Skip to main content
Apply

Spears School of Business

Open Main MenuClose Main Menu

      MSIS Research Abstract Report 2020

Assigning students to academic majors
We study the problem of assigning students to academic majors, develop a model which integrates student preferences, major requirements, and capacity limitations.  We also develop efficient algorithms to solve the model. 

Sponsor: Oklahoma State University
PI/PD: Ali Amiri

 

The application grouping problem in Software-as-a-Service (SaaS) networks
Software as a Service (SaaS) provided by cloud computing has recently gained widespread adoption.  Because of increased competition in the SaaS market, it is essential for a SaaS provider to properly design its computing system.  Significant gains can be achieved by efficiently clustering software applications.  This paper focuses on the application grouping problem encountered in computer clustering in SaaS networks.  We present integer programming formulations and propose an efficient solution procedure based on the column generation technique applied to the problem.

Sponsor: Oklahoma State University
PI/PD: Ali Amiri

 

The set covering problem with feature selection: A column generation-based solution approach
We study the Set Covering Problem with Feature Selection (SCF).  The problem has wide applications especially in the areas of the design of feature limited demonstration software, facility location and customer segmentation.  In the SCF, there is a set of features that the users are interested in.  Each opened facility has to be assigned a given number of features. A user is covered by a facility only if the facility includes a minimum number of features that the user is interested in.  The goal is to determine the minimum number of facilities to setup that cover all users. 
Sponsor: Oklahoma State University
PI/PD: Ali Amiri

 

A Lagrangean based solution algorithm for the knapsack problem with setups
We consider the knapsack problem with setups which is a generalization of the classical knapsack problem where the items belong to families and an item can be placed in the knapsack only if its family is selected.  The problem has received increasing attention by researchers because of its theoretical significance and practical applications related to resource allocation.  This paper presents an algorithm based on a Lagrangean relaxation of the problem that produces solutions whose quality can be assessed automatically with the algorithm itself without ever knowing the optimal solutions. 
Sponsor: Oklahoma State University
PI/PD: Ali Amiri

 

Quantum Information Systems: Harnessing Individual and Group Energies

In this working paper, we propose that an organization is a living organism that generates energy to achieve certain outcomes. We propose that the relationship between the inputs (individual and group use of information systems) and the outputs (strategic alignment and competitive advantage) of a system (an organization) depends on the basic principles of quantum mechanics. Specifically, we connect the neuroscience research that addresses qualia (individual) and quale (group) to the Management Information Systems (MIS) research. In this paper, we proffer our research objective, discuss our constructs, and present our interview process and survey items that we plan to conduct and administer.

Sponsors: Oklahoma State University, Virginia Military Institute

PI/PDs: Corey Baham

Virginia Military Institute: Jennifer Gerow

Indiana University of Pennsylvania: James Rodgers

 

Applying a Layered Framework to Disaster Recovery

Building highly available information technology (IT) infrastructures has become critical to many corporations’ survival. However, the disaster recovery (DR) industry lacks a common enterprise framework to capitalize on the value that DR provides corporations. To address this problem, we propose a new conceptualization for the DR of enterprise architecture. Further, we present a case study, its findings, and their implications for DR. We demonstrate how our layered framework of enterprise architecture provides a unified understanding of the DR practice, which one can then use to support decision making and corporate alignment of the DR practice and its associated technology.

Sponsors: Oklahoma State University, Louisiana State University

PI/PDs: Corey Baham

Practitioners: Andres Calderon

Louisiana State University: Rudy Hirschheim

 

An Agile Methodology for the Disaster Recovery of Information Systems under Catastrophic Scenarios

This paper explores the use of agile methodologies for improving the recovery of complex systems under catastrophic scenarios. The proposed adaptation of Kanban presents a novel, agile approach to solving the challenges of the traditional disaster recovery methodologies when confronted with catastrophic scenarios and the inevitable cascading consequences in a complex organizational environment. An action research approach is employed to test the implementation of the proposed methodology during a complex scenario at a large enterprise. The findings suggest that an adaptive and flexible methodology is required for a systematic approach to the recovery of complex environments under catastrophic scenarios.

Sponsors: Oklahoma State University, Louisiana State University, State University of New York at Albany

PI/PDs: Corey Baham

Louisiana State University: Rudy Hirschheim

Practitioners: Andres Calderon

State University of New York at Albany: Victoria Kisekka

 

Applying Cyber Range Concepts of Operation to Disaster Recovery Testing: A Case Study

A critical component of disaster recovery planning is testing, which involves verification of the effectiveness of the disaster recovery solutions. There are several limitations that plague disaster testing efforts such as the inability to create realistic disaster scenarios and test them in a production environment. Cyber Range Concept of Operations (CONOPS) present an opportunity for overcoming these challenges. We use a case study approach to observe the development of a disaster recovery program in a large enterprise. We seek to gain an insight into the design and implementation of a disaster recovery program, using the concept of Cyber Ranges.

Sponsors: Louisiana State University, State University of New York at Buffalo

PI/PDs: Corey Baham

State University of New York at Buffalo: Victoria Kisekka

 

Bridging the Acceptance-Routinization Gap in Agile Software Development Assimilation: An Exploratory Cross Case Analysis

Agile software development methods represent a departure from the strong document-driven procedures of plan-driven approaches. As organizations continue to adopt agile methods, understanding how to sustain agile methods is a growing concern. In recent years, researchers have focused their attention on the issues of sustained agile use in order to extend our knowledge on agile assimilation. However, little research has been conducted to expose the assimilation gaps that occur as organizations seek to increase the extent and intensity of their agile use. Following prior literature, we investigate the role of organizational factors in the continuance of agile methods.

Sponsors: Oklahoma State University, Louisiana State University

PI/PDs: Corey Baham

Louisiana State University: Rudy Hirschheim

 

The Impact of Organizational Culture and Structure on the Routinization of Agile Software Development Methodologies

Agile software development methodologies represent a departure from the heavy document-driven procedures of waterfall approaches. As organizations continue to adopt agile methodologies, understanding the factors that influence the routinization of agile is a growing concern. Little research has been conducted to expose the assimilation gaps that occur as organizations seek to increase the extent and intensity of their agile use. Our objective is to articulate a model that explains the impact of organizational culture and structure on the routinization of agile methods. Our theoretical model provides helpful insights that extend our knowledge of agile assimilation in organizations.

Sponsor: Louisiana State University

PI/PD: Corey Baham

 

Teaching Tip: Implementing Scrum Wholesale in the Classroom

This paper describes how Scrum has been incorporated into the classroom wholesale and highlights important considerations for using Scrum for student software development projects. Students having little to no knowledge of Scrum were able to gain confidence in using the method in a real-world setting. The paper discusses the use of a hands-on Scrum project as a pedagogical tool for teaching the Scrum methodology and software development life cycle principles. Qualitative and qualitative data were collected to understand student experiences with a wholesale Scrum implementation in the classroom.

Sponsor: Oklahoma State University

PI/PD: Corey Baham

 

Incorporating the Product Owner Role in Student Projects

As the popularity of Scrum has grown, its roles and ceremonies have been utilized in student software projects. One of the more difficult roles to implement in the academic context is the role of Business Product Owner (BPO). This paper discusses lessons learned when attempting to incorporate the BPO in student software development projects while using Scrum. Over a two-year span, quantitative and qualitative data were collected to understand student experiences in selecting, working with, and responding to BPOs. The paper concludes with data analysis and recommendations for incorporating BPOs in future projects.

Sponsor: Oklahoma State University

PI/PD: Corey Baham

 

Measuring the Relative Performance of Accountable Care Organizations: The Role of Electronic Health Records

Accountable Care Organizations (ACOs) were established to address the issues related to the soaring costs of healthcare delivery. We propose an evaluation framework to measure ACO efficiency, based on their ability to use health care resources to maximize patient health outcomes. Drawing on a nationwide sample of ACOs, we find that larger ACOs are more likely to exhibit lower efficiency relative to smaller ACOs. We also find that usage of electronic health records mitigates the negative impact of size on ACO performance.

Sponsors: Oklahoma State University, University of Texas

PI/PDs: Chenzhang Bao

University of Texas: Indranil Bardhan

 

Antecedents and Impact of Health Information Sharing on Hospital Performance: EMR Sourcing Strategies and HIE Participation

Despite significant investments in health information technologies (IT), there is still a dearth of information sharing among healthcare providers and hospitals, which constrain adopters from reaping the full benefits of health IT. In this study, we examine the impact of electronic medical records (EMR) sourcing strategies of healthcare providers, as well as their participation in health information exchanges (HIE), on the extent of health information sharing. We attempt to identify the underlying mechanisms through which the benefits of health IT on hospital outcomes are realized.

Sponsors: Oklahoma State University, University of Texas

PI/PDs: Chenzhang Bao

University of Texas: Indranil Bardhan

 

IT Spillover Effects in Levels of Healthcare Delivery

Recent literature has examined positive IT spillover effects in regional healthcare. We extend this idea and argue that patient and information exchange occurs mainly between care-delivery levels (e.g. from primary care clinics to tertiary care hospitals and vice versa) rather than within a care level (e.g. from one tertiary care hospital to another). Using the Medicare Cost Report and HIMSS database, we assess how does IT adoption by primary care clinics affects the operating cost of tertiary care hospitals.

Sponsor: Oklahoma State University

PI/PDs: Chenzhang Bao, Dursun Delen, Ankita Srivastava

 

Investigating Uneven Distribution of Health IT Vendor Products

While there is an increasing trend of adopting systems from several dominating vendors, health IT market remains competitive and fragmented. This study investigates the distribution of different vendor products and how hospitals adopt health ITs compared to other neighboring peers in the local healthcare market. We focus on the longitudinal trajectories of different applications across years.

Sponsor: Oklahoma State University

PI/PD: Chenzhang Bao

 

Evolution of EMRs and the Impact on Performance

Health IT applications have been criticized for the lack of interoperability across vendor products. We investigate the difference in vendor selection of EMR applications within a hospital referral region. We cluster the longitudinal patterns of this evolution in vendor difference/similarity and examine its impact on hospital performance.

Sponsors: Oklahoma State University, Temple University

PI/PDs: Chenzhang Bao

Temple University: Sezgin Ayabakan

 

Vulnerability and Risk Mitigation in Artificial Intelligence and Machine Learning

Artificial intelligence (AI) and machine learning (ML) have received considerable attention in both popular culture and in science and academia.   While popular culture depicts AI as computers with near human like cognitive abilities, nothing could be further from the truth.   Some attempts at AI in the real world have gone terribly wrong.  The potential for misplaced trust and catastrophic error in the technology is monumental.  This paper exams the state of the AI/ML capabilities and vulnerabilities and proposes strategies for industry and academia to mitigate the risks associated with deploying the technology.

Sponsors: Oklahoma State University, Churadata Inc.

PI/PDs: David Biros, Madhav Sharma

Churadata Inc: Jacob Biros

 

Building Trust in Wearables for Health Behavior

Advances in Internet of Things (IoT) have given users the ability to monitor heart rate, calories burned, steps walked, time spent exercising, and the electrical activity of the heartbeat. A prominent barrier to adoption of healthcare features in these devices is lack of user trust. This research conceptualizes the formation of user’s initial trust in wearables. Understanding the formation of initial trust on wearable systems’ healthcare features can lead to improvement in user’s health-related behaviors, which in turn has the potential to cause a societal change in primary healthcare delivery.

Sponsor: Oklahoma State University

PI/PDs: David Biros, Madhav Sharma

 

When Programs Collide: A Panel Report on the Competing Interests of Analytics and Security

The increasing demand for business analytics and cybersecurity professionals provides an exciting job outlook for graduates of information systems programs. However, the rapid proliferation of devices and systems that spurred this trend has created a challenging ethical dilemma for those responsible for educating future. Many firms are collecting and storing as much data as possible without regard for security.  This behavior results in an ever-increasing challenge for those charged with protecting organizational assets and exerts pressure on executives seeking an analytical edge to remain profitable in a hyper-competitive marketplace. This paper reports on that discussion and its insights.

Sponsors: Oklahoma State University, Bradley University

PI/PDs: David Biros

Bradley University: Jacob Young

 

An Empirical Evaluation of Interpersonal Deception Theory in a Real-World, High-Stakes Environment

The study of deception and the theories which have been developed have relied heavily on laboratory experiments in controlled environments, using college students participating in mock scenarios.  The goal of this study is to validate previous deception detection research in a real-world, high stakes environment of a convicted criminal attempting to deceive in order to garner a lighter sentence.  The study utilized previously confirmed linguistic and paralinguistic speech cues and the constructs of deception in an attempt to validate a leading deception theory, Interpersonal Deception Theory (IDT). The results validate IDT with mixed findings on individual measures and their constructs.

Sponsors: Oklahoma State University, University of Central Arkansas

PI/PDs: David Biros

University of Central Arkansas: Joseph Thomas

 

Teaching Programming to the Post-Millennial Generation: Pedagogic Considerations for an IS Course

Teaching introductory programming to IS students is challenging. The educational, technological, demographic, and cultural landscape has changed dramatically in recent years. The post-millennial generation has different needs and expectations in an era of open resources. Learning to program is perceived as difficult, teaching approaches are diverse, and there is little research on what works best. In this paper, we share our experiences in developing, testing, and implementing a new design for teaching introductory IS programming at the undergraduate level. We describe pedagogic considerations and present teaching tips for a blended course that combines best practices with experimentation.

Sponsor: Oklahoma State University

PI/PDs: David Biros, Madhav Sharma, Surya Ayyalasomayajula, Nikunj Dalal

 

Classification of Malicious Insiders and the Association of the Forms of Attacks

Malicious insiders continue to pose a great threat to organizations. With their knowledge about organizational security countermeasures as well as valuable organizational resources, malicious insiders can launch an attack towards the organization easier than an outsider could and with more devastating consequences. Many studies have attempted to identify the characteristics of malicious insiders in order to deter and prevent attacks. We argue that the current studies confuse the fact that malicious attacks belong to two different categories: those that launch instrumental attacks and expressive attacks. This current study paves the way for future research about the heterogeneity of malicious insiders.

Sponsors: Oklahoma State University, Louisiana State University

PI/PDs: David Biros, Fletcher Glancy

Louisiana State University: Nan Peter Liang

 

Does Cybersecurity Slow Down Digitization? A Quasi-Experiment of Security Breach Notification Laws

While digitization necessitates cybersecurity reforms, firms engaging in digitization initiatives may be discouraged by the costs of such major changes. Therefore, it has become increasingly important to understand if concerns about the costs of cybersecurity stifle digital growth. This study seizes an opportunity to address this question by investigating the state- and industry-level economic impacts of the passages of security breach notification laws (SBNLs) in the United States. We study the impact of SBNLs on an important economic topic – employment by IT service provider industry. This study provides fresh evidence related to the unintended and broader impacts of cybersecurity legislation.

Sponsors:  Oklahoma State University, Temple University

PI/PDs: David Biros, Tianjian Zhang

Temple University: Taha Havakhor

 

Learned Helplessness

Inclusion of Attribution Theory in the Organizational Sciences is disproportionately low compared to other disciplines.  We take the position that this is due to the lack of a tool that can demonstrate strong psychometric properties.  This study builds such a tool across multiple sets of data gathering and refinement.

Sponsor: Oklahoma State University

PI/PDs: Jim Burkman, Andy Luse

 

Predicting Chronic Pain Development from Preventing Opioid Use

The goal of this grant is to study the relationship between opioid use and chronic pain treatment. To identify the underlying patterns, a large and feature-rich data obtained from Cerner HealthFacts Data Warehouse along with a variety of machine learning technics are leveraged. The early findings of this NIH/OU-CHS funded health analytics research is very descriptive and promising. The next stage will focus on the predictive models to discover new, novel, and actionable knowledge.   

Sponsor: NIH/OU-HSC

PI/PD: Dursun Delen

 

Data Science Mentorship

The goal of the Data Science Rotations for Advancing Discovery (RoAD Trip) is to invite selected junior investigators to “take to the road” to collaborate with senior data science mentors at one of many eligible research universities across the United States. It is a competitive and highly-selective process for the junior investigators as well as the mentors to receive such prestigious award. The program selects and awards only 10 mentorship engagements per year. It pays for the expenses of the awarded mentee and pays a small stipend to the mentor at the end of the mentorship period.

Sponsor: National Institute for Health (NIH) (Managed by University of South California)

PI/PD: Dursun Delen

 

Identifying Adverse Drug Events with Big Data Analytics

In pharmacovigilance terminology, Adverse Drug Event (ADE) is a general term that refers to any injury caused by a medication. Although, pharmaceutical companies conduct rather extensive, time-demanding clinical studies to identify such adversities beforehand, it is not possible to do so for unexpected and slow-moving adverse outcomes. This research aimed to discover such ADRs using Big Data and advanced AI (machine learning techniques). The ultimate goal is to use HER, social media/network, medical literature, and biological/chemical databases to develop inelegant systems that detect ADR, thereby to save human lives.

Sponsor: Oklahoma State University

PI/PDs: Dursun Delen, Behrooz Davazdahemami

 

Improving Student Retention with Predictive Analytics

Accurately predicting and rankling the students at risk of attrition is the key component of any retention management system. The goal if the research project is to use historical data to develop machine learning based prediction models to accurately identify the freshmen students that are at the greater risk of dropping out after their first year at college. The system not only predicts those students that are at risk but also prioritize them based of their likelihood of dropping out so that the limited resources for the intervention and retention programs could optimally be utilized. 

Sponsor: Oklahoma State University

PI/PD: Dursun Delen

 

Development of a Clinical Decision Support System for Early Detection of Diabetic Retinopathy

Diabetic retinopathy (DR) is the most common cause of vision loss among diabetic patients. In this research study, we analyzed data from more than 1.4 million diabetics and developed a clinical decision support system (CDSS) for predicting DR. While the existing diagnostic approach requires access to ophthalmologists and expensive equipment, our CDSS only uses demographic and lab data to detect patients’ susceptibility to retinopathy with a high accuracy. Our CDSS provides several important practical implications, including identifying the DR risk factors, facilitating the early diagnosis of DR, and solving the problem of low compliance with annual retinopathy screenings.

Sponsor: Oklahoma State University

PI/PDs: Dursun Delen, Saeed Piri

 

Developing a Decision Support Systems for Predicting the Financial Success of Hollywood Movies

Motion picture business is one of the riskiest endeavors for any investor, especially in today’s ever-changing needs and wants, likes and dislikes of the potential audience. In this study, we aim at developing a Web-based DSS (which we refer to as Movie Forecast Guru, or MFG in short) for investors, movie producers, distributors, and exhibitors to make better decisions in selection of movie projects. In addition to predicting the box-office success of potential movie projects, this DSS is also capable of assessing the importance/contribution of movie parameters such as genre, super stars, technical effects, release time, etc.

Sponsor: Oklahoma State University

PI/PDs: Dursun Delen, Ramesh Sharda

 

Identifying Medical Informatics Research Trends with Text Mining

The objective of this research project is to identify major subject areas of medical informatics and health analytics and explore the time-variant changes (upward or downward trends) therein. Using PubMed archives, we identified 26,307 articles published in the top medical informatics journals within the last 12 years. Employing a predictive analytics / text mining approach, we clustered major research topics and analyzed the most frequently appearing subject terms extracted from the abstracts of these articles. The time-variant results indicated that some subject areas are declining while others are growing exponentially.

Sponsor: Oklahoma State University

PI/PDs: Dursun Delen, Yong-Mi Kim

 

A Theory of Deception Detection in Asynchronous Communication

This paper develops a theory of deception detection in asynchronous communication. The overarching proposition in Asynchronous Communication Deception Detection Theory (ACDDT) asserts that there is a direct linkage between concealment, isolation, and normality in a text and deception. We derive theoretical constructs and propositions using the case study research method. The theory provides a better explanation of how the deceptive documents are different from the non-deceptive ones. This study contributes a new and unique theory of deception in asynchronous communication that has a practical contribution in the area of fraud detection. 

Sponsors: Oklahoma State University, Texas Tech University

PI/PDs: Fletcher Glancy

Texas Tech University: Surya Yadav

 

Classification of Malicious Insiders and the Association of the Forms of Attacks

Malicious insiders continue to pose a significant threat to the organization. Many studies have attempted to identify the characteristics of malicious insiders. We argue that the current studies about malicious insiders confuse the fact that malicious attacks belong to two different categories: those that launch instrumental attacks and expressive attacks. Our results show that malicious insiders who exhibit signs of manipulative behavior or seeking personal gain tend to carry out instrumental attacks. Malicious insiders who exhibit signs of arrogance tend to conduct expressive attacks. This current study paves the way for future research about the heterogeneity of malicious insiders.

Sponsors: Oklahoma State University, Louisiana State University

PI/PDs: Fletcher Glancy, David Biros, Andy Luse

Louisiana State University: Nan Liang

 

Who Dares to Jump into the Cloud First? – Antecedents and Consequences of the Attitude toward Public Cloud Adoption.

Cloud computing has become one of the hottest trends in the IT field. While the cloud offers various potential benefits to organizations, many organizations are hesitant to migrate to the public cloud due to the innate uncertainties in the new environment. This research attempts to identify major factors that influences the attitude of IT professionals toward public cloud adoption in the organizational IT environment. The effect of the individuals’ attitudes on the organizational level adoption decision is also examined. The results will provide insights into the decision-making and evolution process of enterprise IT architecture.

Sponsor: Oklahoma State University

PI/PD: JinKyu Lee

 

To Protect and Serve? Perception of Information Security Team and Cooperative Security Operations

This research examines the effect of the employees’ perception on their information security team on their willingness to cooperate security operations. The extent research has identified various institutionalized mechanisms such as sanctions, incentives, and employee training programs that can improve information security performance. We propose that how employees perceive their security team (e.g., controller, projector, enabler, etc.) also plays a critical role in successful security operations by enacting cooperative behaviors (e.g., reporting potential security threats, complying with security policies, etc.). The results will extend the model of security enhancing behaviors and suggest additional tools to improve information security.

Sponsor: Oklahoma State University

PI/PD: JinKyu Lee

 

Moderators for the Antecedents of Information Security Enhancing Behaviors

Previous studies on corporate information security pointed out that employee incompliance is a major causes of information security incidents. While extant literature suggests that organizations can adopt various incentive and training programs to encourage employees’ compliance with information security policies, most studies considered employees as an invariant group of people regardless their paygrade, job type, industry, etc. In this study, we explore personal and situational factors that can moderate employees’ conformity level in presence of compliance incentive and training programs. The findings will identify factors that can improve the effectiveness of compliance incentive and training programs for various employee groups. 

Sponsor: Oklahoma State University

PI/PD: JinKyu Lee

 

The Roles and limitations of Employee Training and Technical Measures for Information Security

Employee training has been widely recognized as one of the most important means to strengthen the information security posture of an organization. However, its complementary and supplementary roles in corporate security architecture has not been clearly understood.

This study examines the effectiveness of employee trainings on organizational security posture in relation to technical security countermeasures for various types of information security threats. The findings of this study will help managers develop more effective employee training programs for their threat environments while identifying the technical components of information security architecture that should not rely on employee training.

Sponsor: Oklahoma State University

PI/PD: JinKyu Lee

 

From General to Situational Privacy Concerns: A New Mechanism to Explain Information Disclosure in Social Networks

In this study, we discuss that the inconsistency reported in the literature (i.e., information sharing in SNSs in the presence of CFIP) is mainly due to lack of proper conceptualization and operationalization of models in those studies. Our results show that prior research widely lacks parallelism between the operationalization levels of CFIP and willingness to share information. Moreover, we show that situational factors such as sensitivity of information and perceived control over privacy play a critical role in explaining the decision-making mechanism for information disclosure in SNSs.

Sponsors: Oklahoma State University, University of Wisconsin-Whitewater, Auburn University

PI/PDs: Andy Luse, Bryan Hammer

University of Wisconsin-Whitewater: Behrooz Davazdahemami

Auburn University: Pankush Kalgotra

 

Strong vs. Weak Theory:  An Evaluative Mechanism for Theoretical Development

The goal of many theoreticians is to develop sound theory that will be utilized within their field both by researchers and practitioners.  Yet, scholars have not arrived at a consensus concerning what constitutes appropriate theoretical structure. In this paper, we offer an approach to theory design and analysis based on a categorization of strong and weak theory structure.  We first offer a concrete definition of the meaning of strong and weak theory that is based on a variety of literature. Second, we apply this evaluative framework to a prominent stream of theory development and discuss the nature of theory evolution.

Sponsors: Oklahoma State University, Iowa State University

PI/PDs: Andy Luse, Bryan Edwards

Iowa State University: Anthony Townsend

 

Instruction in 802.11 Technology in Online Virtual Labs

Lab-based education has been a staple of computing education for decades. By interacting with the technology, students are able to gain a much greater understanding of the subject through hands-on activities. Recently, virtual labs have provided a mechanism to allow both co-located and online students access to these lab environments without the time, space, and monetary constraints of traditional labs. Computer networking and security is one area where virtual labs provide a highly useful testbed for learning security concepts. One problem is implementing virtual educational labs pertaining to 802.11 technologies given the inherently physical location-based nature of the wireless medium.

Sponsors: Oklahoma State University, Iowa State University

PI/PDs: Andy Luse, Amanda Brown

Iowa State University: Julie Rursch

 

Does Technology Thwart Gender Stereotypes: An Impression Formation-based Examination of the Differential Influence of Technology across Gender and Message

This research examines the relationship between gender, message bias, and technology use on the way that observers form impressions of others. Building on impression formation and gender stereotype research and theory, we develop a two-study research methodology for examining how impressions are formed of technology users. The results of our two studies indicate that technology use is an important component in impression formation, significantly inhibiting the effects of gender stereotyping, such that women and men are not evaluated differently based upon their apparent competency in using technology nor on the content of their messaging.

Sponsors: Oklahoma State University, Iowa State University

PI/PDs: Andy Luse

Iowa State University: Anthony Townsend

 

Data Analytics in Organizations:  Leadership, Management, Talent, and Performance 

The success of today’s organizations depends on data analytics—obtaining data, analyzing it, and using the results to make informed decisions.  Although the significance of analytics is recognized more than ever by those in businesses, many lack the leadership and talent to optimize the transition from data analytics to data-driven decision making.  This research investigates the state of data analytics in organizations through an investigation of leadership, management, talent, and performance.   

Sponsor:  Oklahoma State University 

PI/PD:  Jeretta Horn Nord

 

The Internet of Things (IoTs) 

Those in the emerging digital world have recently witnessed the proliferation and impact of IoT-enabled devices.  The Internet of Things (IoTs) has provided new opportunities in the technology arena while bringing security, privacy, and trust challenges to an increased level of concern.  This research investigates the usage, benefits, and challenges of IoTs in organizations.  The research has both practical and theoretical impetus since IoT is still in its infancy, yet is considered by many as the most important technology initiative of today. 

Sponsor:  Oklahoma State University 

PI/PD: Jeretta Horn Nord 

 

The Effect of Supply Chain Relationships on Resilience: Empirical Evidence from India

The purpose of this study is to empirically explore the effects of trust, communication, commitment and cooperation on Supply Chain (SC) resilience and performance. An online, cross-sectional survey was used for collecting perceptual responses from supply chain professionals. SmartPLS was used to analyze 155 completed responses. Findings suggest communication and cooperation as dominant enablers of SC resilience in the integrated model with positive effect on performance. The study is the first to consider the inter-relationships among the relational attributes, and how they collectively influence SC resilience.

Sponsors: Oklahoma State University, ICFAI Business School (IBS), Hyderabad

PI/PDs: Rathindra Sarathy

ICFAI Business School (IBS), Hyderabad: Santanu Mandal

 

Self-control, organizational context, and rational choice in internet abuses at work

Cyber criminals use the Internet as a major platform to launch malware and social engineering attacks. Employees’ violation of Internet use policy (IUP) elevates a firm’s security risks from cyber-attacks. In the literature, such deviant behavior is generally considered to be the result of a cost-benefit calculus. However, this study shows that dispositional factors such as self-control and procedural justice moderate the cost-benefit calculus. We conclude that self-control and procedural justice need to be integrated with the Rational Choice Theory to better explain Internet abuses at work.

Sponsors: State of Oklahoma, University of New Mexico, Midwestern State University

PI/PDs: Rathindra Sarathy

University of New Mexico: Han Li, Xin (Robert) Luo

Midwestern State University: Jie Zhang

 

Statistical Information Recovery from Multivariate Noise-Multiplied Data, a Computational Approach

This paper presents a computational method for sharing multivariate confidential numerical microdata, an area of growing interest. The method can be used to recover interesting statistical information about the sensitive microdata based on noise-multiplied protected data. Estimating the parameters in linear regression without using the original data directly becomes feasible. An R package MaskJointDensity is built for implementing the method, and is available in the public domain.

Sponsors: Oklahoma State University, University of Wollongong, University of Oklahoma

PI/PDs: Rathindra Sarathy

University of Wollongong, Australia: Luke Mazur, Yan-Xia Lin

University of Oklahoma: Krishnamurty Muralidhar

 

Health Analytics

We are studying several issues in health analytics using a large electronic medical records data warehouse through CHSI – prediction of hospital length of stay, estimating comorbidities across different demographics, estimating mortality rates; etc.

Sponsors: Oklahoma State University, Auburn University

PI/PDs: Ramesh Sharda

Auburn University: Pankush Kalgotra

 

Quality of Information Exchanged on Social Media

The goal is to determine the quality and objectivity of information being posted on twitter, and also understand which types of users provide what type of information through their tweets. Having this guidance permits one to use the posted information more carefully and reliable. We run such analyses in the context of providing support to chronically mental disease patients.

Sponsors: Oklahoma State University, Wright State University

PI/PDs: Ramesh Sharda

Wright State University: Daniel Asamoah

 

Analysis of Social Media Interactions

We model the stochastic nature of social media interactions, especially as it relates to discussion about specific brands and products. The models help understand reactions to original postings.

Sponsors: Oklahoma State University, Wright State University

PI/PDs: Ramesh Sharda

Wright State University: Amir Hassan Zadeh

 

Understanding Impacts of Interruptions

We study the effects of interruptions on knowledge tasks. Neuroimaging is employed to deepen our understanding of what happens during and after an interruption.

Sponsors: Oklahoma State University, Auburn University

PI/PDs: Ramesh Sharda, Corey Baham

Auburn University: Pankush Kalgotra

 

Mitigating Dark Side of Analytics/AI

Stories abound on how AI/Analytics models are leading companies to make questionable decisions. This research is aimed at identifying information systems research opportunities to help mitigate such missteps.

Sponsors: Oklahoma State University, Auburn University

PI/PDs: Ramesh Sharda

Auburn University: Ashish Gupta

 

Impacts of Smart Technology on Short-Term Rentals Operations

In this working paper, we analyze the financial and operational impacts of deploying smart technologies in short-term rentals. Landlords are usually not co-located with lodging units rented through short-term agents, such as Airbnb and VRBO. Application of smart thermostats, plugs, and energy monitors can have a significant impact on costs without a comparable increase in operational burden. Using a case study of five properties, we assess the impact of these devices and explore additional benefits derived from behavioral changes by tenants due to the presence of these devices.

Sponsor: Oklahoma State University

PI/PD: Mark Weiser

Back To Top
MENUCLOSE