Search Results

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications
The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the consequences of mind wandering in a technological setting is imperative because mind wandering plays a vital role in influencing various outcomes associated with technology use and/or technology learning, such as technology anxiety, software self-efficacy, and task performance. This dissertation is composed of three essays which examine the determinants and consequences of mind wandering and focus of attention on a number of emotional and cognitive outcomes. A multi-method approach (i.e., online survey and laboratory experiment) across three essays is used to test the research models. Essay 1 focuses on developing the measurement items and estimating the impact of mind wandering on users' emotional outcomes (i.e., technology anxiety and users' satisfaction). Drawing upon the content regulation hypothesis of mind wandering, the content of thoughts are differentiated into two categories—technology-related thought (herein IT) and non-technology related thought (herein non-IT). The results show that whereas mind wandering (non-IT) is a major determinant of technology anxiety, focus of attention (IT) is the main predictor of users' satisfaction. Essay 2 focuses on the effect of mind wandering and focus of attention in the IS learning context. The study begins by exploring the hypotheses concerning the roles of executive functions (i.e., inhibition, switching, and working memory) and task complexity in influencing the occurrence of mind wandering and focus of attention, and in turn, cognitive outcomes (i.e., software self-efficacy and …
Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps
The increasing demand for mobile apps is out the current capability of mobile app developers. In addition, the growing trend in smartphone ownership and the time people spend on mobile apps has raised several opportunities and risks for users and developers. The average time everyday a user spend on smartphones to use mobile apps is more than two hours. The worldwide mobile app revenue increase is estimated to grow 33%, $19 billion. Three quarter of the time used on mobile apps is solely for using game and social networking apps. To provide more customized services and function to users, mobile apps need to access to personal information. However, 80% of mobile apps put people's information privacy at risk. There is a major gap in the literature about the privacy concerns of mobile device users in the context of mobile apps. This dissertation addresses one fundamental research question: how does individuals' privacy change in the context of mobile apps? More precisely, the focus of this dissertation is on information privacy role in individuals' and mobile app developers' protective behaviors. We investigate the information sensitivity level influence on mobile app developers' emphasis on privacy across mobile app categories. The results show information sensitivity level has a significant impact on developers' emphasis on secondary usage of information. Moreover, we analyze the privacy trade-off dynamism in using a new social networking app and how it could result in emotional attachment. Results show initial use and initial disclosure influence the privacy trade-off from pre-use to initial-use period. Finally, the effect of privacy concern and engagement on emotional attachment is demonstrated. This dissertation addresses one fundamental research question: how does individuals' privacy change in the context of mobile apps? More precisely, the focus of this dissertation is on information privacy role in individuals' and mobile app …
Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance
Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual decision makers, in different decision contexts, determine when to stop collecting information given the availability of virtually unlimited information. Decision makers must make an ultimate decision, but also must make a decision that he or she has enough information to make the final decision (Browne, Pitts, & Wetherbe, 2007). In determining how much information to collect, researchers found that people engage in ‘satisficing' in order to make decisions, particularly when there is more information than it is possible to manage (Simon, 1957). A more recent elucidation of information use relies on the idea of stopping rules, identifying five common stopping rules information seekers use: mental list, representational stability, difference threshold, magnitude threshold, and single criterion (Browne et al., 2007). Prior research indicates a lack of understanding in the areas of information use (Prabha, Connaway, Olszewski, & Jenkins, 2007) and information overload (Eppler & Mengis, 2004) in Information Systems literature. Moreover, research indicates a lack of clarity in what information should be used in different decision contexts (Kowalczyk & Buxmann, 2014). The increase in the availability of information further complicates and necessitates research in this area. This dissertation seeks to fill these gaps in the literature by determining how information use changes across decision contexts and the relationships between stopping rules. Two unique methodologies were used to test the hypotheses in the conceptual …
Three Research Essays on Online Users' Concerns and Web Assurance Mechanisms
Online users struggle with different concerns whenever they use information systems. According to Miyazaki and Fernandez (2001), there are three important categories of concerns for online users: privacy concern, third party fraudulent behavior concern ("system security"), and online website fraudulent behavior concern ("security"). Kim, Sivasailam, and Rao (2004) proposed a similar categorization for web assurance dimensions. They argue that online websites are supposed to address users' privacy, security, and business integrity concerns to decrease user concerns. Although several researchers tried to answer how different factors affect these concerns and how these concerns affect users' behavior, there are so many ambiguities and contradictions in this area. This Essay I in this work develops a comprehensive map of the role of online privacy concern to identify related factors and categorize them through an in-depth literature review and conducting meta-analysis on online privacy concern. Although users have concerns about their privacy and security, there is still growth in the number of internet users and electronic commerce market share. One possible reason is that websites are applying assurance mechanisms to ensure the privacy of their users. Therefore, it could be an interesting research topic to investigate how privacy assurance mechanisms affect users concern and, consequently, their behavior in different concerns such as e-commerce and social networking sites. Different types of web assurance mechanisms are used by websites. The most prevalent among these assurance mechanisms include web assurance seals and assurance statements and privacy customization features. Essay II and III aims to address how these mechanisms influence e-commerce and social networking sites users' behavior. Essay II applies the procedural fairness theory by Lind and Tyler (1988) to explain how and why the web assurance mechanisms affect consumers' perceived risks. Essay III addresses the issue of self-disclosure on social networking sites. Applying protection motivation theory, this …
Three Essays on Social Media: the Effect of Motivation, Participation, and Sentiment on Performance
In recent years, social media has experienced tremendous growth in the number of users. Facebook alone has more than 1.3 billion active users and Twitter has attracted over 600 million active users. Social media has significantly changed the way humans communicate. Many people use social media to keep in touch with family and friends and receive up-to-date information about what happens around the world. Politicians are using social media to support their campaigns. Use of social media is not restricted to individuals and politicians. Businesses are now using social media to promote their products and services. Many companies maintain Facebook and Twitter accounts to keep in touch with their customers. Consumers also use social media to receive information about products/services. Online product reviews are now an important source of information for consumers. This dissertation aims to address one fundamental research question: how do individual differences among users lead to different levels of performance on social media? More specifically, this dissertation investigates the motivations of use and the predictors of performance in the context of social media. We utilize sentiment mining to predict performance in different types of social media including information diffusion in Twitter and helpfulness and readership of online consumer reviews. The results show how different motivations lead to different levels of participation in social media and level of participation consequently influences performance. We also find that sentiment of the messages posted on social media significantly influence their performance.
Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals
Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), which allows employees to connect their personal devices to corporate networks. BYOD is identified as one of the top ten technology trends in 2014 that can multiply the size of mobile workforce in organizations. However, it can also serve as a vehicle that transfers cyber security threats associated with personal mobile devices to the organizations. As BYOD opens the floodgates of various device types and platforms into organizations, identifying different sources of cyber security threats becomes indispensable. So far, there are no studies that investigated how user, device and usage characteristics affect individuals’ protective and risky IT behaviors. The goal of this dissertation is to expand the current literature in IS security by accounting for the roles of user, device, and usage characteristics in protective and risky IT behaviors of individuals. In this study, we extend the protection motivation theory by conceptualizing and measuring the risky IT behaviors of individuals and investigating how user, device, and usage characteristics along with the traditional protection motivation factors, influence individuals’ protective and risky IT behaviors. We collected data using an online survey. The results of our study show that individuals tend to engage in different levels of protective and risky IT behaviors on different types of devices. We also found that certain individual characteristics as well as the variety of applications that individuals use on their …
Organizational Competency Through Information: Business Intelligence and Analytics as a Tool for Process Dynamization
The data produced and collected by organizations represents both challenges and opportunities for the modern firm. Business intelligence and analytics (BI&A) comprises a wide variety of information management technologies and information seeking activities designed to exploit these information resources. As a result, BI&A has been heralded as a source of improved organizational outcomes in both the academic and practitioner literature, and these technologies are among the largest continuous IT expenditures made over the last decade.Despite the interest in BI&A, there is not enough theorizing about its role in improving firm performance. Scholarly investigations of the link between BI&A and organizational benefits are scarce and primarily exploratory in nature. Further, the majority of the extant research on BI&A is techno-centric, conceptualizing BI&A primarily an organizational technical asset. This study seeks to explicate the relationship between BI&A and improved organizational outcomes by viewing this phenomenon through the lens of dynamic capabilities, a promising theoretical perspective from the strategic management discipline. In so doing, this research reframes BI&A as an organizational capability, rather than simply a technical resource. Guided by a comprehensive review of the BI&A and dynamic capabilities literature, as well as a series of semi-structured focus groups with senior-level business practitioners with BI&A experience, this study develops and tests a model of BI&A enabled firm performance. Using a snowball sample, an online survey was administered to 137 business professionals in 24 industries. The data were analyzed using partial least squares (PLS) structural equation modeling (SEM). The findings support the contention that BI&A serve as the sensing and seizing components of an organizational dynamic capability, while transformation is achieved through business process change capability. These factors influence firm financial performance through their impact on the functional performance of the firm’s business processes. Further, this study demonstrates that traditional BI&A success factors are …
The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective
This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed in two stages. First, the participants (employees of a municipality) are exposed to a series of phishing and spear-phishing messages to assess if there are any common characteristics shared by the phishing victims. The differences between the phished and the not phished group are assessed through multiple discriminant analysis. Second, the same individuals are asked to participate in a survey designed to examine their security awareness. The research model is tested using PLS-SEM approach. The results indicate that security awareness is in fact a second-order formative construct composed of six components. There are significant differences in security awareness levels between the victims of the phishing experiment and the employees who maintain compliance with security policies. The study extends the theory by proposing and validating a universal definition of security awareness. It provides practitioners with an instrument to examine awareness in a plethora of settings and design customized security training activities.
The Relationship Between Data Visualization and Task Performance
We are entering an era of business intelligence and big data where simple tables and other traditional means of data display cannot deal with the vast amounts of data required to meet the decision-making needs of businesses and their clients. Graphical figures constructed with modern visualization software can convey more information than a table because there is a limit to the table size that is visually usable. Contemporary decision performance is influenced by the task domain, the user experience, and the visualizations themselves. Utilizing data visualization in task performance to aid in decision making is a complex process. We develop and test a decision-making framework to examine task performance in a visual and non-visual aided decision-making by using three experiments to test this framework. Studies 1 and 2 investigate DV formats and how complexity and design affects the proposed visual decision making framework. The studies also examine how DV formats affect task performance, as measured by accuracy and timeliness, and format preference. Additionally, these studies examine how DV formats influence the constructs in the proposed decision making framework which include information usefulness, decision confidence, cognitive load, visual aesthetics, information seeking intention, and emotion. Preliminary findings indicate that graphical DV allows individuals to respond faster and more accurately, resulting in improved task fit and performance. Anticipated implications of this research are as follows. Visualizations are independent of the size of the data set but can be increasingly complex as the data complexity increases. Furthermore, well designed visualizations let you see through the complexity and simultaneously mine the complexity with drill down technologies such as OLAP.
Business/it Alignment: the Impact of Incentive Plans on the Development of Shared Vision
This study, utilizing Preston and Karahanna’s framework for shared vision development and Agency Theory, explores the impact of vision development factors and factors associated with incentive plans on shared vision and alignment. Results of the study confirm the strong relationship between shared vision and alignment, and indicate that having an effective management team is important with respect to developing and maintaining shared vision and alignment within the organization. Several vision development factors such as using the language of the business, participation on the top management team (TMT), and having knowledge of the business impact shared vision through their influence on teamwork. Also, results of this study suggest that participation on the TMT by the CIO/IT leader is more important than the individual’s position in the organizational hierarchy. In addition, attributes associated with incentive plans such as achievable and clear measures, measures linked to organizational goals, measures that align the interests of the individual with those of the organization, regular plan reviews, and using a balanced scorecard approach with respect to incentive plan design positively impact teamwork and shared vision. For practitioners, this highlights the importance of incentive plans as powerful tools that can be used to reinforce shared vision, effective teamwork, and alignment within the organization. Also, the CIO/IT leader needs to be knowledgeable of the business and must fill the role of both a technologist as well as an enterprise leader. This person must be an evangelist communicating the value and benefits of IT to the rest of the organization.
Accessing the Power of Aesthetics in Human-computer Interaction
In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency characteristics, are critical concerns of designers. This view contends that visual design enhances system use. Thus, this work examines the effects of visual design on computer systems. Visual design exerts its influence on systems through two mechanisms: it evokes affective responses from IT users, such as arousal and pleasure and it influences individuals’ cognitive assessments of systems. Given that both affective and cognitive reactions are significant antecedents of user behaviors in the IT realm, it is no surprise that visual design plays a critical role in information system success. Human-computer-interaction literature indicates that visual aesthetics positively influences such information success factors as usability, online trust, user satisfaction, flow experience, and so on. Although academic research has introduced visual design into the Information Systems (IS) field and validated its effects, visual design is still very limited in three contexts: product aesthetics in e-commerce, mobile applications and commercial emails. This dissertation presents three studies to help fill these theoretical gaps respectively.
The Effect of It Process Support, Process Visualization and Process Characteristics on Process Outcomes
Business process re-engineering (part of the Business Process Management domain) is among the top three concerns of Information Technology (IT) leaders and is deemed to be one of many important IT leveraging opportunities. Two major challenges have been identified in relation to BPM and the use of IT. The first challenge is related to involving business process participants in process improvement initiatives using BPM systems. BPM technologies are considered to be primarily targeted for developers and not BPM users, and the need to engage process participants into process improvement initiatives is not addressed, contributing to the business-IT gap. The second challenge is related to potential de-skilling of knowledge workers when knowledge-intensive processes are automated and process knowledge resides in IT, rather than human process participants. The two identified challenges are not separate issues. Process participants need to be knowledgeable about the process in order to actively contribute to BPM initiatives, and the loss of process knowledge as a result of passive use of automated systems may further threaten their participation in process improvement. In response to the call for more research on the individual impacts of business process initiatives, the purpose of this dissertation study is to understand the relationship between IT configurations (particularly process support and process visualization), process characteristics and individual level process outcomes, such as task performance and process knowledge. In the development of the research model we rely on organizational knowledge creation literature and scaffolding in Vygotsky’s Zone of Proximal Development, business process modeling and workflow automation research, as well as research on the influence of IT on individual performance. The theoretical model is tested empirically in experimental settings using a series of two studies. In both studies participants were asked to complete tasks as part of a business process using different versions of a mock-up …
An Investigation of the Value of Color in Hard Copy Output
The objectives of this research were to: (1) augment existing research regarding the impact of information retention resulting from the application of redundant color codes; and (2) determine whether the application of color in hard-copy documents has a positive influence in business reports by non-color deficient subjects. This research was an extension of work done by Lamberski and Dwyer (1983) and Moore and Dwyer (1991). Both studies were hard copy based and focused on the impact of information retention resulting from the application of redundant color codes.
A Case Study of an Information System Developed to Generate Competitive Advantage
The purpose of this study was to examine the effect of information technology (IT) on the competitive position of a firm. The problem motivating this study is the potential for misallocation of scarce resources on new technology without realizing the level of competitive advantage (CA) expected. This study was a single-site case study. It examined the factors related to the selection, design, development, implementation, use, and effects of an information system (IS) intended to generate CA. The study examined all these factors within the organizational and industrial contexts of the subject firm.
Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information
The objective of this research is the investigation of the patterns of information growth to test whether there has been an "information explosion." To tackle the main problem, there are three issues which need to be addressed: (1) the concept of information dimensionality; (2) determination of common parameters to measure the amount of information within each dimension; and (3) a working definition of "explosiveness. "
Communication Quality in Information Systems Development: The Effect of Computer-Mediated Communication on Task-Oriented Problem Solving
The problem motivating this research is that ineffective communication may hamper systems development efforts. Specifically germane to this study are development efforts characterized as task-oriented, and which require information-sharing and problem-solving activities. This research problem motivated an analysis of the communication process and lead to the development of a temporal framework that delineates variables associated with task-oriented, end user/systems analyst communication interactions. Several variables within this framework are depicted in two theoretical models. The first model shows the theoretical relationship between an independent variable, communication mode (represented by asynchronous computer conferencing and face-to-face conferencing), and five dependent variables: (1) the amount of information shared, (2) the significance of the information shared, (3) the comprehensiveness of the information shared, (4) the perception of progress toward the goal, and (5) the perception of freedom to participate. The second model depicts the assumed interaction between communication mode, the five variables cited above (now acting as independent variables), and a dependent variable, communication quality. There are two theoretical components of communication quality: (1) deviation from an optimal set of user requirements, and (2) the degree of convergence (unity based on mutual understanding and mutual agreement) emanating from a communication interaction. Using the theoretical models as a guide, an experiment was designed and performed to test the relationships among the variables. The experimental results led to the rejection of all null hypotheses; the results strongly favored face-to-face conferencing for solving task-oriented, information-sharing problems analagous to the case used in the present study. The findings indicate that asynchronous computer conferencing may have a detrimental effect on the thoroughness of information exchange, on the relevance of the information shared in terms of making the correct decision, and on the completeness of the consideration given to all problem dimensions.
An Empirical Investigation of Psychophysiological Characteristics and Psychological Variables in Information Systems Human Factors Research
The purpose of this study was to test the comparability of several psychological instruments commonly used in Information Systems (IS) cognitive style research. The objective was to determine the limitations of: existing instruments in IS cognitive style research. The motivation for this research was the inconclusive findings reported in IS human information processing research. The study used a repeated measures design. Each individual completed the following cognitive style and personality instruments; the Myers-Briggs Type Indicator, the Group Embedded-figures Test, the Learning Style Inventory, the Human Information Processing Survey, and the Torrance Tests of Creative Thinking (Figural Form A). The individual also completed a dichotic listening and tachistoscope task. Data was collected from business administration, BCIS, liberal arts majors, and IS professionals. The results of this study indicate IS researchers need to consider several factors in the use of these instruments. A direct relationship exists between cognitive ability and results on the GEFT. Cognitive ability should be considered a moderating variable in interpreting the results of the GEFT. Also, the hypothesis that the GEFT is a surrogate for analytical and low-analytical abilities is not supported by this study. Other reported results include the inappropriateness of using the TTCT with adult populations. Also, the MBTI appears to be an appropriate instrument for measuring cognitive styles in IS research. This study reported that gender is a moderating factor on the classification of MBTI types in that gender is not evenly divided among feeling and thinking types. This study reported no relationships between the cognitive style and personality instruments with the physiological measurements. The validity of the physiological measurements could be the underlying factor for not reporting any significant relationships. IS researchers will benefit from this study through an improved understanding of the appropriateness and applicability of these instruments. This benefits research through the …
Impacts of Personality Type and Computer System Response Time on Anxiety and User Response Time
The purpose of this research was to determine if personality type and system response time have any effect on state anxiety and user response time. The sample for this study consisted of senior and graduate level college students who possessed basic know 1 edge of a text editor. Each test subject was administered the Jenkins Activity Survey to determine scores for Type A versus Type B, speed and impatience, involvement, and competitiveness. The test subjects were randomly assigned to one of three treatment groups (good, variable, and poor system response time). They were required to edit a text file which contained multiple errors. The test subjects were provided hard copies of the file with errors (errors highlighted) and the file as should appear without the errors. The test situation for each test subject was identical, except for changes in system response time. The A-state scale of the State-Trait Anxiety Inventory (STAI) was administered to the test subjects immediately prior to the edit task in order to determine pre-task state anxiety levels. The A-state scale of the STAI was again administered immediately after the edit task in order to determine post-task state anxiety levels. Analysis of variance, analysis of covariance, regression, and two sample t-tests were used to analyze the data collected. All hypotheses were tested at the alpha .05 level. The most significant finding of this study was the positive relationship between state anxiety and system response time. It was originally predicted that the Type A personality would experience a greater increase in state anxiety than the Type B personality. However, that was not found to be true. Both Type A and Type B individuals experience an increase in state anxiety during periods of poor or variable system response time. This study also confirms prior research regarding user and system …
An Empirical Investigation of the Effects of Individual Differences and Data Models on the Ease-of-Use of Database Query Facilties by Casual Users
The problem motivating this study is that database query facilities are not effectively meeting the needs of casual users. A solution to this problem is especially important due to the increasing number of potential casual users. There is considerable controversy revolving around the question of which elements and/or which combination of elements within the casual users' environment are necessary to provide an effective man/machine interface. The purpose of the study is to extend the basic knowledge relating to the effect of using different data models, the effect of cognitive style differences, and the interaction effects of these two independent variables on casual users' performance and confidence in writing database queries. The data models being investigated are the relational, hierarchical, and network models. The cognitive style classifications used are two of the Jungian dimensions, Sensing/Intuition and Thinking/Feeling.
Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace
Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organizations trying to reap potential benefits of enterprise social software (ESS) must successfully implement and maintain ESS tools. This research develops a framework for assessing knowledge sharing based on reciprocal determinism theory and augmented with technology acceptance, sociological, and psychological factors. Semi-structured interviews with IT professionals, followed by a written survey of employees using ESS are used to collect data. The hermeneutic circle methodology is used to analyze the interview transcripts and structural equation modeling is used to analyze the survey data. Results show technological advantage has no significant effect on the intention to share knowledge, but community cohesiveness and individual willingness significantly affect knowledge sharing intention and behavior. The study offers a synthesized model of variables affecting knowledge sharing as well as a better understanding of best practices for organizations to consider when implementing and maintaining ESS tools for employee knowledge sharing and collaboration.
A Study of Differences Perceived by Information Systems Professionals in the Systems Development Job Environment Due to the Use of ICASE Technology
Information systems professionals now face the automation of their own work in integrated computer aided software engineering. Organizations need to achieve all the leverage possible from costly IT implementations to enhance competitiveness, profitability, and survival in a rapidly changing environment. ICASE technology is a part of the infrastructure necessary to meet this challenge but appears to present significant difficulties in implementation.
The Effects of Alternative Presentation Formats on Biases and Heuristics in Human Decision Making
The purpose of this research was to determine whether changes in the presentation format of items in a computer display could be used to alter the impact of specific cognitive biases, and to add to the knowledge needed to construct theory-based guidelines for output design. The problem motivating this study is twofold. The first part of the problem is the sub-optimal decision making caused by the use of heuristics and their associated cognitive biases. The second part of the problem is the lack of a theoretical basis to guide the design of information presentation formats to counter the effects of such biases. An availability model of the impact of changes in presentation format on biases and heuristics was constructed based on the findings of a literature review. A six-part laboratory experiment was conducted utilizing a sample of 205 student subjects from the college of business. The independent variable was presentation format which was manipulated by altering the visual salience or visual recency of items of information in a visual computer display. The dependent variables included recall, perceived importance, and the subjects' responses to three judgment tasks. The results clearly demonstrate that changes in presentation format can be used to alter the impact of cognitive biases on human decision making. The results also provide support for the availability model, with the exception of the proposed influence of learning style. Learning style was found to have no significant impact on decision making whether alone or in combination with changes in presentation format. The results of this investigation demonstrate that by using our knowledge of cognitive processes (e.g., the visual salience effect, the visual recency effect, and the availability heuristic), presentation formats can be altered in order to moderate the effects of certain biases and heuristics in human decision making. An understanding of …
An Empirical Investigation of Detail Design Tools and Cognitive Style of Software Developers
The purpose of this study is to identify what detail design tools are more productive for the different types of professional software developers. By establishing a match between the detail design tool and the cognitive style of the professional programmer, the end product (Information Systems) should be of a higher quality. Two laboratory experiments were conducted. The first experiment was with professional Software Developers; the second one was with students. The dependant variables considered in this study were the number of semantic errors and the time required to complete a design task for conditional logic. The independent variables were the cognitive style of the subject, the complexity of the task, and the detail design tools. Decision trees, flowcharts and pseudocode were used as detailed design tools. Field dependence was the only dimension of cognitive style that was tested.
The Role of Workstation-Based Client/Server Systems in Changing Business Processes: a Multiple Case Study
Although several studies question information technology's contribution to productivity, organizations continue to invest in client/server systems (CSSs) particularly as enablers of business process reengineering (BPR). These efforts may be wasted if they do not improve business processes. This study focused on business processes and investigated the role of workstation-based CSSs in changing business processes. A multiple case study of workstation-based CSS databases in three organizations was performed with the proposition that they moderate the relation between managerial action and changes within business processes. The research framework suggested that changes to business processes are achieved by reducing uncertainty. In order to measure change in business processes, this study categorized business process change into: (1) compressing sequential tasks across functions, (2) compressing tasks vertically within the managerial hierarchy, (3) eliminating slack resources, (4) reducing the distance between the point of decision and the point of information or eliminating intermediaries, (5) reconfiguring sequential processes to operate in parallel, and (6) linking parallel activities during the process. Data collected from questionnaires, interviews, and observations from three case studies were used to construct network diagrams, relationship matrices, reachability matrices, and task tables of business processes. The results of this research partially support the proposition that managerial action affects business process change by reducing uncertainty. This research suggests that changes in the use of workstation-based CSSs are related to changes in business processes. However, because ofthe small sample size, no finding was made regarding changes in the strength of that relationship. Therefore, within its limitations, this research (1) partially supports the proposition that CSSs moderate changes in business processes, (2) found that both favorable and unfavorable changes may result from using CSSs, (3) explains how business process change occurs, and (4) suggests new variables for measuring successful BPR.
The Risks and Effects of Outsourcing on the Information Systems Function and the Firm
IS outsourcing, especially large-scale IS outsourcing, is a comparatively recent and rapidly growing IS phenomenon, but it is also an inherently risky activity. In an IS outsourcing arrangement, the outsourcing vendor accepts responsibility for IS resources and functions formerly controlled directly by the firm. This research examines IS outsourcing from two perspectives. (1) From an IS perspective, it examines the risk perceptions of IS managers of fourteen Fortune-500 firms who had recently conducted an outsourcing evaluation. (2) From a financial perspective, it examines the theoretical relationship of IS outsourcing with financial performance, and investigates the empirical effects of IS outsourcing on the firm's market value and market risk. This research views IS outsourcing as an independent variable whose effects on the firm may be measured as changes in security returns, changes in asset risk, changes in capital structure, and long-term changes in profitability. To accomplish this, it characterizes IS outsourcing as a sale-and-leaseback transaction.
The Relationships of Cross-Cultural Differences to the Values of Information Systems Professionals within the Context of Systems Development
Several studies have suggested that the effect of cultural differences among Information Systems (IS) professionals from different nations on the development and implementation of IS could be important. However, IS research has generally not considered culture when investigating the process of systems development. This study examined the relationship between the cultural backgrounds of IS designers and their process-related values with a field survey in Singapore, Taiwan, the United Kingdom and the United States. Hofstede's (1980) value survey module (i.e., Power Distance (PDI), Uncertainty Avoidance (UAI), InDiVidualism (IDV) and MASculininity/femininity) and Kumar's (1984) process-related values (i.e., technical, economic, and socio-political) were utilized in the data collection. The hypotheses tested were: whether the IS professionals differed on (H.,) their cultural dimensions based on country of origin, (Hg) their process-related values based on country of origin, and (H3) whether a relationship between their cultural dimensions and their process-related values existed. The countries were significantly different on their PDI, UAI and MAS, but not on their IDV. They significantly differed on their technical and sociopolitical values but not on their economic values. IDV and MAS significantly correlated with the process-related values in Singapore, Taiwan and the United States. In the United Kingdom, UAI significantly correlated with socio-political values; and MAS significantly correlated with technical and socio-political values. In Taiwan, UAI significantly correlated with technical and economic values. PDI did not illustrate any significant correlation with the IS process-related values in all four countries. In Singapore and the United States, UAI did not significantly correlate with any of these values. The results provide evidence that IS professionals differ on most of their cultural dimensions and IS process-related values. While IDV and MAS could be useful for examining the relationship between culture and systems development, research involving PDI and UAI might be of questionable benefit.
The Organizational Consequences of Information Deployment
This study investigates the influence that increasing end user autonomy has on organizational data models. The independence offered by microcomputer technology offers users increasing independence in their information-handling activities. As independence increases, uniformity of data models across the organization is theorized to diminish. The problem motivating this study is the potential for improper allocation of resources that may result from a misinterpretation of organizational data. This study suggests that the expanding use of microcomputers in the business setting will contribute to diversity of data models. This may eventually lead to confusion and even lack of confidence in the information produced.
Empirical Research of Decision-making Effectiveness When Using Differing Presentation Formats Under Varying Decision Tasks
The purpose of this research was to determine if presentation format, given a particular task to be performed, would affect the decision-making process of financial decision makers. The problem motivating this study is the potential for managers to make inefficient decisions when they use reports which are presented inappropriately for a given task.
An Experimental Investigation of Information Systems Project Escalation: An Examination of Contributory Factors in a Business Environment
The purpose of this research is to continue examining the project management process. The management of projects is complicated. It is the complexity of the process that makes a project so difficult to control. This research examines the effect of particular facets of the project manager's skill set and operating environment on management decisions.
A Case Study of the Use of Activity-Based Analysis as an Information Resource Management Tool
The purpose of the study was to investigate a modification of a managerial accounting technique, Activity-Based Costing (ABC), as a tool for addressing Information Resource Management (IRM) concerns within business processes. To indicate that ABC has been adapted for the IRM context, this study called the tool "Activity-Based Analysis" (ABA). ABA includes ABC's costing methodology as well as additional methods to address broader issues. The research method was a single-site case study at a property and casualty insurance company. The unit of analysis was a business process consisting of activities needed to provide claims handling services for workers' compensation insurance. Four questions guided the study: 1. Did ABA identify management information required to monitor process effectiveness and efficiency? 2. Did ABA support outsourcing decision making by identifying IRM cost components within business processes? 3. Did ABA identify information resources; that are sharable? 4. Did ABA identify differences between Company organizational characteristics andIRM department organizational characteristics?
Computer-Supported Collaborative Work and Its Application to Software Engineering in a Case Environment
This study investigated, in the context of a field-based case study, possibilities for formation of a synergistic union between CSCW and CASE tools. A major dimension of today's software challenge is in gearing up for large-scale system development necessitating large teams of systems engineers. The principal goal of this research was to advance the body of knowledge regarding the nature of collaborative technological support in the software development process. Specifically, the study was designed to evaluate the potential for using a CSCW tool as an effective front-end to a CASE tool in the furtherance of SDLC goals.
Organizational Considerations for and Individual Perceptions of Web-Based Intranet Systems
Utilization of World Wide Web style Web-Based Intranet Systems (W-BIS) is a rapidly expanding information delivery technique in many organizations. Published reports concerning these systems have cited return on investment values exceeding 1300% and direct payback time periods as low as six to twelve weeks. While these systems have been widely implemented, little theoretically grounded research has been conducted in relation to users' acceptance, utilization or the perceived quality of these systems. The study employed a two-site investigation of corporate Web-Based Intranet Systems, with surveys distributed via the traditional mail system. The complete survey instrument distributed to employees included the ServQual/ServPerf, User Information Satisfaction, Ease of Use/Usefulness, and Computer Playfulness instruments. In addition to these previously developed instruments, the survey instrument for this study included measures of Web-Based Intranet Systems utilization and usefulness along with respondent demographics and subordinate-reported managerial commitment. This study investigated the reliability and validity of the ServQual/ServPerf instrument in an information systems service environment. The same analysis was conducted of the more generally accepted User Information Satisfaction instrument.
Productivity Considerations for Online Help Systems
The purpose of this study was to determine if task type, task complexity, and search mechanism would have a significant affect on task performance. The problem motivating this study is the potential for systems online help designers to construct systems that can improve the performance of computer users when they need help.
Machine Combination Analysis Procedure for Selecting Optimal Factory Cell Composition
This research examined the relationship between manufacturing input parameters and factory performance in a cellular manufacturing environment.
Longitudinal Study to Assess the Impact of Instructor-Based Training Versus Computer-Based Training on User Performance: A Field Experiment
The purpose of this study is to investigate the relationships between selected end-user training programs corporations provide to their employees and subsequent employee performance based on these opportunities.
An Investigation of the Productivity of Information System Helpdesk User Support Professsionals as Impacted by Their Communication Behavior : A Field Experiment
This research conducted an interdisciplinary field experiment to identify relationships between productivity, user satisfaction and IS Helpdesk USP's use of effective communication behavior. An experimental group of Helpdesk USPs of a large retail organization were trained by communication professionals in communication effectiveness, with emphasis on the needs of the telephone environment.
Interactions of Presentation Formats and Decision-Maker Characteristics upon Multiple Decision-Making Tasks: an Experiment Using Multiple Cognitive Assessments
Information systems research tends to ignore individual differences in users. This laboratory experiment sought to illuminate contributions of decision-makers' cognitive processes to decision outcome as reflected in four hypothesis sets: the impact of imagery preference and presentation format upon (HI) recall accuracy and upon hemispheric activation during (H2) encoding and (H3) recall, and (H4) to examine the relationship between hemispheric activation differences and accuracy differences. Point-value (specific values) and intraset-pattern (relationships between values) recall were considered. Thirty MBA students, grouped by imagery preference (cognitive style) as favoring verbal (textual) or visual (graphical) information presentation, performed computer-based recall tasks using tabular and graphical formats in a repeated measures design. Hemispheric activation (cognitive process) was assessed using ratios of EEG activity in six frequency bands captured from six pairs of homologous electrode sites during encoding and recall.
An Examination of the Effect of Decision Style on the Use of a Computerized Project Management Tool
Managing a software development project presents many difficulties. Most software development projects are considered less than successful, and many are simply canceled. Ineffective project management has been cited as a major factor contributing to these failures. Project management tools can greatly assist managers in tracking and controlling their projects. However, project management tools are very structured and analytical in nature, which is not necessarily supported by decision-making styles of the managers. This research examined the influence that decision style has on a project manager's use of a project management tool.
The Role of Information Technology Support Mechanisms in Coordination Management for Virtual Teams
The purpose of this research is to examine virtual team members' use and perceptions of information technology (IT) support mechanisms. The study identifies the IT support mechanisms currently in use and focuses on differences between virtual and non-virtual teams in control and coordination, IT acceptance, and IT adoption.
The Impact of Multimedia on Information Scanning Effectiveness: an Empirical Study in an Executive Support Systems Environment
This study investigates the impact of multimedia on the effectiveness of information scanning. Information scanning is the act of seeking and receiving a wide variety of special information to develop a thorough understanding of the organization and the environment. The application domain of this study is Executive Support Systems. The experimental task is to identify potential threats and opportunities, a strategic information-scanning activity, based on the information stored in three ESS prototypes. Forty subjects from four organizations participated in the experiment. A random assignment process allocated them into three groups. The control group used the text-based ESS. The first experimental group used the visual multimedia ESS. The second experimental group used the audiovisual multimedia ESS. The experiment was carried out on the sites of the participating organizations. The investigator measured the effectiveness of information scanning based on the number of threats and opportunities each subject identifies. A close-ended questionnaire measured subjects' retention of information. The results of this study support the cognitive-fit theory. The findings indicate that multimedia is not an appropriate presentation format for analytical tasks. Subjects who use text-based ESS identify significantly more threats and opportunities than subjects who use audiovisual multimedia ESS. The cognitive style of subjects does not moderate the impact of multimedia. The results show that the use of multimedia does not necessarily improve retention of information. Further research is needed to determine the most effective combination of text, graphics, animation, video, and sound.
Task Domain Knowledge as a Moderator of Information System Usage
Information system (IS) support of human problem solving during the complex task of auditing within a computer environment was investigated. 74 computer audit specialist professionals from nine firms participated in the field experiment. Task accomplishment behavior was recorded via a computerized activity-logging technique. Theoretical constructs of interest included: 1) IS problem-solving support, 2) task domain knowledge, and 3) decision-making behavior. It was theorized that task domain knowledge influences the type of IS most functionally appropriate for usage by that individual. IS task presentation served as the treatment variable. Task domain knowledge was investigated as a moderating factor of task accomplishment Task accomplishment, the dependent variable, was defined as search control strategy and quality of task performance. A subject's task domain knowledge was assessed over seven theoretical domains. Subjects were assigned to higher or lower task domain knowledge groups based on performance on professional competency examination questions. Research hypothesis one investigated the effects of task domain knowledge on task accomplishment behavior. Several task domain knowledge bases were found to influence both search control strategy and task performance. Task presentation ordering effects, hypothesis two, were not found to significantly influence search control strategy or task performance. The third hypothesis investigated interaction effects of a subject's task domain knowledge and task presentation ordering treatments on task accomplishment behavior. An interaction effect was found to influence the subject's search control strategy. The computer-specific knowledge base and task presentation ordering treatments were found to interact as joint moderators of search control strategy. Task performance was not found to be significantly influenced by interaction effects. Users' task accomplishment was modeled based upon problem-solving behavior. A subject's level of task domain knowledge was found to serve as a moderating factor of IS usage. Human information-processing strategies, IS usage, and task domain knowledge were integrated into a comprehensive …
An Examination of Electronic Commerce and the Internet : Role of Technology, Critical Success Factors and Business Strategy
This research employed the case study methodology to examine the issues, challenges, and project lessons learned for a large firm engaged in electronic commerce on the Internet.
Client/Server Systems Performance Evaluation Measures Use and Importance: a Multi-Site Case Study of Traditional Performance Measures Applied to the Client/Server Environment
This study examines the role of traditional computing performance measures when used in a client/server system (C/SS) environment. It also evaluates the effectiveness of traditional computing measures of mainframe systems for use in C/SS. The underlying problem was the lack of knowledge about how performance measures are aligned with key business goals and strategies. This research study has identified and evaluated client/server performance measurements' importance in establishing an effective performance evaluation system. More specifically, this research enables an organization to do the following: (1) compare the relative states of development or importance of performance measures, (2) identify performance measures with the highest priority for future development, (3) contrast the views of different organizations regarding the current or desired states of development or relative importance of these performance measures.
Comparisons of Neural Networks, Shewhart ‾x, and CUSUM Control Charts Under the Condition of Nonnormality
In this study, neural networks are developed under conditions of nonnormality as alternatives to standard control charts, and their performance is compared with those of standard ‾x and CUSUM control charts.
Information System Quality: An Examination of Service-Based Models and Alternatives
Service quality as a component of overall Information Systems quality is examined. Three related studies test the SERVQUAL and related instruments (SERVPERF and Importance-weighted SERVPERF) using Information System users. SERVPERF outperformed SERVQUAL in all three studies.
The Role of Electronic Messaging in the Intermediate Business Context
This research examines the role of electronic messaging in business firms. The study presents a taxonomy of electronic mail uses, develops a theoretical framework for analyzing electronic mail impact, and investigates risks and advantages of electronic messaging. The research focus is intermediate-size firms.
The Effects of Using Information Technology to Support Evaluation of Feedback and Implementation of Adjustments in an Organization's Strategic Planning Process
Organizations that must respond quickly to environmental pressures look for tools to assist in that response. Information technology may be one tool to facilitate the response. In this study the possible effects of using information technology, specifically a decision support system, in the feedback segment of one organization's strategic management loop were examined. The organization was one region of the Board of Probation and Parole in a central state. Personnel included administrators, parole officers and clerical workers. The information technology was an off-the-shelf software product called PlanRight. This study is significant for two reasons: a new application for information technology was examined and the adequacy of a generic computerized tool designed to be suitable for various operations was explored. This study was a case study. Two months of data were taken prior to the implementation of the decision support system, and four months of data were taken after the system was implemented. Questionnaire data taken before system implementation provided descriptive characteristics of the organization. Follow-up surveys and interviews at the conclusion of the study were used to evaluate employee perceptions. The study was done in three phases. During phase one questionnaires were distributed and returned. During phase two, goals, plans and evaluation criteria were formulated and plans were implemented. Feedback was obtained and evaluated through the use of the decision support system enabling reaction to the feedback data. In phase three perceptions of administrators and parole officers were elicited using follow-up surveys and semi-structured interviews. Three propositions guided the evaluation of the study's outcomes. These propositions dealt with performance toward goal achievement, satisfaction with feedback processes and quality of plans formulated for the project. Performance was moderately successful. Satisfaction with processes was high. Speed of obtaining feedback was considered high by administrators and paroled officers. Quality of processes and outcomes …
The Influence of Business Intelligence Components on the Quality of Decision Making
Decision makers require the right information at the right time, in the right place and in the right format so that they can make good decisions. Although business intelligence (BI) has the potential to improve decision making, there is little empirical evidence of how well this has been achieved. The purpose of this dissertation is to examine the quality of decisions made using BI. The research question it addresses is what are the key antecedents of decision quality for users of business intelligence systems? The theoretical support for the model is developed based on the literature review that draws on decision support systems (DSS), group decision support systems (GDSS), and BI. Grounded on this literature review, the antecedents of decision quality are operationalized in this dissertation through independent variables such as the problem space complexity, the level of BI usage, the BI user experience, and information quality. The dependent variable is operationalized as decision quality and it captures the self-satisfaction with a decision made by users in a BI environment. The research model was tested using a survey of BI users whose names were provided by a marketing company. This research suggests that BI user experience is a more complex construct than has been initially thought.
An Investigation of Factors Influencing the User's Social Network Site Continuance Intention
The social network sites (SNS) industry has recently shown an abnormal development pattern: An SNS could rapidly accumulate a large number of users, and then suffer a serious loss of users in a short time, which subsequently leads to the failure of the Web site in the highly competitive market. The user's social network site continuance is considered the most important factor for an SNS to keep its sustainable development. However, little knowledge of the user's SNS continuance raises the following research question: What factors could significantly influence the user's SNS continuance intention? To address this research question, I study the question from three lenses of research, including the I-view, the social interactivity view, and the trust based view. The I-view is an extension of the IS continuance model. From this research perspective, I tested the influence of the utilitarian factor (i.e., perceived usefulness) and the hedonic factor (i.e., perceived enjoyment) on the user's satisfaction in the I-view. In addition, I extend the umbrella construct, confirmation, into two sub-constructs, informativeness and self-actualization, and respectively study their influences on the utilitarian factor and the hedonic factor. I find that the user's perceived enjoyment has a significant positive effect on the user's satisfaction, thereby motivating the user to continue using the SNS. The perceived informativeness of an SNS and the user's self-actualization through information sharing with others on the Web site both have significant positive effects on the user's perceived usefulness and perceived enjoyment. From the social interactivity perspective, I suggest that a user's social gains could have a projection effect on the user's satisfaction in an SNS and his or her SNS continuance intention. Most previous studies emphasized on the influence of social connection outcomes (i.e., social capitals) on the user's behavioral intention, but ignored the fact that an individual would …
A Study of the Intent to Fully Utilize Electronic Personal Health Records in the Context of Privacy and Trust
Government initiatives called for electronic health records for each individual healthcare consumer by 2014. the purpose of the initiatives is to provide for the common exchange of clinical information between healthcare consumers, healthcare providers, third-party payers and public healthcare officials.This exchange of healthcare information will impact the healthcare industry and enable more effective and efficient application of healthcare so that there may be a decrease in medical errors, increase in access to quality of care tools, and enhancement of decision making abilities by healthcare consumers, healthcare providers and government health agencies. an electronic personal health record (ePHR) created, managed and accessed by healthcare consumers may be the answer to fulfilling the national initiative. However, since healthcare consumers potentially are in control of their own ePHR, the healthcare consumer’s concern for privacy may be a barrier for the effective implementation of a nationwide network of ePHR. a technology acceptance model, an information boundary theory model and a trust model were integrated to analyze usage intentions of healthcare consumers of ePHR. Results indicate that healthcare consumers feel there is a perceived usefulness of ePHR; however they may not see ePHR as easy to use. Results also indicate that the perceived usefulness of utilizing ePHR does not overcome the low perceived ease of use to the extent that healthcare consumers intend to utilize ePHR. in addition, healthcare consumers may not understand the different components of usage: access, management, sharing and facilitating third-party ePHR. Also, demographics, computer self-efficacy, personal innovativeness, healthcare need and healthcare literacy impact a healthcare consumer’s privacy concerns and trusting intentions in the context of ePHR and intent to utilize ePHR. Finally, this research indicates that healthcare consumers may need a better understanding of the Health Insurance and Portability and Accountability Act of 1996 (HIPAA) regulations of ePHR as well as …
Back to Top of Screen