You limited your search to:

  Partner: UNT Libraries
 Degree Discipline: Business Computer Information Systems
 Degree Level: Doctoral
Accessing the Power of Aesthetics in Human-computer Interaction

Accessing the Power of Aesthetics in Human-computer Interaction

Date: August 2013
Creator: Chenyan, Xu
Description: In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency characteristics, are critical concerns of designers. This view contends that visual design enhances system use. Thus, this work examines the effects of visual design on computer systems. Visual design exerts its influence on systems through two mechanisms: it evokes affective responses from IT users, such as arousal and pleasure and it influences individuals’ cognitive assessments of systems. Given that both affective and cognitive reactions are significant antecedents of user behaviors in the IT realm, it is no surprise that visual design plays a critical role in information system success. Human-computer-interaction literature indicates that visual aesthetics positively influences such information success factors as usability, online trust, user satisfaction, flow experience, and so on. Although academic research has introduced visual design into the Information Systems (IS) ...
Contributing Partner: UNT Libraries
An Analysis of the Effect of Environmental and Systems Complexity on Information Systems Failures

An Analysis of the Effect of Environmental and Systems Complexity on Information Systems Failures

Date: August 2001
Creator: Zhang, Xiaoni
Description: Companies have invested large amounts of money on information systems development. Unfortunately, not all information systems developments are successful. Software project failure is frequent and lamentable. Surveys and statistical analysis results underscore the severity and scope of software project failure. Limited research relates software structure to information systems failures. Systematic study of failure provides insights into the causes of IS failure. More importantly, it contributes to better monitoring and control of projects and enhancing the likelihood of the success of management information systems. The underlining theories and literature that contribute to the construction of theoretical framework come from general systems theory, complexity theory, and failure studies. One hundred COBOL programs from a single company are used in the analysis. The program log clearly documents the date, time, and the reasons for changes to the programs. In this study the relationships among the variables of business requirements change, software complexity, program size and the error rate in each phase of software development life cycle are tested. Interpretations of the hypotheses testing are provided as well. The data shows that analysis error and design error occur more often than programming error. Measurement criteria need to be developed at each stage of the ...
Contributing Partner: UNT Libraries
Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information

Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information

Date: August 1987
Creator: Attia, Abdel-Hameed M. (Abdel-Hameed Mohammed)
Description: The objective of this research is the investigation of the patterns of information growth to test whether there has been an "information explosion." To tackle the main problem, there are three issues which need to be addressed: (1) the concept of information dimensionality; (2) determination of common parameters to measure the amount of information within each dimension; and (3) a working definition of "explosiveness. "
Contributing Partner: UNT Libraries
Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Date: August 2010
Creator: Işik, Öykü
Description: Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of BI capabilities on BI success, in the presence of different decision environments. The decision environment is a composition of the decision types and the way the required information is processed to aid in decision making. BI capabilities are defined as critical functionalities that help an organization improve its performance, and they are examined in terms of organizational and technological capabilities. An online survey is used to obtain the data and partial least squares path modeling (PLS) is used for analysis. The results of this dissertation suggest that all technological capabilities as well as one of the organizational capabilities, flexibility, significantly impact BI success. Results also indicate that the moderating effect of decision environment is significant for quantitative data quality. These ...
Contributing Partner: UNT Libraries
A Case Study of the Use of Activity-Based Analysis as an Information Resource Management Tool

A Case Study of the Use of Activity-Based Analysis as an Information Resource Management Tool

Date: December 1994
Creator: Arnett, Charles A. (Charles Augustus)
Description: The purpose of the study was to investigate a modification of a managerial accounting technique, Activity-Based Costing (ABC), as a tool for addressing Information Resource Management (IRM) concerns within business processes. To indicate that ABC has been adapted for the IRM context, this study called the tool "Activity-Based Analysis" (ABA). ABA includes ABC's costing methodology as well as additional methods to address broader issues. The research method was a single-site case study at a property and casualty insurance company. The unit of analysis was a business process consisting of activities needed to provide claims handling services for workers' compensation insurance. Four questions guided the study: 1. Did ABA identify management information required to monitor process effectiveness and efficiency? 2. Did ABA support outsourcing decision making by identifying IRM cost components within business processes? 3. Did ABA identify information resources; that are sharable? 4. Did ABA identify differences between Company organizational characteristics andIRM department organizational characteristics?
Contributing Partner: UNT Libraries
Client/Server Systems Performance Evaluation Measures Use and Importance: a Multi-Site Case Study of Traditional Performance Measures Applied to the Client/Server Environment

Client/Server Systems Performance Evaluation Measures Use and Importance: a Multi-Site Case Study of Traditional Performance Measures Applied to the Client/Server Environment

Date: May 1999
Creator: Posey, Orlando Guy
Description: This study examines the role of traditional computing performance measures when used in a client/server system (C/SS) environment. It also evaluates the effectiveness of traditional computing measures of mainframe systems for use in C/SS. The underlying problem was the lack of knowledge about how performance measures are aligned with key business goals and strategies. This research study has identified and evaluated client/server performance measurements' importance in establishing an effective performance evaluation system. More specifically, this research enables an organization to do the following: (1) compare the relative states of development or importance of performance measures, (2) identify performance measures with the highest priority for future development, (3) contrast the views of different organizations regarding the current or desired states of development or relative importance of these performance measures.
Contributing Partner: UNT Libraries
Communication Quality in Information Systems Development: The Effect of Computer-Mediated Communication on Task-Oriented Problem Solving

Communication Quality in Information Systems Development: The Effect of Computer-Mediated Communication on Task-Oriented Problem Solving

Date: May 1986
Creator: Smith, Jill Yvonne
Description: The problem motivating this research is that ineffective communication may hamper systems development efforts. Specifically germane to this study are development efforts characterized as task-oriented, and which require information-sharing and problem-solving activities. This research problem motivated an analysis of the communication process and lead to the development of a temporal framework that delineates variables associated with task-oriented, end user/systems analyst communication interactions. Several variables within this framework are depicted in two theoretical models. The first model shows the theoretical relationship between an independent variable, communication mode (represented by asynchronous computer conferencing and face-to-face conferencing), and five dependent variables: (1) the amount of information shared, (2) the significance of the information shared, (3) the comprehensiveness of the information shared, (4) the perception of progress toward the goal, and (5) the perception of freedom to participate. The second model depicts the assumed interaction between communication mode, the five variables cited above (now acting as independent variables), and a dependent variable, communication quality. There are two theoretical components of communication quality: (1) deviation from an optimal set of user requirements, and (2) the degree of convergence (unity based on mutual understanding and mutual agreement) emanating from a communication interaction. Using the theoretical models ...
Contributing Partner: UNT Libraries
Comparisons of Neural Networks, Shewhart ‾x, and CUSUM Control Charts Under the Condition of Nonnormality

Comparisons of Neural Networks, Shewhart ‾x, and CUSUM Control Charts Under the Condition of Nonnormality

Date: August 1997
Creator: Yi, Junsub
Description: In this study, neural networks are developed under conditions of nonnormality as alternatives to standard control charts, and their performance is compared with those of standard ‾x and CUSUM control charts.
Contributing Partner: UNT Libraries
Computer-Supported Collaborative Work and Its Application to Software Engineering in a Case Environment

Computer-Supported Collaborative Work and Its Application to Software Engineering in a Case Environment

Date: May 1997
Creator: Bailey, Janet L.
Description: This study investigated, in the context of a field-based case study, possibilities for formation of a synergistic union between CSCW and CASE tools. A major dimension of today's software challenge is in gearing up for large-scale system development necessitating large teams of systems engineers. The principal goal of this research was to advance the body of knowledge regarding the nature of collaborative technological support in the software development process. Specifically, the study was designed to evaluate the potential for using a CSCW tool as an effective front-end to a CASE tool in the furtherance of SDLC goals.
Contributing Partner: UNT Libraries
Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

Date: August 2016
Creator: Sullivan, Yulia
Description: The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the consequences of mind wandering in a technological setting is imperative because mind wandering plays a vital role in influencing various outcomes associated with technology use and/or technology learning, such as technology anxiety, software self-efficacy, and task performance. This dissertation is composed of three essays which examine the determinants and consequences of mind wandering and focus of attention on a number of emotional and cognitive outcomes. A multi-method approach (i.e., online survey and laboratory experiment) across three essays is used to test the research models. Essay 1 focuses on developing the measurement items and estimating the impact of mind wandering on users' emotional outcomes (i.e., technology anxiety and users' satisfaction). Drawing upon the content regulation hypothesis of mind wandering, the content of thoughts ...
Contributing Partner: UNT Libraries
Critical Success Factors in Data Mining Projects.

Critical Success Factors in Data Mining Projects.

Date: August 2003
Creator: Sim, Jaesung
Description: The increasing awareness of data mining technology, along with the attendant increase in the capturing, warehousing, and utilization of historical data to support evidence-based decision making, is leading many organizations to recognize that the effective use of data is the key element in the next generation of client-server enterprise information technology. The concept of data mining is gaining acceptance in business as a means of seeking higher profits and lower costs. To deploy data mining projects successfully, organizations need to know the key factors for successful data mining. Implementing emerging information systems (IS) can be risky if the critical success factors (CSFs) have been researched insufficiently or documented inadequately. While numerous studies have listed the advantages and described the data mining process, there is little research on the success factors of data mining. This dissertation identifies CSFs in data mining projects. Chapter 1 introduces the history of the data mining process and states the problems, purposes, and significances of this dissertation. Chapter 2 reviews the literature, discusses general concepts of data mining and data mining project contexts, and reviews general concepts of CSF methodologies. It also describes the identification process for the various CSFs used to develop the research framework. ...
Contributing Partner: UNT Libraries
Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance

Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance

Access: Use of this item is restricted to the UNT Community.
Date: August 2016
Creator: Gerhart, Natalie
Description: Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual decision makers, in different decision contexts, determine when to stop collecting information given the availability of virtually unlimited information. Decision makers must make an ultimate decision, but also must make a decision that he or she has enough information to make the final decision (Browne, Pitts, & Wetherbe, 2007). In determining how much information to collect, researchers found that people engage in ‘satisficing' in order to make decisions, particularly when there is more information than it is possible to manage (Simon, 1957). A more recent elucidation of information use relies on the idea of stopping rules, identifying five common stopping rules information seekers use: mental list, representational stability, difference threshold, magnitude threshold, and single criterion (Browne et al., 2007). Prior research indicates ...
Contributing Partner: UNT Libraries
Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness

Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness

Date: August 2008
Creator: Young, Randall Frederick
Description: The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera, 2003). The little empirical research that has been conducted in this area has shown that information security management in many organizations is poor (Baskerville, 1993; Shimeall & McDermott, 1999). Several researchers have identified the need for methods to measure the organization-wide information security posture of organizations (Eloff & Von Solms, 2000; James, 1996). This dissertation attempts to measure the organization-wide information security posture by examining benchmark variables that assess role, planning orientation, and performance structure within the organization. Through this conceptualization of an organization's information security posture, a means is presented to measure overall information security and how it impacts the effective utilization of information security strategies. The presence of the dependent variable, effectiveness, gives academics and practitioners a success measure which can guide more effective decision making in ...
Contributing Partner: UNT Libraries
Design for Social Presence and Exploring Its Mediating Effect in Mobile Data Communication Services

Design for Social Presence and Exploring Its Mediating Effect in Mobile Data Communication Services

Date: May 2011
Creator: Ogara, Solomon Omondi
Description: The mobility, flexibility, convenience, and ubiquity of mobile data services (MDS) have contributed to their enormous growth and popularity with users. MDS allow users to communicate through mobile texting (mTexting), mobile Instant Messaging (mIM), multimedia messaging services (MMS), and email. A unique feature of MDS that enhances its popularity among its users is the awareness capability, which is revolutionizing the way MDS is being used to communicate today. It allows potential communication partners to socialize through these technologies. This dissertation explored the relationship between user experience, perceived richness, perceived social presence and satisfaction with MDS. A research model for examining the antecedent conditions that influence social presence, richness, social interaction and satisfaction with MDS was developed. Partial least square analysis showed that user experience influenced both social presence and richness. Also supported was the relationship between richness, social presence and satisfaction with MDS. Social presence mediated the relationship between user experience and richness. However, only one dimension of interactivity influenced social presence.
Contributing Partner: UNT Libraries
A Discrimination of Software Implementation Success Criteria

A Discrimination of Software Implementation Success Criteria

Date: August 1999
Creator: Pryor, Alan N.
Description: Software implementation projects struggle with the delicate balance of low cost, on-time delivery and quality. The methodologies and processes used to create and maintain a quality software system are expensive to deploy and result in long development cycle-time. However, without their deployment into the software implementation life-cycle, a software system will be undependable, unsuccessful. The purpose of this research is to identify a succinct set of software implementation success criteria and assess the key independent constructs, activities, carried out to ensure a successful implementation project. The research will assess the success of a software implementation project as the dependent construct of interest and use the software process model (methodology) as the independent construct. This field research involved three phases: (1) criteria development, (2) data collection, and (3) testing of hypotheses and discriminant analysis. The first phase resulted in the development of the measurement instruments for the independent and dependent constructs. The measurement instrument for the independent construct was representative of the criteria from highly regarded software implementation process models and methodologies, e.g., ISO9000, Software Engineering Institute's Capability Maturity Model (SEI CMM). The dependent construct was developed from the categories and criteria from the Delone and McLean (1992) MIS List of ...
Contributing Partner: UNT Libraries
Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky It Behaviors of Individuals

Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky It Behaviors of Individuals

Access: Use of this item is restricted to the UNT Community.
Date: August 2015
Creator: Negahban, Arash
Description: Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), which allows employees to connect their personal devices to corporate networks. BYOD is identified as one of the top ten technology trends in 2014 that can multiply the size of mobile workforce in organizations. However, it can also serve as a vehicle that transfers cyber security threats associated with personal mobile devices to the organizations. As BYOD opens the floodgates of various device types and platforms into organizations, identifying different sources of cyber security threats becomes indispensable. So far, there are no studies that investigated how user, device and usage characteristics affect individuals’ protective and risky IT behaviors. The goal of this dissertation is to expand the current literature in IS security by accounting for the roles of user, device, and usage characteristics ...
Contributing Partner: UNT Libraries
The Effect of It Process Support, Process Visualization and Process Characteristics on Process Outcomes

The Effect of It Process Support, Process Visualization and Process Characteristics on Process Outcomes

Date: December 2013
Creator: Al Beayeyz, Alaa
Description: Business process re-engineering (part of the Business Process Management domain) is among the top three concerns of Information Technology (IT) leaders and is deemed to be one of many important IT leveraging opportunities. Two major challenges have been identified in relation to BPM and the use of IT. The first challenge is related to involving business process participants in process improvement initiatives using BPM systems. BPM technologies are considered to be primarily targeted for developers and not BPM users, and the need to engage process participants into process improvement initiatives is not addressed, contributing to the business-IT gap. The second challenge is related to potential de-skilling of knowledge workers when knowledge-intensive processes are automated and process knowledge resides in IT, rather than human process participants. The two identified challenges are not separate issues. Process participants need to be knowledgeable about the process in order to actively contribute to BPM initiatives, and the loss of process knowledge as a result of passive use of automated systems may further threaten their participation in process improvement. In response to the call for more research on the individual impacts of business process initiatives, the purpose of this dissertation study is to understand the relationship ...
Contributing Partner: UNT Libraries
The Effects of Alternative Presentation Formats on Biases and Heuristics in Human Decision Making

The Effects of Alternative Presentation Formats on Biases and Heuristics in Human Decision Making

Date: May 1996
Creator: Van Dyke, Thomas P. (Thomas Peter)
Description: The purpose of this research was to determine whether changes in the presentation format of items in a computer display could be used to alter the impact of specific cognitive biases, and to add to the knowledge needed to construct theory-based guidelines for output design. The problem motivating this study is twofold. The first part of the problem is the sub-optimal decision making caused by the use of heuristics and their associated cognitive biases. The second part of the problem is the lack of a theoretical basis to guide the design of information presentation formats to counter the effects of such biases. An availability model of the impact of changes in presentation format on biases and heuristics was constructed based on the findings of a literature review. A six-part laboratory experiment was conducted utilizing a sample of 205 student subjects from the college of business. The independent variable was presentation format which was manipulated by altering the visual salience or visual recency of items of information in a visual computer display. The dependent variables included recall, perceived importance, and the subjects' responses to three judgment tasks. The results clearly demonstrate that changes in presentation format can be used to alter ...
Contributing Partner: UNT Libraries
The Effects of Using Information Technology to Support Evaluation of Feedback and Implementation of Adjustments in an Organization's Strategic Planning Process

The Effects of Using Information Technology to Support Evaluation of Feedback and Implementation of Adjustments in an Organization's Strategic Planning Process

Date: May 1997
Creator: Kemm, Elizabeth
Description: Organizations that must respond quickly to environmental pressures look for tools to assist in that response. Information technology may be one tool to facilitate the response. In this study the possible effects of using information technology, specifically a decision support system, in the feedback segment of one organization's strategic management loop were examined. The organization was one region of the Board of Probation and Parole in a central state. Personnel included administrators, parole officers and clerical workers. The information technology was an off-the-shelf software product called PlanRight. This study is significant for two reasons: a new application for information technology was examined and the adequacy of a generic computerized tool designed to be suitable for various operations was explored. This study was a case study. Two months of data were taken prior to the implementation of the decision support system, and four months of data were taken after the system was implemented. Questionnaire data taken before system implementation provided descriptive characteristics of the organization. Follow-up surveys and interviews at the conclusion of the study were used to evaluate employee perceptions. The study was done in three phases. During phase one questionnaires were distributed and returned. During phase two, goals, plans ...
Contributing Partner: UNT Libraries
An Empirical Investigation of Detail Design Tools and Cognitive Style of Software Developers

An Empirical Investigation of Detail Design Tools and Cognitive Style of Software Developers

Date: May 1992
Creator: Flores-Rosales, Oscar
Description: The purpose of this study is to identify what detail design tools are more productive for the different types of professional software developers. By establishing a match between the detail design tool and the cognitive style of the professional programmer, the end product (Information Systems) should be of a higher quality. Two laboratory experiments were conducted. The first experiment was with professional Software Developers; the second one was with students. The dependant variables considered in this study were the number of semantic errors and the time required to complete a design task for conditional logic. The independent variables were the cognitive style of the subject, the complexity of the task, and the detail design tools. Decision trees, flowcharts and pseudocode were used as detailed design tools. Field dependence was the only dimension of cognitive style that was tested.
Contributing Partner: UNT Libraries
An Empirical Investigation of Psychophysiological Characteristics and Psychological Variables in Information Systems Human Factors Research

An Empirical Investigation of Psychophysiological Characteristics and Psychological Variables in Information Systems Human Factors Research

Date: December 1989
Creator: Corman, Lawrence S. (Lawrence Sanger)
Description: The purpose of this study was to test the comparability of several psychological instruments commonly used in Information Systems (IS) cognitive style research. The objective was to determine the limitations of: existing instruments in IS cognitive style research. The motivation for this research was the inconclusive findings reported in IS human information processing research. The study used a repeated measures design. Each individual completed the following cognitive style and personality instruments; the Myers-Briggs Type Indicator, the Group Embedded-figures Test, the Learning Style Inventory, the Human Information Processing Survey, and the Torrance Tests of Creative Thinking (Figural Form A). The individual also completed a dichotic listening and tachistoscope task. Data was collected from business administration, BCIS, liberal arts majors, and IS professionals. The results of this study indicate IS researchers need to consider several factors in the use of these instruments. A direct relationship exists between cognitive ability and results on the GEFT. Cognitive ability should be considered a moderating variable in interpreting the results of the GEFT. Also, the hypothesis that the GEFT is a surrogate for analytical and low-analytical abilities is not supported by this study. Other reported results include the inappropriateness of using the TTCT with adult populations. ...
Contributing Partner: UNT Libraries
Empirical Research of Decision-making Effectiveness When Using Differing Presentation Formats Under Varying Decision Tasks

Empirical Research of Decision-making Effectiveness When Using Differing Presentation Formats Under Varying Decision Tasks

Date: December 1988
Creator: Hard, Nancy J. (Nancy Jean)
Description: The purpose of this research was to determine if presentation format, given a particular task to be performed, would affect the decision-making process of financial decision makers. The problem motivating this study is the potential for managers to make inefficient decisions when they use reports which are presented inappropriately for a given task.
Contributing Partner: UNT Libraries
Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Date: August 2013
Creator: Harden, Gina
Description: Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organizations trying to reap potential benefits of enterprise social software (ESS) must successfully implement and maintain ESS tools. This research develops a framework for assessing knowledge sharing based on reciprocal determinism theory and augmented with technology acceptance, sociological, and psychological factors. Semi-structured interviews with IT professionals, followed by a written survey of employees using ESS are used to collect data. The hermeneutic circle methodology is used to analyze the interview transcripts and structural equation modeling is used to analyze the survey data. Results show technological advantage has no significant effect on the intention to share knowledge, but community cohesiveness and individual willingness significantly affect knowledge sharing intention and behavior. The study offers a synthesized model of variables affecting knowledge sharing as well as a better understanding of best practices for organizations to consider when implementing ...
Contributing Partner: UNT Libraries
An Examination of Electronic Commerce and the Internet : Role of Technology, Critical Success Factors and Business Strategy

An Examination of Electronic Commerce and the Internet : Role of Technology, Critical Success Factors and Business Strategy

Date: December 1997
Creator: Tabor, Sharon W.
Description: This research employed the case study methodology to examine the issues, challenges, and project lessons learned for a large firm engaged in electronic commerce on the Internet.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 NEXT LAST