Information Privacy and Security Associated with Healthcare Technology Use

This dissertation consists of three studies that investigate the information privacy & security associated with healthcare technology use. Essay 1 PRISMA-style systematically reviews the existing literature on privacy information disclosure in IoT technology and serves as the theoretical foundation of the current research. It is crucial to comprehend why, how, and under what consequences individuals choose to disclose their personal and health information since doing so is beneficial to the company. This SLR method allows us to find those factors that significantly impact individuals' behavioral intention to disclose personal information while using IoT technologies. Essay 2 posits, develops, and tests a comprehensive theoretical framework built upon the theory of planned behavior and the health belief model to examine factors affecting willingness to disclose PHI in order to use WFDs. A research survey is designed and distributed to a crowdsourcing platform, Mechanical Turk (M-Turk). Research hypotheses are tested using partial least square – structural equation modeling (PLS-SEM). To achieve this purpose, Essay 3 extends the findings from the previous essay and further investigates the caregiver context. Therefore, we developed a novel theoretical model utilizing privacy calculus theory and the technology acceptance model to investigate the willingness of the elderly to disclose …
Date: July 2023
Creator: Amin, M A Shariful
System: The UNT Digital Library

Incorporating Ethics in Delegation To and From Artificial Intelligence-Enabled Information Systems

AI-enabled information systems (AI-enabled IS) offer enhanced utility and efficiency due to their knowledge-based endowments, enabling human agents to assign and receive tasks from AI-enabled IS. As a result, this leads to improved decision-making, ability to manage laborious jobs, and a decrease in human errors. Despite the performance-based endowments and efficiencies, there are significant ethical concerns regarding the use of and delegation to AI-enabled IS, which have been extensively addressed in the literature on the dark side of artificial intelligence (AI). Notable concerns include bias and discrimination, fairness, transparency, privacy, accountability, and autonomy. However, the Information Systems (IS) literature does not have a delegation framework that incorporates ethics in the delegation mechanism. This work seeks to integrate a mixed deontological-teleological ethical system into the delegation mechanism to (and from) AI-enabled IS. To that end, I present a testable model to ethically appraise various AI-enabled IS as well as ethically evaluate delegation to (and from) AI-enabled IS in various settings and situations.
Date: July 2023
Creator: Saeed, Kashif
System: The UNT Digital Library

Three Essays on Collective Privacy and Information Security

In Essay 1, we seek to expand the insights on an individual's decision to share group content. Social networking sites (SNS) have become a ubiquitous means of socializing in the digital age. Using a survey, we collected data from 520 respondents with corporate work experience to test our research model. Our analysis highlights the complex interplay between individual and group factors that shape users' risk-benefit analysis of sharing group content on social networking sites. Furthermore, the results of this study have important implications for social networking site design and policy, particularly with regard to providing granular control over the privacy settings of group content and clear and concise information about the potential risks and benefits of sharing group content. Essay 2 aims to extend the knowledge of information security policy (ISP) compliance. Using a comprehensive approach, we extended the perspective of control mechanisms in the context of ISPs. It is evident that maintaining information security is an important concern for organizations of all sizes and industries. Organizations can establish policies and procedures to regulate and ensure compliance with information security policies, and various control mechanisms can be employed to ensure compliance. Among these control mechanisms, enforcement, punishment, evaluation, and recognition …
Date: July 2023
Creator: Memarian Esfahani, Sara
System: The UNT Digital Library

Quantitative Modeling of Healthcare Services and Biodegradable Medical Supplies

This research presents a mathematical model for the transportation and distribution of COVID-19 vaccine, a simulation model for fleet optimization, and a measurement model for "Healthcare 4.0." Essay 1 examines the development of a distribution model using mixed integer programming (MIP) with the objective of maximizing the number of vaccinated individuals, minimizing transportation costs across the entire network, and ensuring widespread access. This research primarily focuses on the distribution aspect of the vaccine and accordingly devises a model for transportation and distribution that ensures swift and efficient delivery of the COVID-19 vaccine. Essay 2 provides a simulation-based model to enhance logistics performance by including drones along with vaccine trucks and air cargo in the vaccine distribution fleet. The simulation model focuses on minimization of the overall cost of distribution of medical supplies. This second study shows that the types of vehicles utilized have an impact on overall system performance. The selection of the appropriate mix for the mode of transportation impacts transportation costs and lead time. To increase the responsiveness and cost-effectiveness of the logistics system for delivery of the vaccine a proper fleet configuration is required. The model developed in this study is validated via application in Telangana, India …
Date: July 2023
Creator: Kumar, Abhijeet
System: The UNT Digital Library