Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Science and Technology Studies

Assessing Patient And Caregiver Intent To Use Mobile Device Videoconferencing For Remote Mechanically-Ventilated Patient Management, Brian R. Smith Jan 2017

Assessing Patient And Caregiver Intent To Use Mobile Device Videoconferencing For Remote Mechanically-Ventilated Patient Management, Brian R. Smith

Master's Theses and Doctoral Dissertations

The Michigan Medicine adult Assisted Ventilation Clinic (AVC) supports patients with neuromuscular disorders and spinal cord injuries and their caregivers at home, helping them avoid expensive emergency department visits, hospitalization, and unnecessary or excessive treatments. Mobile device videoconferencing provides an effective capability for remote mechanically-ventilated patient management but must rely upon an unknown infrastructure comprising patient and caregiver mobile device ownership, connectivity, and experience—and intent to use the service if provided. The purpose of this study was to measure the extent of this infrastructure and the perceived ease of use, perceived usefulness, and intent to use this mobile device …


Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen Nov 2016

Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen

Master's Theses and Doctoral Dissertations

This descriptive correlation study sought to learn the relationships, if any, between a person’s concern for privacy and their acceptance of technology, in conjunction with the control factors of the Big Five personality factors. The study employed a modified Concern for Information Privacy (CFIP) scale and a modified Technology Acceptance Model (TAM) approach in conjunction with the Big Five personality factors using a 51-question survey.

The study surveyed students at Eastern Michigan University in Ypsilanti, Michigan, who were enrolled in the College of Technology. The results indicated that there was a significant positive relationship between the CFIP and the TAM. …


A Study Of Information Security Awareness Program Effectiveness In Predicting End-User Security Behavior, James Michael Banfield Aug 2016

A Study Of Information Security Awareness Program Effectiveness In Predicting End-User Security Behavior, James Michael Banfield

Master's Theses and Doctoral Dissertations

As accessibility to data increases, so does the need to increase security. For organizations of all sizes, information security (IS) has become paramount due to the increased use of the Internet. Corporate data are transmitted ubiquitously over wireless networks and have increased exponentially with cloud computing and growing end-user demand. Both technological and human strategies must be employed in the development of an information security awareness (ISA) program. By creating a positive culture that promotes desired security behavior through appropriate technology, security policies, and an understanding of human motivations, ISA programs have been the norm for organizational end-user risk mitigation …