WorldWideScience

Sample records for personal information systems

  1. Personalized Mobile Information Retrieval System

    Directory of Open Access Journals (Sweden)

    Okkyung Choi

    2012-04-01

    Full Text Available Building a global Network Relations with the internet has made huge changes in personal information system and even comments left on a webpage of SNS(Social Network Services are appreciated as important elements that would provide valuable information for someone. Social Network is a relation between individuals or groups, represented in a graph model, which converts the concept of psychological and social relations into a logical structure by using node and link. But, most of the current personalized systems on the basis of Social Network are built and constructed mainly in the PC environment, and the systems are neither designed nor implemented in mobile environment. Hence, the objective of this study is to propose methods of providing Personalized Mobile Information Retrieval System using NFC (Near Field Communication Smartphone, which will be then used for Smartphone users. Besides, this study aims to verify its efficiency through a comparative analysis of existing studies.

  2. Trust-based information system architecture for personal wellness.

    Science.gov (United States)

    Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd

    2014-01-01

    Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed.

  3. Divulging Personal Information within Learning Analytics Systems

    Science.gov (United States)

    Ifenthaler, Dirk; Schumacher, Clara

    2015-01-01

    The purpose of this study was to investigate if students are prepared to release any personal data in order to inform learning analytics systems. Besides the well-documented benefits of learning analytics, serious concerns and challenges are associated with the application of these data driven systems. Most notably, empirical evidence regarding…

  4. The User-Subjective Approach to Personal Information Management Systems.

    Science.gov (United States)

    Bergman, Ofer; Beyth-Marom, Ruth; Nachmias, Rafi

    2003-01-01

    Explains personal information management (PIM) systems and suggests a user-subjective approach to PIM system design. Advocates that PIM systems relate to the subjective value-added attributes that the user gives the stored data so that the user can find information again, recall it when needed, and use it effectively in the next interaction.…

  5. Personal anticipated information need

    OpenAIRE

    H. Bruce

    2005-01-01

    Background. The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in 'Bookmarks' and 'Favourites'. Argument. It is suggested that personal information collections are created in anticipation of some future need for that information-personal, anticipated information need, which also underlies the design of formal information systems. ...

  6. Personal anticipated information need

    Directory of Open Access Journals (Sweden)

    H. Bruce

    2005-01-01

    Full Text Available Background. The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in 'Bookmarks' and 'Favourites'. Argument. It is suggested that personal information collections are created in anticipation of some future need for that information-personal, anticipated information need, which also underlies the design of formal information systems. Elaboration. Examination of the literature of information needs and information seeking behaviour leads to the formulation of five propositions that elaborate the concept of personal, anticipated information need. These propositions draw upon concepts such as uncertainty, predictability, sensitivity and the valuation of information sources. Conclusion. An individual's understanding of personal, anticipated information need and how this understanding guides the acquisition and management of personal information will determine the effectiveness of that collection.

  7. Seamless personal health information system in cloud computing.

    Science.gov (United States)

    Chung, Wan-Young; Fong, Ee May

    2014-01-01

    Noncontact ECG measurement has gained popularity these days due to its noninvasive and conveniences to be applied on daily life. This approach does not require any direct contact between patient's skin and sensor for physiological signal measurement. The noncontact ECG measurement is integrated with mobile healthcare system for health status monitoring. Mobile phone acts as the personal health information system displaying health status and body mass index (BMI) tracking. Besides that, it plays an important role being the medical guidance providing medical knowledge database including symptom checker and health fitness guidance. At the same time, the system also features some unique medical functions that cater to the living demand of the patients or users, including regular medication reminders, alert alarm, medical guidance, appointment scheduling. Lastly, we demonstrate mobile healthcare system with web application for extended uses, thus health data are clouded into web server system and web database storage. This allows remote health status monitoring easily and so forth it promotes a cost effective personal healthcare system.

  8. Architecture of personal healthcare information system in ubiquitous healthcare

    NARCIS (Netherlands)

    Bhardwaj, S.; Sain, M.; Lee, H.-J.; Chung, W.Y.; Slezak, D.; et al., xx

    2009-01-01

    Due to recent development in Ubiquitous Healthcare now it’s time to build such application which can work independently and with less interference of Physician. In this paper we are try to build the whole architecture of personal Healthcare information system for ubiquitous healthcare which also

  9. 41 CFR 105-64.104 - What must the system manager tell me when soliciting personal information?

    Science.gov (United States)

    2010-07-01

    ... manager tell me when soliciting personal information? 105-64.104 Section 105-64.104 Public Contracts and... Responsibilities § 105-64.104 What must the system manager tell me when soliciting personal information? When soliciting information from you or a third party for a system of records, system managers must: Cite the...

  10. Fuzzy Privacy Decision for Context-Aware Access Personal Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qingsheng; QI Yong; ZHAO Jizhong; HOU Di; NIU Yujie

    2007-01-01

    A context-aware privacy protection framework was designed for context-aware services and privacy control methods about access personal information in pervasive environment. In the process of user's privacy decision, it can produce fuzzy privacy decision as the change of personal information sensitivity and personal information receiver trust. The uncertain privacy decision model was proposed about personal information disclosure based on the change of personal information receiver trust and personal information sensitivity. A fuzzy privacy decision information system was designed according to this model. Personal privacy control policies can be extracted from this information system by using rough set theory. It also solves the problem about learning privacy control policies of personal information disclosure.

  11. The Usage of Informational Gateways for Data Exchange between Personal Data Systems of Different Classes

    Directory of Open Access Journals (Sweden)

    E. I. Goncharov

    2010-03-01

    Full Text Available When personal data exchange between informational systems takes place, one must guarantee the systems are not integrating but just interacting. This task can not be accomplished by using traditional tools such as firewalls, cryptography and so on. To solve the problem we suggest deploying of informational gateway in personal data exchange process.

  12. Web Based Information System for Job Training Activities Using Personal Extreme Programming (PXP)

    Science.gov (United States)

    Asri, S. A.; Sunaya, I. G. A. M.; Rudiastari, E.; Setiawan, W.

    2018-01-01

    Job training is one of the subjects in university or polytechnic that involves many users and reporting activities. Time and distance became problems for users to reporting and to do obligations tasks during job training due to the location where the job training took place. This research tried to develop a web based information system of job training to overcome the problems. This system was developed using Personal Extreme Programming (PXP). PXP is one of the agile methods is combination of Extreme Programming (XP) and Personal Software Process (PSP). The information system that has developed and tested which are 24% of users are strongly agree, 74% are agree, 1% disagree and 0% strongly disagree about system functionality.

  13. Personal dosimetry and information platforms

    International Nuclear Information System (INIS)

    Sanchez Hidalgo, M.; Galan Montenegro, P.; Bodineau Gil, C.; Hernandez Rodriguez, R.; Jimenez Nartin, A.; Cano Sanchez, J. J.

    2011-01-01

    One question often raised by the hospital personnel dosimetry is the high incidence in the no monthly turnover of dosimeters, which is currently a high number of administrative dose assignments. The high number of workers with personal dosimetry and in many cases, the dispersion of workplaces makes it impossible to personalized management. To make a more direct and personal, and transmit information quickly and with guaranteed reception, has developed and implemented a system of personalized dosimetric information through messaging Short Message Service (SMS) and access to the history of dosimetric dosimetric and management through web space Service Hospital Radio physics.

  14. Personal Information Management (PIM): an Introduction

    OpenAIRE

    Rasoul Zavaraqi; Michael Safaie

    2012-01-01

    The aim of this paper was to present detailed texts about necessities of personal information management (PIM) and has been written by literature survey. Historical investigation of this new born research area showed PIM is an extension to primary personal information management in offices and other bureaucratic centers. PIM is the result of new ICT developments and its followings as information overload and pollution, which is combination of information retrieval, database management systems...

  15. PERSON-Personalized Expert Recommendation System for Optimized Nutrition.

    Science.gov (United States)

    Chen, Chih-Han; Karvela, Maria; Sohbati, Mohammadreza; Shinawatra, Thaksin; Toumazou, Christofer

    2018-02-01

    The rise of personalized diets is due to the emergence of nutrigenetics and genetic tests services. However, the recommendation system is far from mature to provide personalized food suggestion to consumers for daily usage. The main barrier of connecting genetic information to personalized diets is the complexity of data and the scalability of the applied systems. Aiming to cross such barriers and provide direct applications, a personalized expert recommendation system for optimized nutrition is introduced in this paper, which performs direct to consumer personalized grocery product filtering and recommendation. Deep learning neural network model is applied to achieve automatic product categorization. The ability of scaling with unknown new data is achieved through the generalized representation of word embedding. Furthermore, the categorized products are filtered with a model based on individual genetic data with associated phenotypic information and a case study with databases from three different sources is carried out to confirm the system.

  16. A clinical nutritional information system with personalized nutrition assessment.

    Science.gov (United States)

    Kuo, Su-E; Lai, Hui-San; Hsu, Jen-Ming; Yu, Yao-Chang; Zheng, Dong-Zhe; Hou, Ting-Wei

    2018-03-01

    Traditional nutrition evaluations not only require the use of numerous tables and lists to provide sufficient recommendations for patients' diets but are also very time-consuming due to cross-referencing and calculations. To personalize patient assessments, this study implemented a Clinical Nutritional Information System (CNIS) to help hospital dietitians perform their daily work more effectively in terms of time management and paper work. The CNIS mainly targets in-patients who require cancer-nutrition counselling. The development of the CNIS occurred in three phases. Phase 1 included system design and implementation based on the Nutrition Care Process and Model (NCPM) and the Patient Nutrition Care Process. Phase 2 involved a survey to characterize the efficiency, quality and accuracy of the CNIS. In Phase 3, a second survey was conducted to determine how well dietitians had adapted to the system and the extent of improvement in efficiency after the CNIS had been available online for three years. The work time requirements decreased by approximately 58% with the assistance of the CNIS. Of the dietitians who used the CNIS, 95% reported satisfaction, with 91.66% indicating that the CNIS was really helpful in their work. However, some shortcomings were also evident according to the results. Dietitians favoured the standardization of nutritional intervention and monitoring. The CNIS meets the needs of dietitians by increasing the quality of nutritional interventions by providing accurate calculations and cross-referencing for information regarding patients' conditions, with the benefit of decreasing the processing time, such as handwritten documentation. In addition, the CNIS also helps dietitians statistically analyse each patient's personal nutritional needs to achieve nutritional improvement. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. An Inter-Personal Information Sharing Model Based on Personalized Recommendations

    Science.gov (United States)

    Kamei, Koji; Funakoshi, Kaname; Akahani, Jun-Ichi; Satoh, Tetsuji

    In this paper, we propose an inter-personal information sharing model among individuals based on personalized recommendations. In the proposed model, we define an information resource as shared between people when both of them consider it important --- not merely when they both possess it. In other words, the model defines the importance of information resources based on personalized recommendations from identifiable acquaintances. The proposed method is based on a collaborative filtering system that focuses on evaluations from identifiable acquaintances. It utilizes both user evaluations for documents and their contents. In other words, each user profile is represented as a matrix of credibility to the other users' evaluations on each domain of interests. We extended the content-based collaborative filtering method to distinguish other users to whom the documents should be recommended. We also applied a concept-based vector space model to represent the domain of interests instead of the previous method which represented them by a term-based vector space model. We introduce a personalized concept-base compiled from each user's information repository to improve the information retrieval in the user's environment. Furthermore, the concept-spaces change from user to user since they reflect the personalities of the users. Because of different concept-spaces, the similarity between a document and a user's interest varies for each user. As a result, a user receives recommendations from other users who have different view points, achieving inter-personal information sharing based on personalized recommendations. This paper also describes an experimental simulation of our information sharing model. In our laboratory, five participants accumulated a personal repository of e-mails and web pages from which they built their own concept-base. Then we estimated the user profiles according to personalized concept-bases and sets of documents which others evaluated. We simulated

  18. Personal, Anticipated Information Need

    Science.gov (United States)

    Bruce, Harry

    2005-01-01

    Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…

  19. Personalized Recommender System for Digital Libraries

    Science.gov (United States)

    Omisore, M. O.; Samuel, O. W.

    2014-01-01

    The huge amount of information available online has given rise to personalization and filtering systems. Recommender systems (RS) constitute a specific type of information filtering technique that present items according to user's interests. In this research, a web-based personalized recommender system capable of providing learners with books that…

  20. [Management of Personal Information in Clinical Laboratory Medicine:--Chairmen's Introductory Remarks].

    Science.gov (United States)

    Yoshida, Hiroshi; Shimetani, Naoto

    2014-11-01

    The Japanese Society of Laboratory Medicine has been running its own Medical Safety Committee, and holding a symposium on medical safety during the annual meeting. The medical world is filled with a considerable amount of personal information, including genetic information, the ultimate personal information. We, as medical staff, have to manage such personal information not only in times of peace but also during disasters or emergency situations. In Japan, the Act on the Protection of Personal Information is currently being implemented, but a number of problems remain. Human beings have entered the information technology era, including electrical medical record systems, which is useful for research and education besides medical practice. This is why personal information must be more effectively protected from leakage, misconception, and abuse. We should create a sound system to manage personal information, with the spirit of protecting patient information that originated from the Oath of Hippocrates.

  1. Personal Information Management (PIM: an Introduction

    Directory of Open Access Journals (Sweden)

    Rasoul Zavaraqi

    2012-10-01

    Full Text Available The aim of this paper was to present detailed texts about necessities of personal information management (PIM and has been written by literature survey. Historical investigation of this new born research area showed PIM is an extension to primary personal information management in offices and other bureaucratic centers. PIM is the result of new ICT developments and its followings as information overload and pollution, which is combination of information retrieval, database management systems (DBMS, information science, human-computer interaction, cognitive psychology, and artificial intelligence. The research area tries to address to old challenges by new mechanisms. The paper introduced the new born research area and discussed about its appearance, definitions, history, benefits, performance and researches which has been done about it.

  2. Modified Motivation System as the Information Source for Personal Controlling. Case of the Hotel

    Directory of Open Access Journals (Sweden)

    Małgorzata Sztorc

    2008-09-01

    Full Text Available The purpose of the article is to analysis of employee system incentive hotel there be source of information for personal controlling. New incentive system fitted look to suggest for notes entered by employee. It pay attention in article, that there is sole form of motivating of forceful employee proprietary form financial motivator. Proper system of motivation effects boost of efficiency of staff aiming at achievement in firm purposes indicated appointee. Besides, it shows revolt of working group about miscellaneous features, requirements, engagement, skilful management leads achievement of fairest effect of work which. We understand control result of taken personal decision through definition personal controlling, structures of employment, system of remuneration, motivation systems, utilization of active time of employee and cost of work. Among others, counteraction belongs to tasks in sphere of management in taking up of erroneous decision human resources controlling, high cost of employment have, helping with fitting human resources for real requirements of firms and through suitable utilization of potential work stimulation. There is in firm personal wanted controlling in order to it were of limited activity of professional employee for forward taking reward only.

  3. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Science.gov (United States)

    2010-07-01

    ... personal information? 105-64.108 Section 105-64.108 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General... GSA safeguard personal information? (a) System managers will establish administrative, technical, and...

  4. TASK-TECHNOLOGY FIT AND PERSON-JOB FIT: A BEAUTY CONTEST TO IMPROVE THE SUCCESS OF INFORMATION SYSTEMS

    OpenAIRE

    Suryani, Woro Dwi; Sumiyana, Sumiyana

    2015-01-01

    This study raises the issue that information system success could be enhanced by complementingother factors. This study investigates the success of information systems by inducing2the task-technology fit (TTF) and person-job fit (PJF) into the DeLone and McLean model. Thisstudy aims to examine, among the two induced factors, which one is able to explain andimprove the success of the information systems implementation.The results of this study indicate that the TTF explains the models’ goodnes...

  5. College Students’ Information Needs and Information Seeking Behaviors regarding Personal Information

    Directory of Open Access Journals (Sweden)

    Yu-Wen Liu

    2017-12-01

    Full Text Available This study analyzed college students’ reactions toward the issues of personal information. Students’ needs and seeking behaviors for personal information were assessed. Relevant literature was reviewed for framing the research questions and designing the questionnaire items for survey. Survey subjects were students from an university at northern Taiwan. A set of questionnaire items were used to collect research data. Statistical analysis from 252 valid data reveals some items were highly rated: Students reflected highly for their need of knowledge under the security threat of personal information (M = 4.29. They reacted strongly on acquiring knowledge and resources through the Internet (M = 4.24. They preferred the use of resources clear and easy to be understood (M = 4.04. However, most students had low level faith toward either government or non-governmental organizations in securing their personal information (M < 3.0 for most items. More effort among education and government should be emphasized in the future to improve personal use and reduce uncertainty in the use of personal information.

  6. Personal Information as Communicative Acts

    DEFF Research Database (Denmark)

    Mai, Jens-Erik

    2016-01-01

    The paper extends previous accounts of informational privacy as a contextual notion. Where previous accounts have focused on interpretations of the privacy context itself as being contextual and open for negotiation and interpretation, this paper extends those analyses and shows that personal...... information itself is in fact best understood as contextual and situational—and as such open for interpretation. The paper reviews the notion of information as it has been applied in informational privacy and philosophy of information, and suggests that personal information ought to be regarded...... as communicative acts. The paper suggests a reconceptualization of informational privacy from having its focus on controlling, limiting, and restricting access to material carriers of information to a focus on a regulation of the use, analysis, and interpretation of personal information....

  7. Self-informant Agreement for Personality and Evaluative Person Descriptors: Comparing Methods for Creating Informant Measures.

    Science.gov (United States)

    Simms, Leonard J; Zelazny, Kerry; Yam, Wern How; Gros, Daniel F

    2010-05-01

    Little attention typically is paid to the way self-report measures are translated for use in self-informant agreement studies. We studied two possible methods for creating informant measures: (a) the traditional method in which self-report items were translated from the first- to the third-person and (b) an alternative meta-perceptual method in which informants were directed to rate their perception of the targets' self-perception. We hypothesized that the latter method would yield stronger self-informant agreement for evaluative personality dimensions measured by indirect item markers. We studied these methods in a sample of 303 undergraduate friendship dyads. Results revealed mean-level differences between methods, similar self-informant agreement across methods, stronger agreement for Big Five dimensions than for evaluative dimensions, and incremental validity for meta-perceptual informant rating methods. Limited power reduced the interpretability of several sparse acquaintanceship effects. We conclude that traditional informant methods are appropriate for most personality traits, but meta-perceptual methods may be more appropriate when personality questionnaire items reflect indirect indicators of the trait being measured, which is particularly likely for evaluative traits.

  8. Development of a Recommender System based on Personal History

    Science.gov (United States)

    Tanaka, Katsuaki; Hori, Koichi; Yamamoto, Masato

    The flood of information on the Internet makes a person who surf it without some strong intention strayed into it. One of the ways to control the balance between a person and the flood is a recommender system by computer, and many web sites use it. These systems work on a web site for the same kind of items. However the field of personal activity is not limited to handle the same kind of thing and a web site, but also offline area in the real world. To handle personal offline activities, LifeLog is proposed as method to record it, but the main purpose of LifeLog is recording a personal history. How to use a history has still been studied stage. The authors have developed a recommender system that captures personal context from history of personal online and offline activities, treats information on web sites as a large set of context, and finds out and extends overlap of them, then recommends information located there. The aim of the system is that a person can enjoy waves of information again. The system worked as a part of My-life Assist Service. It was a service for mobile phones provided by NTT DoCoMo, Inc. as a field experiment from Dec. 2007 to Feb. 2008.

  9. [A web information system for enhancing management and improving special care services provided to dependent persons].

    Science.gov (United States)

    Alvarez-Bermejo, J A; Hernández-Capel, D M; Belmonte-Ureña, L J; Roca-Piera, J

    2009-01-01

    Ensuring the quality of services provided in centres where dependent persons are seen by specialist services, by improving and enhancing how information -salary, control of tasks, patients' records, etc.- is shared between staff and carers. A web information system has been developed and experimentally deployed to accomplish this. The accuracy of the system was evaluated by assessing how confident the employees were with it rather than relying on statistical data. It was experimentally deployed since January 2009 in Asociación de Personas con Discapacidad "El Saliente" that manages several day centres in Almeria, for dependent persons over 65 years old, particularly those affected by Alzheimer' disease. Incidence data was collected during the experimental period. A total of 84% of the employees thought that the system helped to manage documents, administrative duties, etc., and 92.4% said they could attend to really important tasks because the system was responsible for alerting them of every task, such as medication timetables, checking all patients were present (to prevent an Alzheimer affected person leaving the centre) etc. During this period the incidences reported were reduced by about a 30%, although data is still partially representative. As the life expectancy of the population gets longer, these centres will increase. Providing systems such as the one presented here would be of great help for administrative duties (sensitive data protection...) as well as ensuring high quality care and attention.

  10. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information

  11. Personal health records: retrieving contextual information with Google Custom Search.

    Science.gov (United States)

    Ahsan, Mahmud; Seldon, H Lee; Sayeed, Shohel

    2012-01-01

    Ubiquitous personal health records, which can accompany a person everywhere, are a necessary requirement for ubiquitous healthcare. Contextual information related to health events is important for the diagnosis and treatment of disease and for the maintenance of good health, yet it is seldom recorded in a health record. We describe a dual cellphone-and-Web-based personal health record system which can include 'external' contextual information. Much contextual information is available on the Internet and we can use ontologies to help identify relevant sites and information. But a search engine is required to retrieve information from the Web and developing a customized search engine is beyond our scope, so we can use Google Custom Search API Web service to get contextual data. In this paper we describe a framework which combines a health-and-environment 'knowledge base' or ontology with the Google Custom Search API to retrieve relevant contextual information related to entries in a ubiquitous personal health record.

  12. The Personal Information Security Assistant

    NARCIS (Netherlands)

    Kegel, Roeland Hendrik,Pieter

    The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security

  13. Ontology-Based User Profiling for Personalized Acces to Information within Collaborative Learning System

    Directory of Open Access Journals (Sweden)

    Mohammed Amine Alimam

    2014-06-01

    Full Text Available The use of modern educational technology methods has become an important area of research in order to support learning as well as collaboration. This is especially evident with the rise of internet and web 2.0 platforms that have transformed users’ role from mere content consumers to fully content consumers-producers. Furthermore, people engaged in collaborative learning capitalize on one another’s resources and skills, unlike individual learning. This paper proceeds with a categorization of the main tools and functions that characterize the personalization learning aspect, in order to discuss their trade-offs with collaborative learning systems. It proposes a framework of a personalized information research (IR within a collaborative learning system, incorporating the characterization of the research type carried by the query, as well as modeling and constructing semantic users’ profiles. We use the context of the user query into a prediction mechanism of the search type, based on a previous identification of users’ levels and interests. The paper is concluded by presenting experiment results, revealing that the use of the subject ontology extension approach satisfyingly contributes to improvement in the accuracy of system recommendations.

  14. The Decision of Information Safety Problems at Processing of the Biometric Personal Data

    Directory of Open Access Journals (Sweden)

    Y. G. Gorshkov

    2010-03-01

    Full Text Available The requirements imposed on transfer by the personal biometric information in systems and communication networks according to Federal Law № 152 “Personal data” are defined. Lacks of used decisions protection of such biometric data, as the test speech information, including parameters of a speech path, and also acoustic signals of tones and noise of heart of the person on an example of telemedicine systems construction with the using of a network telephone channels general using and wireless networks Wi-Fi are considered. Directions of works are formulated on safety of the personal biometric data transferred in telecommunication systems.

  15. Personality and Education Mining based Job Advisory System

    Directory of Open Access Journals (Sweden)

    Rajendra S. Choudhary

    2014-09-01

    Full Text Available Every job demands an employee with some specific qualities in addition to the basic educational qualification. For example, an introvert person cannot be a good leader despite of a very good academic qualification. Thinking and logical ability is required for a person to be a successful software engineer. So, the aim of this paper is to present a novel approach for advising an ideal job to the job seeker while considering his personality trait and educational qualification both. Very well-known theories of personality like MBTI indicator and OCEAN theory, are used for personality mining. For education mining, score based system is used. The score based system captures the information from attributes like most scoring subject, dream job etc. After personality mining, the resultant values are coalesced with the information extracted from education mining. And finally, the most suited jobs, in terms of personality and educational qualification are recommended to the job seekers. The experiment is conducted on the students who have earned an engineering degree in the field of computer science, information technology and electronics. Nevertheless, the same architecture can easily be extended to other educational degrees also. To the best of the author’s knowledge, this is a first e-job advisory system that recommends the job best suited as per one’s personality using MBTI and OCEAN theory both.

  16. The SADI Personal Health Lens: A Web Browser-Based System for Identifying Personally Relevant Drug Interactions.

    Science.gov (United States)

    Vandervalk, Ben; McCarthy, E Luke; Cruz-Toledo, José; Klein, Artjom; Baker, Christopher J O; Dumontier, Michel; Wilkinson, Mark D

    2013-04-05

    The Web provides widespread access to vast quantities of health-related information that can improve quality-of-life through better understanding of personal symptoms, medical conditions, and available treatments. Unfortunately, identifying a credible and personally relevant subset of information can be a time-consuming and challenging task for users without a medical background. The objective of the Personal Health Lens system is to aid users when reading health-related webpages by providing warnings about personally relevant drug interactions. More broadly, we wish to present a prototype for a novel, generalizable approach to facilitating interactions between a patient, their practitioner(s), and the Web. We utilized a distributed, Semantic Web-based architecture for recognizing personally dangerous drugs consisting of: (1) a private, local triple store of personal health information, (2) Semantic Web services, following the Semantic Automated Discovery and Integration (SADI) design pattern, for text mining and identifying substance interactions, (3) a bookmarklet to trigger analysis of a webpage and annotate it with personalized warnings, and (4) a semantic query that acts as an abstract template of the analytical workflow to be enacted by the system. A prototype implementation of the system is provided in the form of a Java standalone executable JAR file. The JAR file bundles all components of the system: the personal health database, locally-running versions of the SADI services, and a javascript bookmarklet that triggers analysis of a webpage. In addition, the demonstration includes a hypothetical personal health profile, allowing the system to be used immediately without configuration. Usage instructions are provided. The main strength of the Personal Health Lens system is its ability to organize medical information and to present it to the user in a personalized and contextually relevant manner. While this prototype was limited to a single knowledge domain

  17. The SADI Personal Health Lens: A Web Browser-Based System for Identifying Personally Relevant Drug Interactions

    Science.gov (United States)

    Vandervalk, Ben; McCarthy, E Luke; Cruz-Toledo, José; Klein, Artjom; Baker, Christopher J O; Dumontier, Michel

    2013-01-01

    Background The Web provides widespread access to vast quantities of health-related information that can improve quality-of-life through better understanding of personal symptoms, medical conditions, and available treatments. Unfortunately, identifying a credible and personally relevant subset of information can be a time-consuming and challenging task for users without a medical background. Objective The objective of the Personal Health Lens system is to aid users when reading health-related webpages by providing warnings about personally relevant drug interactions. More broadly, we wish to present a prototype for a novel, generalizable approach to facilitating interactions between a patient, their practitioner(s), and the Web. Methods We utilized a distributed, Semantic Web-based architecture for recognizing personally dangerous drugs consisting of: (1) a private, local triple store of personal health information, (2) Semantic Web services, following the Semantic Automated Discovery and Integration (SADI) design pattern, for text mining and identifying substance interactions, (3) a bookmarklet to trigger analysis of a webpage and annotate it with personalized warnings, and (4) a semantic query that acts as an abstract template of the analytical workflow to be enacted by the system. Results A prototype implementation of the system is provided in the form of a Java standalone executable JAR file. The JAR file bundles all components of the system: the personal health database, locally-running versions of the SADI services, and a javascript bookmarklet that triggers analysis of a webpage. In addition, the demonstration includes a hypothetical personal health profile, allowing the system to be used immediately without configuration. Usage instructions are provided. Conclusions The main strength of the Personal Health Lens system is its ability to organize medical information and to present it to the user in a personalized and contextually relevant manner. While this

  18. Exploring Healthcare Consumer Acceptance of Personal Health Information Management Technology through Personal Health Record Systems

    Science.gov (United States)

    Wu, Huijuan

    2013-01-01

    Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…

  19. Internet protocol television for personalized home-based health information: design-based research on a diabetes education system.

    Science.gov (United States)

    Gray, Kathleen Mary; Clarke, Ken; Alzougool, Basil; Hines, Carolyn; Tidhar, Gil; Frukhtman, Feodor

    2014-03-10

    The use of Internet protocol television (IPTV) as a channel for consumer health information is a relatively under-explored area of medical Internet research. IPTV may afford new opportunities for health care service providers to provide health information and for consumers, patients, and caretakers to access health information. The technologies of Web 2.0 add a new and even less explored dimension to IPTV's potential. Our research explored an application of Web 2.0 integrated with IPTV for personalized home-based health information in diabetes education, particularly for people with diabetes who are not strong computer and Internet users, and thus may miss out on Web-based resources. We wanted to establish whether this system could enable diabetes educators to deliver personalized health information directly to people with diabetes in their homes; and whether this system could encourage people with diabetes who make little use of Web-based health information to build their health literacy via the interface of a home television screen and remote control. This project was undertaken as design-based research in two stages. Stage 1 comprised a feasibility study into the technical work required to integrate an existing Web 2.0 platform with an existing IPTV system, populated with content and implemented for user trials in a laboratory setting. Stage 2 comprised an evaluation of the system by consumers and providers of diabetes information. The project succeeded in developing a Web 2.0 IPTV system for people with diabetes and low literacies and their diabetes educators. The performance of the system in the laboratory setting gave them the confidence to engage seriously in thinking about the actual and potential features and benefits of a more widely-implemented system. In their feedback they pointed out a range of critical usability and usefulness issues related to Web 2.0 affordances and learning fundamentals. They also described their experiences with the system in

  20. Information literacy and personal knowledge management

    DEFF Research Database (Denmark)

    Schreiber, Trine; Harbo, Karen

    2004-01-01

    The aim of the paper is to discuss a new subject called personal knowledge management and to compare it with the better-known concept information literacy. Firstly, the paper describes and discusses the course called personal knowledge management. People from three institutions, the Library...... the participants partly how to manage information in such a way that it supports a learning process, and partly how to negotiate with the colleagues about the information needs, locate the information, and mediate it in such a way that the colleagues will use it. At the end of the course the participants construct...... a ´knowledge map´, which constitutes the mediation of the information to the workplace. The course has got a very positively reception. Secondly, the paper compares the course of personal knowledge management with the concept of information literacy. There exist a number of different definitions of the last...

  1. Application of ubiquitous computing in personal health monitoring systems.

    Science.gov (United States)

    Kunze, C; Grossmann, U; Stork, W; Müller-Glaser, K D

    2002-01-01

    A possibility to significantly reduce the costs of public health systems is to increasingly use information technology. The Laboratory for Information Processing Technology (ITIV) at the University of Karlsruhe is developing a personal health monitoring system, which should improve health care and at the same time reduce costs by combining micro-technological smart sensors with personalized, mobile computing systems. In this paper we present how ubiquitous computing theory can be applied in the health-care domain.

  2. Controlled Sharing of Personal Information in Android

    OpenAIRE

    Bø, Solvår; Pedersen, Stian; Nyre, Åsmund Ahlmann; Bernsmed, Karin

    2011-01-01

    Smartphones with third-party applications have become very popular. Recently, they have received attention for quietly monitoring and transferring personal information without the users’ knowledge. The objective of this work is to help users to protect their privacy by increasing their consciousness on how personal information is collected and distributed. We propose a design that provides a higher degree of control by allowing users to set preferences that determine what personal information...

  3. Collection, Use, Disclosure and Protection of Personal Information ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    whoskin

    addresses, personal and/or work email addresses, personal and/or work or cell telephone numbers); and. • language testing and language assessment results. How Do We Use Your Personal Information? We use the personal information you provide exclusively for the purposes of processing, screening, assessing ...

  4. Personal exposure control system

    International Nuclear Information System (INIS)

    Tanabe, Ken-ichi; Akashi, Michio

    1994-01-01

    Nuclear power stations are under strict radiation control. Exposure control for nuclear workers is the most important operation, and so carefully thought out measures are taken. This paper introduces Fuji Electric's personal exposure control system that meets strict exposure control and rationalizes control operations. The system has a merit that it can provide required information in an optimum form using the interconnection of a super minicomputer and exposure control facilities and realizes sophisticated exposure control operations. (author)

  5. Personal power systems

    Energy Technology Data Exchange (ETDEWEB)

    Dunn-Rankin, Derek; Leal, Elisangela Martins; Walther, David C. [Mechanical and Aerospace Engineering Department, University of California, Irvine, CA 92697 (United States)

    2005-07-01

    The lack of compact, efficient, human compatible, lightweight power sources impedes the realization of machine-enhanced human endeavor. Electronic and communication devices, as well as mobile robotic devices, need new power sources that will allow them to operate autonomously for periods of hours. In this work, a personal power system implies an application of interest to an individual person. The human-compatible gravimetric energy density spans the range from 500 to 5000Wh/kg, with gravimetric power density requirements from 10 to 1000W/kg. These requirements are the primary goals for the systems presented here. The review examines the interesting and promising concepts in electrochemical, thermochemical, and biochemical approaches to small-scale power, as well as their technological and physical challenges and limitations. Often it is the limitations that dominate, so that while the technology to create personal autonomy for communications, information processing and mobility has accelerated, similar breakthroughs for the systems powering these devices have not yet occurred. Fuel cells, model airplane engines, and hummingbird metabolism, are three promising examples, respectively, of electrochemical, thermochemical, and biochemical power production strategies that are close to achieving personal power systems' power demands. Fuel cells show great promise as an energy source when relatively low power density is demanded, but they cannot yet deliver high peak powers nor respond quickly to variable loads. Current small-scale engines, while achieving extraordinary power densities, are too inefficient to achieve the energy density needed for long-duration autonomous operation. Metabolic processes of flying insects and hummingbirds are remarkable biological energy converters, but duplicating, accelerating, and harnessing such power for mobility applications is virtually unexplored. These challenges are significant, and they provide a fertile environment for

  6. Infectious Disease Information Collection System at the Scene of Disaster Relief Based on a Personal Digital Assistant.

    Science.gov (United States)

    Li, Ya-Pin; Gao, Hong-Wei; Fan, Hao-Jun; Wei, Wei; Xu, Bo; Dong, Wen-Long; Li, Qing-Feng; Song, Wen-Jing; Hou, Shi-Ke

    2017-12-01

    The objective of this study was to build a database to collect infectious disease information at the scene of a disaster through the use of 128 epidemiological questionnaires and 47 types of options, with rapid acquisition of information regarding infectious disease and rapid questionnaire customization at the scene of disaster relief by use of a personal digital assistant (PDA). SQL Server 2005 (Microsoft Corp, Redmond, WA) was used to create the option database for the infectious disease investigation, to develop a client application for the PDA, and to deploy the application on the server side. The users accessed the server for data collection and questionnaire customization with the PDA. A database with a set of comprehensive options was created and an application system was developed for the Android operating system (Google Inc, Mountain View, CA). On this basis, an infectious disease information collection system was built for use at the scene of disaster relief. The creation of an infectious disease information collection system and rapid questionnaire customization through the use of a PDA was achieved. This system integrated computer technology and mobile communication technology to develop an infectious disease information collection system and to allow for rapid questionnaire customization at the scene of disaster relief. (Disaster Med Public Health Preparedness. 2017;11:668-673).

  7. A Survey of Indoor Positioning Systems for Wireless Personal Networks

    NARCIS (Netherlands)

    Gu, Y.; Lo, A.; Niemegeers, I.

    2009-01-01

    Recently, indoor positioning systems (IPSs) have been designed to provide location information of persons and devices. The position information enables location-based protocols for user applications. Personal networks (PNs) are designed to meet the users' needs and interconnect users' devices

  8. From fear to flow personality and information interaction

    CERN Document Server

    Heinstrom, Jannica

    2010-01-01

    From Fear to Flow explores how personality traits may influence attitude, behaviour and reaction to information. Consideration is made for individual differences in information behaviour and reasons behind individual search differences. The book reviews personality and information behaviour and discusses how personality may influence the attitude towards information. Reaction to information is examined in contexts such as everyday life, decision-making, work, studies and human-computer interaction.Introduces a little researched area which is current and needed in our Informatio

  9. A PhD abstract presentation on Personal Information Privacy System based on Proactive Design

    DEFF Research Database (Denmark)

    Dhotre, Prashant Shantaram; Olesen, Henning

    2014-01-01

    providers and websites collects and make an extensive use of personal information. Using different Big Data methods and techniques the knowledge and patterns are generated or extracted from the data. This will lead to a serious problem to privacy breach. Hence, there is a need of embedding privacy...... in the design phase will be the basic principle on which the data security can be provided, and the privacy will be protected. This will give more control and power to user over personal information....

  10. Media education as a system of health personalities software in media-information space

    Directory of Open Access Journals (Sweden)

    Ye. M. Velykodna

    2014-04-01

    Full Text Available The main purpose of the article is to outline the problems of health and human security in the media­information education space. Media education as a system of values formation under conditions of medial ­ information educational environment focused on developing and providing protective functions in their close interdependence. Training is aimed at creating conditions for the development of spiritual subjects of education, promotion of positive changes in their personal development. Protective aimed at improving the social protection of business education in the destructive tendencies in society , to neutralize the impact of negative factors media. The most important part of media education in the context of ensuring the health of the individual is the formation of values education activity as the basis of spiritual health. It is shown that meaningful use sens formative influence of media­information space determines the priority position of media education as a factor in providing mental health of the individual. Formation of mental health is associated with the conscious assimilation of certain belief systems of the world. According media education focuses not on broadcast ready «moral absolutes «, and the simulation of specific situations in which the individual is necessary to self­determination regarding fundamental values and principles of implementing these values in life.

  11. Mapping Students’ Informal Learning Using Personal Learning Environment

    Directory of Open Access Journals (Sweden)

    Jelena Anđelković Labrović

    2014-07-01

    Full Text Available Personal learning environments are a widely spared ways of learning, especially for the informal learning process. The aim of this research is to identify the elements of studens’ personal learning environment and to identify the extent to which students use modern technology for learning as part of their non-formal learning. A mapping system was used for gathering data and an analysis of percentages and frequency counts was used for data analysis in the SPSS. The results show that students’ personal learning environment includes the following elements: Wikipedia, Google, YouTube and Facebook in 75% of all cases, and an interesting fact is that all of them belong to a group of Web 2.0 tools and applications.

  12. A Perception Study of Computer Science and Information Systems Students on Bullying Prevalence in the Information Systems Profession

    Science.gov (United States)

    Lawler, James; Molluzzo, John C.

    2016-01-01

    Bullying is considered to be omnipresent in business firms and prevalent in entrepreneurial firms in information systems and in departments of information systems in industry. Entrepreneurialism and narcissism of personalities in the information systems profession may be perceived as especially predisposed to bullying. The authors of this paper…

  13. Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online?

    Science.gov (United States)

    Mesch, Gustavo S.; Beker, Guy

    2010-01-01

    This study investigated whether norms of self-disclosure of one's online and offline identity are linked to online disclosure of personal and intimate information. We expected online disclosure of personal and intimate information to be associated with norms of online disclosure. Secondary analysis of the 2006 Pew and American Life Survey of…

  14. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.

    Science.gov (United States)

    Namoğlu, Nihan; Ulgen, Yekta

    2013-01-01

    Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects.

  15. Personality traits and group-based information behaviour

    DEFF Research Database (Denmark)

    Hyldegård, Jette

    2009-01-01

    followed during a project assignment. The long version of the commonly-used NEO-PI-R test instrument was employed to describe and compare each group member's personality traits at a more detailed level. Data were also collected through a process survey, a diary and an interview. Analysis. The calculation....... Information behaviour associated with personality traits was identified, but the presence of personality effects tended to vary with the perceived presence of the social context. Conclusions. Some matches were identified between group members' personality traits and their actual information behaviour...... but there were also deviations, which were found that seemed to be related to the group-work context. The importance of studying personality traits in context has further been confirmed....

  16. Using a User-Interactive QA System for Personalized E-Learning

    Science.gov (United States)

    Hu, Dawei; Chen, Wei; Zeng, Qingtian; Hao, Tianyong; Min, Feng; Wenyin, Liu

    2008-01-01

    A personalized e-learning framework based on a user-interactive question-answering (QA) system is proposed, in which a user-modeling approach is used to capture personal information of students and a personalized answer extraction algorithm is proposed for personalized automatic answering. In our approach, a topic ontology (or concept hierarchy)…

  17. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  18. Personalized Information Management by Online Stores in 4C Model. Case Study

    Directory of Open Access Journals (Sweden)

    Kubicka Anna

    2016-01-01

    Full Text Available The increasing complexity of the business environment, growing knowledge requirements, development of information technologies, and competitiveness implies the need of implementation of information management systems. Moreover, welter of information about online customers, their individual behavior, and their expectations force entrepreneurs to manage information in a personalized way. Monitoring Internet users behavior, creating their profiles (based on data about age, sex, lifestyle, interests, family, work, etc., and controlling current traffic on the Web site give wide range of possibilities in creating a real model of potential customers preference and using it in online communication. This study concentrates on possibilities of using personalized communication in the information management by online stores in 4C model.

  19. Smart information system for gachon university gil hospital.

    Science.gov (United States)

    Park, Dong Kyun; Jung, Eun Young; Jeong, Byung Hui; Moon, Byung Chan; Kang, Hyung Wook; Tchah, Hann; Han, Gi Seong; Cheng, Woo Sung; Lee, Young Ho

    2012-03-01

    In this research, the hospital information system of Gachon University Gil hospital is introduced and a future strategy for hospital information systems is proposed. This research introduces the development conditions of hospital information system at Gachon University Gil hospital, information about the development of the enterprise resource planning (ERP), a medical service process improvement system, and the personal health record (PHR) system. The medical service process and work efficiency were improved through the medical service process improvement system, which is the most common hospital information system at Gachon University Gil hospital and which includes an emergency medical service system, an online evaluation system and a round support system. Gachon University Gil hospital developed medical service improvement systems to increase work efficiency of medical team and optimized the systems to prove the availability of high-quality medical services for patients and their families. The PHR-based personalized health care solution is under development and will provide higher quality medical service for more patients in the future.

  20. Construction of pilot system for the Korea information system of occupational exposure

    International Nuclear Information System (INIS)

    Na, Seong Ho; Park, Moon Il; Im, Bok Soo; Lee, Seon Mi; Kim, Hyung Uk; Chae, Eun Yeong

    2003-01-01

    In this study, the construction of Korea Information System of Occupational Exposure (KISOE) system is designed with occupational exposure control system based on information evaluation technology and it makes the reliability of the personal exposure by use of personal dose verification. While the operation of national based radiation worker protection system, this system are settled the control system for radiation worker and ALARA. The purpose of construction and operation of pilot system of KISOE systematically is to derive the master plan of KISOE, stable development of this system, and serve the high quality radiation use internationally

  1. Construction of pilot system for the Korea information system of occupational exposure

    Energy Technology Data Exchange (ETDEWEB)

    Na, Seong Ho [Korea Institute of Nuclear Safety, Taejon (Korea, Republic of); Park, Moon Il; Im, Bok Soo; Lee, Seon Mi; Kim, Hyung Uk; Chae, Eun Yeong [ADDLAB Co., Ltd., Taejon (Korea, Republic of)

    2003-01-15

    In this study, the construction of Korea Information System of Occupational Exposure (KISOE) system is designed with occupational exposure control system based on information evaluation technology and it makes the reliability of the personal exposure by use of personal dose verification. While the operation of national based radiation worker protection system, this system are settled the control system for radiation worker and ALARA. The purpose of construction and operation of pilot system of KISOE systematically is to derive the master plan of KISOE, stable development of this system, and serve the high quality radiation use internationally.

  2. Protecting personal information: Implications of the Protection of Personal Information (POPI) Act for healthcare professionals.

    Science.gov (United States)

    Buys, M

    2017-10-31

    Careless handling of patient information in daily medical practice can result in Health Professions Council of South Africa sanction, breach of privacy lawsuits and, in extreme cases, serious monetary penalty or even imprisonment. This review will focus on the Protection of Personal Information (POPI) Act (No. 4 of 2013) and the implications thereof for healthcare professionals in daily practice. Recommendations regarding the safeguarding of information are made.

  3. Particle swarm optimization using multi-information characteristics of all personal-best information.

    Science.gov (United States)

    Huang, Song; Tian, Na; Wang, Yan; Ji, Zhicheng

    2016-01-01

    Convergence stagnation is the chief difficulty to solve hard optimization problems for most particle swarm optimization variants. To address this issue, a novel particle swarm optimization using multi-information characteristics of all personal-best information is developed in our research. In the modified algorithm, two positions are defined by personal-best positions and an improved cognition term with three positions of all personal-best information is used in velocity update equation to enhance the search capability. This strategy could make particles fly to a better direction by discovering useful information from all the personal-best positions. The validity of the proposed algorithm is assessed on twenty benchmark problems including unimodal, multimodal, rotated and shifted functions, and the results are compared with that obtained by some published variants of particle swarm optimization in the literature. Computational results demonstrate that the proposed algorithm finds several global optimum and high-quality solutions in most case with a fast convergence speed.

  4. The Economic Value of Personal Information and Policy Implication

    OpenAIRE

    Kim, Jiin; Nam, Changi; Kim, Seongcheol

    2015-01-01

    Personal information is essential in an information-oriented society for societal development and as a valuable business resource. However, because of poor management and a lack of proper protection, leakage of personal information can take place over time, and the standard for compensation is not well established. In order to establish appropriate policies for its protection, we need to know the economic value of personal information. Using conjoint analysis, we analyze the potential value o...

  5. Commercial products that convey personal health information in emergencies.

    Science.gov (United States)

    Potini, Vishnu C; Weerasuriya, Dilani N; Lowery-North, Douglas W; Kellermann, Arthur L

    2011-12-01

    Describe commercially available products and services designed to convey personal health information in emergencies. The search engine Google®, supplemented by print ads, was used to identify companies and organizations that offer relevant products and services to the general market. Disease-specific, health system, and health plan-specific offerings were excluded. Vendor web sites were the primary sources of information, supplemented by telephone and e-mail queries to sales representatives. Perfect inter-rater agreement was achieved. Thirty-nine unique vendors were identified. Eight sell engraved jewelry. Three offer an embossed card or pamphlet. Twelve supply USB drives with various features. Eleven support password-protected web sites. Five maintain national call centers. Available media differed markedly with respect to capacity and accessibility. Quoted prices ranged from a one-time expenditure of $3.50 to an annual fee of $200. Associated features and annual fees varied widely. A wide range of products and services exist to help patients convey personal health information. Health care providers should be familiar with their features, so they can access the information in a disaster or emergency.

  6. Content Sharing Based on Personal Information in Virtually Secured Space

    Science.gov (United States)

    Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.

    User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.

  7. Liquid Spheres on Smartphones: The Personal Information Policies

    Directory of Open Access Journals (Sweden)

    Ana Serrano Tellería

    2015-01-01

    Full Text Available Data collected from the profiles and the digital identities has become a valuable currency for the mobile ecosystem, especially between users and providers. Services that required them are also described as the ground floor in direct linked with the infrastructures and as intermediate layers between networks, platforms and applications. The frontier debate between innovation and protection of privacy is shown off undefined and unstable. Therefore, a comparative analysis between ‘Privacy Terms and Conditions’ as well as the interrelation between operative systems (Apple iOS, Android, Blackberry and Windows Phone, social media platforms (Facebook, LinkedIn, Twitter and Google + and applications (Instagram, WhatsApp, Line and Vine have been carried out focusing on Privacy issues. Two main tendencies were appreciated in relation with the two principal operative systems: Apple iOS closed environment and Google Android open source. They reconfigure the functional structure and design of platforms and applications in different ways. The liquid spheres observed varied from the first approach that tried to control every action and personal information from the binomial operative system-device and the second one that allowed the user actions and information to be more susceptible to interact with any kind of applications and platforms while the system is linked to information aggregation services to collect the data. Prominent aspects were the various stages of synchronization between the different levels of personal information (contacts, profile, digital identity and localization. Focusing on the case of Portugal, other complementary conclusions obtained from focus group and surveys showed a strong circumstantial pattern behaviour and a concern about privacy issues taking care of some actions while admitted checking if they had the terms and conditions involved - which are too ambiguous - but not reading them. Described also by other international

  8. HOPE information system review

    Science.gov (United States)

    Suzuki, Yoshiaki; Nishiyama, Kenji; Ono, Shuuji; Fukuda, Kouin

    1992-08-01

    An overview of the review conducted on H-2 Orbiting Plane (HOPE) is presented. A prototype model was constructed by inputting various technical information proposed by related laboratories. Especially operation flow which enables understanding of correlation between various analysis items, judgement criteria, technical data, and interfaces with others was constructed. Technical information data base and retrieval systems were studied. A Macintosh personal computer was selected for information shaping because of its excellent function, performance, operability, and software completeness.

  9. Determining Barriers and Facilitators Associated With Willingness to Use a Personal Health Information Management System to Support Worksite Wellness Programs.

    Science.gov (United States)

    Neyens, David M; Childers, Ashley Kay

    2017-07-01

    To determine the barriers and facilitators associated with willingness to use personal health information management (PHIM) systems to support an existing worksite wellness program (WWP). The study design involved a Web-based survey. The study setting was a regional hospital. Hospital employees comprised the study subjects. Willingness, barriers, and facilitators associated with PHIM were measured. Bivariate logit models were used to model two binary dependent variables. One model predicted the likelihood of believing PHIM systems would positively affect overall health and willingness to use. Another predicted the likelihood of worrying about online security and not believing PHIM systems would benefit health goals. Based on 333 responses, believing PHIM systems would positively affect health was highly associated with willingness to use PHIM systems (p < .01). Those comfortable online were 7.22 times more willing to use PHIM systems. Participants in exercise-based components of WWPs were 3.03 times more likely to be willing to use PHIM systems. Those who worried about online security were 5.03 times more likely to believe PHIM systems would not help obtain health goals. Comfort with personal health information online and exercise-based WWP experience was associated with willingness to use PHIM systems. However, nutrition-based WWPs did not have similar effects. Implementation barriers relate to technology anxiety and trust in security, as well as experience with specific WWP activities. Identifying differences between WWP components and addressing technology concerns before implementation of PHIM systems into WWPs may facilitate improved adoption and usage.

  10. 32 CFR 327.6 - Collecting personal information

    Science.gov (United States)

    2010-07-01

    ... personal data, a Privacy Act Statement will be added. ...) PRIVACY PROGRAM DEFENSE COMMISSARY AGENCY PRIVACY ACT PROGRAM § 327.6 Collecting personal information (a... third party sources for security or employment suitability determinations; (2) Seeking third party...

  11. Ethical Considerations Regarding Classroom Use of Personal Genomic Information

    Directory of Open Access Journals (Sweden)

    Lisa S. Parker

    2014-10-01

    Full Text Available Rapidly decreasing costs of genetic technologies—especially next-generation sequencing—and intensifying need for a clinical workforce trained in genomic medicine have increased interest in having students use personal genomic information to motivate and enhance genomics education. Numerous ethical issues attend classroom/pedagogical use of students’ personal genomic information, including their informed decision to participate, pressures to participate, privacy concerns, and psychosocial sequelae of learning genomic information. This paper addresses these issues, advocates explicit discussion of these issues to cultivate students’ ethical reasoning skills, suggests ways to mitigate potential harms, and recommends collection of ethically relevant data regarding pedagogical use of personal genomic information.

  12. DLP system and the secret of personal correspondence

    Directory of Open Access Journals (Sweden)

    Mavrinskaya T.V.

    2017-04-01

    Full Text Available according to the authors, every day a number of threats to information security increases, and this requires an increase in resources (systems of information protection of organizations and enterprises. There are many information security tools with different functionality, but the main mean of preventing information leakage is the Date Loss Prevention (DLP system. If you need to establish control over the leak of confidential information there appear a number of questions of conformity of decisions with the legislation and regulations. This article describes the issue of compliance functionality of a DLP system the provisions and requirements of the legislation in the sphere of protection of family and personal secrets, as well as compliance with the Constitutional right of citizens to privacy of correspondence.

  13. Radiological information management system SRIM-10

    International Nuclear Information System (INIS)

    Shibata, Koichi; Goto, Yoshihisa

    1989-01-01

    A radiological information management system, SRIM-10, has been developed using a personal computer, in order to smoothly manage routine works in radiological division of hospitals. Data base is constructed with radiographic data acuqired directly from x-ray apparatus and patient information acquired using ID card. It is possible to record patient information of about 10,000 patients and radiographic data of about 120,000 exposures. This system can be made up as a multi work station system using a local area network. (author)

  14. Radiological information management system SRIM-10

    Energy Technology Data Exchange (ETDEWEB)

    Shibata, Koichi; Goto, Yoshihisa

    1989-03-01

    A radiological information management system, SRIM-10, has been developed using a personal computer, in order to smoothly manage routine works in radiological division of hospitals. Data base is constructed with radiographic data acuqired directly from x-ray apparatus and patient information acquired using ID card. It is possible to record patient information of about 10,000 patients and radiographic data of about 120,000 exposures. This system can be made up as a multi work station system using a local area network. (author).

  15. On the Protection of Personal Data in the Access Control System

    Directory of Open Access Journals (Sweden)

    A. P. Durakovskiy

    2012-03-01

    Full Text Available The aim is to prove the qualification system of access control systems (ACS as an information system for personal data (ISPDn. Applications: systems of physical protection of facilities.

  16. Personal information search on mobile devices

    OpenAIRE

    Akbas, Mehmet.

    2007-01-01

    Today's mobile devices, especially mobile phones, are comparable in computing capability and storage to the desktop computers of a few years ago. The volume and diversity of the information kept on mobile devices has continually increased and users have taken advantage of this. Since information is being stored on multiple devices, searching for and retrieving the desired information has become an important function. This thesis focuses on search with regard to Personal Information Manag...

  17. Information workers and their personal information management: a literature review

    NARCIS (Netherlands)

    A.A.J. (Jos) van Helvoort

    2011-01-01

    The research described in this paper provides insights into tools and methods which are used by professional information workers to keep and to manage their personal information. A literature study was carried out on 23 scholar papers and articles, retrieved from the ACM Digital Library and Library

  18. Adaptive Visualization for Focused Personalized Information Retrieval

    Science.gov (United States)

    Ahn, Jae-wook

    2010-01-01

    The new trend on the Web has totally changed today's information access environment. The traditional information overload problem has evolved into the qualitative level beyond the quantitative growth. The mode of producing and consuming information is changing and we need a new paradigm for accessing information. Personalized search is one of…

  19. An Architecture for Information Commerce Systems

    OpenAIRE

    Hauswirth, Manfred; Jazayeri, Mehdi; Miklós, Zoltan; Podnar, Ivana; Di Nitto, Elisabetta; Wombacher, Andreas

    2001-01-01

    The increasing use of the Internet in business and commerce has created a number of new business opportunities and the need for supporting models and platforms. One of these opportunities is information commerce (i-commerce), a special case of ecommerce focused on the purchase and sale of information as a commodity. In this paper we present an architecture for i-commerce systems using OPELIX (Open Personalized Electronic Information Commerce System) [11] as an example. OPELIX provides an open...

  20. Disposal Site Information Management System

    International Nuclear Information System (INIS)

    Larson, R.A.; Jouse, C.A.; Esparza, V.

    1986-01-01

    An information management system for low-level waste shipped for disposal has been developed for the Nuclear Regulatory Commission (NRC). The Disposal Site Information Management System (DSIMS) was developed to provide a user friendly computerized system, accessible through NRC on a nationwide network, for persons needing information to facilitate management decisions. This system has been developed on NOMAD VP/CSS, and the data obtained from the operators of commercial disposal sites are transferred to DSIMS semiannually. Capabilities are provided in DSIMS to allow the user to select and sort data for use in analysis and reporting low-level waste. The system also provides means for describing sources and quantities of low-level waste exceeding the limits of NRC 10 CFR Part 61 Class C. Information contained in DSIMS is intended to aid in future waste projections and economic analysis for new disposal sites

  1. The ideal laboratory information system.

    Science.gov (United States)

    Sepulveda, Jorge L; Young, Donald S

    2013-08-01

    Laboratory information systems (LIS) are critical components of the operation of clinical laboratories. However, the functionalities of LIS have lagged significantly behind the capacities of current hardware and software technologies, while the complexity of the information produced by clinical laboratories has been increasing over time and will soon undergo rapid expansion with the use of new, high-throughput and high-dimensionality laboratory tests. In the broadest sense, LIS are essential to manage the flow of information between health care providers, patients, and laboratories and should be designed to optimize not only laboratory operations but also personalized clinical care. To list suggestions for designing LIS with the goal of optimizing the operation of clinical laboratories while improving clinical care by intelligent management of laboratory information. Literature review, interviews with laboratory users, and personal experience and opinion. Laboratory information systems can improve laboratory operations and improve patient care. Specific suggestions for improving the function of LIS are listed under the following sections: (1) Information Security, (2) Test Ordering, (3) Specimen Collection, Accessioning, and Processing, (4) Analytic Phase, (5) Result Entry and Validation, (6) Result Reporting, (7) Notification Management, (8) Data Mining and Cross-sectional Reports, (9) Method Validation, (10) Quality Management, (11) Administrative and Financial Issues, and (12) Other Operational Issues.

  2. Information management to enable personalized medicine: stakeholder roles in building clinical decision support.

    Science.gov (United States)

    Downing, Gregory J; Boyle, Scott N; Brinner, Kristin M; Osheroff, Jerome A

    2009-10-08

    Advances in technology and the scientific understanding of disease processes are presenting new opportunities to improve health through individualized approaches to patient management referred to as personalized medicine. Future health care strategies that deploy genomic technologies and molecular therapies will bring opportunities to prevent, predict, and pre-empt disease processes but will be dependent on knowledge management capabilities for health care providers that are not currently available. A key cornerstone to the potential application of this knowledge will be effective use of electronic health records. In particular, appropriate clinical use of genomic test results and molecularly-targeted therapies present important challenges in patient management that can be effectively addressed using electronic clinical decision support technologies. Approaches to shaping future health information needs for personalized medicine were undertaken by a work group of the American Health Information Community. A needs assessment for clinical decision support in electronic health record systems to support personalized medical practices was conducted to guide health future development activities. Further, a suggested action plan was developed for government, researchers and research institutions, developers of electronic information tools (including clinical guidelines, and quality measures), and standards development organizations to meet the needs for personalized approaches to medical practice. In this article, we focus these activities on stakeholder organizations as an operational framework to help identify and coordinate needs and opportunities for clinical decision support tools to enable personalized medicine. This perspective addresses conceptual approaches that can be undertaken to develop and apply clinical decision support in electronic health record systems to achieve personalized medical care. In addition, to represent meaningful benefits to personalized

  3. Information management to enable personalized medicine: stakeholder roles in building clinical decision support

    Directory of Open Access Journals (Sweden)

    Brinner Kristin M

    2009-10-01

    Full Text Available Abstract Background Advances in technology and the scientific understanding of disease processes are presenting new opportunities to improve health through individualized approaches to patient management referred to as personalized medicine. Future health care strategies that deploy genomic technologies and molecular therapies will bring opportunities to prevent, predict, and pre-empt disease processes but will be dependent on knowledge management capabilities for health care providers that are not currently available. A key cornerstone to the potential application of this knowledge will be effective use of electronic health records. In particular, appropriate clinical use of genomic test results and molecularly-targeted therapies present important challenges in patient management that can be effectively addressed using electronic clinical decision support technologies. Discussion Approaches to shaping future health information needs for personalized medicine were undertaken by a work group of the American Health Information Community. A needs assessment for clinical decision support in electronic health record systems to support personalized medical practices was conducted to guide health future development activities. Further, a suggested action plan was developed for government, researchers and research institutions, developers of electronic information tools (including clinical guidelines, and quality measures, and standards development organizations to meet the needs for personalized approaches to medical practice. In this article, we focus these activities on stakeholder organizations as an operational framework to help identify and coordinate needs and opportunities for clinical decision support tools to enable personalized medicine. Summary This perspective addresses conceptual approaches that can be undertaken to develop and apply clinical decision support in electronic health record systems to achieve personalized medical care. In

  4. Freedom of Expression, Right to Information, Personal Data and the Internet in the view of the Inter-American System of Human Rights

    Directory of Open Access Journals (Sweden)

    Silvia Susana TOSCANO

    2017-03-01

    Full Text Available The Inter-American System of Protection of Human Rights is composed of microsystems, like the freedom of expression, the right to information and the protection of privacy and of personal data, among others. These rights interrelate and form the standards of the Inter-American system, in accordance with the UN system, to develop these liberties, and to keep the constant balance of these rights in conflict. All of this enhanced by a dynamic and growing massiveness, like the internet and by a new paradigm in which the freedom of expression and the right to information is included: a postmodern society characterized by a “democratization” of connectivity, a multidirectional transmission of the information and a dichotomy between what is public or private. Freedom of expression is developed in both of its two dimensions: individual or collective. When we talk about its individual dimension, we mean the right of each person to express his ideas, thoughts and beliefs aiming at unidirectional, bidirectional or multidirectional communication. The collective or social dimension refers to the right of a person to receive any type of information, to know the thoughts, ideas and information of others and have free access to them. Both dimensions are equally important and are interdependent, thus it is important to protect them simultaneously. New communication technologies have altered the previous system, and the individual dimension of freedom of expression breaks into public debate on the democratization of internet access and its social dimension due to the feasibility a multidirectional communication impossible to conceive in any other technological paradigm entails. The protection scheme of freedom of expression of the Inter-American System is particularly strong as it specifically prohibits prior censorship and rules sanctions and very strict restrictions in relation to discrimination, advocacy of war, violence and hatred. This characteristic

  5. Personal Information Management for Nurses Returning to School.

    Science.gov (United States)

    Bowman, Katherine

    2015-12-01

    Registered nurses with a diploma or an associate's degree are encouraged to return to school to earn a Bachelor of Science in Nursing degree. Until they return to school, many RNs have little need to regularly write, store, and retrieve work-related papers, but they are expected to complete the majority of assignments using a computer when in the student role. Personal information management (PIM) is a system of organizing and managing electronic information that will reduce computer clutter, while enhancing time use, task management, and productivity. This article introduces three PIM strategies for managing school work. Nesting is the creation of a system of folders to form a hierarchy for storing and retrieving electronic documents. Each folder, subfolder, and document must be given a meaningful unique name. Numbering is used to create different versions of the same paper, while preserving the original document. Copyright 2015, SLACK Incorporated.

  6. Gharibi_FaceCard for Contacts and Easy Personal - Information Exchange

    OpenAIRE

    Gharibi, Wajeb; Gharibi, Gharib

    2014-01-01

    In this paper, we discuss a new contact way for exchanging personal information using mobile phones. The idea of this invention depends on allocating a special code called Gharibi Code (GC) for each personal mobile and creating a personal information file called Gharibi Face Card (GFC), which has all specified personal data of the mobile phone user. When you request someone's GC code, the other party's phone will send you the GFC of that person. We think that this approach will facilitate the...

  7. Construction of analysis system on personal computer for slope disaster information using remote sensing technology. Remote sensing wo riyoshita pasokongata no shamen bosai joho kaiseki system no kochiku

    Energy Technology Data Exchange (ETDEWEB)

    Setojima, M [Kokusai Kogyo Co. Ltd., Tokyo (Japan); Goto, K [Nagasaki Universtiy, Nagasaki (Japan). FAculty of Engineering

    1991-08-25

    An analytical system with superposition of images which uses picture elements as a unit was developed to treat information obtained by remote sensing and other geographical information by superposing the images in order to extract the second information which expresses qualitatively and quantitatively the degree of slope disaster in the future, based on the first information about the damage caused by disaster and landform and geology. As necessary function for analytical system of the second information, precise correction of geometrical strain, superposition of images, visual reading treatment, and output of analytical result in map are listed and described respectively. Next, the detailed explanation of hardware and software of pilot system which used personal computer was given. The analytical procedure and result of land conditions around the landslide occurred at Nagano city in 1985 was shown. 3 refs., 1 fig., 1 tab.

  8. System Engineering Analysis For Improved Scout Business Information Systems

    Energy Technology Data Exchange (ETDEWEB)

    Van Slyke, D. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-01-30

    The project uses system engineering principles to address the need of Boy Scout leaders for an integrated system to facilitate advancement and awards records, leader training and planning for meetings and activities. Existing products to address needs of Scout leaders and relevant stakeholders function to support record keeping and some communication functions but opportunity exists for a better system to fully integrate these functions with training delivery and recording, activity planning along with feedback and information gathering from stakeholders. Key stakeholders for the sytem include Scouts and their families, leaders, training providers, sellers of supplies and awards, content generators and facilities that serve Scout activities. Key performance parameters for the system are protection of personal information, availability of current information, information accuracy and information content that has depth. Implementation concepts considered for the system include (1) owned and operated by Boy Scouts of America, (2) Contracted out to a vendor (3) distributed system that functions with BSA managed interfaces. The selected concept is to contract out to a vendor to maximize the likelihood of successful integration and take advantage of the best technology. Development of requirements considers three key use cases (1) System facilitates planning a hike with training needed satisfied in advance and advancement recording real time (2) Scheduling and documenting in-person training, (3) Family interested in Scouting receives information and can request follow-up. Non-functional requirements are analyzed with the Quality Function Deployment tool. Requirement addressing frequency of backup, compatibility with legacy and new technology, language support, software update are developed to address system reliability and intuitive interface. System functions analyzed include update of activity database, maintenance of advancement status, archive of documents, and

  9. Continuum Thinking and the Contexts of Personal Information Management

    Science.gov (United States)

    Huvila, Isto; Eriksen, Jon; Häusner, Eva-Maria; Jansson, Ina-Maria

    2014-01-01

    Introduction: Recent personal information management literature has underlined the significance of the contextuality of personal information and its use. The present article discusses the applicability of the records continuum model and its generalisation, continuum thinking, as a theoretical framework for explicating the overlap and evolution of…

  10. The letter of recommendation effect in informant ratings of personality.

    Science.gov (United States)

    Leising, Daniel; Erbs, Julia; Fritz, Ulrike

    2010-04-01

    In most studies using informant reports of personality, the informants are recruited by the targets. Such informants may tend to like the targets and thus portray them in specific ways (e.g., too positively). Study 1 (N = 403) demonstrated the necessity to distinguish between "liking" and "knowing" in studying the relationships between informants and targets. Informants who liked their targets better described them more positively (i.e., as being more extraverted, agreeable, open, conscientious, and less neurotic). The association between personality ratings and liking was moderated by item evaluativeness. Liked targets were also described as being more similar to each other (range restriction), which would lower correlations of informant ratings of personality with external variables. Study 2 (N = 90) used a within-subjects design to disentangle actual personality differences between targets (substance) from the informants' specific views on the targets (style). Ninety informants were asked to nominate targets they did not like. These targets then nominated informants of their own choice. Target-nominated informants liked the targets very much and described the targets' personalities very positively and in ways that were highly redundant with the average target's self-rating. There was evidence that lower liking may be associated with better accuracy. Higher subjective levels of knowing were not associated with better interrater agreement but with a greater willingness to describe targets negatively. Implications for the field of recruiting are discussed. Where possible, the choice of informants and referees should be made independent of the targets' preferences.

  11. Towards ontology personalization to enrich social conversations on AAC systems

    Science.gov (United States)

    Mancilla V., Daniela; Sastoque H., Sebastian; Iregui G., Marcela

    2015-01-01

    Communication is one of the essential needs of human beings. Augmentative and Alternative Communication Systems (AAC) seek to help in the generation of oral and written language to people with physical disorders that limit their natural communication. These systems present significant challenges such as: the composition of consistent messages according to syntactic and semantic rules, the improvement of message production times, the application to social contexts and, consequently, the incorporation of user-specific information. This work presents an original ontology personalization approach for an AAC instant messaging system incorporating personalized information to improve the efficacy and efficiency of the message production. This proposal is based on a projection of a general ontology into a more specific one, avoiding storage redundancy and data coupling, representing a big opportunity to enrich communication capabilities of current AAC systems. The evaluation was performed for a study case based on an AAC system for assistance in composing messages. The results show that adding user-specific information allows generation of enriched phrases, so improving the accuracy of the message, facilitating the communication process.

  12. Opportunities and challenges in conducting secondary analysis of HIV programmes using data from routine health information systems and personal health information.

    Science.gov (United States)

    Gloyd, Stephen; Wagenaar, Bradley H; Woelk, Godfrey B; Kalibala, Samuel

    2016-01-01

    HIV programme data from routine health information systems (RHIS) and personal health information (PHI) provide ample opportunities for secondary data analysis. However, these data pose unique opportunities and challenges for use in health system monitoring, along with process and impact evaluations. Analyses focused on retrospective case reviews of four of the HIV-related studies published in this JIAS supplement. We identify specific opportunities and challenges with respect to the secondary analysis of RHIS and PHI data. Challenges working with both HIV-related RHIS and PHI included missing, inconsistent and implausible data; rapidly changing indicators; systematic differences in the utilization of services; and patient linkages over time and different data sources. Specific challenges among RHIS data included numerous registries and indicators, inconsistent data entry, gaps in data transmission, duplicate registry of information, numerator-denominator incompatibility and infrequent use of data for decision-making. Challenges specific to PHI included the time burden for busy providers, the culture of lax charting, overflowing archives for paper charts and infrequent chart review. Many of the challenges that undermine effective use of RHIS and PHI data for analyses are related to the processes and context of collecting the data, excessive data requirements, lack of knowledge of the purpose of data and the limited use of data among those generating the data. Recommendations include simplifying data sources, analysis and reporting; conducting systematic data quality audits; enhancing the use of data for decision-making; promoting routine chart review linked with simple patient tracking systems; and encouraging open access to RHIS and PHI data for increased use.

  13. Understanding views on everyday use of personal health information: Insights from community dwelling older adults.

    Science.gov (United States)

    Hartzler, A L; Osterhage, K; Demiris, G; Phelan, E A; Thielke, S M; Turner, A M

    2018-09-01

    Older adults apply various strategies to pursue healthy aging, but we know little about their views and use of personal health information to accomplish those ends. As a first step in formulating the role of personal health information management (PHIM) in healthy aging, we explored the perspectives of older adults on health and health information used in their everyday lives through four focus groups with 25 community-dwelling adults aged 60 and over. We found that the concept of wellness-the holistic and multidimensional nature of health and wellbeing-plays prominently in how older adults think about health and health information. Participants expressed wellness from a position of personal strength, rather than health-related deficits, by focusing on wellness activities for staying healthy through: (1) personal health practices, (2) social network support, and (3) residential community engagement. Although these themes involve personal health information, existing PHIM systems that focus on disease management are generally not designed to support wellness activities. Substantial opportunity exists to fill this wellness support gap with innovative health information technology designed for older adults. Findings carry implications for the design of PHIM tools that support healthy aging and methods for engaging older adults as co-producers of this critical support.

  14. Implications of the Protection of Personal Information (POPI)

    African Journals Online (AJOL)

    The main purpose of the POPI act is to protect the processing of personal information ... a smartphone, iPad or personal computer), digital storage devices. (iCloud, Dropbox ... (vi) Reasonable security regarding the safeguarding, integrity and.

  15. Cloud Computing Application of Personal Information's Security in Network Sales-channels

    OpenAIRE

    Sun Qiong; Min Liu; Shiming Pang

    2013-01-01

    With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed me...

  16. List of names of persons well informed on new energies; Shin energy yushikisha meibo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    In order to establish an environment in which local public organizations and local business entities intending introduction of new energies can obtain easily the information about the technologies thereof and introduction examples, a 'list of names of persons well informed on new energies' was prepared. At the same time, a system was set up, with which these well-informed people can be introduced on NEDO home pages. The list of the names has collected data of the well-informed people granted with patents related to the fields defined in the new energy law as their specialty fields. The criterion for extracting the persons calls for persons who have experience of writing theses on new energies, and who have give lectures on the subject. Other new energy related experts acting in local areas, who were not able of having been extracted by using the above method, were extracted through hearings by key persons in each area. Questionnaire surveys were performed on the extracted specialists, whereas 495 effective answers permitting disclosure were obtained, and detailed items of information were collected on these specialists individually. The specialty fields include 23 new energy fields. The names of persons were arranged in the order of bureaus listed in the Ministry of International Trade and Industry. The names in the bureaus were arranged in the Japanese alphabetical order. (NEDO)

  17. Cooperative problem solving with personal mobile information tools in hospitals.

    Science.gov (United States)

    Buchauer, A; Werner, R; Haux, R

    1998-01-01

    Health-care professionals have a broad range of needs for information and cooperation while working at different points of care (e.g., outpatient departments, wards, and functional units such as operating theaters). Patient-related data and medical knowledge have to be widely available to support high-quality patient care. Furthermore, due to the increased specialization of health-care professionals, efficient collaboration is required. Personal mobile information tools have a considerable potential to realize almost ubiquitous information and collaborative support. They enable to unite the functionality of conventional tools such as paper forms, dictating machines, and pagers into one tool. Moreover, they can extend the support already provided by clinical workstations. An approach is described for the integration of mobile information tools with heterogeneous hospital information systems. This approach includes identification of functions which should be provided on mobile tools. Major functions are the presentation of medical records and reports, electronic mailing to support interpersonal communication, and the provision of editors for structured clinical documentation. To realize those functions on mobile tools, we propose a document-based client-server architecture that enables mobile information tools to interoperate with existing computer-based application systems. Open application systems and powerful, partially wireless, hospital-wide networks are the prerequisites for the introduction of mobile information tools.

  18. The personalized reminder information and social management system (PRISM) trial: rationale, methods and baseline characteristics.

    Science.gov (United States)

    Czaja, Sara J; Boot, Walter R; Charness, Neil; A Rogers, Wendy; Sharit, Joseph; Fisk, Arthur D; Lee, Chin Chin; Nair, Sankaran N

    2015-01-01

    Technology holds promise in terms of providing support to older adults. To date, there have been limited robust systematic efforts to evaluate the psychosocial benefits of technology for older people and identify factors that influence both the usability and uptake of technology systems. In response to these issues, we developed the Personal Reminder Information and Social Management System (PRISM), a software application designed for older adults to support social connectivity, memory, knowledge about topics, leisure activities and access to resources. This trail is evaluating the impact of access to the PRISM system on outcomes such as social isolation, social support and connectivity. This paper reports on the approach used to design the PRISM system, study design, methodology and baseline data for the trial. The trial is multi-site randomized field trial. PRISM is being compared to a Binder condition where participants received a binder that contained content similar to that found on PRISM. The sample includes 300 older adults, aged 65-98 years, who lived alone and at risk for being isolated. The primary outcome measures for the trial include indices of social isolation and support and well-being. Secondary outcomes measures include indices of computer proficiency, technology uptake and attitudes towards technology. Follow-up assessments occurred at 6 and 12 months post-randomization. The results of this study will yield important information about the potential value of technology for older adults. The study also demonstrates how a user-centered iterative design approach can be incorporated into the design and evaluation of an intervention protocol. Copyright © 2014 Elsevier Inc. All rights reserved.

  19. Personalized professional content recommendation

    Science.gov (United States)

    Xu, Songhua

    2015-10-27

    A personalized content recommendation system includes a client interface configured to automatically monitor a user's information data stream transmitted on the Internet. A hybrid contextual behavioral and collaborative personal interest inference engine resident to a non-transient media generates automatic predictions about the interests of individual users of the system. A database server retains the user's personal interest profile based on a plurality of monitored information. The system also includes a server programmed to filter items in an incoming information stream with the personal interest profile and is further programmed to identify only those items of the incoming information stream that substantially match the personal interest profile.

  20. Alleviating the new user problem in collaborative filtering by exploiting personality information

    OpenAIRE

    Fernández-Tobías, Ignacio; Braunhofer, Matthias; Elahi, Mehdi; Ricci, Francesco; Cantador, Iván

    2016-01-01

    The final publication is available at Springer via http://dx.doi.org/10.1007/s11257-016-9172-z The new user problem in recommender systems is still challenging, and there is not yet a unique solution that can be applied in any domain or situation. In this paper we analyze viable solutions to the new user problem in collaborative filtering (CF) that are based on the exploitation of user personality information: (a) personality-based CF, which directly improves the recommendation prediction ...

  1. Personal information documents for people with dementia: Healthcare staff 's perceptions and experiences.

    Science.gov (United States)

    Baillie, Lesley; Thomas, Nicola

    2018-01-01

    Person-centred care is internationally recognised as best practice for the care of people with dementia. Personal information documents for people with dementia are proposed as a way to support person-centred care in healthcare settings. However, there is little research about how they are used in practice. The aim of this study was to analyse healthcare staff 's perceptions and experiences of using personal information documents, mainly Alzheimer's Society's 'This is me', for people with dementia in healthcare settings. The method comprised a secondary thematic analysis of data from a qualitative study, of how a dementia awareness initiative affected care for people with dementia in one healthcare organisation. The data were collected through 12 focus groups (n = 58 participants) and 1 individual interview, conducted with a range of healthcare staff, both clinical and non-clinical. There are four themes presented: understanding the rationale for personal information documents; completing personal information documents; location for personal information documents and transfer between settings; impact of personal information documents in practice. The findings illuminated how healthcare staff use personal information documents in practice in ways that support person-centred care. Practical issues about the use of personal information documents were revealed and these may affect the optimal use of the documents in practice. The study indicated the need to complete personal information documents at an early stage following diagnosis of dementia, and the importance of embedding their use across care settings, to support communication and integrated care.

  2. Requirements and Solutions for Personalized Health Systems.

    Science.gov (United States)

    Blobel, Bernd; Ruotsalainen, Pekka; Lopez, Diego M; Oemig, Frank

    2017-01-01

    Organizational, methodological and technological paradigm changes enable a precise, personalized, predictive, preventive and participative approach to health and social services supported by multiple actors from different domains at diverse level of knowledge and skills. Interoperability has to advance beyond Information and Communication Technologies (ICT) concerns, including the real world business domains and their processes, but also the individual context of all actors involved. The paper introduces and compares personalized health definitions, summarizes requirements and principles for pHealth systems, and considers intelligent interoperability. It addresses knowledge representation and harmonization, decision intelligence, and usability as crucial issues in pHealth. On this basis, a system-theoretical, ontology-based, policy-driven reference architecture model for open and intelligent pHealth ecosystems and its transformation into an appropriate ICT design and implementation is proposed.

  3. The neural representation of personally familiar and unfamiliar faces in the distributed system for face perception.

    Science.gov (United States)

    Visconti di Oleggio Castello, Matteo; Halchenko, Yaroslav O; Guntupalli, J Swaroop; Gors, Jason D; Gobbini, M Ida

    2017-09-25

    Personally familiar faces are processed more robustly and efficiently than unfamiliar faces. The human face processing system comprises a core system that analyzes the visual appearance of faces and an extended system for the retrieval of person-knowledge and other nonvisual information. We applied multivariate pattern analysis to fMRI data to investigate aspects of familiarity that are shared by all familiar identities and information that distinguishes specific face identities from each other. Both identity-independent familiarity information and face identity could be decoded in an overlapping set of areas in the core and extended systems. Representational similarity analysis revealed a clear distinction between the two systems and a subdivision of the core system into ventral, dorsal and anterior components. This study provides evidence that activity in the extended system carries information about both individual identities and personal familiarity, while clarifying and extending the organization of the core system for face perception.

  4. Information pricing based on trusted system

    Science.gov (United States)

    Liu, Zehua; Zhang, Nan; Han, Hongfeng

    2018-05-01

    Personal information has become a valuable commodity in today's society. So our goal aims to develop a price point and a pricing system to be realistic. First of all, we improve the existing BLP system to prevent cascading incidents, design a 7-layer model. Through the cost of encryption in each layer, we develop PI price points. Besides, we use association rules mining algorithms in data mining algorithms to calculate the importance of information in order to optimize informational hierarchies of different attribute types when located within a multi-level trusted system. Finally, we use normal distribution model to predict encryption level distribution for users in different classes and then calculate information prices through a linear programming model with the help of encryption level distribution above.

  5. Development of personal dose monitoring system using wireless data transmission device

    International Nuclear Information System (INIS)

    Inui, Daisuke; Nakashima, Sadao

    2008-01-01

    Radiation workers working in radiation controlled area in nuclear power plants etc., are required to carry a dosimeters by regulation law. The workers are controlled daily on personal exposure dose by reading out the exposure dose information of the dosimeters with an area access control gate installed at the entrance of the radiation controlled area. This type of personal dose monitoring system has a problem that each worker can get his personal dose data only at the entrance of the radiation controlled area several times a day. We developed a system to get the real-time acquisition of personal dose data especially for workers working in a high dose area. This system is generally composed of a dosimeter with a wireless attachment, relay station, and monitor. Some relay stations set in main work places in the radiation controlled area can collect real-time personal dose data of each dosimeter carried by workers at the work place with the relay stations, and transmit it to the monitor to get personal dose data of individual workers. A wireless communication system between dosimeters and relay stations is applied to collect efficiently all personal dose data in the work place. (author)

  6. The Role of Personality in Musicians' Information Seeking for Creativity

    Science.gov (United States)

    Kostagiolas, Petros; Lavranos, Charilaos; Martzoukou, Konstantina; Papadatos, Joseph

    2017-01-01

    Introduction: This paper explores the relationship between musicians' information seeking behaviour and their personality traits within the context of musical creativity. Although previous research has addressed different socio-technological and behavioral aspects of music information seeking, the role of personality characteristics around…

  7. Five-factor model personality disorder prototypes in a community sample: self- and informant-reports predicting interview-based DSM diagnoses.

    Science.gov (United States)

    Lawton, Erin M; Shields, Andrew J; Oltmanns, Thomas F

    2011-10-01

    The need for an empirically validated, dimensional system of personality disorders is becoming increasingly apparent. While a number of systems have been investigated in this regard, the five-factor model of personality has demonstrated the ability to adequately capture personality pathology. In particular, the personality disorder prototypes developed by Lynam and Widiger (2001) have been tested in a number of samples. The goal of the present study is to extend this literature by validating the prototypes in a large, representative community sample of later middle-aged adults using both self and informant reports. We found that the prototypes largely work well in this age group. Schizoid, Borderline, Histrionic, Narcissistic, and Avoidant personality disorders demonstrate good convergent validity, with a particularly strong pattern of discriminant validity for the latter four. Informant-reported prototypes show similar patterns to self reports for all analyses. This demonstrates that informants are not succumbing to halo representations of the participants, but are rather describing participants in nuanced ways. It is important that informant reports add significant predictive validity for Schizoid, Antisocial, Borderline, Histrionic, and Narcissistic personality disorders. Implications of our results and directions for future research are discussed.

  8. Five-Factor Model personality disorder prototypes in a community sample: Self- and informant-reports predicting interview-based DSM diagnoses

    Science.gov (United States)

    Lawton, Erin M.; Shields, Andrew J.; Oltmanns, Thomas F.

    2011-01-01

    The need for an empirically-validated, dimensional system of personality disorders is becoming increasingly apparent. While a number of systems have been investigated in this regard, the five-factor model of personality has demonstrated the ability to adequately capture personality pathology. In particular, the personality disorder prototypes developed by Lynam and Widiger (2001) have been tested in a number of samples. The goal of the present study is to extend this literature by validating the prototypes in a large, representative community sample of later middle-aged adults using both self and informant reports. We found that the prototypes largely work well in this age group. Schizoid, Borderline, Histrionic, Narcissistic, and Avoidant personality disorders demonstrate good convergent validity, with a particularly strong pattern of discriminant validity for the latter four. Informant-reported prototypes show similar patterns to self reports for all analyses. This demonstrates that informants are not succumbing to halo representations of the participants, but are rather describing participants in nuanced ways. Importantly, informant reports add significant predictive validity for Schizoid, Antisocial, Borderline, Histrionic, and Narcissistic personality disorders. Implications of our results and directions for future research are discussed. PMID:22200006

  9. Data entry system for INIS input using a personal computer

    International Nuclear Information System (INIS)

    Ishikawa, Masashi

    1990-01-01

    Input preparation for the INIS (International Nuclear Information System) has been performed by Japan Atomic Energy Research Institute since 1970. Instead of the input data preparation done by worksheets make out with the typewriters, new method with which data can be directly inputted into a diskette using personal computers is introduced. According to the popularization of personal computers and word processors, this system is easily applied to other system, so the outline and the future development on it are described. A shortcoming of this system is that spell-checking and data entry using authority files are hardly performed because of the limitation of hardware resources, and that data code conversion is needed because applied code systems between personal computer and main frame computer are quite different from each other. On the other hand, improving the timelyness of data entry is expected without duplication of keying. (author)

  10. Strengthening Rehabilitation in Health Systems Worldwide by Integrating Information on Functioning in National Health Information Systems.

    Science.gov (United States)

    Stucki, Gerold; Bickenbach, Jerome; Melvin, John

    2017-09-01

    A complete understanding of the experience of health requires information relevant not merely to the health indicators of mortality and morbidity but also to functioning-that is, information about what it means to live in a health state, "the lived experience of health." Not only is functioning information relevant to healthcare and the overall objectives of person-centered healthcare but to the successful operation of all components of health systems.In light of population aging and major epidemiological trends, the health strategy of rehabilitation, whose aim has always been to optimize functioning and minimize disability, will become a key health strategy. The increasing prominence of the rehabilitative strategy within the health system drives the argument for the integration of functioning information as an essential component in national health information systems.Rehabilitation professionals and researchers have long recognized in WHO's International Classification of Functioning, Disability and Health the best prospect for an internationally recognized, sufficiently complete and powerful information reference for the documentation of functioning information. This paper opens the discussion of the promise of integrating the ICF as an essential component in national health systems to secure access to functioning information for rehabilitation, across health systems and countries.

  11. Protecting Personal Information on Social Networking Sites

    Science.gov (United States)

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  12. Information access tasks and evaluation for personal lifelogs

    OpenAIRE

    Jones, Gareth J.F.; Gurrin, Cathal; Kelly, Liadh; Byrne, Daragh; Chen, Yi

    2008-01-01

    Emerging personal lifelog (PL) collections contain permanent digital records of information associated with individuals’ daily lives. This can include materials such as emails received and sent, web content and other documents with which they have interacted, photographs, videos and music experienced passively or created, logs of phone calls and text messages, and also personal and contextual data such as location (e.g. via GPS sensors), persons and objects present (e.g. via Bluetooth) and ph...

  13. The Research of Spatial-Temporal Analysis and Decision-Making Assistant System for Disabled Person Affairs Based on Mapworld

    Science.gov (United States)

    Zhang, J. H.; Yang, J.; Sun, Y. S.

    2015-06-01

    This system combines the Mapworld platform and informationization of disabled person affairs, uses the basic information of disabled person as center frame. Based on the disabled person population database, the affairs management system and the statistical account system, the data were effectively integrated and the united information resource database was built. Though the data analysis and mining, the system provides powerful data support to the decision making, the affairs managing and the public serving. It finally realizes the rationalization, normalization and scientization of disabled person affairs management. It also makes significant contributions to the great-leap-forward development of the informationization of China Disabled Person's Federation.

  14. Towards Privacy Managment of Information Systems

    OpenAIRE

    Drageide, Vidar

    2009-01-01

    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.

  15. The Development of Pyro Human Resource Information System

    International Nuclear Information System (INIS)

    Jung, M. S.; Kim, S. K.; Ko, W. I.

    2012-01-01

    This paper aims to provide the current status of the development of a human resource information system. Establishing an expert information system helps readily provide the personal information of international and local pyroprocess experts who are currently conducting research at institutes. The information system offers a data processing environment in which users can easily access the necessary information online for a prompt search. Setting up this online networking enables us to easily obtain the personal information of pyro-experts, if necessary, and to provide the basic materials to seek an efficient system of technical cooperation. As pyro-technology presently falls under a high-tech field in the area of back-end fuel cycle, the research is under way at some advanced nuclear nations such as the United States, Korea, and Japan: therefore, the cooperation of experts from home and abroad is critical, helping gain maximum achievements through minimum investments and personnel. Since many efforts should be preceded to secure original technology in the field of fair technology and pyrosystem engineering, we can attain the research goal efficiently if other advanced nuclear nations have already obtained advanced technology, by efficiently realizing the goal through the benchmarking of the necessary technology. To form a cooperative system for such experts, we should know, above all, what research experts are conducting in certain fields at certain laboratories of certain countries

  16. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Science.gov (United States)

    2010-07-01

    ... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to... 32 National Defense 6 2010-07-01 2010-07-01 false Sending personal information over electronic mail. 806b.29 Section 806b.29 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR...

  17. Reference architecture of application services for personal wellbeing information management.

    Science.gov (United States)

    Tuomainen, Mika; Mykkänen, Juha

    2011-01-01

    Personal information management has been proposed as an important enabler for individual empowerment concerning citizens' wellbeing and health information. In the MyWellbeing project in Finland, a strictly citizen-driven concept of "Coper" and related architectural and functional guidelines have been specified. We present a reference architecture and a set of identified application services to support personal wellbeing information management. In addition, the related standards and developments are discussed.

  18. Building the national health information infrastructure for personal health, health care services, public health, and research

    Directory of Open Access Journals (Sweden)

    Detmer Don E

    2003-01-01

    Full Text Available Abstract Background Improving health in our nation requires strengthening four major domains of the health care system: personal health management, health care delivery, public health, and health-related research. Many avoidable shortcomings in the health sector that result in poor quality are due to inaccessible data, information, and knowledge. A national health information infrastructure (NHII offers the connectivity and knowledge management essential to correct these shortcomings. Better health and a better health system are within our reach. Discussion A national health information infrastructure for the United States should address the needs of personal health management, health care delivery, public health, and research. It should also address relevant global dimensions (e.g., standards for sharing data and knowledge across national boundaries. The public and private sectors will need to collaborate to build a robust national health information infrastructure, essentially a 'paperless' health care system, for the United States. The federal government should assume leadership for assuring a national health information infrastructure as recommended by the National Committee on Vital and Health Statistics and the President's Information Technology Advisory Committee. Progress is needed in the areas of funding, incentives, standards, and continued refinement of a privacy (i.e., confidentiality and security framework to facilitate personal identification for health purposes. Particular attention should be paid to NHII leadership and change management challenges. Summary A national health information infrastructure is a necessary step for improved health in the U.S. It will require a concerted, collaborative effort by both public and private sectors. If you cannot measure it, you cannot improve it. Lord Kelvin

  19. Human factors information system

    International Nuclear Information System (INIS)

    Goodman, P.C.; DiPalo, C.A.

    1991-01-01

    Nuclear power plant safety is dependent upon human performance related to plant operations. To provide improvements in human performance, data collection and assessment play key roles. This paper reports on the Human factors Information System (HFIS) which is designed to meet the needs of the human factors specialists of the United States Nuclear Regulatory Commission. These specialists identify personnel errors and provide guidance designed to prevent such errors. HFIS is a simple and modular system designed for use on a personal computer. It is designed to contain four separate modules that provide information indicative of program or function effectiveness as well as safety-related human performance based on programmatic and performance data. These modules include the Human Factors Status module; the Regulatory Programs module; the Licensee Event Report module; and the Operator Requalification Performance module. Information form these modules can either be used separately or can be combined due to the integrated nature of the system. HFIS has the capability, therefore, to provide insights into those areas of human factors that can reduce the probability of events caused by personnel error at nuclear power plants and promote the health and safety of the public. This information system concept can be applied to other industries as well as the nuclear industry

  20. The Iridium (tm) system: Personal communications anytime, anyplace

    Science.gov (United States)

    Hatlelid, John E.; Casey, Larry

    1993-01-01

    The Iridium system is designed to provide handheld personal communications between diverse locations around the world at any time and without prior knowledge of the location of the personal units. This paper provides an overview of the system, the services it provides, its operation, and an overview of the commercial practices and relatively high volume satellite production techniques which will make the system cost effective. A constellation of 66 satellites will provide an orbiting, spherical-shell, infrastructure for this global calling capability. The satellites act as tall cellular towers and allow convenient operation for portable handheld telephones. The system will provide a full range of services including voice, paging, data, geolocation, and fax capabilities. Motorola is a world leader in the production of high volume, high quality, reliable telecommunications hardware. One of Iridium's goals is to apply these production techniques to high reliability space hardware. Concurrent engineering, high performance work teams, advanced manufacturing technologies, and improved assembly and test methods are some of the techniques that will keep the Iridium system cost effective. Mobile, global, flexible personal communications are coming that will allow anyone to call or receive a call from/to anyplace at anytime. The Iridium system will provide communications where none exist today. This connectivity will allow increased information transfer, open new markets for various business endeavors, and in general increase productivity and development.

  1. Information service system in the power plant

    International Nuclear Information System (INIS)

    Maruyama, Yukio; Mizuno, Hiromi; Shoda, Kohei; Sekine, Yasuhiro.

    1994-01-01

    For the purpose of improving the intelligent productivity in offices, the introduction of PC-LAN system by the initiative of users has been advanced. In this example, by connecting many personal computers, the information service system that possesses the information on the business of power stations in common was constructed, and intelligent productivity was improved. This information service system is that in which all users are the sponsor as the users and the offerer of information are united, therefore, high conscience level is required for individual users, and the attentive device for the easiness of use was exercised so as to always maintain newest information. The background of introducing this system is explained. The information systems in power stations are the system related to operation control, preventive maintenance and so on and the system for helping the routine works of personnel. The main functions are the offer of the operational data of power stations, the offer of the information on the expected visitors to the PR hall of nuclear power stations, electronic information exchange and so on. The constitution and the features of the system are reported. (K.I.)

  2. The use of stereotypes and individuating information in political person perception.

    Science.gov (United States)

    Crawford, Jarret T; Jussim, Lee; Madon, Stephanie; Cain, Thomas R; Stevens, Sean T

    2011-04-01

    This article introduces the political person perception model, which identifies conditions under which perceivers rely on stereotypes (party membership), individuating information (issue position), or both in political person perception. Three studies supported the model's predictions. Study 1 showed that perceivers gave primacy to target information that was narrowly relevant to a judgment, whether that information was stereotypic or individuating. Study 2 found that perceivers relied exclusively on individuating information when it was narrowly relevant to the judgment and relied on both stereotype and individuating information when individuating information was not narrowly relevant to the judgment but did imply a political ideology. Study 3 replicated these findings in a more ecologically valid context and showed that people relied on party information in the absence of narrowly relevant policy positions and when individuating information did not imply a political ideology. Implications for political person perception and theories of stereotyping are discussed.

  3. Systems of Selves: the Construction of Meaning in Multiple Personality Disorder

    Science.gov (United States)

    Hughes, Dureen Jean

    Current models for understanding both Multiple Personality Disorder and human mentation in general are both linear in nature and self-perpetuating insofar as most research in this area has been informed and shaped by extant psychological concepts, paradigms and methods. The research for this dissertation made use of anthropological concepts and methods in an attempt to gain a richer understanding of both multiple personality and fundamental universal processes of the mind. Intensive fieldwork using in-depth, open-ended interviewing techniques was conducted with people diagnosed with Multiple Personality Disorder with the purpose of mapping their personality systems in order to discover the nature of the relationships between the various alternate personalities and subsystems comprising the overall personality systems. These data were then analyzed in terms of dynamical systems theory ("Chaos Theory") as a way of understanding various phenomena of multiple personality disorder as well as the overall structure of each system. It was found that the application of the formal characteristics of nonlinear models and equations to multiple personality systems provided a number of new perspectives on mental phenomena. The underlying organizational structure of multiple personality systems can be understood as a phenomenon of spontaneous self-organization in far-from -equilibrium states which characterizes dissipative structures. Chaos Theory allows the perspective that the nature of the process of the self and the nature of relationship are one and the same, and that both can be conceived as ideas in struggle at a fractal boundary. Further, such application makes it possible to postulate an iterative process which would have as one of its consequences the formation of a processural self who is conscious of self as separate self. Finally, given that the iterative application of a few simple rules (or instructions) can result in complex systems, an attempt was made to discern

  4. Nest prospecting brown-headed cowbirds 'parasitize' social information when the value of personal information is lacking.

    Science.gov (United States)

    White, David J; Davies, Hayden B; Agyapong, Samuel; Seegmiller, Nora

    2017-08-30

    Brood parasites face considerable cognitive challenges in locating and selecting host nests for their young. Here, we test whether female brown-headed cowbirds, Molothrus ater , could use information acquired from observing the nest prospecting patterns of conspecifics to influence their own patterns of nest selection. In laboratory-based experiments, we created a disparity in the amount of personal information females had about the quality of nests. Females with less personal information about the quality of two nests spent more time investigating the nest that more knowledgeable females investigated. Furthermore, there was a strong negative relationship between individual's ability to track nest quality using personal information and their tendency to copy others. These two contrasting strategies for selecting nests are equally effective, but lead to different patterns of parasitism. © 2017 The Author(s).

  5. Increasing Personal Value Congruence in Computerized Decision Support Using System Feedback

    Directory of Open Access Journals (Sweden)

    Bryan Hosack

    2014-02-01

    Full Text Available The Theory of Universals in Values (TUV, a reliable and validated conceptualization of personal values used in psychology, is used to examine the effect of system feedback delivered by a Decision Support System (DSS on personal values. The results indicate that value-based decision-making behavior can be influenced by DSS feedback to address value congruence in decision-making. User behavior was shown to follow the outcomes expected by operant theory when feedback was supportive and to follow the outcomes of reactance theory when feedback was challenging. This result suggests that practitioners and Information System (IS researchers should consider user values when designing computerized decision feedback to adjust a system’s design such that the potential user backlash is avoided or congruence between organizational and personal values is achieved.

  6. Indivo: a personally controlled health record for health information exchange and communication

    Directory of Open Access Journals (Sweden)

    Crawford William CR

    2007-09-01

    Full Text Available Abstract Background Personally controlled health records (PCHRs, a subset of personal health records (PHRs, enable a patient to assemble, maintain and manage a secure copy of his or her medical data. Indivo (formerly PING is an open source, open standards PCHR with an open application programming interface (API. Results We describe how the PCHR platform can provide standard building blocks for networked PHR applications. Indivo allows the ready integration of diverse sources of medical data under a patient's control through the use of standards-based communication protocols and APIs for connecting PCHRs to existing and future health information systems. Conclusion The strict and transparent personal control model is designed to encourage widespread participation by patients, healthcare providers and institutions, thus creating the ecosystem for development of innovative, consumer-focused healthcare applications.

  7. A comprehensive theoretical framework for personal information-related behaviors on the internet

    NARCIS (Netherlands)

    Beldad, Ardion Daroca; de Jong, Menno D.T.; Steehouder, M.F.

    2011-01-01

    Although there is near consensus on the need for privacy, the reality is that people's attitude toward their personal information privacy is complex. For instance, even when people claim that they value their information privacy, they often trade their personal information for tangible or intangible

  8. Method of Improving Personal Name Search in Academic Information Service

    Directory of Open Access Journals (Sweden)

    Heejun Han

    2012-12-01

    Full Text Available All academic information on the web or elsewhere has its creator, that is, a subject who has created the information. The subject can be an individual, a group, or an institution, and can be a nation depending on the nature of the relevant information. Most information is composed of a title, an author, and contents. An essay which is under the academic information category has metadata including a title, an author, keyword, abstract, data about publication, place of publication, ISSN, and the like. A patent has metadata including the title, an applicant, an inventor, an attorney, IPC, number of application, and claims of the invention. Most web-based academic information services enable users to search the information by processing the meta-information. An important element is to search information by using the author field which corresponds to a personal name. This study suggests a method of efficient indexing and using the adjacent operation result ranking algorithm to which phrase search-based boosting elements are applied, and thus improving the accuracy of the search results of personal names. It also describes a method for providing the results of searching co-authors and related researchers in searching personal names. This method can be effectively applied to providing accurate and additional search results in the academic information services.

  9. 32 CFR 310.13 - Safeguarding personal information.

    Science.gov (United States)

    2010-07-01

    .... (a) General responsibilities. DoD Components shall establish appropriate administrative, technical..., the sensitivity of the personal information stored, the storage medium used and, to a degree, the... automated environment (see appendix A). (5) Tailor safeguards specifically to the vulnerabilities of the...

  10. Protection of personal information in South Africa: a framework for biometric data collection security

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-11-01

    Full Text Available personal information. Like many other countries, South Africa, in 2013 officially approved and enacted the Protection of Personal Information Act, which gives guidelines that should be followed when processing personal information. The Act regards biometric...

  11. A PRIVACY MANAGEMENT ARCHITECTURE FOR PATIENT-CONTROLLED PERSONAL HEALTH RECORD SYSTEM

    Directory of Open Access Journals (Sweden)

    MD. NURUL HUDA

    2009-06-01

    Full Text Available Patient-controlled personal health record systems can help make health care safer, cheaper, and more convenient by facilitating patients to 1 grant any care provider access to their complete personal health records anytime from anywhere, 2 avoid repeated tests and 3 control their privacy transparently. In this paper, we present the architecture of our Privacy-aware Patient-controlled Personal Health Record (P3HR system through which a patient can view her integrated health history, and share her health information transparently with others (e.g., healthcare providers. Access to the health information of a particular patient is completely controlled by that patient. We also carry out intuitive security and privacy analysis of the P3HR system architecture considering different types of security attacks. Finally, we describe a prototype implementation of the P3HR system that we developed reflecting the special view of Japanese society. The most important advantage of P3HR system over other existing systems is that most likely P3HR system provides complete privacy protection without losing data accuracy. Unlike traditional partially anonymous health records (e.g., using k-anonymity or l-diversity, the health records in P3HR are closer to complete anonymity, and yet preserve data accuracy. Our approach makes it very unlikely that patients could be identified by an attacker from their anonymous health records in the P3HR system.

  12. Personality and information gathering in free-ranging great tits.

    Directory of Open Access Journals (Sweden)

    Thijs van Overveld

    Full Text Available One aspect of animal personality that has been well described in captivity, but received only little attention in studies in the wild, is that personality types may vary in their behavioural flexibility towards environmental changes. A fundamental factor underlying such differences is believed to be the degree to which individual behavior is guided by environmental stimuli. We tested this hypothesis in the wild using free-ranging great tits. Personality variation was quantified using exploratory behaviour in a novel environment, which has previously been shown to be repeatable and correlated with other behaviours in this and other populations of the same species. By temporarily removing food at feeding stations we examined whether birds with different personality differed in returning to visit empty feeders as this may provide information on how birds continue to sample their environment after a sudden change in conditions. In two summer experiments, we found that fast-exploring juveniles visited empty feeders less often compared to slow-exploring juveniles. In winter, sampling behaviour was sex dependent but not related to personality. In both seasons, we found that birds who sampled empty feeders more often were more likely to rediscover food after we again re-baited the feeding stations, but there was no effect of personality. Our results show that personality types may indeed differ in ways of collecting environmental information, which is consistent with the view of personalities as different styles of coping with environmental changes. The adaptive value of these alternative behavioural tactics, however, needs to be further explored.

  13. Cognitive, personality, and social factors associated with adolescents' online personal information disclosure.

    Science.gov (United States)

    Liu, Cong; Ang, Rebecca P; Lwin, May O

    2013-08-01

    The current study aims to understand the factors that influence adolescents' disclosure of personally identifiable information (PII) on social networking sites (SNSs). A survey was conducted among 780 adolescent participants (between 13 and 18) who were Facebook users. Structural equation modeling was used for analyzing the data and obtaining an overarching model that include cognitive, personality, and social factors that influence adolescents' PII disclosure. Results showed privacy concern as the cognitive factor reduces adolescents' PII disclosure and it serves as a potential mediator for personality and social factors. Amongst personality factors, narcissism was found to directly increase PII disclosure, and social anxiety indirectly decreases PII disclosure by increasing privacy concern. Amongst social factors, active parental mediation decreases PII disclosure directly and indirectly by increasing privacy concern. Restrictive parental mediation decreases PII disclosure only indirectly by increasing privacy concern. Implications of the findings to parents, educators, and policy makers were discussed. Copyright © 2013 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  14. Personal health records: Consumer attitudes toward privacy and security of their personal health information.

    Science.gov (United States)

    Lafky, Deborah Beranek; Horan, Thomas A

    2011-03-01

    Personal health record (PHR) systems are a subject of intense interest in the move to improve healthcare accessibility and quality. Although a number of vendors continue to put forward PHR systems, user-centered design research has lagged, and it has not been clear what features are important to prospective PHR users. Here, we report on a user-centered design study that combines qualitative and quantitative approaches to investigate several dimensions relevant to PHR design, and to look at the effect of health status on user needs. The results indicate that health status, especially disability and chronic illness, is relevant to PHR design. Further, the results provide empirical evidence about the role of privacy and security in users' attitudes toward PHR use. The exact nature of these attitudes differs from widely held perceptions about consumer values in healthcare information management. © The Author(s) 2011.

  15. Health information: reconciling personal privacy with the public good of human health.

    Science.gov (United States)

    Gostin, L O

    2001-01-01

    The success of the health care system depends on the accuracy, correctness and trustworthiness of the information, and the privacy rights of individuals to control the disclosure of personal information. A national policy on health informational privacy should be guided by ethical principles that respect individual autonomy while recognizing the important collective interests in the use of health information. At present there are no adequate laws or constitutional principles to help guide a rational privacy policy. The laws are scattered and fragmented across the states. Constitutional law is highly general, without important specific safeguards. Finally, a case study is provided showing the important trade-offs that exist between public health and privacy. For a model public health law, see www.critpath.org/msphpa/privacy.

  16. Data liquidity in health information systems.

    Science.gov (United States)

    Courtney, Paul K

    2011-01-01

    In 2001, the Institute of Medicine report Crossing the Quality Chasm and the National Committee on Vital and Health Statistics report Information for Health were released, and they provided the context for the development of information systems used to support health-supporting processes. Both had as their goals, implicit or explicit, to ensure the right data are provided to the right person at the right time, which is one definition of "data liquidity." This concept has had some traction in recent years as a shorthand way to express a system property for health information technology, but there is not a well-defined characterization of what properties of a system or of its components give it better or worse data liquidity. This article looks at some recent work that help to identify those properties and perhaps can help to ground the concept with metrics that are assessable.

  17. Personalized Information Environments: Do Public Libraries Want a Slice of the PIE?

    Science.gov (United States)

    Worcester, Lea

    2003-01-01

    Discussion of personalized information environments (PIEs) focuses on library personalized interfaces. Describes academic library PIEs and commercial sites, such as Amazon.com that use personalization; explores the Public Library of Charlotte and Mecklenburg's personalized interface; and discusses opportunities and challenges PIEs offer public…

  18. Information system design and its implementation at the SNSA

    International Nuclear Information System (INIS)

    Rasula, J.; Stritar, A.; Osojnik, I.; Pungercar, D.

    2005-01-01

    In 2003, the Slovenian Nuclear Safety Administration (SNSA) decided to launch a Preliminary Investigation and Requirements Analysis study for a new information system (IS). A decision was made to start developing the information system from scratch, without fully realising its future potential. Finally, in 2004, the information system portal named InfoURSJV was fully developed. The development of the system began by setting up two registers, based on legislation. The Ionising Radiation Protection and Nuclear Safety Act defines registers containing information on radiation sources and radiation practices. In accordance with this Act, the register of radiation practices and the register of radiation sources shall be maintained as public registers by the ministry competent for the environment. Both registers were developed as modules in InfoURSJV at the end of 2004 and are used on a daily basis. The main objective of the register of radiation practices was to create a powerful tool that allows users to view, filter, search, sort, browse and analyse all persons who carry out a radiation practice. Gradually, we have set new objectives for the information system. One of our main objectives is to use the data and information with the intention to become a customerfriendly administration, where the importance of suitable information support must be emphasised. We have set up registers to determine which persons are carrying out radiation practices without a valid licence and which licences will soon expire. Now, we are able to remind our customers that they should apply for a new permit before it runs out. The objective of this paper is to demonstrate how our information system could be used on our way to becoming a customer-friendly administration. Furthermore, it should be emphasised that we are developing a quality management system that is evolving into a tool for every sector and department at the SNSA, from licensing to inspection. (author)

  19. MIMS - MEDICAL INFORMATION MANAGEMENT SYSTEM

    Science.gov (United States)

    Frankowski, J. W.

    1994-01-01

    MIMS, Medical Information Management System is an interactive, general purpose information storage and retrieval system. It was first designed to be used in medical data management, and can be used to handle all aspects of data related to patient care. Other areas of application for MIMS include: managing occupational safety data in the public and private sectors; handling judicial information where speed and accuracy are high priorities; systemizing purchasing and procurement systems; and analyzing organizational cost structures. Because of its free format design, MIMS can offer immediate assistance where manipulation of large data bases is required. File structures, data categories, field lengths and formats, including alphabetic and/or numeric, are all user defined. The user can quickly and efficiently extract, display, and analyze the data. Three means of extracting data are provided: certain short items of information, such as social security numbers, can be used to uniquely identify each record for quick access; records can be selected which match conditions defined by the user; and specific categories of data can be selected. Data may be displayed and analyzed in several ways which include: generating tabular information assembled from comparison of all the records on the system; generating statistical information on numeric data such as means, standard deviations and standard errors; and displaying formatted listings of output data. The MIMS program is written in Microsoft FORTRAN-77. It was designed to operate on IBM Personal Computers and compatibles running under PC or MS DOS 2.00 or higher. MIMS was developed in 1987.

  20. Introduction to the Personal Access Satellite System Study

    Science.gov (United States)

    Sue, Miles K.

    1990-01-01

    A recent study by the National Telecommunications and Information Administration (NTIA) has concluded that the 21st century will be the age of information in which the telecommunication infrastructure will be vital to the social and economic well being of society. To meet the challenge of the coming age, JPL has been performing studies on a personal access satellite system (PASS) for the 21st century. The PASS study can be traced back to a study in which the technical feasibility and potential applications of a high frequency, low data rate satellite system were identified using small fixed terminals. Herein, the PASS concept is described along with the strawman design. Then the key challenges are identified along with possible solutions. Finally, the plan for the future is summarized from the key results.

  1. The use of self-quantification systems for personal health information: big data management activities and prospects.

    Science.gov (United States)

    Almalki, Manal; Gray, Kathleen; Sanchez, Fernando Martin

    2015-01-01

    Self-quantification is seen as an emerging paradigm for health care self-management. Self-quantification systems (SQS) can be used for tracking, monitoring, and quantifying health aspects including mental, emotional, physical, and social aspects in order to gain self-knowledge. However, there has been a lack of a systematic approach for conceptualising and mapping the essential activities that are undertaken by individuals who are using SQS in order to improve health outcomes. In this paper, we propose a new model of personal health information self-quantification systems (PHI-SQS). PHI-SQS model describes two types of activities that individuals go through during their journey of health self-managed practice, which are 'self-quantification' and 'self-activation'. In this paper, we aimed to examine thoroughly the first type of activity in PHI-SQS which is 'self-quantification'. Our objectives were to review the data management processes currently supported in a representative set of self-quantification tools and ancillary applications, and provide a systematic approach for conceptualising and mapping these processes with the individuals' activities. We reviewed and compared eleven self-quantification tools and applications (Zeo Sleep Manager, Fitbit, Actipressure, MoodPanda, iBGStar, Sensaris Senspod, 23andMe, uBiome, Digifit, BodyTrack, and Wikilife), that collect three key health data types (Environmental exposure, Physiological patterns, Genetic traits). We investigated the interaction taking place at different data flow stages between the individual user and the self-quantification technology used. We found that these eleven self-quantification tools and applications represent two major tool types (primary and secondary self-quantification systems). In each type, the individuals experience different processes and activities which are substantially influenced by the technologies' data management capabilities. Self-quantification in personal health maintenance

  2. Regulatory authority information system RAIS

    International Nuclear Information System (INIS)

    Ortiz, P.; Mrabit, K.; Miaw, S.

    2000-01-01

    In this lecture the principles of the regulatory authority information system (RAIS) are presented. RAIS is a tool currently being developed by the IAEA for the Regulatory Authorities. It is a part of a set of supporting actions designed to assist member states in achieving the objectives of the Model project on radiation and waste safety infrastructure. RAIS is a tool that provides the management of the Regulatory Authority with the key information needed for the planning and implementation of activities and to ensure confidence that resources are optimally used. The RAIS contains five modules: Inventory of installations and radiation sources; Authorization process; Inspection and follow-up actions; Information on personal dosimetry; Assessment of effectiveness by means of performance indicators

  3. Design and implementation of a smart card based healthcare information system.

    Science.gov (United States)

    Kardas, Geylani; Tunali, E Turhan

    2006-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.

  4. Determinants of Internet use as a preferred source of information on personal health.

    Science.gov (United States)

    Lemire, Marc; Paré, Guy; Sicotte, Claude; Harvey, Charmian

    2008-11-01

    To understand the personal, social and cultural factors likely to explain recourse to the Internet as a preferred source of personal health information. A cross-sectional survey was conducted among a population of 2923 Internet users visiting a firmly established website that offers information on personal health. Multiple regression analysis was performed to identify the determinants of site use. The analysis template comprised four classes of determinants likely to explain Internet use: beliefs, intentions, user satisfaction and socio-demographic characteristics. Seven-point Likert scales were used. An analysis of the psychometric qualities of the variables provided compelling evidence of the construct's validity and reliability. A confirmatory factor analysis confirmed the correspondence with the factors predicted by the theoretical model. The regression analysis explained 35% of the variance in Internet use. Use was directly associated with five factors: perceived usefulness, importance given to written media in searches for health information, concern for personal health, importance given to the opinions of physicians and other health professionals, and the trust placed in the information available on the site itself. This study confirms the importance of the credibility of information on the frequency of Internet use as a preferred source of information on personal health. It also shows the potentially influential role of the Internet in the development of personal knowledge of health issues.

  5. Personalised Information Gathering and Recommender Systems: Techniques and Trends

    Directory of Open Access Journals (Sweden)

    Xiaohui Tao

    2013-02-01

    Full Text Available With the explosive growth of resources available through the Internet, information mismatching and overload have become a severe concern to users.Web users are commonly overwhelmed by huge volume of information and are faced with the challenge of finding the most relevant and reliable information in a timely manner. Personalised information gathering and recommender systems represent state-of-the-art tools for efficient selection of the most relevant and reliable information resources, and the interest in such systems has increased dramatically over the last few years. However, web personalization has not yet been well-exploited; difficulties arise while selecting resources through recommender systems from a technological and social perspective. Aiming to promote high quality research in order to overcome these challenges, this paper provides a comprehensive survey on the recent work and achievements in the areas of personalised web information gathering and recommender systems. The report covers concept-based techniques exploited in personalised information gathering and recommender systems.

  6. INFORMATION SYSTEM FOR DEPARTMENT OF RECONSTRUCTIVE NEUROSURGERY

    Directory of Open Access Journals (Sweden)

    V. I. Tsymbaliuk

    2015-05-01

    Full Text Available This article is about creating information system for the rehabilitation Department of Neurosurgery. To develop the information system needs to explore the work of department, examine the medical documentation and statistical reporting forms which doctors using in their work. Determine the sequence of making records into documentation. And finally make list of requirements for application with help of medical staff. The software was developed by using C# language and the database server MySQL. It has five major systems and several ancillary subsystems. The major systems are: saving personal and clinical patient information, editing inputted data, showing data, ensuring the integrity and accuracy of database, the implementation of access to the same database from different computers. Auxiliary subsystems include: creating medical documentation, blocking form’s elements, searching for patient through database, making statistic over some period of time, creating folders for every patient and others. There was designed user interface that allows doctors to reduce time for learning functionality of application. Information system has positive effect. It saves time for medical staff and reduces the possibility of inputting wrong information. Application does not require high hardware characteristics of computer.

  7. Person Recognition in Personal Photo Collections

    OpenAIRE

    Oh, Seong Joon; Benenson, Rodrigo; Fritz, Mario; Schiele, Bernt

    2015-01-01

    Recognising persons in everyday photos presents major challenges (occluded faces, different clothing, locations, etc.) for machine vision. We propose a convnet based person recognition system on which we provide an in-depth analysis of informativeness of different body cues, impact of training data, and the common failure modes of the system. In addition, we discuss the limitations of existing benchmarks and propose more challenging ones. Our method is simple and is built on open source and o...

  8. Five on one side: personal and social information in spatial choice.

    Science.gov (United States)

    Brown, Michael F; Saxon, Marie E; Bisbing, Teagan; Evans, Jessica; Ruff, Jennifer; Stokesbury, Andrew

    2015-03-01

    To examine whether the outcome of a rat's own choices ("personal information") and the choice behavior of another rat ("social information") can jointly control spatial choices, rats were tested in an open field task in which they searched for food. For the rats of primary interest (Subject Rats), the baited locations were all on one side of the arena, but the specific locations baited and the side on which they occurred varied over trials. The Subject Rats were sometimes tested together with an informed "Model" rat that had learned to find food in the same five locations (all on the same side of the arena) on every trial. Unintended perceptual cues apparently controlled spatial choices at first, but when perceptual cues to food location were not available, choices were controlled by both personal information (allowing the baited side of the arena to be determined) and social information (allowing baited locations to be determined more precisely). This shows that control by personal and social information are not mutually exclusive and supports the view that these two kinds of information can be used flexibly and adaptively to guide spatial choices. This article is part of a Special Issue entitled: tribute to Tom Zentall. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. A System Model for Personalized Medication Management (MyMediMan—The Consumers’ Point of View

    Directory of Open Access Journals (Sweden)

    Elena Vlahu-Gjorgievska

    2018-03-01

    Full Text Available In this paper, we propose a design for a personalized medication management system model MyMediMan that provides medication information for different stakeholders. The focus of the paper is on the system’s features and personalized information provided for the consumers as primary users of the proposed solution. The presented design introduces the consumers to different aspects of the medications they take and their overall health condition. The personalized information should increase the consumers’ awareness about the positive benefits of taking the medications as well as the consequences that particular medication can have on their health condition. By obtaining this information, the consumers will be aware of various medications’ characteristics and different ways to improve their health, and thus be more actively involved in their healthcare.

  10. Information fusion in personal biometric authentication based on the iris pattern

    International Nuclear Information System (INIS)

    Wang, Fenghua; Han, Jiuqiang

    2009-01-01

    Information fusion in biometrics has received considerable attention. This paper focuses on the application of information fusion techniques in iris recognition. To improve the reliability and accuracy of personal identification based on the iris pattern, this paper proposes the schemes of multialgorithmic fusion and multiinstance fusion. Multialgorithmic fusion integrates the improved phase algorithm and the DCT-based algorithm, and multiinstance fusion combines information from the left iris and the right iris of an individual. Both multialgorithmic fusion and multiinstance fusion are carried out at the matching score level and the support vector machine (SVM)-based fusion rule is utilized to generate fused scores for final decision. The experimental results on the noisy iris database UBIRIS demonstrate that the proposed fusion schemes can perform better than the single recognition systems, and further prove that information fusion techniques are feasible and effective to improve the accuracy and robustness of iris recognition especially under noisy conditions

  11. The Use of DLP-systems for the Protection of Personal Data

    Directory of Open Access Journals (Sweden)

    I. S. Boridko

    2012-12-01

    Full Text Available The issues of the principal possibility of the application of DLP-systems (Data Leak Prevention System for the protection of personal data are considered. Approaches of Russian company SecurIT for the prevention of leakage of information through the connected devices and network channels (Zlock system and Zgate system are analyzed. Advantages of Zgate system are revealed, which allows to increase the efficiency of detection of confidential data with the average 60—70 % for existing DLP-systems up to 95 % of the Zgate.

  12. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  13. Analysis of College Students' Personal Health Information Activities: Online Survey.

    Science.gov (United States)

    Kim, Sujin; Sinn, Donghee; Syn, Sue Yeon

    2018-04-20

    With abundant personal health information at hand, individuals are faced with a critical challenge in evaluating the informational value of health care records to keep useful information and discard that which is determined useless. Young, healthy college students who were previously dependents of adult parents or caregivers are less likely to be concerned with disease management. Personal health information management (PHIM) is a special case of personal information management (PIM) that is associated with multiple interactions among varying stakeholders and systems. However, there has been limited evidence to understand informational or behavioral underpinning of the college students' PHIM activities, which can influence their health in general throughout their lifetime. This study aimed to investigate demographic and academic profiles of college students with relevance to PHIM activities. Next, we sought to construct major PHIM-related activity components and perceptions among college students. Finally, we sought to discover major factors predicting core PHIM activities among college students we sampled. A Web survey was administered to collect responses about PHIM behaviors and perceptions among college students from the University of Kentucky from January through March 2017. A total of 1408 college students were included in the analysis. PHIM perceptions, demographics, and academic variations were used as independent variables to predict diverse PHIM activities using a principal component analysis (PCA) and hierarchical regression analyses (SPSS v.24, IBM Corp, Armonk, NY, USA). Majority of the participants were female (956/1408, 67.90%), and the age distribution of this population included an adequate representation of college students of all ages. The most preferred health information resources were family (612/1408, 43.47%), health care professionals (366/1408, 26.00%), friends (27/1408, 1.91%), and the internet (157/1408, 11.15%). Organizational or

  14. True-personality-assisted self-awareness expert system

    International Nuclear Information System (INIS)

    Laleuf, M.

    1988-01-01

    Based on psychoanalytic theory, the Who am I? expert system explains in simple terms the individual's true personality, even it its unconscious or hidden aspects. Our overt personality traits are deeply rooted. The Who am I? expert system gives access to an individual's primary personality, starting from his habitual everyday-life behavior: (1) describes the individual's basic personality, (2) explains this personality through the individual's deeply rooted experience and motivation, and (3) makes links with other people with a similar profile. The following are the primary features of the system: easy individual access, results in <20 minutes, and guaranteed confidentiality. Business applications include the following: (1) Individual training: Self-awareness improves a person's ability to fit in and to succeed within the group. (2) Communication: a homogeneous team has a better chance of success. (3) Human reliability: A close-knit team remains reliable even when faced with serious difficulties. (4) Recruitment: This technique enables the selection of individuals who will fit an existing homogeneous team. The system also enables a psychological diagnosis to be confirmed

  15. Family history assessment of personality disorders: I. Concordance with direct interview and between pairs of informants.

    Science.gov (United States)

    Ferro, T; Klein, D N

    1997-01-01

    The present study examined the concordance of the Family History Interview for Personality Disorders (FHIPD) with diagnoses based on direct interviews and between pairs of informants. Subjects were 224 probands participating in a series of studies of the familial transmission of mood and personality disorders and their first-degree relatives. Proband informants and relatives provided information about themselves on the Structured Clinical Interview for DSM-III-R (SCID), Personality Disorder Examination (PDE), and Eysenck Personality Questionnaire (EPQ). Information from informants about relatives was collected with the FHIPD. All assessments were made blindly and independently. Using Kappa, concordance between proband informants' family histories and relative direct reports on specific personality disorders was low, ranging from -.01 to .28, with a median of .10. Kappa for a diagnosis of any personality disorder was .16. When two independent informant reports were compared, Kappas for specific Axis II disorders ranged from .10 to .72, with a median of .28. Kappa for a diagnosis of any personality disorder was .36. These data suggest that subjects and informants provide different perspectives on Axis II psychopathology, and support the use of both sources of information whenever possible.

  16. The search for person-related information in general practice: a qualitative study.

    Science.gov (United States)

    Schrans, Diego; Avonts, Dirk; Christiaens, Thierry; Willems, Sara; de Smet, Kaat; van Boven, Kees; Boeckxstaens, Pauline; Kühlein, Thomas

    2016-02-01

    General practice is person-focused. Contextual information influences the clinical decision-making process in primary care. Currently, person-related information (PeRI) is neither recorded in a systematic way nor coded in the electronic medical record (EMR), and therefore not usable for scientific use. To search for classes of PeRI influencing the process of care. GPs, from nine countries worldwide, were asked to write down narrative case histories where personal factors played a role in decision-making. In an inductive process, the case histories were consecutively coded according to classes of PeRI. The classes found were deductively applied to the following cases and refined, until saturation was reached. Then, the classes were grouped into code-families and further clustered into domains. The inductive analysis of 32 case histories resulted in 33 defined PeRI codes, classifying all personal-related information in the cases. The 33 codes were grouped in the following seven mutually exclusive code-families: 'aspects between patient and formal care provider', 'social environment and family', 'functioning/behaviour', 'life history/non-medical experiences', 'personal medical information', 'socio-demographics' and 'work-/employment-related information'. The code-families were clustered into four domains: 'social environment and extended family', 'medicine', 'individual' and 'work and employment'. As PeRI is used in the process of decision-making, it should be part of the EMR. The PeRI classes we identified might form the basis of a new contextual classification mainly for research purposes. This might help to create evidence of the person-centredness of general practice. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  17. An Integrated Information Retrieval Support System for Campus Network

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new integrated information retrieval support system (IIRSS) which can help Web search engines retrieve cross-lingual information from heterogeneous resources stored in multi-databases in Intranet. The IIRSS, with a three-layer architecture, can cooperate with other application servers running in Intranet. By using intelligent agents to collect information and to create indexes on-the-fly, using an access control strategy to confine a user to browsing those accessible documents for him/her through a single portal, and using a new cross-lingual translation tool to help the search engine retrieve documents, the new system provides controllable information access with different authorizations, personalized services, and real-time information retrieval.

  18. The Right to Consent and Control Personal Information Processing in Cyberspace

    OpenAIRE

    Thilla Rajaretnam

    2015-01-01

    Consumer concerns over the safety of their personal information and the violation of their privacy rights are described as being the single overwhelming barrier to rapid growth of e- commerce. This paper explores the problems for e-commerce users when there is collection, use, and disclosure of personal information that are based on implied consent in e- commerce transactions. It questions the assumption that consent is sufficient to waive privacy interests in relation to e-commerce transacti...

  19. 34 CFR 5.71 - Protection of personal privacy and proprietary information.

    Science.gov (United States)

    2010-07-01

    ... other information of a private and personal nature. (b) Information having a commercial or financial... individuals who have access to such information, (3) the type and degree of risk of financial injury to be... use of nondiscloseable records or information from such records for authorized program purposes...

  20. Perspectives on access to personal health information in New Zealand/Aotearoa.

    Science.gov (United States)

    Menkes, David B; Hill, Charlotte J; Horsfall, Melissa; Jaye, Chrystal

    2008-12-01

    This study used group interviews to explore Māori and European New Zealander (Pakeha) perspectives on access to personal health information. Two predominant themes emerged: the tension between the individual and society, and differences inherent in the use of formal and informal moral codes. Māori and Pakeha differed in their concept of autonomy and relied on distinct moral codes when considering questions of access; Western values and moral codes were notably less relevant to Māori who described distinct, collectivist means of ensuring social care of the sick and dying. Pakeha but not Māori participants often used hypothetical situations to reach an abstract determination of 'who should know'; the latter instead used personal experience to decide case-by-case. Generational differences were also evident, particularly in the Māori groups. In conclusion, culture should be considered in access to personal health information in New Zealand. Similar cultural variation is likely to be found in other countries; recognition of such differences will help ensure that access to sensitive information is appropriate, inclusive, and ethical.

  1. Personalized E- learning System Based on Intelligent Agent

    Science.gov (United States)

    Duo, Sun; Ying, Zhou Cai

    Lack of personalized learning is the key shortcoming of traditional e-Learning system. This paper analyzes the personal characters in e-Learning activity. In order to meet the personalized e-learning, a personalized e-learning system based on intelligent agent was proposed and realized in the paper. The structure of system, work process, the design of intelligent agent and the realization of intelligent agent were introduced in the paper. After the test use of the system by certain network school, we found that the system could improve the learner's initiative participation, which can provide learners with personalized knowledge service. Thus, we thought it might be a practical solution to realize self- learning and self-promotion in the lifelong education age.

  2. Personality and self-regulation: trait and information-processing perspectives.

    Science.gov (United States)

    Hoyle, Rick H

    2006-12-01

    This article introduces the special issue of Journal of Personality on personality and self-regulation. The goal of the issue is to illustrate and inspire research that integrates personality and process-oriented accounts of self-regulation. The article begins by discussing the trait perspective on self-regulation--distinguishing between temperament and personality accounts--and the information-processing perspective. Three approaches to integrating these perspectives are then presented. These range from methodological approaches, in which constructs representing the two perspectives are examined in integrated statistical models, to conceptual approaches, in which the two perspectives are unified in a holistic theoretical model of self-regulation. The article concludes with an overview of the special issue contributions, which are organized in four sections: broad, integrative models of personality and self-regulation; models that examine the developmental origins of self-regulation and self-regulatory styles; focused programs of research that concern specific aspects or applications of self-regulation; and strategies for increasing the efficiency and effectiveness of self-regulation.

  3. Health information systems and pesticide poisoning at Pernambuco.

    Science.gov (United States)

    de Albuquerque, Pedro Costa Cavalcanti; Gurgel, Idê Gomes Dantas; Gurgel, Aline do Monte; Augusto, Lia Giraldo da Silva; de Siqueira, Marília Teixeira

    2015-01-01

    Understanding the epidemiologic profile of a particular disease is key to undertake health actions. To that end, information systems that present quality data help in the decision-making process and demonstrate the impact of the problems. To analyze the contribution of health information systems for the characterization of pesticide poisoning through SINAN, CEATOX and SIM in the State of Pernambuco. In this study, the completeness and consistency of the data were assessed, as well as the epidemiological profile of pesticide poisoning in Pernambuco in the period from 2008 to 2012, based on the following Health Information Systems: Center for Toxicological Assistance of Pernambuco (CEATOX), Notifiable Diseases Information System (SINAN) and Mortality Information System (SIM). The data revealed incompleteness and inconsistencies in information. Regarding the profile, females are more affected in the morbidity profile, and men have a higher mortality rate. Poisoning was more frequent in young adults with low educational level. With regard to the circumstances, most of the cases were suicide attempts, unique acute cases and not related to work. Despite suggesting underreporting, the data showed that persons engaged in agriculture are most commonly affected. The strengthening of these systems is necessary for the generation of consistent information that support health policies for the population groups involved.

  4. Quality of life in children surviving cancer: a personality and multi-informant perspective.

    Science.gov (United States)

    De Clercq, Barbara; De Fruyt, Filip; Koot, Hans M; Benoit, Yves

    2004-12-01

    To describe quality of life (QoL) of children surviving cancer in relation to their personality, using self- and maternal reports and examining differences with healthy referents. Sixty-seven children who survived childhood cancer were compared with eighty-one healthy children on QoL and personality characteristics. Children who survived cancer reported higher QoL than healthy children, whereas there were no differences for personality. Two main effects emerged for informant with children rating themselves as less neurotic and more conscientious than their mothers. The correspondence between mothers and children was substantially higher for survivors for QoL and personality ratings. QoL and trait measures share substantial variance, and personality traits significantly predict QoL. Parental personality ratings explained child QoL beyond children's personality ratings. Personality traits contribute to quality of life, indicating that personality significantly influences child's quality of life beyond the experience of a negative life event such as surviving cancer and its treatment. From a diagnostic perspective, parental trait ratings are informative in addition to children's ratings of personality to understand children's QoL.

  5. Associations between informant ratings of personality disorder traits, self-reports of personality, and directly observed behavior.

    Science.gov (United States)

    Kaurin, Aleksandra; Sauerberger, Kyle S; Funder, David C

    2018-03-02

    Diagnoses of personality disorders (PD) must rely on judgments of observers-either clinicians or acquaintances-because personality disorders are primarily defined in terms of maladaptive interpersonal behavior. Little is known, however, about how closely acquaintances' judgments of PD traits relate to self-reports of theoretically relevant Big Five traits or directly observed behavioral outcomes in interpersonal situations. The present study examines associations between judgments of the 10 PD traits provided by close acquaintances, self-reports of PD-relevant Big Five personality traits, and observed interpersonal behaviors across three different three-person laboratory interactions (i.e., unstructured chat, cooperative task, competitive game). The sample consisted of 256 undergraduate students (130 females; M age  = 19.83, SD = 1.25). Four unacquainted observers independently rated participants' behaviors from video recordings. In line with previous work, informant reports of PD traits demonstrate strong convergent validity with relevant self-reported Big Five traits (as identified by Lynam & Widiger, 2001). Directly observed behavior is meaningfully associated with acquaintances' judgments and self-reports of PD-relevant traits, and the associations between these judgments and behavior are strongest for traits associated with histrionic and schizoid PD. Vector correlations between behavioral profiles associated with informant and self-reports show that both assessments have similar behavioral correlates. Associations between PD trait ratings and behavior appeared to differ as a function of gender, with males showing more and stronger correlations. Informants' ratings of PD traits are impressively accurate, converging both with self-reports of relevant traits and directly observed interpersonal behavior. Therefore, a comprehensive understanding of PDs and associated traits can be augmented by information from multiple acquaintances who have the

  6. Vibrotactile Feedbacks System for Assisting the Physically Impaired Persons for Easy Navigation

    Science.gov (United States)

    Safa, M.; Geetha, G.; Elakkiya, U.; Saranya, D.

    2018-04-01

    NAYAN architecture is for a visually impaired person to help for navigation. As well known, all visually impaired people desperately requires special requirements even to access services like the public transportation. This prototype system is a portable device; it is so easy to carry in any conduction to travel through a familiar and unfamiliar environment. The system consists of GPS receiver and it can get NEMA data through the satellite and it is provided to user's Smartphone through Arduino board. This application uses two vibrotactile feedbacks that will be placed in the left and right shoulder for vibration feedback, which gives information about the current location. The ultrasonic sensor is used for obstacle detection which is found in front of the visually impaired person. The Bluetooth modules connected with Arduino board is to send information to the user's mobile phone which it receives from GPS.

  7. What Is Anonymous?: A Case Study of an Information Systems Hacker Activist Collective Movement

    Science.gov (United States)

    Pendergrass, William Stanley

    2013-01-01

    Interconnected computer information systems have become indispensable aspects of modern life. All forms of communication, education, finance, commerce and identity utilize these systems creating a permanent personal presence for all of us within this digital world. Individuals who reveal or threaten to reveal these personal identities for various…

  8. Framing and personalizing informed consent to prevent negative expectations: An experimental pilot study.

    Science.gov (United States)

    Heisig, Sarah R; Shedden-Mora, Meike C; Hidalgo, Pablo; Nestoriuc, Yvonne

    2015-10-01

    Informing patients about medical treatments and their possible side effects is ethically and legally obligatory but may trigger negative expectations and nocebo-related side effects. This pilot study aims to investigate the effect of different informed consent procedures on treatment expectations for adjuvant breast cancer treatments (Study 1: endocrine therapy; Study 2: chemotherapy). Using an experimental 2-factorial design, healthy women were informed about endocrine therapy (n = 60) or chemotherapy (n = 64) within a hypothetical scenario. Information was framed with or without treatment benefit information and delivered in a personalized or standardized interaction. Primary outcomes were necessity-concern beliefs about the treatment and side-effect expectations, secondary outcomes were decisional conflicts. In Study 1, side-effect expectations (η²p= .08) and decisional conflicts (η²p = .07) were lower when framed treatment information was given. Providing personalized information resulted in more functional necessity-concern beliefs (η²p = .06) and lower decisional conflicts (η²p = .07). Personalizing and framing of information resulted in more functional necessity-concern beliefs (η²p = .10) and lower decisional conflicts. In Study 2, necessity-concern beliefs were more functional with framing (η²p = .06). Participants in the personalized groups reported lower decisional conflicts (η²p = .06). No differences in side-effect expectations were revealed. This is the first study to provide evidence for optimized treatment expectations through altered informed consent strategies. The results emphasize that framing and personalizing informed consent can positively influence treatment expectations and reduce decisional conflicts. However, generalizations are impaired by the study's pilot character. The potential to prevent nocebo responses in clinical practice should be analyzed. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  9. Information needs of case managers caring for persons living with HIV.

    Science.gov (United States)

    Schnall, Rebecca; Cimino, James J; Currie, Leanne M; Bakken, Suzanne

    2011-05-01

    The goals of this study were to explore the information needs of case managers who provide services to persons living with HIV (PLWH) and to assess the applicability of the Information Needs Event Taxonomy in a new population. The study design was observational with data collection via an online survey. Responses to open-ended survey questions about the information needs of case managers (n=94) related to PLWH of three levels of care complexity were categorized using the Information Needs Event Taxonomy. The most frequently identified needs were related to patient education resources (33%), patient data (23%), and referral resources (22%) accounting for 79% of all (N=282) information needs. Study limitations include selection bias, recall bias, and a relatively narrow focus of the study on case-manager information needs in the context of caring for PLWH. The study findings contribute to the evidence base regarding information needs in the context of patient interactions by: (1) supporting the applicability of the Information Needs Event Taxonomy and extending it through addition of a new generic question; (2) providing a foundation for the addition of context-specific links to external information resources within information systems; (3) applying a new approach for elicitation of information needs; and (4) expanding the literature regarding addressing information needs in community-based settings for HIV services.

  10. MyLibrary: A Web Personalized Digital Library.

    Science.gov (United States)

    Rocha, Catarina; Xexeo, Geraldo; da Rocha, Ana Regina C.

    With the increasing availability of information on Internet information providers, like search engines, digital libraries and online databases, it becomes more important to have personalized systems that help users to find relevant information. One type of personalization that is growing in use is recommender systems. This paper presents…

  11. A Study of Personal Information Management Strategies for Online Faculty

    Science.gov (United States)

    Kearns, Lorna R.; Frey, Barbara A.; Tomer, Christinger; Alman, Susan

    2014-01-01

    The literature suggests that personal information management is a serious challenge for many computer users. Online faculty are especially challenged because of the large number of electronic files necessitated by teaching online. Those who have experience in this environment may offer valuable insights regarding information management challenges…

  12. Liquid Effluent Monitoring Information System (LEMIS) System Construction

    International Nuclear Information System (INIS)

    Adams, R.T.

    1994-01-01

    The liquid effluent sampling program is part of the effort to minimize adverse environmental impact during the cleanup operation at the Hanford Site. Of the 33 Phase I and Phase II liquid effluents, all streams actively discharged to the soil column will be sampled. The Liquid Effluent Monitoring Information System (LEMIS) is being developed as the organized information repository facility in support of the liquid effluent monitoring requirements of the Tri-Party Agreement. It is necessary to provide an automated repository into which the results from liquid effluent sampling will be placed. This repository must provide for effective retention, review, and retrieval of selected sample data by authorized persons and organizations. This System Construction document is the aggregation of the DMR P+ methodology project management deliverables. Together they represent a description of the project and its plan through four Releases, corresponding to the definition and prioritization of requirements defined by the user

  13. Design and implementation of the standards-based personal intelligent self-management system (PICS).

    Science.gov (United States)

    von Bargen, Tobias; Gietzelt, Matthias; Britten, Matthias; Song, Bianying; Wolf, Klaus-Hendrik; Kohlmann, Martin; Marschollek, Michael; Haux, Reinhold

    2013-01-01

    Against the background of demographic change and a diminishing care workforce there is a growing need for personalized decision support. The aim of this paper is to describe the design and implementation of the standards-based personal intelligent care systems (PICS). PICS makes consistent use of internationally accepted standards such as the Health Level 7 (HL7) Arden syntax for the representation of the decision logic, HL7 Clinical Document Architecture for information representation and is based on a open-source service-oriented architecture framework and a business process management system. Its functionality is exemplified for the application scenario of a patient suffering from congestive heart failure. Several vital signs sensors provide data for the decision support system, and a number of flexible communication channels are available for interaction with patient or caregiver. PICS is a standards-based, open and flexible system enabling personalized decision support. Further development will include the implementation of components on small computers and sensor nodes.

  14. The acquisition of face and person identity information following anterior temporal lobectomy.

    Science.gov (United States)

    Moran, Maria; Seidenberg, Michael; Sabsevitz, Dave; Swanson, Sara; Hermann, Bruce

    2005-05-01

    Thirty unilateral anterior temporal lobectomy (ATL) subjects (15 right and 15 left) and 15 controls were presented a multitrial learning task in which unfamiliar faces were paired with biographical information (occupation, city location, and a person's name). Face recognition hits were similar between groups, but the right ATL group committed more false-positive errors to face foils. Both left and right ATL groups were impaired relative to controls in acquiring biographical information, but the deficit was more pronounced for the left ATL group. Recall levels also varied for the different types of biographical information; occupation was most commonly recalled followed by city name and person name. In addition, city and person name recall was more likely when occupation was also recalled. Overall, recall of biographical information was positively correlated with clinical measures of anterograde episodic memory. Findings are discussed in terms of the role of the temporal lobe and associative learning ability in the successful acquisition of new face semantic (biographical) representations.

  15. Challenges and Opportunities with Empowering Baby Boomers for Personal Health Information Management Using Consumer Health Information Technologies: an Ecological Perspective.

    Science.gov (United States)

    LeRouge, Cynthia M; Tao, Donghua; Ohs, Jennifer; Lach, Helen W; Jupka, Keri; Wray, Ricardo

    2014-01-01

    "Baby Boomers" (adults born between the years of 1946 and 1964) make up the largest segment of the population in many countries, including the United States (about 78 million Americans) [1]. As Baby Boomers reach retirement age and beyond, many will have increasing medical needs and thus demand more health care resources that will challenge the healthcare system. Baby Boomers will likely accelerate the movement toward patient self-management and prevention efforts. Consumer Health Information Technologies (CHIT) hold promise for empowering health consumers to take an active role in health maintenance and disease management, and thus, have the potential to address Baby Boomers' health needs. Such innovations require changes in health care practice and processes that take into account Baby Boomers' personal health needs, preferences, health culture, and abilities to use these technologies. Without foundational knowledge of barriers and opportunities, Baby Boomers may not realize the potential of these innovations for improving self-management of health and health outcomes. However, research to date has not adequately explored the degree to which Baby Boomers are ready to embrace consumer health information technology and how their unique subcultures affect adoption and diffusion. This position paper describes an ecological conceptual framework for understanding and studying CHIT aimed at satisfying the personal health needs of Baby Boomers. We explore existing literature to provide a detailed depiction of our proposed conceptual framework, which focuses characteristics influencing Baby Boomers and their Personal Health Information Management (PHIM) and potential information problems. Using our ecological framework as a backdrop, we provide insight and implications for future research based on literature and underlying theories represented in our model.

  16. The computer-based process information system for the 5 MW THR

    International Nuclear Information System (INIS)

    Zhang Liangju; Zhang Youhua; Liu Xu; An Zhencai; Li Baoxiang

    1990-01-01

    The computer-based process information system has effectively improved the interface between operation person and the reactor, and has been successfully used in reactor operation environment. This article presents the design strategy, functions realized in the system and some advanced techniques used in the system construction and software development

  17. 78 FR 54626 - Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2, Personal...

    Science.gov (United States)

    2013-09-05

    ...-01] Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2, Personal... Commerce's approval of Federal Information Processing Standard (FIPS) Publication 201-2, Personal Identity... Information Processing Standards (FIPS). Homeland Security Presidential Directive (HSPD) 12, entitled ``Policy...

  18. 个人信息人格利益与财产利益理论分析%An Theoretical Analysis of the Personality Interests and Property Interests of Personal Information

    Institute of Scientific and Technical Information of China (English)

    高志明

    2018-01-01

    个人信息既具有人格利益又包含财产利益.个人信息人格利益理论强调确定个人信息自决权、通过法律全面保护个人信息人格利益;个人信息连带关系理论、社会主义信息法学思想可以阐释网络社会的个人信息互联关系;个人信息财产利益理论涉及功利主义、隐私经济学和个人信息商品化理论,注重个人信息所蕴含的经济价值、注重商业利用个人信息以发挥其最大效用.%Personal information has both personality and property interests.Personality interests theory empha-sizes of the self determination right of personal information and the comprehensive protection of personality in-terests;Personal information joint relation theory and the socialist information legal thoughts can interpret the interconnection of personal information in a network society;Personal information property interest theory in-volves utilitarianism,privacy economics theory,personal information commercialization theory,and pays atten-tion to the personal information economic value and the commercial use of personal information to maximize its impact.

  19. Perspectives on utilization of community based health information systems in Western Kenya.

    Science.gov (United States)

    Flora, Otieno Careena; Margaret, Kaseje; Dan, Kaseje

    2017-01-01

    Health information systems (HIS) are considered fundamental for the efficient delivery of high quality health care. However, a large number of legal and practical constraints influence the design and introduction of such systems. The inability to quantify and analyse situations with credible data and to use data in planning and managing service delivery plagues Africa. Establishing effective information systems and using this data for planning efficient health service delivery is essential to district health systems' performance improvement. Community Health Units in Kenya are central points for community data collection, analysis, dissemination and use. In Kenya, data tend to be collected for reporting purposes and not for decision-making at the point of collection. This paper describes the perspectives of local users on information use in various socio-economic contexts in Kenya. Information for this study was gathered through semi-structured interviews. The interviewees were purposefully selected from various community health units and public health facilities in the study area. The data were organized and analysed manually, grouping them into themes and categories. Information needs of the community included service utilization and health status information. Dialogue was the main way of information utilization in the community. However, health systems and personal challenges impeded proper collection and use of information. The challenges experienced in health information utilization may be overcome by linkages and coordination between the community and the health facilities. The personal challenges can be remedied using a motivational package that includes training of the Community Health Workers.

  20. Performance evaluation of a novel personalized ventilation-personalized exhaust system for airborne infection control.

    Science.gov (United States)

    Yang, J; Sekhar, S C; Cheong, K W D; Raphael, B

    2015-04-01

    In the context of airborne infection control, it is critical that the ventilation system is able to extract the contaminated exhaled air within the shortest possible time. To minimize the spread of contaminated air exhaled by occupants efficiently, a novel personalized ventilation (PV)-personalized exhaust (PE) system has been developed, which aims to exhaust the exhaled air as much as possible from around the infected person (IP). The PV-PE system was studied experimentally for a particular healthcare setting based on a typical consultation room geometry and four different medical consultation positions of an IP and a healthy person (HP). Experiments using two types of tracer gases were conducted to evaluate two types of PE: Top-PE and Shoulder-PE under two different background ventilation systems: Mixing Ventilation and Displacement Ventilation. Personalized exposure effectiveness, intake fraction (iF) and exposure reduction (ε) were used as indices to evaluate the PV-PE system. The results show that the combined PV-PE system for the HP achieves the lowest intake fraction; and the use of PE system for the IP alone shows much better performance than using PV system for the HP alone. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  1. The enhancement of security in healthcare information systems.

    Science.gov (United States)

    Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-06-01

    With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.

  2. Systems Book for a Student Information System. End of Project Report, 1968-1971, Volume II.

    Science.gov (United States)

    Western Nevada Regional Education Center, Lovelock.

    The necessary handbooks for use of the Student Information System (SIS), developed and tested by the Western Nevada Regional Education Center under a 1968-71 Title III (Elementary and Secondary Education Act) grant, are presented in this volume. As noted, the purpose of the SIS is to supply data and information to persons or organizations who make…

  3. Information bias in contingent valuation: effects of personal relevance, quality of information, and motivational orientation

    Science.gov (United States)

    Icek Ajzen; Thomas C. Brown; Lori H. Rosenthal

    1996-01-01

    A laboratory experiment examined the potential for information bias in contingent valuation (CV). Consistent with the view that information about a public or private good can function as a persuasive communication, willingness to pay (WTP) was found to increase with the quality of arguments used to describe the good, especially under conditions of high personal...

  4. Information system success model for customer relationship management system in health promotion centers.

    Science.gov (United States)

    Choi, Wona; Rho, Mi Jung; Park, Jiyun; Kim, Kwang-Jum; Kwon, Young Dae; Choi, In Young

    2013-06-01

    Intensified competitiveness in the healthcare industry has increased the number of healthcare centers and propelled the introduction of customer relationship management (CRM) systems to meet diverse customer demands. This study aimed to develop the information system success model of the CRM system by investigating previously proposed indicators within the model. THE EVALUATION AREAS OF THE CRM SYSTEM INCLUDES THREE AREAS: the system characteristics area (system quality, information quality, and service quality), the user area (perceived usefulness and user satisfaction), and the performance area (personal performance and organizational performance). Detailed evaluation criteria of the three areas were developed, and its validity was verified by a survey administered to CRM system users in 13 nationwide health promotion centers. The survey data were analyzed by the structural equation modeling method, and the results confirmed that the model is feasible. Information quality and service quality showed a statistically significant relationship with perceived usefulness and user satisfaction. Consequently, the perceived usefulness and user satisfaction had significant influence on individual performance as well as an indirect influence on organizational performance. This study extends the research area on information success from general information systems to CRM systems in health promotion centers applying a previous information success model. This lays a foundation for evaluating health promotion center systems and provides a useful guide for successful implementation of hospital CRM systems.

  5. Information System Success Model for Customer Relationship Management System in Health Promotion Centers

    Science.gov (United States)

    Choi, Wona; Rho, Mi Jung; Park, Jiyun; Kim, Kwang-Jum; Kwon, Young Dae

    2013-01-01

    Objectives Intensified competitiveness in the healthcare industry has increased the number of healthcare centers and propelled the introduction of customer relationship management (CRM) systems to meet diverse customer demands. This study aimed to develop the information system success model of the CRM system by investigating previously proposed indicators within the model. Methods The evaluation areas of the CRM system includes three areas: the system characteristics area (system quality, information quality, and service quality), the user area (perceived usefulness and user satisfaction), and the performance area (personal performance and organizational performance). Detailed evaluation criteria of the three areas were developed, and its validity was verified by a survey administered to CRM system users in 13 nationwide health promotion centers. The survey data were analyzed by the structural equation modeling method, and the results confirmed that the model is feasible. Results Information quality and service quality showed a statistically significant relationship with perceived usefulness and user satisfaction. Consequently, the perceived usefulness and user satisfaction had significant influence on individual performance as well as an indirect influence on organizational performance. Conclusions This study extends the research area on information success from general information systems to CRM systems in health promotion centers applying a previous information success model. This lays a foundation for evaluating health promotion center systems and provides a useful guide for successful implementation of hospital CRM systems. PMID:23882416

  6. Professional career management and personal development for the employees of the Romanian medical system

    OpenAIRE

    Mirica Dumitrescu Catalina-Oana

    2017-01-01

    The purpose of this article is to inform as many persons as possible on the present situation of doctors in Romania, to present more theoretical and practical elements that lead to the development of a sustainable career in the Romanian medical system. So I tried to get as much information about the current situation of the medical system, to obtain a certain confirmation of what was said by those working in the system. Gradually, I found out about the hospital problems, the insufficient budg...

  7. Dissemination of Information in Developing Countries: The Personal Computer and beyond

    Science.gov (United States)

    Wong, Wai-Man

    2005-01-01

    With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…

  8. Relating DSM-5 section II and section III personality disorder diagnostic classification systems to treatment planning.

    Science.gov (United States)

    Morey, Leslie C; Benson, Kathryn T

    2016-07-01

    Beginning with DSM-III, the inclusion of a "personality" axis was designed to encourage awareness of personality disorders and the treatment-related implications of individual differences, but since that time there is little accumulated evidence that the personality disorder categories provide substantial treatment-related guidance. The DSM-5 Personality and Personality Disorders Work Group sought to develop an Alternative Model for personality disorder, and this study examined whether this model is more closely related to clinicians' decision-making processes than the traditional categorical personality disorder diagnoses. A national sample of 337 clinicians provided complete personality disorder diagnostic information and several treatment-related clinical judgments about one of their patients. The dimensional concepts of the DSM-5 Alternative Model for personality disorders demonstrated stronger relationships than categorical DSM-IV/DSM-5 Section II diagnoses to 10 of 11 clinical judgments regarding differential treatment planning, optimal treatment intensity, and long-term prognosis. The constructs of the DSM-5 Alternative Model for personality disorders may provide more clinically useful information for treatment planning than the official categorical personality disorder diagnostic system retained in DSM-5 Section II. Copyright © 2016 Elsevier Inc. All rights reserved.

  9. Psycho-Diagnostic Problems of Personalized Teaching Systems

    Science.gov (United States)

    Abu-Dawwas, Waheeb A.; Al-Azzeh, Rashed M.; Abu-Arqoub, Mohammed H.

    2007-12-01

    The paper is an attempted to discuss one of the must important components in the architecture of personalized teaching systems—the testing system. One of the aims of the paper is to propose a definition of cognitive state, which can be used in designing personalized teaching systems.

  10. Assessment of capabilities in persons with advanced stage of dementia: Validation of The Montessori Assessment System (MAS).

    Science.gov (United States)

    Erkes, Jérôme; Camp, Cameron J; Raffard, Stéphane; Gély-Nargeot And, Marie-Christine; Bayard, Sophie

    2017-01-01

    This study evaluated the validity and reliability of the Montessori Assessment System. The Montessori Assessment System assesses preserved abilities in persons with moderate to severe dementia. In this respect, this instrument provides crucial information for the development of effective person-centered care plans. A total of 196 persons with a diagnosis of dementia in the moderate to severe stages of dementia were recruited in 10 long-term care facilities in France. All participants completed the Montessori Assessment System, the Clinical Dementia Rating Scale and/or the Mini Mental State Examination and the Severe Impairment Battery-short form. The internal consistency and temporal stability of the Montessori Assessment System were high. Additionally, good construct and divergent validity were demonstrated. Factor analysis showed a one-factor structure. The Montessori Assessment System demonstrated satisfactory psychometric properties while being a useful instrument to assess capabilities in persons with advanced stages of dementia and hence to develop person-centered plans of care.

  11. Relationships: empirical contribution. Understanding personality pathology in adolescents: the five factor model of personality and social information processing.

    Science.gov (United States)

    Hessels, Christel; van den Hanenberg, Danique; de Castro, Bram Orobio; van Aken, Marcel A G

    2014-02-01

    This study seeks to integrate two research traditions that lie at the base of the understanding of personality pathology in adolescents. The first research tradition refers to normal personality according to the Five Factor Model (FFM). The second tradition specifies the key feature of personality disorder as the capacity to mentalize, which can be reflected in Social Information Processing (SIP). In a clinical sample of 96 adolescents, the authors investigated response generation, coping strategy, and memories of past frustrating experiences as part of SIP, as mediator in the relationship between personality and personality pathology, and a possible moderating role of personality on the relationship between SIP and personality pathology. The hypothesized mediation, by which the effects of personality dimensions on personality pathology was expected to be mediated by SIP variables, was found only for the effect of Neuroticism, most specifically on BPD, which appeared to be mediated by memories the patients had about past frustrating conflict situations with peers. Some moderating effects of personality on the relationship between SIP variables and personality pathology were found, suggesting that high Agreeableness and sometimes low Neuroticism can buffer this relationship. These results suggest that personality dimensions and social cognitions both independently and together play a role in adolescents' personality pathology.

  12. Employee Self Service-based Human Resources Information System Development and Implementation. Case Study: BCP Indonesia

    Directory of Open Access Journals (Sweden)

    Lestari Margatama

    2017-01-01

    Full Text Available Human Resources Information System is a Decision Support System that provides necessary information regarding human resources in an organization. Web-based e-HR is one of the best practical solution in human resources management that allows employees to focus more on their job instead of HR administration procedures. By implementing Employee Self Service (ESS it is expected that worker satisfaction can be improved and in turn will also improve employees’ performance. The web-based ESS is characterized by personalized information approach which offers personal and management services on information access and structured workflow process. The object covered in this research is HR administration of PT. BCP to create and implement ESS with system prototype development and UML modeling tool. The resulting system is designed to quickly access the information and company procedures to shorten the time for BCP’s employee administration and documentation

  13. Towards a conceptual framework for protection of personal information from the perspective of activity theory

    Directory of Open Access Journals (Sweden)

    Tiko Iyamu

    2017-11-01

    Full Text Available Background: Personal information about individuals is stored by organisations including government agencies. The information is intended to be kept confidential and strictly used for its primary and legitimate purposes. However, that has not always been the case in many South African government agencies and departments. In recent years, personal information about individuals and groups has been illegally leaked for other motives, in which some were detrimental. Even though there exists a legislation, Protection of Personal Information (POPI Act, which prohibits such malpractices, illegally leaked information has however, not stopped or reduced. In addition to the adoption of the POPI Act, a more stringent approach is therefore needed in order to improve sanity in the use and management of personal information. Otherwise, the detriment that such malpractices cause too many citizens can only be on the increase. Objectives: The objectives of this study were in twofold: (1 to examine and understand the activities that happen with personal information leaks, which includes why and how information is leaked; and (2 to develop a conceptual framework, which includes identification of the factors that influence information leaks and breaches in an environment. Method: Qualitative research methods were followed in achieving the objectives of the study. Within the qualitative methods, documents including existing literature were gathered. The activity theory was employed as lens to guide the analysis. Result: From the analysis, four critical factors were found to be of influence in information leaks and breaches in organisations. The factors include: (1 information and its value, (2 the roles of society and its compliance to information protection, (3 government and its laws relating to information protection and (4 the need for standardisation of information usage and management within a community. Based on the factors, a conceptual framework was

  14. The Design and Analysis of a Secure Personal Healthcare System Based on Certificates

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2016-11-01

    Full Text Available Due to the development of information technology (IT, it has been applied to various fields such as the smart home, medicine, healthcare, and the smart car. For these fields, IT has been providing continuous prevention and management, including health conditions beyond the mere prevention of disease, improving the quality of life. e-Healthcare is a health management and medical service to provide prevention, diagnosis, treatment, and the follow-up management of diseases at any time and place in connection with information communication technology, without requiring patients to visit hospitals. However, e-Healthcare has been exposed to eavesdropping, manipulation, and the forgery of information that is personal, biological, medical, etc., and is a security threat from malicious attackers. This study suggests a security service model to exchange personal health records (PHRs for e-Healthcare environments. To be specific, this study suggests a scheme in which communicators are able to securely authorize and establish security channels by constituting the infrastructure each organization relies on. In addition, the possibility of establishing a security service model is indicated by suggesting an e-Healthcare system for a secure e-Healthcare environment as a secure personal health record system. This is anticipated to provide securer communication in e-Healthcare environments in the future through the scheme suggested in this study.

  15. Money makes you reveal more: Consequences of monetary cues on preferential disclosure of personal information

    Directory of Open Access Journals (Sweden)

    Sumitava eMukherjee

    2013-11-01

    Full Text Available With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure.

  16. Money makes you reveal more: consequences of monetary cues on preferential disclosure of personal information.

    Science.gov (United States)

    Mukherjee, Sumitava; Manjaly, Jaison A; Nargundkar, Maithilee

    2013-01-01

    With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure.

  17. A Review of Organizational Structures of Personal Information Management

    OpenAIRE

    Indratmo, J; Vassileva, Julita

    2008-01-01

    Personal information management (PIM) covers a large area of research fragmented into separate sub-areas such as file management, web bookmark organization, and email management. Consequently, it is hard to obtain a unified view of the various approaches to PIM developed in these different sub-areas. In this article, we synthesize and classify existing research on PIM based on the approach used to organize information items. We classify the organizational structures into five categories: hier...

  18. Medical students and personal smartphones in the clinical environment: the impact on confidentiality of personal health information and professionalism.

    Science.gov (United States)

    Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C

    2014-05-22

    Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students' use of personal smartphones for clinical work. The intent of the study was to examine final-year medical students' experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Our findings suggest that the use of personal smartphones for clinical work by medical students is prevalent. There is a need to more fully address

  19. RESEARCH OF MULTICRITERIAL DECISION-MAKING MODEL FOR EDUCATIONAL INFORMATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    V. V. Serbin

    2016-09-01

    Full Text Available Subject of Research. Decision-making model is offered for informational and educational systems. The study of multi-criteria model is carried out taking into account knowledge, reaction and doubt. Method. The model of material proficiency by the user is based on identification of the personal characteristics when operating with the system. As a result of personal characteristics tracking in the system, an image is formed for each user that can be used for identifying his state: knowledge level, proportion of error, handwriting information, etc. During registration the user is passing an input test. Multi-criteria test results are automatically stored in the user's personal database (agent matrix and accounted for psychological comfort, formation of the next system content, management of knowledge levels, decision-making when working with the system. The proposed method gives a more clear and "transparent situational picture" for objective decision-making. Main Results. Implementation of multi-criteria decision-making model contributes to the quality of distance education. Also, the method makes it possible to reduce the probability of guessing the correct answer, thus increases the objectivity of knowledge level evaluation in diagnostic systems for management of learning process based on remote technologies. Practical Relevance. Obtained theoretical results of the work are used in training systems on the basis of multi-criteria decision models. Thus, the proposed model leads to an increase in the average score of about 0.3-0.4 points and reduces the training time in 1.5 to 2.0 times.

  20. Image and information management system

    Science.gov (United States)

    Robertson, Tina L. (Inventor); Raney, Michael C. (Inventor); Dougherty, Dennis M. (Inventor); Kent, Peter C. (Inventor); Brucker, Russell X. (Inventor); Lampert, Daryl A. (Inventor)

    2009-01-01

    A system and methods through which pictorial views of an object's configuration, arranged in a hierarchical fashion, are navigated by a person to establish a visual context within the configuration. The visual context is automatically translated by the system into a set of search parameters driving retrieval of structured data and content (images, documents, multimedia, etc.) associated with the specific context. The system places ''hot spots'', or actionable regions, on various portions of the pictorials representing the object. When a user interacts with an actionable region, a more detailed pictorial from the hierarchy is presented representing that portion of the object, along with real-time feedback in the form of a popup pane containing information about that region, and counts-by-type reflecting the number of items that are available within the system associated with the specific context and search filters established at that point in time.

  1. Knowledge Management Systems as an Interdisciplinary Communication and Personalized General-Purpose Technology

    Directory of Open Access Journals (Sweden)

    Ulrich Schmitt

    2015-10-01

    Full Text Available As drivers of human civilization, Knowledge Management (KM processes have co-evolved in line with General-Purpose-Technologies (GPT, such as writing, printing, and information and communication systems. As evidenced by the recent shift from information scarcity to abundance, GPTs are capable of drastically altering societies due to their game-changing impact on our spheres of work and personal development. This paper looks at the prospect of whether a novel Personal Knowledge Management (PKM concept supported by a prototype system has got what it takes to grow into a transformative General-Purpose-Technology. Following up on a series of papers, the KM scenario of a decentralizing revolution where individuals and self-organized groups yield more power and autonomy is examined according to a GPT's essential characteristics, including a wide scope for improvement and elaboration (in people's private, professional and societal life, applicability across a broad range of uses in a wide variety of products and processes (in multi-disciplinary educational and work contexts, and strong complementarities with existing or potential new technologies (like organizational KM Systems and a proposed World Heritage of Memes Repository. The result portrays the PKM concept as a strong candidate due to its personal, autonomous, bottom-up, collaborative, interdisciplinary, and creativity-supporting approach destined to advance the availability, quantity, and quality of the world extelligence and to allow for a wider sharing and faster diffusion of ideas across current disciplinary and opportunity divides.

  2. A Personalized Electronic Movie Recommendation System Based on Support Vector Machine and Improved Particle Swarm Optimization.

    Science.gov (United States)

    Wang, Xibin; Luo, Fengji; Qian, Ying; Ranzi, Gianluca

    2016-01-01

    With the rapid development of ICT and Web technologies, a large an amount of information is becoming available and this is producing, in some instances, a condition of information overload. Under these conditions, it is difficult for a person to locate and access useful information for making decisions. To address this problem, there are information filtering systems, such as the personalized recommendation system (PRS) considered in this paper, that assist a person in identifying possible products or services of interest based on his/her preferences. Among available approaches, collaborative Filtering (CF) is one of the most widely used recommendation techniques. However, CF has some limitations, e.g., the relatively simple similarity calculation, cold start problem, etc. In this context, this paper presents a new regression model based on the support vector machine (SVM) classification and an improved PSO (IPSO) for the development of an electronic movie PRS. In its implementation, a SVM classification model is first established to obtain a preliminary movie recommendation list based on which a SVM regression model is applied to predict movies' ratings. The proposed PRS not only considers the movie's content information but also integrates the users' demographic and behavioral information to better capture the users' interests and preferences. The efficiency of the proposed method is verified by a series of experiments based on the MovieLens benchmark data set.

  3. Security for decentralized health information systems.

    Science.gov (United States)

    Bleumer, G

    1994-02-01

    Health care information systems must reflect at least two basic characteristics of the health care community: the increasing mobility of patients and the personal liability of everyone giving medical treatment. Open distributed information systems bear the potential to reflect these requirements. But the market for open information systems and operating systems hardly provides secure products today. This 'missing link' is approached by the prototype SECURE Talk that provides secure transmission and archiving of files on top of an existing operating system. Its services may be utilized by existing medical applications. SECURE Talk demonstrates secure communication utilizing only standard hardware. Its message is that cryptography (and in particular asymmetric cryptography) is practical for many medical applications even if implemented in software. All mechanisms are software implemented in order to be executable on standard-hardware. One can investigate more or less decentralized forms of public key management and the performance of many different cryptographic mechanisms. That of, e.g. hybrid encryption and decryption (RSA+DES-PCBC) is about 300 kbit/s. That of signing and verifying is approximately the same using RSA with a DES hash function. The internal speed, without disk accesses etc., is about 1.1 Mbit/s. (Apple Quadra 950 (MC 68040, 33 MHz, RAM: 20 MB, 80 ns. Length of RSA modulus is 512 bit).

  4. Personalized E-Learning System Using Item Response Theory

    Science.gov (United States)

    Chih-Ming, Chen; Lee, Hahn-Ming; Chen, Ya-Hui

    2005-01-01

    Personalized service is important on the Internet, especially in Web-based learning. Generally, most personalized systems consider learner preferences, interests, and browsing behaviors in providing personalized services. However, learner ability usually is neglected as an important factor in implementing personalization mechanisms. Besides, too…

  5. Critical connections: personal learning environments and information literacy

    Directory of Open Access Journals (Sweden)

    Alison Hicks

    2015-01-01

    Full Text Available Personal learning environments (PLEs and critical information literacies (CILs are two concepts that have been presented as responses to the challenges of the rich and complex information landscape. While both approaches support learners’ critical engagement with new information environments, each was developed within a different field. This paper connects and contrasts PLEs and CILs in order to explore the design of pedagogical responses to the information environment. Through a careful examination of PLE and CIL literature, the paper demonstrates that information literacy education intersects with the concepts and goals of PLEs. As such, the authors suggest that PLE scholarship informed by CIL scholarship, and vice versa, will yield a deeper understanding of modern learning contexts as well as a more holistic and responsive learner framework. The example of the research assignment will be used to demonstrate the viability of this approach. With these propositions, the authors invite educators, librarians and information technologists to engage in a dialogue about these concepts and the potential for pedagogical change.

  6. Informing the Design of Direct-to-Consumer Interactive Personal Genomics Reports.

    Science.gov (United States)

    Shaer, Orit; Nov, Oded; Okerlund, Johanna; Balestra, Martina; Stowell, Elizabeth; Ascher, Laura; Bi, Joanna; Schlenker, Claire; Ball, Madeleine

    2015-06-12

    In recent years, people who sought direct-to-consumer genetic testing services have been increasingly confronted with an unprecedented amount of personal genomic information, which influences their decisions, emotional state, and well-being. However, these users of direct-to-consumer genetic services, who vary in their education and interests, frequently have little relevant experience or tools for understanding, reasoning about, and interacting with their personal genomic data. Online interactive techniques can play a central role in making personal genomic data useful for these users. We sought to (1) identify the needs of diverse users as they make sense of their personal genomic data, (2) consequently develop effective interactive visualizations of genomic trait data to address these users' needs, and (3) evaluate the effectiveness of the developed visualizations in facilitating comprehension. The first two user studies, conducted with 63 volunteers in the Personal Genome Project and with 36 personal genomic users who participated in a design workshop, respectively, employed surveys and interviews to identify the needs and expectations of diverse users. Building on the two initial studies, the third study was conducted with 730 Amazon Mechanical Turk users and employed a controlled experimental design to examine the effectiveness of different design interventions on user comprehension. The first two studies identified searching, comparing, sharing, and organizing data as fundamental to users' understanding of personal genomic data. The third study demonstrated that interactive and visual design interventions could improve the understandability of personal genomic reports for consumers. In particular, results showed that a new interactive bubble chart visualization designed for the study resulted in the highest comprehension scores, as well as the highest perceived comprehension scores. These scores were significantly higher than scores received using the

  7. The data and system Nikkei Telecom "Industry/Technology Information Service"

    Science.gov (United States)

    Kurata, Shizuya; Sueyoshi, Yukio

    Nihoh Keizai Shimbun started supplying "Industry/Technology Information Service" from July 1989 as a part of Nikkei Telecom Package, which is online information service using personal computers for its terminals. Previously Nikkei's database service mainly covered such areas as economy, corporations and markets. On the other hand, the new "Industry/Technology Information Service" (main data covers industry by industry information-semi macro) is attracting a good deal of attention as it is the first to supply science and technology related database which has not been touched before. Moreover it is attracting attention technically as it has an access by gateway system to JOIS which is the first class science technology file in Japan. This report introduces data and system of "Industry/Technology Information Service" briefly.

  8. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data

    Directory of Open Access Journals (Sweden)

    Eduard J. Beck

    2016-11-01

    Full Text Available Background: As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV. The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The

  9. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    Science.gov (United States)

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV . The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs like

  10. The personal health record paradox: health care professionals' perspectives and the information ecology of personal health record systems in organizational and clinical settings.

    Science.gov (United States)

    Nazi, Kim M

    2013-04-04

    Despite significant consumer interest and anticipated benefits, overall adoption of personal health records (PHRs) remains relatively low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications for health care professionals and organizational delivery systems; however, these have received less attention. An exclusive focus on the PHR as a tool for consumer empowerment does not adequately take into account the social and organizational context of health care delivery, and the reciprocal nature of patient engagement. The purpose of this study was to examine the experiences of physicians, nurses, and pharmacists at the Department of Veterans Affairs (VA) using an organizationally sponsored PHR to develop insights into the interaction of technology and processes of health care delivery. The conceptual framework for the study draws on an information ecology perspective, which recognizes that a vibrant dynamic exists among technologies, people, practices, and values, accounting for both the values and norms of the participants and the practices of the local setting. The study explores the experiences and perspectives of VA health care professionals related to patient use of the My HealtheVet PHR portal and secure messaging systems. In-depth interviews were conducted with 30 VA health care professionals engaged in providing direct patient care who self-reported that they had experiences with at least 1 of 4 PHR features. Interviews were transcribed, coded, and analyzed to identify inductive themes. Organizational documents and artifacts were reviewed and analyzed to trace the trajectory of secure messaging implementation as part of the VA Patient Aligned Care Team (PACT) model. Study findings revealed a variety of factors that have facilitated or inhibited PHR adoption, use, and endorsement of patient use by health care professionals. Health care professionals' accounts and analysis of organizational

  11. Knowledge-based personalized search engine for the Web-based Human Musculoskeletal System Resources (HMSR) in biomechanics.

    Science.gov (United States)

    Dao, Tien Tuan; Hoang, Tuan Nha; Ta, Xuan Hien; Tho, Marie Christine Ho Ba

    2013-02-01

    Human musculoskeletal system resources of the human body are valuable for the learning and medical purposes. Internet-based information from conventional search engines such as Google or Yahoo cannot response to the need of useful, accurate, reliable and good-quality human musculoskeletal resources related to medical processes, pathological knowledge and practical expertise. In this present work, an advanced knowledge-based personalized search engine was developed. Our search engine was based on a client-server multi-layer multi-agent architecture and the principle of semantic web services to acquire dynamically accurate and reliable HMSR information by a semantic processing and visualization approach. A security-enhanced mechanism was applied to protect the medical information. A multi-agent crawler was implemented to develop a content-based database of HMSR information. A new semantic-based PageRank score with related mathematical formulas were also defined and implemented. As the results, semantic web service descriptions were presented in OWL, WSDL and OWL-S formats. Operational scenarios with related web-based interfaces for personal computers and mobile devices were presented and analyzed. Functional comparison between our knowledge-based search engine, a conventional search engine and a semantic search engine showed the originality and the robustness of our knowledge-based personalized search engine. In fact, our knowledge-based personalized search engine allows different users such as orthopedic patient and experts or healthcare system managers or medical students to access remotely into useful, accurate, reliable and good-quality HMSR information for their learning and medical purposes. Copyright © 2012 Elsevier Inc. All rights reserved.

  12. Personal Digital Information Archiving among Students of Social Sciences and Humanities

    Science.gov (United States)

    Krtalic, Maja; Marcetic, Hana; Micunovic, Milijana

    2016-01-01

    Introduction: As both academic citizens and active participants in information society who use information, students produce huge amounts of personal digital data and documents. It is therefore important to raise questions about their awareness, responsibility, tendencies and activities they undertake to preserve their collective digital heritage.…

  13. Achievement report on research and development of medical and welfare equipment technology. Multimedia system for disabled persons; Iryo fukushi kiki gijutsu kenkyu kaihatsu seika hokokusho. Shogaisha taio multimedia system

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-11-01

    Research and development is conducted of a multimedia system to enable visually handicapped persons to use application programs on a GUI (graphic user interface)-based computer. This 1994-1998 project aims to complete a total system on the basis of the three element technologies of a non-visual GUI access system, a 3-dimensional sound field-aided information display system, and an optical medium reader. In relation to the non-visual GUI access system, a dialogue type sound/touch display using a touch/sound device is developed to deal with the structure and layout information about objects on the screen. The 3-dimensional sound field-aided information display system presents layout information such as the arrangement and shapes of GUI parts, and is subject to operation by mouse-aided non-visual direct pointing. The optical medium reader is almost complete, which enables a visually handicapped person to take in information and to access its contents. (NEDO)

  14. Consumer Adoption of Personal Health Record Systems: A Self-Determination Theory Perspective.

    Science.gov (United States)

    Assadi, Vahid; Hassanein, Khaled

    2017-07-27

    Personal Health Records (PHR) systems provide individuals with access and control over their health information and consequently can support individuals in becoming active participants, rather than passive recipients, in their own care process. In spite of numerous benefits suggested for consumers' utilizing PHR systems, research has shown that such systems are not yet widely adopted or well known to consumers. Bearing in mind the potential benefits of PHRs to consumers and their potential interest in these systems-and that similar to any other type of information system, adoption is a prerequisite for realizing the potential benefits of PHR systems-research is needed to understand how to enhance the adoption rates for PHR systems. This research seeks to understand how individuals' intentions to adopt PHR systems are affected by their self-determination in managing their own health-the extent of their ability to take an active role in managing their own health. As such, this research aims to develop and empirically validate a theoretical model that explains PHR systems adoption by the general public through the integration of theories from the information systems and psychology literatures. This research employs a cross-sectional survey method targeted at the Canadian general public without any prior experience in using PHR systems. A partial least squares approach to structural equation modeling was used to validate the proposed research model of this study (N=159). Individuals with higher levels of ability to manage their own health (self-determination) are more likely to adopt PHR systems since they have more positive perceptions regarding the use of such systems. Further, such self-determination is fueled by autonomy support from consumers' physicians as well as the consumers' personality trait of autonomy orientation. This study advances our theoretical understanding of PHR systems adoption. It also contributes to practice by providing insightful implications

  15. Toward patient-centered, personalized and personal decision support and knowledge management: a survey.

    Science.gov (United States)

    Leong, T-Y

    2012-01-01

    This paper summarizes the recent trends and highlights the challenges and opportunities in decision support and knowledge management for patient-centered, personalized, and personal health care. The discussions are based on a broad survey of related references, focusing on the most recent publications. Major advances are examined in the areas of i) shared decision making paradigms, ii) continuity of care infrastructures and architectures, iii) human factors and system design approaches, iv) knowledge management innovations, and v) practical deployment and change considerations. Many important initiatives, projects, and plans with promising results have been identified. The common themes focus on supporting the individual patients who are playing an increasing central role in their own care decision processes. New collaborative decision making paradigms and information infrastructures are required to ensure effective continuity of care. Human factors and usability are crucial for the successful development and deployment of the relevant systems, tools, and aids. Advances in personalized medicine can be achieved through integrating genomic, phenotypic and other biological, individual, and population level information, and gaining useful insights from building and analyzing biological and other models at multiple levels of abstraction. Therefore, new Information and Communication Technologies and evaluation approaches are needed to effectively manage the scale and complexity of biomedical and health information, and adapt to the changing nature of clinical decision support. Recent research in decision support and knowledge management combines heterogeneous information and personal data to provide cost-effective, calibrated, personalized support in shared decision making at the point of care. Current and emerging efforts concentrate on developing or extending conventional paradigms, techniques, systems, and architectures for the new predictive, preemptive, and

  16. Transfer of information from personal health records: a survey of veterans using My HealtheVet.

    Science.gov (United States)

    Turvey, Carolyn L; Zulman, Donna M; Nazi, Kim M; Wakefield, Bonnie J; Woods, Susan S; Hogan, Timothy P; Weaver, Frances M; McInnes, Keith

    2012-03-01

    Personal health records provide patients with ownership of their health information and allow them to share information with multiple healthcare providers. However, the usefulness of these records relies on patients understanding and using their records appropriately. My HealtheVet is a Web-based patient portal containing a personal health record administered by the Veterans Health Administration. The goal of this study was to explore veterans' interest and use of My HealtheVet to transfer and share information as well as to identify opportunities to increase veteran use of the My HealtheVet functions. Two waves of data were collected in 2010 through an American Customer Satisfaction Index Web-based survey. A random sample of veterans using My HealtheVet was invited to participate in the survey conducted on the My HealtheVet portal through a Web-based pop-up browser window. Wave One results (n=25,898) found that 41% of veterans reported printing information, 21% reported saving information electronically, and only 4% ever sent information from My HealtheVet to another person. In Wave Two (n=18,471), 30% reported self-entering medication information, with 18% sharing this information with their Veterans Affairs (VA) provider and 9.6% sharing with their non-VA provider. Although veterans are transferring important medical information from their personal health records, increased education and awareness are needed to increase use. Personal health records have the potential to improve continuity of care. However, more research is needed on both the barriers to adoption as well as the actual impact on patient health outcomes and well-being.

  17. 76 FR 12712 - Announcing Draft Federal Information Processing Standard (FIPS) 201-2, Personal Identity...

    Science.gov (United States)

    2011-03-08

    ...-02] Announcing Draft Federal Information Processing Standard (FIPS) 201-2, Personal Identity..., ``Personal Identity Verification of Federal Employees and Contractors Standard.'' Draft FIPS 201-2 amends... Issuing Personal Identity Verification Cards under HSPD-12.'' The purpose of this change is to update the...

  18. AQUIS: An air quality and permit information management system

    Energy Technology Data Exchange (ETDEWEB)

    Smith, A.E.; Huber, C.C.; Tschanz, J. (Argonne National Lab., IL (USA)); Ryckman, S.J. Jr. (Air Force Logistics Command, Wright-Patterson AFB, OH (USA))

    1991-01-01

    The Air Quality Utility Information System (AQUIS) is a data base management system that operates on a dedicated, IBM-compatible personal computer using dBASE IV. AQUIS is in operation at six of the seven US Air Force Logistics Command (AFLC) bases to assist with the management of the source inventory, permit tracking, and the estimating and tracking of emissions. The system also provides environmental management personnel with information on regulatory requirements and other compliance information. An AFLC base can have over 500 regulated or unregulated emission sources, and the task of tracking and correlating emissions, sources, and permits is substantial. AQUIS is a comprehensive management tool that provides a single system for storing and accessing information previously available only in multiple, uncorrelated files. This paper discusses the development of the system and provides an overview of the system structure and the relationship of that structure to sources in the field. Certain features such as the linking capability and compound-specific emissions are highlighted. The experience of environmental managers, the ultimate system users, is discussed, including specific ways in which AQUIS has proven useful in responding to managers' needs for air quality information. 10 refs., 3 figs., 1 tab.

  19. Privacy Protection in Personal Health Information and Shared Care Records

    Directory of Open Access Journals (Sweden)

    Roderick L B Neame

    2014-03-01

    Full Text Available Background The protection of personal information privacy has become one of the most pressing security concerns for record keepers. Many institutions have yet to implement the essential infrastructure for data privacy protection and patient control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring has led to the imposition of increasingly significant monetary penalties for failures to protect privacy. Objective  There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information.  This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy.  This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing.Requirements for Privacy  There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers to keep patient information confidential and to share it only with the authorisation of the patient.  To achieve this information storage and retrieval, and communication systems must be appropriately configured. Patients may consult clinicians anywhere and at any time: therefore their data must be available for recipient-driven retrieval under patient control and kept private. 

  20. Personal Web home pages of adolescents with cancer: self-presentation, information dissemination, and interpersonal connection.

    Science.gov (United States)

    Suzuki, Lalita K; Beale, Ivan L

    2006-01-01

    The content of personal Web home pages created by adolescents with cancer is a new source of information about this population of potential benefit to oncology nurses and psychologists. Individual Internet elements found on 21 home pages created by youths with cancer (14-22 years old) were rated for cancer-related self-presentation, information dissemination, and interpersonal connection. Examples of adolescents' online narratives were also recorded. Adolescents with cancer used various Internet elements on their home pages for cancer-related self-presentation (eg, welcome messages, essays, personal history and diary pages, news articles, and poetry), information dissemination (e.g., through personal interest pages, multimedia presentations, lists, charts, and hyperlinks), and interpersonal connection (eg, guestbook entries). Results suggest that various elements found on personal home pages are being used by a limited number of young patients with cancer for self-expression, information access, and contact with peers.

  1. Perspectives of health and self-care among older persons-To be implemented in an interactive information and communication technology-platform.

    Science.gov (United States)

    Göransson, Carina; Wengström, Yvonne; Ziegert, Kristina; Langius-Eklöf, Ann; Eriksson, Irene; Kihlgren, Annica; Blomberg, Karin

    2017-12-01

    To acquire knowledge regarding the contents to be implemented in an interactive information and communication technology-platform perceived to be relevant to health and self-care among older persons based on the literature, healthcare professionals and the older persons themselves. The growing ageing population places demands on the healthcare system to promote healthy ageing and to strengthen the older person's self-care ability. This requires innovative approaches to facilitate communication between the older person and healthcare professionals, and to increase the older person's participation in their care. An information and communication technology-platform could be used for this purpose, but the content needs to be relevant to both the older persons and the healthcare professionals. Descriptive qualitative design. This study was based on three samplings: a scoping review of the literature (n = 20 articles), interviews with healthcare professionals (n = 5) and a secondary analysis of interviews with older persons (n = 8) and nursing assistants (n = 7). The data were analysed using qualitative content analysis. Four areas were identified to be of relevance to older persons' perceived health: frame of mind, having relationships and social activities, physical ability and concerns, and maintaining self-care. Self-care was described in the literature and by the healthcare professionals more than by the older persons. The results show a concordance in the data samplings that give a clear indication of the areas relevant to older persons' health and self-care that can be integrated in an interactive information and communication technology-platform for use in regular daily care assessments. Descriptions of self-care were limited indicating a possible gap in knowledge that requires further research. Areas relevant to older persons' health and self-care could be used for regular assessment to support and promote healthy ageing. © 2017 John Wiley & Sons Ltd.

  2. Interacting with a personal wearable device

    NARCIS (Netherlands)

    Haan, de G.; Wright, P.; Hollnagel, E.; Dekker, S.

    2000-01-01

    Comris is a research project that aims to create a wearable assistant, "the parrot", for conference and workshop visitors. A personal interest profile and an active badge system enable agents in a virtual information space to provide context-sensitive information about interesting persons and events

  3. Design and implementation of website information disclosure assessment system.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2015-01-01

    Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail address and network database leakages. These leakages have many causes. For example, malicious users can steal database contents, taking advantage of mistakes made by programmers and administrators. In order to mitigate this type of abuse, a website information disclosure assessment system is proposed in this study. This system utilizes a series of technologies, such as web crawler algorithms, SQL injection attack detection, and web vulnerability mining, to assess a website's information disclosure. Thirty websites, randomly sampled from the top 50 world colleges, were used to collect leakage information. This testing showed the importance of increasing the security and privacy of website information for academic websites.

  4. Design and implementation of website information disclosure assessment system.

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    Full Text Available Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail address and network database leakages. These leakages have many causes. For example, malicious users can steal database contents, taking advantage of mistakes made by programmers and administrators. In order to mitigate this type of abuse, a website information disclosure assessment system is proposed in this study. This system utilizes a series of technologies, such as web crawler algorithms, SQL injection attack detection, and web vulnerability mining, to assess a website's information disclosure. Thirty websites, randomly sampled from the top 50 world colleges, were used to collect leakage information. This testing showed the importance of increasing the security and privacy of website information for academic websites.

  5. Geographical Information Systems (GIS); Sistemas de Informacion Geografica

    Energy Technology Data Exchange (ETDEWEB)

    Garcia Santiago, P.A. [Inisel Espacio, Madrid (Spain)

    1994-12-31

    Geographical Information Systems (GIS) have converted in a computer`s tool that due of its great versatility, exceeds of its usage as Basic Cartography Manager. The best GIS to use (vector or raster) will depend on the type of data we work with, we should keep in mind that the use of a specific GIS does not mean total incompatibility with others GIS. Future tendencies in this field aim to Data Storage Optimization and to Shared Operating System between Workstations and Personal computers. (Author)

  6. Information impact on transportation systems

    NARCIS (Netherlands)

    Litescu, S.; Viswanathan, V.; Lees, M.; Knoll, A.; Aydt, H.

    2015-01-01

    With a broader distribution of personal smart devices and with an increasing availability of advanced navigation tools, more drivers can have access to real time information regarding the traffic situation. Our research focuses on determining how using the real time information about a

  7. Effectiveness of a personalized ventilation system in reducing personal exposure against directly released simulated cough droplets.

    Science.gov (United States)

    Pantelic, J; Tham, K W; Licina, D

    2015-12-01

    The inhalation intake fraction was used as an indicator to compare effects of desktop personalized ventilation and mixing ventilation on personal exposure to directly released simulated cough droplets. A cough machine was used to simulate cough release from the front, back, and side of a thermal manikin at distances between 1 and 4 m. Cough droplet concentration was measured with an aerosol spectrometer in the breathing zone of a thermal manikin. Particle image velocimetry was used to characterize the velocity field in the breathing zone. Desktop personalized ventilation substantially reduced the inhalation intake fraction compared to mixing ventilation for all investigated distances and orientations of the cough release. The results point out that the orientation between the cough source and the breathing zone of the exposed occupant is an important factor that substantially influences exposure. Exposure to cough droplets was reduced with increasing distance between cough source and exposed occupant. The results from this study show that an advanced air distribution system such as personalized ventilation reduces exposure to cough-released droplets better than commonly applied overhead mixing ventilation. This work can inform HVAC engineers about different aspects of air distribution systems’ performance and can serve as an aid in making critical design decisions. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  8. Rebuilding and the private cloud of the hospital information system by the virtualization technology.

    Science.gov (United States)

    Yamashita, Yoshinori; Ogaito, Tatoku

    2013-01-01

    In our hospital, we managed an electronic health record system and many section subsystems as a hospital information system. By the expansion of these information systems, a system becomes complicated, and maintenance and operative cost increased. Furthermore, the environment that is available to medical information is demanded anywhere anytime by expansion of the computerization. However, the expansion of the information use becomes necessary for the expansion such as the personal protection of information for security. We became rebuilding and the private cloud of the hospital information system by the virtualization technology to solve such a problem. As a result, we were able to perform a decrease in number of the servers which constituted a system, a decrease in network traffic, reduction of the operative cost.

  9. Employers' Statutory Vicarious Liability in Terms of the Protection of Personal Information Act

    Directory of Open Access Journals (Sweden)

    Daleen Millard

    2016-07-01

    Full Text Available A person whose privacy has been infringed upon through the unlawful, culpable processing of his or her personal information can sue the infringer's employer based on vicarious liability or institute action based on the Protection of Personal Information Act 4 of 2013 (POPI. Section 99(1 of POPI provides a person (a "data subject" whose privacy has been infringed upon with the right to institute a civil action against the responsible party. POPI defines the responsible party as the person who determines the purpose of and means for the processing of the personal information of data subjects. Although POPI does not equate a responsible party to an employer, the term "responsible party" is undoubtedly a synonym for "employer" in this context. By holding an employer accountable for its employees' unlawful processing of a data subject's personal information, POPI creates a form of statutory vicarious liability. Since the defences available to an employer at common law and developed by case law differ from the statutory defences available to an employer in terms of POPI, it is necessary to compare the impact this new statute has on employers. From a risk perspective, employers must be aware of the serious implications of POPI. The question that arises is whether the Act perhaps takes matters too far. This article takes a critical look at the statutory defences available to an employer in vindication of a vicarious liability action brought by a data subject in terms of section 99(1 of POPI. It compares the defences found in section 99(2 of POPI and the common-law defences available to an employer fending off a delictual claim founded on the doctrine of vicarious liability. To support the argument that the statutory vicarious liability created by POPI is too harsh, the defences contained in section 99(2 of POPI are further analogised with those available to an employer in terms of section 60(4 of the Employment Equity Act 55 of 1998 (EEA and other

  10. Wilderness Management... A Computerized System for Summarizing Permit Information

    Science.gov (United States)

    Gary H. Elsner

    1972-01-01

    Permits were first needed for visits to wilderness areas in California during summer 1971. A computerized system for analyzing these permits and summarizing information from them has been developed. It produces four types of summary tables: point-of-origin of visitors; daily variation in total number of persons present; variations in group size; and variations in...

  11. A SYSTEM APPROACH TO ORGANISING PROTECTION FROM TARGETED INFORMATION IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Marina V. Tumbinskaya

    2017-01-01

    Full Text Available Abstract. Objectives The aim of the study is to formalise a generalised algorithm for the distribution of targeted information in social networks, serving as the basis for a methodology for increasing personal information security. Method The research is based on the methodology of protection from unwanted information distributed across social network systems. Results The article presents the formalisation of an algorithm for the distribution of targeted information across social networks: input and output parameters are defined and the algorithm’s internal conditions are described, consisting of parameters for implementing attack scenarios, which variation would allow them to be detailed. A technique for protection from targeted information distributed across social networks is proposed, allowing the level of protection of personal data and information of social networks users to be enhanced, as well as the reliability of information increased. Conclusion The results of the research will help to prevent threats to information security, counteract attacks by intruders who often use methods of competitive intelligence and social engineering through the use of countermeasures. A model for protection against targeted information and implement special software for its integration into online social network social information systems is developed. The system approach will allow external monitoring of events in social networks to be carried out and vulnerabilities identified in the mechanisms of instant messaging, which provide opportunities for attacks by intruders. The results of the research make it possible to apply a network approach to the study of informal communities, which are actively developing today, at a new level. 

  12. AQUIS: A PC-based air quality and permit information system

    International Nuclear Information System (INIS)

    Smith, A.E.; Huber, C.C.; Tschanz, J.; Ryckman, J.S. Jr.

    1992-01-01

    The Air Quality Utility Information System (AQUIS) was developed to calculate and track emissions, permits, and related information. The system runs on IBM-compatible personal computers using dBASE IV. AQUIS tracks more than 900 data items distributed among various source categories and allows the user to enter specific information on permit control devices, stacks, and related regulatory requirements. The system is currently operating at seven US Air Force Materiel Command facilities, large industrial operations involved in the repair and maintenance of aircraft. Environmental management personnel are responsible for the compliance status of as many as l,000 sources at each facility. The usefulness of the system has been enhanced by providing a flexible reporting capability that permits users who are unfamiliar with database structure to design and prepare reports containing specified information. In addition to the standard six pollutants, AQUIS calculates compound-specific emissions and allows users to enter their own emission estimates. This capability will be useful in developing air toxics inventories and control plans

  13. Web-based audiovisual patient information system--a study of preoperative patient information in a neurosurgical department.

    Science.gov (United States)

    Gautschi, Oliver P; Stienen, Martin N; Hermann, Christel; Cadosch, Dieter; Fournier, Jean-Yves; Hildebrandt, Gerhard

    2010-08-01

    In the current climate of increasing awareness, patients are demanding more knowledge about forthcoming operations. The patient information accounts for a considerable part of the physician's daily clinical routine. Unfortunately, only a small percentage of the information is understood by the patient after solely verbal elucidation. To optimise information delivery, different auxiliary materials are used. In a prospective study, 52 consecutive stationary patients, scheduled for an elective lumbar disc operation were asked to use a web-based audiovisual patient information system. A combination of pictures, text, tone and video about the planned surgical intervention is installed on a tablet personal computer presented the day before surgery. All patients were asked to complete a questionnaire. Eighty-four percent of all participants found that the audiovisual patient information system lead to a better understanding of the forthcoming operation. Eighty-two percent found that the information system was a very helpful preparation before the pre-surgical interview with the surgeon. Ninety percent of all participants considered it meaningful to provide this kind of preoperative education also to patients planned to undergo other surgical interventions. Eighty-four percent were altogether "very content" with the audiovisual patient information system and 86% would recommend the system to others. This new approach of patient information had a positive impact on patient education as is evident from high satisfaction scores. Because patient satisfaction with the informed consent process and understanding of the presented information improved substantially, the audiovisual patient information system clearly benefits both surgeons and patients.

  14. Real-time personal exposure and health condition monitoring system

    Energy Technology Data Exchange (ETDEWEB)

    Saitou, Isamu; Kanda, Hiroaki; Asai, Akio; Takeishi, Naoki; Ota, Yoshito [Hitachi Aloka Medical, Ltd., Measuring Systems Engineering Dept., Tokyo (Japan); Hanawa, Nobuhiro; Ueda, Hisao; Kusunoki, Tsuyoshi; Ishitsuka, Etsuo; Kawamura, Hiroshi [Japan Atomic Energy Agency, Oarai Research and Development Center, Oarai, Ibaraki (Japan)

    2012-03-15

    JAEA (Japan Atomic Energy Agency) and HAM (Hitachi Aloka Medical, Ltd) have proposed novel monitoring system for workers of nuclear facility. In these facilities, exposure management for workers is mainly used access control and personal exposure recordings. This system is currently only for reports management but is not confirmative for surveillance when work in progress. Therefore, JAEA and HAM integrate access control and personal exposure recordings and two real-time monitoring systems which are position sensing and vital sign monitor. Furthermore change personal exposure management to real-time management, this system integration prevents workers from risk of accidents, and makes possible take appropriate action quickly. This novel system is going to start for tentative operation, using position sensing and real-time personal dosimeter with database in Apr. 2012. (author)

  15. Multi channel analyzer system addible to personal computer

    International Nuclear Information System (INIS)

    Ramirez J, F.J.; Garcia R, R.; Ramirez N, R.; Torres B, M.A.

    1996-01-01

    It has been developed a Multichannel analyzer system which was added to personal computer of 4096 channels for its use, in nuclear radiations matters, such as X-ray fluorescence analysis, Neutron activation analysis, etc. in that is interesting to know the radiation energy distribution. This system has three modules; a Digital analogical converter of 12 bits, fast (total conversion time of 6 μ s) that use a successive approximation technique with linearity correction by the gliding rule method. A digital card with microprocessor that is useful as an interface with the computer for the acquisition, data storage and the process control. A computer program with extensive use of graphics, friendly with the user in order to facilitate its utilization, also with the option to find peaks, an expansion of an interesting area, information storage in compatible format with spectra analysis programs, etc. Twenty five units of this system have been constructed which all of they were distributed to the ARCAL Member countries and the other 10 units were distributed in the National Institute of Nuclear Research. On the other hand, it has been able to find other applications where the information can be converted to pulses and the interest variable is represented by the pulse amplitude. (Author)

  16. Big data privacy: The datafication of personal information

    DEFF Research Database (Denmark)

    Mai, Jens-Erik

    2016-01-01

    . This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information......In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model......—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy...

  17. An XML-based framework for personalized health management.

    Science.gov (United States)

    Lee, Hiye-Ja; Park, Seung-Hun; Jeong, Byeong-Soo

    2006-01-01

    This paper proposes a framework for personalized health management. In this framework, XML technology is used for representing and managing the health information and knowledge. Major components of the framework are Health Management Prescription (HMP) Expert System and Health Information Repository. The HMP Expert System generates a HMP efficiently by using XML-based templates. Health Information Repository provides integrated health information and knowledge for personalized health management by using XML and relational database together.

  18. Managerial information system of the organization of the services

    Directory of Open Access Journals (Sweden)

    Miroslav Brožek

    2007-01-01

    Full Text Available The aim of this work is creation conception proposal of information system. It is processed on the example of the firm making business on the czech market in the area of selling personal car of premium segment. On the basic of analysis external and internal environment was discovered a need of application of the new information communication technologies (ICT and related reengineering changes. Submitted model ICT contains account modul, instore modul, servis modul, sales modul, special software of car company and modul e-commerce. Within the framework conception proposal of ICT arised modular arrangement of new environment to new built strategy, thereby this approach is new by classic concept, where exist strategy of firm and management of firm and to them is added as accelerating instrument of these processes information systems.

  19. An Intelligent System Prototype to support and sharing diagnoses of maligned tumours, based on personalized medicine philosophy

    Directory of Open Access Journals (Sweden)

    Víctor Manuel Flores Fonseca

    2016-12-01

    Full Text Available Circulatory systems diseases are one of the most important causes of death in Chilean population according to a report presented by the Chilean National Bureau of Statistics (INE. Undoubtedly, these sad numbers arise an opportunity to analyse ways to improve this situation. Personalized Medicine is a new approach used to adapt standard medical treatments to individual characteristics of patients. Currently, several kinds of personalized-medicine software applications are building using Artificial Intelligent techniques and supported by techniques as Cloud Computing and Big Data. This architecture provides complex and varied information access, such as clinical data, genome data, patients’ treatment or drugs information, among others. This document describes a proposal to produce a method for generating and sharing medical information, particularly of maligned tumors in Chile. The prototype will be developed within the framework of the personalized medicine.

  20. The effect of information systems on supply chain and performance ...

    African Journals Online (AJOL)

    The effect of information systems on supply chain and performance of National Iranian South Oil Company (NISOC) ... Sample population of this research is made up of nisoc's managers and experts that are more than 2043 persons.By applying the cochrane's formula,the sample population of this research determined as ...

  1. Opinions of the well-informed persons about the nuclear reactor facility periodical inspection

    International Nuclear Information System (INIS)

    Aeba, Yoichi; Ishikawa, Michio; Enomoto, Toshiaki; Oomori, Katsuyoshi

    2005-01-01

    Falsifications of self-inspection records in the shrouds and of leakage rates for containment vessels at TEPCO nuclear power plants destroyed public trust in nuclear safety. The Nuclear Reactor Regulation Law and Electric Utility Law were amended to enhance the nuclear safety regulation system. The major improvements are that operators are legally required to conduct inspection (periodical operator inspection) and recording and keeping inspection results. The operator performs 'periodical operator inspection' regularly, and Nuclear and Industrial Safety Agency (NISA) performs periodical inspection' about particularly important facilities/function in safety. Sixteen opinions of well-informed persons about the nuclear reactor facility periodical inspection were presented in this special number. Interval of periodical inspection less than thirteen months was disputed. Maintenance activities should be more rationalized based on risk information. (T. Tanaka)

  2. Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information

    OpenAIRE

    Labitzke , Sebastian

    2011-01-01

    Part 4: Privacy and Transparency in the Age of Cloud Computing; International audience; The risk involved when users publish information, which becomes available to an unintentional broad audience via online social networks is evident. It is especially difficult for users of social networks to determine who will get the information before it is shared. Moreover, it is impossible to monitor data flows or to control the access to personal data after sharing the information. In contrast to enter...

  3. Primary Emotional Systems and Personality: An Evolutionary Perspective

    Science.gov (United States)

    Montag, Christian; Panksepp, Jaak

    2017-01-01

    The present article highlights important concepts of personality including stability issues from the perspective of situational demands and stability over the life-course. Following this more introductory section, we argue why individual differences in primary emotional systems may represent the phylogenetically oldest parts of human personality. Our argumentation leads to the need to increasingly consider individual differences in the raw affects/emotions of people to understand human personality in a bottom–up fashion, which can be coordinated with top–down perspectives. In support of this idea, we also review existing evidence linking individual differences in primal emotions as assessed with the Affective Neuroscience Personality Scales and the widely accepted Big Five Model of Personality. In this context, we provide additional evidence on the link between primal emotions and personality in German and Chinese sample populations. In short, this article addresses evolutionary perspectives in the evaluation of human personality, highlighting some of the ancestral emotional urges that probably still control variations in the construction of human personality structures. Moreover, we address how individual differences in primary emotional systems can illuminate linkages to major human psychopathologies and the potential advantages and disadvantages of carrying a certain personality trait within certain cultural/environmental niches. PMID:28443039

  4. Primary Emotional Systems and Personality: An Evolutionary Perspective.

    Science.gov (United States)

    Montag, Christian; Panksepp, Jaak

    2017-01-01

    The present article highlights important concepts of personality including stability issues from the perspective of situational demands and stability over the life-course. Following this more introductory section, we argue why individual differences in primary emotional systems may represent the phylogenetically oldest parts of human personality. Our argumentation leads to the need to increasingly consider individual differences in the raw affects/emotions of people to understand human personality in a bottom-up fashion, which can be coordinated with top-down perspectives. In support of this idea, we also review existing evidence linking individual differences in primal emotions as assessed with the Affective Neuroscience Personality Scales and the widely accepted Big Five Model of Personality. In this context, we provide additional evidence on the link between primal emotions and personality in German and Chinese sample populations. In short, this article addresses evolutionary perspectives in the evaluation of human personality, highlighting some of the ancestral emotional urges that probably still control variations in the construction of human personality structures. Moreover, we address how individual differences in primary emotional systems can illuminate linkages to major human psychopathologies and the potential advantages and disadvantages of carrying a certain personality trait within certain cultural/environmental niches.

  5. E-learning systems intelligent techniques for personalization

    CERN Document Server

    Klašnja-Milićević, Aleksandra; Ivanović, Mirjana; Budimac, Zoran; Jain, Lakhmi C

    2017-01-01

    This monograph provides a comprehensive research review of intelligent techniques for personalisation of e-learning systems. Special emphasis is given to intelligent tutoring systems as a particular class of e-learning systems, which support and improve the learning and teaching of domain-specific knowledge. A new approach to perform effective personalization based on Semantic web technologies achieved in a tutoring system is presented. This approach incorporates a recommender system based on collaborative tagging techniques that adapts to the interests and level of students' knowledge. These innovations are important contributions of this monograph. Theoretical models and techniques are illustrated on a real personalised tutoring system for teaching Java programming language. The monograph is directed to, students and researchers interested in the e-learning and personalization techniques. .

  6. Glass badge dosimetry system for large scale personal monitoring

    International Nuclear Information System (INIS)

    Norimichi Juto

    2002-01-01

    Glass Badge using silver activated phosphate glass dosemeter was specially developed for large scale personal monitoring. And dosimetry systems such as an automatic leader and a dose equipment calculation algorithm were developed at once to achieve reasonable personal monitoring. In large scale personal monitoring, both of precision for dosimetry and confidence for lot of personal data handling become very important. The silver activated phosphate glass dosemeter has basically excellent characteristics for dosimetry such as homogeneous and stable sensitivity, negligible fading and so on. Glass Badge was designed to measure 10 keV - 10 MeV range of photon. 300 keV - 3 MeV range of beta, and 0.025 eV - 15 MeV range of neutron by included SSNTD. And developed Glass Badge dosimetry system has not only these basic characteristics but also lot of features to keep good precision for dosimetry and data handling. In this presentation, features of Glass Badge dosimetry systems and examples for practical personal monitoring systems will be presented. (Author)

  7. 38 CFR 74.25 - What types of personally identifiable information will VA collect?

    Science.gov (United States)

    2010-07-01

    ... DEPARTMENT OF VETERANS AFFAIRS (CONTINUED) VETERANS SMALL BUSINESS REGULATIONS Records Management § 74.25 What types of personally identifiable information will VA collect? In order to establish owner... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false What types of personally...

  8. Development of 3-D Radiosurgery Planning System Using IBM Personal Computer

    International Nuclear Information System (INIS)

    Suh, Tae Suk; Park, Charn Il; Ha, Sung Whan; Kang, Wee Saing; Suh, Doug Young; Park, Sung Hun

    1993-01-01

    Recently, stereotactic radiosurgery plan is required with the information of 3-D image and dose distribution. A project has been doing if developing LINAC based stereotactic radiosurgery since April 1991. The purpose of this research is to develop 3-D radiosurgery planning system using personal computer. The procedure of this research is based on two steps. The first step is to develop 3-D localization system, which input the image information of the patient, coordinate transformation, the position and shape of target, and patient contour into computer system using CT image and stereotactic frame. The second step is to develop 3-D dose planning system, which compute dose distribution on image plane, display on high resolution monitor both isodose distribution and patient image simultaneously and develop menu-driven planning system. This prototype of radiosurgery planning system was applied recently for several clinical cases. It was shown that our planning system is fast, accurate and efficient while making it possible to handle various kinds of image modalities such as angiography, CT and MRI. It makes it possible to develop general 3-D planning system using beam eye view or CT simulation in radiation therapy in future

  9. Designing for Underserved Populations: Constraints and Requirements of Personal Health Record Systems

    Centers for Disease Control (CDC) Podcasts

    2009-02-11

    In this podcast, Dr. Thomas Horan discusses how language, literacy, and access barriers can be overcome with electronic Personal Health Record (PHR) systems to improve health among the most vulnerable, isolated, and underserved populations.  Created: 2/11/2009 by Coordinating Center for Health Information Service (CCHIS), Healthy Healthcare Settings Goal Team, Office of Strategy and Innovation.   Date Released: 9/2/2009.

  10. PC-based Multiple Information System Interface (PC/MISI) detailed design and implementation plan

    Science.gov (United States)

    Dominick, Wayne D. (Editor); Hall, Philip P.

    1985-01-01

    The design plan for the personal computer multiple information system interface (PC/MISI) project is discussed. The document is intended to be used as a blueprint for the implementation of the system. Each component is described in the detail necessary to allow programmers to implement the system. A description of the system data flow and system file structures is given.

  11. Personal health record systems and their security protection.

    Science.gov (United States)

    Win, Khin Than; Susilo, Willy; Mu, Yi

    2006-08-01

    The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.

  12. Data Systems vs. Information Systems

    OpenAIRE

    Amatayakul, Margret K.

    1982-01-01

    This paper examines the current status of “hospital information systems” with respect to the distinction between data systems and information systems. It is proposed that the systems currently existing are incomplete data dystems resulting in ineffective information systems.

  13. Sticking with the nice guy: trait warmth information impairs learning and modulates person perception brain network activity.

    Science.gov (United States)

    Lee, Victoria K; Harris, Lasana T

    2014-12-01

    Social learning requires inferring social information about another person, as well as evaluating outcomes. Previous research shows that prior social information biases decision making and reduces reliance on striatal activity during learning (Delgado, Frank, & Phelps, Nature Neuroscience 8 (11): 1611-1618, 2005). A rich literature in social psychology on person perception demonstrates that people spontaneously infer social information when viewing another person (Fiske & Taylor, 2013) and engage a network of brain regions, including the medial prefrontal cortex, temporal parietal junction, superior temporal sulcus, and precuneus (Amodio & Frith, Nature Reviews Neuroscience, 7(4), 268-277, 2006; Haxby, Gobbini, & Montgomery, 2004; van Overwalle Human Brain Mapping, 30, 829-858, 2009). We investigate the role of these brain regions during social learning about well-established dimensions of person perception-trait warmth and trait competence. We test the hypothesis that activity in person perception brain regions interacts with learning structures during social learning. Participants play an investment game where they must choose an agent to invest on their behalf. This choice is guided by cues signaling trait warmth or trait competence based on framing of monetary returns. Trait warmth information impairs learning about human but not computer agents, while trait competence information produces similar learning rates for human and computer agents. We see increased activation to warmth information about human agents in person perception brain regions. Interestingly, activity in person perception brain regions during the decision phase negatively predicts activity in the striatum during feedback for trait competence inferences about humans. These results suggest that social learning may engage additional processing within person perception brain regions that hampers learning in economic contexts.

  14. Information Needs of Family Caregivers of Persons with Cognitive versus Physical Deficits

    Science.gov (United States)

    Koenig, Kelly N.; Steiner, Victoria; Pierce, Linda L.

    2011-01-01

    This study compared information needs of caregivers of persons with dementia with caregivers of those who received rehabilitation treatment. Caregivers were provided a 48-item survey and asked to choose their top ten information needs. Dementia caregivers' (n = 33) top needs were dealing with forgetfulness/confusion (91%) and repeating…

  15. Comparing the validity of informant and self-reports of personality using laboratory indices of emotional responding as criterion variables.

    Science.gov (United States)

    Lieberman, Lynne; Liu, Huiting; Huggins, Ashley A; Katz, Andrea C; Zvolensky, Michael J; Shankman, Stewart A

    2016-09-01

    Personality traits relate to risk for psychopathology and can inform predictions about treatment outcome. In an effort to obtain a comprehensive index of personality, informant reports of personality are sometimes obtained in addition to self-reports of personality. However, there is limited research comparing the validity of self- and informant reports of personality, particularly among those with internalizing psychopathology. This is important given that informants may provide an additional (and perhaps different) perspective on individuals' personality. The present study therefore compared how both reports of positive affectivity (PA) and negative affectivity (NA) relate to psychophysiological and subjective measures of emotional responding to positive and negative stimuli. Given that our sample (n = 117) included individuals with no history of psychopathology, as well as individuals with major depressive disorder (MDD) and/or panic disorder (PD), we were also able to explore whether these internalizing diagnoses moderated the association between personality reports and measures of emotional responding. Informant-reported PA predicted physiological responses to positive stimuli (but not negative). Informant-reported NA predicted physiological responses to negative stimuli (but not positive). Self-reported personality did not predict physiological responding, but did predict subjectively measured emotional responding (NA for negative responding, PA for positive responding). Diagnoses of internalizing psychopathology (PD or MDD) did not moderate these associations. Results suggest self- and informant reports of personality may each provide valid indices of an individual's emotional response tendencies, but predict different aspects of those tendencies. © 2016 Society for Psychophysiological Research.

  16. Comparing the Validity of Informant- and Self-reports of Personality Using Laboratory Indices of Emotional Responding as Criterion Variables

    Science.gov (United States)

    Lieberman, Lynne; Liu, Huiting; Huggins, Ashley A.; Katz, Andrea C.; Zvolensky, Michael J.; Shankman, Stewart A.

    2016-01-01

    Personality traits relate to risk for psychopathology and can inform predictions about treatment outcome. In an effort to obtain a comprehensive index of personality, informant-reports of personality are sometimes obtained in addition to self-reports of personality. However, there is limited research comparing the validity of self- and informant-reports of personality, particularly among those with internalizing psychopathology. This is important given that informants may provide an additional (and perhaps different) perspective on individuals’ personality. The present study therefore compared how both reports of positive affectivity (PA) and negative affectivity (NA) relate to psychophysiological and subjective measures of emotional responding to positive and negative stimuli. Given that our sample (n = 117) included individuals with no history of psychopathology, as well as individuals with major depressive disorder (MDD) and/or panic disorder (PD), we were also able to explore whether these internalizing diagnoses moderated the association between personality reports and measures of emotional responding. Informant-reported PA predicted physiological responses to positive stimuli (but not negative). Informant reported NA predicted physiological responses to negative stimuli (but not positive). Self-reported personality did not predict physiological responding, but did predict subjectively measured emotional responding (NA for negative responding; PA for positive responding). Diagnoses of internalizing psychopathology (PD or MDD) did not moderate these associations. Results suggest self- and informant-reports of personality may each provide valid indices of an individual’s emotional response tendencies, but predict different aspects of those tendencies. PMID:27273802

  17. Personality in a group living species : social information, collective movements and social decision-making

    NARCIS (Netherlands)

    Kurvers, R.H.J.M.

    2011-01-01

    Animals need to make constant decisions throughout their lives and to make optimal decisions individuals rely on information. Information can be obtained in two distinct ways: personal or social information. The current paradigm in the information theory use in animal ecology assumes that the

  18. Liquid Effluent Monitoring Information System test plans release 1.2

    International Nuclear Information System (INIS)

    Adams, R.T.

    1994-01-01

    The Liquid Effluent Monitoring Information System (LEMIS) is being developed as the organized information repository facility in support of the liquid effluent monitoring requirements of the Tri-Party Agreement. It is necessary to provide an automated repository into which the results from liquid effluent sampling will be placed. This repository must provide for effective retention, review, and retrieval of selected sample data by authorized persons and organizations. This System Architecture document is the aggregation of the DMR P+ methodology project management deliverables. Together they represent a description of the project and its plan through four Releases, corresponding to the definition and prioritization of requirements defined by the user

  19. Provocation to Learn - A Study in the Use of Personal Response Systems in Information Literacy Instruction

    Directory of Open Access Journals (Sweden)

    Maura Alicia Matesic

    2008-06-01

    Full Text Available The appearance of Personal Response Systems (PRS or “clickers” in universityclassrooms has opened an avenue for new forms of communication betweeninstructors and students in large-enrolment classes. Because it allows instructorsto pose questions and receive tabulated responses from students in real-time,proponents of this technology herald it as an innovative means for encouraginghigher levels of participation, fostering student engagement, and streamlining theassessment process. Having already been experimentally deployed acrossdisciplines ranging from business to the arts and sciences, it is also beginning tobe used in the context of information literacy instruction. In this project weemployed the technology not to transfer actual skills, but to advertise theexistence of online library guides, promote the use of the library within thecontext of the course itself, and “provoke” students to adopt a more activeapproach to research as a recursive process. Our findings suggest that studentsadapt easily to the use of this technology and feel democratically empowered torespond to their instructors in a variety of ways that include anonymous clickerresponses as well as more traditional means such as the raising of hands andposing questions verbally. The particular value of this study was to show thatthese broader findings seem equally applicable to pedagogical settings in whichlearning objectives are built around and integrated with the principles ofinformation literacy.

  20. Real-time personal dose monitoring and management system

    International Nuclear Information System (INIS)

    Zhang Zhiyong; Cheng Chang; Yang Huating; Liu Zhengshan; Deng Changming; Li Mei

    2000-01-01

    This paper mainly describes a real-time personal dose monitoring and management system. The system is composed of three parts that include SDM-98 semiconductor detector personal dosimeters, Data Readers and a Management System Software. It can be used for personal dose monitoring and management and other controlling actions in a radioactive controlled area. Adopting semiconductor detector and microcontroller, SDM-98 Personal Dosimeter is used to measure personal accumulated dose equivalent and dose rate caused by X-ray and Gamma ray. The results can be read directly on LCD. All the data stored in dosimeter can be transmitted into a data reader by infrared optical link. The alarm threshold can be adjusted successively in whole range of dose or dose rate. The Data Reader is an intelligent interface between the dosimeter and master computer. The data received from dosimeter will be sent to a master computer through RS-232 serial interface. According to the master computer's order, the Data Reader can turn on the dosimeter's power at entrance and shutdown it at exit. The Management System Software which written by Visual BASIC 5.0 runs on MS Win95. All the measuring data from dosimeters can be analyzed and treated according to requirements and stored in database. Therefore, some figures and tables relative to dose or rate can be shown on screen or printed out. (author)

  1. Personalized nanomedicine

    NARCIS (Netherlands)

    Lammers, Twan Gerardus Gertudis Maria; Rizzo, L.Y.; Storm, Gerrit; Kiessling, F.

    2012-01-01

    Abstract Personalized medicine aims to individualize chemotherapeutic interventions on the basis of ex vivo and in vivo information on patient- and disease-specific characteristics. By noninvasively visualizing how well image-guided nanomedicines-that is, submicrometer-sized drug delivery systems

  2. Intergovernmental cooperation for mission-oriented information systems: a memoir

    Energy Technology Data Exchange (ETDEWEB)

    Woolston, John E.

    2004-12-01

    This frankly personal account is based on my involvement in negotiations, design, and development for international bibliographic systems to support three different missions: fostering the peaceful uses of atomic energy (International Nuclear Information System, or INIS); supporting research, development, and better practices in agriculture (International Information System for the Agricultural Sciences and Technology, or AGRIS); and improving economic and social conditions in poorer countries (Development Sciences Information System, or DEVSIS). All three designs were based on the concept of decentralized operation: each country reports the information produced in its own territory; the merging of this input and the overall management are in the hands of an organization in the United Nations system; and all participants have equal rights to exploit the entire database. INIS began in 1970 and is still in steady operation; AGRIS started in 1975 and showed quantitative and qualitative growth for more than twenty years but has been in disastrous decline since its peak in 1996; and DEVSIS, unfortunately, was not launched on a global scale. Attempts are made to identify the condition -- political and technical -- likely to favor or frustrate efforts to obtain cooperation among countries for the construction of large, essentially comprehensive databases and ultimately for sharing knowledge without discrimination between rich and poor participants.

  3. Intergovernmental cooperation for mission-oriented information systems: a memoir

    International Nuclear Information System (INIS)

    Woolston, John E.

    2004-01-01

    This frankly personal account is based on my involvement in negotiations, design, and development for international bibliographic systems to support three different missions: fostering the peaceful uses of atomic energy (International Nuclear Information System, or INIS); supporting research, development, and better practices in agriculture (International Information System for the Agricultural Sciences and Technology, or AGRIS); and improving economic and social conditions in poorer countries (Development Sciences Information System, or DEVSIS). All three designs were based on the concept of decentralized operation: each country reports the information produced in its own territory; the merging of this input and the overall management are in the hands of an organization in the United Nations system; and all participants have equal rights to exploit the entire database. INIS began in 1970 and is still in steady operation; AGRIS started in 1975 and showed quantitative and qualitative growth for more than twenty years but has been in disastrous decline since its peak in 1996; and DEVSIS, unfortunately, was not launched on a global scale. Attempts are made to identify the condition -- political and technical -- likely to favor or frustrate efforts to obtain cooperation among countries for the construction of large, essentially comprehensive databases and ultimately for sharing knowledge without discrimination between rich and poor participants

  4. Designing information systems

    CERN Document Server

    Blethyn, Stanley G

    2014-01-01

    Designing Information Systems focuses on the processes, methodologies, and approaches involved in designing information systems. The book first describes systems, management and control, and how to design information systems. Discussions focus on documents produced from the functional construction function, users, operators, analysts, programmers and others, process management and control, levels of management, open systems, design of management information systems, and business system description, partitioning, and leveling. The text then takes a look at functional specification and functiona

  5. The SISERI system: an information system for occupational dosimetry registration

    International Nuclear Information System (INIS)

    Scanff, P.; Crescini, D.; Vial, E.

    2013-01-01

    The SISERI information system was developed and brought into use in order to meet a workplace health objective aimed at reducing and controlling exposure of workers to ionising radiation in France. Dosimetric monitoring of workers in France annually concerns 280.000 people who are exposed to ionising radiation as part of their work. This system centralizes, verifies and preserves all dosimetric data relating to each worker in accordance with the confidentiality required by the personal nature of this information. The SISERI data are made available to occupational doctors and experts in radiation protection to assist them in monitoring exposure of workers. The data are also intended for statistical processing with the aim of optimizing radiation protection for workers. They may also be used for epidemiological studies. The system has been gradually developed since it came into service in February 2005 and is now operating normally so that it is possible to guarantee that all doses received by each worker, anywhere on French territory, are recorded. If this system can be extended outside French borders it will be easier to monitor workers who have to travel to different European countries. The slides of the presentation have been added at the end of the paper. (authors)

  6. Inpatient satisfaction and usage patterns of personalized smart bedside station system for patient-centered service at a tertiary university hospital.

    Science.gov (United States)

    Ryu, Borim; Kim, Seok; Lee, Kee-Hyuck; Hwang, Hee; Yoo, Sooyoung

    2016-11-01

    Bedside stations, also known as bedside terminals, are in place to enhance the quality and experience of a hospital's healthcare service delivery. The purpose of this study was to identify information needs and overall satisfaction with the personalized patient bedside system, called Smart Bedside Station (SBS) system, embedded in a tertiary general university hospital. End-user responses on the satisfaction survey and system usage logs of the SBS system were collected and analyzed. For the user opinion survey, 156 nurses and 1914 patients, their family members, or caregivers participated during the evaluation period of 2013 to 2014 in this study. All working nurses in the SBS-installed ward were answered the paper-based evaluation, for complete enumeration survey. Inpatients were voluntary participated to deliver the online questionnaire on the SBS menu. We also explored system log data including page calls and usage time from December 2013 to 2015. Regarding the relationship of overall satisfaction of the SBS with patient's characteristics, patient's education status and degree of familiarity with the smart device were statistically significant. From the analysis of system logs, Personalized My Menu(28.0%) was the most frequently used menu item (except for TV and Internet entertainment service use of 62.7%),it provides individual health information, such as laboratory test results, hospital fee check, message logs, daily medication information, and meal information. Next frequently used menus were information support(4.9%) which deliver hospital guide and health information and convenience service ordering(4.4%) such as meal order, bed sheet change. Satisfaction survey results and log data results show that the personalized service enhances the user satisfaction during hospital admission. Our post-implementation experience and subsequent assessment of SBS system is capable of providing insights into improving the hospital information system and service contents

  7. How older persons structure information in the decision to seek medical care

    Directory of Open Access Journals (Sweden)

    Peter J. Veazie

    2014-10-01

    Full Text Available Typical models of the decision to seek care consider information as a single conceptual object. This paper presents an alternative that allows multiple objects. For older persons seeking care, results support this alternative. Older decision-makers that segregate information into multiple conceptual objects assessed separately are characterized by socio-demographic (younger age, racial category, non-Hispanic, higher education, higher income, and not married, health status (better general health for men and worse general health for women, fewer known illnesses, and neuropsychological (less memory loss for men, trouble concentrating and trouble making decisions for men factors. Results of this study support the conclusion that older persons are more likely to integrate information, and individuals with identifiable characteristics are more likely to do so than others. The theory tested in this study implies a potential explanation for misutilization of care (either over or under-utilization.

  8. Informed consent in direct-to-consumer personal genome testing: the outline of a model between specific and generic consent.

    Science.gov (United States)

    Bunnik, Eline M; Janssens, A Cecile J W; Schermer, Maartje H N

    2014-09-01

    Broad genome-wide testing is increasingly finding its way to the public through the online direct-to-consumer marketing of so-called personal genome tests. Personal genome tests estimate genetic susceptibilities to multiple diseases and other phenotypic traits simultaneously. Providers commonly make use of Terms of Service agreements rather than informed consent procedures. However, to protect consumers from the potential physical, psychological and social harms associated with personal genome testing and to promote autonomous decision-making with regard to the testing offer, we argue that current practices of information provision are insufficient and that there is a place--and a need--for informed consent in personal genome testing, also when it is offered commercially. The increasing quantity, complexity and diversity of most testing offers, however, pose challenges for information provision and informed consent. Both specific and generic models for informed consent fail to meet its moral aims when applied to personal genome testing. Consumers should be enabled to know the limitations, risks and implications of personal genome testing and should be given control over the genetic information they do or do not wish to obtain. We present the outline of a new model for informed consent which can meet both the norm of providing sufficient information and the norm of providing understandable information. The model can be used for personal genome testing, but will also be applicable to other, future forms of broad genetic testing or screening in commercial and clinical settings. © 2012 John Wiley & Sons Ltd.

  9. System of data management in 'Dosis' personal dosimetry

    International Nuclear Information System (INIS)

    Manzano de Armas, Jose; Diaz Bernal, Efren; Capote Ferrera, Eduardo; Molina Perez, Daniel; Lopez Bejerano, Gladys

    2001-01-01

    The storage and control of the data of a service of personal dosimetry is a task that requires specify care in data handling and manipulation. This activity becomes more annoying of making manually when the volume of users of the service is significant. The External Dosimetric Laboratory of the Center for Radiation Protection and Hygiene has developed a system of administration of data that allows the storage, control and analysis of the data generated by the Service of Personal Dosimetry in an efficient and reliable way. This paper describes the characteristics of the System for Administration of Data in Personal Dosimetry 'Dosis', as well as their design and programming. The importance of this System for the laboratory and the advantages of their application are described. The characteristics of the different modules are also described. (author)

  10. [Measures to prevent patient identification errors in blood collection/physiological function testing utilizing a laboratory information system].

    Science.gov (United States)

    Shimazu, Chisato; Hoshino, Satoshi; Furukawa, Taiji

    2013-08-01

    We constructed an integrated personal identification workflow chart using both bar code reading and an all in-one laboratory information system. The information system not only handles test data but also the information needed for patient guidance in the laboratory department. The reception terminals at the entrance, displays for patient guidance and patient identification tools at blood-sampling booths are all controlled by the information system. The number of patient identification errors was greatly reduced by the system. However, identification errors have not been abolished in the ultrasound department. After re-evaluation of the patient identification process in this department, we recognized that the major reason for the errors came from excessive identification workflow. Ordinarily, an ultrasound test requires patient identification 3 times, because 3 different systems are required during the entire test process, i.e. ultrasound modality system, laboratory information system and a system for producing reports. We are trying to connect the 3 different systems to develop a one-time identification workflow, but it is not a simple task and has not been completed yet. Utilization of the laboratory information system is effective, but is not yet perfect for patient identification. The most fundamental procedure for patient identification is to ask a person's name even today. Everyday checks in the ordinary workflow and everyone's participation in safety-management activity are important for the prevention of patient identification errors.

  11. Sharing and helping: predictors of adolescents' willingness to share diabetes personal health information with peers.

    Science.gov (United States)

    Vaala, Sarah E; Lee, Joyce M; Hood, Korey K; Mulvaney, Shelagh A

    2018-02-01

    Sharing personal information about type 1 diabetes (T1D) can help adolescents obtain social support, enhance social learning, and improve self-care. Diabetes technologies, online communities, and health interventions increasingly feature data-sharing components. This study examines factors underlying adolescents' willingness to share personal T1D information with peers. Participants were 134 adolescents (12-17 years of age; 56% female) who completed an online survey regarding experiences helping others with T1D, perceived social resources, beliefs about the value of sharing information and helping others, and willingness to share T1D information. Hemoglobin A1c values were obtained from medical records. Adolescents were more willing to share how they accomplished T1D tasks than how often they completed them, and least willing to share glucose control status. In multivariate analyses, sharing/helping beliefs (β = 0.26, P value; β = -0.26, P personal health information. Glucose control moderated relationships such that adolescents with worse A1c values had stronger relationships between sharing/helping beliefs and willingness to share (β = 0.18, P personal health information, particularly if they have better diabetes health status and a stronger belief in the benefits of sharing. Social learning and social media components may improve intervention participation, engagement, and outcomes by boosting adolescents' beliefs about the benefits of sharing information and helping others. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  12. Mortality of persons deprived of liberty in the penal system

    Directory of Open Access Journals (Sweden)

    Jovanić Goran

    2016-01-01

    Full Text Available The main aim of this research is to determine the scope, dynamics, and structure of deaths of persons deprived of their liberty who resided in the penal system due to custody, security measures, serving a prison sentence or an alternative sanction, with regard to their demographic, criminological, penal, and psychological characteristics. Article 111, paragraph b of the United Nations Rules for the Protection of Juveniles Deprived of their Liberty (1990 determines that deprivation of liberty refers to any kind of detention, imprisonment, i.e. placement in a public or private institution which the imprisoned person cannot leave, by order of judicial, administrative or other public authority. The data used included information on persons deprived of their liberty who died in the territory of the Republic of Serbia in the period from 2008 to 2012. The data was obtained from The Directorate for Execution of Criminal Sanctions of the Ministry of Justice of the Republic of Serbia. In the past, researches mainly focused on violence in prisons, death penalty, prison riots, auto-aggressive behavior, i.e. certain forms of mortality such as a suicide. This paper aims to point out the characteristics of deaths which occur while persons deprived of their liberty are under the authority of judicial institutions, both before and after passing a criminal sanction.

  13. Online retrieval of patient information by asynchronous communication between general purpose computer and stand-alone personal computer

    International Nuclear Information System (INIS)

    Tsutsumi, Reiko; Takahashi, Kazuei; Sato, Toshiko; Komatani, Akio; Yamaguchi, Koichi

    1988-01-01

    Asynchronous communication was made between host (FACOM M-340) and personal computer (OLIBETTIE S-2250) to get patient's information required for RIA test registration. The retrieval system consists of a keyboad input of six numeric codes, patient's ID, and a real time reply containing six parameters for the patient. Their identified parameters are patient's name, sex, date of birth (include area), department, and out- or inpatient. Linking this program to RIA registration program for individual patient, then, operator can input name of RIA test requested. Our simple retrieval program made a useful data network between different types of host and stand-alone personal computers, and enabled us accurate and labor-saving registration for RIA test. (author)

  14. The Information Technology Infrastructure for the Translational Genomics Core and the Partners Biobank at Partners Personalized Medicine

    Directory of Open Access Journals (Sweden)

    Natalie Boutin

    2016-01-01

    Full Text Available The Biobank and Translational Genomics core at Partners Personalized Medicine requires robust software and hardware. This Information Technology (IT infrastructure enables the storage and transfer of large amounts of data, drives efficiencies in the laboratory, maintains data integrity from the time of consent to the time that genomic data is distributed for research, and enables the management of complex genetic data. Here, we describe the functional components of the research IT infrastructure at Partners Personalized Medicine and how they integrate with existing clinical and research systems, review some of the ways in which this IT infrastructure maintains data integrity and security, and discuss some of the challenges inherent to building and maintaining such infrastructure.

  15. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Science.gov (United States)

    2010-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as defined in section 85...

  16. BNL ALARA Center experience with an information exchange system on dose control at nuclear power plants

    International Nuclear Information System (INIS)

    Baum, J.W.; Khan, T.A.

    1992-01-01

    The essential elements of an international information exchange system on dose control at nuclear power plants are summarized. Information was collected from literature abstracting services, by attending technical meetings, by circulating data collection forms, and through personal contacts. Data are assembled in various databases and periodically disseminated to several hundred interested participants through a variety of publications and at technical meetings. Immediate on-line access to the data is available to participants with modems, commercially available communications software, and a password that is provided by the Brookhaven National Laboratory (BNL) ALARA Center to authorized users of the system. Since January 1992, rapid access also has been provided to persons with fax machines. Some information is available for ''polling'' the BNL system at any time, and other data can be installed for polling on request. Most information disseminated to data has been through publications; however, new protocols, simplified by the ALARA Center staff, and the convenience of fax machines are likely to make the earlier availability of information through these mechanisms increasingly important

  17. Information system fur the management of a regulatory programme

    International Nuclear Information System (INIS)

    Ortiz, P.; Mrabit, K.; Miaw, S.

    1998-01-01

    A Regulatory Programme to monitor safety of activities involving radiation sources, implies the existence of a Regulatory Authority empowered by legislation to issue radiation protection regulations and to monitor compliance with those regulations. The core element of the programme is a system of notification and authorization (registration and licensing), inspection and enforcement. The efficiency of this system is largely dependent on the availability of reliable information on the inventory of radiation sources and installations, the administrative status of the facilities (authorization), prompt processing of inspection reports and follow up of regulatory actions, including monitoring deadlines. Essential data relevant to safety, such as personal dosimetry for occupationally exposed individuals, inspection findings and incident reports would provide, in addition, an insight on the overall safety of the country. A simple but comprehensive Regulatory Authority Information System (RAIS) linked to the authorization and inspection process will largely facilitate regulatory decisions and actions. A readily available and reliable information from the various regulatory activities will facilitate planning, optimization of resources, monitoring safety related data, disseminating safety information, making decisions and follow up regulatory actions including monitoring dead lines. The implementation of the system in more than 50 countries will contribute to experience exchange and harmonization of regulatory activities. (author)

  18. Incorporating popularity in a personalized news recommender system

    Directory of Open Access Journals (Sweden)

    Nirmal Jonnalagedda

    2016-06-01

    Full Text Available Online news reading has become a widely popular way to read news articles from news sources around the globe. With the enormous amount of news articles available, users are easily overwhelmed by information of little interest to them. News recommender systems help users manage this flood by recommending articles based on user interests rather than presenting articles in order of their occurrence. We present our research on developing personalized news recommendation system with the help of a popular micro-blogging service, “Twitter.” News articles are ranked based on the popularity of the article identified from Twitter’s public timeline. In addition, users construct profiles based on their interests and news articles are also ranked based on their match to the user profile. By integrating these two approaches, we present a hybrid news recommendation model that recommends interesting news articles to the user based on their popularity as well as their relevance to the user profile.

  19. Interactional Features of Repair Negotiation in NS-NNS Interaction on Two Task Types: Information Gap and Personal Information Exchange

    Science.gov (United States)

    Kitajima, Ryu

    2013-01-01

    The studies in task-based approaches in second language acquisition claim that controlled and goal convergent tasks such as information gap tasks surpass open-ended conversations such as personal information exchange tasks for the development of the learner's interlanguage, in that the formers promote more repair negotiation. And yet, few studies…

  20. Micro Information Systems

    DEFF Research Database (Denmark)

    Ulslev Pedersen, Rasmus; Kühn Pedersen, Mogens

    2014-01-01

    such as medical and manufacturing. These new sensor applications have implications for information systems (IS) and, the authors visualize this new class of information systems as fractals growing from an established class of systems; namely that of information systems (IS). The identified applications...... and implications are used as an empirical basis for creating a model for these small new information systems. Such sensor systems are called embedded systems in the technical sciences, and the authors want to couple it with general IS. They call the merger of these two important research areas (IS and embedded...... systems) for micro information systems (micro-IS). It is intended as a new research field within IS research. An initial framework model is established, which seeks to capture both the possibilities and constraints of this new paradigm, while looking simultaneously at the fundamental IS and ICT aspects...

  1. 41 CFR 102-38.335 - Is there any additional personal property sales information that we must submit to the General...

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Is there any additional personal property sales information that we must submit to the General Services Administration? 102-38.335 Section 102-38.335 Public Contracts and Property Management Federal Property Management Regulations System...

  2. Challenges and opportunities of using recommender systems for personalized health education.

    Science.gov (United States)

    Fernandez-Luque, Luis; Karlsen, Randi; Vognild, Lars K

    2009-01-01

    The use of computers in health education started more than a decade ago, mainly for tailoring health educational resources. Nowadays, many of the computer-tailoring health education systems are using the Internet for delivering different types of health education. Traditionally, these systems are designed for a specific health problem, with a predefined library of educational resources. These systems do not take advantage of the increasing amount of educational resources available on the Internet. One of the reasons is that the high availability of content is making it more difficult to find the relevant one. The problem of information overload has been addressed for many years in the field of recommender systems. This paper is focused on the challenges and opportunities of merging recommender systems with personalized health education. It also discusses the usage of social networks and semantic technologies within this approach.

  3. Privacy protection for personal health information and shared care records.

    Science.gov (United States)

    Neame, Roderick L B

    2014-01-01

    The protection of personal information privacy has become one of the most pressing security concerns for record keepers: this will become more onerous with the introduction of the European General Data Protection Regulation (GDPR) in mid-2014. Many institutions, both large and small, have yet to implement the essential infrastructure for data privacy protection and patient consent and control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring, has led to the imposition of increasingly significant monetary penalties for failure to protect privacy: these too are set to become more onerous under the GDPR, increasing to a maximum of 2% of annual turnover. There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information. This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy. This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing. REQUIREMENTS FOR PRIVACY: There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers) to keep patient information confidential and to share it only with the authorisation of the patient. To achieve this information storage and retrieval, communication systems must be appropriately configured. There are many components of this, which are discussed in this paper. Patients may consult clinicians anywhere and at any time: therefore, their data must be available for recipient-driven retrieval (i.e. like the World Wide Web) under patient control and kept private: a method for delivering this is outlined.

  4. 78 FR 53478 - Proposed Information Collection; United States Park Police Personal History Statement

    Science.gov (United States)

    2013-08-29

    ...] Proposed Information Collection; United States Park Police Personal History Statement AGENCY: National Park... about this IC, contact Major Scott Fear, United States Park Police, 1100 Ohio Drive SW., Washington, DC... INFORMATION: I. Abstract The United States Park Police (USPP) is a unit of the National Park Service...

  5. 29 CFR 1915.159 - Personal fall arrest systems (PFAS).

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Personal fall arrest systems (PFAS). 1915.159 Section 1915... Protective Equipment (PPE) § 1915.159 Personal fall arrest systems (PFAS). The criteria of this section apply to PFAS and their use. Effective January 1, 1998, body belts and non-locking snaphooks are not...

  6. Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2012-01-01

    Although personal identity information must primarily be used for protecting and promoting the physical needs of individuals, it has also become central to the business models of the digital age due to its use for other secondary purposes, resulting in various innovative identity management (Id...

  7. 34 CFR 361.38 - Protection, use, and release of personal information.

    Science.gov (United States)

    2010-07-01

    ... through appropriate modes of communication of the confidentiality of personal information and the... individual's native language or through the appropriate mode of communication; and (v) These policies and... the record of services, consistent with § 361.47(a)(12). (d) Release for audit, evaluation, and...

  8. Image-based surveillance and security systems using personal computers for device aiming and digital image comparison

    International Nuclear Information System (INIS)

    Quiett, S.; Axtell, L.H.

    1987-01-01

    A detection-type security system using enhanced capability cameras or other imaging devices can aid in maintaining security from long distance and/or for large areas. To do so requires that the imaging device(s) be repeatedly and accurately positioned so that no areas are overlooked. Digital control using personal computers is the simplest method of achieving positional accuracy. The monitoring of large areas and/or a large number of areas also requires that a substantial quantity of visual information be catalogued and evaluated for potential security problems. While security personnel alone are typically used for such monitoring, as the quantity of visual information increases, the likelihood that potential security threats will be missed also increases. The ability of an image-based security system to detect potential security problems can be further increased with the use of selected image processing techniques. Utilizing personal computers for both imaging device position control as well as image processing, surveillance of large areas can be performed by a limited number of individuals with a high level of system confidence

  9. MATHEMATICAL MODEL FOR CALCULATION OF INFORMATION RISKS FOR INFORMATION AND LOGISTICS SYSTEM

    Directory of Open Access Journals (Sweden)

    A. G. Korobeynikov

    2015-05-01

    that risk value under the specified conditions becomes lower than permissible if the demanded time of material resources transportation determined by the customer is more than 50 minutes. This calculation provides additional information for the person making the decision about the offer acceptance or refusal on transportation of material resources to the specified points. Practical significance. Results of work are usable in the fully functional information and logistic systems for calculation of the information risks arising during the transporting or distribution of material resources. It will increase competitiveness of the logistic companies operating in the conditions of the modern market relations.

  10. Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation

    Directory of Open Access Journals (Sweden)

    Hongsong Chen

    2015-01-01

    Full Text Available Human health information from healthcare system can provide important diagnosis data and reference to doctors. However, continuous monitoring and security storage of human health data are challenging personal privacy and big data storage. To build secure and efficient healthcare application, Hadoop-based healthcare security communication system is proposed. In wireless biosensor network, authentication and key transfer should be lightweight. An ECC (Elliptic Curve Cryptography based lightweight digital signature and key transmission method are proposed to provide wireless secure communication in healthcare information system. Sunspot wireless sensor nodes are used to build healthcare secure communication network; wireless nodes and base station are assigned different tasks to achieve secure communication goal in healthcare information system. Mysql database is used to store Sunspot security entity table and measure entity table. Hadoop is used to backup and audit the Sunspot security entity table. Sqoop tool is used to import/export data between Mysql database and HDFS (Hadoop distributed file system. Ganglia is used to monitor and measure the performance of Hadoop cluster. Simulation results show that the Hadoop-based healthcare architecture and wireless security communication method are highly effective to build a wireless healthcare information system.

  11. Liquid Effluent Monitoring Information System (LEMIS) test plans release 1.0

    International Nuclear Information System (INIS)

    Adams, R.T.

    1994-01-01

    The Liquid Effluent Monitoring Information System (LEMIS) is being developed as the organized information repository facility in support of the liquid effluent monitoring requirements of the Tri-Party Agreement. It is necessary to provide an automated repository into which the results from liquid effluent sampling will be placed. This repository must provide for effective retention, review, and retrieval of selected sample data by authorized persons and organizations. This System Architecture document is the aggregation of the DMR P+ methodology project management deliverables. Together they represent a description of the project and its plan through four Releases, corresponding to the definition and prioritization of requirements defined by the user

  12. Liquid Effluent Monitoring Information System (LEMIS) test plans release 1.1

    International Nuclear Information System (INIS)

    Adams, R.T.

    1994-01-01

    The Liquid Effluent Monitoring Information System (LEMIS) is being developed as the organized information repository facility in support of the liquid effluent monitoring requirements of the Tri-Party Agreement. It is necessary to provide an automated repository into which the results from liquid effluent sampling will be placed. This repository must provide for effective retention, review, and retrieval of selected sample data by authorized persons and organizations. This System Architecture document is the aggregation of the DMR P+ methodology project management deliverables. Together they represent a description of the project and its plan through four Releases, corresponding to the definition and prioritization of requirements defined by the user

  13. Robust Query Processing for Personalized Information Access on the Semantic Web

    DEFF Research Database (Denmark)

    Dolog, Peter; Stuckenschmidt, Heiner; Wache, Holger

    and user preferences. We describe a framework for information access that combines query refinement and relaxation in order to provide robust, personalized access to heterogeneous RDF data as well as an implementation in terms of rewriting rules and explain its application in the context of e-learning...

  14. 77 FR 25499 - Notice of Proposed Information Collection: Comment Request; Personal Financial and Credit Statement

    Science.gov (United States)

    2012-04-30

    ... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5607-N-14] Notice of Proposed Information Collection: Comment Request; Personal Financial and Credit Statement AGENCY: Office of the... Proposal: Personal Financial and Credit Statement. OMB Control Number, if applicable: 2502-0001...

  15. Emergency information systems for cars

    Science.gov (United States)

    Thirunavukkarasu, M.; Vani Manasa, N.; Kumar, K. Rajesh; Sundar, S.

    2017-11-01

    The main objective of this work is to create a Health Care monitoring and Guidance system for persons who are travelling in outdoor environments like cars. GSM (Global System for Mobile Communications) and GPS (Global Positioning System) technologies are separately and combined today in many applications in our day to day life. The GSM module will send a message along with the GPS location to the end user through text, and a call is initiated to the user for further instructions. The Global Positioning System (GPS) will give the location of the interested vehicle. This system helps the doctor or anyone to monitor the accident who is outdoor and has less help. This will help the hospital to monitor the accident as well as guide the injured through difficult situations. Using a buzzer, the persons nearby will come to know that the person is in danger or in poor health conditions. This project provides a good two-way communication with the injured and the hospital to assist them to give first aid before an ambulance arrives. So, this paper devices a novel technique to assist the people who just met with accident through GPS and GSM.

  16. Reading interest and information needs of persons with visual impairment in Nigeria

    Directory of Open Access Journals (Sweden)

    ’Niran Adetoro

    2010-01-01

    Full Text Available Information materials can only become usable to persons with visual impairment when they are transcribed into alternative formats. Over time, the transcription and provision of alternative formats in Nigeria by libraries has not been based on users’ reading interest and information needs. This study delves into the reading interests and information needs of persons with visual impairment in Nigeria. Survey research design was adopted and the study purposively focused on southwestern Nigeria. Using stratified proportionate random sampling techniques, data was gathered by questionnaires namely the Visually Impaired Adult Questionnaire VIAQ (= 0.75 and Visually Impaired Student Questionnaire VISQ (= 0.78 from fourteen selected libraries stratified into non-governmental, public, tertiary institutions and secondary schools. Of the 563 copies of the questionnaire that were administered, 401 (71.3% were successfully completed and used for the study. The study found that adults with visual impairment had high reading interests in religious, business, and entertainment materials, among others. Secondary school respondents had high reading interest in art subjects, reference materials, manuals and animal story materials. Both respondents showed high information needs in expected and relevant areas. Braille materials (58.3% are the most preferred source of information generally. Adult respondents preferred Braille (72.4%, while the secondary school respondents preferred Talking books/audio recordings (55%. Transcription and provision of information materials for the visually impaired through libraries should be based on knowledge of their reading interest and information needs.

  17. Integration of radiology and hospital information systems (RIS, HIS) with PACS

    International Nuclear Information System (INIS)

    Mosser, H.; Urban, M.; Hruby, W.; Duerr, M.; Rueger, W.

    1992-01-01

    PACS development has now reached a stage where it can clearly be stated that the technology for storage, networking and display in a fully digital environment is available. This is reflected by an already large and rapidly increasing number of PACS installations in USA, Western Europe and Japan. Such installations consist of a great variety of information systems, more or less interconnected, like PACS, HIS, RIS and other departmental systems, differing in both hardware and software. Various data -even if they only concern one person- are stored in different systems distributed in the hospital. The integration of all digital systems into a functional unit is determined by the radiologist's need of quick access to all relevant information regardless where it is stored. The interconnection and functional integration of all digital systems in the hospital determine the clinical benefits of PACS. This paper describes the radiologist's requirements concerning this integration, and presents some realistic solutions such as the Siemens ISI (Information System Interface), and a mobile viewing station for the wards (visitBox). (author). 9 refs., 4 figs

  18. BIBLIO: A Computer System Designed to Support the Near-Library User Model of Information Retrieval.

    Science.gov (United States)

    Belew, Richard K.; Holland, Maurita Peterson

    1988-01-01

    Description of the development of the Information Exchange Facility, a prototype microcomputer-based personal bibliographic facility, covers software selection, user selection, overview of the system, and evaluation. The plan for an integrated system, BIBLIO, and the future role of libraries are discussed. (eight references) (MES)

  19. INTELLIGENT E-MAIL PERSONALIZATION SYSTEM

    Directory of Open Access Journals (Sweden)

    SHANMUGASUNDARAM HARIHARAN

    2011-02-01

    Full Text Available In Internet era E-mail has become the most important mode of communication in every day life. E-mail offers several advantages like secure delivery, speed, cheaper cost, acknowledgement report, transparent service, and distributed environment. As spammers try to induce large amount of spam or unsolicited mails, managing these E-mails’s in an efficient manner requires huge attention. This paper focus on personalizing the E-mail messages after eliminating the spam messages. The basic step starts with pre-processing the documents and classifying the contents into several folders or categories. The next step is to cluster the documents based on the relativeness they have using cosine similarity metric. This clustering approach is carried out using unsupervised method. The mail messages are the parsed through a filter that would identify the spam immediately. Studies on personalization of mails after spam identification, prioritizing the E-mail’s based on the importance and summarization of were also proposed. The results were quiet promising leading to efficient spam identification providing a platform for further improvements to build a domain independent personalizer system.

  20. An Experimental Comparison of a Co-Design Visualizing Personal Drug Information and Patient Information Leaflets: Usability Aspects.

    Science.gov (United States)

    Khodambashi, Soudabeh; Haugland, Dagrun; Ellingsberg, Anette; Kottum, Hanne; Sund, Janne Kutschera; Nytrø, Øystein

    2017-01-01

    Providing patients with specific information about their own drugs can reduce unintentional misuse and improve compliance. Searching for information is time-consuming when information is not personalized and is written using medical vocabulary that is difficult for patients to understand. In this study we explored patient information needs regarding visualizing of drug information and interrelationships by conducting a total of four co-design workshops with patients, other users and pharmacists. We developed a prototype and drug ontology to support reasoning about drug interactions. We evaluated individual performance in finding information, understanding the drug interactions, and learning from the provided information in the prototype compared to using patient information leaflets (PILs). We concluded that interactive visualization of drug information helps individuals find information about drugs, their side effects and interactions more quickly and correctly compared to using PILs. Our study is limited to co-morbid patients with transient ischaemic attack with several chronic diseases.

  1. Data Entities and Information System Matrix for Integrated Agriculture Information System (IAIS)

    Science.gov (United States)

    Budi Santoso, Halim; Delima, Rosa

    2018-03-01

    Integrated Agriculture Information System is a system that is developed to process data, information, and knowledge in Agriculture sector. Integrated Agriculture Information System brings valuable information for farmers: (1) Fertilizer price; (2) Agriculture technique and practise; (3) Pest management; (4) Cultivation; (5) Irrigation; (6) Post harvest processing; (7) Innovation in agriculture processing. Integrated Agriculture Information System contains 9 subsystems. To bring an integrated information to the user and stakeholder, it needs an integrated database approach. Thus, researchers describes data entity and its matrix relate to subsystem in Integrated Agriculture Information System (IAIS). As a result, there are 47 data entities as entities in single and integrated database.

  2. Determinants of the Intention to Protect Personal Information among Facebook Users

    Directory of Open Access Journals (Sweden)

    Bum Soo Chon

    2018-02-01

    Full Text Available This study aimed to examine predictors of the intention to protect personal information on Facebook. We conducted an online survey of 679 Facebook users in the Republic of Korea. The findings of this study showed that usefulness and ease of use had significant effects on attitudes toward protection behavior. The results also revealed that risk factors (privacy risk severity and vulnerability had significant effects on protective behaviors. Based on our findings, we discussed the information protection of privacy on Facebook.

  3. An Interactive Personalized Recommendation System Using the Hybrid Algorithm Model

    Directory of Open Access Journals (Sweden)

    Yan Guo

    2017-10-01

    Full Text Available With the rapid development of e-commerce, the contradiction between the disorder of business information and customer demand is increasingly prominent. This study aims to make e-commerce shopping more convenient, and avoid information overload, by an interactive personalized recommendation system using the hybrid algorithm model. The proposed model first uses various recommendation algorithms to get a list of original recommendation results. Combined with the customer’s feedback in an interactive manner, it then establishes the weights of corresponding recommendation algorithms. Finally, the synthetic formula of evidence theory is used to fuse the original results to obtain the final recommendation products. The recommendation performance of the proposed method is compared with that of traditional methods. The results of the experimental study through a Taobao online dress shop clearly show that the proposed method increases the efficiency of data mining in the consumer coverage, the consumer discovery accuracy and the recommendation recall. The hybrid recommendation algorithm complements the advantages of the existing recommendation algorithms in data mining. The interactive assigned-weight method meets consumer demand better and solves the problem of information overload. Meanwhile, our study offers important implications for e-commerce platform providers regarding the design of product recommendation systems.

  4. System and carrier for optical images and holographic information recording

    International Nuclear Information System (INIS)

    Andries, A.; Bivol, V.; Iovu, M

    2002-01-01

    The invention relates to the semiconducting silverless photography, in particular to the technique for optical information recording and may be used in microphotography for manifacture of microfiches, microfilms, storage disks, i the multiplication and copying technique, in holography, in micro- and optoelectronics, cinematography etc. The system for optical images and holographic information recording includes an optical exposure system, an information carrier , containing a dielectric substrate with the first electrode, a photosensitive element and the second electrode, arranged in consecutive order, a constant and impulse voltage source, a means for climbing and movement of the information carrier, a control unit for connection of the voltage source to the electroconducting strate, a personal computer, connected to the control unit of the recording modes ,to the exposure system and the information carrier, an electrooptical transparency, connected to the computer by means of the matching unit. The carrier for optical images and holographic information recording contains a dielectric substrate, a photosensitive element formed of a layer of the vitreous chalcogenic semiconductor and a layer of the crystalline or amorphous semiconductor, forming a heterojunction, the photosensitive element is arranged between two electrodes , one of which is made transparent , in such case rge layer of the vitreous chalcogenic semiconductor comes into contact with the superior transparent electrode, subjected to exposure

  5. Overview of the plant risk status information management system

    International Nuclear Information System (INIS)

    Kirchner, J.R.; Campbell, D.J.

    1987-01-01

    The Plant Risk Status Information Management System (PRISIM) is a personal computer program that presents PRA results and related information for use by decision-makers. The program was originally developed for NRC inspectors, but now an expanded version of the program with more potential applications is complete. Prototypes of both versions have been developed for Arkansas Nuclear One - Unit 1, and the inspection-related version is currently being field-tested. Interim results of these field tests are favorable. The PRISIM database contains both pre-processed information that is useful for long-term planning and a plant risk model for assessing the risk implications of the current plant status. The program provides rapid access to specific information by making extensive use of menus. Development of PRISIM programs for Peach Bottom-Unit 2 is underway, and there are plans to create programs for other plants

  6. Semantic Learning Service Personalized

    Directory of Open Access Journals (Sweden)

    Yibo Chen

    2012-02-01

    Full Text Available To provide users with more suitable and personalized service, personalization is widely used in various fields. Current e-Learning systems search for learning resources using information search technology, based on the keywords that selected or inputted by the user. Due to lack of semantic analysis for keywords and exploring the user contexts, the system cannot provide a good learning experiment. In this paper, we defined the concept and characteristic of the personalized learning service, and proposed a semantic learning service personalized framework. Moreover, we made full use of semantic technology, using ontologies to represent the learning contents and user profile, mining and utilizing the friendship and membership of the social relationship to construct the user social relationship profile, and improved the collaboration filtering algorithm to recommend personalized learning resources for users. The results of the empirical evaluation show that the approach is effectiveness in augmenting recommendation.

  7. An overview of the evaluation plan for PC/MISI: PC-based Multiple Information System Interface

    Science.gov (United States)

    Dominick, Wayne D. (Editor); Lim, Bee Lee; Hall, Philip P.

    1985-01-01

    An initial evaluation plan for the personal computer multiple information system interface (PC/MISI) project is discussed. The document is intend to be used as a blueprint for the evaluation of this system. Each objective of the design project is discussed along with the evaluation parameters and methodology to be used in the evaluation of the implementation's achievement of those objectives. The potential of the system for research activities related to more general aspects of information retrieval is also discussed.

  8. Satellite systems for personal applications concepts and technology

    CERN Document Server

    Richharia, Madhavendra

    2010-01-01

    Presents the concepts, technology, and role of satellite systems in support of personal applications, such as mobile and broadband communications, navigation, television, radio and multimedia broadcasting, safety of life services, etc. This book presents a novel perspective on satellite systems, reflecting the modern personal technology context, and hence a focus on the individual as end-user. The book begins by outlining key generic concepts before discussing techniques adopted in particular application areas; next, it exemplifies these techniques through discussion of state-of-art c

  9. Recommending personally interested contents by text mining, filtering, and interfaces

    Science.gov (United States)

    Xu, Songhua

    2015-10-27

    A personalized content recommendation system includes a client interface device configured to monitor a user's information data stream. A collaborative filter remote from the client interface device generates automated predictions about the interests of the user. A database server stores personal behavioral profiles and user's preferences based on a plurality of monitored past behaviors and an output of the collaborative user personal interest inference engine. A programmed personal content recommendation server filters items in an incoming information stream with the personal behavioral profile and identifies only those items of the incoming information stream that substantially matches the personal behavioral profile. The identified personally relevant content is then recommended to the user following some priority that may consider the similarity between the personal interest matches, the context of the user information consumption behaviors that may be shown by the user's content consumption mode.

  10. 41 CFR 109-1.5205 - Personal property management system changes.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Personal property management system changes. 109-1.5205 Section 109-1.5205 Public Contracts and Property Management Federal... Personal property management system changes. Any proposed significant change to a designated contractor's...

  11. A vector-product information retrieval system adapted to heterogeneous, distributed computing environments

    Science.gov (United States)

    Rorvig, Mark E.

    1991-01-01

    Vector-product information retrieval (IR) systems produce retrieval results superior to all other searching methods but presently have no commercial implementations beyond the personal computer environment. The NASA Electronic Library Systems (NELS) provides a ranked list of the most likely relevant objects in collections in response to a natural language query. Additionally, the system is constructed using standards and tools (Unix, X-Windows, Notif, and TCP/IP) that permit its operation in organizations that possess many different hosts, workstations, and platforms. There are no known commercial equivalents to this product at this time. The product has applications in all corporate management environments, particularly those that are information intensive, such as finance, manufacturing, biotechnology, and research and development.

  12. Benefits of Employing a Personal Response System in a Decision Analysis Course

    Directory of Open Access Journals (Sweden)

    Rachel Or-Bach

    2016-05-01

    Full Text Available This paper describes the employment of a Personal Response System (PRS during a Decision Analysis course for Management Information Systems (MIS students. The description shows how the carefully designed PRS-based questions, the delivery, and the follow-up discussions; provided a context for eliciting and exercising central concepts of the course topics as well as central skills required for MIS majors. A sample of PRS-based questions is presented along with a description for each question of its purpose, the way it was delivered, the response rate, the responses and their frequencies, and the respective in-class discussion. Lessons from these findings are discussed.

  13. Person perception informs understanding of cognition during visual search.

    Science.gov (United States)

    Brennan, Allison A; Watson, Marcus R; Kingstone, Alan; Enns, James T

    2011-08-01

    Does person perception--the impressions we form from watching others--hold clues to the mental states of people engaged in cognitive tasks? We investigated this with a two-phase method: In Phase 1, participants searched on a computer screen (Experiment 1) or in an office (Experiment 2); in Phase 2, other participants rated the searchers' video-recorded behavior. The results showed that blind raters are sensitive to individual differences in search proficiency and search strategy, as well as to environmental factors affecting search difficulty. Also, different behaviors were linked to search success in each setting: Eye movement frequency predicted successful search on a computer screen; head movement frequency predicted search success in an office. In both settings, an active search strategy and positive emotional expressions were linked to search success. These data indicate that person perception informs cognition beyond the scope of performance measures, offering the potential for new measurements of cognition that are both rich and unobtrusive.

  14. Personal Values, Social Capital, and Higher Education Student Career Decidedness: A New "Protean"-Informed Model

    Science.gov (United States)

    Fearon, Colm; Nachmias, Stefanos; McLaughlin, Heather; Jackson, Stephen

    2018-01-01

    This study investigates the role of personal values as motivational antecedents for understanding higher education (HE) student career decidedness among university business school (UBS) students. We propose a new "protean"-informed HE student career decidedness model for theorizing how both personal values and social capital mediators…

  15. Combining personal with social information facilitates host defences and explains why cuckoos should be secretive

    Science.gov (United States)

    Thorogood, Rose; Davies, Nicholas B.

    2016-01-01

    Individuals often vary defences in response to local predation or parasitism risk. But how should they assess threat levels when it pays their enemies to hide? For common cuckoo hosts, assessing parasitism risk is challenging: cuckoo eggs are mimetic and adult cuckoos are secretive and resemble hawks. Here, we show that egg rejection by reed warblers depends on combining personal and social information of local risk. We presented model cuckoos or controls at a pair’s own nest (personal information of an intruder) and/or on a neighbouring territory, to which they were attracted by broadcasts of alarm calls (social information). Rejection of an experimental egg was stimulated only when hosts were alerted by both social and personal information of cuckoos. However, pairs that rejected eggs were not more likely to mob a cuckoo. Therefore, while hosts can assess risk from the sight of a cuckoo, a cuckoo cannot gauge if her egg will be accepted from host mobbing. Our results reveal how hosts respond rapidly to local variation in parasitism, and why it pays cuckoos to be secretive, both to avoid alerting their targets and to limit the spread of social information in the local host neighbourhood. PMID:26794435

  16. Personal continuous route pattern mining

    Institute of Scientific and Technical Information of China (English)

    Qian YE; Ling CHEN; Gen-cai CHEN

    2009-01-01

    In the daily life, people often repeat regular routes in certain periods. In this paper, a mining system is developed to find the continuous route patterns of personal past trips. In order to count the diversity of personal moving status, the mining system employs the adaptive GPS data recording and five data filters to guarantee the clean trips data. The mining system uses a client/server architecture to protect personal privacy and to reduce the computational load. The server conducts the main mining procedure but with insufficient information to recover real personal routes. In order to improve the scalability of sequential pattern mining, a novel pattern mining algorithm, continuous route pattern mining (CRPM), is proposed. This algorithm can tolerate the different disturbances in real routes and extract the frequent patterns. Experimental results based on nine persons' trips show that CRPM can extract more than two times longer route patterns than the traditional route pattern mining algorithms.

  17. Development of an electronic radiation oncology patient information management system.

    Science.gov (United States)

    Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan

    2008-01-01

    The quality of patient care is critically influenced by the availability of accurate information and its efficient management. Radiation oncology consists of many information components, for example there may be information related to the patient (e.g., profile, disease site, stage, etc.), to people (radiation oncologists, radiological physicists, technologists, etc.), and to equipment (diagnostic, planning, treatment, etc.). These different data must be integrated. A comprehensive information management system is essential for efficient storage and retrieval of the enormous amounts of information. A radiation therapy patient information system (RTPIS) has been developed using open source software. PHP and JAVA script was used as the programming languages, MySQL as the database, and HTML and CSF as the design tool. This system utilizes typical web browsing technology using a WAMP5 server. Any user having a unique user ID and password can access this RTPIS. The user ID and password is issued separately to each individual according to the person's job responsibilities and accountability, so that users will be able to only access data that is related to their job responsibilities. With this system authentic users will be able to use a simple web browsing procedure to gain instant access. All types of users in the radiation oncology department should find it user-friendly. The maintenance of the system will not require large human resources or space. The file storage and retrieval process would be be satisfactory, unique, uniform, and easily accessible with adequate data protection. There will be very little possibility of unauthorized handling with this system. There will also be minimal risk of loss or accidental destruction of information.

  18. A Personalized Tag-Based Recommendation in Social Web Systems

    DEFF Research Database (Denmark)

    Durao, Frederico; Dolog, Peter

    2009-01-01

    -based recommender system which suggests similar Web pages based on the similarity of their tags from a Web 2.0 tagging application. The proposed approach extends the basic similarity calculus with external factors such as tag popularity, tag representativeness and the affinity between user and tag. In order...... to study and evaluate the recommender system, we have conducted an experiment involving 38 people from 12 countries using data from Del.icio.us , a social bookmarking web system on which users can share their personal bookmarks......Tagging activity has been recently identified as a potential source of knowledge about personal interests, preferences, goals, and other attributes known from user models. Tags themselves can be therefore used for finding personalized recommendations of items. In this paper, we present a tag...

  19. Using Geographic Information Systems in Knowledge Management Processes

    Directory of Open Access Journals (Sweden)

    Dr. Filiz Gürder

    2013-07-01

    Full Text Available Nowadays, organizations are required to develop quick and accurate responses to internal and external changes that gain momentum. In this context, knowledge management activities become more important to all organizations. On the other hand, Geographic Information Systems (GIS become common more and more. GIS which address a broad spectrum of users such as public agencies, local communities, civil society organizations, the private sector, academic environment, and personal users have been aiming to solve problems which occurred in location-based areas. GIS are important to get, combine, analyze and transfer the spatial data. Common use of PCs for personal needs, digital geography and improvements of software technologies, also the need to make socially acceptable business decisions facilitated development and widespread use of GIS applications. The main purpose of this paper is to discuss using areas and contribution potentials of GIS in enterprise-wide knowledge management processes.

  20. Self- and informant-reported perspectives on symptoms of narcissistic personality disorder.

    Science.gov (United States)

    Cooper, Luke D; Balsis, Steve; Oltmanns, Thomas F

    2012-04-01

    Because narcissistic individuals tend to have an inflated view of themselves and their abilities, the reliance on self-reported information in the assessment and diagnosis of narcissistic personality disorder (NPD) is problematic. Hence, the use of informants in the assessment of NPD may be necessary. In the current study we examined self- and informant-reported features of NPD using agreement, frequency, and discrepancy analyses. The results indicated that informants tended to report more NPD features than selves, and that there were either low or nonsignificant levels of self-informant agreement among the 9 NPD diagnostic criteria and its categorical diagnosis. Informants were increasingly more likely to report higher raw scores relative to selves, indicating that the discrepancy between self- and informant reports increases with the NPD scale. Informants also reported NPD features that selves often did not, suggesting that current prevalence estimates of NPD, which use only self-reported information, are most likely underestimates. These results highlight the importance of gathering informant-reported data in addition to self-reported data when assessing NPD. (PsycINFO Database Record (c) 2013 APA, all rights reserved).

  1. Is the personal bankruptcy system bankrupt?

    OpenAIRE

    Loretta J. Mester

    2002-01-01

    Loretta Mester outlines the components of reform proposals. She then looks at the empirical research on personal bankruptcy to evaluate the rationale for reforming the system and the effectiveness of proposed changes. ; Also issued as Payment Cards Center Discussion Paper No. 02-02

  2. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  3. 78 FR 49270 - Information Collection; MyUSA

    Science.gov (United States)

    2013-08-13

    ... personal and/or business confidential information provided. FOR FURTHER INFORMATION CONTACT: Sarah Crane... information collected is basic profile information, and may include: name, home address, phone number, gender... small business owner, a parent or a student. Use of the system, and contribution of personal information...

  4. Contributions from personality- and psychodynamically oriented assessment to the development of the DSM-5 personality disorders.

    Science.gov (United States)

    Huprich, Steven K

    2011-07-01

    Advances in personality assessment over the past 20 years have notably influenced the proposed assessment and classification of personality disorders in the Diagnostic and Statistical Manual of Mental Disorders (5th ed. [DSM-5]). However, a considerable body of personality assessment and psychodynamically oriented assessment research has significant relevance to the way in which personality disorders are evaluated that appears to have gone unrecognized in the current proposals for DSM-5. In this article, I discuss the ways in which some of these 2 bodies of literature can and should inform the DSM-5 so that the diagnostic nomenclature can be more scientifically and comprehensively informed and consequently improve the clinical utility of a diagnostic system in need of considerable revision.

  5. Experience of the pilot implementation of the european information sharing and alerting system in the field of information security

    Directory of Open Access Journals (Sweden)

    Anatoly A. Malyuk

    2018-03-01

    Full Text Available The formation of a global information society poses a particular challenge to the development of an information security culture. In the Doctrine of Information Security of the Russian Federation, adopted in December 2016, one of the main threats is the low awareness of citizens in matters of ensuring personal information security. One of the most important mechanisms for increasing competence and forming an in-formation security culture, in addition to mass training of people, are methods of propaganda and creation of "hot lines". They allow the general public to take the initiative in monitoring and reporting computer incidents. The development of such approaches should be carried out taking into account the international experience accumulated today. To this end, the article examines the European experience of creating a system of information and advisory assistance in the field of preventing threats to the security of public and corporate information systems, primarily information and telecommunications networks, as well as eliminating the consequences of threats in the information sphere. The analysis of the experience of implementing the pilot project of the European Information Sharing and Alert System has revealed the advisability of designing such systems on the basis of a management model with four players that unites network operators, information producers (who are IT product suppliers or IT security specialists; local information intermediaries and consumers of information. As a model of the information flow, a node can be selected that runs a local web portal that provides information to end users, generates new information, adapts information to the constraints of various distribution channels, and to the characteristics of end-user target groups. The methodology of the pilot project can be used in the design and deployment of a notification and information exchange system aimed at end-users of several regions or countries

  6. A Study of Personality Traits to Explain Employees' Information Security Behavior among Generational Cohorts

    Science.gov (United States)

    Warrington, Cartmell

    2017-01-01

    In this study, the Big Five factor model of personality traits theory was tested for its ability to predict or explain Employee Information Security Behavior (EISB), when Generational Cohort (GCOHORT) moderated the relationship between the five factors of personality and EISB. The independent variables (IVs) Extraversion, Agreeableness,…

  7. Intelligent Web-Based Learning System with Personalized Learning Path Guidance

    Science.gov (United States)

    Chen, C. M.

    2008-01-01

    Personalized curriculum sequencing is an important research issue for web-based learning systems because no fixed learning paths will be appropriate for all learners. Therefore, many researchers focused on developing e-learning systems with personalized learning mechanisms to assist on-line web-based learning and adaptively provide learning paths…

  8. International cooperative information systems

    International Nuclear Information System (INIS)

    1980-01-01

    Developing countries need mechanisms by which the information they generate themselves and development information from the rest of the world can be retrieved. The international cooperative information system is such a mechanism. Delegates to the Seminar on International Cooperative Information Systems were informed about various existing systems (INIS, AGRIS, INFOTERRA, TCDC/INRES, POPIN, DEVSIS, and INPADROC), some specialized information systems and services (CDS/ISIS and the Cassava Information Centre), and computer programs for information processing (INIS/AGRIS, CDS/ISIS, and MINISIS). The participants suggested some changes that should be made on both the national and the international levels to ensure that these systems meet the needs of developing countries more effectively. (LL)

  9. Privacy and Personal Information Held by Government: A Comparative Study, Japan and New Zealand

    Science.gov (United States)

    Cullen, Rowena

    This chapter reports on the concepts of information privacy and trust in government among citizens in Japan and New Zealand in a transnational, crosscultural study. Data from both countries are presented, and cultural and other factors are sought that might explain differences in attitudes shown. In both countries, citizens display a range of views, not related to age or gender. New Zealand citizens express concern about information privacy in relation to information held by government, but show a higher level of trust in government overall, and most attribute breaches of privacy to incompetence, rather than deliberate malfeasance. Japanese citizens interviewed also indicated that they had major concerns about information privacy, and had considerably less trust in government than New Zealand respondents showed. They were more inclined to attribute breaches of privacy to lax behavior in individuals than government systems. In both countries citizens showed an awareness of the tradeoffs necessary between personal privacy and the needs of the state to hold information for the benefit of all citizens, but knew little about the protection offered by privacy legislation, and expressed overall concern about privacy practices in the modern state. The study also provides evidence of cultural differences that can be related to Hofstede's dimensions of culture.

  10. Computing handbook information systems and information technology

    CERN Document Server

    Topi, Heikki

    2014-01-01

    Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber

  11. Truebounded, Overbounded, or Underbounded? Scientists’ Personal Publication Lists versus Lists Generated through Bibliographic Information Services

    Directory of Open Access Journals (Sweden)

    Isabelle Dorsch

    2018-02-01

    Full Text Available A truebounded publication list of a scientific author consists of exactly all publications that meet two criteria: (1 they are formally published (e.g., journal article or proceeding paper; (2 they have scientific, scholarly, or academic content. A publication list is overbounded if it includes documents which do not meet the two criteria (such as novels; a publication list is underbounded if it is incomplete. Are authors’ personal publication lists, found on their personal sites on the Internet or in institutional repositories, truebounded, overbounded, or underbounded? And are the respective publication lists generated through bibliographic information services truebounded, overbounded, or underbounded? As case studies, publications of nine International Society of Scientometrics and Informetrics (ISSI Committee members (published between 2007 and 2016 were collected to create preferably complete personal publication lists according to the two criteria. We connect the “relative visibility of an author” with the concepts of truebounded, overbounded, and underbounded publication lists. The authors’ relative visibility values were determined for the information services Web of Science (WoS, Scopus, and Google Scholar and compared to the relative visibility of the authors’ personal publication lists. All results of the bibliographic information services are underbounded. Relative visibility is highest in Google Scholar, followed by Scopus and WoS.

  12. Information system metaphors

    NARCIS (Netherlands)

    Gazendam, H.W.M.

    1999-01-01

    Metaphors are useful because they are efficient: they transfer a complex of meaning in a few words. Information systems are social constructs. Therefore, metaphors seem to be especially useful for explaining the space of possible meaning complexes or designs of information systems. Three information

  13. 12 CFR 4.37 - Persons and entities with access to OCC information; prohibition on dissemination.

    Science.gov (United States)

    2010-01-01

    ... information; prohibition on dissemination. 4.37 Section 4.37 Banks and Banking COMPTROLLER OF THE CURRENCY... § 4.37 Persons and entities with access to OCC information; prohibition on dissemination. (a) Current... agreement to abide by, the prohibition on the dissemination of non-public OCC information contained in...

  14. Who should decide how much and what information is important in person-centred health care?

    DEFF Research Database (Denmark)

    Kaltoft, Mette Kjer; Nielsen, Jesper Bo; Salkeld, Glenn

    2015-01-01

    implicitly segues into the patient having made a 'good decision'. In person-centred health care, whether, in what form, and with what weight, 'information' is included as a criterion of decision quality is a matter for the person involved, to decide in the light of their own values, preferences, and time...

  15. Personal Privacy in an Information Society: What are the Trade-Offs? Insights into Consumer Issues.

    Science.gov (United States)

    J.C. Penney Co., Inc., New York, NY.

    Insights into Consumer Issues is one of a group of educational publications and teaching units that J.C. Penney provides for consumer educators as a public service. This folder illustrates that although computerized processing of personal information has brought considerable convenience, the potential risk to personal privacy is of increasing…

  16. ANALYSIS OF FOREIGN EXPERIENCE OF SYSTEMIC DEVELOPMENT OF FUTURE SOCIAL PEDAGOGISTS’ INFORMATIONAL CULTURE

    Directory of Open Access Journals (Sweden)

    Oleksandr A. Ratsul

    2014-10-01

    Full Text Available The article deals with the analysis of foreign experience of systemic development of future social pedagogists’ informational culture. A number of cultural universals are identified, each of them is treated as the core of culture. A list of components of future social pedagogists’ information culture is given. Personality traits that enable future social pedagogists to participate effectively in all kinds of work with information are characterized. Two structural levels (contents and functions in future social pedagogists’ information culture are singled out. Main functions of future social pedagogists’ information culture are defined. The structural organization of future social pedagogists’ information culture is analyzed.

  17. Testing a bedside personal computer Clinical Care Classification System for nursing students using Microsoft Access.

    Science.gov (United States)

    Feeg, Veronica D; Saba, Virginia K; Feeg, Alan N

    2008-01-01

    This study tested a personal computer-based version of the Sabacare Clinical Care Classification System on students' performance of charting patient care plans. The application was designed as an inexpensive alternative to teach electronic charting for use on any laptop or personal computer with Windows and Microsoft Access. The data-based system was tested in a randomized trial with the control group using a type-in text-based-only system also mounted on a laptop at the bedside in the laboratory. Student care plans were more complete using the data-based system over the type-in text version. Students were more positive but not necessarily more efficient with the data-based system. The results demonstrate that the application is effective for improving student nursing care charting using the nursing process and capturing patient care information with a language that is standardized and ready for integration with other patient electronic health record data. It can be implemented on a bedside stand in the clinical laboratory or used to aggregate care planning over a student's clinical experience.

  18. Aeronautical Information System -

    Data.gov (United States)

    Department of Transportation — The Aeronautical Information System (AIS) is a leased weather automated system that provides a means of collecting and distributing aeronautical weather information...

  19. How Do Personality Traits Shape Information-Sharing Behaviour in Social Media? Exploring the Mediating Effect of Generalized Trust

    Science.gov (United States)

    Deng, Shengli; Lin, Yanqing; Liu, Yong; Chen, Xiaoyu; Li, Hongxiu

    2017-01-01

    Introduction: Personality and trust have been found to be important precursors of information-sharing behaviour, but little is known about how these factors interact with each other in shaping information-sharing behaviour. By integrating both trust and user personality into a unified research framework, this study examines how trust mediates the…

  20. A Distributed Multi-Agent System for Collaborative Information Management and Learning

    Science.gov (United States)

    Chen, James R.; Wolfe, Shawn R.; Wragg, Stephen D.; Koga, Dennis (Technical Monitor)

    2000-01-01

    In this paper, we present DIAMS, a system of distributed, collaborative agents to help users access, manage, share and exchange information. A DIAMS personal agent helps its owner find information most relevant to current needs. It provides tools and utilities for users to manage their information repositories with dynamic organization and virtual views. Flexible hierarchical display is integrated with indexed query search-to support effective information access. Automatic indexing methods are employed to support user queries and communication between agents. Contents of a repository are kept in object-oriented storage to facilitate information sharing. Collaboration between users is aided by easy sharing utilities as well as automated information exchange. Matchmaker agents are designed to establish connections between users with similar interests and expertise. DIAMS agents provide needed services for users to share and learn information from one another on the World Wide Web.

  1. Influences of Formal Learning, Personal Learning Orientation, and Supportive Learning Environment on Informal Learning

    Science.gov (United States)

    Choi, Woojae; Jacobs, Ronald L.

    2011-01-01

    While workplace learning includes formal and informal learning, the relationship between the two has been overlooked, because they have been viewed as separate entities. This study investigated the effects of formal learning, personal learning orientation, and supportive learning environment on informal learning among 203 middle managers in Korean…

  2. Information extraction system

    Science.gov (United States)

    Lemmond, Tracy D; Hanley, William G; Guensche, Joseph Wendell; Perry, Nathan C; Nitao, John J; Kidwell, Paul Brandon; Boakye, Kofi Agyeman; Glaser, Ron E; Prenger, Ryan James

    2014-05-13

    An information extraction system and methods of operating the system are provided. In particular, an information extraction system for performing meta-extraction of named entities of people, organizations, and locations as well as relationships and events from text documents are described herein.

  3. Community Information Systems.

    Science.gov (United States)

    Freeman, Andrew

    Information is provided on technological and social trends as background for a workshop designed to heighten the consciousness of workers in community information systems. Initially, the basic terminology is considered in its implications for an integrated perspective of community information systems, with particular attention given to the meaning…

  4. Adults Living with Type 2 Diabetes: Kept Personal Health Information Items as Expressions of Need

    Science.gov (United States)

    Whetstone, Melinda

    2013-01-01

    This study investigated personal information behavior and information needs that 21 adults managing life with Type 2 diabetes identify explicitly and implicitly during discussions of item acquisition and use of health information items that are kept in their homes. Research drew upon a naturalistic lens, in that semi-structured interviews were…

  5. Dynamic Personal Identity and the Dynamic Identity Grid: How Theory and Concept Can Transform Information into Knowledge and Secure the American Homeland

    Science.gov (United States)

    2008-09-01

    80 Figure 12. Dynamic Identity Grid Strategy Canvas ..........................................................81 Figure 13. Hurdles to...GIG Global Information Grid HSPD Homeland Security Presidential Directive IAFIS Integrated Automated Fingerprint Identification System IP...recognizing a person based on a physiological or behavioral characteristic. Biometric features that can be measured include: facial, fingerprint , hand

  6. Personality-Informed Interventions for Healthy Aging: Conclusions from a National Institute on Aging Work Group

    Science.gov (United States)

    Chapman, Benjamin P.; Hampson, Sarah; Clarkin, John

    2014-01-01

    We describe 2 frameworks in which personality dimensions relevant to health, such as Conscientiousness, can be used to inform interventions designed to promote health aging. First, contemporary data and theory do not suggest that personality is "immutable," but instead focus on questions of who changes, in what way, why, when, and how.…

  7. Personal computer based home automation system

    OpenAIRE

    Hellmuth, George F.

    1993-01-01

    The systems engineering process is applied in the development of the preliminary design of a home automation communication protocol. The objective of the communication protocol is to provide a means for a personal computer to communicate with adapted appliances in the home. A needs analysis is used to ascertain that a need exist for a home automation system. Numerous design alternatives are suggested and evaluated to determine the best possible protocol design. Coaxial cable...

  8. Informing cancer patient based on his type of personality: the suspicious (paranoid) patient.

    Science.gov (United States)

    Kallergis, G

    2013-01-01

    Imparting bad news had always been an unpleasant task for the physician, as shown from ancient years to our days. In the healthcare sector and as far as the cancer patient is concerned, the imparting of bad news is performed by the patient's doctor within a therapeutic relationship of course. The fundamental question is how a therapist could tailor the information to any patient and if "Is it possible to determine who should be told what, when and how ?". The aim of this paper was to describe the suspicious character or type of personality thoroughly so that any physician can make a diagnosis and tailor the information strategy to the patient's needs. As method of research was used the qualitative method through groups with doctors and nurses, while research within groups lasted for 5 years. The degree of informing of the suspicious personality in the range "minimal - small - medium - large - very large" is : the degree of denial varies between large and very large. The degree of informing varies between medium and small and sometimes minimal. Informing the Family: The hardest family to deal with. Pay attention to litigious mania. Avoid confrontation or be drawn into agreeing with the family views.

  9. Personalized Audio Systems - a Bayesian Approach

    DEFF Research Database (Denmark)

    Nielsen, Jens Brehm; Jensen, Bjørn Sand; Hansen, Toke Jansen

    2013-01-01

    Modern audio systems are typically equipped with several user-adjustable parameters unfamiliar to most users listening to the system. To obtain the best possible setting, the user is forced into multi-parameter optimization with respect to the users's own objective and preference. To address this......, the present paper presents a general inter-active framework for personalization of such audio systems. The framework builds on Bayesian Gaussian process regression in which a model of the users's objective function is updated sequentially. The parameter setting to be evaluated in a given trial is selected...

  10. Radiation Exposure Monitoring and Information Transmittal (REMIT) system

    International Nuclear Information System (INIS)

    Cale, R.; Clark, T.; Dixson, R.; Hagemeyer, D.

    1993-06-01

    The Radiation Exposure Monitoring and Information Transmittal (REMIT) system is designed to assist US Nuclear Regulatory Commission (NRC)licensees in meeting the reporting requirements of the revised 10 CFR 20 and in agreement with the guidance contained in R.G. 8.7, Rev. 1, ''Instructions for Recording and Reporting Occupational Exposure Data.'' REMIT is a personal computer (PC) based menu driven system that facilitates the manipulation of data base files to record and report radiation exposure information. REMIT is designed to be user-friendly and contains the full text of R. G. 8.7, Rev. 1, on-line as well as context-sensitive help throughout the program. The user can enter data directly from NRC Forms 4 or 5, REMIT allows the user to view the individual's exposure in relation to regulatory or administrative limits and alerts the user to exposures in excess of these limits. The system also provides for the calculation and summation of dose from intakes and the determination of the dose to the maximally exposed extremity for the monitoring year. REMIT can produce NRC Forms 4 and 5 in paper and electronic format and can import/export data from ASCII and data base files

  11. Intelligent Internet-based information system optimises diabetes mellitus management in communities.

    Science.gov (United States)

    Wei, Xuejuan; Wu, Hao; Cui, Shuqi; Ge, Caiying; Wang, Li; Jia, Hongyan; Liang, Wannian

    2018-05-01

    To evaluate the effect of an intelligent Internet-based information system upon optimising the management of patients diagnosed with type 2 diabetes mellitus (T2DM). In 2015, a T2DM information system was introduced to optimise the management of T2DM patients for 1 year in Fangzhuang community of Beijing, China. A total of 602 T2DM patients who were registered in the health service centre of Fangzhuang community were enrolled based on an isometric sampling technique. The data from 587 patients were used in the final analysis. The intervention effect was subsequently assessed by statistically comparing multiple parameters, such as the prevalence of glycaemic control, standard health management and annual outpatient consultation visits per person, before and after the implementation of the T2DM information system. In 2015, a total of 1668 T2DM patients were newly registered in Fangzhuang community. The glycaemic control rate was calculated as 37.65% in 2014 and significantly elevated up to 62.35% in 2015 ( p information system, the rate of standard health management was increased from 48.04% to 85.01% ( p information system optimised the management of T2DM patients in Fangzhuang community and decreased the outpatient numbers in both community and general hospitals, which played a positive role in assisting T2DM patients and their healthcare providers to better manage this chronic illness.

  12. 78 FR 17222 - Notice of Proposed Information Collection, License for the Use of Personally Identifiable...

    Science.gov (United States)

    2013-03-20

    ... Identifiable Information Protected Under the E-Government Act of 2002, Title V and the Privacy Act of 1974...) and Title V, subtitle A of the E-Government Act of 2002 (CIPSEA) (U.S.C. 3501 note). HUD wishes to... Information Collection, License for the Use of Personally Identifiable Information Protected Under the E...

  13. The sensitivities of user profile information in music recommender systems

    NARCIS (Netherlands)

    Perik, E.M.; Ruyter, de B.E.R.; Markopoulos, P.; Eggen, J.H.

    2006-01-01

    Personalized services can cause privacy concerns, due to the acquisition, storage and application of sensitive personal information. This paper describes empirical research into the factors influencing the trade-off between the perceived benefits of personalization and the privacy ‘costs’

  14. Correlation Between Information Technology And Management Information Systems Quality

    Directory of Open Access Journals (Sweden)

    Annisa Fitri Anggraeni

    2015-08-01

    Full Text Available The aim of this research is to find out the correlation between Information Technology and Management Information System Quality. This research applies literature review from various theories and previously conducted research where controversies between Information Technology and Management Information Systems. The result of this research shows that Information Technology is a part of Management Information System and supports the performance of Management Information Systems.

  15. The use of traits and contextual information in free personality descriptions of ethno-cultural groups in South Africa

    NARCIS (Netherlands)

    Valchev, V.H.; van de Vijver, F.J.R.; Nel, J.A.; Rothmann, S.R.; Meiring, D.

    2013-01-01

    The present study investigates the differences between 3 ethnocultural groups in South Africa in the use of traits and contextual information for personality descriptions and the interaction of these differences with social distance from the target person and with personality domains. Semistructured

  16. Putting Personal Knowledge Management under the Macroscope of Informing Science

    Directory of Open Access Journals (Sweden)

    Ulrich Schmitt

    2015-08-01

    Full Text Available The paper introduces a novel Personal Knowledge Management (PKM concept and prototype system. The system’s objective is to aid life-long-learning, resourcefulness, creativity, and teamwork of individuals throughout their academic and professional life and as contributors and beneficiaries of organizational and societal performance. Such a scope offers appealing and viable opportunities for stakeholders in the educational, professional, and developmental context. To further validate the underlying PKM application design, the systems thinking techniques of the transdiscipline of Informing Science (IS are employed. By applying Cohen’s IS-Framework, Leavitt’s Diamond Model, the IS-Meta Approach, and Gill’s and Murphy’s Three Dimensions of Design Task Complexity, the more specific KM models and methodologies central to the PKMS concept are aligned, introduced, and visualized. The extent of this introduction offers an essential overview, which can be deepened and broadened by using the cited URL and DOI links pointing to the available resources of the author’s prior publications. The paper emphasizes the differences of the proposed meme-based PKM System compared to its traditional organizational document-centric counterparts as well as its inherent complementing synergies. As a result, it shows how the system is closing in on Vannevar Bush’s still unfulfilled vison of the ‘Memex’, an as-close-as-it-gets imaginary ancestor celebrating its 70th anniversary as an inspiring idea never realized. It also addresses the scenario recently put forward by Levy which foresees a decentralizing revolution of knowledge management that gives more power and autonomy to individuals and self-organized groups. Accordingly, it also touches on the PKM potential in terms of Kuhn’s Scientific Revolutions and Disruptive Innovations.

  17. An integrated clinical and genomic information system for cancer precision medicine.

    Science.gov (United States)

    Jang, Yeongjun; Choi, Taekjin; Kim, Jongho; Park, Jisub; Seo, Jihae; Kim, Sangok; Kwon, Yeajee; Lee, Seungjae; Lee, Sanghyuk

    2018-04-20

    Increasing affordability of next-generation sequencing (NGS) has created an opportunity for realizing genomically-informed personalized cancer therapy as a path to precision oncology. However, the complex nature of genomic information presents a huge challenge for clinicians in interpreting the patient's genomic alterations and selecting the optimum approved or investigational therapy. An elaborate and practical information system is urgently needed to support clinical decision as well as to test clinical hypotheses quickly. Here, we present an integrated clinical and genomic information system (CGIS) based on NGS data analyses. Major components include modules for handling clinical data, NGS data processing, variant annotation and prioritization, drug-target-pathway analysis, and population cohort explorer. We built a comprehensive knowledgebase of genes, variants, drugs by collecting annotated information from public and in-house resources. Structured reports for molecular pathology are generated using standardized terminology in order to help clinicians interpret genomic variants and utilize them for targeted cancer therapy. We also implemented many features useful for testing hypotheses to develop prognostic markers from mutation and gene expression data. Our CGIS software is an attempt to provide useful information for both clinicians and scientists who want to explore genomic information for precision oncology.

  18. Characteristics of personal health information management groups: findings from an online survey using Amazon's mTurk.

    Science.gov (United States)

    Kim, Sujin; Huber, Jeffrey T

    2017-10-01

    The study characterized three groups with different levels of familiarity with personal health information management (PHIM) in terms of their demographics, health knowledge, technological competency, and information sources and barriers. In addition, the authors examined differences among PHIM groups in subjective self-ratings and objective test scores for health literacy. A total of 202 survey participants were recruited using Amazon's Mechanical Turk (mTurk) service, a crowdsourcing Internet service. Using K-means clustering, three groups with differing levels of familiarity with PHIM were formed: Advanced, Intermediate, and Basic. The Advanced group was the youngest, and the Basic group contained the highest proportion of males, whereas the Intermediate group was the oldest and contained the fewest males. The Advanced group was significantly more likely to engage in provider- or hospital-initiated PHIM activities such as emailing with providers, viewing test results online, and receiving summaries of hospital visits via email or websites than the other groups. The Basic group had significantly lower information management skills and Internet use than the other groups. Advanced and Basic groups reported significant differences in several information barriers. While the Advanced group self-reported the highest general literacy, they scored lowest on an objective health literacy test. For effective personal health records management, it is critical to understand individual differences in PHIM using a comprehensive measure designed to assess personal health records-specific activities. Because they are trained to perform an array of information management activities, medical librarians or patient educators are well positioned to promote the effective use of personal health records by health consumers.

  19. The Information Tekhnology Share In Management Information System

    Directory of Open Access Journals (Sweden)

    Nur Zeina Maya Sari

    2015-08-01

    Full Text Available Abstract Management Information System growth cause change of role from all manager in decision making the information technology. While prima facie reason for the usage of information technology in business to support such a manner so that information system may operate better OBrienamp Marakas 2004. Its meaning with existence of information tekhnology in management information system SIM company management decision making which initially often pursued by many factor of non technical become accurately is relevant complete and on schedule

  20. The value of personal health record (PHR) systems.

    Science.gov (United States)

    Kaelber, David; Pan, Eric C

    2008-11-06

    Personal health records (PHRs) are a rapidly growing area of health information technology despite a lack of significant value-based assessment.Here we present an assessment of the potential value of PHR systems, looking at both costs and benefits.We examine provider-tethered, payer-tethered, and third-party PHRs, as well as idealized interoperable PHRs. An analytical model was developed that considered eight PHR application and infrastructure functions. Our analysis projects the initial and annual costs and annual benefits of PHRs to the entire US over the next 10 years.This PHR analysis shows that all forms of PHRs have initial net negative value. However, at the end of 10 years, steady state annual net value ranging from$13 billion to -$29 billion. Interoperable PHRs provide the most value, followed by third-party PHRs and payer-tethered PHRs also showing positive net value. Provider-tethered PHRs constantly demonstrating negative net value.

  1. Examining the Role of Anxiety and Apathy in Health Consumers' Intentions to Use Patient Health Portals for Personal Health Information Management

    Science.gov (United States)

    Torres, Carlos A.

    2011-01-01

    This study investigated college students' attitudes toward and intentions to use personal health portals (PHPs) for managing their personal health information using a survey method. The study also aimed to examine the roles electronic Personal Health Information Management (PHIM) anxiety and apathy play in influencing students' attitudes toward…

  2. The Information Ecology of Personal Health Record Systems: Secure Messaging as Catalyst and Its Evolving Impact on Use and Consequences

    Science.gov (United States)

    Nazi, Kim M.

    2012-01-01

    Personal Health Records (PHRs) and PHR systems have been designed as consumer-oriented tools to empower patients and improve health care. Despite significant consumer interest and anticipated benefits, adoption remains low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications…

  3. Teleradiology mobile internet system with a new information security solution

    Science.gov (United States)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kusumoto, Masahiko; Kaneko, Masahiro; Moriyama, Noriyuki

    2014-03-01

    We have developed an external storage system by using secret sharing scheme and tokenization for regional medical cooperation, PHR service and information preservation. The use of mobile devices such as smart phones and tablets will be accelerated for a PHR service, and the confidential medical information is exposed to the risk of damage and intercept. We verified the transfer rate of the sending and receiving of data to and from the external storage system that connected it with PACS by the Internet this time. External storage systems are the data centers that exist in Okinawa, in Osaka, in Sapporo and in Tokyo by using secret sharing scheme. PACS continuously transmitted 382 CT images to the external data centers. Total capacity of the CT images is about 200MB. The total time that had been required to transmit was about 250 seconds. Because the preservation method to use secret sharing scheme is applied, security is strong. But, it also takes the information transfer time of this system too much. Therefore, DICOM data is masked to the header information part because it is made to anonymity in our method. The DICOM data made anonymous is preserved in the data base in the hospital. Header information including individual information is divided into two or more tallies by secret sharing scheme, and preserved at two or more external data centers. The token to relate the DICOM data anonymity made to header information preserved outside is strictly preserved in the token server. The capacity of header information that contains patient's individual information is only about 2% of the entire DICOM data. This total time that had been required to transmit was about 5 seconds. Other, common solutions that can protect computer communication networks from attacks are classified as cryptographic techniques or authentication techniques. Individual number IC card is connected with electronic certification authority of web medical image conference system. Individual number IC

  4. Electronic bulletin board system for image and information exchange

    International Nuclear Information System (INIS)

    Halama, J.R.; Henkin, R.E.; Wagner, R.H.

    1990-01-01

    This paper provides nuclear medicine professionals access to an electronic bulletin board (EBB) for image and information exchange. EBB users access the system remotely via modem and personal computer. A public message board is maintained containing messages posted by users. New messages or replies to existing messages may be posted. A public library board contains documents and images for users to access by transmitting them locally for off-line review. Comments and replies may be posted in the library board. New files may be posted in the library at any time. The EBB programs were developed on a multi-user computer system, allowing simultaneous access of users and on-line conferencing among active users

  5. Implementation of an information system on the medical exposure to ionizing radiation

    International Nuclear Information System (INIS)

    Etard, C.; Aubert, B.; Sinno-Tellier, S.

    2005-01-01

    The national institute of sanitary surveillance (I.n.V.S.) and I.R.S.N. collaborate since 2003 to build a perennial information system on the medical exposure to ionizing radiation of the French population (Ex.P.R.I. system). These data will allow to update the estimation of the average annual dose per caput, and will inform on its distribution by sex, age and on the number of effectively exposed persons. Thanks to the common project of I.R.S.N. and I.n.V.S., to the contributions of illness assurance and professional, the data of exposure in 2002 will be updated and enriched. A report will be published at the beginning of 2009. (N.C.)

  6. Ecological Modelling of Individual and Contextual Influences: A Person-in-Environment Framework for Hypothetico-Deductive Information Behaviour Research

    Science.gov (United States)

    Sin, Sei-Ching Joanna

    2015-01-01

    Introduction: This paper discusses the person-in-environment framework, which proposes the inclusion of environmental factors, alongside personal factors, as the explanatory factors of individual-level information behaviour and outcome. Method: The paper first introduces the principles and schematic formulas of the person-in-environment framework.…

  7. Personal Informatics in the Wild: Hacking Habits for Health & Happiness

    DEFF Research Database (Denmark)

    Li, Ian; Froehlich, Jon; Larsen, Jakob Eg

    2013-01-01

    Personal informatics is a class of systems that help people collect personal information to improve selfknowledge. Improving self-knowledge can foster selfinsight and promote positive behaviors, such as healthy living and energy conservation. The development of personal informatics applications p...

  8. Geographical information systems

    DEFF Research Database (Denmark)

    Möller, Bernd

    2004-01-01

    The chapter gives an introduction to Geographical Information Systems (GIS) with particular focus on their application within environmental management.......The chapter gives an introduction to Geographical Information Systems (GIS) with particular focus on their application within environmental management....

  9. Personal values, social capital and higher education student career decidedness: a new ‘protean’ informed model

    OpenAIRE

    Fearon, C.; Nachmias, S.; McLaughlin, H.; Jackson, S.

    2016-01-01

    This study investigates the role of personal values as motivational antecedents for understanding HE student career decidedness among university business school (UBS) students. We propose a new ‘protean’ informed HE student career decidedness model for theorizing how both personal values and social capital mediators (student social capital; personal, social and enterprise skills; access to resources) help in the student-centric and self-directed processes of career decision-making. A mixed me...

  10. Ethical and legal issues involved in the pro-active collection of personal information with the aim of reducing online disclosure

    CSIR Research Space (South Africa)

    Botha, J

    2016-09-01

    Full Text Available aims to highlight some of the major ethical and legal issues when pro-actively collecting personal information, through a South African case study, to assist in reducing the amounts of personal information being disclosed online....

  11. PELS: A Noble Architecture and Framework for a Personal E-Learning System (PELS)

    Science.gov (United States)

    Dewan, Jahangir; Chowdhury, Morshed; Batten, Lynn

    2014-01-01

    This article presents a personal e-learning system architecture in the context of a social network environment. The main objective of a personal e-learning system is to develop individual skills on a specific subject and share resources with peers. The authors' system architecture defines the organisation and management of a personal learning…

  12. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    OpenAIRE

    Jin-Won Park; Sung Bum Pan; Yongwha Chung; Daesung Moon

    2009-01-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification i...

  13. Dynamics of Information Systems

    CERN Document Server

    Hirsch, Michael J; Murphey, Robert

    2010-01-01

    Our understanding of information and information dynamics has outgrown classical information theory. This book presents the research explaining the importance of information in the evolution of a distributed or networked system. It presents techniques for measuring the value or significance of information within the context of a system

  14. Effluent Information System (EIS) / Onsite Discharge Information System (ODIS): 1986 executive summary

    International Nuclear Information System (INIS)

    Watanabe, T.

    1987-09-01

    Department of Energy (DOE) data base systems aid DOE-Headquarters and Field Offices in managing the radioactive air and liquid effluents from DOE facilities. Data on effluents released offsite are entered into effluent information system (EIS) and data on effluents discharged onsite and retained onsite are entered into Onsite Discharge Information System (ODIS). This document is a summary of information obtained from the CY 1986 effluent data received from all DOE and DOE contractor facilities and entered in the data bases. Data from previous years are also included. The summary consists of information for effluents released offsite, and information for effluents retained onsite

  15. Translating Personality Psychology to Help Personalize Preventive Medicine for Young-Adult Patients

    Science.gov (United States)

    Israel, Salomon; Moffitt, Terrie E.; Belsky, Daniel W.; Hancox, Robert J.; Poulton, Richie; Roberts, Brent; Thomson, W. Murray; Caspi, Avshalom

    2014-01-01

    The rising number of newly insured young adults brought on by healthcare reform will soon increase demands on primary-care physicians. Physicians will face more young-adult patients which presents an opportunity for more prevention-oriented care. In the current study, we evaluated whether brief observer reports of young adults’ personality traits could predict which individuals would be at greater risk for poor health as they entered midlife. Following the Dunedin Study cohort of 1,000 individuals, we show that very brief measures of young adults’ personalities predicted their midlife physical health across multiple domains (metabolic abnormalities, cardiorespiratory fitness, pulmonary function, periodontal disease, and systemic inflammation). Individuals scoring low on the traits of Conscientiousness and Openness-to-Experience went on to develop poorer health even after accounting for preexisting differences in education, socioeconomic status, smoking, obesity, self-reported health, medical conditions, and family medical history. Moreover, personality ratings from peer informants who knew participants well, and from a nurse and receptionist who had just met participants for the first time, predicted health decline from young adulthood to midlife despite striking differences in level of acquaintance. Personality effect sizes were on par with other well-established health-risk factors such as socioeconomic status, smoking, and self-reported health. We discuss the potential utility of personality measurement to function as an inexpensive and accessible tool for healthcare professionals to personalize preventive medicine. Adding personality information to existing healthcare electronic infrastructures could also advance personality theory by generating opportunities to examine how personality processes influence doctor-patient communication, health service use, and patient outcomes. PMID:24588093

  16. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  17. Liquid Effluent Monitoring Information System test plans releases 2.0 and 3.0

    International Nuclear Information System (INIS)

    Guettler, D.A.

    1995-01-01

    The Liquid Effluent Monitoring Information System (LEMIS) is being developed as the organized information repository facility in support of the liquid effluent monitoring requirements of the Tri-Party Agreement. It is necessary to provide an automated repository into which the results from liquid effluent sampling will be placed. This repository must provide for effective retention, review, and retrieval of selected sample data by authorized persons and organizations. This System Architecture document is the aggregation of the DMR P+ methodology project management deliverables. Together they represent a description of the project and its plan through four Releases, corresponding to the definition and prioritization of requirements defined by the user

  18. Nurses' satisfaction with use of a personal digital assistants with a mobile nursing information system in China.

    Science.gov (United States)

    Shen, Li-Qiong; Zang, Xiao-Ying; Cong, Ji-Yan

    2018-04-01

    Personal digital assistants, technology with various functions, have been applied in international clinical practice. Great benefits in reducing medical errors and enhancing the efficiency of clinical work have been achieved, but little research has investigated nurses' satisfaction with the use of personal digital assistants. To investigate nurses' satisfaction with use of personal digital assistants, and to explore the predictors of this. This is a cross-sectional descriptive study. We conducted a cross-sectional survey targeting nurses who used personal digital assistants in a comprehensive tertiary hospital in Beijing. A total of 383 nurses were recruited in this survey in 2015. The total score of nurses' satisfaction with use of personal digital assistants was 238.91 (SD 39.25). Nurses were less satisfied with the function of documentation, compared with the function of administering medical orders. The time length of using personal digital assistants, academic degree, and different departments predicted nurses' satisfaction towards personal digital assistant use (all P < 0.05). Nurses were satisfied with the accuracy of administering medical orders and the safety of recording data. The stability of the wireless network and efficiency related to nursing work were less promising. To some extent, nurses with higher education and longer working time with personal digital assistants were more satisfied with them. © 2018 John Wiley & Sons Australia, Ltd.

  19. Perception of quality and trustworthiness of Internet resources by personal health information seekers.

    Science.gov (United States)

    Stavri, P Zoë; Freeman, Donna J; Burroughs, Catherine M

    2003-01-01

    This paper focuses on one dimension of personal health information seeking: perception of quality and trustworthiness of information sources. Intensive interviews were conducted using a conversational, unstructured, exploratory interview style. Interviews were conducted at 3 publicly accessible library sites in Arizona, Hawaii and Nevada. Thirty-eight non-experts were interviewed. Three separate and distinct methods used to identify credible health information resources were identified. Consumers may have strong opinions about what they mistrust; use fairly rigorous evaluation protocols; or filter information based on intuition or common sense, eye appeal or an authoritative sounding sponsor or title. Many people use a mix of rational and/or intuitive criteria to assess the health information they use.

  20. Sharing is caring, but not error free: transparency of granular controls for sharing personal health information in social networks.

    Science.gov (United States)

    Hartzler, Andrea; Skeels, Meredith M; Mukai, Marlee; Powell, Christopher; Klasnja, Predrag; Pratt, Wanda

    2011-01-01

    When patients share personal health information with family and friends, their social networks become better equipped to help them through serious health situations. Thus, patients need tools that enable granular control over what personal health information is shared and with whom within social networks. Yet, we know little about how well such tools support patients' complex sharing needs. We report on a lab study in which we examined the transparency of sharing interfaces that display an overview and details of information sharing with network connections in an internet-based personal health information management tool called HealthWeaver. Although participants found the interfaces easy to use and were highly confident in their interpretation of the sharing controls, several participants made errors in determining what information was shared with whom. Our findings point to the critical importance of future work that examines design of usable interfaces that offer transparent granularity in support of patients' complex information sharing practices.

  1. Differential contributions of the anterior temporal and medial temporal lobe to the retrieval of memory for person identity information.

    Science.gov (United States)

    Tsukiura, Takashi; Suzuki, Chisato; Shigemune, Yayoi; Mochizuki-Kawai, Hiroko

    2008-12-01

    Although previous studies have suggested the importance of the bilateral anterior temporal (ATL) and medial temporal lobes (MTL) in the retrieval of person identity information, there is little evidence concerning how these regions differentially contribute to the process. Here we investigated this question using functional magnetic resonance imaging (fMRI). Before scanning, subjects learned associations among faces (F), names (N), and job titles (as a form of person-related semantics, S). During retrieval with fMRI, subjects were presented with previously learned and new S stimuli, and judged whether the stimuli were old or new. Successful retrieval (H) trials were divided into three conditions: retrieval of S and associated F and N (HSFN); retrieval of S and associated F (HSF); and retrieval of S only (HS). The left ATL was significantly activated in HSFN, compared to HSF or HS, whereas the right ATL and MTL were significantly activated in HSFN and HSF relative to HS. In addition, activity in bilateral ATL was significantly correlated with reaction time for HSFN, whereas we found no significant correlation between activity in the right MTL and reaction time in any condition. The present findings suggest that the left ATL may mediate associations between names and person-related semantic information, whereas the right ATL mediates the association between faces and person-related semantic information in memory for person identity information. In addition, activation of the right MTL region implies that this area may contribute to a more general relational processing of associative components, including memory for person identity information. Copyright 2007 Wiley-Liss, Inc.

  2. Personalized medicine. Closing the gap between knowledge and clinical practice.

    Science.gov (United States)

    Anaya, Juan-Manuel; Duarte-Rey, Carolina; Sarmiento-Monroy, Juan C; Bardey, David; Castiblanco, John; Rojas-Villarraga, Adriana

    2016-08-01

    Personalized medicine encompasses a broad and evolving field informed by a patient distinctive information and biomarker profile. Although terminology is evolving and some semantic interpretations exist (e.g., personalized, individualized, precision), in a broad sense personalized medicine can be coined as: "To practice medicine as it once used to be in the past using the current biotechnological tools." A humanized approach to personalized medicine would offer the possibility of exploiting systems biology and its concept of P5 medicine, where predictive factors for developing a disease should be examined within populations in order to establish preventive measures on at-risk individuals, for whom healthcare should be personalized and participatory. Herein, the process of personalized medicine is presented together with the options that can be offered in health care systems with limited resources for diseases like rheumatoid arthritis and type 1 diabetes. Copyright © 2016 Elsevier B.V. All rights reserved.

  3. Pro-active data breach detection: examining accuracy and applicability on personal information detected

    CSIR Research Space (South Africa)

    Botha, J

    2016-03-01

    Full Text Available breaches but does not provide a clear indication of the level of personal information available on the internet since only reported incidents are taken into account. The possibility of pro-active automated breach detection has previously been discussed as a...

  4. Natural Information Processing Systems

    OpenAIRE

    John Sweller; Susan Sweller

    2006-01-01

    Natural information processing systems such as biological evolution and human cognition organize information used to govern the activities of natural entities. When dealing with biologically secondary information, these systems can be specified by five common principles that we propose underlie natural information processing systems. The principles equate: (1) human long-term memory with a genome; (2) learning from other humans with biological reproduction; (3) problem solving through random ...

  5. Process mining user behaviour for personalization

    NARCIS (Netherlands)

    Maruster, L.; Faber, N.R.; Wang, J.

    2008-01-01

    As the on-line services and Web-based information systems proliferate in many domains of activities, it has become increasingly important to model user behaviour and personalization, so that these systems will appropriately address user characteristics. In this sense, particular topics are addressed

  6. Development of the radiation control system for personal permission, status and record

    International Nuclear Information System (INIS)

    Miyamoto, A.; Yamazaki, H.; Yuki, H.; Nanao, M.; Sugawara, Y.; Ohtsuki, T.

    2003-01-01

    The radiation control system for automated locks, personal status, and recordings in the database was developed at Laboratory of Nuclear Science (LNS), Tohoku University. It consists of the Programmable Logic Controllers (PLC) for the entrance system and Windows PC. The PLC is controlled with Fins Gateway and Compolet on the Windows PC through an ethernet. The SQL Server 2000 was also installed on the Windows PC for database management. In the system, personal data such as destination, purpose, working hours and radiation dose are stored in the database. Furthermore, monthly report of personal data can easily be printed out by using the system. Personal status can be checked by a status monitor of the accelerator in the operation room and the entrance of the radiation controlled area, etc. (author)

  7. Evolution of Cognitive Rehabilitation After Stroke From Traditional Techniques to Smart and Personalized Home-Based Information and Communication Technology Systems: Literature Review.

    Science.gov (United States)

    Cogollor, José M; Rojo-Lacal, Javier; Hermsdörfer, Joachim; Ferre, Manuel; Arredondo Waldmeyer, Maria Teresa; Giachritsis, Christos; Armstrong, Alan; Breñosa Martinez, Jose Manuel; Bautista Loza, Doris Anabelle; Sebastián, José María

    2018-03-26

    Neurological patients after stroke usually present cognitive deficits that cause dependencies in their daily living. These deficits mainly affect the performance of some of their daily activities. For that reason, stroke patients need long-term processes for their cognitive rehabilitation. Considering that classical techniques are focused on acting as guides and are dependent on help from therapists, significant efforts are being made to improve current methodologies and to use eHealth and Web-based architectures to implement information and communication technology (ICT) systems that achieve reliable, personalized, and home-based platforms to increase efficiency and level of attractiveness for patients and carers. The goal of this work was to provide an overview of the practices implemented for the assessment of stroke patients and cognitive rehabilitation. This study puts together traditional methods and the most recent personalized platforms based on ICT technologies and Internet of Things. A literature review has been distributed to a multidisciplinary team of researchers from engineering, psychology, and sport science fields. The systematic review has been focused on published scientific research, other European projects, and the most current innovative large-scale initiatives in the area. A total of 3469 results were retrieved from Web of Science, 284 studies from Journal of Medical Internet Research, and 15 European research projects from Community Research and Development Information Service from the last 15 years were reviewed for classification and selection regarding their relevance. A total of 7 relevant studies on the screening of stroke patients have been presented with 6 additional methods for the analysis of kinematics and 9 studies on the execution of goal-oriented activities. Meanwhile, the classical methods to provide cognitive rehabilitation have been classified in the 5 main techniques implemented. Finally, the review has been finalized with

  8. 17 CFR 248.10 - Limits on disclosure of nonpublic personal information to nonaffiliated third parties.

    Science.gov (United States)

    2010-04-01

    ...: Privacy of Consumer Financial Information and Safeguarding Personal Information Limits on Disclosures... customer opens an on-line account with you and agrees to receive the notices required in paragraph (a)(1) of this section electronically, and you allow the customer to opt out by any reasonable means within...

  9. Transportation Routing Analysis Geographic Information System (TRAGIS) User's Manual

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, PE

    2003-09-18

    The Transportation Routing Analysis Geographic Information System (TRAGIS) model is used to calculate highway, rail, or waterway routes within the United States. TRAGIS is a client-server application with the user interface and map data files residing on the user's personal computer and the routing engine and network data files on a network server. The user's manual provides documentation on installation and the use of the many features of the model.

  10. Reward Devaluation: Dot-Probe Meta-Analytic Evidence of Avoidance of Positive Information in Depressed Persons

    Science.gov (United States)

    Winer, E. Samuel; Salem, Taban

    2015-01-01

    Cognitive theories of depression and anxiety have traditionally emphasized the role of attentional biases in the processing of negative information. The dot-probe task has been widely used to study this phenomenon. Recent findings suggest that biased processing of positive information might also be an important aspect of developing psychopathological symptoms. However, despite some evidence suggesting persons with symptoms of depression and anxiety may avoid positive information, many dot-probe studies have produced null findings. The present review used conventional and novel meta-analytic methods to evaluate dot-probe attentional biases away from positive information and, for comparison, toward negative information, in depressed and anxious individuals. Results indicated that avoidance of positive information is a real effect exhibiting substantial evidential value among persons experiencing psychopathology, with individuals evidencing primary symptoms of depression clearly demonstrating this effect. Different theoretical explanations for these findings are evaluated, including those positing threat-processing structures, even-handedness, self-regulation, and reward devaluation, with the novel theory of reward devaluation emphasized and expanded. These novel findings and theory suggest that avoidance of prospective reward helps to explain the cause and sustainability of depressed states. Suggestions for future research and methodological advances are discussed. PMID:26619211

  11. PC-BEIS: a personal computer version of the biogenic emissions inventory system

    International Nuclear Information System (INIS)

    Pierce, T.E.; Waldruff, P.S.

    1991-01-01

    The US Environmental Protection Agency's Biogenic Emissions Inventory System (BEIS) has been adapted for use on IBM-compatible personal computers (PCs). PC-BEIS estimates hourly emissions of isoprene, α-pinene, other monoterpenes, and unidentified hydrocarbons for any county in the contiguous United States. To run the program, users must provide hourly data on ambient temperature, relative humidity, wind speed, cloud cover, and a code that identifies the particular county. This paper provides an overview of the method used to calculate biogenic emissions, shows an example application, and gives information on how to obtain a copy of the program

  12. Putting the Focus Back on the Patient: How Privacy Concerns Affect Personal Health Information Sharing Intentions.

    Science.gov (United States)

    Abdelhamid, Mohamed; Gaia, Joana; Sanders, G Lawrence

    2017-09-13

    Health care providers are driven by greater participation and systemic cost savings irrespective of benefits to individual patients derived from sharing Personal Health Information (PHI). Protecting PHI is a critical issue in the sharing of health care information systems; yet, there is very little literature examining the topic of sharing PHI electronically. A good overview of the regulatory, privacy, and societal barriers to sharing PHI can be found in the 2009 Health Information Technology for Economic and Clinical Health Act. This study investigated the factors that influence individuals' intentions to share their PHI electronically with health care providers, creating an understanding of how we can represent a patient's interests more accurately in sharing settings, instead of treating patients like predetermined subjects. Unlike privacy concern and trust, patient activation is a stable trait that is not subject to change in the short term and, thus, is a useful factor in predicting sharing behavior. We apply the extended privacy model in the health information sharing context and adapt this model to include patient activation and issue involvement to predict individuals' intentions. This was a survey-based study with 1600+ participants using the Health Information National Trends Survey (HINTS) data to validate a model through various statistical techniques. The research method included an assessment of both the measurement and structural models with post hoc analysis. We find that privacy concern has the most influence on individuals' intentions to share. Patient activation, issue involvement, and patient-physician relationship are significant predictors of sharing intention. We contribute to theory by introducing patient activation and issue involvement as proxies for personal interest factors in the health care context. Overall, this study found that although patients are open to sharing their PHI, they still have concerns over the privacy of their PHI

  13. Lofar information system design

    NARCIS (Netherlands)

    Valentijn, E.; Belikov, A. N.

    2009-01-01

    The Lofar Information System is a solution for Lofar Long Term Archive that is capable to store and handle PBs of raw and processed data. The newly created information system is based on Astro-WISE - the information system for wide field astronomy. We review an adaptation of Astro-WISE for the new

  14. Introduction of self-control of enterprise information system through accounting documentation process of

    Directory of Open Access Journals (Sweden)

    K.О. Volskа

    2017-12-01

    Full Text Available The research is devoted to determining the possibility of implementing self-control of an enterprise information system, describing the criteria for building an information system in an enterprise that will be self-organized and capable of self-analysis. The article considers the concept of self-control, its main criteria as well as the possibility of implementing the self-control in the information system of the enterprise. The current study provides the definition of intelligent information systems and how to use expert knowledge in them. The article presents the place of the self-control (in terms of its organization at the enterprise in the economic activity of the enterprise and its correlation with internal control; as a result, it is suggested to consider the self-control of the information system as the unit included in the methods of internal control. The paper carries out the comparison of the response to the error in the information system under the usual control (from the subject of the control to the person and the self-control, that made it possible to determine the latter as the method of preventing errors, that is, real-time control during the data entry in the information system of the enterprise. It is proposed to divide the control mechanisms in the information system into informational (protection of the information system from a technical point of view and special (accounting, legal, technological, etc.. The special control mechanisms of the information system should initially be formed by the experts of the relevant profile and who should present them in the form of algorithms for preventing any possible errors that will allow IT-professionals to describe them at the software level and implement one of the criteria for self-control of the information system, namely, a self-examination. The article proposes to implement the self-control at the input of the information system, when entering the data of the primary documents

  15. Management Information Systems

    OpenAIRE

    Furduescu Bogdan-Alexandru

    2017-01-01

    Technology is the science that studies processes, methods and operations run or applied onto raw materials, matters or data, in order to obtain a certain product. Information is the material signal able to launch a material reaction of a dynamic auto-tuning system for which the system is conditioned and finalized. Information Technology is the technology needed for handling (procuring, processing, storing converting and transmitting) information, in particular, with the use of computers [Long...

  16. Personalized direct marketing using digital publishing

    Science.gov (United States)

    Kutty, Cheeniyil L.; Prabhakaran, Jayasree K.

    2006-02-01

    In today's cost-conscious business climate, marketing and customer service decision makers are increasingly concerned with how to increase customer response and retention rates. Companies spend large amounts of money on Customer Relationship Management (CRM) solutions and data acquisition but they don't know how to use the information stored in these systems to improve the effectiveness of their direct marketing campaigns. By leveraging the customer information they already have, companies can create personalized, printed direct mail programs that generate high response rates, greater returns, and stronger customer loyalty, while gaining a significant edge over their competitors. To reach the promised land of one-to-one direct marketing (personalized direct marketing - PDM), companies need an end-to-end solution for creating, managing, printing, and distributing personalized direct mail "on demand." Having access to digital printing is just one piece of the solution. A more complete approach includes leveraging personalization technology into a useful direct marketing tool that provides true one-to-one marketing, allowing variable images and text in a personalized direct mail. This paper discusses integration of CRM with a Print-on-Demand solution so as to create truly personalized printed marketing campaigns for one or many individuals based on the profile information, preferences and purchase history stored in the CRM.

  17. Consumer Opinions of Health Information Exchange, e-Prescribing, and Personal Health Records.

    Science.gov (United States)

    Cochran, Gary L; Lander, Lina; Morien, Marsha; Lomelin, Daniel E; Brittin, Jeri; Reker, Celeste; Klepser, Donald G

    2015-01-01

    Consumer satisfaction is a crucial component of health information technology (HIT) utilization, as high satisfaction is expected to increase HIT utilization among providers and to allow consumers to become full participants in their own healthcare management. The primary objective of this pilot study was to identify consumer perspectives on health information technologies including health information exchange (HIE), e-prescribing (e-Rx), and personal health records (PHRs). Eight focus groups were conducted in seven towns and cities across Nebraska in 2013. Each group consisted of 10-12 participants. Discussions were organized topically in the following categories: HIE, e-Rx, and PHR. The qualitative analysis consisted of immersion and crystallization to develop a coding scheme that included both preconceived and emergent themes. Common themes across focus groups were identified and compiled for each discussion category. The study had 67 participants, of which 18 (27 percent) were male. Focus group findings revealed both perceived barriers and benefits to the adoption of HIT. Common HIT concerns expressed across focus groups included privacy and security of medical information, decreases in quality of care, inconsistent provider participation, and the potential cost of implementation. Positive expectations regarding HIT included better accuracy and completeness of information, and improved communication and coordination between healthcare providers. Improvements in patient care were expected as a result of easy physician access to consolidated information across providers as well as the speed of sharing and availability of information in an emergency. In addition, participants were optimistic about patient empowerment and convenient access to and control of personal health data. Consumer concerns focused on privacy and security of the health information, as well as the cost of implementing the technologies and the possibility of an unintended negative impact on the

  18. Biometric Features in Person Recognition Systems

    Directory of Open Access Journals (Sweden)

    Edgaras Ivanovas

    2011-03-01

    Full Text Available Lately a lot of research effort is devoted for recognition of a human being using his biometric characteristics. Biometric recognition systems are used in various applications, e. g., identification for state border crossing or firearm, which allows only enrolled persons to use it. In this paper biometric characteristics and their properties are reviewed. Development of high accuracy system requires distinctive and permanent characteristics, whereas development of user friendly system requires collectable and acceptable characteristics. It is showed that properties of biometric characteristics do not influence research effort significantly. Properties of biometric characteristic features and their influence are discussed.Article in Lithuanian

  19. National health information infrastructure model: a milestone for health information management education realignment.

    Science.gov (United States)

    Meidani, Zahra; Sadoughi, Farhnaz; Ahmadi, Maryam; Maleki, Mohammad Reza; Zohoor, Alireza; Saddik, Basema

    2012-01-01

    Challenges and drawbacks of the health information management (HIM) curriculum at the Master's degree were examined, including lack of well-established computing sciences and inadequacy to give rise to specific competencies. Information management was condensed to the hospital setting to intensify the indispensability of a well-organized educational campaign. The healthcare information dimensions of a national health information infrastructure (NHII) model present novel requirements for HIM education. Articles related to challenges and barriers to adoption of the personal health record (PHR), the core component of personal health dimension of an NHII, were searched through sources including Science Direct, ProQuest, and PubMed. Through a literature review, concerns about the PHR that are associated with HIM functions and responsibilities were extracted. In the community/public health dimension of the NHII the main components have been specified, and the targeted information was gathered through literature review, e-mail, and navigation of international and national organizations. Again, topics related to HIM were evoked. Using an information system (decision support system, artificial neural network, etc.) to support PHR media and content, patient education, patient-HIM communication skills, consumer health information, conducting a surveillance system in other areas of healthcare such as a risk factor surveillance system, occupational health, using an information system to analyze aggregated data including a geographic information system, data mining, online analytical processing, public health vocabulary and classification system, and emerging automated coding systems pose major knowledge gaps in HIM education. Combining all required skills and expertise to handle personal and public dimensions of healthcare information in a single curriculum is simply impractical. Role expansion and role extension for HIM professionals should be defined based on the essence of

  20. Information Management System Development for the Characterization and Analysis of Human Error in Naval Aviation Maintenance Related Mishaps

    National Research Council Canada - National Science Library

    Wood, Brian

    2000-01-01

    ..., incidents, and personal injuries, is the foundation of this management tool. The target audience for this information management system tool includes safety personnel, mishap investigators, Aircraft Mishap Board (AMB...

  1. An Evaluation of Information Consistency in Grid Information Systems

    CERN Document Server

    Field, Laurence

    2017-01-01

    A Grid information system resolves queries that may need to consider all information sources (Grid services), which are widely distributed geographically, in order to enable efficient Grid functions that may utilise multiple cooperating services. Fundamentally this can be achieved by either moving the query to the data (query shipping) or moving the data to the query (data shipping). Existing Grid information system implementations have adopted one of the two approaches. This paper explores the two approaches in further detail by evaluating them to the best possible extent with respect to Grid information system benchmarking metrics. A Grid information system that follows the data shipping approach based on the replication of information that aims to improve the currency for highly-mutable information is presented. An implementation of this, based on an Enterprise Messaging System, is evaluated using the benchmarking method and the consequence of the results for the design of Grid information systems is discu...

  2. Contested collaboration: A descriptive model of intergroup communication in information system design

    DEFF Research Database (Denmark)

    Sonnenwald, D.H.

    1995-01-01

    . The model describes design phases, roles, themes, and intergroup communication networks as they evolve throughout the design process and characterizes design as a process of ''contested collaboration.'' It is a first step towards a predictive design model that suggests strategies which may help participants......Many information system design situations today include users, designers, and developers who, with their own unique group and individual perspectives, need to interact so that they can come to a working understanding of how the information system being developed will coexist with and ideally...... support patterns of work activities, social groups, and personal beliefs. In these situations, design is fundamentally an interactive process that requires communication among users, designers, and developers. However, communication among these groups is often difficult although of paramount importance...

  3. Migrating the facility profile information management system into the world wide web

    Energy Technology Data Exchange (ETDEWEB)

    Kero, R.E.; Swietlik, C.E.

    1994-09-01

    The Department of Energy - Office of Special Projects and Argonne National Laboratory (ANL), along with the Department of Energy - office of Scientific and Technical Information have previously designed and implemented the Environment, Safety and Health Facility Profile Information Management System (FPIMS) to facilitate greater efficiency in searching, analyzing and disseminating information found within environment, safety and health oversight documents. This information retrieval based system serves as a central repository for full-text electronic oversight documents, as well as a management planning and decision making tool that can assist in trend and root cause analyses. Continuous improvement of environment, safety and health programs are currently aided through this personal computer-based system by providing a means for the open communication of lessons learned across the department. Overall benefits have included reductions in costs and improvements in past information management capabilities. Access to the FPIMS has been possible historically through a headquarters-based local area network equipped with modems. Continued demand for greater accessibility of the system by remote DOE field offices and sites, in conjunction with the Secretary of Energy` s call for greater public accessibility to Department of Energy (DOE) information resources, has been the impetus to expand access through the use of Internet technologies. Therefore, the following paper will discuss reasons for migrating the FPIMS system into the World Wide Web (Web), various lessons learned from the FPIMS migration effort, as well as future plans for enhancing the Web-based FPIMS.

  4. Next generation information systems

    Energy Technology Data Exchange (ETDEWEB)

    Limback, Nathan P [Los Alamos National Laboratory; Medina, Melanie A [Los Alamos National Laboratory; Silva, Michelle E [Los Alamos National Laboratory

    2010-01-01

    The Information Systems Analysis and Development (ISAD) Team of the Safeguards Systems Group at Los Alamos National Laboratory (LANL) has been developing web based information and knowledge management systems for sixteen years. Our vision is to rapidly and cost effectively provide knowledge management solutions in the form of interactive information systems that help customers organize, archive, post and retrieve nonproliferation and safeguards knowledge and information vital to their success. The team has developed several comprehensive information systems that assist users in the betterment and growth of their organizations and programs. Through our information systems, users are able to streamline operations, increase productivity, and share and access information from diverse geographic locations. The ISAD team is also producing interactive visual models. Interactive visual models provide many benefits to customers beyond the scope of traditional full-scale modeling. We have the ability to simulate a vision that a customer may propose, without the time constraints of traditional engineering modeling tools. Our interactive visual models can be used to access specialized training areas, controlled areas, and highly radioactive areas, as well as review site-specific training for complex facilities, and asset management. Like the information systems that the ISAD team develops, these models can be shared and accessed from any location with access to the internet. The purpose of this paper is to elaborate on the capabilities of information systems and interactive visual models as well as consider the possibility of combining the two capabilities to provide the next generation of infonnation systems. The collection, processing, and integration of data in new ways can contribute to the security of the nation by providing indicators and information for timely action to decrease the traditional and new nuclear threats. Modeling and simulation tied to comprehensive

  5. User Behaviour in Personal Data Disclosure

    OpenAIRE

    Malheiros, M.

    2014-01-01

    Organisations see the collection and use of data about their customers, citizens or employees as necessary to enable value-adding activities such as personalised service or targeted advertising. At the same time, the increased efficiency and cost-effectiveness of information systems have removed most economic disincentives for widespread collection of personal data. HCI privacy research has mainly focused on identifying features of information systems or organisational practices that lead to ...

  6. Personal Information Leaks with Automatic Login in Mobile Social Network Services

    Directory of Open Access Journals (Sweden)

    Jongwon Choi

    2015-06-01

    Full Text Available To log in to a mobile social network service (SNS server, users must enter their ID and password to get through the authentication process. At that time, if the user sets up the automatic login option on the app, a sort of security token is created on the server based on the user’s ID and password. This security token is called a credential. Because such credentials are convenient for users, they are utilized by most mobile SNS apps. However, the current state of credential management for the majority of Android SNS apps is very weak. This paper demonstrates the possibility of a credential cloning attack. Such attacks occur when an attacker extracts the credential from the victim’s smart device and inserts it into their own smart device. Then, without knowing the victim’s ID and password, the attacker can access the victim’s account. This type of attack gives access to various pieces of personal information without authorization. Thus, in this paper, we analyze the vulnerabilities of the main Android-based SNS apps to credential cloning attacks, and examine the potential leakage of personal information that may result. We then introduce effective countermeasures to resolve these problems.

  7. The regulation of informed consent to participation in clinical research by mentally ill persons: An overview

    Directory of Open Access Journals (Sweden)

    A Nienaber

    2010-12-01

    Full Text Available The article examines the legal requirements relating to the informed consent of mentally ill persons to participation in clinical research in South Africa. First, the juridical basis of informed consent in South African law is outlined; and second, the requirements for lawful consent developed in South African common law and case law are presented. Finally, the article deliberates upon the requirements for the participation of mentally ill persons in research as laid down by the Mental Health Care Act and its regulations, the National Health Act and its (draft regulations, and the South African Constitution.

  8. A data acquisition system based on a personal computer

    International Nuclear Information System (INIS)

    Omata, K.; Fujita, Y.; Yoshikawa, N.; Sekiguchi, M.; Shida, Y.

    1991-07-01

    A versatile and flexible data acquisition system KODAQ (Kakuken Online Data AcQuisition system) has been developed. The system runs with CAMAC and a most popular Japanese personal computer, PC9801 (NEC), similar to the IBM PC/AT. The system is designed to set up easily a data acquisition system for various kinds of nuclear-physics experiments. (author)

  9. The Influence of Organizational Systems on Information Exchange in Long-Term Care Facilities: An Institutional Ethnography.

    Science.gov (United States)

    Caspar, Sienna; Ratner, Pamela A; Phinney, Alison; MacKinnon, Karen

    2016-06-01

    Person-centered care is heavily dependent on effective information exchange among health care team members. We explored the organizational systems that influence resident care attendants' (RCAs) access to care information in long-term care (LTC) settings. We conducted an institutional ethnography in three LTC facilities. Investigative methods included naturalistic observations, in-depth interviews, and textual analysis. Practical access to texts containing individualized care-related information (e.g., care plans) was dependent on job classification. Regulated health care professionals accessed these texts daily. RCAs lacked practical access to these texts and primarily received and shared information orally. Microsystems of care, based on information exchange formats, emerged. Organizational systems mandated written exchange of information and did not formally support an oral exchange. Thus, oral information exchanges were largely dependent on the quality of workplace relationships. Formal systems are needed to support structured oral information exchange within and between the microsystems of care found in LTC. © The Author(s) 2016.

  10. Exploring New Potentials of Blogs for Learning: Can Children Use Blogs for Personal Information Management (PIM)?

    Science.gov (United States)

    Yeo, Hwan-Ik; Lee, Yekyung Lisa

    2014-01-01

    This study explores the use of blogs for personal information management (PIM) as a learning tool that could bring increased efficiency and academic self-efficacy for carrying out learning tasks. In order to identify the uses and effects of using blogs for PIM by children, a control group that used personal spaces within the class website and an…

  11. Application of Agent Methodology in Healthcare Information Systems

    Directory of Open Access Journals (Sweden)

    Reem Abdalla

    2017-02-01

    Full Text Available This paper presents a case study to describe the features and the phases of the two agent methodologies. The Gaia methodology for agent oriented analysis and design, Tropos is a detailed agent oriented software engineering methodology to explore each methodology's ability to present solutions for small problems. Also we provide an attempt to discover whether the methodology is in fact understandable and usable. In addition we were collecting and taking notes of the advantages and weaknesses of these methodologies during the study analysis for each methodology and the relationships among their models. The Guardian Angle: Patient-Centered Health Information System (GA: PCHIS is the personal system to help track, manage, and interpret the subject's health history, and give advice to both patient and provider is used as the case study throughout the paper.

  12. Real-time personal dose measurement and management system

    International Nuclear Information System (INIS)

    Zhang Zhiyong; Cheng Chang; Liu Zhengshan; Yang Huating; Deng Changming; Zhang Xiu; Guo Zhanjie

    2001-01-01

    The composition and design of a real-time personal dose measurement and management system are described. Accordingly, some pertinent hardware circuits and software codes including their operation modes are presented

  13. Management Information Systems

    Directory of Open Access Journals (Sweden)

    Furduescu Bogdan-Alexandru

    2017-12-01

    Full Text Available Technology is the science that studies processes, methods and operations run or applied onto raw materials, matters or data, in order to obtain a certain product. Information is the material signal able to launch a material reaction of a dynamic auto-tuning system for which the system is conditioned and finalized. Information Technology is the technology needed for handling (procuring, processing, storing converting and transmitting information, in particular, with the use of computers [Longley, D. & Shain, M. (1985, p. 164]. The importance of IT in the economic growth and development is widely known, taking into account the impact that technology can have on the success and survival, or the failure of the economic activity of enterprises/organizations, IT offering various management information systems (MIS, executive and feedback segments, which all have important and beneficial implications in management and control.

  14. Device- and system-independent personal touchless user interface for operating rooms : One personal UI to control all displays in an operating room.

    Science.gov (United States)

    Ma, Meng; Fallavollita, Pascal; Habert, Séverine; Weidert, Simon; Navab, Nassir

    2016-06-01

    In the modern day operating room, the surgeon performs surgeries with the support of different medical systems that showcase patient information, physiological data, and medical images. It is generally accepted that numerous interactions must be performed by the surgical team to control the corresponding medical system to retrieve the desired information. Joysticks and physical keys are still present in the operating room due to the disadvantages of mouses, and surgeons often communicate instructions to the surgical team when requiring information from a specific medical system. In this paper, a novel user interface is developed that allows the surgeon to personally perform touchless interaction with the various medical systems, switch effortlessly among them, all of this without modifying the systems' software and hardware. To achieve this, a wearable RGB-D sensor is mounted on the surgeon's head for inside-out tracking of his/her finger with any of the medical systems' displays. Android devices with a special application are connected to the computers on which the medical systems are running, simulating a normal USB mouse and keyboard. When the surgeon performs interaction using pointing gestures, the desired cursor position in the targeted medical system display, and gestures, are transformed into general events and then sent to the corresponding Android device. Finally, the application running on the Android devices generates the corresponding mouse or keyboard events according to the targeted medical system. To simulate an operating room setting, our unique user interface was tested by seven medical participants who performed several interactions with the visualization of CT, MRI, and fluoroscopy images at varying distances from them. Results from the system usability scale and NASA-TLX workload index indicated a strong acceptance of our proposed user interface.

  15. ReMashed – Recommendation Approaches for Mash-Up Personal Learning Environments in Formal and Informal Learning Settings

    NARCIS (Netherlands)

    Drachsler, Hendrik; Pecceu, Dries; Arts, Tanja; Hutten, Edwin; Rutledge, Lloyd; Van Rosmalen, Peter; Hummel, Hans; Koper, Rob

    2009-01-01

    Drachsler, H., Peccau, D., Arts, T., Hutten, E., Rutledge, L., Van Rosmalen, P., Hummel, H. G. K., & Koper, R. (2009). ReMashed – Recommendation Approaches for Mash-Up Personal Learning Environments in Formal and Informal Learning Settings. Presentation at the 2nd Workshop Mash-Up Personal Learning

  16. [Three dimensional CT reconstruction system on a personal computer].

    Science.gov (United States)

    Watanabe, E; Ide, T; Teramoto, A; Mayanagi, Y

    1991-03-01

    A new computer system to produce three dimensional surface image from CT scan has been invented. Although many similar systems have been already developed and reported, they are too expensive to be set up in routine clinical services because most of these systems are based on high power mini-computer systems. According to the opinion that a practical 3D-CT system should be used in daily clinical activities using only a personal computer, we have transplanted the 3D program into a personal computer working in MS-DOS (16-bit, 12 MHz). We added to the program a routine which simulates surgical dissection on the surface image. The time required to produce the surface image ranges from 40 to 90 seconds. To facilitate the simulation, we connected a 3D system with the neuronavigator. The navigator gives the position of the surgical simulation when the surgeon places the navigator tip on the patient's head thus simulating the surgical excision before the real dissection.

  17. VISION-AIDED CONTEXT-AWARE FRAMEWORK FOR PERSONAL NAVIGATION SERVICES

    Directory of Open Access Journals (Sweden)

    S. Saeedi

    2012-07-01

    Full Text Available The ubiquity of mobile devices (such as smartphones and tablet-PCs has encouraged the use of location-based services (LBS that are relevant to the current location and context of a mobile user. The main challenge of LBS is to find a pervasive and accurate personal navigation system (PNS in different situations of a mobile user. In this paper, we propose a method of personal navigation for pedestrians that allows a user to freely move in outdoor environments. This system aims at detection of the context information which is useful for improving personal navigation. The context information for a PNS consists of user activity modes (e.g. walking, stationary, driving, and etc. and the mobile device orientation and placement with respect to the user. After detecting the context information, a low-cost integrated positioning algorithm has been employed to estimate pedestrian navigation parameters. The method is based on the integration of the relative user’s motion (changes of velocity and heading angle estimation based on the video image matching and absolute position information provided by GPS. A Kalman filter (KF has been used to improve the navigation solution when the user is walking and the phone is in his/her hand. The Experimental results demonstrate the capabilities of this method for outdoor personal navigation systems.

  18. Event detection in athletics for personalized sports content delivery

    DEFF Research Database (Denmark)

    Katsarakis, N.; Pnevmatikakis, A.

    2009-01-01

    Broadcasting of athletics is nowadays biased towards running (sprint and longer distances) sports. Personalized content delivery can change that for users that wish to focus on different content. Using a combination of video signal processing algorithms and live information that accompanies the v...... algorithms needed for the extraction of the events that trigger both between and within sport camera selection, and describes a system that handles user preferences, live information andvideo-generated events to offer personalized content to the users.......Broadcasting of athletics is nowadays biased towards running (sprint and longer distances) sports. Personalized content delivery can change that for users that wish to focus on different content. Using a combination of video signal processing algorithms and live information that accompanies...... the video of large-scale sports like the Olympics, a system can attend to the preferences of users by selecting the most suitable camera view for them.There are two types of camera selection for personalized content delivery. According to the between sport camera selection, the view is changed between two...

  19. Internet Use for Health-Related Information via Personal Computers and Cell Phones in Japan: A Cross-Sectional Population-Based Survey

    Science.gov (United States)

    Takahashi, Yoshimitsu; Ohura, Tomoko; Ishizaki, Tatsuro; Okamoto, Shigeru; Miki, Kenji; Naito, Mariko; Akamatsu, Rie; Sugimori, Hiroki; Yoshiike, Nobuo; Miyaki, Koichi; Shimbo, Takuro

    2011-01-01

    Background The Internet is known to be used for health purposes by the general public all over the world. However, little is known about the use of, attitudes toward, and activities regarding eHealth among the Japanese population. Objectives This study aimed to measure the prevalence of Internet use for health-related information compared with other sources, and to examine the effects on user knowledge, attitudes, and activities with regard to Internet use for health-related information in Japan. We examined the extent of use via personal computers and cell phones. Methods We conducted a cross-sectional survey of a quasi-representative sample (N = 1200) of the Japanese general population aged 15–79 years in September 2007. The main outcome measures were (1) self-reported rates of Internet use in the past year to acquire health-related information and to contact health professionals, family, friends, and peers specifically for health-related purposes, and (2) perceived effects of Internet use on health care. Results The prevalence of Internet use via personal computer for acquiring health-related information was 23.8% (286/1200) among those surveyed, whereas the prevalence via cell phone was 6% (77). Internet use via both personal computer and cell phone for communicating with health professionals, family, friends, or peers was not common. The Internet was used via personal computer for acquiring health-related information primarily by younger people, people with higher education levels, and people with higher household incomes. The majority of those who used the Internet for health care purposes responded that the Internet improved their knowledge or affected their lifestyle attitude, and that they felt confident in the health-related information they obtained from the Internet. However, less than one-quarter thought it improved their ability to manage their health or affected their health-related activities. Conclusions Japanese moderately used the Internet via

  20. Internet use for health-related information via personal computers and cell phones in Japan: a cross-sectional population-based survey.

    Science.gov (United States)

    Takahashi, Yoshimitsu; Ohura, Tomoko; Ishizaki, Tatsuro; Okamoto, Shigeru; Miki, Kenji; Naito, Mariko; Akamatsu, Rie; Sugimori, Hiroki; Yoshiike, Nobuo; Miyaki, Koichi; Shimbo, Takuro; Nakayama, Takeo

    2011-12-14

    The Internet is known to be used for health purposes by the general public all over the world. However, little is known about the use of, attitudes toward, and activities regarding eHealth among the Japanese population. This study aimed to measure the prevalence of Internet use for health-related information compared with other sources, and to examine the effects on user knowledge, attitudes, and activities with regard to Internet use for health-related information in Japan. We examined the extent of use via personal computers and cell phones. We conducted a cross-sectional survey of a quasi-representative sample (N = 1200) of the Japanese general population aged 15-79 years in September 2007. The main outcome measures were (1) self-reported rates of Internet use in the past year to acquire health-related information and to contact health professionals, family, friends, and peers specifically for health-related purposes, and (2) perceived effects of Internet use on health care. The prevalence of Internet use via personal computer for acquiring health-related information was 23.8% (286/1200) among those surveyed, whereas the prevalence via cell phone was 6% (77). Internet use via both personal computer and cell phone for communicating with health professionals, family, friends, or peers was not common. The Internet was used via personal computer for acquiring health-related information primarily by younger people, people with higher education levels, and people with higher household incomes. The majority of those who used the Internet for health care purposes responded that the Internet improved their knowledge or affected their lifestyle attitude, and that they felt confident in the health-related information they obtained from the Internet. However, less than one-quarter thought it improved their ability to manage their health or affected their health-related activities. Japanese moderately used the Internet via personal computers for health purposes, and rarely

  1. Introduction to information processing

    CERN Document Server

    Dietel, Harvey M

    2014-01-01

    An Introduction to Information Processing provides an informal introduction to the computer field. This book introduces computer hardware, which is the actual computing equipment.Organized into three parts encompassing 12 chapters, this book begins with an overview of the evolution of personal computing and includes detailed case studies on two of the most essential personal computers for the 1980s, namely, the IBM Personal Computer and Apple's Macintosh. This text then traces the evolution of modern computing systems from the earliest mechanical calculating devices to microchips. Other chapte

  2. IAEA safeguards information system

    International Nuclear Information System (INIS)

    Nardi, J.

    1984-01-01

    The basic concepts, structure, and operation of the Agency Safeguards Information System is discussed with respect to its role in accomplishing the overall objectives of safeguards. The basis and purposes of the Agency's information system, the structure and flow of information within the Agency's system, the relationship of the components is the Agency system, the requirements of Member States in respect of their reporting to the Agency, and the relationship of accounting data vis-a-vis facility and inspection data are described

  3. World-wide information systems

    International Nuclear Information System (INIS)

    1974-01-01

    The three international organizations, IAEA, FAO, and UNESCO, which jointly sponsored the Symposium, share an active interest and involvement in information systems development. The extent of their interest was explained by the Director General of the IAEA, Dr. Sigvard Eklund, when he opened the meeting on behalf of the three co-sponsors: UNESCO in conjunction with the International Council of Scientific Unions (ICSU), took initiatives in 1966 which led to the establishment of its UNISIST programme. Its aims are to co-ordinate existing trends towards international co-operation in the collection, storage and dissemination of information and to act as a catalyst. Its ultimate goal is to establish 'a flexible and loosely connected network of information services based on voluntary co-operation'. A particular concern of UNISIST is to ensure co-ordination of the information activities of the United Nations organizations. The Symposium provided an opportunity for the science information community to assess the progress already made in creating links between diverse national, international, intergovernmental and non-governmental information systems and services. Papers were presented describing current developments in the national information systems of a number of countries, with special emphasis on how these developments were furthering harmonization of national information policies and facilitating interconnection with international systems. INIS and AGRIS figured prominently amongst the international systems discussed. In addition, proposals for two new international systems, to be known as DEVSIS and SPINIS, were outlined. The former will deal with development science information; the latter will cover the information on the administrative, scientific and legal aspects of science policy. There was also discussion of international co-operation in information handling within such international organizations as the CMEA, the Commission of the European Communities and

  4. Analysis of the Effect of Information System Quality to Intention to Reuse of Employee Management Information System (Simpeg Based on Information Systems Success Model

    Directory of Open Access Journals (Sweden)

    Suryanto Tri Lathif Mardi

    2016-01-01

    Full Text Available This study examines the effect of Information Quality, Systems Quality and Service Quality on the user intention to reuse Employee Management Information System (SIMPEG in University in the city of Surabaya, based on the theoretical foundation of DeLone and McLane Information Systems Success (ISS Model. The distribution of questionnaire was conducted to 120 employees of different universities by means of stratified random sampling. The results showed that: (1 there is a significant positive effect of the System Quality on the Quality of Information, (2 there is a significant positive effect of the Information Quality on the Intention to Reuse, information related to the fulfillment of the user’s needs; (3 there is a significant positive effect of the Quality of the Intention on system re-use, the system related to the fulfillment of the needs of users; (4 there is no effect of the Quality of Service to the Intention to Reuse. In the end, the results of this study provide an analysis and advice to The University officials that can be used as a consideration for Information Technology/Information System investment and development in accordance with the Success of Information System and Intention to Reuse model.

  5. New methodology for a person identification system

    Indian Academy of Sciences (India)

    Home; Journals; Sadhana; Volume 31; Issue 3. New methodology for a person identification system. R Bremananth A Chitra. Volume 31 Issue 3 June 2006 pp 259-276 ... Experimental results illustrate that the proposed method has been easily espoused in elections, bank transactions and other security applications.

  6. [P.A.I.S., a personal medical information system. A comprehensive medical knowledge base].

    Science.gov (United States)

    Münch, E

    1994-06-01

    The electronic medical knowledge data base DOPIS is a compliation of knowledge from various special fields of medicine. Using uniform nomenclature, the data are presented on demand as they would be in a book chapter. Concise updates can be performed at low cost. The primary structure of the concept is the division of medical knowledge into data banks on diagnosis, literature, medication and pharmacology, as well as so-called electronic textbooks. All data banks and electronic textbooks are connected associatively. Visual information is obtained via the image data bank connected to the diagnosis data bank and the electronic books. Moreover, DOPIS has an integrated patient findings system, as well as an image processing and archiving system with research values enabling research functions. The diagnosis and literature data banks can be modified by the user or author, or fed with their own data (a so-called Expert System Shell). For authors from special fields working on the project, an extra Medical Electronic Publishing System has been developed and made available for the electronic textbooks. The model for the knowledge data base has been developed in the field of ENT, the programme implemented and initially ENT data have been stored.

  7. Tourism information system

    OpenAIRE

    Ulevičius, Žygimantas

    2017-01-01

    The goal of this project is to create responsive design portal with the tools for its administration which lets users to access tourist relevant information. In order to achieve the goal certain tasks were formulated, few technical analysis were done and similar systems which already exist were reviewed. The result is creation of information system with administrative tools, which can be used by several user types which have rights to take adequate actions. The system has account control modu...

  8. Intelligent Techniques Using Molecular Data Analysis in Leukaemia: An Opportunity for Personalized Medicine Support System.

    Science.gov (United States)

    Banjar, Haneen; Adelson, David; Brown, Fred; Chaudhri, Naeem

    2017-01-01

    The use of intelligent techniques in medicine has brought a ray of hope in terms of treating leukaemia patients. Personalized treatment uses patient's genetic profile to select a mode of treatment. This process makes use of molecular technology and machine learning, to determine the most suitable approach to treating a leukaemia patient. Until now, no reviews have been published from a computational perspective concerning the development of personalized medicine intelligent techniques for leukaemia patients using molecular data analysis. This review studies the published empirical research on personalized medicine in leukaemia and synthesizes findings across studies related to intelligence techniques in leukaemia, with specific attention to particular categories of these studies to help identify opportunities for further research into personalized medicine support systems in chronic myeloid leukaemia. A systematic search was carried out to identify studies using intelligence techniques in leukaemia and to categorize these studies based on leukaemia type and also the task, data source, and purpose of the studies. Most studies used molecular data analysis for personalized medicine, but future advancement for leukaemia patients requires molecular models that use advanced machine-learning methods to automate decision-making in treatment management to deliver supportive medical information to the patient in clinical practice.

  9. Private personalized social recommendations in an IPTV system

    Science.gov (United States)

    Elmisery, Ahmed M.

    2014-04-01

    In our connected world, recommender systems have become widely known for their ability to provide expert and personalize referrals to end-users in different domains. The rapid growth of social networks and new kinds of systems so called "social recommender systems" are rising, where recommender systems can be utilized to find a suitable content according to end-users' personal preferences. However, preserving end-users' privacy in social recommender systems is a very challenging problem that might prevent end-users from releasing their own data, which detains the accuracy of extracted referrals. In order to gain accurate referrals, social recommender systems should have the ability to preserve the privacy of end-users registered in this system. In this paper, we present a middleware that runs on end-users' Set-top boxes to conceal their profile data when released for generating referrals, such that computation of recommendation proceeds over the concealed data. The proposed middleware is equipped with two concealment protocols to give users a complete control on the privacy level of their profiles. We present an IPTV network scenario and perform a number of different experiments to test the efficiency and accuracy of our protocols. As supported by the experiments, our protocols maintain the recommendations accuracy with acceptable privacy level.

  10. Report: Cybersecurity Act of 2015 Report - EPA’s Policies and Procedures to Protect Systems With Personally Identifiable Information

    Science.gov (United States)

    Report #16-P-0259, August 10, 2016. The EPA has 30 systems that contain sensitive PII. Safeguarding information and preventing system breaches are essential for ensuring the EPA retains the trust of the American public.

  11. Audit for Information Systems Security

    Directory of Open Access Journals (Sweden)

    Ana-Maria SUDUC

    2010-01-01

    Full Text Available The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they support. In spite of significant advances in the information security area many information systems are still vulnerable to inside or outside attacks. The existence of an internal audit for information system security increases the probability of adopting adequate security measures and preventing these attacks or lowering the negative consequences. The paper presents an exploratory study on informatics audit for information systems security.

  12. Disclosing Genetic Risk for Coronary Heart Disease: Attitudes Toward Personal Information in Health Records.

    Science.gov (United States)

    Brown, Sherry-Ann; Jouni, Hayan; Marroush, Tariq S; Kullo, Iftikhar J

    2017-04-01

    Incorporating genetic risk information in electronic health records (EHRs) will facilitate implementation of genomic medicine in clinical practice. However, little is known about patients' attitudes toward incorporation of genetic risk information as a component of personal health information in EHRs. This study investigated whether disclosure of a genetic risk score (GRS) for coronary heart disease influences attitudes toward incorporation of personal health information including genetic risk in EHRs. Participants aged 45-65 years with intermediate 10-year coronary heart disease risk were randomized to receive a conventional risk score (CRS) alone or with a GRS from a genetic counselor, followed by shared decision making with a physician using the same standard presentation and information templates for all study participants. The CRS and GRS were then incorporated into the EHR and made accessible to both patients and physicians. Baseline and post-disclosure surveys were completed to assess whether attitudes differed by GRS disclosure. Data were collected from 2013 to 2015 and analyzed in 2015-2016. GRS and CRS participants reported similar positive attitudes toward incorporation of genetic risk information in the EHR. Compared with CRS participants, participants with high GRS were more concerned about the confidentiality of genetic risk information (OR=3.67, 95% CI=1.29, 12.32, p=0.01). Post-disclosure, frequency of patient portal access was associated with positive attitudes. Participants in this study of coronary heart disease risk disclosure overall had positive attitudes toward incorporation of genetic risk information in EHRs, although those who received genetic risk information had concerns about confidentiality. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  13. Management Information Systems Research.

    Science.gov (United States)

    Research on management information systems is illusive in many respects. Part of the basic research problem in MIS stems from the absence of standard...decision making. But the transition from these results to the realization of ’satisfactory’ management information systems remains difficult indeed. The...paper discusses several aspects of research on management information systems and reviews a selection of efforts that appear significant for future progress. (Author)

  14. Automated personal dosimetry monitoring system for NPP

    International Nuclear Information System (INIS)

    Chanyshev, E.; Chechyotkin, N.; Kondratev, A.; Plyshevskaya, D.

    2006-01-01

    Full text: Radiation safety of personnel at nuclear power plants (NPP) is a priority aim. Degree of radiation exposure of personnel is defined by many factors: NPP design, operation of equipment, organizational management of radiation hazardous works and, certainly, safety culture of every employee. Automated Personal Dosimetry Monitoring System (A.P.D.M.S.) is applied at all nuclear power plants nowadays in Russia to eliminate the possibility of occupational radiation exposure beyond regulated level under different modes of NPP operation. A.P.D.M.S. provides individual radiation dose registration. In the paper the efforts of Design Bureau 'Promengineering' in construction of software and hardware complex of A.P.D.M.S. (S.H.W. A.P.D.M.S.) for NPP with PWR are presented. The developed complex is intended to automatize activities of radiation safety department when caring out individual dosimetry control. The complex covers all main processes concerning individual monitoring of external and internal radiation exposure as well as dose recording, management, and planning. S.H.W. A.P.D.M.S. is a multi-purpose system which software was designed on the modular approach. This approach presumes modification and extension of software using new components (modules) without changes in other components. Such structure makes the system flexible and allows modifying it in case of implementation a new radiation safety requirements and extending the scope of dosimetry monitoring. That gives the possibility to include with time new kinds of dosimetry control for Russian NPP in compliance with IAEA recommendations, for instance, control of the equivalent dose rate to the skin and the equivalent dose rate to the lens of the eye S.H.W. A.P.D.M.S. provides dosimetry control as follows: Current monitoring of external radiation exposure: - Gamma radiation dose measurement using radio-photoluminescent personal dosimeters. - Neutron radiation dose measurement using thermoluminescent

  15. Identifying preferred format and source of exercise information in persons with multiple sclerosis that can be delivered by health-care providers.

    Science.gov (United States)

    Learmonth, Yvonne C; Adamson, Brynn C; Balto, Julia M; Chiu, Chung-Yi; Molina-Guzman, Isabel M; Finlayson, Marcia; Riskin, Barry J; Motl, Robert W

    2017-10-01

    There is increasing recognition of the benefits of exercise in individuals with multiple sclerosis (MS), yet the MS population does not engage in sufficient amounts of exercise to accrue health benefits. There has been little qualitative inquiry to establish the preferred format and source for receiving exercise information from health-care providers among persons with MS. We sought to identify the desired and preferred format and source of exercise information for persons with MS that can be delivered through health-care providers. Participants were adults with MS who had mild or moderate disability and participated in a range of exercise levels. All participants lived in the Midwest of the United States. Fifty semi-structured interviews were conducted and analysed using thematic analysis. Two themes emerged, (i) approach for receiving exercise promotion and (ii) ideal person for promoting exercise. Persons with MS want to receive exercise information through in-person consultations with health-care providers, print media and electronic media. Persons with MS want to receive exercise promotion from health-care providers with expertise in MS (ie neurologists) and with expertise in exercise (eg physical therapists). These data support the importance of understanding how to provide exercise information to persons with MS and identifying that health-care providers including neurologists and physical therapists should be involved in exercise promotion. © 2017 The Authors Health Expectations Published by John Wiley & Sons Ltd.

  16. Concordance of DSM-IV Axis I and II diagnoses by personal and informant's interview.

    Science.gov (United States)

    Schneider, Barbara; Maurer, Konrad; Sargk, Dieter; Heiskel, Harald; Weber, Bernhard; Frölich, Lutz; Georgi, Klaus; Fritze, Jürgen; Seidler, Andreas

    2004-06-30

    The validity and reliability of using psychological autopsies to diagnose a psychiatric disorder is a critical issue. Therefore, interrater and test-retest reliability of the Structured Clinical Interview for DSM-IV Axis I and Personality Disorders and the usefulness of these instruments for the psychological autopsy method were investigated. Diagnoses by informant's interview were compared with diagnoses generated by a personal interview of 35 persons. Interrater reliability and test-retest reliability were assessed in 33 and 29 persons, respectively. Chi-square analysis, kappa and intraclass correlation coefficients, and Kendall's tau were used to determine agreement of diagnoses. Kappa coefficients were above 0.84 for substance-related disorders, mood disorders, and anxiety and adjustment disorders, and above 0.65 for Axis II disorders for interrater and test-retest reliability. Agreement by personal and relative's interview generated kappa coefficients above 0.79 for most Axis I and above 0.65 for most personality disorder diagnoses; Kendall's tau for dimensional individual personality disorder scores ranged from 0.22 to 0.72. Despite of a small number of psychiatric disorders in the selected population, the present results provide support for the validity of most diagnoses obtained through the best-estimate method using the Structured Clinical Interview for DSM-IV Axis I and Personality Disorders. This instrument can be recommended as a tool for the psychological autopsy procedure in post-mortem research. Copyright 2004 Elsevier Ireland Ltd.

  17. Municipal Emergency Management System: a strategy towards information and managing resources

    Science.gov (United States)

    Pacheco, J.

    2009-04-01

    The Azores archipelago is located in the North Atlantic Ocean, on a complex geological setting where the North American, Eurasian and African plates meet. Throughout its history the geological and meteorological hazards have been the most significant and had cause thousands of deaths and extensive damages. To prepare and mitigate the impact of catastrophic events there are emergency plans to guide the authorities and to instruct the population. However, a key point on the effectiveness of any emergency plan is the efficiency on getting the relevant information from the existing plans and conveying quality information to the operational teams and to the population. To address this issue the Municipal Emergency Management System was designed as a modular software with a core database and two different applications; one back-office to input and manage data and one front-end to query the database. The database is installed in a server and the system runs over an Intranet or the Internet, allowing its management and query to be done anywhere. The information on the system comprises two sets of data: (a) static data, regarding guidelines from the official Municipal Emergency Plan and a broad characterization of the county that does not need to be updated frequently (geography, geomorphology, climatology and the main hazards to consider) and (b) dynamic information, concerning data that requires regular updating such as available resources, administrative officials, pertinent private organisations etc.. All dynamic data in the core database is organised in three layers: (1) administrative organisations with geographical expression (such as province or district), (2) entities with capability to provide aid on provisions, accommodations, health, infrastructures, construction, transportation and security (public services, non-governmental organisations, enterprises or individual persons) and (3) operative information (applicable laws, tasks of each operative structure of the

  18. Systems for neutronic, thermohydraulic and shielding calculation in personal computers

    International Nuclear Information System (INIS)

    Villarino, E.A.; Abbate, P.; Lovotti, O.; Santini, M.

    1990-01-01

    The MTR-PC (Materials Testing Reactors-Personal Computers) system has been developed by the Nuclear Engineering Division of INVAP S.E. with the aim of providing working conditions integrated with personal computers for design and neutronic, thermohydraulic and shielding analysis for reactors employing plate type fuel. (Author) [es

  19. Clinical information system based on the medical smart card.

    Science.gov (United States)

    Danon, Y L; Saiag, E

    2000-07-01

    Over the last 5 years Israel has implemented a nationwide health insurance plan covering the entire population of the country. We have developed a clinical information system based on electronic-chip health care medical smart cards. Health care cards are used in several European countries and chip smart cards have been successful in many sectors. Our project involves the community use of the MSC, thereby enabling health care professionals to skillfully employ card systems in the health care sector. This system can easily arrange electronic medical charts in clinics, facilitating the confidential sharing of personal health databases among health professionals. To develop an MSC applicable for daily use in the community and hospital system. The MSC project, currently underway in Israel and the USA, will aid in determining the costs, benefits and feasibility of the MSC. Successful implementation of the MSC in chosen clinics will promote a nationwide willingness to adopt this promising technology.

  20. Federal Emergency Management Information System (FEMIS) system administration guide, version 1.4.5

    Energy Technology Data Exchange (ETDEWEB)

    Arp, J.A.; Burnett, R.A.; Carter, R.J. [and others

    1998-06-26

    The Federal Emergency Management Information Systems (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the US Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication, data distribution, and notification functionality necessary to operate FEMIS in a networked, client/server environment. The UNIX server provides an Oracle relational database management system (RDBMS) services, ARC/INFO GIS (optional) capabilities, and basic file management services. PNNL developed utilities that reside on the server include the Notification Service, the Command Service that executes the evacuation model, and AutoRecovery. To operate FEMIS, the Application Software must have access to a site specific FEMIS emergency management database. Data that pertains to an individual EOC`s jurisdiction is stored on the EOC`s local server. Information that needs to be accessible to all EOCs is automatically distributed by the FEMIS

  1. Personality Symptoms and Self-Esteem as Correlates of Psychopathology in Child Psychiatric Patients: Evaluating Multiple Informant Data

    Science.gov (United States)

    De Pauw, Sarah S. W.; Mervielde, Ivan; De Clercq, Barbara J.; De Fruyt, Filip; Tremmery, Sabine; Deboutte, Dirk

    2009-01-01

    Research on adulthood posits personality and self-esteem as important predictors of psychopathology. In childhood, however, the study of these relationships is complicated by the lack of consensus on how to combine data from multiple informants of child behavior. This study evaluates the relationships among personality symptoms, self-esteem and…

  2. Personality Traits of Minority Arab Teachers in the Arab Educational System in Israel

    Science.gov (United States)

    Abu Hussain, Jamal; Abu Hussain, Nadia

    2017-01-01

    The present research examined the personality traits prevalent among Arab teachers as a minority in the Arab educational system in Israel. Personality traits has much significance in the prediction of human behavior in various situations. Personality traits affect a person's behavior. Usually personality traits do not change, and they are…

  3. Are personal health records safe? A review of free web-accessible personal health record privacy policies.

    Science.gov (United States)

    Carrión Señor, Inmaculada; Fernández-Alemán, José Luis; Toval, Ambrosio

    2012-08-23

    Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users' concerns regarding the privacy and security of their personal health information. To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users' accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low.

  4. Health Information Systems.

    Science.gov (United States)

    Sirintrapun, S Joseph; Artz, David R

    2015-06-01

    This article provides surgical pathologists an overview of health information systems (HISs): what they are, what they do, and how such systems relate to the practice of surgical pathology. Much of this article is dedicated to the electronic medical record. Information, in how it is captured, transmitted, and conveyed, drives the effectiveness of such electronic medical record functionalities. So critical is information from pathology in integrated clinical care that surgical pathologists are becoming gatekeepers of not only tissue but also information. Better understanding of HISs can empower surgical pathologists to become stakeholders who have an impact on the future direction of quality integrated clinical care. Copyright © 2015 Elsevier Inc. All rights reserved.

  5. Medical-Information-Management System

    Science.gov (United States)

    Alterescu, Sidney; Friedman, Carl A.; Frankowski, James W.

    1989-01-01

    Medical Information Management System (MIMS) computer program interactive, general-purpose software system for storage and retrieval of information. Offers immediate assistance where manipulation of large data bases required. User quickly and efficiently extracts, displays, and analyzes data. Used in management of medical data and handling all aspects of data related to care of patients. Other applications include management of data on occupational safety in public and private sectors, handling judicial information, systemizing purchasing and procurement systems, and analyses of cost structures of organizations. Written in Microsoft FORTRAN 77.

  6. OSIS: A PC-based oil spill information system

    International Nuclear Information System (INIS)

    Leech, M.V.; Tyler, A.; Wiltshire, M.

    1993-01-01

    Warren Spring Laboratory and BMT Ceemaid Ltd. are cooperating to produce an Oil Spill Information System (OSIS) that will have worldwide application. OSIS is based on EUROSPILL, a spill simulation model originally developed under programs sponsored by the European Commission and the Marine Pollution Control Unit of the United Kingdom government's Department of Transport. OSIS is implemented in the Microsoft Windows 3.x graphical environment on a personal computer. A variety of options enables the user to input information on continuous or instantaneous spills of different types of oil under variable environmental conditions, to simulate the fate of oil and the trajectory of a spill. Model results are presented in the forms of maps, charts, graphs, and tables, displayed in multiple windows on a color monitor. Color hard copy can be produced, and OSIS can be linked to other Windows software packages, providing the opportunity to create a suite of spill incident management tools

  7. Building Standards based Science Information Systems: A Survey of ISO and other standards

    Science.gov (United States)

    King, Todd; Walker, Raymond

    Science Information systems began with individual researchers maintaining personal collec-tions of data and managing them by using ad hoc, specialized approaches. Today information systems are an enterprise consisting of federated systems that manage and distribute both historical and contemporary data from distributed sources. Information systems have many components. Among these are metadata models, metadata registries, controlled vocabularies and ontologies which are used to describe entities and resources. Other components include services to exchange information and data; tools to populate the system and tools to utilize available resources. When constructing information systems today a variety of standards can be useful. The benefit of adopting standards is clear; it can shorten the design cycle, enhance software reuse and enable interoperability. We look at standards from the International Stan-dards Organization (ISO), International Telecommunication Union (ITU), Organization for the Advancement of Structured Information Standards (OASIS), Internet Engineering Task Force (IETF), American National Standards Institute (ANSI) which have influenced the develop-ment of information systems in the Heliophysics and Planetary sciences. No standard can solve the needs of every community. Individual disciplines often must fill the gap between general purpose standards and the unique needs of the discipline. To this end individual science dis-ciplines are developing standards, Examples include the International Virtual Observatory Al-liance (IVOA), Planetary Data System (PDS)/ International Planetary Data Alliance (IPDA), Dublin-Core Science, and the Space Physics Archive Search and Extract (SPASE) consortium. This broad survey of ISO and other standards provides some guidance for the development information systems. The development of the SPASE data model is reviewed and provides some insights into the value of applying appropriate standards and is used to illustrate

  8. The relationship of the Severe Personality disorders with behavioral activation and inhibition systems in patients with paranoid, borderline and schizotypal personality disorders

    Directory of Open Access Journals (Sweden)

    Setareh Jani

    2016-12-01

    Full Text Available Introduction: Given the disruptive effects of personality disorders on personal and family life, it is essential to recognize their predisposing factors to understand them more accurately, and identify their preventive measures treatment facilitators. Therefore, the present study aimed to examine the relationship of severe personality disorders with behavioral activation and inhibition systems in patients with paranoid, borderline and schizotypal personality disorders. Methods: The present descriptive-correlational study recruited patients with paranoid, borderline and schizotypal personality disorders presenting to psychiatry clinics in Ardabil using convenient sampling method. A total of 30 paranoid patients, 30 borderline patients and 20 schizotypal patients were selected by a psychiatrist through psychiatric examination, clinical interview and completing Millon Clinical Multiaxial Inventory (MCMI-III. The following instruments were used: MCMI- III and behavioral activation-inhibition system scale (BIS-BAS. The data were analyzed with Pearson’s correlation coefficient and stepwise regression. Results: BIS and BAS systems were both significant for predicting borderline and paranoid personality disorders, but only BIS was significant for predicting schizotypal personality disorder. Conclusion: These findings can help experts to have a better and more accurate understanding of personality disorders and use proper methods to predict the probability of these disorders and develop treatments.

  9. Personal computer control system for small size tandem accelerator

    Energy Technology Data Exchange (ETDEWEB)

    Takayama, Hiroshi; Kawano, Kazuhiro; Shinozaki, Masataka [Nissin - High Voltage Co. Ltd., Kyoto (Japan)

    1996-12-01

    As the analysis apparatus using tandem accelerator has a lot of control parameter, numbers of control parts set on control panel are so many to make the panel more complex and its operativity worse. In order to improve these faults, development and design of a control system using personal computer for the control panel mainly constituted by conventional hardware parts were tried. Their predominant characteristics are shown as follows: (1) To make the control panel construction simpler and more compact, because the hardware device on the panel surface becomes the smallest limit as required by using a personal computer for man-machine interface. (2) To make control speed more rapid, because sequence control is closed within each block by driving accelerator system to each block and installing local station of the sequencer network at each block. (3) To make expandability larger, because of few improvement of the present hardware by interrupting the sequencer local station into the net and correcting image of the computer when increasing a new beamline. And, (4) to make control system cheaper, because of cheaper investment and easier programming by using the personal computer. (G.K.)

  10. Mobile Student Information System

    Science.gov (United States)

    Asif, Muhammad; Krogstie, John

    2011-01-01

    Purpose: A mobile student information system (MSIS) based on mobile computing and context-aware application concepts can provide more user-centric information services to students. The purpose of this paper is to describe a system for providing relevant information to students on a mobile platform. Design/methodology/approach: The research…

  11. Interactions of nanomaterials and biological systems: implications to personalized nanomedicine☆

    Science.gov (United States)

    Zhang, Xue-Qing; Xu, Xiaoyang; Bertrand, Nicolas; Pridgen, Eric; Swami, Archana; Farokhzad, Omid C.

    2012-01-01

    The application of nanotechnology to personalized medicine provides an unprecedented opportunity to improve the treatment of many diseases. Nanomaterials offer several advantages as therapeutic and diagnostic tools due to design flexibility, small sizes, large surface-to-volume ratio, and ease of surface modification with multivalent ligands to increase avidity for target molecules. Nanomaterials can be engineered to interact with specific biological components, allowing them to benefit from the insights provided by personalized medicine techniques. To tailor these interactions, a comprehensive knowledge of how nanomaterials interact with biological systems is critical. Herein, we discuss how the interactions of nanomaterials with biological systems can guide their design for diagnostic, imaging and drug delivery purposes. A general overview of nanomaterials under investigation is provided with an emphasis on systems that have reached clinical trials. Finally, considerations for the development of personalized nanomedicines are summarized such as the potential toxicity, scientific and technical challenges in fabricating them, and regulatory and ethical issues raised by the utilization of nanomaterials. PMID:22917779

  12. The use of traits and contextual information in free personality descriptions across ethnocultural groups in South Africa.

    Science.gov (United States)

    Valchev, Velichko H; van de Vijver, Fons J R; Nel, J Alewyn; Rothmann, Sebastiaan; Meiring, Deon

    2013-06-01

    The present study investigates the differences between 3 ethnocultural groups in South Africa in the use of traits and contextual information for personality descriptions and the interaction of these differences with social distance from the target person and with personality domains. Semistructured interviews asking for self- and other-descriptions were conducted with 1,027 Blacks, 84 Coloureds and Indians, and 105 Whites, representing the country's 11 official languages. In Part 1 we found similarities in the total set of categories used most often for personality description across the 3 groups-traits, behaviors, preferences, and perceptions (over 86%), which were context-free (over 66%)-as well as substantial differences between the groups in the relative use of these categories. In Part 2 we found that distance from the target person plays a role in cross-cultural differences in trait use and contextualization. In Part 3 we found significant interactions of culture with the use of traits and contextual information across agency-communion and 9 indigenous South African personality clusters similar to the Big Five. The responses of Blacks confirmed expectations for collectivistic groups (fewer traits and more contextualization) and of Whites for individualistic groups (more traits and less contextualization), and Coloureds and Indians had an intermediate pattern. The results are discussed in the framework of the trait and cultural psychology perspectives on personality. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  13. [Cross-sectional study of informal caregiver burden and the determinants related to the care of dependent persons].

    Science.gov (United States)

    Rodríguez-González, Ana María; Rodríguez-Míguez, Eva; Duarte-Pérez, Ana; Díaz-Sanisidro, Eduardo; Barbosa-Álvarez, Ángel; Clavería, Ana

    2017-03-01

    To describe the burden of informal carers of dependent people and to identify related variables. Descriptive observational cross-sectional study. Primary Health Care in the southern area of Pontevedra. 97 caregivers of dependent persons. We collected socioeconomic data and health conditions from caregivers and dependent persons, time spent on the daily care and caregiver burden (Zarit abbreviate) through a personal interview. Besides the description of the sample-including their burden level-, a contrast mean was used to identify characteristics that influenced in punctuation of Zarit scale. A logistic regression was used to analyse characteristics that increase the likelihood to experiment burden. 61.9% of caregivers are subject to intense burden. The item on the scale which contributes most to the caregiver burden is the lack of time for oneself, followed by the negative effects of interpersonal relationships. Contrast means shows that degree of relationship, number of care hours, caregiver health and aggressiveness of dependent persons produce significant differences in Zarit scale. Physic and psychological health of caregivers and aggressiveness of dependent persons is associated with the likelihood of developing caregiver burden. Informal caregivers of dependent persons show a high level of burden, both related to their characteristics and those of the dependent persons. Caregiver burden rethinks the need for public policies focused on dependence to adopt an integrative caregiver-dependent vision. Copyright © 2016 Elsevier España, S.L.U. All rights reserved.

  14. Implementation of an advanced clinical and administrative hospital information system.

    Science.gov (United States)

    Vegoda, P R; Dyro, J F

    1986-01-01

    Over the last six years since University Hospital opened, the University Hospital Information System (UHIS) has continued to evolve to what is today an advanced administrative and clinical information system. At University Hospital UHIS is the way of conducting business. A wide range of patient care applications are operational including Patient Registration, ADT for Inpatient/Outpatient/Emergency Room visits, Advanced Order Entry/Result Reporting, Medical Records, Lab Automated Data Acquisition/Quality Control, Pharmacy, Radiology, Dietary, Respiratory Therapy, ECG, EEG, Cardiology, Physical/Occupational Therapy and Nursing. These systems and numerous financial systems have been installed in a highly tuned, efficient computer system. All applications are real-time, on-line, and data base oriented. Each system is provided with multiple data security levels, forward file recovery, and dynamic transaction backout of in-flight tasks. Sensitive medical information is safeguarded by job function passwords, identification codes, need-to-know master screens and terminal keylocks. University Hospital has an IBM 3083 CPU with five 3380 disk drives, four dual density tape drives, and a 3705 network controller. The network of 300 terminals and 100 printers is connected to the computer center by an RF broadband cable. The software is configured around the IBM/MVS operating system using CICS as the telecommunication monitor, IMS as the data base management system and PCS/ADS as the application enabling tool. The most extensive clinical system added to UHIS is the Physiological Monitoring/Patient Data Management System with serves 92 critical care beds. In keeping with the Hospital's philosophy of integrated computing, the PMS/PDMS with its network of minicomputers was linked to the UHIS system. In a pilot program, remote access to UHIS through the IBM personal computer has been implemented in several physician offices in the local community, further extending the communications

  15. Personal Emergency Response Systems--Communication Technology Aids Elderly and Their Families.

    Science.gov (United States)

    Dibner, Andrew S.

    Personal response systems (PRS) bring immediate help to aged and disabled persons at home at the touch of a button. The PRS user wears a tiny radio transmitter as a pendant or a bracelet and can send a telephone signal from any part of the home to a 24-hour emergency center when help is needed. This study examined research on the Lifeline system,…

  16. The Role of Personality Features on in Information- seeking Bahavior of Graduate Students at University of Tehran (2006-2007

    Directory of Open Access Journals (Sweden)

    Mahmood Khowsrojerdi

    2009-04-01

    Full Text Available The present study attempts to investigate the nature of information seeking behavior in the sample population of 158 graduate students and examine the role of personality factors in their information seeking behavior. Two questionnaires were used. Pearson correlation analysis and multi-valued regression analysis were employed in analyzing the data. Findings indicate that there is a positive significance between students’ extroversion and relevance judgment, positing of new ideas, time as a motivating factor, and effort to seek out information. A similar indication was observed between interpolation of experience and time slated for searching for information. Generally it could be deduced that there is a significant relationship between personality features and information seeking behavior of graduate students.

  17. Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.4.6

    Energy Technology Data Exchange (ETDEWEB)

    Arp, J.A.; Bower, J.C.; Burnett, R.A.; Carter, R.J.; Downing, T.R.; Fangman, P.M.; Gerhardstein, L.H.; Homer, B.J.; Johnson, D.M.; Johnson, R.L.; Johnson, S.M.; Loveall, R.M.; Martin, T.J.; Millard, W.D.; Schulze, S.A.; Stoops, L.R.; Tzemos, S.; Wood, B.M.

    1999-06-29

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are corrected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication data distribution and notification functionality necessary to operate FEMIS in a networked, client/server environment.

  18. Security Information System Digital Simulation

    OpenAIRE

    Tao Kuang; Shanhong Zhu

    2015-01-01

    The study built a simulation model for the study of food security information system relay protection. MATLAB-based simulation technology can support the analysis and design of food security information systems. As an example, the food security information system fault simulation, zero-sequence current protection simulation and transformer differential protection simulation are presented in this study. The case studies show that the simulation of food security information system relay protect...

  19. Security and privacy issues of personal health.

    Science.gov (United States)

    Blobel, Bernd; Pharow, Peter

    2007-01-01

    While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.

  20. The effectiveness of creating an online life story book on persons with early dementia and their informal caregivers : a protocol of a randomized controlled trial

    NARCIS (Netherlands)

    Elfrink, Teuntje R.; Zuidema, Sytse U.; Kunz, Miriam; Westerhof, Gerben J.

    2017-01-01

    Background: Dementia has a high burden for patients, informal caregivers and society. Given changes in care systems, more persons with dementia will live longer at home. However, living at home (with dementia) with a good quality of life is not easy to achieve. Dementia is often accompanied by

  1. The effectiveness of creating an online life story book on persons with early dementia and their informal caregivers : A protocol of a randomized controlled trial

    NARCIS (Netherlands)

    Elfrink, Teuntje R.; Zuidema, Sytse U.; Kunz, Miriam; Westerhof, Gerben J.

    2017-01-01

    Background: Dementia has a high burden for patients, informal caregivers and society. Given changes in care systems, more persons with dementia will live longer at home. However, living at home (with dementia) with a good quality of life is not easy to achieve. Dementia is often accompanied by

  2. A personalized mobile patient guide system for a patient-centered smart hospital: Lessons learned from a usability test and satisfaction survey in a tertiary university hospital.

    Science.gov (United States)

    Yoo, Sooyoung; Jung, Se Young; Kim, Seok; Kim, Eunhye; Lee, Kee-Hyuck; Chung, Eunja; Hwang, Hee

    2016-07-01

    The present study focused on the design, implementation, and evaluation of a personalized mobile patient guide system that utilizes smart phones, indoor navigation technology and a hospital information system (HIS) to address the difficulties that outpatients face in finding hospital facilities, recognizing their daily treatment schedule, and accessing personalized medical and administrative information. The present study was conducted in a fully digitized tertiary university hospital in South Korea. We developed a real-time location-based outpatient guide system that consists of Bluetooth access points (APs) for indoor navigation, an Android-based guide application, a guide server, and interfaces with the HIS. A total of 33 subjects and 43 outpatients participated in the usability test (UT) and the satisfaction survey, respectively. We confirmed that the indoor navigation feature can be applied to outpatient departments with precision using a position error test. The participants in the UT completed each scenario with an average success rate of 67.4%. According to the results, we addressed the problems and made improvements to the user interface by providing users with context-based guidance information. The satisfaction rating of the system was high, with an average score of 4.0 out of 5.0, showing its utility as a patient-centered hospital service. The innovative mobile patient guide system for outpatients is feasible and can be successfully implemented to provide personalized information with high satisfaction. Additionally, the issues identified and lessons learned from our experiences regarding task scheduling, indoor navigation, and usability should be considered when developing the system. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. Air System Information Management

    Science.gov (United States)

    Filman, Robert E.

    2004-01-01

    I flew to Washington last week, a trip rich in distributed information management. Buying tickets, at the gate, in flight, landing and at the baggage claim, myriad messages about my reservation, the weather, our flight plans, gates, bags and so forth flew among a variety of travel agency, airline and Federal Aviation Administration (FAA) computers and personnel. By and large, each kind of information ran on a particular application, often specialized to own data formats and communications network. I went to Washington to attend an FAA meeting on System-Wide Information Management (SWIM) for the National Airspace System (NAS) (http://www.nasarchitecture.faa.gov/Tutorials/NAS101.cfm). NAS (and its information infrastructure, SWIM) is an attempt to bring greater regularity, efficiency and uniformity to the collection of stovepipe applications now used to manage air traffic. Current systems hold information about flight plans, flight trajectories, weather, air turbulence, current and forecast weather, radar summaries, hazardous condition warnings, airport and airspace capacity constraints, temporary flight restrictions, and so forth. Information moving among these stovepipe systems is usually mediated by people (for example, air traffic controllers) or single-purpose applications. People, whose intelligence is critical for difficult tasks and unusual circumstances, are not as efficient as computers for tasks that can be automated. Better information sharing can lead to higher system capacity, more efficient utilization and safer operations. Better information sharing through greater automation is possible though not necessarily easy.

  4. Advanced radiology information system.

    Science.gov (United States)

    Kolovou, L; Vatousi, M; Lymperopoulos, D; Koukias, M

    2005-01-01

    The innovative features of an advanced Radiology Information System (RIS) are presented in this paper. The interoperability of RIS with the other Intra-hospital Information Systems that interacts with, dealing with the compatibility and open architecture issues, are accomplished by two novel mechanisms [1]. The first one is the particular message handling system that is applied for the exchange of information, according to the Health Level Seven (HL7) protocol's specifications and serves the transfer of medical and administrative data among the RIS applications and data store unit. The same mechanism allows the secure and HL7-compatible interactions with the Hospital Information System (HIS) too. The second one implements the translation of information between the formats that HL7 and Digital Imaging and Communication in Medicine (DICOM) protocols specify, providing the communication between RIS and Picture and Archive Communication System (PACS). The whole structure ensures the automation of the every-day procedures that the ;medical protocol' specifies and provides its services through a friendly and easy to manage graphical user interface.

  5. Complementary approaches to the assessment of personality disorder. The Personality Assessment Schedule and Adult Personality Functioning Assessment compared.

    Science.gov (United States)

    Hill, J; Fudge, H; Harrington, R; Pickles, A; Rutter, M

    2000-05-01

    Current concepts and measures of personality disorder are in many respects unsatisfactory. To establish agreement between two contrasting measures of personality disorder, and to compare subject-informant agreement on each. To examine the extent to which trait abnormality can be separated from interpersonal and social role dysfunction. Fifty-six subjects and their closest informants were interviewed and rated independently. Personality functioning was assessed using a modified Personality Assessment Schedule (M-PAS), and the Adult Personality Functioning Assessment (APFA). Subject-informant agreement on the M-PAS was moderately good, and agreement between the M-PAS and the APFA, across and within subjects and informants, was comparable to that for the M-PAS. This was equally the case when M-PAS trait plus impairment scores and trait abnormality scores were used. The M-PAS and the APFA are probably assessing similar constructs. Trait abnormalities occur predominantly in an interpersonal context and could be assessed within that context.

  6. Medical Students and Personal Smartphones in the Clinical Environment: The Impact on Confidentiality of Personal Health Information and Professionalism

    OpenAIRE

    Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C

    2014-01-01

    Background Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students’ use of personal smartphones for clinical work. Objective The intent of the study was to examine final-year medical students’ experience with and attitudes toward using per...

  7. Information system for administrating and distributing color images through internet

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available The information system for administrating and distributing color images through the Internet ensures the consistent replication of color images, their storage - in an on-line data base - and predictable distribution, by means of a digitally distributed flow, based on Windows platform and POD (Print On Demand technology. The consistent replication of color images inde-pendently from the parameters of the processing equipment and from the features of the programs composing the technological flow, is ensured by the standard color management sys-tem defined by ICC (International Color Consortium, which is integrated by the Windows operation system and by the POD technology. The latter minimize the noticeable differences between the colors captured, displayed or printed by various replication equipments and/or edited by various graphical applications. The system integrated web application ensures the uploading of the color images in an on-line database and their administration and distribution among the users via the Internet. For the preservation of the data expressed by the color im-ages during their transfer along a digitally distributed flow, the software application includes an original tool ensuring the accurate replication of colors on computer displays or when printing them by means of various color printers or presses. For development and use, this application employs a hardware platform based on PC support and a competitive software platform, based on: the Windows operation system, the .NET. Development medium and the C# programming language. This information system is beneficial for creators and users of color images, the success of the printed or on-line (Internet publications depending on the sizeable, predictable and accurate replication of colors employed for the visual expression of information in every activity fields of the modern society. The herein introduced information system enables all interested persons to access the

  8. CIMS: The Cartographic Information Management System,

    Science.gov (United States)

    1981-01-01

    use. Large-scale information systems may cover large amounts of information such as the Land Identification and Information Management System (LIMS...small computer in managing the information holdings of a mapping institute. The result is the Cartographic Information Management System (CIMS), a...American countrie.s. 1 .- - _ _ _ _. = _ m m m THE CARTOGRAPHIC INFORMATION MANAGEMENT SYSTEM System Rationale Interactive computer-assisted cartography

  9. Majoring in Information Systems: Reasons Why Students Select (or Not) Information Systems as a Major

    Science.gov (United States)

    Snyder, Johnny; Slauson, Gayla Jo

    2014-01-01

    Filling the pipeline for information systems workers is critical in the information era. Projected growth rates for jobs requiring information systems expertise are significantly higher than the projected growth rates for other jobs. Why then do relatively few students choose to major in information systems? This paper reviews survey results from…

  10. The Impact of the Big Five Personality Traits on Reports of Child Behavior Problems by Different Informants.

    Science.gov (United States)

    Kroes, Gert; Veerman, Jan W.; De Bruyn, Eric E.J.

    2005-01-01

    The present study compared ratings of a standardized sample of child behavior problems across informants and examined the effects of informant personality traits on child behavior ratings by mothers, teachers, and group-care workers. Participants were 55 clinic-referred children, aged 6-12 years. All informants watched and rated the same 17-min…

  11. Medical Information Management System (MIMS): A generalized interactive information system

    Science.gov (United States)

    Alterescu, S.; Friedman, C. A.; Hipkins, K. R.

    1975-01-01

    An interactive information system is described. It is a general purpose, free format system which offers immediate assistance where manipulation of large data bases is required. The medical area is a prime area of application. Examples of the system's operation, commentary on the examples, and a complete listing of the system program are included.

  12. The comprehensive registration and information system of radiation protection regulatory authority in the Czech Republic

    International Nuclear Information System (INIS)

    Petrova, K.

    2004-01-01

    The central registration system in radiation protection is created in the Czech Republic since the 1997 year. Since that time the central registries of licensees, ionizing radiation sources (IRS) and occupational of workers doses has been developed by the State Office for Nuclear Safety (SUJB) in accordance with the demands of the new Czech legislation. The core of this complex information system is created by the Central Register of Licensees (CRL). The Central Register of Occupational Exposure (CROE) and the Central Register of Ionising Radiation Sources (CRIRS) are connected to CRL and provides with the list of workers their doses and relevant sources for each licensee. The Central Register of Approvals (CRA) issued by SUJB has been also created in 2002 and it was implemented into the system. The further register of inspections is recently under development. The whole system is operated in Oracle database. CRL registers all relevant information on the level of licensee, their workplaces and also on the level of smaller working units (labs, buildings, ..) where is necessary for more precise information about the placement of sources. The data are updated continuously. CROE collects personal and dosimetric data for all monitored workers in whole country. This register also includes the information on the personal radiation passports distributed by SUJB to external workers. CRIRS registers sealed IRS, devices with sealed IRS, generators and specification of workplaces with unsealed IRS. Users are obliged to report information on new source specified by Decree on radiation protection within one months. They shall report also all changes of registered data including the transfer of source to another user or to final disposal. CRA enables to issue automatically the licence in unified form and provides users with the different control tools of issued licences. Described comprehensive information system serves as very important and useful tool for effective regulation

  13. Using Information Systems as Directions of the State Support for the Conditionally Depressive Regions

    Directory of Open Access Journals (Sweden)

    Morhachov Ilya V.

    2017-12-01

    Full Text Available The article is aimed at substantiating the perspectivity of information systems and technologies as a direction of the State support for the conditionally depressive regions. The article clarifies the assumption that an increase in the number of freelancers in region (even evaders from taxation, causes the growth of both the regional enterprises’ revenues and the tax revenues to budgets. Such freelancers become customers of works, services and goods, and, accordingly, employers for other persons who work officially. The State support for the concentration of such persons in the region contributes to reducing the «brain drain» abroad. The article substantiates prospective directions of the State support for the conditionally depressive regions by means of information systems, the basic elements of which are IT-specialists; as well as economic expediency of priority of the State support for the regions with presence of high level of unemployment of working population. The ways of solution of contradictions between the State and the freelancer in the part of payment of taxes and accrual of the insurance period for the future pension have been suggested. The ultimate goal of the State support for the conditionally depressive regions with use of information systems has been defined, which is to achieve the stage of the multiplied effect of growth of income of economic entities and tax revenues to the budget due to the implementation of innovation projects as result of the concentration of IT specialists in region.

  14. [Neurobiological aspects of personality disorders and emotional instability].

    Science.gov (United States)

    Petrovic, Predrag

    2016-12-06

    Neurobiological aspects of personality disorders and emotional instability ADHD and mental disorders encompassing emotional instability such as emotionally unstable personality disorder and antisocial personality disorder can potentially be explained by a suboptimal regulation of information processing in the brain. ADHD involves suboptimal function of non-emotional attentional regulatory processes and emotional instability involves suboptimal emotional regulation. A network including prefrontal areas, anterior cingulate cortex, basal ganglia and specific neuromodulatory systems such as the dopamine system are dysfunctional in both ADHD and emotional instability. One might suggest that a dimensional view better describes these mental states than categorical diagnoses.

  15. The Personal Hearing System—A Software Hearing Aid for a Personal Communication System

    Directory of Open Access Journals (Sweden)

    Giso Grimm

    2009-01-01

    Full Text Available A concept and architecture of a personal communication system (PCS is introduced that integrates audio communication and hearing support for the elderly and hearing-impaired through a personal hearing system (PHS. The concept envisions a central processor connected to audio headsets via a wireless body area network (WBAN. To demonstrate the concept, a prototype PCS is presented that is implemented on a netbook computer with a dedicated audio interface in combination with a mobile phone. The prototype can be used for field-testing possible applications and to reveal possibilities and limitations of the concept of integrating hearing support in consumer audio communication devices. It is shown that the prototype PCS can integrate hearing aid functionality, telephony, public announcement systems, and home entertainment. An exemplary binaural speech enhancement scheme that represents a large class of possible PHS processing schemes is shown to be compatible with the general concept. However, an analysis of hardware and software architectures shows that the implementation of a PCS on future advanced cell phone-like devices is challenging. Because of limitations in processing power, recoding of prototype implementations into fixed point arithmetic will be required and WBAN performance is still a limiting factor in terms of data rate and delay.

  16. The Personal Hearing System—A Software Hearing Aid for a Personal Communication System

    Science.gov (United States)

    Grimm, Giso; Guilmin, Gwénaël; Poppen, Frank; Vlaming, Marcel S. M. G.; Hohmann, Volker

    2009-12-01

    A concept and architecture of a personal communication system (PCS) is introduced that integrates audio communication and hearing support for the elderly and hearing-impaired through a personal hearing system (PHS). The concept envisions a central processor connected to audio headsets via a wireless body area network (WBAN). To demonstrate the concept, a prototype PCS is presented that is implemented on a netbook computer with a dedicated audio interface in combination with a mobile phone. The prototype can be used for field-testing possible applications and to reveal possibilities and limitations of the concept of integrating hearing support in consumer audio communication devices. It is shown that the prototype PCS can integrate hearing aid functionality, telephony, public announcement systems, and home entertainment. An exemplary binaural speech enhancement scheme that represents a large class of possible PHS processing schemes is shown to be compatible with the general concept. However, an analysis of hardware and software architectures shows that the implementation of a PCS on future advanced cell phone-like devices is challenging. Because of limitations in processing power, recoding of prototype implementations into fixed point arithmetic will be required and WBAN performance is still a limiting factor in terms of data rate and delay.

  17. Social Networking Privacy Control: Exploring University Variables Related to Young Adults' Sharing of Personally Identifiable Information

    Science.gov (United States)

    Zimmerman, Melisa S.

    2014-01-01

    The growth of the Internet, and specifically social networking sites (SNSs) like Facebook, create opportunities for individuals to share private and identifiable information with a closed or open community. Internet crime has been on the rise and research has shown that criminals are using individuals' personal information pulled from social…

  18. 78 FR 16539 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Personal...

    Science.gov (United States)

    2013-03-15

    .... SUMMARY: The Department of Labor (DOL) is submitting the Occupational Safety and Health Administration (OSHA) sponsored information collection request (ICR) titled, ``Personal Protective Equipment for... use in accordance with the Paperwork Reduction Act (PRA) of 1995 (44 U.S.C. 3501 et seq.). DATES...

  19. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...

  20. Personalized Search

    CERN Document Server

    AUTHOR|(SzGeCERN)749939

    2015-01-01

    As the volume of electronically available information grows, relevant items become harder to find. This work presents an approach to personalizing search results in scientific publication databases. This work focuses on re-ranking search results from existing search engines like Solr or ElasticSearch. This work also includes the development of Obelix, a new recommendation system used to re-rank search results. The project was proposed and performed at CERN, using the scientific publications available on the CERN Document Server (CDS). This work experiments with re-ranking using offline and online evaluation of users and documents in CDS. The experiments conclude that the personalized search result outperform both latest first and word similarity in terms of click position in the search result for global search in CDS.

  1. MULTI-PERSON DECISION FOR SUSTAINABLE DESIGN ON IBS FLOOR SYSTEM SELECTION

    Directory of Open Access Journals (Sweden)

    Christiono Utomo

    2013-05-01

    Full Text Available Selecting a design solution (choice problem is one of the natures of design decision. If the problem is more complex and involves multi participants, decision aid is necessary. This paper discusses the nature of group judgment and negotiation on multi-criteria decision-making methodologies. It presents a conceptual model of negotiation support in a multi-person decision on building floor system selection. Decision technique (AHP was applied for decision process in a satisfying options and game theory for coalition formation. An n-person cooperative game is represented by a set of all players. The proposed coalition formation model enables each agent to select individually or coalition. It improves the value of building system decision. It further emphasizes the importance of performance evaluation in the design process and value-based decision. The support model can be extended to an automated negotiation and in different building system selection with proper  modification. Keywords: Multi-person, design decision, IBS, floor system selection.

  2. Cues to Personality and Health in the Facial Appearance of Chimpanzees (Pan Troglodytes

    Directory of Open Access Journals (Sweden)

    Robin S. S. Kramer

    2012-04-01

    Full Text Available Humans (Homo sapiens and chimpanzees (Pan troglodytes can extract socially-relevant information from the static, non-expressive faces of conspecifics. In humans, the face is a valid signal of both personality and health. Recent evidence shows that, like humans, chimpanzee faces also contain personality information, and that humans can accurately judge aspects of chimpanzee personality relating to extraversion from the face alone (Kramer, King, and Ward, 2011. These findings suggest the hypothesis that humans and chimpanzees share a system of personality and facial morphology for signaling socially-relevant traits from the face. We sought to test this hypothesis using a new group of chimpanzees. In two studies, we found that chimpanzee faces contained health information, as well as information of characteristics relating to extraversion, emotional stability, and agreeableness, using average judgments from pairs of individual photographs. In a third study, information relating to extraversion and health was also present in composite images of individual chimpanzees. We therefore replicate and extend previous findings using a new group of chimpanzees and demonstrate two methods for minimizing the variability associated with individual photographs. Our findings support the hypothesis that chimpanzees and humans share a personality signaling system.

  3. Development of safeguards information treatment system at facility level in Korea

    International Nuclear Information System (INIS)

    So, D.S.; Lee, B.D.; Song, D.Y.

    2001-01-01

    Safeguards Information Treatment System (SITS) at Facility level was developed to implement efficiently the obligations under IAEA comprehensive Safeguards Agreement, bilateral nuclear cooperation Agreements with other countries and domestic law, and to manage efficiently the information related to safeguards implementation at facility level in Korea. Nuclear facilities in Korea are categorized into 8 types based on its accounting characteristics as follows: (1) Item counting facility or bulk handling facility; (2) Batch follow-up facility or not; (3) MUF (Material Unaccounted For) occurrence or not; (4) Nuclear production facility or not; (5) Operation status of facility; (6) Information management of nuclear material transfer status between KMPs or not; (7) Indication of inventory KMP on the inventory change of nuclear material is required or not. Hardware and Software for SITS can be loaded on a personal computer under operation system of Window 2000 or Window NT. MS SQL server 7 and MS Internet Information Server were adopted for database management system and Web server, respectively. Network environment of SITS was designed to include nuclear research institute, nuclear power plants of PWR and CANDU, nuclear fuel fabrication facilities and other facilities. SITS can be operated standalone or under the client-server system if intranet exists. More detailed contents of SITS are described elsewhere. Each module of SITS will be tested during incorporation of existing data into SITS and SITS will be distributed to nuclear facilities in Korea

  4. Materials management information systems.

    Science.gov (United States)

    1996-01-01

    The hospital materials management function--ensuring that goods and services get from a source to an end user--encompasses many areas of the hospital and can significantly affect hospital costs. Performing this function in a manner that will keep costs down and ensure adequate cash flow requires effective management of a large amount of information from a variety of sources. To effectively coordinate such information, most hospitals have implemented some form of materials management information system (MMIS). These systems can be used to automate or facilitate functions such as purchasing, accounting, inventory management, and patient supply charges. In this study, we evaluated seven MMISs from seven vendors, focusing on the functional capabilities of each system and the quality of the service and support provided by the vendor. This Evaluation is intended to (1) assist hospitals purchasing an MMIS by educating materials managers about the capabilities, benefits, and limitations of MMISs and (2) educate clinical engineers and information system managers about the scope of materials management within a healthcare facility. Because software products cannot be evaluated in the same manner as most devices typically included in Health Devices Evaluations, our standard Evaluation protocol was not applicable for this technology. Instead, we based our ratings on our observations (e.g., during site visits), interviews we conducted with current users of each system, and information provided by the vendor (e.g., in response to a request for information [RFI]). We divided the Evaluation into the following sections: Section 1. Responsibilities and Information Requirements of Materials Management: Provides an overview of typical materials management functions and describes the capabilities, benefits, and limitations of MMISs. Also includes the supplementary article, "Inventory Cost and Reimbursement Issues" and the glossary, "Materials Management Terminology." Section 2. The

  5. Professional career management and personal development for the employees of the Romanian medical system

    Directory of Open Access Journals (Sweden)

    Mirica Dumitrescu Catalina-Oana

    2017-07-01

    Full Text Available The purpose of this article is to inform as many persons as possible on the present situation of doctors in Romania, to present more theoretical and practical elements that lead to the development of a sustainable career in the Romanian medical system. So I tried to get as much information about the current situation of the medical system, to obtain a certain confirmation of what was said by those working in the system. Gradually, I found out about the hospital problems, the insufficient budget allocated annually by the mismanagement, media campaigns of doctor denigration, the increasingly precarious health conditions of Romanians, the colossal businesses of the pharmaceutical industry, the heavily discussed and postponed Health Law, that managed to pull a lot of people in the street, and many other items that are not only intended to sound an alarm regarding the condition of medical workers in Romania. Besides the researches and the relationships on the medical education status, the situation of available positions, the distribution of doctors, their salaries, the legal and ethical operating framework, I undertook also a study among physicians (especially those being at their early career to find out the elements that led them to choose this career and what is the current situation of medical career in Romania. For this, I chose questions that reflect the doctors’ satisfaction at workplace and how performance is influenced by the satisfaction level obtained from the medical services provided in the Romanian healthcare facilities. The study had both expected results, already knowing the current situation, but also unexpected, given the expectations of doctors. In more detail, there is a large number of young doctors that before thinking about work at a prestigious hospital abroad, think to what extent the current workplace in Romania offers support for family, pension, holidays etc. Thus, we considered appropriate to bring up within the paper

  6. Facilitating consumer access to health information.

    Science.gov (United States)

    Snowdon, Anne; Schnarr, Karin; Alessi, Charles

    2014-01-01

    The lead paper from Zelmer and Hagens details the substantive evolution occurring in health information technologies that has the potential to transform the relationship between consumers, health practitioners and health systems. In this commentary, the authors suggest that Canada is experiencing a shift in consumer behaviour toward a desire to actively manage one's health and wellness that is being facilitated through the advent of health applications on mobile and online technologies platforms. The result is that Canadians are now able to create personalized health solutions based on their individual health values and goals. However, before Canadians are able to derive a personal health benefit from these rapid changes in information technology, they require and are increasingly demanding greater real-time access to their own health information to better inform decision-making, as well as interoperability between their personal health tracking systems and those of their health practitioner team.

  7. Development of the bedridden person support system using hand gesture.

    Science.gov (United States)

    Ichimura, Kouhei; Magatani, Kazushige

    2015-08-01

    The purpose of this study is to support the bedridden and physically handicapped person who live independently. In this study, we developed Electric appliances control system that can be used on the bed. The subject can control Electric appliances using hand motion. Infrared sensors of a Kinect are used for the hand motion detection. Our developed system was tested with some normal subjects and results of the experiment were evaluated. In this experiment, all subjects laid on the bed and tried to control our system. As results, most of subjects were able to control our developed system perfectly. However, motion tracking of some subject's hand was reset forcibly. It was difficult for these subjects to make the system recognize his opened hand. From these results, we think if this problem will be improved our support system will be useful for the bedridden and physically handicapped persons.

  8. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  9. dLOGIS: Disaster Logistics Information System

    Science.gov (United States)

    Koesuma, Sorja; Riantana, Rio; Siswanto, Budi; Aji Purnomo, Fendi; Lelono, Sarjoko

    2017-11-01

    There are three timing of disaster mitigation which is pre-disaster, emergency response and post-disaster. All of those is important in disaster mitigation, but emergency response is important when we are talking about time. Emergency response has limited time when we should give help. Rapid assessment of kind of logistic, the number of survivors, number children and old people, their gender and also for difable person. It should be done in emergency response time. Therefore we make a mobile application for logistics management system. The name of application is dLOGIS, i.e. Disaster Logistics Information System. The application is based on Android system for mobile phone. Otherwise there is also website version. The website version is for maintenance, data input and registration. So the people or government can use it directly when there is a disaster. After login in dLOGIS, there is five main menus. The first main menu shows disaster information, refugees conditions, logistics needed, available logistics stock and already accepted logistics. In the second menu is used for entering survivors data. The field coordinator can enter survivors data based on the rapid assessment in disaster location. The third menu is used for entering kind of logistic. Number and kind of logistics are based on the BNPB needed standard for the survivor. The fourth menu displays the logistics stock available in field coordinator. And the last menu displays the logistics help that already accepted and sent by donation. By using this application when a disaster happened, field coordinator or local government can use maintenance distribution of logistics base on their needs. Also for donor people who will give help to survivor, they can give logistics with the corresponding of survivor needs.

  10. 76 FR 71980 - SEDASYS Computer-Assisted Personalized Sedation System; Ethicon Endo-Surgery, Incorporated's...

    Science.gov (United States)

    2011-11-21

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration [Docket No. FDA-2010-P-0176] SEDASYS Computer-Assisted Personalized Sedation System; Ethicon Endo-Surgery, Incorporated's Petition for... SEDASYS computer-assisted personalized sedation system (SEDASYS) submitted by Ethicon Endo-Surgery Inc...

  11. The Design and Implementation of Multiterminal Based Proactive Information Delivery System

    Directory of Open Access Journals (Sweden)

    Shixiong Xia

    2013-01-01

    Full Text Available Currently, the development of various communication terminal devices has greatly promoted people’s daily life, while information using efficiency with these devices decreases rapidly due to the information overload. To solve this problem, a multiterminal based proactive information delivery system (MPIDS is designed and implemented in this paper. Firstly, users’ interests are computed comprehensively from the historical data, taking full consideration of users’ behaviors when visiting web pages. Secondly, a proactive information monitor service is introduced to monitor users’ data requirements and their interest changes, with which, user data are pushed to their online device automatically according to the strategies. Finally, a data self-adapter is given to encode and transform the data according to users’ online parameters and a series of data self-adaptive strategies. The experimental results show that MPIDS provides richly featured, secure, and robust personalized functions, reduces the running cost, and promotes the end-user experience and business efficiency.

  12. The importance of purpose: moving beyond consent in the societal use of personal health information.

    Science.gov (United States)

    Grande, David; Mitra, Nandita; Shah, Anand; Wan, Fei; Asch, David A

    2014-12-16

    Adoption of electronic health record systems has increased the availability of patient-level electronic health information. To examine public support for secondary uses of electronic health information under different consent arrangements. National experimental survey to examine perceptions of uses of electronic health information according to patient consent (obtained vs. not obtained), use (research vs. marketing), and framing of the findings (abstract description without results vs. specific results). Nationally representative survey. 3064 African American, Hispanic, and non-Hispanic white persons (response rate, 65%). Appropriateness of health information use described in vignettes on a scale of 1 (not at all appropriate) to 10 (very appropriate). Mean ratings ranged from a low of 3.81 for a marketing use when consent was not obtained and specific results were presented to a high of 7.06 for a research use when consent was obtained and specific results were presented. Participants rated scenarios in which consent was obtained as more appropriate than when consent was not obtained (difference, 1.01 [95% CI, 0.69 to 1.34]; Pmarketing as less appropriate than when the use was research (difference, -2.03 [CI, -2.27 to -1.78]; Pmarketing uses (5.65 vs. 4.52; difference, 1.13 [CI, 0.87 to 1.39]). Participants rated hypothetical scenarios. Results could be vulnerable to nonresponse bias despite the high response rate. Although approaches to health information sharing emphasize consent, public opinion also emphasizes purpose, which suggests a need to focus more attention on the social value of information use. National Human Genome Research Institute.

  13. Back to the Future: Personality and Assessment and Personality Development

    OpenAIRE

    Roberts, Brent W.

    2009-01-01

    In this essay I consider the future of personality development in light of the past effects of Personality and Assessment on the field of personality in general and personality development in particular. The essay is organized around 1) the effect of Mischel's book on the foundational theories informing personality development; 2) definitions of personality traits; 3) an alternative model of personality traits, described as the sociogenomic model of personality traits, that can bridge the div...

  14. Towards a personalized environmental health information service using low-cost sensors and crowdsourcing

    Science.gov (United States)

    Castell, Nuria; Liu, Hai-Ying; Schneider, Philipp; Cole-Hunter, Tom; Lahoz, William; Bartonova, Alena

    2015-04-01

    Most European cities exceed the air quality guidelines established by the WHO to protect human health. As such, citizens are exposed to potentially harmful pollutant levels. Some cities have services (e.g., web pages, mobile apps, etc.) which provide timely air quality information to the public. However, air quality data at individual level is currently scarce or non-existent. Making this information directly useful to individuals poses a challenge. For instance, if a user is informed that the air quality is "poor", what does that mean for him/her, and how can this information be acted upon? Despite individuals having a unique relationship with their environment, the information on the state of atmospheric components and related hazards is currently mostly generic, and seldom personally relevant. This undermines citizens' interest in their environment, and consequently limits their ability to recognize and change both their contribution and their exposure to air pollution. In Oslo, two EU founded projects, CITI-SENSE (Engelken-Jorge et al., 2014) and Citi-Sense-MOB (Castell et al., 2014), are trying to establish a dialogue with citizens by providing them with the possibility of getting personalized air quality information on their smartphones. The users are able to check the air quality in their immediate surroundings and track their individual exposure while moving through the urban environment (Castell et al., 2014). In this way, they may be able to reduce their exposure such as by changing transport modes or routes, for example by selecting less polluted streets to walk or cycle through. Using a smartphone application, citizens are engaged in collecting and sharing environmental data generated by low-cost air quality sensors, and in reporting their individual perception (turning citizens into sensors themselves). The highly spatially resolved data on air quality and perception is geo-located. This allows for simultaneous visualization of both kinds of the sensor

  15. Meeting the health information needs of prostate cancer patients using personal health records.

    Science.gov (United States)

    Pai, H H; Lau, F; Barnett, J; Jones, S

    2013-12-01

    There is interest in the use of health information technology in the form of personal health record (phr) systems to support patient needs for health information, care, and decision-making, particularly for patients with distressing, chronic diseases such as prostate cancer (pca). We sought feedback from pca patients who used a phr. For 6 months, 22 pca patients in various phases of care at the BC Cancer Agency (bcca) were given access to a secure Web-based phr called provider, which they could use to view their medical records and use a set of support tools. Feedback was obtained using an end-of-study survey on usability, satisfaction, and concerns with provider. Site activity was recorded to assess usage patterns. Of the 17 patients who completed the study, 29% encountered some minor difficulties using provider. No security breaches were known to have occurred. The two most commonly accessed medical records were laboratory test results and transcribed doctor's notes. Of survey respondents, 94% were satisfied with the access to their medical records, 65% said that provider helped to answer their questions, 77% felt that their privacy and confidentiality were preserved, 65% felt that using provider helped them to communicate better with their physicians, 83% found new and useful information that they would not have received by talking to their health care providers, and 88% said that they would continue to use provider. Our results support the notion that phrs can provide cancer patients with timely access to their medical records and health information, and can assist in communication with health care providers, in knowledge generation, and in patient empowerment.

  16. Collaborative Information Agents on the World Wide Web

    Science.gov (United States)

    Chen, James R.; Mathe, Nathalie; Wolfe, Shawn; Koga, Dennis J. (Technical Monitor)

    1998-01-01

    In this paper, we present DIAMS, a system of distributed, collaborative information agents which help users access, collect, organize, and exchange information on the World Wide Web. Personal agents provide their owners dynamic displays of well organized information collections, as well as friendly information management utilities. Personal agents exchange information with one another. They also work with other types of information agents such as matchmakers and knowledge experts to facilitate collaboration and communication.

  17. Derivation and validation of the Personal Support Algorithm: an evidence-based framework to inform allocation of personal support services in home and community care.

    Science.gov (United States)

    Sinn, Chi-Ling Joanna; Jones, Aaron; McMullan, Janet Legge; Ackerman, Nancy; Curtin-Telegdi, Nancy; Eckel, Leslie; Hirdes, John P

    2017-11-25

    Personal support services enable many individuals to stay in their homes, but there are no standard ways to classify need for functional support in home and community care settings. The goal of this project was to develop an evidence-based clinical tool to inform service planning while allowing for flexibility in care coordinator judgment in response to patient and family circumstances. The sample included 128,169 Ontario home care patients assessed in 2013 and 25,800 Ontario community support clients assessed between 2014 and 2016. Independent variables were drawn from the Resident Assessment Instrument-Home Care and interRAI Community Health Assessment that are standardised, comprehensive, and fully compatible clinical assessments. Clinical expertise and regression analyses identified candidate variables that were entered into decision tree models. The primary dependent variable was the weekly hours of personal support calculated based on the record of billed services. The Personal Support Algorithm classified need for personal support into six groups with a 32-fold difference in average billed hours of personal support services between the highest and lowest group. The algorithm explained 30.8% of the variability in billed personal support services. Care coordinators and managers reported that the guidelines based on the algorithm classification were consistent with their clinical judgment and current practice. The Personal Support Algorithm provides a structured yet flexible decision-support framework that may facilitate a more transparent and equitable approach to the allocation of personal support services.

  18. Derivation and validation of the Personal Support Algorithm: an evidence-based framework to inform allocation of personal support services in home and community care

    Directory of Open Access Journals (Sweden)

    Chi-Ling Joanna Sinn

    2017-11-01

    Full Text Available Abstract Background Personal support services enable many individuals to stay in their homes, but there are no standard ways to classify need for functional support in home and community care settings. The goal of this project was to develop an evidence-based clinical tool to inform service planning while allowing for flexibility in care coordinator judgment in response to patient and family circumstances. Methods The sample included 128,169 Ontario home care patients assessed in 2013 and 25,800 Ontario community support clients assessed between 2014 and 2016. Independent variables were drawn from the Resident Assessment Instrument-Home Care and interRAI Community Health Assessment that are standardised, comprehensive, and fully compatible clinical assessments. Clinical expertise and regression analyses identified candidate variables that were entered into decision tree models. The primary dependent variable was the weekly hours of personal support calculated based on the record of billed services. Results The Personal Support Algorithm classified need for personal support into six groups with a 32-fold difference in average billed hours of personal support services between the highest and lowest group. The algorithm explained 30.8% of the variability in billed personal support services. Care coordinators and managers reported that the guidelines based on the algorithm classification were consistent with their clinical judgment and current practice. Conclusions The Personal Support Algorithm provides a structured yet flexible decision-support framework that may facilitate a more transparent and equitable approach to the allocation of personal support services.

  19. The impact of the Big Five personality traits on reports of child behavior problems by different informants

    NARCIS (Netherlands)

    Kroes, G.; Veerman, J.W.; Bruyn, E.E.J. De

    2005-01-01

    The present study compared ratings of a standardized sample of child behavior problems across informants and examined the effects of informant personality traits on child behavior ratings by mothers, teachers, and group-care workers. Participants were 55 clinic-referred children, aged 6–12 years.

  20. Management Information Systems Students' Perception of Skills and Competencies - Towards Knowledge Based Community

    Directory of Open Access Journals (Sweden)

    Alev ELÇİ

    2016-12-01

    Full Text Available The increasing usage of Information and Communication Technologies in official borders of our business lives, starting from e-government and e-commerce applications, spreading towards our daily personal lives has made it difficult to ignore the importance of Management Information Systems (MIS. MIS, initially taught as a course in different disciplines, has now started to develop as a standalone interdisciplinary academic program in higher education. Besides curriculum standards suggestions and necessary skills and competencies for MIS education identified by academic and professional organizations, students' perceptions in these topics are also important. Thus while developing towards knowledge based community, the aim of this research is to identify MIS students' perceptions of essential skills and competencies in their educational, proffesional and personal lives. The sample group of this study are the students that are a member of social media MIS groups. The gathered quantitative data has been analyzed by an online survey. As a result, it has been evident that students find that information technical skills and competencies are crucial. The skills required for transition to knowledge based community; global working, multicultural, social responsibility, civic awareness, equal opportunity, gender and environmental awareness comes later.