Electronic Healthcare
Electronic Healthcare
Electronic Healthcare
Editorial Board
Ozgur Akan
Middle East Technical University, Ankara, Turkey
Paolo Bellavista
University of Bologna, Italy
Jiannong Cao
Hong Kong Polytechnic University, Hong Kong
Falko Dressler
University of Erlangen, Germany
Domenico Ferrari
Università Cattolica Piacenza, Italy
Mario Gerla
UCLA, USA
Hisashi Kobayashi
Princeton University, USA
Sergio Palazzo
University of Catania, Italy
Sartaj Sahni
University of Florida, USA
Xuemin (Sherman) Shen
University of Waterloo, Canada
Mircea Stan
University of Virginia, USA
Jia Xiaohua
City University of Hong Kong, Hong Kong
Albert Zomaya
University of Sydney, Australia
Geoffrey Coulson
Lancaster University, UK
Patty Kostkova Martin Szomszor
David Fowler (Eds.)
Electronic
Healthcare
4th International Conference, eHealth 2011
Málaga, Spain, November 21-23, 2011
Revised Selected Papers
13
Volume Editors
Patty Kostkova
Martin Szomszor
David Fowler
City University London, School of Health Sciences
City eHealth Research Centre
Northampton Square, London EC1V 0HB, UK
E-mail: patty@soi.city.ac.uk; {martin.szomszor.1, david.fowler.1}@city.ac.uk
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is
concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,
reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication
or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,
in its current version, and permission for use must always be obtained from Springer. Violations are liable
to prosecution under the German Copyright Law.
The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply,
even in the absence of a specific statement, that such names are exempt from the relevant protective laws
and regulations and therefore free for general use.
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
Patty Kostkova
Martin Szomszor
David Fowler
Organization
General Co-chairs
Patty Kostkova City eHealth Research Centre, City University
London, UK
Martin Szomszor City eHealth Research Centre, City University
London, UK
Clinical Chair
Femida Gwadry-Sridhar Lawson Health Research Institute, Canada
Industry Chair
Corinne Marsolier Cisco Systems Inc.
Publications Chair
David Fowler City eHealth Research Centre, City University
London, UK
Poster Chair
Ed de Quincey University of Greenwich, UK
VIII Organization
Demo Chair
Gawesh Jawaheer City eHealth Research Centre, City University
London, UK
Web Chair
Simon Hammond City eHealth Research Centre, City University
London, UK
Local Chair
Cristina Urdialis University of Malaga, Spain
Conference Coordinator
Justina Senkus European Alliance for Innovation
1 Introduction
Today, the number of social media users continues to skyrocket with rates of
participation on social networking sites already quadrupling from 2005-2009 [1]. As
an easily accessible, highly cost-effective and interoperable system, social media
opens doors to a better understanding of community creation, providing fast access to
information anywhere in the world, 24 hours a day [2,3].
Due to the popularity of online communication, open-source social media
platforms present excellent opportunities in health research [4]. Using a strategy
called infoveillance, real-time online data can be systematically mined, aggregated
and analyzed to inform public health and policy [5,6]. More specifically, social
media can be used as a relevant and real-time source of epidemic intelligence [4].
Mining online information can provide insight to abnormal patterns of disease and
aid in predicting disease outbreaks. Various studies have confirmed the potential of
infoveillance to advance epidemic intelligence.
The aim of this paper is to illustrate how data generated through social media can
be used to inform planning and implementation of strategies to address communicable
disease emergence - in turn, changing the future of health research.
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 1–8, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
2 S. Guy et al.
2 Method
3 Results
Fig. 1. This flow diagram illustrates the study selection process. A total of 885 publications
were identified by bibliographic and hand searching. Through application of inclusion and
exclusion criteria, 12 full-text publications were included in this review. This diagram is based
upon The PRISMA Statement [7].
All publications reported focused on mining social media for the purpose of disease
surveillance and prediction. As infodemiology is a relatively novel and emerging
field, most studies were exploratory in design. The diseases of choice include
influenza-like-illness (ILI) and H1N1.
evaluated with CDC (Centres for Disease Control) data. The system retrieved 4.7 million
– retweets were extracted. To validate the observed trends, this data was compared to
CDC data. The dataset containing no retweets and no tweets from the same user, resulted
in the highest correlation (r= 0.9846) with CDC data.
Corley et al., [10] evaluated blog posts containing ILI keywords. Flu-related posts
were extracted from 44 million posts collected over a 3 month period. A seven day
period in posting was identified and verified. Categorized baseline trends were
compared to CDC data to identify anomalies. Results show a significant correlation
between the frequency of ILI posts per week and CDC data. In addition, Corley et al
{{4750 Corley 2010; 4028 Corley 2010;}} collected 97,955,349 weblogs, micro-
blogs and social media items pertaining to ILI data over a 20 week period. English
language items containing relevant keywords were retrieved and grouped by month,
week and day of the week. Flu-related data was compared to CDC data, and found to
be highly correlated (r = 0.626 at 95% confidence).
Culotta et al., [4] have developed regression models using 574, 643 tweets
collected over a 10 week period to predict ILI. To obtain a random sample of tweets
the authors searched for common words. The percentage of tweets that reported ILI
was estimated. Their findings indicated multiple regression out performs simple
regression, keywords selected based on residual sum of squares is more effective than
selecting keywords based on a correlation coefficient, and the best model of
prediction (r=0.78) was one where “a simple bag-of-words classifier trained on
roughly 200 documents can effectively filter erroneous document matches”.
de Quincey & Kostkova [13] conducted a study to identify ILI trends present in
tweets. The Twitter Search API was used to retrieve 100 tweets (including metadata).
A PHP code parsed returned tweets (every minute) which were then saved to a
MYSQL database. The system ran for 1 week in May 2009. A total of 135, 438
tweets containing ‘flu’ terminology were retrieved. The content was analyzed for
trends using ‘flu’ in conjunction with other keywords (‘swine’ + ‘flu’). Future plans
involve the use of collocation analysis to identify trends.
Infovigil is an open-source infoveillance system which mines, analyzes and
visually represents textual health-related data from Twitter [6,14]. Infovigil was used
to plot term prevalence, and provide content analysis of tweets pertaining to H1N1.
Two million tweets were retrieved over an 8 month period. English-language tweets
were selected for, and retweets were excluded. Tweet patterns were influenced by
media with the most commonly tweeted material being news (52.6%) Original tweets,
as opposed to retweets, contained more personal experiences. There was very little
misinformation found in the tweets (4.5%). The majority of automated queries
correlated with manual coding results.
Lampos & Cristianini [15] developed a monitoring tool to track ILI patterns using
UK specific Twitter data. Tweets containing symptom-related keywords were
collected over 6 months during 2009. A daily average of 160,000 tweets were
retrieved. This data, converted to a flu-score, was compared to weekly H1N1 reports
from the Health Protection Agency. This resulting score correlated highly with reports
(>95%). This method works independently of language, can determine self-diagnostic
statements in tweets, and uses time series geolocated data.
Social Media: A Systematic Review to Understand the Evidence and Application 5
Data Collector [16] is a system that uses social media as a source for real-time
data. The backend consists of a web crawler, written in PHP and utilizing the Twitter
Search API. Tweets are stored in a relational database according to UML class with 2
main categories: disease and location. Data Collector supplies a RESTful API divided
into location, disease, and occurrence, which specifies methods and parameters
through which one can access the database. The frontend web interface uses AJAX to
produce real- time graphs and maps. A dataset containing H1N1 tweets was collected
from 6 European countries between May and July 2009. This system collected an
average of 3200 tweets per day; 700 pertained to H1N1.
Signorini et al., [17] tracked sentiment and H1N1 activity using tweets. Keywords
were used to retrieve tweets from the US. Prediction models were trained using CDC
ILI values. Results are divided into 2 sets of data. The first saw 951,697 tweets from
334,840,972 retrieved over 34 days and was used to plot spikes of public interest. The
second set represented over 4 million tweets from 8 million over a 3 month period.
When analyzed, this showed no sustained interest in vaccine-related issues by the
public. ILI estimates were gathered using a model trained on 1 million ILI tweets for
8 months. This model produced estimates that the authors believed were fairly
accurate (average error = 0.28%; SD 0.23%). In order to garner real time estimates of
ILI according to region, Signorini et al., [17] developed a model with region readings
fitted to geolocated tweets. This model was less precise (average error = 0.37%) than
the national weekly model.
The majority of articles included in the systematic review collected and examined
data from Twitter (n=7); only 1 article looked at weblogs, micro-blogs, and social
media. Studies demonstrated that a general correlation exists between ILI content in
Tweets and CDC data. Research also indicated that Tweet patterns are strongly
influenced by media, with news being the most commonly tweeted material. Finally,
additional research is needed to determine the effectiveness of geo-location in
garnering real-time estimates of ILI according to region.
4 Discussion
Our search strategy was not as streamlined as we had planned. Not having the ability
to choose a MeSH term as distinct as “social media”, “infoveillance”, or “Twitter”,
meant that time was wasted sifting through irrelevant publications. While we
extended our search to include conference proceedings as well, the publications
retrieved were not of value. Rather, the references in retrieved publications provided
direction to relevant crucial proceedings. However, some of the publications we
retrieved through hand searching were not retrieved through direct bibliographic
database searching.
Target Audiences. The initial task for any text mining solutions is identifying entities
of interest from the relevant textual content. This is often achieved through the use of
natural language processing techniques. Each social media has a specific target
audience with unique engagement behavior specific to that platform. Information
harvested through social networking sites may not be representative of the population
Social Media: A Systematic Review to Understand the Evidence and Application 7
at large. It is therefore important that data mining solutions take into account
demographic characteristics of audiences within individual platforms.
User Interactions: Every social networking platform has a set of rules governing
how its users interact with one another. For example, some social media platforms
such as Twitter and Facebook enable real-time interactions between users while
YouTube tends to be less interactive. As such, the types of interactions will
determine when and how often data must be collected in order to derive any
meaningful information.
Information Access: Social media platforms are already compiling fine-grained
user-generated content based on individuals’ online activities. While the means for
deciphering what is relevant through information mining already exists and have
proven extremely successful considering the amount of money companies are willing
to pay to have such kind of access, such personal and information-rich content is not
often publicly available. More open-source social networking solutions are therefore
needed to facilitate any meaningful data mining solutions beyond the basic alert
systems discussed in this paper.
Evidence-Based Medicine: Research is needed to identify effective ways of
embedding evidence within social media platforms that could support monitoring
positive impact on desired behavior changes and allowing users to share/compare
experiences and provide support. Given the broad range of users, there is also a need
to provide levels of detail regarding the evidence itself so that meaning information
could be mined.
Knowledge Representation: Finally, mining social media content for medical
information can only succeed if we recognize the role of ontologies in knowledge
management and knowledge discovery. Ontology offers significant benefit to
knowledge harvesting in social networking platforms as it facilitates data pruning and
can help accelerate the discovery of meaningful information.
References
1. Evans, D.: Social Media Marketing: An Hour a Day. Wiley Publishing, Indiana (2008)
2. McNab, C.: What Social Media Offers to Health Professionals and Citizens. Bulletin of the
WHO 87, 566 (2009)
3. Bacigalupe, G.: Is There a Role for Social Technologies in Collaborative Healthcare?
Families, Systems & Health 29, 1–14 (2011)
8 S. Guy et al.
4. Culotta, A.: Towards Detecting Influenza Epidemics by Analyzing Twitter Messages. In:
1st Workshop on Social Media Analytics (SOMA 2010), Washington DC (2010)
5. Wilson, N., Mason, K., Tobias, M., Peacey, M., Huang, Q.S., Baker, M.: Interpreting
Google Flu Trends Data for Pandemic H1N1 Influenza: The New Zealand Experience.
Euro. Surveill. 14, 19386 (2009)
6. Chew, C., Eysenbach, G.: Pandemics in the Age of Twitter: Content Analysis of Tweets
During the 2009 H1N1 Outbreak. PLoS ONE 5 (2010)
7. Moher, D., Liberati, A., Tetzlaff, J., Altman, D.G., PRISMA Group: Preferred Reporting
Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement. Annals of
Internal Medicine 151, 264–269 (2009)
8. Achrekar, H., Avinash, G., Lazarus, R., Yu, S., Liu, B.: Predicting Flu Trends using
Twitter Data. In: International Workshop on CPNS, Shanghai, China (2011)
9. Chen, L., Achrekar, H., Liu, B., Lazarus, R.: Vision: Towards Real Time Epidemic
Vigilance through Online Social Networks: Introducing SNEFT. In: 1st ACM Workshop
on Mobile Cloud Computing, San Francisco, California (2010)
10. Corley, C.D., Mikler, A.R., Singh, K.P., Cook, D.J.: Monitoring Influenza Trends through
Mining Social Media. In: International Conference on Bioinformatics and Computational
Biology, Las Vegas, Nevada (2009)
11. Corley, C.D., Cook, D.J., Mikler, A.R., Singh, K.P.: Text and Structural Data Mining of
Influenza Mentions in Web and Social Media. International Journal of Environmental
Research and Public Health 7, 596–615 (2010)
12. Corley, C.D., Cook, D.J., Mikler, A.R., Singh, K.P.: Using Web and Social Media for
Influenza Surveillance. Advances in Experimental Medicine and Biology 680, 559–564
(2010)
13. de Quincey, E., Kostkova, P.: Early Warning and Outbreak Detection Using Social
Networking Websites: The Potential of Twitter. In: Kostkova, P. (ed.) eHealth 2009.
LNICST, vol. 27, pp. 21–24. Springer, Heidelberg (2010)
14. Eysenbach, G.: Infodemiology and Infoveillance Tracking Online Health Information and
Cyberbehavior for Public Health. American Journal of Preventive Medicine 40, S154–
S158 (2011)
15. Lampos, V., Cristianini, N.: Tracking the Flu Pandemic by Monitoring the Social Web. In:
Int. Workshop on CIP, Elba Island, Italy (2010)
16. Lopes, L.F., Zamite, J.M., Tavares, B.C., Couto, F.M., Silva, F., Silva, M.J.: Automated
Social Network Epidemic Data Collector. In: INForum (2009)
17. Signorini, A., Segre, A.M., Polgreen, P.M.: The Use of Twitter to Track Levels of Disease
Activity and Public Concern in the U.S. during the Influenza A H1N1 Pandemic. PloS
One 6, e19467 (2011)
18. Wilson, K., Brownstein, J.S.: Early Detection of Disease Outbreaks Using the Internet.
CMAJ: Canadian Medical Association Journal 180, 829–831 (2009)
19. Brownstein, J.S., Freifeld, C.C., Madoff, L.C.: Digital Disease Detection–Harnessing the
Web for Public Health Surveillance. The New England Journal of Medicine 360, 2153–
2155, 2157 (2009)
An Examination of the Behaviour of Young
and Older Users of Facebook
1 Introduction
The growth and adoption of Internet technologies has increased markedly over the
past decade. From 2000 to 2011, growth in Internet usage has witnessed an increase
of 353% and as of March 2011, 58% of Europe's 816 million population were Internet
users [1]. As a subsequent development of the Internet, online social networks
emerged through a desire by users to share data, experiences, events and emotions. As
a communication tool they performed a major role in the increased adoption rates of
Internet technologies. As such a diverse range of social networking sites have been
developed, from generic social networks such as Facebook1, to specialist content
sharing sites such as the photo sharing network of flickr2. The impact of social
networking has been acclaimed as rendering a new global footprint [2], due to its
profound social and economic impact, on both business and individual users. With
increased access to web services, and ever more innovative developments for end
users, high profile social networking applications such as Facebook and Twitter3 are
being routinely applied as a core communication approach for users desiring to share
1
www.facebook.com
2
www.flickr.com
3
www.twitter.com
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 9–16, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
10 D. Quinn, L. Chen, and M. Mulvenna
information on a range of topics. An increased use of social networking sites has led
to a rise in research interest, particularly within the domain of Social Network
Analysis (SNA), a research area with a traditional role of analysis and visualisation of
networks [3], discovering details such as a networks structure, or the strength and
cohesiveness of community structures [4].
More recently within SNA a trend is emerging which is extending traditional
concepts towards a more contemporary approach of Social Network Interaction
Analysis (SNIA). As an example, Facebook is currently the most popular Social
Networking Site with an estimated 700 million unique monthly visitors [5]. The aim
of SNIA is to understand the "individual" and their use of functions in these vast
networks. Through a variety of techniques such as web crawlers or bespoke programs,
SNIA seeks to discover the behavioural patterns of each individual by analysing their
user generated content. Contemporary studies have been interested in aspects such as
user profiles, communication patterns and interactions in online networks [6], [7], [8].
As an approach it not only allows for the analysis of users and groups etc, but may
also be applied to develop a greater understanding of the behavioural patterns and
related characteristics of each user.
1.1 Aim
The aim of our current research is to harness and mine user generated content,
through data collection approaches applied to Facebook, exploring the behaviour and
characteristics of two distinct user groups, young (15-30) and older (50+) users,
comprised of equal numbers of males and females. This study is made up in two
parts; firstly we investigated user activity, defined as the posting of comments or
replies to comments. As a study, its aim is to define the individual interaction metrics
of any given user’s activity. These measures are applied to compare interaction rates
of a user, and across two age categories. Secondly we explore activity visualisation,
to disclose interaction patterns. Illustrating user interaction data may help to
understand previously undisclosed patterns, detailing the: who, what and when of a
user’s social network engagement, illustrating patterns such as network joining or the
activity evolution of a user, defining their high and low periods of user activity.
The remainder of the paper is organised as follows. Section 2 discusses the
concept, exploring in detail the chosen social network structure, defining interactions
metrics and analysis methods applied in the study. Section 3 describes the user data
and the data collection process, with results of activity frequencies and activity
visualisation presented. Section 4 discusses the patterns that can be observed from the
results. Section 5 summarises current work, discussing future work and limitations.
The aim of the research is to develop an understanding into the individual activity of
users. The research is aimed at determining individual metrics, and also to establish if
correlations are identifiable between age groups and interaction frequency. Studies are
An Examination of the Behaviour of Young and Older Users of Facebook 11
designed with the primary objectives of: quantifying user activity, visualising user
engagement, identifying behavioural patterns and characteristics of disparate user
groups, based on real world observations in an online social network. Metrics are
subsequently applied to categorise users based on measures of activity, based upon
frequency of posting comments and replies to comments. The primary motivation for
investigating young and older online users is that it helps to establish if different
behaviours (e.g., high or low activity patterns) are present and identifiable. Secondly
the research may help to determine if these behaviours are attributable to the age of
online social networks users. Future investigations will focus on establishing if
indicators in the behaviour of people in online social networks relate to user well
being (e.g., low activity frequency corresponding to low feelings of well being).
2.1 Methodology
"Facebook is a social utility that connects people with friends and others who work,
study and live around them. People use Facebook to keep up with friends, upload an
unlimited number of photos, post links and videos and learn more about the people
they meet" [9]. Facebook was selected to investigate user's online social network
engagement for the following reasons: prominence as the leading social network, user
volume, data accessibility and a range of interaction features. Essentially Facebook
users engage through their ‘Wall’, a facility which controls user content, such as for
the posting of comments. As users contribute to their wall a chronicle of interactions
is amassed. User's security options are self-imposed and dictate the accessibility of
data by other Facebook network users. Privacy settings are set and controlled by the
user, and information can be disclosed to: 'everyone', 'friends of friends' or 'friends
only'. We class information as publically available if a user's privacy settings are set
to everyone. It is only these profiles with which the study was concerned.
As is dependent on the information provided by the user, the age of a user is not
always explicitly given. However, provided certain information is available it then
becomes possible to determine a user's age (within a close proximity), in one or a
combination of three ways, either by: date of birth, school leaving year or university
leaving year. Interactions were defined within the context of this study as being any
measurable user activity occurring on the user wall. A full range of potential
Facebook interactions were assessed for their inclusion within the scope of the current
study. However, the remit of the current study is to assess only the user's personal
contribution to their network, therefore all non-user elements (e.g., non-user
comments) were omitted. Due to the subjective nature of particular wall features our
study concerned itself solely on user comments and user replies as core application
components to provide a measurement of user contribution. It is viewed that later
studies may provide an opportunity to provide a broader scoped analysis. As a
specific example, the following comment scenario is provided; a user posts a
comment and another user posts a reply in response to this comment, both interactions
are recorded. However, only the first interaction will be of interest in the scope of this
study as this is the only interaction attributable to the user in question. Corresponding
metadata of date and time was also captured for each user element.
12 D. Quinn, L. Chen, and M. Mulvenna
Where; activity frequency (af), first date stamp (x1), last date stamp (x2), total
number of user activities (n).
the remaining groupings off G2 to G5. The user comment frequency for both the ollder
and younger users (Fig.1), and also the user reply frequencies for older and younnger
users (Fig.2) have been illlustrated below. Further detailed is the activity frequeency
comparison table of young and older users (Table 1).
Comments Replies
30
A B C
25
Activity Count
20
15
10
0
Feb-10
Jun-10
Sep-10
Jan-10
Mar-10
Oct-10
Nov-10
Jan-11
Jul-10
Apr-10
May-10
Aug-10
Dec-10
Activity Period (per month scale)
5 Conclusion
This study makes a num mber of contributions to the knowledge of online uuser
interactions and user behaaviour. This paper has shown that in the online social
network of facebook.com the activity frequency at which younger and older ussers
engage is varied. By harvessting user generated content, contained within a user's wwall
profile, the frequency at whhich a user engages can be determined. The developmennt of
activity frequency metrics now
n quantifies the frequency at which a user contributees to
a social network. As is sh hown, such approaches can enable users to be classiffied
based on their activity. Su ubsequently it is possible for the interaction rates too be
compared across different users
u and against different user types in age groups. Thhese
results show that younger users
u can be classified as high frequency users, produccing
large volumes of online useer data. Older users have been shown to engage less witth a
more infrequent online soccial network engagement. Through the plotting of a usser's
online history, results showw that the behavioural patterns of a user can be observved,
particularly in regard to hig
gh, low and non engagement.
16 D. Quinn, L. Chen, and M. Mulvenna
References
1. Miniwatts Marketing Group, Internet World Stats. Internet (March 2011),
http://www.internetworldstats.com/stats4.htm (accessed July 12, 2011)
2. Charron, C., Favier, J., Li, C.: Social Computing, http://www.forrester.com
(accessed April 02, 2010)
3. Lewis, K., Kaufman, K., Gonzalez, Christakis, M.: Tastes, ties and time: A new social
network dataset using facebook.com. Social Networks 30(4), 330–342 (2008)
4. Porter, M.A., Onnela, J.P., Mucha, P.J.: Communities in networks. Notices of the American
Mathmatical Society 56(9), 1082–1097 (2009)
5. eBizMBA. Top 15 most popular Social Networking Sites. Internet,
http://www.ebizmba.com/articles/social-networking-websites
(accessed July 12, 2011)
6. Massari, L.: Analysis of MySpace user profiles. Information Systems Frontiers 12(4), 357–
359 (2010)
7. Huang, L., Xia, L.: User Character and Communication Pattern Detecting on Social
Network Site. In: International Conference on Engineering Computation, ICEC 2009, May
2-3, pp. 261–264 (2009)
8. Wilson, C., Boe, B., Sala, A., Puttaswamy, K.P.N., Zhao, B.Y.: User interactions in social
networks and their implications. In: Proceedings of the 4th ACM European Conference on
Computer Systems (Eurosys 2009), pp. 205–218 (2009)
9. Facebook. Facebook Press Room, About Facebook. Internet,
http://www.facebook.com/press.php (July 12, 2011)
An Agile Methodology
for IHE-Enabled Deployments
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 17–25, 2012.
c Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
18 B. Alves and M. Schumacher
1
IHE International, http://www.ihe.net
2
DICOM Homepage, http://medical.nema.org/
3
Health Level Seven International,http://www.hl7.org/
An Agile Methodology for IHE-Enabled Deployments 19
Our experience with IHE technologies was mostly acquired in the context of
Medicoordination project. Although the project was successful in several aspects
and the experiment was positively evaluated, the first prototype suffered from a
few important design flaws that could have been avoided through a more careful
design. This experience emphasized the importance of having good planning and
a good methodology. Here are some experiences from the field:
As we came to learn, security is a topic that needs planning. It is in general
a good practice to consider it already in the early stages of the product’s de-
velopment lifecyle. Although it may sound like a good idea to first develop an
unsecured version and then add security to it, it is not. Security planning has
many implications on the very foundations of the architecture and can lead to the
creation of new unplanned breaches. IHE solves the problem partly, by providing
a methodic and well documented security section in every Profile description.
Common security concerns and elements to care about are well documented.
Furthermore, because healthcare software is usually provisionned with patient-
centric sensitive data, not having a risk assessment and mitigation plan is un-
acceptable. Without it, the risk implications are not well understood, users not
trained at is consequences and the final product may go well against local poli-
cies, against law or even against ethics.
Finally a mistake commonly found in research projects is to believe that a
product will integrate flawlessly in the target operating environment. People
often tend to believe there’s no need to take the environment in consideration,
even more in the early stages of the development. Murphy’s Law4 states that
”if something can go wrong, it will eventually go wrong”. Taking the operating
environment into account in the planning allows avoiding most nasty unforseen
consequences.
Unlike the traditional waterfall development model, agile methods do not assume
that the requirements will not change. On the contrary, they embrace change as a
mean to constantly improve the software architecture. Scrum was first introduced
The Scrum methodology does not make assumptions on the model used for the
implementation, but rathers limits itself to the description of how to drive the
development. Scrum consists in three main phases: pre-game, development and
the postgame.
The pre-game phase starts with a meeting to define a set or prioritized high-
level requirements, called product backlog list. A thorough planning is achieved,
including risk assessment, security consideration, project team and so on. In
a second step, an architecture model is designed from the backlog items and
problems, which may arise are identified and mitigated.
The development phase undergoes successive iterations, called sprints that can
last up to 30 days until the release is ready for distribution. Each sprint starts
with a meeting in which several items are taken from product backlog list to work
on. Items are often splitted in smaller tasks and inserted into the sprint backlog.
Some environment variables, such as timeframe, quality, resources and so on are
constantly re-evaluated. The Scrum Master is tied to management activities to
assess that no impediment will ever affect the ongoing development.
An Agile Methodology for IHE-Enabled Deployments 21
The post-game phase leads to a fully working release. The development enters
this phase as soon as all the environment variables (requirements) are com-
pleted. The system is ready to be released and preparation includes tasks such
as integration, user training and documentation.
This section describes the three phases of the Scrum methodology including
elements from the IHE documentation.
The pre-game phase contains all the required groundwork before the actual de-
velopment can start. The phase starts with a planning, in which the central
element is the generation of items in the product backlog by the members of the
whole team, including customers, sales and marketing division, software devel-
opers and a few other roles, that may vary from one project to the other. The
initial planning generally includes elements from security, risk assessment, team
foundation, training needs, integration and testing plans and many others that
have been detailed in other works on agile development.
IHE documents state that a risk assessment and mitigation plan should be
written for each profile. IHE provides a Security Considerations section for every
Profile, which is based on the mitigations identified in each risk assessment. The
Security Considerations section is not a thorough standalone security assessment,
but just deals with issues specifically relevant to interoperability. There is no pre-
cooked recipe for a risk assessment and mitigation plan, since risks usually vary
from one project to the other. However, elements of the method used to write
the Security Considerations section, which is described in the IHE Cookbook:
Preparing the IHE Profile Security Section[13] can be used to help writing the
global risk assessment plan. The method consists in identifying lists of risks, by
imagining different scenarios and then assess their level of impact and probability
of occurrence. Finally, mitigation of relevant risks for each profile is proposed.
Ethical and legal considerations need to be accounted for in the early stages
of the development process. Ethical issues have to be well understood and com-
municated to the future users of the system. It should be clearly stated what is
going to be done with sensitive data, who has access to it, what are the mech-
anisms to protect the data and what should be done in case of unauthorized
disclosure. Legal aspects need to be analyzed transversely taking into account
the laws of the country as well as the laws and policies of the lower levels (region,
organization or business unit).
Security planning should be also partly done in the early phases of the develop-
ment and improved during the subsequent sprints as the technical requirements
become more and more clear. Some risk mitigation solutions proposed in the
Technical Framework, must be analyzed and described in the security planning.
IHE proposes some good articles on Profile-centric access control mechanisms[14]
22 B. Alves and M. Schumacher
and on the management of security and privacy. The Template for XDS Affin-
ity Domain Deployment Planning Handbook [15] is usually used in planning the
deployment of a XDS domain, but can also be used to plan organizational, op-
erational and membership rules, as well as patient privacy and consent matters.
System developers should not forget to attach the audit logging planning to the
security section.
Analysis. The analysis phase includes elements such as security planning, us-
ability and testing procedures.
Risk assessment must typically be done for every profile integrated in the final
product, because different profiles generate different risks. Furthermore integrat-
ing with other Profiles generates even more risks.
Security planning must include all important information to help making se-
curity decisions. The team should be aware of topics such as actors, roles, au-
thorizations, secure protocols, privacy, confidentiality and patient consent (in-
volvement). It is important to define here what type of data is stored, where it is
stored, who as access to it, for how long. This section may also contain emergency
and bypass protocols as well as audit logs format and auditing placement.
Design. A typical IHE design should include low level aspects, such as IHE
actors, transactions as well as security, interoperability annotations, communi-
cation protocols, encryption standards, protection mechanisms, role-based access
controlling schemes and so on. All the links between the actors sould be clearly
identified and annotated with the type of security they require (mutual TLS over
HTTP, for example) and with used protocols at both ends. For example, if one
link is used to send data from a system that produces HL7 CDA R2 documents,
it is a good idea to write HL7 CDA R2 next to the source actor. This kind of
annotations helps making sure that two integrated systems are talking the same
language and the same version.
An Agile Methodology for IHE-Enabled Deployments 23
Implementation. Demos are important, because they help them assessing the
progress of an ongoing development. The implementation process may consist
in writing modules or deploying existing frameworks, but the general rule is
that implementation efforts should always result in output, which is visible and
presentable at the end of the sprint. Customers do not live on promises, they
want value. IHE projects often tend to mix both coding and deployments. It is
thus important to limit the scope of the current backlog item in order to produce
some visible output until the end of the next deadline, even if that means to
split the item for the next iterations.
Testing. Unit testing is a great tool for assessing the correct behaviour of the
iteration, even though it is far from sufficient. There are other key aspects that
must be tested and validated such as: interoperability, security and usability.
Interoperability testing comes down to assessing that your system is using
the right communication protocols and standard. Sometimes, using a different
version of a same protocol, for example HL7 v2.5 over HL7 2.4, may invalidate
your efforts. Interoperability validation ensures that messages sent by your piece
of software are well understood by the surroundings. IHE Profiles inform about
the expected outcome of a particular transaction. The software tests must use
this data to make sure the current products’ iteration behaves as expected.
Furthermore, IHE Profiles rely heavily on proven standards and are generally
interoperable. It may happen, however, that some specific features or options
are not implemented in one particular IHE Profile implementation. Hence, it is
necessary to perform interoperability validation before proceeding to the next
phase. There exist some IHE testing frameworks, such as the NIST XDS Test
Suite6 or the now famous IHE Connectathons7 , where teams can test their IHE-
enabled products against others and possibly receive compliance statements.
Security testing is a delicate matter, since in most small projects, there is no
true security expert. Testing procedures must assess the security of the software
module for scenarios designed in the planning phase. For safety critical systems,
availability has also to be tested, by putting systems under heavy charges and
inserting deficient nodes.
Usability is one aspect that can make or destroy your project. It is important
to involve user judgment early in the development lifecyle. IHE Profiles are
designed to integrate user’s workflow without much disturbances.
The post-game phase represents the end of a release. The project enters in the
post phase upon agreement that all environment variables are completed. The
system is typically finished and release preparation tasks such as integration and
delivery are done at this step.
6
http://ihexds.nist.gov/
7
http://gazelle.ihe.net/content/ihe-europe-2011-connectathon
8
Yogi Berra, American professional baseball player and manager.
24 B. Alves and M. Schumacher
4 Discussion
The methodology presented above builds on the success of agile methodologies
and on the rigor and consistency of IHE Profiles. It simplifies the development
of projects in small-to-medium scale regional hospitals and healthcare organiza-
tions, by providing a guide about subjects that require a special care. Further-
more, this methodology also provides links to helpful IHE documents facilitating
the process of writing down good risk assessement plans, creating SOA architec-
tures based on IHE Profiles or preparing the security of the product.
This methodology is meant to be used as a supplementary tool and not as a
all-in-one guide. Is was created as a response to problems we had in our previous
developments. No standard evaluation was performed using existing frameworks,
which may restrain the scope of usability of this methodology to non-safety
critical and non-business critical projects . However, concepts presented here are
taken from our past experiences and may still prove valuable in order to avoid
the same mistakes again and again.
5 Conclusion
We presented here a new agile methodology centered on IHE Profiles that allows
assisting small-to-medium scale healthcare development tasks based on IHE. The
methodology presented here builds on the agility principles of the successful
Scrum agile method and is primarily intended to be used by small-to-medium
scale regional hospitals and healthcare organizations where teams are sufficiently
small and proximity is good.
An Agile Methodology for IHE-Enabled Deployments 25
References
1. Laplante, P.A., Nell, C.J., Sangwan, R.S.: Healthcare Professionals’ Perceptions of
Medical Software and What to Do About it. J. IEEE Computer 39, 26–32 (2006)
2. Leverson, G.S., Turner, C.S.: An Investigation on the Therac-25 Accidents. Com-
puter, 18–41 (1993)
3. Koppel, R., et al.: Role of Computerized Physicain Order Entry Systems in Facil-
itating Medication Errors. JAMA 9, 1197–1202 (2005)
4. Kohn, L.T., Corrigan, J.M., Donaldson, M.S.: To Err Is Human: Building a Safer
Health System, p. 80. Nat’l. Academies Press (2000)
5. Walker, J., Pan, E., Johnston, D., Adler-Milstein, J., Bates, D.W., Middleton,
B.: The value of health care information exchange and interoperability. J. Health
Affairs, hlthaff–w5 (2005)
6. IHE IT Infrastructure (ITI) Technical Framework. IHE International, vol. 1–3,
Revision 7 (2010)
7. Schwaber, K., Beedle, M.: Agile software development with Scrum. Prentice Hall
PTR (2001)
8. Alves, B., Müller, H., Schumacher, M., Godel, D., Abou Khaled, O.: Interoper-
ability prototype between hospitals and general practitioners in Switzerland. In:
Medinfo 2010, Cape Town, South Africa, pp. 366–370. IOS Press (2010)
9. Müller, H., Schumacher, M., Godel, D., Abou Khaled, O., Mooser, F., Ding, S.:
MediCoordination: A practical approach to interoperability in the Swiss health
system. In: The Medical Informatics Europe Conference (MIE 2009) (2009)
10. Alves, B., Schumacher, M., Godel D., Richard, P. Abu Khaled, O., Müller, H.:
Prototype d’interoprabilit entre hpitaux et mdecins traitants. In: Actes de GISEH
2010, Conference Francophone “Gestion et Ingnierie des Systmes Hospitaliers”,
Clermont-Ferrand, France (2010)
11. Alves, B., Schumacher, M.: The Open-Source Integrating the Healthcare Enterprise
(IHE). In: Proceedings of the IADIS e-Health Conference, Rome, Italy (2011)
12. Takeuchi, H., Nonaka, I.: The new new product development game. J. Harvard
Business Review 64, 137–146 (1986)
13. IHE Cookbook: Preparing the IHE Profile Security. IHE International (2008)
14. Caumanns, J., Kuhlisch, R., Pfaff, O., Rode, O.: IHE ITI Infrastructure White
Paper: Access Control. IHE International (2009)
15. IHE IT Infrastructure Technical Commitee White Paper: Template for XDS Affin-
ity Domain Deployment Planning. IHE International, Version 15 (2008)
Obstetric Medical Record Processing and
Information Retrieval
1 Introduction
1.1 Motivation
In many industrial, business, healthcare and scientific areas we witness the
boom of computers, computational appliances, personalized electronics, high-
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 26–33, 2012.
c Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
Medical Record Information Retrieval 27
Text Extraction. The accuracy for relation extraction in journal text is typ-
ically about 60 % [1]. A perfect accuracy in text mining is nearly impossible
due to errors and duplications in the source text. Even when linguists are hired
to label text for an automated extractor, the inter-linguist disparity is about
30 %. The best results are obtained via an automated processing supervised by
a human [2].
28 M. Bursa et al.
3 Graph Explanation
In this paper we describe transition graphs. These are created for each attribute.
An attribute consists of many records in form of a sentence. By sentence we
hereby mean a sequence of literals, not a sentence in a linguistic form. The
records are compressed – unnecessary words (such as verbs is, are) are omitted.
In this paper, only the atribute delivery anesthetics is visualized, as it is the
simplest one.
Vertices of the transition graph represent the words (separated by spaces) in
the records. For each word (single or multiple occurence) a vertex is created and
its potence (number of occurences is noted). For example, the words mesocaine,
anesthetics, not, mL form a vertex. Note that also words as mesocain, mezokain
and other versions of the word mesocaine are present. For a number (i.e. sequence
of digits) a special literal NUMBER is used.
Edges are created from single records (sentences entered). For example the
sentence mesocaine 10 mL would add edges from vertex mesocaine to vertex
NUMBER and from vertex NUMBER to the vertex mL (or the edge count is
increased in case it exists). For all records, the count of the edges is also useful.
It provides an overview on the inherent structure of the data – the most often
word transitions.
Medical Record Information Retrieval 29
4 Motivation
The task of this work is to provide the researchers with a quick automated or
semi-automated view on the textual records. Textual data are not easy to visu-
alize. The word frequency is inapropriate, although it is very simple. Therefore
we decided to extract information in the form of a transition graph.
Using these graphs a set of rules for information retrieval is bein created
(defined). These rules serve for extraction of (boolean) attributes from the tex-
tual rules. These attributes are used in automated rule discovery and can be
further used for recommendation.
Social insects, i. e. ant colonies, show many interesting behavioral aspects, such
as self-organization, chain formation, brood sorting, dynamic and combinatorial
optimization, etc. The coordination of an ant colony is of local nature, composed
mainly of indirect communication through pheromone (also known as stigmergy.
The high number of individuals and the decentralized approach to task coor-
dination in the studied species means that ant colonies show a high degree of
parallelism, self-organization and fault tolerance. In studying these paradigms,
we have high chance to discover inspiration concepts for many successful meta-
heuristics.
Ant Colony Methods for Clustering. Several species of ant workers have
been reported to form piles of corpses (cemeteries) to clean up their nests. This
aggregation phenomenon is caused by attraction between dead items mediated
by the ant workers. The workers deposit (with higher probability) the items in
the region with higher similarity (when more similar items are present within
the range of perception). For example, the Messor sancta ants organize dead
corpses into clusters; brood sorting has been studied in ant colony of Leptothorax
unifasciatus.
This approach has been modeled in the work of Deneubourg et al. [4] and in
the work of Lumer and Faieta [5] to perform a clustering of data.
Methods using pheromone also exist, namely A2 CA [6]. Another approach can
be found the work of J. Handl in [7] (an ATTA algorithm), which introduce mod-
ified neighborhood function (penalizing high dissimilarities), short-term memory
with lookahead (jumping ants), increasing radius of perception, time-dependent
modulation of the neighborhood function.
30 M. Bursa et al.
6 Automated Processing
Automated layout of transition graph is very comfortable for an expert, how-
ever the contents of the attribute is so complicated, that a human interven-
tion is inevitable. Examples of automated layout can be seen in Fig. [1] and
Fig. [2].
The figure Fig. [1] shows a transitional graph where only positioning based on
the word distance from the sentence start is used. Althoug it migh look correct,
note that the same words are mispositioned in the horizontal axis.
Fig. 1. A fully automated transition graph showing the most important relations in
one textual attribute. No clustering has been used. The layout is based on the word
distance from the start of the sentence. Note the mis-alignment of the similar/same
words. Refer to section [2].
Medical Record Information Retrieval 31
Fig. 2. A fully automated transition graph (sub-graph) showing the most important
relations in one textual attribute. The ACO approach has been used to cluster the
corresponding vertices. Refer to section [2].
7 Expert Intervention
A human intervention and supervision over the whole project is indiscutable.
Therefore also human (expert) visualization of the transition graph has been
studied.
The vertices in a human-only organization are (usually) organized depending
on the position in the text (distance from the starting point) as the have the
highest potence. Number literal (a wildcard) had the highest potence, as many
quantitative measures are contained in the data (age, medication amount, etc.).
Therefore it has been fixed to the following literal, spreading into the graph via
multiple nodes (i.e. a sequence mesocain 10 mL become two vertices – meso-
cain NUMBER and mL). This allowed to organize the chart visualization in
more logical manner. Time needed to organize such graph was about 5–10 min-
utes. The problem is that the transition graph contains loops, therefore the
manual organization is not straigthforward.
An aid of a human expert has been used in semi-automated approach (see
Fig. [3] where the automated layout has been corrected by the expert. The
correction time has been about 20–30 seconds only.
$
$
$
$
$
$
$"
$"
$"
&'('
$"
!
"
")
%#
" %#
" #
about 5–10 minutes to approx 20–30 seconds) allowed to perform more iterations,
increasing the yield of information from data that would be further processed
in rule discovery process. However, the expert intervention in minor correction
is still inevitable. The results of the work are adopted for rule discovery and are
designed to be used in expert recommendation system.
References
1. Freitag, D., McCallum, A.K.: Information extraction with hmms and shrinkage.
In: Proceedings of the AAAI Workshop on Machine Learining for Information
Extraction (1999)
2. Lafferty, J., McCallum, A., Pereira, F.: Conditional random fields: Probabilistic
models for segmenting and labeling sequence data. In: Proceedings of the ICML,
pp. 282–289 (2001); Text processing: interobserver agreement among linquists at
70
3. Dorigo, M., Stutzle, T.: Ant Colony Optimization. MIT Press, Cambridge (2004)
4. Deneubourg, J.L., Goss, S., Franks, N., Sendova-Franks, A., Detrain, C., Chretien,
L.: The dynamics of collective sorting robot-like ants and ant-like robots. In: Pro-
ceedings of the First International Conference on Simulation of Adaptive Behavior
on From Animals to Animats, pp. 356–363. MIT Press, Cambridge (1990)
5. Lumer, E.D., Faieta, B.: Diversity and adaptation in populations of clustering ants.
In: From Animals to Animats: Proceedings of the 3th International Conference on
the Simulation of Adaptive Behaviour, vol. 3, pp. 501–508 (1994)
6. Vizine, A.L., de Castro, N.L., Hruschka, E.R., Gudwin, R.R.: Towards improving
clustering ants: An adaptive ant clustering algorithm. Informatica 29, 143–154
(2005)
7. Handl, J., Knowles, J., Dorigo, M.: Ant-based clustering and topographic mapping.
Artificial Life 12(1), 35–61 (2006)
8. Bursa, M., Lhotska, L., Macas, M.: Hybridized swarm metaheuristics for evolution-
ary random forest generation. In: Proceedings of the 7th International Conference
on Hybrid Intelligent Systems 2007 (IEEE CSP), pp. 150–155 (2007)
9. Bursa, M., Lhotska, L.: Ant colony cooperative strategy in biomedical data clus-
tering. SCI. Springer, Heidelberg (2007)
10. Bursa, M., Huptych, M., Lhotska, L.: Ant colony inspired metaheuristics in biolog-
ical signal processing: Hybrid ant colony and evolutionary approach. In: Biosignals
2008-II, vol. 2, pp. 90–95. INSTICC Press, Setubal (2008)
Health Care Performance Monitoring Using an Inpatient
Reference Process Model and Clinical KPIs
1 Introduction
With the enormous impact of Information Technology (IT), there is a major demand
for standardization in health care nowadays. On the other side, assessing a higher
quality of health care to patients has become increasingly important. Effective health
care processes are thereby heavily dependent on a comprehensive IT-support.
Therefore, a thorough understanding about both the hospital IT-systems and clinical
pathways is required, to identify quality problems.
In recent years, hospital performance assessment projects and health care quality
reporting have become therefore common worldwide [1], resulting in numerous
initiatives aiming the development of clinical quality indicators to measure health care
quality including hospital care performance measurement [2]. Improving quality of care
through process performance measurement in hospitals and the identification of
bottlenecks in performed workflows is thereby a promising concept. Process
performance measures can assist hospitals in assessing their workflows and identifying
areas for improvements in the field of diagnostics and treatment.
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 34–42, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
Health Care Performance Monitoring Using an Inpatient Reference Process Model 35
Fig. 1. IT-systems and clinical standards involved in the diagnostic workflow in hospitals
Health Care Performance Monitoring Using an Inpatient Reference Process Model 37
Fig.1 shows the involved IT-systems and the timeline during the diagnostics of an
inpatient (i.e. a patient who stays at hospital for diagnostics and treatment).
Additionally, timestamps (t) and events (e) are exemplary marked in the figure. Event
(e1) means the patient’s admission at hospital. The two following events mark the
beginning and the end of the laboratory procedure, i.e. the KPI “order to lab test”. The
fourth and fifth events allow the imaging procedure monitoring at a modality (i.e.
imaging device). Here the KPI “order to imaging” can be determined. Thereby, the
timestamps, these events are based on, are extracted from the logfiles stored at the
modalities. Using modality logfiles for monitoring purposes is a novel approach we
introduce to enable process monitoring at the lowest process level. Finally, the last
event indicates the finishing of the diagnostic process flow. The difference between
the first and last event timestamps provides the KPI “door to diagnosis”, which is very
important in time critical diseases like heart attack and stroke [17].
4 Related Work
So far, there is no process model published that describes the integration of clinical
performance metrics for acute diseases taking in particular into account the
possibilities for their automatic extraction using clinical information systems during a
patient’s stay in hospital and additionally considering the characteristics of the clinical
environment, such as flexible workflows and modular process structure. Nevertheless,
focusing on classical workflow analysis, event-based process monitoring and mining
approaches with the objective to optimize the workflows are presented in [23], [24],
[25] and [26]. However, they were not designed for health care purposes and focus on
more standardized processes as they are usually performed in clinical domain. An
identification approach aiming the clinical context identification and categorization is
proposed in [27].
A KPI-based framework for process-based benchmarking of hospital information
systems is presented in [28]. In contrast to our approach, documentation processes
and outcome criteria related to the process flow and underlying structures in the area
of the Hospital Information System (HIS) aiming benchmarking possibilities are there
focused on. An approach using the derivation of hospital-specific clinical guidelines
is described in [29]. Thereby, lifecycle support for medical guidelines and pathways is
the objective.
Further clinical (reference) process models are presented in [30], [31], [32], [33],
[34]. In [35] the authors present a modeling approach, which introduces principles of
process modeling in healthcare using EPCs and employ these principles to existing
medical information systems by implementing them using a Workflow Management
System (WFMS). However, the possibility for event-based clinical performance
measurement in time-critical diseases, as we introduce it in our approach, is not
provided. Additionally, the model-based generic and disease-specific performance
monitoring is also not supported.
References
1. Groene, O., Skau, J., Frolich, A.: An international review of projects on hospital
performance assessment. International Journal for Quality in Health Care 20(3), 162–171
(2008)
2. Copnell, B., et al.: Measuring the quality of hospital care: an inventory of indicators.
Internal Medicine Journal 39(6), 352–360 (2009)
3. n.e.: Der Einfluss der Prozessreife auf den Erfolg von Telekommunikationsunternehmen,
Detecon study (2009), http://www.detecon.com/bpm
4. Gattnar, E., Ekinci, O.: Process Assessment and Improvement Using Capability Maturity
Models. In: Podium der Wirtschaft, Recht & Soziales, vol. 22, pp. 121–148. VHK, Altdorf
b. Nbg (2011)
5. Gattnar, E., Ekinci, O.: Qualitätsmanagement im Krankenhaus – Konzepte,
Rahmenbedingungen und Standards. In: Podium der Wirtschaft, Recht & Soziales, vol. 21,
pp. 67–130. VHK, Altdorf b. Nbg (2011)
6. Mainz, J.: Developing evidence-based clinical indicators: a state of the art methods primer.
International Journal for Quality in Health Care 15(supp. 1), i5–i11 (2003)
7. de Vos, M., et al.: Quality measurement at intensive care units: which indicators should we
use? Journal of Critical Care 22, 267–274 (2007)
8. Rubin, H.R., Pronovost, P., Diette, G.B.: The advantages and disadvantages of process-
based measures of health care quality. International Journal for Quality in Health
Care 13(6), 469–474 (2001)
9. Rubin, H.R., Provonost, P., Diette, G.B.: From a process of care to a measure: the
development and testing of a quality indicator. International Journal for Quality in Health
Care 13(6), 489–496 (2001)
10. Crossing the Quality Chasm: A new Health System for the 21st Century. Committee on
Quality of Health Care in America, Institute of Medicine (IOM), 4th edn. National
Academy Press, Washington (2003)
11. McGlynn, E.A.: Identifying, Categorizing, and Evaluating Health Care Efficiency
Measures. Final Report (prepared by the Southern California Evidence-based Practice
Center—RAND Corporation, under Contract No. 282-00-0005-21). AHRQ Publication
No. 08-0030. Agency for Healthcare Research and Quality, Rockville, MD (2008)
12. Pencheon, D.: The good indicators guide: understanding how to use and choose indicators.
NHS Institute for Innovation and Improvement, Association of Public Health
Observatories (APHO) (2007)
13. Gattnar, E., Ekinci, O., Detschew, V.: Event-based Workflow Analysis in Healthcare. In:
Proceedings of the 9th International Workshop on Modeling, Simulation, Verification and
Validation of Enterprise Information Systems (MSVVEIS 2011), in conjunction with the
13th International Conference on Enterprise Information Systems (ICEIS 2011), pp. 61–
70. SciTePress (2011)
14. Gattnar, E., Ekinci, O., Detschew, V.: Clinical Process Modeling and Performance
Measurement in Hospitals. In: Proceedings of the 5th International Workshop on Advances
in Quality of Service Management (AQuSerM 2011), in conjunction with 15th IEEE
Enterprise Computing Conference (EDOC 2011), pp. 132–140. IEEE Computer Society
Press, Los Alamitos (2011)
15. Gattnar, E., Ekinci, O., Detschew, V.: Interoperable Process Monitoring using Clinical IT-
Standards and Healthcare Information Systems. In: Proceedings of the IADIS International
Conferences Informatics 2011, Wireless Applications and Computing 2011,
Telecommunications, Networks and Systems 2011, pp. 59–66. IADIS Press (2011)
Health Care Performance Monitoring Using an Inpatient Reference Process Model 41
16. Gattnar, E., Ekinci, O., Detschew, V.: An Integrated Approach to Standardized and
Automated Extraction of Clinical Process Cycle Times. In: Proceedings of the IADIS
International Conferences eHealth 2011, pp. 128–136. IADIS Press (2011)
17. Gattnar, E., Ekinci, O., Detschew, V.: A Novel Generic Clinical Reference Process Model
for Event-Based Process Times Measurement. In: Abramowicz, W., Maciaszek, L., Węcel,
K. (eds.) BIS 2011 Workshops. LNBIP, vol. 97, pp. 65–76. Springer, Heidelberg (2011)
18. Wollersheim, H., et al.: Clinical indicators: development and applications. The
Netherlands Journal of Medicine, Van Zuiden Communications B.V. 65(1), 15–22 (2007)
19. Scott, I., Phelps, G.: Measurement for improvement: getting one to follow the other.
International Medicine Journal, Royal Australasian College of Physicians 39, 347–351
(2009)
20. Korherr, B., List, B.: Extending the EPC and the BPMN with Business Process Goals and
Performance Measures. In: Proceedings of the 9th International Conference on Enterprise
Information Systems (ICEIS 2007) (2007)
21. List, B., Korherr, B.: An Evaluation of Conceptual Business Process Modelling
Languages. In: Proceedings of the 21st ACM Symposium on Applied Computing (SAC
2006). ACM Press (2006)
22. Sánchez Gonzáles, L., Rubio, F.G.: Measurement in business processes: a systematic
review. Business Process Management Journal 16(1), 114–134 (2010)
23. zur Mühlen, M., Rosemann, M.: Workflow-based process monitoring and controlling-—
technical and organizational issues. In: Sprague, R. (ed.) Proceedings of the 33rd Hawaii
International Conference on System Science (HICSS-33), pp. 1–10. IEEE Computer
Society Press, Los Alamitos (2000)
24. van der Aalst, W.M.P.: Business Alignment: Using Process Mining as a Tool for Delta
Analysis. Requirements Engineering 10(3), 198–211 (2005)
25. van der Aalst, W.M.P., et al.: Workflow mining: A survey of issues and approaches. Data
& Knowledge Engineering 47(2), 237–267 (2003)
26. van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M.: Business Process Management:
A Survey. In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003.
LNCS, vol. 2678, pp. 1–12. Springer, Heidelberg (2003)
27. Ghattas, J., Peleg, M., Soffer, P., Denekamp, Y.: Learning the Context of a Clinical
Process. In: Rinderle-Ma, S., Sadiq, S., Leymann, F. (eds.) BPM 2009. LNBIP, vol. 43, pp.
545–556. Springer, Heidelberg (2010)
28. Jahn, F., Winter, A.: A KPI Framework for Process-based Benchmarking of Hospital
Information Systems. In: Proceedings of the 23th International Conference of the European
Federation for Medical Informatics (MIE 2011), pp. 542–546. IOS Press (2011)
29. Lenz, R., Reichert, M.: IT support for healthcare processes – premises, challenges,
perspectives. Data & Knowledge Engineering 61, 39–58 (2007)
30. Eisentraut, K., et al.: Abbildung klinischer Behandlungspfade als Modelle in der Unified
Modeling Language. 53. Jahrestagung der Deutschen Gesellschaft für Medizinische
Informatik, Biometrie und Epidemiologie (gmds) (2008)
31. Mauro, C., Happle, T., Sunyaev, A., Krcmar, H., Leitmeister, J.M.: From Medical
Processes to Workflows – Modeling of Clinical Pathways with the Unified Modeling
Language. In: Proceedings of 3rd International Conference on Health Informatics
(HealthInf 2010), pp. 388–391. INSTICC Press (2010)
32. McGregor, C., et al.: A Structured Approach to Requirements Gathering Creation Using
PaJMa Models. In: Proceedings of the International Conference of IEEE Engineering in
Medicine and Biology Society, Vancouver, Canada, pp. 1506–1509 (2008)
42 E. Gattnar, O. Ekinci, and V. Detschew
33. Winter, A., Haux, R.: A Three Level graph-based Model for the Management of
Computer-Supported Hospital Information Systems. Methods of Information in
Medicine 34(4), 378–396 (1995)
34. Buchauer, A., et al.: 3LGM: Method and Tool to support the management of
heterogeneous hospital information systems. Computers in Medicine, Polish Society of
Medical Informatics, 72–82 (1997)
35. Becker, J., Fischer, R., Janiesch, C.: Optimizing U.S. Health Care Processes - A Case
Study in Business Process Management. In: Proceedings of the 13th Americas Conference
on Information Systems (AMCIS 2007) (2007)
A Model for a Motivational System Grounded
on Value Based Abstract Argumentation
Frameworks
1 Introduction
Digital interventions to promote healthy lifestyles are more and more ubiquitous.
[13] offers a detailed overview of Internet based interventions, and conclude that,
as their effect can vary substantially, it is important to identify the parameters
that can contribute to their success. Their analysis seems to suggest that more
successful interventions are strongly grounded on theory, especially if the the-
ory deals with planned behaviour, and that using a variety of techniques which
could impact different stages of the changing process is crucial, as well as the
use of different styles of interactions. In this paper we show how insights from
a relatively new research field, Argument and Computation [10], can be utilised
to augment the design of a motivational system, based on the Transtheoretical
Model of Change. A small prototype has been implemented, in the domain of
healthy eating. This paper, after introducing some relevant background litera-
ture, will discuss the design of the system, and show a walked-through example
to demonstrate the way we envisage this system to work.
2 Background
The Transtheoretical model of Change [9] is a widely accepted theory that at-
tempts to model how people modify their behaviour. The model suggests that
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 43–50, 2012.
c Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
44 E. Di Tullio and F. Grasso
Perspectives
A state of affair can be evaluated from different points of view, or perspectives.
This allows to express concepts like: from the “health” perspective t is prefer-
able to s, while from a “travel comfort” perspective, the opposite is true. A
perspective is defined by [12] as a pre-order on states in a certain domain,
and is denoted with ≤ p. We use p,q,r to denote perspectives. When s ≤p t
(where s and t are states), we say that t is at least as preferred as s from
perspective p.
The same state of affair can be evaluated from different perspectives. In some
cases it is not known which of two states is preferred from a given perspec-
tive, but one can assume that one perspective is influenced by another. For
example one can assume that perspective p =“Being successful” positive in-
fluences perspective q =“Happiness” thus if a state is preferred from p, it will
be preferred from q too. We denote that a perspective p positively influences
the perspective q with notation p ↑ q and similarly we use p ↓ q for a negative
influence.
Perspectives influencing each other may create influence chains. These chains
can be represented with a directed graph (Fig. 1) where the dashed arrows indi-
cate a negative influence, while the solid ones a positive influence. The left graph
denotes how perspective p positively influences q, which in turn negatively influ-
ences r. It follows that p negatively influences r (right graph).
A Model for a Motivational System 45
Values
Perspectives are subjective points of view and are not necessarily shared by every
agent in the dialogue. The way in which an agent reasons with perspectives is
based on the agent’s set of values and preferences. An agent preference is a
pre-order on states denoted with <α . When s <α t we say that agent α prefers
state t to state s. Therefore agent preferences are perspectives which an agent
considers valid. If one or more preferences maximise a particular perspective,
this perspective is considered a value for that agent. A value is therefore a
perspective maximised from one or more agent’s preferences. Starting from an
agent’s values, it is possible to infer other agent’s preferences, kept implicit in
the user model, by finding those which maximise his values.
Values can also be in an order relationship, to allow for situations in which, for
example, a user may prefer the value Health to Happiness, and thus will choose
a state transition that maximises Health over one that maximises Happiness. A
Value System is a pre-order on values, and is denoted with ≺α . When W ≺α V
we say that agent α prefers to promote the value set V over the value set W .
Transitions may promote or demote a particular value set:
– pro: function pro : S × S → V determines the values promoted by a tran-
sition from a state to another. This function is defined as: pro(s, t) = {v ∈
Vα | t <v s}. When pro(s, t) = V we say that the transition from s to t
promotes V .
– dem: function dem : S × S → V determines the values demoted by a
transition from a state to another. This function is defined as: dem(s, t) =
pro(t, s) = {v ∈ Vα | t <v s}. When dem(s, t) = V we say that the transition
from s to t demotes V .
– Neutral transition: when a transition from s to t neither promotes nor
demotes a value (v ∈ / (dem(s, t) ∪ pro(s, t)) we say that that transition is
neutral for that value.
By means of the value ordering and the functions pro and dem, it is possible to
derive α preferences.
3 System Description
The system’s architecture is shown in Fig. 2. The jVS dialogue manages the
interaction with the user. It is build on top of an ASPIC type dialogue [1], which
is an implementation of a dialogue game based on an abstract argumentation
46 E. Di Tullio and F. Grasso
framework. The jVS interfaces the dialogue component with the reasoning en-
gine, a set of prolog libraries which reason about the value systems according to
the theory at [12]. The libraries use information from a set of ontologies describ-
ing the stereotypical model of a user in each of the 6 stages of change, according
to the Transtheoretical model, as well as the set of values and perspectives which
can be applied to a state of the world. The system maintains one belief model,
in form of an ontology, for each user of the system, as well as the system’s own.
Aside from domain related notions, the model of values and preferences in the
ontology is shown in Fig. 3. The User Modelling component chooses the appro-
priate stereotype for the user, from information retrieved during the interactions,
on the basis of a widely used Transtheoretical model questionnaire. The Plans
component manages the plans used by the system to build the interaction with
the user in each stage.
The interaction is driven by discourse plans describing the evolution of the
motivational strategy. A plan consists of domain knowledge, eliciting questions
to build the user model of their values, suggestions to the user depending on
which stage the user is in, and motivational expressions to operate some posi-
tive reinforcement when the user succeeds in achieving a goal. The plan content
depends on the stage of change of focus at any one time, as to each stage cor-
responds a different set of goals. For instance in the precontemplation stage one
goal might be raising awareness of the problem the user is facing.
A Model for a Motivational System 47
The main drive for deciding what to say is the user’s stage of change. The
discourse plan, on the basis of the different stages of change, identifies appro-
priate argumentation paths in the VS. One of the paths is chosen on the basis
of the user model (taking into account what the user already said and whether
the user had already ’accepted’ some argumentations beforehand). The use of a
VS path allows to detect inconsistencies in the user’s system of values. In this
paper we show the value systems using a very simple, preliminary, formalisation,
not comprising the stage of change user profile, that has mainly the purpose of
better explain how the system manipulates values and how they are connected
together. In the remainder of the section, an example will help understand this
mechanism.
At the start of the interaction, the user makes no connection between healthy
eating and health, therefore the user justifies some behaviours, like eating too
much junk food, without loss of coherence in his system. Also, the user values
48 E. Di Tullio and F. Grasso
health and social life, with the former preferred over the latter, therefore if the
system succeeds in showing that some behaviour is negatively affecting health,
the user might agree that it is a behaviour that should be modified. Let us
suppose the dialogue is concerned with the transition:
A = Eating junk food more than 8 times a month is preferred to Eating junk food less than 4 times a month
The user has a preference for the transition, while the system considers A a
transition the user should avoid, as the perspectives that A demotes are more
than those which A promotes. But in the user’s model, the user is not “aware”
of all A’s negative impacts. The situation is therefore:
System’s VS User’s VS
Perspectives that the transition A promotes
Social Life Social Life
User’s preferences
Perspectives that the transition A demotes
Healthy Eating
Fitness
Health
Social Life
The argumentation the system may attempt with the user is therefore:
Eating junk food more than 8 times a week, instead of less than 4 times a week,
is not advisable because your Health would be penalised, because A penalises
healthy eating, which in turn promotes fitness, which in turn promotes health.
The system hopes that by integrating these new connections, the user would
be persuaded that the transition is negative. The VS focuses on the health per-
spective, because the user has indicated this is preferred over other perspectives.
If the user accepts the line of reasoning above, the image of the user’s VS will
be modified as in Fig. 4. A screenshot of the system corresponding to one phase
in this dialogue is shown in Fig. 5.
4 Conclusion
is still at a design stage. The role of natural dialogue for interacting with the
system has been left for the moment outside the scope of this work. Testing of
the system showed that it is able to provide very simple argumentation, and it
is envisaged that with more complex ontologies and with an interface with a
NL dialogue system it will be possible to obtain more complex and convincing
natural dialogue with the user. A small evaluation is being designed as a Wizard
of Oz experiment [8], and plans are under way to adapt the system so that it
can be interfaced with an embodied conversational agent developed at the first
author’s research lab [4].
References
1. Amgoud, L., et al.: Project N 002307 ASPIC, Deliverable D2.6 - Final re-
view and report on formal argumentation system, available as Technical Re-
port ULCS-07-005, Department of Computer Science, University of Liverpool,
http://www.csc.liv.ac.uk/research/techreports/tr2007/tr07005abs.html
2. Bench-Capon, T.J.M.: Persuasion in Practical Argument Using Value Based Argu-
mentation Frameworks. Journal of Logic and Computation 13(3), 429–448 (2003)
3. Cawsey, A., Grasso, F.: Goals and Attitude Change in Generation: a Case Study
in Health Education. In: Jokinen, K., Maybury, M., Zock, M., Zukerman, I. (eds.)
Proceedings of the ECAI 1996 Workshop on: Gaps and Bridges: New directions in
Planning and NLG, pp. 19–23 (1996)
4. de Rosis, F., Novielli, N., Carofiglio, V., Cavalluzzi, A., De Carolis, B.: User Mod-
eling And Adaptation In Health Promotion Dialogs With An Animated Character.
International Journal of Biomedical Informatics, 514–531 (2006)
5. Free, C., Knight, R., Robertson, S., et al.: Smoking cessation support delivered via
mobile phone text messaging (txt2stop): a single-blind, randomised trial. Lancet
6. Hare, J., Osmond, A., Yang, Y., Wills, G., Weal, M., De Roure, D., Joseph, J.,
Yardley, L.: LifeGuide: A platform for performing web-based behavioural interven-
tions. In: WebSci 2009: Society On-Line, Athens, Greece, March 18-20 (2009)
7. He, H.A., Greenberg, S., Huang, E.M.: One size does not fit all: applying the
transtheoretical model to energy feedback technology design. In: Proceedings of
the 28th International Conference on Human Factors in Computing Systems (CHI
2010), pp. 927–936. ACM, New York (2010)
8. Kelley, J.F.: An iterative design methodology for user-friendly natural language
office information applications. ACM Transactions on Office Information Sys-
tems 2(1), 26–41 (1984)
9. Prochaska, J., Clemente, C.D.: Stages of Change in the Modification of Problem
Behavior. In: Hersen, M., Eisler, R., Miller, P. (eds.) Progress in Behavior Modifi-
cation, vol. 28. Sycamore Publishing Company, Sycamore (1992)
10. Rahwan, I., Simari, G.R.: Argumentation in Artificial Intelligence, 1st edn. Springer
Publishing Company, Incorporated (2009)
11. Reiter, E., Robertson, R., Osman, L.: Types of Knowledge Required to Personalize
Smoking Cessation Letters. In: [25], pp. 389–399
12. van der Weide, T., Dignum, F., Meyer, J., Prakken, H., Vreeswijk, G.: Practical Rea-
soning Using Values. In: McBurney, P., Rahwan, I., Parsons, S., Maudet, N. (eds.)
ArgMAS 2009. LNCS (LNAI), vol. 6057, pp. 79–93. Springer, Heidelberg (2010)
13. Webb, T.L., Joseph, J., Yardley, L., Michie, S.: Using the Internet to promote
health behavior change: A systematic review and meta-analysis of the impact of
theoretical basis, use of behavior change techniques, and mode of delivery on effi-
cacy. Journal of Medical Internet Research 12(1) (2010)
An Assessment of the Potential for Personalization
in Patient Decision Aids
Norwegian Electronic Health Library, Postboks 7004, 0130 Oslo. Oslo University Hospital
oye@helsebiblioteket.no, lauras@idi.ntnu.no
Abstract. An increasing number ofpatient decision aids are being developed to as-
sist patients in making personalized choices among health care options, but little is
known about the current use of and potential for personalization of web-based de-
cision aids. The purpose of this study is to estimate the potential for personalization
of patient decision aids. We developed a coding scheme for personalization and
analyzed web-based patient decision aids from all relevant developers according to
the scheme. The most relevant subgroups of users and the current representation of
the groups in the tools were identified. We then identified system behavior relevant
to web personalization, and instances of adaptive system behaviors.The decision
aids included in this study exhibit four out of five classes of system behavior eligi-
ble for personalization. With few exceptions, the tools do not contain automatic,
adaptive behavior. Patient decision aids hold potential for web personalization.
Relevant techniques are largely unexplored.
1 Background
Patient decision aids are evidence-based tools designed to help people participate in
making specific, deliberated, personalized choices among health care options, in ways
they prefer. According to a systematic review on the effectiveness on patient decision
aids, the tools «differ from usual health education materials because of their detailed,
specific, and personalized focus on options and outcomes for the purpose of preparing
people for decision making»[1].
The term «personalized» is often included in the definitions and declared pur-
poses of patient decision aids. Personalization can pertain to several aspects of a
decision aid, such as the structure and content of the tool, the decision-making
process, and the resulting choice. Within the domain of information and communi-
cation technology, personalization implies the use of technology to accommodate
the differences between individuals. Technological personalization of patient deci-
sion aids could potentially tailor healthcare and healthcare communication by ad-
justing to the different biological, psychosocial and contextual idiosyncrasies of
patients.
Web personalization is the employment of user features in web systems that adapt
their behavior to the user. The overall aim is to meet the needs, goals and preferences of a
variety of people. The adapted content can be variations regardinginformation, products,
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 51–57, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
52 Ø. Eiring and L. Slaughter
people, services and activities. An exploration of the techniques in the domain of deci-
sion aids could hold potential for more informed, satisfactory, effective and personalized
decisions. A large inventory of techniques for adaptively selecting, structuring and pre-
senting content in web systems to user features (attributes and interaction data) have
evolved during the last two decades [2].
Despite the fact that decision aids are intended to support the personalization of
care, little is known about the current use of, and potential for web personalization
inherent in the tools.
The objective of this mixed-methods study is to estimate the potential for web perso-
nalization in web-based patient decision aids.
Based on a comprehensive anthology [2] we developed a coding scheme for cur-
rent web personalization techniques. The scheme includes a checklist of possible user
features and a catalog of adaptive system behaviors.
We identified developers of web-based decision aids by hand-searching the quali-
ty-assessed patient decision aids in the Ottawa Inventory[3].Developers of decision
aids only available in PDF format were excluded. One decision aid from each devel-
oper was included for further study. When a developer had produced more than one
decision aid, we selected the decision aid that included the richest functionality
present in the developer′s portfolio of tools.
Applying the coding scheme, we identified explicit and implicit subgroups with
comparable user features in the decision aids. Subgroups existent in the tools that
were not present in the generic coding scheme, were added to the scheme. We identi-
fied and described the linguistic representation of subgroups in the decision aids.
We then mapped the system behavior in the decision aids to the classes and prere-
quisites of adaptable system behavior present in the coding scheme. Finally, we sys-
tematically identified user-adaptive behavior present in the decision aids.
3 Results
259 decision aids developed by 22 producers were found in the Ottawa Inventory.
The 10 producers that met the inclusion criteria were responsible for 223 of the deci-
sion aids included in the inventory.
Fig. 1. Screenshot of the coding scheme. The subclass individual traits is expanded.
contained information that described different subgroups. This information was, with
few exceptions, not found in the decision aid.
All decision aids presented selected and organized content. 6 of the decision aids
included a search field, but only 1 included a search field that searched specifically
for content included in the tool only. The search fields in the remaining 5 decision
aids searched the content in all of the website. 1 developer included a tailored search
field to selected websites. With 2 exceptions, the decision aids exhibited static naviga-
tion. None of the producers enabled user collaboration. 1 included a user forum di-
rectly related to the tool. 1 decision aid included automatic recommendation of con-
tent based on implicit interaction data. Users could manually enter personal data in 9
of the 10 decision aids, the most frequent feature being the possibility to adjust text
size.
An Assessment of the Potential for Personalization in Patient Decision Aids 55
4 Discussion
Whereas paper-based and linear media can be personalized to a very limited degree,
web-based hypermedia systems can adapt their content and presentation to individual
users employing an array of techniques. The web-based decision aids included in this
study display 4 out of 5 classes of system behavior eligible for personalization. None
of the systems contain advanced adaptive behavior. All the selected decision aids are
closed corpus systems.
The web-based decision aids analyzed in this study target and address several sub-
groups within what is mainly a one-size-fits-all format. A number of strategies are
applied to relate the content to different subgroups, of which some are potentially
misleading, inappropriate, and might entail increased cognitive burden and unneces-
sary uncertainty. A relatively large amount of content could have been differentiated
according to different patient´s somatic parameters.
In the case where the evidence supporting the decision aid was provided, our anal-
ysis indicates that most of the information could be differentiated to individual
patients. This information was only to a limited degree reflected in the decision aid.
As decision aids are developed to support patient´s personalized choices, the gen-
eral absence of personalization in current decision aids is a paradox. According to our
findings, a significant amount of content in both the decision aids and their underlying
56 Ø. Eiring and L. Slaughter
evidence base could be tailored to the somatic parameters or other features of individ-
ual subgroups.
In addition to personalized selection and organization of content, system behavior
could adapt to users in a variety of ways. To give an idea of the potential, personaliza-
tion techniques could include:
• Presentation of the content most relevant to the user by priority-on-context tech-
niques such as coloring or scaling
• Supported navigation by augmenting links with annotations that give visual cues,
for instance of progress
• Recommendation of peers with similar features that is treated at the same hospital,
to the patient
• Personalized web search adapted to the health literacy of the user
• Personalized collaboration where users e.g. build a shared list of questions to ask
their caregiver or physician
Fig. 2. In the patient decision aid Treatment choices for men with early prostate cancer, infor-
mation about different tumor stages is presented identically to all users. The presentation could
be personalized utilizing techniques that highlight the tumor stage relevant to the individual
patient. Content fragments could be dimmed, colored, scaled or sorted. Reprinted with permis-
sion from the National Cancer Institute.
5 Conclusion
adaptive behavior of decision aids. The advance of semantic web technologies such as
RDF and OWL, and the use of an open corpus knowledgebase, could bring added
possibilities.
References
1. O’Connor, A.M., Bennett, C.L., Stacey, D., Barry, M., Col, N.F., Eden, K.B., Entwistle,
V.A., Fiset, V., Holmes-Rovner, M., Khangura, S., Llewellyn-Thomas, H., Rovner, D.:
Decision aids for people facing health treatment or screening decision. Cochrane Database
Syst. Rev. (3), CD001431 (2009)
2. Brusilovsky, P.: Adaptive Navigation Support. In: Brusilovsky, P., Kobsa, A., Nejdl, W.
(eds.) Adaptive Web 2007. LNCS, vol. 4321, pp. 263–290. Springer, Heidelberg (2007)
3. http://decisionaid.ohri.ca/AZinvent.php (acessed July 20, 2011)
An Analysis of Twitter Messages
in the 2011 Tohoku Earthquake
1 Introduction
Social media such as Facebook and Twitter have proven to be useful resources for
understanding public opinion towards natural disaster events. Such resources can be
used to detect general events in politics, e.g., elections [10], and finance, e.g., stock
market changes [2,10] and oil price changes [10], as well as in alerting disasters such
as earthquakes and typhoons [12]. Other social data such as search queries have been
successfully used in public health to build bio-surveillance systems for early warning
of influenza-like illness [7,8,11], showing high correlations with Centers for Disease
Control and Prevention (CDC) reports. Within the wider Web, the BioCaster project
has worked on detecting and tracking infectious diseases using newswire reports [5].
Twitter, the largest micro-blogging service with about 200 milion users as of March
2011 [1], can generate 200 million tweets a day. Tweets are short but condensed
personal messages with a 140 character limit designed for rapid reporting from
mobile devices. Several applications using Twitter messages in biosurveillance
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 58–66, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
An Analysis of Twitter Messages in the 2011 Tohoku Earthquake 59
systems have been developed. For example, Flu Detector used Twitter messages to
detect the ILI rate in the United Kingdom [9], and DIZIE, which is part of the
BioCaster project, is an experiemental syndromic surveillance system [6].
The great Tohoku earthquake happened on 11th March 2011 was the most
powerful known earthquake to have hit Japan, and one of the five most powerful
earthquakes in the world overall since modern record-keeping began in 1900 [3]. The
earthquake triggered a tsunami, causing massive loss of life and destruction of
infrastructure, and in turn lead to a number of nuclear accidents in Fukushima
prefecture, affecting hundreds of thousand of residents. This was described as “the
toughest and the most difficult crisis for Japan” by the Japanese Prime Minister [4].
Greater understanding of social responses during such disaster periods should help
metropolitan governments and public health agencies to gain greater insights for
preparedness and response. Twitter data, being real time and large-scale, offers a
unique insight into public opinions as the disaster develops.
In this paper, we analyzed over 1.5 million Twitter messages for the period starting
9th March 2011 until 31st May 2011 – the time when the main crisis happened - in
order to review social attitudes during the time when the earthquake occurred. We
focused on tracking keywords related to three main topics: earthquake/tsunami,
radiation and public anxiety for the Twitter user population in the metropolitan Tokyo
area; an area that experienced severe tremors, social anxiety and mild radiation but no
major loss of life. To gain greater insights into differing attitudes between local and
foreign residents we explicitly differentiated English and Japanese tweets. Our results
show high correlations between Twitter data and real world events as well as how
quickly Japanese people’s anxiety returned to a stable level after the disasters. To the
best of our knowledge, this is the first such study on Twitter data during the 2011
Tohoku earthquake.
2 Methods
We collected Twitter data for three months, starting from March 9th 2011 to May 31st
2011 using Twitter API (http://dev.twitter.com/) with the geolocation feature set to
track messages originating within Tokyo. The resulting corpus had a total of 48,870
tweets in English and 1,611,753 tweets in Japanese. The details of tweets by dates in
both English and Japanese are depicted in Figure 1. In order to analyze the data, we
wrote a simple parser in Python to parse the text and used relevant keywords for
filtering.
Our empirical analysis focuses on the events during the 2011 Tohoku earthquake.
Within the stream of Twitter messages we studied three indicators of public response:
1) earthquake and tsunami, 2) radiation caused by the Fukushima Daiichi plant’s
60 S. Doan, B.-K.H. Vo, and N. Collier
meltdown, and 3) public anxiety. The first two types of indicators are aimed at
showing people’s awareness of the earthquake, tsunami and radiation and the last
indicators looks at how people in Tokyo are anxious about these events. Essentially,
the events happened as the sequences as follows: The first is the earthquake occurring
at 05:46:23 UTC on Friday, 11th March 2011. The second is the tsunami which
happened after the earthquake a few minutes. The third is the nuclear explosion at the
Fukushima Daiichi plant which the first explosion at reactor 1 happened at 6:36 UTC
th
on 12 March 2011.
We manually investigated both English and Japanese tweets and constructed lists
of key terms that are relevant to the events. The lists of English and Japanese terms
indicating earthquake and tsunami, radiation and public anxiety are shown in Table 1.
Although the number of terms might not be comprehensive we believed that they are
good enough for our investigation. The reason we included earthquake and tsunami as
a single event was because we found there were few English tweets about tsunami in
our corpus.
Table 1. List of relevant keywords for the Earthquake and Tsunami, Radiation, and Anxiety
events
English terms Japanese terms
Earthquake and Tsunami event
大地震 大震災
(major earthquake), (great
震災 地震
earthquake, quake, quaking, post-quake,
earthquake), (earthquake disaster),
余震 揺れ
shake, shaking, shock, aftershock, temblor,
tremor, movement, sway, landslide seismic, (earthquake), (aftershock), (quake/tremor),
seismography, seismometer, seismology, 震度 震源 マグニチュ
(seismic intensity), (epicenter),
epicenter, tsunami, wave ード 津波 (magnitude) (tsunami)
Radiation event
放射 放射線
(radiation), 放射能 (radiation ray),
放射性物質
radiation, radioactivity, radioactive, nuclear, (radioactivity), 原発(radioactive material),
東京電力
(nuclear power plant), メルト (TEPCO),
ダウン マイクロシーベルト
power plant, reactor, iodine, TEPCO,
meltdown, sievert, micro sievert, iodine, (meltdown), (micro
isodine, explosion, caesium, strontium, ヨウ素
sievert), イソジン ヨウ化
(iodine), (isodine),
plutonium, uranium カリウム 炉心溶融
(potassium iodide), (core
爆発
meltdown), (explosion)
Anxiety event
死亡 (death), 死ぬ (die), やばい, やばかった, ヤ
バい, やばっ, やべ (risky; dangerous), 怖い, 怖かっ
た, 怖っ, 恐れ (scary, scared), すごい, すげえ, すげ
die, death, risky, scary, scared, incredible,
Figure 1 supports Sakaki et al.’s [12] observations that the number of earthquake
tweets increases significantly directly after a major earthquake. The data indicates that
Twitter users would like to broadcast their experience immediately.
Event 1: Earthquake & tsunami event
Earthquake and tsunami keyword frequencies for both English and Japanese are
shown in Figure 2. We noticed that there is a sharp and sudden rise in the number of
tweets immediately preceding the first major tremor. Note that the earthquake
happened at 14:46:23 JST (05:46:23 UTC) on Friday, 11th March 2011 with 9.0
magnitude earthquake near the east coast of Honshu, Japan which was 373 km NE of
Tokyo1.
First, we considered how quickly Twitter users responded to the earthquake. It is
unknown when the first public report about the earthquake was in Tokyo but the first
tweet on the topic originating in Tokyo occurred at 05:48:08 UTC, 1 minute and 25
second right after the earthquake happened at the epicenter. It is unsurprising but
noteworthy that the first tweet was in Japanese.
1
http://earthquake.usgs.gov/earthquakes/recenteqsww/Quakes/usc0001xgp.php
62 S. Doan, B.-K.H. Vo, and N. Collier
Within our corpus the first English tweets on the earthquake are given below, with the
first two tweets sent from an iPhone:
11-03-2011T05:48:54 Huge earthquake in TK we are affected!
11-03-2011T05:49:01 BIG EARTHQUAKE!!!
11-03-2011T05:50:00 Massive quake in Tokyo
The first Japanese tweets on the earthquake are as follows.
地震!"
" [Earthquake!]
地震だ〜縦揺れ!" [Earthquake ~ vertical shake!]
11-03-2011T05:48:08
11-03-2011T05:48:08 "
11-03-2011T05:48:14 地震!!!!" [Earthquake!!!!]
"
We can easily see that first Twitter users responded very quickly, with the first
English and Japanese tweets occurring about two minutes right after the earthquake
happened. Japanese tweets preceded the English tweets by about 47 seconds. This
might be because the numbers of Japanese language users are far greater than English
language users in Tokyo. We also note that when the earthquake occurred, because of
network outage there was no contact by cell phones but people could still access the
Internet through 3G services with smartphones such as the iPhone.
We note that the first tweet from a Tokyo resident about a tsunami in Tohoku was
a re-tweet at 06:02:35 UTC, 12 minutes after the first tsunami was reported. The first
tweet about a tsunami was an eye witness tweet at 2011-03-11T 05:52:23 UTC, 6
minutes after the earthquake occurred at its epicentre.
11-03-2011T 05:52:23 " オレ、津波の様子見てくるわ!!!! " [I can see the
tsunami coming!!!!]
Fig. 2. Keyword frequencies for the earthquake event over time for English (left) and Japanese
tweets (right)
Let us consider the details of the aftershocks which were described in Wikipedia2.
“Japan experienced over 900 aftershocks since the earthquake, with about 60
registering over magnitude 6.0 Mw and at least three over 7.0 Mw. A magnitude
7.7 Mw and a 7.9 Mw quake occurred on March 11 and the third one struck offshore
on 7 April with a disputed magnitude”
2
http://en.wikipedia.org/wiki/2011_Tōhoku_earthquake_and_tsunami
An Analysis of Twitter Messages in the 2011 Tohoku Earthquake 63
“Four days later on April 11, another strong magnitude 6.6 Mw aftershock struck
Fukushima, causing additional damage and killing a total of three people”
As reported above, there are two other significant earthquake events: 7th April and
th
11 April. Both English and Japanese tweets in Figure 1 show how significant they
are since peaks occur on both of those date with frequencies of 0.12 (English) and
0.07 (Japanese) at 7th April and 0.18 (English) and 0.09 (Japanese) at 11th April,
respectively. It seems from our observations that Japanese language speakers were
more concerned on 11th April than 7th April.
The below tweets were the first to show concern about nuclear plants right after the
earthquake.
11-03-2011T05:57:53 " 原発大丈夫かな?
" [Is the nuclear power plant
福島原発ヤバい状況らしい。。。政府が国民を欺かないことを
alert.]
11-03-2011T09:50:49 "
願います " [The Fukushima plant is in a really bad situation… I hope that
the government won’t deceive the public.]
From drill down analysis we noticed that many people reported the situation
happening in Tokyo from their own personal experiences such as a lack of food in
convenience store on 11th and 12th March.
11-03-2011T11:27:03 People r suggested to prepare an "emergency
kit" consist of blanket, water, canned food, flashlight, aid kit,
clothes #bigearthquakeinjapan
12-03-2011T01:00:18 Wow. I've never seen a convenience store
depleted of food before, even during the Great Handgun quake. At least I
got toilet paper.
It is easy to see that such information could be automatically harvested for timely
planning in future disasters. From Figure 2, we can see that both English and
Japanese tweets correlate closely, reflecting the fact that public concern in both
English and Japanese are the same during the earthquake events.
3
http://en.wikipedia.org/wiki/Timeline_of_the_Fukushima_I_nuclear_accidents
64 S. Doan, B.-K.H. Vo, and N. Collier
Radiation equivalent dose rates of 400 millisieverts per hour (400 mSv/h) are observed at one
location in the vicinity of unit 3.
Figure 3 shows that after the March 11th earthquake, Japanese tweets showed further
peaks on the 12th and 15th March whilst English tweets reached peaks one or two days
later later on the 13th and 17th March, respectively. Although the cause is not clear this
indicates that Japanese people in Tokyo were concerned about radiation earlier than
foreign residents in Tokyo. Once again the results indicate the important role that
aggregated tweets in the native languages play in early warnings.
When the earthquake hit the Fukushima nuclear plant on 11th April, both English and
Japanese tweets reached their peak a day later, on 12th April. This indicates that the
event is of major concern to both Japanese people and foreigner residents in Tokyo.
Fig. 3. Keyword frequencies for the radiation event over time for English (left) and Japanese
tweets (right)
Below are some examples of early English tweets at the peak on 11th and 12th April.
11-04-2011T23:21:09 Earthquakes, tsunamis, radiation what else you
got? Exploding Fuji? Let me get out my folding umbrella... #fb
#quaketrashtalk #backchannel
11-04-2011T23:51:09 This is the "New Normal" life after 3/11.
Always fearing how the situation of nuclear plant is #prayforjapan
12-04-2011T00:08:01 Nuclear Agency Japan has increased the level
of nuclear disaster to level 7 as the worst, which equal to Chernobyl
#Fukushimasradiation
12-04-2011T02:41:40 @<username> 4 of 6 reactors in meltdown. Spent
fuel rods melting. Two explosions, containment breached. Already a 7.
#fukushima #niisa
Topically, several tweets focus on concerns about radiation in relation to tap water in
Tokyo since 13th March.
13-03-2011T07:06:37 People are asked to close window, door; not
to use AC; use mask & not to drink tap water #Fukushimasradiation
23-03-2011T06:18:50 210 becquerel iodine (normal 100 becquerel)
discovered in Tokyo tap water. Infants are urged to avoid drinking it
#Fukushimasradiation
An Analysis of Twitter Messages in the 2011 Tohoku Earthquake 65
Below are some examples for anxiety of people in Tokyo in English tweets,
11-03-2011T06:58:49 nerves frayed out on the streets. everyone
emptied out of buildings, on their phones, worried. some inspecting
damage to buildings
11-03-2011T07:09:56 @<username> I'm okay, thx. Worried about
others...
11-03-2011T07:14:52 @<username> thanks ! Now Me and my family are
ok. But worrying about my men...
4 Conclusions
language play an important role in early warning in terms of their volume and timeliness.
Strong correlation between Twitter and public health events leads us to believe that
Twitter data can be a useful resource in an early warning surveillance systems as well as
a tool for analyzing public anxiety and needs during times of disaster.
In the future, we plan to extend our work on analysis to other aspects of the
earthquake using publicly available metrics for evaluation. Automated methods to
find relevant terms for tracking during disasters will also be investigated.
Acknowledgements. Authors would like to thank to Twitter Inc. for providing API
functions to access the Twitter data.
References
1. BBC (2001), http://www.bbc.co.uk/news/business-12889048
(retrieved March 28, 2011)
2. Bollen, J., Mao, H., Zeng, X.: Twitter mood predicts the stock market. Journal of
Computational Science 2(1), 1–8 (2011)
3. CBS News. New USGS number puts Japan quake at 4th largest, March 14. Associated
Press (2011), Archived from the original on (April 5, 2011),
http://www.webcitation.org/5xgjFTgf4 (retrieved March 15, 2011)
4. CNN. Japanese PM: ’Toughest’ crisis since World War II (March 13, 2011), Archived
from the original on (April 12, 2011),
http://edition.cnn.com/2011/WORLD/asiapcf/03/13/japan.quake/
index.html?iref=NS1 (retrieved March 13, 2011)
5. Collier, N., Doan, S., Kawazoe, A., Goodwin, R., Conway, M., Tateno, Y., Ngo, Q.-H.,
Dien, D., Kawtrakul, A., Takeuchi, K., Shigematsu, M., Taniguchi, K.: BioCaster:
detecting public health rumors with a Web-based text mining system. Bioinformatics
(2008), doi:10.1093/bioinformatics/btn534
6. Collier, N., Doan, S.: Syndromic Classification of Twitter Messages. In: Kostkova, P.,
Szomszor, M., Fowler, D. (eds.) eHealth 2011. LNICST, vol. 91, pp. 186–195. Springer,
Heidelberg (2012)
7. Eysenbach, G.: Infodemiology: Tracking Flu-Related Searches on the Web for Syndromic
Surveillance. In: AMIA Annu. Symp. Proc. 2006, pp. 244–248 (2006)
8. Ginsberg, J., Mohebbi, M., Patel, R., Brammer, L., Smolinski, M., Brilliant, L.: Detecting
influenza epidemics using search engine query data. Nature 457(7232), 2012–2014 (2009)
9. Lampos, V., Cristianini, N.: Tracking the flu pandemic by monitoring the social web. In:
Proc. of the 2nd International Workshop on Cognitive Information Processing (CIP), pp.
411–416 (2010)
10. O’Connor, B., Balasubramanyan, R., Routledge, B.R., Smith, N.A.: From tweets to polls:
Linking text sentiment to public opinion time series. In: Cohen, W.W., Gosling, S. (eds.)
Proceedings of the 4th International AAAI Conference on Weblogs and Social Media, pp.
122–129. AAAI Press (2010)
11. Polgreen, P.M., Chen, Y., Pennock, D.M., Nelson, Weinstein, R.: Using internet searches
for influenza surveillance. Clinical Infectious Diseases 47(11), 1443–1448 (2008)
12. Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes twitter users: realtime event
detection by social sensors. In: Proc. of the 19th International World Wide Web
Conference, Raleigh, NC, USA, pp. 851–860 (2010)
Web-Based Stress Management System Goes Mobile:
Considerations of the Design of a Mobile Phone App
Abstract. High levels of stress at work, great demands and lack of balance
between work and family; these are examples of components in the daily lives
of many people in modern society. Interventions of different kinds are needed.
However, changing patterns of thinking and behaviors is not an easy task, and it
demands for continuous support and learning efforts. This paper presents a
web-based stress management system and the way it was transferred to a
mobile phone app. The solution and considerations are presented. The design
principles of the web-based system were used to examine the use of the mobile
phone app. The results showed that the app to a large extent meets the design
principles, and some of the principles seemed even more applicable in the
mobile phone setting due to its mobility.
1 Introduction
Today many people are on sick leave as a result of high levels of stress [1]-[2].
Studies show that high or unclear demands, low control and low social support at
work increase the risk of "job stress". If this state of high levels of stress is prolonged,
the risk of impaired health gets high. There may also be a disturbance in the balance
between work and family when the demands of one sphere do not comply with the
requirements of the other, or when the individual's efforts to fulfill its role in the work
are affected negatively by the demands from family [3]-[4]. Social support at work or
in private life has a mediating effect of perceived stress, and can to some extent,
prevent negative stress.
Prevention and health promotion measures aim at creating attitude and behavioral
changes in people who suffer from stress symptoms. Empowerment is a central
concept for increasing control in life. An important question is how to build on and
reinforce authentic participation, a sense of value and mastery in decision making.
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 67–75, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
68 Å. Smedberg and H. Sandmark
To manage stressful life situations, to develop and maintain a healthy lifestyle and
inner balance, can be difficult. E-health communities can contribute to this process
through its ability to foster continuous interaction between members. Previous studies
have shown that knowledge from health experts and experiences of peers can create a
good synergy; the use of web-based ask-the-expert functions, between citizens and
experts, and conversations among peers in e-health communities has shown to offer
different and complementary support [11]-[12].
Web-Based Stress Management System Goes Mobile 69
adjusted when necessary. For example, exercises can be adjusted to better fit the
stress symptoms among the users.
10. Multimedia for Virtual and Real Life Integration. Communication between the
system's medical staff and the ones with stress symptoms can be supported by
multimedia applications. Breathing exercises can, for example, be easily
demonstrated through online video clips, and also other physical exercises and
instructions can benefit from using multimedia. The recorded exercises can be
performed by the users whenever they choose. Other types of tools can be used to
support the dialogue and make them richer.
11. Embedded Feedback Mechanisms. The system should include stress
measurements such as physiological markers and self-reporting since they help
measure the users' learning progress. Results from these tests could also be useful to
identify additional needs that the system should meet.
Fig. 1. Home page of the mobile phone app for stress management (in Swedish)
Forum. The user can actively participate in conversations with peers. As the web-
based system uses a pre-programmed standard forum system, the phone app adds a
link to the forum (via WebView) instead of retrieving the separate messages. Since
the standard forum system, VanillaForums, supports mobile phone apps, the interface
is automatically adjusted. The way it is displayed can be seen below (in Fig.2).
Fig. 2. Page showing the five different functions at the top. “Forum” is activated and forum
discussions in the four stress areas are displayed via WebView (in Swedish).
The forum function of the system is treated differently since it uses a pre-
programmed standardized forum system. The other four functions, however, have
been able to be programmed from scratch and adjusted to the overall phone app
interface. On next page is an illustration of the tab for booking counseling sessions
(Fig.3). The chosen stress area is balance in life. In the text box, information about the
scheduled counseling session is given (title, date, time and maximum participants).
Web-Based Stress Management System Goes Mobile 73
Fig. 3. Page for booking counseling sessions. It illustrates how a session is displayed in the area
dealing with issues related to balance in life (in Swedish).
Table 1. Comparison between the web-based system and the mobile phone app regarding the
main five functions
Function Web-based system Mobile phone app
Research & real life Presentation of stories and Ability to choose between reading
stories research as both text and sound. or listening to selected stories and
research (via ‘sliding drawer’).
Practical tools, Presentation as text, sound and Presentation as for Research &
exercises video clips. real life stories. Video clips are
also available.
Ask-the-expert Frequently questions and answers Frequently questions and answers
are presented. The user can post are presented. The user can post
new questions (and receive new questions (and read personal
personal answers through e-mail). answers through e-mail).
Group counseling Information on upcoming Information on upcoming
counseling sessions are displayed, counseling sessions are displayed,
and the user can sign up for one or and the user can sign up for one or
more sessions. Information about more sessions. The user can also
registered sessions are displayed. add the session to his/her phone
The session takes place in a calendar.
certain chat area in the system.
Forum The forum system offers As the web-based system uses a
participation and displays questions pre-programmed standard forum
and answers between peers. system, the phone app offers links
to the forum system (via
WebView).
74 Å. Smedberg and H. Sandmark
4 Final Remarks
In this paper, we have presented a prototype of a mobile phone app for stress
management associated with a web-based system. So far, the mobile phone app has
shown promising results when evaluated by criteria from research in the area of stress
management and online support. This preliminary work will be followed by user-
based evaluations to identify needs to be addressed in the next iteration of design.
References
1. Henderson, M., Glozier, N., Holland, E.K.: Long Term Sickness Absence is Caused by
Common Conditions and Needs Managing. BMJ. 330, 802–803 (2005)
2. Dekkers-Sánchez, P.M., Hoving, J.L., Sluiter, J.K., Frings-Dresen, M.H.: Factors
Associated with Long-Term Sick Leave in Sick-Listed Employees: A Systematic Review.
Occup. Environ. Med. 65, 153–157 (2008)
Web-Based Stress Management System Goes Mobile 75
3. Sandmark, H.: Work and Family: Associations with Long Term Sick-Listing in Swedish
Women. BMC Public Health 7, 287 (2007)
4. Sandmark, H.: Job Mismatching, Unequal Opportunities and Long-Term Sickness
Absence in Female White Collar Workers in Sweden. Scand. J. Public Health. 37, 43–49
(2009)
5. Jacobson, E.: Progressive Relaxation, 2nd edn. University of Chicago, Chicago (1938)
6. Murphy, L.R.: Stress Management in Work Settings: A Critical Review of the Health
Effects. American Journal of Health Promotion 11, 112–135 (1996)
7. Smedberg, Å., Sandmark, H.: Multiple Help Online: An Integrated E-Health System for
Stress Management. In: Proceedings of IADIS International Conference E-Health,
Freiburg, Germany, July 29-31, pp. 151–158 (2010) ISBN: 978-972-8939-16-8
8. Smedberg, Å., Sandmark, H.: Stress Intervention Online - Designing for Self-Help through
Multiple Help. In: Proceedings of the Third International Conference on eHealth,
Telemedicine, and Social Medicine, Guadeloupe, France, February 23-28, pp. 120–125
(2011) ISBN: 978-1-61208-003-1
9. Smedberg, Å., Sandmark, H.: Dynamic Stress Management: Self-Help through Holistic
System Design. In: Smedberg, Å. (ed.) E-Health Communities and Online Self-Help
Groups: Applications and Usage, pp. 136–154. IGI Global (2012)
10. Jones, M., Marsden, G.: Mobile Interaction Design, 1st edn. Wiley-VCH, Chichester
(2005)
11. Smedberg, Å.: To Design Holistic Health Service Systems on the Internet. Proceedings of
World Academy of Science, Engineering and Technology, 311–317 (November 2007)
12. Smedberg, Å.: Online Communities and Learning for Health - The Use of Online Health
Communities and Online Expertise for People with Established Bad Habits. Doctoral
Thesis. Department of Computer and Systems Sciences, Stockholm University (2008)
ISBN: 978-91-7155-689-9
13. Preece, J.: Empathic Communities: Balancing Emotional and Factual Communication.
Interacting with Computers 12, 63–77 (1999)
14. Preece, J.: Online Communities – Designing Usability, Supporting Sociability. Wiley &
Sons (2000)
15. Haythornthwaite, C.: Social Networks and Online Community. In: Joinson, A., McKenna,
K., Postmes, T., Reips, U.-D. (eds.) The Oxford Handbook of Internet Psychology, pp.
121–137. Oxford University Press, United Kingdom (2007)
16. McEwen, B.S.: The Neurobiology of Stress: From Serendipity to Clinical Relevance.
Brain Res. 886, 172–189 (2000)
17. Levi, L.: Working Life and Mental Health - A Challenge to Psychiatry? World Psych. 4(1),
53–57 (2005)
18. Siegrist, J., Marmot, M.: Health inequalities and the psychosocial environment—two
scientific challenges. Soc. Sci. Med. 58, 1463–1473 (2004)
19. Preckel, D., von Känel, R., Kudielka, B.M., Fischer, J.E.: Over Commitment to Work is
Associated with Vital Exhaustion. Int. Arch. Occup. Environ. Health 78, 117–122 (2005)
Use of SMS for Tsunami Early Warnings
at a Table Top Exercise*
Abstract. Tsunamis are one of the most dangerous and destructive natural
disasters: countries that experience a tsunami event are likely to undergo, after
the immediate destruction of the regions nearby the coast, several secondary
effects, for example epidemic outbreaks. Thus, early warning systems able to
timely advise the authorities and the population of an imminent tsunami are
valuable tools that should be implemented in any coastal region with high risk
of seismic events. In this paper we present the experience that we gained during
a Table Top exercise aimed at testing the effectiveness of an SMS – based
Tsunami Early Warning System (TEWS). SMS showed to be a valuable
additional support channel for propagating the alarm, even though some
drawbacks were identified e.g. lack of reliability, formal procedures and follow-
through training that must be carefully taken in account. Experience gained will
be used in an operational exercise scheduled October 2011 and potentially pave
the way for including SMS early warning in disaster management.
1 Introduction
Recently, two extraordinary Tsunami events (Indian Ocean, 2004 and Pacific Coast of
Japan, 2011) remind the entire world of the potential destructiveness of natural
disasters. Tsunami consequences do not run out in the immediate term; on the
contrary, long term effects of Tsunamis are even more devastating than the brute
destruction spread by the giant waves. In particular, Tsunamis often create unsanitary
health conditions that are likely to breed serious diseases and epidemics. Currently,
the only countermeasures for contrasting Tsunami events consist in (a) developing
emergency programs for population evacuation and (b) creating Tsunami Early
Warning Systems (TEWS) that are able to timely detect the arrival of a Tsunami for
*
This work was supported by the European Commission, Humanitarian Aid and Civil
Protection Directorate under contract 070401/2009/534360/SUB/A3: “POSEIDON:
Earthquake followed by Tsunami in the Mediterranean Sea”.
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 76–79, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
Use of SMS for Tsunami Early Warnings at a Table Top Exercise 77
advising both the authorities and the civil population to take action in view of the
imminent risk.
Real world, operating TEWS have been deployed in several countries after 2004,
for example in India [1] and Indonesia [2]. Interestingly, most recent TEWS started to
employ SMS services for spreading alert messages; however, using SMS for
broadcasting disaster warnings is still a controversial issue. Thanks to the wide
diffusion of mobile phones, SMS can easily reach a large number of recipients.
Recent studies have noted the possibilities of using SMS and MMS to provide
personalized, media-rich, context-aware advice [3,4] and enhance the
understandability of the alert for visual/hearing impaired citizens [5]. However, SMS
technology is intrinsically unreliable, and sending large numbers of SMS immediately
after a disaster may contribute to overloading the communication network [6].
In this framework, our research group along with National Civil Protection
Authorities, the Red Cross, and the regional Government, recently engaged in a new
initiative, the POSEIDON project [7], with the aim of conducting a European civil
protection exercise to train in the European Civil Protection Mechanism that includes
use of Information and Communication technology in population evacuation in case
of Tsunami. The operational field exercise will be held in October 2011, in the island
of Crete. For our simulation we plan to employ SMS as supplementary
communication channel for advising both competent authorities and the general
population about the imminent Tsunami. One of the preliminary activities of the
project consisted in performing a Table Top exercise (May 2011), with the objectives
of both strengthening the connections among the actors involved and refining the
organization of the simulation. We sent, through SMS, a Tsunami alert to all the
participants of the Table Top exercise that accepted to be involved in this first
experimentation. After sending the SMS, we collected the impression and the
comments of the recipients with a questionnaire prepared in advance. Our scope was
to exploit this first experience in planning the SMS alert system for the field exercise.
2 Methodology
Setting of the TEWS Simulation during the Table Top Exercise: The tabletop
exercise was hosted in the main building of the Decentralized Administration of
Crete, on May 30, 2011. Close to one hundred (100) Representatives of Health
Authorities, Civil Protection, Firefighters, Police, Port Authorities and Cretan
Municipalities were present. Among the Table Top participants, eighty–four (84)
accepted to participate in the simulation: the participants’ role consisted in receiving
two alert SMS on their mobile phones and subsequently answering a questionnaire.
The first message contained a Tsunami alert for the Municipality of Heraklion, while
the second one for the Municipality of Chania. Both messages contained a location –
dependent hyperlink pointing at a map of the coastal area at risk. Messages were sent
either in English or Greek, depending by the nationality of the recipient. The
prototype .NET application for sending the messages, consisting in a Graphical User
Interface connected to the Skype software via an application programming interface
that allowed maintaining the list of contacts, their role, and language preferences.
78 V. Lagani et al.
Evaluating the Results from the Table Top Exercise: We measured the
performance of the SMS service under two different aspects: (a) technical
effectiveness, consisting in evaluating whether the SMS service succeeded in timely
delivering all planned messages, and quantified as the percentage of sent SMS over
the number of planned messages (%SENT) and the percentage of participants that
actually received the SMS over the number of intended recipients (%DEL); (b)
informativeness, much more complex to measure, since it involves the interaction
between the reader and the message itself. For evaluating SMS informativeness we
devised an ad-hoc questionnaire subdivided in the following sections (dimensions):
understandability, credibility, usability and usefulness. Question are structured as five
points items, ordered from “totally negative” (score: 1) to “totally positive” (score: 5).
The questionnaire is available online at: http://kwiksurveys.com/?u=poseidon
3 Results
Out of one–hundred sixty eight (168) planned messages (eighty–four (84) recipients,
two messages each), we managed to send one–hundred nine SMS (%SENT = 64.9%)
to sixty two (62) distinct recipients. At the end of the table-top exercise, we collected
twenty eight (28) filled and four (4) blank questionnaires (thirty two (32) in total).
We estimated the percentage of delivered messages as %DEL = 28/32 = 87.5%. After
the questionnaires collection, we evaluated the results as follows: for each dimension
D we calculated a normalized score as the average score of the questions associated to
D. We then calculate the mean of the normalized scores across all questionnaires.
This procedure produced a single, mean normalized score for each dimension, ranging
from 1 to 5, where “1” indicates that the participants’ average evaluation of the
message was completely negative, while “5 “corresponds to a totally positive
assessment. In particular, the score for each dimension are the following:
Understandability, 3.66; Credibility, 3.58; Usability, 3.67; Usefulness, 2.26.
References
1. Kumar, T.S., Kumar, C.P., Nayak, S.: Performance of the Indian Tsunami Early Warning
System. In: International Archives of the Photogrammetry, Remote Sensing and Spatial
Information Science, Kyoto, Japan, vol. XXXVIII, part 8 (2010)
2. Lauterjung, J.: Installation of a tsunami early warning system in the Indian Ocean. In:
Proceedings of the 13th Annual ACM International Workshop on Geographic Information
Systems (GIS 2005), p. 1. ACM, New York (2005)
3. Meissen, U., Voisard, A.: Increasing the Effectiveness of Early Warning via Context-
aware Alerting. In: Proceedings of ISCRAM Conference, Washington, DC, USA (May
2008)
4. Malizia, A., et al.: CAP-ONES: An Emergency Notification System for all. In: Proceedings of
the 6th International ISCRAM Conference, Gothenburg, Sweden (May 2009)
5. Mitchell, H., Johnson, J., La Force, S.: Wireless Emergency Alerts: An Accessibility
Study. In: Proceedings of the 7th International ISCRAM Conference, Seattle, USA (May
2010)
6. Pau, L.F., Simonsen, P.: Emergency messaging to general public via public wireless
networks. In: Proceedings of ISCRAM Conference, Washington, DC, USA (2008)
7. Evangelia, T., et al.: Risk Assessment Study based of the 365AD Earthquake to Drive a
Civil Protection Exercise. ERCIM News (April 2010), http://ercim-
news.ercim.eu/en81/special/risk-assessment-study (visited on July
11, 2011)
Seamless Evaluation of Interactive Digital Storytelling
Games: Edugames4All
Patty Kostkova
1 Introduction
Serious games are increasingly becoming established as a new method of education
[1]. IDS is a growing hybrid discipline bringing together computer games and
cinematic storytelling enabling a creation of unique learning applications [2]. The
positive use of games to aid learning has been established [3-4]. The Edugames4All
project (www.edugames4all.org) based on the DG SANCO-funded e-Bug project
(www.e-bug.eu) developed a story-telling game to teach children basic principles of
hygiene and antibiotic resistance [5]. As a traditional ‘role-playing game’ it relies
heavily on narrative [2]. There were 3 missions implemented, each teaching a set of
learning objectives (LOs) prescrived by the project. In this paper we discuss the
evaluation results and propose a seamless evaluation utilizing the storytelling nature
of the game and engaging the player in a dialogue with the characters allowing to
fine-tune the understanding of the player while not disturbing the immersion.
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 80–84, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
Seamless Evaluation of Interactive Digital Storytelling Games: Edugames4All 81
Here we describe the first puzzle based around hand hygiene related LOs (the 2nd and
3rd teach appropriate use of antibiotics and the issue of antibiotic resistance).
Referring to standard IDS levels, defined in [1], illustrated on Figure 1, in the
“animation base”, the player is presented with a scene, chooses narrative to talk to
characters, collects evidence, investigates evidence in a laboratory and presents an
answer to “puzzle” – the cause of infection or reason for an illness – to the boss of e-
Bug (“Big C” character, Figure 2). At the second “dialog base”, there is the story. For
example, the story in the first puzzle is as follows: at a BBQ party, a famous actor
gets by infection transmitted as a result of poor hand hygiene at a bathroom but
poisoning food and insufficient hygiene in the kitchen must be eliminated by
investigating a Chef and by collecting and testing evidence samples. Investigate
dialogue in the kitchen scene is illustrated on Figure 3.
The game mechanics “rules” require the player to test the samples and prove the
hypothesis. This includes so called “micro-vision” (illustrated on Figure 4) turning the
room into a “microbe-vision light” allowing users to see microbes on the scene and
collect samples for testing in a microbiological laboratory. The evidence is tested and
hypothesis about the cause of the infection either proved or disproved. Finally, on the
4th level - “plot outline” - the story “Big C at the Investigators HQ assigns player a
task to investigate the reason of poisoning and approves the correct investigation
outcome: the Actor’s sickness was caused by a contamination of the salad at the BBQ
by microbes transmitted due to poor hand hygiene at a toilet.
3 Evaluation Results
The games were evaluated during the development phase in schools in the UK in
terms of knowledge change and usability. Final game was evaluated in summer 2010
82
Table 1. Summary of player responses for questionnaires for each Mission, including the specific questions provided at each level corresponding
to e-Bug pack learning outcomes. The pre and post responses are written via symbols between the ‘&’ where C=correct, W=wrong, ?=other
(either answer not provided or both True and False selected – wrong in either case). For example, ‘C&C’ = correct pre and correct post answers;
‘C&(W|?)’ = correct pre-answer and either wrong post-answer or other response selected. ‘Remaining’ refers to the tallied player responses for
the following cases: ‘?&?’ , ‘?&W’ , and ‘W&?.’
Mission Question # Kids Started # Kids Finished C&C W&W (W|?)&C C&(W|?) Remaining McNemar chi-square p value
16
1. Viruses and bacteria are two types of micro-organisms. 22 10 1 4 1 27 1.25 0.26
P. Kostkova
18
2. If you cannot see a microbe in plain daylight, it is not there. 22 10 0 3 1 27 0.56 0.45
17
3. Fungi are microbes. 22 10 2 3 0 27 2.08 0.15
18
4. Virus microbes can be spread by sneezing or coughing. 22 10 0 2 2 27 0.06 0.80
19
5. Virus microbes can be spread by sneezing or coughing. 22 10 0 0 3 27 4.08 0.04
Mission 1
20
6. Virus microbes can spread if people don’t wash their hands after using the loo. 22 10 0 1 1 27 0.13 0.72
19
7. Washing vegetables and cooking meat removes bad microbes from our food. 22 10 1 1 1 27 0.13 0.72
21
8. People should wash their hands before eating. 22 10 0 0 1 27 2.25 0.13
20
9. Before making a meal, people don’t need to wash their hands. 22 10 1 0 1 27 2.25 0.13
19
10. Microbes are found on most surfaces like your skin, or food that you eat. 22 10 0 2 1 27 0.08 0.77
10
1. Antibiotics kill bacteria. 14 10 1 1 2 35 0.75 0.39
11
4. Bacteria and viruses are the same. 14 10 0 0 1 37 2.25 0.13
3
5. Antibiotics kill viruses. 14 10 4 5 1 36 2.04 0.15
Mission 2 9
6. Most coughs and colds get better without antibiotics. 14 10 1 3 1 35 0.56 0.45
13
7. If antibiotics are overused, bacteria can mutate to become resistant to the drugs. 14 10 1 0 0 35 N/A N/A
12
8. You should only use antibiotics with your doctor’s permission. 14 10 2 0 0 35 N/A N/A !
13
9. Overuse and abuse of antibiotics leads to antibiotic resistance. 14 10 1 0 0 35 N/A N/A
11
10. Antibiotics are needed to treat bacterial illnesses and to make you feel better. 14 10 1 2 0 35 1.13 0.29
17
1. Microbes are contagious. 22 13 0 3 2 27 0.05 0.82
20
2. If you cannot see a microbe in plain daylight, it is not there. 22 13 0 1 1 27 0.13 0.72
18
3. Bad microbes can spread when you touch something or someone that is sick. 22 13 1 3 0 27 2.08 0.15
19
4. If people wash their hands, they are less likely to get ill. 22 13 0 3 0 27 2.08 0.15
19
5. You should only use antibiotics with your doctor’s permission. 22 13 0 0 3 27 4.08 0.04
Mission 3
0.27
6. You can stop taking antibiotics when you are feeling better. 22 13 7 5 7 3 27 1.23
0.40
7. Finishing your course of antibiotics ensures that all bacteria is out of your system. 22 13 7 6 6 3 27 0.69
N/A
8. You should never give your antibiotics to a friend to use. 22 13 22 0 0 0 27 N/A
9. People should take antibiotics to prevent them from getting sick (like a vaccine). 22 13 12 3 3 4 27 0.32 0.57
0.27
10. Antibiotics kill our good bacteria in our gut. 22 13 10 2 7 3 27 1.23
Seamless Evaluation of Interactive Digital Storytelling Games: Edugames4All 83
5 Conclusion
Computer games have been established as new media for education. We described the
design of the IDS game Edugames4All teaching hygiene and antibiotic resistance and
the results of an evaluation using pre and post questionnaires methodology. A work in
progress method, the seamless evaluation, integrating fine-grained questions into the
game dialogue and introducing a “debrief” session evaluates knowledge gain without
decreasing players’ immersion.
References
[1] O’Hagan, M.: Video games as a new domain for translation research, Revista
Tradumàtica – Traducció I Tecnologìes de la Informaciŏ I la Comunicaciŏ 05:
Localitzaciŏ de videojocs, ISSN 1578-7559,
http://www.fti.uab.cal/tradumatica/revista
[2] Spieerling, U.: Interactive Digital Storytelling: Towards a Hybrid Conceptual Approach.
In: Proceedings of DiGRA 2005 Conference: Changing Views – Worlds in Play (2005)
[3] Klabbers, J.: The gaming landscape: A taxonomy for classifying games and simulations.
In: Copier, Raessens (eds.) Level up: Digital Games Research Conference, Utrecht Uni.
(2003)
[4] Robertson, J., Collins, T., Kelly, A.: Tales of Adventure Author: Learning through Making
Games. Narrative and Interactive Learning Environments, Edinburgh (2008)
[5] Farrell, D., Kostkova, P., Lazareck, L., Weerasinghe, D.: Developing web games to teach
microbiology. The Journal of Antimicrobial Chemotherapy 66(suppl. 5), v33–v38
[6] Farrell, D., Kostkova, P., Weinberg, J., Lazareck, L., Weerasinghe, D., McNulty, C.A.M.:
Computer games to teach hygiene: An evaluation of the e-Bug junior game. The Journal
of Antimicrobial Chemotherapy 66(suppl. 5), v39–v44
[7] http://www.edugames4all.org/IntegratedCRD.nsf/a2e0dec55e90ea
ac80257914005ad890/c7b7205052d61c578025791400661778?OpenDocu
ment
[8] Vavoula, G., Meek, J., Sharples, M., Lonsdale, P., Rudman, P.: A Lifecycle Approach to
Evaluating MyArtSpace. In: Proc. 4th Int. Workshop of WMUTE 2006, pp. 18–22 (2006)
Patient-Centered Care as a Learning Process
Linneaus University
351 95 VÄXJÖ
Sweden
{Jan.aidemark,Linda.askenas}@Lnu.se
1 Introduction
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 85–92, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
86 J. Aidemark and L. Askenäs
on what happens with the facts when they have reached the patient, and on what it
takes for facts to become actions. In the core of this we find the concept of knowledge
and the processes that surround it, like creation, storage, transfer, use and so on, in
short, what a patient understands from the facts presented. This is a process going on
in all the aspects, including measures, planning, choices, actions and evaluations.
Forbat et al. (2009) discuss the nature of PCC and its key feature of patient
involvement in the care process, which means that the patient is part of planning,
decision-making, delivery and evaluation. However, this involvement is not enough,
but the patient must really be engaged in the care process. This requires that the
patient gains a personal understanding of the sickness, and this does not mean just an
information-seeking process. Forbat et al. (2009) argue that patient and care personnel
must be coached into being able to be engaged. The method which Forbat et al.
(2009) suggest builds on study groups of patients and staff that work according to a
Plan Do Study Act (PDSA) method as a support for learning and building personal
understanding.
Gathering facts by taking measurements on the patient is central for making plans and
decisions about the continued care process. In PCC this has been translated into a
need of personalized measurements that capture the individual perspective, or, how
the patient perceives his or her situation. The outcome of a measurement might be
different whether a patient or a physician makes the assessment (for example,
Stephens, 1997). In the care of chronic illness special measures for understanding the
long term progress of the individual have been developed. The typical example of this
is the “quality of life” (QoL) concept. Davidson et al. (2004), researchers on heart
failure, argue for the task of assessing patient needs as being central to tailoring the
care for the individual patient. The approach builds on structured measures to capture
this information, including for example patient satisfaction, quality of life and utility.
But the key is how to individualize these measures, by involving the patient and
making him or her take active part in the measurements, and turning it into a long-
term process and not a one-time happening. In their paper the authors argue for a
general framework and for developing specific and quantitative needs assessment
questionnaires within each area. They also point towards a number of problems with
the QoL measure. First, this concept is not properly defined, which makes it
somewhat less reliable even though it often includes factors like physical functions,
psychological processes, social and economic concerns, and spiritual/existential
aspects.
al., 2007). In this case a framework for a self-management goal cycle has been set as
support for the patients. The central activities include: 1) visits, both personal and
group meetings, also including scheduled or ad hoc telephone calls; 2) goal lists, i.e.
lists of things the patient should achieve; 3) measurements, including one measure for
the likelihood of reaching a goal and one for measuring the ability of the caregiver to
solve problems associated with the goal; 4) a checklist for the caregiver as support
when gathering facts about the situation; and 5) problem-solving activities when a
problem arises about the goal.
The decision on what care a patient needs is the centerpiece of the care process. A
patient who is well informed and is thus empowered to participate actively in the
decision plays an important part in a patient-centered care model. The preceding
activities build up to this moment, the patient-doctor meeting, facts and measures, the
planning and the learning processes all supporting an empowered patient. Great
advantages are expected from a patient-centered decision including a focus on issues
that are important to the patient, decisions made in line with patient values, the
improvement of patient compliance with and commitment to the care. In the long run
this would also mean a lower total cost for care. Shared decision-making is a concept
advocated in a brief case study (Walker, 2008) as part of a patient-centered care
model. Walker (2008) defines shared decision-making as “[t]he collaboration between
patients and caregivers to choose treatment options in line with patient health plans”.
The patient in the case becomes informed by support like counseling for good
information gathering and understanding, videos with treatment choices and facts in
form of a treatment handbook. Gustavsson et al. (1999) present a study of a support
system that was provided to a group of patients for home use. The patients were
provided with support like information, decision support, and connections to experts
and other patients. The impact of the system was measured with self-reports of their
quality of life and of the frequency and duration of their use of medical services. The
benefits included, for instance, patients spending less time during care visits,
communicating with health providers by phone and experiencing fewer and shorter
hospitalizations.
3.5 Action and Learning: Connecting the Cause and Effect of Self Care
Taking the action that is the actual care is of course the goal of the care process. The
actions can be taken by patients more or less on their own, or be performed by
someone else, maybe a caregiver from the professional organization, or by someone
close to the patient. The focus of PCC is to empower the patient to be able to perform
self-care. Robinson et al. (2008) study PCC from an adherence perspective, defining
the concept as the patient’s efforts to follow health care advice. Adherence is related
to the concept of compliance, defined in Robinson et al. (2008) as a when a person’s
behavior coincides with clinical advice. To use the term adherence reflects more of
PCC, i.e. individual care and patient involvement. Self-management is one approach
Patient-Centered Care as a Learning Process 89
Evaluation is needed to ensure that PPC approaches promote better health for patients.
Building the databases needed as sources of facts is closely related to record-keeping.
Both evaluation and records are ongoing activities that are performed in each phase of
the care process, as discussed throughout this section.
Evaluations are necessary for making a good case for PCC. For example, Stewart
et al. (2000) made a study of the differences in outcome between cases using and
those not using a patient-centered approach. The outcome of this study showed that
patient-centered communication influences patients’ health because they perceived
that their visit was patient-centered. Stewart et al. (2000) therefore drew the
conclusion that patient-centered practice improved health status and increased the
efficiency of care by reducing diagnostic rests and referrals. For the patient to find
common ground with the physician was especially important. Cassivi et al. (2008)
discuss the problems with measuring by giving an example of a framework in the
thoracic surgical area. The main problem is identified as what is called a void in
quality measures. The problem is one of a duality in the use of measures. The
measures are both used for quality improvement or for economic aspects of care and,
together with these, as means for supporting the right care choices. This is also
reflected in the type of measures, whether they are outcome-oriented or process-
oriented. To fill this void in measures, frameworks for measuring and measures
should be developed on the basis of a patient-centered view. Cassivi et al. (2008), also
point toward the need of building databases of records from the measures and the
importance of these records for future quality improvements. The financial outcome is
90 J. Aidemark and L. Askenäs
also connected with the evaluation and measurement of PCC and its importance for
care institutions. Charmel and Frampton (2008) point to number of economic reasons
for PCC, including reduced length of stay, a lower cost per case, fewer adverse
events, higher employee retention rates, a decrease in malpractice claims and
increased market shares.
The aim of this paper has been to investigate how to understand and model a health
care process as a patient learning process for the use as a IS/IT planning approach.
Starting with a tentative model of PCC, we have investigated current practices of PCC
as reported in the literature, and found the model a useful way of understanding the
PCC process. All the seven types of activity are in use today, albeit not in a coherent
or systemic way. The focus of most of the activities is not on the learning aspect as
such, however important part it is. Most of the practices can be seen to deal with more
than one type, but they usually have a focus on one of them. There are clear needs of
development in all these learning processes, and the way they interact over time, all
directed towards an integrated and systemic understanding of this problem area. For
the care organization learning process there has been progress in directions like care
Patient-Centered Care as a Learning Process 91
improvement research, but more generally it would be expected that lessons could be
learnt from organizational learning areas. When it comes to community learning,
which takes place on a person-to-person level theories within the social learning area
could be expected to contribute. The picture of the patient learning process seems to
be a very information-oriented and rational one. This is the picture that emerges both
in the practice as we have studied it and in the different situations that we have
reviewed in this paper. This sits well in the planning perspective and a rational world
view of information systems in general. However, this may not be the best way of
understanding how a patient really experiences the process.
Acknowledgement. The project Bridging the Gap 2, Futurum - the academy for
healthcare, Jönköping county council, Sweden.
References
1. Aita, V., McIlvain, H., Backer, E., McVea, K., Crabtree, B.: Patient-centered care and
communication in primary care practice: what is involved? Patient Education and
Counseling 58, 296–304 (2005)
2. Cassivi, S.D., Allen, M.S., Vanderwaerdt, G.D., Ewoldt, L.L., Cordes, M.E., Wigle, D.A.,
Nichols, F.C., Pairolero, P.C., Deschamps, C.: Patient-centered quality indicators for
pulmonary resection. Ann. Thorac Surg. 86, 927–933 (2008)
3. Charmel, P.A., Frampton, S.B.: Building the business case for patient-centered care.
Health Care Financial Management (March 2008)
4. Coleman, M.T., Newton, K.S.: Supporting self-management in patients with chronic
illness. American Family Physician 72(8), 1503–1510 (2005)
5. Davidson, P., Cockburn, J., Daly, J., Sanson Fisher, R.: Patient-centered needs assessment
– Rationale for a psychometric measure for assessing needs in heart failure. Journal of
Cardiovascular Nursing 19(3), 164–171 (2004)
6. Dubé, L.: What’s missing from patient-centered care? Marketing Health Services 23(1),
30–36 (2003)
7. Epstein, R.M., Street Jr., R.L.: Patient-centered communication in cancer care: promoting
healing and reducing suffering. National Cancer Institute, NIH Publication No. 07-6225,
Bethesda, MD (2007)
8. Forbat, L., Cayless, S., Knighting, K., Cornwell, J., Kearney, N.: Engaging patients in
health care: An empirical study of the role of engagement on attitudes and action. Patient
Education and Counseling 74, 84–90 (2009)
9. Gustafsson, D.H., Hawkins, R., Boberg, E., Pingree, S., Serlin, R.E., Graziano, F., Chan,
C.L.: Impact of a patient-centered, computer-based health information/support system -
reliability and validity in a patient population. American Journal of Preventive
Medicine (16,1), 1–9 (1999)
10. Heisig, P., Iske, P.: European knowledge management framework. In: European Guide to
Good Practice in Knowledge Management (Work in in progress, Draft Version 3.0).
CEN/ISSS, Berlin, Amsterdam (2003)
11. Laine, C., Davidoff, F.: Patient-centered medicine. A professional evolution.
JAMA 275(2), 152–156 (1996)
92 J. Aidemark and L. Askenäs
12. Langford, A.T., Sawyer, D.R., Giomio, S., Brownson, C.A., O’Toole, M.L.: Patient-
centered goal setting as a tool to improve diabetes self-management. The Diabetes
Educator 33(suppl. 6), 139s–144s (2007)
13. Robinson, J.H., Callister, L.C., Berry, J.A., Dering, K.A.: Patient-centered care and
adherence: Definitions and applications to improve outcomes. Journal of the American
Academy of Nurse Practitioners 20, 600–607 (2008)
14. Sherer, J.L., Anderson, H.J., Lumsdon, K.: Putting patients first. Hospitals work to define
patient-centered care. Hospital 67(3), 18–23 (1993)
15. Stephens, R.J., Hopwood, P., Girling, D.J., Machin, D.: Randomized trials of quality of
life endpoints: are doctors ratings of patient symptoms interchangeable with patients self-
ratings?! Qual. Life Res. 6, 225–236 (1997)
16. Steward, M., Brown, J.B., Weston, W.W., McWhinney, I.R., McWilliam, C.L., Freman,
T.R.: Patient-Centered medicine: transforming the clinical method, p. 25. Sage, Thousand
Oaks (1995)
17. Stewart, M., Brown, J.B., Donner, A., McWhinney, I.R., Oates, J., Weston, W.W., Jordan,
J.: The Impact of Patient-Centered Care on Outcomes. Journal of Family Practice 49(9),
796–804 (2000)
18. Teal, C.R., Street, R.L.: Critical elements of culturally competent communication in the
medical encounter: a review and a model. Social Science and Medicine 68, 533–543
(2009)
19. Walker, T.: Shared decision making gains recognition as patient-centric care model.
Managed Health Care Executive (April 2008)
20. Webb, J., Davis, T.C., Bernadella, P., Clayman, M.L., Parker, R.M., Adler, D., Wolf,
M.S.: Patient-centered approach for improving, prescription drug warning labels. Patient
Education and Counseling 72, 443–449 (2008)
Wireless Computer Games
and Applications in the Medical Education Curriculum:
Adventures in Pedagogy
Abstract. This manuscript reports work on the first of several related projects
in a series entitled “Adventures in Pedagogy”. Serious Computer Games and
Applications on wireless devices connected to the Internet are commonly
embedded into everyday clinical practice. Yet a review of the literature
indicates a scarcity of such curricula in undergraduate medical education.
Graduates are evidently not well prepared for wireless e-health practice during
University study. Consequently, we have introduced a selective for first year
medical students called “Computer Games and Applications for Health and
Wellbeing”. The selective is designed to support the clinical application of the
wireless tools in an ethical and practical manner while embedding fundamental
IT concepts to help prepare graduates for new practice horizons.
1 Introduction
Most clinicians agree that mobile access to Serious Computer Games and
Applications (SCG&A) using wireless devices over the Internet has opened new
practice horizons for health. The SCG&A are designed to facilitate improved health
and wellness outcomes, epidemic intelligence and public health event detection [1].
Many SCG&A tools are already widely used in Australian, if not international,
clinical practice.
Designers of medical education curricula have largely overlooked the SCG&A
health practice milieu [2]. Anecdotal evidence suggests the enormous amount of
information students must learn over their five year undergraduate qualification
militates against explicitly introducing informatics into the medical curriculum [3].
Educators would be well advised to develop a dialectic curriculum that resolves the
current mismatch between ubiquitous SCG&A tools for health and busy medical
education models. We have begun to address the mismatch by introducing a
Selectives unit, “Computer Games and Applications for Health and Wellbeing”, into
the first year undergraduate medical education.
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 93–96, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
94 J. Fernando and N. Peters
2 Study Design
2.1 Aim
The aim of this work, the first of several related projects in a series entitled
“Adventures in Pedagogy”, reflects on the process of embedding health informatics
into MBBS curriculum to support graduates for future wireless practice.
2.2 Methods
We use an action research method. Action research is well suited to exploring and
sustaining change processes to established curriculum.
2.4 Participants
We are the only participants at this stage of the research program, which has received
University human ethics authorization.
2.5 Evaluation
Students will evaluate the unit in October 2011 using a tool we have developed and
the Student Evaluation of Teaching and Units tool administered by Monash
University (4). Both evaluations will be triangulated with data collected from our
reflections. These data will be analysed interpretively so we may analyze the full
complexity of Selective outcomes.
3 Learning Objectives
Unit learning objectives were informed by several meetings with MBBS candidates of
varying experience over many years, daily interactions with colleagues, familiarity
Wireless Computer Games and Applications in the Medical Education Curriculum 95
with the relevant educational and health informatics literature and professional
expertise [5].
Multidisciplinary University support for the unit included access to devices and other
resources drawn from Faculty colleagues and those from IT Support and E-Learning
divisions. Expertise from the entire Monash community underpinned much of the
syllabus design.
The multinational Australasian College of Health Informatics (ACHI) membership
made several suggestions for meaningful syllabus inclusions too. ACHI members
often used their own professional networks to support the selective [6]. The authors
drew on a generous range of international expertise to inform the classes on topics
such as the application of telehealth and telemedicine (public health) to African and
transient communities, 3D worlds hosted locally, in New Zealand and the United
Kingdom. This pedagogical adventure would not have been able to proceed without
such direct and collegiate support.
Finally, the Selectives’ focus on personal and professional development provided a
ready-made vehicle for us to offer a new topic, simplifying logistics management.
The unit did not require integration into an already busy curriculum [3]. The
challenge of embedding health and medical informatics syllabus into medical
education more generally is among the subjects of our current research interests.
The published literature and anecdotal evidence based on research experience from
the biomedical and health informatics arena informed the Selectives title. While many
clinical students may be technologically savvy this does not necessarily translate to
comfort using wireless devices for health in real life [2]. Clinical students often
believe new informatics pathways in medical education are too hard to learn as part of
their degree program (7). Thus the friendly, if a little misleading, term “computer
96 J. Fernando and N. Peters
5 Conclusion
References
1. Health Informatics Society of Australia: Providing Leadership in E-Health (2011),
http://www.hisa.org.au/
2. Otto, A., Kushniruk, A.: Incorporation of Medical Informatics and Information
Technology as Core Components of Undergraduate Medical Education – Time for
Change! Stud. Health Technol. Inform. 143, 62–67 (2009)
3. Confederation of Postgraduate Medical Councils (CPMC): Australian Curriculum
Framework for Junior Doctors (2011), http://curriculum.cpmec.org.au/
4. Monash University. Student Evaluation of Teaching and Units (2011),
http://opq.monash.edu.au/us/surveys/setu/index.html
5. Fernando, J.: Personal web page (2011),
http://users.monash.edu.au/~juanitaf/
6. Australasian College of Health Informatics (ACHI) (2011),
http://www.achi.org.au
7. Berglunda, M., Nilssona, C., Révaya, P., Petersson, G., Nilsson, G.: Nurses’ and Nurse
Students’ Demands of Functions and Usability in a PDA. Int. J. Med. Inform. 76(7),
530–537 (2007)
The Process of Policy Authoring
of Patient-Controlled Privacy Preferences
1 Introduction
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 97–104, 2012.
c Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
98 T. Trojer et al.
a country (see e.g., [1]). Further patients have individual privacy concerns and
may want to execute their personal right of self-determination on access and
usage of their medical records. Legal regulations on data privacy and therein
especially information self-determination represent the underpinning motive to
let patients express personal privacy concerns. To meet these regulations, cus-
tomized applications and IT-infrastructure have to be built to make electronic
health-records controllable.
Therein we see a major requirement being usable authoring tools supporting
and guiding patient-authors of privacy preferences during the authoring process.
An important usability-supporting factor during this authoring process is the
analysis of privacy policies. Analysis results are used to inform the patient-
author about quality and effects her/his privacy settings imply on the overall
functionality of the health-care information system. Besides policy analysis, the
integration of health-care domain characteristics and domain knowledge also
support usability. Such integrations try to answer questions like, ”who are the
typical stakeholders within the health-care domain?”, ”which data is involved
and how sensitive is it?” or ”what data is required by those stakeholders?”. In
this paper we present the process of authorization policy authoring for shared
electronic health records and discuss usability-supporting factors involved. The
importance of developing highly usable authoring tools comes from the fact that
patients are not considered security experts and are not necessarily familiar
with working processes of the health-care domain. Therefore patients have to be
supported when trying to express their individual conception of privacy towards
corresponding enforceable privacy policies.
2 Problem Statement
Privacy can be ensured when a consent or agreement on a purpose of use is stated
by the identified individual which gets enforced by the security infrastructure.
Further access restrictions limit usage of data in order to prevent potential dam-
age and misuse. Here we want to specifically emphasize on the necessity that the
explicit source for setting privacy preferences is the corresponding patient.
A problem gets visible when changing the perspective, asking how privacy
policies can be declared in a way so that they match patients’ individual con-
ception of privacy. Since it is not feasible to put in place a trusted party who
manages policies for each patient, a patient by her-/himself should be allowed to
act as the author of privacy settings. An initial requirement to successfully em-
power patients to do so, is to consider usability-supporting factors of the policy
authoring tools. These factors leads to a change in the traditional authoring pro-
cess, which allows only security experts to define security artifacts. Furthermore,
as privacy policy authoring requires health-care domain information, aspects of
integration to an established health-care infrastructure have to be covered at the
same time.
The Process of Policy Authoring of Patient-Controlled Privacy Preferences 99
3 Related Work
Our ongoing work related to patient-controlled access control is based on pro-
posals published by ELGA1 , which is the working group driving the Austrian
e-health initiative [2].
There has been general work published in the field of usable security, e.g., [7].
The authors in this work state that when employing usable applications, guiding
the user in a privacy policy authoring process will lower the risk of inappropriate
use of personal information. In their work they conducted an empirical study to
evaluate the use of tools guiding and not guiding users through the authoring
process. Significant advantages of the employment of guided tools are shown
in their study. This also justifies our effort on implementing patient-controlled
access control policy authoring. Still, our work differs by the use-case within the
health-care domain together with the domain-aware analysis of patient privacy
policies to support the user. Further the authors in [13] evaluated the SPARKLE
policy workbench, an enterprise privacy policy authoring application in order to
gain information on usability challenges. We are able to develop our usability
requirements based on parts of their work, although related to characteristics of
a networked health-care landscape.
A core part of the process of policy authoring we propose in this work is
authorization policy analysis. An analysis component therefore analyses patient
privacy settings and provides feedback to the patient-author. Policy analysis,
similar to what we implemented is covered in [10]. Still, in our work we dynam-
ically retrieve health-care domain characteristics, required to enable domain-
aware analysis.
Katt et al. [8] propose an architecture for enforcing access control in Integrat-
ing the Healthcare Enterprises (IHE) based systems. IHE is also the basis for
our work regarding the retrieval of domain characteristics. Their work can be
used to implement the actual enforcement of patient privacy policies.
1
electronic health-record (German, ”Elektronische Gesundheitsakte”)
100 T. Trojer et al.
Authorization
User interface domain policy model
design
patient
!
privacy policy
Stakeholder view
Stakeholder
view Template
policy valid
Domain
characteristics
no yes
Authorization
Stakeholder domain policy model
views
Domain
User interface <<extends>>
characteristics
design
Patient
privacy policy
!
Authorization policy
authoring model
User Interface (UI) Design. When defining graphical user interfaces human
cognition as well as user behavior during task execution has to be considered. A
usable UI is designed in a way e.g., to show interface elements in a well-placed
(grouped) manner, describes necessary steps to reach a certain goal, gives a user
a history of previous actions taken, lets a user abort (and maybe continue) at
any time and keeps a user informed about the application state. In our case the
state of the application links back to policy analysis as it will be described later
in this section.
IHE ITI-TF 1
IHE ITI Supplements Policy authoring tool
IHE XDS
Document Document
repository registry
PEP PDP
!
Patient privacy policy
PAP
XACML actors
ISO/IEC 10181-3
Fig. 3. Integration of policy authoring tools, their relation to the XACML actors and
their dependencies to an IHE-based infrastructure
In the following we identify and list different IHE-profiles the authoring ap-
plication needs to incorporate:
References
1. European Commision. Directive 95/46/EC, Data Protection Directive (1995)
2. IBM Austria. Feasibility Study for implementing the electronic health record
(ELGA) in the Austrian health system (2006)
3. IHE. IT Infrastructure (ITI) Technical Framework. Integration Profiles, vol. 1
4. IHE. IT Infrastructure Access Control (White Paper) (2009)
5. IHE. IT Infrastructure (ITI) Technical Framework, Supplement, Healthcare
provider directory (HPD) (2010)
6. ISO. ISO/IEC 10181-3:1996 Information technology – Open Systems Interconnec-
tion – Security frameworks for open systems: Access control framework (1996)
7. Karat, C., Karat, J., Brodie, C., Feng, J.: Evaluating interfaces for privacy policy
rule authoring. In: CHI 2006. ACM (2006)
8. Katt, B., Breu, R., Hafner, M., Schabetsberger, T., Mair, R., Wozak, F.: Privacy
and Access Control for IHE-Based Systems. In: Weerasinghe, D. (ed.) eHealth
2008. LNCSIT, vol. 1, pp. 145–153. Springer, Heidelberg (2009)
9. Kotschy, W.: STRING ELGA Datenschutzrechtliche Analyse (German, Electronic
health record – Data privacy aspects). Austrian Federal Ministry of Health (2005)
10. LeMay, M., Fatemieh, O., Gunter, C.A.: PolicyMorph: Interactive Policy Transfor-
mations for a Logical Attribute-Based Access Control Framework. In: SACMAT
2007. ACM (2007)
11. Moffett, J.D., Sloman, M.S.: Policy conflict analysis in distributed system manage-
ment (1993)
12. OASIS. eXtensible Access Control Markup Language (XACML) v2.0 (2005)
13. Reeder, R.W., Karat, C.-M., Karat, J., Brodie, C.: Usability Challenges in Security
and Privacy Policy-Authoring Interfaces. In: Baranauskas, C., Abascal, J., Barbosa,
S.D.J. (eds.) INTERACT 2007. LNCS, vol. 4663, pp. 141–155. Springer, Heidelberg
(2007)
14. Trojer, T., Katt, B., Wozak, F., Schabetsberger, T.: An Authoring Framework for
Security Policies: A Use-Case within the Healthcare Domain. In: Szomszor, M.,
Kostkova, P. (eds.) e-Health. LNICT, vol. 69, pp. 1–9. Springer, Heidelberg (2011)
Modelling a User Authorisation and Data Access
Framework for Multi-specialty Research Systems
in Secondary Health Care
Ire Ogunsina1, Sarah N. Lim Choi Keung1, Lei Zhao1, Gavin Langford 3,
Edward Tyler1, and Theodoros N. Arvanitis2
1
Department of Primary Care Clinical Sciences
2
School of Electronic, Electrical and Computer Engineering
University of Birmingham, Edgbaston, Birmingham B15 2TT, United Kingdom
3
Birmingham and Black Country Comprehensive Local Research Network
{i.ogunsina,s.n.limchoikeung, l.zhao, e.tyler,
t.arvanitis}@bham.ac.uk, Gavin.Langford@uhb.nhs.uk
1 Introduction
Patient data is arguably the most essential resource in health care systems. The
recommendations of the Caldicott guardian stipulate that access to patient data must
strictly be on a “need-to-know” basis [1]. Caldicott-compliant systems need to be
effective in granting and restricting access to patient data and resources according to
system and user specifications. This work is part of a larger project involved with the
design and development of a research system to be used for clinical studies across
multiple specialties in secondary care. System users (subsequently referred to as the
subjects) will typically be health practitioners with proficiency in at least one
specialty and affiliated to one or more health organisations, typically NHS Trusts.
Apart from the patient data resource, license protected resources also exist for the
computation of clinical data. Access to all resources need to be verified along several
lines to ascertain rights and permissions. The paper continues with an overview of the
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 105–108, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
106 I. Ogunsina et al.
classic RBAC, some known limitations and possible solutions. Sections 3 and 4 focus
on the context of our work, the reasoning and rationale behind the proposed model.
2.1 Problems
Although RBAC has proven its effectiveness and good utilisation record across a
wide industrial spectrum, the approach is not to be considered as a panacea for all
access control issues [2]. The traditional RBAC has been shown to have limitations,
making it unsuitable for scenarios requiring complex access requirements [5]. Some
of the main problems, often associated with RBAC, are related to potential policy
conflicts and inconsistencies with authorisation of subjects with multiple roles. The
objective of our work is to model an effective framework for granting or denying
access requests to patient data and resources. This framework must take into
consideration the combination of the roles, specialties, Trusts, resources and actions
requested. The scope of the proposed model does not include more challenging
scenarios, such as emergency access requests.
3.2 Resources
Apart from patient data, another requirement of the model is the management of
system resources and tools. An example is licensed quality of life questionnaires
which may exist in paper or electronic format. A typical case is the Hospital Anxiety
and Depression Scale (HADS) [7] score in the COPD specialty. These licenses are
usually bought by the Trust and used in calculating patient data.
The RBAC model of the now defunct NHS National Programme for IT (NPfIT)
project [8] includes additional concepts for suitability within the health enterprise.
Within each policy entity, directives would specify the concept status such as
Legitimate Relationships (LR) - ensuring that patient identifiable data is only
accessible if the subject is involved in the patient’s care. Non patient identifiable data
may be accessed as allowed within the Sealed Envelopes (SE) segments of policy
documents. In most access request scenarios, it would be impossible to be granted
access without Patient Consent (PC) status being true within policy documents.
As shown in Figure 1, the scalable model generates a decision outcome as a
product of aggregated policies. This approach gleans from Blobel’s more detailed
model [9] as well as HL7’s security policy information model [10].
Policy
Composite Resource
Subj ect Policy
Farzad and Yu [11] extended Crook’s RBAC model [12] which modelled the
concepts of responsibility, operation and context in addition to the role concept as
criteria for object access and permission, bears good resemblance with our approach
work described with particular focus on including the model during the knowledge
108 I. Ogunsina et al.
engineering phase. Although the work by Slevin and Macfie [4] involves a single
specialty and Trust in a clinical environment, it highlights challenges common to
access control mechanisms within healthcare systems and possible solutions.
Acknowledgements. The work was supported by the England’s National Institute for
Health Research (NIHR) and the Birmingham and Black Country Comprehensive
Local Research Network (BBC CLRN).
References
[1] Becker, M.Y., Sewell, P.: Cassandra: Flexible Trust Management, Applied to Electronic
Health Records. In: Computer Security Foundations Workshop, pp. 139—154 (2004)
[2] Sandu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control
Models. IEEE Computer 29, 38–47 (1996)
[3] Ferraiolo, D.F., Kuhn, D.R.: Role Based Access Controls. In: 15th National Computer
Security Conference, pp. 554–563 (1992)
[4] Slevin, L.A., Macfie A.: Role Based Access Control for a Medical Database. In:
IASTED-Software Engineering and Applications Conference, pp. 19–21 (2007)
[5] Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized Role-Based Access Control for
Securing Future Applications. Technical Report GIT-CC-00-02. Georgia Institute of
Technology (2000)
[6] PERMIS. FAQ (2011), http://sec.cs.kent.ac.uk/permis/documents/FAQ.shtml
[7] Snaith, R.P.: The Hospital Anxiety and Depression Scale. Health Qual. Life Outcomes 1,
29 (2003)
[8] National programme for IT (NPfIT), http://www.gpchoice.org/npfit.aspx
[9] Blobel, B.: Authorisation and Access Control for Electronic Health Record Systems.
International Journal of Medical Informatics 73, 251–257 (2004)
[10] HL7. Privacy, Access and Security Services (PASS) Access Control Services Conceptual
Model. Release 1 (2010),
http://hssp-security.wikispaces.com/
PASS+HL7+Balloted+Documents
[11] Farzad, F., Yu, E., Hung, P.C.K.: Role Based Access Control Requirements Model with
Purpose Extension. In: Workshop on Requirements Engineering, pp. 207–216 (2007)
[12] Crook, R., Ince, D., Nuseibeh, B.: Modelling Access Policies Using Roles in
Requirements Engineering. Information and Software Technology 45(14), 979–991
(2003)
Software Engineering-Inspired Approach
to Prevention Healthcare
Victor Rentea, Andrei Vasilateanu, Radu Ioanitescu, and Luca Dan Serbanati
1 Introduction
In the past two decades, much of the growth in health expenditures has been attributa-
ble to chronic conditions in the context of global population ageing. Future health
reform should rely on stimulating patient empowerment [1], i.e., people to take re-
sponsibility of their health status and act proactively upon maintaining it [2]. One of
the most promising applications of patient empowerment is in the field of prevention,
aiming to avoid even the debut of chronic conditions, with an alarming increasing
prevalence in young people [3]. However, the existing healthcare information systems
are not suitable for this purpose because they focus on acute disease care and favor
diagnosis and treatment based mainly on the current symptoms [4]. The paper ap-
proaches the healthcare area from the original and seminal perspective of software
analysis and design, applying proven methods for tackling partial knowledge prob-
lems in the prevention field. Using a concern-oriented approach to health monitoring
and prevention, a multi-agent system is designed around the Personal Health Record
(PHR) to provide continuous assistance throughout the whole lifespan of the user.
Section 2 presents a brief state of the art in the fields this paper relies upon. To ad-
dress some of the identified problems, the conceptual design of a multi-agent system
is presented in Section 4, building upon a theoretical basis described in Section 3.
Conclusions and future work are presented in section 5.
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 109–113, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
110 V. Rentea et al.
3 Theoretical Background
The goal of our research is to compare the software development process with the
management of the patient’s health state in the attempt to apply proven methods from
the former to innovate in the prevention field. Although apparently very different in
nature, the two domains have many similarities: both produce unique, unrepeatable
work, both make critical decisions relying on some abstract model built through itera-
tive analysis and both emphasize the continuous nature of their work, i.e. treatment
and maintenance, respectively. Furthermore, both medical assistance and software
development requests are triggered by a change in an unpredictable universe, health
status and business environment, respectively.
The IEEE defines the concerns for a system as “those interests which pertain to the
system’s development, its operation or any other aspects that are critical or otherwise
important to one or more stakeholders” [7]. Concern-Oriented Software Development
[8][9] is an approach to partitioning a software system in a concern-driven way, with
the aim of supporting the specification of stakeholders’ concerns and their composi-
tion into a working system. The concerns about a system are represented as facets,
usually interrelated and overlapping. A key supposition is that the sum of all the fa-
cets identified is the system to be developed, because the composite representation
subsumes all the knowledge about the system available at that moment [8]. Thus,
the system analyst has to consider all the stakeholders’ concerns and design the soft-
ware system to harmonize all the different facets. Similarly, the medical specialties
have different, sometimes overlapping or even conflicting views and concerns about
the health state of a patient that should be harmonized in the final medical advice.
In software development several requirements often recur in similar forms, e.g., the
requirement for security, but to implement it correctly, worldwide-agreed standards
and proven solutions are reused. In medical practice, the proven knowledge is built on
clinical trials [10] that quantify the benefic or detrimental effect of habits and lifestyle
on the health state in the form of a Relative Risk (RR%), and embedded in clinical
guidelines and protocols that indicate the best therapeutic attitude.
After delivery, a software system enters the maintenance phase throughout which its
various problems and limitations emerge in the ever-changing business environment.
Similarly, in healthcare, while treating a patient multiple adverse effects together with
unexpected medical conditions may begin to manifest. However, regular monitoring
could predict acute and possibly dangerous manifestations.
Software Engineering-Inspired Approach to Prevention Healthcare 111
• The different recommendations are negotiated between VHAs, e.g., potassium salt
is good for patients with high blood pressure, but questionable in case of arrythmia.
• The final recommendations are presented to the user and integrated in the PHR.
5 Conclusions
References
1. Thorpe, K., Ogden, L., Galactionova, K.: Chronic conditions account for rise in medicare
spending from 1987 to 2006. Health Aff. (February 2010) doi:10.1377/hlthaff.2009.0474
2. Anderson, R.M., Funnell, M.M.: Patient empowerment: reflections on the challenge of fos-
tering the adoption of a new paradigm. Pat. Ed. and Counsel. 57, 153–157 (2005)
3. Schleiffenbauma, B.E., et al.: Unexpected high prevalence of metabolic disorders and
chronic disease among young male draftees – the Swiss Army XXI experience. Swiss
Med. Wkly 136, 175–184 (2006)
4. Serbanati, L.D., Ricci, L.R., Mercurio, G., Vasilateanu, A.: Steps towards a digital health
ecosystem. Journal of Biomedical Informatics (in press) doi: 10.1016/j.jbi.2011.02.011
5. Isern, D., Sánchez, D., Moreno, A.: Agents applied in health care: A review. International
Journal of Medical Informatics 75, 145–166 (2010)
6. Kawamoto, K., Houlihan, C.A., Balas, E.A., Lobach, D.F.: Improving clinical practice us-
ing clinical decision support systems: a systematic review of trials to identify features crit-
ical to success. BMJ. 330, 756 (2005)
7. IEEE Recommended Practice for Architectural Description of Software-Intensive Systems.
IEEE Std. 1471 (2000)
Software Engineering-Inspired Approach to Prevention Healthcare 113
8. Serbanati, L.D.: Integrating Tools for Software Development. Prentice Hall (1992)
9. Bogdan, C., Serbanati L.D.: Concern-oriented and Ontology Based Analysis of Informa-
tion Systems. In: Proc. ITAIS Conference 2008, in Information Systems: People, Organi-
zations, Institutions, and Technologies, pp. 245–253. Springer, Heidelberg (2010)
10. Timmermans, S., Mauck, A.: The promises and pitfalls of evidence-based medicine.
Health Aff. 24, 18–28 (2005)
11. Arrow, K.J.: Uncertainty and the welfare economics of medical care. Am. Econ. Rev. 53,
941–973 (1963)
Evaluation of a Web-Based Patient Portal
for Chronic Disease Management
1 Introduction
Currently, more than 9 million people are suffering from chronic disease in Canada
[1]. Accounting for nearly 87% of all disability in the country and consuming over
67% of all healthcare costs, chronic disease poses an incredible burden on the
Canadian healthcare system. By 2015, the World Health Organization predicts that
chronic disease will account for 89% of all Canadian deaths [2].
In Ontario, Canada, the impact is just as severe. Approximately 1 in 3 people suffer
from at least one chronic disease in the province, costing the healthcare system a total
of 80 billion dollars annually [3]. The impact of adverse effects of chronic disease are
especially salient in Southwestern Ontario where rates of chronic disease, particularly
prostate cancer and type II diabetes, are disproportionately higher than in other
regions of the province [4]. A 2011 report by the Canadian Cancer Society found
prostate cancer to be the most frequently diagnosed cancer in Ontario followed by
breast cancer and colorectal cancer [5].
Canada, like most developed countries have a cohort of aging baby-boomers. In
Southwestern Ontario the prevalence of diabetes and cancers continues to grow at an
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 114–121, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
Evaluation of a Web-Based Patient Portal for Chronic Disease Management 115
Fig. 1. My Diabetes Wellness PortalTM interface. Features of this portal can be seen in the side
bar located on the left-hand side.
2 Methods
We designed and implemented a pilot study where patients from each disease cohort
were allocated to one group per portal and followed for 6 months. All patients were
given access to usual care (print material, advice from their physician and other health
providers) and new sources of education, via the web-based portal. Patients had
access to self-monitoring tools, and the ability to track disease-related metrics. Our
ethics committee (University of Western Ontario) found this approach acceptable
(REB #16100E).
Two disease cohorts were targeted through convenience sampling. Patients
diagnosed with prostate cancer, including first and second line, of any age, were
approached to participate. Patients with type II diabetes were invited to participate.
116 S. Guy, A. Ratzki-Leewing, and F. Gwadry-Sridhar
This cohort was chosen as the disease requires many variables to be managed to
achieve optimal care. In both populations patients needed to have access to a
computer and the internet. Patients with comorbidities were not excluded. This
allowed us to have a fully representative population. We were not concerned with the
age range between cohorts (prostate cancer patients are generally an older cohort) as
we were not comparing cohorts. Rather this range allowed us to examine possible
barriers to use of web 2.0.
Patients were recruited by the physicians and educators at the London Health
Sciences Centre. One clinic was located in the Cancer Program, the other in
Endocrinology Care. These clinics are ideal as a large number of patients from
practices in South-western Ontario are referred for treatment. In addition to face-to-
face recruitment, mail outs were sent to patients. We aimed to recruit a total of 50
patients for each condition.
The patient letter of information and consent clearly explained the nature of what
data was going to be stored and how this was going to be stored. The data stored is
encrypted, and the portal company did not have access to any data. Data is stored
behind a secure hospital firewall and backed up nightly. The principal investigator,
physician, research assistant and healthcare provider on the team (a social worker, and
a pharmacist) had access to the portal. Patients were given randomly generated logins
which they changed in order to ensure confidentiality. Disease specific data for the
site is provided through manual entry (information entered by the patient) and HL7
data transfer.
An interactive, guided help video is available on the portal. Upon signing in, the
help video would pop up. A toll-free helpline was established for participants
experiencing difficulties. This was manned by the portal provider. Participants were
also able to call the research assistant if an issue arose.
We initiated the study in September 2009. Each portal was monitored by a
healthcare provider. The portal enables participants to track their disease-related
metrics (e.g., diabetes patients could download readings from their blood glucose
monitor) and visualize the data via graphs. External notifications based on goals set
by patients are automatically sent. Evidence-based educational material, chosen by
healthcare providers on the team, was accessible through the portal. Patient-to-patient
and patient-to-provider interaction was available through a community forum and
short messaging service.
The feasibility of this portal is assessed by a telephonic survey and a focus group.
A 10 minute telephonic survey was administered to patients from both portals. This
survey consists of 28 likert scale items and 4 open-ended questions. It was created to
assess patient experience with the portals over the course of 3 months. Questions were
derived from a questionnaire developed by Evangelista et al., (2006) [6] as well as an
expert panel of software developers, and healthcare providers (specifically, team
members). Items evaluated: motivation to use the portal, expectations, usability,
aesthetics, specific features, support team service, and benefit to health. Responses to
the survey were analyzed according to frequency and were subsequently grouped into
the themes.
Evaluation of a Web-Based Patient Portal for Chronic Disease Management 117
Focus groups were held, at study closure, with participants from each portal, to
provide in-depth understanding of portal experience. A focus group is a qualitative
research data collection method. Focus groups are particularly useful for exploring
opinions, preferences and experiences of a study [7, 8]. Focus groups "have an
advantage for researchers in the field of health and medicine...they can encourage
participation from people reluctant to be interviewed on their own or who feel they
have nothing to say" p.299[9]. Focus group validity is recognized by considering the
participants' responses as "an accurate representation of the perceptions of reality for
the group members and therefore valid" p.489 [10]. According to Calder [7] enough
focus group sessions have been held when it is possible for the moderator to
anticipate what will be said next. A semi-structured interview schedule was
developed, aimed at developing iterations of the portal that would provide optimal
support for managing a disease. The themes explored within the focus groups
included: motivations and expectations of the project, usability of the portal, reasons
for usage or non-usage of the community forum, and suggestions for the next portal
prototype. Two facilitators were present at each focus group (SG, and FG-S). These
sessions were audio recorded.
3 Analysis
Data from the telephonic questionnaire was entered into SPSS (Chicago, Il.) where
the frequency of items was computed. Open-ended questions were grouped into
themes initially laid out by the areas delineated in the survey. In addition, usage
statistics were collected through the backend of the portal. This provided data on
number of logins, time spent on each task etc.
The two focus group sessions (one for each cohort) were audio recorded and the
raw data was transcribed by a moderator (S.G). This data was analyzed according to
thematic analysis. Qualitative thematic analysis provides a rigorous method of
analysis across which a gathered data set will be searched and organized in to pre-
empted and emergent themes (repeated units of meaning or patterns) [11; 12] This
analysis requires that initial codes be generated after transcription, searching for
patterns across the data set, reviewing the themes, defining and naming themes, as
well as reporting issues considered relevant to the research question.
4 Results
Thirty-four out of 64 participants completed the survey (at the time of the survey, 64
participants were enrolled in the study). Ten male and five female My Diabetes
Wellness PortalTM (MyDWP) participants completed the survey – the majority of
which (5 participants) were between the ages of 40 to50 years. The majority of
ProPortalTM (ProP) participants (n=19) who completed the survey were between the
ages of 73-83 years (8 participants). At study closure, when the focus groups were
conducted, a total of 99 participants (46 MyDWP participants, and 53 ProP
participants) had consented to the study. Five ProP, and 2 MyDWP participants took
118 S. Guy, A. Ratzki-Leewing, and F. Gwadry-Sridhar
part in the focus groups. Findings from both the survey and focus groups are reported
within themes in the table below.
Themes Findings
Expand knowledge base and receive Canadian content
Sense of community and social network.
Motivations
Help others.
Find out how to improve overall health.
Involvement of primary physician.
Complete medical record history pertaining to disease to be
Expectations
available via portal.
System to be available to hospital personnel.
Easy to navigate, well-organized, clear, caught-on quickly.
Usability Feelings of frustration at missing medical information led to
discontinued use.
Time spent on MyDWP: average 15.60 minutes with average
participant login of 1.64 per day.
Time spent on ProP: 17.58 minutes with average participant
Portal Usage
login of 0.66 times per day.
Frequency of login related to checking for new information and
postings.
Privacy &
Felt personal information secure and protected.
Security
Features
Lack of participation by participants and healthcare team.
Community Wanted to see more activity.
Forum Recommendations: Discussion led by healthcare provider on
topic chosen by participants.
Tracking Well-liked and used.
Tools Need to combine items of likeness.
External
‘No new messages’ led to turning off feature.
Notification
MyDWP: liked ability to upload glucometer readings. However,
Personal some glucometers were not compatible with the system.
Health Delay between results and appearance on portal.
Record Results uploaded were close to unreadable.
ProP: Wanted portal pre-populated with biometric data.
Evaluation of a Web-Based Patient Portal for Chronic Disease Management 119
Table 1. (continued)
5 Discussion
implications these motivations may have had on study results must also be
considered. Repeating the trial with a larger sample size will improve the validity and
generalizability of the study; in painting a more accurate picture of the MyDWP,
researchers can accurately assess the portal’s effectiveness. In the future, it may be
beneficial to apply the technology adoption model (TAM) to determine user
acceptance of the portal and to make study outcomes more generalizable to the
research population.
6 Conclusion
This pilot study marks an important journey into e-based chronic disease management
in Canada. As the role patients with chronic disease play in their ‘healthfulness’
(as opposed to illness) becomes larger, cost-effective avenues to explore self-
management become crucial to the survival of our healthcare system. By learning
from the findings discussed in this paper, researchers will be able to deploy future
iterations of portals that encompass more of what patients want to see. Issues of
importance to participants include access to their medical record, communication with
health care professionals and other participants regarding topics of interest, keeping
track of biometrics, and keeping up with the latest clinical studies.
References
1. Canadian Academy of Health Sciences.: Health System Transformation to Meet the
Burden of Chronic Disease: The Challenge (2008),
http://www.cahs-acss.ca/e/pdfs/CDM_Challenge.pdf
2. World Health Organization.: Preventing Chronic Diseases: A Vital Investment. World
Health Organization Press, Geneva (2005)
3. Ontario Health Quality Council.: 2008 Report on Ontario’s Health System. Ontario Health
Quality Council, Toronto (2008)
4. The University of Western Ontario.: Facing Facts (2011),
http://www.robarts.ca/facing-facts
5. Canadian Cancer Society.: Ontario cancer Statistics (2011),
http://www.cancer.ca/ontario/about%20cancer/
cancer%20statistics/ontario%20cancer%20statistics.aspx
6. Evangelista, A., Stromberg, A., Westlake, C., Ter Galstanyan, A., Anderson, N., Dracup,
K.: Developing A Web-based Education and Counseling Program for Heart Failure
Patients. Prog. Cardiovasc. Nurs. 21, 196–201 (2006)
7. Asbury, J.E.: Overview of Focus Group Research. Qual. Health Res. 5, 414–420 (1995)
8. Barbour, R.S.: Making Sense of Focus Groups. Med. Educ. 39, 742–750 (2005)
Evaluation of a Web-Based Patient Portal for Chronic Disease Management 121
9. Kitzinger, J.: Qualitative Research – Introducing Focus Groups. Br. Med. J. 311,
299–302 (1995)
10. Carey, M.A.: Concerns in the Analysis of Focus Group Data. Qual. Health Res. 5,
487–495 (1995)
11. Braun, V., Clarke, V.: Using Thematic Analysis in Psychology. Qual. Res. Psych. 743,
77–101
12. Huberman, A.M., Miles, M.B.: The Qualitative Researcher’s Companion. Sage, Thousand
Oaks (2002)
13. Ontario Health Quality Council.: 2010 Report on Ontario’s Health System. Ontario Health
Quality Council, Toronto (2010)
14. Canadian Cancer Society.: Prostate Cancer Statistics at a Glance (2011),
http://www.cancer.ca/Canada-
wide/About%20cancer/Cancer%20statistics/Stats%20at%20a%20gla
nce/Prostate%20cancer.aspx?sc_lang=en
Cardio Online Reader/COR: A Web
2.0-Based Tool Aimed at Clinical Decision-Making Support
in Cardiology
1 Introduction
There is a wide acceptance of the fact, that the processes of clinical decision-making
has to be based on reliable scientific evidence, nowadays derived from clinical
research trials [1], [2], [3], [4]. A general agreement exists also around the statement,
that medical doctors have been challenging a huge increase of information, which is
still unstoppably growing. They do not know about important advances, and feel
overwhelmed by new scientific information [5], [6].
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 122–127, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
Cardio Online Reader/COR 123
would have to read one study report every half hour, day and night. In addition to
RCTs, about 1000 papers are also indexed daily on MEDLINE from a total of about
5000 journal articles published each day [7]. In addition to that, the quality of most of
the information is very poor: most published information is irrelevant and/or the
methods are not good [7]. Medical doctors have to select and appraise the sought
information, which requires specific knowledge, skills and experience. But previous
studies unveiled, they are not good at finding new information, and do not know how
to evaluate it when it is found [5], [6]. Information retrieval therefore is not a trivial
task for most of them.
Even when clinicians have time to read some of a new literature, it is difficult to
identify which information will be most useful in clinical practice and to recall the most
up-to-date findings when they need them [7]. Moreover, push technology to disseminate
information has magnified the problem to unwanted information [8]. Unsolicited
information received through the mail alone can amount to kilograms per month [7]. And
so busy clinicians are now caught in an information paradox - overwhelmed with
information but unable to find the knowledge they need when they need it [8].
Considering this reality, it is not surprising, that medical practitioners, particularly
GPs, are overloaded with information[7] and - at the same time - they face a serious
problem in keeping up to date [5], [6], [7].
Doctors need to be linked to the medical research literature in a way that allows them to
routinely obtain up-to-date, outcomes-based information [7]. Most of the questions
generated by doctors can be answered, usually from electronic sources, but it is time
consuming and expensive to do so-and demands information skills that many doctors do
124 V. Papíková and M. Zvolský
not have [6].Thoughnew resources focused on clinical doctors´ information needs (e.g.
Clinical Evidence or Evidence Updates) have been created, new information tools still
are needed [4], [6]. They should respect the "3Rs" of evidence communication, which are
reliability, relevance, and readability [4]. They are likely to be electronic, portable, fast,
easy to use, connected to both a large valid database of medical knowledge and the
patient record, and a servant of patients as well as doctors [6].
Some of the features mentioned above can be accomplished by means of the
Internet. Doctors are increasingly proficient with the Internet. Searching with Google
came out as useful means to formulate a differential diagnosis in difficult diagnostic
cases [14]. Yet doctors are seeking new methods of information discovery because of
the limitations of search engines [15]. Also the use of MEDLINE/PubMed to answer
daily medical care questions is limited because it is challenging to retrieve a small set
of relevant articles and time is restricted [9].
The Web 2.0 proved a potent platform able to provide right tools for the above
mentioned tasks. Its applications and services are characterized by features enabling
collaboration, information sharing and aggregation, composition of independent
services and provision of rich user interaction [16]. Using an RSS doctors can fight
information overload. RSS feeds enable to them to organize new web content sent to
them by various medical websites in a single interface of an RSS reader [15]. All of
the facts described above motivated us to develop an information system aimed at
targeted dissemination of the best available evidence from the cardiology by means of
tools and services of the Web 2.0.
The COR (Cardio Online Reader) application is based on domain focused records of
scientific publications, which are presented using Web 2.0 technologies. The application
functions as an online RSS reader and database of selected types of scientific articles. In
the process of selecting information we put the accent on their high reliability and clinical
relevance according to principles of evidence-based medicine. The articles have been
gained from the biomedical database MEDLINE/PubMed. The automated script
periodically loads selected records from free accessible interface of the PubMed and
stores them in the own fully searchable database of the COR. Afterwards the most recent
articles are displayed at top positions of the COR title web page. The user interface of the
COR was developed with an accent on ease of use and simplicity of control.
The goal of the COR is to simplify tracking and searching for methodologically
valid and clinically relevant publications to disseminate the latest piece of knowledge
from the clinical research to the clinical practice, and to create a space for discussion
about these findings and articles. These goals are reached by following attributes and
functions:
• The online reader presents articles selected from the MEDLINE/PubMed database.
• The articles have been chosen according to criteria of evidence-based medicine,
specifically methodological reliability and clinical relevance. For that reason
content of the application is created from five types of articles. They are Guidelines
Cardio Online Reader/COR 125
3 Discussion
The presented web application uses freely accessible source of biomedical bibliographic
information and brings the added value of domain specific focus (cardiology). Its
development is concentrated on quality, simplicity, and usability.
We plane to develop a fully individualized interface, predefined filters, list of
favorite articles, authors or MeSH tags, and other advanced functions and tools for
registered users in next versions of the application. There is also a need for at least
basic registration process to ensure the chance to archive the authorship of comments
126 V. Papíková and M. Zvolský
and ratings. A big deal will be to adjust the application to future trends in information
sharing, as they develop spontaneously.
4 Summary
Acknowledgements. This work was partly supported by the project 1M06014 of the
Ministry of Education CR and the research plan AV0Z10300504.
References
1. Eddy, D.M.: Evidence-based medicine: a unified approach. Health Affairs (Project
Hope) 24(1), 9–17 (2005)
2. Moyer, V.: Evidence based medicine: is it practical? Arch. Dis. Child. 89(5), 399–400
(2004)
3. King, J.F.: A short history of evidence-based obstetric care. Best Practice & Research.
Clinical Obstetrics &Gynaecology 19(1), 3–14 (2005)
4. Straus, S., Haynes, R.B.: Managing evidence-based knowledge: the need for reliable,
relevant and readable resources. CMAJ 180(9), 942–945 (2009)
5. Williamson, J.W., German, P.S., Weiss, R., Skinner, E.A., Bowes, F.: Health science
information management and continuing education of physicians. A survey of U.S.
primary care practitioners and their opinion leaders. Annals of Internal Medicine 110(2),
151–160 (1989)
6. Smith, R.: What clinical information do doctors need? BMJ: British Medical
Journal 313(7064), 1062–1068 (1996)
7. Glasziou, P., Del Mar, C., Salisbury, J.: Evidence-Based Medicine Workbook, 1st edn.
BMJ Publishing Group, London (2003)
8. Gray, J.A.M.: Where’s the chief knowledge officer? To manage the most precious resource
of all. BMJ: British Medical Journal 317(7162), 832–840 (1998)
9. Hoogendam, A., Stalenhoef, A., Robbe, P., Overbeke, A.J.: Analysis of queries sent to
PubMed at the point of care: Observation of search behaviour in a medical teaching
hospital. BMC Medical Informatics and Decision Making 8(1), 42 (2008)
10. Oxman, A.D., Guyatt, G.H.: The science of reviewing research. Ann. N Y Acad. Sci. 703,
125–134 (1993)
Cardio Online Reader/COR 127
11. McColl, A., Smith, H., White, P., Field, J.: General practitioners perceptions of the route to
evidence based medicine: a questionnaire survey. BMJ 316(7128), 361–365 (1998)
12. Guyatt, G.H., Meade, M.O., Jaeschke, R.Z., Cook, D.J., Haynes, R.B.: Practitioners of
evidence based care: Not all clinicians need to appraise evidence from scratch but all need
some skills. BMJ: British Medical Journal 320(7240), 954–955 (2000)
13. Haynes, R.B., Haines, A.: Barriers and bridges to evidence based clinical practice. BMJ:
British Medical Journal 317, 273–276 (1998)
14. Tang, H., Ng, J.H.K.: Googling for a diagnosis–use of Google as a diagnostic aid: internet
based study. BMJ 333(7579), 1143–1145 (2006)
15. Giustini, D.: How Web 2.0 is changing medicine. BMJ: British Medical
Journal 333(7582), 1283 (2006)
16. Karkalis, G.I., Koutsouris, D.D.: E-health and the Web 2.0. In: itab 2006, Congress Center
Du Lac, Ioannina, Greece (2006)
An Agent Based Pervasive Healthcare System:
A First Scalability Study
1 Introduction
Gestational diabetes mellitus (GDM)[10] affects 3%–10% of all pregnant women
with no history of diabetes before pregnancy and manifests itself in high blood
sugar levels during pregnancy. Current treatment guidelines [13] consist in diet
adjustment and in anti-diabetic medicines such as insulin and metformin. In
particular, the patient starts the treatment by simply monitoring the levels of
glucose 4 times per day, with one preprandial observation and one postprandial
observation in the morning, and two postprandial observations after the lunch
and after the dinner. Such values are then written in a notebook that is handed
to the doctors twice weekly. According to the behaviour of the physiological
values the doctors may introduce further checks at lunch and dinner, and, if the
glucose values are outside the boundaries, start the treatment with metformin
or insulin. If not treated, GDM may have severe risks for the mother, who may
develop high blood pressure and protenuria (preeclampsia) [14], and for the baby,
This work has been partially funded by the Hasler Stiftung and by the Nano-Tera
Consortium.
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 128–137, 2012.
c Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
An Agent Based Pervasive Healthcare System: A First Scalability Study 129
who may become large for the gestational age (macrosomia), with complications
at delivery and later in life.
Rather than checking the patient once or twice weekly, a better monitoring
may allow doctors to assess the situation of the patient and propose the cor-
rect treatment. One approach to continuous and intelligent patient monitoring
is represented by pervasive healthcare [12]. The goal of a pervasive healthcare
system (PHS) is to break the boundaries of hospital care, allowing patients to
be monitored while living their day-to-day life and to keep in touch with health-
care professionals. Due to its distributed nature, a PHS is faced with three main
challenges: scalability, accuracy and security. Scalability is important for PHSs
as these systems must be able to serve many patients at the same time, without
experiencing disruption due to high loads. Secondly, an accurate PHS should
be able to filter information efficiently in order to save time to the healthcare
professionals and produce alerts only when needed, with a good trade-off be-
tween false positives and false negatives. Finally, security is also an important
dimension for a PHS as it deals with medical data, which is sensitive data.
In this paper we present a PHS to monitor patients affected by GDM.
A previous version of this system was presented in [2], where we modelled a
distributed agent-based PHS. We have chosen agents as a modelling abstraction
for our PHS as they are understood to be autonomous software entities, that act
proactively and pursue a set of goals [15] in an intelligent way, by applying AI
reasoning techniques. Using multi-agent systems (MAS) abstractions to model
PHSs is beneficial as this programming paradigm is well suited for distributed
systems, due to the autonomy property of the agents, and thanks to distributed
event based approach that these systems take into consideration to model the
interactions between the agents and the other available resources [3].
In [2] we have already provided a first validation of the accuracy of the noti-
fications provided to the health professionals by our intelligent agents. On one
hand, in this paper we present the full implementation of our PHS for GDM,
evaluating the scalability of our system and illustrating how healthcare profes-
sionals can utilise the functionalities of our tool. On the other hand, the security
of our PHS will be evaluated in future publications as the system is currently
being audited for security at the Lausanne University Hospital, although in this
paper we also present how we secured the interfaces of our PHS. The remainder
of this paper is structured as follows: Section 2 discusses the functionalities of
the components of our system; Section 3 discusses an evaluation of our PHS in
terms of its scalability; Section 4 puts our work in comparison with relevant re-
lated works; finally Section 5 concludes this paper and draws the lines for future
work.
:TrustedServer
:ApplicationServer
4 1
Legende
Fig. 1. The Pervasive Health System Logic Architecture and the Security Interfaces
Data Gateway connector that accepts HTTPS requests. The MI component col-
lects the physiological data of the patient and delivers such data to the AE
component and to the PMS component.
The AE component utilises logic programming to model intelligent agents that
filter the data submitted to the PMS and provide alerts in case of significant
events, such as a possibility of preeclampsia in the patient or a high level of blood
sugar that requires a treatment adjustment. The AE system is subdivided in cells
associated to an area of a real city where the patients connect with their mobile
phones to produce their physiological data, that are then evaluated by intelligent
agents. The patients are represented in the AE as avatars that can communicate
to a personal intelligent agent, embodied in the AE. This representation of the
patient is convenient as we can reuse the AE communication and notification
facilities to interact with the intelligent agents situated in it. To every patient
avatar we associate an intelligent agent whose cognitive architecture will be
explained later in this Section. Finally the PMS allows the doctors to visualise
the patient’s data, to modify its treatment and to visualise the alerts produced
by the AE.
The three tier logic architecture shown on the top of Fig. 1 translate then to a
four tier architecture as shown on the bottom of Fig. 1. In particular, the mobile
phone and the Web browser represent the presentation layer, the reverse proxy
and the Web server represent the Web application layer, the agent environment
represents the business logic layer while the database represents the data layer.
An Agent Based Pervasive Healthcare System: A First Scalability Study 131
The Web application layer accepts outside secure connections only on the
HTTPS port. It connects business logic and data layers. Caretakers and patients
use client authenticated HTTPS to connect to the system. A second authentica-
tion factor is provided by the combination of user name and password. Internal
components use local in-memory or mutually authenticated TLS connections to
communicate with each other. The data base partition is encrypted to protect
against physical access to the hard disk. User access to resources is restricted
by membership in one of the three groups users, caretakers and administrators.
Access to patient data is further restricted by an access control list which only
allows caretakers who treat a patient to access this patient’s data. All actions
are logged including IP address, user name, resource and success of the action
to provide an audit trail.
In the particular case of our PHS, the patients are represented in the AE as
avatars that can communicate with a personal caretaker agent, whose architec-
ture is reported in Fig. 3. Every agent is deployed in GOLEM in a container.
A GOLEM container represents a portion of the distributed agent environment
which in this case is associated with a portion of the real environment, in order
to distribute the load of the requests of the patients. This topology was chosen
because we imagine that this system could work in synergy with the actual cel-
lular network. As described in [2], every caretaker agent has a cognitive model
with a deductive and an abductive part, whose specification is shown in Fig. 3.
The deductive rules are specified in Event Calculus [8], to describe the evo-
lution in time of the patient physiological values. Such rules specify how the
treatment of the patient should evolve. For example rule R6 specifies that, when
the patient had high glucose in the postprandial observations, then the agent
suggests to introduce further preprandial observations. Similarly, if the patient
is already in a 6 checks per day regime, then the agent suggests the doctors
to introduce a slow insulin in the morning to tackle the values that are out
range. The abductive rules take into consideration the symptoms of the patient
to provide alerts of macrosomia or preeclampsia to the doctors. In particular,
for preeclampsia, we also provide the probability of adverse outcome using the
fullPiers model [14], also reported in Fig. 3. To be able to provide this probabil-
ity, the agent connects to the PMS using the GOLEM middleware to download
the blood samples needed by the fullPiers model and introduced in the system
An Agent Based Pervasive Healthcare System: A First Scalability Study 133
through the PMS. Further details about the agent cognitive model and its ac-
curacy are reported in [2] and we refer the interested reader to this publication.
The Patient Management System allows healthcare professionals to visualise
and analyse data as well as to introduce new data gathered during a patient’s
visit. The PMS is a hybrid application incorporating both elements of a clas-
sic server side Web application and a modern AJAX-powered client side Web
application.
3 Evaluation
To evaluate our solution, we measured the performance for HTTPS requests
with different requirements on the application and database. Our goal in evalu-
ating our PHS was to understand if the system could support the traffic load of
134 J. Krampf et al.
the patients of an hospital of a medium sized city, such as the city of Lausanne
in Switzerland, where we plan to perform field tests. Also, another goal of this
evaluation is to understand what is the maximum amount of patients that we
can serve before having to introduce load balancing techniques in the PHS. We
therefore perform our evaluation on those components representing a bottleneck
of the current architecture. We do not perform an evaluation on the agent en-
vironment as this is based on the GOLEM platform, whose performances have
been previously evaluated in [3], showing that the system can scale up with the
number of GOLEM containers spawned for the application. For the tests, we
ran our PHS on a 3 GHz Intel Core 2 Duo processor, 4 GB RAM and Ubuntu
10.04.
!
"! !
The tests were performed using the ApacheBench [1] utility, which works by
performing a defined number of requests to a specified URL and measuring vari-
ous values such as response time or transferred bytes for each request. After fin-
ishing the benchmark, ApacheBench shows a statistical analysis of all requests,
showing transfer rate and mean time per request. To prevent the benchmark
utility from influencing the results, it was executed on a notebook with a 1.6
GHz Intel Core 2 Duo processor, 1 GB RAM running Linux with a direct cable
connection to the server, to minimise influences caused by network latency. We
tested different usage scenarios stressing different parts of the system. All re-
quests were executed at 1 to 100 concurrent requests to simulate different usage
load. Values were recorded during a 60 seconds stress testing period.
The curves on the left of Fig. 5 show the response time to different concurrent
calls performed in the system. In particular, we show the time to: retrieve the data
for glucose in the PMS; retrieve a patient history; insert glucose values from the
mobile phone; retrieve a patient summary page; access the login page and patient
page. We also assume that concurrent calls coming from different patients are dis-
tributed in different cells of the agent environment. The requests per second values
increase with higher concurrency levels until a plateau is reached. At this point
the server becomes overloaded and the response time increases. The graph of re-
quests to the login page shows the plateauing behaviour when reaching about 1400
An Agent Based Pervasive Healthcare System: A First Scalability Study 135
requests per second. By looking at the detailed values we discovered that the re-
sponse time increase between 400% and 500% when comparing 20 and 100 concur-
rent connections while the processed requests per second are virtually unchanged.
The curves on top of Fig. 5 also show the plateauing behaviour of the requests with
database activity. The maximum value for requests per second is reached between
10 and 20 concurrent requests. This suggests a database related limit in concur-
rency. When increasing the concurrency from 10 to 15, the glucose insertion from
the mobile phones experiences a sharp fall from 130 to 20 requests per second.
The message queue in the Web service data gateway interface is the limiting fac-
tor here: messages are acknowledged in order to ensure message delivery and with
many concurrent requests messages cannot be acknowledged fast enough.
The 90th percentile response time charts on the right of Fig. 5 show the
expected maximum response time for 90% respectively of all requests. The re-
sponse time begins to be above 1 second and noticeable by a user at about 50
concurrent requests for requests with medium database activity and at about 15
concurrent requests for database heavy requests.
Each patient will transmit a number of values each day: Twice daily blood
pressure and four to six times blood sugar. Furthermore, the patient will trans-
mit one weight value per week and she will report symptoms when she experi-
ences them. We are interested in the maximum number of requests in a short
time period and will make the pessimistic assumptions that during one second
of usage of her mobile phone the patient transmits symptoms, blood pressure,
blood sugar and weight at the same time in the morning. The maximum num-
ber of requests/second for a user is therefore 4 requests/second. The worst case
scenario is all 10 patients of a planned pilot study making their 4 requests con-
currently in the same second, leading to 40 requests/second with 10 concurrent
connections. When producing Fig. 5 we found that the system is capable of 132
requests/second for a concurrency level of 10. As at the Lausanne University
Hospital, that serves the Canton Vaud in Switzerland, there are a maximum
of 5–6 patients with GDM at the same time, the system we defined is viable to
deal with the load experienced by a big sized university hospital. To estimate the
maximum number of users the system can serve, we modify our assumptions to
assume an uniform distribution of the 4 requests over the course of 30 minutes.
We will furthermore use 20 requests/second as the system’s performance due to
performance drop off at higher concurrency levels. This results in about 0.002
requests/second per user (Eq. 1) and 9000 patients (Eq. 2) with 20 concurrent
connections (Eq. 3). This allows us to consider usage for the whole canton Vaud.
The canton has a population of 700,000 [11] and 9.4 births per 1000 inhabitants
per year. This results in 6580 births per year (Eq. 4) which means that the
system can theoretically monitor all pregnant women in the Canton of Vaud.
4 request × user 1 request × user
= (1)
30 ∗ 60 second 450 second
4 Related Work
From the related work stand point, several attempts have been done in the past
to combine agent technology with the healthcare domain. The systems described
by Huang et al. in [7] and by Hammond and Sergot in [6] use symbolic reasoning
over clinical workflows to manage oncological patients within a healthcare in-
stitution and to simplify the management of clinical trials. Larson et al present
Guardian in [9], an early attempt to provide an agent-based system for medical
monitoring and diagnosis. Guardian uses a tuple space based approach where
cognitive agents with a properly programmed knowledge base, provide a diag-
nosis for situations such as liver failure and hypothermia. In [4] Ciampolini et
al present a distributed MAS to deal with distributed diagnosis performed by
heterogeneous distributed abductive agents. In Ciampolini’s approach the di-
agnosis is provided in term of probabilities, although they do not consider a
realistic model for their experiments. The ASPIC project [5] has developed an
architecture based on argumentation theory for an autonomous agent that single-
and multi-agent healthcare applications can use. Evaluation scenarios focus on
the management and treatment of people with heart disease. With respect to
the systems reported above, our contribution is twofold: first of all we devel-
oped a practical system that takes into consideration scalability and security
issues following the needs of medical doctors at Lausanne University Hospital;
secondly, for our intelligent reasoning agents, we also utilise clinical models like
the fullPiers [14], whereas the systems mentioned above lack this approach.
References
1. ApacheBench, http://httpd.apache.org/docs/2.2/programs/ab.html
2. Bromuri, S., Schumacher, M., Stathis, K., Ruiz, J.: Monitoring gestational dia-
betes mellitus with cognitive agents and agent environments. In: Proceedings of
the 2011th IEEE/WIC/ACM International Conference on Intelligent Agent Tech-
nology (IAT 2011) (August 2011)
An Agent Based Pervasive Healthcare System: A First Scalability Study 137
3. Bromuri, S., Stathis, K.: Distributed Agent Environments in the Ambient Event
Calculus. In: DEBS 2009: Proceedings of the Third International Conference on
Distributed Event-based Systems. ACM, New York (2009)
4. Ciampolini, A., Mello, P., Storari, S.: Distributed medical diagnosis with abductive
logic agents. In: ECAI 2002 Workshop on Agents in Healthcare, Lione (2002)
5. Fox, J., Glasspool, D., Modgil, S.: A canonical agent model for healthcare appli-
cations. IEEE Intelligent Systems 21, 21–28 (2006)
6. Hammond, P., Sergot, M.: Computer support for protocol-based treatment of can-
cer. The Journal of Logic Programming 26(2), 93–111 (1996)
7. Huang, J., Jennings, N.R., Fox, J.: Agent-based approach to health care manage-
ment. Applied Artificial Intelligence 9(4), 401–420 (1995)
8. Kowalski, R., Sergot, M.: A logic-based calculus of events. New Gen. Comput. 4(1),
67–95 (1986)
9. Larsson, J.E., Hayes-Roth, B.: Guardian: An intelligent autonomous agent for med-
ical monitoring and diagnosis. IEEE Intelligent Systems 13, 58–64 (1998)
10. Serlin, D.C., Lash, R.W.: Diagnosis and management of gestational diabetes mel-
litus. Am. Fam. Physician 80, 57–62 (2009)
11. Swiss Statistics. The population of Switzerland 2009 (2010),
http://www.bfs.admin.ch/bfs/portal/en/index/themen/01/22/
publ.Document.136821.pdf
12. Varshney, U.: Pervasive Healthcare Computing: EMR/EHR, Wireless and Health
Monitoring. Springer Publishing Company, Incorporated (2009)
13. Vogel, N., Burnand, B., Vial, Y., Ruiz, J., Paccaud, F., Hohlfeld, P.: Screening
for gestational diabetes: variation in guidelines. Eur. J. Obstet. Gynecol. Reprod.
Biol. 91, 29–36 (2000)
14. von Dadelszen, P., et al.: Prediction of adverse maternal outcomes in pre-eclampsia:
development and validation of the fullPIERS model. Lancet 377, 219–227 (2011)
15. Wooldridge, M.: MultiAgent Systems. John Wiley and Sons (2002)
An Agent-Based Approach to Real-Time Patient
Identification for Clinical Trials
1 Introduction
Clinical trials are the gold standard by which medical research is evaluated.
They are used to study various aspects of medical science, as well as being a
vital stage in the deployment of new drug treatments. Currently, however, such
trials are frequently unsuccessful at recruiting sufficient patients. A review of the
UK Medical Research Council found that only 31% of trials actually recruited to
their planned target, with 30–40% of costs arising during the recruitment phase
alone [1]. This is because discovering and contacting eligible potential recruits is
both logistically and legally challenging. Consequently, many research projects
take far longer to complete than is desirable, resulting in an unnecessary burden
for those who could potentially benefit from the results.
The main challenge for patient recruitment lies in locating and contacting
patients in a sufficiently timely manner to allow them to participate. However,
the ease with which this can be done varies dramatically with the type of trial;
for instance, recruitment can be challenging for trials that have high recruit-
ment targets or complex eligibility criteria. Currently, recruitment is performed
in a highly laborious manner, which is ill-suited to the above situations. It often
involves a human recruitment agent visiting clinics in an attempt to locate suit-
able patients (e.g. asking practitioners or searching local medical records). This
creates significant overhead as it is both slow and costly, as well as non-scalable
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 138–145, 2012.
c Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
An Agent-Based Approach to Real-Time Patient Identification 139
for most trials. For example, a trial investigating rare ailments might need an
extensive number of visits to locate sufficient patients.
In consequence, it is of paramount importance to address the recruitment
challenges within trials to ensure the future efficacy of medical research. It is
therefore necessary to find a scalable way by which eligible patients can be
discovered. To address this, we propose replacing human agents with software
agents that permanently reside within clinics, with the aim of searching for
patients who might satisfy trial eligibility criteria. Through this, the agent could
inspect patient information in real-time to ascertain eligibility before presenting
notifications to local practitioners. Importantly, by using a software agent this
could be done rapidly within a consultation before a patient has left, thereby
shortening the recruitment lifecycle (as well as enabling trials based on incidental
cases). The paper’s contributions are therefore as follows:
– A critique of existing clinical trial recruitment approaches, highlighting that
current techniques are both slow and expensive.
– An agent-based distributed architecture called ePCRN-IDEA that enables
real-time recruitment of patients, whilst avoiding the key limitations of ex-
isting approaches.
– A procedure by which software agents can guide the recruitment of patients
to their most appropriate trials.
The rest of the paper is structured as follows; first the background to the research
is discussed in Section 2 before detailing the ePCRN-IDEA recruitment system
in Section 3. Following this, a discussion is presented in Section 4, alongside
future work and conclusions.
HealthAgents [7] went beyond MAID to also enable decision support, specifically
for diagnosing brain tumours. A range of agent-based systems have also been pro-
posed for handling distributed expertise. These includes using agents to enable
better communication between healthcare workers based on ambient informa-
tion, e.g. their role, location etc. [8], as well as using agents to remotely monitor
patients [9][10]. These systems also often involved data analysis; S(MA)2 D [10],
for instance, uses statistical analysis to cluster patients into similar groups. This
ability to scalably perform data analysis in real-time, clearly, also shows poten-
tial for enabling the type of eligible patient identification discussed previously.
Despite this, so far little work has been performed into using agents to improve
clinical trial recruitment. Consequently, the rest of this paper explores exploiting
the properties of agents to enable real-time recruitment of patients to trials.
3.1 Overview
The core goal of the ePCRN-IDEA recruitment system is to improve patient
recruitment. In order to do so, researchers must formally define the eligibility
criteria of participants, then distribute it to software agents that reside locally
on practitioners’ computers. These software agents listen to interactions between
the practitioner’s local Electronic Healthcare Record (EHR) database and the
user in an attempt to locate patients who are eligible for trials. Importantly,
this occurs in real-time during the consultation, thereby allowing a pop-up to be
generated, notifying the practitioner of the patient’s eligibility. In this way, the
patient can be instantly consulted regarding the trial and, if interested, recruited
via a web interface. The key architectural entities in the system are as follows:
– LEPIS: An agent that resides at primary care practices and investigates the
eligibility of any present patients, termed the Local Eligible Patient Identi-
fication Service.
– CCS: A point of storage and distribution that allows clinical researchers to
inject new trials into the system, termed the Central Control Service.
– CTMS: A website that handles the actual recruitment process once an el-
igible patients has been discovered, termed the Clinical Trial Management
System.
Prototype implementations of all these components have already been developed.
Fig. 1 provides an overview of these, as detailed in the rest of this section.
142 G. Tyson et al.
related to the patient. Whenever a patient enters a clinic, the practitioner opens
his or her medical record using the Electronic Healthcare Record (EHR) database
on their desktop computer. This medical record contains a range of demographic
and medical information about the patient, allowing practitioners to retrieve
information about the patient during the consultation, as well as enter new
information. This offers an existing platform through which a recruitment agent
can access information about patients. We have modified a popular EHR system,
Vision [12], to interact with LEPIS. Whenever a patient record is opened or
modified, the information is passed to LEPIS (through a standard file using a
shared XML schema) so that it can attempt to locate trials for which the patient
may be eligible. Information is coded using standard Read Codes and Multilex
Drug Codes to allow LEPIS and the EHR to understand each other. LEPIS
is therefore given real-time access to information about any patients who are
currently in consultation. Although, evidently, eligibility criteria is limited to
those attributes provided by the EHR, which can vary based on both policy and
EHR implementation (many EHR vendors exist).
Accessing Trial Information. To allow a LEPIS agent to compute a patient’s
eligibility, it must first gain access to trial information. Ideally, this should be
stored locally to enable real-time eligibility checks within a consultation. How-
ever, evidently, this is largely infeasible with the huge number of active trials run-
ning; e.g. clinicaltrials.gov currently lists well over 100,000 trials. Consequently,
it is necessary for each agent to independently select the most appropriate trials
for its clinic and practitioner. Each agent thus maintains a set of trials T of size
n, as limited by the host’s local resources. An agent therefore selects n based
on the capabilities of its host, by performing eligibility checks on a random set
of trials repeatedly for one second; n is then set as the number of iterations. It
then keeps a persistent record of all patient identifiers, Read Codes and Multi-
lex Codes provided by the EHR to build up a profile of the clinic. Using this
information, n trials are retrieved from the CCS through the following process:
1. LEPIS attempts to retrieve a set of n trials from the CCS containing:
(a) p trials that includes a known patient registered within the clinic (p =<
n);
(b) if p < n, c trials that includes coded information previously encountered
within the clinic (c =< n − p); and
(c) if p + c < n, r randomly selected trials (r =< n − p − c).
2. Remove any trials that are fully recruited.
These two steps are repeated throughout an agent’s lifetime with a configurable
interval, which is set to 24 hours by default.
Computing Eligibility and Generating a Popup. When LEPIS acquires
patient information from the EHR, it must compare it against the eligibility
criteria of any known trials. This is a simple process that currently involves
iteratively computing eligibility for each known trial and then selecting a random
one if multiple are found. A popup is then generated to notify the user. Fig. 2
shows a screenshot of the user interface.
144 G. Tyson et al.
this, we embed intelligence within the agents to learn how to best select trials
for their host clinic, exploiting the local knowledge (and computational abilities)
of each agent, rather than burdening a central point.
From our initial phase-1 prototype we have identified a number of future lines
of work. First, we aim to complete a full system deployment within the UK
primary healthcare system, thereby enabling a detailed quantitative evaluation.
Beyond this, we also intend to extend the agent capabilities. Key research lines
include, (i) inter-agent collaboration: allowing agents to build societies to better
enable information and resource sharing (e.g. based on disease areas, localities);
(ii) interface adaptation: allowing agents to learn (and share) the behaviour of
users to adapt interaction; and (iii) trial negotiation: allowing agents to negotiate
with each other to best distribute trials based on runtime conditions.
References
1. McDonald, A., Knight, R., Campbell, M., Entwistle, V., Grant, A., Cook, J., El-
bourne, D., Francis, D., Garcia, J., Roberts, I., Snowdon, C.: What influences
recruitment to randomised controlled trials? a review of trials funded by two uk
funding agencies. Trials 7(1), 9 (2006)
2. Embi, P.J., Jain, A., Clark, J., Bizjack, S., Hornung, R., Harris, C.M.: Effect of
a clinical trial alert system on physician participation in trial recruitment. Arch.
Intern. Med. 195(19) (2005)
3. Rollman, B.L., Fischer, G.S., Zhu, F., Belnap, B.H.: Comparison of electronic
physician prompts versus waitroom case-finding on clinical trial enrollment. Jour-
nal of General Internal Medicine 23(4) (2008)
4. Luck, M., McBurney, P., Preist, C.: Agent Technology: Enabling Next Generation
Computing (A Roadmap for Agent Based Computing). AgentLink (2003)
5. Wooldridge, M.: Introduction to Multiagent Systems. John Wiley & Sons, Inc.
(2009)
6. Cruz-Correia, R., Vieira-Marques, P., Costa, P., Ferreira, A., Oliveira-Palhares, E.,
Araújo, F., Costa-Pereira, A.: Integration of hospital data using agent technologies
- a case study. AI Commun. 18 (August 2005)
7. González-Vélez, H., Mier, M., Julià-Sapé, M., Arvanitis, T., Garcı́a-Gómez, J.,
Robles, M., Lewis, P., Dasmahapatra, S., Dupplaw, D., Peet, A., Arús, C., Celda,
B., Van Huffel, S., Lluch-Ariet, M.: Healthagents: distributed multi-agent brain
tumor diagnosis and prognosis. Applied Intelligence 30 (2009)
8. Rodrı́guez, M.D., Favela, J., Preciado, A., Vizcaı́no, A.: Agent-based ambient in-
telligence for healthcare. AI Commun. 18, 201–216 (2005)
9. Koutkias, V.G., Chouvarda, I., Maglaveras, N.: A multiagent system enhancing
home-care health services for chronic disease management. IEEE Transactions on
Information Technology in Biomedicine 9, 528–537 (2005)
10. Rammal, A., Trouilhet, S., Singer, N., Pécatte, J.-M.: An adaptive system for
home monitoring using a multiagent classification of patterns. Int. J. Telemedicine
Appl. 2008, 3:1–3:8 (2008)
11. Speedie, S.M., Taweel, A., Sim, I., Arvanitis, T.N., Delaney, B., Peterson, K.A.: The
primary care research object model (pcrom): A computable information model for
practice-based primary care research. Journal of the American Medical Informatics
Association 15(5) (2008)
12. Vision, http://www.inps4.co.uk/vision/
The Use of Social Bookmarking by Health Care Students
to Create Communities of Practice
Ed de Quincey, Avril Hocking, Josephine O’Gorman, Simon Walker, and Liz Bacon
Abstract. Teaching and learning health and social care in a digital age produces
many challenges for students and their teachers. A common hurdle for
healthcare students and practitioners is the sheer amount of information that
they have to make sense of. Another challenge is where this information is
captured and stored, with people utilising personal, as well as institutionally
owned devices. A potential solution to these problems is the use of social
bookmarking applications such as “delicious”, where users can create a
centralised repository of online resources, share them with other users, and view
what others are bookmarking. This paper describes research conducted at the
University of Greenwich involving 160 participants across three Schools and 5
modules, including Health and Social Care who were encouraged to integrate
social bookmarking into their learning and teaching. Participants were
instructed to tag their resources with an appropriate module code tag e.g.
NURS1297 so that a repository of module specific bookmarks was created.
Over a 4 month period, 160 users created 1430 bookmarks with 5032 tags.
Further analysis of the bookmarking behaviour is discussed along with
reflections on the suitability of social bookmarking to create digitally literate
health care communities of practice.
1 Introduction
A common problem for students studying health related subjects in Higher Education
(HE) is that they can access the web on any number of devices which do not
necessarily have automatic syncing of bookmarked web pages enabled. There is also a
related issue of sharing, as well as discovering relevant online resources [1]. A
potential solution to these problems is a social bookmarking application, where users
can create a centralised repository of bookmarked resources, share them with other
users and view what others are bookmarking. The popularity of these systems has
become of increased interest to information architects and has prompted a number of
studies into the use social bookmarking and the related field of collaborative tagging
[2],[3],[4]. Results from these studies suggest that tagging and bookmarking share
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 146–153, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
Social Bookmarking by Health Care Students to Create Communities of Practice 147
similar features to more traditional indexing systems [2] but also contain extra
dimensions such as tags related to time e.g. “toread” and task or users’ emotional
responses to a document e.g. “cool”, which conventional indexing systems do not
support [2].
One of the most popular online resources that supports social bookmarking is
“delicious”, a social bookmarking website which “allows users to tag, save, manage
and share web pages from a centralized source” [5]. The main advantage of these
services over traditional bookmarking systems such as those included in the majority
of web browsers e.g. “favorites”, is that the need for synchronizing bookmarks
between multiple computers and browsers is no longer required. This is a common
problem for students in HE, in particular those from health and social care courses
who are on placements and who access the web on any number of machines and
devices, in any number of locations. Although a number of browsers have bookmark
synching capabilities (either in-built or via plugins), this is often not available on HE
or NHS maintained machines due to security or privacy concerns. A related benefit is
the ability to categorise resources in multiple categories, by the use of tags, which is
only partially supported by web browsers in the form of “bookmark folders”. A
consequence of the use of tagging that is potentially useful for students, lecturers and
practitioners is the ability to discover and share resources via these tags. For example
tagging resources using the course codes of a degree program gives students a central
access point (e.g. http://delicious.com/tag/NURS1297) for all relevant online
information for that course. If all students then use the appropriate course code tag
when bookmarking during their own personal research, both students and lecturers
will collaboratively produce a list of online resources for that course.
This paper describes the results of a project that aimed to utilise the delicious
website to investigate the use of social bookmarking and tagging in an educational
setting by students and lecturers.
2 Research Questions
The main objectives for this project were to investigate the best methods for
integrating social bookmarking into everyday practice for both students and teachers,
and to then determine behavioral usage and motivations. The following were the
proposed research questions for the project:
1. What patterns of user tagging activity emerge through analyses of tagging
frequency and co-word analysis? (based on [2])
2. What patterns of user bookmarking activity emerge through analyses of the
resources bookmarked and the tags used to bookmark them?
3. What is the temporal distribution of bookmarking during an academic
semester?
4. What types of tags are being used i.e. do students/lecturers utilise task and
time related tags?
148 E. de Quincey et al.
The following section describes the two methods that were used to answer the
research questions described above.
3 Methodology
3.1 Participants
In total 160 people, comprising 5 lecturers and 155 students on 5 modules across the
Schools of Computing and Mathematical Sciences, Engineering and Health and
Social Care, participated in this study. Courses ranged from Masters (Level 7) to first
year undergraduate (Level 4) and comprised of around 10 students to over 100.
Students ranged from novice computer users to relative experts i.e. students who
already had an undergraduate computing related degree. Courses ran from various
points in September to the end of the semester in December 2010.
3.2 Materials
All students were provided with introductory materials, which were developed with a
pilot group, and delivered through lectures, tutorials and YouTube videos. These
resources introduced learners to the social bookmarking project and to the delicious
social bookmarking tool.
An initial interesting finding was the use of the term “bookmarking”. During the
first introductory talk to a group from the School of Health and Social Care, one of
the researchers compared “social bookmarking” to “browser based bookmarking”,
outlining the advantages and disadvantages of both approaches. It became apparent
however that students did not understand what “browser based bookmarking” was,
primarily due to the fact that the majority of students used Internet Explorer as their
default web browser, which utilises the term “favorites” instead of “bookmarks”1.
Following this, the term favorites was used in the introductory material, alongside
bookmarking, to avoid potential misunderstanding.
A further finding at this stage was the need for two different sets of instructions. A
step by step guide was produced with detailed instructions and screenshots of each
stage of the sign up, adding bookmarks and tagging resources process (totalling
around 14 pages). Although a number of students appreciated these materials, others
1
The term “bookmark” is used in the majority of other web browsers such as Firefox and
Chrome.
Social Bookmarking by Health Care Students to Create Communities of Practice 149
suggested that they would prefer a one-page set of instructions, which highlighted the
key stages, which was then produced.
3.3 Procedure
In September 2010, all lecturers introduced social bookmarking to their students using
the materials described above. The only prescribed usage was that students and
lecturers were instructed to tag any resources that were related to a particular module
with the appropriate module code e.g. NURS1297. This then enabled a module
specific set of resources to be created and made available at a single URL on the
delicious website e.g. http://delicious.com/tag/NURS1297. Students were encouraged
to use delicious to store and find useful resources for each module, with lecturers
employing a number of strategies to motivate continued use. These included the
production of a number of different visualisations via the tool described in section
3.3.1, as shown in figure 1 below which were shown to the students during lectures
and tutorials to demonstrate the course’s current bookmarking activity.
Fig. 1. Visualisation of bookmarking activity in the form of a tag cloud from NURS1297, a
course entitled “Principles of Learning Disability Nursing across the lifespan”
One particular advantage for researchers in this field is that in addition to a user
facing service, delicious also enables programmatic access to the information stored
on the site. This is enabled by an Application Programming Interface (API), which
supplies a number of XML/JSON based web services. This means that the collection
and analysis of users’ bookmarking and tagging behaviour can then be automated.
As described by Kipp and Campbell [2], the basic component of delicious is the
bookmark entry made by each user upon encountering a website of interest. In
addition to the URL of the website, the user can enter a title, some notes and a number
of tags. All of these details along with the username and the date the bookmark was
added can be accessed via the delicious API. An analysis package was therefore
created with PHP and MySQL that stored any bookmarks that were tagged with the
relevant module codes, along with the username, the additional tags, any notes and
the timestamp.
150 E. de Quincey et al.
4 Results
160 users across the 3 Schools created 1,430 bookmarks with 5,032 tags from August
2010 to the end of January 2011. A certain amount of agreement between respondents
was demonstrated with only 1,069 unique tags being used (21%) and the 1,430
bookmarks being comprised of 882 distinct url’s. 58% of bookmarks (829) contained
notes about the resource that had been added by the user. The figure below shows the
normalised temporal distribution of bookmarking activity for the duration of the
project. There were initial peaks of activity in August, with the pilot group and then in
September when social bookmarking was introduced to students in all of the modules.
In the first full week of the semester (w/c 27th September) 468 bookmarks were
created.
Activity gradually declined from the initial launch in September with 488
bookmarks being created in October, 180 in November and 71 in December (although
this includes the Christmas holiday). Although all of the modules stopped in
December, the delicious website was still being used by students with 42 bookmarks
being created in January 2011.
The types of tags used were dependent on the domain of the module but generally
give a good descriptive overview of the subject area of that discipline. For example,
Social Bookmarking by Health Care Students to Create Communities of Practice 151
when considering the co-word matrices for each tag, the tag “NURS1297”, relating to
the module “Principles of Learning Disability Nursing across the lifespan”, co-occurred
most frequently with the tag “learningdisabilities” (40 times). Within that module, other
frequently co-occurring tags were “communicationdifficulties”, “intellectualdisability”
and “learningdisabilities”.
The number of tags used per bookmark ranged from 1 to 17, the distribution being
shown in Figure 3 below. The majority of bookmarks (266) were tagged with a single
tag, with the average number of tags per bookmark being 3.5.
The following table shows numbers of users with how many bookmarks in total
they created e.g. 2 users created between 50 and 59 bookmarks.
Although the majority of users created between 1 and 9 bookmarks, over 59% of
users (94) created 5 or more tagged resources during the duration of the project.
Analysing the health related courses separately revealed similar activity levels and
behaviours to the results as a whole, across the 3 Schools.
saying they used delicious to share resources. Around 30% indicated that they used
delicious to find relevant resources. Interestingly only 49% found resources via the
module code tag with 77% finding resources via tags related to the module i.e. subject
related tags. Around 70% of students viewed other students’ bookmarked resources.
84% of respondents stated that they would use the delicious website again, with
89% of those students saying they would use it for University related activities.
Pleasingly, 70% of respondents said that they would recommend delicious to a friend
and 68% said they’d recommend it to other learners. 52% would recommend it to
professional colleagues. Although not a main objective of this project, 49% of
students felt that using delicious had improved their ICT skills.
The qualitative feedback generated from the questionnaire was generally positive,
relating to both storage and discovery of information.
The results from this study indicate that social bookmarking has a number of positive
outcomes with regards to teaching and learning, across a number of disciplines related
to eHealth. Students and lecturers found the tool to be useful for storing, sharing and
discovering resources. Through the process of using specific course code tags, both
students and lecturers have created their own learning communities or communities of
practice. The formation of these learning communities enables them to share
information relating to their own specific course subjects, with their peers. The year
on year building of a repository of information in effect provides students with an
online searchable database for its members to access [6]. It also provides students the
opportunity to discover and share the views and perspectives of their fellow members.
In this study, students were not limited to accessing their own learning communities;
there were opportunities for students to create and join other learning communities. This
was achieved by users utilising their own specific descriptive words when tagging (as
“module codes” were chosen in the project to establish learning communities), or by
joining existing ones. The latter can be achieved by the students finding others who use
identical tags as themselves, relating to the students’ own interest. This means
individuals can share resources with other ‘like minded’ people who have similar, or the
same interests [7]. Through the tagging process students can discover additional
resources that they may not have necessarily found themselves (77% of students
reported that they found resources in this way), thus leading to a group of people
forming their own learning community [6].
The advantages of learning communities include individual users being able to
access these groups at a time and place which is convenient to them, on a 24/7 basis.
In this study, students were not restricted as to when and where they could access and
use these learning communities, which became increasingly important when students
were on placements. Additionally, through the process of using “notes”, students can
share views with one another about the various resources users have bookmarked,
helping students to develop their critical evaluation skills.
It is noted however, the level and extent of participation as a member within each of
these learning communities is dependent on the individual. Some students chose only to
Social Bookmarking by Health Care Students to Create Communities of Practice 153
participate a few times, whilst others used their communities more often. Users do not
receive any feedback about whether their tagged resources have been used by others [6],
perhaps explaining why there are some who chose only to consume the resources rather
than contribute to the community. Although bookmarking activity decreased during the
duration of the project, a key indicator of success is the building of the repository itself,
as opposed to the number of contributors. The work of Ortega et al. [8] suggests that in
collaborative resource creation applications such as Wikipedia, there is a great level of
inequality “with less than 10% of the total number of authors being responsible for more
than the 90% of the total number of contributions”. From this study, supposing that
creating over 10 tagged bookmarks is a reasonable level of contribution, then 33% of
users achieved this level. If we reduce that level to 5 tagged bookmarks then 59% of
users have made an active contribution.
The utilisation of social bookmarking is an example of how learning communities
can be created where its members can store and share a collective range of resources
for others to share. This could be seen as encouraging not only the development of
learner independence and autonomy but a range of related graduate attributes which
are valued by employers. Further to this, the emergence of these communities
demonstrates how social interaction within health care subjects in HE is progressing.
Future work will include identifying specific improvements that could be made to
the delicious website and functionality that is currently missing e.g. improved support
for critical evaluation of resources. The project will be continued in the following
academic year with other modules as well as an investigation into how social
bookmarking can be used within VLE’s such as Moodle.
References
1. Jenson, J.: It’s the information age, so where‘s the information? Why our students can’t
find it and what we can do to help. College Teaching 52(3), 107–112 (2004)
2. Kipp, M.E.I., Campbell, G.D.: Patterns and Inconsistencies in Collaborative Tagging
Systems: An Examination of Tagging Practices. In: Proceedings of the 2006 Annual
Meeting of the American Society for Information Science and Technology, Austin,
November 3-8 (2006)
3. Kipp, Margaret E.I.: @toread and Cool: Tagging for Time, Task and Emotion. In: Proc.
Information Architecture Summit 2007 (2007)
4. Golder, S., Huberman, B.A.: The structure of collaborative tagging systems. HP Labs
Technical Report (2006),
http://www.hpl.hp.com/research/idl/papers/tags/
5. delicious.com (2011), http://delicious.com/about
6. Benbunan-Fich, R., Koufaris, M.: An empirical examination of the sustainability of social
bookmarking website. Information Systems E-Business Management 8, 1310148 (2010)
7. Mason, R., Rennie, F.: E-Learning & Social Networking Handbook: The resources for
Higher Education. Taylor & Francis (2008)
8. Ortega, F., Gonzalez-Barahona, J.M., Robles, G.: On the Inequality of Contributions to
Wikipedia. In: Proceedings of the 41st Annual International Conference on Hawaii
International Conference on System Sciences, p. 304 (2008)
Engagement in Online Medical Communities of Practice
in Healthcare: Analysis of Messages and Social Networks
1 Introduction
Professional communities of practice (CoPs) have been the cornerstone for sharing
scientific knowledge and professional discourse. The internet has dramatically
changed the way communication and peer networking is managed: little overhead and
flat structures, easy online recording of scientific discussions, higher frequency of
postings, and virtually unlimited geographical coverage of the CoPs. However, online
communities may be vulnerable to stagnation and failure if the support tools are not
suitable, or if key members of the community are not able to take an active role.
The term “community of practice” has many definitions, although it originates in the
work of Lave and Wenger [1]. We will use the definition of CoPs as “groups of
people who share a concern, a set of problems, or a passion about a topic, and who
deepen their knowledge and expertise in this area by interacting on an ongoing basis.”
[2] (also cited in [3]). CoPs may be deliberately created or spontaneously emerge, and
be highly structured or informal [3].
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 154–157, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
Engagement in Online Medical Communities of Practice in Healthcare 155
Fig. 1. The user networks extracted from FEM Wiki (left), and MSU (right). The nodes with
most connections are highlighted.
Fig. 2 shows the number of connections for each node in the networks, and Table 1
summarises some key statistics. Each network has a number of users who are
involved in many discussions; these seem to be mainly senior project leaders or
administrators. There is an almost linear decline to users who were only involved in
one or two discussions (possibly they only had a specific question that was answered
to their satisfaction). Although the networks that are extracted are not a complete
picture of the knowledge sharing activities in the communities (for example, members
may share knowledge in person or via other media and the network does not measure
the quality of contributions), it may give a reasonable approximation. Users with
many connections are involved in many discussions, and therefore may have more
knowledge and experience to share.
156 D. Fowler et al.
FEMWiki MSU
Nodes 23 20
Edges 73 62
Average Degree 6.348 6.200
Diameter 3 4
Average Path Length 1.798 1.816
Graph Density 0.289 0.326
3 Message Analysis
In addition to examining the connections between users, we also looked at the
characteristics of the messages. There were striking similarities between FEM Wiki
and MSU in the distribution of replies to messages. Table 2 shows that the majority of
posts have a small number of replies (the median is 2 for both communities). This
seems to be typical behaviour for online forums, e.g. [4].
Table 2. Summary statistics for the numbers of replies to FEM Wiki and MSU posts
We have shown that there are underlying similarities in the user network structure and
distribution of numbers of replies to posts of two independent online CoPs. The two
sites also vary in their organisational structures and editing processes, so these results
might suggest some properties that are shared more widely between online CoPs. This
should provide some useful lines of enquiry, although it will require access to data
from a larger number of online CoPs. We will also need to investigate how the
properties of CoPs vary with size, as our examples were both in the small to medium
range.
The type of analysis in this paper may be helpful in identifying users whose
contributions are critical to keeping an online community active. If such users become
less active (for example, through pressures of other work), there is a risk that the
community will stagnate, and lose other users. There is some evidence that this has
happened recently with the MSU site (although with MSU there was another possible
cause for loss of activity: a spam attack on the discussion forum may have driven
away some users).
We are interested in tracking the activity of online CoPs over time to see how the
user networks vary, investigating what factors may affect the activity, and whether
there is an identifiable “critical point” at which community activity breaks down. We
are currently redesigning the MSU site, and plan to promote the site again to existing
and prospective users in order to increase activity.
Finally, we plan to investigate the factors that affect the user response to forum
messages. Section 3 showed high level similarities, and it will be interesting to see
which types of posts attract most discussion, and to draw comparisons between sites.
References
1. Lave, J., Wenger, E.: Situated Learning: Legitimate Peripheral Participation. Cambridge
University Press, Cambridge (1991)
2. Wenger, E., McDermott, R., Snyder, W.M.: Cultivating Communities of Practice: A Guide
to Managing Knowledge. Harvard Business School Press, Boston (2002)
3. Hara, N., Shachaf, P., Stoerger, S.: Online communities of practice typology revisited.
Journal of Information Science 35(6), 740–757 (2009)
4. Mishne, G., Glance, N.: Leave a reply: An analysis of weblog comments, In: Third Annual
Workshop on the Weblogging Ecosystem (part of WWW 2006) (2006)
Towards Delivering Disease Support Processes
for Patient Empowerment
Using Mobile Virtual Communities
Bert-Jan van Beijnum, Pravin Pawar, Lamia Elloumi, and Hermie Hermens
1 Introduction
In the past decade, the European Union has, and still is, investing a lot in changing the
way in which health services are delivered. Telemedicine is seen as a solution for the
problems in current and future healthcare delivery. Originally started with remotely
monitoring of the health condition of patients with chronic diseases, the emphasis
today is becoming more on the self-management of patients. A project that embraces
this vision is the BraveHealth project [1]. This project targets patients with chronic
cardiovascular diseases, these diseases have the highest contribution to the European
mortality rate (about 2 million per year), and account for about 192 billion Euro in
health expenditure and about 270 million lost working days.
This paper leverages on our previous work [2] in which the research challenges
and opportunities for the mobile virtual communities (MVC) in telemedicine are
described. In this paper we outline the vision for CVD patient empowerment using
MVCs. E-Support Groups or virtual communities for patients exists already for some
time. These virtual communities mostly focus on emotional support and informational
support. In this paper, we focus on the MVCs for CVD patient empowerment
including instrumental and feedback support as well.
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 158–161, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
Towards Delivering Disease Support Processes for Patient Empowerment Using MVC 159
2 Related Work
Today, many dedicated virtual health communities exist, we have found over 40
different sites (English language only). Patients Like Me [3] is a social network for
patients, the focus of this network is on giving and receiving support and information
from the peers with similar health profiles. Face To Face Health [4] is a social
network to find and connect patients with similar health experiences on a one-to-one
basis. Main objective is to support storytelling and share experiences. IBM’s Patient
Empowerment System [5] is based on, and extends IBM’s long tradition in the
medical sector. The IBM vision is to merge the medical network with a social
network in order to empower patients. DailyStrength [6] is a social network website
where patients provide one another with emotional support by discussing their
struggles and successes with each other. The site contains multiple online
communities that deal with different medical conditions or life challenges. Medical
professionals are also available to contact and treatments for a variety of illnesses and
problems on some of the sites listed above. The virtual community sites we
investigated focus on providing emotional and informational (peer) support.
• Community member roles: The platform must support user roles relevant for
providing support, e.g. patient, cardiologist, nurse, practitioner, relative and friend.
Also, creation of new roles and associated access rights must be supported by the
platform.
• Access: The MVC platform must be accessible using devices that have become
standard today, hence including smart phones and tablets. Human-machine
interfaces must adapt according to device capabilities.
• Language: the MVC platform must support multiple languages.
• Ease-of-use / usability: The user-interface must be intuitive and easy to use. User
role, skills, age, gender and any disability may affect the user-interface requirements.
• Information access control: Users must be able to audit who may access their
health related information and they must be able to exercise control over who is
allowed to see their health related information.
160 B.-J. van Beijnum et al.
Regarding the logical architecture of the MVC, we adopt the well-known and proven
three-tier architectural pattern. To provide all the intended MVC disease support
processes, we identified the need for the following modules:
• MVC Platform Management: This module is responsible to provide functionalities
for managing the platform. The platform management tasks include deployment of
community services, platform performance monitoring and platform auditing
functionalities.
• MVC Template Management: The platform needs to be able to accommodate
multiple communities, based on disease facets and required support type. Through
this module new templates can be defined which are to be instantiated in order to
create a community. The community template specifies roles and services that are
to be part of communities and the rules that govern the operation and service use.
• MVC Generics: The MVC generics refers to the services that can be reused in
different contexts. E.g. chat capabilities, the management of publication (for the
purpose of information support or for educational purposes) are generic services
that may appear in various communities.
• Specific MVCs: Based on the above modules, dedicated communities are created
to address specific disease facets. These communities may be enhanced with new
functionalities specific for the disease facet addressed.
Towards Delivering Disease Support Processes for Patient Empowerment Using MVC 161
6 Discussion
References
1. Bravehealth: Patient Centric Approach for an Integrated Adaptive, Context Aware Remote
Diagnosis and Management of Cardiovascular Diseases, http://bravehealth.eu
2. Beijnum, B.J.F., van Pawar, P., Dulawan, C., Hermens, H.: Mobile Virtual Communities
for Telemedicine: Research Challenges and Opportunities. International Journal of
Computer Science & Applications 6(2), 38–49 (2009)
3. Patientslikeme, http://www.patientslikeme.com/
4. FacetoFaceHealthCommunity, http://www.facetofacehealth.com/
5. Made in IBM Labs: IBM Reinvents the Patient Portal (March 2011),
http://www-03.ibm.com/press/us/en/pressrelease/33944.wss
6. DailyStrength, http://www.dailystrength.org/
7. Fedele, F., Sterfanis, P.D., Ribeiro, V.: Application Scenario Studies, BraveHealth project
Deliverable 1.1 (September 2010),
http://bravehealth.eu/pdf/Deliverable%201.1%20Application%20
Scenario%20Studies_FINAL.pdf
8. Tardy C.H.: Social Support Measurement. American Journal of Community Psychology
13(2) (1985)
9. van Uden-Kraan, C.F., et al.: Self-Reported Differences in Empowerment Between
Lurkers and Posters in Online Patient Support Groups. Journal of Medical Internet
Research 10(2) (2008)
10. Maloney-Krichmar, D., Preece, J.: A Multilevel Analysis of Sociability, Usability, and
Community Dynamics in an Online Health Community. ACM Transactions on Computer-
Human Interaction 12(2), 201–232 (2005)
11. Dickstein, K.: ESC Guidelines for the diagnosis and treatment of acute and chronic heart
failure 2008. European Heart Journal 29, 2388–2442 (2008)
E-Health Readiness Assessment for E-Health Framework
for Africa: A Case Study of Hospitals in South Africa
Abstract. This study assessed e-healthcare readiness of rural and urban hospitals
in North West Province of South Africa. Outcome of assessment led to creation
of e-health architectural framework for e-health solutions. Assessment was
conducted in usage of ICT in patient healthcare record system, processes and
procedures in consultation among healthcare professionals, prescription of
medication, referral of patients and training of healthcare professionals in ICT
usage. The study was in two phases and six hospitals were selected. E-healthcare
readiness assessment focusing on need, technological, engagement and social
acceptance readiness were assessed. Data collected used group interviews and
qualitative questionnaires. Findings showed that computers were not used for
clinical duties and no e-health solutions were found. E-health Maturity Level
was at level zero. Recommendations and compilation of Provincial E-Health
Framework (PEHF) were made. The findings were unexpected and therefore, of
great benefit to healthcare institutions which intend to implement e-health
initiatives in hospitals.
1 Introduction
HIV pandemic in most African countries has not only caused considerable strain on
various national healthcare systems, but has increased the number of orphans, reduced
productive human capital and productivity, eroded knowledge and skills, put pressure
on national budgets, increased the poverty-stricken populace and reduced the quality
of life, health and wellness[1]. E-health as one of the supportive systems within the
healthcare system has great potential to address the challenges facing healthcare
systems in developing countries. The recognition of Information and Communication
Technology (ICT) in healthcare is not an end unto itself but a means to an end. The
successful introduction of ICT in healthcare requires the examination of complex
political, organisational and infrastructural factors, including a readiness factor [2].
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 162–169, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
E-Health Readiness Assessment for E-Health Framework for Africa 163
The White Paper on transformation of the public healthcare system in South Africa
(SA) reveals that majority of the population has inadequate access to basic healthcare
services and that the greater percentage of this population lives in rural communities
[3].The White Paper also indicates that majority of South Africans receive their
medical care from government-run clinics and hospitals [4]. The North West Province
Health Department (NWPHD) has invested substantial sums of money in the district
and provincial health services, health facilities management and healthcare support
services, including ICT, in an effort to improve the work processes of healthcare
professionals in order to promote efficient delivery of healthcare services. Despite the
high investment in the healthcare system, many healthcare professionals in NWP do
not receive the benefits for which ICT can provide to improve on their work
processes.
This article reports on how ICT can be used to promote efficiency in the work
processes within the hospitals to deliver quality healthcare services to the people in
North West Province (NWP). To operationalise this objective, an e-health readiness
assessment of rural and urban hospitals was conducted. Outcome of the assessment
led to compilation of e-health framework to improve healthcare professionals’ work
processes. The assessment investigated effective and efficient use of ICT in patient
record systems, processes in consultation, prescription, referrals and training.
This research has contributed to the body of knowledge in e-health in two ways.
Firstly, a set of recommendations has been drawn from the research data to help
bridge the gap between current levels of ICT usage in healthcare to attain a higher
level where there is integration of e-health adoption in the hospitals. Secondly, a
PEHF for the hospitals in NWP has been compiled, based on the data drawn from the
research.
The World Health Organization [5] defines e-health as ‘being the leveraging of ICT to
connect providers, patients and governments; to educate and inform healthcare
professionals, managers and consumers; to stimulate innovation in healthcare delivery
and health system management and to improve our healthcare system’. Eysenbach [6]
refers to e-health as ‘a concerted effort undertaken by leaders in healthcare and hi-
tech industries to fully harness the benefits available through convergence of the
Internet and healthcare’. The advent of e-health seems fitting to address both
opportunities and challenges in the healthcare sector but the question is, are hospitals
in NWP ready to embrace the full potential of e-health?
Currently there are six assessment models which are commonly used to assess e-
health readiness in the health environment. These models [3], [8], [7], provide
different dimensions which can be utilized in assessing e-healthcare readiness. These
are core readiness, engagement readiness, structural readiness and non-readiness.
Another component, Technology Acceptance Model [9], is included for use in
developing countries, especially in rural areas. The principal components adopted for
this e-health readiness assessment included technology acceptance construct which is
vital to the introduction of any technology in rural hospitals.
164 A. Coleman, M.E. Herselman, and D. Potass
2 Methods
Qualitative research design employing a multiple case study approach was used. Data
from selected urban and rural hospitals were collected, using group interview and
qualitative questionnaire. The questionnaire instrument was used in addition to the
group interview because it promoted reliability and validity of the data. The data were
analyzed by utilizing [10] case study analysis template and [11] guidelines for case
study analysis. The group interview and questionnaire items were formulated in
accordance with the categories of background/history of hospitals, hospital
infrastructure, ICT access level, including ICT availability, accessibility and usability;
and e-health solutions including availability, accessibility and usability.
There are five regions in the province and all the regions were taken into account
by selecting a hospital from each region. The selected hospitals were Rustenburg,
Taung, Ganyesa, Klerksdorp, Christian and Reivilo Hospital. Rustenburg and
Klerksdorp Hospitals are urban hospitals while Taung, Christiana and Reivilo
Hospitals are rural hospitals.
2.1 Participants
A purposive sampling was applied to select respondents from the hospitals in order to
achieve the goals of the study. A total of 48 respondents were selected. The selected
respondents from each hospital had the following categories: 2 administrators, 2
general doctors, 2 professional nurses and 2 assistant nurses. The respondents were
informed prior to the group interviews and the completion of the questionnaires that
participation in the research was voluntary and that any information provided would
be treated as confidential.
Group Interview
A group interview was conducted in each hospital. The interviewees were of diverse
age, ethnicity, gender and educational levels. The purpose of the interview was to
determine how the healthcare professionals perceive the usefulness and potential
benefits of e-patient record, e-prescription, e-consultation, e-referrals and e-training
systems. The interview questions are attached to the full research report.
Questionnaire
The questionnaire instrument consisted of two sets of questions. The first set of
questions was administered to hospital administrators whilst the second was for
general doctors, nurses and assistant nurses. The purpose of the first set of questions
was to establish the background history, the settings of the hospitals and the existing
ICT infrastructure in these hospitals. The second set of questions was to establish
baseline data for processes and procedures in keeping patient health records,
consultation among healthcare professionals, prescription and referral processes. The
questions were drawn from e-health readiness assessment framework [9].
E-Health Readiness Assessment for E-Health Framework for Africa 165
3 Results
This section presents the findings and proposes some recommendations which served
as guiding principles for the development of e-health solution.
collect medication from multiple hospitals with duplicate paper prescription. One
respondent stated, “It will eliminate ghost patients and before a patient arrives at the
pharmacy, the pharmacist will have the information about the patient”.
It emerged that referrals of patients from a lower level hospital to a higher level
hospital were done through the use of paper notes. Patients are given referral letters
(except in emergency cases) which they take to the referred hospital. Patients often
misplace these letters and end up not going to the referred hospital. One participant
indicated, “E -referral will help because you refer patients but on the way they get lost
or don’t go. If it is done electronically, the referred hospital will know that such a
time we expect this patient”.
There is Internet facility in both urban and rural hospitals but the Internet is limited
to searching information and sending e-mails. Both urban and rural hospitals have
PAAB system which is used to collect and send patient demographic information to
NWPHD’s head office monthly. Urban hospitals have tele-radiography facility which
is used for sending x-ray images between Klerksdorp and Rustenburg Hospitals.
4 Discussion
Source: [14]
Figure 1 illustrates that the level of e-health application in rural hospitals is at the
Presence stage which is classified as Level 0 (The baseline). At this stage there is a
non-interactive website where the main intent is to disseminate information. Thus,
rural hospitals are able to receive and send information from and to NWPHD through
e-mails and the PAAB system.
The level of e-health application in urban hospitals is at the Interaction stage which
is also at Level 0 (The baseline). However, the Interaction stage offers services that
are more advanced than the Presence stage. Thus, urban hospitals are able to send and
receive x-ray images through the tele-radiography facility. Despite the availability of
these ICT infrastructure facilities, the ICT systems are not integrated to be able to
work together across departmental and organizational boundaries to use information
that has been provided by the patient.
A major setback which became evident is that despite the availability of the ICT
facilities and other ICT infrastructure in both urban and rural hospitals, the ICT
systems are not integrated to work together within and across the hospitals to allow
healthcare professionals to gain the benefits of e-health solutions and applications.
These findings place both rural and urban hospitals at Level 0 on the E-Health
Maturity Curve (cf Fig1). Therefore, it is imperative that a special e-health framework
be compiled based on these findings to move the e-health application usage in these
hospitals from Level 0 to Level 2 (Healthcare 2.0) on the E-Health Maturity Curve by
ensuring that Level 1(Integration) is effectively and efficiently achieved. Therefore,
the PEHF was compiled (cf Fig 2).
168 A. Coleman, M.E. Herselman, and D. Potass
6 Conclusion
Having reviewed the literature on e-health and e-healthcare assessment, conducted the
e-healthcare assessment in the selected hospitals, and considering the findings derived
from the hospitals’ assessment, this article provides the following conclusion:
• ICT infrastructure in both urban and rural hospitals is not integrated to work
together within and across hospitals to allow healthcare professionals to gain
the benefits of e-health solutions and applications
• E-health applications in the work processes in the hospitals are at the
Presence and Interaction stages on E-Health Maturity Curve which is Level 0
(The Baseline).
Based on the above conclusion, the following recommendations are made:
• ICT systems within each hospital and across hospitals in NWP need to be
integrated in order to facilitate e-consultation by using an integrated network
which will assist healthcare professionals to consult with peers and
specialists for professional advice and information; and
E-Health Readiness Assessment for E-Health Framework for Africa 169
References
1. Botswana Government: Status of the National Response to the UNGASS Declaration of
Commitment on HIV/AIDS. National Aids Coordinating Agency, Gaborone (2003)
2. Jennett, P., Jackson, A., Healy, T., et al.: A Study of a Rural Community’s Readiness for
Telehealth. J. Telecare 9, 259–263 (2003)
3. Department of Health (DoH). Documents and Reports.: North West Department of Health,
http://www.nwhealth.gov.za/nwhealth_web/doc_reports.php
4. Rasmeni, M.: Budget Speech for the Department of Health for the Financial Year
2007/2008. Presented by the MEC for Health, at the North West Provincial Legislature,
http://www.nwhealth.gov.za/nwhealth_web/dir_prog.php
5. World Health Organization (WHO).: Developing Health Management Information
Systems: A Practical Guide for Developing Countries, Geneva (2004)
6. Eysenbach, G.: What is e-Health? J. Med. Internet Research 3(2), 20 (2001)
7. Campbell, J.D., Harris, K.D., Hodge, R.: Introducing Telemedicine Technology to Rural
Physicians and Settings. J. Fam. Pract. 50, 419–424 (2001)
8. Demiris, G., Oliver, D.R.P., Porock, D., Courtney, K.: Home Telehealth: The Missouri
Telehospice Project: Background and Next Steps. Home Health Care Technology
Report 1(49), 55–57 (2004)
9. Ojo, S.O., Olugbara, O.O., Emuoyibofarhe, O.J.: Formal Model for e-Healthcare
Readiness Assessment in Developing Country Context. In: 4th International Conference on
Innovations in Information Technology, IIT 2007 (2007)
10. Creswell, J.W.: Qualitative Inquiry and Research Design, 2nd edn. Choosing among Five
Approaches. Sage Publications, London (2007)
11. Klein, H.K., Myers, M.D.: A Set of Principles for Conducting and Evaluating Interpretive
Field Studies in Information Systems. Management Information Systems Quarterly 23(1),
67–94 (1999)
12. United Nations Framework Convention on Climate Change (UNFCCC).: Development
and Transfer of Technologies. In: Workshop on Enabling Environment for Technology
Transfer, http://www.unfccc.int/resource/docs
13. Nkqubela, L.R., Herselman, M.E.: ICT Application as E-health Solutions in rural
Healthcare in the Eastern Cape of South Africa. Health Information Management J. 39(1)
(2010)
14. Jarvis, B., Fortunov, I., Bachour, T.: Connect Health Framework Architecture and Design
Blue Print, http://www.microsoft.com/.../articles
The Physical Activity Loyalty Card Scheme:
Development and Application of a Novel System
for Incentivizing Behaviour Change
1 Introduction
The prevalence of physical inactivity, rising obesity levels and associated health
conditions in children and adults is rising [1,2,6]. A continuing trend of a more
sedentary lifestyle has led to stark projections of future prevalence of obesity,
morbidity and mortality [1,2,12]. Recent European figures show that only 31%
of adults currently meet the physical activity recommendations [16]. This level
of inactivity has directly contributed to the rising rate of obesity worldwide. In
the UK, most adults are already overweight and by 2050, 60% of men and 50%
of women could be clinically obese, costing an extra £45.5 billion per year in
treating obesity-related disease [5].
More innovative interventions are required to halt the global increase in phys-
ical inactivity and obesity by sustaining healthy lifestyle behaviours for all
ages. “Nudging” and using incentives to promote positive, long-term healthy
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 170–177, 2012.
c Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
The Physical Activity Loyalty Card Scheme 171
Nudging is not new and draws on behavioural economics and social psychol-
ogy to explain why people may behave in ways that deviate from rationality,
invoking various mechanisms of behaviour change including the changing of de-
fault options, message framing and the provision of social norm feedback. Given
the vicious cycles that confound our attempts to change our behaviour [18], it
is not surprising that a recent framework has underlined the value of combin-
ing approaches that can simultaneously affect our capability, opportunity and
motivation to change behaviour [14].
1
http://www.intelligenthealth.co.uk/
172 R.F. Hunter et al.
(a) Swiping the PAL Card at a (b) The PAL Scheme website
sensor in the park
Fig. 1. Elements of the PAL Scheme
covered and calories expended (Fig. 1b). Each user has a personal account where
they can view their own physical activity data. Feedback is presented graphically
to show users’ daily and aggregated physical activity parameters. Personal goals
can be set using this feature and shown on the graphical display. This system can
be used to incorporate some nudge elements—for example, minutes of activity
are converted to points and redeemed for various rewards.
We incorporated a feature that enabled automated messages to be tailored
to the individual users’ weekly physical activity level. For example, if a user
had fallen below the recommended weekly physical activity level, a prompt was
sent to encourage them to undertake more activity with links to some of the
behaviour change tools featured on the website to help them.
The website contains health promotion material for leading a healthy lifestyle,
including advice on physical activity, diet and smoking. We used Facebook and
Twitter to disseminate health promotion messages and regular encouragements
to keep participants engaged with the scheme. Additionally, the website incor-
porated a number of Web 2.0 features (e.g. forums, user comments) to receive
feedback on the system. Participants were also able to use the social network-
ing features to provide social support—for example, planning walks with other
users.
Finally, the web-based system also acts as a comprehensive research tool,
incorporating features to support each stage from recruitment to data analysis.
This includes electronic data collection, processing and aggregation.
We have built upon the non-randomized scheme highlighted in Sect. 1.1 and
designed an intervention with several nudge components (including modest in-
centives for physical activity participation). We also draw upon evidence-based
approaches from the behavioural science literature, including self-monitoring,
the provision of personal feedback and goal-setting resources. The aim of the in-
tervention is to provide an extrinsic incentive to nudge individuals to develop a
174 R.F. Hunter et al.
long-term intrinsic behaviour change. The system has been piloted in a 12-week
intervention with civil servants who work at Stormont Estate, Belfast, Northern
Ireland. Based on a sample size calculation, we recruited 406 employees aged
18–65 years old, who work on the Estate at least four days a week (minimum
of 6 hours per day) to participate in a randomized controlled trial investigat-
ing the effectiveness of incentives for encouraging physical activity in adults.
Participants were recruited via email, posters and flyers distributed around the
workplace. Participants were randomly allocated to one of two groups:
(a) Unique active PAL Card (b) Number of PAL Card activity sessions per par-
users per week ticipant per week
formed clear clusters, whereas others preferred to exercise on their own. The
size of each node indicates the degree of connectedness; the shade represents the
level of physical activity (darker shades indicate less activity and lighter shades
indicate more activity). We propose to use this kind of graph to investigate
whether physical activity behaviour changes percolate through social networks.
Beyond visual analytics, we intend to investigate the formal properties of the
graph representations using graph-mining techniques such as [4].
176 R.F. Hunter et al.
4 Future Applications
There is scope for this web-based system to be used to investigate the effective-
ness of nudge interventions including the influence of social norms, competition,
and other lessons learnt from the behavioural economics literature. This innova-
tive technology can be applied to future schemes and research trials investigating
the use of incentives and nudges to encourage positive lifestyle behaviour changes
in terms of, for example, smoking and diet, and in various settings—for example,
school and workplace.
5 Conclusions
In this paper, we have described a sophisticated system which has been used
to investigate the effectiveness of incentives for encouraging adults to be more
physically active. Preliminary results indicate that this is a useful tool for this
purpose. The data will be further analysed to investigate the effectiveness of
incentives, the predictors of users of the system and the influence of peer re-
lationships in increasing physical activity in adults. We plan to develop a set
of software tools for the development and deployment of future nudge and be-
haviour change interventions that can be used by other researchers and public
health practitioners.
References
1. White house task force report on childhood obesity: Report to the president. solving
the problem of childhood obesity within a generation (May 2010),
http://www.letsmove.gov/
white-house-task-force-childhood-obesity-report-president
2. Branca, F., Nikogosian, H., Lobstein, T.: The challenge of obesity in the WHO
European region and the strategies for response. Technical report, WHO Regional
Office for Europe (2007)
3. Charness, G., Gneezy, U.: Incentives to exercise. Econometrica 77(3), 909–931
(2009)
The Physical Activity Loyalty Card Scheme 177
4. Davis, M., Liu, W., Miller, P., Redpath, G.: Detecting anomalies in graphs with
numeric labels. In: 20th ACM Conference on Information and Knowledge Manage-
ment (CIKM 2011), Glasgow (October 2011)
5. DHSSPS. A fitter future for all: An obesity prevention framework for Northern
Ireland 2011–2021 (draft),
http://www.dhsspsni.gov.uk/obesity-prevention-framework-2011-2021.pdf
(accessed September 13, 2011)
6. Farhat, T., Iannotti, R.J., Simons-Morton, B.G.: Overweight, obesity, youth, and
health-risk behaviors. American Journal of Preventive Medicine 38(3), 258–267
(2010)
7. Ferney, S.L., Marshall, A.L.: Website physical activity interventions: preferences of
potential users. Health Education Research 21(4), 560–566 (2006)
8. Ferney, S.L., Marshall, A.L., Eakin, E.G., Owen, N.: Randomized trial of a neigh-
borhood environment-focused physical activity website intervention. Preventive
Medicine 48(2), 144–150 (2009)
9. Johannesson, M., Östling, R., Ranehill, E.: The effect of competition on physical ac-
tivity: A randomized trial. The B.E. Journal of Economic Analysis & Policy 10(1),
91 (2010)
10. Lauw, H.W., Lim, E.-P., Pang, H., Tan, T.-T.: Social network discovery by mining
spatio-temporal events. Comput. Math. Organ. Theory 11, 97–118 (2005)
11. Leslie, E., Marshall, A.L., Owen, N., Bauman, A.: Engagement and retention of
participants in a physical activity website. Preventive Medicine 40(1), 54–59 (2005)
12. Lieberman, D.A., Chamberlin, B., Medina, E., Franklin, B.A., Sanner, B.M., Vafi-
adis, D.K.: The power of play. In: Innovations in Getting Active Summit 2011,
vol. 123, pp. 2507–2516 (2011)
13. Marcus, B.H., Selby, V.C., Niaura, R.S., Rossi, J.S.: Self-efficacy and the stages of
exercise behavior change. Research Quarterly for Exercise and Sport 63(1), 60–66
(1992)
14. Michie, S., van Stralen, M., West, R.: The behaviour change wheel: a new method
for characterising and designing behaviour change interventions. Implementation
Science 6(42) (April 2011)
15. Department of Health. Healthy lives, healthy people: our strategy for public health
in England (2010), http://dera.ioe.ac.uk/1974/1/dh_122347.pdf
16. World Health Organization. 10 key facts on physical activity in the WHO European
region, http://tinyurl.com/10factsPA-EU (accessed September 13, 2011)
17. Pressler, A., Knebel, U., Esch, S., Kölbl, D., Esefeld, K., Scherr, J., Haller, B.,
Schmidt-Trucksäss, A., Krcmar, H., Halle, M., Leimeister, J.M.M.: An internet-
delivered exercise intervention for workplace health promotion in overweight seden-
tary employees: a randomized trial. Preventive Medicine 51(3-4), 234–239 (2010)
18. Swinburn, B., Egger, G.: The runaway weight gain train: too many accelerators,
not enough brakes. BMJ 329(7468), 736–739 (2004)
19. Thaler, R.H., Sunstein, C.R.: Nudge: Improving decisions about health, wealth and
happiness. Penguin, London (2008)
20. Vandelanotte, C., Spathonis, K.M., Eakin, E.G., Owen, N.: Website-delivered phys-
ical activity interventions. American Journal of Preventive Medicine 33(1), 54–64
(2007)
Tracking Media Reports on the Shiga Toxin-Producing
Escherichia coli O104: H4 Outbreak in Germany
1 Introduction
Internet surveillance systems have increasingly been used for early event detection and
alerting of emerging public health threats [1]. The Medical Information System
(MedISys, http://medisys.newsbrief.eu) is a fully automatic public health surveillance
system to monitor reporting on emerging public health threats such as human and
animal infectious diseases, chemical, biological, radiological and nuclear (CBRN)
threats, food & feed contaminations and plant diseases [2]. The system retrieves news
articles from the internet, categorizes all incoming articles according to pre-defined
multilingual categories, identifies entities such as organizations, persons and locations,
clusters articles and calculates statistics to detect emerging threats. Users can screen the
categorized articles and display world maps highlighting event locations together with
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 178–185, 2012.
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
Tracking Media Reports on the Shiga Toxin-Producing Escherichia coli O104 179
statistics on the reporting of health threats, countries and combinations thereof. Articles
can be further filtered by language, news source, and country.
Articles are classified in a category, if they satisfy the category definition which
may comprise Boolean operators, proximity operators and wild cards. Cumulative
positive or negative weights can be used with an adjustable threshold. For E. coli, a
category was introduced in MedISys in 2008 with expert input from DG SANCO and
ECDC [3]. It consists of a set of patterns covering several languages. Table 1 shows
the definition (as of 27 June 2011), with the weights for each pattern indicated in the
second column.
MedISys monitors the volume of news per category and per country to determine
sudden changes from the 14-day average number of articles in any given country-
category combination (e.g. Germany - E.coli). If the number of articles in the last 24
hours for a country-category combination (normalized by weekday fluctuations) is
significantly higher than the 14-day average, users are notified using ranking graphs
on the web site or email notifications. The statistics are language-independent because
of the multi-lingual patterns in the category definitions. This allows users to detect
any change in a category even before the event is reported in their own language.
MedISys also clusters all news items within a time window of four hours (or more,
depending on the number of recent articles) and presents the largest clusters as Top
Stories.
On the 19th of May, the Robert-Koch-Institute was informed about a cluster of three
cases of HUS in Hamburg [4]. MedISys detected the first media report in the German
newspaper Die Welt on Saturday 21st of May at 12:14 CEST (Central European
Summer Time). Several other articles followed the developing story in the afternoon
(see Table 2), making reference to various press releases by public health authorities
in Germany, e.g. in Hamburg and Lower Saxony (in MedISys, users can distinguish
between general news media and official sources). Altogether, 23 German news items
triggered the MedISys E. coli category, of which 22 were about the outbreak (one
irrelevant article was about the water quality in German lakes in the region
Oberbergischer Kreis). Furthermore, there were two news reports in Farsi and one
report in Mandarin; these reports were from the science pages of Iranian and Chinese
newspapers and were not related to the outbreak. Due to the sudden increase in media
reports on E.coli on Saturday (in comparison to the average value of the last 14 days),
MedISys issued an automatic alert and also highlighted E.coli in combination with
Germany to the users (in the section called ”Most active topics”).
The Early Warning and Response System (EWRS) of the European Union [5]
received a first communication by the German authorities on Sunday 22 May at
11:40. ProMED-mail covered the event in a report on Monday 23 May [6]. All other
major early alerting systems (ARGUS, Biocaster, GPHIN, HealthMap, PULS)
reported the event as well.
180 J.P. Linge et al.
Table 1. Category definition (as of 27 June 2011) showing the patterns with their
corresponding weights (using wild cards such as % for zero, one or more characters, + for
whitespace/linebreak, and _ for one character). An incoming news article is selected, if the sum
of the weights of all triggered patterns exceeds the threshold (which was set to 40 for this
category); negative weights are used to exclude irrelevant news items.
Pattern Weight
escherichia+coli+enfek% 20
koli+basili% 20
pałeczka+okrężnicy 20
koli+basili 20
eşerişiya+koli 20
бактерията+Ешерихия+коли 20
кишечн%+палочк%+EHEC 20
палочк%+EHEC 20
EHEC 20
enterohämorragisches+Eschericha+Coli 20
Ehec-Infekt% 20
Ehec-Keim 20
Coliba -99
Colidiu -99
Ešerihija+koli 20
escherichia+coli 20
ешерихи%+кол% 20
Ešerihioze 20
大腸桿菌 20
大腸埃希氏桿菌 20
大肠杆菌 20
大肠埃希氏杆菌 20
اﻟﻘﻮﻟﻮﻧﻴ ﺔ+اﻹﺷ ﺮﻳﻜﻴﺔ 20
ﻴﺎﮐﻠﻲ اﺷﺮﻳﺸ 20
اﮐﻮﻟ ﻰ 20
آﻮﻟ ﻲ+اﺳ ﭽﺮﻳﭽﻴﺎ 20
ﯼﮐ ﻮﻻﯼا 20
enterokrwotoczn% 20
escherichia+coli+O157_H7 20
escherichia+coli+O104_H4 20
escheric%+coli% 20
e.coli+bacteri% 20
Ешерихия+коли 20
кишечн%+палочк% 20
e-coli% 20
Sukelta 20
Enterohemoraginės 20
Lazdelės 20
Žarninės 20
escherich% 20
Nakkus 20
enteroh% 20
Colibacille 20
Κολοβακτηρίδιο 20
e+coli% 20
Ešerihioze 20
Kolibakteeri 20
Tracking Media Reports on the Shiga Toxin-Producing Escherichia coli O104 181
Fig. 1. Number of articles in the E. coli category per day (data from 1 May to 4 July 2011; all
languages)
While the outbreak in northern Germany reached its peak between 21 and 23 May
[4], the media reporting showed a different behaviour. As illustrated in Fig. 1, the
highest number of articles per day was reached on 2 June 2011 (all languages, all
countries). The data can be further filtered by language, country of publication,
country mentioned in the text (using a multi-lingual category; see Fig. 2). The filter
functionality clearly shows how the media attention changed geographical focus over
time, following the developing situation.
In Fig. 2, we can clearly identify key aspects:
− the sudden rise on articles mentioning Germany (21-25 May), when the first
cases became public,
− a peak with articles on a Swedish tourist group who got infected in Lower
Saxony (26 May).
− the reporting on alleged E. coli contaminations in Spanish cucumber, tomatoes
and salad (peak on 27 May with 107 articles),
− the reporting on the financial impact on Spanish farmers and the announcement
that Spanish cucumbers had tested negative for E. coli (peak on 31 May with 300
articles),
− the discussion on trade restrictions in Russia for EU vegetable products (peak on
2 June),
− the announcements by German authorities that bean sprouts were the source of
infection (rise in volume on 5-10 June),
− the E.coli cluster of cases in Bordeaux, France (peak on 16 June with 203
articles), and
− the reporting on fenugreek seeds imported from Egypt in 2009 and 2010 (from
end of June on).
182 J.P. Linge et al.
Fig. 2. Number of articles in the E. coli category from one of the countries Luxembourg (LU),
Sweden (SE), France (FR), Russia (RU), Spain (ES) and Germany (DE)
Fig. 3 illustrates how MedISys presented statistics on the outbreak on its web site
(screenshots taken on 26 May). It demonstrates how the deviation from the 14-day
average alerts the users to the E.coli-Germany combination. All data used for the
figures stem from MedISys.
In addition to the E. coli category, the outbreak was also visible in filters set up by
EFSA [7], e.g. EFSABacteria (which contains E. coli as potential pathogen),
EFSAEconomics and EFSACommerce in relation to Spain (impact on Spanish
farmers) and Russia (trade restrictions) and EFSAFoodFeedSafety. This demonstrates
that broader filters targeted at economics and commerce are able to detect changes in
media reporting.
Using entity extraction, the main organizations and people mentioned in the
articles can be identified by the system. As an example, we extracted a subset of
articles on E. coli that also mentioned the Robert-Koch-Institute, Commissioner John
Dalli, European Commission, ECDC, and EFSA. These entities were selected from an
automatically generated list of top entities (according to number of citations). Fig. 4
summarizes the data, highlighting the following aspects:
Fig. 3. Screenshot of MedISys on 26th of May (above: country distribution; centre: statistics on
E.coli-country combinations in comparison to 14-day average values; below: daily number of
articles for the E. coli category)
184 J.P. Linge et al.
Fig. 4. Number of articles in the E.coli category that also mention one of the entities Robert
Koch Institute, Commissioner John Dalli, European Commission, ECDC and EFSA
3 Conclusions
References
1. Linge, J.P., Steinberger, R., Weber, T.P., Yangarber, R., van der Goot, E., Al-Khudhairy,
D., Stilianakis, N.I.: Internet surveillance systems for early alerting and health threats.
Euro. Surveill. 14(13), 19162 (2009)
2. Linge, J.P., Belyaeva, J., Steinberger, R., Gemo, M., Fuart, F., Al-Khudhairy, D., Bucci,
S., Yangarber, R., van der Goot, E.: MedISys: Medical Information System. In:
Asimakopoulou, E., Bessis, N. (eds.) Advanced ICTs for Disaster Management and Threat
Detection: Collaborative and Distributed Frameworks, pp. 131–142. IGI Global (2010)
3. Mantero, J., Belyaeva, J., Linge, J.P.: How to maximise event-based surveillance web-
systems: the example of ECDC/JRC collaboration to improve the performance of
MedISys. JRC Scientific and Technical Reports (EUR collection). Publications Office of
the European Union (2011) ISBN 978-92-79-19755-0. ISSN 1018-5593, doi:
10.2788/69804
Tracking Media Reports on the Shiga Toxin-Producing Escherichia coli O104 185
4. Frank, C., Werber, D., Cramer, J.P., Askar, M., Faber, M., Heiden, M.A., Bernard, H.,
Fruth, A., Prager, R., Spode, A., Wadl, M., Zoufaly, A., Jordan, S., Stark, K., Krause, G.:
The HUS Investigation Team: Epidemic Profile of Shiga-Toxin-Producing Escherichia
coli O104:H4 Outbreak in Germany - Preliminary Report. N Engl. J. Med., June 22 (2011)
5. Guglielmetti, P., Coulombier, D., Thinus, G., Van Loock, F., Schreck, S.: The Early
Warning and Response System for communicable diseases in the EU: an overview from
1999 to 2005. Euro. Surveill. 11(12), 666 (2006),
http://www.eurosurveillance.org/
ViewArticle.aspx?ArticleId=666
6. ProMED-mail: E. coli VTEC - Germany: RFI. ProMED-mail 2011, May 23:
20110523.1566, http://www.promedmail.org (accessed July 3, 2011)
7. Linge, J.P., Belyaeva, J.: Customization of MedISys for the monitoring of food and feed
hazards (2011),
http://www.efsa.europa.eu/en/supporting/pub/140e.htm
8. EFSA: Tracing seeds, in particular fenugreek (Trigonella foenum-graecum) seeds, in
relation to the Shiga toxin-producing E. coli (STEC) O104:H4 2011 Outbreaks in
Germany and France. EFSA Report. Question No EFSA-Q-2011-00817 (2011),
http://www.efsa.europa.eu/en/supporting/pub/176e.htm (issued on
July 05, 2011)
9. Paquet, C., Coulombier, D., Kaiser, R., Ciotti, M.: Epidemic intelligence: a new
framework for strengthening disease surveillance in Europe. Euro. Surveill. 11, 665
(2006), http://www.eurosurveillance.org/
ViewArticle.aspx?ArticleId=665
Syndromic Classification of Twitter Messages
1 Introduction
Twitter is a social networking service that allows users throughout the world to
communicate their personal experiences, opinions and questions to each other
using micro messages (‘tweets’). The short message style reduces thought in-
vestment [1] and encourages a rapid ‘on the go’ style of messaging from mobile
devices. Statistics show that Twitter had over 200 million users1 in March 2011,
representing a small but significant fraction of the international population across
both age and gender2 with a bias towards the urban population in their 20s and
30s. Our recent studies into novel health applications [2] have shown progress
in identifying free-text signals from tweets that allow influenza-like illness (ILI)
to be tracked in real time. Similar studies have shown strong correlation with
national weekly influenza data from the Centers for Disease Control and Pre-
vention and the United Kingdom’s Health Protection Agency. Approaches like
these hold out the hope that low cost sensor networks could be deployed as early
1
http://www.bbc.co.uk/news/business-12889048
2
http://sustainablecitiescollective.com/urbantickurbantick/20462/twitter-usage-
view-america
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 186–195, 2012.
c Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
DIZIE 187
In the area of TCC reports we note work done by the RODS project [9] that
developed automatic techniques for classifying reports into a list of syndromic
categories based on natural language features. The chief complaint categories
used in RODS were respiratory, gastrointestinal, botulinic, constitutional, neu-
rologic, rash, hemorrhagic and none. Further processes took aggregated data
and issued alerts using time series aberration detection algorithms. The DIZIE
project which we report here takes a broadly similar approach but applies it to
user generated content in the form of Twitter messages.
2 Method
words whose senses are not relevant to infectious diseases and messages where
the cause of the symptoms are not likely to be infectious diseases. About 70%
of messages are removed at this second stage.
To aid in model selection our experiments used two widely known machine
learning models to classify Twitter messages into a fixed set of syndromic classes:
Naive Bayes (NB) and support vector machines (SVM) [11] using a variety of
kernel functions. Both models were trained with binary feature vectors repre-
senting a dictionary index of words in the training corpus. i.e. a feature for the
test message was marked 1 if a word was present in the test message which
had been seen previously in the training corpus otherwise 0. No normalisation
of the surface words was done, e.g. using stemming, because of the high out of
vocabulary rate with tools trained on general language texts.
Despite the implausibility of its strong statistical independence assumption
between words, NB tends to perform strongly. The choice to explore keywords
as features rather than more sophisticated parsing and conceptual analysis such
as MPLUS [12] was taken from a desire to evaluate less expensive approaches
before resorting to time consuming knowledge engineering.
The NB classifier exploits an estimation of the Bayes Rule:
P (ck ) × m
i=1 P (fi |ck )
fi (d)
P (ck |d) = (1)
P (d)
where the objective is to assign a given feature vector for a document d consist-
ing of m features to the highest probability class ck . fi (d) denotes the frequency
count of feature i in document d. Typically the denominator P (d) is not com-
puted explicitly as it remains constant for all ck . In order to compute the highest
DIZIE 191
In order to detect unexpected rises in the stream of messages for each syndrome
we implemented a widely used change point detection algorithm called the Early
Aberration and Reporting System (EARS) C2 [13]. C2 reports an alert when its
test value St exceeds a number k of standard deviations above a historic mean:
where Ct is the count of classified tweets for the day, μt and σt are the mean and
standard deviation of the counts during the history period, set as the previous
two weeks. k controls the number of standard deviations above the mean where
an alert is triggered, set to 1 in our system. The output of C2 is a numeric score
indicating the degree of abnormality but this by itself is not so meaningful to
ordinary users. We constructed 5 banding groups for the score and showed this
in the graphical user interface.
3 Results
Results for 10-fold cross validation experiments on the classification models are
shown in Table 3. Overall the SVM with polynomial degree 1 kernel outper-
formed all other kernels with other kernels generally offering better precision at
a higher cost to recall. Precision (Positive predictive) values ranged from 82.0 to
3
http://www.cs.cmu.edu/ mccallum/bow/rainbow/
4
http://svmlight.joachims.org/
192 N. Collier and S. Doan
93.8 for SVM (polynomial degree 1) and from 83.3 to 99.0 for NB. Recall (sensi-
tivity) values ranged from 58.3 to 96.2 for SVM (polynomial degree 1) and from
74.7 to 90.3 for NB. SVM tended to offer a reduced level of precision but better
recall. In the case of one syndrome (Hemorrhagic) we noticed an unusually low
level of recall for SVM but not for NB.
SVM’s performance seemed moderately correlated to the positive/negative
ratio in the training corpus and also showed weakness for the two classes (Hem-
orrhagic and Gastrointestinal) with the smallest positive counts. Naive Bayes
performed robustly across classes with no obvious correlation either to posi-
tive/negative ratio or the volume of training data. Low performance was seen
in both models for the gastrointestinal syndrome. This was probably due to the
low number of training examples resulting from the low inter-annotator agree-
ment on this class and the requirement for complete agreement between all three
annotators.
Table 3. Evaluation of automated syndrome classification using naive Bayes and Sup-
port Vector Machine models on 10-fold cross validation. P - Precision, R - Recall, F1
- F1 score. 1 SVM using a linear kernel, 2 SVM using a polynomial kernal degree 2, 3
SVM using a polynomial kernal degree 3, R SVM using a radial basis function kernel.
Fig. 1. Radial graphs showing syndromic alert levels for major world cities. Colour
coding on the radial segments indicates the alerting degree automatically assigned to
a syndrome in a city based on the previous hour’s Twitter counts and the previous 2
weeks as a baseline. The page is updated every hour. Clicking on the graph for a city
displays the frequency graph and also the matching tweets for the current hour.
Fig. 2. Number of Tweets by a sample of major world cities classified by DIZIE during
the period 2nd March 2011 to 31st August 2011
Navigation links are provided to and from BioCaster, a news event alerting
system, and we expect in the future to integrate the two systems more closely to
promote greater situation awareness across media sources. Access to the GUI is
via regular Web browser or mobile device with the page adjusting automatically
to fit smaller screens.
194 N. Collier and S. Doan
4 Conclusion
Twitter offers unique challenges and opportunities for syndromic surveillance.
Approaches based on machine learning need to be able (a) to handle biased
data, and (b) to adjust to the rapidly changing vocabulary to prevent a flood
of false positives when new topics trend. Future work will compare keyword
classifiers against more conceptual approaches such as [12] and also compare the
performance characteristics of change point detection algorithms.
Based on the experiments reported here we have built an experimental appli-
cation called DIZIE that samples Twitter messages originating in major world
cities and automatically classifies them according to syndromes. Access to the
system is openly available. Based on the outcome of our follow up study we
intend to integrate DIZIE’s output with our event-based surveillance system
BioCaster which is currently used by the international public health community.
References
1. Java, A., Song, X., Finin, T., Tseng, B.: Why we twitter: Understanding microblog-
ging usage and communities. In: Proc. 9th WebKDD and 1st SNA-KDD Workshop
on Web Mining and Social Network Analysis, August 12. ACM (2007)
2. Collier, N., Nguyen, S.T., Nguyen, M.T.N.: OMG U got flu? analysis of shared
health messages for bio-surveillance. Biomedical Semantics 2(suppl. 5), S10 (2011)
3. Earle, P.: Earthquake twitter. Nature Geoscience 3(4), 221–222 (2010),
doi:10.1038/ngeo832
4. Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes twitter users: real-time
event detection by social sensors. In: Proc. of the 19th International World Wide
Web Conference, Raleigh, NC, USA, pp. 851–860 (2010)
5. Hartley, D., Nelson, N., Walters, R., Arthur, R., Yangarber, R., Madoff, L., Linge,
J., Mawudeku, A., Collier, N., Brownstein, J., Thinus, G., Lightfoot, N.: The land-
scape of international biosurveillance. Emerging Health Threats J. 3(e3) (January
2010), doi:10.1093/bioinformatics/btn534
6. Szomszor, M., Kostkova, P., De Quincey, E.: swineflu : Twitter predicts swine flu
outbreak in 2009 (December 2009)
7. Lampos, V., De Bie, T., Cristianini, N.: Flu Detector - Tracking Epidemics on
Twitter. In: Balcázar, J.L., Bonchi, F., Gionis, A., Sebag, M. (eds.) ECML PKDD
2010. LNCS, vol. 6323, pp. 599–602. Springer, Heidelberg (2010)
8. Signorini, A., Segre, A.M., Polgreen, P.M.: The use of twitter to track levels of dis-
ease activity and public concern in the U.S. during the influenza a h1n1 pandemic.
PLoS One 6(5), e19467 (2011)
9. Wagner, M.M., Espino, J., Tsui, F.C., Gesteland, P., Chapman, W., Ivanov, W.,
Moore, A., Wong, W., Dowling, J., Hutman, J.: Syndrome and outbreak detec-
tion using chief-complaint data - experience of the real-time outbreak and disease
surveillance project. Morbidity and Mortality Weekly Report (MMWR) 53(suppl.),
28–31 (2004)
DIZIE 195
10. Collier, N., Doan, S., Kawazoe, A., Matsuda Goodwin, R., Conway, M., Tateno, Y.,
Ngo, Q., Dien, D., Kawtrakul, A., Takeuchi, K., Shigematsu, M., Taniguchi, K.:
BioCaster:detecting public health rumors with a web-based text mining system.
Bioinformatics 24(24), 2940–2941 (2008), doi:10.1093/bioinformatics/btn534
11. Joachims, T.: Text categorization with support vector machines: Learning with
many relevant features. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS,
vol. 1398, pp. 137–142. Springer, Heidelberg (1998)
12. Christensen, L.M., Haug, P.J., Fiszmann, M.: Mplus: A probabilistic medical lan-
guage understanding model. In: Proceedings of the Workshop on Natural Language
Processing in the Biomedical Domain, Philadelphia, USA (July 2002)
13. Hutwagner, L., Thompson, W., Seeman, M.G., Treadwell, T.: The bioterrorism
preparedness and response early aberration reporting system (EARS). J. Urban
Health 80(2), i89–i96 (2003)
Towards Spatial Description-Based Integration
of Biomedical Atlases
1 Introduction
Patients are now routinely undergoing a variety of medical imaging investiga-
tions, such as Magnetic Resonance Imaging (MRI) and Computed Tomography
(CT) scanning, and the images resulting from these investigations become part
of the patients’ medical records. The same as well as other imaging techniques,
e.g. optical imaging, are also used in preclinical studies and the Life Sciences.
The work presented in this paper is rooted in the latter and uses examples
from biomedical atlases, where we consider an atlas to consist of the image data
components, a set of labels describing structures in the images, and mappings
between them. There are questions of data integration within the domain of
clinical images, within the Life Sciences image datasets, as well as between hu-
man and model organism data. The latter being particularly of interest in the
translational sciences.
Biologists have access to a variety of biomedical atlases. Many of these atlases
are data sources for the same experimental field, for example, mouse gene expres-
sion data. Though storing the same type of data, different experimental designs,
varying analysis of results and different update routines have caused the data in
these atlases to be different. The consequence is that these atlases may provide
P. Kostkova, M. Szomszor, and D. Fowler (Eds.): eHealth 2011, LNICST 91, pp. 196–203, 2012.
c Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012
Biomedical Atlases 197
different results even for the same query. It is vital that multiple resources in
the same field are used so that full and complete results can be generated for
the query. The comparative clinical issue is the integration of different medical
images for a single patient, or the comparison of images of multiple patients with
the same disease.
A biomedical atlas consists of a graphical model, the ontology associated with
the graphical model and a mapping between these two. The ontology contains
a collection of anatomical domains and relations between these domains. The
graphical model is the image for a mammalian with those anatomical domains.
This paper proposes the integration of these data sources by mapping the im-
ages of biomedical atlases using spatial descriptions. Given two images I1 and I2,
mapping one image onto another means that, for each anatomical space in image
I1, we try to find a corresponding space, which has the same intended mean-
ing, in image I2. For this study, we circumvent the extra complexity of image
segmentation by considering anatomical domains that can be easily segmented.
More specifically, we explore 2D image space of mouse embryo domains.
Mappings anatomical spaces concern a number of issues. Different images may
have a different number of segmented regions causing one structure to correspond
to parts of several structures, and vice versa. Furthermore, even if these images
may have the same anatomical structures, the morphology may vary with scale,
orientation and the position of the structure. In addition, different biomedical
atlases may have the same segmented images but may use different anatomical
names causing interoperability issue of finding correspondences anatomical re-
gions between these images. An efficient representation structure is necessary to
conceptualize anatomical space of an image to guide the mapping process. This
paper explores spatial description-based approach for the linking of images for
the integration of biomedical atlases.
Section 2 presents an overview of image mapping approaches. The proposed
integration approach is described in Section 3. Section 4 provides experimental
results of the proposed approach. In Section 5, a discussion is presented. Finally,
a conclusion in Section 6.
This section discusses two approaches for mapping. In particular, its focus is
on the following approaches: (1) ontology based mapping (2) image processing
based mapping. Ontology based mapping depends on spatial relations between
anatomical regions, whereas, mapping using image processing depends on fiducial
points.
This section describes the mapping between anatomical spaces across images us-
ing ontologies. Mappings based on an ontology start by segmenting the image of
a biomedical atlas according to its anatomical regions. Subsequently, the regions
198 N.J.M. Zaizi and A. Burger
can be linked to the appropriate concepts in the atlas’ anatomy ontology. Two
regions are then mapped according to the similarity of their spatial relationships.
Given two atlas anatomy ontologies O1 and O2 , if anatomical structure A1 in
ontology O1 has the relationships A1 is adjacent to B1 , and A1 is adjacent to C1
then its equivalent anatomical structure, A2 , in ontology O2 , must be adjacent
to B2 and C2 , where the latter two correspond to B1 and C1 , respectively. The
integration of biomedical atlases can then be achieved by linking between their
respective anatomy ontologies.
The concepts of spatial relations have been well employed in ontologies by
both FMA [1] and Bittner et al. 2008 [2] to describe anatomical space in the
biomedical domain. In general, spatial relations between anatomical entities are
described using relationships from the following categories:
Mereological relations describe the concept of parthood between the whole
and its parts, e.g., finger is part of hand, hand is part of the arm etcetera.
Topological relations describe the concept of adjacency, discreteness, and
connectedness among entities. Two entities are described as being adjacent
when they are close to each other, but not connected. Discrete entities are
not connected. If two entities have a common anatomical space, such that
they partially coincide or are externally attached with one another, they
are said to be connected., e.g., two entities are externally connected if the
distance between them is zero and do not overlap, for example, in human
major parts of the joint, the synovial cavity is externally connected to the
synovial membrane [2].
Location relations describe the concept of relative location between entities
that may coincide wholly or partially without being part of one another, for
example, the brain is located in (but not part of ) cranial cavity.
Based on spatial relations, for example, anatomical region x in Figure 1(a) is
mapped to the result region y in Figure 1(b) if x is described as:
’adjacent(x, midgut), adjacent(x, liver)’
Fig. 1. Based on spatial adjacency between (a) anatomical region x with other anatom-
ical regions will map x to (b) the result region y
Biomedical Atlases 199
This section discusses the mapping between biomedical atlases based on image
processing techniques. These methods start by examining the pixels in an image
to classify them into regions, e.g. [3,4]. Classification is by the pixel’s intensity
level. Subsequently, a registration algorithm is required to identify equivalent
regions, across images, based on pixels. In addition, based on the pixel classifica-
tion, fiducial points can be located. A fiducial point is a point in space in either
2D or 3D, typically an anatomical landmark which is easily recognizable in an
image, usually identified by human experts and possibly assisted by auto/semi-
automated image processing algorithms. These fiducial points are typically used
for registration experimentation image of canonical atlas. Izard and Jedynak [5]
describes a registration approach which employs a Bayesian model to detect these
points in order to map between regions across images. Registration technique as
proposed by Khaissidi et al. 2009 [6] uses the Hough Transform algorithm to
align medical images, based on fiducial points extracted from the two compared
images. However, the drawback of image processing based mapping in general
is that it has the possibility to fail if there is a large variation in pixel/voxel
intensity [7].
On the other hand, the use of fiducial points allows this approach to work in-
dependently of spatial relations between segmented regions. The approach does
not intend to include a large number of concepts in spatial relations as that
replicates the ontology mapping approach. The entire spatial area of an image
should be conceptualized with a small number of fiducial points such that the
attempt is not a replicate to the image processing mapping approach. We now
summarize the formalism of the approach. We define directional relations as
where SQ is the spatial description for query region x with respect to a fiducial
point Fpoint = {p1 , p2 ,..., pn } or a fiducial line Fline = {l1 , l2 ,..., ln }
Figure 3 depicts two images of mouse embryo with 6 fiducial points and 15
fiducial lines. The simplified description for query region X is described as:
’southOf(X, P6P2), eastOf(X, P1P4), northOf(X,P2P5), westOf(X, P1P3)’
Note that, in the description, we label a fiducial line according to its pair of
fiducial points. The location highlighted in Figure 3(b) denotes the matched
location corresponding to the description.
4 Experimental Results
A series of experiments were conducted to demonstrate how fiducial points and
a set of spatial relations can be used to describe locations. For the experiments,
an image representing the mouse embryo was used and 102 spatial regions were
annotated in the image. The image generated 97104 query regions each of size
Biomedical Atlases 201
Fig. 3. Spatial description based on fiducial points and a set of spatial relations maps
(a) query region X to (b) result region Y
50x50 squared pixels, 68154 query regions each of size 100x100 squared pixels,
44204 query regions each of size 150x150 squared pixels, and 25254 query regions
each of size 200x200 squared pixels. For all query regions of size 50x50 squared
pixels, the first query region starts at the top-left corner of the image and is
increased every time by one pixel in order to generate the following query region
and so on. Query regions of other sizes are also generated by following this step
of one pixel. The idea of using query regions is to test the mappings of pixels in a
query region of one image to pixels in a region of another image based on fiducial
points. The percentage of accuracy is calculated by dividing the total number
of pixels in X by the total number of pixels in result region Y , and multiply
by 100 (see Figure 3). Figure 4(A) depicts the average percentage of accuracy
served by number of fiducial points. Results show that the more fiducial points
100 100
Set A
Average % of Accuracy
Average % of Accuracy
Set B
80 80
Set C
60
60
Query Region of Size 200x200 Pixels 40
40 Query Region of Size 150x150 Pixels
Query Region of Size 100x100 Pixels 20
Query Region of Size 50x50 Pixels
20
Fig. 4. (A) Average percentage of accuracy served by number of fiducial points. The
more fiducial points are included the higher the average percentage of accuracy gets.
Moreover, the average percentage of accuracy substantially increases as the query region
area size gets larger. (B) Average percentage of accuracy in three different positioning
sets of 8 fiducial points served by query region area size. The same number of fiducial
point place at different positions produce different average percentage of accuracy.
202 N.J.M. Zaizi and A. Burger
were included, the more accurate the mapping was. In addition, the mapping ac-
curacy substantially increases as the query region area size gets larger. Fiducial
points provide qualitative spatial relations to describe locations. Therefore, the
more fiducial points are used the more spatial relations are available to describe
locations, which increases the average percentage of accuracy. In general, spatial
descriptions will return a location which is either larger or equal to the actual
area location. Thus, for cases where spatial descriptions for the corresponding
query regions do not return locations that are exactly equal to the actual loca-
tion, the larger the size of the query region, the more accurate it is to the actual
area, by which contribute to much higher accuracy value compared to the smaller
one. Figure 4(B) depicts the average percentage of accuracy in three different
positioning sets of 8 fiducial points served by query region size. Results show
that the same number of fiducial points placed at different positions produce
different accuracy. The positions of fiducial points determine spatial relations
made available to describe locations. Because the location is determined by spa-
tial descriptions, different positioning set for the same number of fiducial points
certainly contributes to different spatial descriptions to describe locations, which
produce different average percentages of accuracy. Overall, with the appropriate
number of fiducial points used and better selection of fiducial point location,
mappings can be improve in terms of accuracy.
5 Discussion
The definition for best match criteria is important in any mapping algorithm.
Because anatomical structures exist at different range of scale, arrangement and
the position, there is a possibility for an exact copy of location corresponding
the query region in one image to be unavailable in another image. The proposed
spatial description approach at the current state perform mappings by returning
a location that satisfies all spatial relation constraints corresponding to a query
region. However, this may not be necessary. Therefore, the google-style matches
can be considered. This can be done by specifying a range, for example, allowing
for a distance limit from a fiducial line, which will return a location given by the
range.
A preliminary experiment has also been conducted to compare the perfor-
mance of spatial descriptions based on fiducial points and a set of spatial re-
lations with the following approaches: (1) spatial description based on spatial
relationships between segmented regions (2) spatial description based on fiducial
points and a set of spatial relations, integrated with spatial relations between
segmented regions. Experimental results verified that mapping using spatial de-
scription based on spatial relationships between segmented regions managed to
produce better accuracy compared to spatial description based on fiducial points
and a set of spatial relations. However, this result cannot be used to benchmark
the overall mapping performance produced by spatial description based on fidu-
cial points. Depending on better selection of fiducial point locations or by in-
creasing the number of fiducial points used, the mapping accuracy can be further
Biomedical Atlases 203
References
1. Rosse, C., Mejino, J.L.V.: The Foundational Model of Anatomy Ontology. In:
Anatomy Ontologies for Bioinformatics: Principles and Practise. Springer, Heidel-
berg (2008)
2. Bittner, T., Donelly, M., Goldberg, L.J., Neuhaus, F.: Spatial Representation and
Reasoning. In: Anatomy Ontologies for Bioinformatics: Principles and Practise.
Modeling Principles and Methodologies. Springer, Heidelberg (2008)
3. Boccignone, G., Napoletano, P., Ferraro, M.: Embedding diffusion in variational
bayes: A technique for segmenting images. International Journal of Pattern Recog-
nition and Artificial Intelligence 22(1), 811–827 (2008)
4. Wyawahare, M.V., Patil, P.M., Abhyankar, H.K.: Image Registration Techniques:
An overview. International Journal of Signal Processing, Image Processing and Pat-
tern Recognition 2(3), 1–5 (2009)
5. Izard, C., Jedynak, B.: Bayesian Registration for Anatomical Landmark Detection.
In: IEEE International Symposium on Biomedical Imaging, Arlington, VA (2006)
6. Khaissidi, G., Tairi, H., Aarab, A.: A fast medical image registration using feature
points. ICGST-GVIP Journal 9(3), 19–24 (2009)
7. Walia, E., Suneja, A.: A Conceptual Study on Image Matching Techniques. Global
Journal of Computer Science and Technology 10(12), 83–88 (2010)
8. Human-fetal week 10 sagittal plane,
http://php.med.unsw.edu.au/embryology/
index.php?title=Embryonic Development
Author Index