119 research outputs found

    Who\u27s Afraid of the World Wide Web? An Initial Investigation into the Relative Impact of Two Salient Beliefs on Web Shopping Intent

    Get PDF
    The growth of World Wide Web consumer activity that requires that an individual place sensitive personal information online continues to increase at a phenomenal rate. This study investigates two beliefs about shopping on the web (perceived usefulness and perceived web security) to determine their impact on intent to gather information about products and to purchase products using the World Wide Web. Data from 119 university students is used to develop a scale to assess web security concerns and to perform an initial analysis. Implications are discussed

    Stretching from Punch Card/Programming to Business Data Processing to Business Information Systems

    Get PDF
    The world’s oldest undergraduate degree program in data processing and information systems at Mississippi State University turned fifty years old in 2013. In this paper, we review the pioneering activities of the program’s founder, Charles Moore, and provide insights into his foresight about the potential importance of information systems to business organizations. We explain how the program’s founding marked a shift in the epistemological view of information systems education in the mid-1960s. We show the course offerings of business data processing and information systems and the timeline at MSU over the past five decades. We also share how his efforts are instilled in the continuing development of the business information systems program at Mississippi State University to this day

    Assessing Information Technology Use over Time with Growth Modeling and Hierarchical Linear Modeling: A Tutorial

    Get PDF
    Time is an important factor in the use of information technology. However, traditional information systems research methods cannot adequately account for the dynamic nature of time-based relationships often found in longitudinal data. This shortcoming is problematic when investigating volatile relationships that evolve over time (e.g., information technology use across users, departments, and organizations). Educational, sociological, and management researchers study the influence of time using a rigorous multilevel method called growth modeling. We demonstrate the use of growth modeling in this tutorial, which is based on a semester-long study of an actual web-based university-level course content delivery system. The tutorial provides guidance on preliminary data tests, the construction and analysis of growth models using hierarchical linear modeling, and the interpretation of final results. The tutorial also describes other unique advantages of using growth modeling for IS research

    The Limits of Information: Measuring Differences Between Local and Distance Group Attitudes Toward Distance Learning

    Get PDF
    Because of the imperative of attaining advanced education in the emerging global service economy, and the difficulties involved in traveling to distant classrooms, universities are investing heavily in interactive video and other types of distance learning. While we admit the necessity to investigate these modes of instructional delivery, we also call for a fair but critical investigation of what these technologies take away from the classroom experience. We performed a quasi-experimental study to investigate just that. Students in a local and distance class taught simultaneously by one instructor were asked for their perceptions about the experience. In the main, the perceptions of students in the Distance setting were generally less favorable than their Local setting counterparts. Implications of our findings are discussed

    Sensemaking and Success in the Transition from Community Colleges to University IS/CS/CE Programs

    Get PDF
    Increasing the enrollment of women, minority, and other underrepresented populations in undergraduate information systems and computing programs is an important social issue. We explore ways of attracting and retaining community college transfer students—an important source of underrepresented students —by examining their sensemaking efforts as they transition to four-year universities. We conducted a qualitative study to test sensemaking theory and develop recommendations for retaining community college transfer students in undergraduate information systems, computer science, and computer engineering programs

    Human subjects requirements and economic education researchers

    Get PDF
    This paper presents the results of a web-based survey of economic educators who were asked about their knowledge and experience with human subjects research and the mandated federal protocols that govern such research at most American universities. The results indicate that while economic education researchers are experienced in conducting human subjects research and are aware of the federal regulations, they are not well informed about key details of the regulations. They are skeptical of the net benefits of the mandated protocols because of the perceived discouraging burdens of the paperwork that rarely result in significant modifications of their research projects. The authors conclude that recent calls for modifications to the federal regulations for classroom-based research projects may be justified given the opportunity costs of adhering to the regulations compared to the relatively low levels of perceived benefits

    Human subjects requirements and economic education researchers

    Get PDF
    This paper presents the results of a web-based survey of economic educators who were asked about their knowledge and experience with human subjects research and the mandated federal protocols that govern such research at most American universities. The results indicate that while economic education researchers are experienced in conducting human subjects research and are aware of the federal regulations, they are not well informed about key details of the regulations. They are skeptical of the net benefits of the mandated protocols because of the perceived discouraging burdens of the paperwork that rarely result in significant modifications of their research projects. The authors conclude that recent calls for modifications to the federal regulations for classroom-based research projects may be justified given the opportunity costs of adhering to the regulations compared to the relatively low levels of perceived benefits

    Trematodes of the Great Barrier Reef, Australia: emerging patterns of diversity and richness in coral reef fishes

    Get PDF
    The Great Barrier Reef holds the richest array of marine life found anywhere in Australia, including a diverse and fascinating parasite fauna. Members of one group, the trematodes, occur as sexually mature adult worms in almost all Great Barrier Reef bony fish species. Although the first reports of these parasites were made 100 years ago, the fauna has been studied systematically for only the last 25 years. When the fauna was last reviewed in 1994 there were 94 species known from the Great Barrier Reef and it was predicted that there might be 2,270 in total. There are now 326 species reported for the region, suggesting that we are in a much improved position to make an accurate prediction of true trematode richness. Here we review the current state of knowledge of the fauna and the ways in which our understanding of this fascinating group is changing. Our best estimate of the true richness is now a range, 1,100–1,800 species. However there remains considerable scope for even these figures to be incorrect given that fewer than one-third of the fish species of the region have been examined for trematodes. Our goal is a comprehensive characterisation of this fauna, and we outline what work needs to be done to achieve this and discuss whether this goal is practically achievable or philosophically justifiable

    A Common Variant at the 14q32 Endometrial Cancer Risk Locus Activates AKT1 through YY1 Binding.

    Get PDF
    A recent meta-analysis of multiple genome-wide association and follow-up endometrial cancer case-control datasets identified a novel genetic risk locus for this disease at chromosome 14q32.33. To prioritize the functional SNP(s) and target gene(s) at this locus, we employed an in silico fine-mapping approach using genotyped and imputed SNP data for 6,608 endometrial cancer cases and 37,925 controls of European ancestry. Association and functional analyses provide evidence that the best candidate causal SNP is rs2494737. Multiple experimental analyses show that SNP rs2494737 maps to a silencer element located within AKT1, a member of the PI3K/AKT/MTOR intracellular signaling pathway activated in endometrial tumors. The rs2494737 risk A allele creates a YY1 transcription factor-binding site and abrogates the silencer activity in luciferase assays, an effect mimicked by transfection of YY1 siRNA. Our findings suggest YY1 is a positive regulator of AKT1, mediating the stimulatory effects of rs2494737 increasing endometrial cancer risk. Identification of an endometrial cancer risk allele within a member of the PI3K/AKT signaling pathway, more commonly activated in tumors by somatic alterations, raises the possibility that well tolerated inhibitors targeting this pathway could be candidates for evaluation as chemopreventive agents in individuals at high risk of developing endometrial cancer.The QIMR Berghofer groups were supported by a Rio Tinto Ride to Conquer Cancer (RTCC)/Weekend to End Women's Cancers (WEWC) Grant and NHMRC project grants 1058415 to SLE and 1031333 to ABS. ABS is supported by an NHMRC Senior Research Fellowship (1061779). DFE is a Principal Research Fellow of CR-UK.This is the author accepted manuscript. It is currently under an indefinite embargo pending publication by Cell Press
    • …
    corecore