Search Results

Optimizing Value Co-Creation in Education Supply Chains: An Evaluation of Determinants and Resiliency in Service Systems

Description: Services and service-based business are a major part of any economy. However, service-based supply chains require a greater level of interaction between provider and consumer than the traditional manufacturing or product-based supply chain. Therefore, they require optimization and resiliency models that acknowledge the constraints and goals unique to service-based industries. Value co-creation and service-dominant logistics (SDL) are relatively new to operations research. Existing literature in… more
This item is restricted from view until September 1, 2027.
Date: August 2022
Creator: Smith, Justin Thomas
Partner: UNT Libraries

A Heuristic Approach to Selection of Analytical Methods: Three Empirical Healthcare Studies

Description: Managers rely on analytics to make decisions and the choice of the analytical method can influence their decision-making. This dissertation considers three cases and examines how the choice of analytical methods influence interpretations and implications. These areas are communication for health-related information in social media, health information technology investment by hospitals as it relates to patient satisfaction, and health related expenditure policies of countries. These studies deve… more
Date: August 2021
Creator: Tarakci, Yasemin
Partner: UNT Libraries

A social capital perspective on IT professionals' work behavior and attitude.

Description: Abstract Attracting and developing information technology (IT) professionals is one of the top concerns for companies. Although much research has been conducted about the job behavior and attitudes of IT professionals over the last three decades, findings are inconclusive and contradictory. This suggests that something may be missing in how we examine this phenomenon. Most of this research is drawn from theories of motivation, very little examines the effect of social relationships on IT prof… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2006
Creator: Zhang, Lixuan
Partner: UNT Libraries
open access

A Study of the Intent to Fully Utilize Electronic Personal Health Records in the Context of Privacy and Trust

Description: Government initiatives called for electronic health records for each individual healthcare consumer by 2014. the purpose of the initiatives is to provide for the common exchange of clinical information between healthcare consumers, healthcare providers, third-party payers and public healthcare officials.This exchange of healthcare information will impact the healthcare industry and enable more effective and efficient application of healthcare so that there may be a decrease in medical errors, i… more
Date: May 2012
Creator: Richards, Rhonda J.
Partner: UNT Libraries
open access

The Influence of Business Intelligence Components on the Quality of Decision Making

Description: Decision makers require the right information at the right time, in the right place and in the right format so that they can make good decisions. Although business intelligence (BI) has the potential to improve decision making, there is little empirical evidence of how well this has been achieved. The purpose of this dissertation is to examine the quality of decisions made using BI. The research question it addresses is what are the key antecedents of decision quality for users of business inte… more
Date: May 2013
Creator: Visinescu, Lucian L.
Partner: UNT Libraries

Three Essays on Phishing Attacks, Individual Susceptibility, and Detection Accuracy

Description: Phishing is a social engineering attack to deceive and persuade people to divulge private information like usernames and passwords, account details (including bank account details), and social security numbers. Phishers typically utilize e-mail, chat, text messages, or social media. Despite the presence of automatic anti-phishing filters, phishing messages reach online users' inboxes. Understanding the influence of phishing techniques and individual differences on susceptibility and detection … more
This item is restricted from view until September 1, 2024.
Date: August 2022
Creator: Bera, Debalina
Partner: UNT Libraries
open access

Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps

Description: The increasing demand for mobile apps is out the current capability of mobile app developers. In addition, the growing trend in smartphone ownership and the time people spend on mobile apps has raised several opportunities and risks for users and developers. The average time everyday a user spend on smartphones to use mobile apps is more than two hours. The worldwide mobile app revenue increase is estimated to grow 33%, $19 billion. Three quarter of the time used on mobile apps is solely for us… more
Date: August 2016
Creator: Koohikamali, Mehrdad
Partner: UNT Libraries
open access

General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses

Description: This research sought to shed light on information systems security (ISS) by conceptualizing an organization's use of countermeasures using general deterrence theory, positing a non-recursive relationship between threats and countermeasures, and by extending the ISS construct developed in prior research. Industry affiliation and organizational size are considered in terms of differences in threats that firms face, the different countermeasures in use by various firms, and ultimately, how a firm'… more
Date: May 2009
Creator: Schuessler, Joseph H.
Partner: UNT Libraries
open access

The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective

Description: This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplement… more
Date: August 2014
Creator: Hanus, Bartlomiej T.
Partner: UNT Libraries
open access

Quality Management Theory Development and Investigation of the Constructs within an Organizational Framework

Description: Supply chain management (SCM) and quality management (QM) share some common literature and have overlapping domains that reinforce each other in the supplier and customer relationship management areas. Despite the recognized importance of supplier and customer relationships toward achieving quality goals, limited prior research examines whether SCM represents a distinct construct within the prominent existing quality focused organizational frameworks such as the Malcolm Baldrige National Qualit… more
Date: May 2016
Creator: Peng, Xianghui
Partner: UNT Libraries
open access

Information systems success and technology acceptance within a government organization.

Description: Numerous models of IS success and technology acceptance their extensions have been proposed and applied in empirical. This study continues this tradition and extends the body of knowledge on the topic of IS success by developing a more comprehensive model for measuring IS success and technology acceptance within a government organization. The proposed model builds upon three established IS success and technology acceptance frameworks namely the DeLone and McLean (2003), Venkatesh et al.'s (2003… more
Date: August 2008
Creator: Thomas, Patricia
Partner: UNT Libraries

Three Essays on Artificial Intelligence Adoption and Use

Description: Artificial intelligence (AI) is quickly transforming business operations and society, as AI capabilities are incorporated into applications ranging from mobile personal assistants to self-driving cars. The potentially disruptive nature of AI calls for an extensive investigation into all aspects of AI-human interactions at individual, group, organizational and market levels. However, there is paucity of academic information systems (IS) research in this area that goes beyond the development and … more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2019
Creator: Nguyen, Quynh
Partner: UNT Libraries
open access

Business/it Alignment: the Impact of Incentive Plans on the Development of Shared Vision

Description: This study, utilizing Preston and Karahanna’s framework for shared vision development and Agency Theory, explores the impact of vision development factors and factors associated with incentive plans on shared vision and alignment. Results of the study confirm the strong relationship between shared vision and alignment, and indicate that having an effective management team is important with respect to developing and maintaining shared vision and alignment within the organization. Several vis… more
Date: December 2014
Creator: Johnson, Vess L.
Partner: UNT Libraries

Information Privacy and Security Associated with Healthcare Technology Use

Description: This dissertation consists of three studies that investigate the information privacy & security associated with healthcare technology use. Essay 1 PRISMA-style systematically reviews the existing literature on privacy information disclosure in IoT technology and serves as the theoretical foundation of the current research. It is crucial to comprehend why, how, and under what consequences individuals choose to disclose their personal and health information since doing so is beneficial to the com… more
This item is restricted from view until August 1, 2028.
Date: July 2023
Creator: Amin, M A Shariful
Partner: UNT Libraries
open access

Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness

Description: The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera… more
Date: August 2008
Creator: Young, Randall Frederick
Partner: UNT Libraries
open access

Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals

Description: Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), wh… more
Date: August 2015
Creator: Negahban, Arash
Partner: UNT Libraries

Development and Exploration of End-User Healthcare Technology Acceptance Models

Description: This dissertation consists of three studies that collectively investigate the factors influencing the consumer adoption intention towards emerging healthcare technologies. Essay 1 systematically reviews the extent literature on healthcare technology adoption and serves as the theoretical foundation of the dissertation. It investigates different models that have been previously applied to study healthcare technology acceptance. Meta-analysis method is used to quantitatively synthesize the findin… more
Date: May 2021
Creator: Wei, Xinyu "Eddy"
Partner: UNT Libraries

Three Essays on Social Media Use and Information Sharing Behavior

Description: Social media platforms create rich social structures, expand users' boundaries of social networks and revolutionize traditional forms of communications, social interactions and social relationships. These platforms not only facilitate the creation and sharing of news and information, but they also drive various kinds of businesses models, processes and operations, knowledge sharing, marketing strategies for brand management and socio-political discourses essential for healthy and democratic fun… more
Date: May 2021
Creator: Bhagat, Sarbottam
Partner: UNT Libraries
open access

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

Description: The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the co… more
Date: August 2016
Creator: Sullivan, Yulia
Partner: UNT Libraries
open access

Accuracy and Interpretability Testing of Text Mining Methods

Description: Extracting meaningful information from large collections of text data is problematic because of the sheer size of the database. However, automated analytic methods capable of processing such data have emerged. These methods, collectively called text mining first began to appear in 1988. A number of additional text mining methods quickly developed in independent research silos with each based on unique mathematical algorithms. How good each of these methods are at analyzing text is unclear. … more
Date: August 2013
Creator: Ashton, Triss A.
Partner: UNT Libraries
open access

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Description: Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of… more
Date: August 2010
Creator: Işik, Öykü
Partner: UNT Libraries

Factors Influencing Continued Usage of Telemedicine Applications

Description: This study addresses the antecedents of individuals' disposition to use telemedicine applications, as well as the antecedents of their usage to provide insight into creating sustained usage over time. The theoretical framework of this research is Bhattacherjee's expectation-confirmation IS continuance model. By combining a series of key factors which may influence the initial and continued usage of telemedicine applications with key constructs of Bhattacherjee's IS continuance model, this study… more
This item is restricted from view until September 1, 2024.
Date: August 2022
Creator: Liu, Xiaoyan
Partner: UNT Libraries

The Impact of Blockchain Food Tracing Information Quality and Trust on Intention to Purchase

Description: The purpose of our research is to empirically test how system attributes of blockchain build trust through system and information components in blockchain food traceability systems. Findings showed that system attributes of blockchain are strong predictors of trust leading to intention to purchase. A sample of 358 responses were collected from college students through online survey. SmartPLS 3.0 is adopted for data analysis. We made contributions by building a new research model to guide future… more
This item is restricted from view until September 1, 2024.
Date: August 2022
Creator: Lai, Im Hong
Partner: UNT Libraries
open access

A Relationship-based Cross National Customer Decision-making Model in the Service Industry

Description: In 2012, the CIA World Fact Book showed that the service sector contributed about 76.6% and 51.4% of the 2010 gross national product of both the United States and Ghana, respectively. Research in the services area shows that a firm's success in today's competitive business environment is dependent upon its ability to deliver superior service quality. However, these studies have yet to address factors that influence customers to remain committed to a mass service in economically diverse countrie… more
Date: August 2013
Creator: Boakye, Kwabena G.
Partner: UNT Libraries
Back to Top of Screen