Joseph A CazierArizona State University | ASU · Department of Information Systems
Joseph A Cazier
PhD Information Systems
About
138
Publications
48,887
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,077
Citations
Introduction
Additional affiliations
May 2000 - August 2000
Stevens-Henagar College
Position
- Instructor
Description
- Introduction to Oracle PL/SQL Programming
Publications
Publications (138)
Background/Objectives: In a collaborative effort, FAO, the International Federation of Beekeepers’ Association “Apimondia”, the Appalachian State University, and the Istituto Zooprofilattico Sperimentale del Lazio e Toscana (IZSLT), the FAO Reference Centre for Animal Health and Food Security Discipline Apiculture, health, and biosecurity, designed...
Here, we present the results of an online international survey concerning the adoption of good beekeeping practices and proper biosecurity measures for the management of varroosis in Apis mellifera. The survey was designed as a risk assessment tool by the Food and Agriculture Organization of the United Nations (FAO), the International Federation of...
There have been official NOAA and EPA reports of measurable changes in temperature across the United States over the last several decades with average temperatures increasing in most areas and decreasing in a few others. In order to fly, honey bees need optimal temperatures ranging from 13 °C (55 °F) to 38 °C (100 °F), sunlight, low wind, and no ra...
Legislation plays a key role in regulating beekeeping practices and biosecurity measures, but different countries present conflicting legislative frameworks in terms of allowing antibiotic use. Currently the EU and the UK only permit antibiotics under the cascade principle, but while the UK considers the application in cases of European Foulbrood,...
Bees are the main pollinators of most cultivated and wild plant species. Unfortunately, due to the pesticide use, habitat loss, and climate change, they are declining worldwide. A machine learning model to anticipate temperature drops in honeybee colonies. The long short-term memory (LSTM) algorithm was applied to five real datasets with the follow...
Data Overview: An eight-year survey of Varroa destructor infestation rates of western honey bee (Apis mellifera) colonies across Austria and the spatial dimension, temporal dimension and weather factors that impact these infestation rates.
Data Value: This data is valuable because it was collected and designed to build predictive models on where V...
The Technology Acceptance Model (TAM) has been used for decades to explain adoption of business technology in a traditional office environment. It was later expanded to consumer side software. However, prior work still has some limitations. 1. These studies generally rely on self-reported intent to use measures rather than actual usage and 2. Prior...
Emerging pathogens of honey bees represent an important threat to the development of the beekeeping sector. The implementation of biosecurity measures in beekeeping (BMBs) plays an essential role in supporting honey bee health within the beekeeping sector. A group of experts, in collaboration with the BPRACTICES (Grant Agreement No. 696231, Europea...
Smart agricultural systems can ensure food security at the source, combat counterfeits and mislabeled goods, preserve trust, and reduce the price of product differentiation. In the honey sector, a smart supply chain could also help lift beekeepers out of poverty by generating better market opportunities for their honey while supporting farmers by e...
To support the goal of Apimondia’s Bee Data Standardization Group to build a global standard for data related to bees and beekeeping The Bee Corp is sharing their internal standards to assess pollination effectiveness. Data standards presented in this report are used internally for measuring the effectiveness of beehives for crop pollination. The d...
Emerging pathogens of honey bees represent an important threat to the development of the beekeeping sector. The implementation of biosecurity measures in beekeeping (BMBs) plays an essential role in supporting honey bee health within the beekeeping sector. A group of experts, in collaboration with the BPRACTICES (Grant Agreement No. 696231, Europea...
Data analytics and machine learning have the potential to modify and improve many old school businesses. Among the oldest businesses for the human race is managing the waste we generate. In this paper we show how data science can be applied to help derive increased value from a byproduct of that waste, landfill gas. Gas produced from the decomposit...
Breast cancer, the second most common cancer among women, is a multidimensional experience, leading to stressors associated with pain, trauma, emotional upheaval, changes in identity and roles, and fear of death. Although certain aspects of breast cancer are universal, many elements are particular to the illness experience of individual patients. I...
Honey bees have been an important area of research and study going back at least to the days of Aristotle in the third century B.C. The amount and breadth of this research have been steadily increasing over time, especially during the modern age with the growing importance of honey bees to our society in agriculture, economics, food, medicine, and...
Bees are the main pollinators of most wild plant species and insect-pollinated crops and are essential for both plant ecosystems maintenance and humans food production. Among the crops used for human feeding, 75% depend on pollination. In addition to the fact that uncertainty around the beekeeping activity could jeopardize the economic value of pol...
Buildings are complex systems whose energy consumption depends on the interplay of multiple physical and human factors. This paper explored the performance of single-family detached dwellings using the tools of data analytics. The goals of this work were to understand and eventually to predict electrical energy consumption in order to develop strat...
A large majority of Big Data and Analytics projects focus on getting people to do what other people want them to do. Most often, this is done in secretive ways. In other cases, we see various groups that, either as a service or while perhaps still making a profit, use data in ways that largely help them achieve their own goals strictly for their ow...
Modern European beekeeping is facing numerous challenges due to a variety of factors, mainly related to globalisation, agrochemical pollution and environmental changes. In addition to this, new pathogens threaten the health of European honey bees. In that context, correct colony management should encompass a wider vision, where productivity aspects...
At a recent consortium of energy executives, it was agreed transparent messaging from power companies to consumers must become a top priority if energy initiatives related to power conservation and carbon emission reduction can occur. Traditionally, utility companies perceive their role as legal, franchised providers of consistent, reliable energy....
Coordinated and timely actions based on real time information and preventive risk management are important prerequisites for efficient control of Varroa destructor. In 2017, the Austrian Chamber of Agriculture (LKO) together with other stakeholders (BÖ, AGES) has launched a freely accessible, web-based data sharing platform (www.bienengesundheit.at...
Bees are the main pollinators of most wild and cultivated plant species, thus being essential for the maintenance of plant ecosystems and for food production. But they are threatened due to a series of drivers such as pesticides, habitat loss and climate change. Here, we propose a method to identify the loss of thermoregulation capacity in honeybee...
Bees are the main pollinators of most wild plant species and are essential for the maintenance of plant ecosystems and for food production. However, in recent years they are suffering from deforestation and pesticides. Here, we propose a method to identify the health status of Apis mellifera colonies. We trained, validated and tested 4 classificati...
Data collected from a quick-serve sandwich chain over one year provide an opportunity to study market, sociographic, meteorologic, and other factors impacting sales and sales forecasting. The weekly sales table contains over 79,000 rows which each represent summary statistics for the sales of an individual menu item in one store during one week of...
The Editor-in-Chief and the Subject Editors of the Journal of Economic Entomology thank the following scientists for their voluntary commitment of valuable professional time and expertise to peer reviewing manuscripts submitted for publication in our journal. The quality and scientific stature of the journal depends on the conscientious efforts of...
Purpose
The purpose of this paper is to lay out the data competence maturity model (DCMM) and discuss how the application of the model can serve as a foundation for a measured and deliberate use of data in secondary education.
Design/methodology/approach
Although the model is new, its implications, and its application are derived from key findin...
The Editor-in-Chief and the Subject Editors of the Journal of Economic Entomology thank the following scientists for their voluntary commitment of valuable professional time and expertise to peer reviewing manuscripts submitted for publication in our journal. The quality and scientific stature of the journal depends on the conscientious efforts of...
We discuss why we need a framework for hive inspections and then present the Healthy Colony Checklist as both an easy-to-use framework and practical inspection checklist.
Most enrollment management systems today use historical data to build rough forecasts of what percentage of students will likely accept an offer of enrollment based on historical acceptance rates. While this aggregate forecast method has its uses, we propose that building an enrollment model based on predicting an individual’s likelihood of matricu...
We study the roles of value congruence and trust in increasing online shoppers’ intention to purchase goods and their reservation prices for these goods. Hypotheses are developed and a controlled experiment is conducted to measure subjects’ value congruence with and their trust in online sellers with disparate values, along with their purchase inte...
As society continues its rapid change to a digitized individual, corporate, and government environment it is prudent for researchers to investigate the zeitgeist of the global citizenry. The technological changes brought about by big data analytics are changing the way we gather and view data. This big data analytics sentiment research examines how...
We validated a Fitbit sleep tracking device against typical research-use actigraphy across four nights on 38 young adults. Fitbit devices overestimated sleep and were less sensitive to differences compared to the Actiwatch, but nevertheless captured 88 (poor sleepers) to 98 percent (good sleepers) of Actiwatch estimated sleep time changes. Bland–Al...
Byers, L. Olson, T., Hayes, J., McGee, J., Cazier, J. A., Sledge, R., and Sargent Jones, L. (2016) “Analytics for Good: Using Analytics to Improve Yield Management”, North Carolina Research Association for Research in Education Annual Meeting, University of North Carolina Charlotte, Charlotte, North Carolina, USA, February 11-12, 2016.
Most of Big Data and Analytics work is focused on getting people to do what other people want them to do. What if it could be turned around? What if all the data collected on or about individuals could instead be used to help individuals in ways they want to be helped? What if the data could help individuals achieve their life goals and dreams, and...
Work-life balance (WLB) is described as the balance between work engagements and activities outside of work. Upon inspection it is clear that work-life balance is quite a complex system of different factors, and optimization of WLB does not equate to simply working less. Organizations are clearly impacted by the presence, or lack thereof, of curren...
This work takes common and innovative business analytics techniques and seeks to apply them in the setting of the school system to improve educational attainment in both primary and secondary schools in the United States. In particular, this paper reviews common factors identified in the literature as influencing a student's success in secondary sc...
Factors influencing secondary educational attainment (staying in high school) are well characterized, but several shortcomings of current educational attainment theory preclude a real-time and wide-scope understanding of the issue. Further insight could be provided by text analytic technology. In this article, the authors review the current status...
This paper develops a model and implementation plan for using ICT (Information and Communication Technology) combined with Predictive and Behavioral Analytics to build demand for more sustainable power consumption in the community as a small 100-year-old power company upgrades to using consumer level smart meters in its geographically isolated rura...
This study explores the impact of sustainability reporting on consumer behavior. In this study, the authors measure consumer perception and behavior using the constructs value congruence, trust, loyalty, and purchase intention. To test other research model and hypotheses they collected survey data during an online experimental simulation. During th...
Numerous innovative technologies are available to assist the struggling hardwood lumber industry adapt to
changing market demands and environmental concerns. However, most mill owners do not utilize automated
lumber systems because they do not realize how substantial volume and value gains can be. Thus, there is a
need to quantify improved efficien...
Ethical practices are of increasing concern among many different industries. Businesses in the cell phone industry face an ever increasing concern for environmental sustainability and social responsibility practices from consumers. In order to properly address these issues, companies must first make themselves aware of which issues the public value...
This study investigates the effects of stress, economic factors, altruism, and value congruence on intentions to leave jobs and the nursing profession.
Retaining nurses will be critical for healthcare organizations as the demand for nurses increases. Regulation and cost pressures are changing the nursing work environment.
We surveyed 861 RNs in the...
Objective – Investigate the effects of stress, economic factors, altruism and value congruence on intentions to leave the profession in nursing. Background – As the demand for nurses increases retaining nurses will be critical for healthcare organizations and the healthcare industry. We draw from a mature body of research on nurse retention to buil...
The management of "big data" has become a charged topic not only within the information technology (IT) field, but more broadly in both business and political arenas as well. First perceived as just another technology used to better target customers, its use and misuse has propagated into the political realm and beyond. This study investigates chan...
Healthcare employees generally have access to view hospital patient's medical records. This access can be simply viewing their chart or reviewing information on a computer screen. With this type of accessibly, hospital employees have the opportunity to view diagnosis, personal medical histories, as well as demographic information such as age and ge...
This study explores the factors that influence a nurse's choice to continue working in a rural area as compared to those working or commuting to urban areas. The current and predicted nursing shortage tends to have disproportionate effects in rural areas. An understanding of how nurses make the choice of which type of environment to work in is crit...
This study explores the impact of sustainability reporting on consumer behavio1'. In this study, the authors
measure consumer perception and behavior using the constructs value congruence, trust, loyalty, and purchase intention. To test the research model and hypotheses they collected survey data during an online
experimental simulation. During the...
The ethical integrity of companies is important to assess as business faces challenges that arise from different social and environmental responsibility issues. Child labour is one such issue that is currently impacting children in the Democratic Republic of Congo as they mine for coltan. This conflict mineral is used in many consumer electronics,...
This article explores factors that influence a nurse's choice between working in a rural and an urban area. Understanding how nurses make the choice of which type of environment is critical to addressing this shortage, especially in these hardest hit rural areas. A comprehensive literature review suggested a number of factors worthy of investigatio...
Sustainability has become a strategic focus within many modern organizations. This is largely attributed to increased public awareness and changes in consumer behavior. One recent trend, ‘ethical consumerism (EC),’ occurs when consumers purchase the goods and services from businesses that share their values. In response, many businesses are adoptin...
People claim to be concerned about information privacy on the Internet, yet they frequently give out personal information to online vendors and correspondents with whom they have little, if any, prior experience. This behavior is known as the privacy paradox and is particularly relevant to the context of e-health, due to the special risks of health...
Nurses in a hospital located in Southern US were surveyed to determine their perceptions of the reward structures existent in their hospital. Reward structures were divided into two categories: extrinsic and intrinsic. The cluster analysis procedure partitioned the sample into two clusters based on their level of satisfaction with the hospital's re...
This study explores the value of sustainability information on consumer behavior and addresses two questions. First, can a sustainability report positively influence consumer behavior? Second, does a sustainability report from an independent, third party auditing agency have a greater impact on consumer behavior than an organization's self generate...
This study explores the impact of sustainability reporting on consumer behavior.
More specifically we address several research questions including; (a) ‘are consumers
willing to pay premium prices for goods offered by a technology company with a strong
focus on sustainability?’, (b) ‘does sustainability reporting positively affect consumer
behavior...
People claim to be concerned about information privacy on the Internet, yet they frequently give out personal information to online vendors and correspondents with whom they have little, if any, prior experience. This behavior is known as the privacy paradox and is particularly relevant to the context of e-health, due to the special risks of health...
Social engineering can be briefly defined as the obtaining of information through deceptive methods. The intention of the action is to acquire information that will be of use in order to gain access to a system or use of information obtained from the system. There are benefits gained by allowing health care workers access to patient data, but the a...
People claim to be concerned about information privacy on the Internet, yet they frequently give out personal information to online vendors and correspondents with whom they have little, if any, prior experience. This behavior is known as the privacy paradox and is particularly relevant to the context of e-health, due to the special risks of health...
This paper explores the factors that influence a nurse's choice between working in a rural
and an urban area. The current and predicted nursing shortage tends to affect disproportionally
in the rural areas. An understanding of how nurses make the choice of which type of
environment to work in is critical to addressing this shortage, especially in t...
The authors describe the preparation of tertiary amines deriving from 3‐3‐dibrommethyl‐oxacyclobutane and from tribrommethyl‐oxymethyl‐methane.
Approximate yields of 70% have been obtained in most cases by direct reaction of dimethylamine or diaethylamine on these substances.
The reaction products have been identified by analysis of the free amines...
One of the main threats to keeping health information secure in today's digital world is that of social engineering. The healthcare industry has benefitted from its employees' ability to view patient data. Although access to and transmission of patient data may improve care, increase delivery time of services and reduce health care costs, security...
This study explores the “green” business model for the digital economy. Specifically, it asks whether online consumers will pay more to purchase from a company that they perceive to be socially responsible when it comes to the environment. We conduct an experiment where consumers are presented with different facts regarding the environmental practi...
This study explores the value of sustainability information on consumer behavior. Specifically, this study attempts to determine whether or not consumers will pay more to purchase from a company which issues a sustainability report in general and to see if there is a difference between if a company issues a third party attested sustainability repor...
In this paper we investigate nurses' perceptions of the attraction in working in rural areas of the United States. A comprehensive literature review suggested several factors that need to be further examined. Based upon literature review and focus group interviews, a comprehensive survey was designed and administered. Over three thousand surveys we...
While there are many business and ethical reasons to employ Green IT practices, our study looks at this issue from the consumer's point of view. Specifically, it asks whether online consumers will pay more to purchase from a company that they perceive to be socially responsible for environmental causes. Our findings have practical implications for...
This study demonstrates that consumers, healthcare workers and corporate America are still very much vulnerable to simple social engineering attacks, even with current levels of security training. Through a simulation of what a real social engineer might try to do (with a few safeguards to protect participants) security levels were tested in the bu...
The threat of social engineering attacks is prevalent in today’s society. Even with the pervasiveness of mass media’s coverage of hackers and security intrusions, the general population is not aware of the possible damage that could occur should they be subjected to a social engineering attack. In order to show the damage caused by these attacks, w...
This paper explores the current and predicted nursing shortage factors that attract nurses to work in rural areas, which tend to be the ones hardest hit by the shortage. These factors are assessed and measured through a comprehensive literature review, interviews with 6 focus groups and a survey of more than 1,000 registered nurses. Results indicat...
The purpose of this article is to examine the passwords selected by health care professionals and the security and privacy standards in relationship to those passwords as addressed by the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Examinations of these passwords have illustrated the connectivity between password length and...
Privacy risk is increasingly entering the public consciousness when using information technologies. To gain insight into the role of risk in the technology adoption process, we studied the use of information systems for student registration and schedule management at a major U.S. university. We further extended the technology acceptance model (TAM)...
Radio frequency identification technologies (RFID) are rapidly becoming an every day part of supply chains around the world for the many benefits gained through their use. The applicability of RFID in other marketplaces, however, is just beginning to be realized. One area of significant potential is in medical information retrieval. The application...
In this study we explore how user characteristics such as trust, persistence, and perceptions of the benefits and impediments of online travel shopping influence user likelihood to complete a specific travel shopping task. Through an uncontrolled experiment with a multistep travel search task, we test the difference in user characteristics between...
Particular industries face greater challenges when transitioning to the digital economy than others. The wine industry is one of those industries experiencing some difficulty, as it contends with the heterogeneous state laws regulating wine shipments: in some states, the practice is allowed, while in others, it is considered a felony. Additional co...
The threat of social engineering attacks is prevalent in today’s society. Even with the pervasiveness of mass media’s coverage of hackers and security intrusions, the general population is not aware of the possible damage that could occur should they be subjected to a social engineering attack. In order to show the damage caused by these attacks, w...
In today’s networked world, privacy risk is becoming a major concern for individuals using information technology. Every time someone visits a website or provides information online they have exposed themselves to possible harm. The information collected can be sold to third parties or kept by the site owners themselves for use in creating a profil...
In today’s networked world, privacy risk is becoming a major concern for individuals using information technology. Every time someone visits a website or provides information online they have exposed themselves to possible harm. The information collected can be sold to third parties or kept by the site owners themselves for use in creating a profil...
Nurses in a hospital located in Southern U. S. were surveyed to determine their perceptions of the reward structures existent in their hospital. Reward structures were divided into two categories: extrinsic and intrinsic. The cluster analysis procedure partitioned the sample into two clusters based upon their level of satisfaction with the hospital...
Many organizations are adopting radio frequency identification technologies (RFID) as part of their information supply chains for the myriad of benefits that come through the use of such devices. But the applicability of RFID in other marketplaces is just beginning to be realized. One of these areas of significant potential is in medical informatio...
is prohibited. aB stra C t People claim to be concerned about information privacy on the Internet, yet they frequently give out personal information to online vendors and correspondents with whom they have little, if any, prior experience. This behavior is known as the privacy paradox and is particularly relevant to the context of e-health, due to...