Current Search: Information Technology (x)
View All Items
- Title
- Searching for Meaningful Use of Health Information Technology: A Study of Cardiovascular Disease Care in Veterans General Hospitals.
- Creator
-
Thaldorf, Carey, Wan, Thomas, Fottler, Myron, Liberman, Aaron, Campbell, Robert, University of Central Florida
- Abstract / Description
-
The cost of healthcare in the United States is on an upward trajectory towards an unsustainable level. In order to address this, Congress and the Obama Administration passed the American Recovery and Reinvestment Act (ARRA) of 2009 to begin the process of controlling these costs. Within the ARRA is the Health Information Technology for Economic and Clinical Health (HITECH) section which creates financial incentives to invest in Health Information Technology (HIT) and to develop a means to...
Show moreThe cost of healthcare in the United States is on an upward trajectory towards an unsustainable level. In order to address this, Congress and the Obama Administration passed the American Recovery and Reinvestment Act (ARRA) of 2009 to begin the process of controlling these costs. Within the ARRA is the Health Information Technology for Economic and Clinical Health (HITECH) section which creates financial incentives to invest in Health Information Technology (HIT) and to develop a means to measure the Meaningful Use of specific functions of Electronic Health Records (EHRs). This research examines the widely used Joint Commission datasets to determine their suitability as a basis of meeting the government mandated measuring of Meaningful Use. The datasets used for this study consists of hospital level performance measures with a sample size of 370 hospital samples of HIT Use Intensity and Cardiovascular Performance attained from the Veterans Health Administration (VHA). An Organizational Network Theoretical approach was applied to the data in a non-experimental, sample-resample design to data collected in 2007. A Structural Equation Model (SEM) was built to test for the strength of the correlation between HIT Use Intensity and Cardiovascular Performance and a Latent Growth Curve Model (LGM) was built to examine the effect of the trajectory of HIT Use Intensity on the trajectory of Cardiovascular Performance. The SEM found a weak (.18) correlation between HIT Use Intensity and Cardiovascular Performance and the model only captured 12 percent of the variance. The LGM found no convergence between the trajectories of HIT Use Intensity and Cardiovascular Performance. This may have been the result of the data being non-normally distributed and heavily skewed to the high end of the scale. The policy implications of this study indicate that while Joint Commission data capture only a small amount of the variance attributed to HIT Use it does show a weak but positive correlation between increases in HIT Use Intensity and Increases in Cardiovascular Performance at the hospital level. Future research into adjustments to Joint Commission data measures (or others) may prove to be valuable in measuring the Meaningful Use of HIT systems in order to help hospitals make educated decisions on which HIT systems to purchase and the potential benefits associated with them.
Show less - Date Issued
- 2011
- Identifier
- CFE0004488, ucf:49319
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004488
- Title
- DEFINING WORKPLACE INFORMATION FLUENCY SKILLS FOR TECHNICAL COMMUNICATION STUDENTS.
- Creator
-
Zhang, Yuejiao, Dombrowski, Paul, University of Central Florida
- Abstract / Description
-
Information fluency refers to the ability to recognize information needs and to gather, evaluate, and communicate information appropriately. In this study, I treat "information fluency" as both an overall competency and as a collection of knowledge and skills. The purpose of this study is to explore the specific workplace information fluency skills valued by employers of technical communicators, to find out how instructors perceive and teach these skills, and to suggest how these findings can...
Show moreInformation fluency refers to the ability to recognize information needs and to gather, evaluate, and communicate information appropriately. In this study, I treat "information fluency" as both an overall competency and as a collection of knowledge and skills. The purpose of this study is to explore the specific workplace information fluency skills valued by employers of technical communicators, to find out how instructors perceive and teach these skills, and to suggest how these findings can inform our teaching practices. Within the framework of qualitative methodology, this study employs two data-collection instruments, including a content analysis of online job recruitment postings and a survey of technical communication instructors across the United States. The study discovers that when hiring technical communicators, employers require candidates to have skills in information processing, information technology, and critical thinking. Candidates must be able to identify their information needs, and must know how to use specified tools to gather, evaluate, and communicate information. It also reveals that although "information fluency" is a new terminology to a majority of instructors, the skill sets that constitute information fluency already existed in their knowledge. The study's last finding suggests that the opportunity for an internship is perceived as the most helpful in students' acquisition of information fluency skills. This dissertation concludes with a list of specific employer-valued information fluency skills, recommendations for program administrators and instructors for implementing information fluency, as well as recommendations for future researches on this subject.
Show less - Date Issued
- 2010
- Identifier
- CFE0003170, ucf:48604
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003170
- Title
- CRITICAL DIGITAL INFRASTRUCTURE PROTECTION: AN INVESTIGATOIN INTO THE INTERGOVERNMENTAL ACTIVITIES OF INFORMATION TECHNOLOGY DIRECTORS IN FLORIDA COUNTIES.
- Creator
-
Devenny, Joah Nicole, Abel, Eileen, University of Central Florida
- Abstract / Description
-
As cyber attacks become more sophisticated, the risk to all networked computer systems increases. Whether public or private, whether federal, state, or local, the threat is equally real. Consequently, local governments must respond accordingly to understand the threats, take measures to protect themselves, and determine how to respond in the event of a system breach. Additionally, since cyber criminals do not respect geographic or administrative boundaries, local leaders must be prepared to...
Show moreAs cyber attacks become more sophisticated, the risk to all networked computer systems increases. Whether public or private, whether federal, state, or local, the threat is equally real. Consequently, local governments must respond accordingly to understand the threats, take measures to protect themselves, and determine how to respond in the event of a system breach. Additionally, since cyber criminals do not respect geographic or administrative boundaries, local leaders must be prepared to instantly interact with other governments, agencies, and departments to suppress an attack.Guided by the theory of intergovernmental management (IGM), this exploratory research investigated how Information Technology (IT) Directors in Florida county constitutional offices use intergovernmental relations and management activities as part of their information security efforts. Specifically, this research sought to determine: 1) which IGM activities do county IT Directors most often perform; 2) do county IT Directors make more use of vertical or horizontal IGM relationships; 3) is there a relationship between office/county demographics and the IGM activities its IT Directors most often perform?To answer these questions, an electronic survey was distributed to 209 directors, of which 125 responded. Overwhelmingly, the findings indicate that these Directors rarely engage in IGM activities regardless of the purpose or type of government/department contacted. However, when seeking intergovernmental assistance, it is most often horizontally with other Departments within their own government and least often vertically with Federal offices. The most frequently performed intergovernmental activity is seeking technical assistance, however seeking program/project information is also perform more frequently than the other activities explored in this research. The least frequently performed activities involved seeking to modify established IT partnerships. Further, there was evidence of relationships between certain office/county demographics and IGM activity. The discovery of these patterns and relationships can be used to aid policy and program development, as well as to stimulate deeper inquiry into the intergovernmental dimensions involved in protecting local elements of the U.S. Critical Digital Infrastructure.
Show less - Date Issued
- 2004
- Identifier
- CFE0000059, ucf:46113
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000059
- Title
- VALUE MAPPING FRAMEWORK INVOLVING STAKEHOLDERS FOR SUPPLY CHAIN IMPROVEMENT WHEN IMPLEMENTING INFORMATION TECHNOLOGY PROJECTS.
- Creator
-
Moore, Karla, Rabelo, Luis, University of Central Florida
- Abstract / Description
-
Successful Supply Chain Management (SCM) depends on how well an organization performs internal and external communications with trading partners, executes the logistics component, and understands/monitors related costs of conducting its business. The use of information technology (IT) is considered a prerequisite for the effective control of today's complex supply chains. Increased communication technology has redefined how businesses work together, raised customer expectations, and...
Show moreSuccessful Supply Chain Management (SCM) depends on how well an organization performs internal and external communications with trading partners, executes the logistics component, and understands/monitors related costs of conducting its business. The use of information technology (IT) is considered a prerequisite for the effective control of today's complex supply chains. Increased communication technology has redefined how businesses work together, raised customer expectations, and placed new demands on supply chain performance. IT components with proven and rapid return-on-investment are favored to support critical supply chain processes such as leaner manufacturing processes, consumer-driven supply chains, and customer responsiveness. The use of IT in the digital era has become critical and it is treated as a major competitive tool for success. Complex and comprehensive IT infrastructures support the firm's communications network, databases, and operating systems. Information technology facilitates the creation of value. However, the creation of value is defined by the different groups of stakeholders. Therefore, stakeholders must be integrated into this process of change management that uses IT as the enabler. Supply chains are due to change when higher levels of performance and/or adaptation are required as mandated by changes in the business structure and/or benchmarking and/or regulations. One of the major problems for any supply chain executive is to understand and manage these changes. These changes usually require the implementation of an IT project. Therefore, the successful design, execution, and completion of these IT projects are important for the supply chain. SCM is now a strategic function addressed at the highest levels of the organization in concert with multiple stakeholders on both the supplier and customer side of the table. The aim of this dissertation is to develop a value mapping framework involving stakeholders to improve supply chain performance when implementing IT projects. The framework has components that help define the supply chain, measure the size of the issues, identify necessary changes in the metrics to improve performance, measure the organizational consequences of these changes, and develop and follow a plan to implement IT projects to achieve the new goals of performance. Through this new framework, these IT projects will be able to bring the supply chain from a current state "As is" to a future state "To be"; capturing the existing and desired states of the proposed changes which are aligned with the objectives and goals of the organization. Therefore, the IT project can be designed, executed, and completed. One unique component of this framework is the inclusion of the stakeholders at different stages. This framework identifies the group of stakeholders to be taken into consideration in order to define the future "To be" state. In addition, the framework identifies the value creation of the "To be" system as seen by the stakeholders.
Show less - Date Issued
- 2008
- Identifier
- CFE0002108, ucf:47541
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002108
- Title
- PERSPECTIVES OF HEALTH INFORMATION MANAGEMENT FACULTY USE OF AN E-LEARNING LABORATORY AND TECHNOLOGY ACCEPTANCE.
- Creator
-
Meli, Peggy, Sivo, Stephen, University of Central Florida
- Abstract / Description
-
"As the delivery of healthcare has become more sophisticated, scientific, and complex, the need for HIM (Health Information Management) professionals at all levels has increased, and the role and status of those managing these functions has increased accordingly." (AHIMA, September 24, 2007). Studies by the Institute of Medicine and others have found suboptimal technology use throughout the healthcare industry. The American Health Information Management Association (AHIMA) developed the e-HIM...
Show more"As the delivery of healthcare has become more sophisticated, scientific, and complex, the need for HIM (Health Information Management) professionals at all levels has increased, and the role and status of those managing these functions has increased accordingly." (AHIMA, September 24, 2007). Studies by the Institute of Medicine and others have found suboptimal technology use throughout the healthcare industry. The American Health Information Management Association (AHIMA) developed the e-HIM Virtual Lab (V-lab) to train students in the use of new technology applications in response to IOM findings. Faculty are the gatekeepers for use of instructional technology in educational settings. Many disciplines have evaluated instructional technology use by students. There are very few studies on faculty use of instructional technology. There are no published studies of the determinant factors influencing health information management (HIM) faculty use of instructional technology. Therefore, the purpose of this study is to evaluate the faculty's attitude and behavior toward the use of the V-lab instructional technology. A non-random one group pretest posttest design was used to test the hypothetical Instructional Perception -Technology Acceptance Model (IP- TAM) for faculty perceptions regarding system functionality, usability and technology acceptance. The Path Analysis determined the strongest construct indicators for intent to use the V-lab were Perceived Usefulness (PU), Perceived Ease Of Use (PEOU), System Functionality and Usability (SFU). These findings support the recommendation for a collaborative examination of the existing V-lab systems to improve utilization and success.
Show less - Date Issued
- 2008
- Identifier
- CFE0002140, ucf:47500
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002140
- Title
- A REAL OPTION STRATEGIC SCORECARD DECISION FRAMEWORK FOR IT PROJECT SELECTION.
- Creator
-
Munoz, Cesar, Rabelo, Luis, University of Central Florida
- Abstract / Description
-
ABSTRACT The problem of project selection is of significant importance in management of information systems. Almost $2 trillion is spent worldwide every year on IT projects, with over $600 billion spent in the US alone. Traditionally, managers have being using the classical net present value (NPV) method in conjunction with multicriteria scoring models for ROI analysis and selection of IT project investments The multicriteria models use ad-hoc evaluation criteria to assign priority weights...
Show moreABSTRACT The problem of project selection is of significant importance in management of information systems. Almost $2 trillion is spent worldwide every year on IT projects, with over $600 billion spent in the US alone. Traditionally, managers have being using the classical net present value (NPV) method in conjunction with multicriteria scoring models for ROI analysis and selection of IT project investments The multicriteria models use ad-hoc evaluation criteria to assign priority weights and then rate the alternatives against each criterion. These models have two limitations. First, the criteria and weights are based on subjective judgments, allowing the introduction of politics in the information management decision process and the generation of arbitrary results. Second, the classical approach uses deterministic estimations of the cost, benefits and the returns of the projects, without considering the impact of uncertainty and risk in the business decisions. This research proposed a better alternative for ROI analysis and selection of IT projects using a real option strategic scorecard (ROSS) approach. In contrast with traditional methodologies and previous research work, the ROSS decision framework uses a more comprehensive, axiomatic approach for systematically measuring both the business value and the strategic implications of IT project investments. The ROSS approach integrates in a unified IT project management decision framework the best elements of real option theory, strategic balanced scorecards, Monte Carlo simulations and analytical network processes to fully analyzes the effect of uncertainty and risk in the IT investment decisions. In addition, the ROSS approach complies with the critical success factors that have being identified in the literature for validation of IT decision frameworks. The main benefit of the ROSS approach is to enable managers to better compare and rank projects in the IT portfolio, optimizing the ROI analysis and selection of information system projects.
Show less - Date Issued
- 2006
- Identifier
- CFE0001331, ucf:46975
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001331
- Title
- GENERATION AND THE GOOGLE EFFECT: TRANSACTIVE MEMORY SYSTEM PREFERENCE ACROSS AGE.
- Creator
-
Siler, Jessica, Hancock, Peter, University of Central Florida
- Abstract / Description
-
A transactive memory system (TMS) is a means by which people may store information externally; in such a system the task of remembering is offloaded by remembering where information is located, rather than remembering the information itself. As Sparrow et al. (2011) suggest in the article Google Effects on Memory: Cognitive Consequences of Having Information at Our Fingertips, people are beginning to use the internet and computers as a TMS, and this use is changing the way people encounter...
Show moreA transactive memory system (TMS) is a means by which people may store information externally; in such a system the task of remembering is offloaded by remembering where information is located, rather than remembering the information itself. As Sparrow et al. (2011) suggest in the article Google Effects on Memory: Cognitive Consequences of Having Information at Our Fingertips, people are beginning to use the internet and computers as a TMS, and this use is changing the way people encounter and treat information. The purpose of this thesis is to investigate whether preference for TMS type (either with books or with computers) varies across age groups. An interaction between TMS preference and age was hypothesized. Before the onset of the internet age, information was primarily found in books and other print materials whereas now the internet is more frequently used, thus this shift in thinking and habit across generations was expected to emerge in the data. The study yielded a total of 51 participants, 32 from the young age group (ages 18-24) and 19 from the old (ages 61-81). A modified Stroop task and question blocks (for priming purposes) were employed to examine whether people are prone to think of book- or computer-related sources when in search of information. Also, a "Look up or Learn" tendencies survey was used to better understand how people decide whether certain information should be learned or left to be "looked up" later (Yacci & Rosanski, 2012). The mixed ANOVA did not reveal main effects for question difficulty or TMS type, nor was an interaction with age found. The results were not consistent with those of Sparrow et al. (2011) and did not show significance for TMS preference. Future studies should continue to examine the Google effect and TMS preference, as it bears important applications for a number of fields.
Show less - Date Issued
- 2013
- Identifier
- CFH0004473, ucf:45118
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0004473
- Title
- THE INTEGRATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN THE CONTENT AREAS AND ADOLESCENT MOTIVATION.
- Creator
-
Blackwell, Lindsey, Zygouris-Coe, Vicky, University of Central Florida
- Abstract / Description
-
This study was designed to investigate the types of Information and Communication Technologies (ICTs) integrated into the content area classrooms of two local high schools, and whether the use of these ICTs motivated adolescent students to read and write in the content areas. The investigator created a student survey, student, teacher, and other support faculty interview protocols, and a classroom observation protocol to collect data for the study. The investigator faced several challenges...
Show moreThis study was designed to investigate the types of Information and Communication Technologies (ICTs) integrated into the content area classrooms of two local high schools, and whether the use of these ICTs motivated adolescent students to read and write in the content areas. The investigator created a student survey, student, teacher, and other support faculty interview protocols, and a classroom observation protocol to collect data for the study. The investigator faced several challenges which prevented her from spending adequate time in the schools. Due to these challenges, sufficient data was not obtained to form conclusions about the research questions. This thesis will present the review of literature, methodology, and plan for completing the study in the future.
Show less - Date Issued
- 2010
- Identifier
- CFE0003554, ucf:48914
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003554
- Title
- The Impact of Technology on Management Control: Degradation, Empowerment, or Technology Dominance?.
- Creator
-
Canada, Joseph, Arnold, Vicky, Roberts, Robin, Sutton, Steven, Benford, Tanya, University of Central Florida
- Abstract / Description
-
The evolution of technology brings with it the evolution of business processes. Without a doubt, technology changes how work is performed. At first glance, workplace technology appears to be a great boon to society. However, research presents opposing views on how workplace technologies impact the individual. One perspective argues that organizations utilize technology to redesign work processes, such that the worker requires less skill, autonomy, and compensation. The opposing perspective...
Show moreThe evolution of technology brings with it the evolution of business processes. Without a doubt, technology changes how work is performed. At first glance, workplace technology appears to be a great boon to society. However, research presents opposing views on how workplace technologies impact the individual. One perspective argues that organizations utilize technology to redesign work processes, such that the worker requires less skill, autonomy, and compensation. The opposing perspective argues that organizations utilize technology to empower employees to improve efficiency and profits. This dissertation consists of three interrelated studies examining workplace technology's impact on decision makers. The first study examines the capability of an enterprise system to increase the application of scientific management techniques to middle management and, consequently, to degrade middle management's work by limiting their autonomy. The second study investigates the capability of an enterprise system to facilitate the empowerment of managers via mutual monitoring and social identification. The third study builds upon the first study by examining how limiting autonomy through technology impacts the intrinsic motivation of decision makers and, as a result, affects the decision making process. Study one applies labor process theory to explain how enterprise systems can degrade the work of middle management via scientific management techniques. The purpose of this study is to test if the expectations of labor process theory can be applied to enterprise systems. In order to test this assertion, a field survey utilizing 189 middle managers is employed and the data is analyzed using component based structural equation modeling. The results indicate that enterprise system integration increases two scientific management techniques, formalization and performance measurement, but do not reveal a significant relationship between enterprise system integration and routinization. Interestingly, the results also indicate that routinization is the only scientific management technique, of the three studied, that directly limits the autonomy of the middle managers. Although performance measurement does not reduce autonomy directly, performance measurement interacts with routinization to reduce autonomy. This study contributes to the enterprise system literature by demonstrating enterprise systems' ability to increase the degree of scientific management applied to middle management. It also contributes to labor process theory by revealing that routinization may be the scientific management technique that determines whether other control techniques are utilized in a manner consistent with labor process theory. The ability of an enterprise system to facilitate the application of Mary Parker Follett's managerial control concepts are investigated in the second study. Specifically, Follett theorizes that information sharing facilitates the internalization of group goals and empowers individuals to have more influence and be more effective. This study employs a survey of 206 managers to test the theoretical relationships. The results indicate that enterprise system integration increases information sharing in the form of mutual monitoring, consequently, leading to social identification among peer managers. Additionally, social identification among peer managers empowers managers to have more influence over the organization. The study contributes to empowerment research by acknowledging and verifying the role that social identification plays in translating an empowering work climate into empowered managers. The study's conclusion that enterprise system integration facilitates the application of Follett's managerial control concepts extends both enterprise system and managerial control literature. The third study builds upon study one by examining the affect that autonomy has upon the decision maker. This study marries self-determination theory and technology dominance theory to understand the role that self-determination, intrinsic motivation, and engagement have upon technology dominance. Self-determination theory asserts that higher degrees of self-determination increase intrinsic motivation. Furthermore, self-determination research finds that intrinsic motivation increases engagement, while technology dominance research indicates that lack of engagement is an antecedent of technology dominance. Thus, applying self-determination theory as a predictor of technology dominance suggests that autonomy and relatedness associated with a task increase the intrinsic motivation to complete that task and consequently increase engagement in the task. Task engagement, in turn, reduces the likelihood of technology dominance. The proposed theoretical model is tested experimentally with 83 junior level business students. The results do not support the theoretical model, however the findings reveal that intrinsic motivation does reduce the likelihood of technology dominance. This indicates that intrinsic motivation as a predictor of technology dominance should be further investigated. Additionally, the study contributes to technology dominance literature by exhibiting a more appropriate operationalization of the inappropriate reliance aspect of technology dominance. This dissertation reveals that various theories concerning workplace technology and management control techniques have both validity and limitations. Labor process theorists cannot assume that all technologies and management control techniques are utilized to undermine the employee's value to the organization, as Study 2 reveals that enterprise systems and mutual monitoring lead to empowered managers. Likewise, proponents of enterprise systems cannot assume that the integrated nature of enterprise systems is always utilized in an empowering manner, as Study 1 reveals the increased performance measurement through enterprise systems can be utilized to limit managers in a routinized job environment. While the third study was unable to determine that the control features in technology affect the intrinsic motivation to complete a task, the findings do reveal that intrinsic motivation is directly related to technology dominance. The findings and theoretical refinements demonstrate that workplace technology and management control have a complicated relationship with the employee and that the various theories concerning them cannot be applied universally.
Show less - Date Issued
- 2013
- Identifier
- CFE0004980, ucf:49569
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004980
- Title
- The Gender Gap in Technical Communication: How Women Challenge the Predominant Objectivist Paradigm.
- Creator
-
Bower, Nathan, Jones, Daniel, Jones, Anna, Flammia, Madelyn, University of Central Florida
- Abstract / Description
-
Women are currently underrepresented in the Science, Technology, Engineering, and Mathematics (STEM) fields. The purpose of this thesis is to explore how this underrepresentation translates to a gender gap in the field of technical communication and how this gap causes women to challenge the predominant objectivist paradigm in the field. Through an investigation of peer-reviewed journal articles, periodicals, critical theory, and articles published in online magazines such as Slate, I...
Show moreWomen are currently underrepresented in the Science, Technology, Engineering, and Mathematics (STEM) fields. The purpose of this thesis is to explore how this underrepresentation translates to a gender gap in the field of technical communication and how this gap causes women to challenge the predominant objectivist paradigm in the field. Through an investigation of peer-reviewed journal articles, periodicals, critical theory, and articles published in online magazines such as Slate, I identify the gendered nature of modern technology and discuss to what extent a shift in the predominant paradigm has occurred in the professional arena. In looking at several theoretical approaches and contemporary examples, I conclude that a significant paradigm shift has not in fact occurred due to an underlying, culturally promoted sexism. Additionally, I conclude that neither new approaches in the technical communication classroom, nor attempts to increasingly include women in the technological fields will result in a significant paradigm change by themselves. I also point to a need for further meaningful research in how sexism influences the professional world as well as a more thorough conversation regarding a fundamental shift in workplace relations between the genders.
Show less - Date Issued
- 2012
- Identifier
- CFE0004523, ucf:52878
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004523
- Title
- Local Health Department Adoption of Health Information Technology and Its Impact on Population Health.
- Creator
-
Yeung, Tina, Wan, Thomas, Cortelyou-Ward, Kendall, Liu, Albert Xinliang, Dziegielewski, Sophia, University of Central Florida
- Abstract / Description
-
Since the enactment of the HITECH Act in 2009, the US has invested billions in building a robust health information technology (HIT) infrastructure that is secure, capable of the electronic transfer of data and allows for real-time access of patient medical data, among others. This empirical study explored the driving forces (coercive, mimetic, and normative) in the adoption of HIT (i.e. EHRs and HIEs) by local health departments (LHDs) and how it has impacted the population health of...
Show moreSince the enactment of the HITECH Act in 2009, the US has invested billions in building a robust health information technology (HIT) infrastructure that is secure, capable of the electronic transfer of data and allows for real-time access of patient medical data, among others. This empirical study explored the driving forces (coercive, mimetic, and normative) in the adoption of HIT (i.e. EHRs and HIEs) by local health departments (LHDs) and how it has impacted the population health of counties in the US. The researcher conducted a cross-sectional, quantitative study using secondary data sources. The study included data on 505 local health departments and 433 counties' population health data. Institutional theory guided this research and generalized estimating equations, logistic regression, and multiple linear regression were utilized to analyze health IT adoption by LHDs and its impact on county-level health outcomes. Results showed that normative forces, measured by the employment of IS specialists was most impactful in the adoption of both EHRs and HIEs. Mimetic forces, measured by the completion of a CHA and coercive forces measured by the implementation of the HITECH Act were not found to be statistically significant in the adoption of EHRs or HIEs. Finally, EHR adoption was statistically significant at improving population health at the county level. This research study has contributed in three areas: 1) to fill a knowledge gap on the impact of health IT adoption by LHDs on health outcomes; 2) to formulate a theoretically grounded framework to study population health and its variability; and 3) to identify target areas for public health interventions. In conclusion, a substantial amount of resources dedicated in creating a robust health IT infrastructure requires close analysis of the impact health IT has on the population health of our nation.
Show less - Date Issued
- 2017
- Identifier
- CFE0006825, ucf:51801
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006825
- Title
- THE ROLE OF COMMUNITY COLLEGE REGISTRARS IN RELATION TO STUDENT INFORMATION SYSTEMS IMPLEMENTATION.
- Creator
-
Lepley, Sandra, House, Jesse, University of Central Florida
- Abstract / Description
-
This study examined the effects of implementing Web-enabled technology systems on the functional role of the community college registrar. The focus on systems implementation included in-house, outsourced, consortia, or combination of implementation strategies. A quantitative and qualitative approach included several interviews and a mailed survey questionnaire. The researcher developed the instrument from human resources position description forms, an adapted administrative Q-sort technique,...
Show moreThis study examined the effects of implementing Web-enabled technology systems on the functional role of the community college registrar. The focus on systems implementation included in-house, outsourced, consortia, or combination of implementation strategies. A quantitative and qualitative approach included several interviews and a mailed survey questionnaire. The researcher developed the instrument from human resources position description forms, an adapted administrative Q-sort technique, and a role conflict and ambiguity perception questionnaire. The study targeted the members of the American Association of Collegiate Registrars and Admissions Officers. The research findings indicated that some aspects of perceived role, role conflict (harmony), and ambiguity (clarity) were different for registrars whose colleges used in-house, outsourced, consortium, or a combination of implementation strategies, and for certain background characteristics. For example, the study identified different levels of involvement for some duties and some differences in collaboration among divisions and departments within institutions and with other organizations. Suggested uses of the research results include professional development programming for more efficient technology implementation. The research instrument could be adapted to study functional role of other job positions, implementation projects, and administrative strategies.
Show less - Date Issued
- 2006
- Identifier
- CFE0001161, ucf:46869
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001161
- Title
- EFFECTS OF HEALTH INFORMATION TECHNOLOGY ADOPTION ON QUALITY OF CARE AND PATIENT SAFETY IN US ACUTE CARE HOSPITALS.
- Creator
-
Seblega, Binyam, Zhang, Ning, University of Central Florida
- Abstract / Description
-
The adoption of healthcare information technology (HIT) has been advocated by various groups as critical in addressing the growing crisis in the healthcare industry. Despite the plethora of evidence on the benefits of HIT, however, the healthcare industry lags behind many other economic sectors in the adoption of information technology. A significant number of healthcare providers still keep patient information on paper. With the recent trends of reimbursement reduction and rapid...
Show moreThe adoption of healthcare information technology (HIT) has been advocated by various groups as critical in addressing the growing crisis in the healthcare industry. Despite the plethora of evidence on the benefits of HIT, however, the healthcare industry lags behind many other economic sectors in the adoption of information technology. A significant number of healthcare providers still keep patient information on paper. With the recent trends of reimbursement reduction and rapid technological advances, therefore, it would be critical to understand differences in structural characteristics and healthcare performance between providers that do and that do not adopt HIT. This is accomplished in this research, first by identifying organizational and contextual factors associated with the adoption of HIT in US acute care hospitals and second by examining the relationships between the adoption of HIT and two important healthcare outcomes: patient safety and quality of care. After conducting literature a review, the structure-process-outcome model and diffusion of innovations theory were used to develop a conceptual framework. Hypotheses were developed and variables were selected based on the conceptual framework. Publicly available secondary data were obtained from the American Hospital Association (AHA), the Health Information and Management Systems Society (HIMSS), and the Healthcare Cost and Utilization Project (HCUP) databases. The information technologies were grouped into three clusters: clinical, administrative, and strategic decision making ITs. After the data from the three sources were cleaned and merged, regression models were built to identify organizational and contextual factors that affect HIT adoption and to determine the effects of HIT adoption on patient safety and quality of care. Most prior studies on HIT were restricted in scope as they primarily focused on a limited number of technologies, single healthcare outcomes, individual healthcare institutions, limited geographic locations, and/or small market segments. This limits the generalizability of the findings and makes it difficult to draw definitive conclusions. The new contribution of the present study lies in the fact that it uses nationally representative latest available data and it incorporates a large number of technologies and two risk adjusted healthcare outcomes. Large size and urban location were found to be the most influential hospital characteristics that positively affect information technology adoption. However, the adoption of HIT was not found to significantly affect hospitalsÃÂ' performance in terms of patient safety and quality of care measures. Perhaps a remarkable finding of this study is the better quality of care performance of hospitals in the Midwest, South, and West compared to hospitals in the Northeast despite the fact that the latter reported higher HIT adoption rates. In terms of theoretical implications, this study confirms that organizational and contextual factors (structure) affect adoption of information technology (process) which in turn affects healthcare outcomes (outcome), though not consistently, validating Avedis DonabedianÃÂ's structure-process-outcome model. In addition, diffusion of innovations theory links factors associated with resource abundance, access to information, and prestige with adoption of information technology. The present findings also confirm that hospitals with these attributes adopted more technologies. The methodological implication of this study is that the lack of a single common variable and uniformity of data among the data sources imply the need for standardization in data collection and preparation. In terms of policy implication, the findings in this study indicate that a significant number of hospitals are still reluctant to use clinical HIT. Thus, even though the passage of the American Recovery and Reinvestment Act (ARRA) of 2009 was a good stimulus, a more aggressive policy intervention from the government is warranted in order to direct the healthcare industry towards a better adoption of clinical HIT.
Show less - Date Issued
- 2010
- Identifier
- CFE0003327, ucf:48445
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003327
- Title
- THE IMPACT OF ORGANIZATIONAL GOAL CONVERGENCE, INFORMATION-COMMUNICATION TECHNOLOGY UTILIZATION, AND INTER-ORGANIZATIONAL TRUST ON NETWORK FORMATION AND SUSTAINABILITY: THE CASE OF EMERGENCY MANAGEMENT IN THE UNITED STATES.
- Creator
-
Garayev, Vener, Kapucu, Naim, University of Central Florida
- Abstract / Description
-
With the increase of severity and scope of disasters, collaborative networks have become the main tool to tackle with complex emergencies. Networks, however, are mostly effective to the extent they are maintained over time. This study analyzes whether organizational goal convergence, information-communication technology utilization, and inter-organizational trust impacts network sustainability. The main research questions of the study are: (1) How are organizational goals, technical...
Show moreWith the increase of severity and scope of disasters, collaborative networks have become the main tool to tackle with complex emergencies. Networks, however, are mostly effective to the extent they are maintained over time. This study analyzes whether organizational goal convergence, information-communication technology utilization, and inter-organizational trust impacts network sustainability. The main research questions of the study are: (1) How are organizational goals, technical/technological capacity of organizations, and trust among organizations of a network are related to the sustainability of collaborative network relationships? (2) Which of the above-mentioned factors plays the most significant role in affecting network sustainability? Covering the context of emergency management system in the United States, this study utilized a self-administered survey that was electronically distributed to county emergency managers across the country. The data consisting of 534 complete responses was analyzed in Statistical Package for the Social Sciences (SPSS) Inc. software's PASW (Predictive Analytics SoftWare) Statistics version 18.0 and transferred to Amos 18.0 software for structural equation modeling (SEM) analysis. The findings suggest that organizational goal convergence, information-communication technology utilization, and inter-organizational trust have positive and statistically significant relationships with network sustainability; and, inter-organizational trust is the strongest factor followed by information-communication technology utilization and organizational goal convergence. The study contributes to the literature on network sustainability with specific suggestions for emergency management practitioners.
Show less - Date Issued
- 2011
- Identifier
- CFE0003920, ucf:48738
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003920
- Title
- STUDENT DIGITAL PIRACY IN THE FLORIDA STATE UNIVERSITY SYSTEM:AN EXPLORATORY STUDY ON ITS INFRASTRUCTURAL EFFECTS.
- Creator
-
Reiss, Jeffrey, Cintron, Rosa, University of Central Florida
- Abstract / Description
-
Digital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institutionÃÂ's resources combined with the typical college studentÃÂ's lack of funds makes it more lucrative. Students use a number of methods to justify their actions ranging from previewing media to bringing justice...
Show moreDigital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institutionÃÂ's resources combined with the typical college studentÃÂ's lack of funds makes it more lucrative. Students use a number of methods to justify their actions ranging from previewing media to bringing justice to a corrupt company. While trying to understand the mindset of pirates is one route to deal with piracy, corporations attempted to alleviate the situation using added software encoding. These messages are not always effective, and in some cases caused further damage to consumer morale. Furthermore, students such as Joel Tenenbaum, who continued to pirate music despite warnings from his parents and the recording industry, exemplify the type of person that is unfazed by legal threats, leading to a question of ethics. Students may not feel that downloading is stealing despite numerous warnings from the Digital Millennium Copyright Act and other major media organizations. The predominant solution used by universities involves monitoring the studentsÃÂ' network connection to detect Peer-to-Peer (P2P) connections or other connections that involve the transferring of copyrighted goods. Unfortunately, the current tools contain flaws that a crafty student may easily circumvent, undermining any attempts a universityÃÂ's IT department may use to deter piracy. This study explored the nature of piracy prevention tools used by IT departments in the Florida State University System in order to determine their relative effectiveness. The study also looked into the opinions of the Information Security Officer in terms of alternative piracy prevention techniques that do not involve legal action and monitoring. It was found that most institutions do not use a formal piece of software that monitors for infringing data. They also stated that while their current techniques can do its required task, it was not perfected to a point where it could run autonomously. Furthermore, institutions agreed that students lack proper ethics and concern over the matter of copyright, but were not fully convinced that other preventions methods would be effective. The study ultimately considered monitoring techniques a short-term solution and that more research should be put into finding long-term solutions. It also implied that IT departments should be better funded in order to keep up with the technological gap.
Show less - Date Issued
- 2010
- Identifier
- CFE0003131, ucf:48645
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003131
- Title
- Recycled Modernity: Google, Immigration History, and the Limits for H-1B.
- Creator
-
Patten, Neil, Dombrowski, Paul, Mauer, Barry, Grajeda, Anthony, Dziuban, Charles, University of Central Florida
- Abstract / Description
-
Regulation of admission to the United States for technology workers from foreign countries has been a difficult issue, especially during periods of intense development. Following the dot.com bubble, the Google Corporation continued to argue in favor of higher limits under the Immigration and Nationality Act exception referred to as (")H-1B(") for the section of the law where it appears. H-1B authorized temporary admission for highly skilled labor in specialty occupations. Congressional...
Show moreRegulation of admission to the United States for technology workers from foreign countries has been a difficult issue, especially during periods of intense development. Following the dot.com bubble, the Google Corporation continued to argue in favor of higher limits under the Immigration and Nationality Act exception referred to as (")H-1B(") for the section of the law where it appears. H-1B authorized temporary admission for highly skilled labor in specialty occupations. Congressional testimony by Laszlo Bock, Google Vice President for People Operations, provided the most succinct statement of Google's concerns based on maintaining a competitive and diverse workforce. Diversity has been a rhetorical priority for Google, yet diversity did not affect the argument in a substantial and realistic way. Likewise, emphasis on geographically situated competitive capability suggests a limited commitment to the global communities invoked by information technology. The history of American industry produced corporations determined to control and exploit every detail of their affairs. In the process, industrial corporations used immigration as a labor resource. Google portrayed itself, and Google has been portrayed by media from the outside, as representative of new information technology culture, an information community of diverse, inclusive, and democratically transparent technology in the sense of universal availability and benefit with a deliberate concern for avoiding evil. However, emphasis by Google on American supremacy combined with a kind of half-hearted rhetorical advocacy for principles of diversity suggest an inconsistent approach to the argument about H-1B. The Google argument for manageable resources connected to corporate priorities of Industrial Modernity, a habit of control, more than to democratic communities of technology. In this outcome, there are concerns for information technology and the Industry of Knowledge Work. By considering the treatment of immigration as a sign of management attitude, I look at questions posed by Jean Baudrillard, Daniel Headrick, Alan Liu, and others about whether information technology as an industry and as communities of common interests has achieved any democratically universal (")ethical progress(") beyond the preceding system of industrial commerce that demands the absolute power to exploit resources, including human resources. Does Google's performance confirm skeptical questions, or did Google actually achieve something more socially responsible? In the rhetoric of immigration history and the rhetoric of Google as technology, this study finds connections to a recycled corporate-management version of Industrial Modernity that constrains the diffusion of technology.
Show less - Date Issued
- 2014
- Identifier
- CFE0005685, ucf:50135
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005685
- Title
- Driving Towards Sustainability: A Case Study of the Facilitators and Inhibitors of Electrifying Drive Tourism within the United States National Park System.
- Creator
-
Templeton, Amanda, Fjelstul, Jill, Fyall, Alan, Tasci, Asli, Prideaux, Bruce, University of Central Florida
- Abstract / Description
-
Drive tourism has proven to be a popular sub-sector of the tourism industry, given its ability to offer tourists a substantial amount of flexibility and sense of freedom in determining what destinations to explore. Few studies have examined the future of the drive tourism with consideration to changing technologies and growing awareness to the impact of carbon emissions and Green House Gasses. Research has recently begun to examine the ecological consequences of park transportation systems....
Show moreDrive tourism has proven to be a popular sub-sector of the tourism industry, given its ability to offer tourists a substantial amount of flexibility and sense of freedom in determining what destinations to explore. Few studies have examined the future of the drive tourism with consideration to changing technologies and growing awareness to the impact of carbon emissions and Green House Gasses. Research has recently begun to examine the ecological consequences of park transportation systems. Some of these problems can be seen within the United States National Park System (NPS), as various park units are experiencing problems related to infrastructure and preservation of sites. As transportation plays an integral role within the NPS, the impacts of drive tourism must be considered. The study is founded on the premise that electric vehicles and electric vehicle charging stations will reduce GHG emissions, thereby increasing sustainability, supporting sustainable tourism and sustainable drive tourism within the NPS. In an effort to promote sustainable transportation efforts throughout the NPS this study investigates the facilitators that enable an EV infrastructure in some parks and inhibitors for other parks that have yet to develop an EV infrastructure. A qualitative methodology was adopted for this study. Data were analyzed using NVivo with findings being presented in case study format. The study, which offers a conceptual model and offers new definitions for electric vehicles and electric vehicle infrastructure within nature based tourism context, finds key facilitators to include: collaborative efforts through public/private partnerships, strong leadership within the NPS, and availability of funding; major inhibitors being: geography of park unit, lack cultural openness within NPS park unit, and regulatory policies. Current research has given little attention to the future sustainability of drive tourism, allowing this study to add to the academic body of knowledge. Additionally, the suggestions offered in the study are relevantly timed to what is happening within the industry.
Show less - Date Issued
- 2018
- Identifier
- CFE0007107, ucf:51967
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007107
- Title
- An Analysis of the Readiness and Confidence of High School Administrators to Provide Instructional Leadership in Digital School Environments.
- Creator
-
Shepherd, Andrew, Taylor, Rosemarye, Doherty, Walter, Johnson, Jerry, Border, Harold, University of Central Florida
- Abstract / Description
-
The purpose of this study was to analyze the perceived knowledge and confidence of high school administrators to lead in a digital school environment. This study utilized an exploratory mixed-methods case study analysis along with the 62-item Digital Instructional Leadership Readiness Instrument (DILRI)(&)copy; to measure school administrators' knowledge and confidence to lead in a digital school environment. High school administrators within the target school district were requested to...
Show moreThe purpose of this study was to analyze the perceived knowledge and confidence of high school administrators to lead in a digital school environment. This study utilized an exploratory mixed-methods case study analysis along with the 62-item Digital Instructional Leadership Readiness Instrument (DILRI)(&)copy; to measure school administrators' knowledge and confidence to lead in a digital school environment. High school administrators within the target school district were requested to complete the DILRI(&)copy; at two separate points in time: September 2016 and June 2017. Based on these two administrations, this study's six Research Questions were answered. Research Questions 1, 2, 3, 4, and 6 were addressed quantitatively using descriptive statistics, along with two MANOVA analyses for Research Question 6. Research Question 5 was answered qualitatively by examining open-ended responses found within the DILRI(&)copy;. Based on the data collected, Experience Supervising Others and Colleagues were two factors ranked highest by administrators as influencing their knowledge and confidence. Additionally, high school administrators perceive themselves to be knowledge and confident in recognizing Student Engagement and Student Collaboration, and in developing digital school culture factors of Leadership Teams, Empowering Teachers, and Shared Vision. Overall means increased for knowledge and confidence on each scale between the September 2016 and June 2017 DILRI(&)copy; administrations. Much research relating to the digital school environment has only focused on the preparation required of teachers; therefore, this study provides administrators, directors, school boards, superintendents, and other school district leaders with relevant information relating to the self-reported readiness of high school administrators to lead in a digital school environment.
Show less - Date Issued
- 2017
- Identifier
- CFE0007295, ucf:52173
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007295