Exploring EHR Adoption and Implementation: The Impact of Resource Advantage Theory on Healthcare Organization's Competitive Position

Access: Use of this item is restricted to the UNT Community
The hospitals and their healthcare providers need to optimize simultaneously three outcomes: healthcare costs, healthcare options offered to customers, and information utilization efficiency. The adoption of electronic healthcare record (EHR) technologies is a potential managerial mechanism for balancing these outcomes. EHR offers patient management and decision support capabilities that can ameliorate health delivery outcomes for patients, doctors, and hospitals through better-informed business and care decisions. The analysis of data collected in an EHR system may lower costs and improve health care delivery (or both). In sum, it could be argued that EHR is a source of competitive advantage. Despite this prima facie appeal, many hospitals remain reluctant to adopt and implement EHR due to lack of insights into return on investment, unavailability of tested systems and data entry obstacles. To address this gap between the potential of EHR system and lack of its adoption, the purpose of this research is to investigate the role of EHR as a resource of competitive advantage for hospital. Essay 1, titled "Implementation and Adoption of EHR: A Conceptual Model based on Resource Advantage Theory", describes the antecedents and consequences of EHR adoption and implementation. Essay 2, titled "Exploring the Relationship Between Electronic Healthcare Record …
Date: August 2019
Creator: Malhan, Amit Sundeep
System: The UNT Digital Library

The Impact of Blockchain Food Tracing Information Quality and Trust on Intention to Purchase

The purpose of our research is to empirically test how system attributes of blockchain build trust through system and information components in blockchain food traceability systems. Findings showed that system attributes of blockchain are strong predictors of trust leading to intention to purchase. A sample of 358 responses were collected from college students through online survey. SmartPLS 3.0 is adopted for data analysis. We made contributions by building a new research model to guide future studies on trust formation in blockchain based systems as well as informing practice to adopt proven features of blockchain to create and capture values for customers.
Date: August 2022
Creator: Lai, Im Hong
System: The UNT Digital Library

Factors Influencing Continued Usage of Telemedicine Applications

This study addresses the antecedents of individuals' disposition to use telemedicine applications, as well as the antecedents of their usage to provide insight into creating sustained usage over time. The theoretical framework of this research is Bhattacherjee's expectation-confirmation IS continuance model. By combining a series of key factors which may influence the initial and continued usage of telemedicine applications with key constructs of Bhattacherjee's IS continuance model, this study aims to provide a deeper understanding of barriers to telemedicine app usage and how to facilitate continued use of these apps. Online survey data was collected from college students who are telemedicine application users. A total of 313 responses were gathered, and data analysis was conducted using SmartPLS 3. This dissertation contributes by looking at the IS adoption and IS continuance research simultaneously to connect these two research streams as well as suggesting the usage context of some established IS theory being different with regard to healthcare applications.
Date: August 2022
Creator: Liu, Xiaoyan
System: The UNT Digital Library

Three Essays on Harmony in Intrapersonal Identity Networks

Drawing attention to an under-examined process during organizational socialization, we develop theory to explain how newcomers' new organizational roles and social identities become embedded. The process of identities becoming embedded is influenced by how an individual's preexisting identities interact with new organizational identities during socialization. Perceived harmony relationships among identities indicate if newcomers experience identities interacting in a positive or negative manner generally. Using a network perspective, we suggest that the identity embeddedness of new roles and identities are indicated by: degree centrality in an intrapersonal identity harmony network, perceived harmony with the network itself, and the perceived cost of lacking harmony with a focal identity. Newcomers are likely to be more satisfied and engaged with identities with greater embeddedness as well as find such identities more salient. Organizations can work to embed their employees' new identities through initiating identity work directed towards increasing harmony perceptions among the newcomers' new organizational identities and preexisting identities. Through helping individuals create harmony relationships among identities, organizations can improve socialization outcomes.
Date: August 2021
Creator: Anzollitto, Peter
System: The UNT Digital Library
From Property to Person: Understanding the Mediating Role of Control on Ovulation in the Female Consumer Experience (open access)

From Property to Person: Understanding the Mediating Role of Control on Ovulation in the Female Consumer Experience

My aim is to design a research program that emphasizes inclusivity through empiricism rather than anecdotes and benevolent sexism. To accomplish this goal, I review and build on the work assessing the influence of fertility in the female consumer experience (FCE). Fertility, especially menstruation, has been used anecdotally for too long. This research was designed to address the gap in knowledge around the way in which women perceive advertisements. More specifically, the role fertility plays in the process women go through when assessing advertisements and offerings. Does a woman's desire to seek variety become reduced when she sees a rival endorsing the offering? If this is the case, then there is a need to find a mediating variable that can overcome this effect. Internal locus of control, the level a person feels they are in control of the outcomes in their lives, was selected as a starting point. Having a high internal LOC should buffer a person's perceptions of another as a threat. A cross-sectional design from a convenience sample of university students was used to address a series of five research questions: 1) Does fertility status influence locus of control, 2) Does fertility status influence rival assessment, 3) Does …
Date: August 2019
Creator: Njoroge, Lydia
System: The UNT Digital Library
The Use of Data Analytics in Internal Audit to Improve Decision-Making: An Investigation of Data Visualizations and Data Source (open access)

The Use of Data Analytics in Internal Audit to Improve Decision-Making: An Investigation of Data Visualizations and Data Source

The purpose of this dissertation was to examine how managers' judgments from an internal auditor's recommendation are influenced by some aspects of newer data sources and the related visualizations. This study specifically examined how managers' judgments from an internal auditor's recommendation are influenced by the (1) supportiveness of non-financial data with the internal auditor's recommendation and (2) evaluability of visual representations for non-financial data used to communicate the recommendation. This was investigated in a setting where financial data does not support the internal auditor's recommendation. To test my hypotheses, I conducted an experiment that uses an inventory write-down task to examine the likelihood that a manager agrees with an internal auditor's inventory write-down recommendation. This task was selected as it requires making a prediction and both financial and newer non-financial data sources are relevant to inform this judgment. The study was conducted with MBA students who proxy for managers in organizations. Evaluability of visual representations was operationalized as the (1) proximity of financial and non-financial graphs, and (2) type of non-financial graph as requiring a length judgment or not. This dissertation contributes to accounting literature and the internal auditing profession. First, I contribute to recent experimental literature on data analytics …
Date: August 2019
Creator: Seymore, Megan
System: The UNT Digital Library

Three Essays on Phishing Attacks, Individual Susceptibility, and Detection Accuracy

Phishing is a social engineering attack to deceive and persuade people to divulge private information like usernames and passwords, account details (including bank account details), and social security numbers. Phishers typically utilize e-mail, chat, text messages, or social media. Despite the presence of automatic anti-phishing filters, phishing messages reach online users' inboxes. Understanding the influence of phishing techniques and individual differences on susceptibility and detection accuracy is an important step toward creating comprehensive behavioral and organizational anti-phishing awareness programs. This dissertation seeks to achieve a dual purpose in a series of three essays. Essay 1 seeks to explore the nature of phishing threats that including identifying attack intentions, and psychological and design techniques of phishing attacks. Essay 2 seeks to understand the relative influence of attack techniques and individual phishing experiential traits on people's phishing susceptibility. Essay 3 seeks to understand an individual's cognitive and affective differences that differentiate between an individual's phishing detection accuracy.
Date: August 2022
Creator: Bera, Debalina
System: The UNT Digital Library