In this article, we introduce the application of rigorous analysis procedures to goal models to provide several beneÞts beyond the initial act of modeling. Such analysis can allow modelers to assess the satisfaction of goals, facilitate evaluation of high-level design alternatives, help analysts decide on the high-level requirements and design of the system, test the sanity of a model, and support communication and learning. The analysis of goal models can be done in very different ways depending on the nature of the model and the purpose of the analysis. In our work, we use the Goal-oriented Requirement Language (GRL), which is part of the User Requirements Notation (URN). URN, a new Recommendation of the International Telecommunications Union, provides the Þrst standard goal-oriented language. Using GRL, we develop an approach to analysis that can be done by evaluating qualitative or quantitative satisfaction levels of the actors and intentional elements (e.g., goals and tasks) composing the model. Initial satisfaction levels for some of the intentional elements are provided in a strategy and then propagated to the other intentional elements of the model through the various links that connect them. The results allow for an assessment of the relative effectiveness of design alternatives at the requirements level. Although no speciÞc propagation algorithm is imposed in the URN standard, different criteria for deÞning evaluation mechanisms are described. We provide three algorithms (quantitative, qualitative, and hybrid) as examples, which satisfy the constraints imposed by the standard. These algorithms have been implemented in the open-source jUCMNav tool, an Eclipse-based editor for URN models. The algorithms are presented and compared with the help of a telecommunication system example. C
Background When older adults return home from geriatric rehabilitation in a hospital, remembering the plethora of medical advice and medical instructions provided can be overwhelming for them and for their caregivers. Objective The overall objective was to develop and test the feasibility of a novel web-based application called MyPath to Home that can be used to manage the personalized needs of geriatric rehabilitation patients during their transition from the hospital to home. Methods This study involved (1) co-designing a patient- and clinician-tailored web-based application and (2) testing the feasibility of the application to manage the needs of geriatric rehabilitation patients when leaving the hospital. In phase 1, we followed a user-centered design process integrated with the modern agile software development methodology to iteratively co-design the application. The approach consisted of three cycles in which we engaged patients, caregivers, and clinicians to design a series of prototypes (cycles 1-3). In phase 2, we conducted a single-arm feasibility pilot test of MyPath to Home. Baseline and follow-up surveys, as well as select semistructured interviews were conducted. Results In phase 1, semistructured interviews and talk-aloud sessions were conducted with patients/caregivers (n=5) and clinicians (n=17) to design the application. In phase 2, patients (n=30), caregivers (n=18), and clinicians (n=20) received access to use the application. Patients and their caregivers were asked to complete baseline and follow-up surveys. A total of 91% (21/23) of patients would recommend this application to other patients. In addition, clinicians (n=6) and patients/caregivers (n=6) were interviewed to obtain further details on the value of the web-based application with respect to engaging patients and facilitating communication and sharing of information with the health care team. Conclusions We were successful at designing the MyPath to Home prototype for patients and their caregivers to engage with their clinicians during the transition from geriatric rehabilitation to home. Further work is needed to increase the uptake and usage by clinicians, and determine if this translates to meaningful changes in clinical and functional outcomes. International Registered Report Identifier (IRRID) RR2-10.2196/11031
Abstract. Hospitals strive to improve the quality of the healthcare they provide. To achieve this, they require access to health data. These data are sensitive since they contain personal information. Governments have legislation to ensure that privacy is respected and hospitals must comply with it. Unfortunately, most of the procedures meant to control access to health information remain paper-based, making it difficult to trace. In this paper, we introduce a framework based on the User Requirements Notation that models the business processes of a hospital and links them with legislation such as the Ontario Personal Health Information Privacy Act (PHIPA). We analyze different types of links, their functionality, and usefulness in complying with privacy law. This framework will help health information custodians track compliance and indicate how their business processes can be improved.
BackgroundProviders have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality has been an important driver of this reluctance.MethodsSix requirements for a surveillance protocol were defined that satisfy the confidentiality needs of providers and ensure utility to public health. The authors developed a secure multi-party computation protocol using the Paillier cryptosystem to allow the disclosure of stratified case counts and denominators to meet these requirements. The authors evaluated the protocol in a simulated environment on its computation performance and ability to detect disease outbreak clusters.ResultsTheoretical and empirical assessments demonstrate that all requirements are met by the protocol. A system implementing the protocol scales linearly in terms of computation time as the number of providers is increased. The absolute time to perform the computations was 12.5 s for data from 3000 practices. This is acceptable performance, given that the reporting would normally be done at 24 h intervals. The accuracy of detection disease outbreak cluster was unchanged compared with a non-secure distributed surveillance protocol, with an F-score higher than 0.92 for outbreaks involving 500 or more cases.ConclusionThe protocol and associated software provide a practical method for providers to disclose patient data for sentinel, syndromic or other indicator-based surveillance while protecting patient privacy and the identity of individual providers.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.