Search Results

Three Essays on Collective Privacy and Information Security

Description: In Essay 1, we seek to expand the insights on an individual's decision to share group content. Social networking sites (SNS) have become a ubiquitous means of socializing in the digital age. Using a survey, we collected data from 520 respondents with corporate work experience to test our research model. Our analysis highlights the complex interplay between individual and group factors that shape users' risk-benefit analysis of sharing group content on social networking sites. Furthermore, the r… more
This item is restricted from view until August 1, 2024.
Date: July 2023
Creator: Memarian Esfahani, Sara

Information Privacy and Security Associated with Healthcare Technology Use

Description: This dissertation consists of three studies that investigate the information privacy & security associated with healthcare technology use. Essay 1 PRISMA-style systematically reviews the existing literature on privacy information disclosure in IoT technology and serves as the theoretical foundation of the current research. It is crucial to comprehend why, how, and under what consequences individuals choose to disclose their personal and health information since doing so is beneficial to the com… more
This item is restricted from view until August 1, 2028.
Date: July 2023
Creator: Amin, M A Shariful

Quantitative Modeling of Healthcare Services and Biodegradable Medical Supplies

Description: This research presents a mathematical model for the transportation and distribution of COVID-19 vaccine, a simulation model for fleet optimization, and a measurement model for "Healthcare 4.0." Essay 1 examines the development of a distribution model using mixed integer programming (MIP) with the objective of maximizing the number of vaccinated individuals, minimizing transportation costs across the entire network, and ensuring widespread access. This research primarily focuses on the distribu… more
This item is restricted from view until August 1, 2028.
Date: July 2023
Creator: Kumar, Abhijeet

Incorporating Ethics in Delegation To and From Artificial Intelligence-Enabled Information Systems

Description: AI-enabled information systems (AI-enabled IS) offer enhanced utility and efficiency due to their knowledge-based endowments, enabling human agents to assign and receive tasks from AI-enabled IS. As a result, this leads to improved decision-making, ability to manage laborious jobs, and a decrease in human errors. Despite the performance-based endowments and efficiencies, there are significant ethical concerns regarding the use of and delegation to AI-enabled IS, which have been extensively addr… more
This item is restricted from view until August 1, 2025.
Date: July 2023
Creator: Saeed, Kashif

Optimizing Value Co-Creation in Education Supply Chains: An Evaluation of Determinants and Resiliency in Service Systems

Description: Services and service-based business are a major part of any economy. However, service-based supply chains require a greater level of interaction between provider and consumer than the traditional manufacturing or product-based supply chain. Therefore, they require optimization and resiliency models that acknowledge the constraints and goals unique to service-based industries. Value co-creation and service-dominant logistics (SDL) are relatively new to operations research. Existing literature in… more
This item is restricted from view until September 1, 2027.
Date: August 2022
Creator: Smith, Justin Thomas

Factors Influencing Continued Usage of Telemedicine Applications

Description: This study addresses the antecedents of individuals' disposition to use telemedicine applications, as well as the antecedents of their usage to provide insight into creating sustained usage over time. The theoretical framework of this research is Bhattacherjee's expectation-confirmation IS continuance model. By combining a series of key factors which may influence the initial and continued usage of telemedicine applications with key constructs of Bhattacherjee's IS continuance model, this study… more
This item is restricted from view until September 1, 2024.
Date: August 2022
Creator: Liu, Xiaoyan

Three Essays on Phishing Attacks, Individual Susceptibility, and Detection Accuracy

Description: Phishing is a social engineering attack to deceive and persuade people to divulge private information like usernames and passwords, account details (including bank account details), and social security numbers. Phishers typically utilize e-mail, chat, text messages, or social media. Despite the presence of automatic anti-phishing filters, phishing messages reach online users' inboxes. Understanding the influence of phishing techniques and individual differences on susceptibility and detection … more
This item is restricted from view until September 1, 2024.
Date: August 2022
Creator: Bera, Debalina

Robust Methodology in Evaluating and Optimizing the Performance of Decision Making Units: Empirical Financial Evidence

Description: Intelligent algorithm approaches that augment the analytical capabilities of traditional techniques may improve the evaluation and performance of decision making units (DMUs). Crises such as the massive COVID-19 pandemic-related shock to businesses have prompted the deployment of analytical tools to provide solutions to emerging complex questions with incredible speed and accuracy. Performance evaluation of DMUs (e.g., financial institutions) is challenging and often depends on the sophisticat… more
This item is restricted from view until September 1, 2027.
Date: August 2022
Creator: Gharoie Ahangar, Reza

The Impact of Blockchain Food Tracing Information Quality and Trust on Intention to Purchase

Description: The purpose of our research is to empirically test how system attributes of blockchain build trust through system and information components in blockchain food traceability systems. Findings showed that system attributes of blockchain are strong predictors of trust leading to intention to purchase. A sample of 358 responses were collected from college students through online survey. SmartPLS 3.0 is adopted for data analysis. We made contributions by building a new research model to guide future… more
This item is restricted from view until September 1, 2024.
Date: August 2022
Creator: Lai, Im Hong

Three Essays on the Role of Social, Legal and Technical Factors on Internet of Things and Smart Contracts Adoption in the Context of COVID-19 Pandemic

Description: I extended and adapted the current technology acceptance models and privacy research to the peculiar context of the COVID-19 pandemic to ascertain the effective "power" of IT in fighting such a pandemic. The research models developed for the purpose of this study contain peculiar modifications to the technological-personal-environmental (TPE) framework and privacy calculus model because of the unique technologies implemented and the peculiar pandemic scenario. I developed three studies that inv… more
This item is restricted from view until June 1, 2027.
Date: May 2022
Creator: Guerra, Katia

A Heuristic Approach to Selection of Analytical Methods: Three Empirical Healthcare Studies

Description: Managers rely on analytics to make decisions and the choice of the analytical method can influence their decision-making. This dissertation considers three cases and examines how the choice of analytical methods influence interpretations and implications. These areas are communication for health-related information in social media, health information technology investment by hospitals as it relates to patient satisfaction, and health related expenditure policies of countries. These studies deve… more
Date: August 2021
Creator: Tarakci, Yasemin

Three Essays on Information Privacy: Awareness, Sharing, and Resilience

Description: This work embraces three essays on information privacy: 1) Measures of Personal Information Privacy in Social Networks: Information Control and Situation Awareness, 2) Care to Share your Personal Information? and 3) Privacy Breaches: How Resilient Are You? Every transaction made either online or offline, and every social interaction that is transferred or stored electronically in some way, are generally consumed as big data and ultimately drives the analytics from which consumers benefit. Howev… more
Date: August 2021
Creator: Kim, Kevin

Extensions of the Neural Network Models into Applications and Comparisons with General Linear Models

Description: This dissertation is designed to answer the following questions: (1) Which measurement model is better to contribute to the research model in different areas? (2) Within a given model, how does the data size influence the performance of a neural network (NN) and some other methods? (3) Compared to partial least square (PLS), ordinary least square (OLS), XGBoost, how is the performance of NN? Essay 1 systematically compares PLS-SEM to ANN and builds the hybrid vehicle purchasing intention model… more
Date: August 2021
Creator: Wang, Yuchen

Three Essays on Social Media Use and Information Sharing Behavior

Description: Social media platforms create rich social structures, expand users' boundaries of social networks and revolutionize traditional forms of communications, social interactions and social relationships. These platforms not only facilitate the creation and sharing of news and information, but they also drive various kinds of businesses models, processes and operations, knowledge sharing, marketing strategies for brand management and socio-political discourses essential for healthy and democratic fun… more
Date: May 2021
Creator: Bhagat, Sarbottam

Development and Exploration of End-User Healthcare Technology Acceptance Models

Description: This dissertation consists of three studies that collectively investigate the factors influencing the consumer adoption intention towards emerging healthcare technologies. Essay 1 systematically reviews the extent literature on healthcare technology adoption and serves as the theoretical foundation of the dissertation. It investigates different models that have been previously applied to study healthcare technology acceptance. Meta-analysis method is used to quantitatively synthesize the findin… more
Date: May 2021
Creator: Wei, Xinyu "Eddy"

An Analysis of Information Technology (IT) Post-Adoption Behavior

Description: The primary focus of this research is explicating the role of emotion in IT post-adoption behavior. Studied in the context of intelligent personal assistants (IPA), a class of conversational artificial intelligence (AI), the first study integrates elements from computer science, communications, and IS disciplines. The research identifies two constructs vital for speech-based technologies, natural language understanding, and feedback, and examines their role in use decisions. This work provides… more
Date: August 2020
Creator: Mamun, Md Rasel Al

Does Quality Management Practice Influence Performance in the Healthcare Industry?

Description: This research examines the relationship between quality management (QM) practices and performance in the healthcare industry via the conduct of three studies. The results of this research contribute both to advancing QM theory as well as in developing a unique text mining method that is illustrated by examining QM in the healthcare industry. Essay 1 explains the relationship between operational performance and QM practices in the healthcare industry. This study analyzed the findings from the li… more
Date: August 2020
Creator: Xie, Heng

Augmented Reality Intentions in Social Networking and Retail Apps

Description: This dissertation contributes to IS research by explaining user intentions while using AR features in mobile social networking and retail app contexts. It consists of three essays, which use partial least squares modeling to analyze different consumer behavior models. The first essay examines the influence of quality, human, and environmental factors on AR reuse intention in a mobile social networking context. The second essay introduces position relevance, a new construct essential to AR resea… more
Date: August 2020
Creator: David, Alsius
open access

Hybrid Models in Automobile Insurance: Technology Adoption and Customer Relations

Description: Customer relationship management (CRM), a primary activity in the business value chain to relate to the customer, involves solicitation, analysis, and the use of the knowledge about the customer to provide goods and services through effective and efficient methods. It is a wise strategy and source of competitive advantage for customer behavior understanding and business performance management. The use of information technology (IT) in CRM allows companies to simplify their processes, to integra… more
Date: August 2019
Creator: Tian, Xiaoguang
open access

Enhancing the Efficacy of Predictive Analytical Modeling in Operational Management Decision Making

Description: In this work, we focus on enhancing the efficacy of predictive modeling in operational management decision making in two different settings: Essay 1 focuses on demand forecasting for the companies and the second study utilizes longitudinal data to analyze the illicit drug seizure and overdose deaths in the United States. In Essay 1, we utilize an operational system (newsvendor model) to evaluate the forecast method outcome and provide guidelines for forecast method (the exponential smoothing m… more
Date: August 2019
Creator: Najmizadehbaghini, Hossein
open access

The Importance of Construct Definition and Specification in Operations Management Structured Model Research: The Case for Quality and Sustainability Constructs in a Decision-Making Model

Description: In the operations management research, the inconsistent use of the same term for different concepts and the use of the similar concepts for different constructs potentially causes theoretical and statistical problems. This research addresses the importance of construct definitions and specification methodologically within the context of quality and sustainability management. It involves three essays using multiple quantitative methods such as partial least squares structural equation modeling a… more
Date: August 2018
Creator: Xu, Lu
open access

Three Essays on Information Security Risk Management

Description: Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that… more
Date: May 2018
Creator: Ogbanufe, Obiageli
open access

Factors that Drive New Technology Product and Service Use and Continuance

Description: Understanding information technology and its related products and services is increasingly important because the everyday use of technology continues to expand and broaden. Despite this need for greater understanding, the extant theories that explore the dominant factors that drive intention to use a new technology are limited. The Technology Acceptancy Model (TAM) is the most popular model in explaining traditional technology adoption. The limitations of the TAM in grasping the overall evaluat… more
Date: May 2018
Creator: Liu, Xiaotong
open access

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

Description: The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the co… more
Date: August 2016
Creator: Sullivan, Yulia
Back to Top of Screen