Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.

Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective

3.032 Aufrufe

Veröffentlicht am

The Applied Management and Decision Sciences - Information Systems Management specialization provides an integrative approach to all aspects of organizations-people, technology, and management, in today’s information rich environment. The curriculum design is intended to promote the scholarship of discovery, integration, application and teaching in order to derive maximum value and innovation from systems investments and strategic direction.
The proposal before you today is an example of a study that encompasses an integrative approach (people, technology, and management), that promotes scholarship of discovery, and that explores palm vein authentication technology in relation to medical identity theft. In this presentation, I review a Proposal that explores the issue from a quantitative perspective. Funding consideration at https://www.gofundme.com/CruzCerdaPhD2016

Veröffentlicht in: Gesundheitswesen
  • Als Erste(r) kommentieren

Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective

  1. 1. Doctoral Study Oral Defense Proposal Defense Medical Identity Theft, Palm Vein Authentication The Manager’sPerspective
  2. 2. Supervisory Committee Chair: Dr. Nikunja Swain 2nd Committee Member: Dr. Anthony Lolas URR: Dr. Raghu Korrapati 2 Oral Defense
  3. 3. Section 1: Background 3 Oral Defense Medical Identity Theft ??? Palm Vein Authentication ???
  4. 4. Section 1: Background (cont.) 4 Oral Defense Investments in IT held in high regard Biometrics customers purchase solutions not devices Rise in medical identity theft Financial burden Safety challenges Funding consideration at https://www.gofundme.com/CruzCerdaPhD2016
  5. 5. Section 1: Problem Statement bullets/citations Hook: The FBI, cyber actors, and health care systems Anchor: In 2014 - 2.32 million victims, 21.7% increase,481,657 new cases GeneralProblem: Information theft Specific Problem: Uncertainty surrounding the benefits of PVA 5 Oral Defense
  6. 6. Section 1: Purpose Statement The focus of this quantitative correlational study will be to understand the effectiveness of PVA technology as perceived by healthcare managers and doctors. Impact of this issue, project managers and challenges and barriers of implementation. More effective/efficient implementation of PVA system Improved understanding and use of technology 6 Oral Defense
  7. 7. Section 1: Purpose Statement – Social Impact (3) 1. Consumers/Patients 2. Suppliers/Management, Doctors, Providers 3. Insurers 7 Oral Defense
  8. 8. Section 1: Purpose Statement – Social Impact Summary Cost of medical fraud decreases Positive Social Change 8 Oral Defense
  9. 9. Section 1: Research Questions 1, 2 9 Oral Defense RQ 1: adoption of PVA system and perceived usefulness RQ 2: adoption of PVA system and ease of use
  10. 10. Section 1: Research Questions 3, 4 10 Oral Defense RQ 3: adoption of a PVA system and awareness RQ 4: adoption of a PVA system and peer influence
  11. 11. Section 1: Research Questions 5, 6 11 Oral Defense Research Question 5: usage of a PVA system and resource facilitating conditions Research Question 6: adoption of a PVA system and technology facilitating conditions
  12. 12. Section 1: Research Questions 7, 8 12 Oral Defense RQ 7: adoption of a PVA system and self efficacy RQ 8: adoption (usage) of a PVA system and security
  13. 13. Section 1: Research Questions 9, 10 13 Oral Defense RQ 9: adoption (usage) of a PVA system and compatibility RQ 10: adoption of a PVA system and relative advantage
  14. 14. Section 1: Research Question 11 14 Oral Defense RQ 11: adoption of a PVA system and complexity
  15. 15. Section 1: Hypotheses for RQs 1, 2 15 Oral Defense • H1o: There is no statistically significantrelationship between the adoption of a PVA system and perceived usefulness. • H1a: There is a statistically significantrelationship between the adoption of a PVA system and perceived usefulness. • H2o : There is no statistically significant relationship between the adoption of a PVA system and ease of use. • H2a: There is a statistically significant relationship between the adoption of a PVA system and ease of use.
  16. 16. Section 1: Hypotheses for RQs 3, 4 16 Oral Defense • H3o: There is no statistically significantrelationship between the adoption of a PVA system and awareness. • H3a: There is a statistically significantrelationship between the adoption of a PVA system and awareness. • H4o : There is no statistically significant relationship between the adoption of a PVA system and peer influence. • H4a: There is a statistically significant relationship between the adoption of a PVA system and peer influence.
  17. 17. Section 1: Hypotheses for RQs 5, 6 17 Oral Defense • H5o: There is no statistically significantrelationship between the usage of a PVA system and resource facilitating conditions. • H5a: There is a statistically significantrelationship between the usage of a PVA system and resource facilitating conditions. • H6o : There is no statistically significant relationship between the adoption of a PVA system and technology facilitating conditions. • H6a: There is a statistically significant relationship between the adoption of a PVA system and technology facilitating conditions.
  18. 18. Section 1: Hypotheses for RQs 7, 8 18 Oral Defense • H7o: There is no statistically significantrelationship between the adoption of a PVA system and self efficacy. • H7a: There is a statistically significantrelationship between the adoption of a PVA system and self efficacy. • H8o : There is no statistically significant relationship between the adoption (usage) of a PVA system and security. • H8a: There is a statistically significant relationship between the adoption (usage) of a PVA system and security.
  19. 19. Section 1: Hypotheses for RQs 9, 10 19 Oral Defense • H9o: There is no statistically significantrelationship between the adoption (usage) of a PVA system and compatibility. • H9a: There is a statistically significantrelationship between the adoption (usage) of a PVA system and compatibility. • H10o : There is no statistically significantrelationship between the adoption of a PVA system and relative advantage. • H10a: There is a statistically significant relationship between the adoption of a PVA system and relative advantage.
  20. 20. Section 1: Hypotheses for RQ 11 20 Oral Defense • H11o : There is no statistically significantrelationship between the adoption of a PVA system and complexity. • H11a: There is a statistically significant relationship between the adoption of a PVA system and complexity.
  21. 21. Section 1: Theoretical framework • TRA • TAM • MM • TPB • C-TAM-TPB • MPCU • IDT • SCT • 70% BI, 50% AU Unified Theory ofAcceptance and Use of Technology Theory authored by Venkatesh, Morris, Davis, & Davis This theory was developed in 2003 Incorporating eight competing models to explain user acceptance of IT 21 Oral Defense
  22. 22. Section 1: Theoretical framework (cont.) Comprehensive model to examine factors that contribute to the successful adoption of a new technology system The theory interfaces with the proposed study by exploring • Four determinants of user acceptance of IT (adoption, usage) • Performance expectancy • Effort expectancy • Social influence • Facilitating conditions 22 Oral Defense
  23. 23. Section 1: Theoretical framework (cont.) 23 Oral Defense
  24. 24. Section 2: Method/Design chosen to help add new insights Quantitative Study Explore Variables Questionnaire Survey Methodology To Examine Technology Adoption Issues 24 Oral Defense
  25. 25. Section 2: Participants and sample size Population healthcare managers and doctors purposive sampling Minimum sample size Parameters spearman rho correlation a priori power analysis medium effect size 0.3 alpha 0.05 power 0.95 25 Oral Defense
  26. 26. Section 2: Data Source and Collection Technique Plans 26 Oral Defense
  27. 27. Section 2: Data Analysis Plan • Exploratory investigation • Effect size • Demographic characteristics/ occupational experiences – Gender, Age, Highest level of education, years of professional experience, years of employment at present location, full time versus part-time • Demographic characteristics/ occupational experiences • Frequency and Percentagesfor categorically scaled variables • Range for continuously scaled variables 27 Oral Defense
  28. 28. Summary Proposal Alignment Problem Statement Purpose Statement Research Questions Hypotheses Theoretical Framework Method/Design of Study Data Source Data Collection Data Analysis Oral Defense28
  29. 29. Closing Thank you Dr. Swain and Dr. Lolas This concludes my proposal oral defense presentation. I would now like to invite your questions 29 Oral Defense

×