Search results

1 – 10 of over 207000
Article
Publication date: 1 March 1993

Robert W. Stone and David J. Good

Examines the relationships between the frequency of expert systemuse and the system′s hardware, access location, and features. Alsoexamines the relationship between the expert…

Abstract

Examines the relationships between the frequency of expert system use and the system′s hardware, access location, and features. Also examines the relationship between the expert system′s hardware and access location. The study is empirical, using a survey of marketing executives who work within marketing organizations employing expert systems. The findings include that the hardware type appears to influence the frequency of expert systems use. Daily use is dominated by mainframe computers, while weekly and monthly use is dominated by the microcomputers. Further, the frequency of expert system use increases with access availability and decreases as the expert system becomes less available. The dominant feature of these expert systems is the ability to perform what‐if‐analysis. When access location and hardware type are examined, the dominant hardware is the microcomputer. Further, particular hardware types tend to dominate specific access locations.

Details

Industrial Management & Data Systems, vol. 93 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Book part
Publication date: 10 November 2005

Petri Parvinen and Grant T. Savage

A common observation is that both single- and multi-payer health care systems will achieve lower overall costs if they use primary care gatekeeping. Questioning this common…

Abstract

A common observation is that both single- and multi-payer health care systems will achieve lower overall costs if they use primary care gatekeeping. Questioning this common wisdom, we focus on the health care access system, that is, the way in which patients gain access to health care. Gatekeeping, the use of primary care providers to control access to more specialized physician and hospital services, has come under intense scrutiny in the United States and in Europe. The few international comparative studies that have focused on the issues of quality of care, cost containment, and patient satisfaction find weak or no support for common assumptions about gatekeeping. Hence, we examine the institutional environments in seven countries in order to: (a) define and categorize health care access systems; (b) identify the components of a health care access system; (c) explore the notion of a strategic fit between health care financing systems and access system configurations; and (d) propose that the health care access system is a key determinant of process-level cost efficiency. Drawing upon institutional and governance theories, we posit that the structure and organization of an access system is determined by how it addresses six essential questions: Who is covered? Which services are included? What are the points of access? How much time elapses before access? What are the ways of selecting among points of access? and Are services and their quality the same for everyone? This analytical framework reveals that national health care access systems vary the most in their points of access, access times, and selection mechanisms. These findings and our explanations imply that access systems are one of the only tools for demand management, that any lasting change to an access system typically is implemented over an extended time period, and that managers of health care organizations often have limited freedom to define governance structures and shape health care service production systems.

Details

International Health Care Management
Type: Book
ISBN: 978-0-76231-228-3

Article
Publication date: 6 February 2017

Zeinab Papi, Saeid Rezaei Sharifabadi, Sedigheh Mohammadesmaeil and Nadjla Hariri

This study aims to determine the technical requirements for copyright protection of theses and dissertations for proposing a model for applying in Iran’s National System for…

Abstract

Purpose

This study aims to determine the technical requirements for copyright protection of theses and dissertations for proposing a model for applying in Iran’s National System for Theses and Dissertations (INSTD).

Design/methodology/approach

This study used a mixed research methodology. The grounded theory was used in the qualitative phase, and a researcher-made checklist was applied in the quantitative phase for surveying the status of the INSTD. Research population included INSTD as well as six information specialists and copyright experts. Data were analysed by using open, axial and selective coding.

Findings

Based on data extracted from the completed checklists, some technical requirements had been provided in the system. The technical requirements that interviewees pointed out included the following two main classes: technical components and technical-software infrastructures, explored in the phase of the grounded theory. The individual categories included access control, copy control, technical-software challenges, protecting standards, hypertext transfer protocol secure, certificate authority, documentation of thesis and dissertation information, the use of digital object identifiers, copy detection systems, thesis and dissertation integrated systems, digital rights management systems and electronic copyright management systems.

Research limitations/implications

Considering the subject of this study, only the technical aspect was investigated, and other aspects were not included. In addition, electronic theses and dissertation (ETD) providers were not well aware of copyright issues.

Practical implications

Using the technical requirements with high security is effective in the INSTD to gain the trust of the authors and encourage them to deposit their ETDs.

Social implications

The increased use of the system encourages the authors to be more innovative in conducting their research.

Originality/value

Considering the continued violation of copyright in electronic databases, applying technical requirements for copyright protection and regulating users’ access to the information of theses and dissertations are needed in the INSTD.

Article
Publication date: 1 January 1995

Each of the agencies participating in GCDIS will play a role appropriate to its agency mission and consistent with the funds available to it. Descriptions of each agency's…

Abstract

Each of the agencies participating in GCDIS will play a role appropriate to its agency mission and consistent with the funds available to it. Descriptions of each agency's resources follow. Each agency will implement the GCDIS at its own pace.

Details

Library Hi Tech, vol. 13 no. 1/2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 June 1995

Alice Robbin

The “collaboratory” concept has recently entered thevernacular of the scientific community to reflect new modes ofscientific communication, cooperation and collaboration made…

1057

Abstract

The “collaboratory” concept has recently entered the vernacular of the scientific community to reflect new modes of scientific communication, cooperation and collaboration made possible by information technology. The collaboratory represents a scientific research center “without walls” for accessing and sharing data, information, instrumentation and computational resources. The principal applications of the collaboratory concept have been in the physical and biological sciences, including space physics, oceanography and molecular biology. Discusses the attributes of the collaboratory, and applies the concept developed by computer and physical scientists to the design and operation of the SIPPACCESS prototype information system for complex data to be used through the Internet by sociologists, demographers and economists. Examines obstacles to collaboratory development for the social sciences. Concludes that four major obstacles will inhibit the development of collaboratories in the social sciences.

Details

Internet Research, vol. 5 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 31 August 2012

Michael Behm and Poh Choon Hock

Singapore is transforming from a “garden city” to a “city‐in‐a‐garden”. Designing for safety is recognized by researchers and some governments as a best practice in facilitating…

1299

Abstract

Purpose

Singapore is transforming from a “garden city” to a “city‐in‐a‐garden”. Designing for safety is recognized by researchers and some governments as a best practice in facilitating eventual worker safety within the built environment. The purpose of undertaking this research was to understand and describe the status of safe design for skyrise greenery in Singapore.

Design/methodology/approach

A total of 41 rooftop and vertical greenery systems were observed with a focus on access, fall from height, and planting considerations.

Findings

Rooftop greenery systems in Singapore were found to be adhering to safe design principles. Vertical and ledge greenery systems, on the other hand, are newer arrangements and were found to be in need of design for safety guidance.

Originality/value

The results add to the body of knowledge in the area of safe design and skyrise greenery and will aid those seeking to understand from a policy and practice perspective.

Details

Smart and Sustainable Built Environment, vol. 1 no. 2
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 1 March 1999

Lorcan Dempsey, Rosemary Russell and Robin Murray

The management of autonomous, heterogeneous network resources and services provides new challenges which libraries are now addressing. This paper outlines an approach based on the…

Abstract

The management of autonomous, heterogeneous network resources and services provides new challenges which libraries are now addressing. This paper outlines an approach based on the construction of broker services which mediate access to resources. It outlines a framework – the MODELS Information Architecture – for thinking about the components of broker services and their logical arrangement. It describes several development projects and services which show how brokers are developing. It uses examples drawn from the serials environment to describe some of the issues. Technologists understand that they must build more stable and unobtrusive media. They must establish more coherent contexts into which the technology may disappear.

Details

Journal of Documentation, vol. 55 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 30 July 2021

Tanvi Garg, Navid Kagalwalla, Shubha Puthran, Prathamesh Churi and Ambika Pawar

This paper aims to design a secure and seamless system that ensures quick sharing of health-care data to improve the privacy of sensitive health-care data, the efficiency of…

Abstract

Purpose

This paper aims to design a secure and seamless system that ensures quick sharing of health-care data to improve the privacy of sensitive health-care data, the efficiency of health-care infrastructure, effective treatment given to patients and encourage the development of new health-care technologies by researchers. These objectives are achieved through the proposed system, a “privacy-aware data tagging system using role-based access control for health-care data.”

Design/methodology/approach

Health-care data must be stored and shared in such a manner that the privacy of the patient is maintained. The method proposed, uses data tags to classify health-care data into various color codes which signify the sensitivity of data. It makes use of the ARX tool to anonymize raw health-care data and uses role-based access control as a means of ensuring only authenticated persons can access the data.

Findings

The system integrates the tagging and anonymizing of health-care data coupled with robust access control policies into one architecture. The paper discusses the proposed architecture, describes the algorithm used to tag health-care data, analyzes the metrics of the anonymized data against various attacks and devises a mathematical model for role-based access control.

Originality/value

The paper integrates three disparate topics – data tagging, anonymization and role-based access policies into one seamless architecture. Codifying health-care data into different tags based on International Classification of Diseases 10th Revision (ICD-10) codes and applying varying levels of anonymization for each data tag along with role-based access policies is unique to the system and also ensures the usability of data for research.

Details

World Journal of Engineering, vol. 20 no. 1
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 1 February 1993

BRIAN VICKERY and ALINA VICKERY

There is a huge amount of information and data stored in publicly available online databases that consist of large text files accessed by Boolean search techniques. It is widely…

Abstract

There is a huge amount of information and data stored in publicly available online databases that consist of large text files accessed by Boolean search techniques. It is widely held that less use is made of these databases than could or should be the case, and that one reason for this is that potential users find it difficult to identify which databases to search, to use the various command languages of the hosts and to construct the Boolean search statements required. This reasoning has stimulated a considerable amount of exploration and development work on the construction of search interfaces, to aid the inexperienced user to gain effective access to these databases. The aim of our paper is to review aspects of the design of such interfaces: to indicate the requirements that must be met if maximum aid is to be offered to the inexperienced searcher; to spell out the knowledge that must be incorporated in an interface if such aid is to be given; to describe some of the solutions that have been implemented in experimental and operational interfaces; and to discuss some of the problems encountered. The paper closes with an extensive bibliography of references relevant to online search aids, going well beyond the items explicitly mentioned in the text. An index to software appears after the bibliography at the end of the paper.

Details

Journal of Documentation, vol. 49 no. 2
Type: Research Article
ISSN: 0022-0418

Book part
Publication date: 28 June 1991

Karen Horny

Abstract

Details

Library Technical Services: Operations and Management
Type: Book
ISBN: 978-1-84950-795-0

1 – 10 of over 207000