Information addiction is a condition in which individuals compulsively engage in information cons... more Information addiction is a condition in which individuals compulsively engage in information consumption behavior. In today’s world of unprecedented information access, the realities of information addiction can have significant impacts on individuals, families, and organizations. The objective of this research-in-progress study is to explore the neural underpinnings of information addiction as a first step in a larger research program of understanding the antecedents, neural and behavioral manifestations, and consequences of information addition. We outline the theoretical basis for our investigation and describe the design and execution of a pilot fMRI experiment in which participants view both novel and repeat information-bearing tweets. We describe our planned data analysis and future directions for the research program.
Model-driven architecture (MDA) is a relatively new software development paradigm that advocates ... more Model-driven architecture (MDA) is a relatively new software development paradigm that advocates the use of modeling throughout the software development lifecycle. This paradigm appears to be gaining validity in the industry as several large companies are investing resources to develop tools that support MDA. However, little is known about the diffusion of MDA in an academic setting. A survey of Information Systems and Computer Science faculty from around the world was conducted to understand the awareness, interest, evaluation, trial, and adoption of MDA in academia.
Proceedings of the 50th Hawaii International Conference on System Sciences (2017), 2017
Using sensors to gather physiological data about users can provide valuable insights for Informat... more Using sensors to gather physiological data about users can provide valuable insights for Information Systems (IS) research that are not availed through traditional measures. While useful in many laboratory settings, many of these physiological sensors (e.g., fMRI, EEG, EKG, etc.) are impractical and severely limited in other scenarios due to (1) prohibitive cost, (2) small sample size, (3) invasiveness, and (4) the difficulty to match psychological traits to physiological measures. In this study, we demonstrate how inexpensive consumer-grade wearable technologies overcome these first three limitations while we extend existing research on exploring the fourth limitation.
Recent IS research has begun to explore behavioral filtering patterns associated with content and... more Recent IS research has begun to explore behavioral filtering patterns associated with content and contextual cues on a network forum. Using eye-tracking technology, this work has shed light on the cues attended to during filtering (Meservy et al. 2014) and how the attentional switching patterns between these cues (e.g., evaluating all cues of a single solution versus comparing a single cue across multiple solutions) affects filtering accuracy (Fadel et al. 2015). In the present study, we extend this prior work while making note of two important observations. First, although these studies have shed light on the role of different types of cues in forum information filtering, they are limited with respect to their ability to elucidate the actual cognitive processes that underlie this filtering. Gaze data from an eye-tracker can prompt inferences about the types of information attended to during the filtering process, but it is silent on the neurocognitive processes that occur. This leaves several important questions for ongoing theory development. For example, are different types of cues (e.g., content versus contextual) processed by different cognitive centers in the brain, which, depending on their relative activation levels, could produce more or less accurate filtering decisions? Or do similar neural mechanisms underlie both content and context-based processing, and any difference lies only in the type of information evaluated? Moreover, which types of cues are most important when filtering solutions, and how do combinations of cues affect this filtering process on both a behavioral and a cognitive level? Second, prior studies have relied on dual process theories of cognition (Chaiken 1987; Petty and Cacioppo 1986) as a theoretical frame for examining information filtering on a network forum. Originating in the domain of persuasion psychology, dual process theories posit that persuasion can occur via two primary cognitive routes: the central (systematic) route, in which the arguments of the message itself are carefully evaluated, and the peripheral (heuristic) route, in which judgments are made primarily based on surrounding peripheral cues (Chaiken 1980; Petty et al. 2005; Petty and Cacioppo 1986). Applying this framing to the context of solutions on a network forum, central route processing would entail evaluation of solution content, and peripheral route processing would rely on evaluation of surrounding contextual cues such as source expertise and validation (Fadel et al. 2015; Meservy et al. 2014). We believe this conceptualization offers a useful lens for characterizing
Communications of the Association for Information Systems
Over the years, the Information Systems discipline has produced advice on how to discover project... more Over the years, the Information Systems discipline has produced advice on how to discover projects and research topics that are worth pursuing. However, little attention has been given to sharing anecdotes and developing heuristics of when to terminate research projects. This article captures the comments of successful IS researchers about when they have pulled the plug on research projects and some of the heuristics they look for when making that decision.
Communications of the Association for Information Systems
Prior to implementing "Agile" software development methods, organizations rooted in traditional "... more Prior to implementing "Agile" software development methods, organizations rooted in traditional "Waterfall" software development employed heavy upfront project design and limited changes and feedback during and between project stages. Waterfall methods make heavy use of outcome controls primarily monitored by the information systems function (ISF). This paper explores the control mechanisms used by the ISF and business function (BF) during and after the introduction of a major Agile project at a large U.S. company steeped in the traditional Waterfall method. Outcome control, the predominant control mechanism used in the case company, gave way to a hybrid-like control that possessed mechanisms of emergent control while maintaining vestiges of some Waterfall-like outcome control. We observed that, prior to the introduction of Agile, the software-development process was firmly in the hands of the ISF. The introduction of Agile shifted some of the controller authority over the development process from the ISF to the BF. Lessons learned from the case study point to the complexity of designing control mechanisms during a transition from the Waterfall method to an Agile approach.
Page 1. AUGMENTING HUMAN INTELLECT: AUTOMATIC RECOGNITION OF NONVERBAL BEHAVIOR WITH APPLICATION ... more Page 1. AUGMENTING HUMAN INTELLECT: AUTOMATIC RECOGNITION OF NONVERBAL BEHAVIOR WITH APPLICATION IN DECEPTION DETECTION by THOMAS OLIVER MESERVY A Dissertation Submitted to the Faculty of the ...
Groups and decision makers are increasingly running headlong into complexity as interconnections ... more Groups and decision makers are increasingly running headlong into complexity as interconnections and interdependencies between individuals and organizations continue to grow, decision time horizons shrink and more work is being performed by distributed teams. These factors are driving up overall problem space complexity and limiting the effectiveness of time-tested decision and collaboration processes. Increases in problem space complexity lead to higher equivocality in collaborative processes and associated products. Electronic collaboration support tools and associated process management schemes have proven successful in many challenging contexts. However, current collaboration process management schemes and tools may not be able to effectively handle more complex tasks. We posit that heightened problem space complexity must be addressed with commensurate process and technological support for collaborative efforts. To achieve truly agile collaborative solutions, we propose Dynamic Collaboration-a process management scheme that utilizes group consensus, and process evolution via iterative process alignment and product refinement phases to meet the challenges posed by complexity and equivocality.
Outsourcing and offshoring (sourcing) aspects of IS functions have been common organizational act... more Outsourcing and offshoring (sourcing) aspects of IS functions have been common organizational activities for decades.However, the landscape is evolving. Organizations are shifting from primarily single vendor-client sourcing relationshipstoward innovative multi-vendor relationships ...
Computer-mediated deception is prevalent and may have serious consequences for individuals, organ... more Computer-mediated deception is prevalent and may have serious consequences for individuals, organizations, and society. This article investigates several metrics as predictors of deception in synchronous chatbased environments, where participants must often spontaneously formulate deceptive responses. Based on cognitive load theory, we hypothesize that deception influences response time, word count, lexical diversity, and the number of times a chat message is edited. Using a custom chatbot to conduct interviews in an experiment, we collected 1,572 deceitful and 1,590 truthful chat-based responses. The results of the experiment confirm that deception is positively correlated with response time and the number of edits and negatively correlated to word count. Contrary to our prediction, we found that deception is not significantly correlated with lexical diversity. Furthermore, the age of the participant moderates the influence of deception on response time. Our results have implications for understanding deceit in chat-based communication and building deception-detection decision aids in chat-based systems.
... Judith Simon University of Memphis [email protected] Thomas Meservy University of Memphis tm... more ... Judith Simon University of Memphis [email protected] Thomas Meservy University of Memphis [email protected] ... factors as non-IS employees (Ferrat and Short, 1986), there are other results that have taken a contrary view (Im and Hartland, 1990, Sutherland 1992). ...
... Colin G. Onita University of Memphis [email protected] ... Social influence is the degree t... more ... Colin G. Onita University of Memphis [email protected] ... Social influence is the degree to which the individual perceives that his or her social circle and other actors whose opinions matter will support and encourage the information sharing behavior (Hartwick and Barki ...
Information addiction is a condition in which individuals compulsively engage in information cons... more Information addiction is a condition in which individuals compulsively engage in information consumption behavior. In today’s world of unprecedented information access, the realities of information addiction can have significant impacts on individuals, families, and organizations. The objective of this research-in-progress study is to explore the neural underpinnings of information addiction as a first step in a larger research program of understanding the antecedents, neural and behavioral manifestations, and consequences of information addition. We outline the theoretical basis for our investigation and describe the design and execution of a pilot fMRI experiment in which participants view both novel and repeat information-bearing tweets. We describe our planned data analysis and future directions for the research program.
Model-driven architecture (MDA) is a relatively new software development paradigm that advocates ... more Model-driven architecture (MDA) is a relatively new software development paradigm that advocates the use of modeling throughout the software development lifecycle. This paradigm appears to be gaining validity in the industry as several large companies are investing resources to develop tools that support MDA. However, little is known about the diffusion of MDA in an academic setting. A survey of Information Systems and Computer Science faculty from around the world was conducted to understand the awareness, interest, evaluation, trial, and adoption of MDA in academia.
Proceedings of the 50th Hawaii International Conference on System Sciences (2017), 2017
Using sensors to gather physiological data about users can provide valuable insights for Informat... more Using sensors to gather physiological data about users can provide valuable insights for Information Systems (IS) research that are not availed through traditional measures. While useful in many laboratory settings, many of these physiological sensors (e.g., fMRI, EEG, EKG, etc.) are impractical and severely limited in other scenarios due to (1) prohibitive cost, (2) small sample size, (3) invasiveness, and (4) the difficulty to match psychological traits to physiological measures. In this study, we demonstrate how inexpensive consumer-grade wearable technologies overcome these first three limitations while we extend existing research on exploring the fourth limitation.
Recent IS research has begun to explore behavioral filtering patterns associated with content and... more Recent IS research has begun to explore behavioral filtering patterns associated with content and contextual cues on a network forum. Using eye-tracking technology, this work has shed light on the cues attended to during filtering (Meservy et al. 2014) and how the attentional switching patterns between these cues (e.g., evaluating all cues of a single solution versus comparing a single cue across multiple solutions) affects filtering accuracy (Fadel et al. 2015). In the present study, we extend this prior work while making note of two important observations. First, although these studies have shed light on the role of different types of cues in forum information filtering, they are limited with respect to their ability to elucidate the actual cognitive processes that underlie this filtering. Gaze data from an eye-tracker can prompt inferences about the types of information attended to during the filtering process, but it is silent on the neurocognitive processes that occur. This leaves several important questions for ongoing theory development. For example, are different types of cues (e.g., content versus contextual) processed by different cognitive centers in the brain, which, depending on their relative activation levels, could produce more or less accurate filtering decisions? Or do similar neural mechanisms underlie both content and context-based processing, and any difference lies only in the type of information evaluated? Moreover, which types of cues are most important when filtering solutions, and how do combinations of cues affect this filtering process on both a behavioral and a cognitive level? Second, prior studies have relied on dual process theories of cognition (Chaiken 1987; Petty and Cacioppo 1986) as a theoretical frame for examining information filtering on a network forum. Originating in the domain of persuasion psychology, dual process theories posit that persuasion can occur via two primary cognitive routes: the central (systematic) route, in which the arguments of the message itself are carefully evaluated, and the peripheral (heuristic) route, in which judgments are made primarily based on surrounding peripheral cues (Chaiken 1980; Petty et al. 2005; Petty and Cacioppo 1986). Applying this framing to the context of solutions on a network forum, central route processing would entail evaluation of solution content, and peripheral route processing would rely on evaluation of surrounding contextual cues such as source expertise and validation (Fadel et al. 2015; Meservy et al. 2014). We believe this conceptualization offers a useful lens for characterizing
Communications of the Association for Information Systems
Over the years, the Information Systems discipline has produced advice on how to discover project... more Over the years, the Information Systems discipline has produced advice on how to discover projects and research topics that are worth pursuing. However, little attention has been given to sharing anecdotes and developing heuristics of when to terminate research projects. This article captures the comments of successful IS researchers about when they have pulled the plug on research projects and some of the heuristics they look for when making that decision.
Communications of the Association for Information Systems
Prior to implementing "Agile" software development methods, organizations rooted in traditional "... more Prior to implementing "Agile" software development methods, organizations rooted in traditional "Waterfall" software development employed heavy upfront project design and limited changes and feedback during and between project stages. Waterfall methods make heavy use of outcome controls primarily monitored by the information systems function (ISF). This paper explores the control mechanisms used by the ISF and business function (BF) during and after the introduction of a major Agile project at a large U.S. company steeped in the traditional Waterfall method. Outcome control, the predominant control mechanism used in the case company, gave way to a hybrid-like control that possessed mechanisms of emergent control while maintaining vestiges of some Waterfall-like outcome control. We observed that, prior to the introduction of Agile, the software-development process was firmly in the hands of the ISF. The introduction of Agile shifted some of the controller authority over the development process from the ISF to the BF. Lessons learned from the case study point to the complexity of designing control mechanisms during a transition from the Waterfall method to an Agile approach.
Page 1. AUGMENTING HUMAN INTELLECT: AUTOMATIC RECOGNITION OF NONVERBAL BEHAVIOR WITH APPLICATION ... more Page 1. AUGMENTING HUMAN INTELLECT: AUTOMATIC RECOGNITION OF NONVERBAL BEHAVIOR WITH APPLICATION IN DECEPTION DETECTION by THOMAS OLIVER MESERVY A Dissertation Submitted to the Faculty of the ...
Groups and decision makers are increasingly running headlong into complexity as interconnections ... more Groups and decision makers are increasingly running headlong into complexity as interconnections and interdependencies between individuals and organizations continue to grow, decision time horizons shrink and more work is being performed by distributed teams. These factors are driving up overall problem space complexity and limiting the effectiveness of time-tested decision and collaboration processes. Increases in problem space complexity lead to higher equivocality in collaborative processes and associated products. Electronic collaboration support tools and associated process management schemes have proven successful in many challenging contexts. However, current collaboration process management schemes and tools may not be able to effectively handle more complex tasks. We posit that heightened problem space complexity must be addressed with commensurate process and technological support for collaborative efforts. To achieve truly agile collaborative solutions, we propose Dynamic Collaboration-a process management scheme that utilizes group consensus, and process evolution via iterative process alignment and product refinement phases to meet the challenges posed by complexity and equivocality.
Outsourcing and offshoring (sourcing) aspects of IS functions have been common organizational act... more Outsourcing and offshoring (sourcing) aspects of IS functions have been common organizational activities for decades.However, the landscape is evolving. Organizations are shifting from primarily single vendor-client sourcing relationshipstoward innovative multi-vendor relationships ...
Computer-mediated deception is prevalent and may have serious consequences for individuals, organ... more Computer-mediated deception is prevalent and may have serious consequences for individuals, organizations, and society. This article investigates several metrics as predictors of deception in synchronous chatbased environments, where participants must often spontaneously formulate deceptive responses. Based on cognitive load theory, we hypothesize that deception influences response time, word count, lexical diversity, and the number of times a chat message is edited. Using a custom chatbot to conduct interviews in an experiment, we collected 1,572 deceitful and 1,590 truthful chat-based responses. The results of the experiment confirm that deception is positively correlated with response time and the number of edits and negatively correlated to word count. Contrary to our prediction, we found that deception is not significantly correlated with lexical diversity. Furthermore, the age of the participant moderates the influence of deception on response time. Our results have implications for understanding deceit in chat-based communication and building deception-detection decision aids in chat-based systems.
... Judith Simon University of Memphis [email protected] Thomas Meservy University of Memphis tm... more ... Judith Simon University of Memphis [email protected] Thomas Meservy University of Memphis [email protected] ... factors as non-IS employees (Ferrat and Short, 1986), there are other results that have taken a contrary view (Im and Hartland, 1990, Sutherland 1992). ...
... Colin G. Onita University of Memphis [email protected] ... Social influence is the degree t... more ... Colin G. Onita University of Memphis [email protected] ... Social influence is the degree to which the individual perceives that his or her social circle and other actors whose opinions matter will support and encourage the information sharing behavior (Hartwick and Barki ...
Uploads
Papers by Thomas Meservy