Skip to main content
Apply

Spears School of Business

Open Main MenuClose Main Menu

      MSIS Research Abstract Report 2021

A Column Generation Approach for the Product Grouping Problem

We study the product grouping problem (PGP) which seeks to optimize its production process to minimize total materials and equipment changeover cost in a manufacturing plant.  A simplified version of the problem that ignores materials cost is equivalent to the clique partition problem (CPP).  This paper presents a column generation-based algorithm to solve CPP and PGP.  The algorithm is particularly attractive as it requires less fine-tuning of its parameters, produces lower bounds that can be used to assess the quality of the solutions to the problem, and generates improved solutions for a benchmark dataset.

Sponsor: Oklahoma State University
PI/PD: Ali Amiri

 

Optimization of Product Category Allocation to Minimize Order Splitting

We study the problem of allocating product categories to multiple warehouses to reduce online order splitting and ultimately reduce shipping costs.  We propose a column generation-based algorithm to solve the problem.

Sponsor: Oklahoma State University
PI/PD: Ali Amiri

 

Identifying Injury Severity Risk Factors in Automobile Crashes: A Hybrid Explainable AI ApproachWe designed and developed a hybrid methodology involving predictive analytics, explainable AI, and heuristic optimization techniques to investigate the injury severity risk factors in automobile crashes. We proposed an explanation method based on a variable neighborhood search procedure and compared it with the existing methods. By applying an information fusion technique, we identified a ranking list of the most influential injury severity characteristics related to the driver, vehicle, and accident. The findings can be used by practitioners and policymakers to improve traffic safety by mitigating injury-related risk factors.

Sponsor: Oklahoma State University

PI/PDs: Ali Bagheri, Dursun Delen, Mostafa Amini

 

Measuring the Relative Performance of Accountable Care Organizations: The Role of Electronic Health Records

Accountable Care Organizations (ACOs) were established to address the issues related to the soaring costs of healthcare delivery. We propose an evaluation framework to measure ACO efficiency, based on their ability to use health care resources to maximize patient health outcomes. Drawing on a nationwide sample of ACOs, we find that larger ACOs are more likely to exhibit lower efficiency relative to smaller ACOs. We also find that usage of electronic health records mitigates the negative impact of size on ACO performance.

Sponsors: Oklahoma State University, University of Texas

PI/PDs: Chenzhang Bao

University of Texas: Indranil Bardhan

 

Antecedents and Impact of Health Information Sharing on Hospital Performance: EMR Sourcing Strategies and HIE Participation

Despite significant investments in health information technologies (IT), there is still a dearth of information sharing among healthcare providers and hospitals, which constrain adopters from reaping the full benefits of health IT. In this study, we examine the impact of electronic medical records (EMR) sourcing strategies of healthcare providers, as well as their participation in health information exchanges (HIE), on the extent of health information sharing. We attempt to identify the underlying mechanisms through which the benefits of health IT on hospital outcomes are realized.

Sponsors: Oklahoma State University, University of Texas

PI/PDs: Chenzhang Bao

University of Texas: Indranil Bardhan

 

IT Spillover Effects in Levels of Healthcare Delivery

Recent literature has examined positive IT spillover effects in regional healthcare. We extend this idea and argue that patient and information exchange occur mainly between care-delivery levels (e.g. from primary care clinics to tertiary care hospitals and vice versa) rather than within a care level (e.g. from one tertiary care hospital to another). Using the Medicare Cost Report and HIMSS database, we assess how IT adoption by primary care clinics affect the operating cost of tertiary care hospitals.

Sponsor: Oklahoma State University

PI/PDs: Chenzhang Bao, Ankita Srivastava, Dursun Delen

 

Investigating Uneven Distribution of Health IT Vendor Products

While there is an increasing trend of adopting systems from several dominating vendors, health IT markets remain competitive and fragmented. This study investigates the distribution of different vendor products and how hospitals adopt health ITs compared to other neighboring peers in the local healthcare market. We focus on the longitudinal trajectories of different applications across years.

Sponsor: Oklahoma State University

PI/PD: Chenzhang Bao

 

Evolution of EMRs and the Impact on Performance

Health IT applications have been criticized for the lack of interoperability across vendor products. We investigate the difference in vendor selection of EMR applications within a hospital referral region. We cluster the longitudinal patterns of this evolution in vendor difference/similarity and examine its impact on hospital performance.

Sponsors: Oklahoma State University, Temple University

PI/PDs: Chenzhang Bao

Temple University: Sezgin Ayabakan

 

Health Information Exchange: Hype or Hope?

In recent years, healthcare providers increasingly adopt health IT systems primarily from a single supplier in order to maximize their capability to share patient health data. However, little is known about how much variation this merit in health information exchange explains the variations in hospital performance. In this study, we observe that while single-sourcing improves hospital performance, the level of information sharing has negligible explanation on relationship. Compared to information sharing, the benefit of adopting a single-sourced IT system is more likely rooted in its capability to facilitate clinical workflow.

Sponsor: Oklahoma State University

PI/PD: Chenzhang Bao

 

Technostress Among Physicians and Nurses: A Longitudinal Investigation of Health IT Strategies and User Satisfaction

In this research, we propose a strategic technostress model to study how EHR strategies impact clinicians’ satisfaction with IT. We perform text mining on data collected from the Glassdoor website to reveal clinicians’ techno-satisfaction and combine it with organizational EHR strategies. Our analysis indicates that EHR adoption is positively associated with techno-satisfaction. We also observe that EHR sourced from multiple vendors is associated with higher satisfaction. However, these relationships are negatively moderated by EHR experience. Our study provides significant theoretical insights about clinicians’ perception of IT and managerial insights for system design.

Sponsors: Oklahoma State University, Temple University

PI/PDs: Chenzhang Bao, Ankita Srivastava, Surya Ayyalasomayajula, Dursun Delen

Temple University: Sezgin Ayabakan

 

Quantum Information Systems: Harnessing Individual and Group Energies

In this working paper, we propose that an organization is a living organism that generates energy to achieve certain outcomes. We propose that the relationship between the inputs (individual and group use of information systems) and the outputs (strategic alignment and competitive advantage) of a system depends on the basic principles of quantum mechanics. Specifically, we connect the neuroscience research that addresses qualia (individual) and quale (group) to the Management Information Systems (MIS) research. In this paper, we proffer our research objective, discuss our constructs, and present our interview process and survey items that we plan to conduct and administer.

Sponsors: Oklahoma State University, Virginia Military Institute, Indiana University of Pennsylvania

PI/PDs: Corey Baham

Virginia Military Institute: Jennifer Gerow

Indiana University of Pennsylvania: James Rodgers

 

Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret

Authentication plays an important role in securing our systems but is threatened by increasingly sophisticated account hacking and account take over. Several security services have been developed, including multifactor authentication designed to cope with online account authentication. It remains unknown how users perceive and evaluate secure authentication for online accounts and consequently use it to avoid online account threats. This study investigates the factors that affect the use of secure authentication to avoid online account threats. This work extends PMT by showing how the emotion of anticipated regret heightens appraisals of threat and coping.

Sponsors: Oklahoma State University, University of North Texas

PI/PDs: Corey Baham

University of North Texas: Obi Ogbanufe

 

Issues, Challenges, and Discussion of a Theoretical Core of Agile Software Development Research

Information systems researchers need to balance their pursuit of theoretical contribution by applying the level of nuance needed to make an impact in both research and practice. We argue that the most expedient way to overcome challenges in conducting ASD research and evaluating knowledge claims is first to develop a theoretical core and second, address issues of rigor in ASD research. This paper aims to highlight major issues facing ASD research in IS, discuss how these issues can be overcome, and propose a theoretical core that can be debated, refined, and used in future research.

Sponsors: Oklahoma State University, Louisiana State University

PI/PDs: Corey Baham

Louisiana State University: Rudy Hirschheim

 

Is Technostress Forcing Physicians to Leave Their Careers? An Exploration of EHR-Related Physician Burnout?

The growing evidence on physician burnout is gaining paramount attention among practitioners, researchers and policy-makers. IS literature has theorized this phenomenon as technostress and there is considerable causal evidence explaining the effect of use of ICT’s on manifestations of strain and reduced productivity. We argue that the existing literature on technostress fails to generalize in healthcare and thus needs to be extended. We propose that an understanding of how EHR’s contribute to physician burnout is needed. A qualitative study using interviews will be deployed at all three levels of care delivery- primary, secondary and tertiary for a holistic exploration.

Sponsor: Oklahoma State University

PI/PDs: Corey Baham, Ankita Srivastava, Dursun Delen

 

Generational Differences in Handling Technology Interruptions: A Qualitative Study

Digital native and digital immigrant user types characterize the differences between those who grew up in a world of ubiquitous information systems and those who pre-date it. The rise in computer-mediated communication (CMC) technologies is creating more opportunities for interruption. Researchers have explored the impact of growing up in a world of technology, but little research has been conducted to understand potential differences concerning how different user types handle technology interruptions. This paper examines how individuals handle CMC interruptions differently based on the role of technology and its level of pervasiveness in the environment in which they grew up.

Sponsors: Oklahoma State University, Auburn University

PI/PDs: Corey Baham, Ramesh Sharda

Auburn University: Pankush Kalgotra

 

Signals and Mechanisms for Unintended Consequences in AI: A Grounded Theory Approach

Artificial Intelligence (AI) technologies such as including machine learning, deep learning, computer vision, and natural language processing, are becoming general-purpose technologies that significantly impact the economic and social structure of organizations and society. However, that impact has not been entirely positive. There have already been many cases where undesirable or negative consequences of AI tools have harmed their respective organizations in social, financial, and legal spheres. This research seeks to uncover common signals and mechanisms that lead to unintended consequences in AI. Using a grounded theory approach, we propose a unifying theoretical framework for unintended consequences in AI projects.

Sponsors: Oklahoma State University, Churadata Inc.

PI/PDs: Corey Baham, David Biros, Madhav Sharma

Churadata Inc.: Jacob Biros

 

Entrepreneurial Organizational Culture, IT-business Alignment, and Firm Agility: A Moderated Mediation

IT-business strategic alignment is one of the most long-standing managerial challenges. Research differs concerning its impact on firm agility. To better understand this relationship, we study the impact of both intellectual and social alignment on firm agility in the context of entrepreneurial organizational culture (EOC) to account for a firm's level of entrepreneurial intensity.  In a field study of 100 CIOs, we find that EOC positively impacts firm agility through mediated and moderated effects of both social and intellectual alignment, respectively. This paper provides a theory-driven explanation of the dynamics of social and intellectual alignment's impact on firm agility. 

Sponsors: Oklahoma State University, University of Tennessee, Virginia Military Institute

PI/PDs: Corey Baham, Andy Luse, Ramesh Sharda

University of Tennessee: Randy Bradley

Virginia Military Institute: Jennifer Gerow

 

Bridging the Acceptance-Routinization Gap in Agile Software Development Assimilation: An Exploratory Cross Case Analysis

Agile software development methods represent a departure from the strong document-driven procedures of plan-driven approaches. As organizations continue to adopt agile methods, understanding how to sustain agile methods is a growing concern. In recent years, researchers have focused their attention on the issues of sustained agile use in order to extend our knowledge on agile assimilation. However, little research has been conducted to expose the assimilation gaps that occur as organizations seek to increase the extent and intensity of their agile use. Following prior literature, we investigate the role of organizational factors in the continuance of agile methods.

Sponsors: Oklahoma State University, Louisiana State University, Georgia State University

PI/PDs: Corey Baham

Louisiana State University: Rudy Hirschheim

Georgia State University: Likeobe Maruping

 

The Moderating Effect of Ambiguity on Fake News and Sensemaking

Fakes news on the Internet has emerged as an issue with far-reaching consequences. Given fake news’ breadth of influence, depth of consequences, and perpetuity, we extend this line of inquiry to a less studied area - uncertainty-reducing behaviors in fake news online. In this study, we examine ambiguity in fake news and its relationship to information seeking and sensemaking. Our results yield strong theoretical and practical implications for public policy and future research.

Sponsors: Oklahoma State University, Louisiana State University

PI/PDs: Corey Baham

Louisiana State University: Reginald Tucker

 

Data is the Disaster: Data Issues in Disaster Management Scenarios

The 21st Century has been termed “the century of disasters” (Achenbach, 2011) due to several notorious forms of disasters (e.g., geophysical, hydrological, climatological). Among these, the recent biological disaster of the COVID-19 disease epidemic has seen global impacts. The disastrous effects of COVID-19 have exacted a devastating toll on civil and technological infrastructure and society as a whole (e.g., loss of human life, social and economic disturbances, and industry interruptions and shutdowns).

Sponsor: Oklahoma State University

PI/PDs: Corey Baham, Andy Luse, Ramesh Sharda, Jared Taylor

 

A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums

Online hacker communities are meeting spots for aspiring and seasoned cybercriminals where they can engage in technical discussions, and share exploits and relevant hacking tools to be used in launching cyber-attacks on business organizations. Sometimes, the affected organizations can detect these attacks in advance, with the help of cyber-threat intelligence derived from the explicit and implicit features of hacker communication in these forums. In this research, we develop a novel text-mining based cyber-risk assessment and mitigation framework, which performs the cyber-risk assessment using explicit and implicit features applying various machine learning algorithms, sentiment analysis, and topic detection methods.

Sponsor: Oklahoma State University

PI/PD: Dursun Delen

 

A critical analysis of COVID-19 research literature: Text mining approach

Among the stakeholders of COVID-19 research, clinicians particularly experience difficulty keeping up with the deluge of SARS-CoV-2 literature while performing their much-needed clinical duties. To discover the major topics and trends, this study proposes a text-mining approach to navigating large volumes of COVID-19 literature (i.e., a corpus of 65,262 articles). We utilized natural language processing to curate and generate the term list. We applied topic modeling analyses and multiple correspondence analyses to reveal the trends and major topics, and the associations among topics, journal countries, and publication sources.

Sponsors: Oklahoma State University, University of Alabama – Birmingham

PI/PDs: Dursun Delen

University of Alabama – Birmingham: Ferhat D Zengul, Ayse G Zengul, Michael Mugavero, Nurettin Oner, Bunyamin Ozaydin, James H Willig, Kierstin C. Kennedy, James Cimino

 

Clustering Temporal Disease Networks to Assist Clinical Decision Support Systems in Visual Analytics of Comorbidity Progression

Detection and characterization of comorbidity, the presence of more than one distinct disorder or illness concurrently occurring among a specific cohort of patients, is an invaluable decision aid and a prominent challenge in healthcare research and practice. The aim of this study is to design a novel visual analytics system that can support efficient pattern detection and intuitive visualization of comorbidity progression modeled via temporal disease networks (TDNs). Through two case studies on Clostridioides Difficile and stroke, we demonstrate that the proposed system is able to provide evidence-based and visual insights regarding comorbidity progression effectively for clinical decision support.

Sponsors: Oklahoma State University, Center for Health Systems Innovation

PI/PDs: Dursun Delen

Center for Health Systems Innovation: Yajun Lu, Suhao Chen, Zhuqi Miao, Andrew Gin

 

An Investigation of the COVID-19 Characteristics Using HER Data from Cerner DW

Discovery of new novel patterns related to age, race and gender disparities on hospitalization, length-of-stay and mortality in COVID-19 patients through the use of machine learning and data mining techniques and specifically created database on COVID-19 patients within Cerner HealthFacts data warehouse.

Sponsors: Oklahoma State University, Center for Health Systems Innovation

PI/PDs: Dursun Delen

Center for Health Systems Innovation: Zhuqi Miao

 

Predicting and Explaining Pig Iron Production on Charcoal Blast Furnaces: A Machine Learning Approach

Pig iron, the source for a variety of iron-based products, is traded in commodity markets. Therefore, enhanced productivity has significant economic implications for the producers. In this study, we design, develop, and deploy novel machine learning models on a rich data sample covering more than 20 production variables spanning nine years of an actual operational period, collected at one of the largest pig iron production plants in Brazil. We show that, given the blast furnace parameters, machine learning models are capable of unveiling novel insights by illuminating the black box and successfully predicting production levels at different configurations.

Sponsors: Oklahoma State University, Metalsider - Brazil, Sabanci University – Istanbul, Turkey

PI/PDs: Dursun Delen

Metalsider - Brazil: Marcio Salles Melo Lima

Sabanci University - Istanbul, Turkey: Enes Eryarsoy

 

A Probabilistic Bayesian Inference Model to Investigate Injury Severity in Automobile Crashes

One area that has great potential to leverage the value of big data and analytics is the critical analysis of traffic accidents, where results can provide an in-depth understanding of the risks and provide measures to enhance the well-being of individuals involved in such accidents. This study proposes a data science methodology in a field where probabilistic modeling makes much sense for faster, better decision-making. The main objective of this data analytics study is to identify the high-risk factors with their apparent significance to influence the probability of injury severity on automobile crashes using a geographically representative car crash dataset.

Sponsors: Oklahoma State University, University of Tulsa

PI/PDs: Dursun Delen

University of Tulsa: Kazim Topuz

 

Crafting Performance-based Cryptocurrency Mining Strategies Using a Hybrid Analytics Approach

Crafting and executing the best cryptocurrency mining strategy is vital for success. This study aims to identify the best cryptocurrency mining strategy based on service providers' performance for cryptocurrency mining using a hybrid analytics approach, which integrates the Analytic Hierarchy Process (AHP) and Fuzzy-TOPSIS techniques, along with sensitivity analysis. The results show that hosted mining is the overall best cryptocurrency mining strategy, followed by home mining and cloud mining, based on both total cost of operations and cryptocurrency payout criteria.

Sponsors: Oklahoma State University, Ibn Haldun University - Turkey

PI/PDs: Dursun Delen

Ibn Haldun University - Turkey: Umit Hacioglu, Dounia Chlyeh, Mustafa K Yilmaz, Ekrem Tatoglu

 

To Imprison or Not to Imprison: An Analytics Model for Drug Courts

Analytics can have a significant social impact on decisioning in drug courts. An alternative to traditional criminal courts, drug courts attempt to identify and transform the traditional punitive jurisprudence to a therapeutic one, where the eligible offenders are considered as individuals in need of rehabilitative treatments and are persuaded to undergo a regimen that seeks to return them back to the community, rather than sending them to prison. This initiative, if performed properly, has proven to be effective in lowering the costs and improving the social outcomes. The current study attempts to develop decision support systems for drug courts.

Sponsors: Oklahoma State University, University of Dayton, State of Oklahoma

PI/PDs: Dursun Delen

University of Dayton: Hamed M. Zolbanin,

State of Oklahoma: Durand Crosby, David Wright

 

Derivation and Validation of Essential Predictors and Risk Index for Early Detection of Diabetic Retinopathy Using Electronic Health Records

Diabetic retinopathy (DR) is a leading cause for blindness among working-aged adults. The growing prevalence of diabetes urges for cost-effective tools to improve the compliance of eye examinations for early detection of DR. The objective of this research is to identify essential predictors and develop predictive technologies for DR using electronic health records. These predictive technologies can provide an early warning sign that motivates patients to comply with eye examinations for early screening and potential treatments.

Sponsors: Oklahoma State University, Center for Health Systems Innovation

PI/PDs: Dursun Delen

Center for Health Systems Innovation: Ru Wang, Zhuqi Miao, Tieming Liu, Mei Liu, Kristine Grdinovac, Xing Song, Ye Liang, William Paiva

 

Discovering New Patters in COVID-19 Literature Using Text Mining and Topic Modeling

Although the topic is rather fresh, there seem to be very large and rich literatures already accumulating on COVID-19-related research studies. In this text mining and topic modeling study, we accumulated several thousands of published articles and used data mining, Latent Semantic Indexing, and Latent Dirichlet Analysis (LDA) techniques to characterize the research landscape on COVID-19. The outcome of this research is expected to paint a picture on what has been done, what patterns are found to be significantly consistent, and what else needs to be explored (future research directions) relevant to the characterization and management of this epidemic.

Sponsors: Oklahoma State University, University of Wisconsin – Whitewater, University of Dayton

PI/PDs: Dursun Delen

University of Wisconsin – Whitewater: Behrooz Davazdahemami

University of Dayton: Hamed Majidi Zolbanin

 

Identifying Adverse Drug Events with Big Data Analytics

In pharmacovigilance terminology, Adverse Drug Event (ADE) is a general term that refers to any injury caused by a medication. Although, pharmaceutical companies conduct rather extensive, time-demanding clinical studies to identify such adversities beforehand, it is not possible to do so for unexpected and slow-moving adverse outcomes. This research aims to discover such ADRs, using Big Data and advanced AI (machine learning techniques). The ultimate goal is to use HER, social media/network, medical literature, and biological/chemical databases to develop inelegant systems that detect ADR, thereby saving human lives.

Sponsors: Oklahoma State University, University of Wisconsin - Whitewater

PI/PDs: Dursun Delen

University of Wisconsin – Whitewater: Behrooz Davazdahemami

 

Improving Student Retention with Predictive Analytics

Accurately predicting and ranking students that are at risk of attrition is the key component of any retention management system. The goal of this research project is to use historical data to develop machine learning based prediction models to accurately identify the freshmen students that are at a greater risk of dropping out after their first year of college. The system not only predicts those students that are at risk but also prioritizes them based on their likelihood of dropping out so that the limited resources for the intervention and retention programs can optimally be utilized. 

Sponsor: Oklahoma State University

PI/PD: Dursun Delen

 

Developing a Decision Support Systems for Predicting the Financial Success of Hollywood Movies

Motion picture business is one of the riskiest endeavors for investors, especially in today’s ever-changing needs and wants, and likes and dislikes of the potential audience. In this study, we aim at developing a Web-based DSS (which we refer to as Movie Forecast Guru, or MFG in short) for investors, movie producers, distributors, and exhibitors to make better decisions in their selection of movie projects. In addition to predicting the box-office success of potential movie projects, this DSS is also capable of assessing the importance and contribution of movie parameters such as genre, super stars, technical effects, release time, etc.

Sponsor: Oklahoma State University

PI/PD: Dursun Delen

 

Balanced Scorecard-based Analysis of Customer Expectations for Cosmetology Services: A Hybrid Decision Modeling Approach

The goal of this study is to analyze and characterize customer expectations in the cosmetics sector. By employing a multi-criteria decision analysis methodology, the weighted importance of the underlying criteria is identified, and leading cosmetic service providers are ranked. The findings of the study indicate that consumer-focused criteria (i.e., diversification of services, feedback on the product and services, and customer loyalty) have the most significant impact on the success of the cosmetology firms in Ukraine.

Sponsors: Oklahoma State University, Kharkiv National University of Economics - Ukraine, Medipol University - Turkey

PI/PDs: Dursun Delen

Kharkiv National University of Economics - Ukraine: Oleksandr Dorokhov, Liudmyla Dorokhova,

Medipol University - Turkey: Hasan Dinçer, Serhat Yüksel

 

ICT4D and the Capability Approach: Understanding How Conversion Factors Affect Opportunity and Process Freedoms at the Country-Level

Prior macro-level research on ICT4Ds has measured country-level development using resource- or utilitarian-based approaches. We argue for a people-centered lens using the capability approach, using opportunity and process freedoms. Four conversion factors of ICTs are identified as enablers/restrictors of opportunity or freedoms. Using archival data and a 2SLS model, we test ICT-cost and ICT-infrastructure, and the interaction of e-participation and freedoms on ICTs to predict a country’s human development (HD). Results suggest that cost and infrastructure significantly affect HD, e-participation interacts with freedoms on ICTs such that freedom is only effective when accompanied by high levels of e-participation within a country.

Sponsor: Oklahoma State University

PI/PDs: Bryan Hammer, Gabriel Bahr, Andy Luse

 

International Technology Diffusion, Development, and Trading Partner Spillovers

The purpose of this paper is to expand ICT4D literature by investigating the associations between international trade of technology merchandise and development across countries. Using a spatial autoregression model and data on 45 upper-middle and high-income countries from 2009 to 2018, we examine the effects of imports and exports of technology driven trade on two measures of development (GDP and Human Development Index). Additionally, we define spatial borders through a trade partner network and discover spillover effects of trade on development through the associated trading partner countries.

Sponsor: Oklahoma State University

PI/PDs: Bryan Hammer, Gabriel Bahr, Andy Luse

 

The Role of Technological Progress in Vertical Specialization and Economic Growth

Previous research has studied how ICT adoption impacts trade on economic and human growth. Countries contribute to the global supply chain (GSC) with various levels of intermediate to final production. This research investigates to what extent countries with a higher intermediate to final product trade ratio and a higher IT skills/capabilities see faster levels of growth (GDP & HDI) than countries with lower IT skills/capabilities over time. Using 2SLS and data on 82 countries spanning 2005 to 2015, we examine the moderating impact of IT Skills/Capabilities with vertical specialization on economic growth and human development.

Sponsor: Oklahoma State University

PI/PDs: Bryan Hammer, Gabriel Bahr, Andy Luse

 

The Neuro-Correlates of Information Privacy Concerns and Trust: A Longitudinal Study of Approach-Avoidance Behavior Using EEG

Privacy research has mainly focused on cognitive, conscious conceptualizations for privacy concerns and trust. Not much is known in how privacy operates in the subconscious mind. We posit, in a privacy-salient context, that trust operates as an approach-mechanism for information sharing; privacy concerns operates as an avoidance-mechanism. Using a longitudinal experimental design, we determine the extent to which levels of privacy influence approach/avoidance behavior. Additionally, whether the order of privacy level influences sharing behavior.

Sponsor: Oklahoma State University

PI/PDs: Bryan Hammer, Andy Luse

 

The Role of Psychological Contract Violations in Social Media Platforms

Online business entities rely on privacy seals and user agreements to facilitate user information sharing. Interactions among users of social media platforms (SMP) do not rely on user agreements. As a form of social exchange, information sharing on SMPs uses a psychological contract (PC; implicit and assumed reciprocal obligations). This study investigates how PC violations (PCVs) affect sharing intentions on SMPs. We find that sharing intention is negatively influenced by interpersonal and institutional PCVs through privacy concern and trust. PCV by another user positively influences the perceived violation by the SMP, suggesting a collateral damage of interpersonal-PCV towards the SMP.

Sponsors: Oklahoma State University, Oregon State University

PI/PDs: Bryan Hammer

Oregon State University: Forough Nasirpouri Shadbad

 

Privacy as a Multidirectional Problem: A Social Relations Model of The Reciprocation of Privacy and Trust Using Network Analysis

Previous research on privacy (IS, Marketing, Management, Psychology, etc.) models information exchange in privacy salient situations as unidirectional, often from the perspective of a single user. As a social construct, privacy operates in social exchanges in which information moves between and among groups of individuals. Using network analysis, we model privacy and trust within a social relation model. Data come from an organization that uses a social media platform as its primary communication tool. We determine that trust is a reciprocating mechanism within relationships; however, privacy information concerns are not reciprocated, especially between management and subordinate relationships.

Sponsor: Oklahoma State University

PI/PDs: Bryan Hammer, Andy Luse

 

Information Sharing as a Multidimensional Phenomenon: A Multilevel Study of Multiplex Relationships, Privacy, and Trust in Social Media Platforms

Research on privacy and trust often model relationships (interpersonal, business-consumer, etc.) as unidimensional, lacking depth. Prior research indicates multidimensional relationships enhance trust, resource sharing, and satisfaction. This research proposes that multidimensional (i.e. multiplex) relationships increase trust, decrease privacy concerns, and increase information sharing in social media platforms (SMP). Data was gathered from an organization utilizing Facebook as their primary communication platform. Results suggest that more multiplex relationships lead to information exchange, especially when information sensitivity increases.

Sponsor: Oklahoma State University

PI/PDs: Bryan Hammer, Andy Luse

 

The Fear of Social Exclusion and Our Need to Belong: A Study of Interpersonal Privacy and Trust in Social Media Platforms

All individuals have an innate desire to belong to society in order to reduce costs of living as well as experience a reciprocation of welfare. Social media platforms (SMP) provide a vehicle that delivers a means to experience this. This research proposes that individuals’ fear of social exclusion and goal-directed enjoyment leads to information sharing in SMP While enjoyment influences all types of information (low, medium, high), social exclusion only influences sharing of low-sensitive information. Interpersonal trust leads to high-sensitive information sharing, but not medium- or low-sensitive; interpersonal privacy concern decreases medium- and low-sensitive information sharing, but not high.

Sponsor: Oklahoma State University

PI/PDs: Bryan Hammer, Andy Luse

 

The Antecedents of Habit on IS Continuance

This study theorizes the antecedents of the habit construct in hedonic IS usage. Studies of habit in IS investigated habit as a construct in both utilitarian and hedonic contexts, but the link between habit and hedonic IS usage isn't fully understood. Investigating the antecedents of habit should help establish a clearer picture. We investigate social network site and online gaming users through MTurk anonymous surveys to better understand the link between habit and antecedents from the literature.

Sponsor: Oklahoma State University

PI/PDs: Bryan Hammer, Jerome Kirtley, Andy Luse

 

Interruptions and Information Recall: Differences Between Virtual and Face-to-Face Learning

This study investigates the link between sensory interruptions and information recall in computer-mediated learning. There is a dearth of literature concerning sensory interruptions in IS literature and with the rising prevalence of virtual learning in the current environment, investigation of this phenomenon is critical. We will conduct an experiment combined with a survey to assess the effect of visual and audio interruptions on information recall.

Sponsors: Oklahoma State University

PI/PDs: Bryan Hammer, Jerome Kirtley, Andy Luse

 

Are You Game? A Meta-Analysis of Gamified Elements and Behavioral Outcomes

Commercial systems contribute increasing business value by playing a pivotal role in enhancing performance of firms (Melville et al. 2004). Despite the proliferation of technology in our lives, creating systems that maintain user engagement is a struggle for vendors. Previous research has investigated the interplay between gamified elements and user interaction. Using a meta-analysis approach, this research investigates hundreds of published research to investigate the saliency of gamified elements with different types of users and systems.

Sponsors: Oklahoma State University, Oregon State University

PI/PDs: Bryan Hammer, Andy Luse, Gabriel Bahr, Jerome Kirtley

Oregon State University: Forough Nasirpouri Shadbad

 

Hacking the Value Gap: Cybersecurity Investments, Cybersecurity Talent, and Vulnerability Relative to Peers

Cybersecurity investments, when publicly emphasized, create economic rents through gained legitimacy from stakeholders and a reduction in the cost of capital. The results suggest: 1) Publicly Emphasizing Cybersecurity Investments (PECI) are associated with a generally positive value as measured by Tobin’s q, return on assets, and return on sales, 2) PECIs accompanied by security talent generate significantly higher gains, and 3) PECIs are more profitable for under-performing firms as well as over-performing firms. While PECIs without sufficient talent support does not significantly reduce subsequent cyber breaches, it generates market rewards for under- and over-performing firms.

Sponsors: Oklahoma State University, City University of Hong Kong, Temple University, Purdue University

PI/PDs: Bryan Hammer

City University of Hong Kong: TJ Zhang

Temple University: Taha Havakhor

Purdue University: Mohammad Rahman

 

Do I need to be liked to do my job? Perception on Information Security staff and Success of Cooperative Security Operations

This research examines the effect of employees’ perception on their information security staff on the success of security operations. The extent research has identified various mechanisms, such as sanctions, incentives, and employee training programs, that can improve the performance of information security. We propose that how employees perceive their security team (e.g., controller, projector, enabler, etc.) also plays critical roles, directly and indirectly, in security operations by encouraging or discouraging security-enhancing behaviors. The study will extend the model of security enhancing behaviors and suggest additional methods to improve information security controls.

Sponsor: Oklahoma State University

PI/PD: JinKyu Lee

 

The Role of Individual Differences in Acceptance of Information Security Policies

Previous studies on corporate information security pointed out that employee incompliance is a major causes of information security incidents. While extant literature suggests that organizations can adopt various incentives and training programs to encourage employees’ compliance with information security policies, most studies considered employees as an invariant group of people regardless their paygrade, job type, industry, etc. In this study, we explore personal factors that can moderate employees’ conformity level in presence of compliance incentives and training programs. This study will identify major personal dispositions that can cause the disparity in policy compliance behaviors and propose a solution. 

Sponsor: Oklahoma State University

PI/PD: JinKyu Lee

 

Technical Control or Managerial Control? – A Decision Making Framework for Infosec Control Selection

Employee training has been widely recognized as one of the most important means to strengthen the information security posture of an organization. However, its complementary and supplementary roles with technical measures in a corporate security architecture has not been clearly understood. This study examines the effectiveness of employee trainings on organizational security posture in relation to technical security countermeasures for various types of information security threats. This study will focus on identifying underlying characteristics that determine the control effectiveness and develop a decision-making framework for managers who need to select an optimal mix of technical and managerial security controls.

Sponsor: Oklahoma State University

PI/PD: JinKyu Lee

 

Strong vs. Weak Theory:  An Evaluative Mechanism for Theoretical Development

The goal of many theoreticians is to develop sound theory that will be utilized within their field both by researchers and practitioners.  Yet, scholars have not arrived at a consensus concerning what constitutes appropriate theoretical structure. In this paper, we offer an approach to theory design and analysis based on a categorization of strong and weak theory structure.  We first offer a concrete definition of the meaning of strong and weak theory that is based on a variety of literature. Second, we apply this evaluative framework to a prominent stream of theory development and discuss the nature of theory evolution.

Sponsors: Oklahoma State University, Iowa State University

PI/PDs: Andy Luse, Bryan Edwards

Iowa State University: Anthony Townsend

 

Does Technology Thwart Gender Stereotypes: An Impression Formation-based Examination of the Differential Influence of Technology across Gender and Message

This research examines the relationship between gender, message bias, and technology use on the way that observers form impressions of others. Building on impression formation and gender stereotype research and theory, we develop a two-study research methodology for examining how impressions are formed of technology users. The results of our two studies indicate that technology use is an important component in impression formation, significantly inhibiting the effects of gender stereotyping, such that women and men are not evaluated differently based upon their apparent competency in using technology nor on the content of their messaging.

Sponsors: Oklahoma State University, Iowa State University

PI/PDs: Andy Luse

Iowa State University: Anthony Townsend

 

Company-Sponsored Online Co-Creation and Financial Incentives: The Impact of Intrinsic Motivation on Participation Intention

In this study, we use LEGO Ideas, a prominent COCB, as an exemplar and employ a between-subjects randomized experimental design to examine the effect of different types of financial incentives on IM’s impact on participation intention in a COCB context, either directly or indirectly through personal innovativeness in the domain of information technology.  Our findings suggest that focused financial incentives, representing situations where financial rewards are administered exclusively on the basis of excellent performance, offer the best outcome for predicting PI.  Findings provide support for cognitive evaluation theory and insight into the role of financial incentives in a COCB context.

Sponsors: Oklahoma State University, Iowa State University

PI/PDs: Andy Luse

Iowa State University: Anthony Townsend, Sidharth Baswani

 

Using a Virtual Lab Network Testbed to Facilitate Real-world Hands-on Learning in a Networking Course

The use of an Internet testbed technology named ISEAGE allows students to design and implement fully functional networks using public IP space that is contained in the testbed. To the students, it appears as if they were directly connected to the Internet while still being protected. This paper shows that ‘real world’ projects using virtual lab technology can have a positive effect both on objective networking knowledge, as well as subjective self-assessments of self-efficacy with regard to implementing the technology. It also demonstrates that ‘real world’ final projects encourage student thinking at upper levels of Bloom's taxonomy.

Sponsors: Oklahoma State University, Iowa State University

PI/PDs: Andy Luse

Iowa State University: Julie Rursch

 

Gophish: Implementing a Real-World Phishing Exercise to Teach Social Engineering

Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through cooperation with an external corporate partner, students learned the legal, technical, behavioral, analysis, and reporting aspects of social engineering. The outcome provided both usable data for a real-world corporation as well as valuable educational experience for the students.

Sponsor: Oklahoma State University

PI/PDs: Andy Luse, Jim Burkman

 

This Isn’t Your Parent’s TV Show…Oh Wait, It Is

Whether it be old games, books, technology, movies, or TV shows, the prevailing thought is that the younger generation prefers newer things. While this view may be perpetuated online and in popular press, it may also be less than accurate as data actually shows younger generations preferring older content. Utilizing Uses and Gratifications Theory, this research tests this assumption by tracking favorite TV shows of Millennials and Gen Z’ers over a seven-year period. Results show that these individuals actually prefer non-current TV shows and that the level of “non-currentness” of their preference is growing over time.

Sponsor: Oklahoma State University

PI/PDs: Andy Luse, Jim Burkman

 

Wearables in the Workplace: Examination Using a Privacy Boundary Model

Wearable types can take many forms but this study focuses on RFID wearables due to their low cost, proven durability and reusability (Zhu & Hou, 2020). This research investigates the use of RFID wearables in the context of a corporate environment. Utilizing privacy boundary research, findings show that while being monitored negatively impacts employee satisfaction, this satisfaction further varies based on the voluntary nature of the implementation and the gender of the employee. Findings suggest that greater transparency in implementation may alleviate some of the negative aspects of implanting such technologies in the workplace.

Sponsor: Oklahoma State University

PI/PDs: Andy Luse, Jim Burkman

 

Hot or Not: The Impact of Self-Perceived Facial Attractiveness on Webcam Use During Virtual Meetings

This research investigates the impact of facial attractiveness in the decision of an individual to display their webcam during a videoconference. Results show that while men are driven by self-views of their own facial attractiveness, women are instead driven by their beliefs about what others think of their facial attractiveness. This provides important information for those who wish to create a richer interaction for the widespread use of videoconferencing tools.

Sponsor: Oklahoma State University

PI/PDs: Andy Luse, Jim Burkman, Erin Stewart

 

Hackalytics: Using Computer Hacking to Engage Students in Analytics

This teaching brief describes a novel approach to teaching analytics through computer hacking. Students are exposed to the entire data lifecycle by first collecting intrusion detection data through the hacking of other student machines and then utilizing simple analytics procedures to analyze this data. Quantitative and qualitative results show that the students enjoy the activity both in terms of the fun of hacking their fellow classmates as well as analyzing this data in an area less utilized in analytics instruction – security analytics. Three levels of the exercise are provided as well as how-to materials for students to run the exercise.

Sponsors: Oklahoma State University, Oregon State University

PI/PDs: Andy Luse

Oregon State University: Forough Shadbad

 

Best of Both Worlds: The Inclusion of Gamified Elements in Virtual Lab Environments to Increase Educational Value

This research explores the idea of investigating both contexts within one unified platform. We examine whether using gamified elements within virtual labs is effective in enhancing learners’ educational performance. Particularly, we employ leaderboards as a motivational gamification mechanism for more engagement and participation that can result in higher learning outcomes. Using a sample of students, our results show that utilization of gamification within a virtual lab environment causes students to exhibit higher performance in terms of more task accomplishments (specifically those tasks that are more complex in nature) and higher self-efficacy.

Sponsors: Oklahoma State University, Oregon State University

PI/PDs: Andy Luse, Gabe Bahr, Bryan Hammer

Oregon State University: Forough Shadbad

 

Positive Spillover Effects of Mask Mandate Policy and COVID-19 Spread

The mean daily case growth dropped 1.5 to 2.9 percent more following mask mandates for cities subject to the policy relative to non-mandate cities. We also examined whether mask mandate effects spilled over to neighboring municipalities without mandates and found evidence that spillover effects do occur. The spillover framework extends work in relational mobility to demonstrate that a relationally mobile society can have not only negative effects with regard to the spread of the virus, but also positive effects with regard to mask wearing spillover. This argues that mask mandates by major metro areas can be beneficial to neighboring communities.

Sponsor: Oklahoma State University

PI/PDs: Andy Luse, Greg Eaton, Jared Taylor, Ramesh Sharda

 

Learned Helplessness Attributional Scale (LHAS): Development and Validation of an Attributional Style Measure

In answer to the call to increase the use of attribution theory, we look to both the theory of learned helplessness and Weiner’s attribution theory to create a new set of scales to provide a stable, parsimonious instrument for measuring attributions.  Twelve sections of four courses across ten semesters were used to develop the scales and test them across groups and time.  The final result is a new measurement tool, the Learned Helplessness Attribution Scale (LHAS), that demonstrates solid psychometric properties.

Sponsor: Oklahoma State University

PI/PDs: Andy Luse, Jim Burkman

 

Blocking Effects of Information Sensitivity and Approach-avoidance Disposition on Online Information Disclosure: A Longitudinal Experiment Using EEG

We theorize that an overarching approach-avoidance mechanism drives information disclosure in which privacy- and trust-related concepts are driven by avoidance tendencies and approach tendencies, respectively. We posit blocking effects and approach-avoidance dispositions explain the inconsistencies. Using a longitudinal experimental design with EEG, we found that while sharing behavior of low sensitive information is not affected by either the approach-avoidance tendencies of the individual or initial information exposure, the sharing of highly sensitive information is significantly affected by both, such that disclosure is negatively impacted by initial exposure to highly sensitive information for those who display avoidance tendencies.

Sponsor: Oklahoma State University

PI/PDs: Andy Luse, Bryan Hammer

 

Information Sharing as a Multidimensional, Dyadic Problem: A Multilevel Study of Multiplex Relationships, Privacy, and Trust

Using network theory, we theorize that privacy concerns, trust, and information sharing occur at two levels: relational (i.e., dyadic) and individual. Relationships characterized as multiplex, or more multidimensional, are richer and experience greater trust while reducing privacy concerns. Utilizing data collected from an organization using Facebook as their communication and organization platform, we analyze our data using a Bayesian multilevel model approach. Our results indicate that privacy concerns operate mainly through the individual level while trust operates at the relational level. Our findings suggest that privacy mechanisms are more complex than previously modeled and that they depend on interpersonal relationships.

Sponsor: Oklahoma State University

PI/PDs: Andy Luse, Bryan Hammer

 

Are Some Countries Wasting Their Time and Money with ICT4D Initiatives? A Process Freedom Approach to Understanding ICT4D Barriers

Using publicly available archival data and a 2SLS model with instrumental variables, we test ICT cost, ICT infrastructure, and the interaction effect between e-participation and freedom of expression on ICTs to predict a country’s human development. Results suggest that both ICT cost and infrastructure significantly affect human development and that e-participation interacts with freedom of expression on ICTs in a way that freedom of expression is only effective when accompanied by high levels of e-participation within a country.

Sponsor: Oklahoma State University

PI/PDs: Andy Luse, Bryan Hammer, Gabe Bahr

 

Journal Rankings and Impact Factors: A Comparative Analysis

Publishing in journals of high quality and reputation has become increasingly important for faculty performance reviews, promotion and tenure.  The jury is still out regarding the best way to assess publications and varies widely among universities.  Traditionally, international universities have depended more on impact factors while nationally, results of journal ranking studies have taken precedence over impact factors which are based on cite scores.  This study investigates journal rankings and impact factors for business related publications looking at the correlation between the two.

Sponsor: Oklahoma State University

PI/PD: Jeretta Horn Nord

 

Critical Components in Organizational Performance

Organizational performance is one of the most important factors leading to a company’s success.  Recognizing the vital role of competencies, knowledge-oriented leadership, and innovation in organizations, there is a need to study how these variables affect organizational performance. This research builds a model with four constructs, i.e., competencies, knowledge-oriented leadership, innovation, and performance within manufacturing companies to find out, through path modeling, 1) the effect of competencies on innovation, 2) the effect of knowledge-oriented leadership on innovation, and 3) the effect of innovation on performance. The survey instrument included four constructs – Competencies, Knowledge-oriented Leadership, Innovation, and Performance. 

Sponsor: Oklahoma State University

PI/PDs: Jeretta Horn Nord, Alex Koohang, Joanna Paliszkiewicz, Marcin Soniewicki

 

Data Analytics in Organizations: Leadership, Management, Talent, and Performance

The success of today’s organizations depends on data analytics—obtaining data, analyzing it, and using the results to make informed decisions. Although the significance of analytics is recognized more than ever by those in businesses, many lack the leadership and talent to optimize the transition from data analytics to data-driven decision making. This research investigates the state of data analytics in organizations through an investigation of leadership, management, talent, and performance.

Sponsor: Oklahoma State University

PI/PD: Jeretta Horn Nord

 

The Internet of Things (IoTs)

Those in the emerging digital world have recently witnessed the proliferation and impact of IoT-enabled devices. The Internet of Things (IoTs) has provided new opportunities in the technology arena while bringing security, privacy, and trust challenges to an increased level of concern. This research investigates the usage, benefits, and challenges of IoTs in organizations. The research has both practical and theoretical impetus since IoT is still in its infancy, yet is considered by many as the most important technology initiative of today.

Sponsor: Oklahoma State University

PI/PD: Jeretta Horn Nord

 

Using the Gaussian Copula to Generate the Predictive Distribution in Monotonic Nonlinear Models: An Efficient Resampling Approach

We present a resampling approach for generating the predictive distribution of a dependent variable that has monotonic nonlinear relationships with its predictors. The procedure provides an empirical estimate of the predictive (conditional) distribution in terms of the original variables without requiring analyst intervention to identify appropriate transformations (and back-transformations) of variables. This allows predictions based on the estimated conditional expectation, and prediction intervals based on the estimate of conditional variance. It employs the well-known Gaussian copula, is easily implementable and is computationally efficient.

Sponsors: Oklahoma State University, University of Oklahoma

PI/PDs: Rathindra Sarathy

University of Oklahoma: Krish Muralidhar

 

When will I get out of the hospital? Modeling Length of Stay using Comorbidity Networks

Using the EMR hosted by CHSI, we build models for predicting hospital length of stay by incorporating historical and probable comorbidities that a patient is likely to face during their hospital stay. The results show significant improvement in predictive performance.

Sponsors: Oklahoma State University, Auburn University

PI/PDs: Ramesh Sharda

Auburn University: Pankush Kalgotra

 

Pandemic Information Support Lifecycle: Evidence from the Evolution of Mobile Apps during COVID-19

We propose a pandemic information support lifecycle (PISL) consisting of five phases: awareness, preventive care, active information, confidence building and evaluation. We validated this PISL using analysis of the mobile apps developed worldwide.

Sponsors: Oklahoma State University, Auburn University

PI/PDs: Ramesh Sharda

Auburn University: Pankush Kalgotra, Ashish Gupta

 

Examining multimorbidity differences across racial groups: a network analysis of electronic medical records

Using the EMR hosted through CHSI, we study health differences by analyzing multi-morbidities among seven population groups based on race. Our multimorbidity network analysis identifies specific differences in diagnoses among different population groups, and presents questions for biological, behavioral, clinical, social science, and policy research.

Sponsors: Oklahoma State University, Auburn University

PI/PDs: Ramesh Sharda, Julie Croff

Auburn University: Pankush Kalgotra

 

What should I believe? Exploring information validity on social network platforms

We develop a theoretical framework to explore the accuracy and objectivity of oscial networks content by employing social capital theory. The proposed and validated measures can help assign an accuracy and objectivity score to a conversation taking place in social media.

Sponsors: Oklahoma State University, Wright State University

PI/PDs: Ramesh Sharda

Wright State University: Daniel Asamoah

 

How Can Our Tweets Go Viral? Point-Process Modelling of Brand Content

We develop and test stochastic models based on Hawke’s process to be able to predict which tweets are likely to go viral.

Sponsors: Oklahoma State University, Wright State University

PI/PDs: Ramesh Sharda

Wright State University: Amir Hasan Zadeh

 

Analytics/Data Science Decision Support for Management of Oklahoma COVID pandemic

We assist the State of Oklahoma with data accuracy analyses and positivity rate changes to better understand and mitigate the Covid-19 pandemic.

Sponsors: Oklahoma State Department of Health

PI/PDs: Ramesh Sharda, Andy Luse

 

COVID Increase Drives Decrease in Travel Risk Perception

This is a comparative analysis of perceived international travel risk immediately prior to COVID outbreak and in the months following most airlines returning to near full capacity.

Sponsor: Oklahoma State University

PI/PD: Mark Weiser

 

Task-based Self-efficacy and Perception Changes from Short-term Study Abroad Experiences

This study evaluates the practical value of short-term faculty-led study abroad experiences to increase an individual's efficacy in tasks specifically related to traveling and interacting abroad, and in comfort and security perceptions about the country of travel and other countries.

Sponsor: Oklahoma State University

PI/PD: Mark Weiser

 

Close to Home: A Survey of Municipal Policies for Short-term Home Rentals

This study surveys municipal legislation from small cities in which a Division 1 FBS school is located to categorize approaches in developing home-sharing markets.

Sponsor: Oklahoma State University

PI/PD: Mark Weiser

 

Impacts of Smart Technology on Short-term Rentals Operations

This study analyzes the financial and operational impacts of deploying smart technologies in short-term rentals. Landlords are usually not co-located with lodging units rented through short-term agents, such as Airbnb and VRBO. Application of smart thermostats, plugs, and energy monitors can have a significant impact on costs without a comparable increase in operational burden. Using a case study of five properties, we assess the impact of these devices and explore additional benefits derived from behavioral changes by tenants due to the presence of these devices.

Sponsor: Oklahoma State University

PI/PD: Mark Weiser

MENUCLOSE