MHealth for Decision Making Support: A Case Study of EHealth in the Public Sector
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 5
Abstract
This paper seeks to explore factors that determine the acceptance of the MHealth application patients. The research relied on (UTAUT2) Unified Theory of Acceptance and Use of Technology to assess the level of acceptance of a new mobile health application by patients. The study involved conducting test surveys across medical hospitals in Jordan with the goal of collecting data from hospital visitors and their patients concerning their intention to use the new mobile health application. 98 questionnaires were collected and 44 valid responses drawn from them for onward data analysis. The UTAUT2 research model was the most appropriate one for conducting the evaluation on MHealth’s user acceptance. Its results would support the government’s goal of building m-health solutions that meet user needs. The model also enhances the roles of DSS in facilitating adoption of MHealth applications. This study provides a theoretical framework for pursuing future research work on the rates of adoption of m-health applications by patients.
Authors and Affiliations
Majed Kamel Al-Azzam, Malik Bader Alazzam, Majida Khalid al-Manasra
Graphing emotional patterns by dilation of the iris in video sequences
For this paper, we took videos of iris of people while induced a feeling of joy or sadness, using videos to motivate the states affective. The manuscript implemented is a system of recognition affective pattern by dilati...
JWOLF: Java Free French Wordnet Library
The electronic lexical databases WordNets, have become essential for many computer applications, especially in linguistic research. Free French WordNet is an XML lexical database for French language based on Princeton Wo...
Measuring Quality of E-Learning and Desaire2Learn in the College of Science and Humanities at Alghat, Majmaah University
E-learning and Desaire2Learn (D2L) system were used in several higher education institutions; the learning satisfaction depends on the quality of the system applied to serve this issue and its importance in users mind. T...
Triple SV: A Bit Level Symmetric Block-Cipher Having High Avalanche Effect
The prolific growth of network communication system entails high risk of breach in information security. This substantiates the need for higher security for electronic information. Cryptography is one of the ways to secu...
An Approach of nMPRA Architecture using Hardware Implemented Support for Event Prioritization and Treating
One of the fundamental requirements of real time operating systems is the determinism of executing critical tasks and treating multiple periodic or aperiodic events. The present paper presents the hardware support of the...