UNT Libraries - Browse


Accessing the Power of Aesthetics in Human-computer Interaction

Description: In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency characteristics, are critical concerns of designers. This view contends that visual design enhances system use. Thus, this work examines the effects of visual design on computer systems. Visual design exerts its influence on systems through two mechanisms: it evokes affective responses from IT users, such as arousal and pleasure and it influences individuals’ cognitive assessments of systems. Given that both affective and cognitive reactions are significant antecedents of user behaviors in the IT realm, it is no surprise that visual design plays a critical role in information system success. Human-computer-interaction literature indicates that visual aesthetics positively influences such information success factors as usability, online trust, user satisfaction, flow experience, and so on. Although academic research has introduced visual design into the Information Systems (IS) field and validated its effects, visual design is still very limited in three contexts: product aesthetics in e-commerce, mobile applications and commercial emails. This dissertation presents three studies to help fill these theoretical gaps respectively.
Date: August 2013
Creator: Chenyan, Xu

An Analysis of the Effect of Environmental and Systems Complexity on Information Systems Failures

Description: Companies have invested large amounts of money on information systems development. Unfortunately, not all information systems developments are successful. Software project failure is frequent and lamentable. Surveys and statistical analysis results underscore the severity and scope of software project failure. Limited research relates software structure to information systems failures. Systematic study of failure provides insights into the causes of IS failure. More importantly, it contributes to better monitoring and control of projects and enhancing the likelihood of the success of management information systems. The underlining theories and literature that contribute to the construction of theoretical framework come from general systems theory, complexity theory, and failure studies. One hundred COBOL programs from a single company are used in the analysis. The program log clearly documents the date, time, and the reasons for changes to the programs. In this study the relationships among the variables of business requirements change, software complexity, program size and the error rate in each phase of software development life cycle are tested. Interpretations of the hypotheses testing are provided as well. The data shows that analysis error and design error occur more often than programming error. Measurement criteria need to be developed at each stage of the software development cycle, especially in the early stage. The quality and reliability of software can be improved continuously. The findings from this study suggest that it is imperative to develop an adaptive system that can cope with the changes to the business environment. Further, management needs to focus on processes that improve the quality of the system design stage.
Date: August 2001
Creator: Zhang, Xiaoni

Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information

Description: The objective of this research is the investigation of the patterns of information growth to test whether there has been an "information explosion." To tackle the main problem, there are three issues which need to be addressed: (1) the concept of information dimensionality; (2) determination of common parameters to measure the amount of information within each dimension; and (3) a working definition of "explosiveness. "
Date: August 1987
Creator: Attia, Abdel-Hameed M. (Abdel-Hameed Mohammed)

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Description: Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of BI capabilities on BI success, in the presence of different decision environments. The decision environment is a composition of the decision types and the way the required information is processed to aid in decision making. BI capabilities are defined as critical functionalities that help an organization improve its performance, and they are examined in terms of organizational and technological capabilities. An online survey is used to obtain the data and partial least squares path modeling (PLS) is used for analysis. The results of this dissertation suggest that all technological capabilities as well as one of the organizational capabilities, flexibility, significantly impact BI success. Results also indicate that the moderating effect of decision environment is significant for quantitative data quality. These findings provide richer insight in the role of the decision environment in BI success and a framework with which future research on the relationship between BI capabilities and BI success can be conducted. Findings may also contribute to practice by presenting information for managers and users of BI to consider about their decision environment in assessing BI success.
Date: August 2010
Creator: Işik, Öykü

A Case Study of the Use of Activity-Based Analysis as an Information Resource Management Tool

Description: The purpose of the study was to investigate a modification of a managerial accounting technique, Activity-Based Costing (ABC), as a tool for addressing Information Resource Management (IRM) concerns within business processes. To indicate that ABC has been adapted for the IRM context, this study called the tool "Activity-Based Analysis" (ABA). ABA includes ABC's costing methodology as well as additional methods to address broader issues. The research method was a single-site case study at a property and casualty insurance company. The unit of analysis was a business process consisting of activities needed to provide claims handling services for workers' compensation insurance. Four questions guided the study: 1. Did ABA identify management information required to monitor process effectiveness and efficiency? 2. Did ABA support outsourcing decision making by identifying IRM cost components within business processes? 3. Did ABA identify information resources; that are sharable? 4. Did ABA identify differences between Company organizational characteristics andIRM department organizational characteristics?
Date: December 1994
Creator: Arnett, Charles A. (Charles Augustus)

Client/Server Systems Performance Evaluation Measures Use and Importance: a Multi-Site Case Study of Traditional Performance Measures Applied to the Client/Server Environment

Description: This study examines the role of traditional computing performance measures when used in a client/server system (C/SS) environment. It also evaluates the effectiveness of traditional computing measures of mainframe systems for use in C/SS. The underlying problem was the lack of knowledge about how performance measures are aligned with key business goals and strategies. This research study has identified and evaluated client/server performance measurements' importance in establishing an effective performance evaluation system. More specifically, this research enables an organization to do the following: (1) compare the relative states of development or importance of performance measures, (2) identify performance measures with the highest priority for future development, (3) contrast the views of different organizations regarding the current or desired states of development or relative importance of these performance measures.
Date: May 1999
Creator: Posey, Orlando Guy

Communication Quality in Information Systems Development: The Effect of Computer-Mediated Communication on Task-Oriented Problem Solving

Description: The problem motivating this research is that ineffective communication may hamper systems development efforts. Specifically germane to this study are development efforts characterized as task-oriented, and which require information-sharing and problem-solving activities. This research problem motivated an analysis of the communication process and lead to the development of a temporal framework that delineates variables associated with task-oriented, end user/systems analyst communication interactions. Several variables within this framework are depicted in two theoretical models. The first model shows the theoretical relationship between an independent variable, communication mode (represented by asynchronous computer conferencing and face-to-face conferencing), and five dependent variables: (1) the amount of information shared, (2) the significance of the information shared, (3) the comprehensiveness of the information shared, (4) the perception of progress toward the goal, and (5) the perception of freedom to participate. The second model depicts the assumed interaction between communication mode, the five variables cited above (now acting as independent variables), and a dependent variable, communication quality. There are two theoretical components of communication quality: (1) deviation from an optimal set of user requirements, and (2) the degree of convergence (unity based on mutual understanding and mutual agreement) emanating from a communication interaction. Using the theoretical models as a guide, an experiment was designed and performed to test the relationships among the variables. The experimental results led to the rejection of all null hypotheses; the results strongly favored face-to-face conferencing for solving task-oriented, information-sharing problems analagous to the case used in the present study. The findings indicate that asynchronous computer conferencing may have a detrimental effect on the thoroughness of information exchange, on the relevance of the information shared in terms of making the correct decision, and on the completeness of the consideration given to all problem dimensions.
Date: May 1986
Creator: Smith, Jill Yvonne

Computer-Supported Collaborative Work and Its Application to Software Engineering in a Case Environment

Description: This study investigated, in the context of a field-based case study, possibilities for formation of a synergistic union between CSCW and CASE tools. A major dimension of today's software challenge is in gearing up for large-scale system development necessitating large teams of systems engineers. The principal goal of this research was to advance the body of knowledge regarding the nature of collaborative technological support in the software development process. Specifically, the study was designed to evaluate the potential for using a CSCW tool as an effective front-end to a CASE tool in the furtherance of SDLC goals.
Date: May 1997
Creator: Bailey, Janet L.

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

Description: The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the consequences of mind wandering in a technological setting is imperative because mind wandering plays a vital role in influencing various outcomes associated with technology use and/or technology learning, such as technology anxiety, software self-efficacy, and task performance. This dissertation is composed of three essays which examine the determinants and consequences of mind wandering and focus of attention on a number of emotional and cognitive outcomes. A multi-method approach (i.e., online survey and laboratory experiment) across three essays is used to test the research models. Essay 1 focuses on developing the measurement items and estimating the impact of mind wandering on users' emotional outcomes (i.e., technology anxiety and users' satisfaction). Drawing upon the content regulation hypothesis of mind wandering, the content of thoughts are differentiated into two categories—technology-related thought (herein IT) and non-technology related thought (herein non-IT). The results show that whereas mind wandering (non-IT) is a major determinant of technology anxiety, focus of attention (IT) is the main predictor of users' satisfaction. Essay 2 focuses on the effect of mind wandering and focus of attention in the IS learning context. The study begins by exploring the hypotheses concerning the roles of executive functions (i.e., inhibition, switching, and working memory) and task complexity in influencing the occurrence of mind wandering and focus of attention, and in turn, cognitive outcomes (i.e., software self-efficacy and ...
Date: August 2016
Creator: Sullivan, Yulia

Critical Success Factors in Data Mining Projects.

Description: The increasing awareness of data mining technology, along with the attendant increase in the capturing, warehousing, and utilization of historical data to support evidence-based decision making, is leading many organizations to recognize that the effective use of data is the key element in the next generation of client-server enterprise information technology. The concept of data mining is gaining acceptance in business as a means of seeking higher profits and lower costs. To deploy data mining projects successfully, organizations need to know the key factors for successful data mining. Implementing emerging information systems (IS) can be risky if the critical success factors (CSFs) have been researched insufficiently or documented inadequately. While numerous studies have listed the advantages and described the data mining process, there is little research on the success factors of data mining. This dissertation identifies CSFs in data mining projects. Chapter 1 introduces the history of the data mining process and states the problems, purposes, and significances of this dissertation. Chapter 2 reviews the literature, discusses general concepts of data mining and data mining project contexts, and reviews general concepts of CSF methodologies. It also describes the identification process for the various CSFs used to develop the research framework. Chapter 3 describes the research framework and methodology, detailing how the CSFs were identified and validated from more than 1,300 articles published on data mining and related topics. The validated CSFs, organized into a research framework using 7 factors, generate the research questions and hypotheses. Chapter 4 presents analysis and results, along with the chain of evidence for each research question, the quantitative instrument and survey results. In addition, it discusses how the data were collected and analyzed to answer the research questions. Chapter 5 concludes with a summary of the findings, describing assumptions and limitations and suggesting future research.
Date: August 2003
Creator: Sim, Jaesung

Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance

Description: Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual decision makers, in different decision contexts, determine when to stop collecting information given the availability of virtually unlimited information. Decision makers must make an ultimate decision, but also must make a decision that he or she has enough information to make the final decision (Browne, Pitts, & Wetherbe, 2007). In determining how much information to collect, researchers found that people engage in ‘satisficing' in order to make decisions, particularly when there is more information than it is possible to manage (Simon, 1957). A more recent elucidation of information use relies on the idea of stopping rules, identifying five common stopping rules information seekers use: mental list, representational stability, difference threshold, magnitude threshold, and single criterion (Browne et al., 2007). Prior research indicates a lack of understanding in the areas of information use (Prabha, Connaway, Olszewski, & Jenkins, 2007) and information overload (Eppler & Mengis, 2004) in Information Systems literature. Moreover, research indicates a lack of clarity in what information should be used in different decision contexts (Kowalczyk & Buxmann, 2014). The increase in the availability of information further complicates and necessitates research in this area. This dissertation seeks to fill these gaps in the literature by determining how information use changes across decision contexts and the relationships between stopping rules. Two unique methodologies were used to test the hypotheses in the conceptual ...
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: August 2016
Creator: Gerhart, Natalie

Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness

Description: The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera, 2003). The little empirical research that has been conducted in this area has shown that information security management in many organizations is poor (Baskerville, 1993; Shimeall & McDermott, 1999). Several researchers have identified the need for methods to measure the organization-wide information security posture of organizations (Eloff & Von Solms, 2000; James, 1996). This dissertation attempts to measure the organization-wide information security posture by examining benchmark variables that assess role, planning orientation, and performance structure within the organization. Through this conceptualization of an organization's information security posture, a means is presented to measure overall information security and how it impacts the effective utilization of information security strategies. The presence of the dependent variable, effectiveness, gives academics and practitioners a success measure which can guide more effective decision making in the information security domain. An additional aim of this dissertation is to empirically examine the influence of management practices and decisions on effective use of information security strategies within the organization. The issues of centralization versus decentralization of information security activities will be evaluated along with its impact on information security posture of organizations and the effectiveness of the organization's information security strategies. Data was collected from 119 IT and information security executives. Results show that how the organization structures information security activities is not correlated with more effective utilization of information security strategies. Meanwhile, the organization's information security posture ...
Date: August 2008
Creator: Young, Randall Frederick

Design for Social Presence and Exploring Its Mediating Effect in Mobile Data Communication Services

Description: The mobility, flexibility, convenience, and ubiquity of mobile data services (MDS) have contributed to their enormous growth and popularity with users. MDS allow users to communicate through mobile texting (mTexting), mobile Instant Messaging (mIM), multimedia messaging services (MMS), and email. A unique feature of MDS that enhances its popularity among its users is the awareness capability, which is revolutionizing the way MDS is being used to communicate today. It allows potential communication partners to socialize through these technologies. This dissertation explored the relationship between user experience, perceived richness, perceived social presence and satisfaction with MDS. A research model for examining the antecedent conditions that influence social presence, richness, social interaction and satisfaction with MDS was developed. Partial least square analysis showed that user experience influenced both social presence and richness. Also supported was the relationship between richness, social presence and satisfaction with MDS. Social presence mediated the relationship between user experience and richness. However, only one dimension of interactivity influenced social presence.
Date: May 2011
Creator: Ogara, Solomon Omondi

A Discrimination of Software Implementation Success Criteria

Description: Software implementation projects struggle with the delicate balance of low cost, on-time delivery and quality. The methodologies and processes used to create and maintain a quality software system are expensive to deploy and result in long development cycle-time. However, without their deployment into the software implementation life-cycle, a software system will be undependable, unsuccessful. The purpose of this research is to identify a succinct set of software implementation success criteria and assess the key independent constructs, activities, carried out to ensure a successful implementation project. The research will assess the success of a software implementation project as the dependent construct of interest and use the software process model (methodology) as the independent construct. This field research involved three phases: (1) criteria development, (2) data collection, and (3) testing of hypotheses and discriminant analysis. The first phase resulted in the development of the measurement instruments for the independent and dependent constructs. The measurement instrument for the independent construct was representative of the criteria from highly regarded software implementation process models and methodologies, e.g., ISO9000, Software Engineering Institute's Capability Maturity Model (SEI CMM). The dependent construct was developed from the categories and criteria from the Delone and McLean (1992) MIS List of Success Measures. The data collection and assessment phase employed a field survey research strategy to 80 companies involved in internal software implementation. Both successful and unsuccessful software implementation projects (identified by the Delone/McLean model) participated. Results from 165 projects were collected, 28 unsuccessful and 137 successful. The third phase used ANOVA to test the first 11 hypotheses and employed discriminant analysis for the 12th hypothesis to identify the "best set" of variables, criteria, that discriminate between successful and unsuccessful software implementation projects. Twelve discriminating variables out of 67 were identified and supported as significant discriminators between successful and unsuccessful projects. ...
Date: August 1999
Creator: Pryor, Alan N.

Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky It Behaviors of Individuals

Description: Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), which allows employees to connect their personal devices to corporate networks. BYOD is identified as one of the top ten technology trends in 2014 that can multiply the size of mobile workforce in organizations. However, it can also serve as a vehicle that transfers cyber security threats associated with personal mobile devices to the organizations. As BYOD opens the floodgates of various device types and platforms into organizations, identifying different sources of cyber security threats becomes indispensable. So far, there are no studies that investigated how user, device and usage characteristics affect individuals’ protective and risky IT behaviors. The goal of this dissertation is to expand the current literature in IS security by accounting for the roles of user, device, and usage characteristics in protective and risky IT behaviors of individuals. In this study, we extend the protection motivation theory by conceptualizing and measuring the risky IT behaviors of individuals and investigating how user, device, and usage characteristics along with the traditional protection motivation factors, influence individuals’ protective and risky IT behaviors. We collected data using an online survey. The results of our study show that individuals tend to engage in different levels of protective and risky IT behaviors on different types of devices. We also found that certain individual characteristics as well as the variety of applications that individuals use on their ...
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: August 2015
Creator: Negahban, Arash

The Effect of It Process Support, Process Visualization and Process Characteristics on Process Outcomes

Description: Business process re-engineering (part of the Business Process Management domain) is among the top three concerns of Information Technology (IT) leaders and is deemed to be one of many important IT leveraging opportunities. Two major challenges have been identified in relation to BPM and the use of IT. The first challenge is related to involving business process participants in process improvement initiatives using BPM systems. BPM technologies are considered to be primarily targeted for developers and not BPM users, and the need to engage process participants into process improvement initiatives is not addressed, contributing to the business-IT gap. The second challenge is related to potential de-skilling of knowledge workers when knowledge-intensive processes are automated and process knowledge resides in IT, rather than human process participants. The two identified challenges are not separate issues. Process participants need to be knowledgeable about the process in order to actively contribute to BPM initiatives, and the loss of process knowledge as a result of passive use of automated systems may further threaten their participation in process improvement. In response to the call for more research on the individual impacts of business process initiatives, the purpose of this dissertation study is to understand the relationship between IT configurations (particularly process support and process visualization), process characteristics and individual level process outcomes, such as task performance and process knowledge. In the development of the research model we rely on organizational knowledge creation literature and scaffolding in Vygotsky’s Zone of Proximal Development, business process modeling and workflow automation research, as well as research on the influence of IT on individual performance. The theoretical model is tested empirically in experimental settings using a series of two studies. In both studies participants were asked to complete tasks as part of a business process using different versions of a mock-up ...
Date: December 2013
Creator: Al Beayeyz, Alaa

The Effects of Alternative Presentation Formats on Biases and Heuristics in Human Decision Making

Description: The purpose of this research was to determine whether changes in the presentation format of items in a computer display could be used to alter the impact of specific cognitive biases, and to add to the knowledge needed to construct theory-based guidelines for output design. The problem motivating this study is twofold. The first part of the problem is the sub-optimal decision making caused by the use of heuristics and their associated cognitive biases. The second part of the problem is the lack of a theoretical basis to guide the design of information presentation formats to counter the effects of such biases. An availability model of the impact of changes in presentation format on biases and heuristics was constructed based on the findings of a literature review. A six-part laboratory experiment was conducted utilizing a sample of 205 student subjects from the college of business. The independent variable was presentation format which was manipulated by altering the visual salience or visual recency of items of information in a visual computer display. The dependent variables included recall, perceived importance, and the subjects' responses to three judgment tasks. The results clearly demonstrate that changes in presentation format can be used to alter the impact of cognitive biases on human decision making. The results also provide support for the availability model, with the exception of the proposed influence of learning style. Learning style was found to have no significant impact on decision making whether alone or in combination with changes in presentation format. The results of this investigation demonstrate that by using our knowledge of cognitive processes (e.g., the visual salience effect, the visual recency effect, and the availability heuristic), presentation formats can be altered in order to moderate the effects of certain biases and heuristics in human decision making. An understanding of ...
Date: May 1996
Creator: Van Dyke, Thomas P. (Thomas Peter)

The Effects of Using Information Technology to Support Evaluation of Feedback and Implementation of Adjustments in an Organization's Strategic Planning Process

Description: Organizations that must respond quickly to environmental pressures look for tools to assist in that response. Information technology may be one tool to facilitate the response. In this study the possible effects of using information technology, specifically a decision support system, in the feedback segment of one organization's strategic management loop were examined. The organization was one region of the Board of Probation and Parole in a central state. Personnel included administrators, parole officers and clerical workers. The information technology was an off-the-shelf software product called PlanRight. This study is significant for two reasons: a new application for information technology was examined and the adequacy of a generic computerized tool designed to be suitable for various operations was explored. This study was a case study. Two months of data were taken prior to the implementation of the decision support system, and four months of data were taken after the system was implemented. Questionnaire data taken before system implementation provided descriptive characteristics of the organization. Follow-up surveys and interviews at the conclusion of the study were used to evaluate employee perceptions. The study was done in three phases. During phase one questionnaires were distributed and returned. During phase two, goals, plans and evaluation criteria were formulated and plans were implemented. Feedback was obtained and evaluated through the use of the decision support system enabling reaction to the feedback data. In phase three perceptions of administrators and parole officers were elicited using follow-up surveys and semi-structured interviews. Three propositions guided the evaluation of the study's outcomes. These propositions dealt with performance toward goal achievement, satisfaction with feedback processes and quality of plans formulated for the project. Performance was moderately successful. Satisfaction with processes was high. Speed of obtaining feedback was considered high by administrators and paroled officers. Quality of processes and outcomes ...
Date: May 1997
Creator: Kemm, Elizabeth

An Empirical Investigation of Detail Design Tools and Cognitive Style of Software Developers

Description: The purpose of this study is to identify what detail design tools are more productive for the different types of professional software developers. By establishing a match between the detail design tool and the cognitive style of the professional programmer, the end product (Information Systems) should be of a higher quality. Two laboratory experiments were conducted. The first experiment was with professional Software Developers; the second one was with students. The dependant variables considered in this study were the number of semantic errors and the time required to complete a design task for conditional logic. The independent variables were the cognitive style of the subject, the complexity of the task, and the detail design tools. Decision trees, flowcharts and pseudocode were used as detailed design tools. Field dependence was the only dimension of cognitive style that was tested.
Date: May 1992
Creator: Flores-Rosales, Oscar

An Empirical Investigation of Psychophysiological Characteristics and Psychological Variables in Information Systems Human Factors Research

Description: The purpose of this study was to test the comparability of several psychological instruments commonly used in Information Systems (IS) cognitive style research. The objective was to determine the limitations of: existing instruments in IS cognitive style research. The motivation for this research was the inconclusive findings reported in IS human information processing research. The study used a repeated measures design. Each individual completed the following cognitive style and personality instruments; the Myers-Briggs Type Indicator, the Group Embedded-figures Test, the Learning Style Inventory, the Human Information Processing Survey, and the Torrance Tests of Creative Thinking (Figural Form A). The individual also completed a dichotic listening and tachistoscope task. Data was collected from business administration, BCIS, liberal arts majors, and IS professionals. The results of this study indicate IS researchers need to consider several factors in the use of these instruments. A direct relationship exists between cognitive ability and results on the GEFT. Cognitive ability should be considered a moderating variable in interpreting the results of the GEFT. Also, the hypothesis that the GEFT is a surrogate for analytical and low-analytical abilities is not supported by this study. Other reported results include the inappropriateness of using the TTCT with adult populations. Also, the MBTI appears to be an appropriate instrument for measuring cognitive styles in IS research. This study reported that gender is a moderating factor on the classification of MBTI types in that gender is not evenly divided among feeling and thinking types. This study reported no relationships between the cognitive style and personality instruments with the physiological measurements. The validity of the physiological measurements could be the underlying factor for not reporting any significant relationships. IS researchers will benefit from this study through an improved understanding of the appropriateness and applicability of these instruments. This benefits research through the ...
Date: December 1989
Creator: Corman, Lawrence S. (Lawrence Sanger)

Empirical Research of Decision-making Effectiveness When Using Differing Presentation Formats Under Varying Decision Tasks

Description: The purpose of this research was to determine if presentation format, given a particular task to be performed, would affect the decision-making process of financial decision makers. The problem motivating this study is the potential for managers to make inefficient decisions when they use reports which are presented inappropriately for a given task.
Date: December 1988
Creator: Hard, Nancy J. (Nancy Jean)

Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Description: Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organizations trying to reap potential benefits of enterprise social software (ESS) must successfully implement and maintain ESS tools. This research develops a framework for assessing knowledge sharing based on reciprocal determinism theory and augmented with technology acceptance, sociological, and psychological factors. Semi-structured interviews with IT professionals, followed by a written survey of employees using ESS are used to collect data. The hermeneutic circle methodology is used to analyze the interview transcripts and structural equation modeling is used to analyze the survey data. Results show technological advantage has no significant effect on the intention to share knowledge, but community cohesiveness and individual willingness significantly affect knowledge sharing intention and behavior. The study offers a synthesized model of variables affecting knowledge sharing as well as a better understanding of best practices for organizations to consider when implementing and maintaining ESS tools for employee knowledge sharing and collaboration.
Date: August 2013
Creator: Harden, Gina