Computing Technologies eJournal最新文献

筛选
英文 中文
Adoption and Diffusion of Health Information Technology: The Case of Primary Care Clinics 卫生信息技术的采用与传播:以初级保健诊所为例
Computing Technologies eJournal Pub Date : 2012-08-27 DOI: 10.2139/ssrn.2137307
Brantly Callaway, Vivek Ghosal
{"title":"Adoption and Diffusion of Health Information Technology: The Case of Primary Care Clinics","authors":"Brantly Callaway, Vivek Ghosal","doi":"10.2139/ssrn.2137307","DOIUrl":"https://doi.org/10.2139/ssrn.2137307","url":null,"abstract":"We empirically examine the determinants of adoption of information technology by primary healthcare clinics using a large sample of physician clinics from several States in the U.S. Ours is one of the first studies to intensively investigate primary care clinics. These clinics are important as they represent the frontlines in the delivery of services in this large and complex market. Our study generates several interesting results related to the adoption and diffusion of Health Information Technology (HIT), including: (1) the adoption probabilities vary considerably by the specific type of clinic; (2) in contrast to numerous studies in the broader technology adoption literature, we find little evidence to suggest a relationship between firm (clinic) size and the likelihood of adoption; (3) there appears to be no definitive relationship between the age of a clinic and the likelihood of adoption; (4) there is a strong effect of geographic location, as measured by specific types of urban and rural counties, on the likelihood of adoption; (5) market competitive forces appear to have a mixed influence on adoption; (6) there is a distinct State-specific effect suggesting that information privacy, medical malpractice laws and State initiatives may play an important role in adoption; and (7) HIT is diffusing at a faster rate over time. Our findings have the potential to provide a better understanding of the longer-run effectiveness and efficiency in the provision of healthcare, and crafting appropriate policy responses. We note some future extensions of our work.","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2012-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88920229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Global Optimization of Some Difficult Benchmark Functions by Cuckoo-Host Co-Evolution Meta-Heuristics 基于布谷鸟-宿主协同进化元启发式的复杂基准函数全局优化
Computing Technologies eJournal Pub Date : 2012-08-11 DOI: 10.2139/SSRN.2128079
Sudhanshu K. Mishra
{"title":"Global Optimization of Some Difficult Benchmark Functions by Cuckoo-Host Co-Evolution Meta-Heuristics","authors":"Sudhanshu K. Mishra","doi":"10.2139/SSRN.2128079","DOIUrl":"https://doi.org/10.2139/SSRN.2128079","url":null,"abstract":"This paper proposes a novel method of global optimization based on cuckoo-host co-evaluation. It also develops a Fortran-77 code for the algorithm. The algorithm has been tested on 96 benchmark functions (of which the results of 30 relatively harder problems have been reported). The proposed method is comparable to the Differential Evolution method of global optimization.","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2012-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90235356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Code Reuse in Open Source Software Development: Quantitative Evidence, Drivers, and Impediments 开源软件开发中的代码重用:量化证据、驱动因素和障碍
Computing Technologies eJournal Pub Date : 2010-03-09 DOI: 10.17705/1JAIS.00248
M. Sojer, J. Henkel
{"title":"Code Reuse in Open Source Software Development: Quantitative Evidence, Drivers, and Impediments","authors":"M. Sojer, J. Henkel","doi":"10.17705/1JAIS.00248","DOIUrl":"https://doi.org/10.17705/1JAIS.00248","url":null,"abstract":"The focus of existing open source software (OSS) research has been on how and why individuals and firms add to the commons of public OSS code - that is, on the “giving” side of this open innovation process. In contrast, research on the corresponding “receiving” side of the innovation process is scarce. We address this gap, studying how existing OSS code is reused and serves as an input to further OSS development. Our findings are based on a survey with 686 responses from OSS developers. As the most interesting results, our multivariate analyses of developers’ code reuse behavior point out that developers with larger personal networks within the OSS community and those who have experience in a greater number of OSS projects reuse more, presumably because both network size and a broad project experience facilitate local search for reusable artifacts. Moreover, we find that a development paradigm that calls for releasing an initial functioning version of the software early - as the “credible promise” in OSS - leads to increased reuse. Finally, we identify developers’ interest to tackle difficult technical challenges as detrimental to efficient reuse-based innovation. Beyond OSS, we discuss the relevance of our findings for companies developing software and for the receiving side of open innovation processes in general.","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83470892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
Biometric Methods - A Secure Survey 生物计量方法——一项安全的调查
Computing Technologies eJournal Pub Date : 2009-10-25 DOI: 10.2139/ssrn.1493905
Kannammal, P. Balaji
{"title":"Biometric Methods - A Secure Survey","authors":"Kannammal, P. Balaji","doi":"10.2139/ssrn.1493905","DOIUrl":"https://doi.org/10.2139/ssrn.1493905","url":null,"abstract":"Biometrics involves recognizing individuals based on the features derived from their Physiological and or behavioral characteristics. Biometric systems provide reliable recognition schemes to determine or confirm the individual identity.Applications of these systems include computer systems security,e-banking, credit card, access to buildings in a secure way. Here the person or object itself is a password. User verification systems that use a single Biometric indicator is disturbed by noisy data,restricted degrees of freedom and error rates. Improving the performance of Unimodal biometric systems now becomes problematic. Multibiometric systems tries to overcome these drawbacks by providing multiple evidences to the same identity hence the performance may be increased. Furthermore intruders trying to hack the biometric identity finds it difficult to work on Multibiometric systems. However an effective fusion scheme is necessary to combine multiple information of an identity. This paper addresses a brief overview of biometric methods both Unimodal and Multimodal as well as their advantages and disadvantages are to be presented.","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2009-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84232699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Record-Linkage from a Technical Point of View 从技术角度看记录链接
Computing Technologies eJournal Pub Date : 2009-08-01 DOI: 10.2139/ssrn.1462075
R. Schnell
{"title":"Record-Linkage from a Technical Point of View","authors":"R. Schnell","doi":"10.2139/ssrn.1462075","DOIUrl":"https://doi.org/10.2139/ssrn.1462075","url":null,"abstract":"TRecord linkage is used for preparing sampling frames, deduplication of lists and combining information on the same object from two different databases. If the identifiers of the same objects in two different databases have error free unique common identifiers like personal identification numbers (PID), record linkage is a simple file merge operation. If the identifiers contains errors, record linkage is a challenging task. In many applications, the files have widely different numbers of observations, for example a few thousand records of a sample survey and a few million records of an administrative database of social security numbers. Available software, privacy issues and future research topics are discussed.","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90312700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Information and Communication Technologies in a Multi-Sector Endogenous Growth Model 多部门内生增长模型中的信息和通信技术
Computing Technologies eJournal Pub Date : 2009-05-01 DOI: 10.2139/ssrn.1424405
Evangelia Vourvachaki
{"title":"Information and Communication Technologies in a Multi-Sector Endogenous Growth Model","authors":"Evangelia Vourvachaki","doi":"10.2139/ssrn.1424405","DOIUrl":"https://doi.org/10.2139/ssrn.1424405","url":null,"abstract":"This paper investigates the growth impact of Information and Communication Technologies (ICT) in an economy consisting of three sectors, ICT-producing, ICT-using and non-ICTusing. The ICT progress causes falling prices of the consumption and intermediates produced by the ICT-using sector, providing incentives for investment in the sectors using them. Therefore, the non-ICT-using sector benefits indirectly from ICT, while households' utility increases. The magnitude of the growth transmission mechanism relies on the ICT-using sector production shares. Aggregate economy is on a constant growth path, where growth rates differ across sectors. The model predictions are broadly consistent with the U.S. growth experience.","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"96 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85733289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Note on the Sub-Optimality of Rank Ordering of Objects on the Basis of the Leading Principal Component Factor Scores 基于主成分因子得分的对象排序次最优性的注记
Computing Technologies eJournal Pub Date : 2008-12-29 DOI: 10.2139/ssrn.1321369
Sudhanshu K. Mishra
{"title":"A Note on the Sub-Optimality of Rank Ordering of Objects on the Basis of the Leading Principal Component Factor Scores","authors":"Sudhanshu K. Mishra","doi":"10.2139/ssrn.1321369","DOIUrl":"https://doi.org/10.2139/ssrn.1321369","url":null,"abstract":"This paper demonstrates that if we intend to optimally rank order n objects (candidates) each of which has m attributes or rank scores awarded by m evaluators, then the ordinal ranking of objects by the conventional principal component based factor scores turns out to be suboptimal. Three numerical examples have been provided to show that principal component based rankings do not necessarily maximize the sum of squared correlation coefficients between the individual m rank scores arrays, X(n,m), and overall rank scores array, Z(n).","PeriodicalId":10688,"journal":{"name":"Computing Technologies eJournal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2008-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77312759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信