Roozmehr Safi

Roozmehr Safi
Verified
Roozmehr verified their affiliation via an institutional email.
Verified
Roozmehr verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Professor (Associate) at University of Missouri–Kansas City

About

17
Publications
6,109
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
115
Citations
Current institution
University of Missouri–Kansas City
Current position
  • Professor (Associate)

Publications

Publications (17)
Article
Full-text available
Generative AI agents such as ChatGPT have created renewed concerns about the adverse effects of technology on students’ learning through receiving unpermitted aid in their coursework. We conducted an exploratory experiment involving a typical college course assignment to detect and compare genuine student responses with responses generated by ChatG...
Conference Paper
Full-text available
Students increasingly rely on generative AI agents, such as ChatGPT, for their coursework. While these agents often significantly increase students' productivity, their use can suppress their creativity or lead to answers that are incorrect or biased. The ability to reliably discriminate between content written by students and that authored by AI i...
Conference Paper
Full-text available
ChatGPT, an AI agent capable of answering questions from virtually all domains of knowledge, has created renewed concerns about the adverse effects of AI on students' learning through cheating. We conducted an experiment involving a typical college course assignment to detect and compare genuine student responses to responses generated by ChatGPT....
Article
Full-text available
As e-commerce expands rapidly from small inexpensive products to major ones, more sellers design and deliver their products as unassembled, compact kits to make logistics more efficient and cost effective. While sensible from an operation’s perspective, this practice inadvertently shifts often significant amounts of assembly work to consumers. Draw...
Article
Full-text available
Detecting and responding to information security threats quickly and effectively is becoming increasingly crucial as modern attackers continue to engineer their attacks to operate covertly to maintain long-term access to victims’ systems after the initial penetration. We conducted an experiment to investigate various aspects of decision makers’ beh...
Article
Full-text available
How do individuals decide how much private information to share publicly? We explore: (a) What are contemporary attitudes about sharing? (b) How much can an organization influence members' sharing indirectly through targeting attitudes, and/or directly through targeting behaviors? We draw on ambivalence, nudging, and privacy paradox theories to exa...
Article
Full-text available
Increasing reliance on the Internet's perpetual memory has raised concerns regarding how dated information that would otherwise be forgotten or inaccessible can unduly or disproportionally influence current assessments and decisions. I investigate aspects of this topic for two major business entity types: one-person businesses (i.e., sole proprieto...
Article
Full-text available
Information resources are becoming increasingly important to individuals and organizations, and ensuring their security is a major concern. While research in information security has adopted primarily a quantitative method to determine how and how much to invest in security, most decision makers rely on non-quantitative methods for this purpose, th...
Article
In this article, an evolutionary argument to explain how people comprehend graphs is put forth. A theory of evolutionary fit, which argues for the correspondence between information presentation and evolutionarily adaptive brain structures, is proposed. This is complementary to cognitive fit, which argues for a correspondence between task and infor...
Article
The success of information systems development efforts hinges largely on eliciting accurate requirements from users and other stakeholders. Requirements determination is difficult due to the complexity of the systems to be built, analysts’ and users’ cognitive and motivational challenges, and the highly politicized nature of many development effort...
Article
Full-text available
Online reviews have become extremely valuable sources of information about products and their customers as electronic commerce continues to proliferate rapidly. Previous research has shown that reviews of a product change and evolve over its life. Identifying and understanding patterns of change in reviews and the forces that shape them is an under...
Conference Paper
Full-text available
We propose a communication method based on goal framing (positive or negative framing of messages) to improve the persuasive power of the security messages communicated to users of information systems. Following previous findings in goal framing research, we distinguish between messages advocating adopting preventative security measures and message...
Article
Evolution has equipped Homo sapiens with a wide range of inherent abilities. One of those abilities is comprehending graphical representations. We claim that comprehension is only inherent if the representation has an analogy in the evolutionary environment. We test this using a fMRI study to show that certain graphs activate the visual cortex and...
Article
Full-text available
Purpose – The purpose of this paper is to study the effects of multidimensional friendship networks on economic outcomes in the domain of online people-to-people (P2P) lending markets. Design/methodology/approach – The empirical analysis is based on the data set of transactions and friendship networks from PPDai.com market, the most prominent P2P...
Article
Full-text available
Assessing the creditworthiness of prospective business partners is the first step in conducting trade. Traditionally the creditworthiness of partners was assessed using transactional methods, methods based on close observation of the other party and the heavy use of mostly subjective, soft information. During recent decades, however, these relation...

Network

Cited By