{"title":"Field Testing, Evaluation and Validation of a Web-Based MedWatch Decision Support System (MWDSS): An Empirical Study of the Application of Mobile Tracking of Epidemiological Disease Trends and Patient Movements in a Military Scenario","authors":"James A. Rodger, P. Pendharkar","doi":"10.1109/WCMEB.2007.16","DOIUrl":"https://doi.org/10.1109/WCMEB.2007.16","url":null,"abstract":"The MedWatch decision support system (MWDSS) is a promising mobile medical informatics technology approaching maturity. MWDSS was originally commissioned as a Web-based tool for medical planners to facilitate resource management by medical facilities and to track disease trends and patient movement. Given the present military climate, automated medical surveillance capabilities are valuable tools for medical support of the armed forces. MWDSS promises to enhance medical support for the military. The development of MWDSS is consistent with the Department of Defense (DoD) directives, which identified medical surveillance as important for maintaining force readiness. This report documents the results of a subject matter expert (SME) survey conducted to evaluate the MWDSS software. Thirty nine SMEs agreed to undergo any necessary training to use the software and to provide feedback on its performance during the simulation. While some users did not require follow-up training, others required some refresher training to perform certain functions. SMEs for this exercise were able to quickly and successfully train to use MWDSS and were satisfied that it performed most of its functions well. They also felt that it could be a useful tool in understanding the common operational picture and had features that would allow users to obtain, evaluate, and present information more efficiently than previous methods. Overall, participants indicated that MWDSS had significant potential utility for mobile medical informatics. Some of the SME's reluctance to accept new mobile medical informatics may be viewed through a cognitive perspective. The research draws on Kelly's personal construct theory (PCT) to argue that SME's reluctance to use new mobile medical informatics are influenced by their inability to change their established group personal constructs related to information systems development and delivery activities.","PeriodicalId":140908,"journal":{"name":"Eighth World Congress on the Management of eBusiness (WCMeB 2007)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128216054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intranets as Part of an E-Business Strategy","authors":"R. Mockler, M. Gartenfeld","doi":"10.1109/WCMEB.2007.83","DOIUrl":"https://doi.org/10.1109/WCMEB.2007.83","url":null,"abstract":"Summary form only given. This paper provides an overview of one the fastest growing segments of the Web environment - the Intranet. Discussions include what an Intranet is (definition), its uses and benefits (both general and specific), its challenges and critical issues (both organizational and technical), as well as future trends (both short-term and mid- to long-term). In addition, throughout this paper the position and vital role the Intranet plays as part of a company's e-Business strategy is highlighted. The same concepts and technologies of the Internet, such as clients and servers, are used to build an Intranet. HTTP (HyperText Transfer Protocol) and other Internet protocols, especially FTP (File Transfer Protocol) and SMTP (Simple Mail Transfer Protocol), which is often used for email, are commonly utilized as well.","PeriodicalId":140908,"journal":{"name":"Eighth World Congress on the Management of eBusiness (WCMeB 2007)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128197988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the Use of Privacy-Enhancing Technologies to Achieve PIPEDA Compliance in a B2C e-Business Model","authors":"M. Szeto, A. Miri","doi":"10.1109/WCMEB.2007.35","DOIUrl":"https://doi.org/10.1109/WCMEB.2007.35","url":null,"abstract":"The advanced computing power and reduced acquisition cost of information technology have facilitated the collection, storage, and processing of information in a short amount of time. Privacy legislation has been enacted to ensure that governments and businesses secure such collections in their systems and implement solutions to comply with the law. One such legislation in Canada is the personal information protection and electronic documents act (PIPEDA), intended as a technology- neutral data protection law, where the principles are general and do not require organizations to use a specific vendor or technological tool. In this paper, we give a detailed analysis and taxonomy of use of several privacy-enhancing technologies (PET) to assist business-to-consumer (B2C) organizations to comply with PIPEDA. Our analysis indicates that a combination of PETs can assist in complying with the ten PIPEDA privacy principles, with selection of the PETs to be determined by the organization's privacy handling practices.","PeriodicalId":140908,"journal":{"name":"Eighth World Congress on the Management of eBusiness (WCMeB 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130939981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring User-to-Role Delegation in Role-Based Access Control","authors":"Wei Qiu, C. Adams","doi":"10.1109/WCMEB.2007.47","DOIUrl":"https://doi.org/10.1109/WCMEB.2007.47","url":null,"abstract":"Enterprises must have business security solutions that provide detection and enforcement at every point of network access. Role-based access control (RBAC) formulates that access decisions are based on the roles that individual users have as members of a system. In RBAC, there are role hierarchies in which a senior role inherits the permissions of a junior role. In order to allow a junior role to perform one or more tasks of a senior role, various delegation models have been proposed in the literature. This paper presents a new role-based delegation model called user-to-role delegation model (URDM), which supports multiple delegation, role hierarchy, and single-step delegation. Four situations are analyzed when URDM runs a multiple delegation process. A Web-based system called university delegation management system (UDMS) is designed and implemented to verify the core functionality of URDM within the first situation.","PeriodicalId":140908,"journal":{"name":"Eighth World Congress on the Management of eBusiness (WCMeB 2007)","volume":"19 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132747545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development and Example of a Web-Based Open Source Clinical Tool","authors":"M. S. Orr, S. Straus, J. Holroyd-Leduc","doi":"10.1109/WCMEB.2007.71","DOIUrl":"https://doi.org/10.1109/WCMEB.2007.71","url":null,"abstract":"Urinary incontinence affects from 3% to 55% of the population, depending on the definition of incontinence used and the age range studied. The prevalence is highest among older woman (17%-55%) and incontinence negatively impacts their quality of life. Holroyd-Leduc and Straus (2004) recommend that physicians understand the causes and management options available to their female patients with urinary incontinence. The objective was to develop an open source Web-based clinical questionnaire tool that health care providers can use to manage urinary incontinence. The health care providers who would be using the tool were initially consulted for their requirements. Based on the users' requirements the tool functions must deliver, collect, and provide questionnaire analysis. The clinical tool questionnaire was required to provide questionnaire design functionality along with the ability to collect demographic information and deliver validated urinary incontinence questionnaires, incontinence impact questionnaire-7 and the urogenital distress inventory-6. To develop the Web-based prototype tool an open-source software questionnaire system entitled PHPSurveyor was used and custom developed administration and statistical functions were integrated into the clinical tool.","PeriodicalId":140908,"journal":{"name":"Eighth World Congress on the Management of eBusiness (WCMeB 2007)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133155117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perceived Privacy and Perceived Security and Their Effects on Trust, Risk, and User Intentions","authors":"M. Breward","doi":"10.1109/WCMEB.2007.24","DOIUrl":"https://doi.org/10.1109/WCMEB.2007.24","url":null,"abstract":"This article seeks to review and consolidate existing research modeling the relationships between perceived privacy, security, and consumer intention to use Web-based services such as on-line shopping. This is a crucial area to understand since many consumers are still reluctant to use on-line services due to perceived risk and trust issues. Recent headlines highlighting major privacy and security breaches by firms such as Winners have further inflamed concerns. Past research, however, has focused only on narrowly defined components of the overall picture, such as the link between security and trust. This paper therefore seeks to consolidate their models, creating a single overarching model, which is proposed as a starting point for future research.","PeriodicalId":140908,"journal":{"name":"Eighth World Congress on the Management of eBusiness (WCMeB 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114380335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sex, Gender and Self-Concept: Predicting Web Shopping Site Design Preferences","authors":"M. Hupfer, Brian Detlor","doi":"10.1504/IJEB.2009.026527","DOIUrl":"https://doi.org/10.1504/IJEB.2009.026527","url":null,"abstract":"Past studies of male-female differences in Web site design preferences often attribute these sex differences to gender roles and thereby posit a direct link between biological sex and gender identity. This paper, however, demonstrates the value of measuring specific self-concept traits that are associated with gender identity, rather than assuming their existence as a consequence of biological sex. An online survey collected Web site feature importance ratings as well as measures of Self-Orientation (agentic) and Other- Orientation (communal) self-concept characteristics, and found that Self- and Other-Orientation were better predictors of Web site design preferences than sex. Individuals with high Other-Orientation scores desired Web site features that facilitated comprehensive processing of information-rich environments, while those with high Self-Orientation placed greater importance on design features that improved processing efficiency and minimized effort. These findings imply that Web designers should consider site personalization that responds to preferences arising from individual differences in self-concept.","PeriodicalId":140908,"journal":{"name":"Eighth World Congress on the Management of eBusiness (WCMeB 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126324755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Mobile Business Through a Task-Oriented Model for Mobile Remote Access","authors":"K. Khankan, R. Steele","doi":"10.1109/WCMEB.2007.13","DOIUrl":"https://doi.org/10.1109/WCMEB.2007.13","url":null,"abstract":"Given the proliferation of mobile devices and the significant advancements in mobile technologies over the past few years, an important goal in mobile business is improving the productivity of field employees and executives through facilitating global remote access to their existing enterprise applications. While the research and industry efforts to develop mobile remote access systems is evident, a global acceptance of these systems has not been achieved yet. In this paper, we introduce a novel model and a candidate architecture that provides task oriented access to existing remote applications in order to provide the mobile users with the functionalities they need anywhere anytime. In this model, we propose a semiautomatic approach of generating a mobile device- based user interface for application tasks that allows remote access to desktop applications without modifying them.","PeriodicalId":140908,"journal":{"name":"Eighth World Congress on the Management of eBusiness (WCMeB 2007)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133644643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Addressing Privacy in a Federated Identity Management Network for EHealth","authors":"L. Peyton, Jun Hu, Chintan Doshi, P. Seguin","doi":"10.1109/WCMEB.2007.34","DOIUrl":"https://doi.org/10.1109/WCMEB.2007.34","url":null,"abstract":"E-health networks can provide integrated services to patients and health care workers that are more broadly accessible by leveraging Internet technology and electronic health records. However, issues of security and privacy must be addressed. In particular, compliance with relevant privacy legislation must be established. Federated identity management can enable users and service providers to securely and systematically manage identities and user profiles in a single sign on framework that controls access to personal information. In this paper, we use a simple ePrescription scenario to analyze the business and technical issues that need to be addressed in a Liberty Alliance federated identity management framework. We look at the potential impact of privacy compliance on three existing components of the framework (Discovery Service, Identity Mapping Service, Interaction Service) as well as a fourth component (Audit Service) that has been proposed to address potential privacy breeches in Liberty Alliance.","PeriodicalId":140908,"journal":{"name":"Eighth World Congress on the Management of eBusiness (WCMeB 2007)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134435286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-learning Strategy Analysis in Online Learning: a case study","authors":"D. A. AL-MUDIMIGH","doi":"10.1109/WCMEB.2007.72","DOIUrl":"https://doi.org/10.1109/WCMEB.2007.72","url":null,"abstract":"E-learning has reinforced the importance of informal learning and helped to bring about a convergence between learning and working. E-learning is empowering the individual learner so that the instructor is no longer the gatekeeper of knowledge. The focus of e-business must always be on the customer. On the other hand, the technology and the business structure follow on form of the value you intend to provide to the customer. This paper evaluates the e-learning strategy implemented by e-College (alias name) in offering its retail Internet education services.","PeriodicalId":140908,"journal":{"name":"Eighth World Congress on the Management of eBusiness (WCMeB 2007)","volume":"493 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113999502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}