33 Matching Results

Results open in a new window/tab.

Cognitive biases resulting from the representativeness heuristic in operations management: an experimental investigation (open access)

Cognitive biases resulting from the representativeness heuristic in operations management: an experimental investigation

This article investigates the six cognitive biases resulting from the use of the representativeness heuristic, namely, insensitivity to prior probability of outcomes, insensitivity to sample size, misconception of chance, insensitivity to predictability, the illusion of validity, and misconception of regression. Specifically, the authors examine how cognitive reflection and training affect these six cognitive biases in the operations management context.
Date: April 10, 2019
Creator: AlKhars, Mohammed; Evangelopoulos, Nicholas; Pavur, Robert J. & Kulkarni, Shailesh S.
Object Type: Article
System: The UNT Digital Library
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection (open access)

When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection

Article describes how identity theft poses a significant threat to mobile users, yet mobile identity protection is often overlooked in cybersecurity literature. This study adopts a mixed-methods approach and draws on expectancy-value theory to address these gaps and explore the impact of expectations, capabilities, motivational values, technical measures, and awareness on individuals' intentions to achieve mobile identity protection.
Date: September 19, 2023
Creator: Alhelaly, Yasser; Dhillon, Gurpreet & Oliveira, Tiago
Object Type: Article
System: The UNT Digital Library

Creating a Collaborative Online Project for an MBA Core course

Poster presented as part of the 2012 University Forum on Teaching & Learning at UNT. This poster discusses creating a collaborative online project for an MBA core course. Traditional face-to-face classes offer the rich interactive experience gained through collaborative group projects.
Date: March 28, 2012
Creator: Evangelopoulos, Nicholas & Jayakumar, Jay
Object Type: Poster
System: The UNT Digital Library
Latent Semantic Analysis: Five methodological recommendations (open access)

Latent Semantic Analysis: Five methodological recommendations

Article discussing latent semantic analysis and five methodological recommendations.
Date: 2012
Creator: Evangelopoulos, Nicholas; Zhang, Xiaoni & Prybutok, Victor R.
Object Type: Article
System: The UNT Digital Library
Applying Game Theory for Improving and Optimizing the US Political Asylum Process (open access)

Applying Game Theory for Improving and Optimizing the US Political Asylum Process

Data management plan for the grant, "Applying Game Theory for Improving and Optimizing the US Political Asylum Process"
Date: 2024-01-01/2024-12-31
Creator: Fathi, Michel
Object Type: Text
System: The UNT Digital Library
Causal Latent Semantic Analysis (cLSA): An Illustration (open access)

Causal Latent Semantic Analysis (cLSA): An Illustration

Article discussing an illustration of causal latent semantic analysis (cLSA).
Date: April 2011
Creator: Hossain, Muhammad Muazzem; Prybutok, Victor R. & Evangelopoulos, Nicholas
Object Type: Article
System: The UNT Digital Library
Enhancing Cybersecurity TKSs (Tasks, Knowledge, and Skills) for Cybersecurity Education and Workforce Development (open access)

Enhancing Cybersecurity TKSs (Tasks, Knowledge, and Skills) for Cybersecurity Education and Workforce Development

Data management plan for the grant, "Enhancing Cybersecurity TKSs (Tasks, Knowledge, and Skills) for Cybersecurity Education and Workforce Development."
Date: 2022-03-01/2023-02-28
Creator: Kim, Dan J.
Object Type: Text
System: The UNT Digital Library
Exploring the Relative Risk Severity of Phishing Techniques on Individual Phishing Susceptibility: A Mixed Approach (open access)

Exploring the Relative Risk Severity of Phishing Techniques on Individual Phishing Susceptibility: A Mixed Approach

Data management plan for the grant, "Exploring the Relative Risk Severity of Phishing Techniques on Individual Phishing Susceptibility: A Mixed Approach."
Date: 2024-03-01/2025-02-28
Creator: Kim, Dan J.
Object Type: Text
System: The UNT Digital Library
Confirmatory Influence of Trust in E-commerce: A Data Collection Bias and Suggestion (open access)

Confirmatory Influence of Trust in E-commerce: A Data Collection Bias and Suggestion

Article explores the importance of investigating the impact of trust on intention to purchase from both successful and unsuccessful purchase cases in order to provide a more balanced view of the critical role of trust in e-commerce transaction decisions.
Date: January 7, 2020
Creator: Kim, Dan J. & Ogbanufe, Obi
Object Type: Article
System: The UNT Digital Library
An Investigation of Predictors of Information Diffusion in Social Media: Evidence from Sentiment Mining of Twitter Messages (open access)

An Investigation of Predictors of Information Diffusion in Social Media: Evidence from Sentiment Mining of Twitter Messages

Article is a study examining how emotional arousal influences information diffusion in social media using a sentiment mining approach. The authors propose a research model and test it using data collected from Twitter.
Date: January 7, 2020
Creator: Kim, Dan J. & Salehan, Mohammad
Object Type: Article
System: The UNT Digital Library
Information Re-Sharing on Social Network Sites in the Age of Fake News (open access)

Information Re-Sharing on Social Network Sites in the Age of Fake News

This article examines the relationship between the characteristics of social media content and re-sharing behavior.
Date: October 3, 2017
Creator: Koohikamali, Mehrdad & Sidorova, Anna
Object Type: Article
System: The UNT Digital Library
Dynamic Interactive Visualizations: Implications of Seeing, Doing, and Playing for Quantitative Analysis Pedagogy (open access)

Dynamic Interactive Visualizations: Implications of Seeing, Doing, and Playing for Quantitative Analysis Pedagogy

Article presents a sample of dynamic interactive visualizations of relatively complex quantitative topics in statistics, operations management, and management science and discuss their implications for pedagogy for undergraduate and graduate students.
Date: May 16, 2019
Creator: Kulkarni, Shailesh S.; Mai, Bin; Amirkiaee, S. Yasaman & Tarakci, Hakan
Object Type: Article
System: The UNT Digital Library
Role of Electronic Healthcare Record Adoption in Enhancing the Relationship between Quality Measures and Hospital Financial Performance (open access)

Role of Electronic Healthcare Record Adoption in Enhancing the Relationship between Quality Measures and Hospital Financial Performance

Article asserts that the most significant government-mandated technology is the implementation of Electronic Health Records (EHRs). The present research examines EHR through the lens of Resource Advantage Theory –– to empirically assess how partial and comprehensive implementation levels of EHR adoption influence quality management and financial performance of hospitals.
Date: November 16, 2022
Creator: Malhan, Amit; Pavur, Robert J.; Pelton, Lou E. & Manuj, Ila
Object Type: Article
System: The UNT Digital Library
From user reviews to theory building: an inductive approach to construct identification using text mining (open access)

From user reviews to theory building: an inductive approach to construct identification using text mining

Poster paper for the 2017 International Conference on Knowledge Management. This paper demonstrates the utility of text analytic for theory building and validation in information science.
Date: October 25, 2017
Creator: Nguyen, Quynh & Sidorova, Anna
Object Type: Paper
System: The UNT Digital Library

From User Reviews to Theory Building: An Inductive Approach to Construct Identification Using Text Mining

Presented at the 2017 International Conference on Knowledge Management. This poster demonstrates the utility of text analytic for theory building and validation in information science.
Date: October 25, 2017
Creator: Nguyen, Quynh N. & Sidorova, Anna
Object Type: Poster
System: The UNT Digital Library
Predicting Criminal Activities in Darknet Markets: Advancing Knowledge and Tools for Activities Monitoring (open access)

Predicting Criminal Activities in Darknet Markets: Advancing Knowledge and Tools for Activities Monitoring

Data management plan for the grant, "Predicting Criminal Activities in Darknet Markets: Advancing Knowledge and Tools for Activities Monitoring."
Date: 2022-03-01/2023-02-28
Creator: Ogbanufe, Obi
Object Type: Text
System: The UNT Digital Library
Vice or Virtue? Exploring the Dichotomy of an Offensive Security Engineer and Government “Hack Back” Policies (open access)

Vice or Virtue? Exploring the Dichotomy of an Offensive Security Engineer and Government “Hack Back” Policies

This article uses the virtue (ethics) theory and cyber attribution to argue that there exists a dichotomy among offensive security engineers, one that appreciates organizational security practices, but at the same time violates ethics in how to retaliate against a malicious attacker.
Date: January 7, 2020
Creator: Parrish, James L.; Withers, Kim L.; Smith, James N. & Ellis, Timothy J.
Object Type: Article
System: The UNT Digital Library

Analyzing How Business Students Engage in Learning in an Introductory Data Analysis Course

Poster presented at the 2013 University Forum on Teaching & Learning at UNT. This poster discusses an analysis of how business students engage in learning in an introductory data analysis course.
Date: April 12, 2013
Creator: Pavur, Robert J. & Kvanli, Alan H.
Object Type: Poster
System: The UNT Digital Library
Continued Usage and Location Disclosure of Location-Based Applications: A Necessity for Location Intelligence (open access)

Continued Usage and Location Disclosure of Location-Based Applications: A Necessity for Location Intelligence

This article's research builds a continuance usage and location disclosure model from the expectation-confirmation perspective. The effect of benefit expectations on usefulness and satisfaction is hypothesized. In addition, the positive effect of usefulness on satisfaction and continuance intention is postulated. Findings contribute to the current literature in business intelligence by focusing on location disclosure behavior in the context of LBAs and the necessity of this type of information for location intelligence. This article was presented at the 52nd Hawaii International Conference on System Sciences.
Date: January 8, 2019
Creator: Peak, Daniel; Mousavizadeh, Mohammadreza & Koohikamali, Mehrdad
Object Type: Article
System: The UNT Digital Library
An Exploration Into the Development, Application, and Further Growth of Real Options Analysis (open access)

An Exploration Into the Development, Application, and Further Growth of Real Options Analysis

This paper discusses research into the development, application, and further growth of real options analysis.
Date: April 15, 2010
Creator: Poyser, Whitley; Davis, Alan; Gentry, Danon; Robinson, Miguel; Manuj, Ila; Pohlen, Terrence L. et al.
Object Type: Paper
System: The UNT Digital Library

An Exploration Into the Development, Application, and Further Growth of Real Options Analysis [Presentation]

Presentation for the 2010 University Scholars Day at the University of North Texas discussing research on the development, application, and further growth of real options analysis.
Date: April 15, 2010
Creator: Poyser, Whitley; Davis, Alan; Gentry, Danon; Robinson, Miguel; Manuj, Ila; Pohlen, Terrence L. et al.
Object Type: Presentation
System: The UNT Digital Library
Enhancing Techniques for Ontologies Mapping for the Cybersecurity Workforce Development Applications (open access)

Enhancing Techniques for Ontologies Mapping for the Cybersecurity Workforce Development Applications

Data management plan for the grant, "Enhancing Techniques for Ontologies Mapping for the Cybersecurity Workforce Development Applications."
Date: 2022-03-01/2023-02-28
Creator: Pravin, Dipakkumar
Object Type: Text
System: The UNT Digital Library
Exploiting machine learning for cybersecurity tasks to talent mapping and exploring credentialing ecosystem (open access)

Exploiting machine learning for cybersecurity tasks to talent mapping and exploring credentialing ecosystem

Data management plan for the grant, "Exploiting machine learning for cybersecurity tasks to talent mapping and exploring credentialing ecosystem"
Date: 2024-01-01/2024-12-31
Creator: Pravin, Dipakkumar
Object Type: Text
System: The UNT Digital Library
An Integrated Structural Equation Model of eHealth Behavioral Intention (open access)

An Integrated Structural Equation Model of eHealth Behavioral Intention

Article presents an integrated model to explain the learning process and provide essential antecedents of eHealth behavioral intention.
Date: September 27, 2019
Creator: Prybutok, Gayle; Prybutok, Victor R.; Ta, Anh Viet & Lui, Xiaotong
Object Type: Article
System: The UNT Digital Library