104 research outputs found

    Relevance of Health-Related Hashtags on Twitter: A Text Mining Approach

    Get PDF
    BACKGROUND Social media platforms facilitate user interaction and impact decision making. Users prefer to use hashtags while sharing posts. Knowing the sentiment towards diabetes, bloodpressure, and obesity is fundamental to understanding the impact of these information on patients and their families. The study seeks to determine the relevance of health-related hashtags on Twitter and analyze sentiments about diabetes, obesity, blood pressure. METHOD Tweets were retrieved using synonyms for “diabetes”, “hypertension” and “obesity”. The extended knowledge discovery in data mining (KDDM) model guided our research with research objectives defined in the ‘research problem understanding’ phase. The ‘information seeking’ from Uses and Gratifications Theory (UGT) determined the success and text mining assessment criteria. Text pre-processing was done using tokenization, stop word removal, and stemming. The research objectives, text mining goals, and success criteria were answered using ‘Uses and Gratifications Theory’ (UGT). RESULTS Total 6749 tweets were extracted using RStudio. 36.41% were about blood pressure, 0.25%- diabetes, 24.43% -obesity and 6.99% -combination of two or more terms. Additional topics such as cholesterol, chia seeds, postpartum, diet, exercise were identified. Upcoming conferences like ‘#ipna’, ‘#review’, ‘#APCH2019’, ‘#cardiotwitter’ were identified. Increased user engagement – about managing blood pressure, diabetes, obesity across different age groups, as well as the consequences of increased cardio exercise for obese and diabetic users were encouraging. Tweets about advertisements specific to clothing for oversized individuals-initiated conversation among users about monitoring self-health. CONCLUSIONS Sentiment analysis can thus increase our understanding about user engagement on such platforms and potentially help improve managing public health strategically.https://scholarscompass.vcu.edu/gradposters/1105/thumbnail.jp

    PLANNING TECHNOLOGY INVESTMENTS FOR HIGH PAYOFFS: A RATIONAL EXPECTATIONS APPROACH TO GAUGING POTENTIAL AND REALIZED VALUE IN A CHANGING ENVIRONMENT

    Get PDF
    This paper examines the impact of information security breaches on organizational performance. Up to date, there have been only a few empirical academic studies that have investigated this issue and they have investigated information security breaches with the focus on the short-term impact on the market value of the firm. This study offers an alternate approach to investigate this issue as it explores the impact of breaches on financial performance of the firm, one year after the breach. Using a “matched sampling” methodology, we explored the impact of each type of breach (i.e. confidentiality, integrity, and availability) and also by IT intensity and size. Our results suggest that the direction of the impact (i.e. positive, negative) is dependent on the type of security breaches and also the impact of IT intensive firms is different from non-IT intensive firms. Our study also includes some important implications for managers and stock market investors.Information security, impact, security breach, organizational performance,confidentiality, integrity, availability

    Structuring IS Outsourcing Contracts for Mutual Gain: An Approach to Analyzing Performance Incentive Schemes

    Get PDF
    As information systems managers come under increasing pressure to improve the cost performance of information processing, outsourcing has become an important management strategy. Although information systems outsourcing is now a major industry, it is still a new decision problem for many managers. As managers gain more and more experience with IS outsourcing, satisfaction with vendor performance is becoming a major issue. Key to managing outsourcing relationships is the outsourcing contract. These contracts assign responsibilities and rewards for the parties. However, improperly or incompletely written contracts have lead to adverse problems. How then are managers to choose from a set of options that which is most appropriate for their firm? Outsourcing problems are complex and entail considerable implications for the strategy of the firm. Although many articles have appeared on outsourcing, few have extended the discussion beyond simple cost-benefit analysis. Contracts that encourage vendor performance and discourage under-performance are clearly of interest to managers. In this paper, an approach to analyzing incentive schemes and structuring outsourcing contracts for the mutual gain of the parties is presented. The approach provides managers with a strategy and techniques for analyzing some of the more subtle issues they may face when dealing with complex outsourcing decision problems

    An Integrated Framework for The Value Focused Thinking Methodology

    Get PDF
    In this paper we presented an integrated framework for the Value Focused Thinking (VFT) methodology that attempts to address issues that have not been adequately addressed. This framework provides several benefits including: the elicitation and high quality definition of objectives that incorporates organizational-oriented & domain- oriented concerns and knowledge, and the automatic generation of the alternate solutions that best satisfy the objectives, constraints and preference values. The proposed framework could contribute to a more effective application of the VFT methodolog

    Linking Investments in Telecoms to Microeconomic Outcomes in Transition Economies: Empirical Investigation

    Get PDF
    We propose and test a conceptual model allowing for investigating the microeconomic impact of investments in Telecoms,where Telecoms are used as a proxy for Information and Communications Technology (ICT) in general. While the impact ofinvestments in Telecoms on the macroeconomic outcomes in the form of productivity growth has been previouslyinvestigated, there seems to be no published research that looked at the microeconomic impact of Telecom investments

    Linking Investments in Telecoms and Economic Growth: An Empirical Analysis of Total Factor Productivity and its Determinants in the Context of Transition Economies

    Get PDF
    The limited resources of Transition Economies (TE) accentuate the need for formulation of the effective and efficient policiesfor investments in Information and Communication Technologies (ICT). However, the empirical evidence required for sounddecision making is scarce, thus prompting a call for additional studies in the area of the macroeconomic impact ofinvestments in ICT. Using time series data for the period from 1993 to 2002, we investigate the impact of investments inTelecoms on Total Factor Productivity (TFP) in the context of 18 TEs of Central Europe. The results of the data analysissuggest that while all TEs exhibited overall growth in productivity, the annual growth of the majority was inconsistent andnot determined by the increase in the levels of investments and full-time Telecom labor. The results also indicate thatintroduced for the purposes of the investigation composite proxy variable Change in Productivity may reliably serve as apredictor of TFP for eight out of eighteen TEs, thus indicating actionable paths for TEs to obtain a spillover effect frominvestments in ICT

    A Data Mining-based Exploration of Antecedents of Voluntary Knowledge Contribution to Organizational Repositories

    Get PDF
    Knowledge Management systems are often based on the assumption that employees will contribute their job related knowledge to electronic knowledge repositories, though organizations can’t force its employees to do so. In a previous work Stewart & Osei-Bryson (2013) developed and tested a research model that was based on the theory of planned behavior. In this paper we use a data mining approach to explore the same data in order to see if there could be additional hypothesis that could be worthy of future exploration

    AN EXPLORATORY EVALUATION OF THREE I.S. PROJECT PERFORMANCE MEASUREMENT METHODS

    Get PDF
    Information systems projects play an important strategic role in organisations and are key drivers to the delivery of change. Given this prominence it is essential to find measurement methods that effectively analyze and communicate the performance to its stakeholders. Further, to assure contribution to both research and practice it is essential to verify the utility of the artifacts (i.e. methods) developed to help validate or justify that the solutions are suitable for practice, and fit the needs and contexts for which it is created. Grounded in the design science paradigm, this paper reports an exploratory evaluation of the perception of certain qualities of two recently developed measurement methods (The Project Performance Scorecard and Project Objectives Measurement Model) against the traditional Triple Constraint method. An analytic scenario-based survey of fifty-one (51) participants, comprising of three (3) sets of independent sample of seventeen (17) respondents each was used. The study analyzed dimensions of task performance, ease of use, perceived usefulness, perceived semantic qualities and user satisfaction from the perspective of the participants. The preliminary study revealed encouraging results for the new methods and the general design process which can help guide current use and further refinements. The limitations of the study and future research directions are discussed

    Exploring the Impacts of Individual Styles on Security Compliance Behavior: A Preliminary Analysis

    Get PDF
    It is well known that while there is a strong correlation between adoption of ICTs and economic growth there is also a corresponding strong correlation between the adoption of ICTs and increased ICT-related technological threats that can have severe economic and other negative consequences. Within this context cybersecurity has become a major issue in both “developed” and “developing” countries, with humans being considered the “weakest link in the chain” of system security. While the cybersecurity literature has previously explored constructs such as awareness and self-efficacy to explain cybersecurity compliance behavior, there has been no exploration of the impacts of individuals’ decision styles on cybersecurity related compliance behavior and some other antecedents of such behavior. In this paper we address this issue using an exploratory approach and present a causal model for consideration in future research

    A Regression Tree Based Exploration of the Impact of Information Technology Investments on Firm Level Productivity

    Get PDF
    The issue as to whether investments in information technology (IT) contribute significantly to organizational productivity has been of major concern for many years, and various studies have lead to seemingly contradictory results. In this paper, we analyze the relationship between IT investments and firm level productivity using regression trees (RT). Use of this data mining technique represents a novel approach to identifying elements of this relationship as most previous studies have primarily used econometrics-based techniques. While the use of traditional techniques has provided valuable results, our RT-based analysis revealed additional findings that were not identified in the previous studies. For example unlike the econometric-based studies that identify a uniform impact of IT investments on productivity, our RT-based analysis suggests that IT has an impact on productivity only when Non-IT Labor expenses are within the interior interval. Also, even within this range, the impact of IT is not uniform
    • 

    corecore