Search Results

open access

The Effect of It Process Support, Process Visualization and Process Characteristics on Process Outcomes

Description: Business process re-engineering (part of the Business Process Management domain) is among the top three concerns of Information Technology (IT) leaders and is deemed to be one of many important IT leveraging opportunities. Two major challenges have been identified in relation to BPM and the use of IT. The first challenge is related to involving business process participants in process improvement initiatives using BPM systems. BPM technologies are considered to be primarily targeted for develop… more
Date: December 2013
Creator: Al Beayeyz, Alaa
Partner: UNT Libraries
open access

Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Description: Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organi… more
Date: August 2013
Creator: Harden, Gina
Partner: UNT Libraries
open access

The Influence of Business Intelligence Components on the Quality of Decision Making

Description: Decision makers require the right information at the right time, in the right place and in the right format so that they can make good decisions. Although business intelligence (BI) has the potential to improve decision making, there is little empirical evidence of how well this has been achieved. The purpose of this dissertation is to examine the quality of decisions made using BI. The research question it addresses is what are the key antecedents of decision quality for users of business inte… more
Date: May 2013
Creator: Visinescu, Lucian L.
Partner: UNT Libraries

A social capital perspective on IT professionals' work behavior and attitude.

Description: Abstract Attracting and developing information technology (IT) professionals is one of the top concerns for companies. Although much research has been conducted about the job behavior and attitudes of IT professionals over the last three decades, findings are inconclusive and contradictory. This suggests that something may be missing in how we examine this phenomenon. Most of this research is drawn from theories of motivation, very little examines the effect of social relationships on IT prof… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2006
Creator: Zhang, Lixuan
Partner: UNT Libraries
open access

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Description: Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of… more
Date: August 2010
Creator: Işik, Öykü
Partner: UNT Libraries
open access

The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective

Description: This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplement… more
Date: August 2014
Creator: Hanus, Bartlomiej T.
Partner: UNT Libraries
open access

The Impact of IT Capability on Employee Capability, Customer Value, Customer Satisfaction, and Business Performance

Description: This study empirically examines the impact of IT capability on firms' performance and evaluates whether firms' IT capabilities play a role in improving employee capability, customer value, customer satisfaction, and ultimately business performance. The results were based on comparing the business performance of the IT leader companies with that of control companies of similar size and industry. The IT leader companies were selected from the Information Week 500 list published annually from 2001… more
Date: August 2009
Creator: Chae, Ho-Chang
Partner: UNT Libraries
open access

An Investigation of Factors Influencing the User's Social Network Site Continuance Intention

Description: The social network sites (SNS) industry has recently shown an abnormal development pattern: An SNS could rapidly accumulate a large number of users, and then suffer a serious loss of users in a short time, which subsequently leads to the failure of the Web site in the highly competitive market. The user's social network site continuance is considered the most important factor for an SNS to keep its sustainable development. However, little knowledge of the user's SNS continuance raises the follo… more
Date: December 2012
Creator: Han, Bo
Partner: UNT Libraries
open access

Organizational factors contributing to an effective information technology intelligence system.

Description: The purpose of this dissertation is to investigate the organizational factors that contribute to effective emerging information technology intelligence processes and products. Emerging information technology is defined as a technology which is little commercialized and is currently adopted by not more than twenty percent of the companies within a given industry. By definition, information technology intelligence is a subdivision of competitive intelligence and business intelligence. I discovere… more
Date: December 2008
Creator: Taskov, Konstantin
Partner: UNT Libraries
open access

Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals

Description: Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), wh… more
Date: August 2015
Creator: Negahban, Arash
Partner: UNT Libraries

Propensity for knowledge sharing: An organizational justice perspective.

Description: Converting individual knowledge into organizational knowledge can be difficult because individuals refuse to share knowledge for a number of different reasons. Creating an atmosphere of fairness plays an important role in the creation of a knowledge-sharing climate. This dissertation proposes that perceptions of organizational justice are crucial building blocks of that environment, leading to knowledge sharing. Data was collected using a field survey of IT managers representing a broad spectr… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2006
Creator: Ibragimova, Bashorat
Partner: UNT Libraries
open access

Factors Influencing BI Data Collection Strategies: An Empirical Investigation

Description: The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top… more
Date: August 2010
Creator: Ramakrishnan, Thiagarajan
Partner: UNT Libraries
open access

The Relationship Between Data Visualization and Task Performance

Description: We are entering an era of business intelligence and big data where simple tables and other traditional means of data display cannot deal with the vast amounts of data required to meet the decision-making needs of businesses and their clients. Graphical figures constructed with modern visualization software can convey more information than a table because there is a limit to the table size that is visually usable. Contemporary decision performance is influenced by the task domain, the user exp… more
Date: December 2014
Creator: Phillips, Brandon
Partner: UNT Libraries
open access

Three Essays on Social Media: the Effect of Motivation, Participation, and Sentiment on Performance

Description: In recent years, social media has experienced tremendous growth in the number of users. Facebook alone has more than 1.3 billion active users and Twitter has attracted over 600 million active users. Social media has significantly changed the way humans communicate. Many people use social media to keep in touch with family and friends and receive up-to-date information about what happens around the world. Politicians are using social media to support their campaigns. Use of social media is not r… more
Date: August 2015
Creator: Salehan, Mohammad
Partner: UNT Libraries
open access

Three Research Essays on Online Users' Concerns and Web Assurance Mechanisms

Description: Online users struggle with different concerns whenever they use information systems. According to Miyazaki and Fernandez (2001), there are three important categories of concerns for online users: privacy concern, third party fraudulent behavior concern ("system security"), and online website fraudulent behavior concern ("security"). Kim, Sivasailam, and Rao (2004) proposed a similar categorization for web assurance dimensions. They argue that online websites are supposed to address users' priv… more
Date: August 2016
Creator: Mousavizadeh Kashipaz, Seyed Mohammadreza
Partner: UNT Libraries
open access

Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness

Description: The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera… more
Date: August 2008
Creator: Young, Randall Frederick
Partner: UNT Libraries
open access

Design for Social Presence and Exploring Its Mediating Effect in Mobile Data Communication Services

Description: The mobility, flexibility, convenience, and ubiquity of mobile data services (MDS) have contributed to their enormous growth and popularity with users. MDS allow users to communicate through mobile texting (mTexting), mobile Instant Messaging (mIM), multimedia messaging services (MMS), and email. A unique feature of MDS that enhances its popularity among its users is the awareness capability, which is revolutionizing the way MDS is being used to communicate today. It allows potential communicat… more
Date: May 2011
Creator: Ogara, Solomon Omondi
Partner: UNT Libraries
open access

Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps

Description: The increasing demand for mobile apps is out the current capability of mobile app developers. In addition, the growing trend in smartphone ownership and the time people spend on mobile apps has raised several opportunities and risks for users and developers. The average time everyday a user spend on smartphones to use mobile apps is more than two hours. The worldwide mobile app revenue increase is estimated to grow 33%, $19 billion. Three quarter of the time used on mobile apps is solely for us… more
Date: August 2016
Creator: Koohikamali, Mehrdad
Partner: UNT Libraries
open access

Accessing the Power of Aesthetics in Human-computer Interaction

Description: In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency ch… more
Date: August 2013
Creator: Chenyan, Xu
Partner: UNT Libraries
open access

Organizational Competency Through Information: Business Intelligence and Analytics as a Tool for Process Dynamization

Description: The data produced and collected by organizations represents both challenges and opportunities for the modern firm. Business intelligence and analytics (BI&A) comprises a wide variety of information management technologies and information seeking activities designed to exploit these information resources. As a result, BI&A has been heralded as a source of improved organizational outcomes in both the academic and practitioner literature, and these technologies are among the largest continuous I… more
Date: August 2015
Creator: Torres, Russell
Partner: UNT Libraries
open access

Business/it Alignment: the Impact of Incentive Plans on the Development of Shared Vision

Description: This study, utilizing Preston and Karahanna’s framework for shared vision development and Agency Theory, explores the impact of vision development factors and factors associated with incentive plans on shared vision and alignment. Results of the study confirm the strong relationship between shared vision and alignment, and indicate that having an effective management team is important with respect to developing and maintaining shared vision and alignment within the organization. Several vis… more
Date: December 2014
Creator: Johnson, Vess L.
Partner: UNT Libraries
open access

Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance

Description: Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual de… more
Date: August 2016
Creator: Gerhart, Natalie
Partner: UNT Libraries
open access

General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses

Description: This research sought to shed light on information systems security (ISS) by conceptualizing an organization's use of countermeasures using general deterrence theory, positing a non-recursive relationship between threats and countermeasures, and by extending the ISS construct developed in prior research. Industry affiliation and organizational size are considered in terms of differences in threats that firms face, the different countermeasures in use by various firms, and ultimately, how a firm'… more
Date: May 2009
Creator: Schuessler, Joseph H.
Partner: UNT Libraries
Back to Top of Screen