481 results on '"Jason Bennett"'
Search Results
202. Worker stress in the age of mobile technology: The combined effects of perceived interruption overload and worker control
- Author
-
Varun Grover, Jason Bennett Thatcher, Manju Ahuja, and Stefan Tams
- Subjects
Mediation (statistics) ,Information Systems and Management ,05 social sciences ,Control (management) ,Applied psychology ,02 engineering and technology ,Moderation ,Management Information Systems ,Moderated mediation ,020204 information systems ,Process analysis ,8. Economic growth ,0502 economics and business ,Stress (linguistics) ,Technostress ,0202 electrical engineering, electronic engineering, information engineering ,050211 marketing ,Mobile technology ,Psychology ,Information Systems - Abstract
Mobile technologies have dramatically increased the number of work-related interruptions, especially after regular work hours. At the same time, many employees have limited freedom to decide how and when they accomplish their work, a condition that renders the explosion of interruptions especially problematic. This study proposes that perceived interruption overload negatively impacts work-related technology-usage via workers’ experiences of work-life conflict, a key source of stress, and that this indirect effect is stronger for lower levels of worker control (moderated mediation). Data were collected from 601 knowledge workers and analyzed through Conditional process analysis, which integrates moderation and mediation analyses. The results supported our model. This study takes an important step toward elucidating the role of mobile technology in work-life conflict and technostress, and it illustrates the roles of perceived interruption overload as well as conflict and technostress in IT use.
- Published
- 2020
203. CONCEPTUALIZING FLUID TEAM MEMBERSHIP AND ITS EFFECTS IN IT PROJECTS: A PRELIMINARY MODEL.
- Author
-
Przybilla, Leonard, Wiesche, Manuel, and Thatcher, Jason Bennett
- Subjects
INFORMATION storage & retrieval systems ,COMPUTER software development ,DIGITAL technology ,MENTAL representation ,INFORMATION technology - Abstract
IT projects frequently add and subtract team members to take advantage of diverse knowledge stocks in solving complex problems. In this paper, we examine how such "fluid" changes in team membership impact the performance of IT projects. In doing so, we offer a conceptual definition of team fluidity and propose a theoretical model of fluid membership's impact on IT project performance. We argue the effects of fluidity depend on the project setting, such as project type and familiarity of members, and characteristics of the fluidity event, that is centrality of members involved and timing. We propose that fluidity likely affects IT work through its impact on team cognition. Going beyond the common assumption that teams are stable entities with clearly defined membership, our propositions bring research on IT project teams as well as on teams in general closer to reality. By shedding light on how fluid team membership relates to project performance, we additionally contribute to the body of knowledge on the design and management of IT project teams to achieve high performance. [ABSTRACT FROM AUTHOR]
- Published
- 2020
204. Avoiding pressure injuries with Root Cause Analysis and Action
- Author
-
Susan M. Scott and Jason Bennett
- Subjects
Pressure Ulcer ,medicine.medical_specialty ,030504 nursing ,Perioperative nursing ,business.industry ,Nursing assessment ,MEDLINE ,Organizational culture ,Organizational Culture ,United States ,030207 dermatology & venereal diseases ,03 medical and health sciences ,Medical–Surgical Nursing ,0302 clinical medicine ,Action (philosophy) ,Perioperative Nursing ,Humans ,Medicine ,Root Cause Analysis ,0305 other medical science ,business ,Intensive care medicine ,Root cause analysis ,Nursing Assessment - Published
- 2018
205. Clinical proof of concept for a safe and effective NF-κB-targeting strategy in multiple myeloma
- Author
-
Metod Oblak, Daria Capece, Jane F. Apperley, Jason Bennett, Heather Oakervee, Ashutosh D. Wechalekar, Michael Tarbit, Angela Chambery, Richard Kaczmarski, Domenico Raimondo, Daniela Verzella, Ian H Gabriel, Annamaria Sandomenico, Magda J Al-Obaidi, Daniel D'Andrea, Gary Acton, Menotti Ruvo, James Kelly, Guido Franzoso, Holger W. Auner, Federica Begalli, Antonio Leonardi, Reuben Benjamin, Nigel Adams, Martin Kaiser, Elizabeth A. Campbell, Laura Tornatore, Selina Bannoo, Tornatore, Laura, Capece, Daria, D'Andrea, Daniel, Begalli, Federica, Verzella, Daniela, Bennett, Jason, Acton, Gary, Campbell, Elizabeth A., Kelly, Jame, Tarbit, Michael, Adams, Nigel, Bannoo, Selina, Leonardi, Antonio, Sandomenico, Annamaria, Raimondo, Domenico, Ruvo, Menotti, Chambery, Angela, Oblak, Metod, Al-Obaidi, Magda J., Kaczmarski, Richard S., Gabriel, Ian, Oakervee, Heather E., Kaiser, Martin F., Wechalekar, Ashutosh, Benjamin, Reuben, Apperley, Jane F., Auner, Holger W., and Franzoso, Guido
- Subjects
0301 basic medicine ,apoptosis ,clinical trials ,drug ,multiple myeloma ,NF-κB ,Antineoplastic Agents ,Cell Line, Tumor ,Humans ,NF-kappa B ,Neoplasm Proteins ,Proof of Concept Study ,Drug Delivery Systems ,Multiple Myeloma ,Immunology ,Cell Line ,03 medical and health sciences ,chemistry.chemical_compound ,0302 clinical medicine ,Medicine ,1102 Cardiorespiratory Medicine and Haematology ,Multiple myeloma ,Tumor ,Science & Technology ,business.industry ,clinical trial ,Hematology ,medicine.disease ,GADD45-BETA ,apoptosi ,Clinical trial ,030104 developmental biology ,chemistry ,Apoptosis ,Proof of concept ,030220 oncology & carcinogenesis ,Cancer research ,business ,Life Sciences & Biomedicine - Published
- 2018
206. Deploying Machine Learning Models for Public Policy
- Author
-
Adolfo De Unánue, Crystal Cody, Jason Bennett, Hareem Naveed, Rayid Ghani, Joe Walsh, Sun-Joo Lee, Andrea Navarrete Rivera, Klaus Ackermann, Lauren Haynes, and Michael Defoe
- Subjects
Computer science ,business.industry ,Corporate governance ,Public policy ,02 engineering and technology ,Machine learning ,computer.software_genre ,Metropolitan area ,Intervention (law) ,Software deployment ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Complaint ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,computer ,Use of force - Abstract
Machine learning research typically focuses on optimization and testing on a few criteria, but deployment in a public policy setting requires more. Technical and non-technical deployment issues get relatively little attention. However, for machine learning models to have real-world benefit and impact, effective deployment is crucial. In this case study, we describe our implementation of a machine learning early intervention system (EIS) for police officers in the Charlotte-Mecklenburg (North Carolina) and Metropolitan Nashville (Tennessee) Police Departments. The EIS identifies officers at high risk of having an adverse incident, such as an unjustified use of force or sustained complaint. We deployed the same code base at both departments, which have different underlying data sources and data structures. Deployment required us to solve several new problems, covering technical implementation, governance of the system, the cost to use the system, and trust in the system. In this paper we describe how we addressed and solved several of these challenges and provide guidance and a framework of important issues to consider for future deployments.
- Published
- 2018
207. MP79-17 LEVEL OF DIFFICULTY AND TRAUMA ASSOCIATED WITH REMOVAL OF THE TINED LEAD FOR SACRAL NEUROMODULATION
- Author
-
Tomas L. Griebling, Steven Siegel, Daniel J. Culkin, Jeffrey Mangel, Samuel Zylstra, Jason Bennett, Suzette E. Sutherland, Fangyu Kan, Craig V. Comiter, Kellie Berg, and Erin Bird
- Subjects
medicine.medical_specialty ,Sacral nerve stimulation ,business.industry ,Urology ,medicine ,Lead (electronics) ,business ,Surgery - Published
- 2018
208. Turning an old GADDget into a troublemaker
- Author
-
Federica Begalli, Jason Bennett, Laura Tornatore, Guido Franzoso, Daniel D'Andrea, Francesca Zazzeroni, Daniela Verzella, Daria Capece, Medical Research Council (MRC), Cancer Research UK, and Leukaemia & Lymphoma Research 'Beating Blood Cancers'
- Subjects
0301 basic medicine ,Biochemistry & Molecular Biology ,NF-KAPPA-B ,Inflammation ,03 medical and health sciences ,Text mining ,INFLAMMATION ,medicine ,Animals ,Humans ,NF-kB ,tumor microenvironment (TME) ,Molecular Biology ,Science & Technology ,business.industry ,NF-kappa B ,apoptosis ,Cancer ,Cell Biology ,11 Medical And Health Sciences ,06 Biological Sciences ,NFKB1 ,medicine.disease ,CANCER ,MAPK ,030104 developmental biology ,NF-kB, Gadd45b, tumor microenvironment (TME), MAPK, apoptosis ,Caspases ,Cancer research ,Cytokines ,medicine.symptom ,business ,Gadd45b ,Life Sciences & Biomedicine - Published
- 2018
209. NF-κB in the crosshairs: Rethinking an old riddle
- Author
-
Jason, Bennett, Daria, Capece, Federica, Begalli, Daniela, Verzella, Daniel, D'Andrea, Laura, Tornatore, Guido, Franzoso, Medical Research Council (MRC), Cancer Research UK, and Leukaemia & Lymphoma Research 'Beating Blood Cancers'
- Subjects
Cancer ,DTP3 ,GADD45β ,IKKβ ,NF-κB ,Animals ,Antineoplastic Agents ,Apoptosis ,Cell Survival ,Drug Design ,Drugs, Investigational ,Humans ,Molecular Targeted Therapy ,NF-kappa B ,Neoplasm Proteins ,Neoplasms ,Signal Transduction ,Models, Biological ,MCL1, myeloid cell leukaemia sequence 1 ,Investigational ,XIAP, X chromosome-linked inhibitor of apoptosis protein ,IKK, IκBα kinase ,cFLIP, cellular FLICE-inhibitory protein ,CLL, chronic lymphocytic leukaemia ,Models ,TME, tumour microenvironment ,cIAP, cellular inhibitor of apoptosis ,βTrCPP, β-transducin repeat-containing proteint ,FDA, US Food and Drug Administration ,Drugs ,BCL-XL, B-cell lymphoma-extra large ,JNK, c-Jun N-terminal kinase ,DLBCL, diffuse large B-cell lymphoma ,Biochemistry & Molecular Biology ,IL-1β, interleukin-1β ,RAS, rat sarcoma virus oncogene ,Article ,SMAC, second mitochondria-derived activator of caspases ,DIABLO, direct inhibitor of apoptosis protein (IAP)-binding protein with low pI ,IκBα, nuclear factor of κ light polypeptide gene enhancer in B-cells inhibitor α ,FLICE, FADD-like IL-1β-converting enzyme ,SCF, SKP1-Cullin 1-F-box protein ,MALT, mucosa-associated lymphoid tissue ,BFL-1, Bcl-2-related gene expressed in foetal liver ,GADD45β, growth arrest and DNA damage inducible β ,NF-κB, nuclear factor κ B (nuclear factor binding to the κ-light-chain-enhancer B site) ,0601 Biochemistry And Cell Biology ,GBM, glioblastoma multiforme ,Biological ,PTEN, phosphatase and tensin homolog ,MAP, mitogen activated protein ,BCL-2, B-cell lymphoma 2 - Abstract
Highlights • NF-κB transcription factors are central coordinating regulators of immunity, inflammation and cell survival. • NF-κB pathway is aberrantly and stably activated in cancer. • The ubiquitous presence and pleiotropic physiological role of NF-κB dimers have thus far prevented the development of any clinically useful NF-κB inhibitor. • Emerging therapeutic approaches aim to achieve the cancer-selective inhibition of the NF-κB pathway as a way to overcome the preclusive toxicities of conventional IKKβ/NF-κB-targeting drugs., Constitutive NF-κB signalling has been implicated in the pathogenesis of most human malignancies and virtually all non-malignant pathologies. Accordingly, the NF-κB pathway has been aggressively pursued as an attractive therapeutic target for drug discovery. However, the severe on-target toxicities associated with systemic NF-κB inhibition have thus far precluded the development of a clinically useful, NF-κB-targeting medicine as a way to treat patients with either oncological or non-oncological diseases. This minireview discusses some of the more promising approaches currently being developed to circumvent the preclusive safety liabilities of global NF-κB blockade by selectively targeting pathogenic NF-κB signalling in cancer, while preserving the multiple physiological functions of NF-κB in host defence responses and tissue homeostasis.
- Published
- 2017
210. GADD45β loss ablates innate immunosuppression in cancer
- Author
-
Francesca Zazzeroni, Fabio Pasqualini, Stuart J. Forbes, Federica Begalli, Jason Bennett, Mariafausta Fischietti, Laura Tornatore, Daniel D'Andrea, Toby Lawrence, Barbara Di Francesco, Antonio Sica, Anil K. Thotakura, Marcella De Maglie, Daria Capece, Salvatore Papa, Camilla Recordati, Guido Franzoso, Daniela Verzella, Edoardo Alesse, Davide Vecchiotti, Medical Research Council (MRC), Cancer Research UK, Bloodwise, Department of Immunology and Cell Biology, Mario Negri Institute, Department of Physics [Roma La Sapienza], Università degli Studi di Roma 'La Sapienza' = Sapienza University [Rome], Centre d'Immunologie de Marseille - Luminy (CIML), Aix Marseille Université (AMU)-Institut National de la Santé et de la Recherche Médicale (INSERM)-Centre National de la Recherche Scientifique (CNRS), Istituto Clinico Humanitas [Milan] (IRCCS Milan), Humanitas University [Milan] (Hunimed), Department of Biotechnological and Applied Clinical Sciences, Università degli Studi dell'Aquila (UNIVAQ), Dipartimento di Fisica [Roma La Sapienza], Università degli Studi di Roma 'La Sapienza' = Sapienza University [Rome] (UNIROMA), Università degli Studi dell'Aquila = University of L'Aquila (UNIVAQ), and Institut National de la Santé et de la Recherche Médicale (INSERM)-Centre National de la Recherche Scientifique (CNRS)-Aix Marseille Université (AMU)
- Subjects
0301 basic medicine ,Male ,Cancer Research ,Myeloid ,GADD45β, NF-κB, Inflammation, Tumor associated macrophage (TAM), Tumour microenvironment (TME) ,medicine.medical_treatment ,T-Lymphocytes ,NF-KAPPA-B ,DIVERSITY ,PROGRESSION ,Apoptosis ,Tumor associated macrophage (TAM) ,medicine.disease_cause ,NF-κB ,Immune tolerance ,Mice ,Cancer immunotherapy ,Tumour microenvironment (TME) ,HEPATOCELLULAR-CARCINOMA ,Neoplasms ,Tumor Cells, Cultured ,Tumor Microenvironment ,Medicine ,Myeloid Cells ,Mice, Knockout ,Liver Neoplasms ,Immunosuppression ,3. Good health ,TUMOR-ASSOCIATED MACROPHAGES ,medicine.anatomical_structure ,Oncology ,[SDV.IMM]Life Sciences [q-bio]/Immunology ,Female ,GADD45β ,Life Sciences & Biomedicine ,Carcinoma, Hepatocellular ,Article ,03 medical and health sciences ,INFILTRATING MACROPHAGES ,LYMPHOID STRUCTURES ,INFLAMMATION ,Journal Article ,Biomarkers, Tumor ,Immune Tolerance ,Animals ,Humans ,1112 Oncology and Carcinogenesis ,Oncology & Carcinogenesis ,IMMUNOTHERAPY ,Cell Proliferation ,Immunosuppression Therapy ,Tumor microenvironment ,Science & Technology ,business.industry ,Macrophages ,Cancer ,medicine.disease ,Antigens, Differentiation ,Immune checkpoint ,Mice, Inbred C57BL ,030104 developmental biology ,CELLS ,Cancer research ,business ,Carcinogenesis - Abstract
T-cell exclusion from the tumor microenvironment (TME) is a major barrier to overcoming immune escape. Here, we identify a myeloid-intrinsic mechanism governed by the NF-κB effector molecule GADD45β that restricts tumor-associated inflammation and T-cell trafficking into tumors. In various models of solid cancers refractory to immunotherapies, including hepatocellular carcinoma and ovarian adenocarcinoma, Gadd45b inhibition in myeloid cells restored activation of proinflammatory tumor-associated macrophages (TAM) and intratumoral immune infiltration, thereby diminishing oncogenesis. Our results provide a basis to interpret clinical evidence that elevated expression of GADD45B confers poor clinical outcomes in most human cancers. Furthermore, they suggest a therapeutic target in GADD45β for reprogramming TAM to overcome immunosuppression and T-cell exclusion from the TME. Significance: These findings define a myeloid-based immune checkpoint that restricts T-cell trafficking into tumors, with potentially important therapeutic implications to generally improve the efficacy of cancer immunotherapy. Cancer Res; 78(5); 1275–92. ©2017 AACR.
- Published
- 2017
211. Six types of IT-business strategic alignment: an investigation of the constructs and their measurement
- Author
-
Jennifer E. Gerow, Jason Bennett Thatcher, and Varun Grover
- Subjects
Information management ,Knowledge management ,Computer science ,Strategic alignment ,business.industry ,05 social sciences ,Information technology ,02 engineering and technology ,Library and Information Sciences ,Business model ,Management information systems ,020204 information systems ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,050211 marketing ,Strategic information system ,Soft systems methodology ,business ,Information Systems - Abstract
Top management has been concerned with IT-business strategic alignment (hereafter referred to as alignment) for the past 30 years. Consequently, alignment researchers have developed many mo...
- Published
- 2015
212. Beliefs and Attributions toward Computing Technology
- Author
-
Natasha F. Veltri, Richard D. Johnson, and Jason Bennett Thatcher
- Subjects
Human-Computer Interaction ,Strategy and Management ,Social cue ,Attribution ,Psychology ,Social psychology ,Computer Science Applications - Abstract
This study critiques and extends the work of , who investigated the relations between social cues in an interface, user personality, user beliefs about the social role and capabilities of computers, and the attributions of responsibility users made for their interactions and outcomes with a computer. In this study, rather than examining the simple, direct effects investigated previously, we examine the moderating role of social cues in the interface. In addition, building upon recent findings from psychology, the authors assess personality traits individually, rather than aggregating them. To evaluate the theorized relations, 152 individuals participated in a controlled laboratory experiment, where social cues in two computer interfaces were manipulated. Results indicate that social cues moderate the relations between personality, beliefs about the social role of computing, and the attributions made. In addition, the results suggest that disaggregating personality traits is theoretically and practically richer than aggregating them.
- Published
- 2015
213. The role of user age in task performance: examining curvilinear and interaction effects of user age, expertise, and interface design on mistake making
- Author
-
Stefan Tams, Richard Pak, Jason Bennett Thatcher, J. Christopher Zimmer, and Kevin Craig
- Subjects
Economics and Econometrics ,Engineering ,Knowledge management ,business.industry ,Context (language use) ,Mistake ,Task (project management) ,Information and Communications Technology ,Human resource management ,Workforce ,Information system ,Business and International Management ,business ,Disadvantage - Abstract
The next 30 years are going to be challenging for organizations as they need to transition to a workforce that is rapidly growing older. As the workforce is growing older, the age of organizational technology users is an important aspect to examine in the context of organizational information systems (IS). The corresponding IS literature has largely assumed that age is an impediment or disadvantage when using modern information and communication technologies (ICTs) and has, thus, directed attention to the challenges faced by older technology users in the workforce. However, such research has not examined the potential benefits of an older workforce in terms of a possibly higher task performance under certain workplace conditions, such as employees’ subject-area knowledge and the design of the ICT interface. Hence, this paper examines age-related differences in the use of organizational ICTs in terms of the propensity that different age groups have toward performance in the form of mistake-making when searching for information. To do so, the paper forms hypotheses that explain how the combination of age, subject-area knowledge, and system interface lead individuals to make mistakes in a technology-enabled context. Drawing on a laboratory experiment using 107 older and younger technology users, we evaluated the three-way interaction of age, subject-area knowledge, and interface design. Our results demonstrate that—under certain conditions—age is not the detriment that it is widely believed to be. The implications of this finding are explored in relation to the “graying of the workforce” that all OECD countries are currently experiencing.
- Published
- 2015
214. Interrupting the Workplace: Examining Stressors in an Information Technology Context
- Author
-
Varun Grover, Pamela S. Galluch, and Jason Bennett Thatcher
- Subjects
Management information systems ,Information and Communications Technology ,business.industry ,Applied psychology ,Technostress ,Stressor ,Information technology ,Context (language use) ,Psychology ,business ,Social psychology ,Computer Science Applications ,Information Systems - Published
- 2015
215. Modern information technology in an old workforce: Toward a strategic research agenda
- Author
-
Varun Grover, Stefan Tams, and Jason Bennett Thatcher
- Subjects
Information Systems and Management ,Knowledge management ,business.industry ,media_common.quotation_subject ,Perspective (graphical) ,Information technology ,Public relations ,Management Information Systems ,Interdependence ,Information and Communications Technology ,Phenomenon ,Workforce ,Information system ,Sociology ,business ,Information Systems ,media_common ,Diversity (business) - Abstract
Raising awareness of the importance of examining the role of age in IS phenomena.Providing a review of age-related IS research on which future work can build.Introducing the concept of "touch points of age".Enabling an improvement in the modeling and understanding of age-related impacts.Advancing a series of research questions to further knowledge in this area. As the workforce ages rapidly in industrialized countries, a phenomenon known as the graying of the workforce, new challenges arise for firms as they have to juggle this dramatic demographical change (Trend 1) in conjunction with the proliferation of increasingly modern information and communication technologies (ICTs) (Trend 2). Although these two important workplace trends are pervasive, their interdependencies have remained largely unexplored. While Information Systems (IS) research has established the pertinence of age to IS phenomena from an empirical perspective, it has tended to model the concept merely as a control variable with limited understanding of its conceptual nature. In fact, even the few IS studies that used the concept of age as a substantive variable have mostly relied on stereotypical accounts alone to justify their age-related hypotheses. Further, most of these studies have examined the role of age in the same phenomenon (i.e., initial adoption of ICTs), implying a marked lack of diversity with respect to the phenomena under investigation. Overall, IS research has yielded only limited insight into the role of age in phenomena involving ICTs. In this essay, we argue for the importance of studying age-related impacts more carefully and across various IS phenomena, and we enable such research by providing a research agenda that IS scholars can use. In doing so, we hope that future research will further both our empirical and conceptual understanding of the managerial challenges arising from the interplay of a graying workforce and rapidly evolving ICTs.
- Published
- 2014
216. Development of a new patient-reported outcome (PRO) measure on the Impact of Nighttime Urination (INTU) in patients with nocturia-Psychometric validation
- Author
-
Kristin Khalaf Gillard, Seymour Fein, Steven Abrams, Linda Cheng, Jason Bennett, and Benjamin Banderas
- Subjects
Male ,medicine.medical_specialty ,Psychometrics ,Urology ,Concurrent validity ,030232 urology & nephrology ,Urination ,Pittsburgh Sleep Quality Index ,03 medical and health sciences ,Young Adult ,0302 clinical medicine ,Quality of life ,Surveys and Questionnaires ,Medicine ,Nocturia ,Humans ,Patient Reported Outcome Measures ,Aged ,Aged, 80 and over ,Rasch model ,business.industry ,Middle Aged ,Confirmatory factor analysis ,Exploratory factor analysis ,030220 oncology & carcinogenesis ,Physical therapy ,Quality of Life ,Patient-reported outcome ,Female ,Neurology (clinical) ,medicine.symptom ,business - Abstract
AIMS To psychometrically evaluate the Impact of Nighttime Urination (INTU) questionnaire, a new patient-reported outcome measure developed to assess the impact of nocturia on health and functioning in a multicenter, behavioral modification (fluid restriction) study. METHODS Participants aged 50-95 years with at least two voiding episodes/night for ≥6 months completed voiding diaries and the INTU on 3 consecutive days during weeks 1 and 2 (same day recall) and completed the Pittsburgh Sleep Quality Index (PSQI) and Nocturia Quality of Life Questionnaire (N-QOL) at baseline and days 8 and 15. Psychometric evaluations of the INTU were conducted. RESULTS Rasch analysis showed the INTU to be a unidimensional construct, with most items located on the severe end of the symptom severity continuum. In addition to an Overall Impact Score (10 items), exploratory factor analysis affirmed by confirmatory factor analysis identified two domains: Daytime (six items) and Nighttime (four items) Impact Scores (comparative fit index = 0.968; root mean square error of approximation = 0.08). Concurrent validity met prespecified hypotheses, indicating similarity of concepts with the PSQI (correlation [r] = 0.627) and N-QOL (r = -0.784) total scores. The INTU differentiated among patients with different nocturic episode frequencies (P
- Published
- 2017
217. When Modern Technologies Meet Ageing Workforces: Older Workers are more affected by Demands from Mobile Interruptions than their Younger Counterparts
- Author
-
Manju Ahuja, Jason Bennett Thatcher, Varun Grover, and Stefan Tams
- Subjects
Gerontology ,Ageing ,020204 information systems ,0502 economics and business ,05 social sciences ,Technostress ,0202 electrical engineering, electronic engineering, information engineering ,050211 marketing ,Operations management ,02 engineering and technology ,Psychology - Published
- 2017
218. Partnering for Perioperative Skin Assessment: A Time to Change A Practice Culture
- Author
-
Linda Minnich, Jason Bennett, and Jennifer Mercer
- Subjects
medicine.medical_specialty ,business.industry ,Psychological intervention ,Prevalence ,Front line ,Theory of change ,Perioperative ,Middle Aged ,Skin Tears ,Unit (housing) ,Medical–Surgical Nursing ,Patient safety ,Risk Factors ,Perioperative Nursing ,Emergency medicine ,Physical therapy ,Humans ,Medicine ,Female ,business ,Nursing Assessment ,Skin - Abstract
Front line staff identified skin tears and stage one pressure ulcers on post-surgical patients undergoing surgical interventions lasting longer than 2 hours. Collaboration between unit-based councils from the operating room, post-anesthesia care unit, and post-surgical units established a new process for early identification and prevention of surgical acquired pressure ulcers (SAPUs). Interdepartmental collaboration was essential to identifying patient safety concerns and developing a new process of pre-evaluation, early identification, and prevention of SAPUs. Specific skin evaluation reports were created to assess the occurrence and prevalence of SAPUs within moments of initial discovery and continuing through the remainder of hospitalization. Patients would have a skin assessment post-operatively performed by the operating room and post-anesthesia care unit nurses together. An internal prevalence study revealed occurrence rates of 7.1% before implementation of interventions. After evaluating 3,035 patients over 2 years and implementation of a new screening process, the prevalence rate was reduced to 3.3%. The resultant decline in SAPUs supports the value of this no-cost change in workflow.
- Published
- 2014
219. Incorporating trust-in-technology into Expectation Disconfirmation Theory
- Author
-
Nancy K. Lankton, D. Harrison McKnight, and Jason Bennett Thatcher
- Subjects
System development ,Information Systems and Management ,Knowledge management ,Future studies ,business.industry ,Process (engineering) ,Management Information Systems ,Information system ,Predictive power ,Strategic information system ,Continuance ,business ,Construct (philosophy) ,Psychology ,Information Systems - Abstract
Continued use of strategic information systems is not always a given. This study proposes that users’ trust in the system may influence their satisfaction and continuance intention. While trust has been found to have strategic implications for understanding consumers’ technology usage, relatively little research has examined how trust’s influence operates over time. To gain insight into trust’s influence on strategic system usage over time and to explain how trust relates to satisfaction and continuance intention, we integrate trust-related constructs with the Complete Expectation Disconfirmation Theory (EDT) Model. Our results demonstrate that trust plays a central role in the EDT process and that the EDT process helps explain trust’s role more completely. The study shows that technology trusting expectations influence trusting intention through performance, disconfirmation, and satisfaction. We also show that technology trusting intention adds predictive power to EDT’s satisfaction construct as together they predict usage continuance intention. For research, our results provide a strong combined EDT and trust theory base for future studies that examine expectation management and system development projects. For practice, our study informs systems implementation strategies for technologies that have fewer human-like characteristics and more technology-like characteristics. Our findings underscore that managers need to adopt an EDT process-based view when seeking to build trust, satisfaction, and continuance intention in strategically important information systems.
- Published
- 2014
220. Research Note—Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance
- Author
-
Michael Dinger, Ryan T. Wright, Matthew L. Jensen, Kent Marett, and Jason Bennett Thatcher
- Subjects
Persuasion ,Information Systems and Management ,Computer Networks and Communications ,business.industry ,media_common.quotation_subject ,Social engineering (security) ,Internet privacy ,Shared experience ,Vulnerability ,Data breach ,Library and Information Sciences ,Deception ,Computer security ,computer.software_genre ,Phishing ,Management Information Systems ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,ComputingMilieux_COMPUTERSANDSOCIETY ,Motivation theory ,business ,Psychology ,computer ,Information Systems ,media_common - Abstract
Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data breaches, loss of corporate secrets, and espionage. Despite the significant threat, potential phishing targets have little theoretical or practical guidance on which phishing tactics are most dangerous and require heightened caution. The current study extends persuasion and motivation theory to postulate why certain influence techniques are especially dangerous when used in phishing attacks. We evaluated our hypotheses using a large field experiment that involved sending phishing messages to more than 2,600 participants. Results indicated a disparity in levels of danger presented by different influence techniques used in phishing attacks. Specifically, participants were less vulnerable to phishing influence techniques that relied on fictitious prior shared experience and were more vulnerable to techniques offering a high level of self-determination. By extending persuasion and motivation theory to explain the relative efficacy of phishers' influence techniques, this work clarifies significant vulnerabilities and lays the foundation for individuals and organizations to combat phishing through awareness and training efforts.
- Published
- 2014
221. Looking Toward the Future of IT-Business Strategic Alignment through the Past: A Meta-Analysis
- Author
-
Jason Bennett Thatcher, Jennifer E. Gerow, Varun Grover, and Philip L. Roth
- Subjects
Information Systems and Management ,Knowledge management ,Variables ,business.industry ,Strategic alignment ,media_common.quotation_subject ,Foundation (evidence) ,Nomological network ,Context (language use) ,Computer Science Applications ,Management Information Systems ,Meta-analysis ,Productivity paradox ,business ,Psychology ,Productivity ,Information Systems ,media_common - Abstract
Research examining the relationship between IT-business strategic alignment (hereafter referred to as alignment) and firm performance (hereafter referred to as performance) has produced apparently conflicting findings (i.e., an alignment paradox). To examine the alignment paradox, we conducted a meta-analysis that probed the interrelationships between alignment, performance, and context constructs. We found the alignment dimensions (intellectual, operational, and cross-domain) demonstrate unique relationships with the different performance types (financial performance, productivity, and customer benefit) and with many of the other constructs in alignment's nomological network. All mean corrected correlations between dimensions of alignment and dependent variables were positive and most of the credibility interval values in these analyses were also positive. Overall, the evidence gathered from the extant literature suggests there is not much of an alignment paradox. This study contributes to the literature by clarifying the relationships between alignment and performance outcomes and offering insight into sources of inconsistencies in alignment research. By doing so, this paper lays a foundation for more consistent treatment of alignment in future IT research.
- Published
- 2014
222. Understanding the social web
- Author
-
Simon Appleford, Jason Bennett Thatcher, and James R. Bottum
- Subjects
Knowledge management ,Computer Networks and Communications ,business.industry ,Social web ,Information science ,Management Information Systems ,Community of practice ,Business intelligence ,Information system ,Applied research ,Social media ,Engineering ethics ,Sociology ,Web intelligence ,business - Abstract
This paper identifies issues that must be considered by Information Systems scholars interested in helping to build a rich, interdisciplinary community to support applied research into the impact of the social web. We describe challenges and opportunities presented by the social web for Information Systems research and argue that an interdisciplinary approach may address the challenges of pursuing research questions about ephemeral social web phenomena. Through the creation of communities of practice that bring together faculty, IT professionals, and students from across academic colleges and high performance computing groups that lay a foundation for collaboration, information systems scholars may realize new opportunities for behavioral, design science, business intelligence, and IS strategy research. More importantly, through an interdisciplinary community of practice, we may inform how to develop an information systems curriculum that equips our students to participate in the growing knowledge economy.
- Published
- 2014
223. Understanding online customers' ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty
- Author
-
Michelle Carter, Jason Bennett Thatcher, Richard G. Klein, and Ryan T. Wright
- Subjects
Customer retention ,business.industry ,InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS ,media_common.quotation_subject ,ComputingMilieux_PERSONALCOMPUTING ,Information technology ,Library and Information Sciences ,Business model ,Loyalty business model ,Management information systems ,Loyalty ,Accounting information system ,ComputingMilieux_COMPUTERSANDSOCIETY ,Strategic information system ,Marketing ,business ,Information Systems ,media_common - Abstract
Fostering customer loyalty is a key objective for online businesses. Initial transactions with new customers are less profitable than transactions with existing customers, making loyalty an importa...
- Published
- 2014
224. The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use
- Author
-
D. Harrison McKnight, Michael J. Gundlach, Jason Bennett Thatcher, and Elizabeth White Baker
- Subjects
Self-efficacy ,business.industry ,Strategy and Management ,media_common.quotation_subject ,Information technology ,Nomological network ,It usage ,Computer Science Applications ,Research model ,Human-Computer Interaction ,Institution ,Computer anxiety ,business ,Psychology ,Social psychology ,Social cognitive theory ,media_common - Abstract
Prior research has shown that proximal states are important mechanisms through which distal states relate to IT usage. In particular, the influence of distal traits tied to social activity has not been incorporated into the nomological network surrounding information technology (IT) use. Addressing this literature gap, the authors develop their research model using Social Cognitive Theory and examine how two distal traits, social aversion (SA) and institution-based trust (TRIT), influence computer self-efficacy (CSE) and other proximal state-like differences related to IT use. The authors' results show that SA and TRIT demonstrated influence on CSE and CA at the general and specific levels of analysis, and that CSE mediates the influence of SA and TRIT on PU and PEOU, yet does not fully mediate the influence of CA on PU and PEOU. The implications of their findings for research and practice are discussed, as well as avenues for future research.
- Published
- 2014
225. Perspectives on numerical data quality in IS research
- Author
-
Jason Bennett Thatcher, James R. Marsden, and David E. Pingry
- Subjects
Information Systems and Management ,Arts and Humanities (miscellaneous) ,Computer science ,Data quality ,Developmental and Educational Psychology ,Data science ,Information Systems ,Management Information Systems - Published
- 2019
226. Political Affiliation in Resumes: Loathing, Disidentification, and the Dark Side of Assessment
- Author
-
Wenxi Pu, Philip L. Roth, Jason Bennett Thatcher, and Phil Bobko
- Subjects
Politics ,medicine.anatomical_structure ,Great Rift ,Political science ,Political economy ,medicine ,Globe ,General Medicine ,Test (assessment) - Abstract
Members of major political parties in the United States view each other much more negatively than at any time in the past several decades, and political discord is common around the globe. To test ...
- Published
- 2019
227. Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use
- Author
-
Polites, Greta L., primary, Serrano, Christina, additional, Thatcher, Jason Bennett, additional, and Matthews, Kevin, additional
- Published
- 2018
- Full Text
- View/download PDF
228. ICIS 2017 Panel Report: Break Your Shackles! Emancipating Information Systems from the Tyranny of Peer Review
- Author
-
Chua, Cecil Eng Huang, primary, Thatcher, Jason Bennett, additional, Niederman, Fred, additional, Chan, Yolande E., additional, and Davidson, Elizabeth J., additional
- Published
- 2018
- Full Text
- View/download PDF
229. How Much is Too Much: Employee Monitoring, Surveillance, and Strain.
- Author
-
Singh, Tripti, Johnston, Allen C., and Thatcher, Jason Bennett
- Subjects
SECURITY management ,EMPLOYEE surveillance ,STRAIN theory (Sociology) ,ELECTRONIC monitoring in the workplace ,SOCIAL media - Abstract
To maintain security, organizations use increasingly sophisticated methods to monitor employees, such as checking emails, tracking employee's website connections, collecting keystrokes, and surveilling social media activity. While electronic monitoring and surveillance (EM/S) practices represent an attempt to secure the firm's data and more, they also may have an unintended consequence of creating strain among employees. In this study, we examine EM/S practices, the characteristics of those practices which cause strain and the negative, deviant and non-compliant behaviors the strain evoke in the EM/S subjected employees. We draw from the techno-stress and EM/S literature to build a research model that describes the relationship between EM/S, strain, and employees' EM/S related deviant and non-compliant outcomes. The research concludes with the discussion of our plan for testing the research model and its potential implications for research. [ABSTRACT FROM AUTHOR]
- Published
- 2019
230. Advancing operations management theory using exploratory structural equation modelling techniques.
- Author
-
Roberts, Nicholas, Thatcher, Jason Bennett, and Grover, Varun
- Subjects
STRUCTURAL equation modeling ,EMPIRICAL research ,SAMPLE size (Statistics) ,LEAST squares ,THEORY ,MEASUREMENT - Abstract
The structural equation modelling (SEM) technique has been touted as a useful tool for tightening links between theoretical and empirical operations management (OM) research. Despite SEM's increasing prominence in the field, leading scholars continue to call for a deeper infusion of theory into empirical OM research. To strengthen ties between theory and analysis in OM research, this study evaluates previous OM applications of SEM and identifies specific ways we can use SEM to advance operations management theory. Through judicious use of SEM techniques, we believe that OM researchers have the opportunity to confirm and extend existing theoretical frameworks. Further, we offer guidance on how to operationalise measurement models such that researchers accurately depict the causality of a construct. To demonstrate how to advance theory, we use an illustrative example of SEM in an OM context based upon data gathered from a survey of over 200 respondents. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
231. Phishing Tests Are Necessary. But They Don't Need to Be Evil.
- Author
-
Wright, Ryan and Thatcher, Jason Bennett
- Subjects
PHISHING ,MANAGEMENT information systems ,INFORMATION resources management ,TEAMS in the workplace - Abstract
When done correctly, phishing test are important part of any cybersecurity program, but companies need to reconsider how to empower employees rather than to disenfranchise them. When security teams foster direct communication lines with employees they protect, they are likely to get a better streetlevel view of how countermeasures, such as phishing tests, impact company culture. Given that phishing tests routinely help cybersecurity professionals spot gaps in defenses and shore them up, how can organizations stop employees from regarding them as unfair, unethical, and unjust?. [Extracted from the article]
- Published
- 2021
232. Electronic medical record compliance and continuity in delivery of care: an empirical investigation in a combat environment
- Author
-
Nicholas Roberts, Mark Mellott, and Jason Bennett Thatcher
- Subjects
Telemedicine ,050208 finance ,Process management ,Combat support ,business.industry ,Health Policy ,05 social sciences ,Health services research ,Health Informatics ,Telehealth ,Health informatics ,Health administration ,Nursing ,0502 economics and business ,Sanctions ,Medicine ,business ,Implementation ,050203 business & management - Abstract
Electronic medical records (EMRs) are central to continuity in delivery of care in a combat environment. Yet, despite their benefits, technological advances, and legislation mandating their use, EMRs are not widely diffused in the U.S. military. Several contextual factors, such as armed conflict, multiple layers of bureaucracy, inconsistent rotation schedules, and competing goals, contribute to the complexity and difficulty of EMR implementation in a combat environment. This study applies a principal–agent perspective to understand barriers to EMR policy compliance in the U.S. military. Using a unique data set collected over a 105-week period, we investigate the implementation and effect of monitoring and sanctions on EMR compliance in combat support hospitals. Our results show that monitoring and sanctions positively impact the rate of EMR completion, yet they have no effect on the rate of EMRs started. Our results have implications for research and policy on EMR compliance and implementation in vertically integrated healthcare systems.
- Published
- 2013
233. Social Media in Employee-Selection-Related Decisions
- Author
-
Philip L. Roth, Chad H. Van Iddekinge, Jason Bennett Thatcher, and Philip Bobko
- Subjects
business.industry ,Strategy and Management ,05 social sciences ,Personnel selection ,050109 social psychology ,Public relations ,New class ,Work (electrical) ,Job performance ,0502 economics and business ,0501 psychology and cognitive sciences ,Social media ,Sociology ,Human resources ,business ,Employee selection ,050203 business & management ,Finance ,Diversity (business) - Abstract
Social media (SM) pervades our society. One rapidly growing application of SM is its use in personnel decision making. Organizations are increasingly searching SM (e.g., Facebook) to gather information about potential employees. In this article, we suggest that organizational practice has outpaced the scientific study of SM assessments in an area that has important consequences for individuals (e.g., being selected for work), organizations (e.g., successfully predicting job performance or withdrawal), and society (e.g., consequent adverse impact/diversity). We draw on theory and research from various literatures to advance a research agenda that addresses this gap between practice and research. Overall, we believe this is a somewhat rare moment in the human resources literature when a new class of selection methods arrives on the scene, and we urge researchers to help understand the implications of using SM assessments for personnel decisions.
- Published
- 2013
234. Can we have fun @ work? The role of intrinsic motivation for utilitarian systems
- Author
-
Jennifer E. Gerow, Ramakrishna Ayyagari, Philip L. Roth, and Jason Bennett Thatcher
- Subjects
Knowledge management ,business.industry ,Computer science ,05 social sciences ,02 engineering and technology ,Library and Information Sciences ,Moderation ,Structural equation modeling ,Information science ,Management information systems ,020204 information systems ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,050211 marketing ,Strategic information system ,Soft systems methodology ,Technology acceptance model ,business ,Information Systems ,Cognitive psychology - Abstract
Since the introduction of the Motivational Technology Acceptance Model in 1992, many researchers have considered both extrinsic and intrinsic motivation as antecedents of intent to use and actual use of a system. However, it has been a long-standing and largely unchallenged assumption that intrinsic motivation (i.e., fun or enjoyment) is a more dominant predictor of hedonic (fun) application use and that extrinsic motivation (i.e., usefulness) is a more dominant predictor of utilitarian (practical) application use. In this article, we probe whether system type serves as a boundary condition (i.e., moderator) for understanding an individual’s interaction with information technology. Specifically, we examine whether perceived enjoyment’s influence on perceived ease of use, perceived usefulness, intention, and use varies with system type. On the basis of a meta-analytic structural equation modeling analysis of 185 studies between 1992 and February 2011, our findings suggest intrinsic motivation is equally relevant for predicting intentions toward using and actual use of both hedonic and utilitarian systems. Therefore, our meta-analytic results call into question the rigidity of the assumption that system type is a ‘boundary condition’ for understanding individuals’ interaction with information technology. The implications of these results for research and practice are discussed.
- Published
- 2013
235. The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use
- Author
-
Baker, Elizabeth White, Thatcher, Jason Bennett, Gundlach, Michael, and McKnight, D. Harrison
- Subjects
Self-efficacy (Psychology) -- Analysis ,Information technology -- Usage ,Trust (Psychology) -- Analysis ,Computers -- Usage ,Information technology ,Software/hardware leasing ,Computers and office automation industries - Abstract
Prior research has shown that proximal states are important mechanisms through which distal states relate to IT usage. In particular, the influence of distal traits tied to social activity has not been incorporated into the nomological network surrounding information technology (IT) use. Addressing this literature gap, the authors develop their research model using Social Cognitive Theory and examine how two distal traits, social aversion (SA) and institution-based trust (TRIT), influence computer self-efficacy (CSE) and other proximal state-like differences related to IT use. The authors' results show that SA and TRIT demonstrated influence on CSE and CA at the general and specific levels of analysis, and that CSE mediates the influence of SA and TRIT on PU and PEOU, yet does not fully mediate the influence of CA on PU and PEOU. The implications of their findings for research and practice are discussed, as well as avenues for future research., Author(s): Elizabeth White Baker, Cameron School of Business, University of North Carolina - Wilmington, Wilmington, NC, USA, Jason Bennett Thatcher, College of Business and Behavioral Science, Clemson University, Clemson, SC, [...]
- Published
- 2014
- Full Text
- View/download PDF
236. Tacrolimus Modulates TGF-β Signaling to Induce Epithelial-Mesenchymal Transition in Human Renal Proximal Tubule Epithelial Cells
- Author
-
Craig Slattery, Michael P. Ryan, Hilary Cassidy, Tara McMorrow, and Jason Bennett
- Subjects
0301 basic medicine ,Pathology ,medicine.medical_specialty ,030232 urology & nephrology ,lcsh:Medicine ,SMAD ,Article ,03 medical and health sciences ,0302 clinical medicine ,Fibrosis ,Renal fibrosis ,Medicine ,Epithelial–mesenchymal transition ,tacrolimus ,business.industry ,Mesenchymal stem cell ,fibrosis ,lcsh:R ,General Medicine ,medicine.disease ,Epithelial-mesenchymal transition ,Calcineurin ,030104 developmental biology ,Cancer research ,Stem cell ,business ,Myofibroblast - Abstract
Epithelial-mesenchymal transition (EMT), a process which describes the trans-differentiation of epithelial cells into motile mesenchymal cells, is pivotal in stem cell behavior, development and wound healing, as well as contributing to disease processes including fibrosis and cancer progression. Maintenance immunosuppression with calcineurin inhibitors (CNIs) has become routine management for renal transplant patient, but unfortunately the nephrotoxicity of these drugs has been well documented. HK-2 cells were exposed to Tacrolimus (FK506) and EMT markers were assessed by RT PCR and western blot. FK506 effects on TGF-β mRNA were assessed by RT PCR and TGF-β secretion was measured by ELISA. The impact of increased TGF-β secretion on Smad signaling pathways was investigated. The impact of inhibition of TGF-β signaling on EMT processes was assessed by scratch-wound assay. The results presented in this study suggest that FK506 initiates EMT processes in the HK-2 cell line, with altered expression of epithelial and myofibroblast markers evident. Additionally, the study demonstrates that FK506 activation of the TGF-β/ SMAD pathways is an essential step in the EMT process. Overall the results demonstrate that EMT is heavily involved in renal fibrosis associated with CNI nephrotoxicity.
- Published
- 2016
237. Examining Academic Support After Concussion for the Adolescent Student-Athlete: Perspectives of the Athletic Trainer
- Author
-
Michelle A. Cleary, Tricia M. Kasamatsu, Tamara C. Valovich McLeod, Jason Bennett, and Keith E. Howard
- Subjects
medicine.medical_specialty ,Adolescent ,Trainer ,Physical Therapy, Sports Therapy and Rehabilitation ,Context (language use) ,Medical care ,03 medical and health sciences ,0302 clinical medicine ,Cognition ,030225 pediatrics ,Surveys and Questionnaires ,Concussion ,Medicine ,Humans ,Learning ,Orthopedics and Sports Medicine ,Interdisciplinary communication ,Brain Concussion ,Original Research ,Medical education ,Physical Education and Training ,Schools ,business.industry ,030229 sport sciences ,General Medicine ,medicine.disease ,Faculty ,Academic support ,Cross-Sectional Studies ,Athletic Injuries ,Physical therapy ,Interdisciplinary Communication ,Student athletes ,business - Abstract
Student-athletes may require cognitive rest and academic support after concussion. Athletic trainers (ATs) in secondary schools are uniquely positioned to provide medical care and to collaborate with school professionals while managing concussions. However, little is known regarding return-to-learn policies and their implementation in secondary schools.Context: To examine ATs' perspectives on return to learn, cognitive rest, and communication with school professionals after concussion.Objective: Cross-sectional study.Design: Web-based survey.Setting: A total of 1124 secondary school ATs completed the survey (28.5% response rate). The majority of participants were employed full time (752/1114 [67.5%]) in public schools (911/1117 [81.6%]).Patients or Other Participants: School and AT employment characteristics, demographics, number of concussions evaluated annually, and perceptions of school professionals' familiarity with ATs' responsibilities were independent variables.Main Outcome Measure(s): Of the ATs, 44% reported having an existing return-to-learn policy. The strongest predictor of a return-to-learn policy was frequent communication with teachers after concussion (odds ratio = 1.5; 95% confidence interval = 1.2, 1.7). Most ATs recommended complete cognitive rest (eg, no reading, television; 492/1087 [45.3%]) or limited cognitive activity based upon symptoms (391/1087 [36.0%]). Common academic accommodations were postponed due dates (789/954 [82.7%]), rest breaks (765/954 [80.2%]), and partial attendance (740/954 [77.6%]). Athletic trainers self-reported as primary monitors of health (764/1037 [73.7%]) and academic progression (359/1011 [35.5%]). The strongest predictor of ATs' communication with school professionals was their perception of school professionals' understanding of ATs' roles.Results: Overall, ATs followed best practices for cognitive rest and return to learn after concussion. Although ATs are central to the management of student-athletes' physical health after concussion, school professionals may be better suited to monitor academic progress. Increased communication between the AT and school professionals is recommended to monitor recovery and facilitate academic support for symptomatic student-athletes.Conclusions
- Published
- 2016
238. Mobile Phone Identity
- Author
-
Jason Bennett Thatcher, Michelle Carter, and Varun Grover
- Subjects
Mobile phone ,business.industry ,Internet privacy ,Identity (social science) ,Psychology ,business - Published
- 2016
239. The Moderating Effects of Privacy Restrictiveness and Experience on Trusting Beliefs and Habit: An Empirical Test of Intention to Continue Using a Social Networking Website
- Author
-
Nancy K. Lankton, Jason Bennett Thatcher, and D.H. McKnight
- Subjects
Information privacy ,business.industry ,Strategy and Management ,media_common.quotation_subject ,Internet privacy ,Theory of reasoned action ,Empirical research ,Continuance ,Habit ,Electrical and Electronic Engineering ,Set (psychology) ,Psychology ,business ,Restrictiveness ,Personally identifiable information ,media_common - Abstract
While some online social networking (OSN) websites, such as Facebook, have reported sustained growth, others, such as Bebo, have not. This study investigates the factors that influence users' intentions to continue using these websites. We adapt the theory of reasoned action and develop a model depicting how trusting beliefs, habit, attitude, and subjective norm lead to continuance intention. We propose that trusting beliefs and habit will have differential effects depending on the levels of privacy restrictiveness and site experience. An analysis of data collected from Facebook users shows that the effects of trusting beliefs on continuance intention diminish as OSN users become more experienced, yet, do not diminish when users set privacy controls high. The latter finding contradicts theory positing control and trusting beliefs are substitutes. The finding that the trusting belief-continuance intention relationship is not significant when experience is high demonstrates that trusting beliefs and experience interact. We also show that habit is a stronger predictor when users restrict their personal information. However, contrary to predictions, habit shapes intention among users with both high and low experience. These findings explain how habit and trusting beliefs predict continuance intention in the new OSN environment and have both practical and research implications.
- Published
- 2012
240. The Grass is Always Greener on The Other Side: A Test of Present and Alternative Job Utility on IT Professionals’ Turnover
- Author
-
Lee P. Stepina, Kevin Craig, Michael Dinger, and Jason Bennett Thatcher
- Subjects
ComputingMilieux_THECOMPUTINGPROFESSION ,business.industry ,Process (engineering) ,Strategy and Management ,Information technology ,Cognition ,Variance (accounting) ,Test (assessment) ,Research model ,Work (electrical) ,Order (business) ,Electrical and Electronic Engineering ,Marketing ,business - Abstract
The costs associated with the turnover of information technology (IT) professionals continue to draw the attention of IT managers and researchers. Although a weak labor market has limited the quantity of turnover, organizations' most skilled IT personnel are still coveted and valuable resources. These IT professionals are also those most equipped to leave their firm and find new work. In order to reduce costs, retain key employees, and manage turnover, managers need to understand the factors that drive quitting behavior. The research model suggests that the utility of present and alternative IT work are key cognitive influences on an IT professional's decision to search for new employment, intention to quit, and, ultimately, turnover. We test the research model using longitudinal data that include actual turnover behavior. The research model explains 44% of the variance in intention to quit and 13% of the variance in actual turnover. After establishing the influence of utility on the quitting process, we conduct additional analyses to identify the elements of present and alternative job utility that are the most salient for IT professionals' quitting processes. From the additional analyses, we derive specific guidance to practice on the management of IT professionals.
- Published
- 2012
241. Sustained therapeutic effects of percutaneous tibial nerve stimulation: 24-month results of the STEP study
- Author
-
Leslie Wooldridge, Scott MacDiarmid, Nicholas Franco, Craig E. McCoy, Donna J. Carrico, Kenneth M. Peters, Ansar U. Khan, and Jason Bennett
- Subjects
Adult ,Male ,medicine.medical_specialty ,Urology ,Electric Stimulation Therapy ,Urinary incontinence ,Severity of Illness Index ,law.invention ,Randomized controlled trial ,law ,Surveys and Questionnaires ,Severity of illness ,medicine ,Humans ,Nocturia ,Percutaneous tibial nerve stimulation ,Adverse effect ,Prospective cohort study ,Aged ,Aged, 80 and over ,Urinary Bladder, Overactive ,business.industry ,Urinary Incontinence, Urge ,Middle Aged ,medicine.disease ,Treatment Outcome ,Overactive bladder ,Quality of Life ,Physical therapy ,Female ,Neurology (clinical) ,Tibial Nerve ,medicine.symptom ,business - Abstract
Aims To evaluate the safety, sustained effectiveness, and treatment interval for percutaneous tibial nerve stimulation (PTNS) for overactive bladder (OAB) therapy through 24 months. Methods A prospective study following treatment success after 12 weekly PTNS treatments, subjects were prescribed a 14-week tapering protocol, followed by ongoing therapy with a Personal Treatment Plan determined by the investigator and subject to sustain subject OAB symptom improvement. Questionnaires were completed every 3 months, voiding diaries every 6 months; adverse events were reported throughout. Results Of 50 subjects enrolled, 35 remained in the study at 24 months. During the 24 months following initial treatment success and a 14-week tapering protocol, mean treatments per month was 1.3. Voiding diary and OAB-q data demonstrate sustained improvement reported at 13 weeks through 24 months. Improvements in frequency, urge incontinence episodes, night-time voids and moderate-to-severe urgency episodes from voiding diaries at 6, 12, 18, and 24 months were statistically significant compared to baseline (prior to initial 12 weekly treatments). Compared to baseline, OAB-q symptom severity scores and health related quality of life scores were statistically significant for improvement at each tested time point. Five mild adverse events of unknown relation to treatment were reported. Conclusion Sustained safety and efficacy of PTNS were demonstrated over 24 months with initial success after 12 weekly treatments, followed by a 14-week prescribed tapering protocol and a Personalized Treatment Plan. With an average of 1.3 treatments per month, PTNS therapy is a safe, durable, and valuable long-term OAB treatment option to sustain clinically significant OAB symptom control. Neurourol. Urodynam. 32: 24–29, 2013. © 2012 Wiley Periodicals, Inc.
- Published
- 2012
242. Does Technology Trust Substitute Interpersonal Trust?
- Author
-
Xin Li, Guang Rong, and Jason Bennett Thatcher
- Subjects
Human-Computer Interaction ,Dual role ,Strategy and Management ,Data_MISCELLANEOUS ,Interpersonal communication ,Psychology ,Social psychology ,Computer Science Applications ,Research model - Abstract
While an increasing number of trust studies examine technological artifacts as trust recipients, there is still a lack of basic understanding of how technology trust relates to traditional trust and its role within the broader nomological net articulated in trust research. This paper suggests that technology trust is distinct from interpersonal trust (i.e., trust in humans) due to the different core characteristics of the trustees. To examine these differences, the authors first develop and validate a measure of technology trust comprised of IT-specific belief sources. Then, they articulate a research model that compares and contrasts technology trust and interpersonal trust. This study provides evidence that technology trust is associated with, yet distinct from, interpersonal trust. The authors found technology trust plays a dual role in the nomological net tied to individual intended behavior – exerting a direct and an indirect influence on a trust outcome. Rather than suggesting that technology trust substitutes for interpersonal trust, the findings suggest that technology trust complements interpersonal trust in affecting purchase intention.
- Published
- 2012
243. Post-Acceptance Intentions and Behaviors
- Author
-
Katherine M. Chudoba, Pamela E. Carter, Kent Marett, and Jason Bennett Thatcher
- Subjects
business.industry ,Strategy and Management ,media_common.quotation_subject ,Information technology ,Cognition ,Context (language use) ,Usability ,Computer Science Applications ,Test (assessment) ,Human-Computer Interaction ,Personal control ,Technology acceptance model ,business ,Psychology ,Social psychology ,Autonomy ,media_common - Abstract
Due to its extensive use for the study of information technology adoption and use, the Technology Acceptance Model (TAM) serves as an ideal base model for the study of post-acceptance IT diffusion outcomes. The research presented in this paper incrementally builds on TAM-based research to gain meaningful insights into the potential differences individuals’ exhibit in three types of diffusion outcomes in a post-acceptance context. The authors model and test the effects of perceived usefulness and perceived ease of use on intentions to use, intentions to explore, and trying to innovate – IT diffusion outcomes proposed as vital in a post-acceptance context. In addition to TAM predictive variables, the authors investigate how autonomy, a personal control factor, and subjective norms, a social factor, influence individuals’ intentions toward and behaviors associated with technology use. The findings suggest cognitive intention outcomes are more likely to be influenced by technology-related factors, while behavioral outcomes are more likely to be influenced by social and personal control factors in post-acceptance contexts. Implications of the study for practice and future research are also discussed.
- Published
- 2012
244. Conceptualizing models using multidimensional constructs: a review and guidelines for their use
- Author
-
Nicholas Roberts, Greta L. Polites, and Jason Bennett Thatcher
- Subjects
Information management ,Computer science ,Management science ,05 social sciences ,Library and Information Sciences ,Business model ,Information science ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Management information systems ,Empirical research ,0502 economics and business ,Information system ,050211 marketing ,Strategic information system ,Soft systems methodology ,050203 business & management ,Information Systems - Abstract
While information on multidimensional constructs and empirical methods has become more accessible, there remain substantial challenges to theorizing about their form and implications. There are at ...
- Published
- 2012
245. Trust in a specific technology
- Author
-
Jason Bennett Thatcher, Michelle Carter, D. Harrison McKnight, and Paul F. Clay
- Subjects
Knowledge management ,General Computer Science ,business.industry ,Vendor ,Virtual team ,Information technology ,Nomological network ,Interpersonal communication ,Management Information Systems ,Information system ,Computational trust ,business ,Construct (philosophy) ,Psychology - Abstract
Trust plays an important role in many Information Systems (IS)-enabled situations. Most IS research employs trust as a measure of interpersonal or person-to-firm relations, such as trust in a Web vendor or a virtual team member. Although trust in other people is important, this article suggests that trust in the Information Technology (IT) itself also plays a role in shaping IT-related beliefs and behavior. To advance trust and technology research, this article presents a set of trust in technology construct definitions and measures. We also empirically examine these construct measures using tests of convergent, discriminant, and nomological validity. This study contributes to the literature by providing: (a) a framework that differentiates trust in technology from trust in people, (b) a theory-based set of definitions necessary for investigating different kinds of trust in technology, and (c) validated trust in technology measures useful to research and practice.
- Published
- 2011
246. The Influence of Interactivity on E-service Offerings: An Empirical Examination of Benefits and Risks
- Author
-
J. Christopher Zimmer, Ryan T. Wright, Mauricio Featherman, Jason Bennett Thatcher, and Richard Pak
- Subjects
Service (business) ,E-services ,business.industry ,media_common.quotation_subject ,Advertising ,General Medicine ,Risk perception ,Interactivity ,Perception ,Identity theft ,Intangibility ,The Internet ,business ,media_common - Abstract
News reports of Internet-based security breaches, identity theft, fraud, and other dangers may increase the perceived risk and decrease the perceived benefits of using electronic services (or e-services). We examine whether interactivity serves as a means to diminish the perceived risks and increase the perceived benefits of using e-services. To examine interactivity‟s influence on consumers‟ perceptions, we conducted a laboratory experiment using a simulated web-based, online payment system. When compared to a non-interactive preview of an online payment system, we found that consumers who used an interactive e-service simulation reported higher perceived involvement and authenticity as well as higher intangibility and risks of e-services. Further, we found that interactivity moderated relationships such that consumers were more likely to report higher intentions to use eservices. The paper concludes with implications for research and practice.
- Published
- 2011
247. The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems
- Author
-
D. Harrison McKnight, Nicholas Roberts, Jason Bennett Thatcher, Elizabeth White Baker, and Riza Ergun Arsal
- Subjects
Knowledge management ,business.industry ,Strategy and Management ,media_common.quotation_subject ,Direct effects ,Information technology ,Cognition ,Context (language use) ,Usability ,Test (assessment) ,Empirical examination ,Perception ,Electrical and Electronic Engineering ,Psychology ,business ,media_common - Abstract
In this study, we examine trust in information technology's (IT) relationship with postadoption exploration of knowledge management systems (KMS). We introduce and distinguish between trust in IT and trust in IT support staff as object-specific beliefs that influence technology's infusion into organizations. We suggest that these object-specific beliefs' influence on intention to explore KMS is mediated by behavioral beliefs about IT (e.g., perceived usefulness and perceived ease of use). To test the model, we completed two studies. Study 1 examined users' perceptions of a knowledge portal. Study 2 examined IT professionals' perceptions of KMS. Across studies, our analysis suggests that trust in IT exerts direct effects on behavioral beliefs leading to intentions to explore KMS. Further, when compared to trust in IT support, we found that trust in IT played a more central role in shaping behavioral beliefs leading to exploration of IT. Implications for research and practice are offered.
- Published
- 2011
248. Organisational change and capability reconfiguration in information technology innovation
- Author
-
Galy, Edith, Liao, Qinyu, Adams, Garry L., and Thatcher, Jason Bennett
- Subjects
Organizational change -- Evaluation ,Technological innovations -- Evaluation ,Enterprise resource planning -- Technology application ,Enterprise resource planning ,Technology application ,Computers and office automation industries - Abstract
Byline: Edith Galy, Qinyu Liao, Garry L. Adams, Jason Bennett Thatcher This paper examines the dynamics of change resulting from organisations' attempts to modernise by implementing Enterprise Resource Planning (ERP) software, a highly complex and integrative software system. Change is an observable difference in an organisation's mode of operation and manner of shaping its environment. Some organisations treat innovations in Information Technology (IT) as a continuous incremental effort to adapt to change while other organisations embark in revolutionary change as a result of implementing IT. This study compares the differences in change mechanisms and their relationship to the performance of the new technology. Faced with the challenge of adapting to technological advances, capabilities within the organisation must be reconfigured for the organisation to realise desired competitive advantages.
- Published
- 2007
249. Social influence and perceived organizational support: A social networks analysis
- Author
-
Kristin D. Scott, Jason Bennett Thatcher, Ray Gibney, Audrey J. Murrell, and Thomas J. Zagenczyk
- Subjects
Organizational Behavior and Human Resource Management ,Social network ,business.industry ,media_common.quotation_subject ,Social environment ,Public relations ,Social relation ,Social support ,Friendship ,Social exchange theory ,Psychology ,business ,Social psychology ,Perceived organizational support ,Applied Psychology ,Social influence ,media_common - Abstract
We suggest that employees’ perceptions of organizational support (POS) are not solely a product of independent evaluations of treatment offered by the organization, but are also shaped by the social context. We argue that coworkers will directly (through inquiry via cohesive friendship and advice ties) and indirectly (through monitoring of employees structurally equivalent in advice and friendship networks) affect employees’ perceived organizational support. Network studies in the admissions department of a large public university and a private company specializing in food and animal safety products indicate that employees’ POS are similar to those of coworkers with whom they maintain advice relationships as well as to those who hold structurally equivalent positions in organizational friendship and advice networks. Our work contributes to organizational support theory by developing and testing a theoretical explanation for the relationship between the social context and perceptions of support among employees. Implications for research and practice are offered.
- Published
- 2010
250. A Study of Work-Family Conflict Among IT Professionals: Job Characteristics, Individual Values, and Management Practices
- Author
-
Lee P. Stepina, Jason Bennett Thatcher, and Michael Dinger
- Subjects
Job security ,Computational Theory and Mathematics ,Work (electrical) ,Work ethic ,Work–family conflict ,Variance (accounting) ,Psychology ,Social psychology ,Management practices ,Computer Science Applications ,Information Systems ,Variety (cybernetics) ,Test (assessment) - Abstract
In this study, we develop a model that explains the work-family conflict experienced by IT professionals. We propose two major sources of work-family conflict: the structure of work and individual mindsets toward work. Furthermore, we examine beliefs about the employer that can diminish work-family conflict. We test our hypotheses using data gathered from 126 IT professionals. Our model explains more than 45% of the variance in work-family conflict. Our findings suggest: (1) skill variety requirements increase work-family conflict, (2) work ethic positively relates to work-family conflict, (3) leisure ethic negatively relates to work-family conflict, and (4) professionalism has mixed effects on work-family conflict. Finally, we found that when IT professionals perceive high levels of job security and are satisfied with supervision, work-family conflict diminishes. The study concludes with implications for research and practice.
- Published
- 2010
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.