Search Results

open access

Developing Criteria for Extracting Principal Components and Assessing Multiple Significance Tests in Knowledge Discovery Applications

Description: With advances in computer technology, organizations are able to store large amounts of data in data warehouses. There are two fundamental issues researchers must address: the dimensionality of data and the interpretation of multiple statistical tests. The first issue addressed by this research is the determination of the number of components to retain in principal components analysis. This research establishes regression, asymptotic theory, and neural network approaches for estimating mean and … more
Date: August 1999
Creator: Keeling, Kellie Bliss
Partner: UNT Libraries
open access

Reliable Prediction Intervals and Bayesian Estimation for Demand Rates of Slow-Moving Inventory

Description: Application of multisource feedback (MSF) increased dramatically and became widespread globally in the past two decades, but there was little conceptual work regarding self-other agreement and few empirical studies investigated self-other agreement in other cultural settings. This study developed a new conceptual framework of self-other agreement and used three samples to illustrate how national culture affected self-other agreement. These three samples included 428 participants from China, 818… more
Date: August 2007
Creator: Lindsey, Matthew Douglas
Partner: UNT Libraries
open access

Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness

Description: The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera… more
Date: August 2008
Creator: Young, Randall Frederick
Partner: UNT Libraries
open access

Information systems success and technology acceptance within a government organization.

Description: Numerous models of IS success and technology acceptance their extensions have been proposed and applied in empirical. This study continues this tradition and extends the body of knowledge on the topic of IS success by developing a more comprehensive model for measuring IS success and technology acceptance within a government organization. The proposed model builds upon three established IS success and technology acceptance frameworks namely the DeLone and McLean (2003), Venkatesh et al.'s (2003… more
Date: August 2008
Creator: Thomas, Patricia
Partner: UNT Libraries
open access

IT Offshoring Success: A Social Exchange Perspective

Description: Spending by U.S. companies in offshore IT services continues at unprecedented levels despite a high failure rate. This study fills a gap in the existing literature by examining the client-vendor offshoring relationship through the theoretical lens of social exchange theory at the organizational level of analysis from the client's perspective. Social exchange theory focuses on the exchange of activities between two parties, whether they are individuals or companies and was used as a basis for ex… more
Date: August 2008
Creator: St. John, Jeremy
Partner: UNT Libraries
open access

The Impact of IT Capability on Employee Capability, Customer Value, Customer Satisfaction, and Business Performance

Description: This study empirically examines the impact of IT capability on firms' performance and evaluates whether firms' IT capabilities play a role in improving employee capability, customer value, customer satisfaction, and ultimately business performance. The results were based on comparing the business performance of the IT leader companies with that of control companies of similar size and industry. The IT leader companies were selected from the Information Week 500 list published annually from 2001… more
Date: August 2009
Creator: Chae, Ho-Chang
Partner: UNT Libraries
open access

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Description: Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of… more
Date: August 2010
Creator: Işik, Öykü
Partner: UNT Libraries
open access

Factors Influencing BI Data Collection Strategies: An Empirical Investigation

Description: The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top… more
Date: August 2010
Creator: Ramakrishnan, Thiagarajan
Partner: UNT Libraries
open access

The Impact of Quality on Customer Behavioral Intentions Based on the Consumer Decision Making Process As Applied in E-commerce

Description: Perceived quality in the context of e-commerce was defined and examined in numerous studies, but, to date, there are no consistent definitions and measurement scales. Instruments that measure quality in e-commerce industries primarily focus on website quality or service quality during the transaction and delivery phases. Even though some scholars have proposed instruments from different perspectives, these scales do not fully evaluate the level of quality perceived by customers during the entir… more
Date: August 2012
Creator: Wen, Chao
Partner: UNT Libraries
open access

Accessing the Power of Aesthetics in Human-computer Interaction

Description: In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency ch… more
Date: August 2013
Creator: Chenyan, Xu
Partner: UNT Libraries
open access

Accuracy and Interpretability Testing of Text Mining Methods

Description: Extracting meaningful information from large collections of text data is problematic because of the sheer size of the database. However, automated analytic methods capable of processing such data have emerged. These methods, collectively called text mining first began to appear in 1988. A number of additional text mining methods quickly developed in independent research silos with each based on unique mathematical algorithms. How good each of these methods are at analyzing text is unclear. … more
Date: August 2013
Creator: Ashton, Triss A.
Partner: UNT Libraries
open access

Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Description: Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organi… more
Date: August 2013
Creator: Harden, Gina
Partner: UNT Libraries
open access

A Relationship-based Cross National Customer Decision-making Model in the Service Industry

Description: In 2012, the CIA World Fact Book showed that the service sector contributed about 76.6% and 51.4% of the 2010 gross national product of both the United States and Ghana, respectively. Research in the services area shows that a firm's success in today's competitive business environment is dependent upon its ability to deliver superior service quality. However, these studies have yet to address factors that influence customers to remain committed to a mass service in economically diverse countrie… more
Date: August 2013
Creator: Boakye, Kwabena G.
Partner: UNT Libraries
open access

The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective

Description: This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplement… more
Date: August 2014
Creator: Hanus, Bartlomiej T.
Partner: UNT Libraries
open access

Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals

Description: Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), wh… more
Date: August 2015
Creator: Negahban, Arash
Partner: UNT Libraries
open access

The Effect of Value Co-creation and Service Quality on Customer Satisfaction and Commitment in Healthcare Management

Description: Despite much interest in service quality and various other service quality measures, scholars appear to have overlooked the overall concept of quality. More specifically, previous research has yet to integrate the effect of the customer network and customer knowledge into the measurement of quality. In this work, it is posited that the evaluation of quality is based on both the delivered value from the provider as well as the value developed from the relationships among customers and between cu… more
Date: August 2015
Creator: Kwon, Junhyuk
Partner: UNT Libraries
open access

The Impact of Culture on the Decision Making Process in Restaurants

Description: Understanding the process of consumers during key purchasing decision points is the margin between success and failure for any business. The cultural differences between the factors that affect consumers in their decision-making process is the motivation of this research. The purpose of this research is to extend the current body of knowledge about decision-making factors by developing and testing a new theoretical model to measure how culture may affect the attitudes and behaviors of consumers… more
Date: August 2015
Creator: Boonme, Kittipong
Partner: UNT Libraries
open access

Organizational Competency Through Information: Business Intelligence and Analytics as a Tool for Process Dynamization

Description: The data produced and collected by organizations represents both challenges and opportunities for the modern firm. Business intelligence and analytics (BI&A) comprises a wide variety of information management technologies and information seeking activities designed to exploit these information resources. As a result, BI&A has been heralded as a source of improved organizational outcomes in both the academic and practitioner literature, and these technologies are among the largest continuous I… more
Date: August 2015
Creator: Torres, Russell
Partner: UNT Libraries
open access

Three Essays on Social Media: the Effect of Motivation, Participation, and Sentiment on Performance

Description: In recent years, social media has experienced tremendous growth in the number of users. Facebook alone has more than 1.3 billion active users and Twitter has attracted over 600 million active users. Social media has significantly changed the way humans communicate. Many people use social media to keep in touch with family and friends and receive up-to-date information about what happens around the world. Politicians are using social media to support their campaigns. Use of social media is not r… more
Date: August 2015
Creator: Salehan, Mohammad
Partner: UNT Libraries
open access

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

Description: The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the co… more
Date: August 2016
Creator: Sullivan, Yulia
Partner: UNT Libraries
open access

Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance

Description: Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual de… more
Date: August 2016
Creator: Gerhart, Natalie
Partner: UNT Libraries
open access

Extensions of the General Linear Model into Methods within Partial Least Squares Structural Equation Modeling

Description: The current generation of structural equation modeling (SEM) is loosely split in two divergent groups - covariance-based and variance-based structural equation modeling. The relative newness of variance-based SEM has limited the development of techniques that extend its applicability to non-metric data. This study focuses upon the extension of general linear model techniques within the variance-based platform of partial least squares structural equation modeling (PLS-SEM). This modeling procedu… more
Date: August 2016
Creator: George, Benjamin Thomas
Partner: UNT Libraries
open access

Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps

Description: The increasing demand for mobile apps is out the current capability of mobile app developers. In addition, the growing trend in smartphone ownership and the time people spend on mobile apps has raised several opportunities and risks for users and developers. The average time everyday a user spend on smartphones to use mobile apps is more than two hours. The worldwide mobile app revenue increase is estimated to grow 33%, $19 billion. Three quarter of the time used on mobile apps is solely for us… more
Date: August 2016
Creator: Koohikamali, Mehrdad
Partner: UNT Libraries
open access

Three Research Essays on Online Users' Concerns and Web Assurance Mechanisms

Description: Online users struggle with different concerns whenever they use information systems. According to Miyazaki and Fernandez (2001), there are three important categories of concerns for online users: privacy concern, third party fraudulent behavior concern ("system security"), and online website fraudulent behavior concern ("security"). Kim, Sivasailam, and Rao (2004) proposed a similar categorization for web assurance dimensions. They argue that online websites are supposed to address users' priv… more
Date: August 2016
Creator: Mousavizadeh Kashipaz, Seyed Mohammadreza
Partner: UNT Libraries
Back to Top of Screen