Connie S. Albert
The focus of my research is the intersection of social media and human behavior. Specifically, I am examining the behaviors of adults and children within predatory discourse online and the aspects of social media that enable the phenomenon to occur. This research has three main purposes. First, we aim to increase the understanding of online predatory behavior toward the goal of improved identification of predators online. Secondly, we aim to increase the understanding of communication between parents/guardians and children regarding predatory behaviors online toward the goal of improved mechanisms of communication. Lastly, we aim to increase the knowledge of Information Systems researchers regarding the Critical Discourse Analysis research method, an underutilized methodology within the field up to this point.
Despite popularity and validity of peer assessment techniques in education and academic research, several critical limitations exist in current designs of peer assessment systems. Dmytro Babik explores the limitations that hinder the use of peer assessment in education, research, and social media; characteristics of tasks/artifacts most suitable for peer assessment; motivation for further development of peer assessment techniques; and IT-enabled peer assessment environments. The Double-Loop Mutual Assessment (DLMA) method is being developed in collaboration with Dr. Eric Ford and, based on this research, a web-based social learning information platform called Mobius SLIP is being built for fostering and assessing complex task competencies through social practice.
My most recent research project examines how mobile device use influences work-life balance. Increased capabilities of mobile devices have influenced the ubiquity of computing resources so that individuals are always connected to both work and life. This study seeks to further previous qualitative research on the influence of mobile devices on work-life balance. The objective of this research is to explain how mobile devices influence the work-life balance of business professionals by exploring the relationships between mobile device usage, productivity, employer expectations, flexibility of work structure, and work-life balance. Through an examination of prior literature on the concepts of interest, a model was developed to formulate the hypothesized relationships. In order to test the hypothesized model, an instrument was developed and a survey was conducted. Interesting results emerge. This research contributes to the academic knowledge on this subject while also helping to better understand a practical problem that currently challenges many companies.
Donald Heath Jr.
I am currently engaged in case research with Infosys Ltd., a global business process outsourcing firm. The focus of this research is on organizational strategies for social media engagement. My second stream of research concerns misalignment between the native business models of organizations and those of their enterprise software. Alignment is examined using an interpretive approach in order to understand misalignment from the perspective of the individual, business unit, and organization. Participating organizations include Cone Health and BE Aerospace. Lastly, I am conducting research on the design of a socio-semioticly organized nomological ontology of topics, contexts, and web content. The design artifact is a social tool which allows the crowd to introduce topics and associations to grow the ontology, and to democratically select the most appropriate web links to inform the elements of the ontology. This research is being conducted in partnership with Investco Inc. under their commercial patent.
Rozan Omar Maghrabi
My research topic focuses on the impact of advanced Information and Communication Technology (ICT) and its role in changing our lives and influencing the way we view the world. In a general sense I am interested in the research questions of: What is the role of ICT in social and cultural change? And how is this role manifested not only to support but to create new social actions and culturally linked behaviors? The ultimate goal is to develop theories that help us to understand the active role of technology and the emergence use and outcomes as a result of its interaction with social behaviors.
Richelle L. Oakley
A disturbing trend of individuals engaging in inappropriate behaviors with technology, cyber deviance, is occurring in both organizational and personal settings. Researchers have used various theoretical approaches to explain these behaviors. However, in a digital context, research has also shown that individuals do not perceive forms of cyber deviance as inappropriate, and they also believe that significant others agree with their beliefs. This study aims to apply an integrative theoretical framework, which includes individual, social, and technical factors as antecedents to cyber deviant behaviors. Through a deeper understanding of the influential factors to cyber deviance, we aim to develop a more well-rounded conceptual view of the behaviors of conscientious cyber citizens.
The focus of my research is on studying blind users’ interactions with health technologies and to improve the technology design to achieve better interaction outcomes. Specifically, I am eliciting and understanding blind users’ problem-solving strategies in the context of accomplishing various personal health information management tasks using eHealth and mHealth interfaces. I will conduct an observation study to generate the design knowledge, will then re-design the interfaces, and will test the efficacy of the new design using a repeated measure experiment. I am using verbal protocol analysis to analyze the qualitative data.
My research focuses on behavior and motivation in the performance of information system security tasks in organizations and on other forms of information-related deviance. My research examines these topics at both the organization and individual levels. Organization-level information system security research is in a nascent state. In particular, few studies seek to explain and predict organizational violations of security and privacy laws and standards. Given the devastating effects that breaches of security and privacy can have on individuals and society, it is increasingly important to understand why organizations violate security and privacy laws and standards. Individual-level information system security research, particularly behavioral research, is also in a nascent state. Much of the current research in this area focuses on the effect formal organizational controls have on employees’ information security behaviors. My research, however, focuses on the informal and interactional events and practices that affect employees’ security behaviors in the workplace. This focus directs managers to the importance that daily interactions with employees have on employees’ security behaviors.
My research interest is in how conflict impacts the performance of virtual teams (VTs). Current IS research is inconclusive about the role of conflict within VTs. It is not conflict itself, but how conflict is dealt with within the socio-emotional structure of the VT that affects its performance. In order to study this phenomenon, my research is grounded in structural balance theory (SBT) (Heider, 1946). The central hypothesis of SBT is that cognitive structures are motivated to achieve a balanced state. The goal of this research is to answer the following question: Do virtual teams develop structural stability over time and is there a relationship between structural stability, conflict, and virtual team performance? The goal of this research is to provide a developmental view of the emergence and impact of structural stability within VTs.