Search Results

Accessing the Power of Aesthetics in Human-computer Interaction
In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency characteristics, are critical concerns of designers. This view contends that visual design enhances system use. Thus, this work examines the effects of visual design on computer systems. Visual design exerts its influence on systems through two mechanisms: it evokes affective responses from IT users, such as arousal and pleasure and it influences individuals’ cognitive assessments of systems. Given that both affective and cognitive reactions are significant antecedents of user behaviors in the IT realm, it is no surprise that visual design plays a critical role in information system success. Human-computer-interaction literature indicates that visual aesthetics positively influences such information success factors as usability, online trust, user satisfaction, flow experience, and so on. Although academic research has introduced visual design into the Information Systems (IS) field and validated its effects, visual design is still very limited in three contexts: product aesthetics in e-commerce, mobile applications and commercial emails. This dissertation presents three studies to help fill these theoretical gaps respectively.
An Analysis of the Effect of Environmental and Systems Complexity on Information Systems Failures
Companies have invested large amounts of money on information systems development. Unfortunately, not all information systems developments are successful. Software project failure is frequent and lamentable. Surveys and statistical analysis results underscore the severity and scope of software project failure. Limited research relates software structure to information systems failures. Systematic study of failure provides insights into the causes of IS failure. More importantly, it contributes to better monitoring and control of projects and enhancing the likelihood of the success of management information systems. The underlining theories and literature that contribute to the construction of theoretical framework come from general systems theory, complexity theory, and failure studies. One hundred COBOL programs from a single company are used in the analysis. The program log clearly documents the date, time, and the reasons for changes to the programs. In this study the relationships among the variables of business requirements change, software complexity, program size and the error rate in each phase of software development life cycle are tested. Interpretations of the hypotheses testing are provided as well. The data shows that analysis error and design error occur more often than programming error. Measurement criteria need to be developed at each stage of the software development cycle, especially in the early stage. The quality and reliability of software can be improved continuously. The findings from this study suggest that it is imperative to develop an adaptive system that can cope with the changes to the business environment. Further, management needs to focus on processes that improve the quality of the system design stage.
Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information
The objective of this research is the investigation of the patterns of information growth to test whether there has been an "information explosion." To tackle the main problem, there are three issues which need to be addressed: (1) the concept of information dimensionality; (2) determination of common parameters to measure the amount of information within each dimension; and (3) a working definition of "explosiveness. "
Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment
Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of BI capabilities on BI success, in the presence of different decision environments. The decision environment is a composition of the decision types and the way the required information is processed to aid in decision making. BI capabilities are defined as critical functionalities that help an organization improve its performance, and they are examined in terms of organizational and technological capabilities. An online survey is used to obtain the data and partial least squares path modeling (PLS) is used for analysis. The results of this dissertation suggest that all technological capabilities as well as one of the organizational capabilities, flexibility, significantly impact BI success. Results also indicate that the moderating effect of decision environment is significant for quantitative data quality. These findings provide richer insight in the role of the decision environment in BI success and a framework with which future research on the relationship between BI capabilities and BI success can be conducted. Findings may also contribute to practice by presenting information for managers and users of BI to consider about their decision environment in assessing BI success.
Business/it Alignment: the Impact of Incentive Plans on the Development of Shared Vision
This study, utilizing Preston and Karahanna’s framework for shared vision development and Agency Theory, explores the impact of vision development factors and factors associated with incentive plans on shared vision and alignment. Results of the study confirm the strong relationship between shared vision and alignment, and indicate that having an effective management team is important with respect to developing and maintaining shared vision and alignment within the organization. Several vision development factors such as using the language of the business, participation on the top management team (TMT), and having knowledge of the business impact shared vision through their influence on teamwork. Also, results of this study suggest that participation on the TMT by the CIO/IT leader is more important than the individual’s position in the organizational hierarchy. In addition, attributes associated with incentive plans such as achievable and clear measures, measures linked to organizational goals, measures that align the interests of the individual with those of the organization, regular plan reviews, and using a balanced scorecard approach with respect to incentive plan design positively impact teamwork and shared vision. For practitioners, this highlights the importance of incentive plans as powerful tools that can be used to reinforce shared vision, effective teamwork, and alignment within the organization. Also, the CIO/IT leader needs to be knowledgeable of the business and must fill the role of both a technologist as well as an enterprise leader. This person must be an evangelist communicating the value and benefits of IT to the rest of the organization.
A Case Study of an Information System Developed to Generate Competitive Advantage
The purpose of this study was to examine the effect of information technology (IT) on the competitive position of a firm. The problem motivating this study is the potential for misallocation of scarce resources on new technology without realizing the level of competitive advantage (CA) expected. This study was a single-site case study. It examined the factors related to the selection, design, development, implementation, use, and effects of an information system (IS) intended to generate CA. The study examined all these factors within the organizational and industrial contexts of the subject firm.
A Case Study of the Use of Activity-Based Analysis as an Information Resource Management Tool
The purpose of the study was to investigate a modification of a managerial accounting technique, Activity-Based Costing (ABC), as a tool for addressing Information Resource Management (IRM) concerns within business processes. To indicate that ABC has been adapted for the IRM context, this study called the tool "Activity-Based Analysis" (ABA). ABA includes ABC's costing methodology as well as additional methods to address broader issues. The research method was a single-site case study at a property and casualty insurance company. The unit of analysis was a business process consisting of activities needed to provide claims handling services for workers' compensation insurance. Four questions guided the study: 1. Did ABA identify management information required to monitor process effectiveness and efficiency? 2. Did ABA support outsourcing decision making by identifying IRM cost components within business processes? 3. Did ABA identify information resources; that are sharable? 4. Did ABA identify differences between Company organizational characteristics andIRM department organizational characteristics?
Client/Server Systems Performance Evaluation Measures Use and Importance: a Multi-Site Case Study of Traditional Performance Measures Applied to the Client/Server Environment
This study examines the role of traditional computing performance measures when used in a client/server system (C/SS) environment. It also evaluates the effectiveness of traditional computing measures of mainframe systems for use in C/SS. The underlying problem was the lack of knowledge about how performance measures are aligned with key business goals and strategies. This research study has identified and evaluated client/server performance measurements' importance in establishing an effective performance evaluation system. More specifically, this research enables an organization to do the following: (1) compare the relative states of development or importance of performance measures, (2) identify performance measures with the highest priority for future development, (3) contrast the views of different organizations regarding the current or desired states of development or relative importance of these performance measures.
Communication Quality in Information Systems Development: The Effect of Computer-Mediated Communication on Task-Oriented Problem Solving
The problem motivating this research is that ineffective communication may hamper systems development efforts. Specifically germane to this study are development efforts characterized as task-oriented, and which require information-sharing and problem-solving activities. This research problem motivated an analysis of the communication process and lead to the development of a temporal framework that delineates variables associated with task-oriented, end user/systems analyst communication interactions. Several variables within this framework are depicted in two theoretical models. The first model shows the theoretical relationship between an independent variable, communication mode (represented by asynchronous computer conferencing and face-to-face conferencing), and five dependent variables: (1) the amount of information shared, (2) the significance of the information shared, (3) the comprehensiveness of the information shared, (4) the perception of progress toward the goal, and (5) the perception of freedom to participate. The second model depicts the assumed interaction between communication mode, the five variables cited above (now acting as independent variables), and a dependent variable, communication quality. There are two theoretical components of communication quality: (1) deviation from an optimal set of user requirements, and (2) the degree of convergence (unity based on mutual understanding and mutual agreement) emanating from a communication interaction. Using the theoretical models as a guide, an experiment was designed and performed to test the relationships among the variables. The experimental results led to the rejection of all null hypotheses; the results strongly favored face-to-face conferencing for solving task-oriented, information-sharing problems analagous to the case used in the present study. The findings indicate that asynchronous computer conferencing may have a detrimental effect on the thoroughness of information exchange, on the relevance of the information shared in terms of making the correct decision, and on the completeness of the consideration given to all problem dimensions.
Comparisons of Neural Networks, Shewhart ‾x, and CUSUM Control Charts Under the Condition of Nonnormality
In this study, neural networks are developed under conditions of nonnormality as alternatives to standard control charts, and their performance is compared with those of standard ‾x and CUSUM control charts.
Computer-Supported Collaborative Work and Its Application to Software Engineering in a Case Environment
This study investigated, in the context of a field-based case study, possibilities for formation of a synergistic union between CSCW and CASE tools. A major dimension of today's software challenge is in gearing up for large-scale system development necessitating large teams of systems engineers. The principal goal of this research was to advance the body of knowledge regarding the nature of collaborative technological support in the software development process. Specifically, the study was designed to evaluate the potential for using a CSCW tool as an effective front-end to a CASE tool in the furtherance of SDLC goals.
Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications
The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the consequences of mind wandering in a technological setting is imperative because mind wandering plays a vital role in influencing various outcomes associated with technology use and/or technology learning, such as technology anxiety, software self-efficacy, and task performance. This dissertation is composed of three essays which examine the determinants and consequences of mind wandering and focus of attention on a number of emotional and cognitive outcomes. A multi-method approach (i.e., online survey and laboratory experiment) across three essays is used to test the research models. Essay 1 focuses on developing the measurement items and estimating the impact of mind wandering on users' emotional outcomes (i.e., technology anxiety and users' satisfaction). Drawing upon the content regulation hypothesis of mind wandering, the content of thoughts are differentiated into two categories—technology-related thought (herein IT) and non-technology related thought (herein non-IT). The results show that whereas mind wandering (non-IT) is a major determinant of technology anxiety, focus of attention (IT) is the main predictor of users' satisfaction. Essay 2 focuses on the effect of mind wandering and focus of attention in the IS learning context. The study begins by exploring the hypotheses concerning the roles of executive functions (i.e., inhibition, switching, and working memory) and task complexity in influencing the occurrence of mind wandering and focus of attention, and in turn, cognitive outcomes (i.e., software self-efficacy and …
Critical Success Factors in Data Mining Projects.
The increasing awareness of data mining technology, along with the attendant increase in the capturing, warehousing, and utilization of historical data to support evidence-based decision making, is leading many organizations to recognize that the effective use of data is the key element in the next generation of client-server enterprise information technology. The concept of data mining is gaining acceptance in business as a means of seeking higher profits and lower costs. To deploy data mining projects successfully, organizations need to know the key factors for successful data mining. Implementing emerging information systems (IS) can be risky if the critical success factors (CSFs) have been researched insufficiently or documented inadequately. While numerous studies have listed the advantages and described the data mining process, there is little research on the success factors of data mining. This dissertation identifies CSFs in data mining projects. Chapter 1 introduces the history of the data mining process and states the problems, purposes, and significances of this dissertation. Chapter 2 reviews the literature, discusses general concepts of data mining and data mining project contexts, and reviews general concepts of CSF methodologies. It also describes the identification process for the various CSFs used to develop the research framework. Chapter 3 describes the research framework and methodology, detailing how the CSFs were identified and validated from more than 1,300 articles published on data mining and related topics. The validated CSFs, organized into a research framework using 7 factors, generate the research questions and hypotheses. Chapter 4 presents analysis and results, along with the chain of evidence for each research question, the quantitative instrument and survey results. In addition, it discusses how the data were collected and analyzed to answer the research questions. Chapter 5 concludes with a summary of the findings, describing assumptions and limitations and suggesting future research.
Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance
Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual decision makers, in different decision contexts, determine when to stop collecting information given the availability of virtually unlimited information. Decision makers must make an ultimate decision, but also must make a decision that he or she has enough information to make the final decision (Browne, Pitts, & Wetherbe, 2007). In determining how much information to collect, researchers found that people engage in ‘satisficing' in order to make decisions, particularly when there is more information than it is possible to manage (Simon, 1957). A more recent elucidation of information use relies on the idea of stopping rules, identifying five common stopping rules information seekers use: mental list, representational stability, difference threshold, magnitude threshold, and single criterion (Browne et al., 2007). Prior research indicates a lack of understanding in the areas of information use (Prabha, Connaway, Olszewski, & Jenkins, 2007) and information overload (Eppler & Mengis, 2004) in Information Systems literature. Moreover, research indicates a lack of clarity in what information should be used in different decision contexts (Kowalczyk & Buxmann, 2014). The increase in the availability of information further complicates and necessitates research in this area. This dissertation seeks to fill these gaps in the literature by determining how information use changes across decision contexts and the relationships between stopping rules. Two unique methodologies were used to test the hypotheses in the conceptual …
Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness
The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera, 2003). The little empirical research that has been conducted in this area has shown that information security management in many organizations is poor (Baskerville, 1993; Shimeall & McDermott, 1999). Several researchers have identified the need for methods to measure the organization-wide information security posture of organizations (Eloff & Von Solms, 2000; James, 1996). This dissertation attempts to measure the organization-wide information security posture by examining benchmark variables that assess role, planning orientation, and performance structure within the organization. Through this conceptualization of an organization's information security posture, a means is presented to measure overall information security and how it impacts the effective utilization of information security strategies. The presence of the dependent variable, effectiveness, gives academics and practitioners a success measure which can guide more effective decision making in the information security domain. An additional aim of this dissertation is to empirically examine the influence of management practices and decisions on effective use of information security strategies within the organization. The issues of centralization versus decentralization of information security activities will be evaluated along with its impact on information security posture of organizations and the effectiveness of the organization's information security strategies. Data was collected from 119 IT and information security executives. Results show that how the organization structures information security activities is not correlated with more effective utilization of information security strategies. Meanwhile, the organization's information security posture …
Design for Social Presence and Exploring Its Mediating Effect in Mobile Data Communication Services
The mobility, flexibility, convenience, and ubiquity of mobile data services (MDS) have contributed to their enormous growth and popularity with users. MDS allow users to communicate through mobile texting (mTexting), mobile Instant Messaging (mIM), multimedia messaging services (MMS), and email. A unique feature of MDS that enhances its popularity among its users is the awareness capability, which is revolutionizing the way MDS is being used to communicate today. It allows potential communication partners to socialize through these technologies. This dissertation explored the relationship between user experience, perceived richness, perceived social presence and satisfaction with MDS. A research model for examining the antecedent conditions that influence social presence, richness, social interaction and satisfaction with MDS was developed. Partial least square analysis showed that user experience influenced both social presence and richness. Also supported was the relationship between richness, social presence and satisfaction with MDS. Social presence mediated the relationship between user experience and richness. However, only one dimension of interactivity influenced social presence.
A Discrimination of Software Implementation Success Criteria
Software implementation projects struggle with the delicate balance of low cost, on-time delivery and quality. The methodologies and processes used to create and maintain a quality software system are expensive to deploy and result in long development cycle-time. However, without their deployment into the software implementation life-cycle, a software system will be undependable, unsuccessful. The purpose of this research is to identify a succinct set of software implementation success criteria and assess the key independent constructs, activities, carried out to ensure a successful implementation project. The research will assess the success of a software implementation project as the dependent construct of interest and use the software process model (methodology) as the independent construct. This field research involved three phases: (1) criteria development, (2) data collection, and (3) testing of hypotheses and discriminant analysis. The first phase resulted in the development of the measurement instruments for the independent and dependent constructs. The measurement instrument for the independent construct was representative of the criteria from highly regarded software implementation process models and methodologies, e.g., ISO9000, Software Engineering Institute's Capability Maturity Model (SEI CMM). The dependent construct was developed from the categories and criteria from the Delone and McLean (1992) MIS List of Success Measures. The data collection and assessment phase employed a field survey research strategy to 80 companies involved in internal software implementation. Both successful and unsuccessful software implementation projects (identified by the Delone/McLean model) participated. Results from 165 projects were collected, 28 unsuccessful and 137 successful. The third phase used ANOVA to test the first 11 hypotheses and employed discriminant analysis for the 12th hypothesis to identify the "best set" of variables, criteria, that discriminate between successful and unsuccessful software implementation projects. Twelve discriminating variables out of 67 were identified and supported as significant discriminators between successful and unsuccessful projects. …
Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals
Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), which allows employees to connect their personal devices to corporate networks. BYOD is identified as one of the top ten technology trends in 2014 that can multiply the size of mobile workforce in organizations. However, it can also serve as a vehicle that transfers cyber security threats associated with personal mobile devices to the organizations. As BYOD opens the floodgates of various device types and platforms into organizations, identifying different sources of cyber security threats becomes indispensable. So far, there are no studies that investigated how user, device and usage characteristics affect individuals’ protective and risky IT behaviors. The goal of this dissertation is to expand the current literature in IS security by accounting for the roles of user, device, and usage characteristics in protective and risky IT behaviors of individuals. In this study, we extend the protection motivation theory by conceptualizing and measuring the risky IT behaviors of individuals and investigating how user, device, and usage characteristics along with the traditional protection motivation factors, influence individuals’ protective and risky IT behaviors. We collected data using an online survey. The results of our study show that individuals tend to engage in different levels of protective and risky IT behaviors on different types of devices. We also found that certain individual characteristics as well as the variety of applications that individuals use on their …
The Effect of It Process Support, Process Visualization and Process Characteristics on Process Outcomes
Business process re-engineering (part of the Business Process Management domain) is among the top three concerns of Information Technology (IT) leaders and is deemed to be one of many important IT leveraging opportunities. Two major challenges have been identified in relation to BPM and the use of IT. The first challenge is related to involving business process participants in process improvement initiatives using BPM systems. BPM technologies are considered to be primarily targeted for developers and not BPM users, and the need to engage process participants into process improvement initiatives is not addressed, contributing to the business-IT gap. The second challenge is related to potential de-skilling of knowledge workers when knowledge-intensive processes are automated and process knowledge resides in IT, rather than human process participants. The two identified challenges are not separate issues. Process participants need to be knowledgeable about the process in order to actively contribute to BPM initiatives, and the loss of process knowledge as a result of passive use of automated systems may further threaten their participation in process improvement. In response to the call for more research on the individual impacts of business process initiatives, the purpose of this dissertation study is to understand the relationship between IT configurations (particularly process support and process visualization), process characteristics and individual level process outcomes, such as task performance and process knowledge. In the development of the research model we rely on organizational knowledge creation literature and scaffolding in Vygotsky’s Zone of Proximal Development, business process modeling and workflow automation research, as well as research on the influence of IT on individual performance. The theoretical model is tested empirically in experimental settings using a series of two studies. In both studies participants were asked to complete tasks as part of a business process using different versions of a mock-up …
The Effects of Alternative Presentation Formats on Biases and Heuristics in Human Decision Making
The purpose of this research was to determine whether changes in the presentation format of items in a computer display could be used to alter the impact of specific cognitive biases, and to add to the knowledge needed to construct theory-based guidelines for output design. The problem motivating this study is twofold. The first part of the problem is the sub-optimal decision making caused by the use of heuristics and their associated cognitive biases. The second part of the problem is the lack of a theoretical basis to guide the design of information presentation formats to counter the effects of such biases. An availability model of the impact of changes in presentation format on biases and heuristics was constructed based on the findings of a literature review. A six-part laboratory experiment was conducted utilizing a sample of 205 student subjects from the college of business. The independent variable was presentation format which was manipulated by altering the visual salience or visual recency of items of information in a visual computer display. The dependent variables included recall, perceived importance, and the subjects' responses to three judgment tasks. The results clearly demonstrate that changes in presentation format can be used to alter the impact of cognitive biases on human decision making. The results also provide support for the availability model, with the exception of the proposed influence of learning style. Learning style was found to have no significant impact on decision making whether alone or in combination with changes in presentation format. The results of this investigation demonstrate that by using our knowledge of cognitive processes (e.g., the visual salience effect, the visual recency effect, and the availability heuristic), presentation formats can be altered in order to moderate the effects of certain biases and heuristics in human decision making. An understanding of …
The Effects of Using Information Technology to Support Evaluation of Feedback and Implementation of Adjustments in an Organization's Strategic Planning Process
Organizations that must respond quickly to environmental pressures look for tools to assist in that response. Information technology may be one tool to facilitate the response. In this study the possible effects of using information technology, specifically a decision support system, in the feedback segment of one organization's strategic management loop were examined. The organization was one region of the Board of Probation and Parole in a central state. Personnel included administrators, parole officers and clerical workers. The information technology was an off-the-shelf software product called PlanRight. This study is significant for two reasons: a new application for information technology was examined and the adequacy of a generic computerized tool designed to be suitable for various operations was explored. This study was a case study. Two months of data were taken prior to the implementation of the decision support system, and four months of data were taken after the system was implemented. Questionnaire data taken before system implementation provided descriptive characteristics of the organization. Follow-up surveys and interviews at the conclusion of the study were used to evaluate employee perceptions. The study was done in three phases. During phase one questionnaires were distributed and returned. During phase two, goals, plans and evaluation criteria were formulated and plans were implemented. Feedback was obtained and evaluated through the use of the decision support system enabling reaction to the feedback data. In phase three perceptions of administrators and parole officers were elicited using follow-up surveys and semi-structured interviews. Three propositions guided the evaluation of the study's outcomes. These propositions dealt with performance toward goal achievement, satisfaction with feedback processes and quality of plans formulated for the project. Performance was moderately successful. Satisfaction with processes was high. Speed of obtaining feedback was considered high by administrators and paroled officers. Quality of processes and outcomes …
An Empirical Investigation of Detail Design Tools and Cognitive Style of Software Developers
The purpose of this study is to identify what detail design tools are more productive for the different types of professional software developers. By establishing a match between the detail design tool and the cognitive style of the professional programmer, the end product (Information Systems) should be of a higher quality. Two laboratory experiments were conducted. The first experiment was with professional Software Developers; the second one was with students. The dependant variables considered in this study were the number of semantic errors and the time required to complete a design task for conditional logic. The independent variables were the cognitive style of the subject, the complexity of the task, and the detail design tools. Decision trees, flowcharts and pseudocode were used as detailed design tools. Field dependence was the only dimension of cognitive style that was tested.
An Empirical Investigation of Psychophysiological Characteristics and Psychological Variables in Information Systems Human Factors Research
The purpose of this study was to test the comparability of several psychological instruments commonly used in Information Systems (IS) cognitive style research. The objective was to determine the limitations of: existing instruments in IS cognitive style research. The motivation for this research was the inconclusive findings reported in IS human information processing research. The study used a repeated measures design. Each individual completed the following cognitive style and personality instruments; the Myers-Briggs Type Indicator, the Group Embedded-figures Test, the Learning Style Inventory, the Human Information Processing Survey, and the Torrance Tests of Creative Thinking (Figural Form A). The individual also completed a dichotic listening and tachistoscope task. Data was collected from business administration, BCIS, liberal arts majors, and IS professionals. The results of this study indicate IS researchers need to consider several factors in the use of these instruments. A direct relationship exists between cognitive ability and results on the GEFT. Cognitive ability should be considered a moderating variable in interpreting the results of the GEFT. Also, the hypothesis that the GEFT is a surrogate for analytical and low-analytical abilities is not supported by this study. Other reported results include the inappropriateness of using the TTCT with adult populations. Also, the MBTI appears to be an appropriate instrument for measuring cognitive styles in IS research. This study reported that gender is a moderating factor on the classification of MBTI types in that gender is not evenly divided among feeling and thinking types. This study reported no relationships between the cognitive style and personality instruments with the physiological measurements. The validity of the physiological measurements could be the underlying factor for not reporting any significant relationships. IS researchers will benefit from this study through an improved understanding of the appropriateness and applicability of these instruments. This benefits research through the …
An Empirical Investigation of the Effects of Individual Differences and Data Models on the Ease-of-Use of Database Query Facilties by Casual Users
The problem motivating this study is that database query facilities are not effectively meeting the needs of casual users. A solution to this problem is especially important due to the increasing number of potential casual users. There is considerable controversy revolving around the question of which elements and/or which combination of elements within the casual users' environment are necessary to provide an effective man/machine interface. The purpose of the study is to extend the basic knowledge relating to the effect of using different data models, the effect of cognitive style differences, and the interaction effects of these two independent variables on casual users' performance and confidence in writing database queries. The data models being investigated are the relational, hierarchical, and network models. The cognitive style classifications used are two of the Jungian dimensions, Sensing/Intuition and Thinking/Feeling.
Empirical Research of Decision-making Effectiveness When Using Differing Presentation Formats Under Varying Decision Tasks
The purpose of this research was to determine if presentation format, given a particular task to be performed, would affect the decision-making process of financial decision makers. The problem motivating this study is the potential for managers to make inefficient decisions when they use reports which are presented inappropriately for a given task.
Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace
Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organizations trying to reap potential benefits of enterprise social software (ESS) must successfully implement and maintain ESS tools. This research develops a framework for assessing knowledge sharing based on reciprocal determinism theory and augmented with technology acceptance, sociological, and psychological factors. Semi-structured interviews with IT professionals, followed by a written survey of employees using ESS are used to collect data. The hermeneutic circle methodology is used to analyze the interview transcripts and structural equation modeling is used to analyze the survey data. Results show technological advantage has no significant effect on the intention to share knowledge, but community cohesiveness and individual willingness significantly affect knowledge sharing intention and behavior. The study offers a synthesized model of variables affecting knowledge sharing as well as a better understanding of best practices for organizations to consider when implementing and maintaining ESS tools for employee knowledge sharing and collaboration.
An Examination of Electronic Commerce and the Internet : Role of Technology, Critical Success Factors and Business Strategy
This research employed the case study methodology to examine the issues, challenges, and project lessons learned for a large firm engaged in electronic commerce on the Internet.
An Examination of the Effect of Decision Style on the Use of a Computerized Project Management Tool
Managing a software development project presents many difficulties. Most software development projects are considered less than successful, and many are simply canceled. Ineffective project management has been cited as a major factor contributing to these failures. Project management tools can greatly assist managers in tracking and controlling their projects. However, project management tools are very structured and analytical in nature, which is not necessarily supported by decision-making styles of the managers. This research examined the influence that decision style has on a project manager's use of a project management tool.
An Experimental Investigation of Information Systems Project Escalation: An Examination of Contributory Factors in a Business Environment
The purpose of this research is to continue examining the project management process. The management of projects is complicated. It is the complexity of the process that makes a project so difficult to control. This research examines the effect of particular facets of the project manager's skill set and operating environment on management decisions.
Exploring Critical Factors in Predicting Post-Adoptive Use of Facebook
Social networking applications (SNAs) have experienced a boom in popularity in recent years. Sites like Facebook and MySpace continuously draw new users, and are successful in organizing groups of users around topics of common interest. Among SNAs, Facebook has demonstrably outgrown its rivals growing an estimated 157 percent from 2008 to 2009. Facebook is now estimated to be the fourth largest Internet site in the world, trailing only Google, Microsoft and Yahoo (Schonfeld 2009). This dissertation posits and tests a theoretical model composed of key factors that contribute to post-adoptive use of social networking applications and the relationship of those factors to one another. This study also identifies and clarifies new constructs that were not previously used to measure usage, and further refines the constructs that were previously used so that they better fit social networking applications. The results of this dissertation show that the critical factors of social capital, hedonic enjoyment, perceived usefulness, social influence, satisfaction and attitude have a positive influence on a post-adoptive user's intention to continue using Facebook. The results of this study yielded a structural model for predicting the post-adoptive use of Facebook. This work also developed an instrument for measuring constructs relevant to social networking applications.
Factors Influencing BI Data Collection Strategies: An Empirical Investigation
The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top level managers involved in developing and managing BI. Data was collected from a range of industries and organizations within the United States. An online survey was used to collect the data to empirically test the proposed relationships. Data was analyzed using partial least square path modeling (PLS). The results of this study suggest that there exists a positive relationship between institutional isomorphism and BI consistency. The results also indicate that there exists a positive relationship between BI consistency and BI comprehensive data collection strategy, and the organizational transformation attribute of BI and BI comprehensive data collection strategy. These findings provide a theoretical lens to better understand the motivators and the success factors related to collecting the huge amounts of data required for BI. This study also provides managers with a mental model on which to base decisions about the data required to accomplish their goals for BI.
Factors Influencing Post-adoptive Enterprise Resource Planning (ERP) Utilization
Organizations expend a great deal of time, effort and money on the implementation of enterprise resource planning (ERP) systems. They are considered the price of entry for large organizations to do business. Yet the success rate of ERP systems is poor. IS literature suggests that one possible reason for this is the underutilization of these systems. Existing ERP literature is replete with research to improve ERP project implementation success; however, notably absent from these streams is the research that identifies how ERP systems are utilized by individuals or organizations. This dissertation posits that increased ERP utilization can result from increased software and business process understanding gained from both formal training and experiential interventions. New dimensions of system utilization (required vs. optional) are proposed. The purpose of this dissertation is to examine how these interventions impact ERP utilization. The results of this dissertation show that while software-training interventions are important to understanding, it is the business process training interventions that seem to provide the greater effect on understanding. This increased understanding positively affects utilization scenarios where a mixture (required vs. optional) of software features and business process tasks can be leveraged by end-users. The improved understanding of post-adoptive ERP utilization gained from this study benefits both researchers and practitioners.
General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses
This research sought to shed light on information systems security (ISS) by conceptualizing an organization's use of countermeasures using general deterrence theory, positing a non-recursive relationship between threats and countermeasures, and by extending the ISS construct developed in prior research. Industry affiliation and organizational size are considered in terms of differences in threats that firms face, the different countermeasures in use by various firms, and ultimately, how a firm's ISS effectiveness is affected. Six information systems professionals were interviewed in order to develop the appropriate instruments necessary to assess the research model put forth; the final instrument was further refined by pilot testing with the intent of further clarifying the wording and layout of the instrument. Finally, the Association of Information Technology Professionals was surveyed using an online survey. The model was assessed using SmartPLS and a two-stage least squares analysis. Results indicate that a non-recursive relationship does indeed exist between threats and countermeasures and that countermeasures can be used to effectively frame an organization's use of countermeasures. Implications for practitioners include the ability to target the use of certain countermeasures to have desired effects on both ISS effectiveness and future threats. Additionally, the model put forth in this research can be used by practitioners to both assess their current ISS effectiveness as well as to prescriptively target desired levels of ISS effectiveness.
The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective
This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed in two stages. First, the participants (employees of a municipality) are exposed to a series of phishing and spear-phishing messages to assess if there are any common characteristics shared by the phishing victims. The differences between the phished and the not phished group are assessed through multiple discriminant analysis. Second, the same individuals are asked to participate in a survey designed to examine their security awareness. The research model is tested using PLS-SEM approach. The results indicate that security awareness is in fact a second-order formative construct composed of six components. There are significant differences in security awareness levels between the victims of the phishing experiment and the employees who maintain compliance with security policies. The study extends the theory by proposing and validating a universal definition of security awareness. It provides practitioners with an instrument to examine awareness in a plethora of settings and design customized security training activities.
The Impact of IT Capability on Employee Capability, Customer Value, Customer Satisfaction, and Business Performance
This study empirically examines the impact of IT capability on firms' performance and evaluates whether firms' IT capabilities play a role in improving employee capability, customer value, customer satisfaction, and ultimately business performance. The results were based on comparing the business performance of the IT leader companies with that of control companies of similar size and industry. The IT leader companies were selected from the Information Week 500 list published annually from 2001 to 2004. For a company to be selected as IT leaders, it needed to be listed at least twice during the period. Furthermore, it had to be listed in the American Customer Satisfaction Index (ACSI) so that its customer satisfaction level could be assessed. Standard & Poor's Compustat and the ACSI scores were used to test for changes in business performance. The study found that the IT leaders had a raw material cost measured by cost-of-goods-sold to sales ratio (COGS/S) than the control companies. However, it found no evidence that firms' IT capability affects employee capability, customer value, customer satisfaction, and profit. An important implication from this study is that IT becomes a commodity and an attempt to gain a competitive advantage by overinvesting in IT may be futile.
The Impact of Multimedia on Information Scanning Effectiveness: an Empirical Study in an Executive Support Systems Environment
This study investigates the impact of multimedia on the effectiveness of information scanning. Information scanning is the act of seeking and receiving a wide variety of special information to develop a thorough understanding of the organization and the environment. The application domain of this study is Executive Support Systems. The experimental task is to identify potential threats and opportunities, a strategic information-scanning activity, based on the information stored in three ESS prototypes. Forty subjects from four organizations participated in the experiment. A random assignment process allocated them into three groups. The control group used the text-based ESS. The first experimental group used the visual multimedia ESS. The second experimental group used the audiovisual multimedia ESS. The experiment was carried out on the sites of the participating organizations. The investigator measured the effectiveness of information scanning based on the number of threats and opportunities each subject identifies. A close-ended questionnaire measured subjects' retention of information. The results of this study support the cognitive-fit theory. The findings indicate that multimedia is not an appropriate presentation format for analytical tasks. Subjects who use text-based ESS identify significantly more threats and opportunities than subjects who use audiovisual multimedia ESS. The cognitive style of subjects does not moderate the impact of multimedia. The results show that the use of multimedia does not necessarily improve retention of information. Further research is needed to determine the most effective combination of text, graphics, animation, video, and sound.
Impacts of Personality Type and Computer System Response Time on Anxiety and User Response Time
The purpose of this research was to determine if personality type and system response time have any effect on state anxiety and user response time. The sample for this study consisted of senior and graduate level college students who possessed basic know 1 edge of a text editor. Each test subject was administered the Jenkins Activity Survey to determine scores for Type A versus Type B, speed and impatience, involvement, and competitiveness. The test subjects were randomly assigned to one of three treatment groups (good, variable, and poor system response time). They were required to edit a text file which contained multiple errors. The test subjects were provided hard copies of the file with errors (errors highlighted) and the file as should appear without the errors. The test situation for each test subject was identical, except for changes in system response time. The A-state scale of the State-Trait Anxiety Inventory (STAI) was administered to the test subjects immediately prior to the edit task in order to determine pre-task state anxiety levels. The A-state scale of the STAI was again administered immediately after the edit task in order to determine post-task state anxiety levels. Analysis of variance, analysis of covariance, regression, and two sample t-tests were used to analyze the data collected. All hypotheses were tested at the alpha .05 level. The most significant finding of this study was the positive relationship between state anxiety and system response time. It was originally predicted that the Type A personality would experience a greater increase in state anxiety than the Type B personality. However, that was not found to be true. Both Type A and Type B individuals experience an increase in state anxiety during periods of poor or variable system response time. This study also confirms prior research regarding user and system …
The Influence of Business Intelligence Components on the Quality of Decision Making
Decision makers require the right information at the right time, in the right place and in the right format so that they can make good decisions. Although business intelligence (BI) has the potential to improve decision making, there is little empirical evidence of how well this has been achieved. The purpose of this dissertation is to examine the quality of decisions made using BI. The research question it addresses is what are the key antecedents of decision quality for users of business intelligence systems? The theoretical support for the model is developed based on the literature review that draws on decision support systems (DSS), group decision support systems (GDSS), and BI. Grounded on this literature review, the antecedents of decision quality are operationalized in this dissertation through independent variables such as the problem space complexity, the level of BI usage, the BI user experience, and information quality. The dependent variable is operationalized as decision quality and it captures the self-satisfaction with a decision made by users in a BI environment. The research model was tested using a survey of BI users whose names were provided by a marketing company. This research suggests that BI user experience is a more complex construct than has been initially thought.
Information System Quality: An Examination of Service-Based Models and Alternatives
Service quality as a component of overall Information Systems quality is examined. Three related studies test the SERVQUAL and related instruments (SERVPERF and Importance-weighted SERVPERF) using Information System users. SERVPERF outperformed SERVQUAL in all three studies.
Information systems success and technology acceptance within a government organization.
Numerous models of IS success and technology acceptance their extensions have been proposed and applied in empirical. This study continues this tradition and extends the body of knowledge on the topic of IS success by developing a more comprehensive model for measuring IS success and technology acceptance within a government organization. The proposed model builds upon three established IS success and technology acceptance frameworks namely the DeLone and McLean (2003), Venkatesh et al.'s (2003) unified theory of acceptance and use of technology (UTAUT), and Wixom and Todd (2005). The findings from this study provide not only a comprehensive IS success assessment model but also insights into whether and how IS success models are influenced by application variables as applied within a government organization. Exploratory factor analysis and confirmatory factor analysis were performed for instrument refinement and validity test of the existing and proposed models. Using data from employees of a local government municipal, the comprehensive model explained 32 percent variance. Four of the hypothesis were fully supported five were not supported, and four were partially supported. In addition, the results suggest that behavioral intention may not be the best predictor of technology acceptance in a mandatory environment.
Interactions of Presentation Formats and Decision-Maker Characteristics upon Multiple Decision-Making Tasks: an Experiment Using Multiple Cognitive Assessments
Information systems research tends to ignore individual differences in users. This laboratory experiment sought to illuminate contributions of decision-makers' cognitive processes to decision outcome as reflected in four hypothesis sets: the impact of imagery preference and presentation format upon (HI) recall accuracy and upon hemispheric activation during (H2) encoding and (H3) recall, and (H4) to examine the relationship between hemispheric activation differences and accuracy differences. Point-value (specific values) and intraset-pattern (relationships between values) recall were considered. Thirty MBA students, grouped by imagery preference (cognitive style) as favoring verbal (textual) or visual (graphical) information presentation, performed computer-based recall tasks using tabular and graphical formats in a repeated measures design. Hemispheric activation (cognitive process) was assessed using ratios of EEG activity in six frequency bands captured from six pairs of homologous electrode sites during encoding and recall.
An Investigation of Factors Influencing the User's Social Network Site Continuance Intention
The social network sites (SNS) industry has recently shown an abnormal development pattern: An SNS could rapidly accumulate a large number of users, and then suffer a serious loss of users in a short time, which subsequently leads to the failure of the Web site in the highly competitive market. The user's social network site continuance is considered the most important factor for an SNS to keep its sustainable development. However, little knowledge of the user's SNS continuance raises the following research question: What factors could significantly influence the user's SNS continuance intention? To address this research question, I study the question from three lenses of research, including the I-view, the social interactivity view, and the trust based view. The I-view is an extension of the IS continuance model. From this research perspective, I tested the influence of the utilitarian factor (i.e., perceived usefulness) and the hedonic factor (i.e., perceived enjoyment) on the user's satisfaction in the I-view. In addition, I extend the umbrella construct, confirmation, into two sub-constructs, informativeness and self-actualization, and respectively study their influences on the utilitarian factor and the hedonic factor. I find that the user's perceived enjoyment has a significant positive effect on the user's satisfaction, thereby motivating the user to continue using the SNS. The perceived informativeness of an SNS and the user's self-actualization through information sharing with others on the Web site both have significant positive effects on the user's perceived usefulness and perceived enjoyment. From the social interactivity perspective, I suggest that a user's social gains could have a projection effect on the user's satisfaction in an SNS and his or her SNS continuance intention. Most previous studies emphasized on the influence of social connection outcomes (i.e., social capitals) on the user's behavioral intention, but ignored the fact that an individual would …
An investigation of technical support issues influencing user satisfaction
The widespread distribution of personal computers (PCs) throughout organizations has made a substantial impact on information systems. Additionally, the tremendous growth of the Internet has changed the way business is carried out. As the user population evolves into a much more technical and demanding group, their needs are also changing. With this change, Management Information Systems (MIS) departments must develop new ways of providing service and support to the user community. This study investigates the relationship between information systems support structures, support services, service quality and the characteristics of a diverse user population. This includes investigating technical support issues influencing user satisfaction. This study attempts to improve the understanding of the support function within MIS. The results of this study clarify the support needs of the users and identify user satisfaction factors, as well as factors relative to the quality of the support received. Six streams of prior research were reviewed when developing the research framework. These include: user support, end users and end-user computing, identifying and classifying user types, information centers, user satisfaction, service quality and other sources of computer support. A survey instrument was designed using the (UIS) user satisfaction instrument developed by Doll and Torkzadeh (1988) and the SERVQUAL instrument as modified by Kettinger and Lee (1994). The survey was distributed to 720 individuals. A total of 155 usable responses were analyzed providing mixed results. Of the ten hypotheses, only four were rejected. The finding of this study differ from those in earlier studies. The variables that were found to be significant to the users for service quality are the method of support that is provided to the user, i.e., help desk or local MIS support and the support technician's experience level. For user satisfaction the location of the service personnel made a difference to the end …
An Investigation of the Productivity of Information System Helpdesk User Support Professsionals as Impacted by Their Communication Behavior : A Field Experiment
This research conducted an interdisciplinary field experiment to identify relationships between productivity, user satisfaction and IS Helpdesk USP's use of effective communication behavior. An experimental group of Helpdesk USPs of a large retail organization were trained by communication professionals in communication effectiveness, with emphasis on the needs of the telephone environment.
An Investigation of the Value of Color in Hard Copy Output
The objectives of this research were to: (1) augment existing research regarding the impact of information retention resulting from the application of redundant color codes; and (2) determine whether the application of color in hard-copy documents has a positive influence in business reports by non-color deficient subjects. This research was an extension of work done by Lamberski and Dwyer (1983) and Moore and Dwyer (1991). Both studies were hard copy based and focused on the impact of information retention resulting from the application of redundant color codes.
IT Offshoring Success: A Social Exchange Perspective
Spending by U.S. companies in offshore IT services continues at unprecedented levels despite a high failure rate. This study fills a gap in the existing literature by examining the client-vendor offshoring relationship through the theoretical lens of social exchange theory at the organizational level of analysis from the client's perspective. Social exchange theory focuses on the exchange of activities between two parties, whether they are individuals or companies and was used as a basis for examining the client and vendor relationship. Variables were identified by a review of the literature primarily from IT outsourcing and offshoring but also from general IT, marketing, sociology and organizational science literature. Data was collected using a field survey of Fortune 500 CIOs representing a population of organizations at the forefront of the offshoring phenomenon. The survey instrument was developed based on the adaptation of previously validated scales. Hypotheses regarding the correlations between social variables such as trust, communication, dependence, power, shared values and offshoring success were tested using Spearman's rho correlation. Seven of the hypotheses were supported, four hypotheses were not supported and one hypothesis was deemed not testable due to lack of information.
Longitudinal Study to Assess the Impact of Instructor-Based Training Versus Computer-Based Training on User Performance: A Field Experiment
The purpose of this study is to investigate the relationships between selected end-user training programs corporations provide to their employees and subsequent employee performance based on these opportunities.
Machine Combination Analysis Procedure for Selecting Optimal Factory Cell Composition
This research examined the relationship between manufacturing input parameters and factory performance in a cellular manufacturing environment.
Organizational Competency Through Information: Business Intelligence and Analytics as a Tool for Process Dynamization
The data produced and collected by organizations represents both challenges and opportunities for the modern firm. Business intelligence and analytics (BI&A) comprises a wide variety of information management technologies and information seeking activities designed to exploit these information resources. As a result, BI&A has been heralded as a source of improved organizational outcomes in both the academic and practitioner literature, and these technologies are among the largest continuous IT expenditures made over the last decade.Despite the interest in BI&A, there is not enough theorizing about its role in improving firm performance. Scholarly investigations of the link between BI&A and organizational benefits are scarce and primarily exploratory in nature. Further, the majority of the extant research on BI&A is techno-centric, conceptualizing BI&A primarily an organizational technical asset. This study seeks to explicate the relationship between BI&A and improved organizational outcomes by viewing this phenomenon through the lens of dynamic capabilities, a promising theoretical perspective from the strategic management discipline. In so doing, this research reframes BI&A as an organizational capability, rather than simply a technical resource. Guided by a comprehensive review of the BI&A and dynamic capabilities literature, as well as a series of semi-structured focus groups with senior-level business practitioners with BI&A experience, this study develops and tests a model of BI&A enabled firm performance. Using a snowball sample, an online survey was administered to 137 business professionals in 24 industries. The data were analyzed using partial least squares (PLS) structural equation modeling (SEM). The findings support the contention that BI&A serve as the sensing and seizing components of an organizational dynamic capability, while transformation is achieved through business process change capability. These factors influence firm financial performance through their impact on the functional performance of the firm’s business processes. Further, this study demonstrates that traditional BI&A success factors are …
The Organizational Consequences of Information Deployment
This study investigates the influence that increasing end user autonomy has on organizational data models. The independence offered by microcomputer technology offers users increasing independence in their information-handling activities. As independence increases, uniformity of data models across the organization is theorized to diminish. The problem motivating this study is the potential for improper allocation of resources that may result from a misinterpretation of organizational data. This study suggests that the expanding use of microcomputers in the business setting will contribute to diversity of data models. This may eventually lead to confusion and even lack of confidence in the information produced.
Back to Top of Screen