This Handbook provides a complete compendium of methods for evaluation of IT-based systems and solutions within healthcare. Emphasis is entirely on assessment of the IT-system within its ...organizational environment. The author provides a coherent and complete assessment of methods addressing interactions with and effects of technology at the organizational, psychological, and social levels.It offers an explanation of the terminology and theoretical foundations underlying the methodological analysis presented here. The author carefully guides the reader through the process of identifying relevant methods corresponding to specific information needs and conditions for carrying out the evaluation study. The Handbook takes a critical view by focusing on assumptions for application, tacit built-in perspectives of the methods as well as their perils and pitfalls.
*Collects a number of evaluation methods of medical informatics*Addresses metrics and measures*Includes an extensive list of anotated references, case studies, and a list of useful Web sites
Interdisciplining Digital Humanities sorts through definitions and patterns of practice over roughly sixty-five years of work, providing an overview for specialists and a general audience alike. It ...is the only book that tests the widespread claim that Digital Humanities is interdisciplinary. By examining the boundary work of constructing, expanding, and sustaining a new field, it depicts both the ways this new field is being situated within individual domains and dynamic cross-fertilizations that are fostering new relationships across academic boundaries. It also accounts for digital reinvigorations of “public humanities” in cultural heritage institutions of museums, archives, libraries, and community forums.
Defining digital humanities Terras, Melissa M; Nyhan, Julianne; Vanhoutte, Edward
2013, 2013, 20160513, 2016-05-13, 2016-05-18, 2013-11-28
eBook
Digital Humanities is becoming an increasingly popular focus of academic endeavour. There are now hundreds of Digital Humanities centres worldwide and the subject is taught at both postgraduate and ...undergraduate level. Yet the term 'Digital Humanities' is much debated. This reader brings together, for the first time, in one core volume the essential readings that have emerged in Digital Humanities. We provide a historical overview of how the term 'Humanities Computing' developed into the term 'Digital Humanities', and highlight core readings which explore the meaning, scope, and implementation of the field. To contextualize and frame each included reading, the editors and authors provide a commentary on the original piece. There is also an annotated bibliography of other material not included in the text to provide an essential list of reading in the discipline. This text will be required reading for scholars and students who want to discover the history of Digital Humanities through its core writings, and for those who wish to understand the many possibilities that exist when trying to define Digital Humanities.
"Organizational computing has been critical to the development of medical informatics. Many end user applications (EUAs), such as FileMaker Pro, have been applied to support medical staff work at ...hospitals in Japan recently. This e-book describes how to use FileMaker Pro with hospital information systems (HISs). EUAs are described with relation to tools used for development, their functions, coordination methods with HIS, how to use them, their effectiveness, and their problems. While not all of the applications fulfill complete requirements for RASIS, and are not established, they give us new perspectives regarding HISs. This e-book also provides readers with various suggestions on how to use HISs more effectively, how to coordinate EUAs with HIS, how to manage end user applications, and how to achieve clinical effectiveness with EUAs. This volume is specialized in the use of FileMaker Pro at hospitals and all of the developers of FileMaker Pro systems. The respective authors are medical doctors at various departments of hospitals in contrast to conventional developers who are usually unfamiliar with medical information requirements. These two features make this e-book more clinically significant and facilitate end users to handle HISs more easily.".
In the era of "big data," science is increasingly information driven, and the potential for computers to store, manage, and integrate massive amounts of data has given rise to such new disciplinary ...fields as biomedical informatics. Applied ontology offers a strategy for the organization of scientific information in computer-tractable form, drawing on concepts not only from computer and information science but also from linguistics, logic, and philosophy. This book provides an introduction to the field of applied ontology that is of particular relevance to biomedicine, covering theoretical components of ontologies, best practices for ontology design, and examples of biomedical ontologies in use.After defining an ontology as a representation of the types of entities in a given domain, the book distinguishes between different kinds of ontologies and taxonomies, and shows how applied ontology draws on more traditional ideas from metaphysics. It presents the core features of the Basic Formal Ontology (BFO), now used by over one hundred ontology projects around the world, and offers examples of domain ontologies that utilize BFO. The book also describes Web Ontology Language (OWL), a common framework for Semantic Web technologies. Throughout, the book provides concrete recommendations for the design and construction of domain ontologies.
This paper extends the unified theory of acceptance and use of technology (UTAUT) to study acceptance and use of technology in a consumer context. Our proposed UTAUT2 incorporates three constructs ...into UTAUT: hedonic motivation, price value, and habit. Individual differences — namely, age, gender, and experience — are hypothesized to moderate the effects of these constructs on behavioral intention and technology use. Results from a two-stage online survey, with technology use data collected four months after the first survey, of 1,512 mobile Internet consumers supported our model Compared to UTAUT, the extensions proposed in UTAUT2 produced a substantial improvement in the variance explained in behavioral intention (56 percent to 74 percent) and technology use (40 percent to 52 percent). The theoretical and managerial implications of these results are discussed.
This paper offers a theory of communication visibility based on a field study of the implementation of a new enterprise social networking site in a large financial services organization. The emerging ...theory suggests that once invisible communication occurring between others in the organization becomes visible for third parties, those third parties could improve their metaknowledge (i.e., knowledge of
who knows what
and
who knows whom
). Communication visibility, in this case made possible by the enterprise social networking site, leads to enhanced awareness of who knows what and whom through two interrelated mechanisms: message transparency and network translucence. Seeing the contents of other’s messages helps third-party observers make inferences about coworkers' knowledge. Tangentially, seeing the structure of coworkers' communication networks helps third-party observers make inferences about those with whom coworkers regularly communicate. The emerging theory further suggests that enhanced metaknowledge can lead to more innovative products and services and less knowledge duplication if employees learn to work in new ways. By learning vicariously rather than through experience, workers can more effectively recombine existing ideas into new ideas and avoid duplicating work. Moreover, they can begin to proactively aggregate information perceived daily rather than engaging in reactive search after confronting a problem. I discuss the important implications of this emerging theory of communication visibility for work in the knowledge economy.
Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy ...and its impacts, and have motivated Information Systems researchers to explore information privacy issues, including technical solutions to address these concerns. In this paper, we inform researchers about the current state of information privacy research in IS through a critical analysis of the IS literature that considers information privacy as a key construct. The review of the literature reveals that information privacy is a multilevel concept, but rarely studied as such. We also find that information privacy research has been heavily reliant on studentbased and USA-centric samples, which results in findings of limited generalizability. Information privacy research focuses on explaining and predicting theoretical contributions, with few studies in journal articles focusing on design and action contributions. We recommend that future research should consider different levels of analysis as well as multilevel effects of information privacy. We illustrate this with a multilevel framework for information privacy concerns. We call for research on information privacy to use a broader diversity of sampling populations, and for more design and action information privacy research to be published in journal articles that can result in IT artifacts for protection or control of information privacy.