Impacts of Personality Type and Computer System Response Time on Anxiety and User Response Time (open access)

Impacts of Personality Type and Computer System Response Time on Anxiety and User Response Time

The purpose of this research was to determine if personality type and system response time have any effect on state anxiety and user response time. The sample for this study consisted of senior and graduate level college students who possessed basic know 1 edge of a text editor. Each test subject was administered the Jenkins Activity Survey to determine scores for Type A versus Type B, speed and impatience, involvement, and competitiveness. The test subjects were randomly assigned to one of three treatment groups (good, variable, and poor system response time). They were required to edit a text file which contained multiple errors. The test subjects were provided hard copies of the file with errors (errors highlighted) and the file as should appear without the errors. The test situation for each test subject was identical, except for changes in system response time. The A-state scale of the State-Trait Anxiety Inventory (STAI) was administered to the test subjects immediately prior to the edit task in order to determine pre-task state anxiety levels. The A-state scale of the STAI was again administered immediately after the edit task in order to determine post-task state anxiety levels. Analysis of variance, analysis of covariance, regression, …
Date: December 1985
Creator: Guynes, Jan L. (Jan Lucille)
System: The UNT Digital Library
Communication Quality in Information Systems Development: The Effect of Computer-Mediated Communication on Task-Oriented Problem Solving (open access)

Communication Quality in Information Systems Development: The Effect of Computer-Mediated Communication on Task-Oriented Problem Solving

The problem motivating this research is that ineffective communication may hamper systems development efforts. Specifically germane to this study are development efforts characterized as task-oriented, and which require information-sharing and problem-solving activities. This research problem motivated an analysis of the communication process and lead to the development of a temporal framework that delineates variables associated with task-oriented, end user/systems analyst communication interactions. Several variables within this framework are depicted in two theoretical models. The first model shows the theoretical relationship between an independent variable, communication mode (represented by asynchronous computer conferencing and face-to-face conferencing), and five dependent variables: (1) the amount of information shared, (2) the significance of the information shared, (3) the comprehensiveness of the information shared, (4) the perception of progress toward the goal, and (5) the perception of freedom to participate. The second model depicts the assumed interaction between communication mode, the five variables cited above (now acting as independent variables), and a dependent variable, communication quality. There are two theoretical components of communication quality: (1) deviation from an optimal set of user requirements, and (2) the degree of convergence (unity based on mutual understanding and mutual agreement) emanating from a communication interaction. Using the theoretical models …
Date: May 1986
Creator: Smith, Jill Yvonne
System: The UNT Digital Library
The Impact of Multimedia on Information Scanning Effectiveness: an Empirical Study in an Executive Support Systems Environment (open access)

The Impact of Multimedia on Information Scanning Effectiveness: an Empirical Study in an Executive Support Systems Environment

This study investigates the impact of multimedia on the effectiveness of information scanning. Information scanning is the act of seeking and receiving a wide variety of special information to develop a thorough understanding of the organization and the environment. The application domain of this study is Executive Support Systems. The experimental task is to identify potential threats and opportunities, a strategic information-scanning activity, based on the information stored in three ESS prototypes. Forty subjects from four organizations participated in the experiment. A random assignment process allocated them into three groups. The control group used the text-based ESS. The first experimental group used the visual multimedia ESS. The second experimental group used the audiovisual multimedia ESS. The experiment was carried out on the sites of the participating organizations. The investigator measured the effectiveness of information scanning based on the number of threats and opportunities each subject identifies. A close-ended questionnaire measured subjects' retention of information. The results of this study support the cognitive-fit theory. The findings indicate that multimedia is not an appropriate presentation format for analytical tasks. Subjects who use text-based ESS identify significantly more threats and opportunities than subjects who use audiovisual multimedia ESS. The cognitive style of subjects …
Date: May 1996
Creator: Huang, Hsin-Chih
System: The UNT Digital Library
Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance (open access)

Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance

Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual decision makers, in different decision contexts, determine when to stop collecting information given the availability of virtually unlimited information. Decision makers must make an ultimate decision, but also must make a decision that he or she has enough information to make the final decision (Browne, Pitts, & Wetherbe, 2007). In determining how much information to collect, researchers found that people engage in ‘satisficing' in order to make decisions, particularly when there is more information than it is possible to manage (Simon, 1957). A more recent elucidation of information use relies on the idea of stopping rules, identifying five common stopping rules information seekers use: mental list, representational stability, difference threshold, magnitude threshold, and single criterion (Browne et al., 2007). Prior research indicates …
Date: August 2016
Creator: Gerhart, Natalie
System: The UNT Digital Library
Accessing the Power of Aesthetics in Human-computer Interaction (open access)

Accessing the Power of Aesthetics in Human-computer Interaction

In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency characteristics, are critical concerns of designers. This view contends that visual design enhances system use. Thus, this work examines the effects of visual design on computer systems. Visual design exerts its influence on systems through two mechanisms: it evokes affective responses from IT users, such as arousal and pleasure and it influences individuals’ cognitive assessments of systems. Given that both affective and cognitive reactions are significant antecedents of user behaviors in the IT realm, it is no surprise that visual design plays a critical role in information system success. Human-computer-interaction literature indicates that visual aesthetics positively influences such information success factors as usability, online trust, user satisfaction, flow experience, and so on. Although academic research has introduced visual design into the Information Systems (IS) …
Date: August 2013
Creator: Chenyan, Xu
System: The UNT Digital Library
Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals (open access)

Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals

Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), which allows employees to connect their personal devices to corporate networks. BYOD is identified as one of the top ten technology trends in 2014 that can multiply the size of mobile workforce in organizations. However, it can also serve as a vehicle that transfers cyber security threats associated with personal mobile devices to the organizations. As BYOD opens the floodgates of various device types and platforms into organizations, identifying different sources of cyber security threats becomes indispensable. So far, there are no studies that investigated how user, device and usage characteristics affect individuals’ protective and risky IT behaviors. The goal of this dissertation is to expand the current literature in IS security by accounting for the roles of user, device, and usage characteristics …
Date: August 2015
Creator: Negahban, Arash
System: The UNT Digital Library
An investigation of technical support issues influencing user satisfaction (open access)

An investigation of technical support issues influencing user satisfaction

The widespread distribution of personal computers (PCs) throughout organizations has made a substantial impact on information systems. Additionally, the tremendous growth of the Internet has changed the way business is carried out. As the user population evolves into a much more technical and demanding group, their needs are also changing. With this change, Management Information Systems (MIS) departments must develop new ways of providing service and support to the user community. This study investigates the relationship between information systems support structures, support services, service quality and the characteristics of a diverse user population. This includes investigating technical support issues influencing user satisfaction. This study attempts to improve the understanding of the support function within MIS. The results of this study clarify the support needs of the users and identify user satisfaction factors, as well as factors relative to the quality of the support received. Six streams of prior research were reviewed when developing the research framework. These include: user support, end users and end-user computing, identifying and classifying user types, information centers, user satisfaction, service quality and other sources of computer support. A survey instrument was designed using the (UIS) user satisfaction instrument developed by Doll and Torkzadeh (1988) and …
Date: May 2000
Creator: Gutierrez, Charletta Frances
System: The UNT Digital Library
An Examination of Electronic Commerce and the Internet : Role of Technology, Critical Success Factors and Business Strategy (open access)

An Examination of Electronic Commerce and the Internet : Role of Technology, Critical Success Factors and Business Strategy

This research employed the case study methodology to examine the issues, challenges, and project lessons learned for a large firm engaged in electronic commerce on the Internet.
Date: December 1997
Creator: Tabor, Sharon W.
System: The UNT Digital Library
Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications (open access)

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the consequences of mind wandering in a technological setting is imperative because mind wandering plays a vital role in influencing various outcomes associated with technology use and/or technology learning, such as technology anxiety, software self-efficacy, and task performance. This dissertation is composed of three essays which examine the determinants and consequences of mind wandering and focus of attention on a number of emotional and cognitive outcomes. A multi-method approach (i.e., online survey and laboratory experiment) across three essays is used to test the research models. Essay 1 focuses on developing the measurement items and estimating the impact of mind wandering on users' emotional outcomes (i.e., technology anxiety and users' satisfaction). Drawing upon the content regulation hypothesis of mind wandering, the content of thoughts …
Date: August 2016
Creator: Sullivan, Yulia
System: The UNT Digital Library
Three Essays on Social Media: the Effect of Motivation, Participation, and Sentiment on Performance (open access)

Three Essays on Social Media: the Effect of Motivation, Participation, and Sentiment on Performance

In recent years, social media has experienced tremendous growth in the number of users. Facebook alone has more than 1.3 billion active users and Twitter has attracted over 600 million active users. Social media has significantly changed the way humans communicate. Many people use social media to keep in touch with family and friends and receive up-to-date information about what happens around the world. Politicians are using social media to support their campaigns. Use of social media is not restricted to individuals and politicians. Businesses are now using social media to promote their products and services. Many companies maintain Facebook and Twitter accounts to keep in touch with their customers. Consumers also use social media to receive information about products/services. Online product reviews are now an important source of information for consumers. This dissertation aims to address one fundamental research question: how do individual differences among users lead to different levels of performance on social media? More specifically, this dissertation investigates the motivations of use and the predictors of performance in the context of social media. We utilize sentiment mining to predict performance in different types of social media including information diffusion in Twitter and helpfulness and readership of online …
Date: August 2015
Creator: Salehan, Mohammad
System: The UNT Digital Library
Design for Social Presence and Exploring Its Mediating Effect in Mobile Data Communication Services (open access)

Design for Social Presence and Exploring Its Mediating Effect in Mobile Data Communication Services

The mobility, flexibility, convenience, and ubiquity of mobile data services (MDS) have contributed to their enormous growth and popularity with users. MDS allow users to communicate through mobile texting (mTexting), mobile Instant Messaging (mIM), multimedia messaging services (MMS), and email. A unique feature of MDS that enhances its popularity among its users is the awareness capability, which is revolutionizing the way MDS is being used to communicate today. It allows potential communication partners to socialize through these technologies. This dissertation explored the relationship between user experience, perceived richness, perceived social presence and satisfaction with MDS. A research model for examining the antecedent conditions that influence social presence, richness, social interaction and satisfaction with MDS was developed. Partial least square analysis showed that user experience influenced both social presence and richness. Also supported was the relationship between richness, social presence and satisfaction with MDS. Social presence mediated the relationship between user experience and richness. However, only one dimension of interactivity influenced social presence.
Date: May 2011
Creator: Ogara, Solomon Omondi
System: The UNT Digital Library
Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps (open access)

Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps

The increasing demand for mobile apps is out the current capability of mobile app developers. In addition, the growing trend in smartphone ownership and the time people spend on mobile apps has raised several opportunities and risks for users and developers. The average time everyday a user spend on smartphones to use mobile apps is more than two hours. The worldwide mobile app revenue increase is estimated to grow 33%, $19 billion. Three quarter of the time used on mobile apps is solely for using game and social networking apps. To provide more customized services and function to users, mobile apps need to access to personal information. However, 80% of mobile apps put people's information privacy at risk. There is a major gap in the literature about the privacy concerns of mobile device users in the context of mobile apps. This dissertation addresses one fundamental research question: how does individuals' privacy change in the context of mobile apps? More precisely, the focus of this dissertation is on information privacy role in individuals' and mobile app developers' protective behaviors. We investigate the information sensitivity level influence on mobile app developers' emphasis on privacy across mobile app categories. The results show information …
Date: August 2016
Creator: Koohikamali, Mehrdad
System: The UNT Digital Library
Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information (open access)

Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information

The objective of this research is the investigation of the patterns of information growth to test whether there has been an "information explosion." To tackle the main problem, there are three issues which need to be addressed: (1) the concept of information dimensionality; (2) determination of common parameters to measure the amount of information within each dimension; and (3) a working definition of "explosiveness. "
Date: August 1987
Creator: Attia, Abdel-Hameed M. (Abdel-Hameed Mohammed)
System: The UNT Digital Library
An Empirical Investigation of Psychophysiological Characteristics and Psychological Variables in Information Systems Human Factors Research (open access)

An Empirical Investigation of Psychophysiological Characteristics and Psychological Variables in Information Systems Human Factors Research

The purpose of this study was to test the comparability of several psychological instruments commonly used in Information Systems (IS) cognitive style research. The objective was to determine the limitations of: existing instruments in IS cognitive style research. The motivation for this research was the inconclusive findings reported in IS human information processing research. The study used a repeated measures design. Each individual completed the following cognitive style and personality instruments; the Myers-Briggs Type Indicator, the Group Embedded-figures Test, the Learning Style Inventory, the Human Information Processing Survey, and the Torrance Tests of Creative Thinking (Figural Form A). The individual also completed a dichotic listening and tachistoscope task. Data was collected from business administration, BCIS, liberal arts majors, and IS professionals. The results of this study indicate IS researchers need to consider several factors in the use of these instruments. A direct relationship exists between cognitive ability and results on the GEFT. Cognitive ability should be considered a moderating variable in interpreting the results of the GEFT. Also, the hypothesis that the GEFT is a surrogate for analytical and low-analytical abilities is not supported by this study. Other reported results include the inappropriateness of using the TTCT with adult populations. …
Date: December 1989
Creator: Corman, Lawrence S. (Lawrence Sanger)
System: The UNT Digital Library
General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses (open access)

General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses

This research sought to shed light on information systems security (ISS) by conceptualizing an organization's use of countermeasures using general deterrence theory, positing a non-recursive relationship between threats and countermeasures, and by extending the ISS construct developed in prior research. Industry affiliation and organizational size are considered in terms of differences in threats that firms face, the different countermeasures in use by various firms, and ultimately, how a firm's ISS effectiveness is affected. Six information systems professionals were interviewed in order to develop the appropriate instruments necessary to assess the research model put forth; the final instrument was further refined by pilot testing with the intent of further clarifying the wording and layout of the instrument. Finally, the Association of Information Technology Professionals was surveyed using an online survey. The model was assessed using SmartPLS and a two-stage least squares analysis. Results indicate that a non-recursive relationship does indeed exist between threats and countermeasures and that countermeasures can be used to effectively frame an organization's use of countermeasures. Implications for practitioners include the ability to target the use of certain countermeasures to have desired effects on both ISS effectiveness and future threats. Additionally, the model put forth in this research …
Date: May 2009
Creator: Schuessler, Joseph H.
System: The UNT Digital Library
A Study of Differences Perceived by Information Systems Professionals in the Systems Development Job Environment Due to the Use of ICASE Technology (open access)

A Study of Differences Perceived by Information Systems Professionals in the Systems Development Job Environment Due to the Use of ICASE Technology

Information systems professionals now face the automation of their own work in integrated computer aided software engineering. Organizations need to achieve all the leverage possible from costly IT implementations to enhance competitiveness, profitability, and survival in a rapidly changing environment. ICASE technology is a part of the infrastructure necessary to meet this challenge but appears to present significant difficulties in implementation.
Date: August 1997
Creator: Troboy, Lori Kim
System: The UNT Digital Library
Interactions of Presentation Formats and Decision-Maker Characteristics upon Multiple Decision-Making Tasks: an Experiment Using Multiple Cognitive Assessments (open access)

Interactions of Presentation Formats and Decision-Maker Characteristics upon Multiple Decision-Making Tasks: an Experiment Using Multiple Cognitive Assessments

Information systems research tends to ignore individual differences in users. This laboratory experiment sought to illuminate contributions of decision-makers' cognitive processes to decision outcome as reflected in four hypothesis sets: the impact of imagery preference and presentation format upon (HI) recall accuracy and upon hemispheric activation during (H2) encoding and (H3) recall, and (H4) to examine the relationship between hemispheric activation differences and accuracy differences. Point-value (specific values) and intraset-pattern (relationships between values) recall were considered. Thirty MBA students, grouped by imagery preference (cognitive style) as favoring verbal (textual) or visual (graphical) information presentation, performed computer-based recall tasks using tabular and graphical formats in a repeated measures design. Hemispheric activation (cognitive process) was assessed using ratios of EEG activity in six frequency bands captured from six pairs of homologous electrode sites during encoding and recall.
Date: December 1994
Creator: Henson, Kerry L. (Kerry Lynn)
System: The UNT Digital Library