Improving Complete Access To Data Within Collaborative Systems In Healthcare Domain

The problem of accessing complete data especially involving different sources had been a major concern in many fields. Due to the absence of data model that become the barrier to access and manage complete datasets, data providers within the collaborative environment may affect users to have fast an...

Full description

Saved in:
Bibliographic Details
Main Author: Md Leza, Fathin Nabilla
Format: Thesis
Language:English
English
Published: 2016
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/18543/1/Improving%20Complete%20Access%20To%20Data%20Within%20Collaborative%20Systems%20In%20Healthcare%20Domain%2024%20Pages.pdf
http://eprints.utem.edu.my/id/eprint/18543/2/Improving%20Complete%20Access%20To%20Data%20Within%20Collaborative%20Systems%20In%20Healthcare%20Domain.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utem-ep.18543
record_format uketd_dc
institution Universiti Teknikal Malaysia Melaka
collection UTeM Repository
language English
English
advisor Emran, Nurul Akmar

topic T Technology (General)
T Technology (General)
spellingShingle T Technology (General)
T Technology (General)
Md Leza, Fathin Nabilla
Improving Complete Access To Data Within Collaborative Systems In Healthcare Domain
description The problem of accessing complete data especially involving different sources had been a major concern in many fields. Due to the absence of data model that become the barrier to access and manage complete datasets, data providers within the collaborative environment may affect users to have fast and seamless accessibility. There had been many data accessibility improvements methods such as: data replication, data sharing, cloud computing and much more. This dissertation had presented the critical review of these methods based on their criteria of accessibility. However, studies to measure complete access to data were limited. A data accessibility model has been proposed within a collaborative environment named as Collaborative Integrated Database System (COLLIDS), in order to overcome the issue to complete access to data. COLLIDS aims to improve complete access to data in multi-data provider‟s context in a case study. The highlighted feature in COLLIDS which is the completeness analyzer provides relative completeness analysis among data provider. Population-based Completeness (PBC) was applied in COLLIDS completeness analyzer to measure the completeness for the dimension of interest, among the population of data providers. It has been hypothesized that there will have an increment in the ratio of completeness of data accessible by data providers. Therefore, COLLIDS have been evaluated in terms of increment of data completeness for all data providers. Further analysis also has been conducted to compute the completeness cases of data providers. In this dissertation, healthcare domain has been chosen as the case study in order to explore the problem of accessing complete data seamlessly. Sample data have been collected from 106 healthcare providers called as „panel clinics‟. PBC have been used in this dissertation to measure the reference population which is the union of patient datasets collected from all the clinics. Two groups of datasets have been measured; „As-Is Completeness‟ and „ Completeness Increment‟ in normality test and Wilcoxon-Sign Rank test, in order to know the significance differences between both groups. The outcome of this dissertation will have to contribute towards understanding for the practical analysis and the evaluation of COLLIDS data model, in measuring complete access to data within multiple data providers‟ environments.
format Thesis
qualification_name Master of Philosophy (M.Phil.)
qualification_level Master's degree
author Md Leza, Fathin Nabilla
author_facet Md Leza, Fathin Nabilla
author_sort Md Leza, Fathin Nabilla
title Improving Complete Access To Data Within Collaborative Systems In Healthcare Domain
title_short Improving Complete Access To Data Within Collaborative Systems In Healthcare Domain
title_full Improving Complete Access To Data Within Collaborative Systems In Healthcare Domain
title_fullStr Improving Complete Access To Data Within Collaborative Systems In Healthcare Domain
title_full_unstemmed Improving Complete Access To Data Within Collaborative Systems In Healthcare Domain
title_sort improving complete access to data within collaborative systems in healthcare domain
granting_institution Universiti Teknikal Malaysia Melaka
granting_department Faculty of Information and Communication Technology
publishDate 2016
url http://eprints.utem.edu.my/id/eprint/18543/1/Improving%20Complete%20Access%20To%20Data%20Within%20Collaborative%20Systems%20In%20Healthcare%20Domain%2024%20Pages.pdf
http://eprints.utem.edu.my/id/eprint/18543/2/Improving%20Complete%20Access%20To%20Data%20Within%20Collaborative%20Systems%20In%20Healthcare%20Domain.pdf
_version_ 1747833933013188608
spelling my-utem-ep.185432021-10-08T15:12:42Z Improving Complete Access To Data Within Collaborative Systems In Healthcare Domain 2016 Md Leza, Fathin Nabilla T Technology (General) TK Electrical engineering. Electronics Nuclear engineering The problem of accessing complete data especially involving different sources had been a major concern in many fields. Due to the absence of data model that become the barrier to access and manage complete datasets, data providers within the collaborative environment may affect users to have fast and seamless accessibility. There had been many data accessibility improvements methods such as: data replication, data sharing, cloud computing and much more. This dissertation had presented the critical review of these methods based on their criteria of accessibility. However, studies to measure complete access to data were limited. A data accessibility model has been proposed within a collaborative environment named as Collaborative Integrated Database System (COLLIDS), in order to overcome the issue to complete access to data. COLLIDS aims to improve complete access to data in multi-data provider‟s context in a case study. The highlighted feature in COLLIDS which is the completeness analyzer provides relative completeness analysis among data provider. Population-based Completeness (PBC) was applied in COLLIDS completeness analyzer to measure the completeness for the dimension of interest, among the population of data providers. It has been hypothesized that there will have an increment in the ratio of completeness of data accessible by data providers. Therefore, COLLIDS have been evaluated in terms of increment of data completeness for all data providers. Further analysis also has been conducted to compute the completeness cases of data providers. In this dissertation, healthcare domain has been chosen as the case study in order to explore the problem of accessing complete data seamlessly. Sample data have been collected from 106 healthcare providers called as „panel clinics‟. PBC have been used in this dissertation to measure the reference population which is the union of patient datasets collected from all the clinics. Two groups of datasets have been measured; „As-Is Completeness‟ and „ Completeness Increment‟ in normality test and Wilcoxon-Sign Rank test, in order to know the significance differences between both groups. The outcome of this dissertation will have to contribute towards understanding for the practical analysis and the evaluation of COLLIDS data model, in measuring complete access to data within multiple data providers‟ environments. UTeM 2016 Thesis http://eprints.utem.edu.my/id/eprint/18543/ http://eprints.utem.edu.my/id/eprint/18543/1/Improving%20Complete%20Access%20To%20Data%20Within%20Collaborative%20Systems%20In%20Healthcare%20Domain%2024%20Pages.pdf text en public http://eprints.utem.edu.my/id/eprint/18543/2/Improving%20Complete%20Access%20To%20Data%20Within%20Collaborative%20Systems%20In%20Healthcare%20Domain.pdf text en validuser https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=100985 mphil masters Universiti Teknikal Malaysia Melaka Faculty of Information and Communication Technology Emran, Nurul Akmar 1. Abd Ghani, M.K., Bali, R.K., Naguib, R.N.G., Marshall, I.M., Baskaran, V., Wickramasinghe, N., and Puentes, J., 2008. A Flexible Telemedicine Framework For The Continuous Upkeep Of Patient Health Record. In: Proceedings of the Fourteenth Americas Conference on Information Systems, Toronto, Canada. 2. Abdi, H. and Molin, P., 2007. Lilliefors/Van Soest’s Test of Normality. Encyclopedia of Measurement and Statistics. 3. Abdullah, A.H., Surif, J., Tahir, L.M., Ibrahim, N.H., and Zakaria, E., 2015. Enhancing Students’ Geometrical Thinking Levels through Van Hiele's Phase-Based Geometer's Sketchpad-Aided Learning. In: 2015 IEEE 7th International Conference on Engineering Education (ICEED). IEEE, pp.106–111. 4. Adesina, A.O., Agbele, K.K., Februarie, R., Abidoye, A.P., and Nyongesa, H.O., 2011. Ensuring the Security and Privacy of Information in Mobile Health-Care Communication Systems. South African Journal of Science, 107 (9/10), pp.1–7. 5. Adolfsson, E.T. and Rosenblad, A., 2011. Reporting Systems, Reporting Rates and Completeness of Data Reported from Primary Healthcare to a Swedish Quality Register--the National Diabetes Register. International journal of medical informatics, 80 (9), pp.663–8. 6. Ahmad, S.M.S., Ali, B.M., and Adnan, W.A.W., 2012. Applications as Access Control of Information Security. International Journal of Information and Control, 8 (11), pp.7983–7999. 7. Alboaie, L., Gorea, D., and Felea, V., 2008. Semantic Integrity Control in the Database Layer of an E-Health System Functional and Architectural Perspective of Telemon E-Health System. International Journal of Computers, Communications & Control, III (Proceedings of ICCCC), pp.162–167. 8. Alkharboush, N. and Li, Y., 2010. A Decision Rule Method for Assessing the Completeness and Consistency of a Data Warehouse. In: 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology. IEEE, pp.265–268. 9. Al-sakran, H.O., 2014. Framework Architecture for Improving Healthcare Information Systems Using Agent Technology. Scientific Research and Essays. 10. Amirian, P. and Alesheikh, A.A., 2008. A Service Oriented Framework for Disseminating Geospatial Data to Mobile, Desktop and Web Clients. World Applied Sciences Journal, 3 (1), pp.140–153. 11. Antony, N. and Melvin, A.A.R., 2013. An Efficient Approach for Flexible and Scalable Access Control Through HASBE. International Journal of Computer Science and Management Research, 2 (4), pp.2003–2007. 12. Arnaout, S., Mkemwa, G., Keane, H., and Mkemwa, G., 2014. The Effect of the Wireless Access for Health Electronic Health Record System on Rural Health Units in the Philippines. 13. Ashtaputre, N., Bhutkar, S., Patil, P., and Sathe, H., 2013. Data Access and Retrieval for Portable Devices. In: Proceedings of the 8th International Conference on Computer Science and Education, ICCSE 2013. pp.357–360. 14. Atsan, E. and Özkasap, Ö., 2013. SCALAR: Scalable Data Lookup and Replication Protocol for Mobile Ad Hoc Networks. Computer Networks, 57 (17), pp.3654–3672. 15. Avidan, A. and Weissman, C., 2012. Record Completeness and Data Concordance in an Anesthesia Information Management System Using Context-Sensitive Mandatory Data-Entry Fields. International journal of medical informatics, 81 (3), pp.173–81. 16. Avointiede, 2015. Avointiede-Data Security [online]. Ministry of Education and Culture of Finland. Available at: http://openscience.fi/data?security. 17. Badurowicz, M., 2012. Two-Dimensional Barcodes in Mobile Applications. In: Actual Problems of Economics. pp.346–350. 18. Ballou, D.P. and Tayi, G.K., 1999. Enhancing Data Quality in Data Warehouse Environments. Communications of the ACM, 42 (1), pp.73–78. 19. Becker, C. and Bizer, C., 2008. DBpedia Mobile : A Location-Enabled Linked Data Browser. LDOW, 369, pp.6–7. 20. Bellera, C.A., Marilyse, J., and Hanley, J.A., 2010. Normal Approximations to the Distributions of the Wilcoxon Statistics : Accurate to What N ? Graphical Insights. Journal of Statistics Education, 18 (2), pp.1–17. 21. Bi, L., Feng, Z., Liu, M., and Wang, W., 2008. Design and Implementation of the Airline Luggage Inspection System Base on Link Structure of QR Code. In: International Symposium on Electronic Commerce and Security Design. pp.527–530. 22. Bloom, K., 2014. CMS Use of a Data Federation. Journal of Physics: Conference Series, 513 (4), pp.2–7. 23. Bonifácio, V.D.B., 2012. QR-Coded Audio Periodic Table of the Elements: A Mobile-Learning Tool. Journal of Chemical Education, 89 (4), pp.552–554. 24. Borovskiy, V., Koch, W., and Zeier, A., 2011. Business Object Query Language as Data Access API in ERP Systems. In: J. Filipe and J. Cordeiro, eds. Enterprise Information Systems: 12th International Conference, ICEIS 2010. Funchal-Madeira, Portugal: Springer Science & Business Media, pp.135–148. 25. Bronnert, J., Clark, J.S., Cassidy, B.S., Fenton, S., Hyde, L., Kallem, C., and Watzlaf, V., 2012. Data Quality Management Model (Updated). Journal of AHIMA, 83 (7), pp.62–67. 26. Brooks, R., 2011. 13 Creative Ways To Use Qr Codes For Marketing [online]. Available at: http://www.fastcompany.com/1720193/13-creative-ways-use-qr-codes-marketing. 27. Brose, M.S., Flood, M.D., Krishna, D., and Nichols, B., 2014. Handbook of Financial Data and Risk Information II: Software and Data. Spain: Cambridge University Press. 28. Burleson, D., 2014. The Hierarchical Database Model [online]. Burleson Consulting. Available at: http://www.dba?oracle.com/t_object_hierarchical_database.htm [Accessed 28 Jun 2015]. 29. BusinessDictionary, 2015. Accessibility [online]. BusinessDictionary.com. Available at: http://www.businessdictionary.com/definition/accessibility.html [Accessed 29 Jun 2015]. 30. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., and Brandic, I., 2009. Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Future Generation Computer Systems, 25 (6), pp.599–616. 31. Calì, A., Calvanese, D., De Giacomo, G., and Lenzerini, M., 2013. Data Integration under Integrity Constraints. In: J. Bubenko, J. Krogstie, O. Pastor, B. Pernici, C. Rolland, and A. Sølvberg, eds. Seminal Contributions to Information Systems Engineering. Berlin, Heidelberg: Springer Berlin Heidelberg, pp.335–352. 32. California Department of Water Resources, 2015. Integrated Water Resources Information System ( IWRIS ) [online]. California Department of Water Resources. Available at: http://www.water.ca.gov/iwris/ [Accessed 12 Oct 2015]. 33. Capanu, M., Jones, G.A., and Randles, R.H., 2006. Testing for Preference Using a Sum of Wilcoxon Signed Rank Statistics. Computational Statistics and Data Analysis, 51 (2), pp.793–796. 34. Charlton, G., 2011. The Pros and Cons of QR Codes [online]. Econsultancy. Available at: http://econsultancy.com/my/blog/7884-the-pros-and-cons-of-qr-codes. 35. Chin, A. and Becker, S., 1997. Improving Decision Making Using Confidence Scaling for Enhanced Data Quality. In: AIS Americas Conference, Indianapolis. 36. Classifications - International Classification of Diseases (ICD) [online], 2012. World Health Organization. Available at: http://www.who.int/classifications/icd/en [Accessed 5 Sep 2014]. 37. Clio Team, 2008. Data Accessibility, Security and Privacy [online]. Available at: http://www.goclio.com/blog/2008/10/data-accessibility-security-and-privacy-part-i/. 38. Dahiya, N. and Kant, C., 2012. Biometrics Security Concerns. In: 2012 Second International Conference on Advanced Computing & Communication Technologies. IEEE, pp.297–302. 39. Danyaro, K.U., Jaafar, J., and Liew, M.S., 2014. MetOcean Data to Linked Data. In: 2014 International Conference on Computer and Information Sciences (ICCOINS). pp.1–5. 40. Dattathreyulu, G., Pitchaiah, D., Krishna, P.P.M., and Reddy, M.R., 2014. Robust Performance of Cooperative Cache Wireless P2P Networks Architecture and Algorithm. International Journal of Engineering Trends and Technology (IJETT) –, 16 (4), pp.170–175. 41. Deethshith, N., Prakash, N.J., Gunaseelan, A., and Santhoshkumar, S.P., 2014. Peak Monitoring the Egotistic Nodes in MANET During Duplication Allocation. International Journal of Engineering Trends and Technology (IJETT) –, 9 (9), pp.454–459. 42. DeLone, W.H. and McLean, E.R., 1992. Information Systems Success: The Quest for the Dependent Variable. Information Systems Research, 3 (1), pp.60–95. 43. Denko, M.K. and Tian, J., 2008. Cross-Layer Design for Cooperative Caching in Mobile Ad Hoc Networks. In: 5th IEEE Consumer Communications and Networking Conference. Ieee, pp.375–380. 44. Ding, C., Wald, M., and Wills, G., 2013. Linked Data for Accessibility: From Techniques to Users. In: Proceedings of the 11th International Conference e-Society 2013. pp.514–516. 45. Ding, C., Wald, M., and Wills, G., 2014. Open Accessibility Data Interlinking. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer International Publishing, pp.73–80. 46. Divine, G., Norton, H.J., Hunt, R., and Dienemann, J., 2013. A Review of Analysis and Sample Size Calculation Considerations for Wilcoxon Tests. Anesthesia and Analgesia, 117 (3), pp.699–710. 47. Doan, A., Halevy, A., and Ives, Z., 2012. Principles of Data Integration. Elsevier. 48. Dolan, P.L., 2011. The Latest Healthcare Marketing Tool: QR Codes [online]. American Medical News. Available at: http://www.amednews.com/article/20111003/business/310039966/5/. 49. Doukas, C., Pliakas, T., and Maglogiannis, I., 2010. Mobile Healthcare Information Management Utilizing Cloud Computing and Android OS. In: Engineering in Medicine and Biology Society (EMBC), 2010 Annual International Conference of the IEEE. pp.1037–1040. 50. Du, Y., Gupta, S.K.S., and Varsamopoulos, G., 2009. Improving on-Demand Data Access Efficiency in MANETs with Cooperative Caching. Ad Hoc Networks, 7 (3), pp.579–598. 51. Ebner, M., 2008. QR Code - the Business Card of Tomorrow ? In: Proceedings FH Science Day. pp.431–435. 52. Eckerson, W.W., 2002. Data Quality and the Bottom Line. TDWI Report, The Data Warehouse Institute. 53. Emran, N.A., 2011. Definition And Analysis Of Population-Based Data Completeness Measurement. University of Manchester. 54. Emran, N.A., 2015. Data Completeness Measures. Pattern Analysis, Intelligent Security and the Internet of Things, 355, pp.117–130. 55. Field, A., 2013. Discovering Statistics Using IBM SPSS Statistics. Sage. 56. Finžgar, L. and Trebar, M., 2011. Use of NFC and QR Code Identification in an Electronic Ticket System for Public Transport. In: Software, Telecommunications and Computer Networks (SoftCOM), 2011 19th International Conference. IEEE, pp.1–6. 57. Gonzalez, H., Halevy, A.Y., Jensen, C.S., Langen, A., Madhavan, J., Shapley, R., Shen, W., and Goldberg-Kidon, J., 2010. Google Fusion Tables. In: Proceedings of the 2010 international conference on Management of data - SIGMOD ’10. New York, New York, USA: ACM Press, pp.1061. 58. Goodhue, D.L., 1995. Understanding User Evaluations of Information Systems. Management science, 41 (12), pp.1827–1844. 59. Green, T.J., Karvounarakis, G., Taylor, N.E., Biton, O., Ives, Z.G., and Tannen, V., 2007. ORCHESTRA: Facilitating Collaborative Data Sharing. In: SIGMOD 07 Proceedings of the 2007 ACM SIGMOD international conference on Management of data. New York, New York, USA: ACM Press, pp.1131–1133. 60. Hara, T., 2001. Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility. In: Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society. Ieee, pp.1568–1576. 61. Hara, T. and Madria, S.K., 2006. Data Replication for Improving Data Accessibility in Ad Hoc Networks. IEEE Transactions on Mobile Computing, 5 (11), pp.1515–1532. 62. Häyrinen, K., Saranto, K., and Nykänen, P., 2008. Definition, Structure, Content, Use and Impacts of Electronic Health Records: A Review of the Research Literature. International Journal of Medical Informatics, 77 (5), pp.291–304. 63. Herzberg, S., Rahbar, K., Stegger, L., Schäfers, M., and Dugas, M., 2011. Concept and Implementation of a Computer-Based Reminder System to Increase Completeness in Clinical Documentation. International Journal of Medical Informatics, 80 (5), pp.351–8. 64. Hitachi Solutions, 2013. Hitachi Advanced Collaboration System First to Be Qualified as a Lync Extensibility Application under the Microsoft Lync ISV Qualification Program Solution [online]. Hitachi Solutions, Ltd. Available at: http://www.hitachi-solutions.com/news/release/2013/0527.html [Accessed 19 Sep 2015]. 65. Huang, W., Wu, K., and Chen, M., 2011. The Study of Using QR Code in the Mobile Tourist Guide Map. In: e-CASE & e-Tech International Conference. pp.2976–2987. 66. Ives, Z., Khandelwal, N., Kapur, A., and Cakir, M., 2005. ORCHESTRA: Rapid, Collaborative Sharing of Dynamic Data. In: Proceedings of the 2005 CIDR Conference. pp.107–118. 67. Ives, Z.G., Green, T.J., Karvounarakis, G., Taylor, N.E., Pereira, F., and Tannen, V., 2008a. The O RCHESTRA Collaborative Data Sharing System. 68. Ives, Z.G., Green, T.J., Karvounarakis, G., Taylor, N.E., Tannen, V., Talukdar, P.P., Jacob, M., and Pereira, F., 2008b. The ORCHESTRA Collaborative Data Sharing System. ACM SIGMOD Record, 37 (3), pp.26. 69. Jaykaran, 2010. How to Select Appropriate Statistical Test? Journal of Pharmaceutical Negative Results, 1 (2), pp.61–63. 70. Kafadar, K., 2003. Testing for Normality. Journal of the American Statistical Association, 98 (463), pp.765. 71. Kan, T., Teng, C.-H., and Chou, W.-S., 2009. Applying QR Code in Augmented Reality Applications. In: Proceedings of the 8th International Conference on Virtual Reality Continuum and its Applications in Industry. pp.253–258. 72. Karthkeyan, T. and Rajaram, A., 2014. Efficient Multicast Data Replication Approach For Power Consumption In MANET. Journal of Theoretical and Applied Information Technology, 69 (2), pp.288–296. 73. Kaushik, S., 2011. Strength of Quick Response Barcodes and Design of Secure Data Sharing System. International Journal of Advanced Computer Science and Applications, 2 (11), pp.28–32. 74. Kelly, B., Anderson, P., Reo, N. V, DelRaso, N.J., Doom, T., and Raymer, M., 2007. A Proposed Statistical Protocol for the Analysis of Metabolic Toxicological Data Derived from NMR Spectroscopy. In: Proceedings of the Ohio Collaborative Conference on Bioinformatics. pp.1414–1418. 75. Khitrov, M., 2013. Talking Passwords: Voice Biometrics for Data Access and Security. Biometric Technology Today, 2013 (2), pp.9–11. 76. Kirch, W., 2008. International Encyclopedia of Public Health. Springer Netherlands. 77. Koch, P., 2011. Benefits of Cloud Computing for PACS and Archiving. Radiology management, 34 (2), pp.16–19. 78. Kumar, A., Bhattacharya, I., Bhattacharya, J., Maskara, S., Kung, W., Wang, Y., and Chiang, I.-J., 2014. Deploying Cloud Computing to Implement Electronic Health Record in Indian Healthcare Settings. Open Journal Of Mobile Computing And Cloud Computing, 1 (1), pp.35–47. 79. Landau, S. and Everitt, B.S., 2004. A Handbook of Statistical Analyses Using SPSS. Chapman & Hall/CRC Press LLC. New York. 80. Lans, R. Van Der, 2010. Clearly Defining Data Virtualization , Data Federation , and Data Integration [online]. BeyeNetwork.com. Available at: http://www.b-eye-network.com/view/14815 [Accessed 25 Mar 2015]. 81. Lenzerini, M., 2002. Data Integration: A Theoretical Perspective. In: Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems - PODS ’02. ACM, pp.233. 82. Li, X., Xiong, Y., Ma, J., and Wang, W., 2012. An Efficient and Security Dynamic Identity Based Authentication Protocol for Multi-Server Architecture Using Smart Cards. Journal of Network and Computer Applications, 35 (2), pp.763–769. 83. Limpag, M., 2013. Leon Kilat : The Tech Experiments Use QR Codes , Google Docs to Set up Free Inventory System Related Posts : [online]. max.limpag.com. Available at: http://max.limpag.com/article/qr-code-google-docs-inventory/. 84. Liu, Y.L.Y., Khoshgoftaar, T., and Yao, J.-F.Y.J.-F., 2006. Developing an Effective Validation Strategy for Genetic Programming Models Based on Multiple Datasets. In: 2006 IEEE International Conference on Information Reuse & Integration. pp.232–237. 85. Lu, W.L.W., Zhou, Y.Z.Y., Li, J.L.J., and Yan, B.Y.B., 2010. A Hierarchical Data Replication Method in Ad Hoc Networks. In: Computer Engineering and Technology (ICCET), 2010 2nd International Conference on. IEEE, pp.23–27. 86. M.Leza, F.N. and Emran, N.A., 2014. Data Accessibility Model Using QR Code for Lifetime Healthcare Records. World Applied Sciences Journal (Innovation Challenges in Multidiciplinary Research & Practice), 30, pp.395–402. 87. Malaysian National Medicines Policy, 2012. 88. Mane, M.D. and Patil, B.M., 2014. Handling Selfishness Over Mobile Ad Hoc Network. International Journal of Advances in Engineering & Technology, 7 (3), pp.917–922. 89. McCarthy, K., 2015. Confidential Information Exposed over 300 Times in ICANN Security Snafu [online]. The Register. Available at: http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/ [Accessed 23 Aug 2015]. 90. Miličić, V., 2011. Problems of Linked Data: Consuming Data [online]. Bew Citnanames. Available at: http://milicicvuk.com/blog/2011/08/04/problems?of?linked?data?44?consuming?data/. 91. Miller, H., 1996. The Multiple Dimensions of Information Quality. Information Systems Management, 13 (2), pp.79–82. 92. Ming Hoong, E., 2007. Application of Paired T-Test and DOE Methodologies on RFID Tag Placement Testing Using Free Space Read Distance. In: 2007 IEEE International Conference on RFID. IEEE, pp.157–166. 93. Minker, J., 1982. On Indefinite Databases and the Closed World Assumption. In: D.W. Loveland, ed. 6th Conference on Automated Deduction. Berlin/Heidelberg: Springer-Verlag, pp.292–308. 94. Minker, J., 2014. Foundations of Deductive Databases and Logic Programming. Morgan Kaufmann. 95. Mohd Albakir, S.N.W.S. and Mohd-Mokhtar, R., 2011. A Conceptual Design of Genuine Halal Logo Detector. In: 2011 IEEE International Conference on Imaging Systems and Techniques. Ieee, pp.296–301. 96. Murkute, J., Nagpure, H., Kute, H., and Mohadikar, N., 2013. Online Banking Authentication System Using QR-Code and Mobile OTP. International Journal of Engineering Research and Applications, 3 (2), pp.1810–1815. 97. Murthy, B.K., Srivastava, P.K., and Cheema, A.S., 2014. Implementation Challenges of Hospital Information System in Super Specialty Hospital ‘ A Case Study of PGIMER , Chandigarh ’. In: Global Humanitarian Technology Conference-South Asia Satellite (GHTC-SAS) 2014 IEEE. IEEE, pp.77–82. 98. Nakao, M., Okamoto, S., Kohara, M., Fujishiro, T., Fujisawa, T., Sato, S., Tabata, S., Kaneko, T., and Nakamura, Y., 2010. CyanoBase: The Cyanobacteria Genome Database Update 2010. Nucleic Acids Research, 38 (Database issue), pp.D379–D381. 99. Navatha, K., Sravanthi, N., Sunitha, L., and Ramana, E.V., 2015. Selfish Node Handling in The Context of Replica Allocation in MANET ’ S. IJCSNS International Journal of Computer Science and Network Security, 15 (6), pp.66–69. 100. Nazir, K., 2015. Html5 and Bootstrap , a Recipe for Development Success [online]. HTML Goodies. Available at: http://www.htmlgoodies.com/html5/markup/html5?and?bootstrap?a?recipe?for?development?success.html#fbid=O6m7ab0k49J [Accessed 10 Sep 2014]. 101. OECD, 2006. Accessibility (As A Statistical Data Quality Dimension) [online]. OECD Glossary of Statistical Terms. Available at: https://stats.oecd.org/glossary/detail.asp?ID=12 [Accessed 28 Jun 2015]. 102. Okazaki, S., Navarro, A., and Campo, S., 2013. Cross-Media Integration of QR Code : A Preliminary Exploration. Journal of Electronic Commerce Research, 14 (2), pp.137–148. 103. Olson, J.E., 2003. Data Quality: The Accuracy Dimension. Morgan Kaufmann. 104. Patil, A., Patil, A., Raman, M., and Singh, M., 2013. MCQ Based Exam Using QR Code. International Journal of Computer Science and Management Research, 2 (4), pp.2206–2210. 105. Pelletier, M.-P., Trépanier, M., and Morency, C., 2011. Smart Card Data Use in Public Transit: A Literature Review. Transportation Research Part C: Emerging Technologies, 19 (4), pp.557–568. 106. De Pietro, O. and Frontera, G., 2012. Mobile Tutoring for Situated Learning and Collaborative Learning in AIML Application Using QR-Code. In: 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems. Ieee, pp.799–805. 107. Pipino, L.L., Lee, Y.W., and Wang, R.Y., 2002. Data Quality Assessment. Communications of the ACM, 45 (4), pp.211. 108. Poarch, D., Cook, M., and Grahn, A., 2015. Mobile Device Security in the Workplace : 6 Key Risks & Challenges [online]. Forsythe Technology. Available at: http://focus.forsythe.com/articles/55/Mobile-Device-Security-in-the-Workplace-6-Key-Risks-and-Challenges [Accessed 12 Oct 2015]. 109. Poline, J.-B., Breeze, J.L., Ghosh, S., Gorgolewski, K., Halchenko, Y.O., Hanke, M., Haselgrove, C., Helmer, K.G., Keator, D.B., Marcus, D.S., Poldrack, R. a, Schwartz, Y., Ashburner, J., and Kennedy, D.N., 2012. Data Sharing in Neuroimaging Research. Frontiers in Neuroinformatics, 6 (April), pp.9. 110. Pornputtapong, N., Wanichthanarak, K., Nilsson, A., Nookaew, I., and Nielsen, J., 2014. A Dedicated Database System for Handling Multi-Level Data in Systems Biology. Source Code for Biology and Medicine, 9 (1), pp.17. 111. Potts, S., 2003. Disadvantages and Pitfalls of Web Services. In: Sams Teach Yourself Web Services in 24 Hours. Sams Publishing, pp.34–42. 112. Rahm, E. and Do, H.H., 2000. Data Cleaning : Problems and Current Approaches. IEEE Data Eng. Bull., 23 (4), pp.3–13. 113. Ramya, S., Pillutla, H.K., Vinoth, D., and Saravanan, S., 2014. Telemedicine Communication Using MANET. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), 12 (1), pp.50–57. 114. Rani, V., Student, P.G., and Dhir, R., 2013. A Study of Ad-Hoc Network : A Review. International Journal of Advanced Research in Computer Science and Software Engineering, 3 (3), pp.135–138. 115. Razniewski, S. and Nutt, W., 2011. Completeness of Queries over Incomplete Databases. Proceedings of the VLDB Endowment, 4 (11), pp.749–760. 116. Reed, G., Keeley, R., Belov, S., and Mikhailov, N., 2010. Ocean Data Portal: A Standard Approach to Data Access and Dissemination. In: Proceedings of the OceanObs. 117. Reiter, R., 1978. On Closed World Data Bases. In: H. Gallaire and J. Minker, eds. Logic and Data Bases. Boston, MA: Springer US, pp.55–76. 118. Rolim, C.O., Koch, F.L., Westphall, C.B., Werner, J., Fracalossi, A., and Salvador, G.S., 2010. A Cloud Computing Solution for Patient’s Data Collection in Health Care Institutions. In: 2010 Second International Conference on eHealth, Telemedicine, and Social Medicine. Ieee, pp.95–99. 119. Rose, S., Spinks, N., and Canhoto, A.I., 2015. Tests for the Assumption That a Variable Is Normally Distributed. Management Research: Applying the Principles. New York: Routledge. 120. Ruj, S., Stojmenovic, M., and Nayak, A., 2012. Privacy Preserving Access Control with Authentication for Securing Data in Clouds. In: Proceedings - 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012. pp.556–563. 121. Sakamoto, M., Ando, H., and Tsutou, A., 2013. Comparing the Effects of Different Individualized Music Interventions for Elderly Individuals with Severe Dementia. International Psychogeriatrics, 25 (05), pp.775–784. 122. Sayogo, D.S., Pardo, T., and Kowlowitz, A., 2012. Collaborative Data Sharing Networks. 123. van Schaik, T.A., Kovalevskaya, N. V., Protopapas, E., Wahid, H., and Nielsen, F.G.G., 2014. The Need to Redefine Genomic Data Sharing: A Focus on Data Accessibility. Applied & Translational Genomics, 3 (4), pp.100–104. 124. Sebastian-Coleman, L., 2013. Measuring Data Quality for Ongoing Improvement: A Data Quality Assessment Framework. Morgan-Kaufmann -Elsevier. 125. Shiang-yen, T.A.N., Foo, L.Y., and Idrus, R., 2010. Application of Quick Response ( QR ) Codes in Mobile Tagging System for Retrieving Information about Genetically Modified Food. In: Proceedings of the 9th WSEAS international conference on Data networks, communications, computers, DNCOCO. pp.114–118. 126. Shimrat, O., 2009. Cloud Computing and Healthcare. San Diego Physician .org. 127. Sial, S., 2009. Weakness of Cryptography [online]. Ezine Articles. Available at: http://ezinearticles.com/?Weakness?of?Cryptography&id=2282424 [Accessed 29 Jun 2015]. 128. Smith, G.D., 1994. Increasing the Accessibility of Data. British Medical Journal, 308, pp.1519–1520. 129. Smucker, M.D., Allan, J., and Carterette, B., 2007. A Comparison of Statistical Significance Tests for Information Retrieval Evaluation. In: CIKM ’07: Proceedings of the sixteenth ACM conference on Conference on information and knowledge management. pp.623–632. 130. So, S., 2011. Beyond the Simple Codes : QR Codes in Education. In: In Ascilite Conference Changing Demands, Changing Directions. pp.1157–1161. 131. SPSS, 2009. Missing Data : The Hidden Problem. IBM SPSS. 132. Sun, Y.-G., 2011. Access Control Method Based on Multi-Level Security Tag for Distributed Database System. In: Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology. pp.2509–2512. 133. Tandon, A., Sharma, R., Sodhiya, S., and Vincent, P.M.D.R., 2013. QR Code Based Secure OTP Distribution Scheme for Authentication in Net-Banking. International Journal of Engineering and Technology (IJET), 5 (3), pp.2502–2505. 134. Tang, J., Ren, Y., Yang, C., Shen, L., and Jiang, J., 2011. A WebGIS for Sharing and Integration of Multi-Source Heterogeneous Spatial Data. In: International Geoscience and Remote Sensing Symposium (IGARSS). pp.2943–2946. 135. Techopedia, 2007. Data Access [online]. Techopedia.com - The IT Education Site. Available at: http://www.techopedia.com/definition/26929/data-access [Accessed 29 Jun 2015]. 136. Teicher, M. and Townend, R., 2001. Smart Card Pin System, Card, And Reader. 137. Tejay, G., Dhillon, G., and Chin, A.G., 2006. Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper). In: Security Management, Integrity, and Internal Control in Information Systems. Boston: Kluwer Academic Publishers, pp.21–39. 138. Tenopir, C., Allard, S., Douglass, K., Aydinoglu, A.U., Wu, L., Read, E., Manoff, M., and Frame, M., 2011. Data Sharing by Scientists: Practices and Perceptions. PLoS ONE, 6 (6). 139. Topac, V. and Stoicu-Tivadar, V., 2011. Patient Empowerment by Increasing Information Accessibility in a Telecare System. In: Studies in Health Technology and Informatics. pp.1–5. 140. TRM Nett Systems (M) Sdn. Bhd, 2015. Integrated Healthcare Management Solution [online]. ClinicPlus - Complete Clinic Management System, Malaysia. Available at: http://www.clinicplus.com.my/clinicplus80i.html [Accessed 12 Oct 2015]. 141. Vieira-Marques, P.M., Patriarca-Almeida, J.H., Frade, S., Bacelar-Silva, G.M., Robles, S., and Cruz-Correia, R.J., 2014. OpenEHR Aware Multi Agent System for Inter- Institutional Health Data Integration . In: Information Systems and Technologies (CISTI), 2014 9th Iberian Conference. Barcelona: IEEE, pp.683–688. 142. Waller, T., Korbel, J., and Stys, M., 2015. CloverETL Designer : User ’ S Guide. 143. Wang, R.W. and Strong, D.M., 1996. Beyond Accuracy: What Data Quality Means to Data Consumers. Journal of Management Information Systems, 12 (4), pp.5–33. 144. Warner, R.M., 2008. Applied Statistics: From Bivariate through Multivariate Techniques. Internatio. Sage Publications. 145. Wilcoxon, F., 1945. Individual Comparisons by Ranking Methods. Biometrics bulletin, 1 (6), pp.80–83. 146. Xu, B., Xu, L. Da, Member, S., Cai, H., Xie, C., Hu, J., and Bu, F., 2014. Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services. IEEE Transactions on Indutrial Informatics, 10 (2), pp.1578–1586. 147. Yang, K. and Jia, X., 2014. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage. IEEE Transactions on Parallel and Distributed Systems, 25 (7), pp.1735–1744. 148. Yin, L. and Cao, G., 2004. Balancing the Tradeoffs between Data Accessibility and Query Delay in Ad Hoc Networks. In: Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems. Ieee, pp.289–298. 149. Zainuddin, M., Baswaraj, D., and Riyazoddin, S.M., 2012. Generating SMS ( Short Message Service ) in the Form of Quick Response Code ( QR-Code ). Journal of Computer Science and Information Technology, 1 (1), pp.10–14. 150. Zaniolo, C., 1984. Database Relations with Null Values. Journal of Computer and System Sciences, 28 (1), pp.142–166.