1,717 research outputs found

    On some street ecologies

    Get PDF
    Reflection on the plant life and other ecologies\ua0in Berlin's streets linking to the relationship of plants and urbanism in Australian and British\ua0ecologie

    Excuses and Intelligibility in Criminal Law

    Get PDF

    Exploring Hospitals\u27 Use of Facebook: Thematic Analysis

    Get PDF
    Background: Although health care organizations such as hospitals and clinics have widely embraced social media as a means to educate the community on health topics and increase patient loyalty and satisfaction, little is known about the content these organizations actually share when using social media channels. Objective: This study aimed to explore the types of content US hospitals post on their Facebook pages and how hospitals’ Facebook activities differ with regard to content types. Methods: We collected and thematically analyzed more than 1700 Facebook posts made over a 3-month period by 17 US hospitals. During the first phase, the 2 researchers coded a set of 159 posts and created an initial thematic web of content. During the second phase, the researchers coded the remaining posts and then revised, refined, and validated the initial web of content accordingly. Coding consensus was achieved on 1184 of the 1548 analyzable sampled posts (76.49%). Results: We identified a list of 13 unique health social media post themes and classified those themes into 3 thematic groups that included announcing, sharing, and recognizing activities. The most frequently used theme was sharing health information, which appeared in 35.81% (424/1184) of the posts analyzed. Such posts sought to provide health tips and advice to community members. Recognizing special days and recognizing employees were the second and third most frequently used themes, respectively, with 14.95% (177/1184) and 11.82% (140/1184) of the posts containing those themes. The frequency of these themes was surprising as the content was geared more toward stakeholders internal to the organization, although most previous literature has focused on social media as a tool to connect with external stakeholders. In addition, we found many of the posts involved more than one theme, and selected sets of themes co-occurred frequently. For example, 25.4% (45/177) of the posts recognizing special days also included content to share health information, and approximately 38% (32/85) of the posts announcing research activities also included content to share health information. Finally, we found similarities and differences between the sampled hospitals in terms of the types of content they posted more frequently on their Facebook pages. Conclusions: Hospitals use Facebook as an inexpensive way to educate people on health and wellness topics and to communicate different types of information and news to the public audience. Hospitals and clinics that are expanding their social media activities or are starting to embark on social media strategies can use the results of this study to better formulate their activities on Facebook

    Prospect Theory and Information Security Investment Decisions

    Get PDF
    Most articles that discuss the economics of security focus on the use of rational choice decision models for evaluating investment alternatives. However, security investment decisions involve risk and several researchers have noted that risk related decisions often violate the fundamental principles of rational choice decision models. Accordingly, we assert that problems exist with using these models to explain security investment decisions. Further, we believe that the development of prescriptive models to guide investment decisions requires a deeper understanding of the cognitive processes involved. To test these ideas, we introduce a study that uses prospect theory to analyze security practitioners’ investment decisions. The article includes a discussion of our methodology to electronically assess security practitioners’ preference patterns. Additionally, we discuss data collection efforts which are currently in-process and future plans to analyze the collected data. Interim analytical results of data received prior to AMCIS 2012 will be presented to conference attendees

    Personality, Gender and Careers in Information Technology

    Get PDF
    The downturn in information technology enrollment numbers in colleges and universities has spurred a stream of research focusing on identifying factors that inhibit students’ interest in information technology. Most of these studies measure individuals’ perceptions and beliefs. We argue that the profession is composed of multiple occupations and those occupations have different characteristics concerning the work performed, the opportunities available, and the people who are employed in those occupations. We investigate the relationship between personality and the intent of students to pursue careers in the information technology field. Last, we examine if there is a gender personality profile for students who decide to pursue careers in information technology. Our findings can be used by researchers and practitioners to better describe to students the specific opportunities and career paths available within the IT profession

    A Conceptual Replication of the Unified Model of Information Security Policy Compliance

    Get PDF
    Conceptual replications offer robust tests of theory by subjecting the relational notions of a scientific model to evaluation using alternate instruments, treatments, and subject pools. This study performs a conceptual replication of Moody, Siponen, and Pahnila’s 2018 empirical analysis that integrated elements of eleven theoretical models to produce the unified model of information security policy compliance (UMISPC). This replication employed a substantially more parsimonious instrument, using modestly revised treatment scenarios targeted toward a U.S. audience of 218 IT professionals as opposed to the Finnish graduate students used in the original study. Our results indicate that UMISPC is robust across variations in instruments and subject pools. The replicated model explained approximately two thirds of the variance in information systems security policy compliance intentions across both studies. In contrast, competing models such as the theory of planned behavior and extended protection motivation theory exhibited large changes in explanatory power when the instrument and subject pool were modified. This suggests that UMIPSC may be a superior theoretical model for consistently evaluating security policy compliance behavioral intentions among varied populations. Our results also indicate that the theoretical model is capable of detecting and integrating a wide range of behavioral antecedents that may have differing levels of influence among various populations

    Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication

    Get PDF
    The current study presents a conceptual replication of Liang and Xue’s (2010) test of their proposed Technology Threat Avoidance Theory (TTAT). Whereas the original study investigated individuals’ spyware related threat perceptions, avoidance motivations, and behaviors; we applied the original study’s research questions, hypotheses, and model to the more general context of malware. Results from a sample of 486 computer users revealed that safeguard effectiveness, safeguard cost, and self-efficacy are relatively robust predictors of avoidance motivation across varied settings. Perceived severity is a strong predictor of perceived threat, however the impact of this overall threat perception (along with its perceived susceptibility antecedent) may be less stable in predicting avoidance motivation under changing contextual/environmental circumstances. The results suggest that TTAT is a valid foundational framework for examining user behavior related to malicious software. Future research should investigate additional predictors of avoidance motivation such as risk propensity, distrust, and impulse control to improve the power of the model. Additionally, the current TTAT instrument offers several opportunities for enhanced measurement accuracy through item modifications, scale anchor revisions, and improvements in parsimony
    • …
    corecore