Organizational factors contributing to an effective information technology intelligence system. (open access)

Organizational factors contributing to an effective information technology intelligence system.

The purpose of this dissertation is to investigate the organizational factors that contribute to effective emerging information technology intelligence processes and products. Emerging information technology is defined as a technology which is little commercialized and is currently adopted by not more than twenty percent of the companies within a given industry. By definition, information technology intelligence is a subdivision of competitive intelligence and business intelligence. I discovered evidence that the information technology intelligence process includes assessment of information technology intelligence needs of consumers, collection of data from internal and external sources, analysis of the collected data and distribution of the analyzed data to the consumers. Exploratory factor analysis confirmed the existence of all the variables in the proposed research model. I found empirical evidence that the final technology intelligence product contributes to better decisions made by consumers, their better environmental scanning, and more funding to information technology departments in organizations from different industries and of different sizes.
Date: December 2008
Creator: Taskov, Konstantin
System: The UNT Digital Library
An Experimental Investigation of Information Systems Project Escalation: An Examination of Contributory Factors in a Business Environment (open access)

An Experimental Investigation of Information Systems Project Escalation: An Examination of Contributory Factors in a Business Environment

The purpose of this research is to continue examining the project management process. The management of projects is complicated. It is the complexity of the process that makes a project so difficult to control. This research examines the effect of particular facets of the project manager's skill set and operating environment on management decisions.
Date: August 1997
Creator: Huff, Richard A. (Richard Allen)
System: The UNT Digital Library
Longitudinal Study to Assess the Impact of Instructor-Based Training Versus Computer-Based Training on User Performance: A Field Experiment (open access)

Longitudinal Study to Assess the Impact of Instructor-Based Training Versus Computer-Based Training on User Performance: A Field Experiment

The purpose of this study is to investigate the relationships between selected end-user training programs corporations provide to their employees and subsequent employee performance based on these opportunities.
Date: August 1996
Creator: Desai, Mayur S.
System: The UNT Digital Library
An Examination of Electronic Commerce and the Internet : Role of Technology, Critical Success Factors and Business Strategy (open access)

An Examination of Electronic Commerce and the Internet : Role of Technology, Critical Success Factors and Business Strategy

This research employed the case study methodology to examine the issues, challenges, and project lessons learned for a large firm engaged in electronic commerce on the Internet.
Date: December 1997
Creator: Tabor, Sharon W.
System: The UNT Digital Library
Critical Success Factors in Data Mining Projects. (open access)

Critical Success Factors in Data Mining Projects.

The increasing awareness of data mining technology, along with the attendant increase in the capturing, warehousing, and utilization of historical data to support evidence-based decision making, is leading many organizations to recognize that the effective use of data is the key element in the next generation of client-server enterprise information technology. The concept of data mining is gaining acceptance in business as a means of seeking higher profits and lower costs. To deploy data mining projects successfully, organizations need to know the key factors for successful data mining. Implementing emerging information systems (IS) can be risky if the critical success factors (CSFs) have been researched insufficiently or documented inadequately. While numerous studies have listed the advantages and described the data mining process, there is little research on the success factors of data mining. This dissertation identifies CSFs in data mining projects. Chapter 1 introduces the history of the data mining process and states the problems, purposes, and significances of this dissertation. Chapter 2 reviews the literature, discusses general concepts of data mining and data mining project contexts, and reviews general concepts of CSF methodologies. It also describes the identification process for the various CSFs used to develop the research framework. …
Date: August 2003
Creator: Sim, Jaesung
System: The UNT Digital Library
Productivity Considerations for Online Help Systems (open access)

Productivity Considerations for Online Help Systems

The purpose of this study was to determine if task type, task complexity, and search mechanism would have a significant affect on task performance. The problem motivating this study is the potential for systems online help designers to construct systems that can improve the performance of computer users when they need help.
Date: May 1994
Creator: Shultz, Charles R. (Charles Richard)
System: The UNT Digital Library
The Effects of Using Information Technology to Support Evaluation of Feedback and Implementation of Adjustments in an Organization's Strategic Planning Process (open access)

The Effects of Using Information Technology to Support Evaluation of Feedback and Implementation of Adjustments in an Organization's Strategic Planning Process

Organizations that must respond quickly to environmental pressures look for tools to assist in that response. Information technology may be one tool to facilitate the response. In this study the possible effects of using information technology, specifically a decision support system, in the feedback segment of one organization's strategic management loop were examined. The organization was one region of the Board of Probation and Parole in a central state. Personnel included administrators, parole officers and clerical workers. The information technology was an off-the-shelf software product called PlanRight. This study is significant for two reasons: a new application for information technology was examined and the adequacy of a generic computerized tool designed to be suitable for various operations was explored. This study was a case study. Two months of data were taken prior to the implementation of the decision support system, and four months of data were taken after the system was implemented. Questionnaire data taken before system implementation provided descriptive characteristics of the organization. Follow-up surveys and interviews at the conclusion of the study were used to evaluate employee perceptions. The study was done in three phases. During phase one questionnaires were distributed and returned. During phase two, goals, plans …
Date: May 1997
Creator: Kemm, Elizabeth
System: The UNT Digital Library
Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps (open access)

Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps

The increasing demand for mobile apps is out the current capability of mobile app developers. In addition, the growing trend in smartphone ownership and the time people spend on mobile apps has raised several opportunities and risks for users and developers. The average time everyday a user spend on smartphones to use mobile apps is more than two hours. The worldwide mobile app revenue increase is estimated to grow 33%, $19 billion. Three quarter of the time used on mobile apps is solely for using game and social networking apps. To provide more customized services and function to users, mobile apps need to access to personal information. However, 80% of mobile apps put people's information privacy at risk. There is a major gap in the literature about the privacy concerns of mobile device users in the context of mobile apps. This dissertation addresses one fundamental research question: how does individuals' privacy change in the context of mobile apps? More precisely, the focus of this dissertation is on information privacy role in individuals' and mobile app developers' protective behaviors. We investigate the information sensitivity level influence on mobile app developers' emphasis on privacy across mobile app categories. The results show information …
Date: August 2016
Creator: Koohikamali, Mehrdad
System: The UNT Digital Library
Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information (open access)

Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information

The objective of this research is the investigation of the patterns of information growth to test whether there has been an "information explosion." To tackle the main problem, there are three issues which need to be addressed: (1) the concept of information dimensionality; (2) determination of common parameters to measure the amount of information within each dimension; and (3) a working definition of "explosiveness. "
Date: August 1987
Creator: Attia, Abdel-Hameed M. (Abdel-Hameed Mohammed)
System: The UNT Digital Library