Assessing technology success and failure using information value chain theory

Enrico Coiera*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

1 Citation (Scopus)
14 Downloads (Pure)

Abstract

Information value chain theory provides a straightforward approach to information system evaluation and design. It first separates the different benefits and costs that might be associated with the use of a given information technology at different stages along a value chain stretching from user interaction to real world outcome. Next, using classical decision theoretic measures such as probabilities and utilities, the resulting value chain can be used to create a profile for a particular technology or technology bundle. Value chain analysis helps focus on the reasons for system implementation success or failure. It also assists in making comparative assessments amongst different solutions, to understand which might be best suited for different clinical contexts.

Original languageEnglish
Title of host publicationApplied interdisciplinary theory in health informatics
Subtitle of host publicationa knowledge base for practitioners
EditorsPhilip Scott, Nicolette de Keizer, Andrew Georgiou
Place of PublicationAmsterdam
PublisherIOS Press
Chapter4
Pages35-48
Number of pages14
ISBN (Electronic)9781614999911
ISBN (Print)9781614999904
DOIs
Publication statusPublished - 2019

Publication series

NameStudies in Health Technology and Informatics
Volume263
ISSN (Print)0926-9630
ISSN (Electronic)1879-8365

Bibliographical note

Copyright the Author(s) and IOS Press 2019. Version archived for private and non-commercial use with the permission of the author/s and according to publisher conditions. For further rights please contact the publisher.

Keywords

  • Evaluation
  • Information technology
  • Utility
  • Value of information

Fingerprint Dive into the research topics of 'Assessing technology success and failure using information value chain theory'. Together they form a unique fingerprint.

Cite this