Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Information technology (6)
- Information science (3)
- Psychology (2)
- Accountable care organizations (1)
- Affect (1)
-
- Behavioral Intentions (1)
- Big data (1)
- Boredom (1)
- Breaches to AIS security (1)
- Bursty topic detection (1)
- Business (1)
- Business Strategy (1)
- CIO (1)
- CPOE alerts (1)
- Chief Information Officer (1)
- Choice (1)
- Clinical decision support (1)
- Cloud adoption (1)
- Cloud computing (1)
- Communication (1)
- Communication behavior (1)
- Communication models (1)
- Communication styles (1)
- Competitiveness (1)
- Criminology (1)
- Cyber Warfare (1)
- Decision Support Systems (1)
- Decision-Making (1)
- Developing Countries (1)
- Developing Economies (1)
- Publication
Articles 1 - 19 of 19
Full-Text Articles in Social and Behavioral Sciences
Event Identification And Analysis On Twitter, Qiming Diao
Event Identification And Analysis On Twitter, Qiming Diao
Dissertations and Theses Collection (Open Access)
With the rapid growth of social media, Twitter has become one of the most widely adopted platforms for people to post short and instant messages. Because of such wide adoption of Twitter, events like breaking news and release of popular videos can easily capture people’s attention and spread rapidly on Twitter. Therefore, the popularity and importance of an event can be approximately gauged by the volume of tweets covering the event. Moreover, the relevant tweets also reflect the public’s opinions and reactions to events. It is therefore very important to identify and analyze the events on Twitter. In this dissertation, …
Informational Power On Twitter: A Mixed-Methods Exploration Of User Knowledge And Technological Discourse About Information Flows, Nicholas John Proferes
Informational Power On Twitter: A Mixed-Methods Exploration Of User Knowledge And Technological Discourse About Information Flows, Nicholas John Proferes
Theses and Dissertations
Following a number of recent examples where social media users have been confronted by information flows that did not match their understandings of the platforms, there is a pressing need to examine public knowledge of information flows on these systems, to map how this knowledge lines up against the extant flows of these systems, and to explore the factors that contribute to the construction of knowledge about these systems. There is an immediacy to this issue because as social media sites become further entrenched as dominant vehicles for communication, knowledge about these technologies will play an ever increasing role in …
Affect And Online Privacy Concerns, David Charles Castano
Affect And Online Privacy Concerns, David Charles Castano
CCE Theses and Dissertations
The purpose of this study was to investigate the influence of affect on privacy concerns and privacy behaviors. A considerable amount of research in the information systems field argues that privacy concerns, usually conceptualized as an evaluation of privacy risks, influence privacy behaviors. However, recent theoretical work shows that affect, a pre-cognitive evaluation, has a significant effect on preferences and choices in risky situations. Affect is contrasted with cognitive issues in privacy decision making and the role of affective versus cognitive-consequentialist factors is reviewed in privacy context.
A causal model was developed to address how affect influences privacy concerns and …
Theory Development And Pilot Testing Of A New Survey Instrument On Usability By Older Adults, Meriam Caboral-Stevens
Theory Development And Pilot Testing Of A New Survey Instrument On Usability By Older Adults, Meriam Caboral-Stevens
Dissertations, Theses, and Capstone Projects
An aging population and the use of technology are two pervasive phenomena that are burgeoning simultaneously. The confluence of these phenomena may present challenges for the older adults that could prevent a successful interface. Barriers and challenges can be addressed by examining the interface between older adults and technology. Usability is described as how well and how easily a user without formal training can interact effectively with the system. A review of the literature shows paucity in nursing theories on usability and the use of technology among older adults. This paper describes the development of a conceptual model - Use …
It-Enabled Coordination In Electronic Markets: An Experimental Investigation Of The Effects Of Social Communication On Group Buyers, Alexander Pelaez
It-Enabled Coordination In Electronic Markets: An Experimental Investigation Of The Effects Of Social Communication On Group Buyers, Alexander Pelaez
Dissertations, Theses, and Capstone Projects
Coordination, and the mechanisms by which coordination occurs, represents a significant area of study for economic research, and information technology. Technology enhances communication in both speed and quantity of information and when aligned with appropriate tasks can improve decision-making and task performance. Examining the effect of technology based coordination mechanisms on market platforms provides insight into outcomes as represented by buyer surplus and task completion as well as behaviors, such as network structure and emotional attitudes in economic experiments. Drawing on theory from economics and information systems, larger buyer groups should be able to obtain better prices and extract higher …
An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden
An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden
CCE Theses and Dissertations
Although empirical research has shown that a clearly defined information system (IS) strategy has a positive impact to a firm’s performance and a poorly defined IS strategy has a negative impact to a firms’ performance, firms still develop poorly defined IS strategies. Further compounding the problem, research has revealed that 87% of the business executives believe information systems are a critical enabler to their firms' strategic realization, yet only 33% of business executives involve the Chief Information Officer (CIO) in their firm’s business strategy development. The main goal of this research study is to empirically identify factors which impact development …
An Empirical Investigation Into The Role That Boredom, Relationships, Anxiety, And Gratification (Brag) Play In A Driver’S Decision To Text, Nathan White
CCE Theses and Dissertations
Texting while driving is a growing problem that has serious, and sometimes fatal, consequences. Despite laws enacted to curb this behavior, the problem continues to grow. Discovering factors that can reduce such risky behavior can significantly contribute to research, as well as save lives and reduce property damage. This study developed a model to explore the motivations that cause a driver to send messages. The model evaluates the effects that boredom, social relationships, social anxiety, and social gratification (BRAG) have upon a driver’s frequency of typing text messages. In addition, the perceived severity of the consequences and the presence of …
Major Challenges And Solutions For Utilizing Big Data In The Maritime Industry, Sadaharu Koga
Major Challenges And Solutions For Utilizing Big Data In The Maritime Industry, Sadaharu Koga
World Maritime University Dissertations
The dissertation is a study of big data for the use in the maritime industry. Today’s society is information-intensive. The term “big data” is becoming more common. In fact, some maritime companies and institutions have already been trying to utilize big data for enhancing maritime safety and environmental protection. In order to promote this trend, the dissertation tries to identify common and important challenges for the whole maritime industry in terms of the utilization of big data and propose corresponding solutions. First, by reviewing the definitions of big data, three major features are identified. Big data takes electronic form, is …
Regression Analysis Of Cloud Computing Adoption For U.S. Hospitals, Terence H. Lee
Regression Analysis Of Cloud Computing Adoption For U.S. Hospitals, Terence H. Lee
Walden Dissertations and Doctoral Studies
Industrial experts agree that cloud computing can significantly improve business and public access to low cost computing power and storage. Despite the benefits of cloud computing, recent research surveys indicated that its adoption in U.S. hospitals is slower than expected. The purpose of this study was to understand what factors influence cloud adoption in U.S. hospitals. The theoretical foundation of the research was the diffusion of innovations and technology-organization-environment framework. The research question was to examine the predictability of cloud computing adoption for U.S. hospitals as a function of 6 influential factors: relative advantage, compatibility, complexity, organizational size, structure, and …
Assessing Clinical Software User Needs For Improved Clinical Decision Support Tools, Kimberly B. Denney
Assessing Clinical Software User Needs For Improved Clinical Decision Support Tools, Kimberly B. Denney
Walden Dissertations and Doctoral Studies
Consolidating patient and clinical data to support better-informed clinical decisions remains a primary function of electronic health records (EHRs). In the United States, nearly 6 million patients receive care from an accountable care organization (ACO). Knowledge of clinical decision support (CDS) tool design for use by physicians participating in ACOs remains limited. The purpose of this quantitative study was to examine whether a significant correlation exists between characteristics of alert content and alert timing (the independent variables) and physician perceptions of improved ACO quality measure adherence during electronic ordering (the dependent variable). Sociotechnical theory supported the theoretical framework for this …
Behavioral Operations Management In Federal Governance, Frederick Leonard Mobley
Behavioral Operations Management In Federal Governance, Frederick Leonard Mobley
Walden Dissertations and Doctoral Studies
The environmental uncertainty of federal politics and acquisition outsourcing in competitive markets requires an adaptive decision-analysis structure. Practitioners oriented toward exclusively static methods face severe challenges in understanding qualitative aspects of organizational governance. The purpose of this grounded theory study was to examine and understand behavioral relationship attributes within intuitive, choice, judgment, or preference decision-making processes. The problem addressed in this study was the detrimental effects of organizational citizenship behavior (OCB), compulsory citizenship behavior (CCB), and social exchange theory (SET) on the acquisition management relationship The OCB, CCB, SET dictates that sound business development, relationship acumen, emotional intelligence and perceptiveness …
Police Opinions Of Digital Evidence Response Handling In The State Of Georgia: An Examination From The Viewpoint Of Local Agencies’ Patrol Officers, Tanya Macneil
CCE Theses and Dissertations
This research examined opinions of local law enforcement agencies’ patrol officers in the State of Georgia regarding preparedness and expectations for handling of digital evidence. The increased criminal use of technology requires that patrol officers be prepared to handle digital evidence in many different situations. The researcher’s goal was to gain insight into how patrol officers view their preparedness to handle digital evidence as well as their opinions on management expectations regarding patrol officers’ abilities to handle digital evidence. The research focused on identifying whether a gap existed between patrol officers’ opinions of digital evidence and the patrol officers’ views …
Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen
Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen
CCE Theses and Dissertations
While several U. S. firms have invested in Knowledge Management (KM) tools and software, it has become apparent that investments must be made in additional facets of KM, such as knowledge sharing (KS), thought by many researchers to be the most important component of KM. Of the two types of KS, explicit and tacit, the sharing of tacit knowledge has been shown to contribute the most to an organization’s performance. However, since tacit knowledge is difficult to both convey and acquire, this unshared tacit knowledge may ultimately harm an organization when, without the appropriate knowledge, individuals cannot effectively perform their …
Implicit Measures And Online Risks, Lucinda W. Wang
Implicit Measures And Online Risks, Lucinda W. Wang
CCE Theses and Dissertations
Information systems researchers typically use self-report measures, such as questionnaires to study consumers’ online risk perception. The self-report approach captures the conscious perception of online risk but not the unconscious perception that precedes and dominates human being’s decision-making. A theoretical model in which implicit risk perception precedes explicit risk evaluation is proposed. The research model proposes that implicit risk affects both explicit risk and the attitude towards online purchase. In a direct path, the implicit risk affects attitude towards purchase. In an indirect path, the implicit risk affects explicit risk, which in turn affects attitude towards purchase.
The stimulus used …
Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan
Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan
Open Access Theses & Dissertations
This Dissertation aims to investigate the global diversity in information systems by studying three distinctive phenomena. The first essay investigates the existence of "IT Productivity Paradox" within firms operating in developing countries using an empirical approach. IT Productivity Paradox has been a widely investigated topic within the context of developed countries and primarily studied within the context of developing countries using a single country. Our research addresses a gap in the literature, which is the study of IT Productivity Paradox across several developing countries with diverse characteristics. The second essay studies the contextual factors (firm characteristics and perception of external …
An Exploration Of Wireless Networking And The Management Of Associated Security Risk, Helen Loretta Collins
An Exploration Of Wireless Networking And The Management Of Associated Security Risk, Helen Loretta Collins
Walden Dissertations and Doctoral Studies
The rapid expansion of wireless information technology (IT) coupled with a dramatic increase in security breaches forces organizations to develop comprehensive strategies for managing security risks. The problem addressed was the identification of security risk management practices and human errors of IT administrators, putting the organization at risk for external security intrusion. The purpose of this non-experimental quantitative study was to investigate and determine the security risk assessment practices used by IT administrators to protect the confidentiality and integrity of the organization's information. The research questions focused on whether the security risk management practices of IT administrators met or exceeded …
Information Operations Under International Law: A Delphi Study Into The Legal Standing Of Cyber Warfare, Kenneth Gualtier
Information Operations Under International Law: A Delphi Study Into The Legal Standing Of Cyber Warfare, Kenneth Gualtier
Walden Dissertations and Doctoral Studies
The ever-growing interconnectivity of industry and infrastructure through cyberspace has increased their vulnerability to cyber attack. The lack of any formal codification of cyber warfare has led to the development of contradictory state practices and disagreement as to the legal standing of cyber warfare, resulting in an increased risk of damage to property and loss of life. Using the just war theory as a foundation, the research questions asked at the point at which cyber attacks meet the definition of use of force or armed attack under international law and what impediments currently exist in the development of legal limitations …
Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey
Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey
Walden Dissertations and Doctoral Studies
Ineffective communication behavioral constructs in the workplace that lead to information technology (IT) project failure and in some cases organization failure are increasingly becoming a management concern. Despite this trend, there is little research on the communication behavioral constructs that contribute to IT project failure rates. The purpose of this phenomenological study was to explore the lived experiences of business analysts, programmers, and programmer analysts pertaining to the behavioral constructs associated with effective and ineffective communication. The research questions addressed these behaviors from a conceptual framework based on communication theory, organizational information processing theory, and critical social theory. This framework …
Enhancing Workplace Productivity And Competitiveness In Trinidad And Tobago Through Ict Adoption, Kennedy Jerome Swaratsingh
Enhancing Workplace Productivity And Competitiveness In Trinidad And Tobago Through Ict Adoption, Kennedy Jerome Swaratsingh
Walden Dissertations and Doctoral Studies
The productivity of Trinidad and Tobago's public sector workplaces is related to their absorptive capacity for technological adoption. Guided by the technology acceptance model, which suggests that individuals' and institutions' use of technology increases in relation to perceived ease of use and apparent value, this case study explored how Trinidad and Tobago used information and communications technology from 2001 - 2010 to improve public sector workplace productivity. Study data were collected from 22 individual interviews with senior executives from the government of Trinidad and Tobago, members of the e-business roundtable, and local industry experts, and from reviewing the archives of …