You limited your search to:

  Partner: UNT Libraries
 Degree Discipline: Business Computer Information Systems
 Degree Level: Doctoral
 Collection: UNT Theses and Dissertations
An Analysis of the Effect of Environmental and Systems Complexity on Information Systems Failures

An Analysis of the Effect of Environmental and Systems Complexity on Information Systems Failures

Date: August 2001
Creator: Zhang, Xiaoni
Description: Companies have invested large amounts of money on information systems development. Unfortunately, not all information systems developments are successful. Software project failure is frequent and lamentable. Surveys and statistical analysis results underscore the severity and scope of software project failure. Limited research relates software structure to information systems failures. Systematic study of failure provides insights into the causes of IS failure. More importantly, it contributes to better monitoring and control of projects and enhancing the likelihood of the success of management information systems. The underlining theories and literature that contribute to the construction of theoretical framework come from general systems theory, complexity theory, and failure studies. One hundred COBOL programs from a single company are used in the analysis. The program log clearly documents the date, time, and the reasons for changes to the programs. In this study the relationships among the variables of business requirements change, software complexity, program size and the error rate in each phase of software development life cycle are tested. Interpretations of the hypotheses testing are provided as well. The data shows that analysis error and design error occur more often than programming error. Measurement criteria need to be developed at each stage of the ...
Contributing Partner: UNT Libraries
Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Date: August 2010
Creator: Işik, Öykü
Description: Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of BI capabilities on BI success, in the presence of different decision environments. The decision environment is a composition of the decision types and the way the required information is processed to aid in decision making. BI capabilities are defined as critical functionalities that help an organization improve its performance, and they are examined in terms of organizational and technological capabilities. An online survey is used to obtain the data and partial least squares path modeling (PLS) is used for analysis. The results of this dissertation suggest that all technological capabilities as well as one of the organizational capabilities, flexibility, significantly impact BI success. Results also indicate that the moderating effect of decision environment is significant for quantitative data quality. These ...
Contributing Partner: UNT Libraries
Critical success factors in data mining projects.

Critical success factors in data mining projects.

Date: August 2003
Creator: Sim, Jaesung
Description: The increasing awareness of data mining technology, along with the attendant increase in the capturing, warehousing, and utilization of historical data to support evidence-based decision making, is leading many organizations to recognize that the effective use of data is the key element in the next generation of client-server enterprise information technology. The concept of data mining is gaining acceptance in business as a means of seeking higher profits and lower costs. To deploy data mining projects successfully, organizations need to know the key factors for successful data mining. Implementing emerging information systems (IS) can be risky if the critical success factors (CSFs) have been researched insufficiently or documented inadequately. While numerous studies have listed the advantages and described the data mining process, there is little research on the success factors of data mining. This dissertation identifies CSFs in data mining projects. Chapter 1 introduces the history of the data mining process and states the problems, purposes, and significances of this dissertation. Chapter 2 reviews the literature, discusses general concepts of data mining and data mining project contexts, and reviews general concepts of CSF methodologies. It also describes the identification process for the various CSFs used to develop the research framework. ...
Contributing Partner: UNT Libraries
Defining the information security posture: An empirical examination of structure, integration, and managerial effectiveness.

Defining the information security posture: An empirical examination of structure, integration, and managerial effectiveness.

Date: August 2008
Creator: Young, Randall Frederick
Description: The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera, 2003). The little empirical research that has been conducted in this area has shown that information security management in many organizations is poor (Baskerville, 1993; Shimeall & McDermott, 1999). Several researchers have identified the need for methods to measure the organization-wide information security posture of organizations (Eloff & Von Solms, 2000; James, 1996). This dissertation attempts to measure the organization-wide information security posture by examining benchmark variables that assess role, planning orientation, and performance structure within the organization. Through this conceptualization of an organization's information security posture, a means is presented to measure overall information security and how it impacts the effective utilization of information security strategies. The presence of the dependent variable, effectiveness, gives academics and practitioners a success measure which can guide more effective decision making in ...
Contributing Partner: UNT Libraries
Design for Social Presence and Exploring Its Mediating Effect in Mobile Data Communication Services

Design for Social Presence and Exploring Its Mediating Effect in Mobile Data Communication Services

Date: May 2011
Creator: Ogara, Solomon Omondi
Description: The mobility, flexibility, convenience, and ubiquity of mobile data services (MDS) have contributed to their enormous growth and popularity with users. MDS allow users to communicate through mobile texting (mTexting), mobile Instant Messaging (mIM), multimedia messaging services (MMS), and email. A unique feature of MDS that enhances its popularity among its users is the awareness capability, which is revolutionizing the way MDS is being used to communicate today. It allows potential communication partners to socialize through these technologies. This dissertation explored the relationship between user experience, perceived richness, perceived social presence and satisfaction with MDS. A research model for examining the antecedent conditions that influence social presence, richness, social interaction and satisfaction with MDS was developed. Partial least square analysis showed that user experience influenced both social presence and richness. Also supported was the relationship between richness, social presence and satisfaction with MDS. Social presence mediated the relationship between user experience and richness. However, only one dimension of interactivity influenced social presence.
Contributing Partner: UNT Libraries
A Discrimination of Software Implementation Success Criteria

A Discrimination of Software Implementation Success Criteria

Date: August 1999
Creator: Pryor, Alan N.
Description: Software implementation projects struggle with the delicate balance of low cost, on-time delivery and quality. The methodologies and processes used to create and maintain a quality software system are expensive to deploy and result in long development cycle-time. However, without their deployment into the software implementation life-cycle, a software system will be undependable, unsuccessful. The purpose of this research is to identify a succinct set of software implementation success criteria and assess the key independent constructs, activities, carried out to ensure a successful implementation project. The research will assess the success of a software implementation project as the dependent construct of interest and use the software process model (methodology) as the independent construct. This field research involved three phases: (1) criteria development, (2) data collection, and (3) testing of hypotheses and discriminant analysis. The first phase resulted in the development of the measurement instruments for the independent and dependent constructs. The measurement instrument for the independent construct was representative of the criteria from highly regarded software implementation process models and methodologies, e.g., ISO9000, Software Engineering Institute's Capability Maturity Model (SEI CMM). The dependent construct was developed from the categories and criteria from the Delone and McLean (1992) MIS List of ...
Contributing Partner: UNT Libraries
Exploring Critical Factors in Predicting Post-Adoptive Use of Facebook

Exploring Critical Factors in Predicting Post-Adoptive Use of Facebook

Date: May 2011
Creator: Magro, Michael J.
Description: Social networking applications (SNAs) have experienced a boom in popularity in recent years. Sites like Facebook and MySpace continuously draw new users, and are successful in organizing groups of users around topics of common interest. Among SNAs, Facebook has demonstrably outgrown its rivals growing an estimated 157 percent from 2008 to 2009. Facebook is now estimated to be the fourth largest Internet site in the world, trailing only Google, Microsoft and Yahoo (Schonfeld 2009). This dissertation posits and tests a theoretical model composed of key factors that contribute to post-adoptive use of social networking applications and the relationship of those factors to one another. This study also identifies and clarifies new constructs that were not previously used to measure usage, and further refines the constructs that were previously used so that they better fit social networking applications. The results of this dissertation show that the critical factors of social capital, hedonic enjoyment, perceived usefulness, social influence, satisfaction and attitude have a positive influence on a post-adoptive user's intention to continue using Facebook. The results of this study yielded a structural model for predicting the post-adoptive use of Facebook. This work also developed an instrument for measuring constructs relevant to social ...
Contributing Partner: UNT Libraries
Factors Influencing BI Data Collection Strategies: An Empirical Investigation

Factors Influencing BI Data Collection Strategies: An Empirical Investigation

Date: August 2010
Creator: Ramakrishnan, Thiagarajan
Description: The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top level managers involved in developing and managing BI. Data was collected from a range of industries and organizations within the United States. An online survey was used to collect the data to empirically test the proposed relationships. Data was analyzed using partial least square path modeling (PLS). The results of this study suggest that there exists a positive relationship between institutional isomorphism and BI consistency. The results also indicate that there exists a positive relationship between BI consistency and BI comprehensive data collection strategy, and the organizational transformation attribute of BI and BI comprehensive data collection strategy. These findings provide a theoretical lens to better understand the motivators and the success factors related to collecting the huge amounts of data required for BI. This study also provides managers with ...
Contributing Partner: UNT Libraries
Factors Influencing Post-adoptive Enterprise Resource Planning (ERP) Utilization

Factors Influencing Post-adoptive Enterprise Resource Planning (ERP) Utilization

Date: August 2011
Creator: McGinnis, Thomas C.
Description: Organizations expend a great deal of time, effort and money on the implementation of enterprise resource planning (ERP) systems. They are considered the price of entry for large organizations to do business. Yet the success rate of ERP systems is poor. IS literature suggests that one possible reason for this is the underutilization of these systems. Existing ERP literature is replete with research to improve ERP project implementation success; however, notably absent from these streams is the research that identifies how ERP systems are utilized by individuals or organizations. This dissertation posits that increased ERP utilization can result from increased software and business process understanding gained from both formal training and experiential interventions. New dimensions of system utilization (required vs. optional) are proposed. The purpose of this dissertation is to examine how these interventions impact ERP utilization. The results of this dissertation show that while software-training interventions are important to understanding, it is the business process training interventions that seem to provide the greater effect on understanding. This increased understanding positively affects utilization scenarios where a mixture (required vs. optional) of software features and business process tasks can be leveraged by end-users. The improved understanding of post-adoptive ERP utilization gained ...
Contributing Partner: UNT Libraries
General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses

General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses

Date: May 2009
Creator: Schuessler, Joseph H.
Description: This research sought to shed light on information systems security (ISS) by conceptualizing an organization's use of countermeasures using general deterrence theory, positing a non-recursive relationship between threats and countermeasures, and by extending the ISS construct developed in prior research. Industry affiliation and organizational size are considered in terms of differences in threats that firms face, the different countermeasures in use by various firms, and ultimately, how a firm's ISS effectiveness is affected. Six information systems professionals were interviewed in order to develop the appropriate instruments necessary to assess the research model put forth; the final instrument was further refined by pilot testing with the intent of further clarifying the wording and layout of the instrument. Finally, the Association of Information Technology Professionals was surveyed using an online survey. The model was assessed using SmartPLS and a two-stage least squares analysis. Results indicate that a non-recursive relationship does indeed exist between threats and countermeasures and that countermeasures can be used to effectively frame an organization's use of countermeasures. Implications for practitioners include the ability to target the use of certain countermeasures to have desired effects on both ISS effectiveness and future threats. Additionally, the model put forth in this research ...
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 NEXT LAST