<<

PDF hosted at the Radboud Repository of the Radboud University Nijmegen

The following full text is a publisher's version.

For additional information about this publication click this link. http://hdl.handle.net/2066/131341

Please be advised that this information was generated on 2021-10-04 and may be subject to change. TSERVICE DISCOVERY IN eHEALTH

TESFA TEGEGNE ASFAW Service Discovery in eHealth

Tesfa Tegegne Asfaw Copyright c 2014 , Tesfa Tegegne Asfaw, Nijmegen, The Netherlands. isbn : 978-90-8891-949-7 SIKS dissertation series: 2014-33

Typeset by the author with LATEX 2ε Documentation System. Cover design: Tesfa Tegegne Asfaw Printed and Lay Out by: Proefschriftmaken.nl, Uitgeverij BOXPress Published by: Uitgeverij BOXPress, Oisterwijk

The work in this thesis has been carried out under the auspices of SIKS, the Dutch Research School for Infor- mation and Knowledge Systems and the Institute for Computing and Information Sciences of the Radboud University Nijmegen.

The research was sponsored by NUFFIC, the Nether- lands Organization for International Cooperation in Higher Education. Service Discovery in eHealth

Proefschrift

ter verkrijging van de graad van doctor aan de Radboud Universteit Nijmegen op gezag van de rector magnificus prof. mr. S.C.J.J. Kortmann volgens besluit van het college van decanen in het openbaar te verdedigen op vrijdag 5 september 2014 om 14.30 uur precies

door

Tesfa Tegegne Asfaw

geboren op 17 mei 1967, te Gondar (Ethiopi¨e) Promotor: Prof. dr. ir. Th.P. van der Weide

Manuscriptcommissie: Prof. dr. H.A. Proper Prof. dr. W.J.A.M van den Heuvel (Universiteit van Tilburg) Dr. G. Pasi (Universit`aDegli Studi di Milano Bicocca, Milano, Italy) Service Discovery in eHealth

Doctoral thesis

to obtain the degree of doctor from Radboud University Nijmegen on the authority of the Rector Magnificus prof. dr. S.C.J.J. Kortmann, according to the decision of the Council of Deans to be defended in public on Friday, September 5, 2014 at 14.30 hours

by

Tesfa Tegegne Asfaw

born on May 17, 1967 in Gondar (Ethiopia) Supervisor: Prof. dr. ir. Th.P. van der Weide

Doctoral Thesis Committee: Prof. dr. H.A. Proper Prof. dr. W.J.A.M van den Heuvel (Universiteit van Tilburg) Dr. G. Pasi (Universit`aDegli Studi di Milano Bicocca, Milano, Italy) Contents

Preface xvii

1 Introduction 1 1.1 Background ...... 1 1.2 Research problem ...... 4 1.2.1 Research questions ...... 4 1.2.2 Objectives ...... 5 1.2.3 Contribution of the thesis ...... 6 1.3 Research Methodology ...... 6 1.3.1 Experimental methods ...... 7 1.3.2 Theoretical method ...... 7 1.3.3 Simulation method ...... 7 1.3.4 Design science ...... 8 1.3.5 Research approach ...... 9 1.4 Thesis outline ...... 10 1.5 Research Publications ...... 13 1.6 Conclusion ...... 13

I The Overall Requirement: a Case Study in Ethiopia 15

2 eHealth service discovery framework: a case study in Ethiopia 17 2.1 Introduction ...... 17 2.2 Related Work ...... 18 2.3 SOA for Healthcare ...... 19 2.3.1 The Impact of SOA in Healthcare for Developing Countries 20 2.3.2 Anywhere Anytime mHealth ...... 21 2.3.3 Case Study: Antiretroviral Treatment (ART) ...... 22 2.4 The SWOT Analysis ...... 23 2.4.1 Background ...... 23 2.4.2 Strengths and Weaknesses ...... 24 2.4.3 Opportunities and Threats ...... 25 2.4.4 The Proposed Strategy ...... 27 2.4.5 Analysis of the Confrontation Matrix ...... 27 2.4.6 The Main Architecture ...... 28

vii 2.5 Service Discovery ...... 30 2.5.1 Sample Session ...... 31 2.6 Conclusion ...... 32

3 Is mHealth Viable to Ethiopia? An empirical study 33 3.1 Introduction ...... 33 3.1.1 Potential of Mobile Phones to Improve Healthcare in Ethiopia 34 3.1.2 Objectives ...... 35 3.2 Application of mHealth ...... 36 3.2.1 Education and Awareness ...... 36 3.2.2 Remote Data Collection ...... 37 3.2.3 Remote Monitoring ...... 37 3.2.4 Communication and Training for Healthcare Workers . . 37 3.2.5 Diagnostic and Treatment Support ...... 38 3.3 Health Services of Ethiopia ...... 38 3.3.1 Background ...... 38 3.3.2 Health Institutions ...... 38 3.3.3 Health Professionals ...... 38 3.4 Methodology ...... 39 3.4.1 Sampling Technique ...... 40 3.4.2 Data Gathering Tools ...... 40 3.4.3 Discussion ...... 40 3.4.4 Result ...... 43 3.5 mHealth Framework ...... 45 3.6 Conclusion ...... 45

II Service Discovery Architecture 47

4 Service discovery architecture for a low infrastructure context 49 4.1 Introduction ...... 49 4.2 Related Work ...... 51 4.3 Service Discovery in Low Infrastructure ...... 51 4.3.1 Sample Session ...... 52 4.3.2 Ontology Based Semantic Service ...... 53 4.3.3 User Profile (Consumer Profile) ...... 54 4.3.4 Context-aware Service Discovery ...... 55 4.3.5 Personalized and Context Based Matchmaker ...... 56 4.3.6 eHealth Service ...... 56 4.4 eHealth Framework ...... 58 4.4.1 Service Discovery Engine ...... 58 4.4.2 Service Registry(Repository) ...... 59 4.5 Conclusion ...... 60

viii III Personalized Context-aware Dialogue System 61

5 User Profile-based Service Discovery for eHealth 63 5.1 Introduction ...... 63 5.2 Related Work ...... 65 5.2.1 Context-aware Models for Personalization ...... 66 5.2.2 Personalization and Service Discovery ...... 68 5.3 User Profile ...... 68 5.3.1 Challenges of User Profile (Personalization) ...... 70 5.3.2 Working Example ...... 70 5.3.3 User Profile Privacy ...... 72 5.4 Service Discovery Framework ...... 74 5.4.1 The Profiled Discovery Problem ...... 75 5.4.2 The Architecture ...... 76 5.5 Personalization on eHealth ...... 79 5.5.1 eHealth Service Discovery Framework ...... 80 5.5.2 Key Benefits ...... 80 5.6 Conclusion ...... 81

6 The impact of user requirement elicitation 83 6.1 Introduction ...... 83 6.2 Literature Review ...... 87 6.3 User Requirements Elicitation and Analysis ...... 89 6.3.1 Requirement Elicitation ...... 89 6.3.2 Requirement Analysis and Negotiation ...... 95 6.4 Methodology ...... 96 6.5 Result & Discussion ...... 96 6.5.1 Service Identification ...... 96 6.5.2 Stakeholder Selection and Participation ...... 97 6.5.3 Requirement Elicitation Techiques/tools ...... 98 6.5.4 Requirement Review ...... 99 6.6 Conclusion and Future work ...... 100

7 Designing Spoken Dialogue Systems for Doctor-Patient Conver- sation 101 7.1 Introduction ...... 101 7.1.1 Motivation ...... 102 7.2 Spoken dialogue systems in healthcare ...... 103 7.2.1 Diagnosis Systems ...... 103 7.2.2 Doctor-Patient Face-to-Face Interaction ...... 104 7.3 Finding Cultural Dependencies ...... 105 7.3.1 Methodology ...... 106 7.3.2 Results ...... 107 7.3.3 Discussion ...... 109 7.3.4 Cultural Aspects ...... 110 7.4 A Spoken Dialogue Model ...... 112

ix 7.4.1 A Simplified Dialogue System ...... 113 7.4.2 Design Dialogue System ...... 114 7.4.3 Designing a Dialogue Based on Doctor-Patient Interaction 114 7.5 Conclusion ...... 117

IV Query Enrichment and Preference Prioritization and Aggregation 119

8 Query enrichment by user preferences 121 8.1 Introduction ...... 121 8.2 Related Work ...... 123 8.2.1 Personalization ...... 124 8.2.2 Matchmaking ...... 126 8.2.3 Comparison with related systems ...... 127 8.3 Difference Between Query Expansion, Formulation and Enrichment127 8.4 Overall Architecture ...... 128 8.4.1 The Dialogue System ...... 129 8.4.2 The Query Interpreter ...... 129 8.4.3 The Matchmaker ...... 130 8.5 Preference Expressions ...... 130 8.5.1 The Relational Model ...... 131 8.5.2 Preferences ...... 132 8.5.3 Conditional Preference ...... 132 8.5.4 Preference Formalism ...... 132 8.5.5 Base Preference Constructors ...... 133 8.5.6 Combining Preferences ...... 134 8.5.7 Properties and Derived Operators ...... 135 8.5.8 Displaying Preferences as CP-Nets ...... 136 8.6 The preferential Similarity Model ...... 138 8.6.1 Preference and SQL ...... 138 8.6.2 Fuzzy Matching ...... 138 8.6.3 Choosing Among the Candidates ...... 140 8.7 Applying in the e-Health Case ...... 141 8.7.1 Symptoms and Diseases ...... 141 8.7.2 Treatments and Risks ...... 142 8.8 A Case Study ...... 143 8.8.1 The Interaction with the Dialogue System ...... 144 8.8.2 The Knowledge and Service Repository ...... 145 8.8.3 The Enriched Query ...... 148 8.8.4 Explaining the Sample Session ...... 149 8.9 A Prototype ...... 151 8.9.1 Evaluation ...... 153 8.10 Conclusions and Future research ...... 153

x 9 User preference prioritization and aggregation 155 9.1 Introduction ...... 155 9.2 Multiple Criteria Decision Making ...... 157 9.2.1 Related Work ...... 158 9.2.2 The decision problem ...... 159 9.2.3 Ordered Weighting Average Operator ...... 162 9.2.4 Involving Preferences ...... 162 9.2.5 The Analytic Hierarchy Process(AHP ...... 163 9.3 MCDM and eHealth ...... 166 9.3.1 Prioritization ...... 166 9.3.2 Symptoms, Treatments and Risks ...... 168 9.3.3 Applying Ordered Weighting Average ...... 169 9.3.4 Applying Analytical Hierarchy Process ...... 171 9.4 The Case Study ...... 172 9.4.1 Background ...... 172 9.4.2 The Decision Process ...... 177 9.4.3 Discussion of case results ...... 186 9.5 Conclusions and Future Research ...... 190

V Prototype Development 191

10 TenaLeHulum (Prototype/Implementation) 193 10.1 Background ...... 193 10.2 Problem Formulation ...... 193 10.3 Requirement Elicitation ...... 194 10.4 Prototype Design ...... 196 10.5 Implementation ...... 196 10.5.1 The Conceptual Model ...... 197 10.5.2 The Database Structure ...... 199 10.5.3 Some of the Algorithms ...... 199 10.6 Evaluation ...... 201 10.6.1 Result ...... 202 10.6.2 Discussion ...... 202 10.7 Concluding Remarks ...... 204

11 Conclusion and Future Research 205 11.1 Overview ...... 205 11.2 Research Contributions ...... 205 11.3 Limitation ...... 208 11.4 Future Research ...... 209 11.4.1 Study ...... 209 11.4.2 Evaluation ...... 210 11.4.3 Clinical Decision Support Systems (CDSS) ...... 211

xi VI Back Matter 213

A AHP and OWA analysis 215

B Questionnaire 223 B.1 Analysis of the questionnaire ...... 232

Bibliography 237

Summary 267

Samenvatting (Dutch Summary) 269

Curriculum Vitae 271

SIKS 273

xii List of Figures

1.1 Design Science process adopted from [PTRC08] ...... 9

2.1 Service Seeking frameworks and criteria adopted from [JI04] . . . 29 2.2 The main architecture ...... 29 2.3 Service discovery framework/architecture ...... 30 2.4 Spoken dialogue system ...... 31

3.1 mHealth intervention areas in eHealth ...... 36 3.2 Health Institutions organogram of Ethiopia ...... 44

4.1 Service Discovery Framework/Architecture ...... 52 4.2 A sample session ...... 53

5.1 Context of mobile user ...... 67 5.2 Personalized user service request ...... 72 5.3 User authentication and authorization ...... 73 5.4 Profile-based service discovery and selection ...... 79

6.1 Requirement elicitation process ...... 91 6.2 Requirement Analysis phases ...... 95

7.1 Semantic Entities of Doctor-patient conversation ...... 107 7.2 User request elicitation process ...... 115

8.1 The overall architecture ...... 128 8.2 The Dialogue System ...... 129 8.3 The Query Interpreter ...... 130 8.4 The Matchmaker ...... 130 8.5 CP-Net for “Evening Dress”, using preferences ...... 137 8.6 A preference graph of database tuples ...... 138 8.7 A preference graph with relevancy scores ...... 138 8.8 CP-net for symptoms, treatments and risks ...... 142 8.9 Patient preferences ...... 143 8.10 Symptoms entered by the user ...... 143 8.11 Framework for the example ...... 144 8.12 Classification of Symptoms ...... 146

xiii 8.13 Classification of Treatments ...... 146 8.14 The sample medical knowledge CP-net ...... 148 8.15 Knowledge sources to enrich a query ...... 149 8.16 Screen shots of the prototype ...... 152 8.17 List of possible diseases and possible treatment for typhoid fever 153

9.1 The structure of a simple decision problem ...... 160 9.2 The augmented decision tree ...... 160 9.3 A node is a decision tree ...... 160 9.4 Implicit-Explicit transformation ...... 161 9.5 The situation in a leaf node ...... 166 9.6 Preferences of Martha ...... 167 9.7 Preferences of Martha’s twin sister ...... 167 9.8 The medical decision problem ...... 168 9.9 Martha’s niece preferences ...... 170 9.10 The complete decision process ...... 178

10.1 The Conceptual Scheme ...... 197 10.2 Similarity coverage for diagnosis ...... 203 10.3 Similarity coverage for side-effect ...... 203 10.4 Similarity coverage for treatment ...... 204

A.1 Selection of antiretroviral drug based on efficacy ...... 215 A.2 Selection of antiretroviral drug based on adverse effect ...... 216 A.3 Selection of antiretroviral drug based on fetal effect ...... 216 A.4 Aggregation of sub-decisions for antiretroviral drugs ...... 217 A.5 Selection of antimalarial drug based on fetal effect ...... 217 A.6 Selection of antimalarial drug based on adverse effect ...... 218 A.7 Aggregation of sub-criteria prioritization for antimalarial drugs . 219 A.8 Aggregation of antiretroviral and antimalarial therapies . . . . . 219 A.9 Doctor’s antiretroviral aggregation ...... 220 A.10 Doctor’s antimalarial aggregation ...... 220 A.11 Patient’s partial balance (efficacy(Φ1p) and risk(Φ2p))aggregation 221 A.12 Doctor’s partial balance (efficacy(Φ1d) and risk(Φ2d))aggregation 221 A.13 Patient’s decision ...... 221 A.14 Doctor’s decision ...... 222 A.15 Treatment Selection ...... 222

xiv List of Tables

1.1 Analysis result of the prototype ...... 12

2.1 Worlds top 5 fastest growing economies [Eco11] ...... 23 2.2 Five years health coverage in Ethiopia ...... 24 2.3 Confrontation matrix ...... 27

3.1 No of healthcare workers in Amhara state ...... 39 3.2 Patient treated in the state in year 2010 ...... 39 3.3 Infrastructure facilities of the health center ...... 42 3.4 Availability of ICT equipments ...... 43

7.1 Doctor utterances in face-to-face conversation ...... 108 7.2 Patient utterances in face-to-face diagnosis processes ...... 108 7.3 Information seeking and provision behavior of patient ...... 108 7.4 Information seeking and provision behavior of doctor ...... 108

8.1 Model summary ...... 145

9.1 Relative Importance ...... 163 9.2 Values ...... 165 9.3 Effects of antiretroviral drugs ...... 178 9.4 Quinine vs Artemether/Lumefantarine (AL) or Coartem . . . . . 179 9.5 Price of ART for year 2011 and 2012 ...... 179

xv xvi Preface

The area of Information and communication technology is wide and affects or socio-economic behavior to a great extent. ICT involved in every sector of development: healthcare, agriculture, education etc. The past two decades, there are enormous technological developments: various theories are developed, tools/devices are emerged and manufactured. In the beginning of this century, the new service oriented architecture paradigm picked up steam and was established as a leading business and technology orga- nizational concept. Service orientation is the paradigm that shows activities in terms of services. Service discovery is a protocol which allow automatic detec- tion of devices or services offered by service providers on a computer network (internet). The thesis address service discovery in healthcare domain. Infor- mation and communication technology (ICT) is seen as a major possibility for innovations in healthcae. Nevertheless, there is no much done in the healthcare domain. In the research reported in this thesis, we developed a framework: eSDF and a prototype to test and evaluate the process of service discovery in healthcare domain. The thesis presents theoretical, empirical and case studies on electronic health and mobile health in Ethiopia. Pursuing a PhD is a truly life-changing journey that is not possible to ac- complish without the help, support and guidance of many people. First of all, I would like to thank and express my gratitude to my advisor, Professor Th.P (Theo) van der Weide, who gave me the opportunity to per- form and accomplish the biggest step towards an academic or research career, which is the PhD acquisition. His continuous support encouraged and enabled me to surpass all research obstacles that came into my way. In addition, his ex- pert guidance, stimulating encouragement, and valuable suggestions have greatly contributed to this thesis and helped me round off the PhD research successfully. Secondly, I would like to acknowledge the support of NUFFIC (for offering me scholarship) and the Institute for Computing and Information Science (ICIS) of Radboud University both financially (providing scholarships for all the expenses throughout the PhD program) and in facilities. Many people from ICIS of Radboud Univesity also helped me in various ways and they deserve special acknowledgments, namely Irma Haerkens, Ronny Wichers, Engelbert Hubbers, and Nicole Messink. Special thanks also go to iCIS- digital security and IS group. Thanks to Didi Rustam for the entertaining atmosphere, the badminton game,

xvii the fun that we spent with a tight schedule and a lot of burden. Thirdly, I would also like to extend my thanks to my parents, brothers, sisters, relatives and friends for the encouragement you provided me throughout my journey. Finally, I would like to thank my wife, Wesenyelesh Amare, for the invaluable love and support that you have unconditionally given and accepting and allowing me to be away for four years. Thank you for looking after our son and shouldering the burden alone rasing him. You have always been there in both the good and the bad moments and gave me the power and inspiration to move on and strive for my goals. In the same vein, I would like to thank my son Fanuel for accepting to have a roving dad at such a tender age when you seek more love and affection form your dad.

Tesfa Tegegne Asfaw

xviii

Chapter 1

Introduction

1.1 Background

The emergence of information and communication technology (ICT) has spawned the flourishing growth of an information and communication revolution in health- care. Information and communication technology has changed the delivery of healthcare services through the concept of electronic health (eHealth). eHealth is emerging as a promising field for improving healthcare quality by offering early symptom detection, early diagnosis, remote monitoring, prevention and guidance and counseling [Ahe07]. The expansion of internet and mobile computing offers possibilities to easily provide health information to individual patients. These health services include personal medical care, advice, and management of related data, communication between health care providers and/or patients, including bulletin boards, chat rooms, or other facilities to communicate health related information [VPP05]. Similarly, [RGA99] said that eHealth becomes critical to the delivery of cost-efficient and quality healthcare. eHealth has contributed to better health service management and delivery of care by creating a conducive environment to increase the access and quality of patient care and by supporting health professionals to provide clinical and administrative decision making. According to Vasilyeva et al. ([VPP05]), eHealth improves the quality and access of healthcare by providing an environment that enables people to manage their well-being through (1) access to qualified and trusted sources of health information and (2) active participation in disease prevention. It enables patients to participate, with better knowledge and responsibility for self monitoring and personalized healthcare by providing real time information and tools for better management of risk and up-to-date medical knowledge and by offering reliable and affordable personal health systems that assist people in managing their lifestyle. Healthcare ICT or eHealth in the developing world has the potential to act as a bridge between medical and public health services. Healthcare technology is a cornerstone of healthcare reform in a number of contexts, and a key element of many developed and some developing countries. Currently enormous amounts 2 Chapter 1. Introduction of effort and resources are utilized to implement eHealth care services in both developed and developing countries. eHealth also brings up opportunities to overcome some of the barriers and challenges of rural healthcare services. Healthcare is positioned to beneficiate from the advancement of technology and connectivity [SG08]. High technological devices and software are available to the healthcare professionals and patients. These advancements of technologies in healthcare are expected to boost performance, to reduce costs and to ameliorate patient care. Today eHealth innovations are considered a key component of patient centered healthcare and an accountable entity. The evidence pointing to the growing interest and investment in eHealth research is described in [Ahe07], and a case is made for the robustness of the burgeoning research field. According to [ABKM11] the goal of health informatics (eHealth) is to develop a technology that is favorable to both the clinician and the patient. The authors of [AKP06] stated eHealth as a promising vehicle that addresses the limited capacity of the healthcare system to provide health behavior change and chronic disease management interventions. The use of eHealth technologies is growing extremely fast and a high per- centage of population already is using eHealth tools. To this [WYB13] has said that about 17% of the US population is using eHealth tools and that 85% would like to communicate with their health providers using email or secure messaging systems. Furthermore, 56% of the physicians have eHealth services that help to disseminate and avail examination results and lab tests electronically [WYB13]. eHealth attempts to foster growth of patient centered care [RMM+13, CE06], which is considered as one of the vital pillars of a high quality healthcare system. Engaging the patients in healthcare decisions is a key component among the sev- eral efforts to reform care and to achieve a better population health [RMM+13]. Being able to access and use health information is the foundation for individu- als to have active and informed involvement in their personal healthcare and in decisions relating to this. Similarly, eHealth is also an essential empowerment strategy. The involvement of patients in healthcare decision making improves health literacy, clinical decisions, self-care, patient safety, and access to personal health information or record [CE06]. Accessing personal health information and using eHealth tools has positioned the patients to indulge in decision making: managing their conditions, voiced with treatment decisions and anytime and anywhere communication with their healthcare workers (doctors, nurses, etc). Generally speaking, eHealth services or tools have changed the ways in which patients and healthcare workers interact. Currently, health information systems is believed to be as a strategic necessity that significantly improves healthcare services. However, there are enormous challenges to adopt and use eHealth in a fully- fledged manner, particularly in developing countries. The main challenges faced in many developing countries are ICT illiteracy, underdeveloped infrastructure and low literacy level and poverty. Braa and Purkayastha [BP10] mentioned the potential significance of mobile technologies in strengthening the health systems in developing countries; but “lack of power, social and institutional issues” are 1.1. Background 3 the major challenges that hinder full utilization of mobile technologies in areas with low infrastructure context [SRB12]. The complexity associated with the design of eHealth systems and its applica- tion environment has driven developers to seek methodologies that can simplify their work. The service oriented architecture (SOA) is a solution that is cap- tivating many important industries and research institutes [SG08]. Service ori- ented architecture (SOA) (see [BAPP06, Has05]), and the corresponding service oriented computing (SOC) provide a system architecture in which a collection of loosely coupled services (components) directly communicate with each other using standard interfaces and message-exchanging protocols. According to Pa- pazoglou et al., [PTDL08], software services or simply services are self contained, platform-agnostic computational elements that support rapid, low-cost and easy composition of loosely coupled distributed software applications. SOA provides a framework for an infrastructure to facilitate the interactions and communica- tions between services [PH07]. The functionality provided by a service can range from answering simple requests to regarding executing sophisticated processes requiring peer to peer or client/server relationships between multiple layers of service consumers and providers [BAPP06, Has05]. SOA is a paradigm [Mar08] that offers system design and management prin- ciples that supports reuse and sharing of system resources across health organi- zations. SOA doesn’t require the re-engineering of the existing systems. With SOA, existing processing can be combined with new capabilities to build a library of services that are used as a part of, or to compose, solutions. Using shared ser- vices that are aligned with business processes, SOA strengthens interoperability while reducing the need to synchronize data between isolated systems. Services may be made available, no matter their location, to create solutions that reach beyond the desktop, the department and the healthcare organization [Bri07]. SOA provides some unique abilities to more quickly react, adapt, and insti- tute changes within an organization and its ICT landscape. SOA is a proven architectural approach that is mature in many other market sectors and has shown benefit it healthcare organizations as well. Ultimately, organizations that have elected to utilize SOA solutions have done so to improve their agility (abil- ity to respond to changing requirements), to more effectively develop and deploy ICT systems, and to improve business ownership, accountability, and consis- tency [Bri07], [HL711]. SOA has been proven to be an adequate solution to integrate heterogenous systems and applications, allowing different application- to-application communication on the internet, reducing cost and making data and services available to different stakeholders. SOA defines a service as an autonomous independent unit of work that is loosely coupled that has a defined capabilities. A service may be an entire pro- cess, a function supporting a process, or a step of a business process [Bri07]. The main advantage of applying SOA is to increase re-use and sharing of resources and functions across systems, departments and organization. Several researchers have claimed that SOA is capable of offering a generic model for implementing large scale enterprize applications, with healthcare as 4 Chapter 1. Introduction an example [Bri07, OTB06, SG08, Has05]. For example, Omar and Taleb- Bendiab [OTB06] have developed an experimental scenario for eHealth moni- toring systems that use SOA as a model for deploying, discovering, integrating, implementing, managing and invoking eHealth services. This eHealth moni- toring system gathers patients readings (blood pressure, temperature, levels of blood components etc) and saves the data in the patient profile to monitor a pa- tient’s condition and relays the information to hospitals or eHealth systems. Such an approach would reduce the hospital burden by minimizing routine check-ups and avoiding patient’s frequent visits thus helping to manage scarce resources (money and human resources) on more difficult tasks [OTB06]. Benharref and Serhani [BS14] proposed a service oriented and cloud based eHealth system for tracking, monitoring and prevention of chronic diseases. The function of the systems is early detection, follow up on chronic disease patients and prevention and coaching of chronic disease patients. Medical errors, redundant data and limited resources are the main challenges facing the healthcare sector; however SOA is a true interoperability that can solve the above mentioned problems and enhance the quality of healthcare ser- vices. Thus, eHealth using SOA framework will improve the healthcare services delivery.

1.2 Research problem

Healthcare is one of the burdens of society in the world. It is believed that peo- ple suffer from chronic and communicable diseases in developed and developing countries respectively.

1.2.1 Research questions This thesis tries to answer the following main question: RQ What is an adequate model for service discovery in a healthcare domain in developing countries? To further guide our research in general, and problem investigation in particular, we shall have the following sub-questions within the context of understanding and supporting the service discovery in healthcare domain. The sub-questions offers to realize the service framework developed. RQ1 Is Ethiopia ready to implement eHealth in terms of technology readiness? What are the main opportunities and threats? RQ2 Is mHealth viable to Ethiopia? RQ3 What is the impact of user requirement elicitation towards service descrip- tion and discovery? RQ4 Is it possible to design a dialogue system based on face to-face doctor- patient interaction in diagnosis process considering cultural diversity? 1.2. Research problem 5

RQ5 What are the main components of service discovery? RQ6 How do we enrich user queries using user preferences and domain knowl- edge? RQ7 How do we prioritize and aggregate treatment decisions using user pref- erence? This research question assesses the readiness of Ethiopia in implementing and utilizing information technology to reform the health sector. The question at- tempts to seek the opportunities and threats of using eHealth. The main purpose of these sub-questions are to assess and evaluate the opportunities and threats of eHealth services. In this thesis, some of the unique challenges and opportunities encountered in eHealth are addressed and highlighted.

1.2.2 Objectives The main objective of this thesis is: OBJ The development of a framework that explains and describes a service dis- covery model to be applied in the healthcare domain in a low infrastructure context. We further break down the above main objective into specific objects in order to address the sub-question proposed in the above sub-section. OBJ1 To assess and evaluate opportunities and threats for implementing eHealth services. OBJ2 To assess the expansion of mobile users and identify the main challenges of using mobile phone in healthcare domain by rural healthcare workers: nurses and health extension workers. OBJ3 To identify the methodologies and techniques used in user service re- quirements elicitation for a wide audience and non-specific users. OBJ4 To evaluate the relationship and difference between conventional require- ments elicitation and service oriented requirements elicitation techniques. OBJ5 To identify the main gaps of face-to-face doctor-patient interaction and to emulate the techniques employed in spoken dialogue design for healthcare. OBJ6 To develop a service discovery framework and analyze the relationships of components. OBJ7 To enrich user queries using personal profiles and domain knowledge. User queries only consists of symptoms, and is mainly provided by semi- literate and illiterate users. OBJ8 To select a personalized treatment based on user preferences. AHP and OWA are used to prioritize and aggregate treatment decisions for pregnant patients co-infected by HIV/AIDS and malaria. 6 Chapter 1. Introduction

1.2.3 Contribution of the thesis The main contribution of the research is developing a framework that can sup- port healthcare workers to substantiate their knowledge and experiences. Sim- ilarly, patients can search health information based on the signs and symptoms they are filling to take a precautious; particularly, patients with chronic illness get some information about the diseases. For detail contributions of the thesis, see Section 1.4.

1.3 Research Methodology

Before we start discussing the different types of research methodologies we have to define the research. In an academic context, research is used to to refer to the activity of a diligent and systematic inquiry or investigation of an area, with the objectives of discovering or revising facts, theories or applications etc. The purpose is to discover and disseminate new knowledge or to propose a new theory or applications or tools. In computer science and information science, an enormous number of re- search methods are being used to investigate computing problems. Choosing a research method is determined by the nature of the research questions, the research objectives, the research settings and the type of research A methodology is a well-structured set of activities, guidelines, concepts, beliefs, methods, values and normative principles which assist in the undertak- ing of a research. In the context of a research project, a method refers to an organized approach to problem-solving that includes (1) collecting data, (2) for- mulating a hypothesis or proposition, (3) testing the hypothesis, (4) interpreting results, and (5) stating conclusions that can later be evaluated independently by others [BHOL08]. This is also commonly described as the scientific method. Selecting appropriate research methods in computing discipline has been a focus of concern and an intriguing or intricate issue [Min01]. The reason behind this claims is that most scholar believes that the computing discipline lacks a clear ground breaking research methodology of its own, it is believed that research methods used by the computing discipline borrows from mathematics, engineer- ing and from social science such as: psychology and sociology. It is because the computing embraces various disciplines that directly and indirectly involve machine and human. The computer science discipline uses the following methodologies: experi- mental, design science, ground theory and simulation. There is some confusion on selecting appropriate research methods in computer science and information systems, since the methods that have been used are adopted from different dis- ciplines (social science and natural science). Before explicitly addressing the research methods used in this thesis, we would like to discuss some of the meth- ods or research techniques used in computing area. Research methods generally categorized as quantitative and qualitative.

Quantitative: research concentrates on what can be measured. It involves 1.3. Research Methodology 7

collecting and analyzing objective data. It involves different statistical and mathematical methods to analyze the collected data. Qualitative: research concentrates on collecting and analyzing subjec- tive data. It also deals with usually the perceptions of the participants involved in the research. Incorporating the perceptions of the stakeholders helps to gain the insights and explicitly address the question ‘why’. Ac- cording to [DF07] “ qualitative research aims to explore and to discover issues about the problem at hand, because very little is known about the problem. There is usually uncertainty about dimensions and characteris- tics of problem. It uses ‘soft’ data and gets ‘rich’ data ”. The most common research methodologies are theoretical and experimental. The former is intended to provide new theories based on mathematical and formal methods; the later one provides valid data for the claims made by the research for a certain research questions. We have used different methods to answer our claims. Some of the most popular methods used in computing discipline are presented as follows.

1.3.1 Experimental methods Experimentation is a crucial part of attribute evaluation and helps to determine whether methods are used in accordance to some theory during product devel- opment. Experiments can test the truthfulness of theories. This method is used in several fields of computer science. It is one of the most widely used methods in the computing discipline. This method is used to ameliorate the legibility and reliability of the developed project. Generally, this method is largely identifying concepts that facilitate solutions to a problem and that evaluate the solution through a prototype [DC02].

1.3.2 Theoretical method This method is based on logic and mathematics. It mainly deals with the concep- tual and formal methods, algorithms, data models. The goal of the theoretical method is to develop and design new algorithms in order to provide optimal solutions for the existing problem or derive a new theory based on the new al- gorithms and models designed and proposed. This method is not only finding new mathematical or formal models or theories, but this method improves the efficiency of the existing theories or models [DC02]. Iteration, induction and recursion [DC02], derived from mathematics, are some of the techniques used in theoretical computer research.

1.3.3 Simulation method In recent years, computer based modeling and simulation has become one of the research methods to solve complex problems. “Computer simulation makes it possible to investigate regimes that are beyond current experimental capabilities 8 Chapter 1. Introduction and to study phenomena that cannot be replicated in laboratories, such as the evolution of of the universe. In the realm of science, computer simulation are guided by theory as well as experimental results, while the computational results often suggest new experiments and theoretical models” [DC02]. Computer sim- ulation is growing in popularity as a methodology to solve complex problems and to predict the future development of the system. Dooley [Doo02] explained three simulation practices: discrete event, system dynamics and agent-based simulation. Generally, the simulation method is used in a variety of disciplines (military, education, health, agriculture, etc) to mimic the real world problems and to find an optimal solution.

1.3.4 Design science In this work we use design science approach [HMPR04, PTRC08, Sim96, MS95] to develop eHealth framework. According to design science researchers (practi- tioners), artifact in design science refers to a new method, technique, framework, model or develop a theory that makes the information systems more effective and efficient [HMPR04, PTRC08, Sim96]. March and Smith [MS95] highlighted the process of building the artifact. They stated that build refers to “to the construction of the artifact, domonstarting that such an artifact can be con- structed” [MS95]. According to Hevner et al. [HMPR04], “design science creates and evaluates IT artifacts intended to solve identified organizational problems”. Peffers et al. [PTRC08] propose six activities (steps) for design science: identify problem, define objectives for a solution, design and development, demonstra- tion, evaluation and communication. Similarly, Hevner [Hev07] identified three cycles of design science research, relevance cycle, design cycle and rigor cycle. Relevance cycle initiates by identi- fying the requirements of the research, for example problems and opportunities faced by stakeholders and defining evaluation criteria for the results of the re- search. Besides, based on the feedback from the stakeholders the requirements could be amended. The rigor cycle identifies the knowledge base form litera- ture review, theories, methods, frameworks, experiences and expertise from the application domain that can be used to tackle the problem (that can provide an opportunity to create a novel idea and solution). The design cycle is an it- erative process between construction, evaluation and feedback of artifact. This process generates design alternatives and evaluating the alternatives against the requirements until optimal design is achieved [HMPR04, Sim96]. Design science is a rigorous method of research that enables to design and evaluate the designed artifacts and systems [HMPR04]. Design science is deep rooted from engineering and sciences of artificial [Sim96]. Design science acquires knowledge and understanding that enable the development and implementation of technology-based solutions to heretofore unsolved and important business problem [HMPR04, PTRC08]. In this research we follow Peffers et al.’s six design sciences processes to formulate our research agenda. In the activity of problem identification and mo- tivation, we employed overall SWOT analysis of the entire country in terms of 1.3. Research Methodology 9 infrastructure (internet, mobile phone expansion, telecom infrastructure, etc), human resources (brain drain, level of literacy etc), global awareness, funding and exponential growth. Currently, the expansion of mobile networks and mo- bile phone in many developing countries opens up enormous opportunities to solve many faceted problems in developing countries in different sectors. In line to this, an empirical study is conducted to assess the availability, coverage of mobile networks, and usage of mobile phones in health sector in rural Ethiopia. Based on this findings and literature review we formulate our research ques- tions. The second process is designing artifacts. Based on the SWOT analysis and the empirical study we developed a service discovery framework for eHealth (eSDF ). The framework basis on the findings of the analysis and a systematic literature review. The framework consists of different components, that includes the knowledge base of the domain. To test the framework an experiment is con- ducted and a prototype (TenaLeHulum) is developed. Finally, a questionnaire is administered to evaluate the framework and the prototype. Figure 1.1 depicts the design science process used in this research.

Figure 1.1: Design Science process adopted from [PTRC08]

1.3.5 Research approach We explicitly state the research methods used in this research. From the nature of our research questions and objectives, we employ different research techniques to discovery healthcare information (services). The research is methodologically qualitative and exploratory. This research attempts to find out what exists in, what are required to discover health information services using ICT. The research falls under an experimental and case study. Besides, a qualita- tive data analysis technique is used. We conduct a SWOT analysis in order to observe the technology and infrastructure readiness of Ethiopia in the healthcare domain (RQ1). This analysis helps to identify the existing opportunities and the 10 Chapter 1. Introduction gaps in the country to be able to launch eHealth. The expansion of mobile phones in developing and developed countries narrow down the digital divide between rural and urban populations. Thus we try to see the availability and exposure of rural healthcare workers in using mobile phones to solve problems facing in their day to day activities (RQ2). Similarly, the assessment addresses the gaps that may encounter if mobile based healthcare is used in the future; and reme- dies and solutions are proposed. Furthermore, in order to employ mHealth as a means to address the disease burden and shortage of healthcare workers (partic- ularly physicians in rural areas) as a tool for diagnosis purpose, we conduct an ethnography approach to record and observe the patient-doctor interaction to diagnosis illness. This techniques helps to emulate the face-to-face patient doctor conversation to spoken dialogue development. On the basis of the interaction, we proposed a spoken dialogue framework for mHealth (RQ4). Unlike conventional system development, service oriented systems do not have known users; hence, there is not any method or technology that can help to elicit user requirements. Having this in mind, we try to address the impact of user requirements in the process of service discovery. The main purpose of this assessment what kind of techniques and tools the service developers and requirement engineer used to elicit user requirements for adequate and efficient service discovery (RQ3). In addition, to answer research question (RQ5-RQ7), we use mathematical model and prototype. To validate the research, question- naire is administered for healthcare to evaluate the case studies as presented in the prototype. Based on the feedback, conclusion will be drawn.

1.4 Thesis outline

In this thesis we report on the results of the project, in which a prototype has been developed for health information service discovery. In addition more theoretical, empirical and case studies on electronic health and mobile health in Ethiopia are presented. We now give an overview of the chapters in this thesis and summarizes their contributions. The thesis consists of four parts.

Part I: Overall Requirements: a case study in Ethiopia This part consists of (chapter 2 & 3). The chapters are highlighted below. In this chapter the overall requirements to develop and implement eHealth in Ethiopia is assessed. A systematic literature review is conducted to assess how the ground is fertile to implement eHealth in terms of infrastructure like internet services, mo- bile expansion, government and individual readiness. In this chapter strengths, weaknesses, opportunities and threats are distinctly or clearly identified as a stepping stone to establish eHealth system. Furthermore, this chapter states the usage of the mobile phone in the healthcare sector, and also tries to answer the questions presented in the empirical study which is conducted to investigate the viability and feasibility of mHEALTH in Ethiopia (RQ2) (for detail see chap- ter 3). In this study we found that among the visited 10 health centers, only 1.4. Thesis outline 11 one of the health centers does not have a mobile network. However, expansion work was undergone. Related to this, the exposure of the healthcare workers on using internet for their day to day medical activities is very minimal. Even some of the healthcare in the rural health centers do not know about internet service accessible with their mobile phone with air time rate. Generally, this chapter consists of the SWOT analysis and the viability of mobile health in Ethiopia.

Part II: Service discovery architecture This part consists of chapter 4. In this chapter, we develop an eHealth service discovery architecture (RQ3). The proposed architecture is based on the findings of the SWOT analysis and the mHealth empirical studies in chapter 2. In this chapter the components of the architecture are presented in detail. The main contribution of this chapter is the proposed framework.

Part III: Personalized and context-aware dialogue system This part includes three chapters: chapter ( 5, 6 & 7). The part discussed abut personalization based service discovery, context aware dialogue systems and eliciting user queries and preferences. Chapter 5 briefly presents two of the components of the framework: personalization and contextualization. In this chapter a detailed theoretical review on personalized and context-aware health service discovery is presented. In chapter 6, we study the impact of user re- quirement elicitation on service discovery is assessed. A case study is conducted how service developers or requirement engineers elicit user requirements in order to speed up the service discovery process (RQ4). Besides, chapter 7 discusses the impact of patient-doctor conversation on designing and developing spoken dialogue system for healthcare (RQ5). This spoken dialogue system helps to re- alize to make the service discovery more personal and context-aware. The main contribution of this chapter is how personal profile and context awareness helps to boost up the process of health information search (discovery).

Part IV: Query Enrichment and preference prioritization and aggregation This part contains chapter 8 & 9. This part briefly addressess query enchi- ment, and user preference prioritization and aggregation. The description of each chapters are presented briefly as follows. This chapter ( 8) discusses how the user query is enriched based on her preferences and context. Besides to user’s personal information, we incorporate domain knowledge preferences as well. In most of the time, user queries are short, ambiguous and not clear as a result enriching user quires using user preferences and domain knowledge has a vital importance in order to make the retrieval process fast and efficient. The main contribution of this chapter is enriching user queries, in this case symptoms of a patient only, by enriching the queries 12 Chapter 1. Introduction using user preference (personal profile and user context) and domain knowledge (medical domain). Chapter 9 presents preference prioritization and aggregation for the medical domain. We employ the ordered weighting average operator (OWA) and the hierarchical analytical process (AHP) to prioritize treatment decisions for a case study on HIV and malaria co-infected pregnant woman. In this case study we addresses in detail the complex antiretroviral and antimalarial treatments for a pregnant women. The analysis shows that the treatment decisions obtained by OWA and AHP are similar to the guidelines provided by WHO [WHO13], US [AID13] and UK [BHI13] for antiretroviral and antimalarial treatments usage. The main contribution is how user preference prioritization and aggregation assists in providing complex medical decision makings.

Part V: Prototype Development) Part V consists of two chapters: TeneLehulum (prototype/Implementation)chpater 10 and the concluding chapter 11. A brief description of the chapters are given be- low. In chapter 10, we present the prototype developed to test and evaluate the proposed framework or model. We address the requirements elicitation tech- niques used, problem identification, prototype design, system implementation and evaluation. To evaluate the system accuracy we administered a question- naire to be filled by the health professionals. Eight nurses and five health officers are participated in the evaluation process. We compare the similarity between nurses and health officers, nurses and prototype, and health officers and proto- type. For the purpose of the comparison 8 cases are presented. The cases studies succinctly describes the signs and symptoms, personal information, previous his- tory, contextual (environmental) information and previous treatment (if any) of a patient. Based on this information, nurses and health officers are required to provide the possible disease, possible treatment (including dose and duration), side effects and risk level of the treatment. The analysis result is presented in Table 1.1.

Table 1.1: Analysis result of the prototype Diagnosis Treatment Side effect Sim(Nur,HO) 69.35% 66.54% 46% Sim(Nur,Sys) 41.3% 60.71% 39.08% Sim(HO,Sys) 51.1% 59.7% 62.21%

From the result we can conclude that even if there are some differences be- tween nurses and health officers compared to the system, we found no significant difference. Finally, chapter 11 discusses the main findings of this thesis in a more general context and conclude with an outlook on the future. 1.5. Research Publications 13

1.5 Research Publications

The following are the research publications done throughout this research.

1. Tegegne, T. and Weide, Th.P. van der (2014). Preference Prioritization and Aggregation, under review. 2. Tegegne, T. and Weide, Th.P. van der (2014). Evaluating the medical diagnosis system:TenaLeHulum, under review. 3. Tegegne, T. and Weide, Th.P. van der (2014). The impact of user require- ments elicitation towards service description and discovery, under review. 4. Tegegne, T. and Weide, Th.P. van der (2014). Enriching queries with user preferences in healthcare. Information Processing & Management,4 (50), 599-620. 5. Tegegne, T. and Weide, Th.P. van der (2013). Designing Spoken Dialogue System based on Dotctor-Patient Interaction in the Diagnosis Process, Third Int. Symposium on Business Modeling and Software Design: Special Session on EHST, 261-269. 6. Tegegne, T. and Weide, Th.P. van der (2012). Is mHealth Viable to Ethiopia? An Empirical Study. M4D2012, New Delhi, India. 7. Tegegne, T. and Weide, Th.P. van der (2011). eHealth Service Discovery Framework:A Case Study in Ethiopia. In Andreas Holzinger and Klaus- Martin Simonic, editors, USAB, LNCS (7058),397-416. Springer, 2011. 8. Tegegne, T., Kanagwa, B. and Weide, Th.P. van der (2011). User Profile- based Service Discovery for eHealth. ICSOFT (1) 2011: 337-346. 9. Tegegne, T., Kanagwa, B. and Weide, Th.P. van der (2010). An eHealth Service Discovery Framework for a Low Infrastructure Context. 2nd Int. Conf. on Computer Technology and Development, Nov 2-4, Cairo, Egypt, 606-610. 10. Tegegne, T., Kanagwa, B. and Weide, Th.P. van der (2010). Service Dis- covery Framework for Personalized eHealth. Int. Conf. on Services Sci- ence, Management and Engineering, Dec 26-28, Tainjin, China,

1.6 Conclusion

E-health service discovery is a multidisciplinary research activity that requires the involvement of medical experts, computer scientists, psychologists and sociol- ogists. In this chapter we address the research questions and the research objec- tives. Specifically, health information discovery in a low infrastructure has come across with different bottlenecks: low physical infrastructure, low education level and shortage of healthcare professionals. However, eHealth can contribute to fill some of the gaps using the existing infrastructure. Thus, to implement eHealth services for Ethiopia with the existing infrastructure, we assessed the overall readiness of the country and proposed eHealth service discovery framework. A prototype has been developed to test the framework. Part I

The Overall Requirement: a Case Study in Ethiopia Chapter 2 explains the overall requirements of Ethiopia towards devel- oping a eHealth services. It starts in Section 2.1 by introducing health services in a low infrastructure context. In section 2.2 a re- lated work is presented. The application of service oriented comput- ing in the healthcare domain. The analysis of the current situation of Ethiopia is discussed using SWOT analysis 2.4. The process of service discovery is described in more detail in Section 2.5. The chapter provides a concluding remark in Section 2.6. Chapter 3 explains the over all coverage of ICT and the expansion of mobile network. Section 3.2 introduces the application of mHealth. The available health services (health institutions and health profes- sional) in Ethiopia particularly in Amhara region is addressed in Section 3.3. The methodology used in this assessment is addressed in Section 3.4. Section 3.5 presents the mHealth framework. Finally, Section 3.6 wraps up the chapter by concluding remarks. Chapter 2 eHealth service discovery framework: a case study in Ethiopia

Abstract eHealth services just as general Health services mostly em- phasize on patient record management systems. Unfortunately the in- formation in these records is rarely used to provide quicker, personalized eHealth services and appropriate treatment especially in a low infras- tructure context where health service providers are often overwhelmed by numbers leading to acute degradation in service delivery. Domain specific service discovery with personalization aims at providing user- aware services. This is very important in a low infrastructure context where most patient requirements particularly from rural areas are a con- sequence of low literacy levels. The focus of this chapter is to describe a framework for eHealth service discovery in a low infrastructure context. To do this, we categorize the context of users and augment it with a user specific profile. Our framework provides ontology based, context-aware semantic and personalized services.

2.1 Introduction

Health services in a low infrastructure context are characterized by long queues, insufficient drugs, insufficient service providers and generally low literacy levels on the side of service consumers [OEOA09, MK08, KNA10b, Dru05]. Services tend to be generic due to lack of specialized resources and a reasonable number of ailments can be avoided with appropriate education and advisory support. eHealth services are proliferating in countries with limited infrastructure (elec- tricity, Internet) as a means of supporting the general health services. However, appropriate services need to be discovered first in order to support the provision of appropriate services to the right consumers. Moreover, customizing health services to different segments of patients can greatly save time while providing 18 Chapter 2. eHealth service discovery framework: a case study in Ethiopia the available service to those that need it most. In most developing countries, health services are provided by a combination of private and government centers, each with different capacity and competen- cies. As a result, health service providers are autonomous but rely on other centers for capabilities that they can not provide. To support this autonomous and dependence nature of health services, we consider the service-oriented ar- chitecture (SOA) (see [BAPP06, Has05]). The corresponding service-oriented computing (SOC) provides a system architecture in which a collection of loosely coupled services (components) directly communicate with each other using stan- dard interfaces and message-exchanging protocols. Software services or simply services are self-contained, platform-agnostic computational elements that sup- port rapid, low-cost and easy composition of loosely coupled distributed software applications. The functionality provided by a service can range from answer- ing simple requests to executing sophisticated processes requiring peer to peer or client/server relationships between multiple layers of service consumers and providers [BAPP06, Has05]. Existing service oriented healthcare systems emphasize on patient record management, giving personalized healthcare assistance to patients, online con- sultation and advisory of patients. However, the communication among health professionals by modern technology has not yet been addressed. For example, Uganda implemented a wireless regional healthcare network to assist the rural healthcare workers in providing learning materials, email, and to enable out- break reporting. Generally, this network is used for data collection systems. The eHealth systems developed so far does not provide professional assistance, for example when new cases or symptoms are encountered. In this chapter we first shortly describe some related work 2.2. In section 2.3 we elaborate on the application of Service Oriented Architecture in the health- care domain. Then in Section 2.4 we analyze the current situation of Ethiopia, derive next steps using a SWOT analysis and show how the architecture pro- posed is motivated from these next steps. In Section 2.5 we describe service discovery in more detail and go into more detail about personalization and con- text awareness. We close in Section 2.6 with some conclusions.

2.2 Related Work

Service discovery is one of the challenging activities of SOA. For example, Has- selmyer [Has05] describes the process of finding services. Most studies done sofar include service semantics, ontology based and context based service dis- covery. To the best of our knowledge, these three components have not been used together to discover services. In previous work service personalization or user profiling (user behavior and preferences) was given no attention. However, Hasselmyer [Has05] and Vu et al. [VHA05] report that contextual information of services is available, complete and unambiguous. They ignore how to han- dle missing, redundant, or incomplete context information. In this chapter we have divided context-awareness of services into service context and user context, 2.3. SOA for Healthcare 19 which enables a richer handling of context. In relation to healthcare service discovery very few research has been con- ducted [Dru05, OEOA09]. For example, John et al. [OEOA09] mentioned eHealth projects under implementation in Uganda, South Africa and Nigeria (UHIN, Cell-Life and MindSet Health, LAMIS respectively), however as cited by Ke- hinde et al. and Drury [KNA10b, Dru05], there are 12 million AIDS orphans in Africa. In line with this, Kehinde et al. [KNA10b] indicated that developing countries face challenges in providing accessible, efficient and equitable quality health services to their people.

2.3 SOA for Healthcare

The advancement of ICT and its application in different aspect have change the way we live, communicate and behave. Information Communication Technolo- gies have gradually become part of our daily lives through Internet that allow computers and mobile phones to provide various remote services. The application of ICT has become a worldwide trend. Impregnating Service- Oriented Architecture (SOA) to provide common activities and interests such as business, medicine, lifestyle, traffic, education, and entertainment has also become one of the popular methods in various industries. The rapid rise of technology and its adoption into the healthcare field has caused healthcare organizations to collect an accumulation of non-interoperable systems that not only need to work together within the organization, but also are accessed from the outside. The burden of integration usually falls on the users of the system, who often are forced to access many different systems to complete one task. The use of a service oriented architecture (SOA), however, can improve the delivery of important information and make the sharing of data across a community of care practical in cost, security, and risk of deploy- ment [JDNB08]. According to Peter [Pet07] SOA for healthcare is designed to give healthcare providers, healthcare benefit organizations, public health, and pharmaceutical companies the flexibility to leverage clinical and administrative business applications independently of the underlying computing platform. The ultimate purpose of integrating SOA for healthcare domain is to im- prove effectiveness, efficiency and service delivery. The application of SOA to healthcare service has the following objectives [Pet07, JDNB08]:

• reduced stay

• improved patient outcomes/reduce risks

• revenue improvement

• staff efficiency

• improved patient and staff satisfaction

• reduced IT expenditure/maintainance costs 20 Chapter 2. eHealth service discovery framework: a case study in Ethiopia

• improved information accuracy and availability • exchange of medical information between care providers (hospitals, clinics, health posts) in order to get key information like patients’ history, aller- gies, persistent medical problems, current medication (if any), and active treatments • exchange of referrals between healthcare providers, labs and feedback of those referral visits • a means to electronically order and monitor consumption of prescriptions Effective and timely communication between patients, physicians, nurses, phar- macists, and other healthcare professionals is vital to a good healthcare. Current communication mechanisms, based largely on paper records and prescriptions, are old-fashioned, inefficient, and unreliable. In the era of electronic record keep- ing and communication, the healthcare industry is still tied to paper documents that are easily mislaid, often illegible, and easy to forget [KMMS08]. When mul- tiple healthcare professionals and facilities are involved in providing healthcare for a patient, the healthcare services provided are often not coordinated. This section provides the application of Service Oriented Architecture (SOA) for healthcare domain in order to make health services accessible by anybody anywhere and anytime. Section 2.3.1 deals with the impact of SOA in healthcare. Section 2.3.2 addresses the use of mobile phones to improve healthcare services in low resources environment and a case study is presented in section 2.3.3.

2.3.1 The Impact of SOA in Healthcare for Developing Countries A healthcare system based on SOA has the potential to address many of the issues faced by health systems around the world by 1) extending the utilization of medical applications to different types of people including physicians, medical staff, personnel with limited training, and in some cases patients, 2) allowing for the coordination of various different types of multimedia inputs and outputs (text, images, and speech), and 3) creating a system that is flexible, nimble, and highly equipped for system changes [KMMS08] Low level infrastructure development is one of the impediments of setting up a mobile healthcare system in a low-infrastructure country such as Ethiopia. Despite of its aggressively expanding ICT infrastructure a single state monop- olized ETC (Ethiopian Telecommunication Corporation) hardly can meet the infrastructural demands for reaching the huge majority of the rural population. Building a nationwide eHealth system on existing IT solutions would improve the efficiency of service delivery, enhance quality and enable cost savings for the health system- as well as for private health service providers. To establish such a system and reap its benefits, Ethiopia would need to: • establish centralized electronic health records (EHR) or customize the ex- isting EHR; 2.3. SOA for Healthcare 21

• develop infrastructure utilizing already developed infrastructures (WoredaNet, SchoolNet, and mobile networks); • enable migration from paper to electronic documents.

The ultimate purposes of developing electronic health system in Ethiopia are:

1. Information technologies are used to exchange medical information over a distance using audio, visual and data communication. The application comprises healthcare delivery and management such as diagnosis, treat- ment, consultation as well as education.

2. The doctor to population ratio is very low (1:37,000). To tackle this prob- lem with mobile health is one of the options for the rural population. In addition, it gives an opportunity to share specialists’ knowledge and ex- periences for remote hospitals, clinics and also for individual healthcare workers and patients, also at an international level.

3. The available health institutions can strengthen their network with refer- ral and teaching hospitals. The existing few number of laboratories and research centers can disseminate their findings and laboratory results to other health intuitions. As an example, IIT Delhi and Tikur Anbesa hos- pital are working on TeleDermatology.

The existing ’digital divide’ in communication technologies such as Internet is lessened by the mobile phone in the resource limited countries. There is a significant growth of the number of mobile phone (12.2%) sub- scribers compared to fixed and Internet (1%) subscribers. Consequently, mHealth can play a pivotal role to provide health services for the rural population.

2.3.2 Anywhere Anytime mHealth The application of mHealth carries the following promises [ITU09]:

• quick and timely high quality affordable healthcare for all, everywhere, at anytime;

• overcoming healthcare shortage of staff and funding and optimization of patient care;

• enhancing preventive care;

• protecting human rights;

• educating and empowering citizens, etc.

No doubt the potential of mobile communications to radically improve healthcare services is enormous. The time has already proven this. Even in some of the most remote and resource-poor environments mobile health may drastically increased the quality and quantity of healthcare [ITU09]. 22 Chapter 2. eHealth service discovery framework: a case study in Ethiopia

Mobile health is applicable for collecting clinical data and for quick exchange of information back and forth to medical staff, care givers and patients; for con- tinuous education of healthcare professionals and providers. Many researchers suggest that mHealth is the top priority to alleviate chronic disease burden, scarce infrastructure and in general high level morbidity and mortality in the developing countries [ITU09], [Dru05]. Mobile Health is no more an optional choice. The service is more and more advancing and acceptable both by citizens and medical professionals. It is al- ready proven that remote care management service can enhance self-care, change health-related behaviors and improve outcomes in patients with a number of long-term conditions [MWA08].

“Mobile Health is already a must, a fantastic challenge for the future but it requires cooperation and coordination at all possible levels, it requires networking and planning, readiness to learn from the others and no efforts to re-invent the wheel” [ITU09].

2.3.3 Case Study: Antiretroviral Treatment (ART) Alexander is a farmer living in the village called Sana found in South Gondar zone in Amhara region. He lives with HIV viruses for the last two years. Two weeks ago he started taking antiretroviral viral drugs. However, recently, he experiences new symptoms such as nausea, diarrhea and headache. Alexander picks up his mobile phone dialling the special number he got for a consult. An automated dialogue system answers the call, asking Alexander the following in- formation: name, age, address, when did he start antiretroviral treatment, when the new symptoms started and how severe they are, and also asks if he has any allergy. After obtaining the necessary information, the dialogue system sends the user request to the query interpreter, an agent that further analyzes the request. by adding personal profile information from the profile database and context information from the context repository. The enriched request is sent to the matchmaking agent to look for the necessary consultation and treatment ad- vises. As a result, the system responds to Alexander that such kind of additional symptoms are common for the couple of weeks after starting the antiretroviral treatment, therefore he has to continue the treatment for a couple of weeks and would the symptoms not disappear to consult a doctor face to face in the nearby health institution. After 10 days Alexander’s condition is getting worse so based on the rec- ommendation of the system he travels to the health center. This story will be continued in section 2.5.1. The above scenario depicts that mobile technology permits the venue of health control to shift from hospital systems to information systems deployed at the location where users live and move, promoting the evaluation from facility- centered services, mainly focussed on patient treatment within hospitals, to patient-centered services, providing anywhere anytime care support to patients while they are at home or on the move. Mobile aeromedicine, remote patient 2.4. The SWOT Analysis 23 monitoring, location-based medical services, and emergency response represents examples of novel patient-centered services [TMC09]. According to Toninelli et al. [TMC09] security, interoperability and user and service mobility are some of the challenges in delivering mobile based healthcare enterprises. For exam- ple, Alexander needs to be provided with lists of treatments and precautions advices/consultations based on his physical conditions and his context. Effective healthcare service discovery is a complex task in mobile healthcare environment and requires tackling several technical challenges at the state of the art, including security, mobility (user and device), interoperability, accessibility (availability), heterogeneity and reliability.

2.4 The SWOT Analysis

In this section we perform a SWOT analysis of the healthcare organization in Ethiopia as a motivation for the approach as presented in this chapter. Typi- cally a SWOT analysis is used to identify on the one hand the strengths and weaknesses (internal factors) of an organization and on the other hand the oppor- tunities and threats (external factors) that come from its external environment. By confronting these internal and external factors in a so-called confrontation matrix, alternative best next steps may be obtained. A SWOT analysis is the base for developing a strategy for an organization that takes benefit from its strengths and the available opportunities, and is aware of the weaknesses of the organization and its external threats.

2.4.1 Background Ethiopia is still ranking among the lowest income countries worldwide. The country also ranks high amongst the donor receiving countries worldwide. As a developing country, Ethiopia, has promising prospects with Table 2.1 indicating one of the fast developing [Eco11].

Table 2.1: Worlds top 5 fastest growing economies [Eco11] 2001-2010 2011-2015 1. Angola 11.1 1. China 9.5 2. China 10.5 2. India 8.2 3. Myanmar 10.3 3. Ethiopia 8.1 4. Nigeria 8.9 4. Mozambique 7.7 5. Ethiopia 8.4 5. Tanzania 7.2

Currently, Ethiopia still ranks among the worst countries in the world in terms of health service coverage and health outcomes. Per capita health ex- penditures are approximately 25$ PPP, which is significantly lower than the Sub-Sahara Africa average of 89$ PPP (World Bank 2004). The number of 24 Chapter 2. eHealth service discovery framework: a case study in Ethiopia

Table 2.2: Five years health coverage in Ethiopia 2005 2010 Health Primary health service coverage 30 89 Maternal Mortality rate (100, 000) 871 590 Infant Mortality rate 123 101 Health extension workers to population ratio 1: 25,000 1: 2,500 Electricity Access to electricity coverage(percentage) 16 41 Number of towns with access to electricity 648 3367 Telecommunication Access to telephone services in 5 KM radius (per- 13 43.3 centage) No of kebeles (villages) with access to telephone ser- 3000 13000 vices No of mobile phone subscribers (in millions) 0.56 4 health workers per capita (11 nurses and 2 physicians per 100,000 inhabitants) remains extremely low even by African standards. As in most low income countries, the Ethiopian health sector is dominated by the public sector: 73% of the nurses and 82% of the doctors work for the public sector. However, both the profit and non-profit sectors are growing. The governments’ upcoming five years (2011- 2015) Growth and Transformational Plan (GTP) [MOF10] looks promising for the health sector. In the year 2015, the primary health service coverage will reach 100%, maternal mortality rate will reduce to 267 per 100000 and number of mobile subscribers will be expected to reach 61.4 million. Imbalance distribution of health professionals in the country: with only 36% of nurses and 17% doctors working in rural locations.The public sector remains by far the largest employer, with most doctors (74% working in public hospitals and the majority of nurses working in public hospitals (29%) or public health centers (27%). One-fifth of the doctors and a small proportion of nurses has secondary jobs in private and for-profit clinics in urban areas. Doctors in rural areas earn significantly more than those in urban areas, both in the public or private sector, whereas nurses earn slightly more in urban areas. Doctors working in urban public facilities receive more training and formal evaluation compared to their counterparts, whereas nurses in rural areas seem to work more hours and have more access to training compared with nurses in urban settings [SSLM10].

2.4.2 Strengths and Weaknesses In this section we discuss the intrinsic (internal) factors of the Ethiopian health- care system to consider their strengths and weaknesses. Information and Communication Technology (ICT) developments in devel- 2.4. The SWOT Analysis 25 oping countries are still in their infant stage compared to developed countries. In most developing countries ICT is incorporated in governmental policy to solve societal problems. A strong point in the case of Ethiopia is that in the last five years every governmental organization has been involved in business process re- engineering (BPR), using ICT as a tool for improvement. We will refer to this strong point as S1. Also the Ethiopian government has improved connectivity by launching (1) an administrative network (WoredaNet) to connect all Ethiopian districts using VSAT technology and (2) a network for high schools (SchoolNet). We will refer to this strong point as strength S2. However, these networks are provided by the Ethiopian Telecommunication Corporation (ETC) only, leading to a lack of com- petition in this market. Ethiopia is the only country in Africa that monopolizes all telecom services: fixed, wireless, mobile, Internet and data communications. This monopolistic control has stifled innovation and retarded expansion. This is referred to as weakness W1. Mobile penetration is not huge yet but there is a lot of improvement from year to year. For example the number of mobile subscribers has grown from 500,000 in 2003 to 10.5 million in 2011. There are huge expansion programs, for instance the program to introduce fiber optic cables across the whole country. For example in Amhara region the mobile network coverage reaches about 90%, which provides the rural village to use mobile phones. This will be strength S3. The number of health facilities in the country has increased by 55% during 1997 to 2002. This increase rate is greater than the population growth rate in the same period, leading to an improved population-facility ratio. We also see a huge boost up of health professionals. Ethiopia’s National Health Accounts show that total health expenditure had grown significantly from $230 million in 1996 to $1.2 billion in 2008. The country’s per capita health expenditure has also increased over the last decade, from $4.09 in 1996 to $16.1 in 2008. The increase of health expenditure has been: 1996: $4.09, 2000: $5.6, 2005: $7.13, and 2008: $16.1. The strong point (referred to as S4) is that we see growth, the weak point is that the actual levels still are very low (weak point W2). ICT as means of facilitating a solution to social problems has not yet been fully considered neither by government nor by society. Another problem to make a break through in the usage and development of ICT in healthcare and other sectors are low level education an less priorities given by the government for the advancement of the information and communication technology. This is referred to as weak point W3. Creating awareness of ICT as an enabler of daily business processes needs to exert some extra efforts. ICT is delivered in schools only in the higher grades (11th and 12th). In most private schools, an ICT course is incorporated in the curricula contrary to governmental or public schools.

2.4.3 Opportunities and Threats

In this section we focus on the opportunities and threats (external factors) for the Ethiopian healthcare system that come from the external environment. 26 Chapter 2. eHealth service discovery framework: a case study in Ethiopia

After years of international expansion of the Internet, in many areas we see new developments in developing global networks for cooperation and knowl- edge sharing internationally on the Internet. Around specific topics there are emerging worldwide communities that cooperate to develop such applications. Also for healthcare we see such developments. Examples are: Health Level 7 (HL7), European Telecommunications Standards Institute (ETSI). In the con- text of mobile applications we see mHealth Ecosystems and mHealth Initiatives. Most countries have established their eHealth and mHealth systems (Australia, Finland, USA, etc). These new developments offer interesting opportunities to improve facilities in Ethiopia taking advantage of international cooperation. This opportunity is referred to as O1. Opening up a society also has some well-known threats, mostly related to brain drain effects. For example, when people see new opportunities they want to make profit of them. This may cause a move of people from rural areas to cities, and from cities to international positions (outside Ethiopia). Migration of health professionals is one of the threats. For example Serra et al [SSLM10] say more than 50% of health professionals plan to migrate abroad in the next two years, expecting to earn higher salaries abroad. Also voice-online [Wei07] reported that about 80% of doctors migrate to USA, Botswana , South Africa and middle east countries for better pay and conditions. Accordingly, the number of Ethiopian doctors (trained in Ethiopia) working in US is more than the doctors working in Ethiopia. They also report that the satisfaction of health professionals with their career choice, economic situation and life in general, has deteriorated between 2004 to 2007. This threat is referred to as T1. Exponential growth both is an opportunity and a threat. We have seen many new developments to start following an exponential growth process. For example the introduction of the mobile phone. Exponential growth makes it possible to formulate strategies in a more ambitious way. Note that growth processes in society/nature usually follow the plateau model. The expected growth rate for Ethiopia (see Figure 2.1) for the coming years may indicate the start of exponential growth. This opportunity is referred to as O2. Exponential growth also poses some threats. Introducing new technology too fast will make the country too dependent from external sources. Especially when capacity building at a managerial level is not going hand-in-hand with the new introduction. This threat is referred to as T2. This requires students to be trained at the international academic levels (bachelor, master and PhD) to man- age actual technological processes, to find creative solutions for new problems, and to develop new policies. Another opportunity is the continuing willingness of donor countries to sup- port Ethiopia in their development process via special programs. This will be opportunity O3. Lower level education, lower level/no digital skill, and lower income may be some of the barriers to diffuse eHealth is a major threat to access ICT related services and equipments. This threat is referred as T3. Inadequate technical in- frastructure, knowledge and financial resources have an impact on the expansion 2.4. The SWOT Analysis 27 of eHealth services.

2.4.4 The Proposed Strategy The confrontation matrix combines internal factors (strengths and weaknesses) with external factors (opportunities and threats). In Table 2.3 we present the confrontation matrix for our case; + indicates a positive effect and − indicates a negative effect. For example a good infrastructure will help to fight brain drain, but monopoly will have a bad influence on taking advantage of opportunity O1. From the confrontation matrix we see that the strong infrastructure and mobile phone both have a positive influence on the Internet. So using Internet opportunities to improve the health system seems a good option.

Table 2.3: Confrontation matrix Opportunities Threats

O O2 T T2 T 1 O3 1 3 Inter exp funding brain exp low net growth drain growth educ

S1: global awareness + + + + + -+ Strengths S2: infrastructure ++ + + ++ + + S3: mobile phone ++ ++ + + + + S4: fast increase + + + + + -+

Weak W1: monopoly - -+ - -- - - nesses W2: low level ------W3: ICT facilitator -+ -+ - - - -

2.4.5 Analysis of the Confrontation Matrix The confrontation matrix relates the internal factors of an organization (strengths and weaknesses) with its external factors (opportunities and threats). A high correlation between an internal and external factor (++) suggests a candidate for a next step. In case of an strength, the next step tries to use this strength to take advantage of the related opportunity, or to protect from the related threat. In case of a weakness the next step is to avoid the weakness hindering in taking advantage of the opportunity, or in materializing the threat. We first focus on the most promising next steps and then discuss the main weaknesses to overcome. First we focus on the strengths that are most helpful for the identified op- portunities or most helpful to overcome threats.

S2 Infrastructure - O1 Internet. As we discussed in the previous subsection, the expansion of networking, electricity, telecommunication boosts up the number of internet users and increases the accessibility of the internet all over the country. The expanding infrastructure is a strong enabler for an efficient introduction of Internet technology1.

1For example, the number of mobile sites in Amhara region is about 501 which almost cover all the rural villages/kebeles of the region. Among this mobile stations 95% of them are 28 Chapter 2. eHealth service discovery framework: a case study in Ethiopia

S2 Infrastructure - T1 Brain drain. The strongly emerging infrastructure can also help to overcome the brain drain threat in 2 ways. First, it might en- courage educated people to find challenges by staying in their country, and it may make them a member of the international community without the need to actually move there. Second, those who still leave the country will more naturally and easily stay a member of their root community.

S3 Mobile phone - O1 Internet. As we discussed, the Internet is an excellent opportunity for Ethiopia to overcome infrastructural disadvantages. Since Ethiopia has a strongly developing mobile phone coverage, using the mobile phone is a good choice to benefit from the Internet opportunity. One of the specific opportunities we found in the SWOT analysis is the provision of internet services using mobile phones. Without any extra payment or change, a user can access internet with the cost rate of air time. Its most simple format, the SMS messaging system, already provides such an access.

S3 Mobile phone - O2 Exponential growth. The effectiveness of the mo- bile phone strength is especially emphasized by the exponential growth that is to be expected from the introduction of this new technology. Next we consider the weaknesses that are most threatening for the identified opportunities, or may be considered as negatively influence the threats identified. First we see from the confrontation matrix that there seem to be no major threats for the opportunities identified. With respect to the threats we have:

W1 Monopoly - T1 Brain drain. Monopoly may prevent newly educated peo- ple from being able to identify an effective way to define their contribution. Next steps can really hurt from a market situation that is too inflexible when it comes to adapting to a new technology.

W2 Low level - T1 Brain drain. Low level is seen as a major cause of brain drain.

W2 Low level - T3 Low education. Low education level is the major cause for low level. In the next section we further explore on the role that the Service Oriented Architecture (SOA) can play for healthcare, and then we present a framework that conforms to the findings of the confrontation matrix as described above, and leads to the next steps as suggested by this matrix.

2.4.6 The Main Architecture A health worker is performing medical tasks. At some moments, the health worker needs specific information, and will start a seeking task. As a part of this functional and 5% will be start function in a few months. In 2010 the government of Ethiopia bought hundreds of VSAT from Gilat Satellite Networks Ltd company based in Israel. The satellite provides high quality voice, broadband data and video services for school-net and WoredaNet projects 2.4. The SWOT Analysis 29 task concrete information units have to be matched with the actual information need as described in a query. This scheme of working has been described by J¨arvelin and Ingwersen ([JI04]) and is displayed in Figure 2.1. According to these authors, interactive IR comprises the work task, informa- tion seeking behavior of the user and context of retrieval. The figure considers different contextual factors in the process of service discovery, each contextual factor specifies its own information need/ information request in different per- spectives, and its effect is independent from another contextual factors. The advantage of having these contexts helps to identify the appropriate services for the user request by considering current environment constraints, medical sta- tus and information seeking behavior of the user besides to personal profile and personal context.

Figure 2.1: Service Seeking frameworks and criteria adopted from [JI04] In our architecture we focus on the seeking task, and how this can be supported by a service oriented architecture. The agents as described in our case in Sec- tion 2.3.3 are presented in the architecture in Figure 2.2. The medical context is the dominating context, where technical support is obtained from modern technology. Figure 2.2 described the seeking process from a technical point of view.

Figure 2.2: The main architecture 30 Chapter 2. eHealth service discovery framework: a case study in Ethiopia

The dialogue system negotiates with the health worker to obtain a (completed) information or service request. Then the query interpreter further elaborates on the request by adding contextual and personal information to the request. Finally the matchmaker matches the request with the available services, and tries to find the best treatment (defined as a composition of services) for this request. When the matchmaker can not resolve the request, a human expert may be asked for advice. From the architecture we see how mobile technology is helping to empower the implemented knowledge distribution, and how experts can be involved with minor dependencies to the location(for detail see Chapter 4).

2.5 Service Discovery

Typical eHealth setups in low infrastructure context involve nurses and health extension workers (HEW) whose main role is to link the largely uneducated masses with health centers. The proposed framework is presented in Figure 2.3 in detail.

Figure 2.3: Service discovery framework/architecture The figure consists of five components: service Consumer, service provider, spoken dialogue system, service discovery engine, and service repository. Ser- vice providers advertise services. Service consumer as denoted by its name re- quests services using either voice or text. In this framework our focus lies on voice/spoken based service request using mobile phone. The spoken dialogue performs speech recognition and converts the speech into text and vice versa (for detail see figure 2.4). The intention of using spoken based service query is to allow semi-literate and illiterate people to use the system. 2.5. Service Discovery 31

Figure 2.4: Spoken dialogue system The service discovery engine performs query reformulation by incorporat- ing additional information about users: user profile and user context. After formulating the user query, it process the matchmaking, ranking and selection of services with respect to the user request. The service repository stores the advertised services. Service discovery is presented in detail in Chapter 4.3.

2.5.1 Sample Session In this part we present a sample session within our framework, continuing the case from section 2.3.3. After 10 days Alexander’s condition has gotten worse so based on the rec- ommendation of the system he travels to the health center. The health center measures his CD4 count and finds no difference with the previous measurement. The nurse doesn’t know what brought the additional symptoms therefore she uses her mobile phone to contact the eHealth System. Since the nurse is rec- ognized as a health worker, she will get a higher access level into the system. She inform the health system about the symptoms, the lab results, the number of CD4 counted and when the treatment was started. The system then asks the nurse to take additional tests and to send the results to the system. The matchmaking agent matches the new patient request with the advertised ser- vices. Suitable (combinations of) service(s) found in the repository, are ranked based on user preferences, QoS, and semantics of services. If no matching (com- binations of) services are found, then the matchmaker agent sends the request to the specialist team associated with the eHealth system. The specialist team forwards the services to the requester and to the service repository. As a result, the nurse will receive the most promising alternative for treat- ment and reference materials. However HIV is a complex disease that requires specially trained physicians to deliver the complex care necessary for a healthy life. Complicated drug regimens with multiple side effects and long-term com- plications make treating the HIV disease a challenge. Hence, the system for- wards Alexander’s data to the HIV specialist. After accessing Alexander’s health 32 Chapter 2. eHealth service discovery framework: a case study in Ethiopia record, the HIV specialist will follow Alexander’s dossier, and may for example contact the the nurse with the request to take an additional test. The above scenario depicts how the working of the proposed framework. This framework can run on a mobile phone since the communication with the healthcare worker is based on relatively text or voice.

2.6 Conclusion

The emergence of Internet is changing the way people live. Service orientation is being applied to all sectors of human life, such as healthcare. Most developing countries have little coverage of society’s health even though the spread of disease is high. In order to reduce this problem electronic health is an option. As eHealth has impacted on developed countries, it will bring a change also in developing countries such as Ethiopia that suffer from high migration of medical doctors inside and outside the country. In this chapter we propose an eHealth service discovery framework which can facilitate the effectiveness of eHealth. The framework provides various facilities to create, specify, discover and select healthcare services. Especially, the framework covers the ignored part of service orientation to customize services based on user/consumer requirements. Our framework will serve for both wired and wireless networks. Chapter 3

Is mHealth Viable to Ethiopia? An empirical study

Abstract The expansion of internet and the availability of mobile de- vices in affordable price to all type of people in the world expand the opportunity to use mobile technology in the health sector. In this chap- ter we address the applicability, feasibility and usability of mobile tech- nology to the under-served population of rural Ethiopia (particularly Amhara region). As the magnitude, disease prevalence and the short- age of healthcare workers increases from time to time, the health service delivery becomes inefficient and ineffective. To alleviate these grounded problems an additional technology is required. The result of the study shows that assisting healthcare service delivery through ICT is very ur- gent and demanding. In addition, the mHealth is the main channel to address the aforementioned problem. To this end we proposed a mobile based health service discovery framework.

3.1 Introduction

The use of information and communication technology (ICT) is one of a range of potential solutions to healthcare challenge. ICT encompasses a range of tech- nologies which enable the exchange of data through the telephone or internet, home based health service delivery, remote consultation and treatment, and re- mote capacity building and on job training. ICT has the potential to modify the way in which people use health services both by increasing access to information and by remotely providing other forms of support. Expectations are changing with people wanting to determine their own health needs through advice on the internet or other technological inter- faces and faster more person-centered (personalized) services from healthcare providers including patients and health professionals. Indeed, we may be wit- nessing a move from the ”face to face age of healthcare” to the ”information age of healthcare”. 34 Chapter 3. Is mHealth Viable to Ethiopia? An empirical study

The explosive growth of mobile communications over the past decade offers a new hope for the promotion of quality healthcare, especially for developing countries. There is a growing body of evidence that demonstrates the potential of mobile communications to radically improve healthcare services even in some of the most remote and resource-poor environments ( [Fou09], [Fru10]). Healthcare is fundamental, under-serviced need of citizens in developing countries. In addition to having the highest maternal mortality, child under five mortality and neonatal mortality ratios, these regions have the largest unmet need for health service provider in the world. Given the shortage of health- care professionals: doctors and nurses, and the low number of medical schools in Ethiopia, the government trained health extension workers (HEW), where women chosen from their own communities trained in basic health service pro- vision for one year, and sent back to provide health service in their community specially in prevention, consulting and awareness creation. Some of the benefits of mHealth are (1) increased access to healthcare and healthcare information to rural communities (remote population), (2) increase efficiency and cost reduction, (3) improve the ability of diagnosis, treat and track diseases, (3) timely dissemination of health information , and (5) provision and expansion of training and medical education.

3.1.1 Potential of Mobile Phones to Improve Healthcare in Ethiopia In the previous years the government of Ethiopia make a tremendous strides its efforts to improve the lives of their citizens; yet formidable obstacles remain. Disease and the lack of adequate preventative care take a significant barrier to sustainable development.

The Promise of Mobile Technologies for Health Mobile communication offers an effective means of bringing healthcare services to developing country citizens. With low-cost handsets and the penetration of mobile phone networks globally, tens of millions of citizens that never had regular access to a fixed-line telephone or computer now use mobile devices as daily tools for communication and data transfer [Fou09]. Mobile technologies enable eHealth systems to decentralize and thus extend their reach to remote settings, as well as to individual members of the health sector and the general public. Mechael [Mec09] stated the effect of mHealth in developing countries, “it is worthwhile to consider how mobile phones are being used organically, and then to look at some examples of formalized mHealth initiatives”. In case of Ethiopia there is an emerging mHealth project which is PDA based data collection.

Defining mHealth In recent years, mHealth has emerged as an important subsegment of the field of eHealth. While there is no widely agreed-to definition for these fields, as a 3.1. Introduction 35 result [Fou09] propose a working definitions: • eHealth: Using information and communication technology (ICT)- such as computers, mobile phones, and satellite communications- for heath service and information. • mHealth: Using mobile communications- such as PDAs and mobiles- for health services and information. mHealth and eHealth are inextricably linked. Both are used to improve health outcomes and their technologies work in conjunction. mHealth programs can serve as the access point for entering patient data into national health in- formation systems, and as remote information tools that provide information to healthcare clinics, home providers, and health workers in the field. While there are many stand-alone mHealth programs, it is important to note the opportunity mHealth presents for strengthening broader eHealth initiatives [Fou09]. Despite of the huge expansion of mobile communication in Ethiopia, mobile technology is not being used yet to assist the healthcare sector. There are some operational projects in the country, for example the remote data collection using PDAs (which is in a pilot phase) and there is a project called Smart Care (hospital information systems). Thus, the utilization of mobile technology to improve the health of the citizen is very minimal. Technology has now evolved to a point that delivering telemedicine services is economically feasible, the graphics quality of the mobile media is acceptable, and the data transfer is reliable and at an acceptable speed. The cost of technology, once a critical barrier, is now providing e-Health opportunities for new services because the costs of hardware, software and telecommunications technology con- tinue to decrease, meanwhile, the capabilities continue to increase [Fru10]. Accordingly [Fru10], Telemedicine offers many opportunities for rural e- health consumers for example, patient consultations from and referral services to medical providers, and training for healthcare professionals via distance edu- cation.

3.1.2 Objectives The last few years witnessed a rapid development and deployment in both wire- less technologies and mobile internet based mHealth system which pervasive computing technologies. The increasing data traffic and demands from different medical applications and roaming application will be compatible with the data rates of in mobile conditions [MS08]. In this work we investigate the feasibility and applicability of mHealth for remote areas of Ethiopia. The objectives of this study are: • To assess the viability of mobile phones to facilitate healthcare services in the rural areas • To understand the exposure of healthcare workers to ICT equipments and technologies 36 Chapter 3. Is mHealth Viable to Ethiopia? An empirical study

• To assess the availability of minimal infrastructure in order to deploy eHealth services specially in the rural areas

• To investigate the interaction of healthcare institutions towards using ICT in healthcare to reach the unreached and to widen the coverage of health- care services in the country.

The chapter is structured as follows: in Section 3.2 we discuss the application of mHealth. Section 3.3 addresses Ethiopia’s health services and the methodology used to gather data and the tools to analyze the collected data is presented in Section 3.4. In Section 3.5 we present the mHealth framework. Finally, we conclude the chapter and pinpoint future work in Section 3.6.

3.2 Application of mHealth mHealth applications are numerous and diverse. They range across remote di- agnostics and monitoring, diagnosis and treatment, collecting medical data re- motely, ease communication and reduce hospitalization and self-diagnostics.

Figure 3.1: mHealth intervention areas in eHealth

3.2.1 Education and Awareness A short messaging services (SMS) is the most cost effective, efficient and scal- able method of providing outreach services for a wide array of health issues. In education and awareness applications, in most developed countries SMS mes- sages are sent directly to users’ phone to offer information about testing and treatment methods, availability of health services, and disease outbreaks. SMS alerts have proven particularly effective in targeting hard-to-reach populations and rural areas, where the absence of clinics, lack of healthcare workers, and limited access to health-related information all too often prevent people from making informed decisions about their health. However, SMS alerts can not be used for the citizen with low level education and illiteracy. Besides the SMS 3.2. Application of mHealth 37 should be localized. Hence, to educate and cerate awareness to the majority of rural population, an automatic voice alert system required to be designed.

3.2.2 Remote Data Collection Data collection is another crucial component of public health programs. Pol- icymakers and health providers at the national, district, and community level need accurate data in order to gauge the effectiveness of existing policies and programs, and in order to shape new ones. Currently there is a data collection program (using PDAs) in Ethiopia as a pilot project. When this mobile based data collection is implemented full-fledged, it will solve the current problem of lacking patient data, enabling the governmental officials to gauge the effective- ness of healthcare programs, to allocate resources more efficiently, and to adjust programs and policies accordingly.

3.2.3 Remote Monitoring One of the areas most uniquely suited with mobile technology is the remote monitoring of patients. As 85% of the population lives in the rural areas and as well as the limited number of hospitals in the country may urge to use remote monitoring of patents in outpatient settings. It is impossible to provide mobile phone for the total population but patients with chronic disease (AIDS, dia- betes, TB, etc) who owns mobile phones can use the monitoring service such as monitoring health conditions, maintain healthcare workers appointments, and receive SMS reminders to take daily medication or to take test, measure blood sugar level and the like. Accordingly United Nations Foundation, Mishra and Singh [Fou09], [MS08] assert that monitoring patients at home for chronic con- ditions dramatically improves survival rates.

3.2.4 Communication and Training for Healthcare Work- ers An acute shortage of healthcare workers is a major challenge facing developing county health sectors. To alleviate such a devastating problem, Ethiopia trained about 32000 front line health community workers (called Heath extension work- ers). They took a one year preventive healthcare training. The majority of the HEW want to upgrade into the next level however there is no such opportu- nity yet. So training HEW using mobile technology closes the gap and helps to empower, motivate and reduce attrition. As we discovered, mobile technology improve the communication mainly be- tween health posts and health centers for the purpose of performance reporting and providing and asking guidance and assistance. Deployment of mobile devices, with their ability to quickly capture and trans- mit data on disease incidence, can be decisive in the prevention and containment of outbreaks. For instance, Peru, Rwanda, and India use mHealth applications to track disease and epidemic outbreaks [Fou09]. 38 Chapter 3. Is mHealth Viable to Ethiopia? An empirical study

3.2.5 Diagnostic and Treatment Support Diagnostics and treatment support are vitally important in healthcare misdi- agnosis or the inability to diagnose a condition could have serious, even fatal, ramifications. mHealth applications in this area are designed to provide diagno- sis and treatment advice to remote healthcare workers through wireless access to medical information databases or medical staff. There are two possibilities to provide remote diagnostics and treatment, first the remote medical professionals can diagnose the illness and prescribe treatments (eliminating patients travel), second the local medical professionals can access the remote medical database through the mobile technology [Fou09].

3.3 Health Services of Ethiopia

3.3.1 Background In this section we try to address the available health services in Ethiopia, spe- cially in one of the biggest and highly populated region, Amhara. The Amhara National Region covers an area of 170,752 sq. kilometers and encompasses a population of about 19 million1. Almost 90% of Amharas pop- ulation is rural, living in heavily populated (111 persons/sq. kilometer) farm- ing communities. It has about 105 districts. The health coverage is not suffi- cient compare to urban administration regions of Addis Ababa and Dire Dawa. Malaria, TB and HIV/AIDs are among the common diseases in the region be- sides other morbidity. Table 3.2 indicates the number of patients diagnosed in year 2010.

3.3.2 Health Institutions The region consists of 23 hospitals, 632 health centers, 1235 health clinics and 2941 health posts. The number of available health institutions are very limited compare with the size of the population. It has only three referral hospital among them one is a teaching hospital. According to the health experts, Bahir Dar Felege Hiwot hospital serves about 9 million people. It is estimated that the region has approximately 2209 hospital beds.

3.3.3 Health Professionals One of the acute problems is shortage of healthcare workers. Regarding the distribution of health professionals are very small compare to the size of the population which accounts of the country’s population. The health facilities are equally distributed for each districts based on the population it contains. The number of health workers in the state is displayed in table 3.1.

12007 national census (www.csa.gov.et) 3.4. Methodology 39

Malaria, TB and HIV/AIDs are among the common diseases in the region besides other morbidity. Table 3.2 below indicates the number of patients diag- nosed in year 2010.

Table 3.1: No of healthcare workers in Amhara state Health professionals by type Total number Percent Specialist 46 0.3% General Practitioner 97 0.7% Health officer 613 3.8% Nurse Bachelor 368 2.3% Nurse diploma 4334 27.3% Midwife Nurse Bsc 84 0.5% Midwife Nurse diploma 205 1.3% Other health professionals 3458 21.8% Health Extension workers 6650 42.0%

Table 3.2: Patient treated in the state in year 2010 Total cases Rank Diagnosis cases % (No) 1 All forms of malaria 317213 19.08 2 Intestinal parasites 171584 10.32 3 Diarrhea 151166 9.09 4 All other respiratory diseases 120016 7.22 ......

3.4 Methodology

We use purposive sampling methods to select zones and districts. We choose 5 districts in the region for the assessment purpose. In each district we select 2 health centers to assess the available infrastructure as a benchmark for the implementation of eHealth (particulary mHealth) projects. The main purposes of the study are : • to assess whether ICT facilities are available or not • to assess the perception of healthcare workers in utilizing eHealth specially mHealth? • to identify barriers preventing eHealth services from reaching their poten- tial in rural communities. • to study the feasibility of eHealth especially mHealth in tackling the pro- truded health problem 40 Chapter 3. Is mHealth Viable to Ethiopia? An empirical study

• to observe how ready rural healthcare workers to use ICT facilities to facilitate their work

• to know if healthcare workers use IT devices in their day to day life

• to understand the intention of healthcare workers towards using ICT in di- agnosis and treatment, in prevention, in patient monitoring and in aware- ness creation.

• to study the existing gap of the health centers

3.4.1 Sampling Technique We use purposive sampling techniques to choose the health centers in each dis- trict. Each districts health office provides the number of health services available in the district, the over all coverage, and the common diseases affected the popu- lation, and the total number of healthcare workers. We select two health centers in each district. Based on the recommendation of a district health office, we choose one health center with very poor infrastructure: (no electricity, no roads, no telecommunication and far from the district town) and the second health center is relatively with better infrastructure and close to the district town in distance or near to the highway. According to the country’s policy, a health center coordinates and manages 5 health posts. A health center and a health post is supposed to serve 25000 and 5000 people respectively. The sample size participated in the assessment are 14 nurses (9 male and 5 female), 2 Health Of- ficers (1 male and 1 female), 3 Health Extension Workers (all females), 4 Woreda Health Officers (males), and 1 junior IT expert.

3.4.2 Data Gathering Tools We employe interview and observation to gather data for the study. In each health center we interviewed the health center head. Among the ten intervie- wee, nine of them are nurses and only one is a health officer. The average work experience of the interviewee is 3 years and the average age is 24. All the partic- ipants took part in the interview process. 9 female and 14 male are participated in the interview. Each interview took from one hour to one and half hours and all the interviews are recorded or audiotapped. The interviewee are presented with open ended and close ended questions.

3.4.3 Discussion Fogera Woreda/District The district consists of 28 kebeles/villages with a total population of 220 926. The district has 11 health centers, 41 health post but there is no any hospital. The nearest hospital is about 55 kilometers. Malaria is the common disease which affects the rural population. We manage to visit two health centers: Kidist 3.4. Methodology 41

Hana Health Center and Kuahar Abo Health center which is 23 kilometers and 8 kilometers far from the district town (Woreta). The furthest health center is 49 Kilometers far from the district capital. One of the unique feature of the district is it assigns IT professional in all health centers to facilitate health service delivery through information technology, however, most of the clinics we have visited do not have an IT equipment and electricity. Consequently, there is mobile network coverage in the clinics therefore all the healthcare workers own mobile phone for communication. Infrastructure is one of the problems of the district; for example only two health centers have all weather roads but others have only seasonal roads as a result transportation is a grand problem. Except two urban health centers, none of the health centers have access to electricity which makes the available medical equipments unutilized and malfunctioning. On the contrary in most of the health centers mobile network is accessible though the healthcare workers used for reporting and for communication purpose only.

Farta Woreda/District Farta is one of the 105 woredas in the Amhara Region of Ethiopia. Part of the Debub Gondar Zone, Farta is bordered on the south by Este, on the west by Fogera, on the north by Ebenat, and on the east by Lay Gayint. Towns in Farta include Gasay and Kimir Dingay. According to the woreda health office, this woreda has a total population of 271 951, of whom 140 878 men and 131 073 women; about 2.97% are urban inhabitants. With an area of 1099.25 square kilometers, Farta has a popula- tion density of 212.22 per square kilometer. Farta consist of 39 kebeles/villages among these two are urban kebeles which has an electricity access. The woreda has 10 health centers (from which two are urban health centers), 2 health clin- ics, 41 health posts. Four of the health centers have an access to all weather roads. The remote heath centers is 65 km far from the district city. Alike other districts, scarcity of infrastructure is one of the pressing problem of the district.

Dera Woreda/District This district is found in South Gondar zone. The district has a total popu- lation of 248 464, of whom 126 961 men and 121 503 women. It has about 36 kebeles/villages. The district consists of 10 health centers, 31 health posts and about 10 private clinics. The distribution of the healthcare workers is as follows: 72 nurses, 5 health officers, 7 lab technicians, 9 pharmacists, 3 sanitarian and 3 midwifery and 81 health extension workers. Some of the health centers lack physical infrastructures per se road, electricity, and telephone infrastructure. For example Sana one of the sample health center in our study has no electricity, only seasonal road, and even mobile networking is not yet reached.

Mecha Woreda/District Mecha is one of the districts/woredas found in West Gojjam zone. The woreda (district) has a total population of 313 068, of whom 158 218 male and 154 858 42 Chapter 3. Is mHealth Viable to Ethiopia? An empirical study female. Among the total population 26 824 lives in urban and 286 244 in rural. It has 44 kebeles/villages 4 them are urban kebeles/villages. The district consists of 11 health centers, 30 health posts, 20 private clinics, 11 private own pharmacies and 5 diagnostic laboratories. The number of healthcare workers incorporates 78 nurses, 3 health officers, 9 lab technicians, 10 pharmacists, 4 sanitarian, 5 midwifery and 89 health extension workers.

YilmanaDiensa Woreda/District

Yilmana and Diensa is one of the districts/woredas found in West Gojjam zone. The woreda/dstirct has a total population of 230 546, of whom 115 734 male and 114 812 female. Among the total population 26 824 lives in urban and 286 244 in rural. It has 44 kebeles/villages 4 them are urban kebeles/villages. The district consists of 12 health centers, 33 health posts, 20 and 1 hospital under construc- tion. Acute shortage of healthcare workers is one of the astounding problem of the district; the distribution of the healthcare workers is as follows:78 nurses, 3 health officers, 9 lab technicians, 10 pharmacists, 4 sanitarian, 5 midwifery and 89 health extension workers. Table 3.4 shows the ICT facilities available

Table 3.3: Infrastructure facilities of the health center Health Center Electricity Transportation Telephone Fixed mobile Wanzaye 1 1 0 1 Korata 0 1 0 1 Sana 0 0* 0 0* Kidist Hana 0* 0* 0 1 Kuhar Abo 1 1 0 1 Maynet 0* 1 0 1 Deremo 0 0* 0 1 Goshye 1 1 0 1 Ageta 0* 1 0 1 Ambo mesk 0* 1 0 1 in the health centers. All of the health centers do not have any ICT facilities and equipments. All the health centers except one get a mobile network cover- age, therefore there is a possibility of accessing Internet through mobile phones. However, only one healthcare worker, a head of the Deremo health center, uses his mobile phone to access Internet, on the other hand most of the healthcare workers even do not know the availability of the services. Among 15 intervie- wees none of them have email account. The interview reveals that the healthcare workers have very limited IT training, some of them took basic computer train- ing in the university or college and others never have IT training at all. This depicts that healthcare workers working in rural area require further basic IT training. 3.4. Methodology 43

Table 3.4: Availability of ICT equipments Internet email mobile Health Center Computer service service Internet Wanzaye no no no yes Korata no no no yes Sana no no no no Kidist Hana no no no yes Kuhar Abo no no no yes Maynet no no no yes Deremo no no no yes Goshye no no no yes Ageta no no no yes Ambo mesk no no no yes

3.4.4 Result

Availability of Infrastructure

The finding shows that 30% of the health centers have electricity and 30% power transmission line is already installed, 60% have all weather roads, 40% seasonal roads, no health centers have fixed telephone and all of the health centers get mobile network coverage (for detail see table 3.3).

IT Awareness of Healthcare Workers for Diagnosis and Treatment

The interview result shows that the majority of the healthcare workers do not have awareness that IT can be applied as an enabler to facilitate health ser- vice delivery. However, some of them use mobile phones to consult doctors and friends whenever they come across complicated or unusual patients cases. Be- sides, mobile phone is used for reporting and data collection purposes to the district health office and to communicate with cluster health posts. Even if they did not know the impact of ICT in healthcare, they suggest that if a mobile based healthcare is developed that will contribute in prevention and diagnosis of health problems. Hence, from the interview and informal discussion made, we learned that mHealth is an option to assist the healthcare sector. One of the woreda/district, recognizing the implication of ICT in improving the healthcare system, assigns a IT professionals in every health centers.

Utilizing mHealth

In all the visited health centers all the healthcare workers own mobile phone, so if any mHealth application is offered, they can use the system easily without a longer term training. 44 Chapter 3. Is mHealth Viable to Ethiopia? An empirical study

Internet Usage As shown in Table 3.4, all the health centers do not have any Internet services, however, the telecom company provides mobile based Internet access to the users with the price of air time. So except the IT professionals in two health centers and one nurse, other healthcare workers included in the study do not access internet using mobile phones. In the interview they were asked why do not they use Internet as it is free and costs only the air time rate; they replied that they expect that Internet may incur much cost and others did not know whether the service is provided or not. Some also do not know the use of Internet due to lack of training. After the discussion with the interviewers, they show a certain enthusiasm to use Internet. In fact, mobile phone is used as a daily communication tools in the health centers and health posts.

Figure 3.2: Health Institutions organogram of Ethiopia As mentioned in the above, the majority of the population live in rural areas but the health coverage is very insignificance. As we can see from figure 3.2, one health post serves about 5000 people (population) and one health post has a maximum of two HEWs, this increases the magnitude of the problem. One health center is designated to 25000 people (population). The study also solicited comments from the participants regarding their opin- ion of eHealth services and the likelihood of using such services. Based on the results of this study, three of the major challenges of expanding eHealth service to rural healthcare concerns the availability of the broadband in- ternet, access to computers and education on how to use computers. Regardless, if the technology is robust enough for telemedicine and physicians are willing to 3.5. mHealth Framework 45 participate, the digital divide overpowers the drivers mentioned earlier [Fru10]. The findings in the study have valuable implications for practitioners of eHealth services and will help them better understand the characteristics and challenges to extending the reach of eHealth services to rural citizens [Fru10].

3.5 mHealth Framework

Based on the result of the study we propose a mobile based service discovery. As mentioned in our previous work [TKW10a], the framework consists of: service consumers, service providers, dialogue system and service discovery engine and service repository. According to Mecheal et al. [MBK+10] literature review, SMS is used for treatment compliance, however, for developing countries (particularly countries with high illiteracy rate) short message service based healthcare service request and delivery is not feasible. Consequently, we propose a voice based service discovery and delivery framework using mobile phones. Additionally, researchers find out that dialogue based mHealth is cost effective and accurate collection methods

3.6 Conclusion

The proliferation of mobile technology in the world makes the healthcare service easily addressable. In this study we assessed the readiness of implementing elec- tronic healthcare in Ethiopia. Hence, the result of the study shows that mobile based healthcare service delivery is feasible. This is because the affordability of mobile phone by low income citizen and the expansion of mobile network in the rural areas help to utilize mobile based health services to consult, to create awareness, to diagnosis and treat the patients in the country. Thus we propose mHealth service discovery and delivery framework.

Part II

Service Discovery Architecture 48

Chapter 4 introduces the application of service oriented computing in healthcare in a low infrastructure context. A literature review is conducted in Section 4.2. Section 4.3 describes the components of the proposed framework. Section 4.4 outlines the eHealth frame. Section 4.5 concludes the chapter. Chapter 4

Service discovery architecture for a low infrastructure context

Abstract eHealth services but also general Health services emphasize patient record management. Unfortunately the information in these records is not used to provide quicker, personalized eHealth services and appropriate treatment. Especially in a low infrastructure context where Health service providers are often overwhelmed by large num- bers leads to degradation in service delivery. Domain specific service discovery with personalization aims at providing user-centric services. This is very important in a low infrastructure context where demands on the health services range over various aspects that reflect the massive variation in social economic development synonymous with developing countries. The focus of this chapter is a framework for eHealth service discovery in low infrastructure context. To do this, we categorize the context of users and augment it with user specific profile. Our frame- work provides ontology based, context-aware semantic and personalized services.

4.1 Introduction

Health services in low infrastructure context are characterized by long queues, insufficient drugs, inefficient service providers and generally low literacy levels on the side of service consumers – patients [OEOA09, MK08, KNA10b, Dru05]. In addition, the health services tend to be generic due to lack of specialized resources. A number of health consumer demands can be satisfied with appro- priate education and advisory services only if they can be easily identified. As eHealth services proliferate into countries with limited infrastructure (electri- fication, Internet) as means of supporting the general health services, there is a need to support such services with software architectures that are low cost, flexible and easily build on the existing infrastructure. Service-oriented architecture (SOA) (see [BAPP06, Has05]), and the corre- sponding service-oriented computing (SOC) provide a system architecture in 50 Chapter 4. Service discovery architecture for a low infrastructure context which a collection of loosely coupled services (components) directly communi- cate with each other using standard interfaces and message-exchanging proto- cols. According to Papazoglou [PH07],“software services or simply services are self contained, platform-agnostic computational elements that support rapid, low-cost and easy composition of loosely coupled distributed software appli- cations”. The functionality provided by a service can range from answering simple requests to executing sophisticated processes requiring peer to peer or client/server relationships between multiple layers of service consumers and providers [BAPP06, Has05]. Services are described, published, discovered and can be assembled to create complex service based systems and applications. Service discovery is the activity of resolving consumer requests in terms of (advertised) services. Some requests may only be resolvable by a (complex) combination of services. Service discovery involves matchmaking of services, selection of appropriate services and prioritiz- ing (ranking) of services. Service discovery can be done manually, automatically or by a combination. Existing service oriented healthcare systems emphasize on patient record management, giving personalized healthcare assistance to patients, online con- sultation and advisory of patients. However, the communication among health professionals by modern technology has not yet been addressed. For example, Uganda implemented a wireless regional healthcare network to assist the rural health workers in providing learning material, email, and to enable outbreak re- porting. Generally, this network is used for data collection systems. The eHealth systems developed so far do not provide professional assistance, for example when new cases or symptoms are encountered. To support eHealth service discovery, we split this activity into: (1) adap- tation: extending a request with personal and contextual information, (2) rea- soning: about the request in terms of (3) domain knowledge. The framework proposed in this chapter will be tested in Ethiopia for the following reasons: (1) non existence of an eHealth system, (2) only a few number of healthcare professionals and the emigration of (local) doctors to developed countries, (3) the availability of some infrastructure such as the school network, the district network, and the expansion of mobile networks, (4) the country policy for elec- trification of districts and rural areas, and (5) the high spreading of diseases such as HIV/AIDS and malaria. Ontology has been defined as: “a formal, explicit definition of a shared con- ceptualization” [BPS+04]. A ‘conceptualization’ refers to an abstract model of some phenomenon in the world that identifies the relevant concepts of that phe- nomenon. Ontologies are used for the classification of the objects based on their properties. Properties have been described by the service provider. The service requester describes the need of properties. The matchmaker will match the ser- vice demand with the service supply. An ontology-base approach will help to avoid the problem of mismatch. The chapter is structured as follows: in Section 4.2 related work is presented. Section 4.3 discusses service discovery in low infrastructure. An overview of 4.2. Related Work 51 eHealth framework is given in Section 4.4. Finally, we present conclusion remarks in Section 4.5.

4.2 Related Work

Service discovery is one of the challenging activities of SOA. For example, [Has05] describes the process of finding services. Most studies done so far include service semantics, ontology based and context based service discovery. To the best of our knowledge, these three components have not been used together to discover services. In previous work service personalization or user profiling (user behav- ior and preferences) was given no attention. However, ([Has05] and [VHA05]) report that contextual information of services is available, complete and unam- biguous. They ignore how to handle missing, redundant, or incomplete context information. In this chapter we have divided context-awareness of services into service context and user context, which enables a richer handling of context.

In relation to healthcare service discovery very few researches has been con- ducted [Dru05, OEOA09]. For example, [OEOA09] mentions eHealth projects are under implementation in Uganda, South Africa and Nigeria (UHIN, Cell- Life and MindSet Health, LAMIS respectively), however as cited by [KNA10b, Dru05], there are about 12 million AIDS orphans in Africa. In line with this, [KNA10b] indicated that developing countries face challenges in providing acces- sible, efficient and equitable quality health services to their people. Recently, the first draft version of the application of SOA in healthcare domain is presented by HL7 standard group on June 2010 at http://hssp.wikispaces.com/PracticalGuide.

4.3 Service Discovery in Low Infrastructure

Typical eHealth setups in a low infrastructure context involve Health Extension Workers (HEW) whose main role is to link the largely uneducated masses with Health service providers. Generally the HEW serves the role of a “broker” and a typical sessions is described in subsection 4.3.1. The proposed framework is presented in Figure 4.1. In later sections we will discuss the components. 52 Chapter 4. Service discovery architecture for a low infrastructure context

Figure 4.1: Service Discovery Framework/Architecture

4.3.1 Sample Session In this part we present a sample session within our framework. The example also is described in Figure 4.2.

1. A Health Extension Worker (HEW) meets a patient who has a symptom of high fever.

2. The HEW sends the patient conditions to the query interpreter adding information as: the patient lives in one of the coldest area of the Semen Mountain region, I have no laboratory to check, I have antibiotics, pain- killer, and HIV/AIDS medicine. I treated the patient with a pain-killer. The patient is two days in this condition.

3. The query interpreter identifies the context and profile information by con- sulting the context manager and the profile.The profile manager updates the data of that HEW. The received context information contains such information as: actual weather condition, distance to nearest hospital.

4. The query interpreter transmits the enriched query to the matchmaker agent.

5. The matchmaker agent will analyze the enriched query, using knowledge obtained from the service repository. This will lead to a treatment pro- posal in terms of available services. The matchmaker agent performs the matching process on the basis of the HEW requirements (functional and non-functional). The matchmaker agent will prioritize more matching ser- vices on the basis of semantics, context and requester profile. 4.3. Service Discovery in Low Infrastructure 53

6. Finally, the matched service (appropriate treatment procedure and medicine prescription) will be sent to the HEW.

The above scenario depicts the working of the proposed framework. This frame- work can run at the client side on a mobile phone since the communication with the HEW is based on relatively short messages.

Figure 4.2: A sample session

4.3.2 Ontology Based Semantic Service Service Ontology for Discovery. Ontology from the philosophical perspective is the science of study of being. Philosophical ontology handles the precise utilization of words as a descriptions of entities, it gives an account for those words that belongs to entities, and those do not [KNA10a]. In computing and information sciences an ontology represents the set of relevant concepts within a domain of interest and their relationships [KNA10a]. The ontology is a formal, explicit specification of a shared concep- tualization of a domain, expressing the common understanding of the structure of descriptive information. The ontology makes explicit assumptions thereby separating domain knowledge from operational knowledge. A most important advantage is that an ontology is the basis for logic inference, giving a formal reasoning system for the underlying application domain. By mapping concepts in different ontologies, structured information can be shared. Hence, ontology is a good candidate for expressing context and domain knowledge. According to D’Mello and Ananthanarayana [DA10], domain ontology (ser- vice ontology) plays a major role in matching service requests with web-based service functionality. Matchmaking algorithms make use of functional elements 54 Chapter 4. Service discovery architecture for a low infrastructure context of web services and semantic relationships of concepts provided by the domain ontology. The goal of domain ontology is (1) to capture the knowledge of related do- mains, (2) to provide common understanding of domain knowledge, (3) to de- termine terms commonly recognized by domain experts, and (4) to well-define these terms and their relationship from formalized patterns of various levels. Domain ontology provides (1) the definition of the domain concepts and their relationships, (2) the actions that may occur in this domain, and (3) the basic principles of this domain [Ji09, DA10]. Describing Web services using ontology will enhance service discovery. The quality of that discovery depends on the algorithms and techniques used.

Semantic Service Discovery The semantic matching based discovery mechanism retrieves meanings (seman- tics) from service descriptions through various means. Depending on the type of information obtained for matchmaking, they are classified as information retrieval based methods, ontology driven methods, context information based methods, goal based methods and functional semantics based methods. eSDF [TKW10a] deals with semantic matching discovery and the quality of service based matching. The former deals with the meaning of the services and the latter with QoS, usability, and personalization (preferences and interests). These two methods of service discovery will facilitate the selection and ranking of services with respect to the advertised and requested services. The process of semantic service discovery consists of two steps: (1) matching of functionality service aspects (the functional requirement), and (2) service selection based on non functionality aspects of the services. Service selection involves semantic matching and ranking to select a single most relevant service to be invoked, starting from a given set of available services. Semantic service matching is the pairwise comparison of an advertised service with a required service (query) to determine the degree of their semantic match [DA10, SDHS05]. This process can be non-logic-based, logic-based or hybrid, depending on the nature of the reasoning style used by the matchmaker to compute partially or totally ordered matching degrees for the representations of service semantics. Subsequent ranking of services determines the order of their individual degrees of semantic matching with the given query. The semantic based web service discovery explores all relevant web services based on the semantics of service functionality, service context, service usability, quality of service QoS) and service goals [BAPP06, DA10].

4.3.3 User Profile (Consumer Profile) When a user wishes service behavior to be personalized based on the request a profile will be required. A user profile is a set of information, preferences, rules and settings recorded for that user [ETS05]. In our framework we use personal- ization of service discovery as important element to discover eHealth services that 4.3. Service Discovery in Low Infrastructure 55 better suit the user needs. Profiles may contain many individual data items (in- formation, preference and rules) coming from various sources [ETS05], [TKW10a, TKW10b]. The profile will change by its usage or may be changed by a special profile updater agent.

2 User Profile Acquisition. To acquire user profile, the required information can be obtained explicitly, that is provided directly by the user, or implicitly through the observation of user actions/behaviors.

- Explicit information The simplest way of obtaining information about users is through the data they input via filling forms or question-answering tech- niques or from the user interfaces provided. Generally, the information gathered in this way is demographic data such as user’s name, age, gender, job, marital status, and hobbies. Besides, user interests and preferences can be obtained explicitly. In this study we propose spoken dialog systems to obtain user’s information explicitly.

- Implicit information User profile are often obtained based on implicitly col- lected information form user behavior or from user feedback. The main advantage of this technique is that it does not require any additional in- tervention by the user during the process of constructing profiles. Gauch et al. [GSCM07] give an overview of the most popular techniques used to collect implicit feedback, and the type of information about the user that can be inferred from the users behavior.User’s browsing history, brows- ing activity, and search logs are some of the techniques used for implicit acquisition of user profile.

2 User Profile Representation. According to Gauch [GSCM07] user profiles are generally represented as a set of key words, semantic networks and concept-based profiles. User profiles repre- sented as weighted keywords are extracted and updated from the user request. The semantic network profile representation deals with the semantic relation- ship of keywords in the network. The bigger the weight, the more relevant the connected nodes. In concept based profiles, the user profile is compared with the whole concept of the user request rather than specific keywords. However, recently ontologies are used to represent user profile.

4.3.4 Context-aware Service Discovery Context is defined by Dey and Abowd [DA00] as: Any information that can be used to characterize the situation of entities (i.e. whether a person, place or object) that are considered relevant to the interaction between a user and an application, including the user and the application themselves. Context is typically the location identity and state of people, groups and computational and physical object. Thus, context is used in 56 Chapter 4. Service discovery architecture for a low infrastructure context three main cases: (i) presentation of information and services to a user, (ii) exe- cution of a service and (iii) tagging of context to information for later retrieval. In our framework we include characteristics as location, time and activity in the context. Furthermore, Dey and Abowd [DA00] says that context answers questions as: what, where, when and who. We therefore categorize context into service context and user context. The above information defines the context of the user whereas the service context includes: service price, service location, etc. The context updater agent provides additional information about a service and a user, for example the location. For that purpose, the context updated is equipped with special agents. For example a GPS agent that can track the user position, which has the added benefit of utilizing location-related information. This extra information will improve service discovery. The context can vary in time, therefore the context updater may also involve in a tracking function to signal context changes when they occur. The context updater might be a human, a system, or an digital agent on the Internet. During service discovery the user context is matched against the service con- text in order to retrieve relevant services with respect to context awareness. Context is very important for service discovery in an infrastructure-less and in- frastructure based networks, since it can retrieve services that conform to the user’s current context and service context. Healthcare services are very sensitive since the services are related to prevent human beings from death. Hence the context of the patient (such as blood pressure, temperature and other symp- toms) should be accurate to provide remotely appropriate prescription, consul- tancy and support. Otherwise it would be cumbersome to treat the patient and to provide assistance to the health worker at a distance.

4.3.5 Personalized and Context Based Matchmaker

The process of service matching is to implement difference operation between service advertisements(SA) and service requests(SQ). Such an operation enables to extract from a subset of web service descriptions the part that is semantically common with a given service request and the part that is different. The matchmaker ensures that the user will receive the service that is perti- nent with user preferences, interests and user contexts. To do so, it receives the user profile, preferences and context from the query interpreter and it combines with service ontology in service repository/registry. After that the matchmaker matches the requested services with advertised services. The extracted services will be forwarded to reasoning to verify the services with respect to users profile, service description and contextualization. Later the ranking module ranks the extracted services (matched services) based on user preferences, user context and non functional properties of services. Finally, the services with maximal rank will be presented to the requestor. The matchmaker will further perform consistency check and validity of the user profile and quality of service [AINC09]. 4.3. Service Discovery in Low Infrastructure 57

4.3.6 eHealth Service Internet-based healthcare is the application of information and communication technology in the whole range of healthcare functions. It covers everything from electronic prescriptions and computerized medical records to the use of new systems and services. This will cut down waiting times and reduce data errors [MK08]. Obviously the use of Internet, alike other sectors (e-business), has facilitated the health care industry with access to information anywhere and anytime. Different challenges of eHealth have been identified (see [OEOA09]), for example process of design, implementation, delivery of services, identity man- agement, infrastructure (wired/wireless), and security of information. However, most existing systems are in an experimental or infant stage [OEOA09]. In developing countries eHealth is an almost non-addressed issue. The emergence of eHealth has been shown to reduce the cost of healthcare and to increase efficiency through better retention and retrieval of records, better management of chronic diseases, shared health professional staffing, reduced travel times, and fewer or shorter hospital stays ([McC07, WERR06]). According to [Tan05], there is an eHealth paradigm shift: hospitals have been downsizing, reducing staff and closing hospital beds, a new form of health providers alliance and new modalities of health service delivery is emerged in the introduction of the eHealth system. Thus the evolving eHealth system is a dynamic entity that is being continually shaped by economic, political, techno- logical, and social forces [Tan05]. Email, phone, PDA, cellular phones enhance long distance communication among health workers, patients, and other professionals. Besides, eHealth em- powers the healthcare workers and patients through e-learning, e-consultations, teleconferencing, etc. Moreover, eHealth system can help attract and retain health professionals in rural areas by providing professional development train- ing and by creating a collaborative environment among the health professionals ([Dru05, Tan05]).

Healthcare Infrastructure The healthcare infrastructure is spread thin and poorly equipped. Health care facilities, in the relatively few locations where they exist, are usually overcrowded and in need of physical repair. The human capacity problem is perhaps even more serious. Despite the expansion of the healthcare institutions, the num- ber of health institutions is not sufficient yet [Tan05]. According to the MoH report on the year 2008, Ethiopia has 195 hospitals, 2689 health centers, 1517 health stations, 271 non profit clinics, 1788 private clinics and 14,416 health posts [MOH10]. MoH to outreach health service for the rural areas launched different projects. One of the project is to train 30000 Health Extension Works (HEW) and to build fifteen thousand health post at community level. These HEWs all are females and completed grade ten. They took a one year training at technical and voca- tional colleges. The main responsibilities of the HEW are: manage operations of 58 Chapter 4. Service discovery architecture for a low infrastructure context health posts, conduct home visits and outreach services to promote preventive actions, provide referral services to health centers and follow up on referrals, identify, train and collaborate with voluntary community health workers, and provides report the district health office. This huge numbers of health work- ers address the main health problems of the society in rural community with only one year training. According to 2009 MoH data, there are about 54534 healthcare professionals among these 2152 are physicians, 1606 are health offi- cers, 20,109 nurses, 1,379 midwives and 33,819 health extension workers. The physician population ratio is 1:37996 people [MOH10]. According to some study more than 60% of doctors leave to abroad or to private health institutions due to low pay, difficult working conditions, lack of opportunities for professional development, and insufficient autonomy.

Current ICT Initiatives and Projects (Ethiopia) WoredaNet Initiative. This is a major e-government initiative that connects all 611 of Ethiopian local councils (woredas or districts) to 9 regional capitals through Internet telephone and teleconferencing. Half the links are by cable, and half by satellite The initiative also provides connectivity to the SchoolNet, eHealth, and the soon-to-be launched AgriNet. WoredaNet is implemented by the Ethiopia Telecommunication Agency with funding from the World Bank and the African Development Bank through the Ministry of Capacity Building. Us- ing this network eHealth can be launched without incurring extra expense. Cur- rently, the woredanet provides various ICT services: video conference (meeting, education and training, workshops and seminars), court services, training and distance education, internet and messaging services, other service like reporting epidermic disease and early warning of natural disasters (flood, famine,etc). School-Net Ethiopia. The joint initiative by the Ministry of Education and UNDP is probably the most visible project in the country with a total of 500 schools equipped with a minimum of 15 networked computers per lab all con- nected to the Internet. There are new programmes around this initiative in the planning stages, including creating an extranet that will connect the schools.

4.4 eHealth Framework 4.4.1 Service Discovery Engine The service discovery framework from Figure 4.1 contains the Service Discovery Engine main components. We will discuss its modules and agents in this section. Context Data. It contains the context of services and users. The context of the request will be provided by the context provider. Two types of context are stored in the context database: service context and user context. Service context includes information about services such as location, version, cost and provider identity. User context, a context different from the user profile, contains such information as location, weather condition, status of the user (busy, on phone), time. 4.4. eHealth Framework 59

Context Manager. The context manager will contact the context data repos- itory to update or modify the context of the user. For example, the context updater may discover the user has moved, and thus send an update request to the context manager. The context manager also is responsible for aggregating or deriving new context information based on domain specific rules. Profile Data. The user profile includes personal bio-data, preferences, rules and constraints. This can be updated based on users behavior, for example using the invoked services or the history of use. User preferences provide a per- sonalization mechanism, which can be seen as part of the overall context, and enable service discovery in a way that matches best the explicit or implicit user requirements. The user profile should be stored in a secure manner based on the user agreed level of privacy. Profile Manager. The profile interpreter receives the consumers’ request from the context interpreter. After the profile interpreter gets the profile of the re- quester/consumer it verifies if the requester has a profile in the profile database. If the consumer/requester is new for the system it will send the profile to the database. After verifying the user profile and the preference, his/her context, the profile interpreter sends the data to the context interpreter. The context interpreter will add the profile information with the context information is for- warder to the matchmaking agent. Request/Query Interpreter. The context interpreter receives the request from the consumer and propagates the request query into the context manager and to the profile interpreter. This two agents extracted the information from the query and verify the information against the information in the database. The context interpreter after receiving the response from the profile interpreter and context manager, it will merge the profile information the context informa- tion and forward it to the matchmaking agent to match the request against the service specification in the service registry. Matchmaker Agent. Generally speaking matchmaking broadly divided into two: syntactic matchmaking which uses the structure or format of requester ser- vice with the provider service. The second one is uses the semantic or meaning of the requester’s service with the provider’s. This matchmaking agent will gather requested services from the query interpreter and the ontology based semantic service from the service registry. Based on this information, the matchmaking agent decides if the request and advertise services match or not.

4.4.2 Service Registry(Repository) The Service registry contains information about the services provided by third parties. To improve the semantic of service descriptions we use semantic web technology, notably OWL [SRAD07], to create additional annotations of service elements. This way, the platform enables service providers to formally describe their services in detail and to bring those service descriptions in correspondence with existing ontologies. On the other hand, it enables search services to perform a subtle search, by using constraints, relations between concepts, approximate matches and semantically rich queries [SPSS04], which delivers a more manage- 60 Chapter 4. Service discovery architecture for a low infrastructure context able result.

4.5 Conclusion

The emergence of Internet is changing the way people live. Service orientation is being applied to all sectors of human life, such as healthcare. Most developing countries have little coverage of society health even though the spread of disease is high. In order to reduce this problem electronic health is an option. As eHealth has impacted on developed countries, it will bring a change also in developing countries such as Ethiopia that suffer from high migration of medical doctors inside and outside the country. In this chapter we propose an eHealth service discovery framework which can facilitate the effectiveness of eHealth. The framework provides various facilities to create, specify, discover and select healthcare services. Especially, the framework covers the ignored part of service orientation to customize services based on user/consumer requirements. Our framework will serve for both wired and wireless networks. Part III

Personalized Context-aware Dialogue System 62

Chapter 5 introduces user profile and user context. Section 5.1 describes the importance of personalization in the process of service discovery. In Section 5.2 a related work is reviewed. In this section contextu- alization and the impact of personalization on service discovery are explained in Section 5.2.1 and 5.2.2. A brief description of user pro- file is given in Section 5.3. The main challenges of personalization, a working example and user profile privacy are discussed in detail in Sections 5.3.1, 5.3.2 and 5.3.3 respectively. Section 5.4 elaborates the architecture of profile based service discovery. The problem of profile based service discovery is presented in Section 5.4.1. The im- portance of personalization in healthcare is discussed in Section 5.5.

Chapter 6 is structured as follows: As an introduction, we discuss the difference and relationship between conventional requirement engi- neering and Service oriented requirement engineering. Section 6.2 gives an overview on related work in this field of research. Fur- thermore, the process of requirement elicitation and analysis is for service oriented system is described (Section 6.3). The approach used and the results obtained form the study is presented in Sec- tion 6.4 and 6.5. This chapter closes with a conclusions and future directions (Section 6.6). Chapter 7 covers spoken dialogue systems (SDS) in general. This in- cludes the state of the art of SDS as well as the motivation that triggered this work. Afterwards, the application of spoken dialogue systems in healthcare domain is discussed in Section 7.2. The anal- ysis of the experiment and the cultural dependencies (based on Hof- stede’s cultural dimensions in Section 7.3.4) of the doctor-patient conversation is presented in Section 7.3. Base thereupon, a spoken dialogue model is proposed (Section 7.4). The chapter closes with concluding remarks and future research directions (Section 7.5). Chapter 5

User Profile-based Service Discovery for eHealth

Abstract Personalization is not very common in Service-oriented Ar- chitecture and Service Discovery in practice, yet very important as it enables to retrieve more specific and relevant services. This is especially true in the case of complex discovery, where the retrieval system tries to find patterns of services that together can satisfy a (complex) request. We describe the relation between personalization and service discovery in general, and then concretize this in the Service Discovery Framework (SDF). Personalization effectively improves the quality of the discovery algorithm. As an application, we show its benefits in the context of eHealth.

KEYWORDS: Personalization, eHealth, Service Discovery, SOA, Con- text

5.1 Introduction

Personalization is regarded as one of the most compelling features of service- oriented systems [PTDL07] and mobile computing (see [WSL+08, LKSP02]) disciplines. Personalization refers to a set of preferences, data, rules and set- tings that are used by a device or service to deliver a customized version of capabilities to the user ( [Kob07, SLL09, WBHK02]) as a means of providing user-centered services. User-centered services and personalization promise to support customers in many aspects that include selecting their favorite services from the rapidly increasing offering of web services and adjusting their personal services to their individual needs. In the past few years, personalization has been used in various application areas such as e-commerce, e-learning to assists users in finding, adapting and using services that fulfil their needs, given their personal profile, mobility and context (see [LKSP02]). Personalization is con- cerned with matching and negotiation between user requirements and abilities 64 Chapter 5. User Profile-based Service Discovery for eHealth on the one hand and service offerings and resulting adaptation of network and application level services on the other hand. In the realm of service discovery, we see personalization as an advanced form of service discovery: a set of services that meet the core requirements of a user are further scrutinized for compliance with the user personal desires and constraints. Consequently, personalization offers a quality user profile and an accurate rep- resentation of the user’s physical and emotional behavior [LKSP02]. To build and maintain effective personalization, appropriate user preferences, interests, and behaviors are required (see [GD09]). In a way, personalization covers all functionality regarding discovery and management of users with respect to their preferences, demands and wishes. Therefore, it is important that personalization should be transparently incorporated as one of the main components of service discovery in addition to context-awareness and semantics. A user profile is often used to classify users into predefined user segments (such as, by demographics or tastes) or to capture their behavior including their private interests and preferences (see [SSRC+10]). One of the key challenges pointed by [GSCM07] and [RK09] is to construct accurate user models contain- ing demographic data, interests, preferences, intent and behavior information. A user profile can be obtained in various ways. It can be explicitly defined by the user, such as during registration for a service. Additional information about the user can be obtained through user profiling:the process of implicitly learning user characteristics from data associated with that user. Data sources for user profiling include among others the user browsing sessions, the user’s own gener- ated content (e.g. the user’s blog), the user’s social interactions with friends in the user’s social network (e.g. the user’s discussions with others), click-through data extracted from search logs, or even other user profiles using collaborative filtering techniques [SSRC+10]. Personalized systems employ various personal- ization methods like machine learning, information retrieval, bayesian networks (see [Wan10], [Kob07]) to derive additional assumptions about users. Gener- ally, the more information is collected about users, the better the quality of personalization will be. As a result, the process of personalization usually con- sists of user modeling and adaptation. According to [Wan10], user modeling is concerned with building user models (profiles), while adaptation creates person- alized services based on the user profile. User profiles evolve over time due to possible changes in user interests and tastes. Our aim in this work is to develop a scalable user profiling solution that captures such evolution and maintains qualitative user profiles that can be argument discovery of services. Personalization dynamically adapts a system’s service or content offer in order to enhance the quality of a users interaction with the system. Having as its goal a closer customer relationship, personalization provides support to satisfy the needs, preferences or goals of individuals and specific target groups. A person context is defined in terms of their connected- ness with domain entities and is defined and affected by the work they do, the things and people they know, or the activities they engaged in. An individual context needs to be correctly interpreted by all entities (services) involved. Se- 5.2. Related Work 65 mantics [GPC02] through the use of ontologies provide a common understanding of concepts and activities that may contribute to the user’s profile. The contribution of this chapter is proposing a context-aware profile-based service discovery based on ontologies. In addition, we address user authenti- cation and authorization methods for user profile and services. We attempt to assess the impact of personalization on facilitating service discovery, service selection and service matching. We exemplify our work within the domain of eHealth services motivated by the fact that it is not common to find identical health cases with similar context, particularly in developing countries that are usually synonymous with wider variations in culture, beliefs and general liv- ing conditions. Such variations occasions added importance for personalization especially in eHealth services that are core to developing countries. This chapter is organized as follows. In Section 5.2, related work is explained. We describe personal profile in Section 5.3. Section 5.4 deals with service discov- ery framework. We discuss personalization on eHealth in Section 5.5. Finally, we conclude the chapter in Section 5.6.

5.2 Related Work

In the last couple of years various researchers have addressed the problem of per- sonalization for different applications (for example e-learning and e-commerce, etc). The rapid growth and deployment of services and information makes per- sonalization one of the important research topics. However, the application of personalization in service discovery has not been widely studied. Semantic and contextualization of service was given more emphasis in the process of service discovery than personalized service discovery. The concept of a user profile (personalization) usually refers to a set of pref- erences, information, rules and settings that are used by a device or service to de- liver a customized version of capabilities to the user ([Kob07, SLL09, WBHK02]). To capture user preference and interest, ontology based user modeling has widely been adopted. Ontology helps to develop an effective mechanism for user query contextualization based on both current and previous search history [SLL09]. According to Jard et al. [JAH07] and Petersen et.al [PBPC09], a user profile contains information on the goals, the needs, the preferences and the intentions of that user. The user profile provides an interface to access this user information, including its static profile, preferences, context information (location, presence, device capabilities, etc), service specific personal information and the history of service usage and so on. The provided function will be used to discover the services requested by the user. Typically a user profile includes her/his individual preferences together with technical constraints of his/her means of communication (devices and equip- ments) and his environment [WBHK02]. Based on semantically enriched service descriptions a service request management is then performed including a service discovery and execution. During service discovery and selection, decisions that have to be made will not necessarily lead to one definitive outcome. Require- 66 Chapter 5. User Profile-based Service Discovery for eHealth ments could be met not by just one service or service component, but by a set of them, or none at all [WBHK02]. Therefore [WBHK02] state that the process of service discovery can take the personal user preferences, semantically rich user profile and context information of the user into account. According to Wang et al. [Wan10] (the study conducted shows that 70% - 89.5% ), Internet users are concerned about their privacy or security of their personal information online. As [Wan10] (see also [Kob07] states, 82% - 95% people refused to give personal information on a web site at one time or another. Related to this, Wang et al., [Wan10] added that according to the study con- ducted on 2009, 68% of Americans ”definitely would not” and 19% ”probably would not” allow advertisers to track them online even if their online activities would remain anonymous. 63% of Americans feel that laws should require ad- vertisers to delete information about their Internet activity immediately. 69% of Americans would like to see a law giving them the right to access all of the information a web site has collected about them. According to literature [Kob07, WK09, Wan10], a significance number of people revealed their concern of disclosing personal data to the Internet. This implies that if users are not given guarantees of keeping their personal informa- tion secured, then they are not willing to disclose this kind of information.

5.2.1 Context-aware Models for Personalization

Context-awareness refers to systems that are able to adapt their services to the user context. Services can be selected according to both the current user context and her/his preferences for this context. Context-aware profiles aim at indicating which service is relevant for a user when he is in a given situation. The main idea of the context based profile [PVOG08, MNS+05, WDFLP08] is to allow users to define the profiles and potential context in which these profiles should be used. Context can be thought of as the “extra” often implicit, information (i.e. associations, facts, assumptions), which makes it possible to fully understand an interaction, communication or knowledge representation [MNS+05]. They propose the use of a common ontology based user context model as a basis for the exchange of user profiles between multiple systems and, thus, as a foundation for cross-system personalization. The user context has influence on the usage of public and private part of profile. For example, if a user is alone, the private part of the profile will also be considered for personalization; whereas if a user is acting as a member of a group then the public part of the profile will be activated [AINC09]. Furthermore, the profile manager (PM) ranks, updates and adds new user preferences with the help of usage logging. Thus the user profile grows over time as the user interacts with the system. However, this growth over time leads to information overabundance issues and makes the user profile inconsistent and redundant since some preferences are only valid for a short period of time (e.g. due to the happening of an event) and after that period the occurrence is very low [AINC09, WDFLP08]. 5.2. Related Work 67

In our model the user context can be obtained in two ways: the user an- nounces her current profile in her request or the context manager dynamically generates the users context (location, weather, etc) from the context provider devices such as GPS, sensors etc. A user context (as summarized in Figure 5.1) consists of two categories (static and dynamic). The static category describes the personal background of the mobile user. These are user data about name, gender, age, language etc. The dynamic further classified as environmental and information world. The environment category provides situational context information like the actual location and the environment. The third category captures the user’s “informa- tion world” e. g. read documents and visited Web pages - thus reflecting the user’s interests. Owing to computational reasons, there is no voluminous user context model on the mobile client. Only the essential user data reside there [KG07].

Figure 5.1: Context of mobile user Context-sensitive service discovery should be able to satisfy the users spe- cific immediate needs. Additionally, community support is of importance to enable communication and an improved exchange of information among mobile users. Users who share the same context, interests, or service needs should be enabled to constitute and join virtual communities. Community specific services and communication between their members would improve the mobile service retrieval. Users in the developing countries could collaborate and benefit from tailored discovery results for their individual needs. Some of the advantages of using context-awareness in healthcare domain are large number of situations and related tasks, mobility of patients, health pro- fessionals and some equipments; limited financial and human resources; and the need to cut cost while improving the quality of service to an increase num- ber of people. In addition, the expectation to access, process, and modify the healthcare information anywhere and anytime using handheld devices is another reason to use context-awareness. Alike other systems, contextualization encoun- ters different challenges such as how often the contextual information needs to be collected, when is some information is old, not reliable, missing, or just plain wrong? Is it the same for normal, abnormal and emergency cases? Health pro- fessionals and patients are involved in a variety of tasks and processes and their information needs vary based on their location, time, environment and involved 68 Chapter 5. User Profile-based Service Discovery for eHealth activity. The knowledge of their current activity may assist in deciding which of the healthcare professionals should be reached for some medical tasks or decision making.

5.2.2 Personalization and Service Discovery Personalized search is seen by the research community as a means to decrease search ambiguity and return results that are more likely to be interesting to a particular user and thus providing more effective and efficient information access (see [SMB07, PYK09]). One of the key factors for accurate personalization information access is user profile and user context. There are many factors that contribute for the delineation of personalization such as: the user’s short- term information need, such as a query or localized context of current activity, semantic knowledge about the domain being investigated, and the user’s profile that captures long-term interests. To find the most appropriate services, service discovery protocols should ex- ploit context. The most appropriate service is not always the nearest or the highest quality rather, it varies according to the user’s preferences. More im- portantly, user criteria change with their context. A user might generally prefer to use the most popular services, but in a particular case, might want to use only high-quality services [PYK09]. A service discovery starts from the local service repository/registory. If it fails to find an appropriate service in the local repository or registry, it propagates request/discovery queries to other appropri- ate repositories/registries. If the requested service is found, the matchmaking process will be performed to select the appropriate service based on the user context and user preference (profile) [PYK09]. Discovery corresponds to the activity of locating a service that meets certain functional criteria. Selection is related to the activity of evaluating and ranking the discovered services to identify the ones that fulfill a set of non-functional properties and user preferences requested by the actual user. Most of the existing techniques rely on syntactic descriptions of services interfaces to find services with disregard to non functional service parameters [BABG08]. Incorporating user contexts and user preferences in the process of service discovery brings quality service discovery that can improve search results and provides a better means for user to identify their service information needs [BABG08, PYK09, PVOG08]. Personalized service discovery or retrieval involves some important chal- lenges: capturing the dynamic behavior of the user, accurately identifying user context and organizing the services in such away that matches the particular service context.

5.3 User Profile

The main purpose of user profile is to keep track of the user related information to control its availability and facilitate service access for its users, and to realize a 5.3. User Profile 69 better user experience. Besides, personalization helps to identify service delivery mechanism (text, audio, video, etc.), to choose the type of service to be delivered with respect to user preferences (physical, psychological, environmental, and so on) and to create a global personalization scheme [ETS10]. User profile may contain many individual data items (information, preference and rules) coming from different sources ([CH08, PBPC09]& [ETS10]). When a user wishes to have the behavior of services personalized to his/her requirements a profile will be required [ETS10]. Some of the values of these items will either not change (static) or change very irregularly (dynamic) and some may be individually changed by the user. A single user may be associated with multiple profiles. It is therefore impor- tant that users have the flexibility to decide on the profile to use; or the system should automatically detect the current profile. For instance, a user may move from office to a meeting room requiring him to access services on a small device. Users can often control the type of service / content provided, as well as the look and feel of the interface, by indicating their choice through their profile. In [PBPC09] a user plays a number of roles in personalization system. A typical user in personalization will have at least two roles such as the user role and the administrator role. The capabilities of these roles are:

• User role : use of persons own profile including activation and deactivation of profile.

• Administrator role : definition of new profile, modification of existing pro- file, and definition of access rights.

User profile can be segmented into two: private and group (clustered). The private profile contains only individual data i.e. personal data, and preferences. Group profile is generated from the private profile from the users who share sim- ilar interests and preferences. For example, for healthcare works we can group users based on their job or educational status: specialist, general practition- ers, nurses, pharmacist, etc.; and patients can be grouped or clustered by the disease type: HIV patient, TB patient, diabetic, etc. This type of clustering improves the service selection and service matchmaking process since they by and large share similar information. Furthermore, this segmentation assists to push (broadcast) some information to the users with the same preferences (for instance, for healthcare workers new disease break out, new vaccination, training etc. and for patents medical time, consultation and education etc). User profile determines the method of service delivery. For example a visually impaired person wishes to get the service in audio and the hearing impaired user wishes to receive in text rather than audio ([CH08, PBPC09]& [ETS10]). Addi- tionally, User profiles may require to be prioritized to avoid conflicting profiles. A user may have several preferences, however, services might not be available for the preferences to match. Hence, after filtering out the relevant needs of the users preference required to be prioritized. The priority of user preferences (see Chapter 9) will help to relax the matchmaking process. In line to this 70 Chapter 5. User Profile-based Service Discovery for eHealth

([PBPC09], [ETS10]) stated that eHealth profiles to be allocated higher priori- ties than non-eHealth profiles. eHealth profiles are considered as more important than personal profiles (normal profiles) as they contain information (extracted from electronic health records) and preferences ([CH08, PBPC09], [ETS10]). Generally, the user profile should address the following questions: where a user is located, what her job/ profession is, what her preferences (interest) is, what the context of the user is, who the provider of the service is , the cost and availability of the service ([PBPC09], [ETS10]).

5.3.1 Challenges of User Profile (Personalization) Personalization (personal profile) is not without the challenges; some of the challenges are: how can personal information be gathered, how is this infor- mation stored in a persistent and ubiquitous manner (this is applicable for infrastructure-less networks), how can the changes always be reflected in the services rendering process? In addition, privacy is the other bottleneck in per- sonalization. In regard to gathering information, we propose pull and push model as well as manual and automatic information gathering. Manually, the user will fill in the form and continuously update the profile whenever there is a change whereas in automatic information gathering especially, in mobile ad hoc networks, every node can broadcast its profile to the immediate neighbor node and gathering information from profile providers and devices such as sensors, GPS, etc. In the case of user profile privacy, in our framework, we proposed user authentication and authorization model to secure the user profile from privacy threat (see Section 5.3.3).

5.3.2 Working Example John works in non governmental charity organization. After a few days in a charity work he feels a little discomfort. He has fever, headache and nausea. The village health extension worker (HEW) diagnoses a laboratory examination (blood, stool, etc), however, all the results are negative. The HEW makes ad- ditional examination to find the cause to administer the appropriate treatment. But the case of John cannot be resolved in the health post as there is only one small laboratory and there is no specialist. Thus the HEW decides to access the health system to get additional help. After logging into the system, the HEW fills the form, entering the diagnosis made, the administered medication, the patient’s symptoms, the patient’s history, John’s preferences and the location of the health post. After accessing John’s medical history (Electronic Health Record) remotely, the HEW learns that John has a mild hypertension case and is allergic for antibiotics, and John prefers not to have an injection. Based on this information, some services are retrieved from the repository. After the sys- tem receives the information, it forwards all this information to John’s family doctor (if any) and the emergency dispatch center (Emergency dispatch center is a specialized or referral hospital near by the given location area. This dispatch centers which has good medical facilities and a number of specialists). While 5.3. User Profile 71 receiving this emergency request the system will forward the cases to the ap- propriate specialist to assist the patient remotely. These emergency team will communicate the patient’s private doctor and forward to the attending doctor the treatment to be administered for the patient. As shown in Figure 5.2 a user may use two ways of requesting a service: (1) using voice and (2) using text or/and video (depending on the bandwidth in developing countries context). As most of the population in developing coun- tries are illiterate, especially in the rural areas, voice based communication will increase the number of eHealth system users. Furthermore, users who own a smart phones and can use the features of the smart phone or PDA, can query service using text and audio/video (if the infrastructure allows). As depicted in the Figure 5.2, the user can press a button and send a voice request. The voice server (VoiceXML) converts the voice data into text data, and forward the converted request to the application server. After receiving the request, the ap- plication server will forward the request to the appropriate emergency dispatch centers (EDC) based on the location. EDC is a center which is set up based on the geographical location. This center should have a number of specialist doc- tors, good health facilities and services. After evaluating the user request, the EDC forwards the request to the appropriate specialists. Finally, the specialists evaluate the user request, verify and access the patient’s history (EHR), com- municate with the family doctor (if any) of the patient, and access the service repository. Finally, the treatment and its procedure is forwarded to the mobile of the requesting HEW. The most prominent benefits of a voice-based question-answering dialogue using mobile devices (mobile, PDA,...) are [Kum07]:

• it enables the underprivileged to create, host and share information and services produced by themselves,

• it provides simple and affordable access mechanisms to let the masses ex- ploit IT services and applications,

• it provides a cost effective ecosystem that can be made available over the infrastructure that exists today.

A voice based querying services has its own challenges. But in the case of Ethiopia it is very important since the majority of the population do not speak English rather can they use their own language. Choosing the language to be localized is another challenge since many languages are spoken in Ethiopia. In our project we plan to use Amharic and English as a medium of communication in our system. The former is understood by many of the people and is the working language of the country and the latter is the medium of instruction starting form junior high schools, high schools and higher education institutions. 72 Chapter 5. User Profile-based Service Discovery for eHealth

Figure 5.2: Personalized user service request

5.3.3 User Profile Privacy Personalization is beneficial for service consumers and service providers. How- ever, its benefit may be counteracted by privacy constraints. Personalized sys- tems need to address the privacy constraints, including user personal privacy preferences, the privacy law and the regulation of the company or industry [Wan10, Kob07]. Similarly, it has been tacitly acknowledged for many years that personalized interaction and user modeling have significant privacy implications, due to the fact that personal information about users needs to be collected to perform personalization [Kob07]. Mobile devices can provide useful personalized services that are based on usage patterns and the current user location. Both are tracked in central servers, which creates new privacy problems. Users are not merely “online” any more and sheltered behind IP addresses, but become identified individuals who are being observed and contacted by their surrounding environments [Kob07]. According to Wang et al. [Wan10] (the study conducted shows that 70% - 89.5% ), Internet users are concerned about their privacy or security of their personal information online. As [Wan10] (see also [Kob07] stated, 82% - 95% people refused to give personal information on a web site at one time or another. Related to this, Wang et al., [Wan10] added that according to the study con- ducted on 2009, 68% of Americans “definitely would not” and 19% “probably would not” allow advertisers to track them online even if their online activities would remain anonymous. 63% of Americans feel that laws should require ad- vertisers to delete information about their Internet activity immediately. 69% of Americans would like to see a law giving them the right to access all of the information a web site has collected about them. According to literature [Kob07, WK09, Wan10], a significance number of people revealed their concern of disclosing personal data to the Internet. This implies that if users are not given guarantees of keeping their personal informa- tion secured, then they are not willing to disclose this kind of information. 5.3. User Profile 73

Privacy for personalization should consider two types of constraints: regu- latory privacy requirement by law and regulations, and personal user privacy preferences and needs. Regulatory privacy includes regulation based on nations, company or sectoral laws. Therefore, highlighting these significant impacts, we advocate more recognition of the importance of privacy in designing and imple- menting of personalization. The personalized system tends to provide users to block the privacy from any an authorized entities. For example the X-ray images and other important patients data can be blocked from the service providers, even only authorized healthcare workers can get access to the specified medical information. The eHealth system will also use role-based access, which means that health care providers are only allowed to access information for patients under their care and will only have access to the minimum amount of information they require. Personalization of service and user preferences can be effective and accepted by the users if the system has a strong privacy law and regulations, and the user data should be free from privacy threats. Users have some characteristics that will need to be tracked for personal- ization: where they are located, what their role is, what their interests and preferences are. Similarly the service will have characteristics that will need to be leveraged for personalization: price, owner of the service, service or product brand, and location of the service found.

Figure 5.3: User authentication and authorization Figure 5.3 shows the solution proposed to provide users authentication and authorization to access their profiles. In this chapter we propose to employ user authentication and authorization. User authentication provides users with a secure user name and password. This user name and password should be encrypted when stored in the profile reposi- tory. Authorization deals with role based access control. Privilege will be given to the users (human or systems) with the respect to the role they played. For 74 Chapter 5. User Profile-based Service Discovery for eHealth example, PERMIS [CZO+08] is one of the prominent role based access control (authorization) system used in many applications. The profile manager (PM) will checks and verifies the certificate, if the certificate is provided by a trusted body, and if the certificate contains signature and if the requester is a legitimate owner. The user to be authorized must be first authenticated by the authentication system. The above algorithm works as follows: 1. The user is requested to login in the system. If the login process is suc- cessful, the user is able to access the system if not the user request will be rejected. The following steps helps to secure the request message and the user identity. 2. The user sends a request to the query interpreter using a session key shared between them. 3. The query interpreter request the Certificate Authentication and autho- rization system (Certificate Authority (CA)) to verify the certificate re- ceived from user is valid or not. 4. The authentication & authorization system or CA checks its validity. If it is valid it will send the Public key of the user, the identity of the user, time stamp and signature of CA. This information can be encrypted using CA’s private key. 5. The profile manager decrypts the information using the public key of CA’s (authentication and authorization system) 6. The user will be given access to the system based on the role she plays. It is obvious that most personal data transferred over networks, or between users, is in the public domain. Thus a person’s name, address, telephone num- bers, bank numbers (credit card numbers), email addresses, transport methods, social security details, date of birth, place of birth, details of family and friends, are in the public domain. What is clear is that in a non-networked world the exposure of such public data and the means to exploit them are relatively low and can be controlled [ETS10]. In a networked world the exposure of data is less controlled and hostile agents may be less obviously present. In a networked world the exposure of data is high and there are many hostile agents; thus there will be a strong likelihood of leakage of private data when using personal de- vices [ETS10]. Mostly the user personal devices are attractive to criminals to break and breach the user privacy and security. In this case we proposed a pri- vate policy oriented privacy protection in which the privacy policy will be stored on the user side.

5.4 Service Discovery Framework

In this section we first introduce the discovery problem, and then describe the SDF framework to handle this problem. 5.4. Service Discovery Framework 75

5.4.1 The Profiled Discovery Problem The service discovery problem can be described as the problem of finding an opti- mal combination of services given a request. We follow the approach from [Kan09], and shortly overview the approach. Services are described by their effect in terms of how they transform their input message into an output message. We use the convenience of Hoare Logic [HH98] and write {P } S {Q} to describe that service S will transform an input satisfying condition P into an output satisfying con- dition Q. We assume a set S of so-called elementary services. Services may be combined to form new services. For example, the service S1; S2 is the service in which the execution of service S1 is followed by S2. The semantics of this compound service is derived as follows:

{P } S1; S2 {Q} ⇔ ∃R [{P } S1 {R} ∧ {R} S2 {Q}] Other ways to combine services are optional, repetitive and parallel execution. Let S+ contain all elementary services from S and be closed under the com- position operators discussed above. A request q is described as a combination q = (Pre, Post). A profiled request (q, P ) is the combination of a request q and a preference profile P . The solution space for request q is:  + Sol(q) = S ∈ S {Pre} S {Post} From this set Sol(q) the cheapest solution is selected:

argmaxS∈Sol(q) (≺[S] , q, P ) where (≺ [S] , q, P ) indicated how well solution S in the context of question q is to be preferred given profile P . This problem however is computationally intractable. In [Kan09] a similarity calculus is described that evaluates the similarity Sim(q, S) between a request q and service S as an estimation of its successfulness in satisfying request q. The similarity calculus is used to select a set of candidates for further investigation to find a proper solution. We will therefore define the solution space as a mapping that indicates the correctness of solutions: + Sol(q): S → [0, 1] which may be defined for request q = (Pre, Post) as follows:

Sol((Pre, Post))(S) = Sim(Pre, Pre(S)) · Sim(Post(S), Post)

Taking the profile P into account, we get for each service S ∈ S+ a final suit- ability score Suit(S, q, P ):

Suit(S, q, P ) = Sol(q)(S) · Sim(P,S) The involvement of personalization may be handled as a measure to make a solution more or less suitable. In chapter 8 we present the problem of service discovery in detail. We use user preferences (which includes user personal information, preference and context) to enrich user queries for speeding up the process of service discovery [TW14]. 76 Chapter 5. User Profile-based Service Discovery for eHealth

5.4.2 The Architecture The framework presented in our previous work ([TKW10a], see Figure 4.1) de- picts an overall process of service discovery. A user may send a request to the request/query interpreter. The profile agent personalizes the request, while the context agent will add context specific extensions to the request. Then the en- riched request is forwarded to the matchmaker agent. The matchmaker agent selects the best candidates for the submitted request, using the service reposi- tory agent to supply the base knowledge (their identity and their semantics) of the elementary agents (S). The result is transmitted to the service requester. The service requester then will take care of the final selection and will make the bindings to the involved agents. Note that this framework can also be applied in developing countries. Mobile phone technology can be used to access the framework even in a low infrastruc- tural situation (for more details see [TKW10a]).

The Profile manager The profile manager (PM) gets the user request. Upon first usage, a user may have to supply some basic information to set up a profile. The profile manager updates the profile repository. After completion, the PM will send the user a registration conformation message. In the meantime, the profile manager sends the new user information to the authorization and authentication module. Then the user will be provided a certificate. If the user is a registered user, the PM will request an authorization certificate from the authentication and authorization module. The PM also checks the validity of the certificate and checks if the certificate is given by a trust security manager. If the certificate fulfills the above requirements, the PM updates the user profile (preference, interest, context (if exist)). After that the PM will send the user request plus the current user profile to the matchmaking agent (and/or the user if necessary). It further reads in the usage logging data from usage logger and updates the specific user profile accordingly. The profile manager also create and maintain a virtual group profile in memory [AINC09]. All profile data are held in a profile database, which is only accessible via the Profile Manager. The PM permits to read or write data only if the requesting application can prove sufficient access rights with a certificate. To enhance security for sensible data, profile entries in the database are encrypted by the Profile Manager.

The Matchmaker The process of service matching is to implement difference operation between service advertisements and service requests. Such an operation enables to extract from a subset of web service descriptions the part that is semantically common with a given service request and the part that is different. The matchmaker ensures that the user will receive the service that is pertinent with user prefer- ences and interests. To do so, it receives the user profile and preferences from 5.4. Service Discovery Framework 77 the query interpreter and it combines with service ontology in service reposi- tory/registry. After that the matchmaker matches the requested services with advertised services. The extracted services will be forwarded to reasoning to verify the services with respect to users profile, service description and contex- tualization. Later the ranking module ranks the extracted services (matched services) based on user preferences, user context and non functional properties of services. Finally, the services with maximal rank will be presented to the requestor. The matchmaker will further perform consistency check and validity of the user profile and quality of service [AINC09]. In this work we consider three stages of capability matchmaking (includes user context, service context, user preferences etc.): exact, plug-in, and subsumed.

1. Exact match: Both outputs and inputs of desired service are equivalent of request’s, i.e.,

INAd = INReq and OUTAd = OUTReq 2. Plug-in match: The outputs of service are more specific than request’s, or inputs of a service need less information than the request provides, i.e.,

OUTAd ⊂ OUTReq or INReq ⊂ INAd 3. Subsumed match: The outputs of a service can only provide partial infor- mation needed by the request, or inputs of a service are more specific than the request provides, i.e.,

OUTreq ⊂ OUTAd or INAd ⊂ INReq

The ultimate goal of matchmaking is to determine the contents that satisfied user preferences and interests. For this, the matching algorithm starts with the most specific expression which best fits the user’s wishes and in the case that no matching can be found, the user query required to be relaxed (expanded). In this section we present our matching algorithm, which evaluates the simi- larity between request and service advertised. We weighted user preference using MoSCoW lists and assigned weight (Must have = 1, Should have = 0.75, Could have = 0.50, Won’t have = 0.25 and 0). This value exhibits how the given preference of the user is mandatory and compulsory. The above algorithm matches the user preference. If the importance of the user preference assigned to the request is compulsory or must have (line 6 and 7 in algorithm 1), the function keeps the exact value of the matching service request and advertised. When the importance assigned to the request is not mandatory (should have and could have) the algorithm increase the value of the matching by relaxing the user request(line 9). In this model, the user requests services. The query interpreter will send the query to the profile manger. The profile manager requests the authenti- cation and authorization server to verify the certificate received from the user is valid or not. After getting the user certificate (verified certificate), the pro- file manager retrieves the user preferences, interest from the profile repository. Finally the user information will be forwarded to the query interpreter. The 78 Chapter 5. User Profile-based Service Discovery for eHealth

Algorithm 1 UserP refMatching(req, adv) 1: a = ServMatch(req, adv); 2: b = UserP refV alue(rqt); 3: if (a == 0) then 4: return 0; 5: else 6: if (b == 1) then 7: return a; 8: else 9: return (a − 1)b + 1; 10: end if 11: end if query interpreter transfers the service request and the user profile (user data and preferences) to the matchmaking agent to process service matching. The matchmaking agent will request the service repository for the advertised services. Then the matching process will be performed. After the matching the reasoning agent will strengthen the matching with some reasons (QoS, user preference, cost etc.). After that the ranking agent will rank the available matched services with respect to user profile and context. Finally, the service with maximal ranking will be selected and sent to the requester. The process of discovering service is based on user profile is depicted in algorithm ( 1 & 2 ) and in figure 5.4.

Algorithm 2 ServiceDiscovery Request Negotiate: See Figure 5.3 Request Interpreter: Update Profile (user, req, pref out req, pref); Update Context (context out context); query := req ⊕ prefs ⊕ context; Matchmaker: Receive (query);  + Cand = s ∈ S Sim(query, s) > δ ; if Cand empty then failure; else report best cost-effective and reliable services end if

Note that each service has a reliability score (similarity with the query) and a cost associated. This does not define a linear ordering on services. 5.5. Personalization on eHealth 79

Figure 5.4: Profile-based service discovery and selection

5.5 Personalization on eHealth

Advances in service orientation, mobile and ubiquitous computing, and contin- uous progress in medical devices and diagnosis methodology are enabling per- sonalized healthcare services to be delivered to individuals at any place and any time [ZYC04]. These advances deviate from the ”One size fits all” paradigm in healthcare as is common in traditional hospitals, clinics and healthcare cen- ters. Personalized healthcare ensures that healthcare services provisioned to individuals are customized to their prevailing healthcare needs. In most devel- oped countries, personalized healthcare is provided for citizens through home care, wearable devices, online treatment and consultation. In developing coun- tries personalized healthcare could provide an opportunity to compensate for the shortage of professional healthcare workers. Introducing ICT in the healthcare sector is a hot issue, both in developed and developing countries. Several researchers have been conducting researches how to use ICT in supporting healthcare. Many organizations are involved in produc- ing electronic healthcare standards. For example, Health Level 7 (HL7, [MOO]) is a health informatics standard organization. The main purpose of this orga- nization is developing, publishing and promoting a comprehensive framework for the development of health informatics standards and the employment of the framework to produce protocol specifications for health data interchange, inte- gration, storage and retrieval among diverse data acquisition, processing, and handling systems. Similarly, the European Telecommunications Standards Institute (ETSI) is an ICT standard organization. ETSI, recently released a first draft personal- ization on eHealth standard. This draft standard will help to manage the user profiles for personalization of eHealth systems and services according to the user preferences and needs. This profile is an extension of the ‘user profile manage- ment(UPM)’ standard developed by ETSI [ETS05]. 80 Chapter 5. User Profile-based Service Discovery for eHealth

5.5.1 eHealth Service Discovery Framework Adapting an eHealth system to the individual user is essential for making it safe and easy to deploy and to use as an effective support to independent living. Personalization can thus enhance the user’s trust in the eHealth systems, and make them more readily accepted. The case for personalization of health information is supported by studies in health communication which have shown that health-education material can be much more effective if customized for the individual patient in accordance with their medical condition, demographic variables, personality profile, and other relevant factors [DWH09]. According to [DWH09], little work is being done on what we consider the most important factor: tailoring the information to individual needs, experiences, and communication style. One of the most important aspects needed in system building is information about the intended user goals, needs, moods, preferences, intentions, etc. This information can be acquired through an explicit and implicit process called user modeling. Modeling a user means interpreting user actions within a given system or application. The user model is usually restricted to some characteristics that are supposed to be the most meaningful in the context of the user interaction with the system.

5.5.2 Key Benefits Personalization in eHealth has twofold advantages; for the health workers it provides information (such as training, professional guidance and assistance) on the basis of their educational background and job descriptions. On the side of the patient, it provides the necessary patient-oriented health information systems like patient preference, informed consent, self-care and shared patient-doctor decision making. The main aim of personalizing eHealth is to acquire and capture factual information about the patient, their condition, current treatments, their prefer- ences. This information can be obtained from the patient record except the user contextual information. Personalizing eHealth besides informing, enabling decision making and per- suading the patients, it will give users access to medical treatment and consul- tation services on the basis of their needs. The health workers also benefit from this personalization in two ways, first they strictly consult their patients based on their preferences, and second the health worker can fetch any information from the personalized system. Patients can get information about the treat- ment, background information about their conditions (the cause, symptoms, its consequences and so on) and alternative treatment and its effect. In most of the previous personalized eHealth, the interaction between the system and the patient was fixed and simple [CGP07]. Personalized email or text messages have also been used. This type of personalization does not consider individual preferences and interests. For example if a centralized HIV/AIDS prevention and controlling office sends an instant message to HIV/AID patients 5.6. Conclusion 81 to take their medicine on a specified regular time. However this system does not address the individual preference rather it implies “one size fits all” notion. Service personalization in eHealth will help to design a personalized user in- terface based on user’s abilities, interests and needs. This will create an oppor- tunity in addressing heterogeneous preferences of individual users. For instance, for an illiterate mobile user, it is possible to create an audio based user interface that can be accessed by pressing a single key. In our framework, the user can request his preference based on priority. We apply MoSCoW (Must have, Should have, Could have and Won’t have) list based preference selection. For each of the preference requirements we assigned values 1, 0.75, 0.5, 0 respectively. This values helps to calculate the similarity between the requested and advertised services and to rank the candidate services.

5.6 Conclusion

Service discovery is one of the main challenges of SOA. Various researchers sug- gested different service discovery protocols and methods. However, service per- sonalization, to the best of our knowledge, is given little attention. The chapter addresses the profile based service discovery. In addition, we integrate privacy (authentication and authorization) issues in service personalization. Eventually, as a future work the framework will be implemented using voice technology to discovery health service in mobile phones as well as developing a corpus for Amharic language for healthcare domain.

Chapter 6

The impact of user requirement elicitation

Abstract Service designers/developers mainly give emphasis on busi- ness requirements to describe services. The lack of including user re- quirements in service description hampers the system in attaining the desired objectives or satisfying a larger audience. In this chapter we pro- pose user requirements for describing services. Methods and strategies to elicit user requirements based on the principle of requirements engi- neering is compared and assessed how the service designers or providers capture user requirements. Assessment of the case studies of the user re- quirements are described to evaluate the impacts on the process of service description and discovery. We propose a method for service providers to describe and publish services in a flexible manner.

6.1 Introduction

Service-Oriented Computing (SOC) is a computing paradigm that utilizes ser- vices as fundamental elements to support rapid, low-cost development of dis- tributed applications in heterogeneous environments. The promise of service ori- ented computing is cooperating services that are being loosely coupled to flexibly create dynamic business process that can adapt quickly to the changing require- ments. This promise of SOC involves with service oriented architecture (SOA) that enables the description, discovery, composition and utilization of services to support the business process of the organization and user context [Pap07]. Requirement engineering (RE) in service oriented plays a vital role in eliciting and specifying service requirements for service consumers and service providers. So service oriented requirement engineering(SORE) [TJWW07] focuses on elici- tation, identification, specification and analysis of requirements. The focuses of this chapter lies on the process of user requirement elicitation for service oriented applications. Requirements elicitation for services impose different challenges from the 84 Chapter 6. The impact of user requirement elicitation conventional software requirement elicitation process. In conventional software requirements engineering, elicitation takes a “face-to-face” mode. That is, there is a group of targeted customer, from whom the requirements engineers can obtain original requirements information. But during the services requirement process, there is often no fixed target user, the requirements elicitation often takes a “back-to-back” mode, service providers and service requesters conduct double blind search. It is generally accepted that poor user requirements increase the risk of missing the opportunity of meeting user’s needs and enhancing the user’s experience. Therefore, it is very important that before a complex service is created, a thorough elicitation of user requirements is undertaken to best meet the goals for the users [BXWJL07] The success or failure of a system development effort and subsequent system usage depends heavily on the quality of the requirements. The quality of the requirements is greatly influenced by techniques employed during requirements elicitation because elicitation is all about identifying (learning) the needs of users, and communicating those needs to system builders [HD03]. It is generally accepted that poor user requirements increase the risk of missing the opportunity of meeting user’s needs and enhancing the user’s experience. As pointed out by [TJWW07], requirements engineering in service-oriented systems is different from traditional systems in that the target is to identify services and workflows, and model the application using identified service and workflow specifications so that real services and workflows can be discovered either at design time (static SOA) or at runtime (dynamic SOA). The ultimate goal of eliciting user requirement is to help the designer to know what the user wants to achieve from using service, in what environment or context the services will be used, what preferences the user have for interacting with the service, which services the user would and would not want to use in an integrated way [CP94]. The most common elicitation techniques used in re- quirements gathering process are interview, scenario, focus groups, observation, questionnaire and document analysis. Each techniques has its own advantages and disadvantages. Nuseibeh and Easterbrook cited by [TR04] have proposed six classification methods: 1) traditional techniques; 2) group elicitation; 3) prototyping; 4) model-driven techniques; 5) cognitive techniques; 6) contextual techniques. A combination of elicitation techniques/tools can be used to make the elicitation process more competent and effective. Traditional techniques of elicitation might not be suitable for service ori- ented requirement elicitation for the larger audience or stakeholders; because the process is time consuming, costly, and cumbersome to identify the particu- lar stakeholders who are interested in the services. Additionally, the importance of studying service oriented requirements engineering as mentioned by Mej´ıa et al. [MTR+09] is to specify clear, complete, consistent service and to nego- tiate and resolve the conflicting service requirements of the consumer and the provider. Understanding internal and external requesters culture nuances, emotional alignments, behavior etc, helps building rewarding relationships which helps free 6.1. Introduction 85

flow of information and this contributes quite effectively to clarity of require- ments. In line to this Jannach et al., [JK05] said, “when the users requirements are taken into account they are enabled to express their requirements in a natural way and their confidence in the answers of the system increases”. This improves consumer satisfactions and better service selection and service discovery. Using consumer-related information such as customer demands and feedback helps to monitor and select services more effectively. For this study we chose the traditional and group based methodologies to investigate the methodologies used by service designers, developers, requirement engineers/anlaysts) to gather requirements from the service consumers and ser- vice providers. We used survey questionnaires and interviews to collect infor- mation. Although service orientation is not matured in Ethiopia there is some emerging companies involved in service oriented and cloud system developments. This investigation will provide an insight how requirement engineers/or system developers elicit users requirements for larger audiences. By understanding the current techniques used in eliciting service requirement, we may able to provide a generic methodology aimed at designing service for users that can increase satisfaction and raise the acceptance rate of service by the users. Selecting appropriate requirement elicitation methods benefits the RE engi- neer/analyst to understand what service requesters demand from the services before service description and discovery. In addition, user requirement collec- tion/elicitation provides possibilities to deal with informal and incomplete ser- vice descriptions in one hand, and informal and incomplete user request on the other hand. Similarly, such a methodology should allow service providers to unambiguously describe both functional (service, behavior, communication and meaning) and quality (service area, service availability, service cost, reliability, usability etc.) properties of their services at all system layers in terms of what service offers to and what it requires from the service requestor. On the other hand, the method should allow the service requestors to express their needs, e.g. what they require from a service and what they are willing to provide in return [PWS04]. Furthermore, eliciting user requirements before the description process as- sists to find out what kind of services users intend to use and what kind of parameters the service takes as input and returns as output. In addition it will help to define a methodology of service matching. What is the match between a service request and a service specification? Does the match between concepts and restrictions, used to express the service request and the service description, entail the match of the service request and the service description themselves? What is the match between concepts, concept relations and restrictions on those relations? [PWS04]. Matchmaking technique is strongly dependent on user requirements and service description. Service requirements elicitation ensures the service provider to reach the cus- tomers/or consumers (hereafter consumers, customer and users are used inter- changeably) needs adequately. Besides it will exert an impact on service descrip- tion and service discovery. The relationship between users and developers will 86 Chapter 6. The impact of user requirement elicitation be clarified and made explicit, allowing for better communication between these two parties. Communication failures are a key reason for IT services projects failure. Secondly it clarifies the service provider and service consumer relation- ship, with the consequence that the outcomes will be much more aligned with true business strategies and goals [ZJ10]. This chapter emphasizes on user requirements (functional & non-functional requirements and user preferences) elicitation techniques and the impact on the process of service discovery (matchmaking, selection and ranking of services). The user involvement has a significant impact on the acceptance of the system and the quality of the resultant system. Related to this Hengst et al, [HKA04] say getting to know what the potential users needs are the main challenge of service creation. While in scenarios such as where, what else and why needs to be represented strongly in the process models. The main contribution of this chapter is to analyze and proposed a model that can provide a means to cap- ture user requirements (goals) for the service description and service discovery process. The user requirements can be captured using ontology, IR and natural language. This chapter tries to address the following questions; assuming that requirements elicitation (at least a market assessment survey) is conducted oth- erwise we will propose what kind of techniques to employ and also propose a method of stakeholder identification. 1. What kind of elicitation techniques are used to gather user requirements? How feasible the techniques are? Why these technique are selected? What was the drawbacks of the techniques? 2. How do RE engineers/analysts (who are involved in service requirements elicitation) identify the future stakeholders (internal and external) of the system? 3. Was there any constraints while eliciting the requirements? 4. What is the impact of user requirements elicitation in service discovery (service selection and matching)? 5. How do RE engineers/analysts solve conflicting requirements (user require- ments and system requirements)? 6. How do analysts map the user requirements with the service description (if any before requirements gathering is conducted) i.e with the goal of the service provider? 7. Was there any requirements reviews? The chapter is organized as follows. In Section 6.2 related work is presented. The process of user requirement elicitation and analysis is discussed in detail in Section 6.3. In Section 6.4 we present the methodology employed to assess how the service providers, service designers capture the user requirements before they describe services. Discussion of the assessment result is presented in Section 6.5, and finally conclusion and future work is presented in Section 6.6. 6.2. Literature Review 87

6.2 Literature Review

Jannach and Kreutler [JK05] proposed personalized web-based requirements elic- itation techniques. However, web based requirements elicitation techniques has some drawbacks, the dialogue can be done by more than one person and non stakeholder can answer the dialogue; secondly it requires technology expertise to navigate the web page. Fouskas, et al. [FPSV02, MTR+09] pointed out service requirements are clas- sified as follows: technological, business strategic and behavioral requirements. User requirements that relate to functional and non-functional preferences help to ease the process of discovery and selection of services. In the process of service discovery user requirements play a pivotal role in satisfying users interests and preferences. Technological requirements concern requirements to design physical and log- ical architecture requirements the system to be developed. This includes the network infrastructure required to deploy and use the system. The business strategic requirements deal with the business model requirements, who the ac- tors are in the system, and the revenue generate, and the relationships of different parties in the system. The final requirement is the behavior of the user. This is the behavioral requirements of the user including context of the user, preferences and interests of the user [FPSV02]. The user requirements elicitation which re- flects the focus on user needs and perceptions is a vitally important factor for user interaction design for the personalized goal to gain. Lee-Klenz et al., [LKSWH10] used a goal-oriented approach for requirements elicitation for services. The work of Lee and Liu [LHJR07] discuss the user ser- vice requirements elicitation and analysis for the domain. Their research identi- fies ontology, role, goal, process and services as the main pillars of requirements elicitation. However, these information is generated from the domain knowledge (business process) not form the future target users of the services. One method of achieving user or customer satisfaction in service discov- ery and selection is to meet his/her requirements and preferences. [ZNP+09] apply American Customer Satisfaction Index (ACSI) to select and monitor ser- vices based on customer demand and feedback. Service consumers form service queries from requirements specifications to retrieve web services compliant with the requirements [ZNP+09]. In [ZMZJ06], the requirements elicited are the re- quirements which is not described during service description. The question here is, is it enough to publish a service with business requirements or system re- quirements only? In our view, this type of system development is in contrary with the software or system development principles. Zimmermann, O. et al(2004)., [ZKG04] high level business requirements or use cases are developed by business analysts or consultants which results in a vaguely articulated requirements. However, formal service description have to be defined eventually, as well as one or more realizations for each of them running in some IT infrastructure such as an application server or transaction monitor. The user request or query should not be expected to contain the users func- tional and non-functional requirements of the user. The user educational back- 88 Chapter 6. The impact of user requirement elicitation ground, experience, access opportunity and the like may hamper users query creation which may not include the functional and non-functional properties of the services. In line to this, Da and Li (2009) explained if the client failed to include non functional requirements when they submit their requests, the sys- tem will prompt the services which satisfied only the functional properties. This implies that the system is dependent on users request only which can impede the service discovery process(that means service selection and service matching will be rare and impossible). In the majority of the previous works, user requirements are extracted from the request or submitted query. This helps to extract the goal of the requesters whereas if the requester provides incomplete, inconsistent and ambiguous query it is difficult to extract the user goal and expand their queries to provide the service they are seeking. Therefore to fill such kind of gap, we believe gathering user requirements before service description will facilitate the process of match- ing and service selection. In addition, users can have an opportunity to know what kind of services they are looking for. Furthermore, gathering user require- ments will assist the service provider to answer some of the questions such as, who is the stakeholder; what do the user requires from the service, what is the best channel to deliver services to users, and so on. The interaction of service providers and consumers may minimize the difficulty of service discovery as they use similar goal description and determine the requirement priority. After eliciting and analyzing user requirements, the service provider will be in a position to address some of the challenges: the type of services needed to satisfy the requirements; clustering requirements to specify the candidate services of these different types; analyzing omissions and inconsistencies; and relating services into contexts and user preferences. Consequently, Zachos et al., [ZMZJ07] eliciting user requirements help to determine which requirements should be implemented as services or not; update and modify the service specification (if there is any before); and relate similar services (cluster services). The requirements gathered from the user might not be complete, mostly it is difficult for users to tell what they need in the future, and in the meantime stakeholders can rarely express complete requirements at the correct levels of abstraction and granularity to match to the descriptions of available services. Requirement analysts form queries from a requirement specification to dis- cover services that are related to the requirements in some form. Descriptions of these discovered services are retrieved and explained to stakeholders, then used to refine and complete the requirement specifications to enable more accurate service discovery, and so on [ZMZJ07]. Another pertinent advantage of eliciting requirement is to select the types of channels to be employed for accessing the published services: web, mobile phones, PDAs or other facilities such as kiosks machines, tv, radio and the like. Hence, most of the previous studies do not address how, what, when do the service providers (service developers) elicit user requirements ahead of service description. Generally, as pointed out in most of the above studies, several 6.3. User Requirements Elicitation and Analysis 89 service providers or developers obtain user requirements from the user requests (query). This query extraction based on the domain business goal encounters a tradeoff because there are (customers) users who could not express their re- quirement properly therefore the process of service discovery will be hampered by poor user request or inadequate service query. In conventional software en- gineering, requirement engineers/analysts present requirements using use cases. Use cases tell a story how the user use a system to perform certain tasks. This shows that requirement engineers give emphasis to domain requirements than user requirements while eliciting requirements.

6.3 User Requirements Elicitation and Analysis

6.3.1 Requirement Elicitation What is requirement elicitation? Requirement elicitation is defined as :Elici- tation is all about determining the stakeholder needs. Requirements elicitation involves ’capturing’ the requirements of different stakeholders, such as users, and developers. Users play a central role in the elicitation process. User requirements define what should be developed. The requirements of the other stakeholders mainly define the constraints to what has to be developed. Requirement elic- itation is the means by which analysts determine the problems and needs of customers, so that system development personnel can construct a system that actually resolves those problems and addresses customers needs. Elicitation is an iterative process. At any moment, conditions cause the analyst to perform a step using a specific elicitation technique. The use of that technique changes the conditions, and thus at the very next moment, the analyst may want to do something else using a different elicitation technique. The result of elicitation is a list of candidate requirement [HD03]. Requirement elicitation is a process of learning and understanding the prob- lems, opportunities, and desires of customers. It is a part of the requirement en- gineering process, whose goal is to understand customers’ requirements for, and document the external behavior of, a new or revised system. It is mostly consid- ered as an early activity in the RE process, it is actually conducted throughout the RE phase in conjunction with other requirements activities. In requirement elicitation process the service provider (requirement engineer, system analyst, service developer etc we call it after here service provider) main task is understanding the customers, their needs, their desires, their approach to the work. One of the core components of requirement elicitation process is identifying and selecting the stakeholders to be involved in the requirement gathering pro- cess. This pave the way towards successful users goal identification or leads to a poor service requirement generation. Therefore when participants are selected for requirement elicitation process it need to consider the users need to be knowl- edgeable about the future information system to be developed. For techniques how to identify stakeholders see section 3.1.3. 90 Chapter 6. The impact of user requirement elicitation

In most cases, services are owned and governed by the providers. Therefore the providers while designing a service they give more emphasis on organizational business goals such as: making their system agile (able to adapt quickly to a new opportunity and potential competitive threats), hitting first the market opportunities, reducing operative costs, and as much as possible integrating with other legacy systems. On the other hand, service providers incorporate service goals and behavior, qualities and commercial information in the service description. To sum up, in current service oriented design, we reckoned service require- ment is treated thoroughly than that of user service requirements. This impedes the process of service discovery as the service provider and service consumer may lack common specification of services. In line to this, [SHWS05] recalled in ideal world the potential service user would express their requirements in appropriate form to discovery services, however, this is unrealistic in the real world. Conse- quently, it is important to have a common language that can be used to provide total specification and and appropriate expression of requirements. Thus, elic- iting user service requirements is very vital to deliver the appropriates service based on requesters needs, preferences, and context.

Ontology Driven User’s Service Requirements Elicitation

User requirements reflect the focus on user’s needs and perceptions, user require- ments should be adequately captured to increase the success for personalized service in the limited size and computing capacity for infrastructured based or infrasturctureless environments. Traditionally, user requirements can be either explicit or implicit, we pro- posed a requirements ontology driven user requirements elicitation [BXWJL07] in order to guide the user to create the personalized services with explicit require- ments of which users can analyze the requirements with the support of domain knowledge based on their individualities (personal preference) and context. Ontology driven requirements avoid requirement ambiguity, inconsistency and incompleteness, which are exhibited in use cases. Service description which is obviously influenced by user requirements, when the user requirements changes and reifies the actual service behavior are customized in the meta level service description. Context awareness computing can deal with the ability of services to utilize information about the user’s environment information in order to dynamically select and execute relevant services that better appropriate to the user needs, which can potentially be used to reduce the amount of explicit input is required to give to achieve a special goals [BXWJL07, LL09]. Figure 6.1 shows the re- quirement elicitation process. 6.3. User Requirements Elicitation and Analysis 91

Figure 6.1: Requirement elicitation process

Stakeholder Identification & Analysis Identifying stakeholders- individuals or organizations who stand to gain or lose from the success or failure of a system–is also critical. Stakeholders include customers or clients (who pay for the systems), developers (who design, construct and maintain the system), and users (who interact with the system to get their work done). For interactive systems, users play a central role in the elicitation process, as usability can only be defined in terms of the target user population. Users themselves are not homogeneous [HKA04], and part of the elicitation process is to identify the needs of different user classes, such as novice users, expert users, occasional users, disabled users, and so on. Stakeholder analysis identifies all the users and stakeholders who may influ- ence or be impacted by the system. This helps to ensure that the needs of all those involved are taken into account. If required, the system is tested by them. The analysis includes internal and external stakeholders. Stakeholder analysis identifies, for each user and stakeholder group, their main roles, responsibilities and task in relation to the system. One of the main issues is how to trade-off the competing needs of different stakeholder groups in the new system. Stakeholder identification should be done before the requirement elicitation process. We believe the main stakeholders are identified and analyzed so identi- fication and analysis of stakeholder is out of the scope of this study. Our interest is to know how the service provider identifies the prospect stakeholders for the requirement gathering process. According to these studies, some of the most important and general rea- sons of failure in SOA projects are: weak definitions of requirements and scope, ambiguous business needs and unclear vision, lack of user involvement and in- puts from the onset, poor internal communication and incomplete specifica- tions when project started [Kav08, WLEL11]. Hadizadeh [Had12] analyzed ap- proaches which have proposed a method for service identification considering stakeholder involvement from 2005 to 2012. Sofar few studies consider stakeholders [Rit12, KKB07] involvement on SOA 92 Chapter 6. The impact of user requirement elicitation projects in order to identify services. Klose et al [KKB07] explicitly involved stakeholders in the process of selecting the candidate business processes, how- ever, stakeholders involved when all business process are already modeled and basic decisions have already been made, stakeholders don’t take action in de- cision making or design. According to the research works that [WLEL11] and [Kav08] have done to identify failure factors in IT projects/SOA deployment some of the important and general reasons of failure in projects are: weak defi- nitions of requirements and scope, ambiguous business needs and unclear vision, lack of user involvement and inputs from the onset, poor internal communication and incomplete specifications when project started [Had12]. Considering these factors, an approach that could involve the stakeholders effectively from the early beginning, identifying business needs and specification, to achieve richer business model would be beneficial and contributive. By active involvement of important stakeholders in requirement elicitation are let to design the system their own way and describe how the system could look like from their perspective. Active stakeholder involvement with high sense of commitment can meet the criteria of efficient service identification regarding to stakeholder interaction and customer satisfaction. And therefore the effective service identification from business view can be beneficial to reach the SOA business promise. At the same time, stakeholders involvement and participation is affected by a number of variables that must be carefully balanced in order to ensure success of the involvement [Had12]. Users are not homogenous groups; different user classes usually can be identi- fied. The selection of the participants for the requirement elicitation process is an important topic. The participants should be selected using purposive sampling. Participants need to be comfortable in talking to each other and should share a similar background to encourage a common understanding of more detailed insights. Preferably, requirements elicitation groups consist of participants who are not too familiar with each other: the more diverse the views that are repre- sented, the more reliable or robust the results become. Some familiarity between participants may help to ’break the ice’, but overfamiliarity may adversely affect the synergy of the group [HKA04].They can tell what they want now, and the requirements elicitation techniques should guide the users from what they want now into future usage scenario’s.

Requirement Elicitation Methods/Tools The most common elicitation techniques used in requirements elicitation are in- terview, scenario, focus groups, observation, questionnaire and document analy- sis. Each techniques has its own advantages and disadvantages. A combination of elicitation techniques/tools can be utilized to make the elicitation process more competent and effective. In this study we used interview and observation methods to gather requirements from the service providers (includes service de- velopers, requirement engineers or application developers who are involved in requirement elicitation process) to answer the questions presented in the inter- view and to check how the end users reaction on the services they are offered. 6.3. User Requirements Elicitation and Analysis 93

For eliciting user requirements different techniques can be employed: ques- tionnaire, interview, observation, scenario, focus group, ethnography [HKA04]. According to Kotonya and Sommerville [KS98], each techniques has its own pros and cons, and there is no one best technique. The combination of several tech- niques can be fruitful: combining ethnography with prototyping or combining cognitive with prototyping for example help to the users to think aloud while actually meeting the new system. Especially, how do service providers capture user requirements to describe their service descriptions? Is the user require- ments elicited or is it only the business requirements are considered to describe the service (functional and non functional properties of the service)? Which of the techniques is appropriate for user service requirements elicitation: individual or group based? The combination of techniques to be used and steps to be taken to elicit re- quirements depends greatly on the situation at hand. The stakeholders involved are an important indicator for this. Requirement elicitation involves capturing the requirements of different stakeholders, such as customers, users and devel- opers [HKA04]. Both researchers and practitioners seem to recognize that poor requirements elicitation, and by extension, poor use of requirements elicitation techniques or selection of inappropriate techniques, is almost guaranteed to result in a poor product [HD02] Group elicitation techniques contain wide range of techniques, the purpose of all of which is to elicit requirements form group of end users. Group techniques aim to foster stakeholder agreement and buy-in, while exploiting team dynamics to elicit a richer understanding of the needs. Group elicitation techniques in- clude brainstorming, participatory approach (PA), joint application development (JAD) and group support system (GSS). These methods generate requirements from the end-users experience and from their actual demands. Group elicitation techniques are two way communication channels as there is relatively free atmo- sphere for the participants to put what they feel and what they aspire in the future. Alike other techniques, group elicitation techniques have disadvantages; the group facilitators need to be skillful on leading the group discussions and prepare an appropriate goal to achieve. The second tradeoff of the group sys- tem is individual dynamism is inevitable so the some individuals may dominate and may attract others to join their agendas. Third it is time consuming and tiresome for the participants therefore, at the last of the elicitation session they may not be as active as at the starting stage. Generally, group techniques are appropriate to elicit the user requirements for service orientation as the user communities will be involved. Besides the traditional elicitation techniques wiki and web based requirement elicitation is introduced. Wiki helps easily to gather requirements however, the disadvantage of wiki is to manage the elicitation process as well as it can be applied only for those who have internet access; in our view wiki can not be used for non-literate people and for rural people. 94 Chapter 6. The impact of user requirement elicitation

Elicitation Conflict Approach-approach / win- win: In this type of conflict resolution if both stakeholders has positive goal conflict towards the requirement elicitation pro- cess. If one goal is selected by the requester and service provider the situation is win-win so it has a positive impact on service matching and service selection. Approach-avoidance / win-loss: This approach explains either the ser- vice requester or service provider has a positive goal and the other disagree on the requirements elicited. At this time either the service requester or service provider need to accept the elicited requirements to be included in the service description. Otherwise, there will be goal conflicts Avoidance-avoidance/ Loss-loss: This is a mechanism of avoiding the requirements elicited not to be included in the service description.

Elicitation techniques selection Analyst select a particular elicitation techniques for any combination of four reasons: (1) It is the only technique the analyst knows, (2) It is the analyst fa- vorites for all situations, (3) The analyst is following some explicit methodology, and that methodology prescribes a particular technique at the current time, and (4)The analysts understands intuitively that the technique is effective in the cur- rent circumstances [HD02]. According to Hickey and Davis [HD02] requirement elicitation technique selection is driven by problem, solution and project domain characteristics. Selecting requirement elicitation techniques must take into account the user context and environment to meet the real need of the users. The techniques should be selected carefully to explore and address cultural, social and other key difference between user characteristics and their own. Requirement engineers need to see what marginalized rural area group see and understand their condi- tions and needs through their words and actions if we are to develop ICT that meets their true needs. This helps the requirement engineer to identify what kinds of techniques are appropriate to elicit the requirements in respect of the users context and characteristics, and social and cultural values. The approach used must enable the requirement engineers to hear and understand some of their experiences and also will provide insights into real needs, concerns and problems of the target users. When we elicit requirements for wide audience end users, we must involve different type of users such as marginalized rural users, and users from rich context and environment specially in developed countries (we need to consider the under-served people too). We may include techniques not common in traditional RE: such as story- telling, ethnography (reading user diaries, to record their joy, interest and hard- ships), and group discussions, meeting and etc. It is vital to consider user socioeconomic, cultural, infrastructure develop- ment of the user and the country while selecting appropriate requirements elic- itation techniques. So far the techniques used in eliciting requirement do not differentiate the users in particular the techniques are adopted with western 6.3. User Requirements Elicitation and Analysis 95 users i.e. for developed countries. However, when considering users of devel- oping countries (marginalized rural people) the techniques should be adopted based on their interest.

6.3.2 Requirement Analysis and Negotiation During the analysis phase, we involved the customer and reinforced their require- ments in our framework via prototype demos that gave the customer a tangible feeling regarding the end product. We derived a lot of useful information from the demo reviews, especially reviewing the alignment with the organizational goal. The customer also got to know our perspective of his/her requirements and made some major changes to the requirements to suit our architecture. During analysis not only the positive scenarios satisfy the needs/interests of the user but also the negative scenarios (where and how the system/service fail and the boundary conditions) should be taken into account. To know the neg- ative scenarios beforehand helps to identify possible failure modes, to evaluate the influence on the system behavior and propose countermeasures to suppress effects. During the requirement analysis phase, requirements can be derived from the customers using different mechanisms, especially in prototype demonstra- tion and workshops reviews. The elicited user requirements need to align with the organizational goal. This may require the designer to adjust the user re- quirements to suit the organizational goal, mission and vision. Requirements analysis is not a simple process. Particular problems faced by the analyst are: addressing complex organizational situations with many stakeholders, users and designers thinking along traditional lines, reflecting the current system and processes, rather than being innovative, users not knowing in advance what they want from the future system, rapid development cycles, re- ducing the time available for user needs analysis, representing user requirements in an appropriate form. Figure 6.2 shows the service analysis phases.

Figure 6.2: Requirement Analysis phases Once a set of requirements has been drafted, these must be analyzed to remove overlap and conflict. Requirements must also grouped and organized to appropriately to facilitate appropriate change control the following iterative cycles of system development (e.g the process by which new requirements are added and defunct ones removed). Each requirements must be identifiable and is typically assigned a unique identifier or sequential number within a document hierarchy. Requirements can be structured hierarchically in a parent-child re- lationships. When requirements have been identified and clearly numbered, a 96 Chapter 6. The impact of user requirement elicitation requirements dependency matrix or interaction matrix can be constructed.

6.4 Methodology

We used different methodologies to capture the information from the service providers such as: ethnography (contextual), interviews, survey questionnaire and document analysis. The ethnography technique will help us to see how this service providers captures user requirements in pre-service description phase. A purposive sampling technique was employed. We choose two Netherlands and two Ethiopia based companies to conduct the interview, administered survey questionnaire (online) and document analysis. The interview and the document analysis mainly carried out in the Netherlands. Nine requirement engineers/system developers and two experts participated in the survey and interview respectively. The results of the study are presented in result and discussion section. Document analysis (wiki pages ) is carried out in CORDYS. Mainly the wiki pages monitored and analyzed for one week to track how the stakeholders and developers cooperate in eliciting requirements.

6.5 Result & Discussion

The result of the study is presented in the following table. As it can be seen in the table the survey questions have three themes: service identification, stakeholder identification and analysis, and requirement elicitation tools and techniques used and validating elicited requirements.

6.5.1 Service Identification Service identification is the first process and one of the important activities of SOA. The process of service identification requires a decision making in regard to a project area, business requirements, identifying the most important tasks and their interrelationships. Business process modeling is an earlier phase of service identification [Had12]. The result of this study shows that service is identified using document analysis (72%) especially by thoroughly studying the organi- zation work flow (business process documents). Others develop a pilot (10%) project to attract customers and based on the feedback from the customers the services are identified and modified. Others also uses the traditional requirement elicitation techniques to identify services. According to Klose [KKB07] existing business process documentation is critical for identification of services, however, the business process should correspond to service modeling conventions. Klose et al. proposed a three phase service identification scheme: preparation phase, service analysis phase and service categorization phase. For each phase they identified tasks and the necessary documents. However, the results of this study indicate that service identification is performed by analyzing the business process of the domain [KKB07]. 6.5. Result & Discussion 97

6.5.2 Stakeholder Selection and Participation According to Robertson [RR06] requirements elicitation is a creative process in which all stakeholders collaborate in the creation of the needs that describe a new system. The stakeholders involved in the requirements elicitation process must understand a domain, and the problems that the different stakeholders want to solve using a software system. Stakeholder analysis identifies all the users and stakeholders who may influ- ence or be impacted by the system. This ensures that the needs of all those involved are taken into account. If required, the system is tested by them. The analysis includes internal and external stakeholders. Stakeholder analysis iden- tifies, for each user and stakeholder group, their main roles, responsibilities and task in relation to the system. One of the main issues is how to trade-off the competing needs of different stakeholder groups in the new system. Stakeholder identification should be done before the requirement elicitation process. We believe that the main stakeholders are identified and analyzed so identification and analysis of stakeholder is out of the scope of this study. Our interest is to know how the service provider identifies the prospect stakeholders for the requirement gathering process. Some studies revealed that the most common reasons for the failure of SOA projects are: weak definitions of requirements and scope, ambiguous business needs and unclear vision, lack of user involvement and inputs from the on- set, poor internal communication and incomplete specifications when project started [Kav08, WLEL11]. Hadizadeh [Had12] analyzed approaches which have proposed a method for service identification considering stakeholder involvement from 2005 to 2012. Sofar few studies consider stakeholders [Rit12, KKB07] involvement on SOA projects in order to identify services. Klose et al. [KKB07] explicitly involved stakeholders in the process of selecting business processes, however, stakeholders do not involve in modeling and designing of business process and they do not take part in decision making processes. [WLEL11] and [Kav08] have identified some of the common failure factors of IT/SOA projects are: weak definitions of requirements and scope, ambiguous business needs and unclear vision, lack of user involvement and inputs from the onset, poor internal communication and incomplete specifications when project started [Had12]. Considering these factors, an approach that could involve the stakeholders effectively from the early beginning, identifying business needs and specification, to achieve richer business model would be beneficial and contribu- tive. By active involvement of important stakeholders in requirement elicitation are let to design the system their own way and describe how the system could look like from their perspective. Active stakeholder involvement with high sense of commitment can meet the criteria of efficient service identification regarding to stakeholder interaction and customer satisfaction. And therefore the effective service identification from business view can be beneficial to reach the SOA business promise. At the same time, stakeholders involvement and participation 98 Chapter 6. The impact of user requirement elicitation is affected by a number of variables that must be carefully balanced in order to ensure success of the involvement [Had12]. The survey findings indicate that requirement engineers/software developers use document analysis and workflow to select the potential stakeholders of the system to develop. Some respondents confirmed that although the involvement of the stakeholder is essential it is not a such important if the developers or requirement engineers know the domain area. However, one of the main factors that the SOA systems failure is due to the excluding of stakeholders in the process of requirement elicitation and business process elicitation. Eliciting requirements involves an approach that must allow negotiation and collaboration of stakeholders that can provide strong foundations for the require- ments to emerge interactive and participatory. Here we see some gaps between developing and developed countries requirement engineers. Requirement engineers in the developed countries use wiki pages to elicit requirements, so every stakeholder can present their requirements in the wiki and thorough discussion will be taken place throughout the project life cycle. wiki allows stakeholders to collaborate to by creating, brainstorming, structuring and reorganizing requirements contained in notes. The requirement negotiation and prioritization can be done through the wiki pages. This method might not be practical for illiterate users and for resource limited environments (infras- tructures: internet, computers etc)so another elicitation techniques should be in place in order to gather users needs. Studies revealed that people (stakehold- ers) are one of the main reasons of SOA projects failure from business perspec- tive [Kav08, Erl09, WLEL11]. According to these studies, some of the most important and general reasons of failure in SOA projects are: weak definition of requirements and scope, ambiguous business needs and unclear vision, lack of user involvement and inputs from the onset, poor internal communication and incomplete specifications when projects started. Kavis [Kav08] and W¨urtemberg [WLEL11] affirmed that stakeholders in- volvement from the early beginning, when identifying business needs and spec- ifications, would be beneficial in order to achieve richer business model and prevent misunderstand and dissatisfaction, and meet SOA benefits.

6.5.3 Requirement Elicitation Techiques/tools Many elicitation techniques/tools have been proposed up to now. Each of them may be more suitable for one particular situation than another and therefore, part of the requirements engineering challenge is to choose the right one for each moment. For example Cysneiros [Cys02] explained during these years working in the health care domain it was possible to observe that many techniques cannot be applied exactly the way it was originally described. Rather, some changes must be done to these techniques so one can use them efficiently. The result of the survey shows that the respondents use both traditional, group and collaborative techniques (wiki pages) are the potential elicitation tools used to identify user requirements. The tools selected for elicitation process depends on the type of project and the number of participating stakeholders. 6.5. Result & Discussion 99

“Is there any special reason for selecting the specified tools or techniques? ” There are a mixed notions for answering this questions: some say selecting a specified technique or tools depends on the project type, number and type of stakeholders. If the project involves a wide variety of stakeholders, questionnaire is the best where as interview might be appropriate. From the survey we found that group elicitation techniques are not used at all however, foreign based requirement engineers or developers use mainly group elicitation techniques: focus group techniques, brainstorming and collaborative methods such as wiki pages. From this study we learnt that traditional elicita- tion techniques: document analysis and questionnaire took the major share. A combination of tools are used to elicit user requirements although it depends on the project type, product feature, and stakeholders types. In Ethiopia, question- naire, interview and document analysis are the common tools used in a project, but in Netherlands, the combination of traditional (interview, observation) and group techniques(focus group discussion and collaborative methods) are used to elicit user requirements.

6.5.4 Requirement Review At some stage in the requirement process, you will want to release requirement specification or candidate requirements. It does not have to be complete at this stage, it could be a practical version for the next iteration. The main advantage of review the requirement specification is to determine whether any requirement are missing, to prioritize the requirements based on importance and urgency, and to check for requirement conflicts. Requirement review can be carried out at any time , ideally, it should be an ongoing activity [RR06]. The involve- ment of stakeholders is very crucial for reviewing the requirement specification. The result of the survey reported that requirement is reviewed and validate it- eratively through out the project cycle, but to commence the project fully the developers and the stakeholders there should be a common understanding be- tween the developers and stakeholders in the elicited requirements. All most all respondents indicate that they review the requirements continuously till both the developers and stakeholders reach on agreement. Reviewing process is done by providing a prototype ( paper or system), requirement specification documents, group discussion or collaborative methods (blog or wiki). Mat´eand Silva said “requirements for software systems are constructed and negotiated in a complex, iterative, and co-operative requirements definition process [MS05b]”. The main benefits of using collaborative methods is to involve stakeholders often work in globally distributed environments and over organizational boundaries; thus the requirements elicitation process can be perceived as highly collaborative and interactive. For example, CORDYS1 (a corporate company) one of the participating cor- porate company mainly uses wiki, blog and CORDYS community to elicit and review requirements. This helps to track all the activities going on in the com-

1www.cordys.com 100 Chapter 6. The impact of user requirement elicitation pany internally and externally. To sum up, requirement review is a crucial RE process helps to determine missing requirements, prioritizing requirements, identify conflicting requirements and also to check the financial and time con- ditions/constraints. Hence, having successful requirements review leads to final kick of the project.

6.6 Conclusion and Future work

The lack of stakeholder involvement in the early stage of service oriented design is one of the failure factors. So incorporating users requirements in the early stage of service identification or description helps to inculcate the needs of the users i.e. service customers and service providers. The findings of the study revealed that requirement engineers and/or system developers employe differ- ent techniques to elicit user requirements even though, the magnitude differs from company to company and individual to individual. Besides, the survey depicts that there is no standard user requirement elicitation techniques. Also it is mentioned by different researches, the conventional software engineering re- quirements elicitation techniques can not be used in service oriented systems, as a result these techniques need to be customized considering SOA principles such as loose coupling. Generally, user requirements affect positively and negatively the process of service description and service discovery. As it is mentioned in section 6.5.2, one of the main factor of SOA project failure is poor stakeholder involvement in the process of service identification. As a future work, we will implement this study and develop a collaborative frame work that can be used students and software companies to elicit user requirements for service oriented systems. Chapter 7

Designing Spoken Dialogue Systems for Doctor-Patient Conversation

Abstract The chapter describes the use of doctor-patient interaction in order to design a spoken dialogue system. In this chapter we analyze doctor and patient information seeking and information provision be- havior. In our experiments we found a difference in information seeking and information provisioning behavior of doctors and patients, although statistically not significant. We identify some important roles that can be used as a springboard to design a spoken dialogue system. Finally, we conclude that analyzing face-to-face doctor-patient interaction can serve as an effective starting point to design spoken medical dialogues.

7.1 Introduction

Speech is one of the most effective means of communication for humans. It plays a great role especially in man-machine interactions. Speech is natural and the vast majority of humans are already fluent in using it for interpersonal communication. In the last two decades there have been a lot of advances in the application of spoken dialogue systems in different areas: academia, military, and telecom companies. A dialogue system is one of the promising applications of speech recognition and natural language processing. Spoken language interaction with computers has become a practical possibility both in scientific as well as in commercial terms. Spoken dialogue systems can be viewed as an advanced application of spoken language technology. Spoken dialogue systems provide an interface between the user and a computer based application that permits spoken interaction with the application relatively in a natural manner [McT02]. Fraser 1997, cited by [McT02], defines spoken dialogue system as ”computer systems with which humans interact on turn-by-turn basis and in which spoken natural language Chapter 7. Designing Spoken Dialogue Systems for Doctor-Patient 102 Conversation plays an important role in the communication”. Spoken dialogue systems en- able semi-literate and illiterate users to interact with a complex application in a natural way using speech. Current spoken dialogue or/and IVR (Interactive Voice Response) systems restrict users in what way they can say and how they can say it. However, users of speech-based dialogue systems often do not know exactly what information they require or how to obtain it- they require the sup- port of the dialogue system to determine their precise requirement (a system directed dialogue). For this reason, it is essential that the spoken dialogue sys- tem is be able to engage users in the dialogue rather than simply respond to predetermined spoken commands.

7.1.1 Motivation The acute health problems of developing countries are the pushing factor that motivates researchers towards using ICT to minimize this burden. The pumping of ICT in healthcare has been providing extraordinary achievements in informa- tion gathering and storage, and created an environment to access quality care and disease prevention. The propelling factor of this study is the adoption and application of speech technology and its impact on the healthcare sector in developing countries where a significant number of the population is illiterate or semi-literate. In this chapter we analyze the doctor-patient conversation in order to find out if we can emulate the methods and techniques used in the conversation to design medical spoken dialogue system that can be accessed easily by non-educated or semi-educated population with the objective of searching health information remotely. Nowadays, mobile becomes an appropriate medium to minimize the burden of healthcare in developing countries. Several researchers, for example [BKS+09, BG06, Fos11], are engaged in mobile based applications such as mHealth, mLearn- ing, mBanking, mAgriculture etc. The expansion of the mobile network and the increment of mobile phone users in Ethiopia provide a fertile ground to adopt and implement mobile based healthcare applications. Designing a medical dialogue alike doctor-patient interaction is very cumbersome, the advancement of speech recognition requires another level to fully understand human speech. It requires at least to design and develop a medical dialogue system resembling human-like conversation to reduce the error of speech recognition. Our main motivation is to understand whether face-to-face doctor-patient interaction plays a vital role in designing human-like medical spoken dialogue system for the healthcare domain in the case of Ethiopia using Amharic language. To the best of our knowledge this is the first study that not only analyzes the doctor-patient conversation but also designs and models a medical dialogue system in the case of Ethiopia. In this chapter we address the following question: Is it possible to design a spoken medical dialogue system based on doctor-patient face-to-face conversa- tion in the diagnosis process? The chapter is structured as follows. The state of the art of medical dialogue systems is discussed in Section 7.2. The analysis of the experiment is presented in Section 7.3. Section 7.4 explains the proposed spoken dialogue system. Finally, Section 7.5 concludes the chapter and gives 7.2. Spoken dialogue systems in healthcare 103 future directions.

7.2 Spoken dialogue systems in healthcare

The healthcare domain has gleaned the benefits of the advancements of Informa- tion Communication Technology. During the last two decades, these interfaces have been adopted as part of tele-medicine technologies [BGGP06, BG06], which enable the delivery of a variety of medical services to locations that are at a long distance from providers. The ultimate goal of a dialogue system is to provide health information for stakeholders primarily using spoken dialogue. Such a system can be used for a wide range of applications including: patients self-treatment and manage- ment, disease remote monitoring, diagnosis, health education etc. In line to this Bickmore and Giorgino ([BGGP06]) say that automated dialogue systems are increasingly being used in healthcare to provide information, advice, coun- seling, disease monitoring, clinical problem identification, as well as enhancing patient-provider communication. However, a dialogue system in the healthcare domain is not without chal- lenges. Clinical practice ordains complicated guidelines, ontologies and proce- dures. This makes the dialogue system more complex and cumbersome to handle. Bickmore and Giorgino also mention some of the challenges of spoken medical dialogue system: criticality (emergency cases), confidentiality (privacy such as HIV/AIDS regimen etc.) and mixed initiatives (patient-centered vs. system- centered). They point out that incorporating medical and behavioral ontologies and deep knowledge of health communication strategies are very important for further development of medical dialogue systems. Bickmore and Giorgino argue that face-to-face communication together with written instructions remains one of the best methods for communicating health information to patients with low literacy level. They report that face-to-face con- sultation is effective because providers can use verbal and nonverbal behavior, such as head nods, hand gesture, eye gaze cues and facial displays to commu- nicate factual information to patients, as well as to communicate empathy and immediacy to elicit patient trust. According to Durling and Lumsden ([DL08]) a spoken dialogue takes half the time needed to achieve the same task using key- board and mouse, regardless of the participant’s ability to correct their input. By highlighting the business side of speech recognition in healthcare, Parente et al., cited by Durling and Lumsden, show that, in their opinion, the adoption of speech technology is worthwhile. The use of speech recognition has, in fact, seen the most successful adoption in the healthcare domain.

7.2.1 Diagnosis Systems Diagnosis, according to Webster’s dictionary,is the act or process of deciding the nature of disease or a problem by examining symptoms. In the medical do- main, many diagnosis systems are proposed and used such as decision support Chapter 7. Designing Spoken Dialogue Systems for Doctor-Patient 104 Conversation systems, agent based systems, and intelligent systems (fuzzy logic, expert sys- tem, neural networks and the like). Mobile diagnostic technology is a relatively new concept in tele-medicine. As suggested by the term itself, it involves two key characteristics: mobility and remote diagnosis [CSR+09a]. The aim of us- ing mobile technologies for healthcare is to support the patients outside of the medical and/or home environment. The rapid spread of mobile phone technolo- gies in the world add values to healthcare as consultation and treatment can be provided virtually in any location where access to a mobile communication sys- tem is available. Hence mobile based diagnostic tools could have a large impact on remote diagnosis and treatment in particular for resources poor rural areas. Celi et al. [CSR+09b] develop a mobile based diagnostic tool works on limited bandwidth and with limited resources for developing countries. To date there are some medical diagnosis applications held using web and handheld devices. Some of the common applications are transmitting medical images through a mobile phone, WISER(Wireless Information System for Emer- gency Responders) is a system designed to assist first responders in hazardous material incidents, and MedWeaver is a web based facilitator which integrates different diagnosis tools that provide personalized services for health profession- als [MMM08]. MCST (Mobile Care, Support & Treatment Manager, India) helps HIV/AIDS patients to access their lab test results. Black et al. [BKS+09] develop a mobile based respiratory and pulse rate calculator, and gestational dates calculator which calculates the age of the fetus and estimated date of de- livery. In addition the system calculates the dose of regimens based on the name of a drug and its indication and presentation. Maria Sacco [MS05a] claims that most diagnosis systems are system-centric rather than user-centric. It is the system itself that is in charge of diagnosis, and the user is basically used to supply information to the system. The exclusion of the user in the diagnosis process is one of the reason for the frequent failure of the application. Considering the aforementioned problem, Maria Sacco [MS05a] proposes a user centric architecture in which the main task of the diagnosis system is to guide the user in exploring and systematically reduce the number of candidate pathologies.

7.2.2 Doctor-Patient Face-to-Face Interaction Face-to-face interactions between people are governed by complex sets of rules, usually beyond explicit awareness of the participants. Some of the rules address the informal communication, which has to do with such things as body posi- tion, eye gazing, social and emotional state. Informal communication mostly is not taken into account or given less attention by computer scientists, although they form the base of natural and intuitive human-computer interaction design [Bic04]. The main goal of a doctor-patient conversation is a focused gathering with a common goal pursued by its participants. Typically, a patient visits a doctor with the purpose to be relieved from feeling unwell possibly caused by an illness; the doctor’s purpose of the interaction with the patient also is to relieve the patient. When both parties appear to fail to comprehend or understand 7.3. Finding Cultural Dependencies 105 each other’s goal, the interaction may be dysfunctional. Studying and analyzing the doctor-patient interaction helps to convey empathy and obtain a trusted spoken dialogue system, especially when used by the semi-literate and illiterate rural people. The analysis should help to design a full-fledged medical dialogue system. Several researches have been conducted in the last three decades analyzing doctor-patient communication to make it as interactive and patient centered as possible, although it is hard to achieve a perfect and accurate face-to-face doctor- patient interaction. As we pointed out in the previous sections, the main idea here is not to analyze the effectiveness and efficiency of the face-to-face doctor- patient interaction but rather the implications towards designing and modeling ’human-like’ medical dialogue system. A good interaction and a quality relationship between doctors and their pa- tients is now widely recognized as a key factor in improving not only patient satisfaction but also treatment outcomes across a wide range of healthcare disci- plines. The use of specific doctor communication skills has been associated with improved adherence regimens, improved psychological outcomes, more detailed medical histories and fewer malpractice suits, in addition to increase patient satisfaction [BGP05]. Doctor’s listening behavior is a necessary ingredient for an interaction in which patients are describing and expressing themselves freely and openly [Nev06]. To test the doctor’s listening behavior, the relative frequency of each cate- gory of information seeking and information giving behavior is calculated for the doctor-patient interactions, representing the number of dialogue acts in any par- ticular category as a proportion of the total number of dialogue acts made by the speaker. A relative frequency of medical topics addressed in every interaction is calculated for all interactions. The doctor as a facilitator of doctor-patient interaction should demonstrate a high frequency of supportive and encouraging behavior in the presence or absence of patient desired behavior. Even though a patient’s characteristics are very important to the quality of interaction, the doctor’s facilitating behavior is essential since it allows patients either to express themselves or to repress [Nev06].

7.3 Finding Cultural Dependencies

Information seeking behavior includes seeking information about medical topics. Direct, assertive and embedded question types are posed by both parties. On the other hand, information provisioning or information giving is providing a direct answer to a question, elaborating the question by providing supplementary information and deviating or changing the topics of the interaction without prompting from the interacting partner. In this study we group the doctor-patient conversation into two categories: information seeking behavior and information provisioning behavior. Informa- tion seeking consists of utterances about information gathering, checking and cueing. Information provisioning contains utterances dealing with explanation, Chapter 7. Designing Spoken Dialogue Systems for Doctor-Patient 106 Conversation confirmation, and giving instructions. Both information seeking and information provisioning are analyzed against medical topics: illness, symptoms, diagnosis, treatment, exam/test and history (medical history) for both doctor and patient. In this study we group information, checking and cueing as information seek- ing behavior and explanation, conformation and giving instruction are grouped as information provision behavior. Accordingly we compute the information seeking and information provisioning behavior of both doctor and patient. In addition, information seeking and information provisioning is analyzed against medical topics: illness, symptoms, diagnosis, treatment, exam/test and history (medical history) for both doctor and patient. Zue and Glass (2000) pose the question “Should one build conversational interfaces by mimicking human-human interactions?” On the one hand, some believe that users feel more comfortable when communicating with a system pos- sessing characteristics of a human agent. On the other hand, others believe that studying and comparing human-human dialogue in itself can provide valuable insights to human-machine dialogue or spoken dialogue [ZJ00]. In the analysis we remove backchannels. Backchannels contain, greetings, and acknowledgment that carry little information value for healthcare doctors and patients. Removing backchannels should not affect the quality of infor- mation obtained from the interaction. We use a two-way ANOVA (Analysis of Variance) to see the difference between doctor and patient in the two criteria and medical topics or themes. Additionally, we check the number of questions posed by doctors and patients. Finally, we analyze the overall interaction process.

7.3.1 Methodology The focus of this research is to design a spoken medical dialogue system on the basis of doctor-patient face-to-face interactions, to understand the weak and strong side of the interaction and to utilize actions taken place during the interaction. We have conducted a number of observational studies in which we recorded the interaction between patients and health professionals. Based on these observations we design the content of the conversation including question and declarative statements, the order of presentation of content, how a system responds to questions and words, sentence structure and tone used, to closely match the user expectations of what a health professional might ask, respond and sound like. In-depth interview studies show that this is perceived by patients as a successful conversation [MFWF06]. The doctor-patient interactions are analyzed as follows. We classify the elic- itation process based on semantic entities as shown in Figure 1, leading to the following topics: (i) Illness, (ii) Symptoms, (iii) Diagnosis, (iv) Previous Treat- ment, (v) Current Treatment and (vi) Exam. Questions and Explanations are targeted towards the following variables proposed by [Now11]: (i) information, (ii) confirmation, (iii) checking, (iv) explanation, (v) cue and (vi) giving instruc- tion. First we address the efforts taken by both doctor and patient to identify problems and attempting to recommend. This includes the process of elicitation 7.3. Finding Cultural Dependencies 107

Figure 7.1: Semantic Entities of Doctor-patient conversation

(information gathering), explanation, confirmation, checking, cue and giving in- struction. We transcribed the audio recordings manually and tabulating into three categories: Information elicitation or information seeking and information provisioning or (information giving) in the case of the doctor and the patient in the interaction. We analyzed 29 conversations done by 4 doctors and 29 patients among 50 patients. We chose only patients coming for diagnostic purposes and ignored follow-up patients since it doesn’t include the elicitation criteria (in- formation gathering/seeking and information provisioning) and medical topics (illness, symptoms, diagnosis, treatment, exam/test and history) for diagnostic purpose.

7.3.2 Results We have collected data to find out how, in the Ethiopian context, patients elicit information during a doctor-patient conversation. Therefore we have audio- taped 50 real doctor-patient interactions. The conversations took 6-7 minutes on average. The statistical analysis of the face-to-face doctor-patient interaction has resulted in the following findings. Out of 29 medical interactions, comprising of 442 turns, 171 (38%) turns classified as Information gathering, 167 (38%) utterances are uttered by doctors to elicit health information and only 4 (1%) of the utterances are uttered by the patients. Table 1 shows the breakdown of the doctor contributions to the doctor-patient interactions into (variable, topic) combinations. Table 2 shows this breakdown for the patient contributions. We may interpret this table as an estimator for probabilities as Prob (v—t, a) for variable v, topic t and actor a (either doctor or patient). Our first conclusion is that the interaction is mainly led by the doctor. The first dialogue act is a question posed by the doctor like ’How are you feeling?’. Then the patient explains complaints or feelings (s)he has. The doctor then will ask additional questions to identify causes, symptoms, and illnesses. Chapter 7. Designing Spoken Dialogue Systems for Doctor-Patient 108 Conversation

Table 7.1: Doctor utterances in face-to-face conversation Illn Smpt Diag P.Tr C.Tr Exam Hist Total Information 34 110 9 5 0 1 8 167 Confirmation 0 2 0 0 0 0 0 2 Checking 1 5 9 8 1 4 1 29 Explanation 6 4 9 3 1 5 0 28 Cue 2 1 2 0 1 0 1 7 Instruction 0 0 3 1 0 5 2 11 Total 43 122 32 17 3 15 12 244

Table 7.2: Patient utterances in face-to-face diagnosis processes Illn Smpt Diag P.Tr C.Tr Exam Hist Total Information 1 2 0 0 0 1 0 4 Confirmation 6 36 1 4 2 2 1 52 Checking 0 28 2 2 0 0 2 34 Explanation 12 76 5 6 0 1 3 103 Cue 0 0 4 1 0 0 0 5 Instruction 0 0 0 0 0 0 0 10 Total 19 142 12 13 2 4 6 198

Table 3 and 4 show information seeking and information provision of doc- tors and patients. We see that information seeking behavior of doctors (46%) is higher than that of patients (10%). Whereas, patients’ information provi- sioning behavior (35%) is much higher than doctors’ (9%). Besides, symptoms 60%, illness 14%, diagnosis 10%, treatment 8%, exam test and history 4% are addressed. In these doctor-patient interactions the medical topic has been given much attention during information seeking and information provision (about 122 turns used by the doctor for information seeking and 142 turns by patients to reply the questions posed by the doctor about the symptoms). The most promi- nent divergence appears in the fact that doctors most frequently initiated ques-

Table 7.3: Information seeking and provision behavior of patient Illn Smpt Diag P.Tr C.Tr Exam Hist Total InfoSeek 1 30 2 2 0 1 2 38 InfoProv 18 112 10 11 2 3 4 160

Table 7.4: Information seeking and provision behavior of doctor Illn Smpt Diag P.Tr C.Tr Exam Hist Total InfoSeek 35 115 21 14 1 10 11 207 InfoProv 8 7 11 3 2 5 1 37 7.3. Finding Cultural Dependencies 109 tions targeted towards information (68%), much less frequently towards checking (12%), and even less frequently towards explanation (11%), giving instruction (5%), cue (3%) and conformation (1%). The patients merely were answering the questions posed by the doctor.

7.3.3 Discussion As discussed in the preceding section, turn taking is a dialogue act. A turn is defined as speaking without interruption. From the doctor-patient audio record- ings we found that the number of turns of doctors is 276 and 238 of the patients. This figure indicates that the doctor speaks in long turns 56% over patients 46%. In general, patients talk less than doctors and most of their interaction is in the form of giving information in response to doctor questions. Many studies indicate that doctor’s dialogue acts encourage patients to discuss their opinions, express feelings, ask questions, and participate in decision making. This helps the doctor to more accurately understand the patient’s goals, interests, and con- cerns as well allows the doctors to better align his conversation/interaction with the patient’s agenda [GL99, VLM+12]. On the contrary, some studies report that doctors often underestimate patients’ desire for information, while over- estimating their medical knowledge [BGGP06]. Thus, allowing patients to ask questions, express concerns and state preference helps the doctor to infer matters that are important to patients in relation to their compliance. Our findings show that the dialogue is initiated by the doctor in order to seek information about the patients health compliance and illnesses. Moreover, the di- alogue is controlled by doctors to gather additional information about the illness (such as symptoms, illness history and medication). Generally, the request for information sets the initial purpose or goal that motivates the speaker’s actions for the remaining sections of the dialogue. The request for information further specified by one or more discourse segments. Asking questions and providing an- swers play a significant role in the process of the medical consultation. Mainly, the aim of doctor-centered behavior is efficiently gathering sufficient information to make a diagnosis and consider treatment options in the least amount of time necessary. This is in contrast to patient-centered interactions that can recognize patients as collaborators who can share not only their biomedical states (physi- cal condition and well being) but also knowledge of their psychological situations (personality, culture, social relations, etc.). The result of quantitative analysis shows, there still is an equal distribution of information seeking (questions) be- tween the dialogue participants, with almost all elicitation initiated on the part of the doctor. The data also demonstrate that both doctors and patients em- phasize on asking and responding about symptoms and illnesses. For example from a total of 442 dialogue acts, 122 and 142 dialogue acts are used to elicit symptom information by doctors and patients. Generally, 59.7% of the interac- tion was devoted to seeking and giving information about symptoms and 14% of illnesses. The finding show a significant difference (F= 14.02, P=0.0026, alpha= 0.05 ) between doctors’ and patients’ information seeking behavior in f-test, but no significance difference is found in patients’ and doctors’ information giving Chapter 7. Designing Spoken Dialogue Systems for Doctor-Patient 110 Conversation behavior. We also analyzed the data using two-way analysis of variance. We found that the information seeking score of doctors is higher than for patients, but the difference is statistically not significant. The score of information giving behav- ior of patients was higher than the doctors, but similarly there is no significant difference. The first impression about people often turns into long-term percep- tions and reputations. So doctors in their first encounter should make good eye contact, shake patient’s hand and introduce himself. In the face-to-face interac- tion we recorded that there were no greetings and introduction during the initial doctor-patient interaction. In each dialogue sentence or clauses the participant (doctor/patient) utterance is categorized into semantic entities (Figure 7.1) in which the dialogue theme is emphasized. Since the conversation is between a doctor and patient for diagnosis purpose we identify the main concepts evolved in the interaction process. Compliant, symptoms, treatment, illness, exams, his- tory, and prescription are the most common entities used in the doctor-patient conversation.

7.3.4 Cultural Aspects Cultural differences may be an obstruction for effective doctor-patient interac- tion. The cultural perceptions of health, sickness, and medical care of patients and families may differ with that of the doctors. Speaking the same language and being born in the same location does not automatically mean sharing all the elements of a particular culture. Studies have shown that a patient’s culture will affect the way they perceive their body, illness, and disease. This is also true for the doctors as their own families and communities have also helped to shape these cultural beliefs within them. Each participant in the medical inter- view brings with them the culture in which they were raised. At times, differing cultural beliefs can have an adverse effect on the care that one receives. Com- munication problems arise when the patient and doctor do not share the same culture. Culture competencies in medical interaction provide a patient centered care by adjusting their attitudes and behaviors to the needs and desires of different patients and account for emotional, cultural, social, and psychosocial issues on disease and illness. Medical competencies relate directly with the doctor-patient interaction that are required by the doctors to conduct an effective interview and to create an acceptable plan of diagnosis and treatment. Studies indicate that issues that may cause problems in cross-cultural encounters are authority, physical contact, communication styles, gender, sexuality, and family. Hofstede [HHM10] has identified five cultural dimensions.

Power Distance Power Distance focuses on the perceived degree of equality, or inequality. It relates to the degree of freedom in decision making based on the hierarchy of persons in an organization or institution or family. According to Hofstede 7.3. Finding Cultural Dependencies 111 et al., [HHM10] ”A high power distance ranking indicates that inequalities of power and wealth have been allowed to grow with the society. In these soci- eties equality and opportunity for everyone is stressed”. In large power distance cultures, ones social status must be clear so that others can show proper re- spect. Our intention in this chapter is to investigate if power distance has an impact on the doctor - patient interaction. In line with this, Hofstede et al. assert that the power distance exhibited in society also is reflected in the rela- tionship of doctors and patients. They say that ”in countries with large-power distance cultures, consultations take less time, and there is less room for unex- pected information exchanges” [HHM10]. The findings indicate that the average time spent on face-to-face consultation is 4-6 minutes. This result confirms that power distance plays a major role in doctor-patient interaction. According to Hofstede, Ethiopia is a large power distance country, so the interaction is dom- inated by doctors and patients rarely participated in treatment and diagnosis decision makings. Hence, in our experiment we found that the conversation is doctor dominated as well as doctors mostly ask closed questions. As it is indi- cated, Ethiopia is a large power distance country, as a result, the conversation is always predominated by a doctor and patients barely participate in treatment and diagnosis decision making. This is true especially for illiterate and rural people. The power distance of literate people and doctors is better compared to the illiterate. In line with this [VLM+12] said that doctors asked less educated patients and low income patients more questions about their disease and med- ical history. Likewise, our findings indicate that doctors’ information seeking behavior is more than that of patients’. Generally, in Ethiopia, patients treat doctors as superiors, consultations are shorter and controlled by doctors.

Individualism vs Collectivism

Hofstede’s cultural dimension indicates that Ethiopia as a low individualism country. The implication of individualism in healthcare [MBMH09] particu- larly in doctor-patient interaction goes with patient autonomy, the possibility of choice, flexibility of social roles, less conformity, and psychosocial informa- tion exchange. The Individualism dimension is defined as a preference for a loosely-knit societal framework in which individuals are expected to take care of themselves and their immediate families only. Whereas collectivism represents a preference for a tightly-knit framework in which individuals can expect their relatives or members of a particular group to look after them in exchange for unquestioning loyalty [HHM10]. The question here is, does individualism has any effect on healthcare especially in doctor-patient interaction? Ethiopia has a low individualism value. The implication of individualism in healthcare partic- ularly in doctor-patient interaction goes with patient autonomy, the possibility of choice, flexibility of social roles, less conformity, and psychosocial information exchange [MBMH09]. Chapter 7. Designing Spoken Dialogue Systems for Doctor-Patient 112 Conversation

Masculinity vs Femininity

Ethiopia is a masculine country (Hofstede’s cultural dimension); however, re- gardless of other dimensions, masculinity doesn’t reflect on the patient - doctor interaction in diagnosis and treatment. Some studies revealed that there is a dif- ference between female and male doctors in creating partnerships, with patients and dealing with psychosocial issues during the conversation. Female doctors mainly address patients’ psychosocial problems, and they can easily create a partnership with patients. This makes patients open and free to discuss their feelings. Whereas, male doctors do not address psychosocial problems and they rarely create partnerships with patients. In line with this, [Ber09] found a sig- nificance difference between female and male doctor practice behavior. Female doctors provide more preventive services and psychosocial counseling; male doc- tors spend more time on technical practice behaviors, such as medical history taking and physical examination. Patients of female doctors are more satisfied than those of the male doctors [Ber09]. Generally, doctor’s and patient’s gender can impact the doctor-patient interaction and its outcomes. Meeuwesen et al., [2009] stated that the more masculine a county, the more instrumental (disease centered) interaction will dominate, the less attention will be paid for psychoso- cial issues and more frequently the majority of doctors will be men or male. The analysis result shows that mainly the interaction between doctors and patients was on the theme of symptoms 60% and illnesses 14%. Eventually the theme of the conversation is disease-centered.

Uncertainty Avoidance

Uncertainty Avoidance in the healthcare domain primarily deals with patients’ emotionality or anxiety, or stress and doctor’s task-orientation, preferences of technological solution and degree of medication. A study in doctor-patient in- teraction conducted in 10 European countries showed that doctors in uncertainty tolerant countries on average had more eye contact with the patient and paid more attention in rapport building [HHM10, MBMH09]. In countries with strong uncertainty avoidance [MBMH09] the more disease-centered (instrumental talk- ing), the less affective talking and the more biomedical exchange can be expected. This a true scenario in Ethiopia cases; since doctors indulge themselves in diag- nosing the illness. In the experiment, we have not found a single introduction (greetings) communication act. Hofstede further explained that ”doctors in un- certainty tolerant countries more often send patients away with comforting talk, without any prescription. In uncertainty avoiding countries doctors usually pre- scribe several drugs, and patients expect them to do so” [HHM10].

Long-term versus Short-term Orientation

Regarding long-term orientation, as Ethiopia doesn’t have data we left out in our analysis. 7.4. A Spoken Dialogue Model 113

7.4 A Spoken Dialogue Model

Eliciting user requests in the medical spoken dialogue is the main challenge for developers and implementers of the system. Unlike a face-to-face doctor-patient interaction it is very hard to analyze the patients’ attitudes and emotions. As a result the eliciting techniques should be patient centered; and the main role of the doctor is a facilitating behavior, focused and unfocused open questioning, request for clarification, summarizing and empathy. Thus, the dialogue system should act like human which can help to elicit the patients’ request in order to provide accurate consultation, diagnosis and treatment. To the best of our knowledge eliciting user medical requests using spoken medical dialogue based on some suggested principles is not assessed, and there is no any results obtained. Our objective is using the best practice of in-person doctor-patient interaction activities to be adopted in the spoken medical dialogue system to search medical information using mobile phones.

7.4.1 A Simplified Dialogue System Spoken medical dialogue tends to be patient centered. Thus the system should facilitate the interaction and ask open questions in which the patients can express not only knowledge of their biomedical state (illness and complaints) but also knowledge of their psychological and social situations (personality, culture, rela- tionships). As discussed before, the face-to-face interaction in Ethiopia is doctor dominated. However, in the dialogue system it is impossible to detect the non- verbal behavior of the patient. Thus, the elicitation should be dominated by the patient in order to seek biomedical as well as psychosocial situations of the patient. Doctor’s behavior that encourages patient active participation includes asking open ended questions, ensuring and confirming patient comprehension, requesting patients’ opinions, and making statements of concern, agreement and approval. Hence, spoken dialogue to resemble human-human interaction, should encourage patients to take part actively in the interaction process. Instead of be- ing expecting responses from patients, the system must take a facilitative role in order to provide time and space for patients to speak out what their symptoms, illnesses, suggestions and to participate in decision making. From the analysis of the in-person interaction of doctors and patients, it was found that there are some gaps that should be filled. The main gaps observed in the face-to-face interaction is doctor domination as well as we identified that the social status of patients and doctors inhibits the interaction process. Other factors that affect the face to face interaction are illiteracy and culture. In rural Ethiopia, the illiteracy rate is higher than in urban areas, so patients from rural areas visited find the interaction with the doctor is difficult; the doctor may consider that non educated rural patients do not express themselves so that a doctor prefers to ask some closed questions and open leading questions to elicit the user requirements. But even when doctors and patients born and live in the same area, they do not necessarily have the same understanding of social norms and cultures. Consequently, the non-literate rural patients are more conservative Chapter 7. Designing Spoken Dialogue Systems for Doctor-Patient 114 Conversation of their values and cultures; some of the illness may not be disclosed in public so to keep their culture or values they reserved from disclosing their feelings, symptoms and illnesses. For instance, a study conducted in USA revealed the gap between doctors and Ethiopian migrants in disclosing illnesses and diseases. According to this study, the migrants did not want to be told if their disease is life threatening; whereas, doctors in US disclose the nature of the illness, the risks of the illness (curable and incurable) and the magnitude of the illness (treatable or non-treatable) [Bey92]. From the face-to-face doctor-patient interaction we deduce the user request elicitation model displayed in Figure 7.2 for spoken dialogue system for health- care application. The model consists of four components: opening initiatives, asking information, giving information and closing. Figure 7.2 displays user re- quest elicitation process for the spoken dialogue systems in a healthcare scenario based on doctor-patient face-to-face dialogue.

7.4.2 Design Dialogue System Data validity, accuracy and integrity are the vital points to be considered in de- signing a spoken dialogue application; since automatic speech recognition(ASR) technology is not perfect. The design of spoken dialogue technology should take into account the possibility of speech recognition errors and improve the overall accuracy using dialogue actions such as re-prompts, conformations, error correc- tion and handling etc. Secondly, it should provide equal access to novice and experienced end users of the system. Thirdly, it should also consider individual differences such as personalization and user context. Finally, before developing the dialogue system it is very important to conduct a face-to-face interview or pay live observation while a doctor is treating a patient (if possible video tape the conversations). The most commonly applied methods to design a spoken dialogue include human-human dialogues and design by simulation. Thus, our interest lies on to look into doctor-patient interactions as a means to design medical spoken dialogue.

7.4.3 Designing a Dialogue Based on Doctor-Patient In- teraction Human-human dialogue provides an insight how humans accomplish a task- oriented dialogue. The doctor-patent interaction studies take place in the early stages of the speech application life cycle. They act as a starting point for spoken dialogue design and help to define requirements. The purposes of doctor-patient interaction studies are to help the designer see the task form the user point of view, develop a feeling for the style of interaction, and acquire some specific knowledge about the vocabulary and grammar used in the diagnostic process. Doctor-patient interaction (natural dialogue) study differs significantly from the wizard-of-oz studies, that have been used extensively by others in the design of spoken dialogue systems. Researchers who use the wizard-of-oz techniques begin the process with a pre-experimental phase that involves studying natural 7.4. A Spoken Dialogue Model 115

Figure 7.2: User request elicitation process human dialogues. Whereas the natural dialogue takes place prior to any system design or functional specifications [Yan08]. The main purpose is to launch the design process. Before designing the medical dialogue system, we wanted to discover how doctors and patients interact in the diagnosis process. From the analysis of the doctor-patient interaction, we found that the interaction is doctor-centered as well as we found that patients question asking behavior is hampered by the cultural influences such as: distance power, high uncertainty avoidance and the like (see Section 3.5). It is impossible to produce a medical dialogue system design based entirely on doctor-patient face-to-face interaction. Rather it can play an important role in the early stages of the development life cycle,

Lesson Learned The doctor-patient interactions analysis highlights a number of important spoken dialogue design concepts:

• An effective spoken medical dialogue system design is more likely to result if the dialogue system is designed from scratch based on the face-to-face doctor-patient interaction.

• To create a human-like spoken dialogue system is to maintain the conversa- tional context so that users may partially or elliptically specify information Chapter 7. Designing Spoken Dialogue Systems for Doctor-Patient 116 Conversation

• Allow users to make corrections when they detect an error; and the user must accept a system that makes errors and the system should also exhibit cooperative behavior.

• Permit users to move the conversation forward more quickly by accepting compound questions and answers

• Provide feedback in a way forward that moves the interaction forward. The system should give feedback combined with the next conversation move, and the user should answer yes/no questions with compound replies.

• Keep track of the previous dialogue act as much as possible. The con- versation can have a more natural feel if the system is able to infer the previous information from the context. E.g. the sign and symptoms of the previous illness and associated symptoms and signs. Keeping track avoids unnecessary repetition and helps to move the conversation quickly.

• Tapering prompts; prompts that are repeated in the conversation can be shortened to avoid repetition. E.g. What do you feel? Do you have a headache, a stomach ache..? After the patient explained the symptoms, the system may ask again..

• Anything else..?’ for additional signs and symptoms. It avoids repetition and this is also another form of a cooperative behavior of the system.

Important Roles The importance of studying doctor-patient interaction, adopted from [Yan08], to design the dialogue systems are discussed below.

• Refining application requirements and functionality: This helps to refine and modify the functional requirements of the system

• Collecting appropriate vocabulary: From the doctor-patient interaction, we identify the appropriate vocabularies used in the diagnosis process. Se- lecting appropriate vocabularies is essential because of out-of-vocabulary utterances are a common cause of recognition errors. So a designer to create a data dictionary for training purpose requires appropriate vocabu- laries. In line with this Yankelovich says, speech user interfaces seem much more effective when they select the same vocabulary that humans use when talking about the domain. Thus, the doctor-patient interaction will help the designer to pick the vocabularies they used while the diagnosis process.

• Discovering effective interaction patterns. This includes turn-taking, ground- ing behavior of the user and the system. This expresses when to take turns, when to end turns and how they share the same ground.

• Helping with the prompt and feedback design. This influences prompt and feedback design. It answers the questions, when and how to give feedback. 7.5. Conclusion 117

• Getting a feeling for the tone of the conversations. The system should use a natural tone; to treat users in a friendly, unhurried, low-pressure manner. Using a tone of respect and politeness and try to avoid rudeness or dis- pleasure makes the conversation more natural and human-like. In addition using the appropriate social context makes the conversation smooth. To sum up, and serve as an effective starting point for spoken medical dialogue system design.

7.5 Conclusion

We have analyzed the interaction in 29 audio-taped doctor-patient diagnosis dialogues in the Gamby Teaching hospital. The study is mainly conducted to investigate the information seeking and information provisioning behavior of doctors and patients. The finding shows that there is no statistical significant difference between doctor information seeking and patient information seeking behavior. Similarly, we didn’t find any significant difference between patients information provisioning and doctors information provisioning behavior. From this analysis we conclude that studying face-to-face interaction between doctor and patients is an effective starting point for spoken medical dialogue system design. We also found an influence of culture on doctor-patient interaction; so cultural values should be incorporated while designing and developing a medical dialogue system. Finally, based on our results, we propose a model to assist user requirements elicitation in order to develop a medical spoken dialogue system. In the future we will implement our model to develop a medical dialogue system.

Part IV

Query Enrichment and Preference Prioritization and Aggregation 120

This part of the thesis contains two chapters that explains preference based query enrichment and describes query prioritization and aggrega- tion.

Chapter 8 introduces briefly the benefits of query enrichment in the healthcare domain. An overview of a related work is presented in Section 8.2. Section 8.3 highlights the distinction between query ex- pansion, query formulation and query enrichment. Section 8.4 shows the overall architecture of the system. Afterwards, we introduce a preference model as a mechanism to describe user preferences (Sec- tion 8.5). In this section, we use relational algebra (Section 8.5.1), conditional preference network (CP-net) (Section 8.5.3), and pref- erence formalism (Section 8.5.4) to describe user preferences. In Section 8.6 we explain different techniques to model preference sim- ilarity. A case study in healthcare domain is presented in Section 8.8 to show how the query enrichment is performed using the proposed preference model. Before the chapter closes with summary, a pro- totype is presented (Section 8.9). Chapter 9 focuses on preference prioritization and aggregation. We describe a general approach to multiple criteria decision making, with a special emphasis on the decomposition of such problems. An overview of multi-criteria decision making (MCDM) in health- care domain is discussed in Section 9.2. Section 9.2.2 introduces the multi-criteria decision problem using decision tree. The ap- plication of multi-criteria decision making (MCDM) in eHealth is covered (Section 9.3). We use ordered weighting average opera- tor (OWA)(Section 9.3.3) and analytical hierarchy process (AHP) (Section 9.3.4) to prioritize and aggregate preferential ordering of diseases, treatments and risks. In Section 9.4 we describe the con- text of the medical decision process for a particular case in more detail. This section deals with some relevant medical knowledge such as treatment interaction, treatment adverse effects and review the treatment guidelines of HIV and malaria. The treatment deci- sions and the decision process is presented 9.4.2. After tabulating and analyzing the row data the results of the case study is pre- sented in Section 9.4.3. The chapter gives the concluding remarks in Section 10.7. Chapter 8

Query enrichment by user preferences

Abstract Query enrichment is a process of dynamically enhancing a user query based on her preferences and context in order to provide a personalized answer. The central idea is that different users may find different services relevant due to different preferences and contexts. In this chapter, we present a preference model that combines user prefer- ences, user context, domain knowledge to enrich the initial user query. We use CP-nets to rank the preferences using implicit and explicit user preferences and domain knowledge. We present some algorithms for preferential matching. We have implemented the proposed model as a prototype. The initial results look promising.

8.1 Introduction

Technological advances have brought tremendous progress in healthcare. Ex- amples are: electronic medical records, mobile health and eHealth, videoconfer- encing, medical decision making, remote monitoring and many more. Besides these, healthcare now can provide personalized health decisions for patients and empower patients to participate in the decision making. Recently, patient em- powerment and engagement has gotten a big boost. Patient-centeredness helps patients and families and/or doctors to make informed healthcare decisions dur- ing diagnosis and treatment [Arn07]. However, these benefits of technology in healthcare are not equitably avail- able for developing countries with their restricted infrastructure and limited resources. Illiteracy, little medical knowledge and poor or ambiguous healthcare queries are factors that hinder the realization of patient empowerment. Low in- frastructure, unavailability of technologies, costs and shortage and high turnover of clinicians are some of the obstacles to realize patient-centeredness in partic- ular and eHealth in general. These challenges and opportunities have triggered the work in this chapter. Especially we have focused on the Ethiopian situa- 122 Chapter 8. Query enrichment by user preferences tion (see [Ber08, SSLM10] in general and [TW11, TKW10a] for a more detailed description). In this chapter we focus on a basic architecture to support health workers. This architecture supports the health worker to make a diagnosis, and then tries to find the best treatment for the patient at hand adapted to the environment of this patient. The dialogue support principles have been discussed in [TW13] and are outside the scope of this work. In this chapter we focus on the enrichment of the initial (medical) query, before matching it against a body of medical knowledge and making a prioritization of the possible treatments. Rather than setting up an advanced expert system to cover for any medical case, we use a basic Information Retrieval approach to match a diagnosis with patterns defined for typical diseases. Then we use personal and environmental information to rank the associated treatments. The diagnosis can be seen as the initial query, that is enriched by personal and environmental information. Illiteracy and low level medical knowledge brings about poor query formu- lation. To this end, we incorporate personal profile and context to enrich the user initial query (which consists of signs and symptoms of the patient). This work also allows clinicians, specially community health workers (Health Exten- sion Workers in Ethiopia context) with very limited training, to query diseases and treatments based on patients profile, symptoms and contexts. The motive behind query enrichment is to enable low/semiliterate patients and clinicians (health workers) to create a medical query to search personalized healthcare information as well as to provide rich diagnosis and treatment op- tions for both patients and clinicians. In general, enriching user queries using domain knowledge, personal profile and context can help to maximize cure and to minimize adverse effects, cost, and waiting time. Queries may contain implicit preferences. This is for example the case in the query fragment Martha is 6th months pregnant. She is on HIV/AIDS regimen; currently she shows some signs of malaria. At this moment, the system should identify complications: antiretroviral may cause antimalarial resistance as well as antimalarial may affect pregnancy. Thus, while enriching the query, it is advisable to be cognizant of the impact of indirect preferences stated in the query. In the above query the woman might not have any knowledge about all the constraints resulting from her condition. Other preferences may come from (if known) a user profile and a user context. The user profile contains interests and preferences, while the user context is considered as the actual state of the user current task. For the purpose of this research, we see both user profile and user context as preferences for that user. In this chapter we focus on handling user preferences in the context of healthcare application. Typically, the query (request) then is a consequence of a diagnosis obtained by the doctor or an automated diagnosis system. Consequently, we may assume that both user profile and user context are available upon entering the query (request). The main purpose of this chapter is to answer the following question: How to develop a general preference model for enriching queries in the context of 8.2. Related Work 123 healthcare application. This leads to the following sub-questions: R-1 What is a general preference model that can handle medical preferences (medical preferences in this context is patients treatment or medication preference)? R-2 How is preferential matching defined in this model? The layout of this chapter is as follows. Related work is presented in Sec- tion 8.2. The distinction between query expansion, query formulation and query enrichment is discussed in Section 8.3. In Section 8.4 we show the overall ar- chitecture of the proposed system. We shortly discuss the system components and discuss the overall quality of the system. The preference model is pre- sented in Section 8.5. In Section 8.6 we discuss the preferential similarity model. Section 8.7 presents the application of preference prioritization in healthcare do- main; and a medical case study is discussed to test our model in Section 8.8. Section 8.9 gives a brief description of the prototype. Finally, we conclude with some future research directions in Section 8.10.

8.2 Related Work

The expansion of the Internet is providing a fertile ground to access a wealth of information. As the volume of heterogeneous web resources increases and the data become more varied, a massive response is issued to user queries. That makes it hard to distinguish relevant information from irrelevant or secondary in- formation. Nowadays, various mechanisms are employed to enhance user queries, such as reformulation user queries, expanding query terms, adding a user profile and considering the user context. Query enrichment is the process of transforming the initial query into a form that more adequately reflects the information need of the user. Query enrich- ment in this work focuses on enhancing the initial user query by incorporating user profile, user context and medical knowledge. It is different from query refor- mulation and query expansion, which deals with rewriting the initial user query by adding or removing words, phrases or clauses. In some systems, expansion terms are added to the query by the user (interactive query expansion [Eft00], like the Google search engine), while other systems the expansion terms are added by the search engine or system itself (automatic query expansion). The query enrichment we propose here varies between query reformulation and query expansion. The enrichment is performed automatically by fetching the user profile, the user context and domain knowledge from the database and doesn’t involve the user intervention. Asfari et al. [ADBS10] use user profiles and user tasks to improve user queries. They consider the state of user’s task at a specified time. The drawback of this approach is that it does not take into account user’s preference relations, preference ranking, etc. Query enrichment by integrating the user profile is addressed by [KI10, Kie02]. Several authors propose a scheme for query enrichment by relevance feedback, beginning the search with an initial query and then modifying it by relevance 124 Chapter 8. Query enrichment by user preferences judgments of the user [BMS07]. Then term expansion is used to reformulate the user query [BN08]. Different approaches are used for the process of query enrichment; for exam- ple Conesa et al. [CSS08] reformulate the initial user query by using semantic knowledge, while others use term relations for expansion [BN08]. Bhogal et al. and Sieg et al. [BMS07, SMB07] propose ontology based query expansion. Se- mantic based query term relations in order to enhance queries is addressed by Benz et al. [BKK+09]. Zaynai et al. [ZPCS09] introduce a system that offers interactive query en- richment by using user profiles. This study uses an incremental query enrichment process based on user preferences. The study also involves negative preferences to enrich the query. Contextual information, however is not used. The medical query generator (MQG) that can generate a keyword based query from a natural language description of a medical information need is pre- sented by the work of [LHJR07]. MGQ generates a query by selecting terms from the user request that have strong term-category correlation to medical categories. Enriching user queries requires personal information about the user such as user profile and user context. We start by explaining the concept of personal- ization and acquisition of user profile, user context and elicitation. Then we go into more detail with the matchmaking process.

8.2.1 Personalization Personalization is the adoption and arrangement of information and services in coherence to a single user or a group of users. It requires permanently optimizing the presented information to the user’s needs. It involves using technology to accommodate the differences between individuals. James [Jam13] defines personalization as “Personalization technology en- ables the dynamic insertion, customization or suggestion of content in any format that is relevant to the individual user, based on the users implicit behavior and preferences, and explicitly given details”. Personalization is a means of meet- ing user’s needs more effectively and efficiently, making interactions faster and easier and, consequently, increasing user satisfaction. Personalization depends on the gathering and use of personal information, consequently, privacy issues are a major concern. An important aspect of personalization is the creation of a high quality user profile that provides an accurate representation of user interests [RK09].

User profile

A user profile is a representation of information about an individual user that is essential for the application at hand. A user profile addresses aspects, such as interests, knowledge, background, skills, goals, behavior, interaction preferences and characteristics of an individual user. 8.2. Related Work 125

User profiles are divided into two main types: static and dynamic profiles. A static profile deals with static aspects such as demographic data and hobbies, whereas the dynamic user profile covers the aspects that are changing through time. [KI10] stated that query personalization is dynamically enhancing a query with related user preferences. We further divide the dynamic user profile in a short term and long term profile. The short term profile records changes based on the status and situation of the user, while the long term profile focuses on changes over a longer period (weeks, months, years). A user profile can be positive (recording preferences) or negative (focusing on dislikes). User profiles can also be categorized into individual and group profiles. An individual profile consists of individual demographic data, preferences, interests and needs whereas group profiles encompass profiles and preferences of groups. For example in the healthcare domain, there are two main groups: patients and healthcare workers. Patients for example can be further grouped according to disease type (diabetes, HIV/AIDS, Tuberculosis etc) while healthcare workers may be grouped by their profession (physicians, nurses, etc). Group profiles are vital in those domains where it is necessary to make recommendations to groups of users rather than to individual users. To acquire a user profile, the information provided by the user may be ex- plicitly processed by direct questioning, or implicitly through the observation of user actions/behavior, or through other recommender system approaches by employing relations with other users or objects. The simplest way of obtaining information about users is through the data they input via the user interfaces provided. Besides, user profiles are also obtained from implicitly collected in- formation gathered from user behavior or user feedback. Accordingly, Guach et al. [GSCM07] give an overview of the most popular techniques used to collect im- plicit feedback, and the type of information about the user that can be inferred from the user’s behavior (user’s browsing history, browsing activity, search logs etc).

User Context

A user context is the description of (relevant) aspects of the current situation of the user. G¨oker and Myrhaug [GM02] define five dimensions of a medical user con- text:(1) Environment context, (2) personal context: is physiological (such as blood pressure, glucose level, pulse etc) and mental (mood, stress, angriness, emotion etc), (3) task context, (4) Social context and (5) Spatial-temporal con- text. A user context can be captured implicitly and explicitly. Users can provide contextual information such as location, temperature, personal context and etc. On the other hand the user context can be captured automatically from sensors, cameras or satellites. The user mental context can be particulary extracted from the user’s conversation. 126 Chapter 8. Query enrichment by user preferences

Elicitation In Section 8.4.1 we will discuss the dialogue system that forms the main man- machine interface for our system. We assume there is some prescribe request format for incoming requests. The dialogue system will help the calling user to complete the request according to this format. After being activated by the user, the dialogue system will ask typical questions that enable the system to find the elements of the prescribed request format. Some elements will have a discrete range of possible values. A typical example is a yes/no question. Answers on such questions are easily obtained by multiple-choice questions. Other elements require a description by the user, and require an open ques- tion. Such questions will be answered in natural language. Natural language has the potential to be a precise specification language provided it is used well. But there are not many people who can use natural language in a consistent, non- verbose, expressed on a same level of abstraction, complete, and unambiguous way [FW04]. Therefore we assume the use of natural language to be restricted by vocab- ulary and sentence constructions, such as to avoid problems. Such a restricted natural language format is referred to as controlled language. According to Wyner et al. [WAB+10]: roughly speaking, controlled natural languages (some- times simply called “controlled languages”) are artificially defined languages that coincide with (or are at least close to) a subset of a particular natural language. We assume the dialogue system guides the user during answering an open question in formulating the answer according to a controlled language format. It will be the task of the dialogue system to help and guide the user to convert the answer on an open questions into this controlled language format. Note that the controlled language format will help to avoid disambiguates, and will enforce the searcher in using the restricted set of terms from the controlled language. The advantage of using a controlled language is that it will also help to reduce the complexity of building an adequate user interface agent [MD09].

8.2.2 Matchmaking Matchmaking is the process of finding knowledge or services that satisfy a given request. Matchmaking is divided into exact and partial matching. Matchmak- ing is based on the comparison of the description of knowledge and services with a request [Gri07]. Matchmaking can be syntax- or semantic-based or be hy- brid [TAH07]. Semantic matchmaking is not only based on the syntax of both the query and the description language, but also involves the semantics (mean- ing) of the constructs. Thus a semantic matchmaking algorithm should consider the meaning of concepts while comparing demand and supply [BK07, PKPS02]. It should consider the various relations between the concepts that are stored in the repository In our case we will have both a knowledge and a services reposi- tory. The quality of matching very much depends on the quality of the request 8.2. Related Work 127 and the quality of the description of the knowledge objects offered in the knowl- edge repository or service repository. This quality also depends on the expres- sive power of the description languages to describe single or compound ob- jects [Gri07]. In many cases the matching process has a boolean result, i.e. the information or service object is either relevant or not [Gri07]. The next points relate more to services being offered in the service repository. Sycara et al. [SPSS04] proposed LARKS, a methodology for service matchmak- ing using input and output of service request and service advertisement. The matching process uses TF-IDF to measure the service request and service de- scriptions and other ontology based measurement. Paolucci et al. [PKPS02] proposed four matching methods of functional properties of services request and services offerings. They use logic based reasoning for checking similarities. Bel- lur and Kulkarni [BK07] use the same analogy of Paolucci et al. notion but it reverse the plug-in and subsumption presentation. A comprehensive early approach is presented by Cardoso and Sheth [CS03]. They regard several aspects of service-based workflow composition, including semantic-based matchmaking of functionalities, non-functional requirements, and service interoperability. Guo et al. [GCL05] present a bipartite graph based matchmaking algorithm.

8.2.3 Comparison with related systems

HealthFinland [SHVH09] is an intelligent semantic portal that provides relevant health information retrieved from the web. It helps to find relevant health infor- mation using basic terms without the need of technical medical terminologies. The limitation of the HealthFinland is that personalized search is not addressed. [RRNZT13] proposed three different expansion methods using knowledge de- rived from medical thesaurus, medical literature, and clinical notes. They de- veloped MeSH (The Medical Subject Heading a semantic medical knowledge resource developed by the National Library of Medicine of the United States) based query expansion by creating the MeSH indexer. However, this method fails to take into account the context of the user and information about user’s situation and preferences. Personalized Health Information Retrieval System (PHIRS) [WYX05, WL05] is a health information recommendation system that addresses user modeling and implements a user-profile matching that customizes the retrieved health information to match the individuals needs. A limitation of PHIRS is that it does not provide detailed information about the medical concepts and that it doe not touch personalization and does not involve the environmental context. In the the architecture that we will propose in the next section, we incorpo- rate user preference, user context and domain knowledge in the process of query enrichment. 128 Chapter 8. Query enrichment by user preferences

8.3 Difference Between Query Expansion, For- mulation and Enrichment

There is a vast related literature on interactive query expansion (IQE) and refine- ment (e.g., Efthimiadis [1996], Baeza-Yates and Ribeiro-Neto [1999]). Its main difference from automatic methods is that the system provides several sugges- tions for query (re)formulation, but the decision is made by the user. From a computational point of view, IQE and AQE share the first two computational steps, namely data acquisition and candidate feature generation, whereas IQE does not address the subsequent problems of feature selection and query refor- mulation. One of the best known systems of this kind is Google Suggest, which offers real-time hints to complete a search query as the user types. IQE has the potential for producing better results than AQE Kanaan et al. [2008], but this generally requires expertise on the part of the user Ruthven [2003]. From a usability point of view, IQE gives the user more control over the query processing, which is a aspect lacking in AQE (see Section 10.3). Although in this article we focus on fully automatic methods for single query searches, we do include some innovative techniques mainly developed for term suggestion, which are susceptible to also being used for AQE. It is known [Ruthven 2003] that expert users are capable of taking full advan- tage of a query refinement feature, whereas pure AQE is better for non-expert users. Hybrid strategies that integrate AQE and interactive search facilities might be more effective for all types of users, but they have not been much in- vestigated so far. A notable exception is Bast et al. [2007], where the individual expansion terms and the number of their associated hits are displayed automat- ically after each keystroke in the search box, together with the best hits. A similar search paradigm has recently been followed for improving content-based visual retrieval, using pairs formed by a refinement keyword and its associated representative images as single expansion features [Zha et al. 2009]. Overall, the usability issue in AQE needs more research.

8.4 Overall Architecture

The overall architecture of our system is displayed in Figure 8.1. The architec- ture is set up to streamline this communication. To allow effective separation of concerns, our system has been split into the following three main sub-systems: 1. The dialogue system D: This sub-system is like a receptionist, it handles the interrogation of the users in order to obtain a well-structured request. The dialogue system communicates with the user on the basis of text. 2. The query interpreter QI : This sub-system enriches the incoming request into a well-defined query. The query interpreter typically personalizes the request of the user and extends it with context information. 3. The matchmaker M: This sub-system answers the enriched query by matching against the available resources. The matchmaker tries to come 8.4. Overall Architecture 129

Figure 8.1: The overall architecture

up with a well-chosen composition of atomic resources that are known to the matchmaker. Would the matchmaker fail to find a proper match, then it may request advice from an external (human) expert. The obvious consequences of splitting our system include a possibility for module- wise testing; for example, the dialogue system can be tested as a separate module. The combination of query interpreter and matchmaker can be tested by feeding well-structured queries directly by hand into the query interpreter. In addi- tion, the different components can be designed to interact in a service-oriented manner.

8.4.1 The Dialogue System The dialogue system (in Figure 8.2) is interviewing the user in order to fill out as complete as possible a request that will be sent to the next system compo- nent, the query interpreter. As discussed in our previous work [TKW10a] the query interpreter uses elicitation techniques during this interview. The resulting request sq is the output of D, and will in the architecture of Figure 8.3 be fed into the query interpreter QI and will also be stored in the user profile. The dialogue system typically is a process of elicitation of user requirements. The quality of the resulting request is most essential for the quality of the re- sponse that will be given by the system. 130 Chapter 8. Query enrichment by user preferences

Figure 8.2: The Dialogue System

8.4.2 The Query Interpreter

The query interpreter (QI, see Figure 8.3) interprets the user query sq that is received from the dialogue system. QI enriches this query by extracting and fetching profile information from the User Profile Repository and context infor- mation from the Context Repository. After completion, the QI forwards the enriched query qr to the matchmaker.

Figure 8.3: The Query Interpreter

8.4.3 The Matchmaker

The matchmaker M will match the enriched query qr with the services be- ing offered, using the Services Repository and the Knowledge Repository (see Figure 8.4). From the Knowledge Repository the candidate diseases and their treatments are selected based on the enriched query. The Services Repository then is used to find services such as take care of the delivery of the required medicines. The matchmaker will try to find a compound service that is of sufficient quality. If in doubt, the matchmaker may address a request for extra information to the query interpreter. If the query interpreter cannot answer the question by itself, then it will address an additional request to the dialogue system, or it will forward a request to the supporting expert center (a center consists of a group of specialized doctors and nurses in order to give health assistances on phone or face-to-face).

Figure 8.4: The Matchmaker 8.5. Preference Expressions 131

8.5 Preference Expressions

Personalized service discovery is designed to provide services that match a user’s personal interest and thus provide more effective and efficient services discov- ery. A key feature in developing successful service discovery is to build a profile that accurately represents the preferences and interests of the user. User pref- erences are typically incomplete and, our knowledge of them is imperfect and partial [KI10]. We first will describe a preference modeling method, and then discuss how this is involved in the matching process. According to Kießling [Kie02], see also [KEW11], (i) Preferences are per- sonalized wishes; (ii) There may consist incomparable items; (iii) ”Better than” may be defined qualitatively and quantitatively; (iv) Preferences may be com- plex, covering multiple attributes; (v) Preferences may come from different, even conflicting sources. According to [BBD+04], based on [KH76], a preference ranking is a total order  on a set of outcomes O, where o1  o2 is interpreted as: the decision maker prefers the outcome o2 above o1. The outcome o2 is strictly more preferred than o1, o2 is strictly more preferred than o1) if and only if o2  o1 but o1 6 o2 or o1 ≺ o2, when o1  o2 ∧ o2 6 o1. The decision maker is indifferent to o1 and o2, denoted as o1 ∼ o2, when o1  o2 ∧ o2  o1 or o1 6 o2 ∧ o2 6 o1. In this chapter we will choose ≺ as the base order relation. In this section, we first introduce the relational model as a mechanism to describe for some application domain the relevant concepts, their relations and their properties. In the line of relational algebra, we then use this conceptual description to describe preferences. Finally we show how CP-Nets can be used as a graphical support to describe preferences.

8.5.1 The Relational Model In the relational approach, an application domain is described by recognizing the relevant categories of things [WAB+10], how they are described by attributes (measurable properties recognized in the application domain) and how they re- late to each other. Let A be the set of attributes. Each attribute A has associ- ated a domain Dom(A) of possible values. Following conventions from relational algebra [Mai88], we will adopt the term relational scheme to refer to a set of attributes. Let R be a relational scheme, then R ⊆ A. The domain Dom(R) of a relational scheme R is defined as the set of all possible mappings from attributes onto adequate values:  Dom(R) = f : R → Values ∀A∈R [f(A) ∈ Dom(A)] A relational model R = hA, Dom, T , Ri of an application domain consists of: • a set A of attributes, and a function Dom assigning elementary domains to these attributes. • A set T of base tables. Each base table describes a specific category of things recognized in the application domain. Each base table consists of a unique name and a relational schema. 132 Chapter 8. Query enrichment by user preferences

• A set R of population rules, also referred to as constraints. In the re- lational model, functional dependencies, multi-valued dependencies, keys and foreign keys are the most common constraints. Other constraints are expressed in terms of relational algebra.

Each state of the application domain is represented by a (unique) population of the base tables such that the population rules are satisfied. Let Pop be a population of relational model R, then we have for the induced population Pop(T ) of each base table T : Pop(T ) ⊆ Dom(R).

8.5.2 Preferences In this chapter we will roughly follow the approach by [Kie02], but introduce the model slightly different, and in a more formal way. Preferences will be defined in the context of a relational model R = hA, Dom, T , Ri. A preference P involves a set Attrs(P ) of attributes and induces a strict partial order ≺[P,T ] on each population Pop(T ) for each base table T = hN,Ri such that Attrs(P ) ⊆ R. This allows us, in contrast to [Kie02], to make preferences population-dependent. Later we will see how preference expressions are constructed and how the induced partial order is derived from these expressions. Therefore we will use ≺[P ] rather than the table-dependent notation ≺[P,T ] .

8.5.3 Conditional Preference A preference may be restricted to some set of states. Following the Evening Dress example taken from [BBD+04], the preference of the suit color is different for the various combinations of the color of the jacket and the pants. In general, let D be a relational algebra condition describing the domain condition, and P be a preference. Then D  P is a conditional preference over attributes Attrs(P ), that induces a strict partial order ≺[P,T ] on each population Pop(T ) satisfying condition D (or: Pop(T )  D) according to the preference expressed in P .

x ≺[D  P ] y , D(x) ∧ D(y) ∧ x ≺[P ] y

8.5.4 Preference Formalism A strict partial order is a binary relation that is irreflexive and transitive:

1. Irreflexive: ¬ x ≺[P ] x 2. Transitive: x ≺[P ] y ∧ y ≺[P ] z ⇒ x ≺[P ] z

Note that strict partial orders do not have cycles, since x ≺[P ] y ∧ y ≺[P ] x by applying the transitivity rule would lead to a violation of the irreflexivity rule. An order relation is called total if each two elements are comparable:

x ≺[P ] y ∨ y ≺[P ] x ∨ x = y (8.1) 8.5. Preference Expressions 133

The order relation ≺[P ] in general will not be total. We will call x and y incom- parable by order relation ≺[P ] , denoted as x ∼[P ] y when neither preference holds:

x ∼[P ] y , ¬ ( x ≺[P ] y ∨ y ≺[P ] x )

We also introduce the following non-strict partial order:

x [P ] y , x ≺[P ] y ∨ x[Attrs(P )] = y[Attrs(P )] where f [A] is the restriction of function f to domain A. This defines a partial order. Preferences also provide an strict partial order on larger domains. Let P be a preference, and let x and y be functions defined on domain B ⊇ Attrs(P ), then

x ≺[P ] y , x[Attrs(P )] ≺[P ] y[Attrs(P )]

If x ∈ Dom(B) and B ⊇ A, then the functions x[A] and x[B − A] can be com- bined: x[A] ∪ x[B − A] = x. We will prefer to use the join operator to denote this combination: x[A] ./ x[B − A] = x.

8.5.5 Base Preference Constructors

Each relational scheme R has associated ∅R as empty preference. This prefer- ence induces on relational scheme R (i.e., Attrs(∅R) = R) the following strict partial order on Dom(R):

x ≺[∅R] y , false

It is easily verified that the binary relation ≺[∅R] ⊆ Dom(R) × Dom(R) is a strict partial order on Dom(R). We will write ∅ rather than ∅R when R is obvious from the context. Let A be an attribute, then the following expressions are (atomic) preferences with attribute set A :

• Explicit enumeration: EXPL(A, hEi), where E is an expression generated by the following syntax diagram (also referred to as rail diagram, see [Wir73]):

Exp

Val   ( Exp )     ,     134 Chapter 8. Query enrichment by user preferences

An explicit enumeration scheme is a special way to denote any concrete (final) preferential structure. The associated preference relation is defined by:

x ≺[EXPL(A, hE + +F i)] y , (x = E ∧ y ∈ F ) ∨ (x ∈ E ∧ y ∈ F ) ∨ x ≺[EXPL(A, hEi)] y ∨ x ≺[EXPL(A, hF i)] y

• Minimal value: LOWEST(A, <). assuming Dom(A) is (partially) ordered by relation <. This preference indicates that a smaller value is preferred above a larger value:

x ≺[LOWEST(A, <)] y , y < x We will omit the ordering relation when it is obvious from the context, and write LOWEST(A).

• Utility based: Util(A, u). Let u be a real-valued (utility) function based on the set A of attributes, then Util(A, u) is a preference with attribute set A expressing that tuples are preferred according to their utility value.

x ≺[Util(A, u)] y , u(x[A]) < u(y[A])

8.5.6 Combining Preferences

Let P be a preference, then REV(P ) also is a preference, reversing the preferential order ≺[P ] induced by P , with the same attribute set: Attrs(REV(P )) = Attrs(P ). Preferences P1 and P2 may be combined by intersection aggregation or its weaker variant as follows.

1. Intersection aggregation: P1 ./ P2, defined as:

x ≺[P1 ./ P2] y , x ≺[P1] y Z x ≺[P2] y

where a Z b has outcome true if both a and b are true, and is undefined otherwise. So this operator yields those cases where P1 and P2 agree on their preference.

Algorithm 3. Intersection aggregation

1: if x ≺[P1] y then 2: return x ≺[P2] y ; 3: end if 8.5. Preference Expressions 135

2. Weak intersection aggregation: P1 £ P2, defined as:

x ≺[P1 £ P2] y , x ≺[P1] y Z x [P2] y The difference with the previous case is that the second preference is al- lowed not to agree when the tuples are the same on Attrs(P2).

Algorithm 4. Weak intersection

1: if x ≺[P1] y then 2: return x [P12] y; 3: end if

It is also possible to make a prioritization between preferences P1 and P2:

3. Predilection: P1 & P2, defined as:

x ≺[P1 & P2] y

, x ≺[P1] y Y x ≺[P1 ./ P2] y

where a Y b has outcome true if either a is true or a is undefined and b. In this case preference P1 has priority above preference P2. Only when P1 does not express a preference for values x and y, preference P2 is used.

Algorithm 5. Predilection

1: if x ≺[P1] y then 2: return true;

3: else if ¬y [P1] x then 4: return x ≺[P2] y ; 5: end if

For convenience we will introduce a case distinction mechanism:

4. Case distinction: D  P1 | P2, defined as:

D  P1 | P2 , (D  P1) ./ (¬D  P2)

The preferences P1 ./ P2, P1 £ P2, P1 & P2 and D  P1 | P2 all have attribute set Attrs(P1) ∪ Attrs(P2). It is easily verified that in all cases the resulting relation is a strict partial order on Attrs(P1) ∪ Attrs(P2).

8.5.7 Properties and Derived Operators

Preferences P1 and P2 are equivalent when they induce the same ordering over their attribute domain:

P1 ≡ P2 , ≺[P1] = ≺[P2] Some obvious properties are: 136 Chapter 8. Query enrichment by user preferences

1. ./ is idempotent, symmetric and associative. 2. £ is idempotent and associative. 3. & is idempotent and associative. 4. ./ and & are distributive. Some other operators defined by [Kie02] can be derived from the other operators:

1. Maximal value: HIGHEST(A, >). HIGHEST(A, >) , REV(LOWEST(A, <))

2. Positive affirmation: POS(A, S). POS(A, S) = EXPL(Dom(A) − S, S).

3. Negative affirmation: NEG(A, S). NEG(A, S) , EXPL(S, Dom(A) − S).

4. Best value: AROUND(A, d, a). Assuming a binary function d over A, this preference indicates that a value closer to a is preferred above a value further away. Let x

5. Equally important: P1 ⊗ P2. P1 ⊗ P2 , (P1 £ P2) ./ (P2 £ P1).

Example Suppose a patient is allergic for the medicine aspirin, and favorably responds on a dose around 0.5 for blood pressure medicine X. The patient responds best on therapy T1, and otherwise T2 also worked well. Then we have the following elementary preferences:  P1 NEG(medicine, aspirin )

P2 AROUND(X, 0.5)

P3 POS(therapy, hT1i)

P4 POS(therapy, hT2i)

The preference P1 is essential, and dominates the others. The preference of this patient corresponds to the preference expression:

P1 & ((P3 & P4) ./ P2)

8.5.8 Displaying Preferences as CP-Nets CP-nets form an elegant representation mechanism for special sets of conditional preferences. We follow [BBD+04], but adapt their definitions to our context. A CP-net is a directed graph G = (N,E, CPT) with a set N of nodes and a set E of (directed) edges. A node will be a set of attributes. Let Parents(V ) be the set  W ∈ N (W, V ) ∈ E of parents of node V . Each node V is annotated with a set CPT(V ) of conditional preferences of the form φ  P where 8.5. Preference Expressions 137

1. φ is a condition over the attributes ∪ Parents(V ) from the parents of node V .

2. P is a preference with attribute set V .

We follow the evening dress example given in [BBD+04]. Depending on the color of the shirt (S), the user has different preferences for the color of the pants (P ) and the color of the jacket (J).

I unconditionally prefer black to white as a color for both the jacket and the pants, while my preference between the red and white shirts is conditioned on the combination of jacket and pants: if they have the same color, then a white shirt will make my outfit too colorless, thus I prefer a red shirt. Otherwise, if the jacket and the pants are of different colors, then a red shirt will probably make my outfit too flashy, thus I prefer a white shirt.

So in this example we have the following attributes: A = S, P, J , and a single table D with relational scheme A. The user preference B can be expressed using conditional preferences as follows:

B = EXPL(J, hwhite, blacki) ./ EXPL(P, hwhite, blacki) ./ J = P  EXPL(S, hwhite, redi) ./ J 6= P  EXPL(S, hred, whitei)

This preference relation induces an ordering ≺[B] of the tuples for any population of table D. The example can be describe as a CP-net with nodes J , P and S , and both an arrow from J to S and an arrow from P to S . Node S has associated the following conditional preference set:

 CPT( S ) = {J = P  EXPL(S, hwhite, redi), J 6= P  EXPL(S, hred, whitei)}

Note that both nodes J and P are root elements, so they both have an empty parent set. A condition over an empty set is assumed to be true. For a root the conditional preference set has a single preference, providing an overall order over its attribute set.  CPT( J ) = {True  EXPL(J, hwhite, redi)} = {EXPL(J, hwhite, redi)} CPT(P ) = {EXPL(J, hwhite, redi)}

This is represented graphically in Figure 8.5, where we use the notation Av as a shorthand for A = v where A is an attribute and v an attribute value. 138 Chapter 8. Query enrichment by user preferences

Figure 8.5: CP-Net for “Evening Dress”, using preferences

8.6 The preferential Similarity Model

8.6.1 Preference and SQL

For the case of SQL the relevancy operator has a binary result: a tuple either satisfies the restriction (WHERE-clause), or otherwise (false or undefined result) the tuple is not selected. This is the initial result of the query. Then, according to [KEW11], the effect of the preference operator is that only those tuples are chosen that are not preferred by an other tuple from the initial result. Formally:

 TopsP (A) , x ∈ A ¬ x ≺[P ] A where x ≺[P ] A abbreviates ∃y∈A [ x ≺[A] y ]. Later we will also use A ≺[P ] B to denote ∀x∈A [ x ≺[P ] B ].

Figure 8.6: A preference graph of database tuples

In the case of Figure 8.6 only tuples x3 and x5 are retrieved, so Tops (A) =  P x3, x5 .

8.6.2 Fuzzy Matching

Rather than the exact match of SQL, we have a fuzzy match operator in the case of Information Retrieval. In Figure 8.7 all nodes have associated their relevancy score. 8.6. The preferential Similarity Model 139

Figure 8.7: A preference graph with relevancy scores

Given a set A we select the set CandP (A) of best candidates as follows. We introduce the preference layers Li for a set of node A with preference relation P as follows:

G−1 = A

Li = TopsP (Gi−1)

Gi = Gi−1 − Li

The set Ci of best candidates in each layer is obtained as:

Ci = TopsP (Li)

So for the example of Figure 8.7 we have:

  L0 = x3, x5 G0 = x1, x2, x4   L1 = x2, x4 G1 = x1  L2 = x1 G2 = ∅

Note that

Lemma 8.6.1 Li ≺[P ] Li−1 for i > 0.

The series Li and Gi are converging. This is expressed by the following property:

Lemma 8.6.2 Gi 6= ∅ ⇒ Gi+1 " Gi

Let k = argmaxiGi 6= ∅, then we have the layers L0,...,Lk. The most attractive candidate form the first layer (L0) obviously is the highest relevant element of this set. In the other layers there may be internal preference relations. For example in L1 we see that x2 is preferred above x4. The selection algorithm we propose is a recursive algorithm. So the best candidates in this layer are CandP (L1). The result of CandP (A) is the set C0 ∪ ... ∪ Ck of best candidates at each preference level. 140 Chapter 8. Query enrichment by user preferences

Algorithm 6. Finding top elements

fun Tops (Pref P, Set X) : Set Set R = EmptySet; foreach x in X do Boolean found = True; foreach y in X do if P(x,y) then found = False; break; fi od if found then R += x; fi od return R endfun

Algorithm 7. Finding next layer

fun NextLevel (Pref P, Set G) : Set Set L = Tops (P, G); return (L, G-L) endfun

Algorithm 8. Finding best candidates

fun Cand (Pref P, Set A) : Set Set L = Tops (P, A); Set G = L; Set R = L; while NotEmpty (G) do (L, G) = NextLevel (P, G); R += Tops (P, Cand (P, L)); end while return R endfun

8.6.3 Choosing Among the Candidates In our case of automatic service discovery, our starting position is a need formula- tion (query) q and a preference formulation P . For each service Sim(q, S) will ex-  press how relevant service S is for query q. Let Simθ(q, S) = S Sim(q, S) > θ be the set of (sufficiently) relevant services for some threshold θ. Using the selec- tion method of the previous subsection, we obtain the set of candidate services CandP (Simθ(q, S)). To make a selection between these candidates, a balance between relevance and preference has to be made. The following table shows the dilemma of the situation: 8.7. Applying in the e-Health Case 141

Relevant yes no yes High quality! Nice but useless Preferred no Relevant but.. Not interesting In some applications it may be possible to reduce the dimensionality of this problem by defining a utility function that combines relevancy and preference score of a service into a single utility score for that service. In that case the services can simply be ordered according to their utility score. In our health application such a utility function does not seem to exist. Another option is to reduce the dimensionality by expressing relevance in terms of preference. That may be done by equipping each service A with a special attribute REL indicating its relevance score Sim(q, S). This basically brings us back to the situation of Figure 8.6. From the system point of view, each of the optimal services is a best solution. For example, suppose each service has an attribute COST describing its cost, and our preference is the service with the highest relevancy but the lowest cost. Then this is expressed as:

HIGHEST(REL)& LOWEST(COST)

Example Suppose our patient from the example in Section 8.5 wants the treatment to be as good as possible. This is expressed as:

P1 &(HIGHEST(REL) ./ (P3 & P4) ./ P2) In more complex applications, there is no such rule to reduce the dimension- ality of our decision problem in either of the above ways. This seems the case in our health application. Then we roughly have the following two opportunities: 1. The health worker (and patient) is involved in the selection procedure, by letting the health worker (patient) decide between the proposed candidates CandP (Simθ(q, S)). 2. Use a data mining system for learning the best preference expression. In our situation the most obvious choice is the first (at least for the time being).

8.7 Applying in the e-Health Case 8.7.1 Symptoms and Diseases In a medical diagnosis situation as encountered by the Matcher in Figure 8.1, we have a diagnosis (a set of symptoms), a set of treatments and a set of risks. An enriched query is an pair hid, q, P i where id is the patient id, q is the set of symptoms that have been reported for this patient and P the preferential expression that combines the user profile and the contextual information. Each disease d is characterized by one or more sets of symptoms. For convenience we identify the set of symptoms with the disease. As a first step, the symptoms from q are matched with the characteristics describing the diseases. 142 Chapter 8. Query enrichment by user preferences

1. A most simple comparison is counting the commonality between symptoms q and d: Sim0(q, d) = |q ∩ d|. 2. The commonality may be normalized against the generality of request and disease, for example as defined by Jaccard’s Measure: |q ∩ d| Sim (q, d) = J |q ∪ d| . 3. A more advanced similarity measure assumes both q and d to be fuzzy sets. The cosine measure computes the similarity as follows: q • d Sim = cos kqk · kdk P where x • y = s∈S x(s) · y(s) is the inner vector product and kxk = pP s∈S x(s) the length of x (seen as a vector). We will use Sim(q, d) as a generic denotation for the similarity function.

8.7.2 Treatments and Risks Given an (enriched) query hid, q, P i, the similarity with each disease d is evalu- ated using similarity function Sim(q, d). As a result, we have a relevancy score for each treatment together with a preference order. Each treatment comes with risks. The CP-net in Figure 8.8 describes the conditional preferences of risks for each treatment.

Figure 8.8: CP-net for symptoms, treatments and risks   As an example, we assume each variable has 2 values, S1,S2 , T1,T2 and  R1,R2 respectively. Figure 8.9 shows the preferences of patients condition using conditional preference networks (CP-net) [BBD+04]. The preference for symptoms is derived from matching with the enriched query q against the symp- toms. This is done using the matching function Util(S) = Match(q, S). We assume that in this example, the resulting preference relation is S2 ≺[Util(S)] S1 . 8.7. Applying in the e-Health Case 143

So, in this preference network, S1 is preferred above S2 since S1 requires urgent intervention, and the corresponding treatment T1 is preferred above T2. Similarly in case of treatment T1 risk R1 is preferred above R2 which has low/less side effects for that treatment.

Figure 8.9: Patient preferences The patient diagnosis is matched against symptoms, of rather combinations of symptoms(see Figure 8.10) that define a typical disease pattern. Each such combination has associated a preferential ordering on treatments. The condi- tional preference relates this combination of symptoms to the preference relation on treatments. Each treatment has associated risks, which are ranked using a preferential ordering relation.

Figure 8.10: Symptoms entered by the user 144 Chapter 8. Query enrichment by user preferences

8.8 A Case Study

In this section we discuss the case of patient Martha as described in the intro- duction. The structure of this section is as follows (see Figure 8.11):

Figure 8.11: Framework for the example 1. First we discuss in Section 8.8.1 a session with the Dialogue System (see Figure 8.1). 2. Then in Section 8.8.2 we describe the relevant Knowledge and Service Repository (see Figure 8.1) as input from medical theory. (step A in Fig- ure 8.11). As described in Section 8.7 we will describe this repository as a CP-Net. 3. In Section 8.8.3 we show how Martha’s request is translated by the Query Interpreter into an enriched query. (step B in Figure 8.11). According to our approach, the original query is enriched by a personal and environ- mental preference relation related to the case of the query. 4. In Section 8.8.4 we discuss the Matchmaker using this extended query and the associated medical knowledge. Furthermore, in this section, we apply the method described in Section 8.6.2 to explain the advice given by the system as described in Section 8.8.1.

8.8.1 The Interaction with the Dialogue System We consider the following situation: Martha is 6th months pregnant. She is on HIV/AIDS regimen; currently she shows some signs of malaria. So she contacts the health post via the mobile architecture (see Figure 8.1), and enters her question, being: 8.8. A Case Study 145

I am HIV positive for the last 2 years. I am taking the first line regimen which includes ZDV, 3TC and NVP since five months. Two days ago I am diagnosed P.falciparum malaria. I am 2 months preg- nant. Which antimalarial drug is appropriate for me and for the fetus? Does this antimalarial drug have any complication with the antiretroviral drug that I am taking?

Having the aforementioned information from the patient, the query inter- preter gathers additional information from the user profile and user context. After it compiles and enriches the user query with additional information such as previous illness, previous medication, any adverse effects (if any) especially allergic, then the query interpreter forwards the enriched query to the match- making. The matchmaking looks for services in the repository which can match the request of the user considering the user preferences and contexts mentioned in the query. Based on Martha’s request, the system recommends the following combina- tion of medicines:

The advised treatment is the combination of ZDV, 3TC, NVP and Qui, provided Martha is not anemic and there is no suspect of hepatitis B.

8.8.2 The Knowledge and Service Repository

We first introduce in this subsection the preferential model that explains the sample session of the above subsection. In the next subsection we will explain the sample session in terms of this model. The preferential model in this case covers the combination of antiretroviral drugs with antimalarial drugs against pregnancy. This model is based on: 1. (medical) conditions or symptoms: these are the base elements of our queries 2. treatments: these correspond to the services and 3. risks, see Table 8.1 for an overview. Symptoms, treatments and risks are categorized as follows:

• Symptoms (S) We restrict ourselves to HIV ∧ PfR combinations. For such combinations, we again restrict ourselves to the presence of the combination of symptoms Anm ∧ Hep, and then distinguish between the state of pregnancy: Preg1 or Preg2. This leads to (see Figure 8.12 for a decision tree representation):

– S1 = HIV ∧ PfR ∧ ¬(Anm ∧ Hep) ∧ Preg1 – S2 = HIV ∧ PfR ∧ ¬(Anm ∧ Hep) ∧ Preg2 – S3 = HIV ∧ PfR ∧ Anm ∧ Hep ∧ Preg1 – S4 = HIV ∧ PfR ∧ Anm ∧ Hep ∧ Preg2 146 Chapter 8. Query enrichment by user preferences

Table 8.1: Model summary

Symptoms Treatments Risks Preg pregnancy ZDV StB stillbirth st Preg1 pregnancy (1 trimester) TDF Cmal congenital st Preg2 pregnancy (above 1 3TC malformation trimester) FTC HypS hypersensitivity Mal malaria NVP Vfail virological failure HIV HIV positive Chl chloroquine Renal renal damage Anm anemia Qui quinine CNS central nervous Hep hepatitis B Coa coartem system AuND auditory nerve damage Lop Lopinavir Tera teratogenicity HPL hypoplasia of the optic EFV Efavirenz nerve NVP Nevirapine AP PfR P.falcipuram resistent area NNRTI NRTI

HIV ∧ PfR

¬(Anm ∧ Hep) Anm ∧ Hep

Preg1 Preg2 Preg1 Preg2

S1 S2 S3 S4

Figure 8.12: Classification of Symptoms

• Treatments (T) Treatments are offered in cocktails. For our example we restrict to HIV- related cocktails of medicines. Each cocktail has Qui as a base component. Then it may contain 3TC or FTC. Furthermore, there is a choice between NVP and EFV. This leads to (see Figure 8.13 for a decision tree representa- tion):

– T1 = Qui ∧ 3TC ∧ ZDV ∧ NVP – T2 = Qui ∧ 3TC ∧ ZDV ∧ EFV – T3 = Qui ∧ 3TC/FTC ∧ TDF ∧ NVP – T4 = Qui ∧ 3TC/FTC ∧ TDF ∧ EFV 8.8. A Case Study 147

Qui

3TC ∧ ZDV 3TC/FTC ∧ TDF

NVP EFV NVP EFV

T1 T2 T3 T4

Figure 8.13: Classification of Treatments

• Risks (R) Risks come in groups. For our example the following groups are relevant:

– R1 = StB ∧ Cmal – R2 = HypS ∧ Vfail ∧ Renal – R3 = CNS ∧ Tera – R4 = Anm ∧ Hep

For each symptom group, there is a preferential order of the cocktails. For each cocktails there is an ordering of the groups of risk. For example, in case of symptoms S1, treatment T1 is to be preferred above the other treatments, while there is no preference for T2, T3 or T4. Similar rules hold for the other symptom groups. This leads to:

 S = S1  POS(T, T1 )  ./ S = S2  POS(T, T2 )  ./ S = S3  POS(T, T3 )  ./ S = S4  POS(T, T4 )

The likelihood of risks associated with a treatment also is described as a prefer- ential expression:

T = T1  EXPL(R, h(R4,R3,R2),R1i) ./ T = T2  EXPL(R, h(R4,R3,R1),R2i) ./ T = T3  EXPL(R, h(R4,R1,R2),R3i) ./ T = T4  EXPL(R, h(R1,R2,R3),R4i)

Figure 8.14 depicts the preference ordering for S1 with treatments and poten- tial risks using CP-nets. The figure below ( 8.14) shows the preference ordering of S1 from the least preferred combination S1 ∧ T1 ∧ R4 to the most preferred S1 ∧ T1 ∧ R1. 148 Chapter 8. Query enrichment by user preferences

Figure 8.14: The sample medical knowledge CP-net We use preference relations to describe the combination symptoms, treat- ments and risks. An overview is shown in Table 8.1. The rules for using these medicines in combination are formulated as the following preferential expres- sions. These expressions are based on [WHO10a].

1. Preg  NRTI ./ (ZDV ⊕ 3TC)&NNRTI ./ NVP

2. PfR  Chl  (AP £ NNRTI £ NRTI)

3. True  Qui ./ (Lop £ EFV £ NVP) In the next subsections we will show how this preferential expression led to the advice given to Martha.

8.8.3 The Enriched Query We return to the sample session of Section 8.8.1. From the description the matchmaker can derive the following:

1. Martha is HIV-infected and she is on antiretroviral regimen; so both HIV and ART are set to true.

2. Martha is pregnant, so Preg is set to true.

3. Martha is diagnosed malaria positive, so Mal is true.

Summarizing, we have the following request q for Martha:

q = HIV ∧ Preg ∧ ART ∧ Mal 8.8. A Case Study 149

In the process of enriching the user query, the prototype collects individual and domain knowledge information. The individual knowledge as depicted in Figure 8.15 consists of behavior (e.g. history of illness, current symptoms, ), de- mography (age group), preference (medication types, medication time, allergic information) and context (location, season, level of illness etc) (includes environ- mental context ) and the domain knowledge which consists of disease, treatment and risks. Gathering all this information helps to widen the scope of enriching user query and assists in providing valuable search results.

Figure 8.15: Knowledge sources to enrich a query

8.8.4 Explaining the Sample Session This query is matched to the symptom groups. The similarity is computed as the fraction of the commonality and the generality of the query and symptom group. For example, the commonality between q and S1 equals 3.5 since they have (1) HIV in common, (2) pregnancy partwise in common and (3) the absence of Anm and Hep in common. The generality equals 7 since there are 7 symptoms involved (considering Preg and Preg1 as the same symptom). So the similarity is evaluated as 3.5/7 = 0.5 Consequently Martha will be matched to the symptoms classes as follows: class description score S1 HIV ∧ PfR ∧ ¬(Anm ∧ Hep) ∧ Preg1 0.50 S2 HIV ∧ PfR ∧ ¬(Anm ∧ Hep) ∧ Preg2 0.50 S3 HIV ∧ PfR ∧ Anm ∧ Hep ∧ Preg1 0.21 S4 HIV ∧ PfR ∧ Anm ∧ Hep ∧ Preg2 0.21 Each symptom group has its preferential list for treatments. For example, group S1 has the following preferences for treatments: EXPL(T, h(T2,T3,T4),T1i). By applying Algorithm 6 we find T1 and T2 as the best candidates. This leads to the advice from Section 8.8.1:

The advised treatment is the combination of ZDV, 3TC, NVP and Qui, provided Martha is not anemic and there is no suspect of hepatitis B. 150 Chapter 8. Query enrichment by user preferences

The purpose of this validation section is to show how our theory is being applied. Based on the expression in 8.8.2, the above combination (ZDV+ 3TC+ NVP+ Qui) is advised for Martha, but the administration of these drugs should be under the close monitoring of healthcare workers (nurses or physicians).The advise given is: ZDV ∧ 3TC ∧ NVP ∧ Qui, provided Martha is not anemic and there is no suspect of hepatitis B. Using the classification of previous Section (8.8.2) and the preference relation, we come to the following:

1. Chloroquine is an antimalarial drug but it is found resistance for P.falcipuram, therefore chloroquine for Martha is not provided. So Chl is false for treating P.falcipuram.

2. Martha is living in a P.falcipuram resistent area. So PfR is set to true.

3. Coartem is not given in first trimester, so Coa is false in the first trimester of pregnancy

The resulting query thus is:

Preg ∧ HIV ∧ Mal extended with the preferences:

PfR ∧ Qui ART ∧ (ZDV ⊕ 3TC) ∧ NVP AGE

Considering the current symptoms, previous history, current and previous med- ication as well as pregnancy the following medicines are found to be relevant:

1. ZDV ∧ 3TC ∧ NVP ∧ Qui if the woman is non-anemic. Otherwise, since patients with anemia or hepatitis B are more likely receiving regimens containing TDF, the following medications are relevant:

2. TDF ∧ FTC ∧ NVP ∧ Qui

3. d4T ∧ 3TC ∧ NVP ∧ Qui

In the next subsection, we see how the system finds the most preferred medica- tion among these three options. We identify symptoms, treatments and risks from Martha’s query. According to Martha’s request S1,T1,R1 is the preferred treatment and has low risk for the symptoms S1. Next we apply the techniques described in Section 8.6.2. The combinations of antiretroviral and antimalarial drugs with the potential risks or adverse effects is presented in Table 8.1. Based on WHO first line regimen recommendation, we 8.9. A Prototype 151 try to map these regimens with antimalarial drugs to be used in pregnancy. The result recommended by the system in Section 8.8.1 is derived by considering users request from the repository. ZDV ∧ 3TC ∧ NVP ∧ Qui is recommended for Martha’s case is: • ZDV ∧ 3TC is recommended for pregnancy (ZDV prevents HIV virus trans- mission to the child). • NVP ≺[P ] EFV since EFVcannot be used in first trimester of pregnancy as well as causes severe central nervous system toxicity and Potential terato- genicity. • Qui ≺[P ] Chl&Coa, because P.falciparum is a severe malaria and chloroquine is resistant for P.falciparum in the area where Martha lives. Coartem is recommended for uncomplicated malaria [WHO10b] and coartem should be avoided in the first trimester. • ZDV ≺[P ] d4T since d4T has high toxicity and has long term side-effects; ZDV ≺[P ] ABC , ABC has a risk of hypersensitivity • ZDV ≺ [P ] TDF , since TDF can cause renal damage as well as Risk of nephrotoxicity • 3TCor FTCis preferred for low toxicity and and high efficacy. • TDF∨d4T∨ABC ≺[P ] ZDV, if the pregnant woman is anemic or has hepatitis B.

8.9 A Prototype

To validate the preference model presented in the previous sections, we have developed a prototype that enriches user queries by adding personal information from the user profile, user context and domain knowledge. The interface asks the user their ID and the symptoms (as presented in Figure 8.16) that describes their situation. The prototype enriches a user query as follows: (1) the dia- logue system (the user interface) sends a request to the query interpreter. The request contains user identification and list of symptoms. (2) After receiving the request, the query interpreter performs the following tasks: (a) personal- ize the request by adding patient’s profile, consisting of user demography (age and gender), patients’s history (illnesses, medication, and diagnosis), patient’s preferences (injection, tablet, etc.) and user context (location, season); (b) add medical information from the medical knowledge repository onto the query. The repository contains information about diseases, symptoms, drugs, side effects, conflicting drugs and drug costs. Finally, the enriched query (that contains symptoms, user profile, user context and domain knowledge) will be send to the matchmaker. After the completion of the query enrichment process, the next step is match- making. Firstly, the prototype provides a symptom score for each candidate disease; then the prototype checks for associated diseases. In addition, the pro- totype checks whether the candidate disease is common in the given location and if it is seasonal. After obtaining the possible diseases, the prototype lists the possible treat- 152 Chapter 8. Query enrichment by user preferences

Figure 8.16: Screen shots of the prototype ments. Then the prototype performs the following tasks:

• List candidate drugs and phases of the drugs;

• select non-allergic drugs;

• identify conflicting drugs;

• when the patient is currently on medication, it removes the corresponding drugs from the lists of the candidate drugs;

• scrutinize the user preferences from the database especially on drug adher- ence (injection, capsule or tablet, syrup etc), and calculate the risks and cost of the drugs;

• determine dosage based on patient’s age and weight.

• Finally, the prototype lists the potential treatments.

For example: A 40 years old man has the following symptoms for the last four days: headache, high fever (39.5 degree Celsius and above), loss of appetite, diarrhea and a feeling of being weak (lethargy). As it is shown in Figure 8.17 the prototype displays three possible diseases, symptoms score (P.vivax 2 symptoms, P.falciparum 1 symptom, and typhoid fever 5 symptoms). The prototype checks out if the disease is local, seasonal as well as if it has associated disease or not. For each selected possible disease, possible treatment(drug) are listed; in the meantime different scores are computed (e.g. symptom score: the number of 8.10. Conclusions and Future research 153 symptoms given by the user and the number of symptoms of the disease); in addition the dosage of the drug, cost, preference and risk scores are listed (see Figure 8.17).

Figure 8.17: List of possible diseases and possible treatment for typhoid fever

8.9.1 Evaluation To evaluate our prototype and preference model we administered questionnaires for healthcare workers in Ethiopia and in the Netherlands. The questionnaires consist of a number of cases, each describing a patient’s health condition and list of symptoms. Some of the cases also provide detailed information about patient’s personal information, previous history, context and list of symptoms. This information is designed to evaluate and test the accuracy of the system to predict the possible illness, possible treatment and expected risks and side effects of the drug prescribed. We did not yet process the resulting data,thus the result of the study will be published in the future.

8.10 Conclusions and Future research

In this chapter, we introduced the preference model to model user preferences. We discussed how these problems can be obtained from the user by interviewing or from the user history. Then we showed in Section 8.6 how the initial user query (user id and set of symptoms) can be enriched to involve the user prefer- ences, the user context and domain knowledge. In Section 8.6, we showed also how preferential matching can be performed. We also presented a prototype to demonstrate our approach. 154 Chapter 8. Query enrichment by user preferences

The medial decision making process is an example of advanced multi-criteria decision making. Future research many exploit the developed theory for such decision problems. Furthermore, the prototype should be further evaluated to show that the decision results from the system are compatible with health expert decisions. Chapter 9

User preference prioritization and aggregation

Abstract In this chapter we focus on the medical decision process. First we describe a general approach to multiple criteria decision making, with a special emphasis on the decomposition of such problems. We discuss two special approaches, the ordered weighting average and the analytical hierarchy process. Then we define the medical decision problem as a special case of multiple criteria decision making, in which we define three major subdecisions: diagnosis, risk handling and balancing. We pay special attention to personalization during balancing and show how personal preferences may lead to different treatments. This is applied on the medical diagnosis system TenaLeHulum that we introduced to be applied in low infrastructure situations such as is the case in developing countries. We show how our proposed model is being used in the context of treating HIV and malaria for pregnant women. Finally we discuss our next steps in developing TenaLeHulum.

9.1 Introduction

In modern computational technology many applications involve the task of mak- ing a selection from a set of alternatives based on the satisfaction level of various criteria. Due to the progress of technology, not only the number of alternatives may be enormous but also the number of criteria. For example, a search en- gine will be able to find many documents relevant for the given query. Google introduced the Using Periodic Table Of SEO Success Factors ([Lan]) that can be seen as a structured system of criteria. Other areas dealing with complex decision are e-health, e-commerce and e-learning. Central to this decision task is the aggregation of individual criteria satis- faction to obtain an overall score for each alternative. These aggregated values 156 Chapter 9. User preference prioritization and aggregation can then be used to select between the alternatives [Yag09]. A major problem is how to aggregate the results of a plethora of criteria. Especially when the aggregation involves a personal component also. Sometimes user preferences are clearly articulated, but it may also happen that user preferences provide an incomplete overview of how the criteria relate to each other. In this chapter we use Analytical Hierarchy Process ([Saa94]) for the first group of users, while we use Ordered Weighting Average ([Yag79]) when confronted with incomplete information. Making medical decisions based on patient preference is vital to provide personalized medical information. Different preferences may require different approaches to prioritize and aggregate the results from the different criteria. Aggregating and prioritizing preferences speeds up the process of personalized medical information retrieval. This chapter aims to address user preferences pri- oritization and aggregation in order to obtain individual healthcare information. The multi-criteria decision process in this work has emerged from an ap- plication in a system for a medical diagnosis support system ([TKW10a]) that the authors are developing to be applied in a low-infrastructure context. The decisions involved can be rather complex, for example, a patient and a doctor may follow a different decision process based on different relevance assignments to criteria, while doctor and patient may also use different criteria. A medical diagnosis system needs a robust and realizable decision making system. Preferences related to medical decision making form a crucial aspect in medical applications. Attributes related medical applications contains are a mixture of linguistic values [Fuj12]. We start from a general definition of the multi-criteria decision problem in Section 9.2 as found in literature. Then we introduce 2 decomposition mecha- nisms, providing effective means to decompose complex decision problems into smaller ones. We show that both AHP and OWA can be applied in the de- composition where they are best applicable. That allows us to give a generic definition of the medical decision process in Section 9.3. In a previous paper ([TW12]) we described the internal architecture of our system and proposed the use of preferential expressions to describe personal preferences. In this research we assume that the patient profile to be a preference expression over measurable criteria. In order to validate the working of this medical decision problem, we consider in Section 9.4 a typical medical problem case in the context of our intended application area: the combination of HIV, malaria and pregnancy. We start with an introduction to the problem domain and then show how the decision problem may be decomposed, containing a decision component for HIV treatment and a decision component for malaria treatment, that subsequently are combined as a typical doctor and a typical patient decision, and then combined to make an overall ordering of the possible treatments. Using data from a variety of sources to support the decision process, we show how the decision is take stepwise. Our results correspond to a reasonable extent with the recommendations of WHO. Differences are especially caused by the treatment prices that we also take into 9.2. Multiple Criteria Decision Making 157 account. The choice for this case is motivated by the following. The advent of the HIV/AIDS epidemic in Ethiopia has triggered investigations into interaction between HIV and other coexisting infections. Malaria is one of the common infection disease in Ethiopia. In this chapter we try to prioritize the treatment given for pregnant HIV-infected women who also suffered from malaria and administered for antimalarial. The prioritization of treatment for antiretroviral and antimalarial drugs for pregnant women reduces the risk of the mother and the fetus as well it minimize the risk of drug interaction. A study in Malawi showed that HIV and malaria infection caused a higher prevalence and density of Plasmodium falciparum parasitemia, also malaria infection increases HIV viral load. As a result treatment preferences should be a serious concern to avoid the potential drug interaction as well as the side effects of the drugs in the women and fetus. Results from previous research indicate that HIV-positive individuals on antiretroviral therapy are almost three times more likely to develop diabetes than people with HIV who are not taking antiretroviral. (http://www.aidsbeacon. com/news/2011/07/07/antiretroviral-therapy-may-be-linked). For more details of drug interaction of antiretroviral and antimalarial see 1. There is growing recognition that persons with multiple morbidities may be at increased risk of adverse consequences of medical therapy [FTA+11]. Fried et al. further elaborate that different disease-specific outcomes are difficult to compare to provide accurate decisions to administer therapy [FTA+11]. Prioritization between pairs of outcomes is a well accepted technique used to elicit preferences in decision support tools [FTA+11]. “Often we are faced with different situations where we have to make a choice and one choice can be better in one way and worse in another. This is called a trade off. Many people have had to make a decision that involves a trade off for their health” [FTA+11]. Lots of medical decisions have trade offs. Every treatment causes a certain side effects, so people have to decide either to continue to take the treatment or stop the treatment. The former would meant they would have to live with the medication side effects, but they would be lessening the disease, however, the later would mean that they would avoid the side effects caused by the treatment, but they would not lessening the risk of the disease. People facing this decision need to prioritize their preferences whether to suffer from the disease or live with the side effects come with the treatments.

9.2 Multiple Criteria Decision Making

Healthcare decision making conceptually is different from decision making in other fields. The main difference is that health is an irreplaceable and priceless good. Healthcare decisions have huge consequences on patients’s quality of life and society as a whole. As an example, granting access to a potentially harmful drug will undoubtedly put patients’ lives at risk. The opposite case is not without

1http://www.hiv-druginteractions.org/ 158 Chapter 9. User preference prioritization and aggregation consequences, as patients may be denied access to effective cures, which in turn may aggravate their health status [DCG13]. This unique feature makes it more difficult for health care decision makers to make the right choices. Many common clinical decisions involve complex choices. The difficulties in making evidence-based, patient centered decisions in a busy clinical settings and scarce human resources are well organized. One of the proposed solutions is the development and implementation of clinical search and decision support sys- tems. To be successful, such systems will have to help clinicians, patients and other stakeholders to make better choices when faced with complex decisions that involve trade-offs between the pros and cons of imperfect options, a mix of objective data and subjective judgments, and uncertain future outcomes [Dol10]. In general, multi-criteria decision making (MCDM) is a type of decision anal- ysis to support complex and multifaceted decision making that transparently incorporates multiple considerations into the decision making process. MCDM helps decision-makers to evaluate a finite number of alternative health care interventions under a finite number of performance criteria [Dol10]. The main goal of MCDM is to help decision makers to make a better choice by helping them to achieve greater understanding and insight into the decision they are facing [Dol10]. According to Dolan [Dol10, DBAI13] multi-criteria methods are designed to support decision making in complex circumstances identical to those posed by many common patient management decisions, they represent a potentially useful foundation on which to build new clinical decision support systems to facilitate the provision of evidence-based, patient-centered care. Multi-criteria methods can be categorized in several ways. When classified based on how the decision criteria are used, methods can be either compensatory or non-compensatory. Compensatory methods incorporate information from all the decision criteria whereas noncompensatory methods do not [Dol10]. Decision-making process has raised concerns about transparency, structure, and comprehensiveness, as it fails to explicitly incorporate patient preferences, unmet needs, and societal and ethical values.

9.2.1 Related Work One validated technique for Multi-criteria Decision Making (MCDM) is Saaty’s Analytic Hierarchy Process (AHP) ([Saa94]). Other commonly used tools for multi-criteria or multi-attribute decision analysis in health care are the elim- ination and choice translating reality (ELECTRE), the simple multi-attribute decision analysis technique (SMART), multi-attribute utility theory (MAUT), and conjoint analysis (also called discrete choice analysis) [BDF+05]. Exper- imental comparison have been made and concluded that each of the MCDA methods has its own advantages and disadvantages [Dol10]. Incorporating patient preference into treatment decisions is an essential com- ponent of optimal medical care [BDF+05]. Preference prioritization is one of the concepts given due attention in in- formation searching. There might be different alternatives or preferences that 9.2. Multiple Criteria Decision Making 159 required to be prioritized and ranked based on user’s situations and needs. The main aspect of prioritizing user’s preferences is to ensure users satisfaction and context satisfaction. Many scholars identified different techniques of user prefer- ences prioritization and aggregation [Yag12, Yag08]. Many applications involve the selection or ordering of a group of alternatives based upon their satisfaction to a collection of criteria [Yag08]. In the healthcare domain there are in general several treatment alternatives for a certain diseases. However, from the given different treatments we can select the appropriate one based on criteria as a result it is required to prioritize the treatment alternatives w.r.t. different criteria. Yager [Yag08] suggests aggrega- tion operators that allows for the inclusion of priority between criteria. Central to this approach is the modeling of priority by using a kind of importance weight in which the importance of lower priority criteria will be based on its satisfaction to the higher priority criteria [Yag08, CPDP12]. O’Connor et al., [OBW+87] study the impact of eliciting preferences on the alternative treatments of the patients. They used rating and voting techniques to elicit patients’ preferences for cancer treatments. To obtain or elicit treatment preference they found voting technique significant and effective. However, they do not aggregate the given preference alternatives. Treatment selection requires to consider different criteria to choose the most important criteria from the oth- ers. Therefore, decision making associates different importance weights with different criteria [YHNM11]. Several researchers use weighted aggregation oper- ators to model multiple criteria decision making [Yag08, CPDP12, YHNM11]. Wang et al. [WLH07] suggest weight-determining model for rank aggregation. Fields et al [FOA13] use triage prioritization to test the preference aggregation methods. The task of ranking a list of alternatives based on one or more criteria is encountered in many situations. Franco et al. [FMR13] suggest three preference modeling in terms of strict preference, its inverse and indifference. The inverse preference refers to the negative preferences. Preference prioritization technique could be used prior to decision making to screen for inconsistent individual preferences and to choose alternative treat- ments. These techniques may not only be useful when patients are actively involved in decision making about alternative treatments but also in the case where clinicians obtain informed consent from patients for risky procedures or treatments. The information about possible long term and short term changes in prefer- ences, values, and behavior over time will be useful to patients and families in understanding the impact that treatment has had on others like themselves.

9.2.2 The decision problem Yager [Yag08] pinpoints the problem of multi-criteria problems saying that there is a collection C of criteria and a set A of alternatives. This corresponds to a decision tree where the criteria correspond to the nodes at depth 1, while for each criterion the set of alternatives corresponds to its direct descendants. We will introduce the multi-criteria decision problem in the style of Uzoka et al 160 Chapter 9. User preference prioritization and aggregation

([UOBO11]). A multi-criteria decision A-problem (or MCDP(A)) is a 3-tuple hD, A,Mi where

• D = hV,Ei is the decision tree having node set V and edges E. The root of the evaluation tree D describes the decision to be made. Each internal node corresponds to a sub-decision. The descendants of a node describe the various criteria to be taken into account for that sub-decision (see Figure 9.1).

Figure 9.1: The structure of a simple decision problem An internal node may also be a nested C-problem. The nested problem  assigns weights to the sub-alternatives C = C1,...,Cn . • A is the set of alternative under evaluation. The augmented decision tree D+ adds alternative nodes below each leaf node of D (see Figure 9.2).

Figure 9.2: The augmented decision tree • M assigns to each node in D+ its evaluation for the alternatives A. Each internal node aggregates the scores of its underlying alternatives using a weighting scheme for the underlying nodes (see Figure 9.3).

Figure 9.3: A node is a decision tree Leaf nodes have a direct method of measurements. • Let G be the root of the decision tree D, then the alternative(s) with the highest score is (are) selected as the best alternative(s).

As a result, a decision problem can be decomposed into smaller decision prob- lems. Each intermediate level has associated a valuation scheme for the alterna- tives A (see Figure 9.3). Popular methods basically tend to have decision trees of depth 2. But the method allows for more refinement when decision problems are getting more complex. 9.2. Multiple Criteria Decision Making 161

Decomposition by Nesting In the situation on Figure 9.3, the decision problem is based on an (implicit) ordering of the alternatives using the scores for each criterion and aggregating by a weighting scheme for the criteria. In case of a nested decision problem, the nested problem specifies the weighting scheme for the criteria as an explicit decision problem. In Figure 9.4 we see a transformation between implicit and explicit specification. Decision node E describes the explicit weighting of the underlying criteria C1,...,Cn.

Figure 9.4: Implicit-Explicit transformation   More formal, let D = D1,...,Dt all be A-problems, and C = C1,...,Cs be criteria. Then we can construct a new A-problem E of the form Comp(G, C, D) by composition. The decision node calculates the alternative scores by using the weights obtained from the decision subproblem E. The final score of node N is obtained as the function M(N): A → [0, 1] defined as: X M(N)(A) = M(E)(C) · M(C)(A) (9.1) C→N

Decomposition by Dimensioning In some cases the set A may be seen as a Cartesian product of subspaces. We consider the following case: A = A1 ×A2. Then the decision procedure may first find the ordering for the A1 alternatives, the ordering for the A2 alternatives and then combine these orderings into an ordering for the alternatives A. Let Φ be the join operator combining the A1 and A2 orderings into the resulting A ordering, then we denote this as:

Φ MCDP(A) = MCDP(A1) ./ MCDP(A2)

The final score of node N is obtained as the function M(N): A → [0, 1] defined as follows. Let alternative A ∈ A be the combination of the alternatives A1 ∈ A1 and A2 ∈ A2, then:

M(N)(A) = Φ(M(R1)(A1),M(R2)(A2)) (9.2) where R1 and R2 are the roots of the sub-decisions MCDP(A1) and MCDP(A2) respectively. Common choices are Φ(x, y) = min(x, y) and Φ(x, y) = x · y. 162 Chapter 9. User preference prioritization and aggregation

Methods Major issue in decision making are the assignment of weights to the various criteria, and the aggregation of the scores for the various alternatives into a single score. Various methods have been proposed. In this study we will restrict ourselves to 2 variants. The first variant is based on partial orderings from which the weights are derived. The second variant (AHP) uses pairwise comparison of items to find their weights. Pairwise comparison can be done readily by domain experts, but may (in contrast to the first variant) suffer from inconsistency. AHP can handle inconsistencies to some extent.

9.2.3 Ordered Weighting Average Operator In the method of Ordered Weighting Average (OWA) an (partial) ordering of items is used to derive weights for the items. Consider internal node N in a  decision tree (see Figure 9.3), having the set C = C1,...,Cn of descendants of node N. With node N a partial order ←N of C is associated. This partial order is used to find weights for the items in C where C ←N D expresses that C is less preferred than D. Each node C ∈ C has associated a weighting for the alternatives, or, M(C): A → [0, 1]. So M(C)(A) is the weight obtained via node C for alternative A ∈ A.

9.2.4 Involving Preferences Following [CPDP12], based on an idea of [Yag08] each criterion gets its own amplifying weight. For each internal node N the ordering ←N is used to calculate an amplifying weight λA(C) for each C ∈ C to be used to calculate a score for each A ∈ A, as follows. Each top criteria get importance weight 1. For the others, the importance weight is reduced by multiplying with the more relevant criteria, usually in the following way: Y λA(C) = M(D)(A) (9.3)

C←N D

An alternative would be (see [Yag09]):

λA(C) = min M(D)(A) (9.4) C←N D

So the importance factor λA(C) of a criterion is reduced by the scores of all more important criteria. The criterion scores are adjusted as follows:

C¯(A) = λA(C) · M(C)(A) (9.5)

For example, if a more important criterion gets a low score, then the scores of the lesser important criteria are devaluated accordingly. This impedes the compensation of a low satisfaction level for a more important criterion by a less important one. 9.2. Multiple Criteria Decision Making 163

The Aggregation Method Next these adjusted criteria scores are aggregated into a single score. According to [Yag12] and aggregation function F : [0, 1]n → [0, 1] is generally required to have the following properties:

1. if ∀i [xi = 0], then F (x1, . . . , xn) = 0

2. if ∀i [xi = 1], then F (x1, . . . , xn) = 1

3. F is monotonous: if ∀i [xi ≥ yi], then F (x1, . . . , xn) ≥ F (y1, . . . , yn)). Yager [Yag88] proposes the following class of aggregation function, parameterized by the weight function w: n X F (x1, . . . , xn) = wj · (jθ(x1, . . . , xn)) (9.6) j=1 where the jθA takes the j-th largest element from A. The weight function sat- Pn isfies 0 ≤ wj ≤ 1 for all 1 ≤ j ≤ n and j=1 wj = 1. This class contains the the maximum, the minimum and the average criteria. Its prominent advantage is that the input data are rearranged in descending order, and the weights as- sociated with the OWA operator are the weights of the ordered positions of the input data rather than the weights of the input data. Following [CPDP12], we aggregate by using the fuzzy AND operator, and use the min/max version of this operator: ^ Fa(A¯w) = v (9.7)

v∈A¯w = min µ = min (M(C)(A))λA(C) (9.8) (C,µ)∈A¯w C Consequently, the function M(N): A → [0, 1] is defined as:

M(N)(A) = Fa(A¯w)

9.2.5 The Analytic Hierarchy Process(AHP ) In the Analytic Hierarchy Process (AHP) each pair of criteria is assumed to be comparable. If objective criteria scores are not available, then the comparison is based on a linguistic choice, that has associated a numerical value. These values are summarized in Table 9.1. Let ai,j > 0 be the result of pairwise comparison of items i and j. The larger ai,j, the more is i preferred above j. Let A be the n × n matrix of these pairwise comparisons. Pairwise decisions are consistent when they meet the cardinal transitivity criterion. If the user prefers i above j with value ai,j, and j above k with value aj,k, then the user will prefers i above k with a value:

ai,k = ai,j ∗ aj,k Some immediate consequences are: 164 Chapter 9. User preference prioritization and aggregation

Table 9.1: Relative Importance Intense of Definition Importance 1 Equal preference 3 Weak preference 5 Essential or strong preference 7 Demonstrated preference 9 Absolute preference 2,4,6,8 intermediate values

1. ai,i = 1 2. ai,j = 1/aj,i 3. ai,j = a1,j/a1,i Let w be the vector consisting the first-row elements of matrix A, or: vi = a1,i, then matrix A is decomposed as follows:

A = ww¯T (9.9) wherew ¯ is the vector containing the reciprocals of vector w, or:w ¯i = 1/wi. Consequently, for the inner vector product we have:

w • w¯ = n

The vector w also is an eigenvector of matrix A:

Aw = ww¯T  w = w w¯T w = nw

It is easily shown that n is the principal eigenvalue of matrix A, and that A has no other eigenvalues unequal to 0.

The Priority Vector The eigenvalue method (EVM) is the most popular method to derive weights for items based on the pairwise comparison matrix A. The weights are the components of the so-called priority vector w, which is the principal eigenvector Pn of A normalized by i=1 wi = 1.

The Aggregation Method The final score of node N is obtained as the function M(N): A → [0, 1] defined as: X M(N)(A) = w(C) · M(C)(A) (9.10) C→N 9.2. Multiple Criteria Decision Making 165

Comparison Errors In the AHP method it is assumed that the errors made by users follow a log- normal distribution ([Saa08]). Due to these errors the comparison matrix may be a non-consistent positive reciprocal matrix. Positive reciprocal matrices do have a principal eigenvalue λmax ≥ n. Furthermore we have: A consistent iff λmax = n. In order to measure the amount of inconsistence, the Consistency Index CI has been introduced by Saaty as follows: λmax − n CI = (9.11) n − 1 The consistency ratio is normalized by the random consistency index RI(n) for matrices of order n (see for example [AMJ03]) that is defined as the expected value of CI(n) when the judgements are randomly taken from the values in Table 9.1 using the EVM method. CI CR = (9.12) RI(n) For normalized consistency index varies from consistent (CR = 0) to random judgements (CR = 1). According to Saaty, 10% consistency ratio is acceptable for the AHP method to work. Some values of RI(n) (see for example [AMJ03]) are shown in Table 9.2.

Table 9.2: Values n 3 4 5 6 7 8 9 10 11 RI(n) 0.525 0.882 1.115 1.252 1.341 1.404 1.452 1.484 1.513

Principal Eigenvalue Computation As shown in the beginning of this section, the principle eigenvalue and eigenvec- tor of a consistent matrix are easily obtained. In case of a comparison errors, the resulting matrix A still is a reciprocal matrix. The power method can be used to find the principal eigenvalue in this case. Let x 6= 0 be any vector, k then the sequence xk = A x will converge to an eigenvector associated with the principal eigenvalue. The eigenvalue is obtained from the Rayleigh quotient, so (xk+1 • xk)/(xk • xk) will converge to the principal eigenvalue λmax. This computation can be sped up as follows: v:= Ax; repeat v0 := v; A := A*A; v := Av until k v0 - v k < eps; λmax := (v • v0) / (v0 • v0) 166 Chapter 9. User preference prioritization and aggregation

2k−1 Note that the approximation vk after the k-th iteration equals A x. It will also be useful to normalize vk for example by dividing vk by |vk|.

Selection in the Leafs The situation in a leaf node C of the decision tree is displayed in Figure 9.5. The Analytic Hierarchy Process (AHP) suggests a technique similar to the one described in Section 9.2.5 when an objective measurement of the alternatives for this criterion C is not available. By making (sufficiently consistent) pairwise (subjective) comparisons between the alternatives, the resulting priority vector leads to a value assignment to the alternatives.

Figure 9.5: The situation in a leaf node

9.3 MCDM and eHealth

According to [BBD+04], based on [KH76], a preference ranking is a total order  on a set of outcomes O, where o1  o2 is interpreted as: the decision maker prefers the outcome o2 above o1. The outcome o2 is strictly more preferred than o1, o2 is strictly more preferred than o1) if and only if o2  o1 but o1 6 o2 or o1 ≺ o2, when o1  o2 ∧ o2 6 o1. The decision maker is indifferent to o1 and o2, denoted as o1 ∼ o2, when o1  o2 ∧ o2  o1 or o1 6 o2 ∧ o2 6 o1. In this work we will choose ≺ as the base order relation.

9.3.1 Prioritization In many situations, there are various criteria to express aspects of relevance. In [CPDP12] a mechanism is described for relevance assessment using a priori- tized aggregation of the dimensions based on personal preferences. The applica- tion of ordered weighted averaging operators and fuzzy decision making in the medical domain were addressed by several researchers [RA06, RA99, Che13]. For example [RA06] used ordered weighted averaging (OWA) operators and fuzzy decision models for drug choice. They considered extraction of the best medicine in the circumstances when some decision makers have different opinions about the priority of the tested drugs [RA99]. Rakus-Andersson [RA06] utilized OWA and Yager’s mathematical fuzzy decision models in the process of extracting the best medicine from the collection of proposed remedies. Mainly, they focus on selection optimal medicine from a collection of drugs recommended to a patient based on clinical symptoms for a certain disease [RA06, RA99]. Chen [Che13] 9.3. MCDM and eHealth 167 investigated the multiple criteria group decision making (MCGDM) problem of patient-centered medicine. They discussed the difficulty and complexity of selecting appropriate treatments. We first give an example of relevance dimensions in our eHealth application.

Example 9.3.1 Let us suppose that Martha is an HIV positive pregnant woman. She is under the antiretroviral regimen for the last couple of years. We assume the set {I1 (HIV), I2 (pregnancy), I3 (malaria)} of illnesses, the set {T1, (antiretroviral), T2 (antimalarial)} of treatments and the set {R1 (efficacy), R2 (adverse effects), R3 (fetal effects)} of risks. Her treatment choice is based on some criteria (we will use special symbols for later reference):

1. C1: allergy (no allergic reaction form the treatment), 2. C2: risk (adverse effect) of treatment, 3. C3: price of the treatment, 4. C4: availability of the treatment. Martha prefers to have a treatment without allergic reactions or risks, that is inexpensive and easily available. She considers risk more important than price, however, she can’t afford big expenses. Easily available is important, but a price reduction is more important for Martha. Finally, allergy is more important than risk and price.

Figure 9.6: Preferences of Martha This is represented as the following preferences: • price  risk • availability  price • risk  allergy • price  allergy This is displayed in Figure 9.6. Note that the preference price  allergy is redundant. Martha’s twins sister, who has the same disease, has different preferences, as shown in Figure 9.7.

Figure 9.7: Preferences of Martha’s twin sister There are two possible treatments for Martha and her twin sister, being: 168 Chapter 9. User preference prioritization and aggregation

1. T1: antiretroviral HIV treatment. This treatment has a low allergy risk, the risk for adverse effects to some extent, a high price but and a low availability. The efficacy of this treatment is high. 2. T2: antimalarial treatment; this treatment has a higher risk for allergy and adverse effects, but has a low price and a high availability. The efficacy of this treatment is medium. The decision problem is to decide what the best treatment is for Martha and for her twin sister, given their personal preferences as described above.

9.3.2 Symptoms, Treatments and Risks A generally applied model to study the medical process is using the Symptoms, Treatments and Risks Model (see also [LPD12, EOE+99]). Given a diagnosis as a set of symptoms and a patient record, this model tries on the one hand to rank the treatments on their medicinal properties and, on the other hand, to rank the treatments on their risk avoidance. We will use this model, and extend it with the techniques as introduced in the previous sections. Symptoms can not be directly related to treatments, but rather via diseases which we define in this context as a set of symptoms. Ranking the treatments on their medical properties can be seen as multiple criteria decision making with diseases as criteria and treatments as alternatives.

Figure 9.8: The medical decision problem In Figure 9.8 the decision problem is displayed. The decision problem is a composition of two subproblems, one focusing on the benefit aspects, the other on 9.3. MCDM and eHealth 169 the cost aspects. The treatments are the alternatives for the decision procedure. The Diagnosis decision node handles the benefits of treatments as a nested  I1,...,In -problem, using the symptoms S1,...,Sp as criteria for illness se- lection. This leads to an ordering of the illnesses giving the criteria at hand. Each illness orders the treatments. From the illnesses ordering, an ordering of treatments T1,...,Tk is derived using a relation between diseases and possible treatments (see next subsection) and the efficacy figures for treating a disease with a treatment. The risk nodes R¯1,..., R¯n each handle a particular cost aspect for treat- ments. For example, the criteria used in the Martha’s case (C1,C2,C3,C4) are examples of such nodes. Each of decision nodes ranks the possible treatments according to increasing risk avoidance. The balancing decision node gets as input a number of treatment orderings according to the criteria below (the diagnosis and the risk nodes), and aggregates them into a single treatment ordering. We assume a (more) objective ordering of these criteria by a doctor and a (more) subjective) ordering of these criteria from the patient. When in conflict, the doctors judgment is preferred above the patients preferences. The result of the balancing decision process is an ordering of treatments, from which the (a) best one will be selected. The decision problem is to be evaluated in the context of some diagnosis and some patient record (containing patient information and preferences), see also [TW12]. As a result of the decision procedure (as described in the previous section), we have a beneficial relevancy score for each treatment together a risk avoidance score.

9.3.3 Applying Ordered Weighting Average CP-Net Notation A CP-Net is a special notation for preferential dependencies. The CP-net in Figure 8.8 describes the conditional preferences of risks for each treatment. The symptoms and the patient profile lead to an preferential ordering of diseases. Each disease has its special treatment preferences. Finally, each treatment has its special risk ’preferences’. This preference network is on the base of applying the OWA method. The CP-Net can be seen as a shorthand representation of the essentials of the medical decision problem (see Figure 9.8), since it describes the causal relation between diseases and treatments, and the causal relation between treatments and risks.

Determining OWA Weights In our example case study, Martha’s preference is displayed in Figure 9.6. As we see, C1 is the most important criterion and C4 the least important criterion. Assume the degree of satisfaction for the treatment T1 and T2 is presented in the following table: 170 Chapter 9. User preference prioritization and aggregation

T1 T2 T3 C1 0.9 0.9 0.9 C2 0.7 0.9 0.7 C3 0.9 0.7 0.7 C4 0.6 0.6 0.9

Next we compute the criteria weights for treatments T1, T2 and T3:

Martha T1 T2 T3 λ1 1 1 1 λ2 = λ1 · C1(Ti) 0.9 0.9 0.9 λ3 = λ2 · C2(Ti) 0.63 0.81 0.63 λ4 = λ3 · C3(Ti) 0.567 0.567 0.441 Consequently the treatment scores are:

λ1 λ2 λ3 λ4 M(T1) = min(C1(T1) ,C2(T1) ,C3(T1) ,C4(T1) ) = min(0.900, 0.725, 0.936, 0.749) = 0.725

λ1 λ2 λ3 λ4 M(T2) = min(C1(T2) ,C2(T2) ,C3(T2) ,C4(T2) ) = min(0.900, 0.910, 0.749, 0.749) = 0.749

λ1 λ2 λ3 λ4 M(T3) = min(C1(T2) ,C2(T2) ,C3(T2) ,C4(T2) ) = min(0.900, 0.725, 0.799, 0.955) = 0.725

Thus we conclude that for Martha’s case treatment T2 is preferred above the other treatments T1 and T3, and thus treatment T2 is advised for Martha. The decision for Martha’s twin sister leads to another decision.

Twin sister T1 T2 T3 λ1 1 1 1 λ2 = λ1 · C1(Ti) 0.9 0.9 0.9 λ3 = λ1 · C1(Ti) 0.9 0.9 0.9 λ4 = λ2 · C2(Ti) 0.63 0.81 0.63

Figure 9.9: Martha’s niece preferences We furthermore added the score’s for Martha’s niece. Her preferences are shown in Figure 9.9, leading to:

niece Emily T1 T2 T3 λ1 1 1 1 λ3 = λ1 · C1(Ti) 0.81 0.63 0.63 λ2 = λ3 · C3(Ti) 0.9 0.9 0.9 λ4 = λ2 · C2(Ti) 0.57 0.57 0.44 This leads to the following scores for Martha, her twin sister and niece Emily: 9.3. MCDM and eHealth 171

T1 T2 T3 Martha 0.725 0.749 0.725 Twin sister 0.725 0.661 0.725 niece 0.749 0.725 0.725

We see that T2 is the best treatment for Martha, for her twin sister both T1 and T3 are an optimal choice, while niece Emily will be best off with T1. Note that Martha’s twin sister has provided less information about her preferences, which makes the treatment decision less certain.

9.3.4 Applying Analytical Hierarchy Process Regarding the AHP applications to medical and health care, [LN08] reviewed fifty articles from 1981 to 2006, and classified them in seven categories: diag- nosis, patient participation, therapy/treatment, organ transplantation, project and technology evaluation and selection, human resource planning, and health care evaluation and policy. AHP applications to healthcare and medical research are still growing. [DIC89, Dol08, DBAI13] demonstrated the tutorial review to promote applications of AHP in medical and healthcare decision making. Lee [LK11] combined AHP and goal programming in strategic enterprize resource planning (ERP) in a health- care system. Many medical studies used plenty of questionnaires of AHP design to conduct empirical research to prioritize criteria. For example, Dolan [DBAI13] evaluated colorectal cancer. [PMR+13] prioritized a hierarchy of 12 user needs for computed tomography (CT) scanner. [DHV+11] elicited patient preferences for health technology assessment. [PBPB11] examined healthcare professionals assessments of risk factors. [HVM+12] prioritized multiple outcome measures of antidepressant drug treatment. Uzoka [UOBO11] conducted a case comparison of the fuzzy logic and AHP methods in the development of medical diagnosis system involving basic symptoms elicitation and analysis. M¨uhlbacher et al., [MSMN13] uses discrete choice experiment to prioritize patient preferences on HIV therapy. IJzerman [ITB12] compared the performance of AHP and Con- joint Analysis (CA) in eliciting patient preferences for treatment alternatives for stroke rehabilitation. [Yue13] discussed the defects of AHP and proposed an al- ternative primitive cognitive network processes (P-CNP). Yuen claimed that the proposed method could be a promising decision tools to replace AHP to share in- formation among patients or/and doctors in order to evaluate therapies, medical treatments and health care technologies and medical resources and healthcare policies.

Determining AHP Weights In many cases the preference comparison of treatments focusing on their risks is not easy. We will describe a method for treatment comparison based on risk estimations for the individual treatments. Clinical studies normally use a scale to grade adverse events. Each treatment has its own toxicity profiles or adverse events. To rank treatment complications 172 Chapter 9. User preference prioritization and aggregation and adverse events, the US Division of AIDS Grading Scale [Nat04] proposes a grading scale ranging from grade 1 (mild) to grade 4 (life-threatening). We adopt this grading scale to weigh the adverse events caused by antiretroviral and antimalarial treatments for pregnant women, and eventually to choose optimal treatments with least adverse effects to the mother and the fetus. Measurement of preferences as explained by Uzoka [UOBO11] involves a pairwise comparison of evaluation variables which are verbal statements about the strength of importance of a variable over another, represented numerically on an absolute scale. The comparison is done from the top level of the hierarchy to the bottom level in order to establish the overall priority index. Let Risk(R,T,P ) be the risk of R for treatment T for patient P . Comparing the risks of treatment T1 and treatment T2 is done by comparing their risk grades as follows:

Risk(R,T1,P ) = w(T1) · w¯(T 2) (9.13) Risk(R,T2,P ) where w(T ) = Risk(R,T,P ) andw ¯(T ) = 1/w(T ). The various outcomes are summarized in the following matrix C:

preference of T2 T1 above T2 mild moderate severe life mild 1/1 2/1 3/1 4/1 C = moderate 1/2 2/2 3/2 4/2 T1 severe 1/3 2/3 3/3 4/3 life 1/4 2/4 3/4 4/4

So we have: C = w · w¯T . Consequently, C is a consistent matrix.

9.4 The Case Study

Our intention is to use the MCDM techniques in the medical diagnosis system TenaLeHulum that we have introduced in [TKW10a] and [TW12]. Figure 8.11 shows the kernel of this system. The system is currently being developed and to be introduced in a rural area of Ethiopia. In Section 9.4.1 we describe the context of the medical decision process for a particular case in more detail. We discuss some relevant medical knowledge such as treatment interaction, treatment adverse effects and review the treatment guidelines of HIV and malaria related. In Section 9.4.2 we describe the decision process for our case in more detail, using the decomposition operators introduced in Section 9.2. Using available data, we calculate the subdecisions for both HIV and malaria. In Section 9.4.3 we discuss the results of this case.

9.4.1 Background Malaria is a major public health problem in Ethiopia, affecting an estimated 52 million (68%) of the population [Min06]. The problem is severe and it has been a 9.4. The Case Study 173 leading cause of illness and death [AZM12] & [Min06]. Pregnant women are more susceptible than general population. Related to this, [TKPV+04, AETK+03] explained that malaria in pregnancy is a leading problem in sub-Saharan Africa, that affects about 24 million people every year. The impact of malaria for pregnant women is associated with anemia and mild and severe birth outcome risks (low birth weight, still birth, premature birth, spontaneous abortion, birth defects etc) [AETK+03], [WHO10c]. The HIV pandemic created an enormous challenge to the survival of mankind worldwide. With a national adult HIV prevalence of 2.4%, Ethiopia is one of the countries most severely hit by the epidemic. According to [NW11]: Besides the dominant heterosexual transmission, the vertical virus transmission from mother to child accounts for more than 90% of paediatric AIDS. As prevention of mother- to-child program provides both prevention of HIV transmission from mother to child and enrollment of pregnant women and their families into antiretroviral treatment and care; it is the effort taken by the government to mitigate the epidemic in children and adults. Moreover the co-infection of malaria and HIV cause more than 4 million deaths each year [WHO04]. Given the considerable geographical overlap between malaria and HIV/AIDS, a substantial number of co-infections occur [WHO04], [Ide07]. HIV increases the risk of an increasing severity of malaria infection and the burden of malaria, which speeds up the transmission of malaria. Malaria is also associated with the speed up of viral progression. Co-infection of HIV and malaria in pregnant women is particulary common in sub-Saharan Africa and has serious consequences for both the mother and the fetus. For example, [Ide07] has said that approximately 1 million pregnancies are complicated by HIV and malaria co-infection in sub-Saharan Africa. Some stud- ies indicated that HIV infection appeared to impair pregnant women’s ability to control parasitemia, resulting in more parasite densities than HIV-uninfected pregnant women [TKPV+04, AB07, FLLP11]. Anemia and maternal death are more common for women with both HIV and malaria than for women with a single infection [TKPV+04, FLLP11]. Some studies show an increased occur- rence of placental malaria and higher parasite densities in HIV-infected pregnant women than in non-infected women. One of the major problems of malaria and HIV co-infection is the adverse effects of the drugs prescribed to control the HIV and malaria viruses, as well as the interaction of drugs are the main bottlenecks in suppressing the illnesses. In this section we try to rationalize the decision process for the best treatment (drugs for the HIV / malaria co-infected women). The objective of this analysis is not to modify the general HIV and malaria treatments as recommended by WHO. In our study, we use for prioritizing an optimal treatment of HIV and malaria for pregnant women, the antiretroviral and antimalarial therapies recommended by WHO [WHO13, WHO10c]. There is growing recognition that persons with multiple morbidities may be at increased risk of adverse consequences of medical therapy [FTA+11]. Fried et al. 174 Chapter 9. User preference prioritization and aggregation further elaborate that different disease-specific outcomes are difficult to compare to provide accurate decisions to administer therapy [FTA+11]. Prioritization between pairs of outcomes is a well accepted technique used to elicit preferences in decision support tools [FTA+11]. “Often we are faced with different situations where we have to make a choice and one choice can be better in one way and worse in another. This is called a trade off. Many people have had to make a decision that involves a trade off for their health” [FTA+11]. Lots of medical decisions have trade offs. Every treatment causes a certain side effects, so people have to decide either to continue to take the treatment or stop the treatment. The former would meant they would have to live with the medication side effects, but they would be lessening the disease, however, the later would mean that they would avoid the side effects caused by the treatment, but they would not lessening the risk of the disease. People facing this decision need to prioritize their preferences whether to suffer from the disease or live with the side effects come with the treatments.

Treatment decisions The introduction of antiretroviral therapy has significantly contributed to im- prove disease control and prolonged survival of HIV-infected patients. In the last two decades more than 20 antiretroviral drugs have been developed. Re- sults of several clinical studies on the efficacy and safety of antiretroviral drugs have become the basis for developing a frequently updated HIV-treatment guide- lines [WHO13]. Based on efficacy and safety profiles, among the currently available NRTI agents, emtricitabine, lamivudine, tenofovir, and zidovudine are preferred and frequently combined with either a nonnucleoside reverse transcriptase inhibitor (NNRTI) or with a PI. Among the NNRTIs, efavirenz is preferred, while the pre- ferred PI or PI combination is lopinavir/ritonavir. Currently, a combination of 3 to 4 agents is recommended as initial therapy for treatment for naive patients: NNRTI-based (1 NRTI + 2NRTI), PI-based (1 or 2 PI + 2 NRTI ), or triple NRTI regimens [WHO13]. Treatment decision making for most diseases including HIV/AIDS and malaria is complex and challenging [YMC+07]. Many symptoms, diagnosis, and treat- ment outcomes are inherently imprecise, immeasurable or poorly quantifiable, and subjective with a high degree of uncertainty. Moreover, the difficulty of treatment decision making increases when more than two diseases are treated simultaneously due to drug interaction (in this case HIV/AIDS & malaria). Ying et al. [YMC+07] argued that HIV/AIDS treatment is, among one of the most complex treatments because of treatment failures and treatment-resistant of HIV virus. Treatment decisions are made due to tradeoffs between disease ef- fect, treatment effect and side effects. Treatment decisions often involve patient’s and doctor’s combined decisions. Toxicity and drug interaction are major adverse effects which requires serious consideration while making treatment decisions. Drug interaction is a situation in which a drug affects the activity of a drug when both are administered to- 9.4. The Case Study 175 gether [Wik]. Drug interaction in clinical trials is one of the most prominent problem that affects the treatments of HIV infected pregnant women suffered from malaria. Some research findings have shown that HIV is the main reason of the infection of malaria (peripheral and placental malaria) in pregnancy. In order to prioritize and aggregate treatment preferences for the aforementioned example (Martha’s case study), we considered the antiretroviral and antimalar- ial drug interaction during pregnancy. The major problems occurred by the interaction of antiretroviral and antimalarial drugs are: severe anemia, higher parasite densities, adverse birth outcomes, toxicity, pill burden, prevalence of resistances and etc. The major adverse reactions of antiretroviral drugs in pregnancy are birth defects, fetal outcomes and vertical transmission. Most of the antiretroviral drugs prevents the vertical transmission of virus from the mother to the child. However, teratogenic effects involving antiretroviral drugs to which pregnant women are exposed. Research findings indicate that the exposure of ART for pregnant women in the first trimester is higher than that of second and third trimester [APR13]. The antiretroviral pregnancy registry (APR) explained the potential association between prenatal and antiretroviral exposure and birth defects. According to the Antimalarial Pregnancy Registry (APR) [APR13] data, among 279 live births with the first trimester exposure 13 birth defects reported. The prevalence of birth defects per 100 live births among women with the first trimester exposure to an antiretroviral primarily (NRTI) is 4.7%. The prevalence of defects among women with the first trimester exposure to antiretroviral medication is signifi- cantly higher than the prevalence of defects with the first exposure of second and third trimester. Fetal exposed to antiretroviral regimen in the first trimester of pregnancy, the most common type of congenital anomalies were musculoskeletal, heart and circulatory and, urinary and digestive systems [APR13]. According to Tarning et al., [TKD+13], the mortality rate of malaria in the year 2010 was estimated 660,000 world wide. In the same year an estimated 219 million malaria infection occurred. Pregnant women are at high risk of devel- oping severe forms of malaria than nonpregnant women, and even an asymp- tomatic infection(s) impairs fetal development. Malaria is an important cause of abortion and stillbirth [TKD+13]. WHO [WHO10c] recommends artemisinin combinations for the treatment of plasmodium falciparum malaria except for first trimester because results from animal studies suggest that artemisinin are embryotoxic. Prospective tracking of fetal drug exposure during pregnancy, particularly newer agents and new combinations of therapies remains critically important in evaluating the safety of these agents among reproductive-age women and the exposed fetus [APR13]. The pressing problem of administering treatments for the co-infection (HIV and malaria) for pregnant women are: • Some antimalarial drugs have an adverse effect on the neonatal or fetus; • Some antiretroviral drugs antagonize with antimalarial drugs which may 176 Chapter 9. User preference prioritization and aggregation

lead to the failure of antimalarial treatment. Also malaria parasites sup- press patient immunity, which may increase the viral density of the pa- tients; Given the aforementioned drug interaction of antiretroviral and antimalarial drugs in pregnancy, we formulate the drug preferences mentioned in the exam- ple as follows. In this example we only consider the first line of treatment of antiretroviral regimens as recommended by WHO [WHO13]. Recommended first line regimens are:

• TDF + 3TC (or FTC) + EFV • ZDV + 3TC + NVP • ZDV + 3TC + EFV • TDF + FTC (or FTC) + NVP Among these drugs which one is appropriate when combined with antimalarial for pregnant women. By inferring this common combinations which is recom- mended by WHO and is also given in many countries we map with antimalarial drugs which have low risk factors on the health of the mother or fetus.

Antiretroviral and antimalarial mapping There are about 12 possible combinations of antiretroviral and antimalarial drugs based on first line regimens [WHO13, WHO10c]. Based on Ethiopia’s national HIV and malaria treatment guidelines and the availability of plasmodium fal- ciparum drugs (Ethiopia uses Quinine and artemether-lumefantrine as the first line regimen to treat plasmodium falciparum) despite the potential risk factors of the mother and the fetus we present the combination of antiretroviral and antimalarial drugs are presented as follows:

• T1 = ZDV + 3TC + NVP + QU • T2 = ZDV + 3TC + NVP + AL • T3 = ZDV + 3TC + EFV + QU • T4 = ZDV + 3TC + EFV + AL • T5 = TDF + 3TC + NVP + QU • T6 = TDF + 3TC + NVP + AL • T7 = TDF + 3TC + EFV + QU • T8 = TDF + 3TC + EFV + AL • T9 = TDF + FTC + NVP + QU • T10 = TDF + FTC + NVP + AL • T11 = TDF + FTC + EFV + QU • T12 = TDF + FTC + EFV + AL There is no any physical data for the combination of antiretroviral and antimalar- ial drugs. However, after reviewing the current antiretroviral and antimalarial guidelines, we map the six first line regimen of antiretroviral and the two anti- malarial (plasmodium falciparum) therapies to choose optimal treatments for co- infection in pregnancy. Although, the above mappings are the potential combina- tions, some researchers pointed out the potential drug-drug interactions between 9.4. The Case Study 177 antiretroviral and antimalarial therapies. Hence, some of the above mappings are not feasible to treat HIV and malaria. For instance, [KMW+11, BKLM+12] reported that co-administration of artemether-lumefantrine with antiretroviral therapies (efavirenz or nevirapine) has potential drug interactions. They eluci- dated that nevirapine NVP significantly reduces the concentration of artemether and elevate the concentration of lumefantrine. These drug interactions may in- crease the risk of malaria treatment failure and development of resistance to artemether-lumefantrine and nevirapine [BKLM+12].

9.4.2 The Decision Process In this subsection we describe how we embed the medical decision structure (see Figure 9.8) in the medical diagnosis system TenaLeHulum. We will restrict our- selves to the Risk handling part of this decision procedure, and discuss this in the context of HIV-malaria diagnosis as discussed in the previous subsection. Ac- cording to the previous subsection, the treatment alternatives are composed of an HIV-component and a malaria component. Therefore we will use decomposi- tion by dimensioning (see Section 9.2.2) and first separately order the treatments for HIV and malaria. The following table shows the decomposition:

D1 D2 D3 D4 D5 D6 QU T1 T3 T5 T7 T9 T11 AL T2 T4 T6 T8 T10 T12 where we use:

• D1 = ZDV + 3TC + NVP • D2 = ZDV + 3TC + EFV • D3 = TDF + 3TC + NVP • D4 = TDF + 3TC + EFV • D5 = TDF + FTC + NVP • D6 = TDF + FTC + EFV The treatment selection decision will be made on the basis of three major aspects:

1. Efficacy of the treatment.

2. The adverse effects of the treatment.

3. The fetal effects.

The complete decision procedure for this case is shown in Figure 9.10. We see how the problem is stepwise decomposed using the techniques we introduced in Section 9.2.

The data used For our experiment we have used the data for the effects of antiretroviral drugs (see Figure 9.3) obtained from( [APR13], [TKS12, EBA12, AO13, FCAM+13, 178 Chapter 9. User preference prioritization and aggregation

Figure 9.10: The complete decision process

SCAM+13, KCP+07, SDR+10, GDA+06, RHC+09, RK05]. The effects of ob- served antimalarial drugs, obtained from [FLLP11, TKD+13, UO09, WSH+07], are shown in Figure 9.4. In both tables we find the percentage of the treatments

Table 9.3: Effects of antiretroviral drugs

leading to that side effect. The data is collected from cohort and clinical studies. A limitation for this study is the quality of the data. Some of the treatments were studied in detail and others not. For example, TDF/FTC/EFV is the most studied regimen, whereas TDF/3TC/NVP is the least studied antiretroviral ther- apy [TKS12]. Hence, we assume that the quality of the data may have an impact 9.4. The Case Study 179 on the overall results of the findings. Relatively many studies were focusing on the efficacy and toxicity of first line regimens. Therefore this data is better compared to that of the other criteria (see Figure A.1).

Table 9.4: Quinine vs Artemether/Lumefantarine (AL) or Coartem

The decision procedures in this chapter are based on satisfaction levels rather than risk percentages. In our experiments we have used the following transfor- mation:

satisfaction level = 1 − percentage (9.14)

There are other techniques to transform into a satisfaction level, however for the purpose of convenience we use the above mentioned transformation method. The price-related decision is based on the following method to determine price satisfaction for the i-th price.

pi 1 − P (9.15) j pj We have used the price information from Table 9.5.

Table 9.5: Price of ART for year 2011 and 2012 ART Price 2011 2012 2013 ZDV/3TC/NVP 128 119 100 ZDV/3TC/EFV 154 140 158 TDF/3TC/NVP 127 95 113 TDF/3TC/EFV 172 161 139 TDF/FTC/NVP 149 119 110 TDF/FTC/EFV 235 183 158

In this analysis we exclude the personal criteria allergy and availability (see example 9.3.1). Regarding allergy, in Martha’s case study it is mentioned that she is non-allergic for antiretroviral and antimalarial drugs, thus we excluded allergy from the analysis. Both the antiretroviral and antimalarial drugs are currently recommended by WHO guidelines to treat HIV and malaria respec- tively, so we assume that these drugs are available anywhere. Note that our 180 Chapter 9. User preference prioritization and aggregation treatment selection procedure will make an objective decision based on these side-effect figures (only).

Prioritizing the drugs Using the data transformation described, we first discuss the sub-decisions. For each sub-decision, we have considered two cases:

1. In the first case we assume a preferential order on the criteria.

2. In the second case we assume that there is no preferential order for criteria.

Both cases can be handled by the OWA method, but not by the AHP method, since pairwise comparisons as required by AHP are not available. In this section we will only discuss the results from the preferential decisions. The results of the other case (no preferences) are shown in Figures A.1-A.15.

HIV drugs We start with discussing the drugs being used for HIV treatment: D1,...,D6.  Each of the decisions below thus is a MCDP( D1,...,D6 ) decision. 1. First we make a treatment selection based on the efficacy of the treatment (decision node ART efficacy in Figure 9.10). The results are summarized in Figure A.1. Using the min-aggregation function (see Equation 9.4) for the first case (a preferential order on the criteria) the treatment scores are summarized as:

D1: 17% D2: 19% ART D3: 13% efficacy D4: 16% D5: 16% D6: 18%

2. Next we focus on treatment selection based on the adverse effects of the drugs (decision node ART adverse in Figure 9.10). The results are sum- marized in Figure A.2. In this case the treatment scores are:

D1: 18% D2: 14% ART D3: 18% adverse effect D4: 19% D5: 15% D6: 16% 9.4. The Case Study 181

A special point to mention here is that all alternatives have a very low score.

3. Finally we consider on treatment selection from the point of view of its fetal effect (decision node ART fetal in Figure 9.10). The results are summarized in Figure A.3. The results are summarized by:

D1: 17% D2: 17% ART D3: 17% fetal effect D4: 17% D5: 16% D6: 17%

After obtaining the adverse effect and fetal effect scores of the antiretroviral drugs, we further aggregate the effects of the considered HIV drugs (decision node ART aggr in Figure 9.10); for details please see Figure A.9. The results are presented in the following pie chart.

D1: 18% D2: 14% ART risk D3: 18% aggregation D4: 19% D5: 15% D6: 17%

Malaria drugs For malaria we consider the drugs AL and QU are considered. Each of the deci- sions below thus is a MCDP(AL, QU ) decision.

1. First we select antimalarial treatments based on drugs efficacy (decision node MAL efficacy in Figure 9.10). The data of efficacy can be found in Figure 9.4. The results are summarized as follows:

QU: 26% AL: 74% Antimalarial Efficacy 182 Chapter 9. User preference prioritization and aggregation

2. The next step is alike the antiretroviral selection we select the antimalarial drugs based on the fetal effects (decision node MAL fetal in Figure 9.10). The results are summarized in Figure A.5. The results are summarized as:

QU: 50% AL: 50% Antimalarial fetal effect

3. Lastly, we choose the treatment based on the adverse effects of the rec- ommended drugs for Plasmodium falciparum (decision node MAL adverse in Figure 9.10). The results can be seen in Figure A.6. The results are summarized as:

QU: 34% AL: 66% Antimalarial adverse effect

The result of the antimalarial risk aggregation is composed of fetal effects and adverse effects of antimalarial drug (decision node MAL aggr in Figure 9.10) is presented in Figure A.10.

QU: 50% AL: 50% Antimalarial risk aggregation

Patient’s aggregation The results of the decisions taken in the previous subsection are processed by the patient to make a patient ranking of the treatments T1,...,T12. The following  two decision steps combine the results from the HIV drugs (MCDP( D1,...,D6 ) decisions) and malaria drugs (MCDP(AL, QU ) decisions) into the combined  MCDP( T1,...,T12 ) decisions. 9.4. The Case Study 183

Efficacy of antiretroviral and antimalarial drugs are aggregated based on patient’s rating criteria. In the first step we present the efficacy of the combined antiretroviral and antimalarial drugs.

Patient Efficacy (Φ1p in Figure 9.10) This efficacy includes the efficacy of antiretroviral and antimalarial drugs for patients. The result of the combined treatment of antiretroviral and antimalarial drugs are presented in the following chart.

T1: ZDV+3TC+NVP+QU 0.217

T2: ZDV+3TC+NVP+AL 0.144

T3: ZDV+3TC+EFV+QU 0.242

T4: ZDV+3TC+EFV+AL 0.162

T5: TDF+3TC+NVP+QU 0.163

T6: TDF+3TC+NVP+AL 0.109

T7: TDF+3TC+EFV+QU 0.207

T8: TDF+3TC+EFV+AL 0.138

T9: TDF+FTC+NVP+QU 0.206

T10: TDF+FTC+NVP+AL 0.137

T11: TDF+FTC+EFV+QU 0.233

T12: TDF+FTC+EFV+AL 0.155

The join operator is defined as: Φ1p(x, y) = x×y. A problem of this choice is that the resulting values will be (very) small numbers. The advantage is that both components x and y contribute to the outcome of Φ1p(x, y).

Another option would have been to take Φ1p(x, y) = min(x, y). Then the larger value of x and y does not have an effect on the outcome of the join value.

Patient Risk (Φ2p in Figure 9.10) The overall risk of antiretroviral and antimalarial drugs. This analysis in- cludes the patients adverse and fetal effects. The result is presented in the following chart.

T1: ZDV+3TC+NVP+QU 0.44

T2: ZDV+3TC+NVP+AL 0.26

T3: ZDV+3TC+EFV+QU 0.44

T4: ZDV+3TC+EFV+AL 0.26

T5: TDF+3TC+NVP+QU 0.44

T6: TDF+3TC+NVP+AL 0.26

T7: TDF+3TC+EFV+QU 0.44

T8: TDF+3TC+EFV+AL 0.26

T9: TDF+FTC+NVP+QU 0.44

T10: TDF+FTC+NVP+AL 0.26

T11: TDF+FTC+EFV+QU 0.44

T12: TDF+FTC+EFV+AL 0.26

The join operator is defined as in the previous case. 184 Chapter 9. User preference prioritization and aggregation

Patient decision (node Patient in Figure 9.10) Besides both criteria above, the patient’s decision involves price and avail- ability (allergy was left out, as we discussed before). We assume all drugs to be available (decision node Availability in Figure 9.10). For price (de- cision node Price in Figure 9.10) we use current market prices and the transformation described in Equation 9.15. For computational details see (FigureA.13), in addition the results are summarized in the chart below.

T1: ZDV+3TC+NVP+QU 0.655

T2: ZDV+3TC+NVP+AL 0.280

T3: ZDV+3TC+EFV+QU 0.638

T4: ZDV+3TC+EFV+AL 0.274

T5: TDF+3TC+NVP+QU 0.504

T6: TDF+3TC+NVP+AL 0.213

T7: TDF+3TC+EFV+QU 0.584

T8: TDF+3TC+EFV+AL 0.249

T9: TDF+FTC+NVP+QU 0.616

T10: TDF+FTC+NVP+AL 0.263

T11: TDF+FTC+EFV+QU 0.618

T12: TDF+FTC+EFV+AL 0.265

Doctor’s aggregation The results of the decisions taken in the previous subsection are also processed by the doctor. The following two decision steps combine the results from the HIV   drugs (MCDP( D1,...,D6 ) decisions) and malaria drugs (MCDP( AL, QU )  decisions) into MCDP( T1,...,T12 ) decisions. The doctor’s aggregated data for the treatment of efficacy, risk and price is presented here.

Doctor Efficacy (Φ1d in Figure 9.10) This efficacy includes the efficacy of antiretroviral and antimalarial drugs for patients.

T1: ZDV+3TC+NVP+QU 0.352

T2: ZDV+3TC+NVP+AL 0.358

T3: ZDV+3TC+EFV+QU 0.394

T4: ZDV+3TC+EFV+AL 0.401

T5: TDF+3TC+NVP+QU 0.266

T6: TDF+3TC+NVP+AL 0.270

T7: TDF+3TC+EFV+QU 0.337

T8: TDF+3TC+EFV+AL 0.342

T9: TDF+FTC+NVP+QU 0.335

T10: TDF+FTC+NVP+AL 0.340

T11: TDF+FTC+EFV+QU 0.379

T12: TDF+FTC+EFV+AL 0.386

The join operator Φ1d is chosen as in the case of the patient. 9.4. The Case Study 185

Doctor Risk (Φ2d in Figure 9.10) Next we present the antiretroviral and antimalarial risks. This risk con- sists of the adverse effect and fetal effect of the aforementioned drugs for pregnant women.

T1: ZDV+3TC+NVP+QU 0.160

T2: ZDV+3TC+NVP+AL 0.162

T3: ZDV+3TC+EFV+QU 0.126

T4: ZDV+3TC+EFV+AL 0.128

T5: TDF+3TC+NVP+QU 0.159

T6: TDF+3TC+NVP+AL 0.161

T7: TDF+3TC+EFV+QU 0.175

T8: TDF+3TC+EFV+AL 0.177

T9: TDF+FTC+NVP+QU 0.137

T10: TDF+FTC+NVP+AL 0.139

T11: TDF+FTC+EFV+QU 0.150

T12: TDF+FTC+EFV+AL 0.152

The join operator Φ1d is chosen as in the previous item.

Doctor decision (node Doctor in Figure 9.10) Besides both criteria above, the doctor’s decision involves price. Fig- ure A.14 shows the analysis results of doctor’s aggregation of efficacy and risks of antiretroviral and antimalarial drugs. The summarized result is presented in the following chart.

T1: ZDV+3TC+NVP+QU 0.350

T2: ZDV+3TC+NVP+AL 0.359

T3: ZDV+3TC+EFV+QU 0.265

T4: ZDV+3TC+EFV+AL 0.273

T5: TDF+3TC+NVP+QU 0.273

T6: TDF+3TC+NVP+AL 0.280

T7: TDF+3TC+EFV+QU 0.341

T8: TDF+3TC+EFV+AL 0.350

T9: TDF+FTC+NVP+QU 0.281

T10: TDF+FTC+NVP+AL 0.289

T11: TDF+FTC+EFV+QU 0.307

T12: TDF+FTC+EFV+AL 0.316

The treatment selection At this point we have two orderings for treatments, the one obtained by patient- based aggregation, the other by doctor-based aggregation. In this subsection we aggregate these both orderings into the final ordering (decision node Balance in Figure 9.10. As stated before, we assume that the doctors point of view takes preferences above the patient’s point of view, or: doctor  patient. Figure A.15 shows the analysis results of doctor’s aggregation of efficacy and risks of antiretroviral and 186 Chapter 9. User preference prioritization and aggregation antimalarial drugs. The summarized result is presented in the following chart.

T1: ZDV+3TC+NVP+QU 0.229

T2: ZDV+3TC+NVP+AL 0.101

T3: ZDV+3TC+EFV+QU 0.170

T4: ZDV+3TC+EFV+AL 0.075

T5: TDF+3TC+NVP+QU 0.137

T6: TDF+3TC+NVP+AL 0.060

T7: TDF+3TC+EFV+QU 0.200

T8: TDF+3TC+EFV+AL 0.087

T9: TDF+FTC+NVP+QU 0.173

T10: TDF+FTC+NVP+AL 0.076

T11: TDF+FTC+EFV+QU 0.190

T12: TDF+FTC+EFV+AL 0.084

9.4.3 Discussion of case results After tabulating and analyzing the row data (mainly the data is obtained from cohort and clinical studies literature review), we compute the data using OWA methods in order to prioritize the optimal treatments with low risks, high viro- logical suppression and low fetal effects.

Importance of criteria ordering In this analysis the criteria are categorized into two: ordered preference and non-ordered preference (equal preference). In the first case, the criteria ordered based on their importance, for example the first criteria appeared in the order- ing is more important than other orderings in the list, whereas a non-ordered preference, the ordering of the criteria is random since all criteria have equal importance; hence the first and the last criteria in the ordering list have equal importance.

Analysis of row data using OWA The analysis of the row data is categorized into two main categories: antiretrovi- ral and antimalarial treatment. For each treatment we analyzed the efficacy, ad- verse reaction and fetal effects of the drug for pregnant women (see Figures A.1- A.7). The first analysis deals with the efficacy of the first line regimen (recom- mended by 2013 WHO guidelines) based on the criteria and sub-criteria. In the analysis we compared six combinations of antiretroviral drugs that consists of two NRTI and one NNRTI drugs. 1. We employed the min, max and average operators to choose the opti- mal treatment with a low treatment failure and low virologic failure. The analysis result indicates that TDF/3TC/NVP has high treatment and virologic failure, however, ZDV/3TC/EFV, TDF/FTC/EFV, ZDV/3TC/NVP,TDF/FTC/NVP, and TDF/3TC/EFV have low treatment failure and virologic failure ranked from 1st 9.4. The Case Study 187 to 5th respectively. This result is based on the assumption that TF is more im- portant than VF. On the other hand, the priority of the treatment varies when we do not provide any importance to the criteria (when TF and VF have equal importance). In this example, TDF/FTC/EFV is ranked first and TDF/3TC/NVP as the worst in virus suppression and treatment adherence. The TDF/FTC/EFV is a first fixed-dose triple antiretroviral combinations drug which is administered once-daily. Some cohort and clinical studies revealed that patients treated with TDF/3TC/NVP have worse virologic outcomes compared to other first line an- tiretroviral regimens [TKS12, SDR+10, GDA+06]. The cohort study [SDR+10] noted the higher rate of VF with patients initiating TDF/3TC/NVP (16.1%) com- pared to ZDV/3TC/NVP (9.5%). Similarly, Gallant et al., [GDA+06] proved the superiority of TDF/FTC/EFV over ZDV/3TC/EFV in terms of virologic suppression. Rey et al., in their analysis of DUAFIN study revealed higher rates of virologic failure among patients on TDF/3TC/NVP (8 of 36) compared to ZDV/3TC/NVP (0 of 35). In addition, current antiretroviral guidelines (US, UK and WHO) rec- ommend TDF/FTC/EFV as a preferred first line regimen and ZDV/3TC/EFV and ZDV/3TC/NVP as alternative regimens. 2. Adverse effect: The adverse effect consists of six adverse effects caused by the antiretroviral regimens. ANM (anemia)is the most important adverse effects and CUT (cutaneous) as the least important sub-criteria. According to the anal- ysis TDF/3TC/EFV and TDF/FTC/EFV are ranked first with little adverse reactions and ZDV/3TC/EFV ranked last with high adverse effects on HIV-infected pregnant women. Related to this [GDA+06] argued that TDF/FTC/EFV and TDF/3TC/EFV has minimum side effects compared to ZDV/3TC-based combinations. The main adverse events of antiretroviral drugs are: anemia, central nervous systems, re- nal failure, gastrointestinal abnormalities, hepatoxicity, lactic acidosis, pancre- atic and rash and hypersensitivity( [WHO13], [KCP+07, KBW05, SCAM+13, AO13, EBA12, RK05, TKS12, GDA+06]. Eluwa and colleagues [EBA12] re- ported pain and skin rash are the commonest adverse events. They further discussed that adverse drug reactions are the very reason for poor adherence to treatment, therefore identifying the adverse events has vital importance to op- timize the initial choice of the antiretroviral regimen [EBA12]. Compared to pa- tients onTDF, ADR was less likely to occur in patients on d4T and ZDV.Conversly, Agu et al., [AO13] reported that 60% of the adverse events occurred by patients on zidovudine-based regimens; adverse event was less likely to occur in patients on d4T and ZDV compared to TDF. Peripheral neuropathy (tingling, numbness and pain), skin rash (cutaneous), pruritus and dizziness are the commonest ad- verse events [AO13]. 4.3% of anemia cases is reported in patients who received ZDV-based regimens. 3%-26% of skin rash is reported in patients on NVP regi- men [AO13, SCAM+13]. 3. Fetal effect: In this part of the analysis we attempted to investigate the effect of antiretroviral therapy for the fetus. In this criteria, mother-to-child transmission (MTCT), birth defects (BD), and abortion(ABO) are included. MTCT is given higher importance than BD and ABO. In the review process we didn’t find any study (clinical or cohort) that shows antiretroviral drugs that causes 188 Chapter 9. User preference prioritization and aggregation any type of abortion (induced or spontaneous). We extract the row data col- lected from 1989- 20113 by APR [APR13]. A number of regimens have been identified that are effective in reducing mother-to-child transmission. Accord- ing to the WHO 2013 guideline [WHO13], combination antiretroviral therapy taken over a longer duration is more effective than a short-course single drug regimen. A number of short-course antiretroviral regimens including zidovudine alone, zidovudine/lamivudine; and a single does nevirapine combined with either short-course zidovudine or zidovudine/lamivudine have been effective in reduc- ing prenatal transmission. In our analysis, ZDV based combination ZDV/3TC/NVP shows low rate of MTCT and TDF based combination that combined with EFV demonstrated little birth defects. Generally, TDF based combination is superior than ZDV based combination in fetal risks. No data is found that shows abortion caused by antiretroviral regimens. 4. Selection of antimalarial drugs. Quinine and artemether-lumefantrine (Coartem) are recommended drugs for uncomplicated and complicated plasmod- ium falciparum. Ethiopia uses these drugs to treat plasmodium falciparum. We analyzed the clinical trials and cohort studies data to evaluate the efficacy, fetal effect and adverse events of drugs used in pregnancy. The findings showed that artemether-lumefantrine (99%) is superior in efficacy than quinine(97.6%). Be- sides, there were few spontaneous abortion and neonatal deaths,and still births proportionally lower in the artemether-lumefantrine than in quinine group. On the other hand, infants born from women in the quinine group showed better mean birth weight than artemether-lumefantrine group. 5. Adverse events of antimalarial drugs: The most common adverse events reported after the treatment of quinine and artemether-lumefantrine are tinnitus, abdominal pain, influenza, headache. From the data we inferred that quinine showed slightly higher adverse events than artemether-lumefantrine. Generally, based on the analysis we may concluded that artemether-lumefantrine is pre- ferred above quinine for pregnant women to treat uncomplicated plasmodium falciparum which is exactly aligned with the 2010 WHO antimalarial guide- lines [WHO10c]. However as it is discussed in Section 9.4.1, the concentration of artemether-lumefantrine may be reduced when administered with nevirapine (NVP) or efavirenz (EFV), that leads to treatment failure. 6. Patient decision: This is the decision made by the patient; this includes the antiretroviral, antimalarial drugs, price and availability. In this aggregation we analyzed the patient decision with additional criteria:price, availability; and without price and availability. The result of aggregation without the price and availability criteria shows the combination prioritized T3: ZDV+3TC+EFV+QU (see Figure A.11) is ranked first; however, the combination treatments with price and availability prioritizes T1: ZDV+3TC+NVP+QU (see Figure A.13). 7. Doctor decision: The anti-HIV and anti-malaria treatment decision made by the doctor addressed in two ways, first the efficacy and risk of the doctor is aggregated. In this aggregation T8: TDF+3TC+EFV+AL (see Figure A.12) is ranked the optimal treatment, but when the rating includes the price criteria, the result of prioritization is the same as the previous one, for detail see Fig- 9.5. Conclusions and Future Research 189 ure A.14. This optimal selection is compatible with the treatment recommended by WHO [WHO13] guidelines.

The resulting treatment prioritization This section presented the aggregated result of antiretroviral and antimalar- ial treatments for HIV-infected pregnant women. Figure 9.3 and 9.4 presents the aggregated data for antiretroviral and antimalarial drugs. The next step is to join the aggregated scores of the antiretroviral and antimalarial treatments. OWA is employed to compute the overall aggregation of antiretroviral and an- timalarial. The results are summarized in Figure A.15. Thus, the result depicts that the combination of TDF/3TC/EFV + QU is superior to treat HIV and malaria. Besides, TDF-based combination with EFV shows better results compared to TDF- based combination with NVP. On the other hand, ZDV-based combination with NVP is superior to the combination with EFV. Generally, the aggregation re- sults also demonstrated that EFV is a preferred NNRTI regimes than NVP. As we can see from the aggregation results, artemether-lumefantrine is preferred to quinine. However, some studies reported there is a potential drug-drug in- teractions between antiretroviral and antimalarial therapies. Co-administration of artemether-lumefantrine with antiretroviral therapies (efavirenz or nevirap- ine) has potential drug interactions [KMW+11, BKLM+12, KBW05]. Nevirap- ine and efavirenz significantly reduced artemether plasma concentration, elevate lumefantrine plasma concentrations and reduce nevirapine exposure [KMW+11, BKLM+12]. These drug interactions may increase the risk of malaria treatment failure and development of resistance to artemether-lumefantrine and nevirap- ine [KMW+11, BKLM+12]. The cost of antiretroviral is alarmingly decreasing from year to year (for de- tail price see Table 9.5). So the TDF-based antiretroviral is preferred above other regimens since the pricing is dramatically falling and it is a single-tablet fixed dose combination. To sum up, the result obtained from the experiment is com- patible with the current national and international guidelines of antiretroviral and antimalarial therapies.

9.5 Conclusions and Future Research

There has been an increasing trend of providing health services from “one-fits- to-all” to patient-centered medical care; therefore the ability to model users attitudes, experiences, habits and and behaviors is very crucial. Preference can be either personal preference or domain knowledge preference. In this chapter we use ordered weighting average operator and AHP to prioritize and aggregate user preference and domain preference particularly treatment preference for HIV and malaria treatments for pregnant women. Our priority is based on the WHO antiretroviral and antimalarial guidelines. Efficacy, adverse events and fetal effect of the treatments are the criteria used to prioritize the treatments based on the individual preferences. Finally, we aggregated the results and the optimal 190 Chapter 9. User preference prioritization and aggregation treatment is selected. Part V

Prototype Development 192

This part of the thesis contains two chapters in which we describe the implementation of the prototype and the conclusion of the thesis which describes the research contributions, limitation of the thesis and gives an outlook on possible future work in the examined filed of the research.

Chapter 10 gives a detail analysis of the system implementation. We start with an overview in Section 10.2 and the requirement elici- tation techniques used are discussed in Section 10.3. The design principles of the prototype is addressed in Section 10.4. We use ob- ject role modeling (ORM) to design the conceptual model and some of the algorithms used in the implementation is presented in Sec- tion 10.5. We present the evaluation results conducted to validate our prototype is described in Section 10.6 and the chapter ended with concluding remarks (Section 10.7). Chapter 11 recapitulates the fundamental contributions of this thesis and an outlook on possible future work will be given. It starts with the an overview in Section 11.1 and we list the thesis contribution in Section 11.2. Section 11.3 discusses the limitation of the thesis and the future research directions is given in Section 11.4. Chapter 10

TenaLeHulum (Prototype/Implementation)

10.1 Background

In this research case studies, interviews, questionnaires, focus group discussions, and observations have been conducted (see chapter 2). In the case studies, a gap analysis is performed in health centers and hospitals. Based on the findings of the cases studies we proposed a service discovery framework in chapter 4 in Figure 4.1. The current chapter presents the implementation and the evaluation of this framework. As it has been discussed in the previous chapters, the frame- work consists of various components: request elicitation, query enrichment and preference prioritization and aggregation. We use the healthcare domain to im- plement our framework. This chapter is organized as follows: the overall problem of the healthcare domain is discussed in Section 10.2.In Section 10.3 requirement elicitation is presented. We discuss the development and implementation pro- cess in Section 10.5. The evaluation technique used and the evaluation results are presented in Section 10.6. Finally the chapter is wrapped up by concluding remarks in Section 10.7.

10.2 Problem Formulation

In Ethiopia a large proportion of the population still resides in rural areas where healthcare access and delivery are often poor. These areas can potentially bene- fit from innovative services models and supporting technologies. The challenges of healthcare quality are many, ranging from poor infrastructure, low literacy, poverty to inadequate healthcare services for monitoring of patients with chronic diseases. This myriad of challenges requires innovative solutions that are afford- able, robust and sustainable over time. Due to the multifaceted problems (e.g. lack of basic infrastructures (electricity, healthcare facilities, clean water, road) 194 Chapter 10. TenaLeHulum (Prototype/Implementation) poverty, illiteracy, etc) of rural areas and inhabitants, healthcare should be as- sisted by the available innovative information technologies i.e., eHealth. The nature of healthcare provided (especially in the rural communities) is in- fluenced by the available resources at health centers. Besides, the daily demand cannot be predicted since a large proportion of the patients are walk-in patients. The result is that patients do not always receive all the needed attention and where clinics cannot provide a sufficient service, the patients are referred to the district, zonal or referral hospitals. Patients can even return home without receiving any treatment. One of the main stressors in this environment is trans- portation; public transport is expensive and not always available in some areas these services do not operate due to poor road conditions. Private transport is only available to a few and other residents pay if they utilize (hire) such private transport. Identifying and analyzing the problem adequately prevents from the mis- match between the system and the actual need or requirement of the users. Most information systems design failure is resulted from poor analysis of the social, cultural and political dimensions of the user. So analyzing the problem should be based on a strong user-centered approach. As a result, in this study we attempt to use different methodologies to reveal the requirements of the user. In many developing countries e-mail and text based messaging improve the com- munication among healthcare workers and patients by removing the need to improve in person, as occurs in office visits, or the problem of enduring interrup- tions at work. E-mail and text messaging communication do not concurrently engage both parties and messages can be accessed by the pace of the receiver. However, this kind of communication, particularly in Ethiopia, is far from prac- tical especially in rural areas where the majority of the population resides and more than half of the population are illiterate or have low literacy level. The above mentioned modalities can be feasible for healthcare workers, however, the infrastructure obviously is a bottleneck. Although, there exist a grand challenge to use ICT fully, the expansion of cell phone and mobile networks sheds some lights in using ICT to reach the vulnerable citizens in rural area.

10.3 Requirement Elicitation

Developing a conceptual model for the healthcare domain is a daunting task since the number of concepts is enormous and the relationships between these entities are complex and sometimes vague. Given the constraints, various steps are taken to derive the requirements for the system and to develop the prototype.

Requirement Gathering Tools

To gather the requirements of the systems, we employ various techniques: ethnog- raphy, interview, questionnaire, and focus group discussion. First, the health institutions, the rural health centers in particular, are visited. 10.3. Requirement Elicitation 195

Ethnography Ethnography in software engineering is a means to provide an in depth under- standing of the socio-technical realities surrounding everyday software develop- ment process. Ethnography involves social interaction between the researcher and participants, which helps to capture firsthand data. Ethnography methodol- ogy helps us in predesigning research and also to generate research questions. In this session, we observe the available facilities of the health institutions, labora- tory, laboratory equipments, examination roos, pharmacies, health professionals, and other infrastructures (electricity, water, telecommunication, internet access (mobile internet) and road and transport facilities). The ethnography investi- gation apt to modify the requirement elicitation tools. In the process of obser- vation, we have learnt, how the healthcare workers treat patients, how long the diagnosis process has taken place, what are the common cases the healthcare workers encountered and observed the available facilities.

Interview An individual interview is undertaken from different healthcare institutions: hos- pitals, health centers, and health posts. The interview is conducted to derive the requirements of the healthcare workers. Besides in ten health centers we visited for individual interview, informal discussion and brain storming meet- ing was conducted. In this discussion, we discuss the potential of information technology in assisting the burden they shoulder in their day to day activities. In this discussion and brain storming session, basic infrastructure (electricity, water, and ICT literacy) is the main obstacles to use ICT in healthcare sector. All the interviews conducted has been audio taped, transcribed and analyzed.

Questionnaire Questionnaire is one of the techniques used to gather requirements individual to individual. In this research we use questionnaires to elicit user requirements and domain requirements. We use closed ended and open ended questions. The main advantage of a questionnaire is, it can reach many people/users with a low resource. However, design a quality questionnaire is crucial and response rate might be low.

Focus Group Discussion Focus group is emerged as a data collection method in 1950s in the social sci- ences. Focus group is defined as a “research technique that collects data through group interaction on a topic determined by the researcher” [Mor96]. We con- ducted four focus group discussions in three health centers we have visited. In the focus group discussion different questions was posed for the health officers and nurses to discuss and reflect their perceptions, opinions, beliefs, and attitudes towards the application of ICT on the healthcare and how can ICT facilitate 196 Chapter 10. TenaLeHulum (Prototype/Implementation) their daily activities. In one of the health centers which the focus group dis- cussion has conducted one of the participant is an IT officer who is assigned for data collection purpose. This health center is more equipped in basic infras- tructure (electivity, road etc) compared to other health centers we have visited. In the discussion, the participants addressed lack of ICT facilities and lack of ICT based training except the IT officer. They said “even if ICT can facilitate our daily activities, there are a lot of issues to be resolved first”. In the dis- cussion several substantial ideas, opinions and feedback have been given. The main focus of the discussion was the potential problems that the health centers faced and also derive alternative opportunities to implement eHealth. Another discussion point in the focus group was the exposure and readiness of healthcare workers to use ICT in their profession in order to minimize the protruded mor- bidity and mortality. Basic physical infrastructure (electricity, road, Internet, ICT related equipments), laboratory equipments, and human resources are the main problems faced the health centers. Our intention of this focus group is to assess the availability of ICT infrastructure, mobile phone usage by the health professionals, and awareness and readiness of healthcare workers in using ICT to assist their profession.

10.4 Prototype Design

The goal of designing a robust and affordable ICT enabled system through which patients and healthcare workers submit vital signs, symptoms, measurements and overall patient conditions to make decisions and to allocate resources accord- ingly, and collectively, to create a system that improves healthcare services. The prototype meet the user requirements and quality of services. In this prototype, we include two main disease: HIV/AIDS and malaria. The main signs, symp- toms and treatments are recorded in the repository. HIV/AIDS and malaria, TB are the most common cause of morbidity and mortality in the country. As a result, for a small-scale prototype a fair amount of data is collected.

10.5 Implementation

As discussed in Section 10.2, we first design the information structure for our intended prototype. We use the Object Role Modeling (ORM) technique to describe the information structure. The underlying relational database structure for our prototype then is obtained by the standard transformation as provided by ORM and elementary linguistic derivations from the elementary sentences. We present the related class diagrams to show the required functionality between the resulting object classes. We also discuss some of the algorithms used in the prototype. 10.5. Implementation 197

10.5.1 The Conceptual Model The conceptual model underlying our prototype is presented in Figure 10.1. This conceptual model shows all concepts and their relations, and has graphical representations for frequently occurring constraints. All fact types in this model correspond to elementary sentences in the associated application domain. The corresponding information grammar lists all these elementary sentences:

Figure 10.1: The Conceptual Scheme

1. The patient • Patient (Pid) has (GivenName), (FamilyName), (Birthdate), (Gender), (Address). • Patient (Pid) is living in Place (PlaceId).

• Patient (Pid) has Preference GRAMMAR(Gpref ). • Patient (Pid) has AllergyType (ATypes) for Disease (Did). • Diagnosis: Patient (Pid) is diagnozed on Date (DateStr) for Disease (Did). 2. The diseases • Disease (Did) has (DiseaseName), (Description). 198 Chapter 10. TenaLeHulum (Prototype/Implementation)

• Disease (Did) has associated Disease (Did). • Disease (Did) is recognized by Symptom (Sid). • Disease (Did) is occuring in Place (PlaceId). • Disease (Did) is typical for Season (SeasonId). • Disease (Did) in Phase (PhaseNr) can be treated with Drug (Drid). 3. The symptoms • Symptom (Sid) has (SymptomName). 4. The drugs • Drug (Drid) has (DrugName), (Usage), (SideEffect). • Drug (Drid) conflicts with Drug (Drid). • Drug (Drid) has shown in previous Diagnosis (Patient, Date, Disease) the AdveEffect (AEtypes) in Level (Lnr). • Usage: Drug (Drid) is used with Type (Tid) Unit (Uid). • Usage (Drug, Type, Unit) has associated cost (Amount). • Dosage: Usage (Drug, Type, Unit) is served in Quantity (Nr). • Dosage (Drug, Type, Unit) has (Duration), Description. • UsageRestriction: Usage (Drug, Type, Unit) is served higher than Quantity (Nr). • UsageRestriction (Usage, Quantity) requires minimal (Age). • UsageRestriction (Usage, Quantity) requires maximal (Age). • UsageRestriction (Usage, Quantity) requires minimal (Weight). • UsageRestriction (Usage, Quantity) requires maximal (Weight). 5. The prescriptions • Diagnosis (Patient, Date, Disease) resulted in prescription of Dosage (Usage, Quan- tity) 6. The environment • Season (SeasonId) starts at Date (DateStr). • Season (SeasonId) ends at Date (DateStr). • Season (SeasonId) has average (Temperature). • Season (SeasonId) is of average (Humidity). • Place (PlaceId) had (PlaceName). • Place (PlaceId) had (Elevation). This information grammar forms the basis for a conceptual language tailored to this application domain. As an example, the following compound sentence is derived form the information grammar using the construction rules from ORC and elementary linguistic variations of the elementary sentences: (Disease OR OTHERWISE associated with Disease) being recog- nized by Symptom with Name ’coughing’ AND ALSO being typical for Season with Humidity > 70% AND ALSO occurring is Place being living place of Patient ’P000’. specifies all diseases that can be recognized by the symptom ’coughing’, together with all the associated diseases during a season of high humidity and occurring in the living place of the patient with Pid ’P000’. From this conceptual model the database structure for the prototype has been derived by the standard ORM technique for transforming a conceptual scheme into a relational scheme. 10.5. Implementation 199

10.5.2 The Database Structure In Figure 10.1 the conceptual schema for the prototype is displayed. This scheme is transformed into the relational schema consisting of the following tables. The underlined attributes form the primary key of the table. A group of attributes that are a foreign key are denoted between brackets. 1. Patient (Pid, GivenName, FamilyName, BirthDate, Gender, Address, Place, [Preference]) 2. Disease (Did, DiseaseName, Description) 3. Symptom (Sid, SymptomName) 4. Drug (Drid, DrugName, Usage, [SideEffect]) 5. Place (PlaceId, PlaceName, [Elevation]) 6. Season (SeasonId, StartDate, EndDate, Humidity, Temperature) 7. AssociatedDiseases ((Did), (AssDid)) 8. ConflictingDrugs ((Drid), (ConflDrid)) 9. RecognizeBy ((Did), (Sid)) 10. TreatWith ((Did), Phase, (Drid)) 11. DiseaseLocation ((Did), (PlaceId)) 12. DiseaseSeason ((Did), (SeasonId)) 13. Usage ((Did), Type, Unit, Cost) 14. Dosage ((Did, Type, Unit), Quantity, [Duration], [Description]) 15. UsageRestriction ((Did, Type, Unit), Quantity, [MinWeight], [MaxWeight], [MinAge], [Max- Age]) 16. Allergy ((Pid), AllergyType, (Drid)) 17. Risk ((Drid), AdvEffect, Level, (Did, Pid, Date) 18. Diagnosis ((Did), (Pid), Date) 19. Prescription ((Did, Pid, Date), (Drid, Type, Unit), Quantity)

10.5.3 Some of the Algorithms The next step shows the block of pseudo-code of the discovery engine. For exam- ple, after the symptoms of a patient have been identified and the environment where the patient is living, the prototype will first generate a list of possible dis- eases. The pseudo code is presented in algorithm 9. The algorithm starts with the generation of a list of diseases that is sufficiently related to the symptoms reported (line 7). This list is augmented with all diseases that are (directly) associated (lines 8-12). From this candidate list, only those diseases are selected that are sufficiently likely. This is done by evaluating a disease score (line 19) based on the patient history, the disease seasonality and how common the disease is in the patient environment. Next we discuss in Algorithm 10 the selection of a treatment for a given disease for a given patient. We start with determining the treatment phase for the disease from the patient archive. Then we select all drugs related to the disease, but remove those for which the patient has shown to be allergic. Next we find the possible dosages for these drugs, and check for conflicting drug patterns for that patient. Finally we convert the resulting dosages into the possible treatments. 200 Chapter 10. TenaLeHulum (Prototype/Implementation)

Algorithm 9 Get list of possible diseases 1: fun GetDiseases (Symptoms, Id, Environment) 2: Input: Symptoms = list of symptoms, 3: Id = patient identification, 4: Environment = patient environment, 5: Output: list of pairs (disease, likelihood) 6: 7: Candidates = MatchDiseasesWith (Symptoms); 8: AssociatedDiseases = empty; 9: foreach Candidate in Candidates do 10: AssociatedDiseases += getAssociatedDiseases (Candidate) 11: od 12: Candidates += AssociatedDiseases; 13: 14: Result = empty; 15: foreach Dx in Candidates do 16: isPrev = Dx ∈ previousDiagnosis (Id); 17: isSea = isSeasonalDisease(Dx, currentSeason); 18: isLoc = isCommonInArea(Dx, Environment); 19: Score = getTotalScore (Dx, isPrev, isSea, isLoc); 20: if Score ≥ Treshold then Result += Dx fi 21: od 22: return Result 23: endfun

Algorithm 10 Treatment selection 1: fun SelectTreatments (Dis, Id) 2: Input: Dis = investigated disease, 3: Id = patient identification, 4: Output: a list of possible treatments for that patient 5: 6: phase = selectPhase (Dis, Id); 7: 8: candDrugs = getDrugsByDisease(Dis, phase); 9: candDrugs = takeNonAllergicDrugs(candDrugs, Id); 10: 11: candDosages = getPossibleDosages(candDrugs, Id, Dis); 12: candDosages = takeNonConflitingDosages(candDosages, Id); 13: 14: candTreatments = getPossibleTreatments(candDosages, Id); 15: 16: return candTreatments 17: endfun 10.6. Evaluation 201

10.6 Evaluation

To evaluate our prototype and preference model we administered questionnaires for healthcare workers in Ethiopia and the Netherlands. The questionnaires consists of patients health condition and list of symptoms. Some of the questions also provide detail information about patients personal information, previous history, context and list of symptoms. This information is designed to evaluate and test the accuracy of the system to predict the possible illness, possible treatment and expected risks and side effects of the drug prescribed. Thus the result of the study indicates that the prototype % similar with the healthcare workers judgment. Prototype evaluation is performed to achieve not only the actual performance and accuracy of the prototype in comparison to the expert judgment, but also in the user’s perceived value; both from a personal and from a healthcare improve- ment perspective, and all over acceptance value in the factors that determine these perspectives. In the prototype evaluation there is a mixed approach, in one hand, there are groups in favor of the system as a decision support system on the other hand there are groups against the prototype. Patient data must be adequate to make a valid treatment decisions. The problem arises when the healthcare worker met with an overwhelming amount of specific and unspecific data, which he or she can not process, on the other hand, when the healthcare worker got insufficient data about the patients: symp- toms, signs, previous history, and laboratory test and some body measurements. The quality of available data is of equal importance. Similarly knowledge used in decision making process must be accurate and current. Medical knowledge and access to information sources have a major importance on clinical decision making, which mainly lacks in the rural healthcare workers in developing coun- tries, it might be due to the limited training and unavailability of additional information sources. In the questionnaire administered we learned that health- care workers with better education (medical doctors, health officers and nurses working in urban areas with some years of experiences) provide better treatment decisions and process of diagnosis. Moreover, good problem solving skills are required to utilize available data and knowledge. Healthcare workers face numerous knowledge needs during the course of patient care and the majority of these needs are not met, compromising the quality of care. eHealth knowledge resources that are capable of solving many of these knowledge needs are now widely available, but a series of barriers hinder a more effective and frequent use of these resources at the health centers and hospitals. One of the challenges of ICT based knowledge resources, e.g. clinical decision support systems, is the experts (healthcare workers) claim that they do not need any support systems since they considered themselves as experts. Some healthcare workers also raised a concern of a general use of healthcare ICT, particularly computer use, during diagnosis process would adversely affect the patient-healthcare worker relationship. Another problem of decision support system is patient’s perception towards healthcare workers who uses decision support systems. [SPM+13] revealed that 202 Chapter 10. TenaLeHulum (Prototype/Implementation) patients viewed physicians who used the tools as less capable than those who make judgments without the computerized tool or who chose to consult a col- league. The patients whose physicians used the tools were more dissatisfied and may be more likely not to comply with treatment recommendations. Related to this, some research reports showed that a healthcare worker who uses a diagnos- tic system for medical diagnosis was perceived to be less capable compared than a healthcare worker using a personal judgment without a diagnosis systems. From this it is possible to argue that patients have negative perception of physicians need to seek advice from an external source: electronic or human [SPM+13]. The concern may emanate from the incorporation of electronic health support may be seen as a replacement of the conventional the patient-doctor relationship. However, eHealth systems improve the safety and outcomes and reduce medi- cation errors. In this regards, Courtney et al. [CAD08] said that clinical decision support systems “improve diagnostic accuracy, provide easier and more rapid ac- cess to patient information and more complete medical records”. Designing service discovery that optimally supports healthcare workers in clinical practice is thus challenging. One approach used to achieve these chal- lenging goals is referred to as user centered design [KPR+13]. User centered system design is a system development technique that explicitly focusses on an- alyzing end-users needs, mental process, limitations and preferences in order to design a system that meets end-user requirements [KPR+13].

10.6.1 Result A questionnaire that contains eight case studies were administered in rural health centers in Ethiopia. The questionnaire consists of signs and symptoms with pa- tient previous history and personal information. This information represents cases that an example of patients complaints, diagnosis and administered treat- ments. Having taken the information, the prototype provides the potential dis- eases and possible treatments. The cases of the questionnaire are described in appendix B.1. For example, the first case study is presented as follows: Assume a 45 years old man has the following symptoms for the last two days: headache, fever, loss of appetite, cough. On May 10, 2013 this patient has been prescribed antimalarial medicine (chloroquine). The patient lives in Bahir Dar, where the maximum temperature is 33 degree Celsius and the minimum temperature 8 degree Celsius. The current season in Ethiopia is Summer.

10.6.2 Discussion In Figure 10.2 we see the similarities between the health officer, the nurse and the system displayed as a similarity triangle. The ideal situation is the grey triangle, where all three similarities are maximal (value 1). The yellow triangle shows the actual similarity values. We define the similarity coverage as the ratio between the area of the actual similarity triangle and the optimal similarity triangle. Figure 10.2 highlights the diagnosis similarities, in Figure 10.3 the similarities between knowledge of side-effects is shown, while Figure 10.4 focuses 10.6. Evaluation 203 on the treatment. For the similarity coverage we have: diagnosis (33%), side- effect(15%) and treatment(43%). So for treatment knowledge we find the highest similarity coverage.

Figure 10.2: Similarity coverage for diagnosis

Figure 10.3: Similarity coverage for side-effect 204 Chapter 10. TenaLeHulum (Prototype/Implementation)

Figure 10.4: Similarity coverage for treatment The result of the study revealed that health officers have obtained higher score than nurses in diagnosis and side effects. In treatment selection, health officers and nurses have similar results with the system. If diagnosis made in- correct, patients may receive inaccurate information regarding their prognosis, may undergo inappropriate medical treatment or the correct treatment may be withheld [MMW+10]. From this we deduce that the health officers has better accuracy than the nurses, although, the difference between nurses and health officers is out of the topic of this theses, we speculate that the difference arise from the training they had. In this regard, an e-health system can reduce misdiagnosis and improve treatment selection.

10.7 Concluding Remarks

TenLeHulum is a discovery system that provides assistance for healthcare work- ers to give optimal diagnosis and treatment decisions. This system will enhance the healthcare delivery particularly in rural areas. As we can learn form the result of the analysis nurses may profit a lot more form the system. Chapter 11

Conclusion and Future Research

11.1 Overview

This chapter is the climax of the journey that started in the first chapter. In it we look back and assess how far we moved towards answering the research questions and how far we have gone realizing the research objectives that have guided our research throughout the chapters. The chapter, thus starts by looking in the research contributions. We point out the sections where these contributions can be traced out. The journey was not completely smooth, so we point out the limitations of the research that prevented us from going further than what we had wanted. The limitations that we encountered throughout the research process yields problems that requires further research to strengthen and fill the loopholes.

11.2 Research Contributions

To provide research contributions, we look back at the research problem that we set out to solve and the research questions that we had posed at the beginning of the research in Chapter 1, section 1.2.1 and assess how far the research has tried to answer them. To make the reading smooth, we intended to briefly discuss the research problems, questions and objectives and present our contributions below.

Research Problem Research Questions and Objectives The contribution of this thesis is derived from the following research ques- tions RQ and objective OBJ

RQ What is an adequate model for service discovery in a healthcare domain in developing countries? 206 Chapter 11. Conclusion and Future Research

The above questions is answered by achieving the following main objective.

OBJ The development of a framework that explains and describes a service dis- covery model to be applied in the healthcare domain in a low infrastructure context.

To further elucidate the research, we broke down the main research question and objective into sub-questions and sub-objectives.

RQ1 Is Ethiopia ready to implement eHealth in terms of technology readiness? What are the main opportunities and threats?

The objective of this sub-question is to attain the following objective:

OBJ1 To assess and evaluate opportunities and threats for implementing eHealth services.

This sub-question assesses how ready the country is in order to implement eHealth services in terms of infrastructure, institutional and social issues. This question identifies the main strengthes, weaknesses, opportunities and threats that can facilitate or hinder the utilization of ICT based health services. In this assessment, we have emphasized on both the availability and accessibility of ICT based infrastructures and the major bottle necks that impede the eHealth implementation.

RQ2 Is mHealth viable to Ethiopia?

The intention of this question is to assesses the feasibility of mobile health in Ethiopia in the current situation. The objective of this sub-question is:

OBJ2 To assess the expansion of mobile users and identify the main challenges of using mobile phone in healthcare domain by rural healthcare workers (health officers, nurses and health extension workers).

The driving force of this assessment is the widespreading of mobile networks and mobile phones connecting people both in rural and urban Ethiopia compared to computers and internet provisions in the country. The study result indicates that all healthcare workers in rural health centers owns mobile phones, although, basic infrastructure is not available in the health centers. In the study healthcare workers awareness of ICT is very limited. Consequently, a mechanism need to be devised to create ICT awareness for rural healthcare workers to use Internet through mobile phone. This may shed some light to solve some professional problems using IT technologies. Besides, if the basic infrastructure is in place, there will be an opportunity to develop and implement clinical decision support systems in rural areas. This may help health officers and nurses can do of physicians and specialists in rural health centers.

RQ3 What is the impact of user requirement elicitation towards service descrip- tion and discovery? 11.2. Research Contributions 207

The objective of this sub-question is: OBJ3 To identify the techniques and methodologies used in user service re- quirements elicitation for a wide audience and non-specific users? And to evaluate the relationship and difference between conventional and service oriented requirement elicitation. To assess the techniques used to elicit user requirements in service oriented ap- proach, we conducted a survey and a case study. The results of the survey indicate a lack of user involvement in the early stage of service description. In addition, the survey revealed that there is no standard user requirement elici- tation techniques. Besides, the survey result shows that conventional software engineering requirements elicitation techniques can not be used in service ori- ented requirement elicitation. The main contribution of this chapter is to assess the impact of user requirement elicitation in the process of service description and service discovery. RQ4 Is it possible to design a dialogue system based on face-to-face doctor- patient interaction in diagnosis process considering cultural diversity? The objective of this sub-question is: OBJ4 To identify the main gaps of face-to-face doctor-patient interaction and to emulate the techniques employed in spoken dialogue design for healthcare. The main contribution of this study is to identify and evaluate the face-to-face doctor-patient interaction. From this face-to-face interaction we proposed a model for designing a spoken dialogue system for healthcare domain. RQ5 What are the components of service discovery? The objective of this sub-question is: OBJ5 To develop a service discovery framework and analyze the relationships of components. The case studies and surveys performed in Chapters ( 2, 3, and 6) helped to develop the service discovery framework. In Chapter 4 we described a new framework that can be used to search health services. The novelty of the ap- proach is that it encompasses personal/user information (user profile and user context) and domain knowledge to retrieve health information in the reposi- tory. This framework consists of user profile, user context, query interpreter and matchmaker as main components. These components speed up the process of service discovery. The main contribution of this chapter is incorporating user information and domain knowledge in the process of service discovery. RQ6 How do we enrich user queries using user preference and domain knowl- edge? The objective of this sub-question is: 208 Chapter 11. Conclusion and Future Research

OBJ6 To enrich user queries using personal profile, user context and domain knowledge. User queries only consists of symptoms, and is mainly provided by semi-literate and illiterate users. In Chapter 8 we introduced a new query enrichment approach that can be used to enrich user queries using user information and domain knowledge. This chapter extends on one of the components of the service discovery framework. In this chapter we used the preferential model. the preferential calculus, and CP-nets to enrich the initial user query. The main contributions of this chapter are: • enriching queries using user preference, user context, and domain knowl- edge that increases information retrieval in healthcare domain • Conditional preference network to rank and prioritize user preferences • developing a prototype to enrich user queries which contains user informa- tion and domain knowledge.

RQ7 How do we prioritize and aggregate treatment decisions using user pref- erence?

The objective of this sub-question is: OBJ7 To select a personalized treatment based on user preferences. AHP and OWA are used to prioritize and aggregate treatment decisions for pregnant patients co-infected by HIV/AIDS and malaria. In this Chapter 9 we used AHP and OWA to prioritize HIV/AIDS and malaria treatment alternatives. The main contributions of this chapter are: • Multiple criteria decision making is extended with decomposition mecha- nisms. • The medical decision problem is shown as a special but complex case. • User and domain knowledge preferences are prioritized and aggregated. • User preference prioritization and aggregation provide personalized treat- ment. • We demonstrate this by antiretroviral and antimalarial treatment

11.3 Limitation

This research sets out to develop a service discovery framework in eHealth to facilitate health service delivery for undeserved population with a limited infras- tructure context. We assessed and conducted a couple of empirical studies that can facilitate health service discovery or search. Although, we successfully de- velop a framework, conduct case studies, and develop a prototype, a number of limitations which may be categorized as theoretical and/or practical limitations. 11.4. Future Research 209

The thesis addresses eHealth service discovery in Ethiopia, in which a country with a low infrastructure. The scope of the thesis is limited to the Ethiopian case in the healthcare domain. The propelling factors of this research are the burden of disease, low infrastructure, shortage of healthcare professionals as well as a high morbidity and mortality rate of children and mothers due to preventable dis- eases: infections disease. One of the limitations of this thesis is low involvement of healthcare professionals. Recently, participatory approach has gained interest in designing and developing eHealth systems. Several researchers emphasize the need of understanding the domain context in system design and involving end- users in development activities. Clemensen et al. [CLKK07] have claimed that participatory design can effectively integrate and merge computer technology and health related interventional approach. Although, user oriented design has played a vital role in eHealth development, our effort to involve physicians in the design and development process was not successful as we had wanted. For ease of use and accessibility of the system, we consider to employ a spoken dialogue system (voice based navigation), but sofar there is no any Amharic dialogue system in place in the healthcare domain. Thus, we have found that developing a spoken dialogue systems is a huge task by itself. Therefore the prototype we have developed does hot accommodate semi-literate and illiterate users and does not provide hands free navigation. Furthermore, in order to compare and contrast the experience of healthcare workers for developed and developing countries, we administered questionnaires.

11.4 Future Research

Ideally a clinical tool should be available anytime, anywhere and easy to use. Since our prototype does not support a spoken dialogue, the prototype can not support semiliterate and illiterate users. Therefore we propose to develop a spo- ken dialogue systems. Before opening our system to the wider audience quality and usability issues of the current system should be evaluated. A formative and summative evaluation is required to improve the system effectiveness.

11.4.1 Pilot Study

It is widely believed that introducing an eHealth system will substantially in- crease efficiency and reduce healthcare cost. It is also anticipated that eHealth will reduce the number of patients by decreasing medical errors and treatment failures [CS09]. Related to this, [AS05] reports that the “use of modern ICT offers tremendous opportunities to support healthcare workers and increase the efficiency, effectiveness and appropriateness of care”. However, there can be errors and failures associated with eHealth or ICT in health. The eHealth application can be inappropriately specified, have functional errors, unreliable, user-unfriendly, ill functioning, or the environment may not be properly prepared within the clinical working process. Such errors and failures 210 Chapter 11. Conclusion and Future Research may negatively affect the decision process of healthcare workers and may put the patient at risk [AS05]. To overcome the above mentioned erroneous phenomena, we need to design and implement systems that are free from errors, easy to use, and tolerant to human errors. To protect the negative side effects of ICT, quality initiatives( functional requirements) must start at the early stage of design, implementa- tion and operation (deployment). Iterative evaluation should be a mandatory task in the process of eHealth development. In line with this, Ammenwerth and Shaw [AS05] explained eHealth evaluation has to be a continuous activity that verifies and validates during development, testing and piloting during im- plementation, and monitoring adverse events and effects during operation are unavoidable part of continuous evaluation process.

11.4.2 Evaluation Evaluation is defined as “the act of measuring or exploring properties of a health information system (in planning, development, implementation or operation), the result of which informs a decision to be made concerning that system in a specific context” [AS05]. Evaluating eHealth can evolve a single or a combination of methods. The evaluation may involve a short or long period of time and may also involve a small or a large scale depending on the scope of the evaluation. Formative evaluation and summative evaluation are frequently used methods of evaluation.

Formative

Formative evaluation is an iterative process that can be used in the process of development with the objective of improving the design and deployment of the eHealth systems. The main purpose of formative evaluation is to provide feedback and guidance for the ultimate design development and the impact of im- plemented systems. Formative evaluation may also to assess how the healthcare professionals adopt and use the new technologies. The adoption of eHealth by healthcare workers helps to judge the value of the new systems (eHealth) [CS09]. Our main target is to conduct a formative evaluation during the pilot study. This evaluation method assists to evaluate and judge the functionality, usability and accessibility of the developed systems. To undertake formative evaluation, the team can devise variety of data collection methods such as: interview, ques- tionnaire, focus group, checklist and expert review.

Summative

Summative evaluation is an evaluation conducted after full implementation of the system. The objective of summative evaluation is assessing how completed systems attain a set of pre-defined goals regarding issues of functionality, safety, efficiency and cost. 11.4. Future Research 211

On the basis of the above facts and reasons, a good quality of evaluation activity can contribute to better eHealth systems, and hence a better quality of care

11.4.3 Clinical Decision Support Systems (CDSS) Clinical decision support systems are computer applications that support health- care in decision making through real-time access of medical knowledge. Clinical decision support systems mainly interacts with healthcare professionals and elec- tronic health record (EHR) to access the patient data, however, there is no EHR yet in Ethiopia, therefore it is pivotal to build a medical knowledge repository. It is not necessary to develop medical knowledge base from the scratch because there are many medical knowledge since there are many available clinical knowl- edge repositories (such as SNOMED CT, UMLS, HL7 etc), but it requires to adopt on the basis of the context. Hospitals and clinics have a paper based (hard copy) patient record system; digitizing patient’s data is very difficult as there is no centralized identification (social security number) system in Ethiopia. So the option may be to adopt the open source EHR while patients visiting the hospital by giving unique identifica- tions otherwise it will be cumbersome to track the patient’s history which may hamper the capability of the eHealth system. As a future direction, we consider to adopt EHR form the open source and build a local knowledge base. The potential sources of the knowledge base will be domain experts, patient health records, clinical practice guidelines. The medical knowledge repository should be accessible, comprehensive, valid, up to date, easy to use or search, fast.

Part VI

Back Matter 214

This part of the thesis contains back matters. These includes ♣ Appendix

♣ Bibliography ♣ Summary of the thesis in English ♣ Summary of the thesis in Dutch (Samenvatting)

♣ Curriculum Vitae ♣ SIKS dissertations series Appendix A

AHP and OWA analysis

Figure A.1: Selection of antiretroviral drug based on efficacy

215 216 Appendix A. AHP and OWA analysis

Figure A.2: Selection of antiretroviral drug based on adverse effect

Figure A.3: Selection of antiretroviral drug based on fetal effect 217

Figure A.4: Aggregation of sub-decisions for antiretroviral drugs

Figure A.5: Selection of antimalarial drug based on fetal effect 218 Appendix A. AHP and OWA analysis

Figure A.6: Selection of antimalarial drug based on adverse effect 219

Figure A.7: Aggregation of sub-criteria prioritization for antimalarial drugs

Figure A.8: Aggregation of antiretroviral and antimalarial therapies 220 Appendix A. AHP and OWA analysis

Figure A.9: Doctor’s antiretroviral aggregation

Figure A.10: Doctor’s antimalarial aggregation 221

Figure A.11: Patient’s partial balance (efficacy(Φ1p) and risk(Φ2p))aggregation

Figure A.12: Doctor’s partial balance (efficacy(Φ1d) and risk(Φ2d))aggregation

Figure A.13: Patient’s decision 222 Appendix A. AHP and OWA analysis

Figure A.14: Doctor’s decision

Figure A.15: Treatment Selection Appendix B

Questionnaire

223 224 Appendix B. Questionnaire 225 226 Appendix B. Questionnaire 227 228 Appendix B. Questionnaire 229 230 Appendix B. Questionnaire 231 232 Appendix B. Questionnaire

B.1 Analysis of the questionnaire

Case 1

Assume a 45 years old man has the following symptoms for the last two days: headache, fever, loss of appetite, cough. On May 10, 2013 this patient has been prescribed antimalarial medicine (chloroquine). The patient lives in Bahir Dar, where the maximum temperature is 33 degree Celsius and the minimum temper- ature 8 degree Celsius. The current season in Ethiopia is Summer. As it can be seen from the case descriptions, the case contains patient’s symptoms, personal information (personal profile and previous history) and in- formation about the context. This information is given as input the prototype, then a possible disease with possible treatment is recommended. From the case studies we can deduce the elements of the case

• Symptoms: Headache, fever, loss of appetite, and cough;

• Patient profile: previous history (illness: malaria, treatment: chloroquine) and age;

• Context: location, temperature, and season.

Based on the above symptoms, patient profile and context information the prototype yields malaria and pneumonia as a possible diseases. Among the given symptoms, three symptoms match with the symptoms of malaria and two symp- toms match with the symptoms of pneumonia in the database. The healthcare workers working in health centers are asked to review the case studies in or- der to provide their expertise judgments of the possible disease and determine the possible treatments considering the patient’s scenario. Thirteen healthcare workers: (5 health officers & 8 nurses) were involved in the questionnaire. The comparison of the prototype and the expertise judgment is presented in detail in Table 1.1. The result of the analysis indicates that 50% of the respondents (4 out of 7 nurses and 2 out of 5 health officers) choose plasmodium vivax (PV) as a po- tential disease and Chloroquine (Clo) is selected as a possible treatment for the patient; and 2 nurses and 2 HOs recommended Coartem (Co) for plasmodium falciparum (PF). In addition, one nurse and one HO choose coartem as a possible treatment for plasmodium vivax. Moreover, a list of side effects are mentioned by the nurses and Health officers. Nausea, vomiting, and gastrointestinal distur- bance and dizziness are the common side effects listed by the healthcare workers. On the other hand, some nurses and health officers did not mention side effects; hence this probably indicates the potential knowledge gap between healthcare workers. The risk level of the side effects also mentioned by the nurses and HOs; 58% of the possible treatments have medium risk (4 nurses and 3 Hos), 25% as a low risk (3 nurses) and 17% (2 HOs) as a high risk. The summary of the analysis result is presented in Figures ( 10.2, 10.3 and 10.4). B.1. Analysis of the questionnaire 233

Case 2 Assume you are traveling to one of the highlands of Ethiopia for a visit. In a remote village, you find a 25 years old severely ill woman. In this remote area there is no health facility in the vicinity. Asking the woman, she tells the following signs and symptoms: nausea, vomiting, fever, headache and cough. She is 3 months pregnant. The woman does not have any illness history. To relieve from her illness she took anti pain drugs, but these did not stop the illness. In this case study five signs and symptoms, personal information and pre- vious history is presented. Alike case study one the respondents provide their judgments on the possible disease, treatment, side effects and risk level. Pneu- monia (PN), malaria( PF and PV), Typhoid fever (TF) and morning sickness (hyperemesis gravidarum)are chosen by two HOs as possible diseases, where as 2 nurses chose PF malaria and 2 nurses pneumonia. The respondents also give the potential treatments as follows: Amoxicillin(Am) is chosen for pneumonia, Coartem (Co) and/or quinine(Qu) for PF and Chloroquine(Clo) for PV. The healthcare workers also list out the potential side effects of the treatments pro- vided: 46%(5 nurses + 1 Ho) do not give any side effects, 15% hypoglycemia, difficulty of nerves system, GIT, rematology, 23% nausea, vomiting and skin rash, and diarrhea and the rest 16% is distributed across vision problem, hearing loss, gastric ulcer and hypersensitive reaction. The respondents also presented the risk level of the treatments as follows: 54% (3 nurses + 4 HOs) as high, 23% (2 nurses + 1 HO) as low and another 23% (3 nurses) as medium.

Case 3 A 20 years old man was ill for the last two days. He has the following signs and symptoms; cough, fast breathing or feeling short breath, shaking and teeth- chattering chills, chest pain, fast heartbeat. Could you please identify: the po- tential illness of this patient, the appropriate medication, dosage, duration (for how long the medicine should be), side effect of the medicine (if any), what will be the risk level of the medication? The analysis result shows that seven nurses and four health officers diag- nosed the illness pneumonia and antibiotic (Amoxicillin) is recommended by five nurses and 4 health officers. Nausea, vomiting, diarrhea, and gastrointesti- nal disturbance are the most common side effects mentioned by majority of the respondents. The risk level of the medication is low.

Case 4 John is a 35 years old man. He is HIV positive for last two years. He is on HIV/AIDS first line regimen (combination of the following drugs: Zidovudine + Lamivudine and Nevarpine) since the end of 2011. Recently, he is diagnosed with falciparum malaria. In this analysis, 6 nurses and 5 health officers elect plasmodium falciparum as a potential illness. 6 nurses and 4 health officers choose coartem as the 234 Appendix B. Questionnaire potential treatment and a health officer recommend quinine to treat the patient. Most of the healthcare workers mentioned nausea, vomiting and gastrointestinal disturbance as the side effects of the drug.

Case 5 Martha is a sixth month pregnant woman living with HIV/AIDS for the last couple of years. She is taking HIV/AIDs first line regimen. Alike John she frequently suffered from malaria. Chloroquine and coartem are recommended as a potential treatment. Side effects of this medication are headache, nausea, vomiting and gastrointestinal. Since the patient is pregnant, the risk of the medication is high (63.6%) and 34.6% is medium.

Case 6 A 8 years old boy has a severe coughing for the last two weeks. He has a mild fever, a running nose, a feeling of being short of breath and slight chest pain. He did not take any drug to relieve from his illness. In this case study pneumonia (72.7%) as a potential illness; 81.8% of the respondents choose antibiotics (amoxicillin) to treat pneumonia. The potential side effects of the treatment listed by the healthcare workers (63.6%)are diarrhea, skin rash, vomiting or throwing up. The risk of the treatment is low.

Case 7 A two months pregnant woman has been diagnosed HIV positive and required to start ART as soon as possible. She is found non anemic, no TB and hepatitis. However, she is suffering from severe malaria or Plasmodium falciparum. The following are some of the antiretroviral (ART) first line regimens and antimalar- ial drugs. Which ART and antimalarial drugs combination are appropriate for the woman considering her conditions(pregnancy and plasmodium falciparum)?; why do you choose this combination?; Are there any other medicine or treatment opinion; dosage; duration; side effect etc The case study asks the respondents to choose the combination of ART and antimalarial drugs for the patient mentioned in the case study. Two drug com- binations are selected by the respondents; 2 nurses and 1 health officer choose TDF+3TC/FTC+EFV+Qu (30%) as a potential treatment. Another 2 health officers and 1 nurse choose ZDV+3TC+NVP+Qu (30%) to treat HIV/AIDS and malaria. According to the respondents who choose ZDV+3TC+NVP combina- tion was preferred since EFV is not recommended for pregnant women on the first trimester. On the contrasty, the respondents who choose TDF+3TC/FTC+EFV the side effect of the treatment is low compared to ZDV based combinations, likewise EFVdoes not have any effect on pregnancy. Liver toxicity, nausea, vom- iting, GI disturbance, hearing loss, vision problem and headache are some of the side effects caused by the recommended treatments. 70% of the respondents mentioned the risk of the treatment is high.

Case 8 Two days ago an old man was diagnosed suffering from the following signs and symptoms: high fever (39 to 40 degree Celsius), weak appetite, diarrhea, stomach pain and headache. In this case study typhoid fever(55%), malaria was chosen as a potential illness of the patient. Ciprofloxacin is the drug recommended for typhoid fever (55%) of the respondents.

Bibliography

[AB07] A. Ammann and S. Burrowes. Malaria and hiv: The impact on pregnant women and infants, June, 2007. Available from: http://www.wunrn.com/ news/2007/02_07/02_12_07/021707_malaia.htm. Cited on page 173. [ABKM11] T. Andersena, P. Bjrnb, F. Kensingc, and J. Molla. Designing for collab- orative interpretation in telemonitoring: Re-introducing patients as diag- nostic agents. International journal of medical informatics, 80:112=126, 2011. Cited on page 2. [ADBS10] O. Asfari, BL. Doan, Y. Bourda, and JP. Sansonnet. Improving user query processing based on user profile and task context. In SWWS 2010:, pages 134–140, 2010. Cited on page 123. [AETK+03] JG. Ayisi, AM. van Eijk, FO. Ter Kuile, MS. Kolczak, JA. Otieno, AO. Misore, PA. Kager, RW. Steketee, and BL. Nahlen. The effect of dual infection with hiv and malaria on pregnancy outcome in western kenya. AIDS, 17:585–594, 2003. Cited on pages 172 and 173. [Ahe07] DK. Ahern. Challenges and opportunities of eHealth research. Am.J. Prev. Med, 32(55):575–582, 2007. Cited on pages 1 and 2. [AID13] AIDSinfo. Guidelines for the use of antiretroviral agents in hiv-1-infected adults and adolescents, 2013. Available from: http://aidsinfo.nih. gov/contentfiles/lvguidelines/AdultandAdolescentGL.pdf accessed July 2013. Cited on page 12. [AINC09] S. Alam, Z. Iqbal, J. Noll, and MR. Chowdury. Semantic personaliza- tion framework for connected set top box environment. In Second Inter- national Conference on Advances in Human-Oriented and Personalized Mechanisms, Technologies, and Services, CENTRIC, pages 97–102, 2009. Cited on pages 56, 66, 76 and 77. [AKP06] DK. Ahern, JM. Kreslake, and JM. Phalen. What is ehealth: Perspectives on the evolution of eHealth research. J. Med. Internet Res., 8(1), 2006. Cited on page 2. [AMJ03] J. Aguar´onand JM. Moreno-Jim´enez.The geometric consistency index: Approximated thresholds. European Journal of Operational Research, 147(1):137 – 145, 2003. Cited on page 165. [AO13] KA. Agu and AC. Oparah. Adverse drug reactions to antiretroviral ther- apy: Results from spontaneous reporting system in nigeria. Perspectives in Clinical Research, 4(2):117–124, 2013. Cited on pages 177 and 188.

237 238 Tesfa Tegegne

[APR13] APR. Antiretroviral pregnancy registry international interim report for1 january 1989 31 january 2013, June, 2013. Available from: http://www. apregistry.com/forms/interim_report.pdf. Cited on pages 175, 177 and 188. [Arn07] SB. Arnold. Improving quality health care: The role of consumer engage- ment, October, 2007. Available from: http://www.academyhealth.org/ files/issues/ConsumerEngagement.pdf accessed June, 2013. Cited on page 121. [AS05] E. Ammenwerth and NT. Shaw. Bad health informatics can kill is eval- uation the answer? Methods Inf Med, 44:1–3, 2005. Cited on pages 209 and 210. [AZM12] D. Ayele, T. Zewotir, and H. Mwambi. Prevalence and risk factors of malaria in ethiopia. Malaria Journal, 11(195), 2012. Cited on page 172. [BABG08] Y. Badr, A. Abraham, F. Biennier, and C. Grosan. Enhancing web ser- vice selection by user preferences of non-functional features. In NWESP, IEEE, 4th International Conference on Next Generation Web Services Practices, pages 60–65, 2008. Cited on page 68. [BAPP06] D. Bianchini, V. de Antonellis, B. Pernici, and P. Plebani. Ontology-based methodology for e-service discovery. Information Systems, 31(4):361 – 380, 2006. Cited on pages 3, 18, 49, 50 and 54. [BBD+04] C. Boutilier, R. Brafman, C. Domshlak, H. Hoos, and D. Poole. Cp-nets - a tool for representing and reasoning with conditional ceteris paribus preference statements. Artificial Intelligence Research, 21:135–191, 2004. Cited on pages 131, 132, 136, 142 and 166. [BDF+05] MK. Beusterien, K. Dziekan, E. Flood, G. Harding, and CJ. Jordan. Un- derstanding patient preferences for hiv medications using adaptive con- joint analysis: Feasibility assessment. Value in Health, 8(4):453–461, 2005. Cited on page 158. [Ber08] Y. Berhan. Medical doctors profile in ethiopia: production, attrition and retention. in memory of 100-years ethiopian modern medicine & the new ethiopian millennium. Ethiopian Medical Journal, 46(1):1–77, 2008. Cited on page 122. [Ber09] K. Bertakis. The influence of gender on the doctor-patient interaction. Patient Education and Counsiling, 76:356–360, 2009. Cited on page 112. [Bey92] Y. Beyene. Medical disclosure and refugees - telling bad news to ethiopian patients. The Western Journal of Medicine, 157(3):328 332, 1992. Cited on page 114. [BG06] T. Bickmore and T. Giorgino. Methodological review: Health dialog systems for patients and consumers. Biomedical Informatics, 39(5):556– 571, 2006. Cited on pages 102 and 103. [BGGP06] T. Bickmore, T. Giorgino, N. Green, and R. Picard. Special issue on dialog systems for health communication. Biomedical Informatics, 39(5), 2006. Cited on pages 103 and 109. [BGP05] T. Bickmore, A. Gruber, and R. Picard. Establishing the computer- patient working alliance in automated health behavior change interven- tions. Patient Educ Couns., 59(1):21–30, 2005. Cited on page 105. Bibliography 239

[BHI13] BHIV. British hiv association guidelines for the treatment of hiv-1-positive adults with antiretroviral therapy, 2013. Avail- able from: http://www.bhiva.org/documents/Guidelines/Treatment/ 2012/hiv1029_2.pdf accessed December 2013. Cited on page 12. [BHOL08] M. Berndtsson, J. Hansson, B. Olsson, and B. Lundell. Thesis Projects: A Guide for Students in Computer Scinece and Informaton Systems (2nded.). Springer, 2008. Cited on page 6. [Bic04] T Bickmore. Unspoken rules of spoken interaction. Communications of the ACM, 47(4):38–44, 2004. Cited on page 104. [BK07] U. Bellur and R. Kulkarni. Improved matchmaking algorithm for se- mantic web services based on bipartite graph matching. In IEEE In- ternational Conference on Web Services (ICWS 2007), IEEE Computer Society, Washington, DC, USA, pages 86–93, 2007. Cited on pages 126 and 127. [BKK+09] D. Benz, B. Krause, GP. Kumar, A. Hotho, and G. Stumme. Character- izing semantic relatedness of search query terms. In 1st Workshop on Ex- plorative Analytics of Information Networks (EIN2009), pages 119–135, 2009. Cited on page 124. [BKLM+12] P. Byakika-Kibwika, M. Lamorde, J. Mayito, L. Nabukeera, R. Namakula, H. Mayanja-Kizza, E. Katabira, M. Ntale, N. Pakker, M. Ryan, W. Han- pithakpong, J. Tarning, N. Lindegardh, Khoo S. Vries, PJ. de and, and Merry C. Back, D and. Significant pharmacokinetic interactions between artemether/lumefantrine and efavirenz or nevirapine in hiv-infected ugan- dan adults. J Antimicrob Chemother, 67(12):22132221, 2012. Cited on pages 176, 177 and 189. [BKS+09] J. Black, F. Koch, L. Sonenberg, R. Scheepers, A. Kahandoker, E. Charry, B. Walker, and LN. Soe. Mobile solutions for front-line health workers in developing countries. In Healthcom, pages 89–93, 2009. Cited on pages 102 and 104. [BMS07] J. Bhogal, A. Macfarlane, and P. Smith. A review of ontology based query exapnsion. Infromation Processing and Mangement., 43:866–886, 2007. Cited on page 124. [BN08] J. Bai and JY. Nie. Adapting information retrieval to query contexts. Information Processing and Management, 44:1901–1922, 2008. Cited on page 124. [BP10] K. Braa and S. Purkayastha. Sustainable mobile information infrastruc- tures in low resource settings. In Stud Health Technol Inform., pages 127–132, 2010. Cited on page 2. [BPS+04] T. Broens, S. Pokraev, M. van Sinderen, J. Koolwaaij, and P. Dock- horn Costa. Context-aware,ontology-based, service discovery. In Ambi- ent Intelligence Second European Symposim, EUSAI, Eindhoven, Nether- lands, pages 8–11, 2004. Cited on page 50. [Bri07] MW. Bridges. Soa in healthcare, June, 2007. Available from: http:// www2.healthmgttech.com/features/2007_june/soa.aspx accessed Oc- tober, 2013. Cited on page 3. 240 Tesfa Tegegne

[BS14] A. Benharref and M. Serhani. Novel cloud and soa based framework for e-health monitoring using wireless biosensor. IEEE Journal of Biomedical and Health Informatics, 18(1):46–55, 2014. Cited on page 4. [BXWJL07] C. Bo, M. Xiang-Wu, and C. Jun-Liang. An adaptive user requirements elicitation framework. In IEEE Computer Society, 31st Annual Inter- national Computer Software and Applications Conference(COMPSAC 2007), Volume 02, pages 501–502, 2007. Cited on pages 84 and 90. [CAD08] KL. Courtney, GL. Alexander, and G. Demiris. Information technology from novice to expert: Implementation implications. Journal of Nursing Management, 16(6):682–699, 2008. Cited on page 202. [CE06] A. Coulter and J. Ellins. Patient-focused interventions: A review of the evidence, August, 2006. Available from: http://www.health.org.uk/public/cms/75/76/313/526/Patient% 20focused%20interventions.pdf?realName=juNCmR.pdf accessed October,2013. Cited on page 2. [CGP07] A. Cawsey, F. Grasso, and C. Paris. Adaptive information for consumers of healthcare. In The Adaptive Web, volume 4321 of LNCS. Springer, 2007. Cited on page 80. [CH08] O. Choi and S. Han. Personalization of rule-based web services. Sensors, 8(4):2424–2435, 2008. Cited on page 69. [Che13] TY. Chen. An interactive method for multiple criteria group decision analysis based on interval type-2 fuzzy sets and its application to medical decision making. Fuzzy Optim Decis Making (2013) 12:323356, 13:323– 356, 2013. Cited on page 166. [CLKK07] J. Clemensen, SB. Larsen, M. Kyng, and M. Kirkevold. Participatory design in health sciences: Using cooperative experimental methods in developing health services and computer technology. Qual Health Res., 17(1):122–130, 2007. Cited on page 209. [CP94] AM. Clarke and SM. Pomfrett. User Requirements for Advanced Com- munication Services. Springer Berlin / Heidelberg, April 1994. Cited on page 84. [CPDP12] C. da Costa Pereira, M. Dragoni, and G. Pasi. Multidimensional rele- vance: Prioritized aggregation in a personalized information retrieval set- ting. Information Processing and Management, 48:340–357, March 2012. Cited on pages 159, 162, 163 and 166. [CS03] J. Cardoso and AP. Sheth. Semantic e-workflow composition. Intelligent Information Systems, 21(3):191–225, 2003. Cited on page 127. [CS09] L. Catwell and A. Sheikh. Evaluating ehealth interventions: The need for continuous systemic evaluation. PLoS Med, 6(8):1–9, 2009. Cited on pages 209 and 210. [CSR+09a] L. Celi, L. Sarmenta, J. Rotberg, A. Marcelo, and G. Clifford. Mobile care (moca) for remote diagnosis and screening. Journal for Health Informatics in Developing Countries, 3(1):17–21, 2009. Cited on page 104. [CSR+09b] L. Celi, L. Sarmenta, J. Rotberg, A. Marcelo, and G. Clifford. Mobile care (moca) for remote diagnosis and screening. Journal for Health Informatics in Developing Countries (JHIDC), 3(1):17–21, 2009. Available at http: //www.jhidc.org/index.php/jhidc/issue/view/6. Cited on page 104. Bibliography 241

[CSS08] J. Conesa, V. Storey, and V. Sugumaran. Improving web-query processing through semantic knowledge. Data & Knowledge Engineering, 66:18–34, 2008. Cited on page 124. [Cys02] LM. Cysneiros. Requirements engineering in the health care domain. In IEEE Joint 10th International Requirements Engineering Conference, pages 350 – 356, 2002. Cited on page 98. [CZO+08] D. Chadwick, G. Zhao, S. Otenko, R. Laborde, L. Su, and T. Anh Nguyen. PERMIS: a modular authorization infrastructur. Concurrency And Com- putation: Practice And Experience., 20(11):1341–1357, 2008. Cited on page 73. [DA00] AK. Dey and GD. Abowd. Towards a better understanding of context and context-awareness. In the Workshop on The What, Who, Where, When, and How of Context-Awareness, (CHI 2000), The Hague, The Netherlands, April 3, 2000, 2000. Cited on pages 55 and 56. [DA10] DA. DMello´ and VS. Ananthanarayana. A review of dynamic web ser- vice description and discovery techniques. In First International Confer- ence on Integrated Intelligent Computing, pages 246–251, 2010. Cited on pages 53 and 54. [DBAI13] JG. Dolan, E. Boohaker, J. Allison, and TF. Imperiale. Patients’ prefer- ences and priorities regarding colorectal cancer screening. Medical Deci- sion Making, 33:59–70, 2013. Cited on pages 158 and 171. [DC02] G. Dodig-Crnkovic. Scientific methods in computer science. In Conference for the Promotion of Research in IT at New Universities and at University Colleges in Sweden, 2002. Cited on pages 7 and 8. [DCG13] V. Diaby, K. Campbell, and R. Goeree. Multi-criteria decision analysis (mcda) in health care: A bibliometric analysis. Operations Research for Health Care, 2:20–24, 2013. Cited on page 158. [DF07] C. Domegan and D. Fleming. Marketing Research in Ireland (3rd ed.). Dublin: Gill MacMillan, 2007. Cited on page 7. [DHV+11] M. Dannera, JM. Hummel, F. Volz, JG. van Manen, B. Wiegarda, CM. Dintsiosa, H. Bastiana, A. Gerbera, and MJ. IJzerman. Integrating pa- tients’ views into health technology assessment: Analytic hierarchy pro- cess (ahp) as a method to elicit patient preferences. International Jour- nal of Technology Assessment in HealthCare, 27:369375, 2011. Cited on page 171. [DIC89] JG. Dolan, BJ. Isselhardt, and JD. Cappuccio. The analytic hierarchy process in medical decision making: A tutorial. Medical Decision Making, 9:40–50, 1989. Cited on page 171. [DL08] S. Durling and J. Lumsden. Speech recognition use in healthcare appli- cations. In MoMM 2008, 2008. Cited on page 103. [Dol08] JG. Dolan. Shared decision-making transferring research into practice: The analytic hierarchy process (ahp). Patient Education and Counseling, 73:418–425, 2008. Cited on page 171. [Dol10] JG. Dolan. Multi-criteria clinical decision support: A primer on the use of multiple criteria decision making methods to promote evidence- based, patient-centered healthcare. Patient, 3(4):229–248, 2010. Cited on page 158. 242 Tesfa Tegegne

[Doo02] K. Dooley. Simulation research methods. In Companion to Organizations. Joel Baum (ed.), London: Blackwell, 2002. Cited on page 8. [Dru05] P. Drury. ehealth: A model for developing countries. eHelath Interna- tional, 2(2):19–26, 2005. Cited on pages 17, 19, 22, 49, 51 and 57. [DWH09] C. DiMarco, D. Wiljer, and E. Hovy. Self-managed access to personalized healthcare through automated generation of tailored health educational materials from electronic health records. In Virtual Healthcare Inter- action: Papers from the AAAI Fall Symposium (FS-09-07, AAAI Fall Symposium Series), pages 4–7, 2009. Cited on page 80. [EBA12] G. Eluwa, T. Badru, and K. Akpoigbe. Adverse drug reactions to an- tiretroviral therapy (arvs): incidence, type and risk factors in nigeria. BMV Clinical Pharmacology, 12(7), 2012. Cited on pages 177 and 188. [Eco11] The Economist. A more hopeful continent. the lion kings? africa is now one of the worlds fastest-growing regions, Jan 6th 2011. Cited on pages xv and 23. [Eft00] EN. Efthimiadis. Interactive query expansion: A user-based evaluation in a relevance feedback environment. Journal of the American Society for Information Science, 51(11):989–1003, 2000. Cited on page 123. [EOE+99] J. Ely, J. Osheroff, M. Ebell, G. Bergus, B. Levy, M. Chambliss, and E. Evans. Analysis of questions asked by family doctors regarding patient care. BMJ, 319(7206):358–361, 1999. Cited on page 168. [Erl09] T. Erl. SOA Design Patterns. The Prentice Hall Service-Oriented Com- puting Series, 2009. Cited on page 98. [ETS05] ETSI. Human factors (hf); user profile management. In ETSI EG 202 325 V1.1.1, ETSI Guide, pages 1–100, 2005. Cited on pages 54 and 79. [ETS10] ETSI. Human factors (hf), ehealth; personalization of ehealth systems. In Draft ETSI ES 202 642 V0.0.28 2010-04, 2010. Cited on pages 68, 69, 70 and 74. [FCAM+13] N. Ford, A. Calmy, I. Andrieux-Meyer, S. Hargreaves, EJ. Mills, and Shubber Z. Adverse events associated with nevirapine use in pregnancy: a systematic review and meta-analysis. AIDS, 27:1135–1143, 2013. Cited on page 177. [FLLP11] C. Flateau, G. Le Loup, and G. Pialoux. Consequences of hiv infection on malaria and therapeutic implications: a systematic review. Lancet Infect Dis., 11(7):541–556., 2011. Cited on pages 173 and 177. [FMR13] C. Franco, J. Montero, and JT. Rodriguex. A fuzzy and bipolar approach to preference modeling with applicatio to need and desire. Fuzzy Sets and Systems, 214:20–34, 2013. Cited on page 159. [FOA13] EB. Fields, GE. Okudan, and OM. Ashour. Rank aggregation methods comparison: A case for triage prioritization. Expert Systems with Appli- cations, 40:1305–1311, 2013. Cited on page 159. [Fos11] C. Foster. Icts and informal learning in developing coun- tries., 2011. http://www.sed.manchester.ac.uk/idpm/research/ publications/wp/di/. Cited on page 102. Bibliography 243

[Fou09] United Nations Foundation. mhealth for development:the opportunity of mobile technology for healthcare in the developing world. Technical report, United Nations Foundation & Vodafone Foundation, 2009. Cited on pages 34, 35, 37 and 38. [FPSV02] G. Fouskas, A. Pateli, D. Spinellis, and H. Virola. Applying contextual inquiry for capturing end-users behaviour requirements for mobile exhi- bition services. In In Proceedings of the First International Conference on Mobile Business, pages 1–23, 2002. Cited on page 87. [Fru10] AL. Fruhling. E-health rural consumers‘ characteristics and challenges. In Proceedings of the 43rd Hawaii International Conference on System Sciences - 2010, pages 1–10, 2010. Cited on pages 34, 35 and 45. [FTA+11] TR. Fried, M. Tinetti, J. Agostini, L. Iannone, and V. Towle. Health outcome prioritization to elicit preferences of older persons with multiple health conditions. Patient Education and Counseling, 83:278–282, 2011. Cited on pages 157, 173 and 174. [Fuj12] H. Fujita. Decision making for medical diagnosis on vds using different fuzzy aggregation functions, 2012. Cited on page 156. [FW04] PJM. Frederiks and Th.P. van der Weide. Information modeling: the process and the required competencies of its participants. In F. Meziane and E. Mtais, editors, 9th International Conference on Applications of Natural Language to Information Systems (NLDB 2004), Manchester, United Kingdom, EU, pages 123–134. Springer Lecture Notes in Computer Science, Vol: 3136, 2004. Cited on page 126. [GCL05] RQ. Guo, D. Chen, and J. Le. Matching semantic web services across heterogeneous ontologies. In ifth International Conference on Computer and Information Technology (CIT 2005), IEEE Computer Society, Wash- ington, DC, USA, pages 264–268, 2005. Cited on page 127. [GD09] R. Ghosh and M. Dekhil. Discovering user profiles. In International World Wide Web Conference, Proceedings of the 18th international conference on World wide web, pages 1233–1234, 2009. Cited on page 64. [GDA+06] JE. Gallant, E. DeJesus, JR. Arribas, AL. Pozniak, B. Azzard, RE. Campo, B. Lu, D. McColl, S. Chuck, J. Enejosa, JJ. Toole, and AK. Cheng. Tenofovir df, emtricitabine, and efavirenz vs. zidovudine, lamivu- dine, and efavirenz for hiv. N Engl J Med., 354(3):251–260, 2006. Cited on pages 177, 187 and 188. [GL99] SD. Goold and M. Lipkin. The doctor patient relationship challenges, opportunities, and strategies. J Gen Intern Med., 14(Supp1):26–33, 1999. Cited on page 109. [GM02] AS. G¨oker and HI. Myrhaug. User context and personalisation. In EC- CBR Workshop on Case Based Reasoning and Personalisation, Aberdeen, pages 1–7, 2002. Cited on page 125. [GPC02] A. G´omez-P´erezand O. Corcho. Ontology specification languages for the semantic web. IEEE Intelligent Systems, 17:54–60, 2002. Cited on page 64. [Gri07] S. Grimm. Discovery. In Rudi Studer, Stephan Grimm, and Andreas Abecker, editors, Semantic Web Services. Concepts, Technologies, and 244 Tesfa Tegegne

Applications, chapter 8, pages 211–244. Springer, Berlin Heidelberg, 2007. Cited on page 126. [GSCM07] S. Gauch, M. Speretta, A. Chandramouli, and A. Micarelli. User profiles for personalized information access. In The adaptive web: methods and strategies of web personalization, Lecture Notes In Computer Science, pages 54–89, 2007. Cited on pages 55, 64 and 125. [Had12] N. Hadizadeh. Stakeholder involvement in soa: Analyzing service identi- fication as co-design. Master’s thesis, University of Boras, 2012. Cited on pages 91, 92, 96 and 97. [Has05] P. Hasselmyer. On service discovery process types. In rd ICSOC ’05, pages 144–156, 2005. Cited on pages 3, 18, 49, 50 and 51. [HD02] AM. Hickey and A. Davis. Requirements elicitation and elicitation tech- nique selection:a model for two knowledge-intensive software development processes. In Proceedings of the 36th Hawaii International Conference on System Sciences, (HICSS03), 2002. Cited on pages 93 and 94. [HD03] AM. Hickey and AM. Davis. Elicitation technique selection: How do experts do it? In In Proc. 11th International Requirements Engineering Conference (RE03), IEEE, pages 169–178, 2003. Cited on pages 84 and 89. [Hev07] A. Hevner. A three cycle view of design science research. Scandinavian Journal of Information Systems, 19(2):87–92, 2007. Cited on page 8. [HH98] J. He and CAR. Hoare. Unifying theories of programming. In RelMiCS, pages 97–99, 1998. Cited on page 75. [HHM10] G. Hofstede, GJ. Hofstede, and M. Minkov. Cultures and Organizations: Software of the Mind: Intercultureal Cooperation and Its Importance for Survival. McGraw Hill, 2010. Cited on pages 110, 111 and 112. [HKA04] M. den Hengst, E. van de Kar, and J. Appelman. Designing mobile information services: User requirements elicitation with gss design and application of a repeatable process. In IEEE Computer Society, Proceed- ings of the 37th Hawaii International Conference on System Sciences - 2004, pages 1–10, 2004. Cited on pages 86, 91, 92 and 93. [HL711] HL7. Health level seven international, 2011. http://www.hl7.org/ ,visitedatJuly,2011. Cited on page 3. [HMPR04] A. Hevner, ST. March, J. Park, and S. Ram. Design science in information systems research. MIS Quarterly, 28(1):75–105, 2004. Cited on page 8. [HVM+12] JM. Hummel, F. Volz, JG. van Manen, M. Danner, CM. Dintsios, MJ. IJzerman, and A. Gerber. Using the analytic hierarchy process to elicit patient preferences: prioritizing multiple outcome measures of antidepres- sant drug treatment. Patient, 5:225–237, 2012. Cited on page 171. [Ide07] V. Idemyor. Human immunodeficiency virus (hiv) and malaria interac- tion in sub-saharan africa: the collision of two titans. HIV Clin Trials., 8(4):246–253., 2007. Cited on page 173. [ITB12] MJ. IJzerman, JA. van Til, and JF. Bridges. A comparison of analytic hierarchy process and conjoint analysis methods in assessing treatment alternatives for stroke rehabilitation. Patient, 5:45–56, 2012. Cited on page 171. Bibliography 245

[ITU09] ITU. Question 14-2/2: Mobile ehealth solutions for developing countries. Technical report, International Telecommunication Union, 2009. Cited on pages 21 and 22. [JAH07] Z. Jrad, MA. Aufaure, and M. Hadjouni. A Contextual User Model for Web Personalization. Springer Berlin / Heidelberg, November 2007. Cited on page 65. [Jam13] D. James. What is the definition of personalization?, re- trieved April, 2013. Available from: http://www.quora.com/ What-is-the-definition-of-personalization. Cited on page 124. [JDNB08] G. Juneja, B. Dournaee, J. Natoli, and S. Birkel. Improving perfor- mance of healthcare systems with service oriented architecture, 07 March 2008. http://www.infoq.com/articles/soa-healthcare;jsessionid= A66D6FE007C7B77C311C7326F9D467F2, visited September 06, 2011. Cited on page 19. [JI04] K. J¨arvelin and P. Ingwersen. Information seeking research needs exten- sion towards tasks and technology. Information Research, 10(1), 2004. Cited on pages xiii and 29. [Ji09] X. Ji. Research on web service discovery based on domain ontology. In 2nd IEEE International Conference on Computer Science and Information Technology, IEEE, pages 65–68, 2009. Cited on page 54. [JK05] D. Jannach and G. Kreutler. Personalized user preference elicitation for e-services. In IEEE ’05, IEEE Computer Society Washington, DC, USA, Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Servic, pages 604–611, 2005. Cited on pages 85 and 87. [Kan09] B. Kanagwa. Design, Discovery and Construction of Service-Oriented Systems. Siks dissertation series: 2009-09, Radboud University, Nijmegen, 2009. Cited on page 75. [Kav08] M. Kavis. Top 10 reasons why people make soa fail. In Computerworld company, 2008. Cited on pages 91, 92, 97 and 98. [KBW05] S. Khoo, D. Back, and P. Winstanley. The potential for interactions between antimalarial and antiretroviral drugs. AIDS, 19:995–1005, 2005. Cited on pages 188 and 189. [KCP+07] W. Kondo, EP. Carraro, E. Prandel, JM. Dias, J. Perini, RL. Macedo, TC. Cornelsen, R. Sbalquiero, and MD. Sasaki. Nevirapine-induced side effects in pregnant women experience of a brazilian university hospital. The Brazilian Journal of Infectious Diseases, 11(6):544–548, 2007. Cited on pages 177 and 188. [KEW11] W. Kießling, M. Endres, and F. Wenzel. The preference sql system - an overview. IEEE Data Eng. Bull., pages 11–18, 2011. Cited on pages 131 and 138. [KG07] J. Kuck and M. Gnasa. Context-sensitive service discovery meets informa- tion retrieval. In Pervasive Computing and Communications Workshops, 2007. PerCom Workshops 2007. Fifth Annual IEEE, International Con- ference on, White Plains, NY, USA (March 2007), IEEE, pages 601–605, 2007. Cited on page 67. 246 Tesfa Tegegne

[KH76] RL. Keeney and H. Haiffa. Decisions with Multiple Objectives: Prefer- ences and Value Tradeoffs. Cambridge University Press, 1976. Cited on pages 131 and 166. [KI10] G. Koutrika and Y. Ioannidis. Personalizing queries based on net- works of composite preferences. ACM Transactions on Database Systems, 35(2):Article 13, 1–50, 2010. Cited on pages 123, 124 and 130. [Kie02] W. Kießling. Foundations preference in database systems. In Proceedings of the 28th VLDB Conference, Hong Kong, China, pages 311–322, 2002. Cited on pages 123, 131, 132 and 135. [KKB07] K. Klose, R. Knackstedt, and D. Beverungen. Identification of services a stakeholder-based approach to soa development and its application in the area of production planning. In 15th European Conference on Information Systems (ECIS), pages 1802 – 1814, 2007. Cited on pages 91, 92, 96 and 97. [KMMS08] F. Kart, LE. Moser, and PM. Melliar-Smith. Building a distributed e- healthcare system using soa. IT Professional, 10(2):24–30, 2008. Cited on page 20. [KMW+11] T. Kredo, K. Mauff, J.S. van der Walt, L. Wiesner, G. Maartens, K. Cohen, P. Smith, and Barnes KI. Interaction between artemether- lumefantarine and nevirapine-based antiretroviral therapy in hiv-1- infected patients. Antimicrob. Agents Chemother, 55(12):5616–5623, 2011. Cited on pages 176 and 189. [KNA10a] A. Kayed, M. Nizar, and M. Alfayoumi. Ontology concepts for require- ments engineering process in e-government applications. In 2010 Fifth International Conference on Internet and Web Applications and Services, IEEE, pages 396–400, 2010. Cited on page 53. [KNA10b] A. Kehinde, H. Nyongesa, and A. Adesina. ICT and information security perspectives in e-health systems. Jou. of Mobile Com., 4(1):17–22, 2010. Cited on pages 17, 19, 49 and 51. [Kob07] A. Kobsa. Generic user modeling systems. In Lecture Notes in Computer Scinence, Modeling technologies, The adaptive web: methods and strate- gies of web personalization, pages 136–154, 2007. Cited on pages 63, 64, 65, 66 and 72. [KPR+13] E. Kilsdonk, LW. Peute, RJ. Riezebos, LC. Kremer, and MWM. Jaspers. From an expert-driven paper guideline to a user-centred decision support system: A usability comparison study. Artificial Intelligence in Medicine, 59:5–13, 2013. Cited on page 202. [KS98] G. Kotonya and I. Sommerville. Requirements Engineering: Processes and Techniques. Wiley, September 1998. Cited on page 93. [Kum07] A. Kumar. The ibm world wide spoken web, 2007. Available from http://researcher.watson.ibm.com/researcher/view_person_ subpage.php?id=1649, viewed at May, 2011. Cited on page 71. [Lan] Search Engine Land. The periodic table of seo success factors. Cited on page 155. Bibliography 247

[LHJR07] W. Liu, K. He, W. Jiang, and P. Rong. Heavyweight semantic inducement for requirement elicitation and analysis. In IEEE Computer Society, Third International Conference on Semantics, Knowledge and Grid, pages 206– 211, 2007. Cited on pages 87 and 124. [LK11] CW. Lee and NK. Kwak. Strategic enterprise resource planning in a health-care system using a multicriteria decision-making model. Journal of Medical Systems, 35:265–275, 2011. Cited on page 171. [LKSP02] MM. Lankhorst, H. van Kranenburg, A. Salden, and AJH. Peddemors. Enabling technology for personalizing mobile services. In HICSS-35/02, Proceedings of the 35th Hawaii International Conference on System Sci- ences, pages 87–2, 2002. Cited on pages 63 and 64. [LKSWH10] S. Lee-Klenz, P Sampaio, and T. Wood-Harper. A requirements elici- tation framework and tool for sourcing business-it aligned e-services. In SAC ’10: Proceedings of the 2010 ACM Symposium on Applied Comput- ing, pages 111–117, March 2010. Cited on page 87. [LL09] CH. Lee and A. Liu. Modeling explicit and implicit service request for in- telligent interface design. In IEEE Computer Society, International Con- ference on Complex, Intelligent and Software Intensive Systems, pages 742–747, 2009. Cited on page 90. [LN08] MJ. Liberatore and RL. Nydick. The analytic hierarchy process in medical and health care decision making: A literature review. European Journal of Operational Research, 189:194–207, 2008. Cited on page 171. [LPD12] M. Lykke, S. Price, and L. Delcambre. How doctors search: A study of query behaviour and the impact on search results. Information processing and management, 48:1151–1170, 2012. Cited on page 168. [Mai88] D. Maier. The Theory of Relational Databases. Computer Science Press, Rockville, Maryland, 1988. Cited on page 131. [Mar08] E. Marks. Service-Oriented Architecture (SOA) Governance for the Ser- vices Driven Enterprise. New Jersey: John Wiley & Sons, 2008. Cited on page 3. [MBK+10] P. Mechael, H. Batavia, N. Kaonga, S. Searle, A. Kwan, A. Gold- berger, L. Fu, and J. Ossman. Barriers and gaps affecting mhealth in low and middle income countries: A policy white paper. Techni- cal report, CenterforGlobalHealthandEconomicDevelopmentEarthInsti- tute,ColumbiaUniversity, March 2010. Cited on page 45. [MBMH09] L. Meeuwesen, A. van den Brink-Muinen, and G. Hofstede. Can dimen- sions of national culture predict cross-national differences in medical com- munication? Patient Education and Counsiling, 75:58–66, 2009. Cited on pages 111 and 112. [McC07] PD. McClure. e-health and americaa’s broadband networks an exami- nation of how broadband services enhance health care in america. In A publication of US Internet Industry Association, pages 1–14, 2007. Cited on page 57. [McT02] M. McTear. Spoken dialogue technology: Enabling the conversational user interface. ACM Computing Survey, 34(1), 2002. Cited on page 101. 248 Tesfa Tegegne

[MD09] T. M´esz´arosand T. Dobrowiecki. Controlled natural languages for in- terface agents. In Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, AAMAS ’09, pages 1173–1174, Richland, SC, 2009. International Foundation for Au- tonomous Agents and Multiagent Systems. Cited on page 126. [Mec09] P. Mechael. The case for mhealth in developing countries. Innovations: Technology, Governance, Globalization, 4(1):103–118, Winter 2009. Cited on page 34. [MFWF06] JP. Migneault, R. Farzanfar, JA. Wright, and RH. Friedman. How to write health dialog for a talking computer. Biomedical Informatics, 39:468–481, 2006. Cited on page 106. [Min01] J. Mingers. Combining is research methods: Towards a pluralist method- ology. Information Systems Research, 12(3):240 – 259, 2001. Cited on page 6. [Min06] Ministry of Health, Federal Democratic Republic of Ethiopia. National five-year strategic plan for malaria prevention & control in ethiopia 2006 2010. Addis Ababa, April 2006. Cited on page 172. [MK08] P. Malindi and TM. Kahn. Providing qos for ip-based rural telemedicine systems. In Third International Conference on Broadband Communica- tions, Information Technology & Biomedical Applications,Pretoria, South Africa, pages 23–26, 2008. Cited on pages 17, 49 and 57. [MMM08] S. Moein, SA. Monadjemi, and P. Moallem. A novel fuzzy-neural based medical diagnosis system. World Academy of Science, Engineering and Technology, 37:157–161, 2008. Cited on page 104. [MMW+10] C. Main, T. Moxham, JC. Wyatt, J. Kay, R. Anderson, and Stein K. Computerised decision support systems in order communication for diag- nostic, screening or monitoring test ordering: systematic reviews of the effects and cost-effectiveness of systems. Health Technol Assess., 14(48):1– 227, 2010. Cited on page 204. [MNS+05] B. Mehta, C. Niederee, A. Stewart, M. Degemmis, P. Lops, and G. Se- meraro. Ontologically-Enriched Unified User Modeling for Cross-System Personalization. Springer Berlin / Heidelberg, August 2005. Cited on page 66. [MOF10] MOFED. Performance evaluation of the first five years development plan (2006-2010) and the growth and transformation planning (gtp) for the next five years (2011 - 2015). Technical report, Ministry of Finance and Economic Development, Addis Ababa, Ethiopia, July 2010. Cited on page 24. [MOH10] MOH. Federal Democratic Republic of Ethiopia Ministry of Health: Health Sector Development Programme IV 2010/11 2014/15, final draft, October 2010. Available from http: //www.nationalplanningcycles.org/sites/default/files/country_ docs/Ethiopia/ethiopia_hsdp_iv_final_draft_2010_-2015.pdf, viewed at Nov 1st, 2011. Cited on pages 57 and 58. [MOO] Hl V Methodology, Hl The Organization, and Hl The Organization. Hl7 organizational overview. Cited on page 79. Bibliography 249

[Mor96] DL. Morgan. Focus groups. Annual Review of Sociology, 22:129–152, 1996. Cited on page 195. [MS95] ST. March and G. Smith. Design and natural science research on infor- mation technology. Decision Support Systems, 15(4):251–266, 1995. Cited on page 8. [MS05a] G. Maria Sacco. Guided interactive diagnostic systems. In IEEE 18th Symposium on Computer-Based Medical Systems (CBMS05), pages 117– 122, 2005. Cited on page 104. [MS05b] J. Mat´eand A. Silva. Requirement Engineering for Sociotechnical systems. Information Science Publishing, 2005. Cited on page 99. [MS08] S. Mishra and IP. Singh. mHealth: A developing country perspective. In making: the eHealth Connection, July 13 - August 8, 2008, Bellagio, Italy, 2008. Cited on pages 35 and 37. [MSMN13] AC. M¨uhlbacher, M. Stoll, J. Mahlich, and M. N¨ubling.Patient prefer- ences for hiv/aids therapy - a discrete choice experiment. Health Eco- nomics Review, 3(14), 2013. Cited on page 171. [MTR+09] FF. Mej´ıa,JMM. Tavarez, AJF. Rodr´ıguez,GLA. Gonz´alez,DH. Lim´on, and GHG. P´erez. From requirements engineering to service oriented requirements engineering: an analysis of transition. In Thirtith Inter- national Conference on Information Systems, Phonex 2009, pages 1–13, 2009. Cited on pages 84 and 87. [MWA08] I. McNeil, J. Wales, and P. Azarmina. Satisfaction: the effect of a tele- phone based care management service on patient outcomes in the uk. In The International Educational and Networking Forum for eHealth, Telemedicine and Health ICT, Electronic Proceedings, Publ. Luxexpo, Luxembourg, Med-e-Tel, pages 415 – 420, 2008. Cited on page 22. [Nat04] National Institute of Allergy and Infectious Diseases (NIAID). Division of aids table for grading the severity of adult and pediatric adverse events, 2004. Available from: http://rsc.tech-res.com/Document/ safetyandpharmacovigilance/Table_for_Grading_Severity_of_ Adult_Pediatric_Adverse_Events.pdf, Viewed at Nov 1th, 2013. Cited on page 171. [Nev06] M. Nevile. Communication in context: A conversation analysis tool for examining recorded voice data in investigations of aviation occurrences. Technical report, ATSB RESEARCH AND ANALYSIS REPORT, Uni- versity of Canberra, 2006. Cited on page 105. [Now11] P. Nowak. Synthesis of qualitative linguistic researcha pilot review in- tegrating and generalizing findings on doctorpatient interaction. Patient Education and Counseling, 82(3):429–441, 2011. Cited on page 106. [NW11] T. Nigatu and Y. Woldegebriel. Analysis of the prevention of mother- to-child transmission (pmtct) service utilization in ethiopia: 2006-2010. Reprod Health, 8(6), 2011. Cited on page 173. [OBW+87] AM. OConnor, NF. Bow, P. Warde, L. Stolbach, and JE. Till. Elicit- ing preferences for alternative drug therapies in oncology: Influence of treatmentoutcome description, elicitation technique and treatment expe- rience on preferences annette. J Chron Dis, 40(8):811–818, 1987. Cited on page 159. 250 Tesfa Tegegne

[OEOA09] JB. Oladosu, JO. Emuoyinbofarhe, SO. Ojo, and AO. Adigun. Frame- work for a context-aware mobile e-health service discovery infrastructure for rural/suburban health care. Journal of Theortical and Applied Infor- mation Technology, pages 338–351, 2009. Cited on pages 17, 19, 49, 51 and 57. [OTB06] WM. Omar and A. Taleb-Bendiab. E-health support services based on service-oriented architecture. IT Professional, 8(2):35–41, 2006. Cited on pages 3 and 4. [Pap07] M. Papazoglou. Web Services: Principles and Technology. Prentice-Hall, July 2007. Cited on page 83. [PBPB11] L. Pecchia, P A. Bath, N. Pendleton, and M. Bracale. Analytic hierarchy process (ahp)for examining healthcare professionals assessments of risk factors: the rela-tive importance of risk factors for falls in community- dwelling. Methods of Information in Medicine, 50:435–444., 2011. Cited on page 171. [PBPC09] F. Petersen, G. Bartolomeo, M. Pluke, and T. Coracidia. Context sen- sitive personalization utilizing user profiles: Standardization work at eu- ropean telecommunications standards institute (etsi). In ETSI, Second International Conference on Advances in Human-Oriented and Personal- ized Mechanisms, Technologies, and Services, pages 20–25, 2009. Cited on pages 65, 69 and 70. [Pet07] MJ. Peter. e-health is the way via soa, 1 March 2007. http://www.allbusiness.com/technology/ software-services-applications-information/10559505-1.html, visited September 06, 2011. Cited on page 19. [PH07] M. Papazoglou and W. van den Heuvel. Service-oriented architec- tures: Approaches, technologies and research issues. The VLDB Journal, 16:389–415, 2007. Cited on pages 3 and 50. [PKPS02] M. Paolucci, T. Kawamura, TR. Payne, and K. Sycara. Semantic match- ing of web services capabilities. In ISWC 2002, pages 333 –347, 2002. Cited on pages 126 and 127. [PMR+13] L. Pecchia, JL. Martin, A. Ragozzino, C. Vanzanella, A. Scognamiglio, L. Mirarchi, and SP. Morgan. User needs elicitation via analytic hierarchy process (ahp). a case study on a computed tomography (ct) scanner. BMC Medical Informatics and Decision Making, 13(2), 2013. Cited on page 171. [PTDL07] M. Papazoglou, P. Traverso, S. Dustdar, and F. Leymann. Service- oriented computing: State of the art and research challenges. Computer, 40(11):38–45, 2007. Cited on page 63. [PTDL08] M. Papazoglou, P. Traverso, S. Dustdar, and F. Leymann. Service- oriented computing: a research roadmap. Int. J. Cooperative Inf. Syst., 17(2):223 – 255, 2008. Cited on page 3. [PTRC08] K. Peffers, T. Tuunanen, M. Rothenberger, and S. Chatterjee. A design science research methodology for information systems research. Journal of Management Information Systems, 24(3):45–77, 2008. Cited on pages xiii, 8 and 9. Bibliography 251

[PVOG08] MK. Pinheiro, M. Villanova-Oliver, and J. Gensel. Personalizing web- based information systems through context-aware user profiles. In UBI- COMM 2008, IEEE, The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pages 231– 237, 2008. Cited on pages 66 and 68. [PWS04] S. Pokraev, RJ. Wieringa, and MWA. Steen. Towards semantic ser- vice specification and discovery. In InCAiSE’04 Workshops in connection with The 16th Conference on Advanced Information Systems Engineering, CAiSE’04n:, pages 363–367, 2004. Cited on page 85. [PYK09] KL. Park, UM. Yoon, and SD. Ki. Personalized service discovery in ubiquitous computing environments. Pervasive Computing, 8(1):58–65, 2009. Cited on page 68. [RA99] E. Rakus-Andersson. A fuzzy group-decision making model applied to the choice of the optimal medicine in the case of symptoms not disappearing after the treatment. The Int. Jou. of Computing Anticipatory Systems, 7:141–152, 1999. Cited on page 166. [RA06] E. Rakus-Andersson. Minimization of regret versus unequal multi- objective fuzzy decision process in a choice of optimal medicines. In Information Processing and Management of Uncertainty in Knowledge- based Systems (IPMU 2006), pages 1181–1188, 2006. Cited on page 166. [RGA99] RJ. Rodrigues, G. Gattini, and G. Aalmeida. Setting up Healthcare Ser- vices Information Systems: A Guide for Requirement Analysis, Applica- tion Specijication, and Procurement. Washington, USA, 1999. Cited on page 1. [RHC+09] D. Rey, B. Hoen, P. Chavanet, MP. Schmitt, G. Hoizey, P. Meyer, G. Pey- tavin, B. Spire, C. Allavena, M. Diemer, T. May, JL. Schmit, M. Duong, V. Calvez, and JM. Lang. High rate of early virological failure with the once-daily tenofovir/lamivudine/nevirapine combination in naive hiv-1- infected patients. J Antimicrob Chemother., 63(3):380–388, 2009. Cited on page 177. [Rit12] P. Rittgen. End-user involvement and team factors in business process modeling. In Proceedings of the 45th Hawaii International Conference on System Sciences, Grand Wailea, Maui, Hawaii, USA, 2012. Cited on pages 91 and 97. [RK05] DC. Rudorf and SA. Krikorian. Adverse effects associated with antiretro- viral therapy and potential management strategies. Journal of Pharmacy Practice, 18(258):258–277, 2005. Cited on pages 177 and 188. [RK09] K. Ramanathan and K. Kapoor. Creating user profiles using wikipedia. In Conceptual Modeling - ER 2009 Springer-Verlag Berlin Heidelberg, 28th International Conference on Conceptual Modeling, Gramado, Brazil, November 9-12,, pages 415–427, 2009. Cited on pages 64 and 124. [RMM+13] L. Ricciardi, F. Mostashari, J. Murphy, JG. Daniel, and EP. Siminerio. A national action plan to support consumer engagement via e-health. Health Affairs, 32(2):376–384, 2013. Cited on page 2. [RR06] S. Robertson and J. Robertson. Mastering the Requirements Process Sec- ond Edition. Addison Wesley Professional, 2006. Cited on pages 97 and 99. 252 Tesfa Tegegne

[RRNZT13] D. Redd, T. Rindflesch, J. Nebeker, and Q. Zeng-Treitler. Improve re- trieval performance on clinical notes: A comparison of four methods. In 46th Hawaii International Conference on System Sciences, pages 2389– 2397, 2013. Cited on page 127. [Saa94] TL. Saaty. Fundamentals of Decision Making and Prority Theory with the Analytic Hierarchy Process. Analytic hierarchy process series. Rws Publications, 1994. Cited on pages 156 and 158. [Saa08] TL. Saaty. Relative measurement and its generalization in decision mak- ing. why pairwise comparisons are central in mathematics for the measure- ment of intangible factors. the analytic hierarchy/network process. Statis- tics and Operations Research, 102(2):251–318, 2008. Cited on page 164. [SCAM+13] Z. Shubber, A. Calmy, I. Andrieux-Meyer, M. Vitoria, F. Renaud-Th´ery, N. Shaffer, S. Hargreaves, EJ. Mills, and N. Ford. Adverse events as- sociated with nevirapine and efavirenz-based first-line antiretroviral ther- apy: a systematic review and meta-analysis. AIDS, 27(9):14031412, 2013. Cited on pages 177 and 188. [SDHS05] AM. Serhabi, R. Dssouli, A. Hafid, and H. Sahraoui. A qos broker based architecture for efficient web service selection. In ICWS ’05 Proceedings of the IEEE International Conference on Web Services, pages 113–120, 2005. Cited on page 54. [SDR+10] K. Scarsi, K. Darin, H. Rawizza, S. Meloni, G. Eisen, C. Chang, R. Olai- tan, E. Ekong, O. Agbaj, W. Gashau, R. Murphy, and P. Kanki. Tdf- 3tc-nvp is inferior to azt-3tc-nvp in a large art program in nigeria, 2010. Cited on pages 177 and 187. [SG08] M. da Silveira and N. Guelfi. Exploiting service oriented architectures for the design of e-health systems. In HealthInfo, pages 219–224, 2008. Cited on pages 2 and 3. [SHVH09] O. Suominen, E. Hyvonen, K. Viljanen, and E. Hukka. Healthfinland - a national publication system for semantic health information. Web Semantics: Science, Services and Agents on the World Wide Web, 7(Issue 4):287–297, 2009. Cited on page 127. [SHWS05] P. Sawyer, J. Hutchinson, J. Walkerdine, and I. Sommerville. Faceted service specification. In 1st International Workshop on Service-oriented Computing:Consequences for Engineering Requirements (Soccer’05, Soc- cer’05, 2005. Cited on page 90. [Sim96] H. Simon. The Sciences of Artificial, 3rd ed. MIT Press, Cambridge, MA, 1996. Cited on page 8. [SLL09] CF. So, CL. Lai, and RYK. Lau. Ontological user profiling and lan- guage modeling for personalized information services. In IEEE Computer Society, 2009 IEEE International Conference on e-Business Engineering, pages 559–564, 2009. Cited on pages 63 and 65. [SMB07] A. Sieg, B. Mobasher, and R. Burke. Web search personalization with ontological user profiles. In ACM, Proceedings of the sixteenth ACM conference on Conference on information and knowledge management, pages 525–534, 2007. Cited on pages 68 and 124. Bibliography 253

[SPM+13] VA. Shaffer, A. Probst, EC. Merkle, HR. Arkes, and MA. Medow. Why do patients derogate physicians who use a computer-based diagnostic sup- port system? Medical Decision Making, 33:108–118, 2013. Cited on pages 201 and 202. [SPSS04] K. Sycara, M. Paolucci, J. Soudry, and N. Srinivasan. Dynamic discovery and coordination of agent-based semantic web services. Internet Comput- ing, 8(3):66–73, 2004. Cited on pages 59 and 126. [SRAD07] G. Shu, FO. Rana, JN. Avis, and C. Dingfang. Ontology-based seman- tic matchmaking approach. Science Direct, 38(1):5967, 2007. Cited on page 59. [SRB12] TA. Sanner, LK. Roland, and K. Braa. From pilot to scale: Towards an mhealth typology for low-resource contexts. Health Policy and Technol- ogy, 1:155–164, 2012. Cited on page 3. [SSLM10] D. Serra, P. Serneels, M. Lindelow, and JG. Montalvo. Discovering the Real World Health Workers’ Early Work Experience and Career Prefer- ences in Ethiopia. The World Bank, May 2010. Cited on pages 24, 26 and 122. [SSRC+10] M. Shmueli-Scheuer, H. Roitman, D. Carmel, Y. Mass, and D. Konop- nicki. Extracting user profiles from large scale data. In ACM International Conference Proceeding Serie, Proceedings of the 2010 Workshop on Mas- sive Data Analytics on the Cloud, page Article No. 4, 2010. Cited on page 64. [TAH07] V. Tsetsos, C. Anagnostopoulos, and S. Hadjiefthymiades. Semantic web service discovery: Methods, algorithms, and tools. In Jorge Cardoso, editor, Semantic Web Services:Theory, Tools, and Applications, Premier Reference Source, chapter XI, pages 240–280. IGI Global, Hershey, PA, USA, 2007. Cited on page 126. [Tan05] J. Tan. E-Health care Information Systems: An Intro. for Students and Professionals. Ebook, April 2005. Cited on page 57. [TJWW07] WT. Tsai, Z Jin, P. Wang, and B. Wu. Requirement engineering in service-oriented system engineering. E-Business Engineering, IEEE In- ternational Conference on, 0:661–668, 2007. Cited on pages 83 and 84. [TKD+13] J. Tarning, F. Kloprogge, M. Dhorda, V. Jullien, F. Nosten, NJ. White, PJ. Guerin, and P. Piolad. Pharmacokinetic properties of artemether, dihydroartemisinin, lumefantrine, and quinine in pregnant women with uncomplicated plasmodium falciparummalaria in uganda. Antimicrob. Agents Chemother, 57(10):5096–5103, 2013. Cited on pages 175 and 177. [TKPV+04] FO. Ter Kuile, ME. Parise, FH. Verhoeff, V. Udhayakumar, RD. New- man, AM. van Eijk, SJ. Rogerson, and RW. Steketee. The burden of co-infection with hmuman immunodeficiency virus type 1 and malaria in pregnant women in sub-saharan africa. Am. J. Trop. Med. Hyg, 71(Supl 2):41–54., 2004. Cited on pages 172 and 173. [TKS12] MW. Tang, P. Kanki, and RW. Shafer. A review of the virological effi- cacy of the 4 world health organizationrecommended tenofovir-containing regimens for initial hiv therapy. HIV/AIDS, 54:862–875, 2012. Cited on pages 177, 179, 187 and 188. 254 Tesfa Tegegne

[TKW10a] T. Tegegne, B. Kanagwa, and Th.P. van der Weide. An ehealth service discovery framework for a low infrastructure context. In 2nd Int. Conf. on Computer Technology and Development, Nov 2-4, Cairo, Egypt, pages 606–610, 2010. Cited on pages 45, 54, 76, 122, 129, 156 and 172. [TKW10b] T. Tegegne, B. Kanagwa, and Th.P. van der Weide. Service discovery framework for personalized ehealth. In Int. Conf. on Services Science, Management and Engineering, SSME2010, Dec 26-28, Tainjin, China, page in press, 2010. Cited on page 54. [TMC09] A. Toninelli, R. Montanari, and A. Corradi. Enabling secure service dis- covery in mobile healthcare enterprise networks. IEE Wireless Commmu- nication, pages 24–32, June 2009. Cited on page 23. [TR04] T. Tuunanen and M. Rossi. Engineering a method for wide audience requirements elicitation and integrating it to software development. In IEEE, Proceedings of the 37th Hawaii International Conference on System Sciences - 2004, pages 1–10, 2004. Cited on page 84. [TW11] T. Tegegne and Th.P. van der Weide. eHealth Service Discovery Frame- work: A Case Study in Ethiopia. In Andreas Holzinger and Klaus-Martin Simonic, editors, USAB, volume 7058 of Lecture Notes in Computer Sci- ence, pages 397–416. Springer, 2011. Cited on page 122. [TW12] T. Tegegne and Th.P. van der Weide. Enriching queries by user prefer- ences. Technical Report, 2012. Cited on pages 156, 169 and 172. [TW13] T. Tegegne and Th.P. van der Weide. Designing spoken dialogue system based on dotctor-patient interaction in the diagnosis process. In Third Int. Symposium on Business Modeling and Software Design: Special Session on EHST, pages 261–269, 2013. Cited on page 122. [TW14] T. Tegegne and Th.P. van der Weide. Enriching queries with user prefer- ences in healthcare. Information Processing & Management, 4(50):599– 620, 2014. Cited on page 75. [UO09] JC. Uneke and A. Ogbonna. Malaria and hiv co-infection in pregnancy in sub-saharan africa: impactio of treatment using antimalarial and an- tiretroviral agents. Trans. of the Royal Soc.of Trop. Medc and Hyg., 103:761–767, 2009. Cited on page 177. [UOBO11] FME. Uzoka, O. Obot, K. Barker, and J. Osuji. An experimental compar- ison of fuzzylogic and analytic hierarchy process for medical decision sup- port systems. Computer Methods and Programs in Biomedicine, 103:10– 27, 2011. Cited on pages 159, 171 and 172. [VHA05] LH. Vu, M. Hauswirth, and K. Aberer. Towards p2p-based semantic web service discovery with qos support. In Lecture Notes in Computer Sci- ence 3812, Workshop on Business Processes and Services (BPS), Nancy, France, pages 18–31, 2005. Cited on pages 18 and 51. [VLM+12] E. Verlinde, N. de Laender, S. de Maesschalck, M. Deveugele, and S. Willems. The social gradient in doctor-patient communication. Inter- national Journal for Equity in Health, 11(12), 2012. Cited on pages 109 and 111. [VPP05] E. Vasilyeva, M. Pechenizkiy, and S. Puuronen. Towards the frame- work of adaptive user interfaces for ehealth. In 18th IEEE Symposium Bibliography 255

on Computer-Based Medical Systems (CBMS05), pages 139 – 144, 2005. Cited on page 1. [WAB+10] W. Wyner, K. Angelov, G. Barzdins, D. Damljanovic, B. Davis, N. Fuch, S. Hoefler, K. Jones, K. Kaljurand, T. Kuhn, M. Luts, J. Pool, M. Rosner, R. Schwitter, and J. Sowa. On controlled natural languages: Properties and prospects. In Norbert E. Fuchs, editor, Proceedings of the Workshop on Controlled Natural Language (CNL 2009), volume 5972 of Lecture Notes in Computer Science, pages 281–289, 2010. Cited on pages 126 and 131. [Wan10] Y. Wang. A framework for privacy-enhanced personalization. In PhD Dissertation, University of California, Irvine, PhD Dissertation, 2010. Cited on pages 64, 66 and 72. [WBHK02] M. Wagner, TW. Balke, R. Hirschfeld, and W. Kellerer. A roadmap to advanced personalization of mobile services. In Workshops DOA/ODBASE/CoopIS, IRvine, CA, In Proc. of the Int. Federated Con- ferences DOA/ODBASE/CoopIS (Industry Program). Irvine, CA, 2002., 2002. Cited on pages 63 and 65. [WDFLP08] D. Weiß, M. Duchon, F. Fuchs, and C. Linnhoff-Popien. Context-aware personalization for mobile multimedia services. In International Confer- ence on Mobile Computing and Multimedia. MoMM 2008, Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia, pages 267–271, 2008. Cited on page 66. [Wei07] Y. Weitzman. Doctors fleeing in record numbers, 24 September 2007. http://archive.voice-online.co.uk/content.php?show=12043, visited September 06, 2011. Cited on page 26. [WERR06] D. Weerasinghe, K. Elmufti, M. Rajarajan, and V. Rakocevic. Xml se- curity based access control for health care information in mobile environ- ment. In IIEEE, Pervasive Health Conference and Workshops, Nov 29- Dec 1, EEE Computer Society, pages 1–6, 2006. Cited on page 57. [WHO04] WHO. Malaria and hiv interactions and their implications for public health policy, June, 2004. Available from: http://www.who.int/hiv/ pub/prev_care/malariahiv.pdf. Cited on page 173. [WHO10a] WHO. Antiretroviral drugs for treating pregnant women and pre- venting hiv infection in infants: recommendations for a public health approach., 2010. http://whqlibdoc.who.int/publications/2010/ 978924159981-eng.pdf, accessed Nov 11th, 2013. Cited on page 148. [WHO10b] WHO. Guidelines for the treatment of malaria, 2010. http: //www.who.int/tdr/publications/tdr-research-publications/ artemisinin-compounds-pregnancy/en/index.html, accessed Nov 11th, 2013. Cited on page 151. [WHO10c] WHO. Guidelines for the treatment of malaria, 2nd ed. world health orga- nization, geneva, switzerland, June, 2010. Available from: http://www. who.int/malaria/publications/atoz/9789241547925/en/index.html. Cited on pages 173, 175, 176 and 189. [WHO13] WHO. Consolidated guidelines on the use of antiretroviral drugs for treat- ing and preventing hiv infection, 2013. Available from: http://apps.who. 256 Tesfa Tegegne

int/iris/bitstream/10665/85321/1/9789241505727_eng.pdf accessed July, 2013. Cited on pages 12, 173, 174, 176, 188 and 189. [Wik] Wikipedia. Drug interaction. Cited on page 174. [Wir73] N. Wirth. The Programming Language Pascal (Revised Report). Num- ber 5 in Berichte de Fachgruppe Computer-Wissenschaften. Eidgeno¨ossis- che Technische Hochschule Z¨urich, Juli 1973. Cited on page 133. [WK09] Y. Wang and A. Kobsa. Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites. Springer Verlag, September 2009. Cited on pages 66 and 72. [WL05] Y. Wang and Z. Liu. A personalized health information retrieval system. In AMIA Annual Symposium Proceedings, page 1149, 2005. Cited on page 127. [WLEL11] L. W¨urtemberg, R. Lagerstrm, E. Ericsson, and J. Lillieskld. It project success factors: An experience report. In Technology Management in the Energy Smart World (PICMET), pages 1–10, 2011. Cited on pages 91, 92, 97 and 98. [WLH07] YM. Wang, Y. Luo, and Z. Hua. Aggregating preferences rankis using owa operator weights. Information Sciences, 177:3356–3363, 2007. Cited on page 159. [WSH+07] SA. Ward, EJP. Sevene, IM. Hastings, F. Nosten, and R. McGready. Antimalarial drugs and pregnancy: safety, pharmacokinetics, and phar- macovigilance. Lancet Infect Dis, 7:136144, 2007. Cited on page 177. [WSL+08] H. Wang, X. Shi, Y. Li, H. Chang, W. Chen, and J. Tang. User profile management for personalized telecom service. In IEEE Computer Society, The 9th International Conference for Young Computer Scientists, pages 1087–1092, 2008. Cited on page 63. [WYB13] JP. Weiner, S. Yeh, and D. Blumenthal. The impact of health informa- tion technology and e-health on the future demand for physician services. Health Affairs, 32(11):1998–2004, 2013. Cited on page 2. [WYX05] YM. Wang, JB. Yang, and DL. Xu. A preference aggregation method through the estimation of utility intervals. Computers & Operations Re- search, 32:2027–2049, 2005. Cited on page 127. [Yag79] R. Yager. Multiple objective decision-making using fuzzy sets. Inter- national Journal of Man-Machine Studies, 9:375–382, 1979. Cited on page 156. [Yag88] R. Yager. On ordered weighted averaging aggregation operators in mul- ticriteria decisionmaking. IEEE Trans Syst Man Cybern, 18(1):183–190, 1988. Cited on page 163. [Yag08] R. Yager. Prioritized aggregation operators. International Journal of Approximate Reasoning, 48:263–274, 2008. Cited on pages 159 and 162. [Yag09] R. Yager. Prioritized owa aggregation. Fuzzy Optim Decis Making, 8:245– 262, 2009. Cited on pages 156 and 162. [Yag12] R. Yager. On prioritized multiple-criteria aggregation. IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics, 42(5):1297–1305, 2012. Cited on pages 159 and 162. [Yan08] N. Yankelovich. Using natural dialogs as the basis for speech interface design. Human Factors and Voice Interactive Systems Signals and Com- munication Technology, pages 255–290, 2008. Cited on pages 114 and 116. [YHNM11] HB. Yan, VN. Huynh, Y. Nakmori, and T. Murai. On prioritized weighted aggregation in multi-criteria decision making. Expert Systems with Ap- plications, 28:812–823, 2011. Cited on page 159. [YMC+07] H. Ying, RD. MacArthur, JA. Chon, DC. Barth-Jones, H. Ye, and LR. Crane. A self-learning fuzzy discrete event system for hiv/aids treatment regimen selection. IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics, 37:966–979, 2007. Cited on page 174. [Yue13] KKF. Yuen. The primitive cognitive network process in healthcare and medical decision making: Comparisons with the analytic hierarchy pro- cess. In press Appl. Soft Comput. J., 2013. Cited on page 171. [ZJ00] VW. Zue and Glass JR. Conversational interfaces: Advances and chal- lenges. In PROCEEDINGS OF THE IEEE, VOL. 88, NO. 8,, IEEE, pages 1166–1180, 2000. Cited on page 106. [ZJ10] D. Zowghi and Z. Jin. A framework for the elicitation and analysis of information technology service requirements and their alignment with en- terprise business goals. In 34th Annual IEEE Computer Software and Ap- plications Conference Workshops, pages 269–272, 2010. Cited on page 86. [ZKG04] O. Zimmermann, P. Krogdahl, and C. Gee. Elements of service-oriented analysis and design, 2004. Available from http://ozimmer.de/download/ INF05-ServiceModelingv11.pdf, viewed at March, 2012. Cited on page 87. [ZMZJ06] K Zachos, N. Maiden, X. Zhu, and S. Jones. Does service discovery en- hance requirements specification? a preliminary empirical investigation. In SOCCER, Service-Oriented Computing: Consequences for Engineering Requirements, 2006. Cited on page 87. [ZMZJ07] K. Zachos, NAM. Maiden, X. Zhu, and S. Jones. Discovering Web Services to Specify More Complete System Requirements. Springer-Verlag Berlin Hiedeberg, 2007. Cited on page 88. [ZNP+09] K. Zachos, C. Nikolaou, P. Petridis, G. Stratakis, M. Voskakis, and E. Pa- pathanasiou. Enhancing service network analysis and service selection using requirements-based service discovery. In IEEE Computer Soci- ety, 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns, pages 325–331, 2009. Cited on page 87. [ZPCS09] C.A. Zaynai, A. P`eninou, MF. Canut, and F. S´edes. An adaptation approach: Query enrichment by user profile. In LNCS 4879, Springer- Verlag Berlin Heideliberg, pages 351–361, 2009. Cited on page 124. [ZYC04] D. Zhang, Z. Yu, and X.Y. Chin. Context-aware infrastructure for person- alized healthcare. In The International Workshop on Personalized Health, December 13-15, Belfast, Northern Ireland, pages 154–163, 2004. Cited on page 79.

Author index

Aalmeida, G. 1 Azzard, B. 181, 190 Aberer, K. 18, 51 Abowd, GD. 56 Back, D. 176, 190, 192 Abraham, A. 68 Back, Merry C., D and 180, 192 Adesina, A. 17, 19, 49, 51 Badr, Y. 68 Adigun, AO. 17, 19, 49, 51, 57 Badru, T. 176, 181, 190 Agbaj, O. 181, 190 Bai, J. 124 Agostini, J. 159, 177 Balke, TW. 63, 65, 66 Agu, KA. 176, 181, 190, 191 Barker, K. 162, 174 Aguar´on,J. 167 Barth-Jones, DC. 177 Ahern, DK. 1, 2 Bartolomeo, G. 65, 69, 70 Akpoigbe, K. 176, 181, 190 Barzdins, G. 126, 131 Alam, S. 57, 66, 76, 77 Bastiana, H. 174 Alexander, GL. 206 Batavia, H. 45 Alfayoumi, M. 53 Bath, P A. 174 Allavena, C. 181 Bellur, U. 126, 127 Allison, J. 160, 174, 176 Benharref, A. 4 Ammann, A. 176 Benz, D. 124 Ammenwerth, E. 215, 216 Bergus, G. 170 Anagnostopoulos, C. 126 Berhan, Y. 122 Ananthanarayana, VS. 53, 54 Berndtsson, M. 6 Andersena, T. 2 Bertakis, K. 112 Anderson, R. 209 Beusterien, MK. 160 Andrieux-Meyer, I. 176, 181, 190, 191 Beverungen, D. 92, 97 Angelov, K. 126, 131 Beyene, Y. 113 Anh Nguyen, T. 73 Bhogal, J. 124 Antonellis, V. de 3, 18, 49, 50, 54 Bianchini, D. 3, 18, 49, 50, 54 Appelman, J. 86, 91–93 Bickmore, T. 102, 103, 105, 109 Arkes, HR. 206 Biennier, F. 68 Arnold, SB. 121 Birkel, S. 19 Arribas, JR. 181, 190 Bjrnb, P. 2 Asfari, O. 123 Black, J. 102, 104 Ashour, OM. 161 Blumenthal, D. 2 Aufaure, MA. 65 Bo, C. 84, 90 Avis, JN. 59 Boohaker, E. 160, 174, 176 Ayele, D. 175 Bourda, Y. 123 Ayisi, JG. 175 Boutilier, C. 131, 132, 137, 143, 169 Azarmina, P. 22 Bow, NF. 161

259 Braa, K. 2, 3 Coulter, A. 2 Bracale, M. 174 Courtney, KL. 206 Brafman, R. 131, 132, 137, 143, 169 Crane, LR. 177 Bridges, JF. 174 Cysneiros, LM. 99 Bridges, MW. 3, 4 Brink-Muinen, A. van den 111, 112 Damljanovic, D. 126, 131 Broens, T. 50 Daniel, JG. 2 Burke, R. 68, 124 Danner, M. 174 Burrowes, S. 176 Dannera, M. 174 Byakika-Kibwika, P. 180, 192 Darin, K. 181, 190 Davis, A. 93, 94 Calmy, A. 176, 181, 190, 191 Davis, AM. 84, 89 Calvez, V. 181 Davis, B. 126, 131 Campbell, K. 160 Degemmis, M. 66 Campo, RE. 181, 190 DeJesus, E. 181, 190 Canut, MF. 124 Dekhil, M. 64 Cappuccio, JD. 174 Delcambre, L. 170 Cardoso, J. 127 Demiris, G. 206 Carmel, D. 64 Deveugele, M. 109, 111 Carraro, EP. 176, 181, 190 Dey, AK. 56 Catwell, L. 215, 216 Dhorda, M. 176, 178, 181 Cawsey, A. 80 Diaby, V. 160 Celi, L. 104 Dias, JM. 176, 181, 190 Chadwick, D. 73 Diemer, M. 181 Chambliss, M. 170 DiMarco, C. 80 Chandramouli, A. 55, 64, 125 Dingfang, C. 59 Chang, C. 181, 190 Dintsios, CM. 174 Chang, H. 63 Dintsiosa, CM. 174 Charry, E. 102, 104 DMello,´ DA. 53, 54 Chatterjee, S. xv, 8, 9 Doan, BL. 123 Chavanet, P. 181 Dobrowiecki, T. 126 Chen, D. 127 Dockhorn Costa, P. 50 Chen, TY. 169 Dodig-Crnkovic, G. 7, 8 Chen, W. 63 Dolan, JG. 160, 174, 176 Cheng, AK. 181, 190 Domegan, C. 7 Chin, X.Y. 79 Domshlak, C. 131, 132, 137, 143, 169 Choi, O. 69, 70 Dooley, K. 8 Chon, JA. 177 Dournaee, B. 19 Chowdury, MR. 57, 66, 76, 77 Dragoni, M. 161, 165, 166, 169 Chuck, S. 181, 190 Drury, P. 17, 19, 22, 49, 51, 57 Clarke, AM. 84 Dssouli, R. 54 Clemensen, J. 215 Duchon, M. 66 Clifford, G. 104 Duong, M. 181 Cohen, K. 180, 192 Durling, S. 103 Conesa, J. 124 Dustdar, S. 3, 63 Coracidia, T. 65, 69, 70 Dziekan, K. 160 Corcho, O. 65 Cornelsen, TC. 176, 181, 190 Ebell, M. 170 Corradi, A. 23 Economist, The xvii Costa Pereira, C. da 161, 165, 166, 169 Efthimiadis, EN. 123 Eijk, AM. van 175, 176 Green, N. 103, 109 Eisen, G. 181, 190 Grimm, S. 126, 127 Ekong, E. 181, 190 Grosan, C. 68 Ellins, J. 2 Gruber, A. 105 Elmufti, K. 57 Guelfi, N. 2–4 Eluwa, G. 176, 181, 190 Guerin, PJ. 176, 178, 181 Ely, J. 170 Guo, RQ. 127 Emuoyinbofarhe, JO. 17, 19, 49, 51, 57 Endres, M. 131, 138 Hadizadeh, N. 92, 96–98 Enejosa, J. 181, 190 Hadjiefthymiades, S. 126 Ericsson, E. 92, 97, 98 Hadjouni, M. 65 Erl, T. 98 Hafid, A. 54 Evans, E. 170 Haiffa, H. 131, 169 Han, S. 69, 70 Farzanfar, R. 106 Hanpithakpong, W. 180, 192 Fields, EB. 161 Hansson, J. 6 Flateau, C. 176, 181 Harding, G. 160 Fleming, D. 7 Hargreaves, S. 176, 181, 190, 191 Flood, E. 160 Hasselmyer, P. 3, 4, 18, 49–51 Ford, N. 176, 181, 190, 191 Hastings, IM. 181 Foster, C. 102 Hauswirth, M. 18, 51 Fouskas, G. 87 He, J. 75 Franco, C. 161 He, K. 87, 124 Frederiks, PJM. 126 Hengst, M. den 86, 91–93 Fried, TR. 159, 177 Heuvel, W. van den 3, 50 Friedman, RH. 106 Hevner, A. 8 Fruhling, AL. 34, 35, 45 Hickey, AM. 84, 89, 93, 94 Fu, L. 45 Hirschfeld, R. 63, 65, 66 Fuch, N. 126, 131 Hoare, CAR. 75 Fuchs, F. 66 Hoefler, S. 126, 131 Fujita, H. 158 Hoen, B. 181 Hofstede, G. 110–112 Gallant, JE. 181, 190 Hofstede, GJ. 110–112 Gashau, W. 181, 190 Hoizey, G. 181 Gattini, G. 1 Hoos, H. 131, 132, 137, 143, 169 Gauch, S. 55, 64, 125 Hotho, A. 124 Gee, C. 87 Hovy, E. 80 Gensel, J. 66, 68 Hua, Z. 161 Gerber, A. 174 Hukka, E. 127 Gerbera, A. 174 Hummel, JM. 174 Ghosh, R. 64 Hutchinson, J. 90 Giorgino, T. 102, 103, 109 Huynh, VN. 161 Gnasa, M. 67 Hyvonen, E. 127 Goeree, R. 160 G¨oker, AS. 125 Iannone, L. 159, 177 Goldberger, A. 45 Idemyor, V. 176 G´omez-P´erez,A. 65 IJzerman, MJ. 174 Gonz´alez,GLA. 84, 87 Imperiale, TF. 160, 174, 176 Goold, SD. 109 Ingwersen, P. xv, 28, 29 Grasso, F. 80 Ioannidis, Y. 123, 125, 131 Iqbal, Z. 57, 66, 76, 77 Koch, F. 102, 104 Isselhardt, BJ. 174 Kolczak, MS. 175 Kondo, W. 176, 181, 190 James, D. 124 Konopnicki, D. 64 Jannach, D. 85, 87 Koolwaaij, J. 50 J¨arvelin, K. xv, 28, 29 Kotonya, G. 93 Jaspers, MWM. 206, 207 Koutrika, G. 123, 125, 131 Ji, X. 53 Kranenburg, H. van 63, 64 Jiang, W. 87, 124 Krause, B. 124 Jin, Z. 86 Kredo, T. 180, 192 Jones, K. 126, 131 Kremer, LC. 206, 207 Jones, S. 87, 88 Kreslake, JM. 2 Jordan, CJ. 160 Kreutler, G. 85, 87 JR., Glass 106 Krikorian, SA. 181, 190 Jrad, Z. 65 Krogdahl, P. 87 Jullien, V. 176, 178, 181 Kuck, J. 67 Jun-Liang, C. 84, 90 Kuhn, T. 126, 131 Juneja, G. 19 Kulkarni, R. 126, 127 Kumar, A. 71 K., Stein 209 Kumar, GP. 124 Kager, PA. 175 Kwak, NK. 174 Kahandoker, A. 102, 104 Kwan, A. 45 Kahn, TM. 17, 49, 57 Kyng, M. 215 Kaljurand, K. 126, 131 Kanagwa, B. 45, 54, 55, 75, 76, 122, 129, Laborde, R. 73 158, 175 Laender, N. de 109, 111 Kanki, P. 181, 190 Lagerstrm, R. 92, 97, 98 Kaonga, N. 45 Lai, CL. 63, 65 Kapoor, K. 64, 124 Lamorde, M. 180, 192 Kar, E. van de 86, 91–93 Lang, JM. 181 Kart, F. 20 Lankhorst, MM. 63, 64 Katabira, E. 180, 192 Larsen, SB. 215 Kavis, M. 92, 97, 98 Lau, RYK. 63, 65 Kawamura, T. 126, 127 Le, J. 127 Kay, J. 209 Le Loup, G. 176, 181 Kayed, A. 53 Lee, CH. 90 Keeney, RL. 131, 169 Lee, CW. 174 Kehinde, A. 17, 19, 49, 51 Lee-Klenz, S. 87 Kellerer, W. 63, 65, 66 Levy, B. 170 Kensingc, F. 2 Leymann, F. 3, 63 Khoo, S. 176, 190, 192 Li, Y. 63 KI., Barnes 180, 192 Liberatore, MJ. 174 Ki, SD. 68 Lillieskld, J. 92, 97, 98 Kießling, W. 123, 131, 132, 136, 138 Lim´on,DH. 84, 87 Kilsdonk, E. 206, 207 Lindegardh, N. 180, 192 Kirkevold, M. 215 Lindelow, M. 24, 26, 122 Kloprogge, F. 176, 178, 181 Linnhoff-Popien, C. 66 Klose, K. 92, 97 Lipkin, M. 109 Knackstedt, R. 92, 97 Liu, A. 90 Kobsa, A. 63–66, 72 Liu, W. 87, 124 Liu, Z. 127 Mingers, J. 6 Lops, P. 66 Minkov, M. 110–112 Lu, B. 181, 190 Mirarchi, L. 174 Lumsden, J. 103 Mishra, S. 35, 37 Lundell, B. 6 Misore, AO. 175 Luo, Y. 161 Moallem, P. 104 Luts, M. 126, 131 Mobasher, B. 68, 124 Lykke, M. 170 Moein, S. 104 Molla, J. 2 Maartens, G. 180, 192 Monadjemi, SA. 104 MacArthur, RD. 177 Montalvo, JG. 24, 26, 122 Macedo, RL. 176, 181, 190 Montanari, R. 23 Macfarlane, A. 124 Montero, J. 161 Maesschalck, S. de 109, 111 Moreno-Jim´enez,JM. 167 Mahlich, J. 174 Morgan, DL. 199 Maiden, N. 87 Morgan, SP. 174 Maiden, NAM. 88 Moser, LE. 20 Maier, D. 132 Mostashari, F. 2 Main, C. 209 Moxham, T. 209 Malindi, P. 17, 49, 57 M¨uhlbacher, AC. 174 Manen, JG. van 174 Murai, T. 161 Marcelo, A. 104 Murphy, J. 2 March, ST. 8 Murphy, R. 181, 190 Maria Sacco, G. 104 Mwambi, H. 175 Marks, E. 3 Myrhaug, HI. 125 Martin, JL. 174 Mass, Y. 64 Nabukeera, L. 180, 192 Mat´e,J. 100 Nahlen, BL. 175 Mauff, K. 180, 192 Nakmori, Y. 161 May, T. 181 Namakula, R. 180, 192 Mayanja-Kizza, H. 180, 192 Natoli, J. 19 Mayito, J. 180, 192 Nebeker, J. 127 McClure, PD. 57 Nesheim, SR. 176 McColl, D. 181, 190 Nevile, M. 105 McGready, R. 181 Newman, RD. 175, 176 McNeil, I. 22 Nie, JY. 124 McTear, M. 101 Niederee, C. 66 Mechael, P. 34, 45 Nigatu, T. 176 Medow, MA. 206 Nikolaou, C. 87 Meeuwesen, L. 111, 112 Nizar, M. 53 Mehta, B. 66 Noll, J. 57, 66, 76, 77 Mej´ıa,FF. 84, 87 Nosten, F. 176, 178, 181 Melliar-Smith, PM. 20 Nowak, P. 106 Meloni, S. 181, 190 Ntale, M. 180, 192 Merkle, EC. 206 N¨ubling,M. 174 M´esz´aros,T. 126 Nydick, RL. 174 Meyer, P. 181 Nyongesa, H. 17, 19, 49, 51 Micarelli, A. 55, 64, 125 Migneault, JP. 106 Obot, O. 162, 174 Mills, EJ. 176, 181, 190, 191 OConnor, AM. 161 Ogbonna, A. 181 Pozniak, AL. 181, 190 Ojo, SO. 17, 19, 49, 51, 57 Prandel, E. 176, 181, 190 Okudan, GE. 161 Price, S. 170 Oladosu, JB. 17, 19, 49, 51, 57 Probst, A. 206 Olaitan, R. 181, 190 Purkayastha, S. 2 Olsson, B. 6 Puuronen, S. 1 Omar, WM. 4 Oparah, AC. 176, 181, 190, 191 Ragozzino, A. 174 Osheroff, J. 170 Rajarajan, M. 57 Ossman, J. 45 Rakocevic, V. 57 Osuji, J. 162, 174 Rakus-Andersson, E. 169 Otenko, S. 73 Ram, S. 8 Otieno, JA. 175 Ramanathan, K. 64, 124 Rana, FO. 59 Pakker, N. 180, 192 Rawizza, H. 181, 190 Paolucci, M. 60, 126, 127 Redd, D. 127 Papathanasiou, E. 87 Renaud-Th´ery, F. 176, 181, 190, 191 Papazoglou, M. 3, 50, 63 Rey, D. 181 Paris, C. 80 Ricciardi, L. 2 Parise, ME. 175, 176 Riezebos, RJ. 206, 207 Park, J. 8 Rindflesch, T. 127 Park, KL. 68 Rittgen, P. 92, 97 Pasi, G. 161, 165, 166, 169 Robertson, J. 97, 99 Pateli, A. 87 Robertson, S. 97, 99 Payne, TR. 126, 127 Rodrigues, RJ. 1 Pecchia, L. 174 Rodriguex, JT. 161 Pechenizkiy, M. 1 Rodr´ıguez,AJF. 84, 87 Peddemors, AJH. 63, 64 Rogers, MF. 176 Peffers, K. xv, 8, 9 Rogerson, SJ. 175, 176 Pendleton, N. 174 Roitman, H. 64 P`eninou,A. 124 Roland, LK. 3 P´erez,GHG. 84, 87 Rong, P. 87, 124 Perini, J. 176, 181, 190 Rosner, M. 126, 131 Pernici, B. 3, 18, 49, 50, 54 Rossi, M. 84 Peter, MJ. 19 Rotberg, J. 104 Petersen, F. 65, 69, 70 Rothenberger, M. xv, 8, 9 Petridis, P. 87 Rudorf, DC. 181, 190 Peute, LW. 206, 207 Ryan, M. 180, 192 Peytavin, G. 181 Phalen, JM. 2 Saaty, TL. 158, 160, 167 Pialoux, G. 176, 181 Sahraoui, H. 54 Picard, R. 103, 105, 109 Salden, A. 63, 64 Pinheiro, MK. 66, 68 Sampaio, P 87 Piolad, P. 176, 178, 181 Sanner, TA. 3 Plebani, P. 3, 18, 49, 50, 54 Sansonnet, JP. 123 Pluke, M. 65, 69, 70 Sarmenta, L. 104 Pokraev, S. 50, 85 Sasaki, MD. 176, 181, 190 Pomfrett, SM. 84 Sawyer, P. 90 Pool, J. 126, 131 Sbalquiero, R. 176, 181, 190 Poole, D. 131, 132, 137, 143, 169 Scarsi, K. 181, 190 Scheepers, R. 102, 104 Su, L. 73 Schmit, JL. 181 Sugumaran, V. 124 Schmitt, MP. 181 Suominen, O. 127 Schwitter, R. 126, 131 Sycara, K. 60, 126, 127 Scognamiglio, A. 174 Searle, S. 45 Taleb-Bendiab, A. 4 S´edes,F. 124 Tan, J. 57 Semeraro, G. 66 Tang, J. 63 Serhabi, AM. 54 Tang, MW. 181, 190 Serhani, M. 4 Tarning, J. 176, 178, 180, 181, 192 Serneels, P. 24, 26, 122 Tavarez, JMM. 84, 87 Serra, D. 24, 26, 122 Taylor, AW. 176 Sevene, EJP. 181 Tegegne, T. 45, 54, 55, 76, 122, 129, 158, Shafer, RW. 181, 190 172, 175 Shaffer, N. 176, 181, 190, 191 Ter Kuile, FO. 175, 176 Shaffer, VA. 206 Til, JA. van 174 Shaw, NT. 215, 216 Till, JE. 161 Sheikh, A. 215, 216 Tinetti, M. 159, 177 Sheth, AP. 127 Toninelli, A. 23 Shi, X. 63 Toole, JJ. 181, 190 Shmueli-Scheuer, M. 64 Towle, V. 159, 177 Shu, G. 59 Traverso, P. 3, 63 Shubber, Z. 176, 181, 190, 191 Tsai, WT. 83, 84 Sieg, A. 68, 124 Tsetsos, V. 126 Silva, A. 100 Tuunanen, T. xv, 8, 9, 84 Silveira, M. da 2–4 Siminerio, EP. 2 Udhayakumar, V. 175, 176 Simon, H. 8 Uneke, JC. 181 Sinderen, M. van 50 Uzoka, FME. 162, 174 Singh, IP. 35, 37 Smith, G. 8 Vanzanella, C. 174 Smith, P. 124, 180, 192 Vasilyeva, E. 1 So, CF. 63, 65 Verhoeff, FH. 175, 176 Soe, LN. 102, 104 Verlinde, E. 109, 111 Sommerville, I. 90, 93 Viljanen, K. 127 Sonenberg, L. 102, 104 Villanova-Oliver, M. 66, 68 Soudry, J. 60, 127 Virola, H. 87 Sowa, J. 126, 131 Vitoria, M. 176, 181, 190, 191 Speretta, M. 55, 64, 125 Volz, F. 174 Spinellis, D. 87 Voskakis, M. 87 Spire, B. 181 Vries, Khoo S., PJ. de and 180, 192 Srinivasan, N. 60, 127 Vu, LH. 18, 51 Steen, MWA. 85 Steketee, RW. 175, 176 Wagner, M. 63, 65, 66 Stewart, A. 66 Wales, J. 22 Stolbach, L. 161 Walker, B. 102, 104 Stoll, M. 174 Walkerdine, J. 90 Storey, V. 124 Walt, J.S. van der 180, 192 Stratakis, G. 87 Wang, H. 63 Stumme, G. 124 Wang, P. 83, 84 Wang, Y. 64, 66, 72, 127 Wyner, W. 126, 131 Wang, YM. 127, 161 Ward, SA. 181 Xiang-Wu, M. 84, 90 Warde, P. 161 Xu, DL. 127 Weerasinghe, D. 57 Weide, Th.P. van der 45, 54, 55, 76, 122, Yager, R. 158, 161, 165 126, 129, 158, 172, 175 Yan, HB. 161 Weiner, JP. 2 Yang, JB. 127 Weiß, D. 66 Yankelovich, N. 115, 116 Ye, H. 177 Weitzman, Y. 26 Yeh, S. 2 Wenzel, F. 131, 138 Ying, H. 177 White, NJ. 176, 178, 181 Yoon, UM. 68 WHO 149 Yu, Z. 79 Wiegarda, B. 174 Yuen, KKF. 174 Wieringa, RJ. 85 Wiesner, L. 180, 192 Z., Shubber 181 Wiljer, D. 80 Zachos, K. 87, 88 Willems, S. 109, 111 Zaynai, C.A. 124 Winstanley, P. 176, 190, 192 Zeng-Treitler, Q. 127 Wirth, N. 133 Zewotir, T. 175 Woldegebriel, Y. 176 Zhang, D. 79 Wood-Harper, T. 87 Zhao, G. 73 Wright, JA. 106 Zhu, X. 87, 88 Wu, B. 83, 84 Zimmermann, O. 87 W¨urtemberg, L. 92, 97, 98 Zowghi, D. 86 Wyatt, JC. 209 Zue, VW. 106 Summary

Service oriented computing and web services have been used and proposed to solve some interoperability problems of heterogenous medical systems. The application of web services in healthcare is growing in an explosive speed, which brings challenges to the accurate, efficient, reliable and automatic discovery of services for users. Medical information systems were introduced in developed countries three decades ago, while in developing countries it is still in infancy stage. Information systems in healthcare institutions (hospitals, clinics) help physicians, nurses and administrative staff to enhance their daily operations. These systems also improve the quality of care, reduce errors, facilitate communications and are patient centered. Health is one of the most important concerns in people’s lives. Computer science, networking and electrical engineering have changed the delivery of healthcare services through the concept of e-health. E-health is a promising field for improving healthcare quality by offering early symptom detection, early diagnosis, prevention, emergency case survival and offering health monitoring either by patients themselves or healthcare providers. Mobile healthcare is considered as one of the solutions that can reduce the cost of healthcare without decreasing the quality of the healthcare. mHealth provides per- sonalized and context based healthcare services that can be accessible anywhere and anytime. This kind of application is characterized by flexibility, accessibility, quality that offers users with on demand information services. In order to be able to provide such kind of healthcare services, this research assess, analyzes and study the readiness of Ethiopia to use and implement electronic and mobile healthcare services. The findings of the assessment and survey shows that Ethiopia is undergoing ICT infrastructure expansion and there are some ICT based healthcare projects underway. Driven by the result of the survey we develop a service discovery framework for eHealth. The framework consists of the SOA triangular model and a service discov- ery engine that consists of query enrichment, personalization, context-awareness and matchmaking. Furthermore, we study the personal profile in detail that helps to identify the problem of profile based service discovery. Having studied the personal profile and a little bit of contextualization we further studied the impact of user requirement elicitation to enhance service description and discovery. In this study, we identify the strengths, pitfalls and misconceptions of service oriented requirement elicitation. In this work we identify the principles and techniques to be used while eliciting user requirements for systems which has no specific users or wide audiences. In another vein, we analyzed doctor-patient face to face interaction in order to

267 268 Tesfa Tegegne emulate for designing a medical dialogue system. After studying this interaction we propose a model that can be used to design a medical dialogue system that can enable doctors and patients to gain health information from the system. This research has further studied query enrichment and user preferences aggrega- tion. The former has dealt with the general process of user query enrichment process. The query enrichment engine automatically enriches users queries by adding user’s per- sonal information, user’s context and domain knowledge. One of the major advantages of query enrichment is it offers a template for dynamically enhancing user queries and to provide a personalized answer. Moreover, people often exhibit inconsistency and experience uncertainty while mak- ing choices among several alternatives. To this end users preference need to be for- malized and modeled. Users may have similar preferences that may alter the choice behavior of the user. To tackle such a problem we analyze and study user preference similarity using CP-net and proposed a preference similarity model. Medical prefer- ences are enormous and many times it is very difficult to manage them. However, aggregating user and domain knowledge preferences is vital for accurate and efficient service discovery. Making medical decisions based on patient preferences is essential to providing per- sonalized medical information. Different preferences may require different approaches to prioritize and aggregate the results from the different criteria. Aggregating and prioritizing preferences speeds up the process of personalized medical information re- trieval. In this research, we used two special approaches: order weighting average operator (OWA) and analytical hierarchical process (AHP) to prioritize and aggregate preferences. Multi-criteria decision making (MCDM) is a type of decision analysis to support complex and multifaceted decision making that transparently incorporates multiple considerations into the decision making process. Many medical problems involve com- plex choices and consequently also involve multilateral decision making. To handle complex decision problems we employ OWA and AHP to facilitate multiple criteria. We give an extended definition of the decision problem, allowing for decomposition and nesting, making complex problems more manageable. Then we describe the general medical decision problem, in which we decompose the problem into diagnosis, risks and treatments. As a case study, we considered HIV, malaria and pregnancy as diagnosis; risks, availability, allergy and price as criteria; and treatment (antiretroviral and antimalarial drugs) as alternatives. We developed the prototype TeneLehulum. We examined to what extent the decision suggested by TeneLehulum are in line with the official WHO recommendations, and we compared the results also with concrete decision making in medical practise. Samenvatting

Service oriented computing en web services zijn gebruikt en voorgesteld om interope- rabiliteitsproblemen op te lossen van heterogene medische systemen. Het gebruik van web services in de gezondheidszorg neemt explosief toe. Hierdoor ontstaan uitdagingen voor het accuraat, effic¨ent, betrouwbaar en automatische opzoeken van services voor gebruikers. Medische informatiesystemen werden ge¨ıntroduceerd in ontwikkelde landen 3 de- cennia geleden, maar in ontwikkelingslanden staan de ontwikkelingen nog in de kin- derschoenen. Informatiesystemen in zorginstellingen (ziekenhuizen, klinieken) helpen artsen, verplegenden en administratieve staf om hun dagelijks activiteiten te verbete- ren. Verder verbeteren deze systemen de kwaliteit van de zorg, reduceren het aantal fouten verkleind, vergemakkelijken de communicatie en zijn pati¨entgericht. Gezondheid is een van de meest belangrijke zorgpunten in iemands leven. Infor- matica, Netwerken en Elektrotechniek hebben het leveren van diensten door de ge- zondheidszorg veranderd via de zogenaamde e-health. E-health is een veelbelovend gebied ter verbetering van de kwaliteit van gezondheidszorg door vroegtijdige opspo- ring van symptomen, vroegtijdige diagnose, preventie, overleving bij noodgevallen en gezondheidsbewaking door zowel pati¨enten als zorgverleners. Mobiele gezondheidszorg wordt als een van de oplossingen gezien om de kosten van de gezondheidszorg te verlagen zonder de kwaliteit te verminderen. mHealth biedt depersonaliseerde en contextgebaseerde services voor gezondheidszorg die overal en altijd toegankelijk zijn. Dit soort toepassing wordt gekenmerkt door een flexibiliteit, toegankelijkheid, kwaliteit in de on demand informatievoorziening van gebruikers. Om dit soort diensten voor gezondheid te kunnen bieden, wordt in dit proefschrift in kaart gebracht, geanalyseerd en bestudeerd in hoeverre Ethiopi¨e toe is aan gebruik en implementatie van elektronische en mobiele diensten in de gezondheidszorg. De bevindingen van dit overzicht laten zien dat Etiopi¨e bezig is met een expansie van haar ICT infrastructuur en dat een aantal ICTgebaseerde projecten aan de gang zijn. Gedreven door het resultaat van dit overzicht ontwikkelen we een raamwerk voor service discovery in eHealth. Dit raamwerk bestaat uit het SOA driehoeksmodel, en een service discovery engine bestaande uit verrijking van de zoekvraag, personalisatie, bewustzijn van context en matchmaking. Verder bestuderen we in de proefschrift het persoonsprofiel in detail, dat helpt om het probleem van profielgebaseerde service discovery te identificeren. Na het persoonsprofiel en een beetje contextualisatie onderzocht te hebben, hebben we verder gekeken naar de impact van user requirement elicitation om de beschrijving en ontdekking van diensten te verbeteren. In dit onderzoek identificeren we sterktes, valkuilen en misvattingen van het requirement elicitation bij service ori¨entatie. We identificeren de principes en technieken om te gebruiken tijdens het elicitatiegesprek

269 270 Tesfa Tegegne met de gebruiker ten behoeve van systemen zonder een specifiek type gebruiker en voor een breed publiek. Verder hebben de dokter-patient face-to-face interactie geanalyseerd om deze te emuleren in een medisch dialoogsysteem. Na een studie van deze interactie komen, stellen we een model voor om te gebruiken in een medisch dialoogsysteem, waardoor doktoren en pati¨enten automatisch gezondheidsinformatie van het systeem krijgen. Verder hebben we ons gericht op het verrijken van de zoekvraag en de aggregatie van gebruikersvoorkeuren. Bij het eerste punt gaat het om het algemene proces van query enrichment. Het systeem dat hiervoor zorgt verrijkt de zoekvraag automatisch door et toevoegen van persoonlijke gebruikersinformatie, de gebruikerscontext en algemene domeinkennis. Een van de grote voordelen van het verrijken van de zoekvraag is dat het een raamwerk biedt voor dynamische verbetering van de zoekvraag en dat het tot gepersonaliseerde antwoorden leidt. Mensen vertonen vaak inconsistentie en ervaren onzekerheid bij het maken van een keuze tussen meerdere alternatieven. Om daar aan tegemoet te komen moeten gebrui- kersvoorkeuren geformaliseerd en gemodelleerd worden. Gebruikers kunnen vergelijk- bare voorkeuren hebben die hun keuzegedrag kunnen veranderen. Om dit probleem aan te pakken hebben we preference similarity geanalyseerd en bestudeerd gebruik ma- kend van CP-net, en we stellen het preference similarity model voor. Er zijn enorm veel soorten medische voorkeuren en vaak zijn ze moeilijk te beheren. Echter, de aggregatie van gebruikers- en domeinkennis van vitaal belang voor een nauwkeurige en effici¨ente services discovery. Het maken van medische beslissingen op basis van de voorkeuren van pati¨enten is essentieel om gepersonaliseerde medische informatie te kunnen verstrekken. Verschil- lende voorkeuren kunnen verschillende benaderingen vereisen om aan de verschillende criteria prioriteiten te stellen de beoordelingen te aggregeren. Hierdoor wordt het ver- strekken van gepersonaliseerde medische informatie versneld. In dit onderzoek werden twee speciale benaderingen gebruikt: de order weighting average operator (OWA) en analytical hierarchical process (AHP) om voorkeuren te prioritiseren en aggregeren. Multi-criteria decision making (MCDM) is een methode voor beslissingsanalyse ter ondersteuning van complexe en veelzijdige besluitvorming die op een inzichtelijke manier meerdere overwegingen van het besluitvormingsproces verenigt. Vele medische beslisproblemen brengen complexe keuzen met zich mee, en derhalve ook multilaterale besluitvorming. Om dit probleem op te lossen hebben we OWA en AHP gebruikt om het multi-criteria te faciliteren. Daartoe hebben we het algemene beslisprobleem rui- mer gedefini¨eerd met de mogelijkheid van decompositie en nesting, waardoor complexe beslisproblemen eenvoudiger hanteerbaar worden. Vervolgens beschrijven we het al- gemene medische beslissingsproces, waarbij we het probleem ontleden in diagnostiek, behandeling en risico. Als case study hebben gekeken naar het stellen van een diagnose gericht op HIV, malaria en zwangerschap Als criteria kozen we risicos, beschikbaarheid, allergie en prijs. Als alternatieven kozen we de behandelmethoden (antiretrovirale en antimalariamid- delen). Hiertoe werd het prototype TeneLehulum ontwikkeld. We hebben gekeken in hoeverre de beslissingen van het systeem conform de offici¨ele richtlijnen van het WHO zijn, en we hebben dit vergeleken met de concrete besluitvorming in de medische prak- tijk. Curriculum Vitae

Tesfa Tegegne was born in Hamusit (a small city) in Gondar province. He pursued his primary education in the Hamusit primary school and the junior and high school in Bahir Dar. In 1995 he obtained his bachelor degree in Pedagogical Science from Bahir Dar Teacher’s College. From 1996 to 2001 he worked in the Benishangul-Gumuz national regional state as a school teacher, as an expert in the regional state council and as ICT expert in the Bureau of Capacity Building. From 2001 to 2004 he pursued his MSc study in China; in 2004, he obtained his master of science degree from Huazhong University of Science and Technology in Wuhan, China. Since 2005, he has been working as a lecturer in the Computer Science Department in Bahir Dar University. He taught various courses, was involved in many projects, served the department in leadership and took part in various committees. In April 2010, he joined Radboud University, Nijmegen to pursue a PhD program.

271

SIKS Dissertatiereeks

2009 2009-17 Laurens van der Maaten (UvT) Fea- 2009-01 Rasa Jurgelenaite (RUN) Symmetric ture Extraction from Visual Data Causal Independence Models 2009-18 Fabian Groffen (CWI) Armada, An Evolving Database System 2009-02 Willem Robert van Hage (VU) Evalu- ating Ontology-Alignment Techniques 2009-19 Valentin Robu (CWI) Modeling Pref- erences, Strategic Reasoning and Col- 2009-03 Hans Stol (UvT) A Framework for laboration in Agent-Mediated Electronic Evidence-based Policy Making Using IT Markets 2009-04 Josephine Nabukenya (RUN) Improv- 2009-20 Bob van der Vecht (UU) Adjustable ing the Quality of Organisational Policy Autonomy: Controling Influences on De- Making using Collaboration Engineering cision Making 2009-05 Sietse Overbeek (RUN) Bridging Sup- 2009-21 Stijn Vanderlooy(UM) Ranking and ply and Demand for Knowledge Intensive Reliable Classification Tasks - Based on Knowledge, Cognition, and Quality 2009-22 Pavel Serdyukov (UT) Search For Ex- pertise: Going beyond direct evidence 2009-06 Muhammad Subianto (UU) Under- standing Classification 2009-23 Peter Hofgesang (VU) Modelling Web Usage in a Changing Environment 2009-07 Ronald Poppe (UT) Discriminative 2009-24 Annerieke Heuvelink (VU) Cognitive Vision-Based Recovery and Recognition Models for Training Simulations of Human Motion 2009-25 Alex van Ballegooij (CWI) RAM: Ar- 2009-08 Volker Nannen (VU) Evolutionary ray Database Management through Rela- Agent-Based Policy Analysis in Dynamic tional Mapping Environments 2009-26 Fernando Koch (UU) An Agent-Based 2009-09 Benjamin Kanagwa (RUN) Design, Model for the Development of Intelligent Discovery and Construction of Service- Mobile Services oriented Systems 2009-27 Christian Glahn (OU) Contextual 2009-10 Jan Wielemaker (UVA) Logic pro- Support of social Engagement and Reflec- gramming for knowledge-intensive inter- tion on the Web active applications 2009-28 Sander Evers (UT) Sensor Data Man- 2009-11 Alexander Boer (UVA) Legal Theory, agement with Probabilistic Models Sources of Law & the Semantic Web 2009-29 Stanislav Pokraev (UT) Model-Driven 2009-12 Peter Massuthe (TUE, Humboldt- Semantic Integration of Service-Oriented Universitaet zu Berlin) Operating Guide- Applications lines for Services 2009-30 Marcin Zukowski (CWI) Balanc- 2009-13 Steven de Jong (UM) Fairness in ing vectorized query execution with Multi-Agent Systems bandwidth-optimized storage 2009-14 Maksym Korotkiy (VU) From 2009-31 Sofiya Katrenko (UVA) A Closer Look ontology-enabled services to service- at Learning Relations from Text enabled ontologies (making ontologies 2009-32 Rik Farenhorst (VU) and Remco work in e-science with ONTO-SOA) de Boer (VU) Architectural Knowledge 2009-15 Rinke Hoekstra (UVA) Ontology Rep- Management: Supporting Architects and resentation - Design Patterns and Ontolo- Auditors gies that Make Sense 2009-33 Khiet Truong (UT) How Does Real 2009-16 Fritz Reul (UvT) New Architectures Affect Affect Affect Recognition In in Computer Chess Speech 274 SIKS Dissertatiereeks

2009-34 Inge van de Weerd (UU) Advancing in 2010-08 Krzysztof Siewicz (UL) Towards an Software Product Management: An In- Improved Regulatory Framework of Free cremental Method Engineering Approach Software. Protecting user freedoms in a world of software communities and eGov- 2009-35 Wouter Koelewijn (UL) Privacy en ernments Politiegegevens; Over geautomatiseerde normatieve informatie-uitwisseling 2010-09 Hugo Kielman (UL) Politi¨ele gegevensverwerking en Privacy, Naar een 2009-36 Marco Kalz (OU) Placement Support effectieve waarborging for Learners in Learning Networks 2010-10 Rebecca Ong (UL) Mobile Communi- 2009-37 Hendrik Drachsler (OU) Navigation cation and Protection of Children Support for Learners in Informal Learn- 2010-11 Adriaan Ter Mors (TUD) The world ing Networks according to MARP: Multi-Agent Route Planning 2009-38 Riina Vuorikari (OU) Tags and self- organisation: a metadata ecology for 2010-12 Susan van den Braak (UU) Sensemak- learning resources in a multilingual con- ing software for crime analysis text 2010-13 Gianluigi Folino (RUN) High Perfor- mance Data Mining using Bio-inspired 2009-39 Christian Stahl (TUE, Humboldt- techniques Universitaet zu Berlin) Service Substitu- tion – A Behavioral Approach Based on 2010-14 Sander van Splunter (VU) Automated Petri Nets Web Service Reconfiguration 2010-15 Lianne Bodenstaff (UT) Manag- 2009-40 Stephan Raaijmakers (UvT) Multino- ing Dependency Relations in Inter- mial Language Learning: Investigations Organizational Models into the Geometry of Language 2010-16 Sicco Verwer (TUD) Efficient Identi- 2009-41 Igor Berezhnyy (UvT) Digital Analy- fication of Timed Automata, theory and sis of Paintings practice 2009-42 Toine Bogers (UvT) Recommender 2010-17 Spyros Kotoulas (VU) Scalable Dis- Systems for Social Bookmarking covery of Networked Resources: Algo- rithms, Infrastructure, Applications 2009-43 Virginia Nunes Leal Franqueira (UT) 2010-18 Charlotte Gerritsen (VU) Caught in Finding Multi-step Attacks in Computer the Act: Investigating Crime by Agent- Networks using Heuristic Search and Mo- Based Simulation bile Ambients 2010-19 Henriette Cramer (UvA) People’s Re- 2009-44 Roberto Santana Tapia (UT) Assess- sponses to Autonomous and Adaptive ing Business-IT Alignment in Networked Systems Organizations 2010-20 Ivo Swartjes (UT) Whose Story Is It 2009-45 Jilles Vreeken (UU) Making Pattern Anyway? How Improv Informs Agency Mining Useful and Authorship of Emergent Narrative 2010-21 Harold van Heerde (UT) Privacy- 2009-46 Loredana Afanasiev (UvA) Querying aware data management by means of data XML: Benchmarks and Recursion degradation 2010 2010-22 Michiel Hildebrand (CWI) End-user 2010-01 Matthijs van Leeuwen (UU) Patterns Support for Access to Heterogeneous that Matter Linked Data 2010-23 Bas Steunebrink (UU) The Logical 2010-02 Ingo Wassink (UT) Work flows in Life Structure of Emotions Science 2010-24 Dmytro Tykhonov (TUD) Designing 2010-03 Joost Geurts (CWI) A Document En- Generic and Efficient Negotiation Strate- gineering Model and Processing Frame- gies work for Multimedia documents 2010-25 Zulfiqar Ali Memon (VU) Modelling 2010-04 Olga Kulyk (UT) Do You Know What Human-Awareness for Ambient Agents: I Know? Situational Awareness of Co- A Human Mindreading Perspective located Teams in Multidisplay Environ- 2010-26 Ying Zhang (CWI) XRPC: Efficient ments Distributed Query Processing on Hetero- geneous XQuery Engines 2010-05 Claudia Hauff (UT) Predicting the Ef- fectiveness of Queries and Retrieval Sys- 2010-27 Marten Voulon (UL) Automatisch tems contracteren 2010-28 Arne Koopman (UU) Characteristic 2010-06 Sander Bakkes (UvT) Rapid Adapta- Relational Patterns tion of Video Game AI 2010-29 Stratos Idreos (CWI) Database Crack- 2010-07 Wim Fikkert (UT ) Gesture interac- ing: Towards Auto-tuning Database Ker- tion at a Distance nels SIKS Dissertatiereeks 275

2010-30 Marieke van Erp (UvT) Accessing 2010-51 Alia Khairia Amin (CWI) Under- Natural History - Discoveries in data standing and supporting information cleaning, structuring, and retrieval seeking tasks in multiple sources 2010-31 Victor de Boer (UVA) Ontology En- 2010-52 Peter-Paul van Maanen (VU) Adap- richment from Heterogeneous Sources on tive Support for Human-Computer the Web Teams: Exploring the Use of Cognitive Models of Trust and Attention 2010-32 Marcel Hiel (UvT) An Adaptive Ser- vice Oriented Architecture: Automati- 2010-53 Edgar Meij (UVA) Combining Con- cally solving Interoperability Problems cepts and Language Models for Informa- tion Access 2010-33 Robin Aly (UT) Modeling Representa- tion Uncertainty in Concept-Based Mul- 2011 timedia Retrieval 2011-01 Botond Cseke (RUN) Variational Al- 2010-34 Teduh Dirgahayu (UT) Interaction gorithms for Bayesian Inference in Latent Design in Service Compositions Gaussian Models 2010-35 Dolf Trieschnigg (UT) Proof of Con- 2011-02 Nick Tinnemeier(UU) Organizing cept: Concept-based Biomedical Informa- Agent Organizations. Syntax and Op- tion Retrieval erational Semantics of an Organization- Oriented Programming Language 2010-36 Jose Janssen (OU) Paving the Way for Lifelong Learning; Facilitating com- 2011-03 Jan Martijn van der Werf (TUE) petence development through a learning Compositional Design and Verification of path specification Component-Based Information Systems 2010-37 Niels Lohmann (TUE) Correctness of 2011-04 Hado Philip van Hasselt (UU) Insights services and their composition in Reinforcement Learning; Formal anal- ysis and empirical evaluation of temporal- 2010-38 Dirk Fahland (TUE) From Scenarios difference learning algorithms to components 2011-05 Bas van de Raadt (VU) Enterprise Ar- 2010-39 Ghazanfar Farooq Siddiqui (VU) In- chitecture Coming of Age – Increasing the tegrative modeling of emotions in virtual Performance of an Emerging Discipline agents 2011-06 Yiwen Wang(TUE) Semantically- 2010-40 Mark van Assem (VU) Converting and Enhanced Recommendations in Cultural Integrating Vocabularies for the Semantic Heritage Web 2011-07 Yujia Cao (UT) Multimodal Informa- 2010-41 Guillaume Chaslot (UM) Monte-Carlo tion Presentation for High Load Human Tree Search Computer Interaction 2010-42 Sybren de Kinderen (VU) Needs- 2011-08 Nieske Vergunst (UU) BDI-based driven service bundling in a multi- Generation of Robust Task-Oriented Di- supplier setting - the computational e3- alogues service approach 2011-09 Tim de Jong (OU) Contextualised 2010-43 Peter van Kranenburg (UU) A Com- Mobile Media for Learning putational Approach to Content-Based 2011-10 Bart Bogaert (UvT) Cloud Content Retrieval of Folk Song Melodies Contention 2010-44 Pieter Bellekens (TUE) An Ap- 2011-11 Dhaval Vyas (UT) Designing for proach towards Context-sensitive and Awareness: An Experience-focused HCI User-adapted Access to Heterogeneous Perspective Data Sources, Illustrated in the Televi- sion Domain 2011-12 Carmen Bratosin (TUE) Grid Archi- tecture for Distributed Process Mining 2010-45 Vasilios Andrikopoulos (UvT) A the- ory and model for the evolution of soft- 2011-13 Xiaoyu Mao (UvT) Airport under ware services Control; Multiagent Scheduling for Air- port Ground Handling 2010-46 Vincent Pijpers (VU) e3alignment: Exploring Inter-Organizational Business- 2011-14 Milan Lovric(EUR) Behavioral Fi- ICT Alignment nance and Agent-Based Artificial Mar- kets 2010-47 Chen Li (UT) Mining Process Model Variants: Challenges, Techniques, Exam- 2011-15 Marijn Koolen (UVA) The Meaning of ples Structure: the Value of Link Evidence for Information Retrieval 2010-48 Withdrawn 2011-16 Maarten Schadd (UM) Selective 2010-49 Jahn-Takeshi Saito (UM) Solving dif- Search in Games of Different Complexity ficult game positions 2011-17 Jiyin He (UVA) Exploring Topic 2010-50 Bouke Huurnink (UVA) Search in Au- Structure: Coherence, Diversity and Re- diovisual Broadcast Archives latedness 276 SIKS Dissertatiereeks

2011-18 Mark Ponsen (UM) Strategic 2011-38 Nyree Lemmens (UM) Bee-inspired Decision-Making in complex games Distributed Optimization 2011-19 Ellen Rusman (OU) The Mind’s Eye 2011-39 Joost Westra (UU) Organizing Adap- on Personal Profiles tation using Agents in Serious Games 2011-20 Qing Gu (VU) Guiding service- 2011-40 Viktor Clerc (VU) Architectural oriented software engineering – A view- Knowledge Management in Global Soft- based approach ware Development 2011-21 Linda Terlouw (TUD) Modularization 2011-41 Luan Ibraimi (UT) Cryptographically and Specification of Service-Oriented Sys- Enforced Distributed Data Access Con- tems trol 2011-22 Junte Zhang (UVA) System Evalua- 2011-42 Michal Sindlar (UU) Explaining Be- tion of Archival Description and Access havior through Mental State Attribution 2011-43 Henk van der Schuur (UU) Process 2011-23 Wouter Weerkamp (UVA) Finding Improvement through Software Opera- People and their Utterances in Social Me- tion Knowledge dia 2011-44 Boris Reuderink (UT) Robust Brain- 2011-24 Herwin van Welbergen (UT) Behav- Computer Interfaces ior Generation for Interpersonal Coordi- nation with Virtual Humans On Specify- 2011-45 Herman Stehouwer (UvT) Statisti- ing, Scheduling and Realizing Multimodal cal Language Models for Alternative Se- Virtual Human Behavior quence Selection 2011-25 Syed Waqar ul Qounain Jaffry (VU) 2011-46 Beibei Hu (TUD) Towards Contex- Analysis and Validation of Models for tualized Information Delivery: A Rule- Trust Dynamics based Architecture for the Domain of Mo- bile Police Work 2011-26 Matthijs Aart Pontier (VU) Virtual Agents for Human Communication – 2011-47 Azizi Bin Ab Aziz(VU) Exploring Emotion Regulation and Involvement- Computational Models for Intelligent Distance Trade-Offs in Embodied Conver- Support of Persons with Depression sational Agents and Robots 2011-48 Mark Ter Maat (UT) Response Selec- tion and Turn-taking for a Sensitive Ar- 2011-27 Aniel Bhulai (VU) Dynamic website tificial Listening Agent optimization through autonomous man- agement of design patterns 2011-49 Andreea Niculescu (UT) Conversa- tional interfaces for task-oriented spoken 2011-28 Rianne Kaptein (UVA) Effective Fo- dialogues: design aspects influencing in- cused Retrieval by Exploiting Query Con- teraction quality text and Document Structure 2012 2011-29 Faisal Kamiran (TUE) Discrimination- aware Classification 2012-01 Terry Kakeeto (UvT) Relationship Marketing for SMEs in Uganda 2011-30 Egon van den Broek (UT) Affective Signal Processing (ASP): Unraveling the 2012-02 Muhammad Umair(VU) Adaptivity, mystery of emotions emotion, and Rationality in Human and Ambient Agent Models 2011-31 Ludo Waltman (EUR) Computa- tional and Game-Theoretic Approaches 2012-03 Adam Vanya (VU) Supporting Ar- for Modeling Bounded Rationality chitecture Evolution by Mining Software Repositories 2011-32 Nees-Jan van Eck (EUR) Methodolog- 2012-04 Jurriaan Souer (UU) Development of ical Advances in Bibliometric Mapping of Content Management System-based Web Science Applications 2011-33 Tom van der Weide (UU) Arguing to 2012-05 Marijn Plomp (UU) Maturing Interor- Motivate Decisions ganisational Information Systems 2011-34 Paolo Turrini (UU) Strategic Rea- 2012-06 Wolfgang Reinhardt (OU) Awareness soning in Interdependence: Logical and Support for Knowledge Workers in Re- Game-theoretical Investigations search Networks 2011-35 Maaike Harbers (UU) Explaining 2012-07 Rianne van Lambalgen (VU) When Agent Behavior in Virtual Training the Going Gets Tough: Exploring Agent- 2011-36 Erik van der Spek (UU) Experiments based Models of Human Performance un- in serious game design: a cognitive ap- der Demanding Conditions proach 2012-08 Gerben de Vries (UVA) Kernel Meth- 2011-37 Adriana Burlutiu (RUN) Machine ods for Vessel Trajectories Learning for Pairwise Data, Applications 2012-09 Ricardo Neisse (UT) Trust and Pri- for Preference Learning and Supervised vacy Management Support for Context- Network Inference Aware Service Platforms SIKS Dissertatiereeks 277

2012-10 David Smits (TUE) Towards a 2012-29 Almer Tigelaar (UT) Peer-to-Peer In- Generic Distributed Adaptive Hyperme- formation Retrieval dia Environment 2012-30 Alina Pommeranz (TUD) Designing 2012-11 J.C.B. Rantham Prabhakara (TUE) Human-Centered Systems for Reflective Process Mining in the Large: Preprocess- Decision Making ing, Discovery, and Diagnostics 2012-31 Emily Bagarukayo (RUN) A Learning 2012-12 Kees van der Sluijs (TUE) Model by Construction Approach for Higher Or- Driven Design and Data Integration in der Cognitive Skills Improvement, Build- Semantic Web Information Systems ing Capacity and Infrastructure 2012-32 Wietske Visser (TUD) Qualitative 2012-13 Suleman Shahid (UvT) Fun and Face: multi-criteria preference representation Exploring non-verbal expressions of emo- and reasoning tion during playful interactions 2012-33 Rory Sie (OUN) Coalitions in Cooper- 2012-14 Evgeny Knutov(TUE) Generic Adap- ation Networks (COCOON) tation Framework for Unifying Adaptive Web-based Systems 2012-34 Pavol Jancura (RUN) Evolutionary analysis in PPI networks and applica- 2012-15 Natalie van der Wal (VU) Social tions Agents. Agent-Based Modelling of Inte- 2012-35 Evert Haasdijk (VU) Never Too Old grated Internal and Social Dynamics of To Learn – On-line Evolution of Con- Cognitive and Affective Processes. trollers in Swarm- and Modular Robotics 2012-16 Fiemke Both (VU) Helping people by 2012-36 Denis Ssebugwawo (RUN) Analysis understanding them - Ambient Agents and Evaluation of Collaborative Model- supporting task execution and depression ing Processes treatment 2012-37 Agnes Nakakawa (RUN) A Collabora- 2012-17 Amal Elgammal (UvT) Towards a tion Process for Enterprise Architecture Comprehensive Framework for Business Creation Process Compliance 2012-38 Selmar Smit (VU) Parameter Tuning 2012-18 Eltjo Poort (VU) Improving Solution and Scientific Testing in Evolutionary Al- Architecting Practices gorithms 2012-19 Helen Schonenberg (TUE) What’s 2012-39 Hassan Fatemi (UT) Risk-aware de- Next? Operational Support for Business sign of value and coordination networks Process Execution 2012-40 Agus Gunawan (UvT) Information 2012-20 Ali Bahramisharif (RUN) Covert Access for SMEs in Indonesia Visual Spatial Attention, a Robust 2012-41 Sebastian Kelle (OU) Game Design Paradigm for Brain-Computer Interfac- Patterns for Learning ing 2012-42 Dominique Verpoorten (OU) Reflec- 2012-21 Roberto Cornacchia (TUD) Query- tion Amplifiers in self-regulated Learning ing Sparse Matrices for Information Re- 2012-44 Anna Tordai (VU) On Combining trieval Alignment Techniques 2012-22 Thijs Vis (UvT) Intelligence, politie 2012-45 Benedikt Kratz (UvT) A Model and en veiligheidsdienst: verenigbare groothe- Language for Business-aware Transac- den? tions 2012-23 Christian Muehl (UT) Toward Affec- 2012-46 Simon Carter (UVA) Exploration and tive Brain-Computer Interfaces: Explor- Exploitation of Multilingual Data for Sta- ing the Neurophysiology of Affect during tistical Machine Translation Human Media Interaction 2012-47 Manos Tsagkias (UVA) Mining Social 2012-24 Laurens van der Werff (UT) Evalua- Media: Tracking Content and Predicting tion of Noisy Transcripts for Spoken Doc- Behavior ument Retrieval 2012-48 Jorn Bakker (TUE) Handling Abrupt Changes in Evolving Time-series Data 2012-25 Silja Eckartz (UT) Managing the Business Case Development in Inter- 2012-49 Michael Kaisers (UM) Learning Organizational IT Projects: A Method- against Learning - Evolutionary dynam- ology and its Application ics of reinforcement learning algorithms in strategic interactions 2012-26 Emile de Maat (UVA) Making Sense of Legal Text 2012-50 Steven van Kervel (TUD) Ontologogy driven Enterprise Information Systems 2012-27 Hayrettin G?rk?k (UT) Mind the Engineering Sheep! User Experience Evaluation and 2012-51 Jeroen de Jong (TUD) Heuristics in Brain-Computer Interface Games Dynamic Sceduling; a practical frame- 2012-28 Nancy Pascall (UvT) Engendering work with a case study in elevator dis- Technology Empowering Women patching 278 SIKS Dissertatiereeks

2013 2013-22 Tom Claassen (RUN) Causal Discov- ery and Logic 2013-01 Viorel Milea (EUR) News Analytics for Financial Decision Support 2013-23 Patricio de Alencar Silva(UvT) Value 2013-02 Erietta Liarou (CWI) Mon- Activity Monitoring etDB/DataCell: Leveraging the Column- 2013-24 Haitham Bou Ammar (UM) Auto- store Database Technology for Efficient mated Transfer in Reinforcement Learn- and Scalable Stream Processing ing 2013-03 Szymon Klarman (VU) Reasoning 2013-25 Agnieszka Anna Latoszek-Berendsen with Contexts in Description Logics (UM) Intention-based Decision Support. 2013-04 Chetan Yadati(TUD) Coordinating A new way of representing and imple- autonomous planning and scheduling menting clinical guidelines in a Decision Support System 2013-05 Dulce Pumareja (UT) Groupware Re- quirements Evolutions Patterns 2013-26 Alireza Zarghami (UT) Architectural Support for Dynamic Homecare Service 2013-06 Romulo Goncalves(CWI) The Data Provisioning Cyclotron: Juggling Data and Queries for a Data Warehouse Audience 2013-27 Mohammad Huq (UT) Inference-based Framework Managing Data Provenance 2013-07 Giel van Lankveld (UvT) Quantifying Individual Player Differences 2013-28 Frans van der Sluis (UT) When Com- plexity becomes Interesting: An Inquiry 2013-08 Robbert-Jan Merk(VU) Making ene- into the Information eXperience mies: cognitive modeling for opponent agents in fighter pilot simulators 2013-29 Iwan de Kok (UT) Listening Heads 2013-09 Fabio Gori (RUN) Metagenomic Data 2013-30 Joyce Nakatumba (TUE) Resource- Analysis: Computational Methods and Aware Business Process Management: Applications Analysis and Support 2013-10 Jeewanie Jayasinghe Arachchige(UvT) 2013-31 Dinh Khoa Nguyen (UvT) Blueprint A Unified Modeling Framework for Ser- Model and Language for Engineering vice Design. Cloud Applications 2013-11 Evangelos Pournaras(TUD) Multi- 2013-32 Kamakshi Rajagopal (OUN) Network- level Reconfigurable Self-organization in ing For Learning; The role of Networking Overlay Services in a Lifelong Learner’s Professional De- velopment 2013-12 Marian Razavian(VU) Knowledge- driven Migration to Services 2013-33 Qi Gao (TUD) User Modeling and Per- sonalization in the Microblogging Sphere 2013-13 Mohammad Safiri(UT) Service Tailor- ing: User-centric creation of integrated 2013-34 Kien Tjin-Kam-Jet (UT) Distributed IT-based homecare services to support in- Deep Web Search dependent living of elderly 2013-35 Abdallah El Ali (UvA) Minimal Mo- 2013-14 Jafar Tanha (UVA) Ensemble Ap- bile Human Computer Interaction proaches to Semi-Supervised Learning 2013-36 Than Lam Hoang (TUe) Pattern Min- Learning ing in Data Streams 2013-15 Daniel Hennes (UM) Multiagent 2013-37 Dirk B¨orner(OUN) Ambient Learning Learning - Dynamic Games and Appli- Displays cations 2013-38 Eelco den Heijer (VU) Autonomous 2013-16 Eric Kok (UU) Exploring the practical Evolutionary Art benefits of argumentation in multi-agent deliberation 2013-39 Joop de Jong (TUD) A Method for En- terprise Ontology based Design of Enter- 2013-17 Koen Kok (VU) The PowerMatcher: prise Information Systems Smart Coordination for the Smart Elec- tricity Grid 2013-40 Pim Nijssen (UM) Monte-Carlo Tree Search for Multi-Player Games 2013-18 Jeroen Janssens (UvT) “Outlier Selec- tion and One-Class Classification” 2013-41 Jochem Liem (UVA) Supporting the Conceptual Modelling of Dynamic Sys- 2013-19 Renze Steenhuizen (TUD) Coordi- tems: A Knowledge Engineering Perspec- nated Multi-Agent Planning and Schedul- tive on Qualitative Reasoning ing 2013-42 Lon Planken (TUD) Algorithms for 2013-20 Katja Hofmann (UvA) Fast and Reli- Simple Temporal Reasoning able Online Learning to Rank for Infor- mation Retrieval 2013-43 Marc Bron (UVA) Exploration and Contextualization through Interaction 2013-21 Sander Wubben (UvT) Text-to-text and Concepts generation by monolingual machine translation 2014 SIKS Dissertatiereeks 279

2014-01 Nicola Barile (UU) 2014-17 Kathrin Dentler (VU) Studies in Learning Monotone Models Computing healthcare quality indicators from Data automatically: Secondary Use of Patient 2014-02 Fiona P. Tulinayo (RUN) Data and Semantic Interoperability Combining System Dynamics with A Do- 2014-18 Mattijs Ghijsen (VU) main Modeling Method Methods and Models for the Design and 2014-03 Sergio Raul Duarte Torres (UT) Study of Dynamic Agent Organizations Information Retrieval for Children:Search 2014-19 Vincius Ramos (TUE) Behavior and Solutions Adaptive Hypermedia Courses: Qualita- 2014-04 Hanna Jochmann-Mannak (UT) tive; and Quantitative Evaluation and Websites for children: search strategies Tool Support and interface design - Three studies on 2014-20 Mena Habib (UT) children’s search performance and evalu- Named Entity Extraction and Disam- ation biguation for Informal Text: The Missing 2014-05 Jurriaan van Reijsen (UU) Link Knowledge Perspectives on Advancing 2014-21 Kassidy Clark (TUD) Dynamic Capability Negotiation and Monitoring in Open En- 2014-06 Damian Tamburri (VU) vironments Supporting Networked Software Develop- 2014-22 Marieke Peeters (UT) ment Personalized Educational Games - De- 2014-07 Arya Adriansyah (TUE) veloping agent-supported scenario-based Aligning Observed and Modeled Behav- training ior 2014-08 Samur Araujo (TUD) 2014-23 Eleftherios Sidirourgos (UvA/CWI) Data Integration over Distributed and Space Efficient Indexes for the Big Data Heterogeneous Data Endpoints Era 2014-09 Philip Jackson (UvT) 2014-24 Davide Ceolin (VU) Toward Human-Level Artificial Intelli- Trusting Semi-structured Web Data gence:Representation and Computation of Meaning in Natural Language 2014-25 Martijn Lappenschaar (RUN) New network models for the analysis of 2014-10 Ivan Salvador Razo Zapata (VU) disease interaction Service Value Networks 2014-26 Tim Baarslag (TUD) 2014-11 Janneke van der Zwaan (TUD) What to Bid and When to Stop An Empathic Virtual Buddy for Social Support 2014-27 Rui Jorge Almeida (EUR) 2014-12 Willem van Willigen (VU) Conditional Density Models Integrating Look Ma, No Hands: Aspects of Au- Fuzzy and Probabilistic Representations tonomous Vehicle Control of Uncertainty 2014-13 Arlette van Wissen (VU) 2014-28 Anna Chmielowiec (VU) Agent-Based Support for Behavior Decentralized k-Clique Matching Change: Models and Applications in 2014-29 Jaap Kabbedijk (UU) Health and Safety Domains Variability in Multi-Tenant Enterprise 2014-14 Yangyang Shi (TUD) Software Language Models With Meta- 2014-30 Peter de Kock Berenschot (UvT) information Anticipating Criminal Behaviour 2014-15 Natalya Mogles (VU) 2014-31 Leo van Moergestel (UU) gent-Based Analysis and Support of Agent Technology in Agile Multiparallel Human Functioning in Complex Socio- Manufacturing and Product Support Technical Systems: Applications in Safety and Healthcare 2014-32 Naser Ayat (UVA) On Entity Resolution in Probabilistic 2014-16 Krystyna Milian (VU) Data upporting trial recruitment and design by automatically interpreting eligibility cri- 2014-33 Tesfa Tegegne Asfaw (RUN) teria Service Discovery in eHealth

HEALTH

e

IN IN

ERVICE DISCOVERY ERVICE S

Service oriented computing and web services have been used and proposed to solve some interoperability prob- lems of heterogenous medical systems. The applica- tion of web services in healthcare is growing at an explo- sive speed, which brings challenges for accurate, efficient, reliable and automatic discovery of services for users. The healtcare domain has reaped the benefits of the ad- vancements of ICT. In the two recent decades ICT based medical systems has benn developed that ena- ble the delivery of health services in remote rural areas. This research proposes a health service discovery sys- tem that can provide health services in Ethiopia.

ISBN: 978-90-8891-949-7