A well known problem in the use of information systems is the risk of data loss due to causes suc... more A well known problem in the use of information systems is the risk of data loss due to causes such as equipment failure, sabotage, or neglect. In response, users are told to make frequent backups of their data to minimize those losses. This study tests whether Protection-Motivation Theory (PMT) or the Universal Theory of Acceptance and Use of Technology (UTAUT)
2011 44th Hawaii International Conference on System Sciences, 2011
... Alina M. Chircu Bentley University achircu@bentley.edu ... Admission 1. Nurse documents exist... more ... Alina M. Chircu Bentley University achircu@bentley.edu ... Admission 1. Nurse documents existing medication list, if any, from patient conversation (H) 2. Medication list is forwarded to pharmacist (H) 3. Pharmacist creates medication administration record (MAR) 4. MAR is ...
International Journal of Accounting Information Systems, 2010
... Janvrin et al., 2008]). A proxy for technical knowledge is professional certification such as... more ... Janvrin et al., 2008]). A proxy for technical knowledge is professional certification such as a CISA, CIA, or CPA issued by professional or regulatory organizations (cf., [Congemi, 2000] and [Gallegos, 2004]). For example, evidence ...
... eg, the adoption of spreadsheets), thus focusing on voluntary rather than mandatory adoption ... more ... eg, the adoption of spreadsheets), thus focusing on voluntary rather than mandatory adoption (Rawstorne et al., 1998; Venkatesh & Davis, 2000 ... Information security policies are considered by most to be necessary (Kadam, 2002), but some research has shown that following the ...
ABSTRACT Purpose ‐ The purpose of this paper is to examine how clinical handoffs affect clinical ... more ABSTRACT Purpose ‐ The purpose of this paper is to examine how clinical handoffs affect clinical information quality (IQ) and medication administration quality. Design/methodology/approach ‐ A case study was conducted in a US hospital. The authors applied a business process management (BPM) perspective to analyze an end-to-end medication administration process and related handoffs, and accounting control theory (ACT) to examine the impact of handoffs on IQ and medication errors. Findings ‐ The study reveals how handoffs can lead to medication errors (by passing information that is not complete, accurate, timely or valid) and can help reduce errors (by preventing, detecting and correcting information quality flaws or prior clinical mistakes). Research limitations/implications ‐ The paper reports on one case study on one hospital unit. Future studies can investigate the impact of clinical IQ on patient safety across the multitude of health information technologies (e.g. computerized provider order entry (CPOE), electronic medication administration records (EMAR), and barcode medication administration systems (BCMA)) and approaches to process design and support (e.g. use of clinical pathways and checklists). Practical implications ‐ The findings can contribute to more successful design, implementation and evaluation of medication administration and other clinical processes, ultimately improving patient safety. Originality/value ‐ The paper's main contribution is the use of accounting control theory to systematically focus on IQ to evaluate and improve end-to-end medical administration processes.
Because violations of information security (ISec) and privacy have become ubiquitous in both pers... more Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified three opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT, and virtually no ISec study models or measures fear. Third, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors. This article describes the theoretical foundation of these three opportunities for improvement. We tested the nomology of PMT, including manipulated fear appeals, in two different ISec contexts that model PMT’s modern theoretical treatment more closely than do extant ISec studies. The first data collection was a longitudinal study in the context of data backups. The second study was a short-term cross-sectional study in the context of anti-malware software. Our new model demonstrated better results and stronger fit than the existing models and confirmed the efficacy of the three potential improvements we identified.
A well known problem in the use of information systems is the risk of data loss due to causes suc... more A well known problem in the use of information systems is the risk of data loss due to causes such as equipment failure, sabotage, or neglect. In response, users are told to make frequent backups of their data to minimize those losses. This study tests whether Protection-Motivation Theory (PMT) or the Universal Theory of Acceptance and Use of Technology (UTAUT)
2011 44th Hawaii International Conference on System Sciences, 2011
... Alina M. Chircu Bentley University achircu@bentley.edu ... Admission 1. Nurse documents exist... more ... Alina M. Chircu Bentley University achircu@bentley.edu ... Admission 1. Nurse documents existing medication list, if any, from patient conversation (H) 2. Medication list is forwarded to pharmacist (H) 3. Pharmacist creates medication administration record (MAR) 4. MAR is ...
International Journal of Accounting Information Systems, 2010
... Janvrin et al., 2008]). A proxy for technical knowledge is professional certification such as... more ... Janvrin et al., 2008]). A proxy for technical knowledge is professional certification such as a CISA, CIA, or CPA issued by professional or regulatory organizations (cf., [Congemi, 2000] and [Gallegos, 2004]). For example, evidence ...
... eg, the adoption of spreadsheets), thus focusing on voluntary rather than mandatory adoption ... more ... eg, the adoption of spreadsheets), thus focusing on voluntary rather than mandatory adoption (Rawstorne et al., 1998; Venkatesh & Davis, 2000 ... Information security policies are considered by most to be necessary (Kadam, 2002), but some research has shown that following the ...
ABSTRACT Purpose ‐ The purpose of this paper is to examine how clinical handoffs affect clinical ... more ABSTRACT Purpose ‐ The purpose of this paper is to examine how clinical handoffs affect clinical information quality (IQ) and medication administration quality. Design/methodology/approach ‐ A case study was conducted in a US hospital. The authors applied a business process management (BPM) perspective to analyze an end-to-end medication administration process and related handoffs, and accounting control theory (ACT) to examine the impact of handoffs on IQ and medication errors. Findings ‐ The study reveals how handoffs can lead to medication errors (by passing information that is not complete, accurate, timely or valid) and can help reduce errors (by preventing, detecting and correcting information quality flaws or prior clinical mistakes). Research limitations/implications ‐ The paper reports on one case study on one hospital unit. Future studies can investigate the impact of clinical IQ on patient safety across the multitude of health information technologies (e.g. computerized provider order entry (CPOE), electronic medication administration records (EMAR), and barcode medication administration systems (BCMA)) and approaches to process design and support (e.g. use of clinical pathways and checklists). Practical implications ‐ The findings can contribute to more successful design, implementation and evaluation of medication administration and other clinical processes, ultimately improving patient safety. Originality/value ‐ The paper's main contribution is the use of accounting control theory to systematically focus on IQ to evaluate and improve end-to-end medical administration processes.
Because violations of information security (ISec) and privacy have become ubiquitous in both pers... more Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified three opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT, and virtually no ISec study models or measures fear. Third, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors. This article describes the theoretical foundation of these three opportunities for improvement. We tested the nomology of PMT, including manipulated fear appeals, in two different ISec contexts that model PMT’s modern theoretical treatment more closely than do extant ISec studies. The first data collection was a longitudinal study in the context of data backups. The second study was a short-term cross-sectional study in the context of anti-malware software. Our new model demonstrated better results and stronger fit than the existing models and confirmed the efficacy of the three potential improvements we identified.
Uploads
Papers by Scott R Boss
This article describes the theoretical foundation of these three opportunities for improvement. We tested the nomology of PMT, including manipulated fear appeals, in two different ISec contexts that model PMT’s modern theoretical treatment more closely than do extant ISec studies. The first data collection was a longitudinal study in the context of data backups. The second study was a short-term cross-sectional study in the context of anti-malware software. Our new model demonstrated better results and stronger fit than the existing models and confirmed the efficacy of the three potential improvements we identified.
This article describes the theoretical foundation of these three opportunities for improvement. We tested the nomology of PMT, including manipulated fear appeals, in two different ISec contexts that model PMT’s modern theoretical treatment more closely than do extant ISec studies. The first data collection was a longitudinal study in the context of data backups. The second study was a short-term cross-sectional study in the context of anti-malware software. Our new model demonstrated better results and stronger fit than the existing models and confirmed the efficacy of the three potential improvements we identified.