scholarly journals Post-implementation Evaluation of a Digital Dictation System in a Large Health Service Using HOT-Fit Framework

2020 ◽  
Vol 15 (4) ◽  
pp. 60-70
Author(s):  
Christopher Bain ◽  
Aniruddha Goswami ◽  
Sheree Lloyd ◽  
Laura Davis

Objective: The objective of this study was to evaluate a digital dictation system (DDS) that has been implemented in a large health service. The data collected in this study was used to understand the overall uptake and performance of the system and consequently improve the quality of care delivered by the organisation.                           Methods: A mixed method research design was used in this study. Clinicians and Medical Transcriptionists using the DDS across the two campuses of the health service over a period of four months, were surveyed to assess the extent to which the implementation of the DDS is fulfilling its purpose. In addition, system usage statistics, project implementation documents and user support emails were also analysed. Results: This study utilised an existing comprehensive and validated evaluation framework, the Human, Organisation and Technology Fit (HOT-Fit) framework. Human fit: 79.55% (n=35) of Clinicians and 33.33% (n=2) of MTs reported an overall satisfaction with the DDS. Organisation fit: The document analysis revealed that the DDS selected aligned best with current organizational IT strategies and was an easy fit with existing practices. Technology fit: An overall satisfaction of 53.49% (n=23) from the Clinicians and 16.67% (n=1) from the MTs was reported on the DDS. Out of 22 issues lodged regarding the system, 77.27% (n=17) issues met the Service Level Agreement (SLA). Conclusions: The overall findings of the study suggest that, the DDS was a good fit within the organisation in terms of Human fit and Organisation fit. In terms of Technology fit there existed some technical issues on the end-user level due to the system being new to the end users. To overcome this and facilitate the smooth functioning of the DDS, effective communication with the vendor and other relevant stakeholders was recommended so that end users i.e. the Clinicians and MTs understand the system, its functionality and their role in providing timely and high-quality information for clinical care.

Author(s):  
A.C. Leonard

End users have expectations regarding services and support, and the quality thereof, provided by the supplier. They compare their expectations to the received service to assess the service quality (Coye, 2004). In order to ensure that the service supplied by the service provider meets the expectations of end users, a successful service level agreement (SLA) is required. Quality SLA’s clearly define, amongst many other elements, the commitments and responsibilities of the IT service provider and end users within the service delivery processes (Larson, 1998). One method of measuring the success of SLA’s is by using service metrics with regard to the availability, reliability, serviceability, response, and user satisfaction of the SLA (Larson, 1998). Therefore, the success of the SLA depends on a clear, common understanding of the services and service quality between the service provider and end users. Furthermore commitment, trust, and cooperation between all parties is necessary to achieve success with SLA’s (Hiles, 1994). However, in this paper it is argued that all these soft issues can only form a basis when sound relationships are established and maintained between the IT service provider and end users (Leonard, 2002). This paper aims to determine how the establishment of a sound IT-end user relationship can add value to the SLA for both the IT service provider and the end users, and increase the success of SLA’s.


2020 ◽  
Vol 17 (9) ◽  
pp. 3904-3906
Author(s):  
Susmita J. A. Nair ◽  
T. R. Gopalakrishnan Nair

Increasing demand of computing resources and the popularity of cloud computing have led the organizations to establish of large-scale data centers. To handle varying workloads, allocating resources to Virtual Machines, placing the VMs in the most suitable physical machine at data centers without violating the Service Level Agreement remains a big challenge for the cloud providers. The energy consumption and performance degradation are the prime focus for the data centers in providing services by strictly following the SLA. In this paper we are suggesting a model for minimizing the energy consumption and performance degradation without violating SLA. The experiments conducted have shown a reduction in SLA violation by nearly 10%.


2018 ◽  
Vol 11 (2) ◽  
pp. 30-42
Author(s):  
Vinicius Da Silveira Segalin ◽  
Carina Friedrich Dorneles ◽  
Mario Antonio Ribeiro Dantas

Cloud computing is a paradigm that presents many advantages to both costumers and service providers, such as low upfront investment, pay-per-use and easiness of use, delivering/enabling scalable services using Internet technologies. Among many types of services we have today, Database as a Service (DBaaS) is the one where a database is provided in the cloud in all its aspects. Examples of aspects related to DBaaS utilization are data storage, resources management and SLA maintenance. In this context, an important feature, related to it, is resource management and performance, which can be done in many different ways for several reasons, such as saving money, time, and meeting the requirements agreed between client and provider, that are defined in the Service Level Agreement (SLA). A SLA usually tries to protect the costumer from not receiving the contracted service and to ensure that the provider reaches the profit intended. In this paper it is presented a classification based on three main parameters that aim to manage resources for enhancing the performance on DBaaS and guarantee that the SLA is respected for both user and provider sides benefit. The proposal is based upon a survey of existing research work efforts.


Author(s):  
Oshin Sharma ◽  
Hemraj Saini

Cloud computing has revolutionized the working models of IT industry and increasing the demand of cloud resources which further leads to increase in energy consumption of data centers. Virtual machines (VMs) are consolidated dynamically to reduce the number of host machines inside data centers by satisfying the customer's requirements and quality of services (QoS). Moreover, for using the services of cloud environment every cloud user has a service level agreement (SLA) that deals with energy and performance trade-offs. As, the excess of consolidation and migration may degrade the performance of system, therefore, this paper focuses the overall performance of the system instead of energy consumption during the consolidation process to maintain a trust level between cloud's users and providers. In addition, the paper proposed three different heuristics for virtual machine (VM) placement based on current and previous usage of resources. The proposed heuristics ensure a high level of service level agreements (SLA) and better performance of ESM metric in comparison to previous research.


Author(s):  
Jeanette Nasem Morgan

This chapter presents the tactics and metrics an organization applies after having made a decision to use outsource providers. Tactics are used to define the nature and specifics of the outsourcing arrangement, as well as to select the contractual basis of the agreement. Organizations that elect to use providers geographically distant from the client site are cautioned to carefully evaluate capabilities, as well as legal and security issues related to external outsourcers. For these purposes, it is critical to align measures of performance compliance in the form of metrics on each MIS outsourcing relationship. When negotiating and establishing the terms of the outsourcing arrangement, management should ensure that appropriate performance metrics are identified and included, as well as flexibility for change is built in to the contract. This chapter addresses some of the methods, as well as some of the metrics that might be used in such contract agreements. The use of contracts and service level agreements are discussed, as well as in depth techniques for conducting validation and background checks on outsource suppliers. Sample outlines for service level agreement preparation and performance specifications are included for the practitioner.


2017 ◽  
Vol 25 (1) ◽  
pp. 61-66
Author(s):  
Nguyen Cao Phuong ◽  
Tran Hong Quan ◽  
Sang-Ho Lee ◽  
Jung-Mo Moon

The most important thing is guarantee QoS over wireless infrastructures. The efficient of service level agreement (SLA) is becoming increasingly important to both service providers and customers. This paper presents some traffic control schemes for improving QoS, trafficmodel and performance evaluation are described. We are defining a new scheme for improving handoff call performances in wireless networks, a finite queuing scheme for the handoff calls. SLA measurement calculates the packet delay parameter (PD) of handoff calls. The handoff calls will be accepted into queue if their PD will be smaller than the average waiting time of the queue. Important performance measures of the suggested scheme such as the blocking probability of new call and dropping probability of handoff call are described and evaluated.  


Author(s):  
David Breitgand ◽  
Amir Epstein ◽  
Benny Rochwerger

The authors consider elastic multi-VM workloads corresponding to multi-tier application and study the fundamental problems of VM placement optimization, subject to policy constraints, elasticity requirements, and performance SLAs. Numerous algorithmic and architecture proposals appeared recently in the area of resource provisioning in IaaS. The chapter provides a comprehensive review of related work in this field and presents the authors’ recent scientific findings in this area obtained in the framework of an EU funded project, RESERVOIR. The chapter discusses horizontal elasticity support in IaaS, its relationship to SLA protection, VM placement optimization and efficient capacity management to improve cost-efficiency of cloud providers. Elastic services comprise multiple virtualized resources that can be added and deleted on demand to match variability in the workload. A Service owner profiles the service to determine its most appropriate sizing under different workload conditions. This variable sizing is formalized through a service level agreement (SLA) between the service owner and the cloud provider. The Cloud provider obtains maximum benefit when it succeeds to fully allocate the resource set demanded by the elastic service subject to its SLA. Failure to do so may result in SLA breach and financial losses to the provider. The chapter defines a novel combinatorial optimization problem called elastic services placement problem to maximize the provider’s benefit from SLA compliant placement. It demonstrates the feasibility of our approach through a simulation study, showing that we are capable of consistently obtaining good solutions in a time efficient manner. In addition, we discuss how resource utilization level can be improved through an advanced capacity management leveraging elastic workload resource consumption variability.


2010 ◽  
pp. 1807-1828
Author(s):  
Jeanette Nasem Morgan

This chapter presents the tactics and metrics an organization applies after having made a decision to use outsource providers. Tactics are used to define the nature and specifics of the outsourcing arrangement, as well as to select the contractual basis of the agreement. Organizations that elect to use providers geographically distant from the client site are cautioned to carefully evaluate capabilities, as well as legal and security issues related to external outsourcers. For these purposes, it is critical to align measures of performance compliance in the form of metrics on each MIS outsourcing relationship. When negotiating and establishing the terms of the outsourcing arrangement, management should ensure that appropriate performance metrics are identified and included, as well as flexibility for change is built in to the contract. This chapter addresses some of the methods, as well as some of the metrics that might be used in such contract agreements. The use of contracts and service level agreements are discussed, as well as in depth techniques for conducting validation and background checks on outsource suppliers. Sample outlines for service level agreement preparation and performance specifications are included for the practitioner.


2013 ◽  
Vol 411-414 ◽  
pp. 60-66
Author(s):  
Ming Yue Lei ◽  
Zheng Huang ◽  
Qiao Yan Wen ◽  
Chun Ye Hu

Since many Internet enterprises employ the computing resources provided by Cloud Service Provider (CSP), how to dynamically adjust the number of rented servers and improve service quality becomes a crucial subject. A lot of efforts have been made to achieve intelligent energy saving capacity adjustment but scarcely any of them takes the security issue of cloud data into account. In this paper, we focus on the cloud storage security in the cloud computing capacity scaling. We design the security part of the whole model based on the idea of Proofs of Retrievability (POR). In the scaling part of the model, we determine the scaling strategy according to email server instances CPU utilization. With simulation and performance evaluation, we conclude that the designed model is able to enable verifier to check the integrity of the information in the cloud storage and maintain satisfied response time target within Service Level Agreement (SLA).


Sign in / Sign up

Export Citation Format

Share Document