Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

PDF

Theses/Dissertations

2011

Applied sciences

Articles 1 - 2 of 2

Full-Text Articles in Business

An Analysis Of The Structure And Evolution Of Networks, Guangying Hua Jan 2011

An Analysis Of The Structure And Evolution Of Networks, Guangying Hua

2011

As network research receives more and more attention from both academic researchers and practitioners, network analysis has become a fast growing field attracting many researchers from diverse fields such as physics, computer science, and sociology. This dissertation provides a review of theory and research on different real data sets from the network perspective. The focus is primarily on the structure and dynamics of social networks.

This dissertation is divided into three essays. The first essay examines a professional online community, and to the best of our knowledge, it is the first paper to address the social network of physicians. The …


Application Of Protection Motivation Theory To Study The Factors That Influence Disaster Recovery Planning: An Empirical Investigation, Shalini Wunnava Jan 2011

Application Of Protection Motivation Theory To Study The Factors That Influence Disaster Recovery Planning: An Empirical Investigation, Shalini Wunnava

Doctoral Dissertations

In today's information intensive and networked world, Disaster Recovery Planning (DRP) is a critical and significant activity. However, DRP does not always receive the attention it deserves. Therefore, it is critical to examine the factors that influence the undertaking of disaster recovery planning. A model on disaster recovery planning was developed using the theoretical lens of Protection Motivation Theory (PMT). Drawing from PMT literature and using the information technology disaster recovery planning (ITDRP) construct developed by Shropshire and Kadlec (2009), a research model was developed in which perceived severity, perceived vulnerability, intrinsic rewards, extrinsic rewards, fear, response efficacy, self-efficacy, and …