You limited your search to:

  Partner: UNT Libraries
 Department: Department of Information Technology and Decision Sciences
 Degree Level: Doctoral
 Collection: UNT Theses and Dissertations
Accessing the Power of Aesthetics in Human-computer Interaction

Accessing the Power of Aesthetics in Human-computer Interaction

Date: August 2013
Creator: Chenyan, Xu
Description: In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency characteristics, are critical concerns of designers. This view contends that visual design enhances system use. Thus, this work examines the effects of visual design on computer systems. Visual design exerts its influence on systems through two mechanisms: it evokes affective responses from IT users, such as arousal and pleasure and it influences individuals’ cognitive assessments of systems. Given that both affective and cognitive reactions are significant antecedents of user behaviors in the IT realm, it is no surprise that visual design plays a critical role in information system success. Human-computer-interaction literature indicates that visual aesthetics positively influences such information success factors as usability, online trust, user satisfaction, flow experience, and so on. Although academic research has introduced visual design into the Information Systems (IS) ...
Contributing Partner: UNT Libraries
Accuracy and Interpretability Testing of Text Mining Methods

Accuracy and Interpretability Testing of Text Mining Methods

Date: August 2013
Creator: Ashton, Triss A.
Description: Extracting meaningful information from large collections of text data is problematic because of the sheer size of the database. However, automated analytic methods capable of processing such data have emerged. These methods, collectively called text mining first began to appear in 1988. A number of additional text mining methods quickly developed in independent research silos with each based on unique mathematical algorithms. How good each of these methods are at analyzing text is unclear. Method development typically evolves from some research silo centric requirement with the success of the method measured by a custom requirement-based metric. Results of the new method are then compared to another method that was similarly developed. The proposed research introduces an experimentally designed testing method to text mining that eliminates research silo bias and simultaneously evaluates methods from all of the major context-region text mining method families. The proposed research method follows a random block factorial design with two treatments consisting of three and five levels (RBF-35) with repeated measures. Contribution of the research is threefold. First, the users perceived a difference in the effectiveness of the various methods. Second, while still not clear, there are characteristics with in the text collection that affect the ...
Contributing Partner: UNT Libraries
Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Date: August 2010
Creator: Işik, Öykü
Description: Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of BI capabilities on BI success, in the presence of different decision environments. The decision environment is a composition of the decision types and the way the required information is processed to aid in decision making. BI capabilities are defined as critical functionalities that help an organization improve its performance, and they are examined in terms of organizational and technological capabilities. An online survey is used to obtain the data and partial least squares path modeling (PLS) is used for analysis. The results of this dissertation suggest that all technological capabilities as well as one of the organizational capabilities, flexibility, significantly impact BI success. Results also indicate that the moderating effect of decision environment is significant for quantitative data quality. These ...
Contributing Partner: UNT Libraries
Business/it Alignment: the Impact of Incentive Plans on the Development of Shared Vision

Business/it Alignment: the Impact of Incentive Plans on the Development of Shared Vision

Access: Use of this item is restricted to the UNT Community.
Date: December 2014
Creator: Johnson, Vess L.
Description: This study, utilizing Preston and Karahanna’s framework for shared vision development and Agency Theory, explores the impact of vision development factors and factors associated with incentive plans on shared vision and alignment. Results of the study confirm the strong relationship between shared vision and alignment, and indicate that having an effective management team is important with respect to developing and maintaining shared vision and alignment within the organization. Several vision development factors such as using the language of the business, participation on the top management team (TMT), and having knowledge of the business impact shared vision through their influence on teamwork. Also, results of this study suggest that participation on the TMT by the CIO/IT leader is more important than the individual’s position in the organizational hierarchy. In addition, attributes associated with incentive plans such as achievable and clear measures, measures linked to organizational goals, measures that align the interests of the individual with those of the organization, regular plan reviews, and using a balanced scorecard approach with respect to incentive plan design positively impact teamwork and shared vision. For practitioners, this highlights the importance of incentive plans as powerful tools that can be used to reinforce shared vision, effective ...
Contributing Partner: UNT Libraries
Comparing Latent Dirichlet Allocation and Latent Semantic Analysis as Classifiers

Comparing Latent Dirichlet Allocation and Latent Semantic Analysis as Classifiers

Date: December 2011
Creator: Anaya, Leticia H.
Description: In the Information Age, a proliferation of unstructured text electronic documents exists. Processing these documents by humans is a daunting task as humans have limited cognitive abilities for processing large volumes of documents that can often be extremely lengthy. To address this problem, text data computer algorithms are being developed. Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are two text data computer algorithms that have received much attention individually in the text data literature for topic extraction studies but not for document classification nor for comparison studies. Since classification is considered an important human function and has been studied in the areas of cognitive science and information science, in this dissertation a research study was performed to compare LDA, LSA and humans as document classifiers. The research questions posed in this study are: R1: How accurate is LDA and LSA in classifying documents in a corpus of textual data over a known set of topics? R2: How accurate are humans in performing the same classification task? R3: How does LDA classification performance compare to LSA classification performance? To address these questions, a classification study involving human subjects was designed where humans were asked to generate and classify documents ...
Contributing Partner: UNT Libraries
Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Date: August 2013
Creator: Harden, Gina
Description: Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organizations trying to reap potential benefits of enterprise social software (ESS) must successfully implement and maintain ESS tools. This research develops a framework for assessing knowledge sharing based on reciprocal determinism theory and augmented with technology acceptance, sociological, and psychological factors. Semi-structured interviews with IT professionals, followed by a written survey of employees using ESS are used to collect data. The hermeneutic circle methodology is used to analyze the interview transcripts and structural equation modeling is used to analyze the survey data. Results show technological advantage has no significant effect on the intention to share knowledge, but community cohesiveness and individual willingness significantly affect knowledge sharing intention and behavior. The study offers a synthesized model of variables affecting knowledge sharing as well as a better understanding of best practices for organizations to consider when implementing ...
Contributing Partner: UNT Libraries
Factors Influencing BI Data Collection Strategies: An Empirical Investigation

Factors Influencing BI Data Collection Strategies: An Empirical Investigation

Date: August 2010
Creator: Ramakrishnan, Thiagarajan
Description: The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top level managers involved in developing and managing BI. Data was collected from a range of industries and organizations within the United States. An online survey was used to collect the data to empirically test the proposed relationships. Data was analyzed using partial least square path modeling (PLS). The results of this study suggest that there exists a positive relationship between institutional isomorphism and BI consistency. The results also indicate that there exists a positive relationship between BI consistency and BI comprehensive data collection strategy, and the organizational transformation attribute of BI and BI comprehensive data collection strategy. These findings provide a theoretical lens to better understand the motivators and the success factors related to collecting the huge amounts of data required for BI. This study also provides managers with ...
Contributing Partner: UNT Libraries
Impact of Forecasting Method Selection and Information Sharing on Supply Chain Performance.

Impact of Forecasting Method Selection and Information Sharing on Supply Chain Performance.

Access: Use of this item is restricted to the UNT Community.
Date: December 2009
Creator: Pan, Youqin
Description: Effective supply chain management gains much attention from industry and academia because it helps firms across a supply chain to reduce cost and improve customer service level efficiently. Focusing on one of the key challenges of the supply chains, namely, demand uncertainty, this dissertation extends the work of Zhao, Xie, and Leung so as to examine the effects of forecasting method selection coupled with information sharing on supply chain performance in a dynamic business environment. The results of this study showed that under various scenarios, advanced forecasting methods such as neural network and GARCH models play a more significant role when capacity tightness increases and is more important to the retailers than to the supplier under certain circumstances in terms of supply chain costs. Thus, advanced forecasting models should be promoted in supply chain management. However, this study also demonstrated that forecasting methods not capable of modeling features of certain demand patterns significantly impact a supply chain's performance. That is, a forecasting method misspecified for characteristics of the demand pattern usually results in higher supply chain costs. Thus, in practice, supply chain managers should be cognizant of the cost impact of selecting commonly used traditional forecasting methods, such as moving ...
Contributing Partner: UNT Libraries
The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective

The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective

Date: August 2014
Creator: Hanus, Bartlomiej T.
Description: This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed in two stages. First, the participants (employees of a municipality) are exposed to a series of phishing and spear-phishing messages to assess if there are any common characteristics shared by the phishing victims. The differences between the phished and the not phished group are assessed through multiple discriminant analysis. Second, the same individuals are asked to participate in a survey designed to examine their security awareness. The research model is tested using PLS-SEM approach. The results indicate that security awareness is in fact a second-order formative construct composed of six components. There are significant differences in security awareness levels between the victims of the phishing experiment and the employees who maintain compliance with security policies. The study extends the theory by ...
Contributing Partner: UNT Libraries
The Impact of IT Capability on Employee Capability, Customer Value, Customer Satisfaction, and Business Performance

The Impact of IT Capability on Employee Capability, Customer Value, Customer Satisfaction, and Business Performance

Date: August 2009
Creator: Chae, Ho-Chang
Description: This study empirically examines the impact of IT capability on firms' performance and evaluates whether firms' IT capabilities play a role in improving employee capability, customer value, customer satisfaction, and ultimately business performance. The results were based on comparing the business performance of the IT leader companies with that of control companies of similar size and industry. The IT leader companies were selected from the Information Week 500 list published annually from 2001 to 2004. For a company to be selected as IT leaders, it needed to be listed at least twice during the period. Furthermore, it had to be listed in the American Customer Satisfaction Index (ACSI) so that its customer satisfaction level could be assessed. Standard & Poor's Compustat and the ACSI scores were used to test for changes in business performance. The study found that the IT leaders had a raw material cost measured by cost-of-goods-sold to sales ratio (COGS/S) than the control companies. However, it found no evidence that firms' IT capability affects employee capability, customer value, customer satisfaction, and profit. An important implication from this study is that IT becomes a commodity and an attempt to gain a competitive advantage by overinvesting in IT may ...
Contributing Partner: UNT Libraries
FIRST PREV 1 2 NEXT LAST