Search Results

open access

The Effect of It Process Support, Process Visualization and Process Characteristics on Process Outcomes

Description: Business process re-engineering (part of the Business Process Management domain) is among the top three concerns of Information Technology (IT) leaders and is deemed to be one of many important IT leveraging opportunities. Two major challenges have been identified in relation to BPM and the use of IT. The first challenge is related to involving business process participants in process improvement initiatives using BPM systems. BPM technologies are considered to be primarily targeted for develop… more
Date: December 2013
Creator: Al Beayeyz, Alaa
Partner: UNT Libraries
open access

Factors Influencing BI Data Collection Strategies: An Empirical Investigation

Description: The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top… more
Date: August 2010
Creator: Ramakrishnan, Thiagarajan
Partner: UNT Libraries
open access

Factors that Drive New Technology Product and Service Use and Continuance

Description: Understanding information technology and its related products and services is increasingly important because the everyday use of technology continues to expand and broaden. Despite this need for greater understanding, the extant theories that explore the dominant factors that drive intention to use a new technology are limited. The Technology Acceptancy Model (TAM) is the most popular model in explaining traditional technology adoption. The limitations of the TAM in grasping the overall evaluat… more
Date: May 2018
Creator: Liu, Xiaotong
Partner: UNT Libraries

Three Essays on Internet of Things Adoption and Use

Description: Internet of Things (IoT) is a promising technology with great potential for individuals, society, governments, and the economy. IoT is expected to become ubiquitous and influence every aspect of everyday experience. Thus, IoT represents an important phenomena for both organizational and behavioral information system (IS) researchers. This dissertation seeks to contribute to IS research by studying the aspects that influence IoT adoption and use at both consumer and organizational levels. This d… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: May 2019
Creator: Aldossari, Mobark
Partner: UNT Libraries

Information Privacy and Security Associated with Healthcare Technology Use

Description: This dissertation consists of three studies that investigate the information privacy & security associated with healthcare technology use. Essay 1 PRISMA-style systematically reviews the existing literature on privacy information disclosure in IoT technology and serves as the theoretical foundation of the current research. It is crucial to comprehend why, how, and under what consequences individuals choose to disclose their personal and health information since doing so is beneficial to the com… more
This item is restricted from view until August 1, 2028.
Date: July 2023
Creator: Amin, M A Shariful
Partner: UNT Libraries
open access

Organizational Competency Through Information: Business Intelligence and Analytics as a Tool for Process Dynamization

Description: The data produced and collected by organizations represents both challenges and opportunities for the modern firm. Business intelligence and analytics (BI&A) comprises a wide variety of information management technologies and information seeking activities designed to exploit these information resources. As a result, BI&A has been heralded as a source of improved organizational outcomes in both the academic and practitioner literature, and these technologies are among the largest continuous I… more
Date: August 2015
Creator: Torres, Russell
Partner: UNT Libraries
open access

Three Essays on Information Security Risk Management

Description: Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that… more
Date: May 2018
Creator: Ogbanufe, Obiageli
Partner: UNT Libraries
open access

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

Description: The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the co… more
Date: August 2016
Creator: Sullivan, Yulia
Partner: UNT Libraries
Back to Top of Screen