scholarly journals Accessible Modelling of Complexity in Health (AMoCH) and associated data flows: asthma as an exemplar

2016 ◽  
Vol 23 (1) ◽  
pp. 476 ◽  
Author(s):  
Harshana Liyanage ◽  
Daniela Luzi ◽  
Simon De Lusignan ◽  
Fabrizio Pecoraro ◽  
Richard McNulty ◽  
...  

Background Modelling is an important part of information science. Models are abstractions of reality. We use models in the following contexts: (1) to describe the data and information flows in clinical practice to information scientists, (2) to compare health systems and care pathways, (3) to understand how clinical cases are recorded in record systems and (4) to model health care business models.Asthma is an important condition associated with a substantial mortality and morbidity. However, there are difficulties in determining who has the condition, making both its incidence and prevalence uncertain.Objective To demonstrate an approach for modelling complexity in health using asthma prevalence and incidence as an exemplar.Method The four steps in our process are:1. Drawing a rich picture, following Checkland’s soft systems methodology;2. Constructing data flow diagrams (DFDs);3. Creating Unified Modelling Language (UML) use case diagrams to describe the interaction of the key actors with the system;4. Activity diagrams, either UML activity diagram or business process modelling notation diagram.Results Our rich picture flagged the complexity of factors that might impact on asthma diagnosis. There was consensus that the principle issue was that there were undiagnosed and misdiagnosed cases as well as correctly diagnosed. Genetic predisposition to atopy; exposure to environmental triggers; impact of respiratory health on earnings or ability to attend education or participate in sport, charities, pressure groups and the pharmaceutical industry all increased the likelihood of a diagnosis of asthma. Stigma and some factors within the health system diminished the likelihood of a diagnosis. The DFDs and other elements focused on better case finding.Conclusions This approach flagged the factors that might impact on the reported prevalence or incidence of asthma. The models suggested that applying selection criteria may improve the specificity of new or confirmed diagnosis.

IFLA Journal ◽  
2019 ◽  
Vol 46 (3) ◽  
pp. 271-289
Author(s):  
Amir Hessam Radfar ◽  
Fatima Fahimnia ◽  
Mohammad Reza Esmaeili ◽  
Moluk al-Sadat Beheshti

Reviewing the recently published texts in the field of library and information science education indicates some fundamental problems in this pedagogic process. According to different factors dealing with the process, confronting the challenges is considered as complex issues. Therefore, in this research Soft Systems Methodology, an action research method, was chosen to propose a comprehensive model to solve the mentioned problems. Based on the Checkland seven proposed stages, the problem situation was identified, and then it was expressed in the form of a rich picture. Driving root definitions and the CATWOE model were cleared to accomplish the conceptual model. Comparison of the conceptual model to the real world, also proposing feasible and desired changes are the fifth and sixth stages of the research. Finally, taking action to improve the current situation in the field of LIS education finished the procedure. Utilizing the steps of Soft Systems Methodology, this research draws the rich picture illustrating the process of LIS education and its issues dealing with the related ecosystem. Accordingly, the final model consisting of three ontologies was attained. To validate the semantic model, Cohen’s kappa coefficient was calculated. The model, approved by high level of expert agreement, not only can be an appropriate solution for the problems involved in library and information science education in Iran, but also can be considered as a pattern for future researches in designation and implementation of a semantic model of education in other disciplines.


Author(s):  
Carol Booton

The problem addressed in this case study stemmed from recognition of qualitative researchers’ desire to triangulate findings with two or more data sources. In this study, I describe the process of using visual data to verify, contradict, or enhance verbal data using a soft systems methodology tool called rich pictures. To date, the process of comparing verbal data and visual data has not been well explored. I use secondary data from a Ph.D. study about faculty members’ perceptions of academic quality to compare two data sources: participants’ verbal definitions of academic quality and participants’ verbal descriptions of rich pictures representing their visual conceptions of academic quality. Three rich picture examples illustrate the varying degrees to which rich picture descriptions may align with verbal definitions. Some participants’ rich picture descriptions were partially or completely consistent with their initial definitions of the phenomenon under study. However, in most cases, participants’ descriptions of their rich pictures added new data to their initial definitions of academic quality, thus generating new insights. I recommend asking participants to describe their rich pictures in their own words, thereby facilitating a direct comparison of participants’ verbal and visual data.


2020 ◽  
Vol 10 (1) ◽  
pp. 86-99
Author(s):  
Lewis Tsuro ◽  
Stan Hardman

The Soft Systems Methodology (SSM) was developed as a set of tools for identifying and making incremental steps to improve situations with poorly defined causes or solutions. The supply chain forms a key process of any construction project; however, on any given construction site, supply chain inefficiencies could arise from many different avenues. Opinions vary, though, on which of these avenues is more important for increasing supply chain efficiencies; whether any problem even exist across the different aspects of the supply chain; as well as what steps should be taken to resolve them. It was therefore studied, here, whether SSM could be employed as a useful tool to systematically apply in the supply chains of a construction project in South Africa, for understanding and targeting the problematic situations that arise. Following thorough cyclical open-ended interviews with 17 workers, supervisors, foremen, site clerks, senior managers, and the CEO of the principal contractor at a new office park construction project in Rosebank, Johannesburg, and a thematic analysis of the data, SSM was performed to understand the existing challenges, and develop a suitable model for improvement. The study found that SSM was a good tool for understanding the ‘messy’ circumstances surrounding the chosen construction project supply chain, as well as actions that could be taken to improve the supply chain’s efficiency on site. The findings add weight to the argument that SSM could be a good tool for project managers to systematically introduce into their project planning regimens


2012 ◽  
Vol 8 (1) ◽  
pp. 1-25 ◽  
Author(s):  
Geoffrey Karokola ◽  
Louise Yngström ◽  
Stewart Kowalski

E-Government offers many benefits to government agencies, citizens and the business community. However, e-Government services are prone to current and emerging security challenges posing potential threats to critical information assets. Securing it appears to be a major challenge facing governments globally. Based on the international security standards – the paper thoroughly investigates and analyzes eleven e-government maturity models (eGMMs) for security services. Further, it attempts to establish a common frame of reference for eGMM critical stages. The study utilizes the Soft Systems Methodology (SSM) of scientific inquiry/ learning cycle adopted from Checkland and Scholes. The findings show that security services (technical and non-technical) are lacking in eGMMs – implying that eGMMs were designed to measure more quantity of offered e-government services than the quality of security services. Therefore, as a step towards achieving secure e-government services the paper proposes a common frame of reference for eGMM with five critical stages. These stages will later be extended to include the required security services.


Sign in / Sign up

Export Citation Format

Share Document