You limited your search to:

  Partner: UNT Libraries
 Department: Department of Information Technology and Decision Sciences
 Decade: 2010-2019
 Collection: UNT Theses and Dissertations
Accessing the Power of Aesthetics in Human-computer Interaction

Accessing the Power of Aesthetics in Human-computer Interaction

Date: August 2013
Creator: Chenyan, Xu
Description: In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency characteristics, are critical concerns of designers. This view contends that visual design enhances system use. Thus, this work examines the effects of visual design on computer systems. Visual design exerts its influence on systems through two mechanisms: it evokes affective responses from IT users, such as arousal and pleasure and it influences individuals’ cognitive assessments of systems. Given that both affective and cognitive reactions are significant antecedents of user behaviors in the IT realm, it is no surprise that visual design plays a critical role in information system success. Human-computer-interaction literature indicates that visual aesthetics positively influences such information success factors as usability, online trust, user satisfaction, flow experience, and so on. Although academic research has introduced visual design into the Information Systems (IS) ...
Contributing Partner: UNT Libraries
Accuracy and Interpretability Testing of Text Mining Methods

Accuracy and Interpretability Testing of Text Mining Methods

Date: August 2013
Creator: Ashton, Triss A.
Description: Extracting meaningful information from large collections of text data is problematic because of the sheer size of the database. However, automated analytic methods capable of processing such data have emerged. These methods, collectively called text mining first began to appear in 1988. A number of additional text mining methods quickly developed in independent research silos with each based on unique mathematical algorithms. How good each of these methods are at analyzing text is unclear. Method development typically evolves from some research silo centric requirement with the success of the method measured by a custom requirement-based metric. Results of the new method are then compared to another method that was similarly developed. The proposed research introduces an experimentally designed testing method to text mining that eliminates research silo bias and simultaneously evaluates methods from all of the major context-region text mining method families. The proposed research method follows a random block factorial design with two treatments consisting of three and five levels (RBF-35) with repeated measures. Contribution of the research is threefold. First, the users perceived a difference in the effectiveness of the various methods. Second, while still not clear, there are characteristics with in the text collection that affect the ...
Contributing Partner: UNT Libraries
Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Date: August 2010
Creator: Işik, Öykü
Description: Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of BI capabilities on BI success, in the presence of different decision environments. The decision environment is a composition of the decision types and the way the required information is processed to aid in decision making. BI capabilities are defined as critical functionalities that help an organization improve its performance, and they are examined in terms of organizational and technological capabilities. An online survey is used to obtain the data and partial least squares path modeling (PLS) is used for analysis. The results of this dissertation suggest that all technological capabilities as well as one of the organizational capabilities, flexibility, significantly impact BI success. Results also indicate that the moderating effect of decision environment is significant for quantitative data quality. These ...
Contributing Partner: UNT Libraries
Business/it Alignment: the Impact of Incentive Plans on the Development of Shared Vision

Business/it Alignment: the Impact of Incentive Plans on the Development of Shared Vision

Access: Use of this item is restricted to the UNT Community.
Date: December 2014
Creator: Johnson, Vess L.
Description: This study, utilizing Preston and Karahanna’s framework for shared vision development and Agency Theory, explores the impact of vision development factors and factors associated with incentive plans on shared vision and alignment. Results of the study confirm the strong relationship between shared vision and alignment, and indicate that having an effective management team is important with respect to developing and maintaining shared vision and alignment within the organization. Several vision development factors such as using the language of the business, participation on the top management team (TMT), and having knowledge of the business impact shared vision through their influence on teamwork. Also, results of this study suggest that participation on the TMT by the CIO/IT leader is more important than the individual’s position in the organizational hierarchy. In addition, attributes associated with incentive plans such as achievable and clear measures, measures linked to organizational goals, measures that align the interests of the individual with those of the organization, regular plan reviews, and using a balanced scorecard approach with respect to incentive plan design positively impact teamwork and shared vision. For practitioners, this highlights the importance of incentive plans as powerful tools that can be used to reinforce shared vision, effective ...
Contributing Partner: UNT Libraries
Comparing Latent Dirichlet Allocation and Latent Semantic Analysis as Classifiers

Comparing Latent Dirichlet Allocation and Latent Semantic Analysis as Classifiers

Date: December 2011
Creator: Anaya, Leticia H.
Description: In the Information Age, a proliferation of unstructured text electronic documents exists. Processing these documents by humans is a daunting task as humans have limited cognitive abilities for processing large volumes of documents that can often be extremely lengthy. To address this problem, text data computer algorithms are being developed. Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are two text data computer algorithms that have received much attention individually in the text data literature for topic extraction studies but not for document classification nor for comparison studies. Since classification is considered an important human function and has been studied in the areas of cognitive science and information science, in this dissertation a research study was performed to compare LDA, LSA and humans as document classifiers. The research questions posed in this study are: R1: How accurate is LDA and LSA in classifying documents in a corpus of textual data over a known set of topics? R2: How accurate are humans in performing the same classification task? R3: How does LDA classification performance compare to LSA classification performance? To address these questions, a classification study involving human subjects was designed where humans were asked to generate and classify documents ...
Contributing Partner: UNT Libraries
Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Date: August 2013
Creator: Harden, Gina
Description: Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organizations trying to reap potential benefits of enterprise social software (ESS) must successfully implement and maintain ESS tools. This research develops a framework for assessing knowledge sharing based on reciprocal determinism theory and augmented with technology acceptance, sociological, and psychological factors. Semi-structured interviews with IT professionals, followed by a written survey of employees using ESS are used to collect data. The hermeneutic circle methodology is used to analyze the interview transcripts and structural equation modeling is used to analyze the survey data. Results show technological advantage has no significant effect on the intention to share knowledge, but community cohesiveness and individual willingness significantly affect knowledge sharing intention and behavior. The study offers a synthesized model of variables affecting knowledge sharing as well as a better understanding of best practices for organizations to consider when implementing ...
Contributing Partner: UNT Libraries
Factors Influencing BI Data Collection Strategies: An Empirical Investigation

Factors Influencing BI Data Collection Strategies: An Empirical Investigation

Date: August 2010
Creator: Ramakrishnan, Thiagarajan
Description: The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top level managers involved in developing and managing BI. Data was collected from a range of industries and organizations within the United States. An online survey was used to collect the data to empirically test the proposed relationships. Data was analyzed using partial least square path modeling (PLS). The results of this study suggest that there exists a positive relationship between institutional isomorphism and BI consistency. The results also indicate that there exists a positive relationship between BI consistency and BI comprehensive data collection strategy, and the organizational transformation attribute of BI and BI comprehensive data collection strategy. These findings provide a theoretical lens to better understand the motivators and the success factors related to collecting the huge amounts of data required for BI. This study also provides managers with ...
Contributing Partner: UNT Libraries
The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective

The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective

Date: August 2014
Creator: Hanus, Bartlomiej T.
Description: This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed in two stages. First, the participants (employees of a municipality) are exposed to a series of phishing and spear-phishing messages to assess if there are any common characteristics shared by the phishing victims. The differences between the phished and the not phished group are assessed through multiple discriminant analysis. Second, the same individuals are asked to participate in a survey designed to examine their security awareness. The research model is tested using PLS-SEM approach. The results indicate that security awareness is in fact a second-order formative construct composed of six components. There are significant differences in security awareness levels between the victims of the phishing experiment and the employees who maintain compliance with security policies. The study extends the theory by ...
Contributing Partner: UNT Libraries
The Impact of Quality on Customer Behavioral Intentions Based on the Consumer Decision Making Process As Applied in E-commerce

The Impact of Quality on Customer Behavioral Intentions Based on the Consumer Decision Making Process As Applied in E-commerce

Date: August 2012
Creator: Wen, Chao
Description: Perceived quality in the context of e-commerce was defined and examined in numerous studies, but, to date, there are no consistent definitions and measurement scales. Instruments that measure quality in e-commerce industries primarily focus on website quality or service quality during the transaction and delivery phases. Even though some scholars have proposed instruments from different perspectives, these scales do not fully evaluate the level of quality perceived by customers during the entire decision-making process. This dissertation purports to provide five main contributions for the e-commerce, service quality, and decision science literature: (1) development of a comprehensive instrument to measure how online customers perceive the quality of the shopping channel, website, transaction and recovery based on the customer decision making process; (2) identification of the determinants of customer satisfaction and the key dimensions of customer behavioral intentions in e-commerce; (3) examination of the relationships among perceived quality, customer satisfaction and loyalty intention using empirical data; (4) application of different statistical packages (LISREL and PLS-Graph) for data analysis and comparison of how these methods impact the results; and (5) examination of the moderating effects of control variables. A survey was designed and distributed to a total of 1126 college students in a ...
Contributing Partner: UNT Libraries
The Influence of Business Intelligence Components on the Quality of Decision Making

The Influence of Business Intelligence Components on the Quality of Decision Making

Date: May 2013
Creator: Visinescu, Lucian L.
Description: Decision makers require the right information at the right time, in the right place and in the right format so that they can make good decisions. Although business intelligence (BI) has the potential to improve decision making, there is little empirical evidence of how well this has been achieved. The purpose of this dissertation is to examine the quality of decisions made using BI. The research question it addresses is what are the key antecedents of decision quality for users of business intelligence systems? The theoretical support for the model is developed based on the literature review that draws on decision support systems (DSS), group decision support systems (GDSS), and BI. Grounded on this literature review, the antecedents of decision quality are operationalized in this dissertation through independent variables such as the problem space complexity, the level of BI usage, the BI user experience, and information quality. The dependent variable is operationalized as decision quality and it captures the self-satisfaction with a decision made by users in a BI environment. The research model was tested using a survey of BI users whose names were provided by a marketing company. This research suggests that BI user experience is a more complex ...
Contributing Partner: UNT Libraries
FIRST PREV 1 2 NEXT LAST