Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas W. Dillon is active.

Publication


Featured researches published by Thomas W. Dillon.


Cin-computers Informatics Nursing | 2003

Nursing self-efficacy of an integrated clinical and administrative information system.

Thomas W. Dillon; Diane Lending; Thaddeus R. Crews; Ray Blankenship

Self-efficacy is a user’s confidence that he or she has the ability to use an information system. A survey gathered demographics, self-assessed computer skills, attitude and self-efficacy before installation of an integrated clinical and administrative information system. Results showed that higher levels of nursing education, home computer use, and average levels of self-assessed e-mail, Internet search, word processing, and general computer expertise predicted self-efficacy of the system. In addition, previous use of home and office electronics equipment, such as an answering machine, predicted self-efficacy. Implications for training and future adoption of clinical information systems are presented.


International Journal of Healthcare Information Systems and Informatics | 2007

The Effects of Confidentiality on Nursing Self-Efficacy with Information Systems

Diane Lending; Thomas W. Dillon

The objective of this study is to gain an understanding of nurses’ perceptions of the confidentiality of computerized charts and determine if these perceptions influence nursing self-efficacy. A questionnaire was mailed to 600 hospital nursing staff just prior to the implementation of an integrated clinical and administrative hospital-wide information system. One hundred and thirty-nine questionnaires were returned for a response rate of 23%. The measurements consisted of perceived confidentiality, self-efficacy, selfreported technology use, self-assessed computer expertise, and attitude. We found that nurses recognize confidential information and that nurses do not think that computerized records are more or less confidential than paper records. Perceived confidentiality and self-efficacy are related. Because nurses that have lower self-efficacy also think that the data found in a computer is less confidential and that there is less of a need for confidentiality for computerized data, hospitals should take steps to improve self-efficacy by enhancing confidentiality training.


annual conference on computers | 2013

Identifying skills for entry-level IT consultants

Diane Lending; Thomas W. Dillon

In this paper, we present preliminary research into the skills that entry-level IT Consultants need. Our data sources are senior-level IT consultants from six different companies and senior IS students who had just completed an IT consulting class where they were mentored by 12 different consulting firms. We used focus groups and open-ended surveys to get rich detailed data and then analyzed the results. Based upon this, we expand the identified skills for an entry-level IT Consultant to include being able to cope with changes, taking a holistic view of a problem, knowing when to ask for help, being a self-starter and having good time management skills. We found that both written and oral communication skills were important and that senior consultants looked for entry level personnel who were well-rounded.


acm sigcpr sigmis conference on computer personnel research | 2004

Perceptions of accuracy: effects on computer attitudes and self-efficacy

Diane Lending; Thomas W. Dillon

With the introduction of any information system into an organization, user attitudes towards the system and self-efficacy (the confidence that the user can use the system) are an important consideration. When patient care systems are introduced into a hospital, hospital workers are rightly concerned about how accurate the records will be in the new system and how the system will affect patient care. In this study, we will investigate whether perceptions of accuracy affect computer attitudes and self-efficacy.In November 2003, we surveyed medical personnel at a regional hospital just prior to the introduction of a patient care system. We hope to better understand the relationships between these concepts.


Proceedings of the 2008 ACM SIGMIS CPR conference on Computer personnel doctoral consortium and research | 2008

High school computer camps: an "early in the pipeline" step to meet the demand for diverse information technology workers

Robert G. Brookshire; Karen Kemp; Daphyne M. Thomas; Thomas W. Dillon

From 2001 to 2006, newly declared computer science majors have declined from a robust 16,000 to 8,000 by the fall of 2006, based on data reported by the Computing Research Association. Enrollments in science, technology, engineering, and mathematics have declines 16%. Information technology (IT) programs have responded with a variety of outreach efforts directed at high school students to attempt to interest them in studying IT subjects, declaring IT majors, and pursuing IT careers. Several colleges and universities have created computer camps, weekend or summer experiences for younger students designed to introduce them to computer technology in a fun and exciting way. We propose to create a panel discussion at the ACM SIGMIS/CPR Conference featuring two universities that have operated such camps


acm sigmis conference on computers and people research | 2016

A Plan to Improve Learning of Requirements Elicitation in an IS Curriculum

Jeremy D. Ezell; Diane Lending; S. E. Kruck; Thomas W. Dillon; Jeffrey May

In this paper, we present our plan to integrate requirements elicitation concepts and learning assessments into an Information System curriculum. Both contemporary research and practitioners have noted deficiencies in the abilities of entry-level IT consultants to effectively evaluate new information system needs in business environments. Thus, the ability to professionally and effectively elicit new IS requirements adds significant value to students seeking an IS degree.


annual conference on computers | 2012

Developing a survey to identify IT consultant skills for incorporating in the IS curriculum

Diane Lending; Thomas W. Dillon

In this paper, we describe the research questions and methodology for a research project investigating excellent performance in Information Technology consulting, both technical and behavioral attributes. Exploratory qualitative data will be gathered using a multi-city focus group and interviews with IT consultants. Based upon the exploratory data and the IS skills literature, a survey will also be created, validated, and conducted for a large consulting population. In our analysis, we will compare the skills of IT consultants with other IT professionals. We will recommend how IS curriculum should be structured to fill these needs. At the time of the conference, we will be able to report on the qualitative data based upon the focus groups and interviews. We will also share our validated survey.


Proceedings of the 2008 ACM SIGMIS CPR conference on Computer personnel doctoral consortium and research | 2008

Keynote speaker: recruiting IT specialists for information risk management (IRM) and the external audit

Thomas W. Dillon

RELEVANT EXPERIENCE Phil began his career with KPMG in 1992 in the Audit practice. In 1997, he transferred to the IT Advisory (formerly IRM) where he has led engagements relative to information security strategies, business continuity plan design, systems implementation support, SAS 70 and IT attestation services, IT audit and SOX assistance, and financial statement and integrated audit support. Phil was elected to the partnership subsequent to the completion of a KPMG Department of Professional Practice rotation in 2004.


Cin-computers Informatics Nursing | 2005

Nursing attitudes and images of electronic patient record systems.

Thomas W. Dillon; Ray Blankenship; Thad Crews


Computers in Nursing | 1998

Perceived ease of use and usefulness of bedside-computer systems.

Thomas W. Dillon; Dorothea McDowell; Salimian F; Conklin D

Collaboration


Dive into the Thomas W. Dillon's collaboration.

Top Co-Authors

Avatar

Diane Lending

James Madison University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Harry L. Reif

James Madison University

View shared research outputs
Top Co-Authors

Avatar

S. E. Kruck

James Madison University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jeffrey May

James Madison University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Karen Kemp

University of South Carolina

View shared research outputs
Researchain Logo
Decentralizing Knowledge