Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Science and Technology Studies

Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen Nov 2016

Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen

Master's Theses and Doctoral Dissertations

This descriptive correlation study sought to learn the relationships, if any, between a person’s concern for privacy and their acceptance of technology, in conjunction with the control factors of the Big Five personality factors. The study employed a modified Concern for Information Privacy (CFIP) scale and a modified Technology Acceptance Model (TAM) approach in conjunction with the Big Five personality factors using a 51-question survey.

The study surveyed students at Eastern Michigan University in Ypsilanti, Michigan, who were enrolled in the College of Technology. The results indicated that there was a significant positive relationship between the CFIP and the TAM. …


How Nurses Perceive The Impact Of Health It Applications On Their Performance And Satisfaction: Examining The Organizational, Social, And Personal Factors, Sadaf Ashtari Nov 2016

How Nurses Perceive The Impact Of Health It Applications On Their Performance And Satisfaction: Examining The Organizational, Social, And Personal Factors, Sadaf Ashtari

Master's Theses and Doctoral Dissertations

Applying information technology tools in the healthcare industry is an appropriate solution to integrate and record medical data and provide complete access of patients’ information. However, the effectiveness of these technologies depends on their successful implementation and adaptation. This study addresses the impact of result observability, autonomy, perceived barriers, task structure, privacy and security anxiety, and communication (social) patterns on the perception of the performance and satisfaction of nurses using IT applications in healthcare. Furthermore, the effects of nurses’ years of experience, age, different hospitals, different electronic medical records (EMR) applications, and personality factors are examined as a moderator factors …


A Study Of Information Security Awareness Program Effectiveness In Predicting End-User Security Behavior, James Michael Banfield Aug 2016

A Study Of Information Security Awareness Program Effectiveness In Predicting End-User Security Behavior, James Michael Banfield

Master's Theses and Doctoral Dissertations

As accessibility to data increases, so does the need to increase security. For organizations of all sizes, information security (IS) has become paramount due to the increased use of the Internet. Corporate data are transmitted ubiquitously over wireless networks and have increased exponentially with cloud computing and growing end-user demand. Both technological and human strategies must be employed in the development of an information security awareness (ISA) program. By creating a positive culture that promotes desired security behavior through appropriate technology, security policies, and an understanding of human motivations, ISA programs have been the norm for organizational end-user risk mitigation …