Publications

In Press
The Adoption of New Medical Technologies: The Case of Customized Individually Made Knee Implants
Namin AT, Jalali MS, Vahdat V, Bedair HS, O’Connor MI, Kamarthi S, et al. The Adoption of New Medical Technologies: The Case of Customized Individually Made Knee Implants. Value in Health [Internet]. In Press; Online simulatorAbstract

Objectives: To investigate the impact of insurance coverage on the adoption of customized individually made (CIM) knee implants, and to compare patient outcomes and cost-effectiveness of off-the-shelf (OTS) and CIM implants.

Study Design: A system dynamics simulation model is developed to study adoption dynamics of CIM and meet the research objectives.

Methods: The model reproduced the historical data on primary and revision knee replacement implants obtained from the literature and the Nationwide Inpatient Sample. Then, the dynamics of adoption of CIM implants were simulated from 2018 to 2026. The rate of 90-day readmission, 3-year revision surgery, recovery period, time savings in operating rooms, and the associated cost within three years of primary knee replacement implants were used as performance metrics.

Results: The simulation results indicate that, by 2026, an adoption rate of 90% for CIM implants can reduce the number of readmissions and revision surgeries by 62% and 39%, respectively, and can save hospitals and surgeons 6% on procedure time, and cut down cumulative healthcare costs by approximately $38 billion.

Conclusions: CIM implants have the potential to deliver high-quality care while decreasing overall healthcare costs, but their adoption requires the expansion of current insurance coverage. This work presents a first systematic study to understand the dynamics of adoption of CIM knee implants and instrumentation. More broadly, the current modeling approach and systems thinking perspective could be utilized to consider the adoption of any emerging customized therapies for personalized medicine.

The Adoption of New Medical Technologies.pdf supporting information.pdf modeling documentation and instruction for reproducibility.pdf
2019
Dynamics of intervention adoption, implementation, and maintenance inside organizations: The case of an obesity prevention initiative
Jalali MS, Rahmandad H, Bullock SL, Lee-Kwan SH, Gittelsohn J, Ammerman A. Dynamics of intervention adoption, implementation, and maintenance inside organizations: The case of an obesity prevention initiative. Social Science & Medicine. 2019;224 :67-76. Abstract
Overall impact of public health prevention interventions relies not only on the average efficacy of an intervention, but also on the successful adoption, implementation, and maintenance (AIM) of that intervention. In this study, we aim to understand the dynamics that regulate AIM of organizational level intervention programs. We focus on two well-documented obesity prevention interventions, implemented in food carry-outs and stores in low-income urban areas of Baltimore, Maryland, which aimed to improve dietary behaviour for adults by providing access to healthier foods and point-of-purchase promotions. Building on data from field observations, in-depth interviews, and data discussed in previous publications, as well as the strategy and organizational behaviour literature, we developed a system dynamics model of the key processes of AIM. With simulation analysis, we show several reinforcing mechanisms that span stakeholder motivation, communications, and implementation quality and costs can turn small changes in the process of AIM into big difference in the overall impact of the intervention. Specifically, small changes in the allocation of resources to communication with stakeholders of intervention could have a nonlinear long-term impact if those additional resources can turn stakeholders into allies of the intervention, reducing the erosion rates and enhancing sustainability. We present how the dynamics surrounding communication, motivation, and erosion can create significant heterogeneity in the overall impact of otherwise similar interventions. Therefore, careful monitoring of how those dynamics unfold, and timely adjustments to keep the intervention on track are critical for successful implementation and maintenance.
dynamics of intervention adoption.pdf Vensim Files
Health Care and Cybersecurity: Bibliometric Analysis of the Literature
Jalali MS, Razak S, Gordon W, Perakslis E, Madnick S. Health Care and Cybersecurity: Bibliometric Analysis of the Literature. Journal of Medical Internet Research. 2019;21 (2) :e12644. Abstract

Background: Over the past decade, clinical care has become globally dependent on information technology. The cybersecurity of health care information systems is now an essential component of safe, reliable, and effective health care delivery.
Objective: The objective of this study was to provide an overview of the literature at the intersection of cybersecurity and health care delivery.
Methods: A comprehensive search was conducted using PubMed and Web of Science for English-language peer-reviewed articles. We carried out chronological analysis, domain clustering analysis, and text analysis of the included articles to generate a high-level concept map composed of specific words and the connections between them.
Results: Our final sample included 472 English-language journal articles. Our review results revealed that majority of the articles were focused on technology: Technology–focused articles made up more than half of all the clusters, whereas managerial articles accounted for only 32% of all clusters. This finding suggests that nontechnological variables (human–based and organizational aspects, strategy, and management) may be understudied. In addition, Software Development SecurityBusiness Continuity, and Disaster Recovery Planning each accounted for 3% of the studied articles. Our results also showed that publications on Physical Security account for only 1% of the literature, and research in this area is lacking. Cyber vulnerabilities are not all digital; many physical threats contribute to breaches and potentially affect the physical safety of patients.
Conclusions: Our results revealed an overall increase in research on cybersecurity and identified major gaps and opportunities for future work.

cybersecurity in healthcare.pdf
The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products
Jalali MS, Kaiser JP, Siegel M, Madnick S. The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products. IEEE Security and privacy. 2019;17 (2) :39-48. Adoption_dynamics_of_IoT_products.pdf
Why Employees (Still) Click on Phishing Links: an Investigation in Hospitals
Jalali MS, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: an Investigation in Hospitals. Social Science Research Network. 2019;
2018
Cybersecurity in Hospitals: a Systematic, Organizational Perspective
Jalali MS, Kaiser JP. Cybersecurity in Hospitals: a Systematic, Organizational Perspective. Journal of Medical Internet Research. 2018;20 (5) :e10059. Abstract

Background: Cybersecurity incidents are a growing threat to the health care industry in general and hospitals in particular. The health care industry has lagged behind other industries in protecting its main stakeholder (ie, patients), and now hospitals must invest considerable capital and effort in protecting their systems. However, this is easier said than done because hospitals are extraordinarily technology-saturated, complex organizations with high end point complexity, internal politics, and regulatory pressures.

Objective: The purpose of this study was to develop a systematic and organizational perspective for studying (1) the dynamics of cybersecurity capability development at hospitals and (2) how these internal organizational dynamics interact to form a system of hospital cybersecurity in the United States.

Methods: We conducted interviews with hospital chief information officers, chief information security officers, and health care cybersecurity experts; analyzed the interview data; and developed a system dynamics model that unravels the mechanisms by which hospitals build cybersecurity capabilities. We then use simulation analysis to examine how changes to variables within the model affect the likelihood of cyberattacks across both individual hospitals and a system of hospitals.

Results: We discuss several key mechanisms that hospitals use to reduce the likelihood of cybercriminal activity. The variable that most influences the risk of cyberattack in a hospital is end point complexity, followed by internal stakeholder alignment. Although resource availability is important in fueling efforts to close cybersecurity capability gaps, low levels of resources could be compensated for by setting a high target level of cybersecurity.

Conclusions: To enhance cybersecurity capabilities at hospitals, the main focus of chief information officers and chief information security officers should be on reducing end point complexity and improving internal stakeholder alignment. These strategies can solve cybersecurity problems more effectively than blindly pursuing more resources. On a macro level, the cyber vulnerability of a country’s hospital infrastructure is affected by the vulnerabilities of all individual hospitals. In this large system, reducing variation in resource availability makes the whole system less vulnerable—a few hospitals with low resources for cybersecurity threaten the entire infrastructure of health care. In other words, hospitals need to move forward together to make the industry less attractive to cybercriminals. Moreover, although compliance is essential, it does not equal security. Hospitals should set their target level of cybersecurity beyond the requirements of current regulations and policies. As of today, policies mostly address data privacy, not data security. Thus, policy makers need to introduce policies that not only raise the target level of cybersecurity capabilities but also reduce the variability in resource availability across the entire health care system.

Cybersecurity in hospitals.pdf
Decision-Making and Biases in Cybersecurity Capability Development: Evidence from a Simulation Game Experiment
Jalali MS, Siegel M, Madnick S. Decision-Making and Biases in Cybersecurity Capability Development: Evidence from a Simulation Game Experiment. Journal of Strategic Information Systems. 2018;Abstract

We developed a simulation game to study the effectiveness of decision-makers in overcoming two complexities in building cybersecurity capabilities: potential delays in capability development; and uncertainties in predicting cyber incidents. Analyzing 1479 simulation runs, we compared the performances of a group of experienced professionals with those of an inexperienced control group. Experienced subjects did not understand the mechanisms of delays any better than inexperienced subjects; however, experienced subjects were better able to learn the need for proactive decision-making through an iterative process. Both groups exhibited similar errors when dealing with the uncertainty of cyber incidents. Our findings highlight the importance of training for decision-makers with a focus on systems thinking skills, and lay the groundwork for future research on uncovering mental biases about the complexities of cybersecurity.

decision-making in cybersecurity.pdf
EARS to Cyber Incidents in Health Care
Jalali M, Russell B, Razak S, Gordon W. EARS to Cyber Incidents in Health Care. Journal of the American Medical Informatics Association. 2018;:1-10. Abstract

Background: Connected medical devices and electronic health records have added important functionality to patient care, but have also introduced a range of cybersecurity concerns. When a healthcare organization suffers from a cybersecurity incident, its incident response strategies are critical to the success of its recovery.

Objective: In this article, we identify gaps in research concerning cybersecurity response plans in healthcare. Through a systematic literature review, we develop aggregated strategies that professionals can use to construct better response strategies in their organizations.

Methods: We reviewed journal articles on cyber incident response plans in healthcare published in PubMed and Web of Science. We sought to collect articles on the intersection of cybersecurity and healthcare that focused on incident response strategies.​

​​​​​​Results: We identified and reviewed 13 articles for cybersecurity response recommendations. We then extracted information such as research methods, findings, and implications. Finally, we synthesized the recommendations into a framework of eight aggregated response strategies (EARS) that fall under managerial and technological categories.

Conclusions: We conducted a systematic review of the literature on cybersecurity response plans in healthcare and developed a novel framework for response strategies that could be deployed by healthcare organizations. More work is needed to evaluate incident response strategies in healthcare.

EARS Framework.pdf
Minimization of Drug Shortages in Pharmaceutical Supply Chains: A Simulation-Based Analysis of Drug Recall Patterns and Inventory Policies
Azghandi R, Griffin J, Jalali MS. Minimization of Drug Shortages in Pharmaceutical Supply Chains: A Simulation-Based Analysis of Drug Recall Patterns and Inventory Policies. Complexity. 2018;:1-14. Abstract

The drug shortage crisis in the last decade not only increased health care costs but also jeopardized patients’ health across the United States. Ensuring that any drug is available to patients at health care centers is a problem that official health care administrators and other stakeholders of supply chains continue to face. Furthermore, managing pharmaceutical supply chains is very complex, as inevitable disruptions occur in these supply chains (exogenous factors), which are then followed by decisions members make after such disruptions (internal factors). Disruptions may occur due to increased demand, a product recall, or a manufacturer disruption, among which product recalls—which happens frequently in pharmaceutical supply chains—are least studied. We employ a mathematical simulation model to examine the effects of product recalls considering different disruption profiles, e.g., the propagation in time and space, and the interactions of decision makers on drug shortages to ascertain how these shortages can be mitigated by changing inventory policy decisions. We also measure the effects of different policy approaches on supply chain disruptions, using two performance measures: inventory levels and shortages of products at health care centers. We then analyze the results using an approach similar to data envelopment analysis to characterize the efficient frontier (best inventory policies) for varying cost ratios of the two performance measures as they correspond to the different disruption patterns. This analysis provides insights into the consequences of choosing an inappropriate inventory policy when disruptions take place.

Drug Shortage.pdf
Model-Based Policy Analysis to Mitigate Post-Traumatic Stress Disorder
Ghaffarzadegan N, Larson RC, Fingerhut H, Jalali MS, Ebrahimvandi A, Quaadgras A, et al. Model-Based Policy Analysis to Mitigate Post-Traumatic Stress Disorder. In: Policy Analytics, Modelling, and Informatics. Springer; 2018. p. 387-406.Abstract

A wide range of modeling methods have been used to inform health policies. In this chapter, we describe three models for understanding the complexities of post-traumatic stress disorder (PTSD), a major mental disorder. The models are: (1) a qualitative model describing the social and psychological complexities of PTSD treatment; (2) a system dynamics model of a population of PTSD patients in the military and the Department of Veterans Affairs (VA); and (3) a Monte Carlo simulation model of PTSD prevalence and clinical demand over time among the OEF/OIF population. These models have two characteristics in common. First, they take systems approaches. In all models, we set a large boundary and look at the whole system, incorporating both military personnel and veterans. Second, the models are informed by a wide range of qualitative and quantitative data. Model I is rooted in qualitative data, and models II and III are calibrated to several data sources. These models are used to analyze the effects of different policy alternatives, such as more screening, more resiliency, and better recruitment procedures, on PTSD prevalence. They also provide analysis of healthcare costs in the military and the VA for each policy. Overall, the developed models offer examples of modeling techniques that incorporate a wide range of data sources and inform policy makers in developing programs for mitigating PTSD, a major premise of policy informatics.

PTSD modeling_book chapter.pdf
Modeling and Estimating the Feedback Mechanisms among Depression, Rumination, and Stressors in Adolescents
Hosseinichimeh N, Wittenborn AK, Rick J, Jalali MS, Rahmandad H. Modeling and Estimating the Feedback Mechanisms among Depression, Rumination, and Stressors in Adolescents. PLOS ONE. 2018;13 (9) :e0204389. Abstract

The systemic interactions among depressive symptoms, rumination, and stress are important to understanding depression but have not yet been quantified. In this article, we present a system dynamics simulation model of depression that captures the reciprocal relationships among stressors, rumination, and depression. Building on the response styles theory, this model formalizes three interdependent mechanisms: 1) Rumination contributes to ‘keeping stressors alive’; 2) Rumination has a direct impact on depressive symptoms; and 3) Both ‘stressors kept alive’ and current depressive symptoms contribute to rumination. The strength of these mechanisms is estimated using data from 661 adolescents (353 girls and 308 boys) from two middle schools (grades 6–8). These estimates indicate that rumination contributes to depression by keeping stressors ‘alive’—and the individual activated—even after the stressor has ended. This mechanism is stronger among girls than boys, increasing their vulnerability to a rumination reinforcing loop. Different profiles of depression emerge over time depending on initial levels of depressive symptoms, rumination, and stressors as well as the occurrence rate for stressors; levels of rumination and occurrence of stressors are stronger contributors to long-term depression. Our systems model is a steppingstone towards a more comprehensive understanding of depression in which reinforcing feedback mechanisms play a significant role. Future research is needed to expand this simulation model to incorporate other drivers of depression and provide a more holistic tool for studying depression.

Modeling depression.pdf
2017
Dynamics of Implementation and Maintenance of Organizational Health Interventions
Jalali MS, Rahmandad H, Bullock SL, Ammerman A. Dynamics of Implementation and Maintenance of Organizational Health Interventions. Int. J. Environ. Res. Public Health. 2017;14 :917. Abstract

In this study, we present case studies to explore the dynamics of implementation and maintenance of health interventions. We analyze how specific interventions are built and eroded, how the building and erosion mechanisms are interconnected, and why we can see significantly different erosion rates across otherwise similar organizations. We use multiple comparative obesity prevention case studies to provide empirical information on the mechanisms of interest, and use qualitative systems modeling to integrate our evolving understanding into an internally consistent and transparent theory of the phenomenon. Our preliminary results identify reinforcing feedback mechanisms, including design of organizational processes, motivation of stakeholders, and communication among stakeholders, which influence implementation and maintenance of intervention components. Over time, these feedback mechanisms may drive a wedge between otherwise similar organizations, leading to distinct configurations of implementation and maintenance processes. 

Dynamics of implementation.pdf
The Effects of Teams’ Initial Characterizations of Interactions on Product Development Performance
Jafari Songhori M, Jalali MS, Terano T. The Effects of Teams’ Initial Characterizations of Interactions on Product Development Performance. Winter Simulation Conference. 2017;
A Flexible Method for Aggregation of Prior Statistical Findings
Rahmandad H, Jalali MS, Paynabar K. A Flexible Method for Aggregation of Prior Statistical Findings. PLOS ONE. 2017;12 :e0175111. Abstract

Rapid growth in scientific output requires methods for quantitative synthesis of prior research, yet current meta-analysis methods limit aggregation to studies with similar designs. Here we describe and validate Generalized Model Aggregation (GMA), which allows researchers to combine prior estimated models of a phenomenon into a quantitative meta-model, while imposing few restrictions on the structure of prior models or on the meta-model. In an empirical validation, building on 27 published equations from 16 studies, GMA provides a predictive equation for Basal Metabolic Rate that outperforms existing models, identifies novel nonlinearities, and estimates biases in various measurement methods. Additional numerical examples demonstrate the ability of GMA to obtain unbiased estimates from potentially mis-specified prior studies. Thus, in various domains, GMA can leverage previous findings to compare alternative theories, advance new models, and assess the reliability of prior studies, extending meta-analysis toolbox to many new problems.

GMA.pdf
How Exposure to Different Opinions Impacts the Life Cycle of Social Media
Rad AA, Jalali MS, Rahmandad H. How Exposure to Different Opinions Impacts the Life Cycle of Social Media. Annals of Operations Research. 2017;268 :63–91. Abstract

As a lot of communication and media consumption moves online, people may be exposed to a wider population and more diverse opinions. However, individuals may act differently when faced with opinions far removed from their own. Moreover, changes in the frequency of visits, posting, and other forms of expression could lead to narrowing of the opinions that each person observes, as well as changes in the customer base for online platforms. Despite increasing research on the rise and fall of online social media outlets, user activity in response to exposure to others’ opinions has received little attention. In this study, we first introduce a method that maps opinions of individuals and their generated content on a multi-dimensional space by factorizing an individual–object interaction (e.g., user-news rating) matrix. Using data on 6151 users interacting with 287,327 pieces of content over 21 months on a social media platform we estimate changes in individuals’ activities in response to interaction with content expressing a variety of opinions. We find that individuals increase their online activities when interacting with content close to their own opinions, and interacting with extreme opinions may decrease their activities. Finally, developing an agent-based simulation model, we study the effect of the estimated mechanisms on the future success of a simulated platform.

Exposure to different opinions.pdf
Measuring Stakeholders’ Perceptions of Cybersecurity for Renewable Energy Systems
Madnick S, Jalali MS, Siegel M, Lee Y, Strong D, Wang R, et al. Measuring Stakeholders’ Perceptions of Cybersecurity for Renewable Energy Systems. In: Lecture Notes in Artificial Intelligence 10097. Springer; 2017. p. 67–77.
2016
A Dynamic Model of Post-Traumatic Stress Disorder for Military Personnel and Veterans
Ghaffarzadegan N, Ebrahimvandi A, Jalali MS. A Dynamic Model of Post-Traumatic Stress Disorder for Military Personnel and Veterans. PLOS ONE. 2016;11 :e0161405. Abstract

Post-traumatic stress disorder (PTSD) stands out as a major mental illness; however, little is known about effective policies for mitigating the problem. The importance and complexity of PTSD raise critical questions: What are the trends in the population of PTSD patients among military personnel and veterans in the postwar era? What policies can help mitigate PTSD? To address these questions, we developed a system dynamics simulation model of the population of military personnel and veterans affected by PTSD. The model includes both military personnel and veterans in a “system of systems.” This is a novel aspect of our model, since many policies implemented at the military level will potentially influence (and may have side effects on) veterans and the Department of Veterans Affairs. The model is first validated by replicating the historical data on PTSD prevalence among military personnel and veterans from 2000 to 2014 (datasets from the Department of Defense, the Institute of Medicine, the Department of Veterans Affairs, and other sources). The model is then used for health policy analysis. Our results show that, in an optimistic scenario based on the status quo of deployment to intense/combat zones, estimated PTSD prevalence among veterans will be at least 10% during the next decade. The model postulates that during wars, resiliency-related policies are the most effective for decreasing PTSD. In a postwar period, current health policy interventions (e.g., screening and treatment) have marginal effects on mitigating the problem of PTSD, that is, the current screening and treatment policies must be revolutionized to have any noticeable effect. Furthermore, the simulation results show that it takes a long time, on the order of 40 years, to mitigate the psychiatric consequences of a war. Policy and financial implications of the findings are discussed.

A dynamic model for PTSD.pdf
Estimating the parameters of system dynamics models using indirect inference
Hosseinichimeh N, Rahmandad H, Jalali MS, Wittenborn AK. Estimating the parameters of system dynamics models using indirect inference. System Dynamics Review. 2016;32 :156-180. Abstract

There is limited methodological guidance for estimating system dynamics (SD) models using datasets common to social sciences that include few data points over time for many units under analysis. Here, we introduce indirect inference, a simulation‐based estimation method that can be applied to common datasets and is applicable to SD models that often include intractable likelihood functions. In this method, the model parameters are found by ensuring that simulated data from the model and available empirical data produce similar auxiliary statistics. The method requires few assumptions about the structure of the model and error‐generating processes and thus can be used in a variety of applications. We demonstrate the method in estimating an SD model of depression and rumination using a panel dataset. The overall results suggest that indirect inference can extend the application of SD models to new topics and leverage common panel datasets to provide unique insights.

Parameter estimation using indirect inference.pdf
Preventive behaviors and perceptions of influenza vaccination among a university student population
Hashmi S, D’Ambrosio L, Diamond DV, Jalali MS, Finkelstein SN, Larson RC. Preventive behaviors and perceptions of influenza vaccination among a university student population. Journal of Public Health. 2016;38 (4) :739–745. Abstract

Background: Every year during influenza season, preventable illnesses occur due to lack of vaccination and failure to adopt the preventive behaviors known as non-pharmaceutical interventions (NPIs). In an effort to study the impact of preventive strategies and policies on behavioral changes during the spread of the H1N1 pandemic in 2009, we examined a sample of undergraduate, graduate and business students at the Massachusetts Institute of Technology (MIT).

Methods: An online survey was completed by 653 students to assess NPI use, perceptions of influenza vaccinations and effectiveness of preventive health policy strategies during the 2009 H1N1 outbreak. Strategies included e-mails and text messages, posters in corridors and restrooms, and videos. These strategies were implemented during both the first and second waves of the 2009 H1N1 pandemic.

Results: Despite the widespread campaign, fewer than half of the respondents reported modifying their behaviors. We discovered that >70% of the respondents did not practice any NPIs, and more than half showed lack of knowledge of flu vaccinations.

Conclusions: Our study results indicate a need for more effective strategies to encourage NPI practices in student populations during outbreaks of infection.

Preventive behaviors and perceptions of vaccination.pdf
Social influence in childhood obesity interventions: a systematic review
Jalali MS, Sharafi‐Avarzaman Z, Rahmandad H, Ammerman AS. Social influence in childhood obesity interventions: a systematic review. Obesity Reviews. 2016;17 :820-832. Abstract

The objective of this study is to understand the pathways through which social influence at the family level moderates the impact of childhood obesity interventions. We conducted a systematic review of obesity interventions in which parents' behaviours are targeted to change children's obesity outcomes, because of the potential social and environmental influence of parents on the nutrition and physical activity behaviours of children. PubMed (1966-2013) and the Web of Science (1900-2013) were searched, and 32 studies satisfied our inclusion criteria. Results for existing mechanisms that moderate parents' influence on children's behaviour are discussed, and a causal pathway diagram is developed to map out social influence mechanisms that affect childhood obesity. We provide health professionals and researchers with recommendations for leveraging family-based social influence mechanisms to increase the efficacy of obesity intervention programmes.

social influence in childhood obesity interventions.pdf

Pages