Mary R. Lind’s research while affiliated with Trident University International and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (45)


Service Quality Dimensions Within Technology-Based Banking Services
  • Chapter

January 2013

·

13 Reads

·

1 Citation

Caroline Howard

·

·

Mary Lind

Technology-based banking services (TBBS) are quickly expanding and provide cost reductions per transaction, given increasing labor costs. However, TBBS can be very costly if not introduced correctly. It is critical to have a clear understanding regarding how to best implement, manage, and promote TBBS for success. The purpose of this quantitative correlational descriptive research study is to determine if a set of technology-based banking service quality dimensions have an association with customer satisfaction and behavioral intentions toward TBBS in Yemen. Findings revealed evidence that seven service quality dimensions—functionality, enjoyment, security, assurance, design, convenience, and customization—suggested by Lin and Hsieh (2006) were significantly associated with customer satisfaction and behavioral intentions toward TBBS in Yemen. The findings contain descriptive and inferential statistical analysis to describe service quality dimensions and predict customer perceptions of TBBS. The study includes a recommendation that bank leaders focus on service enjoyment and customization to enhance customers’ experience using TBBS. Additional research venues are discussed to improve self-service technologies within the banking industry in Yemen.


Perceptions of Productivity and Digital Ethics in Smart Phone Use in a Chinese Context

April 2012

·

28 Reads

·

1 Citation

International Journal of Cyber Ethics in Education

The networked society is impacting all aspects of people's lives and changing the way that information is obtained and used. For students this impact is changing how information is shared and tasks are performed. A digital enabled culture is resulting in changed norms on collaboration and providing more opportunities for teams to collaborate on a moment's notice. The digital ethics code of the 1980s is addressed in the current digital culture. This research will develop a measurement scale for digital ethics and assess this scale in the context using students from China.


Service Quality Dimensions Within Technology-Based Banking Services

July 2011

·

40 Reads

·

9 Citations

International Journal of Strategic Information Technology and Applications

Technology-based banking services TBBS are quickly expanding and provide cost reductions per transaction, given increasing labor costs. However, TBBS can be very costly if not introduced correctly. It is critical to have a clear understanding regarding how to best implement, manage, and promote TBBS for success. The purpose of this quantitative correlational descriptive research study is to determine if a set of technology-based banking service quality dimensions have an association with customer satisfaction and behavioral intentions toward TBBS in Yemen. Findings revealed evidence that seven service quality dimensions-functionality, enjoyment, security, assurance, design, convenience, and customization-suggested by Lin and Hsieh 2006 were significantly associated with customer satisfaction and behavioral intentions toward TBBS in Yemen. The findings contain descriptive and inferential statistical analysis to describe service quality dimensions and predict customer perceptions of TBBS. The study includes a recommendation that bank leaders focus on service enjoyment and customization to enhance customers' experience using TBBS. Additional research venues are discussed to improve self-service technologies within the banking industry in Yemen.


An E-Business Audit Service Model in the B2B Context

April 2010

·

114 Reads

·

9 Citations

Information Systems Management

We have studied E-business audit as a specialized service rendered in an information technology intensive environment. A service model is used to research the E-business audit context. Here auditing is viewed as a specialized technical service conducted in the context of E-business technologies, business processes, and people involved in E-business transactions. The specialized audit service is provided to the E-Business transacting firms that in most cases involve transactions between customers and suppliers. A field study of information technology auditors showed that both knowledge of the business processes and of the technologies were critical for them to render reliable and accurate e-business audit findings. The results showed the need for higher training levels in advanced IT methods and tools for technology auditors in rendering IT audit judgments for the business-to-business (B2B) context. Thus, these results provided support for the service model that calls for the appropriate knowledge and use of technologies, business processes, and people in providing service.


Website Accessibility for Users with Visual Impairment

January 2010

·

62 Reads

·

4 Citations

Information Systems Education Journal

In this web accessibility study of homepages of education departments in post secondary educational institutions, the 1998 US Section 508 Law regarding webpage accessibility for people with disabilities was addressed. Along with the requirements of this legislation, there are grow-ing demands for web accessibility resulting from age-related visual disabilities and the ubiquitous handheld, mobile Internet devices. In this study six hypotheses were addressed to analyze web ac-cessibility in terms of website complexity, enactment of web accessibility policies and practices, and webmaster web accessibility training, end-user communications, and strategic decision-making. A survey was mailed to education department webmasters to identify levels of web accessibility skills and training. Tools utilized to analyze homepage accessibility were ACheckerTM, A-PromptTM, JAWSTM, and KelvinTM. Also, the existence of institutional web accessibility policies and lan-guage in job requirements for webmaster job postings were examined to determine the importance placed on Section 508 compliance by employers. Results showed a 95% failure rate in Section 508 compliance where two significant relationships existed for higher web inaccessibility: lower levels of webmaster web accessibility training and increasing complexity in webpage design.


A De-Construction of Wireless Device Usage

January 2009

·

9 Reads

In this article, wireless technology use is addressed with a focus on the factors that underlie wireless interaction. A de-construction of the information processing theories of user/technology interaction is presented. While commercial and useful applications of wireless devices are numerous, wireless interaction is emerging as a means of social interaction—an extension of the user’s personal image—and as an object of amusement and play. The technology/user interaction theories that have driven the discussions of computer assisted communication media are information richness, communicative action, and social influence modeling. This article will extend this theoretical view of wireless devices by using flow theory to address elements of fun, control, and focus. Then, these technology/user interaction theories are used with respect to wireless devices to propose areas for future research.


A De-Construction of Wireless Device Usage

January 2009

·

5 Reads

In this article, wireless technology use is addressed with a focus on the factors that underlie wireless interaction. A de-construction of the information processing theories of user/technology interaction is presented. While commercial and useful applications of wireless devices are numerous, wireless interaction is emerging as a means of social interaction—an extension of the user’s personal image—and as an object of amusement and play. The technology/user interaction theories that have driven the discussions of computer assisted communication media are information richness, communicative action, and social influence modeling. This article will extend this theoretical view of wireless devices by using flow theory to address elements of fun, control, and focus. Then, these technology/user interaction theories are used with respect to wireless devices to propose areas for future research.


A De-Construction of Wireless Device Usage

January 2009

·

3 Reads

In this article, wireless technology use is addressed with a focus on the factors that underlie wireless interaction. A de-construction of the information processing theories of user/technology interaction is presented. While commercial and useful applications of wireless devices are numerous, wireless interaction is emerging as a means of social interaction—an extension of the user’s personal image—and as an object of amusement and play. The technology/user interaction theories that have driven the discussions of computer assisted communication media are information richness, communicative action, and social influence modeling. This article will extend this theoretical view of wireless devices by using flow theory to address elements of fun, control, and focus. Then, these technology/user interaction theories are used with respect to wireless devices to propose areas for future research.


A De-Construction of Wireless Device Usage

January 2008

·

5 Reads

In this article, wireless technology use is addressed with a focus on the factors that underlie wireless interaction. A de-construction of the information processing theories of user/technology interaction is presented. While commercial and useful applications of wireless devices are numerous, wireless interaction is emerging as a means of social interaction—an extension of the user’s personal image—and as an object of amusement and play. The technology/user interaction theories that have driven the discussions of computer assisted communication media are information richness, communicative action, and social influence modeling. This article will extend this theoretical view of wireless devices by using flow theory to address elements of fun, control, and focus. Then, these technology/user interaction theories are used with respect to wireless devices to propose areas for future research.


The Role of Wireless Communications in Temporary Team Formation

January 2008

·

12 Reads

Information Systems Education Journal

In this paper, an exploratory study of the impact of wireless communications on tem-porary teams is presented. Assessed is the impact of cell phone usage on team formation. Also the flow absorption with the wireless artifact is assessed in terms of team performance. Gender differ-ences using the cell phone to build and maintain teams are assessed. The results indicate that there are gender differences in wireless communication and cell phones that facilitate team formation. Interestingly flow absorption with the cell phone improved team performance.


Citations (31)


... Several researchers have used non-fiscal measures such as vehicle-miles per employee or per vehicle (Dajani and Gilbert 1978;Fielding et al. 1978;Cervero 1984;Karlaftis and McCarthy 1998) which can be compared without concern about purchasing power differences. Sulek and Lind (2000) use a particularly complicated measure that is the weighted sum of outputs (revenue miles, passenger boardings, miles between collisions) divided by the weighted sum of inputs (labor costs, fuel/material costs, fleet size). ...

Reference:

Correction: Operating subsidies and transit efficiency: applying new metrics to old problems
A Systems Model for Evaluating Transit Performance
  • Citing Article
  • December 2000

Journal of Public Transportation

... We have also reviewed articles on technology adoption stages, as BA adoption is considered a technology adoption. As per Lind and Zmud (1991), business analytics is technology innovation, as the operational idea of BA is based on technology. ...

The Influence of a Convergence in Understanding Between Technology Providers and Users on Information Technology Innovativeness
  • Citing Article
  • May 1991

Organization Science

... Wirtz & Zeithaml (2018) predict that all services sectors will be hugely transformed in the coming years as technology becomes smarter, better, smaller, and cheaper. Sectors such as retail banking primarily sell services and are very competitive due to lack of significant product differentiation between operators (Alkibsi, 2011). Therefore, enhancing the quality of services is often deemed as a viable marketing strategy for retail banks to enhance their sustainability (Al-Hawari et al., 2009;Al-Eisawi, 2014). ...

CUSTOMER PERCEPTIONS OF TECHNOLOGY-BASED BANKING SERVICE QUALITY PROVIDED BY BANKS OPERATING IN YEMEN
  • Citing Article
  • Full-text available

... Whereas it is possible to have a qualified SysTrust report, that is not possible for a WebTrust report. WebTrust provides the trust in the websites containing the information, and the SysTrust service provides the trust in the systems producing the information (Pathak and Lind, 2002;Amin and Mohamed, 2016). Some of the specific differences between a SAS 70 audit engagement and a SysTrust engagement are illustrated in Table 2.3. ...

Integrated information systems: SAS 94 and auditors
  • Citing Article
  • November 2007

Journal of Corporate Accounting & Finance

... In both studies, the underlying assumption was that horizontal mechanisms were implemented in order to remove barriers to cross-unit collaboration. Other related research looked at regular conferences and forums (DeSanctis and Jackson, 1994) and training and newsletters (Zmud and Lind, 1986) as informal communication mechanisms. ...

The user of formal mechanisms for linking the information systems function with
  • Citing Conference Paper
  • August 1986

... De 2009 a 2013, temos somente dois artigos que utilizam o termo "digital ethics" no seu título ou no resumo. Encontramos uma publicação de 2011, que aborda a relação da ética digital com a literacia midiática e literacia informacional, citando um termo novo para a época, a "cidadania digital" (Gallagher & Stewart, 2011) e outra publicação de 2012, sobre o uso de smartphones no contexto chinês (Lind, Anyansi-Archibong & Akan, 2012). ...

Perceptions of Productivity and Digital Ethics in Smart Phone Use in a Chinese Context
  • Citing Article
  • April 2012

International Journal of Cyber Ethics in Education

... The main message of this study is that training of workers who run the system (users) must be inherent to assimilation and, as H2 indicates, the very existence or non-existence of training affects the amount of referrals. This finding is congruent with earlier literature which acknowledges the importance of training for successful assimilation (Rivard and Huff, 1988; Sein et al., 1987; Cheney et al., 1986; Zmud and Lind, 1985). It is important to pinpoint the most effective training method for each organization (Facteau et al., 1995). ...

Linking mechanism supporting end-user computing
  • Citing Article
  • January 1985

... 27 Patients in rural areas may face transportation problems and fewer alternatives to in-center hemodialysis. [32][33][34] Paradoxically, dialysis facilities in rural areas are less likely to offer peritoneal or homehemodialysis training than urban facilities, despite the reported advantages of home dialysis for rural patients. [34][35][36] Long travel times can also increase the financial burden for patients and their families, including higher transportation cost, lost productivity, and time and wage loss for family members. ...

Assessing Dialysis Transportation Needs in Rural and Small Urban Transit Systems
  • Citing Article
  • January 2005

... Shostack [15] also argued that process flow must be analyzed to ensure error free service and developed the concept of service blueprinting for mapping all processes that comprise the service. Service blueprinting is valuable because it allows the service provider to visualize the entire service delivery process, thereby emphasizing that reliability requires system wide analysis [15] [16] [17] [18]. Similarly, the customer journey approach also utilizes a system wide view by mapping service delivery from the customer's perspective [19] [20]. ...

Fail-Safe Methods for Paratransit Safety
  • Citing Article
  • September 2005

Journal of Public Transportation

... Scholarly literature has examined the role that IT plays in promoting collaboration and information sharing both inside and across organizational boundaries (e.g., Barua et al., 1995;Lind & Zmud, 1995;Pickering & King, 1995;Quinn et al., 1996). Huber (1990) argued that IT is a variable that can be used to enhance the quality and timeliness of organizational intelligence and decision making, thus promoting organizational performance. ...

Improving Interorganizational Effectiveness through Voice Mail Facilitation of Peer-to-Peer Relationships
  • Citing Article
  • August 1995

Organization Science