Adoption of Product-System Design Approaches Is Critical

Top PDF Adoption of Product-System Design Approaches Is Critical:

Fuzzy Multi-Criteria Approaches for Evaluationg the Critical Factors of Electronic Medical Record Adoption

Fuzzy Multi-Criteria Approaches for Evaluationg the Critical Factors of Electronic Medical Record Adoption

Using Electronic Medical Records (EMRs) are computerized medical information systems that collect, store and display patient information that rising physician’s performance in their daily work to enhance quality, safety and efficiency in different health environment settings. Nevertheless, their state of being adopted throughout the world is slow. Hence, the adoption of EMRs has become an important trend into the healthcare system that needs to be studied by Management Information System (MIS) researchers. Furthermore, in physician practices the rate of EMRs adoption has been reluctant in spite of the cost savings through lower administrative costs and medical errors related to EMR systems. The aim of this research is to identify, categorize, and analyze Meso-level dimension which introduced by Lau et al. (2012), for the adoption of EMRs in the healthcare context. Hence, we develop a Multi Criteria Decision Making (MCDM) framework for healthcare industry improvement and adoption of EMR. The purpose of ranking and weighting using the F-TOPSIS and F-AHP is to inspect which factors are most imperative in EMRs adoption among primary care physicians. Performing F-TOPSIS and F-AHP is as novelty methods in this study for identifying the critical factors of EMRs adoption to assist healthcare organizations specifically hospitals setting in pursuing their key users' behavior towards accepting of this new technology. Seven factors, namely time investment, screen/room, hybrid system, planning, resource training, workflow, and weight, was found as the most influential criteria and strongest drivers in the adoption of EMR in Malaysia’s primary care setting.
Show more

24 Read more

Prioritizing Critical Factors to Successful Adoption of Total Hospital Information System

Prioritizing Critical Factors to Successful Adoption of Total Hospital Information System

Compatibility of THIS. DOI theory defines compatibility as the extent to which an innovation is perceived as consistent with the values, experience and needs of potential adopters (Rogers Everett, 1995). Innovation diffusion theory suggests that compatibility of an innovation with values, experiences, and needs has a positive relationship with innovation adoption. According to Thong (1999), compatibility is an important consideration in an organization‘s IT innovation adoption decision, because with a high level of compatibility, the organization needs to make minimal adjustments and changes, which implies less resistance to adoption. Compatibility has been identified as the critical factor influencing organization‘s decision about the innovative technology adoption (Grover, 1993; Dedrick and West, 2003; Nelson and Shaw, 2003;
Show more

11 Read more

Critical Factors Determining Adoption of Telemedicine

Critical Factors Determining Adoption of Telemedicine

Keywords—Telemedicine, ANP, DEMATEL, Knowledge management 1 Introduction With growing population and the corresponding pressures on basic services, public investment and its social and economic viability tradeoffs is crucial for governments and public institutions to prioritize the most urgent dimensions of these services. Hu- man health is the most critical and sensitive issue for sustainable development and life continuation. In this regard, Telemedicine has become the most promising solution to the complex problems of the healthcare industry. Therefore, to expand access to health services for a large number of populations given the limited human and finan- cial resources, it is imperative to identify the key driving forces that influence the adoption of telemedicine and their relative influencing weights so that investments are prioritized based on feasible options. Telemedicine (Tm) is multidisciplinary in na- ture. We proposed six dimensions namely product design, patient relationship man- agement, supply chain management, knowledge management, environment, and gov- ernance structure.
Show more

15 Read more

Critical Success Factors for Cloud Adoption

Critical Success Factors for Cloud Adoption

© 2012 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. AT&T Proprietary - The information contained herein is for use by authorized persons only and is not for general distribution 5 Critical Success Factors for Cloud Adoption Security

17 Read more

Critical success factors in ERP system adoption: comparative analysis of the private and the public sector

Critical success factors in ERP system adoption: comparative analysis of the private and the public sector

The aim of this paper is to further reduce this knowledge gap and allow better understanding of the differences in ERP adoption between the public and the private sector. First, we wanted to compare the perceived signifi cance, as well as the perceived success, in terms of widely accepted, common CSFs in organizations from the two sectors. Second, we wanted to investigate whether there are certain areas that appear to be much more critical in one of the two sectors. This would provide useful information regarding the allocation of resources, as well as certain segments that require special attention when an ERP solution is implemented in a particular sector. As a result of extensive analysis of relevant literature, we compiled a set of CSFs that were subsequently evaluated by reputable Serbian private and public organizations, in terms of CSFs’
Show more

19 Read more

CRITICAL SUCCESS FACTORS IN ERP SYSTEM ADOPTION: COMPARATIVE ANALYSIS OF THE PRIVATE AND THE PUBLIC SECTOR

CRITICAL SUCCESS FACTORS IN ERP SYSTEM ADOPTION: COMPARATIVE ANALYSIS OF THE PRIVATE AND THE PUBLIC SECTOR

This research provides useful insight into differences in the perception of signifi cance and the degree of fulfi llment of Critical Success Factors (CSFs) of Enterprise Resource Planning (ERP) adoption between private and public sector organizations. The survey was conducted on a sample of 77 Serbian organizations, with approximately equal representation of those from the private and the public sector. A comprehensive list of CSFs, compiled as a result of an extensive literature review, was included in the questionnaire. The collected data and statistical procedures applied revealed the CSFs that differentiate the organizations from the two observed sectors. Involvement of end users in ERP adoption and implementation activities has proven to be the CSF in relation to which the assessments and attitudes of organizations from the two sectors differ the most. Results of this research indicate that differences between private and public sector organizations are more distinct in terms of their level of fulfi llment of ERP adoption CSFs than they are in terms of their assessment of CSFs’ signifi cance. This points to a conclusion that differences in the way of functioning and governance of organizations from these two sectors infl uence their ability to tackle the problems much more than their ability to recognize them. The practical contribution of this research is in providing some useful fi ndings that can greatly assist relevant stakeholders to achieve a higher success rate in an ERP adoption. In addition to responding to the initial research questions, this paper has also revealed new issues, suggesting the need for further research.
Show more

19 Read more

Theories of ICT System Implementation and Adoption A Critical Review

Theories of ICT System Implementation and Adoption A Critical Review

ABSTRACT The purpose of this paper is to map and examine what theories and models of ICT system implementation and adoption are used in management and business research. The focus is on the most influential theories and models, and how they are applied in the research papers. For this purpose, a comprehensive sample of the articles (N=1303) on this topic published between 1999 and 2010 in high-quality management and business journals was analyzed using citation analysis and qualitative content analysis. The results show that during this time the research field provided theories and models to examine the adoption and acceptance of ICT by individuals. The articles focused on a variety of extensions of the Technology Acceptance Model (TAM). The advantage of focusing on TAM is that it is a simple and parsimonious model, which has encouraged researchers to apply it widely. The weaknesses were that previous studies have not been able to integrate contextual factors into TAM, and the research field applied a single and unnecessarily restrictive methodological approach. Future research might benefit from studies which would focus on the implementation and adoption processes and their consequences by drawing on the learning and change management literatures. Additionally, research could also exploit more qualitative and interpretive approaches generating new and unexpected knowledge.
Show more

57 Read more

Adoption, Approaches & Attitudes

Adoption, Approaches & Attitudes

The Future of Cloud Computing Page 8 3.0 TRUST IN THE CLOUD With 37 percent of organizations globally using the cloud in one form or another, the indication is that organizations finally „trust‟ the cloud and are willing to store mission critical data outside of their own network. Respondents were asked to put a dollar sum on the data they were currently hosting in the cloud with the majority (63 percent) estimating the value of data they store in the cloud to be more than quarter- of-a-million dollars.

18 Read more

Lost in translation? Critical reflection on qualitative approaches for informing information systems design

Lost in translation? Critical reflection on qualitative approaches for informing information systems design

INTRODUCTION Widespread acceptance within academic and business domains of qualitative approaches for informing the design, development and implementation of information systems highlights the ‘coming of age’ for user-centred approaches. These approaches have been proven to improve technology adoption and use by variously influencing design in a way that increases users’ satisfaction, trust and ease of use with particular technologies/systems. While these successes are laudable, there remains an underlying concern amongst many IS researchers using these approaches, about the process of translation that occurs from the rich insights generated to the systems that are finally built. There is a growing recognition that implicit techno-centrism inherent within IS design processes often tend to relegate such rich insights to mere adjuncts of conventional usability testing and marginalise opportunities to open up dialogue on new ways of thinking and designing (Gasson, 2003). This
Show more

9 Read more

Adoption of Product and Process Innovations in Differentiated

Adoption of Product and Process Innovations in Differentiated

The results apply for a wide variety of models including spatial and non-spatial product differentiation, Bertrand or Cournot competition and any type of demand functions. The only restrictions under which the above cited results are obtained are that the relative profitability of a product innovation is negatively correlated to the degree of product differentiation. If a particular model yields a positive correlation between the relative attractiveness of a product innovation and the de- gree of product differentiation, the results are reversed. The critical assumptions determining whether or not the relative profitability of a product differentiation negatively depends on the degree of product differentiation negative have been identified as the strategic complementarity of product and process innovations for a firm and the diminishing returns of a product innovation.
Show more

20 Read more

System design and risk assessment for safety critical control software product lines

System design and risk assessment for safety critical control software product lines

System designs that result in undesirable behavior are rejected. The purpose is to identify risks and to determine mechatronic designs with adequate safety characteristics before the design process branches into software, electrical and mechanical domains. The final deliverable of the mechatronic system design phase is a feature model capturing the design alternatives with acceptable safety characteristics. The aspect of this model containing software is the starting point for software product line engineering. In control automation, programmable logic controller targets are used, so a methodology and toolchain for supporting software product line configuration for such platforms has been developed using the PLCopen standard. Two case studies are used to demonstrate the methodology: a boiling water reactor, with a focus on reactor coolant pumps, and a mobile elevating work platform.
Show more

78 Read more

S-Box Design Approaches: Critical Analysis and Future Directions

S-Box Design Approaches: Critical Analysis and Future Directions

In this way 8×8 S-Box is generated. Now perform row-based and column based shifting. The shifting operations are applied to further strengthen the S-Box. As mentioned in the paper, that for selected chaotic systems, some arrays negatively affect the performance of S-Box. The shifting operations help in removing those bad arrays. These steps add complexity and remove any dependence on initial cryptosystem that was after the coding table. The rows are shifted to the left except for the first row. Cells of the remaining rows are shifted to the left such that at each row number of cells being shifted to the left is incremented by one compared to the previous row. Once the rows are shifted, column wise rotation is performed starting from the last column leaving it unrotated. Cells of the remaining columns are rotated such that at each column the number of cells being rotated is incremented by one compared to the previous column. After this step, the final S-box is obtained. Peng et al [20] proposed an S-box design using 4D hyperchaotic Lorenz system.
Show more

5 Read more

New aerodynamic approaches to suction system design

New aerodynamic approaches to suction system design

Introduction The past two decades have seen a revival of interest in Hybrid Laminar Flow Control (HLFC) for the reduction of drag/fuel burn of transport aircraft, largely because of increased concerns about the environmental impact of commercial air traffic at high altitude. As confidence has grown that the technical problems do, in fact, have solutions, the question of commercial viability has arisen. Recent progress means that this issue can now be addressed with some confidence. Another important issue is that the introduction of a new aircraft boasting a new technology such as HLFC may be a risk too far for the civil aerospace industry. One of the issues tackled by the EU 4 th Framework HYLTEC project is the possibility of retro-fitting HLFC technology to a mature aircraft product. The assessment of the potential of a retrofit solution is being undertaken within task 2 of the HYLTEC project. The Airbus Industrie A310 was selected as the baseline aircraft for this task.
Show more

10 Read more

Critical Approaches in the Design of a Mobile Phone Diet Application For Prolong Use

Critical Approaches in the Design of a Mobile Phone Diet Application For Prolong Use

¹˒² Department of Information system, Faculty of Computing UTM, Skudai, Johor ²˒³Sports Innovation Technology Center,UTM, Skudai, Johor Email: ¹afadhil2@live.utm.my, ²minshah.utm.my, ³aho.utm.my Abstract—Many mobile phone diet applications are available today, most of which are free for the user to download on their mobile phone. However, findings have reported that, the existing applications for diet management are not very effective for prolonged use. The statistics have also shown that the rate of obesity in Malaysia is increasing over time. Thus, strategies to design and develop a new mobile phone diet application must be developed. This paper reviews previous research to observe the implementation of diet management elements in existing mobile phone applications. The aim of this review is to improve current mobile phone diet application development efforts towards effective diet management in terms of prolonged usage by identifying the effective approaches from previous research. This paper not only includes a review of relevant journal papers but also a review of the various available online diet management systems. This approach is used to identify the current trends in the implementation of mobile phone diet applications. The main finding of this review is a conceptual model that consists of an important approach to the design of mobile applications for diet management developed so that users will use the application long-term. Additionally it is hoped that the conceptual model will prove helpful for health practitioners or mobile application developers in the development of an effective mobile diet application for successful long-term diet maintenance. Ideally, our approach will aid in overcoming obesity, which is a well-known disease in many countries today.
Show more

9 Read more

Seeking Cultural Originality: A Critical Study on Contemporary Product Design in China

Seeking Cultural Originality: A Critical Study on Contemporary Product Design in China

These were classified and arranged under the brand concepts of ‘material selection’, ‘process examination’ and ‘package simplification’. ‘The Whole Salmon’ poster shown in Figure 5.7 was used to introduce all MUJI’s food products that year. In the context of advocating the economy and consumption in Japan, the design of this poster was based on the concept that every part of the salmon could be used. This reflected MUJI’s brand philosophy. It stressed that delicious food products could be guaranteed, even through the use of non-optimal parts of the salmon, which could reduce prices. In the 1980s, in a period of stable development following high-speed economic growth, Japan suffered an energy crisis after the global economic downtown. The demand for consumer goods had reached saturation point, which caused consumers to take a more rational approach to consumption and to turn away from luxury goods. With label-free clothing, natural colour schemes of black, white, grey and blue, and through a transformation from figure-rich designs to striped designs and unbleached paper in its natural colour, MUJI had distinguished itself from logo-oriented brands. ‘MUJI is against the system’ in its omission of all kinds of excess decoration and challenge of the real value of commodity (Tsutsumi, 2004). MUJI developed a series of products named ‘natural colour’.
Show more

192 Read more

How to Design and Test Safety Critical Software System

How to Design and Test Safety Critical Software System

Key Words: Safety Critical System, Ada, Failure, Malfunction. 1. INTRODUCTION A safety-critical software system is a system whose failure or malfunction can severely harm people's lives, environment or equipment. These kinds of risks are managed using techniques of safety engineering. Safety-critical systems are widely used in various different fields such as medicine, nuclear engineering, transport, aviation, aerospace, civil engineering, industrial simulation, process control, military devices, telecommunications, infrastructures, etc. Safety- critical systems consist of hardware equipment and software equipment and both of them have to be secure in order to ensure that the whole system is fully secure. The main aim is to provide a brief overview of safety-critical software systems and describe the main techniques or approaches used to design and test these kinds of systems. For this, consider the broader notion of testing which comprises all the development cycle of a software product without limiting the scope of testing only to the testing of code. The first section focuses on the basic standards used and applied in different fields for the development of safety-critical systems. The next section focuses on the programming features and languages recommended, then will go on to
Show more

7 Read more

and Product Approaches in Knowledge Management

and Product Approaches in Knowledge Management

The “integrate” phase involves piloting specific knowledge-based solutions. Community enablement is a key solution that runs across most of E&Y’s knowledge management implementations. It focuses on the creation of communities of interest (COINs) or communities of practice (COPs) to address knowledge generation and sharing. Typically, these types of community are self-organized groups that natu- rally communicate with one another because they share common work practices, interests or aims. E&Y aimed to formalize the internal dynamics of the community by establishing a regular system of interchange. This includes not only the defini- tion of community roles and responsibilities, but also important issues surrounding content design and management and technology enablement for collaboration.
Show more

19 Read more

Design and Evaluation of Multi-Biometric Approaches for Continuous Authentication and Non-Repudiation in Critical Services

Design and Evaluation of Multi-Biometric Approaches for Continuous Authentication and Non-Repudiation in Critical Services

through software, without the need for specific hardware or sensors. In those cases, however, the chosen password impacts on the dependability of the authen- tication; for some scenarios, a normal password that the user is able to remember, can be enough. In fact, many users choose memorable words or alphanumeric identifiers, e.g., proper names or birth dates of their relatives, of celebrities, or nouns that can be found on a dictionary. However, those choices are probably the worst from a security point of view: guessing the noun, or trying with a brute force strategy (as in the dictionary attack) may lay the foundations for a successful spoofing. Moreover, many users choose the same password for ac- cessing several different services, and, consequently, a successful attack could mean several intrusions. In order to solve this problem, a long and complex password may be sufficient; however, it becomes hard to remember and the user is often forced to write or copy it somewhere (typically, on a post-it attached on the screen). In this situation, it is necessary to protect the location where the credentials are stored, which means simply displace the problem elsewhere. Another limitation of knowledge factors appears when the secret is intercepted or deduced: the system cannot verify if the user is actually the legitimate one or not, and repudiating actions performed by and intruder becomes very difficult.
Show more

172 Read more

Design for Product Service Supportability (DfPSS) Approach: A State of the Art to Foster Product Service System (PSS) Design

Design for Product Service Supportability (DfPSS) Approach: A State of the Art to Foster Product Service System (PSS) Design

Abstract Product-Service System lifecycle is characterized by several phases from the initial concept to the final disposal. However, as for conventional products, the profit generation and the market success of PSSs critically depend on the decisions taken during the initial lifecycle stages, when PSSs are conceptualized, designed, developed and engineered. These are hence the phases deserving more attention in order to manage the intrinsic complexity of such systems, taking it in account during the entire PSS life cycle design phase. According to this, one of the main gaps detected in the PSS design process is the lack of methods able to support the early integration of service features during the product design. In this specific context DfX approaches, where X= x-bility stands for enhancing products design considering at the same time service features to be embedded on it (x) according to certain performance measures (-bility), are supposed to significantly contribute. The Serviceability point of view appears to be a critical aspect of the design of product-oriented PSS that has not been improving yet: significant enhancement in this products’
Show more

6 Read more

System Design Approaches. System Design. Model-Driven Approaches Modern Structured Design. Model-Driven Approaches

System Design Approaches. System Design. Model-Driven Approaches Modern Structured Design. Model-Driven Approaches

• Modern structured design • Information engineering • Prototyping 12-2 • Prototyping • Object-oriented • RAD • JAD Model-Driven Approaches.. Model-driven strategy – a system.[r]

5 Read more

Show all 10000 documents...