yet applied in the context of IS, provides a compelling explanation for IS security policy violations and offers new insight into how employees rationalize this behavior. In doing so, we propose a theoretical model in which the effects of neutralization techniques are tested alongside those of sanctions described by deterrence theory. Our empirical results highlight neutralization as an important factor to take into account with regard to developing and implementing organizational security policies and practices.
Full text
Available for:
BFBNIB, CEKLJ, IZUM, KILJ, NMLJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
Existing systems dealing with the increasing volume of data series cannot guarantee interactive response times, even for fundamental tasks such as similarity search. Therefore, it is necessary to ...develop analytic approaches that support exploration and decision making by providing progressive results, before the final and exact ones have been computed. Prior works lack both efficiency and accuracy when applied to large-scale data series collections. We present and experimentally evaluate a new probabilistic learning-based method that provides quality guarantees for progressive Nearest Neighbor (NN) query answering. We provide both initial and progressive estimates of the final answer that are getting better during the similarity search, as well suitable stopping criteria for the progressive queries. Experiments with synthetic and diverse real datasets demonstrate that our prediction methods constitute the first practical solution to the problem, significantly outperforming competing approaches.
A fundamental problem in data mining is to effectively build robust classifiers in the presence of skewed data distributions. Class imbalance classifiers are trained specifically for skewed ...distribution datasets. Existing methods assume an ample supply of training examples as a fundamental prerequisite for constructing an effective classifier. However, when sufficient data are not readily available, the development of a representative classification algorithm becomes even more difficult due to the unequal distribution between classes. We provide a unified framework that will potentially take advantage of auxiliary data using a transfer learning mechanism and simultaneously build a robust classifier to tackle this imbalance issue in the presence of few training samples in a particular target domain of interest. Transfer learning methods use auxiliary data to augment learning when training examples are not sufficient and in this paper we will develop a method that is optimized to simultaneously augment the training data and induce balance into skewed datasets. We propose a novel boosting-based instance transfer classifier with a label-dependent update mechanism that simultaneously compensates for class imbalance and incorporates samples from an auxiliary domain to improve classification. We provide theoretical and empirical validation of our method and apply to healthcare and text classification applications.
Full text
Available for:
CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
The aim of process discovery, originating from the area of process mining, is to discover a process model based on business process execution data. A majority of process discovery techniques relies ...on an event log as an input. An event log is a static source of historical data capturing the execution of a business process. In this paper, we focus on process discovery relying on online streams of business process execution events. Learning process models from event streams poses both challenges and opportunities, i.e. we need to handle unlimited amounts of data using finite memory and, preferably, constant time. We propose a generic architecture that allows for adopting several classes of existing process discovery techniques in context of event streams. Moreover, we provide several instantiations of the architecture, accompanied by implementations in the process mining toolkit ProM (
http://promtools.org
). Using these instantiations, we evaluate several dimensions of stream-based process discovery. The evaluation shows that the proposed architecture allows us to lift process discovery to the streaming domain.
Full text
Available for:
CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
An ever growing variety of smart, connected Internet of Things (IoT) devices poses completely new challenges for businesses regarding security and privacy. In fact, the adoption of smart products may ...depend on the ability of organizations to offer systems that ensure adequate sensor data integrity while guaranteeing sufficient user privacy. In light of these challenges, previous research indicates that blockchain technology could be a promising means to mitigate issues of data security arising in the IoT. Building upon the existing body of knowledge, we propose a design theory, including requirements, design principles, and features, for a blockchain-based sensor data protection system (SDPS) that leverages data certification. To support this, we designed and developed an instantiation of an SDPS (CertifiCar) in three iterative cycles intented to prevent the fraudulent manipulation of car mileage data. Following the explication of our SDPS, we provide an ex post evaluation of our design theory considering CertifiCar and two additional use cases in the areas of pharmaceutical supply chains and energy microgrids. Our results suggest that the proposed design ensures the tamper-resistant gathering, processing, and exchange of IoT sensor data in a privacy-preserving, scalable, and efficient manner.
Full text
Available for:
CEKLJ, IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
The change in soil quality due to soil pollution significantly affects the ecosystem. The pollutants in the air also pass to the soil after a while, and therefore the soil is also the environment ...that best reflects the pollution level. Heavy metals are among soil and environmental pollutants; they are especially notorious because many of them can be toxic to living things even at low concentrations, tend to bioaccumulate in living things, and stay in nature for a long time. Therefore, monitoring heavy metal concentrations is of great importance. In this study, it is aimed to determine and map the Ni and Co pollution with the help of top soils in the city center. Top soil samples were taken from these regions and Ni and Co analyses were made, and the obtained values were evaluated statistically. Additionally, the data were transferred to geographic information systems (GIS) using ArcGIS 10.7 software, and then modeled with the kriging method, one of the interpolation methods, and pollution maps were created. As a result of the study, it was determined that the areas with the highest Ni and Co concentrations were generally located in the center of the study area. This shows that Ni and Co pollution increases in areas with high levels of human activities.
Full text
Available for:
CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
You have reached the maximum number of search results that are displayed.
For better performance, the search offers a maximum of 1,000 results per query (or 50 pages if the option 10/page is selected).
Consider using result filters or changing the sort order to explore your results further.