Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Social and Behavioral Sciences

Event Identification And Analysis On Twitter, Qiming Diao Aug 2015

Event Identification And Analysis On Twitter, Qiming Diao

Dissertations and Theses Collection (Open Access)

With the rapid growth of social media, Twitter has become one of the most widely adopted platforms for people to post short and instant messages. Because of such wide adoption of Twitter, events like breaking news and release of popular videos can easily capture people’s attention and spread rapidly on Twitter. Therefore, the popularity and importance of an event can be approximately gauged by the volume of tweets covering the event. Moreover, the relevant tweets also reflect the public’s opinions and reactions to events. It is therefore very important to identify and analyze the events on Twitter. In this dissertation, …


Informational Power On Twitter: A Mixed-Methods Exploration Of User Knowledge And Technological Discourse About Information Flows, Nicholas John Proferes May 2015

Informational Power On Twitter: A Mixed-Methods Exploration Of User Knowledge And Technological Discourse About Information Flows, Nicholas John Proferes

Theses and Dissertations

Following a number of recent examples where social media users have been confronted by information flows that did not match their understandings of the platforms, there is a pressing need to examine public knowledge of information flows on these systems, to map how this knowledge lines up against the extant flows of these systems, and to explore the factors that contribute to the construction of knowledge about these systems. There is an immediacy to this issue because as social media sites become further entrenched as dominant vehicles for communication, knowledge about these technologies will play an ever increasing role in …


Affect And Online Privacy Concerns, David Charles Castano Apr 2015

Affect And Online Privacy Concerns, David Charles Castano

CCE Theses and Dissertations

The purpose of this study was to investigate the influence of affect on privacy concerns and privacy behaviors. A considerable amount of research in the information systems field argues that privacy concerns, usually conceptualized as an evaluation of privacy risks, influence privacy behaviors. However, recent theoretical work shows that affect, a pre-cognitive evaluation, has a significant effect on preferences and choices in risky situations. Affect is contrasted with cognitive issues in privacy decision making and the role of affective versus cognitive-consequentialist factors is reviewed in privacy context.

A causal model was developed to address how affect influences privacy concerns and …


Theory Development And Pilot Testing Of A New Survey Instrument On Usability By Older Adults, Meriam Caboral-Stevens Feb 2015

Theory Development And Pilot Testing Of A New Survey Instrument On Usability By Older Adults, Meriam Caboral-Stevens

Dissertations, Theses, and Capstone Projects

An aging population and the use of technology are two pervasive phenomena that are burgeoning simultaneously. The confluence of these phenomena may present challenges for the older adults that could prevent a successful interface. Barriers and challenges can be addressed by examining the interface between older adults and technology. Usability is described as how well and how easily a user without formal training can interact effectively with the system. A review of the literature shows paucity in nursing theories on usability and the use of technology among older adults. This paper describes the development of a conceptual model - Use …


It-Enabled Coordination In Electronic Markets: An Experimental Investigation Of The Effects Of Social Communication On Group Buyers, Alexander Pelaez Feb 2015

It-Enabled Coordination In Electronic Markets: An Experimental Investigation Of The Effects Of Social Communication On Group Buyers, Alexander Pelaez

Dissertations, Theses, and Capstone Projects

Coordination, and the mechanisms by which coordination occurs, represents a significant area of study for economic research, and information technology. Technology enhances communication in both speed and quantity of information and when aligned with appropriate tasks can improve decision-making and task performance. Examining the effect of technology based coordination mechanisms on market platforms provides insight into outcomes as represented by buyer surplus and task completion as well as behaviors, such as network structure and emotional attitudes in economic experiments. Drawing on theory from economics and information systems, larger buyer groups should be able to obtain better prices and extract higher …


An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden Jan 2015

An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden

CCE Theses and Dissertations

Although empirical research has shown that a clearly defined information system (IS) strategy has a positive impact to a firm’s performance and a poorly defined IS strategy has a negative impact to a firms’ performance, firms still develop poorly defined IS strategies. Further compounding the problem, research has revealed that 87% of the business executives believe information systems are a critical enabler to their firms' strategic realization, yet only 33% of business executives involve the Chief Information Officer (CIO) in their firm’s business strategy development. The main goal of this research study is to empirically identify factors which impact development …


An Empirical Investigation Into The Role That Boredom, Relationships, Anxiety, And Gratification (Brag) Play In A Driver’S Decision To Text, Nathan White Jan 2015

An Empirical Investigation Into The Role That Boredom, Relationships, Anxiety, And Gratification (Brag) Play In A Driver’S Decision To Text, Nathan White

CCE Theses and Dissertations

Texting while driving is a growing problem that has serious, and sometimes fatal, consequences. Despite laws enacted to curb this behavior, the problem continues to grow. Discovering factors that can reduce such risky behavior can significantly contribute to research, as well as save lives and reduce property damage. This study developed a model to explore the motivations that cause a driver to send messages. The model evaluates the effects that boredom, social relationships, social anxiety, and social gratification (BRAG) have upon a driver’s frequency of typing text messages. In addition, the perceived severity of the consequences and the presence of …


Major Challenges And Solutions For Utilizing Big Data In The Maritime Industry, Sadaharu Koga Jan 2015

Major Challenges And Solutions For Utilizing Big Data In The Maritime Industry, Sadaharu Koga

World Maritime University Dissertations

The dissertation is a study of big data for the use in the maritime industry. Today’s society is information-intensive. The term “big data” is becoming more common. In fact, some maritime companies and institutions have already been trying to utilize big data for enhancing maritime safety and environmental protection. In order to promote this trend, the dissertation tries to identify common and important challenges for the whole maritime industry in terms of the utilization of big data and propose corresponding solutions. First, by reviewing the definitions of big data, three major features are identified. Big data takes electronic form, is …


Regression Analysis Of Cloud Computing Adoption For U.S. Hospitals, Terence H. Lee Jan 2015

Regression Analysis Of Cloud Computing Adoption For U.S. Hospitals, Terence H. Lee

Walden Dissertations and Doctoral Studies

Industrial experts agree that cloud computing can significantly improve business and public access to low cost computing power and storage. Despite the benefits of cloud computing, recent research surveys indicated that its adoption in U.S. hospitals is slower than expected. The purpose of this study was to understand what factors influence cloud adoption in U.S. hospitals. The theoretical foundation of the research was the diffusion of innovations and technology-organization-environment framework. The research question was to examine the predictability of cloud computing adoption for U.S. hospitals as a function of 6 influential factors: relative advantage, compatibility, complexity, organizational size, structure, and …


Assessing Clinical Software User Needs For Improved Clinical Decision Support Tools, Kimberly B. Denney Jan 2015

Assessing Clinical Software User Needs For Improved Clinical Decision Support Tools, Kimberly B. Denney

Walden Dissertations and Doctoral Studies

Consolidating patient and clinical data to support better-informed clinical decisions remains a primary function of electronic health records (EHRs). In the United States, nearly 6 million patients receive care from an accountable care organization (ACO). Knowledge of clinical decision support (CDS) tool design for use by physicians participating in ACOs remains limited. The purpose of this quantitative study was to examine whether a significant correlation exists between characteristics of alert content and alert timing (the independent variables) and physician perceptions of improved ACO quality measure adherence during electronic ordering (the dependent variable). Sociotechnical theory supported the theoretical framework for this …


Behavioral Operations Management In Federal Governance, Frederick Leonard Mobley Jan 2015

Behavioral Operations Management In Federal Governance, Frederick Leonard Mobley

Walden Dissertations and Doctoral Studies

The environmental uncertainty of federal politics and acquisition outsourcing in competitive markets requires an adaptive decision-analysis structure. Practitioners oriented toward exclusively static methods face severe challenges in understanding qualitative aspects of organizational governance. The purpose of this grounded theory study was to examine and understand behavioral relationship attributes within intuitive, choice, judgment, or preference decision-making processes. The problem addressed in this study was the detrimental effects of organizational citizenship behavior (OCB), compulsory citizenship behavior (CCB), and social exchange theory (SET) on the acquisition management relationship The OCB, CCB, SET dictates that sound business development, relationship acumen, emotional intelligence and perceptiveness …


Police Opinions Of Digital Evidence Response Handling In The State Of Georgia: An Examination From The Viewpoint Of Local Agencies’ Patrol Officers, Tanya Macneil Jan 2015

Police Opinions Of Digital Evidence Response Handling In The State Of Georgia: An Examination From The Viewpoint Of Local Agencies’ Patrol Officers, Tanya Macneil

CCE Theses and Dissertations

This research examined opinions of local law enforcement agencies’ patrol officers in the State of Georgia regarding preparedness and expectations for handling of digital evidence. The increased criminal use of technology requires that patrol officers be prepared to handle digital evidence in many different situations. The researcher’s goal was to gain insight into how patrol officers view their preparedness to handle digital evidence as well as their opinions on management expectations regarding patrol officers’ abilities to handle digital evidence. The research focused on identifying whether a gap existed between patrol officers’ opinions of digital evidence and the patrol officers’ views …


Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen Jan 2015

Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen

CCE Theses and Dissertations

While several U. S. firms have invested in Knowledge Management (KM) tools and software, it has become apparent that investments must be made in additional facets of KM, such as knowledge sharing (KS), thought by many researchers to be the most important component of KM. Of the two types of KS, explicit and tacit, the sharing of tacit knowledge has been shown to contribute the most to an organization’s performance. However, since tacit knowledge is difficult to both convey and acquire, this unshared tacit knowledge may ultimately harm an organization when, without the appropriate knowledge, individuals cannot effectively perform their …


Implicit Measures And Online Risks, Lucinda W. Wang Jan 2015

Implicit Measures And Online Risks, Lucinda W. Wang

CCE Theses and Dissertations

Information systems researchers typically use self-report measures, such as questionnaires to study consumers’ online risk perception. The self-report approach captures the conscious perception of online risk but not the unconscious perception that precedes and dominates human being’s decision-making. A theoretical model in which implicit risk perception precedes explicit risk evaluation is proposed. The research model proposes that implicit risk affects both explicit risk and the attitude towards online purchase. In a direct path, the implicit risk affects attitude towards purchase. In an indirect path, the implicit risk affects explicit risk, which in turn affects attitude towards purchase.

The stimulus used …


Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan Jan 2015

Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan

Open Access Theses & Dissertations

This Dissertation aims to investigate the global diversity in information systems by studying three distinctive phenomena. The first essay investigates the existence of "IT Productivity Paradox" within firms operating in developing countries using an empirical approach. IT Productivity Paradox has been a widely investigated topic within the context of developed countries and primarily studied within the context of developing countries using a single country. Our research addresses a gap in the literature, which is the study of IT Productivity Paradox across several developing countries with diverse characteristics. The second essay studies the contextual factors (firm characteristics and perception of external …


An Exploration Of Wireless Networking And The Management Of Associated Security Risk, Helen Loretta Collins Jan 2015

An Exploration Of Wireless Networking And The Management Of Associated Security Risk, Helen Loretta Collins

Walden Dissertations and Doctoral Studies

The rapid expansion of wireless information technology (IT) coupled with a dramatic increase in security breaches forces organizations to develop comprehensive strategies for managing security risks. The problem addressed was the identification of security risk management practices and human errors of IT administrators, putting the organization at risk for external security intrusion. The purpose of this non-experimental quantitative study was to investigate and determine the security risk assessment practices used by IT administrators to protect the confidentiality and integrity of the organization's information. The research questions focused on whether the security risk management practices of IT administrators met or exceeded …


Information Operations Under International Law: A Delphi Study Into The Legal Standing Of Cyber Warfare, Kenneth Gualtier Jan 2015

Information Operations Under International Law: A Delphi Study Into The Legal Standing Of Cyber Warfare, Kenneth Gualtier

Walden Dissertations and Doctoral Studies

The ever-growing interconnectivity of industry and infrastructure through cyberspace has increased their vulnerability to cyber attack. The lack of any formal codification of cyber warfare has led to the development of contradictory state practices and disagreement as to the legal standing of cyber warfare, resulting in an increased risk of damage to property and loss of life. Using the just war theory as a foundation, the research questions asked at the point at which cyber attacks meet the definition of use of force or armed attack under international law and what impediments currently exist in the development of legal limitations …


Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey Jan 2015

Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey

Walden Dissertations and Doctoral Studies

Ineffective communication behavioral constructs in the workplace that lead to information technology (IT) project failure and in some cases organization failure are increasingly becoming a management concern. Despite this trend, there is little research on the communication behavioral constructs that contribute to IT project failure rates. The purpose of this phenomenological study was to explore the lived experiences of business analysts, programmers, and programmer analysts pertaining to the behavioral constructs associated with effective and ineffective communication. The research questions addressed these behaviors from a conceptual framework based on communication theory, organizational information processing theory, and critical social theory. This framework …


Enhancing Workplace Productivity And Competitiveness In Trinidad And Tobago Through Ict Adoption, Kennedy Jerome Swaratsingh Jan 2015

Enhancing Workplace Productivity And Competitiveness In Trinidad And Tobago Through Ict Adoption, Kennedy Jerome Swaratsingh

Walden Dissertations and Doctoral Studies

The productivity of Trinidad and Tobago's public sector workplaces is related to their absorptive capacity for technological adoption. Guided by the technology acceptance model, which suggests that individuals' and institutions' use of technology increases in relation to perceived ease of use and apparent value, this case study explored how Trinidad and Tobago used information and communications technology from 2001 - 2010 to improve public sector workplace productivity. Study data were collected from 22 individual interviews with senior executives from the government of Trinidad and Tobago, members of the e-business roundtable, and local industry experts, and from reviewing the archives of …