Accessing the Power of Aesthetics in Human-computer Interaction (open access)

Accessing the Power of Aesthetics in Human-computer Interaction

In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency characteristics, are critical concerns of designers. This view contends that visual design enhances system use. Thus, this work examines the effects of visual design on computer systems. Visual design exerts its influence on systems through two mechanisms: it evokes affective responses from IT users, such as arousal and pleasure and it influences individuals’ cognitive assessments of systems. Given that both affective and cognitive reactions are significant antecedents of user behaviors in the IT realm, it is no surprise that visual design plays a critical role in information system success. Human-computer-interaction literature indicates that visual aesthetics positively influences such information success factors as usability, online trust, user satisfaction, flow experience, and so on. Although academic research has introduced visual design into the Information Systems (IS) …
Date: August 2013
Creator: Chenyan, Xu
System: The UNT Digital Library
Accuracy and Interpretability Testing of Text Mining Methods (open access)

Accuracy and Interpretability Testing of Text Mining Methods

Extracting meaningful information from large collections of text data is problematic because of the sheer size of the database. However, automated analytic methods capable of processing such data have emerged. These methods, collectively called text mining first began to appear in 1988. A number of additional text mining methods quickly developed in independent research silos with each based on unique mathematical algorithms. How good each of these methods are at analyzing text is unclear. Method development typically evolves from some research silo centric requirement with the success of the method measured by a custom requirement-based metric. Results of the new method are then compared to another method that was similarly developed. The proposed research introduces an experimentally designed testing method to text mining that eliminates research silo bias and simultaneously evaluates methods from all of the major context-region text mining method families. The proposed research method follows a random block factorial design with two treatments consisting of three and five levels (RBF-35) with repeated measures. Contribution of the research is threefold. First, the users perceived a difference in the effectiveness of the various methods. Second, while still not clear, there are characteristics with in the text collection that affect the …
Date: August 2013
Creator: Ashton, Triss A.
System: The UNT Digital Library

An Analysis of Information Technology (IT) Post-Adoption Behavior

The primary focus of this research is explicating the role of emotion in IT post-adoption behavior. Studied in the context of intelligent personal assistants (IPA), a class of conversational artificial intelligence (AI), the first study integrates elements from computer science, communications, and IS disciplines. The research identifies two constructs vital for speech-based technologies, natural language understanding, and feedback, and examines their role in use decisions. This work provides guidance to practice on how best to allocate R&D investments in conversational AI. The second essay examines the IT continuance through the theoretical lens of the expectation-confirmation model (ECM), incorportating cognitive and emotional satisfaction into the ECM framework. Empirical testing of the model suggests that it offers additional clarity on IT continuance phenomena and provides a significant improvement to the explanatory power of ECM in the context of an emerging technology. The third essay is one of the earliest efforts to conceptualize and test a theoretical model that considers emotional attachment in IT continuance behavior. This essay develops a novel model to investigate this phenomenon based on emotional attachment theory, and empirically validates the proposed model in the context of conversational artificial intelligence systems. While the existing theories of IT continuance focus …
Date: August 2020
Creator: Mamun, Md Rasel Al
System: The UNT Digital Library

Augmented Reality Intentions in Social Networking and Retail Apps

This dissertation contributes to IS research by explaining user intentions while using AR features in mobile social networking and retail app contexts. It consists of three essays, which use partial least squares modeling to analyze different consumer behavior models. The first essay examines the influence of quality, human, and environmental factors on AR reuse intention in a mobile social networking context. The second essay introduces position relevance, a new construct essential to AR research in e-commerce, and it looks at the influence of this construct and app involvement on user purchase intention, while using view-in-room features on mobile retail apps. The third essay examines the influence of service quality and visual quality on recommendation intention of mobile retail apps while using view-in-room features compared to shopping without using these AR features.
Date: August 2020
Creator: David, Alsius
System: The UNT Digital Library
Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment (open access)

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of BI capabilities on BI success, in the presence of different decision environments. The decision environment is a composition of the decision types and the way the required information is processed to aid in decision making. BI capabilities are defined as critical functionalities that help an organization improve its performance, and they are examined in terms of organizational and technological capabilities. An online survey is used to obtain the data and partial least squares path modeling (PLS) is used for analysis. The results of this dissertation suggest that all technological capabilities as well as one of the organizational capabilities, flexibility, significantly impact BI success. Results also indicate that the moderating effect of decision environment is significant for quantitative data quality. These …
Date: August 2010
Creator: Işik, Öykü
System: The UNT Digital Library
Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications (open access)

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the consequences of mind wandering in a technological setting is imperative because mind wandering plays a vital role in influencing various outcomes associated with technology use and/or technology learning, such as technology anxiety, software self-efficacy, and task performance. This dissertation is composed of three essays which examine the determinants and consequences of mind wandering and focus of attention on a number of emotional and cognitive outcomes. A multi-method approach (i.e., online survey and laboratory experiment) across three essays is used to test the research models. Essay 1 focuses on developing the measurement items and estimating the impact of mind wandering on users' emotional outcomes (i.e., technology anxiety and users' satisfaction). Drawing upon the content regulation hypothesis of mind wandering, the content of thoughts …
Date: August 2016
Creator: Sullivan, Yulia
System: The UNT Digital Library
Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance (open access)

Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance

Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual decision makers, in different decision contexts, determine when to stop collecting information given the availability of virtually unlimited information. Decision makers must make an ultimate decision, but also must make a decision that he or she has enough information to make the final decision (Browne, Pitts, & Wetherbe, 2007). In determining how much information to collect, researchers found that people engage in ‘satisficing' in order to make decisions, particularly when there is more information than it is possible to manage (Simon, 1957). A more recent elucidation of information use relies on the idea of stopping rules, identifying five common stopping rules information seekers use: mental list, representational stability, difference threshold, magnitude threshold, and single criterion (Browne et al., 2007). Prior research indicates …
Date: August 2016
Creator: Gerhart, Natalie
System: The UNT Digital Library
Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness (open access)

Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness

The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera, 2003). The little empirical research that has been conducted in this area has shown that information security management in many organizations is poor (Baskerville, 1993; Shimeall & McDermott, 1999). Several researchers have identified the need for methods to measure the organization-wide information security posture of organizations (Eloff & Von Solms, 2000; James, 1996). This dissertation attempts to measure the organization-wide information security posture by examining benchmark variables that assess role, planning orientation, and performance structure within the organization. Through this conceptualization of an organization's information security posture, a means is presented to measure overall information security and how it impacts the effective utilization of information security strategies. The presence of the dependent variable, effectiveness, gives academics and practitioners a success measure which can guide more effective decision making in …
Date: August 2008
Creator: Young, Randall Frederick
System: The UNT Digital Library
Developing Criteria for Extracting Principal Components and Assessing Multiple Significance Tests in Knowledge Discovery Applications (open access)

Developing Criteria for Extracting Principal Components and Assessing Multiple Significance Tests in Knowledge Discovery Applications

With advances in computer technology, organizations are able to store large amounts of data in data warehouses. There are two fundamental issues researchers must address: the dimensionality of data and the interpretation of multiple statistical tests. The first issue addressed by this research is the determination of the number of components to retain in principal components analysis. This research establishes regression, asymptotic theory, and neural network approaches for estimating mean and 95th percentile eigenvalues for implementing Horn's parallel analysis procedure for retaining components. Certain methods perform better for specific combinations of sample size and numbers of variables. The adjusted normal order statistic estimator (ANOSE), an asymptotic procedure, performs the best overall. Future research is warranted on combining methods to increase accuracy. The second issue involves interpreting multiple statistical tests. This study uses simulation to show that Parker and Rothenberg's technique using a density function with a mixture of betas to model p-values is viable for p-values from central and non-central t distributions. The simulation study shows that final estimates obtained in the proposed mixture approach reliably estimate the true proportion of the distributions associated with the null and nonnull hypotheses. Modeling the density of p-values allows for better control of …
Date: August 1999
Creator: Keeling, Kellie Bliss
System: The UNT Digital Library
Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals (open access)

Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals

Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), which allows employees to connect their personal devices to corporate networks. BYOD is identified as one of the top ten technology trends in 2014 that can multiply the size of mobile workforce in organizations. However, it can also serve as a vehicle that transfers cyber security threats associated with personal mobile devices to the organizations. As BYOD opens the floodgates of various device types and platforms into organizations, identifying different sources of cyber security threats becomes indispensable. So far, there are no studies that investigated how user, device and usage characteristics affect individuals’ protective and risky IT behaviors. The goal of this dissertation is to expand the current literature in IS security by accounting for the roles of user, device, and usage characteristics …
Date: August 2015
Creator: Negahban, Arash
System: The UNT Digital Library

Does Quality Management Practice Influence Performance in the Healthcare Industry?

This research examines the relationship between quality management (QM) practices and performance in the healthcare industry via the conduct of three studies. The results of this research contribute both to advancing QM theory as well as in developing a unique text mining method that is illustrated by examining QM in the healthcare industry. Essay 1 explains the relationship between operational performance and QM practices in the healthcare industry. This study analyzed the findings from the literature using meta-analysis. We applied confirmatory semantic analysis (CSA) to examine the Baldrige winners' applications. Essay 2 examines the benefits associated with an effective QM program in the healthcare industry. This study addressed the research question about how effective QM practice results in improved hospital performance. This study compares the performance of Baldrige Award-winning hospitals with matching hospitals, state average, and national average. The results show that the Baldrige Award can lead to an increase in patient satisfaction in certain periods. Essay 3 discusses the contribution of an online clinic appointment system (OCAS) to QM practices. An enhanced trust model was built on understanding the mechanism of patients' trust formation in the OCAS. Understanding the determinants related to patients' trust and willingness to use OCAS …
Date: August 2020
Creator: Xie, Heng
System: The UNT Digital Library
The Effect of Value Co-creation and Service Quality on Customer Satisfaction and Commitment in Healthcare Management (open access)

The Effect of Value Co-creation and Service Quality on Customer Satisfaction and Commitment in Healthcare Management

Despite much interest in service quality and various other service quality measures, scholars appear to have overlooked the overall concept of quality. More specifically, previous research has yet to integrate the effect of the customer network and customer knowledge into the measurement of quality. In this work, it is posited that the evaluation of quality is based on both the delivered value from the provider as well as the value developed from the relationships among customers and between customers and providers. This research examines quality as a broad and complex issue, and uses the “Big Quality” concept within the context of routine healthcare service. The last few decades have witnessed interest and activities surrounding the subject of quality and value co-creation. These are core features of Service-Dominant (S-D) logic theory. In this theory, the customer is a collaborative partner who co-creates value with the firm. Customers create value through the strength of their relations and network, and they take a central role in value actualization as value co-creator. I propose to examine the relationship between quality and the constructs of value co-creation. As well, due to the pivotal role of the decision-making process in customer satisfaction, I will also operationalize …
Date: August 2015
Creator: Kwon, Junhyuk
System: The UNT Digital Library
Enhancing the Efficacy of Predictive Analytical Modeling in Operational Management Decision Making (open access)

Enhancing the Efficacy of Predictive Analytical Modeling in Operational Management Decision Making

In this work, we focus on enhancing the efficacy of predictive modeling in operational management decision making in two different settings: Essay 1 focuses on demand forecasting for the companies and the second study utilizes longitudinal data to analyze the illicit drug seizure and overdose deaths in the United States. In Essay 1, we utilize an operational system (newsvendor model) to evaluate the forecast method outcome and provide guidelines for forecast method (the exponential smoothing model) performance assessment and judgmental adjustments. To assess the forecast outcome, we consider not only the common forecast error minimization approach but also the profit maximization at the end of the forecast horizon. Including profit in our assessment enables us to determine if error minimization always results in maximum profit. We also look at the different levels of profit margin to analyze their impact on the forecasting method performance. Our study also investigates how different demand patterns influence maximizing the forecasting method performance. Our study shows that the exponential smoothing model family has a better performance in high-profit products, and the rate of decrease in performance versus demand uncertainty is higher in a stationary demand environment.In the second essay, we focus on illicit drug overdose …
Date: August 2019
Creator: Najmizadehbaghini, Hossein
System: The UNT Digital Library
Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace (open access)

Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organizations trying to reap potential benefits of enterprise social software (ESS) must successfully implement and maintain ESS tools. This research develops a framework for assessing knowledge sharing based on reciprocal determinism theory and augmented with technology acceptance, sociological, and psychological factors. Semi-structured interviews with IT professionals, followed by a written survey of employees using ESS are used to collect data. The hermeneutic circle methodology is used to analyze the interview transcripts and structural equation modeling is used to analyze the survey data. Results show technological advantage has no significant effect on the intention to share knowledge, but community cohesiveness and individual willingness significantly affect knowledge sharing intention and behavior. The study offers a synthesized model of variables affecting knowledge sharing as well as a better understanding of best practices for organizations to consider when implementing …
Date: August 2013
Creator: Harden, Gina
System: The UNT Digital Library
Extensions of the General Linear Model into Methods within Partial Least Squares Structural Equation Modeling (open access)

Extensions of the General Linear Model into Methods within Partial Least Squares Structural Equation Modeling

The current generation of structural equation modeling (SEM) is loosely split in two divergent groups - covariance-based and variance-based structural equation modeling. The relative newness of variance-based SEM has limited the development of techniques that extend its applicability to non-metric data. This study focuses upon the extension of general linear model techniques within the variance-based platform of partial least squares structural equation modeling (PLS-SEM). This modeling procedure receives it name through the iterative PLS‑SEM algorithm's estimates of the coefficients for the partial ordinary least squares regression models in both the measurement model and the overall structural model. This research addresses the following research questions: (1) What are the appropriate measures for data segmentation within PLS‑SEM? (2) What are the appropriate steps for the analysis of rank-ordered path coefficients within PLS‑SEM? and (3) What is an appropriate model selection index for PLS‑SEM? The limited type of data to which PLS-SEM is applicable suggests an opportunity to extend the method for use with different data and as a result a broader number of applications. This study develops and tests several methodologies that are prevalent in the general linear model (GLM). The proposed data segmentation approaches posited and tested through post hoc analysis …
Date: August 2016
Creator: George, Benjamin Thomas
System: The UNT Digital Library

Extensions of the Neural Network Models into Applications and Comparisons with General Linear Models

This dissertation is designed to answer the following questions: (1) Which measurement model is better to contribute to the research model in different areas? (2) Within a given model, how does the data size influence the performance of a neural network (NN) and some other methods? (3) Compared to partial least square (PLS), ordinary least square (OLS), XGBoost, how is the performance of NN? Essay 1 systematically compares PLS-SEM to ANN and builds the hybrid vehicle purchasing intention model (HVPIM). It investigates different models that have been previously applied to study the theory of planned behavior (TPB). The methods find those factors that significantly correlated with consumer purchase intention. Essay 2 posits, develops, and tests a PNN model with healthcare data. A research survey is designed and distributed to undergraduate students from a major research school in the U.S. southwest region. Research hypotheses are tested using PLS-SEM and PNN. Essay 3 targets on testing the performance of the NN model with panel data from the soccer transfer market. To achieve this purpose, the essay posits and develops an empirical test built on game theory. The NN model is tested and compared to OLS and XGBoost. As the research compares the …
Date: August 2021
Creator: Wang, Yuchen
System: The UNT Digital Library
Factors Influencing BI Data Collection Strategies: An Empirical Investigation (open access)

Factors Influencing BI Data Collection Strategies: An Empirical Investigation

The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top level managers involved in developing and managing BI. Data was collected from a range of industries and organizations within the United States. An online survey was used to collect the data to empirically test the proposed relationships. Data was analyzed using partial least square path modeling (PLS). The results of this study suggest that there exists a positive relationship between institutional isomorphism and BI consistency. The results also indicate that there exists a positive relationship between BI consistency and BI comprehensive data collection strategy, and the organizational transformation attribute of BI and BI comprehensive data collection strategy. These findings provide a theoretical lens to better understand the motivators and the success factors related to collecting the huge amounts of data required for BI. This study also provides managers with …
Date: August 2010
Creator: Ramakrishnan, Thiagarajan
System: The UNT Digital Library

Factors Influencing Continued Usage of Telemedicine Applications

This study addresses the antecedents of individuals' disposition to use telemedicine applications, as well as the antecedents of their usage to provide insight into creating sustained usage over time. The theoretical framework of this research is Bhattacherjee's expectation-confirmation IS continuance model. By combining a series of key factors which may influence the initial and continued usage of telemedicine applications with key constructs of Bhattacherjee's IS continuance model, this study aims to provide a deeper understanding of barriers to telemedicine app usage and how to facilitate continued use of these apps. Online survey data was collected from college students who are telemedicine application users. A total of 313 responses were gathered, and data analysis was conducted using SmartPLS 3. This dissertation contributes by looking at the IS adoption and IS continuance research simultaneously to connect these two research streams as well as suggesting the usage context of some established IS theory being different with regard to healthcare applications.
Date: August 2022
Creator: Liu, Xiaoyan
System: The UNT Digital Library

A Heuristic Approach to Selection of Analytical Methods: Three Empirical Healthcare Studies

Managers rely on analytics to make decisions and the choice of the analytical method can influence their decision-making. This dissertation considers three cases and examines how the choice of analytical methods influence interpretations and implications. These areas are communication for health-related information in social media, health information technology investment by hospitals as it relates to patient satisfaction, and health related expenditure policies of countries. These studies develop theoretical models and empirically test them on primary or secondary data, comparing the performance of popular analytical methods. The conduct of these three studies contributes to a better understanding about the choice of analytical methods and allow development of a heuristic approach by offering guidelines for selecting an appropriate methodology. They demonstrate the value of heuristic approaches for use with non-traditional and traditional statistical methods, as the information gained from non-traditional methods (NNs) provides insights into traditional statistical methods, similar to insights gained from exploratory data analysis. The studies also show the value in examining any dataset with multiple methods because they either confirm each other or fail to confirm, providing insights.
Date: August 2021
Creator: Tarakci, Yasemin
System: The UNT Digital Library
Hybrid Models in Automobile Insurance: Technology Adoption and Customer Relations (open access)

Hybrid Models in Automobile Insurance: Technology Adoption and Customer Relations

Customer relationship management (CRM), a primary activity in the business value chain to relate to the customer, involves solicitation, analysis, and the use of the knowledge about the customer to provide goods and services through effective and efficient methods. It is a wise strategy and source of competitive advantage for customer behavior understanding and business performance management. The use of information technology (IT) in CRM allows companies to simplify their processes, to integrate product or service related decision making with the business strategies, and to optimize their operations by embracing analytical techniques. The insurance industry is facing unprecedented challenges and decisions in this data-driven business paradigm. It is a strategic necessity for customer-centric insurers to utilize emerging IT capability to support interactions between customers and business operations. The research in the dissertation seeks to provide insights into the application of early technology innovation and data-driven strategies by investigating the following two groups of CRM technology issues: technology adoption and data-driven technology application. Through three essays, the dissertation explores the use of information technology and data analytical tools to provide insight into how automobile insurance companies make decisions regarding their relationships with their customers. The results from these studies provide a …
Date: August 2019
Creator: Tian, Xiaoguang
System: The UNT Digital Library

The Impact of Blockchain Food Tracing Information Quality and Trust on Intention to Purchase

The purpose of our research is to empirically test how system attributes of blockchain build trust through system and information components in blockchain food traceability systems. Findings showed that system attributes of blockchain are strong predictors of trust leading to intention to purchase. A sample of 358 responses were collected from college students through online survey. SmartPLS 3.0 is adopted for data analysis. We made contributions by building a new research model to guide future studies on trust formation in blockchain based systems as well as informing practice to adopt proven features of blockchain to create and capture values for customers.
Date: August 2022
Creator: Lai, Im Hong
System: The UNT Digital Library
The Impact of Culture on the Decision Making Process in Restaurants (open access)

The Impact of Culture on the Decision Making Process in Restaurants

Understanding the process of consumers during key purchasing decision points is the margin between success and failure for any business. The cultural differences between the factors that affect consumers in their decision-making process is the motivation of this research. The purpose of this research is to extend the current body of knowledge about decision-making factors by developing and testing a new theoretical model to measure how culture may affect the attitudes and behaviors of consumers in restaurants. This study has its theoretical foundation in the theory of service quality, theory of planned behavior, and rational choice theory. To understand how culture affects the decision-making process and perceived satisfaction, it is necessary to analyze the relationships among the decision factors and attitudes. The findings of this study contribute by building theory and having practical implications for restaurant owners and managers. This study employs a mixed methodology of qualitative and quantitative research. More specifically, the methodologies employed include the development of a framework and testing of that framework via collection of data using semi-structured interviews and a survey instrument. Considering this framework, we test culture as a moderating relationship by using respondents’ birth country, parents’ birth country and ethnic identity. The results …
Date: August 2015
Creator: Boonme, Kittipong
System: The UNT Digital Library
The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective (open access)

The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective

This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed in two stages. First, the participants (employees of a municipality) are exposed to a series of phishing and spear-phishing messages to assess if there are any common characteristics shared by the phishing victims. The differences between the phished and the not phished group are assessed through multiple discriminant analysis. Second, the same individuals are asked to participate in a survey designed to examine their security awareness. The research model is tested using PLS-SEM approach. The results indicate that security awareness is in fact a second-order formative construct composed of six components. There are significant differences in security awareness levels between the victims of the phishing experiment and the employees who maintain compliance with security policies. The study extends the theory by …
Date: August 2014
Creator: Hanus, Bartlomiej T.
System: The UNT Digital Library
The Impact of IT Capability on Employee Capability, Customer Value, Customer Satisfaction, and Business Performance (open access)

The Impact of IT Capability on Employee Capability, Customer Value, Customer Satisfaction, and Business Performance

This study empirically examines the impact of IT capability on firms' performance and evaluates whether firms' IT capabilities play a role in improving employee capability, customer value, customer satisfaction, and ultimately business performance. The results were based on comparing the business performance of the IT leader companies with that of control companies of similar size and industry. The IT leader companies were selected from the Information Week 500 list published annually from 2001 to 2004. For a company to be selected as IT leaders, it needed to be listed at least twice during the period. Furthermore, it had to be listed in the American Customer Satisfaction Index (ACSI) so that its customer satisfaction level could be assessed. Standard & Poor's Compustat and the ACSI scores were used to test for changes in business performance. The study found that the IT leaders had a raw material cost measured by cost-of-goods-sold to sales ratio (COGS/S) than the control companies. However, it found no evidence that firms' IT capability affects employee capability, customer value, customer satisfaction, and profit. An important implication from this study is that IT becomes a commodity and an attempt to gain a competitive advantage by overinvesting in IT may …
Date: August 2009
Creator: Chae, Ho-Chang
System: The UNT Digital Library