Current Search: information (x)
View All Items
Pages
- Title
- An Approach for Measuring the Confidentiality of Data Assured by the Confidentiality of Information Security Systems in Healthcare Organizations.
- Creator
-
Gallaher, Shawn, Elshennawy, Ahmad, Sala-Diakanda, Serge, Karwowski, Waldemar, Xanthopoulos, Petros, Yousef, Nabeel, University of Central Florida
- Abstract / Description
-
Because of the expansion in health information technology and the continued migration toward digital patient records as a foundation for the delivery of healthcare services, healthcare organizations face significant challenges in their efforts to determine how well they are protecting electronic health information from unauthorized disclosure. The disclosure of one's personal medical information to unauthorized parties or individuals can have broad-reaching and long-term impacts to both...
Show moreBecause of the expansion in health information technology and the continued migration toward digital patient records as a foundation for the delivery of healthcare services, healthcare organizations face significant challenges in their efforts to determine how well they are protecting electronic health information from unauthorized disclosure. The disclosure of one's personal medical information to unauthorized parties or individuals can have broad-reaching and long-term impacts to both healthcare providers and consumers. Although several classes and types of methodologies exist for measuring information security in general, a number of overarching issues have been identified which prevent their adaptation to the problem of measuring the confidentiality (the protection from unauthorized disclosure) of electronic information in complex organizational systems.In this study, a new approach for measuring the confidentiality of electronic information in healthcare-related organizations is developed. By leveraging systemic principles and concepts, an information security system (ISS) for assuring the confidentiality of electronic information in healthcare organizations is synthesized. The ISS is defined as a complex system composed of the Health Insurance Portability and Accountability Act (HIPAA) Security Rule information security safeguards and the people, processes, and technologies that contribute to these safeguards. The confidentiality of the ISS (-) a desired emergent property defined in terms of the systemic interactions which are present (-) represents the measure of protection from the unauthorized disclosure of electronic information.An information security model (ISM) that leverages the structure and parametric modeling capabilities of the Systems Modeling Language (SysML) was developed for specifyingan ISS in addition to the contained systemic interactions which are present. Through the use of a parametric solver capability, the complex system of equations which quantify the contained interactions was executed for the purpose of generating a measure of confidentiality using a set of user-provided input values (-) a process referred to as ISM instantiation.
Show less - Date Issued
- 2012
- Identifier
- CFE0004378, ucf:49380
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004378
- Title
- Friendship and Informant Characteristics Associated with Agreement among Adolescent and Friend Ratings of Behavior Problems.
- Creator
-
Lauer, Brea-anne, Renk, Kimberly, Beidel, Deborah, Sims, Valerie, University of Central Florida
- Abstract / Description
-
Although teacher and parent informants often are used to gather information regarding adolescents' emotional and behavioral functioning, research has suggested that agreement among these raters and adolescents' self-ratings tends to be low to moderate. Given that friends typically play an important role in the lives of adolescents, the present study sought to determine the relative agreement amongst adolescent self-reports and those of their friends as well as factors that might impact this...
Show moreAlthough teacher and parent informants often are used to gather information regarding adolescents' emotional and behavioral functioning, research has suggested that agreement among these raters and adolescents' self-ratings tends to be low to moderate. Given that friends typically play an important role in the lives of adolescents, the present study sought to determine the relative agreement amongst adolescent self-reports and those of their friends as well as factors that might impact this agreement. In particular, a sample of 207 culturally diverse high school students were matched based on perceived friendship closeness and asked to provide ratings of their own emotional and behavioral problems as well as that of an identified friend. Additionally, adolescents provided information regarding their friendship quality, previous exposure to psychopathology in others, and social competence as well as their endorsements for etiological attributions for friends' behavior. Results revealed that adolescent self-ratings and those of their friends demonstrate high levels of agreement for both internalizing and externalizing problems. Further, raters' emotional and behavioral problems were related inconsistently to rating agreement, whereas friendship quality and other rater characteristics (i.e., previous exposure, social competence) did not demonstrate a relationship. Additionally, friends tended to provide explanations for behavior problems that varied according to the type of behavior observed. Specifically, adolescents were more likely to provide explanations that were external in nature for internalizing symptoms, whereas explanations for externalizing symptoms were both internal and external. Overall, this study provided additional support for the utility of friend informants when ratings of adolescents' emotional and behavioral problems are needed.
Show less - Date Issued
- 2015
- Identifier
- CFE0005824, ucf:50905
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005824
- Title
- THE EFFECTS OF INFORMAL SCIENCE EDUCATION ON STUDENTS' ATTITUDES AND ACADEMIC PERFORMANCE.
- Creator
-
Ashley, Samuel, Everett, Robert, University of Central Florida
- Abstract / Description
-
Will student attitudes towards science change when they are given a chance to explore an area of science in which they have indicated an interest? This action research thesis investigated this question over a period of nine weeks. The subjects of this study included twelve students enrolled in the same seventh grade physical science class. The school was located in a suburban setting in the Southeast United States. Data for this study was collected with anecdotal notes, participation grid,...
Show moreWill student attitudes towards science change when they are given a chance to explore an area of science in which they have indicated an interest? This action research thesis investigated this question over a period of nine weeks. The subjects of this study included twelve students enrolled in the same seventh grade physical science class. The school was located in a suburban setting in the Southeast United States. Data for this study was collected with anecdotal notes, participation grid, science attitude survey, student interviews, and student journals. This study found that when students are given the opportunity to pursue an area of science in which they demonstrate an interest, they are more likely to participate in their regular curriculum and increase positive attitudes' towards science. As a result of this increased engagement and improved attitudes' towards science, students academic performance in science also improved.
Show less - Date Issued
- 2008
- Identifier
- CFE0002166, ucf:47508
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002166
- Title
- AN INVESTIGATION INTO THE PREDICTORS OF ADOPTION AND UTILIZATION OF INFORMATION-SHARING NETWORKS BY LOCAL LAW ENFORCEMENT IN THREE STATES.
- Creator
-
saviak, joe, Martin, Lawrence, University of Central Florida
- Abstract / Description
-
ABSTRACT A major change in longstanding police organizational behavior is increasingly evident in the recent emergence of computerized information-sharing networks in public safety. From both theoretical and empirical perspectives, a better understanding of the determinants that can explain and predict the rise and growth of this new and significant development in American policing is needed. A highly limited body of empirical studies has endeavored to validate effective predictors of...
Show moreABSTRACT A major change in longstanding police organizational behavior is increasingly evident in the recent emergence of computerized information-sharing networks in public safety. From both theoretical and empirical perspectives, a better understanding of the determinants that can explain and predict the rise and growth of this new and significant development in American policing is needed. A highly limited body of empirical studies has endeavored to validate effective predictors of adoption and utilization of electronic information-sharing networks by local law enforcement agencies. Utilizing an integrated theoretical framework largely built upon Rogers' diffusion of innovations theory, sixteen hypotheses were tested through logistic regression and multiple regression analyses of survey research data collected from local law enforcement executives in the three states of California, New York, and Georgia. Qualitative research organized and conducted through targeted telephone interviews with twenty law enforcement executives across the three study states and with responses to open ended questions within the study survey instrument aided in the examination of these hypotheses. 66.7% of the cases of agency adoption of information sharing were correctly classified by the predictors within the logistic regression model. Adoption was positively influenced by a chief executive who demonstrated strong leadership and possessed more extensive experience in law enforcement. Adoption was negatively affected by increasing the opportunity to experiment with this innovation and advancing age of the chief executive. Both quantitative and qualitative findings confirmed that law enforcement agencies that exhibited dedicated leadership are more likely to adopt information-sharing networks. 19.4-25.9% of the variation in the outcome variable of adoption was explained by the predictors within the logistic regression model. Utilization was negatively impacted by growing autonomy of police organizations within the network but benefited from innovation attributes such as the acquisition of an advantage in crime fighting capabilities and reduced complexity in employment of the information-sharing network. 9.1% of the variation in utilization of information-sharing networks could be explained by the predictor variables included within the multiple regression model. Qualitative research also cross-validated the positive effect of gaining an advantage over the criminal element as influential to utilization. A greater advantage in preventing and solving crimes, higher levels of inter-organizational trust between police agencies, and enthusiastic executive leadership were found by the qualitative inquiry to enhance both adoption and utilization. Knowing in advance which theoretically informed and empirically validated antecedents can facilitate or impede adoption and utilization of information integration networks could enable policymakers and law enforcement administrators to optimize strategies to attain successful outcomes.
Show less - Date Issued
- 2007
- Identifier
- CFE0001839, ucf:47377
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001839
- Title
- REGIONAL READINESS FOR INTELLIGENCE INFORMATION SHARING TO SUPPORT HOMELAND SECURITY.
- Creator
-
Kemp, Christine, Reynolds, Michael, University of Central Florida
- Abstract / Description
-
The Markle Task Force on National Security in the Information Age was created to produce recommendations on how to best leverage intelligence and information to improve security without compromising existing civil liberties. Their second report proposed that the government set up an information-sharing network using currently available technology to improve our ability to prevent terrorist attacks, while protecting civil liberties. The Markle recommendations have been incorporated into the...
Show moreThe Markle Task Force on National Security in the Information Age was created to produce recommendations on how to best leverage intelligence and information to improve security without compromising existing civil liberties. Their second report proposed that the government set up an information-sharing network using currently available technology to improve our ability to prevent terrorist attacks, while protecting civil liberties. The Markle recommendations have been incorporated into the recent Intelligence Reform and Terrorism Prevention Act of 2004. The proposition is that the Markle task force recommendations are sufficient to achieve the required data integration in the United States. To affirm or falsify the proposition, three existing systems will be reviewed: Alabama's Law Enforcement Tactical System Portal (LETS), Florida's Statewide Data Sharing Effort (FINDER), and Orange County, Florida's Integrated Criminal Justice System. This study found that there is no overall model for national intelligence analysis that incorporates the capabilities that law enforcement has for collection and analysis in with the federal capabilities for collection and analysis. This may ultimately limit the regional systems' success. Recommendations for potential initial models are made. In addition, recommendations for improvement in each regional system are provided. Finally, further research is needed to refine a national intelligence analysis model that can be supported by a distributed information sharing network.
Show less - Date Issued
- 2005
- Identifier
- CFE0000623, ucf:46542
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000623
- Title
- Accuracy of the Peer Informant: What Characteristics Are Related to the Ability to Detect Behavior Problems in Peers?.
- Creator
-
Lauer, Brea-anne, Renk, Kimberly, Beidel, Deborah, Sims, Valerie, University of Central Florida
- Abstract / Description
-
Victimization and rejection by peers leads to and exacerbates behavior problems in children and adolescents. Given the implications of problematic peer relations for adolescents who experience behavior problems, the present study examined factors that may be related to how adolescents perceive peers who exhibit such problems. Specifically, the present study examined the relationship of adolescent peer informants' socioeconomic status, their prior exposure to psychopathology, their own social...
Show moreVictimization and rejection by peers leads to and exacerbates behavior problems in children and adolescents. Given the implications of problematic peer relations for adolescents who experience behavior problems, the present study examined factors that may be related to how adolescents perceive peers who exhibit such problems. Specifically, the present study examined the relationship of adolescent peer informants' socioeconomic status, their prior exposure to psychopathology, their own social competence, and their own behavior problems to their perceptions of peer internalizing and externalizing behavior problems, their liking of individuals who exhibit such problems, and their attributions for the etiology of such problems when portrayed by fictitious adolescents of the same age. In particular, adolescents were asked to rate a set of vignettes that portray internalizing and externalizing behavior problems that are seen commonly in peers and to complete a set of brief questionnaires. Results revealed that adolescents are able to accurately detect the presence of both internalizing and externalizing behavior problems in vignette characters. Additionally, vignette characters who display behavior problems received significantly lower liking ratings. Finally, although adolescents endorsed both internal and external etiological factors, ratings were related to the gender of the depicted vignette character and the nature of the portrayed behavior problems. Participants' own externalizing problems, social competence, and previous exposure to behavior problems in others related uniquely to adolescents' perceptions of the vignette characters. Overall, this study provided additional evidence that, although peers can serve as valuable informants, they also tended to reject adolescents who display behavior problems.
Show less - Date Issued
- 2012
- Identifier
- CFE0004185, ucf:49022
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004185
- Title
- Investigators' Perceptions of Inter-Jurisdictional Law Enforcement Information Sharing On Criminal Investigative Success: An Exploratory Analysis.
- Creator
-
Freeman, Jennifer, Reynolds, Kenneth, Winton, Mark, Ford, Robert, Georgiopoulos, Michael, University of Central Florida
- Abstract / Description
-
Information sharing among law enforcement entities became a national priority after the 9/11 attack (Carter, 2005). Various information systems utilized by law enforcement agencies may be promising; however, there is little extant empirical research to validate the system's effectiveness related to increasing investigative success (Bureau of Justice Assistance, 2010). One information system that has tied together numerous Florida law enforcement agencies is the FINDER system. FINDER, the...
Show moreInformation sharing among law enforcement entities became a national priority after the 9/11 attack (Carter, 2005). Various information systems utilized by law enforcement agencies may be promising; however, there is little extant empirical research to validate the system's effectiveness related to increasing investigative success (Bureau of Justice Assistance, 2010). One information system that has tied together numerous Florida law enforcement agencies is the FINDER system. FINDER, the Florida Integrated Network for Data Exchange and Retrieval system, provides agency investigators a wide range of information not previously available (Reynolds, Griset, (&) Scott, 2006; Scott, 2006). This study's foundation was primarily based upon the conceptual frameworks of diffusion of innovations and knowledge management. Survey based information from investigators using FINDER and those using a non-FINDER information system was obtained and analyzed to determine if the information impacted investigative success. Questionnaires were sent to those law enforcement investigators that participate in the FINDER system, as well as those who use a non-FINDER system. Through descriptive and regression analysis, it was found that FINDER participants reported there was a positive contribution to investigative success. The research also found that certain information obtained from FINDER assisted in arrests and an investigator's ability to solve cases. This study provides a foundation for further information system research related to case solvability and investigative success.
Show less - Date Issued
- 2014
- Identifier
- CFE0005167, ucf:50660
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005167
- Title
- FACTORS INFLUENCING USER-LEVEL SUCCESS IN POLICE INFORMATIONSHARING: AN EXAMINATION OF FLORIDA'S FINDER SYSTEM.
- Creator
-
Scott, Jr, Ernest, Reynolds, Kenneth, University of Central Florida
- Abstract / Description
-
An important post-9/11 objective has been to connect law enforcement agencies so they can share information that is routinely collected by police. This low-level information, gathered from sources such as traffic tickets, calls for service, incident reports and field contacts, is not widely shared but might account for as much as 97% of the data held in police records systems. U.S. policy and law assume that access to this information advances crime control and counterterrorism efforts. The...
Show moreAn important post-9/11 objective has been to connect law enforcement agencies so they can share information that is routinely collected by police. This low-level information, gathered from sources such as traffic tickets, calls for service, incident reports and field contacts, is not widely shared but might account for as much as 97% of the data held in police records systems. U.S. policy and law assume that access to this information advances crime control and counterterrorism efforts. The scarcity of functioning systems has limited research opportunities to test this assumption or offer guidance to police leaders considering investments in information sharing. However, this study had access to FINDER, a Florida system that shares low-level data among 121 police agencies. The user-level value of FINDER was empirically examined using Goodhue's (1995) Task-Technology Fit framework. Objective system data from 1,352 users, user-reported "successes," and a survey of 402 active users helped define parameters of user-level success. Of the users surveyed, 68% reported arrests or case clearances, 71% reported improved performance, and 82% reported improved efficiency attributed to FINDER. Regression models identified system use, task-fit, and user characteristic measures that predicted changes in users' individual performance. A key finding was that FINDER affirmed the importance of sharing low-level police data, and successful outcomes were related to its ease of use and access to user-specified datasets. Also, users employed a variety of information-seeking techniques that were related to their task assignments. Improved understanding of user-defined success and system use techniques can inform the design and functionality of information sharing systems. Further, this study contributes to addressing the critical requirement for developing information sharing system metrics.
Show less - Date Issued
- 2006
- Identifier
- CFE0001503, ucf:47139
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001503
- Title
- HEALTHCARE COMMUNICATION NETWORKS: THE DISSEMINATION OF EMPLOYEE INFORMATION FOR HOSPITAL SECURITY.
- Creator
-
Sumner, Jennifer, Liberman, Aaron, University of Central Florida
- Abstract / Description
-
ABSTRACT: Healthcare in the United States is a system that, organizationally speaking, is fragmented. Each hospital facility is independently operated and is responsible for the hiring of its own employees. However, corrupt individuals can take advantage of this fragmentation and move from hospital to hospital, gaining employment while hiding previous employment history. Traditionally, hospitals have been reluctant to share information on their previous employees, even with other hospitals,...
Show moreABSTRACT: Healthcare in the United States is a system that, organizationally speaking, is fragmented. Each hospital facility is independently operated and is responsible for the hiring of its own employees. However, corrupt individuals can take advantage of this fragmentation and move from hospital to hospital, gaining employment while hiding previous employment history. Traditionally, hospitals have been reluctant to share information on their previous employees, even with other hospitals, for fear of issues surrounding defamation, negligent hiring, and violation of the employee's privacy. However, growth in healthcare services is expected to rise exponentially in the near future, increasing the demand for employees. The need, therefore, to exchange pertinent information regarding employees will become necessary as hospitals seek qualified employees to fill positions throughout their organizations. One way to promote this information exchange is to develop trusted information sharing networks among hospital units. This study examined the problems surrounding organizational information sharing as well as the current level of employee information sharing being conducted by hospitals nationwide. Utilizing a survey of hospital administrators, this study drew upon the theoretical foundations of the Diffusion of Innovation Theory, the Knowledge Management Theory, the Social Exchange Theory and the earlier organizational information sharing frameworks established by Dawes (1996) and Landsbergen and Wolken (1998; 2001) in order to examine the variables that contribute to propensity of hospital administrators to engage in the sharing of employee information with other organizations.
Show less - Date Issued
- 2008
- Identifier
- CFE0002010, ucf:47609
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002010
- Title
- COGNITIVE LEARNING FROM COMPUTER-BASED INFORMATION SYSTEMS BY INCORPORATING KNOWLEDGE CONSTRUCTION INTERVENTIONS.
- Creator
-
Wazzan, Wajdi, Williams, Kent, University of Central Florida
- Abstract / Description
-
The aim of the present study was to develop and empirically evaluate different categories of instructional activities, which stimulate the generation and construction of knowledge on the part of an individual student. These generative activities are primed by prompts or scaffolds, which can easily be inserted into specific curriculum addressing any domain of knowledge. To assess the manner in which the knowledge construction interventions influence the learning outcomes from computerized...
Show moreThe aim of the present study was to develop and empirically evaluate different categories of instructional activities, which stimulate the generation and construction of knowledge on the part of an individual student. These generative activities are primed by prompts or scaffolds, which can easily be inserted into specific curriculum addressing any domain of knowledge. To assess the manner in which the knowledge construction interventions influence the learning outcomes from computerized information systems, we have developed an online computer-based information system that describes the functions and mechanisms associated with the bus system of the US army Abrams M1A2 tank. Seven versions of this interactive instructional computer system were developed for this research; the type of prompt was manipulated among the seven experimental conditions. The seven experimental conditions were control, sentence completion, sentence generation, system provided questions, self-generated questions and answers, system provided advanced organizers, and generated advanced organizers. The results from this study provided strong evidence that the integration of knowledge construction interventions within the curriculum material have improved understanding of the curriculum content and reasoning about such content over and above the mere presentation and study of the curriculum. The research also delineated a practical way on how to incorporate and operationally integrate the knowledge construction interventions within computer-based information systems.
Show less - Date Issued
- 2007
- Identifier
- CFE0001696, ucf:47202
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001696
- Title
- DEVELOPING A SPATIAL INTERFACE FOR INFORMATION VISUALIZATION AND MANAGEMENT IN A CRISIS RESPONSE SCENARIO.
- Creator
-
Costello, Anthony, Tang, Arthur, University of Central Florida
- Abstract / Description
-
The focus of this study was to investigate how a spatial interface can be effectively utilized to support information presentation and information integration via human-centric data visualization, leading to decreased cognitive load, more accurate situation awareness, and subsequently, improved task performance. In high tempo, information intensive environments like those managed by an emergency operations center (EOC), information organization tools are essential. Though users can be trained...
Show moreThe focus of this study was to investigate how a spatial interface can be effectively utilized to support information presentation and information integration via human-centric data visualization, leading to decreased cognitive load, more accurate situation awareness, and subsequently, improved task performance. In high tempo, information intensive environments like those managed by an emergency operations center (EOC), information organization tools are essential. Though users can be trained to use conventional email software applications efficiently, the constraints of the information management paradigms inherent to conventional systems may limit a user's ability to gather context and create an accurate picture of the situation. It is possible that new data visualization techniques and information management paradigms may improve a user's performance far beyond these limits. To address these issues, theories regarding information management, cognitive workload and data visualization paradigms were explored and applied to create a software prototype spatial interface. This study focused on how an individual member of an EOC would need to collect and organize incoming incident reports (e.g., emails) for the purpose of quick analysis and integration. The operator then used this information to build a picture of the event or events taking place in their sphere of influence. Performance metrics were applied to determine whether or not an individual could perform faster and more accurately with the Incident Report Visual Organizer (IRVO) prototype software interface as opposed to a conventional interface (Microsoft Outlook). The findings from this exploratory evaluation are discussed, as well as the potential implications of utilizing spatial interfaces to manage information in dynamic environments.
Show less - Date Issued
- 2007
- Identifier
- CFE0001770, ucf:47264
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001770
- Title
- DEFINING WORKPLACE INFORMATION FLUENCY SKILLS FOR TECHNICAL COMMUNICATION STUDENTS.
- Creator
-
Zhang, Yuejiao, Dombrowski, Paul, University of Central Florida
- Abstract / Description
-
Information fluency refers to the ability to recognize information needs and to gather, evaluate, and communicate information appropriately. In this study, I treat "information fluency" as both an overall competency and as a collection of knowledge and skills. The purpose of this study is to explore the specific workplace information fluency skills valued by employers of technical communicators, to find out how instructors perceive and teach these skills, and to suggest how these findings can...
Show moreInformation fluency refers to the ability to recognize information needs and to gather, evaluate, and communicate information appropriately. In this study, I treat "information fluency" as both an overall competency and as a collection of knowledge and skills. The purpose of this study is to explore the specific workplace information fluency skills valued by employers of technical communicators, to find out how instructors perceive and teach these skills, and to suggest how these findings can inform our teaching practices. Within the framework of qualitative methodology, this study employs two data-collection instruments, including a content analysis of online job recruitment postings and a survey of technical communication instructors across the United States. The study discovers that when hiring technical communicators, employers require candidates to have skills in information processing, information technology, and critical thinking. Candidates must be able to identify their information needs, and must know how to use specified tools to gather, evaluate, and communicate information. It also reveals that although "information fluency" is a new terminology to a majority of instructors, the skill sets that constitute information fluency already existed in their knowledge. The study's last finding suggests that the opportunity for an internship is perceived as the most helpful in students' acquisition of information fluency skills. This dissertation concludes with a list of specific employer-valued information fluency skills, recommendations for program administrators and instructors for implementing information fluency, as well as recommendations for future researches on this subject.
Show less - Date Issued
- 2010
- Identifier
- CFE0003170, ucf:48604
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003170
- Title
- HEALTHCARE INFORMATION SYSTEMS:DESIGN THEORY, PRINCIPLES AND APPLICATION.
- Creator
-
Richardson, Sandra, Courtney, James, University of Central Florida
- Abstract / Description
-
Healthcare information systems (HISs), as a class of systems, are not currently addressed in the MIS literature. This is in spite of a sharp increase in use over the past few years, and the uniquely qualified role that MIS has in the development of, impact and general understanding of HISs. In this project the design science paradigm frames the development of a set of design principles derived from the synthesis of the design literature, ethics literature, and professional guidelines, from...
Show moreHealthcare information systems (HISs), as a class of systems, are not currently addressed in the MIS literature. This is in spite of a sharp increase in use over the past few years, and the uniquely qualified role that MIS has in the development of, impact and general understanding of HISs. In this project the design science paradigm frames the development of a set of design principles derived from the synthesis of the design literature, ethics literature, and professional guidelines, from both the medical and computing professions. The resulting principles are offered to address the design of healthcare information systems. Action research, a widely accepted methodology for testing design principles derived from the design science paradigm, is employed to test the HIS principles and to implement change in a healthcare organization through the use of an HIS. The action research project was a collaborative effort between a Central Florida hospice and the researcher, the result of which was an advanced directives decision support system. The system was design to meet a number of organizational goals that ranged from tracking compliance with federal regulations to increasing the autonomy of the patients that used the system. The result is a set of tested design principles and lessons learned from both anticipated and unanticipated consequences of the action research project.
Show less - Date Issued
- 2006
- Identifier
- CFE0001339, ucf:46960
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001339
- Title
- DEVELOPMENT AND VALIDATION OF THE BEILE TEST OF INFORMATION LITERACY FOR EDUCATION (B-TILED).
- Creator
-
Beile O'Neil, Penny, Boote, David, University of Central Florida
- Abstract / Description
-
Few constituencies exist where it is more important to produce information literate individuals than teacher candidates, yet rarely is it suggested that practitioners entering the field are adequately prepared to teach and model information literacy to their students. As a result, information literacy has been established as a key outcome by a number of teacher education accrediting bodies and professional associations. Corollary to this initiative is the effort to develop valid instruments...
Show moreFew constituencies exist where it is more important to produce information literate individuals than teacher candidates, yet rarely is it suggested that practitioners entering the field are adequately prepared to teach and model information literacy to their students. As a result, information literacy has been established as a key outcome by a number of teacher education accrediting bodies and professional associations. Corollary to this initiative is the effort to develop valid instruments that assess information literacy skills. Yet, at the time of this dissertation, no rigorously reviewed instruments were uncovered that measure the information literacy skills levels of teacher candidates. The study describes the development and validation of the Beile Test of Information Literacy for Education (B-TILED). Funded in part by the Institute for Library and Information Literacy Education and the Institute of Museum and Library Services, the study is part of a national initiative spear-headed by the Project for the Standardized Assessment of Information Literacy Skills (SAILS). Test content is based on nationally recognized standards from the International Society for Technology in Education and the Association of College and Research Libraries. Procedures designed to enhance the scale's validity were woven throughout its development. 172 teacher education students at a large, metropolitan university completed a protocol consisting of 22 test items and 13 demographic and self-percept items. This instrument can be used to inform curricular and instructional decisions and to provide evidence of institutional effectiveness for program reviews.
Show less - Date Issued
- 2005
- Identifier
- CFE0000749, ucf:46591
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000749
- Title
- ANTECEDENTS OF INFORMATION SYSTEMS BACKSOURCING.
- Creator
-
Veltri, Natalia, Saunders, Carol, University of Central Florida
- Abstract / Description
-
This dissertation examines backsourcing of corporate IS activities, and why IS outsourcing clients decide to backsource. Information Systems (IS) backsourcing is a business practice in which a company takes back in-house assets, activities, and skills that are part of its IS operations and were previously outsourced to one or more outside information service suppliers. Focusing on economic, strategic and relationship motives, a number of theoretical backsourcing factors is derived from...
Show moreThis dissertation examines backsourcing of corporate IS activities, and why IS outsourcing clients decide to backsource. Information Systems (IS) backsourcing is a business practice in which a company takes back in-house assets, activities, and skills that are part of its IS operations and were previously outsourced to one or more outside information service suppliers. Focusing on economic, strategic and relationship motives, a number of theoretical backsourcing factors is derived from transaction cost theory, agency theory, core competency perspective, IOR theory and marketing channels literature. To identify factors salient in IS backsourcing and to examine the process of backsourcing this dissertation employs exploratory case study methodology. Six outsourcing contracts within three client companies are analyzed. The evidence is collected using semi-structured interviews, archival records and company documents. Results of individual cases are reported and then triangulated to single out the primary backsourcing antecedents. Qualitative comparative analysis is employed to augment the findings. The findings indicate that service quality of the outsourcing arrangement, cost benefit of backsourcing, change in the role of IS, loss of control over the outsourcing arrangement, changes in the management and power of decision makers and other organizations impact backsourcing decisions. Strategic considerations, change in the role of IS and loss of control, dominate backsourcing decision even if costs or service quality suggest otherwise. The executives exert power through their structural position within organization and have a major influence on decisions. Executives' beliefs, prior experience and values impact their perception of backsourcing and play a role in backsourcing decisions. Additionally, the power of other organizations involved in the interorganizational relationships with the client company is important. These organizations use political maneuvering to impose their goals on the client company. While service quality and cost considerations are important deliverables in the outsourcing contract, these factors by itself do not justify the decision to backsource.
Show less - Date Issued
- 2005
- Identifier
- CFE0000870, ucf:46660
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000870
- Title
- The State of Trauma-Informed Care in the Preschool.
- Creator
-
Kolomeyer, Ellen, Renk, Kimberly, Sims, Valerie, Dunn, Michael, Boris, Neil, University of Central Florida
- Abstract / Description
-
This study aimed to provide a foundational knowledge base from which to begin bridging the gap between research on trauma-informed, relationship-based therapeutic interventions in early childhood preschool classrooms and the practice of such classroom-based interventions. Specifically, this study identified several specific predictors (e.g., funding) and barriers (e.g., lack of knowledge and training in assessment instruments and referral options) to gaining trauma-informed knowledge and...
Show moreThis study aimed to provide a foundational knowledge base from which to begin bridging the gap between research on trauma-informed, relationship-based therapeutic interventions in early childhood preschool classrooms and the practice of such classroom-based interventions. Specifically, this study identified several specific predictors (e.g., funding) and barriers (e.g., lack of knowledge and training in assessment instruments and referral options) to gaining trauma-informed knowledge and engaging in trauma-informed practices in preschool classrooms. Individuals in leadership roles at preschools were sampled anonymously with regard to their current trauma-informed knowledge and program practices. Participants included 98 preschool leaders from Florida, 36 preschool leaders from Maryland, and 34 preschool leaders from Wyoming. Descriptive statistics were calculated for the variables of interest. ANCOVA with bootstrapping was conducted to determine whether there were significant differences between programs based on their state and funding source. There was no effect of state. In contrast, funding source predicted trauma-informed knowledge and practices, with federal/state funding being related to higher levels of knowledge and trauma-informed practices. Additionally, multiple regression analyses with bootstrapping were examined to determine significant predictors of preschool leaders' trauma-informed knowledge and practices. Similarly, results indicated that programs differed significantly in trauma-informed knowledge and screening practices based on their source of funding, with federal/state funding again predicting more trauma-informed knowledge and practices. Researchers may be able to benefit from the unique information found in this study as a launching point to inform program development and disseminate community- and nation-wide models of trauma-informed care in preschool classrooms. Implications for future studies are discussed.
Show less - Date Issued
- 2018
- Identifier
- CFE0007341, ucf:52143
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007341
- Title
- Mathematical Foundations of Adaptive Quantum Processing.
- Creator
-
Bonior, Daniel, Mucciolo, Eduardo, Martin, Keye, Argenti, Luca, Shivamoggi, Bhimsen, Marinescu, Dan, University of Central Florida
- Abstract / Description
-
Quantum information has the potential to revolutionize the way we store, process, transfer and acquire information [1,14,15,21,37]. In particular, quantum information offers exciting new approaches to secure communication, computation and sensing. However, in order to realize such technologies, we must first understand the effect that environmental noise has on a quantum system. This dissertation builds upon recent studies that have explored the underlying structure of quantum information and...
Show moreQuantum information has the potential to revolutionize the way we store, process, transfer and acquire information [1,14,15,21,37]. In particular, quantum information offers exciting new approaches to secure communication, computation and sensing. However, in order to realize such technologies, we must first understand the effect that environmental noise has on a quantum system. This dissertation builds upon recent studies that have explored the underlying structure of quantum information and the effects of qubit channels in quantum communication protocols.This work is divided into five main chapters, with Chapter 1 being a brief introduction to quantum information. We then begin Chapter 2 by defining the error function for our qubit communication protocols. From there we explore the properties of our error functions and the topological space that they form. In Chapter 3 we consider the newly patented process Adaptive Quantum Information Processing, patent number US9838141 B2; originally outlined by Martin in [23]. We restate the adaptive scheme and exemplify its application through the Prepare and Send Protocol and Quantum Key Distribution. Applying our results from Chapter 2, we obtain an expression for the adaptability of unital channels in these two protocols and classify the channels that admit the most improvement. We dedicate Chapter 4 to the derivation of gravitational noise, and show that in certain circumstances gravity results in a channel that can be maximally improved in Adaptive QKD [3,14,16]. Lastly, we study the set of error functions through the lens of domain theory. Domain theory is a subset of mathematics that was developed in order to rigorously formalize computations. The first four chapters are all consequences of past discoveries in the mathematical structure of quantum channels. In Chapter 5 we characterize the set of error functions through domain theory, extending the mathematical foundations of quantum information. [12,18,20, 22, 23,25].
Show less - Date Issued
- 2018
- Identifier
- CFE0007313, ucf:52124
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007313
- Title
- Assessment of Information Security Culture in Higher Education.
- Creator
-
Glaspie, Henry, Karwowski, Waldemar, Wan, Thomas, Hancock, Peter, Caulkins, Bruce, University of Central Florida
- Abstract / Description
-
Information security programs are instituted by organizations to provide guidance to their users who handle their data and systems. The main goal of these programs is to protect the organization's information assets through the creation and cultivation of a positive information security culture within the organization. As the collection and use of data expands in all economic sectors, the threat of data breach due to human error increases. Employee's behavior towards information security is...
Show moreInformation security programs are instituted by organizations to provide guidance to their users who handle their data and systems. The main goal of these programs is to protect the organization's information assets through the creation and cultivation of a positive information security culture within the organization. As the collection and use of data expands in all economic sectors, the threat of data breach due to human error increases. Employee's behavior towards information security is influenced by the organizations information security programs and the overall information security culture. This study examines the human factors of an information security program and their effect on the information security culture. These human factors consist of stringency of organizational policies, behavior deterrence, employee attitudes towards information security, training and awareness, and management support of the information security programs. A survey questionnaire was given to employees in the Florida College System to measure the human aspects of the information security programs. Confirmatory factor analysis (CFA) and Structural Equation Modeling (SEM) were used to investigate the relationships between the variables in the study using IBM(&)#174; SPSS(&)#174; Amos 24 software. The study results show that management support and behavior deterrence have a significant positive relationship with information security. Additionally, the results show no significant association between information security culture and organization policies, employee commitment and employee awareness. This suggests a need for further refinement of the model and the survey tool design to properly assess human factors of information security programs and their effects on the organizational security culture.
Show less - Date Issued
- 2018
- Identifier
- CFE0007184, ucf:52272
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007184
- Title
- Iteratively Reweighted Least Squares Minimization with Prior Information: A New Approach.
- Creator
-
Popov, Dmitriy, Li, Xin, Moore, Brian, Mikusinski, Piotr, University of Central Florida
- Abstract / Description
-
Iteratively reweighted least squares (IRLS) algorithms provide an alternative to the more standard L1-minimization approach in compressive sensing. Daubechies et al. introduced a particularly stable version of an IRLS algorithm and rigorously proved its convergence in 2010. They did not, however, consider the case in which prior information on the support of the sparse domain of the solution is available. In 2009, Miosso et al. proposed an IRLS algorithm that makes use of this information to...
Show moreIteratively reweighted least squares (IRLS) algorithms provide an alternative to the more standard L1-minimization approach in compressive sensing. Daubechies et al. introduced a particularly stable version of an IRLS algorithm and rigorously proved its convergence in 2010. They did not, however, consider the case in which prior information on the support of the sparse domain of the solution is available. In 2009, Miosso et al. proposed an IRLS algorithm that makes use of this information to further reduce the number of measurements required to recover the solution with specified accuracy. Although Miosso et al. obtained a number of simulation results strongly confirming the utility of their approach, they did not rigorously establish the convergence properties of their algorithm. In this paper, we introduce prior information on the support of the sparse domain of the solution into the algorithm of Daubechies et al. We then provide a rigorous proof of the convergence of the resulting algorithm.
Show less - Date Issued
- 2011
- Identifier
- CFE0004154, ucf:49082
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004154
- Title
- Searching for Meaningful Use of Health Information Technology: A Study of Cardiovascular Disease Care in Veterans General Hospitals.
- Creator
-
Thaldorf, Carey, Wan, Thomas, Fottler, Myron, Liberman, Aaron, Campbell, Robert, University of Central Florida
- Abstract / Description
-
The cost of healthcare in the United States is on an upward trajectory towards an unsustainable level. In order to address this, Congress and the Obama Administration passed the American Recovery and Reinvestment Act (ARRA) of 2009 to begin the process of controlling these costs. Within the ARRA is the Health Information Technology for Economic and Clinical Health (HITECH) section which creates financial incentives to invest in Health Information Technology (HIT) and to develop a means to...
Show moreThe cost of healthcare in the United States is on an upward trajectory towards an unsustainable level. In order to address this, Congress and the Obama Administration passed the American Recovery and Reinvestment Act (ARRA) of 2009 to begin the process of controlling these costs. Within the ARRA is the Health Information Technology for Economic and Clinical Health (HITECH) section which creates financial incentives to invest in Health Information Technology (HIT) and to develop a means to measure the Meaningful Use of specific functions of Electronic Health Records (EHRs). This research examines the widely used Joint Commission datasets to determine their suitability as a basis of meeting the government mandated measuring of Meaningful Use. The datasets used for this study consists of hospital level performance measures with a sample size of 370 hospital samples of HIT Use Intensity and Cardiovascular Performance attained from the Veterans Health Administration (VHA). An Organizational Network Theoretical approach was applied to the data in a non-experimental, sample-resample design to data collected in 2007. A Structural Equation Model (SEM) was built to test for the strength of the correlation between HIT Use Intensity and Cardiovascular Performance and a Latent Growth Curve Model (LGM) was built to examine the effect of the trajectory of HIT Use Intensity on the trajectory of Cardiovascular Performance. The SEM found a weak (.18) correlation between HIT Use Intensity and Cardiovascular Performance and the model only captured 12 percent of the variance. The LGM found no convergence between the trajectories of HIT Use Intensity and Cardiovascular Performance. This may have been the result of the data being non-normally distributed and heavily skewed to the high end of the scale. The policy implications of this study indicate that while Joint Commission data capture only a small amount of the variance attributed to HIT Use it does show a weak but positive correlation between increases in HIT Use Intensity and Increases in Cardiovascular Performance at the hospital level. Future research into adjustments to Joint Commission data measures (or others) may prove to be valuable in measuring the Meaningful Use of HIT systems in order to help hospitals make educated decisions on which HIT systems to purchase and the potential benefits associated with them.
Show less - Date Issued
- 2011
- Identifier
- CFE0004488, ucf:49319
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004488