Adam Mills | Loyola University New Orleans (original) (raw)

Adam Mills

Address: New Orleans, LA

less

Uploads

Papers by Adam Mills

Research paper thumbnail of Wearing safe: Physical and informational security in the age of the wearable device

Wearable computing devices promise to deliver countless benefits to users. Moreover, they are amo... more Wearable computing devices promise to deliver countless benefits to users. Moreover, they are among the most personal and unique computing devices of all, more so than laptops and tablets and even more so than smartphones. However, this uniqueness also brings with it a risk of security issues not encountered previously in information systems: the potential to not only compromise data, but also to physically harm the wearer. This article considers wearable device security from three perspectives: whether the threat is to the device and/or the individual, the role that the wearable device plays, and how holistic wearable device security strategies can be developed and monitored.

Research paper thumbnail of iMedical: Integrating Smartphones into medical practice design

Journal of Medical Marketing: Device, Diagnostic and Pharmaceutical Marketing, 2013

Smartphones particularly the iPhone and the multitude of applications that have been developed fo... more Smartphones particularly the iPhone and the multitude of applications that have been developed for users of the device is briefly described. The study investigates what makes Smartphones different from other more common Internet applications (via personal computer), and how these enhance the interactions the practice has with its patients while also increasing efficiency. U-Commerce is suggested as a theoretical framework that best explains the uniqueness of the iPhone. This article considers Smartphones (most notably the iPhone) as a device that can have a valuable impact on the medical practice, particularly from the perspective of the interaction that the practice has with its patients. Practice implications: A process is outlined for identifying apps within the medical practice, ensuring the applications take advantage of the iPhone's unique features, and contribute to the efficiency of the practice.

Research paper thumbnail of Cyber-Positioning: Bestselling Authors’ Online Communicated Brand Personalities

Developments in Marketing Science: Proceedings of the Academy of Marketing Science, 2014

Research paper thumbnail of La Vie BohÈme? The Role of an Operatic Flash Mob on Consumer Behavior

Developments in Marketing Science: Proceedings of the Academy of Marketing Science, 2014

Research paper thumbnail of When Spying is not Just: A Consumer Surveillance Framework

Ideas in Marketing: Finding the New and Polishing the Old, 2014

Research paper thumbnail of Using Chernoff Faces to Portray Social Media Wine Brand Images

Purpose: With the rapid and exponential growth of Web 2.0 over the past few years, wine brand man... more Purpose: With the rapid and exponential growth of Web 2.0 over the past few years, wine brand managers must increasingly be aware of how their brands are represented in the social media sphere. However, understanding social media can be complex due to the broad and diverse nature of communications platforms and styles. This paper illustrates two techniques for the collection, assimilation, analysis and presentation of a brand's social media visibility data

Research paper thumbnail of Wearing safe: Physical and informational security in the age of the wearable device

Wearable computing devices promise to deliver countless benefits to users. Moreover, they are amo... more Wearable computing devices promise to deliver countless benefits to users. Moreover, they are among the most personal and unique computing devices of all, more so than laptops and tablets and even more so than smartphones. However, this uniqueness also brings with it a risk of security issues not encountered previously in information systems: the potential to not only compromise data, but also to physically harm the wearer. This article considers wearable device security from three perspectives: whether the threat is to the device and/or the individual, the role that the wearable device plays, and how holistic wearable device security strategies can be developed and monitored.

Research paper thumbnail of iMedical: Integrating Smartphones into medical practice design

Journal of Medical Marketing: Device, Diagnostic and Pharmaceutical Marketing, 2013

Smartphones particularly the iPhone and the multitude of applications that have been developed fo... more Smartphones particularly the iPhone and the multitude of applications that have been developed for users of the device is briefly described. The study investigates what makes Smartphones different from other more common Internet applications (via personal computer), and how these enhance the interactions the practice has with its patients while also increasing efficiency. U-Commerce is suggested as a theoretical framework that best explains the uniqueness of the iPhone. This article considers Smartphones (most notably the iPhone) as a device that can have a valuable impact on the medical practice, particularly from the perspective of the interaction that the practice has with its patients. Practice implications: A process is outlined for identifying apps within the medical practice, ensuring the applications take advantage of the iPhone's unique features, and contribute to the efficiency of the practice.

Research paper thumbnail of Cyber-Positioning: Bestselling Authors’ Online Communicated Brand Personalities

Developments in Marketing Science: Proceedings of the Academy of Marketing Science, 2014

Research paper thumbnail of La Vie BohÈme? The Role of an Operatic Flash Mob on Consumer Behavior

Developments in Marketing Science: Proceedings of the Academy of Marketing Science, 2014

Research paper thumbnail of When Spying is not Just: A Consumer Surveillance Framework

Ideas in Marketing: Finding the New and Polishing the Old, 2014

Research paper thumbnail of Using Chernoff Faces to Portray Social Media Wine Brand Images

Purpose: With the rapid and exponential growth of Web 2.0 over the past few years, wine brand man... more Purpose: With the rapid and exponential growth of Web 2.0 over the past few years, wine brand managers must increasingly be aware of how their brands are represented in the social media sphere. However, understanding social media can be complex due to the broad and diverse nature of communications platforms and styles. This paper illustrates two techniques for the collection, assimilation, analysis and presentation of a brand's social media visibility data

Log In