Search Results

open access

Accessing the Power of Aesthetics in Human-computer Interaction

Description: In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency ch… more
Date: August 2013
Creator: Chenyan, Xu
open access

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Description: Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of… more
Date: August 2010
Creator: Işik, Öykü
open access

Business/it Alignment: the Impact of Incentive Plans on the Development of Shared Vision

Description: This study, utilizing Preston and Karahanna’s framework for shared vision development and Agency Theory, explores the impact of vision development factors and factors associated with incentive plans on shared vision and alignment. Results of the study confirm the strong relationship between shared vision and alignment, and indicate that having an effective management team is important with respect to developing and maintaining shared vision and alignment within the organization. Several vis… more
Date: December 2014
Creator: Johnson, Vess L.
open access

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

Description: The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the co… more
Date: August 2016
Creator: Sullivan, Yulia
open access

Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance

Description: Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual de… more
Date: August 2016
Creator: Gerhart, Natalie
open access

Design for Social Presence and Exploring Its Mediating Effect in Mobile Data Communication Services

Description: The mobility, flexibility, convenience, and ubiquity of mobile data services (MDS) have contributed to their enormous growth and popularity with users. MDS allow users to communicate through mobile texting (mTexting), mobile Instant Messaging (mIM), multimedia messaging services (MMS), and email. A unique feature of MDS that enhances its popularity among its users is the awareness capability, which is revolutionizing the way MDS is being used to communicate today. It allows potential communicat… more
Date: May 2011
Creator: Ogara, Solomon Omondi
open access

Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals

Description: Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), wh… more
Date: August 2015
Creator: Negahban, Arash
open access

The Effect of It Process Support, Process Visualization and Process Characteristics on Process Outcomes

Description: Business process re-engineering (part of the Business Process Management domain) is among the top three concerns of Information Technology (IT) leaders and is deemed to be one of many important IT leveraging opportunities. Two major challenges have been identified in relation to BPM and the use of IT. The first challenge is related to involving business process participants in process improvement initiatives using BPM systems. BPM technologies are considered to be primarily targeted for develop… more
Date: December 2013
Creator: Al Beayeyz, Alaa
open access

Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Description: Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organi… more
Date: August 2013
Creator: Harden, Gina
open access

Exploring Critical Factors in Predicting Post-Adoptive Use of Facebook

Description: Social networking applications (SNAs) have experienced a boom in popularity in recent years. Sites like Facebook and MySpace continuously draw new users, and are successful in organizing groups of users around topics of common interest. Among SNAs, Facebook has demonstrably outgrown its rivals growing an estimated 157 percent from 2008 to 2009. Facebook is now estimated to be the fourth largest Internet site in the world, trailing only Google, Microsoft and Yahoo (Schonfeld 2009). This dissert… more
Date: May 2011
Creator: Magro, Michael J.
open access

Factors Influencing BI Data Collection Strategies: An Empirical Investigation

Description: The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top… more
Date: August 2010
Creator: Ramakrishnan, Thiagarajan
open access

Factors Influencing Post-adoptive Enterprise Resource Planning (ERP) Utilization

Description: Organizations expend a great deal of time, effort and money on the implementation of enterprise resource planning (ERP) systems. They are considered the price of entry for large organizations to do business. Yet the success rate of ERP systems is poor. IS literature suggests that one possible reason for this is the underutilization of these systems. Existing ERP literature is replete with research to improve ERP project implementation success; however, notably absent from these streams is the r… more
Date: August 2011
Creator: McGinnis, Thomas C.
open access

The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective

Description: This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplement… more
Date: August 2014
Creator: Hanus, Bartlomiej T.
open access

The Influence of Business Intelligence Components on the Quality of Decision Making

Description: Decision makers require the right information at the right time, in the right place and in the right format so that they can make good decisions. Although business intelligence (BI) has the potential to improve decision making, there is little empirical evidence of how well this has been achieved. The purpose of this dissertation is to examine the quality of decisions made using BI. The research question it addresses is what are the key antecedents of decision quality for users of business inte… more
Date: May 2013
Creator: Visinescu, Lucian L.
open access

An Investigation of Factors Influencing the User's Social Network Site Continuance Intention

Description: The social network sites (SNS) industry has recently shown an abnormal development pattern: An SNS could rapidly accumulate a large number of users, and then suffer a serious loss of users in a short time, which subsequently leads to the failure of the Web site in the highly competitive market. The user's social network site continuance is considered the most important factor for an SNS to keep its sustainable development. However, little knowledge of the user's SNS continuance raises the follo… more
Date: December 2012
Creator: Han, Bo
open access

Organizational Competency Through Information: Business Intelligence and Analytics as a Tool for Process Dynamization

Description: The data produced and collected by organizations represents both challenges and opportunities for the modern firm. Business intelligence and analytics (BI&A) comprises a wide variety of information management technologies and information seeking activities designed to exploit these information resources. As a result, BI&A has been heralded as a source of improved organizational outcomes in both the academic and practitioner literature, and these technologies are among the largest continuous I… more
Date: August 2015
Creator: Torres, Russell
open access

The Relationship Between Data Visualization and Task Performance

Description: We are entering an era of business intelligence and big data where simple tables and other traditional means of data display cannot deal with the vast amounts of data required to meet the decision-making needs of businesses and their clients. Graphical figures constructed with modern visualization software can convey more information than a table because there is a limit to the table size that is visually usable. Contemporary decision performance is influenced by the task domain, the user exp… more
Date: December 2014
Creator: Phillips, Brandon
open access

A Study of the Intent to Fully Utilize Electronic Personal Health Records in the Context of Privacy and Trust

Description: Government initiatives called for electronic health records for each individual healthcare consumer by 2014. the purpose of the initiatives is to provide for the common exchange of clinical information between healthcare consumers, healthcare providers, third-party payers and public healthcare officials.This exchange of healthcare information will impact the healthcare industry and enable more effective and efficient application of healthcare so that there may be a decrease in medical errors, i… more
Date: May 2012
Creator: Richards, Rhonda J.
open access

Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps

Description: The increasing demand for mobile apps is out the current capability of mobile app developers. In addition, the growing trend in smartphone ownership and the time people spend on mobile apps has raised several opportunities and risks for users and developers. The average time everyday a user spend on smartphones to use mobile apps is more than two hours. The worldwide mobile app revenue increase is estimated to grow 33%, $19 billion. Three quarter of the time used on mobile apps is solely for us… more
Date: August 2016
Creator: Koohikamali, Mehrdad
open access

Three Essays on Social Media: the Effect of Motivation, Participation, and Sentiment on Performance

Description: In recent years, social media has experienced tremendous growth in the number of users. Facebook alone has more than 1.3 billion active users and Twitter has attracted over 600 million active users. Social media has significantly changed the way humans communicate. Many people use social media to keep in touch with family and friends and receive up-to-date information about what happens around the world. Politicians are using social media to support their campaigns. Use of social media is not r… more
Date: August 2015
Creator: Salehan, Mohammad
open access

Three Research Essays on Online Users' Concerns and Web Assurance Mechanisms

Description: Online users struggle with different concerns whenever they use information systems. According to Miyazaki and Fernandez (2001), there are three important categories of concerns for online users: privacy concern, third party fraudulent behavior concern ("system security"), and online website fraudulent behavior concern ("security"). Kim, Sivasailam, and Rao (2004) proposed a similar categorization for web assurance dimensions. They argue that online websites are supposed to address users' priv… more
Date: August 2016
Creator: Mousavizadeh Kashipaz, Seyed Mohammadreza
Back to Top of Screen