A Study of Differences Perceived by Information Systems Professionals in the Systems Development Job Environment Due to the Use of ICASE Technology (open access)

A Study of Differences Perceived by Information Systems Professionals in the Systems Development Job Environment Due to the Use of ICASE Technology

Information systems professionals now face the automation of their own work in integrated computer aided software engineering. Organizations need to achieve all the leverage possible from costly IT implementations to enhance competitiveness, profitability, and survival in a rapidly changing environment. ICASE technology is a part of the infrastructure necessary to meet this challenge but appears to present significant difficulties in implementation.
Date: August 1997
Creator: Troboy, Lori Kim
System: The UNT Digital Library
An Experimental Investigation of Information Systems Project Escalation: An Examination of Contributory Factors in a Business Environment (open access)

An Experimental Investigation of Information Systems Project Escalation: An Examination of Contributory Factors in a Business Environment

The purpose of this research is to continue examining the project management process. The management of projects is complicated. It is the complexity of the process that makes a project so difficult to control. This research examines the effect of particular facets of the project manager's skill set and operating environment on management decisions.
Date: August 1997
Creator: Huff, Richard A. (Richard Allen)
System: The UNT Digital Library
An Analysis of the Effect of Environmental and Systems Complexity on Information Systems Failures (open access)

An Analysis of the Effect of Environmental and Systems Complexity on Information Systems Failures

Companies have invested large amounts of money on information systems development. Unfortunately, not all information systems developments are successful. Software project failure is frequent and lamentable. Surveys and statistical analysis results underscore the severity and scope of software project failure. Limited research relates software structure to information systems failures. Systematic study of failure provides insights into the causes of IS failure. More importantly, it contributes to better monitoring and control of projects and enhancing the likelihood of the success of management information systems. The underlining theories and literature that contribute to the construction of theoretical framework come from general systems theory, complexity theory, and failure studies. One hundred COBOL programs from a single company are used in the analysis. The program log clearly documents the date, time, and the reasons for changes to the programs. In this study the relationships among the variables of business requirements change, software complexity, program size and the error rate in each phase of software development life cycle are tested. Interpretations of the hypotheses testing are provided as well. The data shows that analysis error and design error occur more often than programming error. Measurement criteria need to be developed at each stage of the …
Date: August 2001
Creator: Zhang, Xiaoni
System: The UNT Digital Library
Factors Influencing BI Data Collection Strategies: An Empirical Investigation (open access)

Factors Influencing BI Data Collection Strategies: An Empirical Investigation

The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top level managers involved in developing and managing BI. Data was collected from a range of industries and organizations within the United States. An online survey was used to collect the data to empirically test the proposed relationships. Data was analyzed using partial least square path modeling (PLS). The results of this study suggest that there exists a positive relationship between institutional isomorphism and BI consistency. The results also indicate that there exists a positive relationship between BI consistency and BI comprehensive data collection strategy, and the organizational transformation attribute of BI and BI comprehensive data collection strategy. These findings provide a theoretical lens to better understand the motivators and the success factors related to collecting the huge amounts of data required for BI. This study also provides managers with …
Date: August 2010
Creator: Ramakrishnan, Thiagarajan
System: The UNT Digital Library
Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment (open access)

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of BI capabilities on BI success, in the presence of different decision environments. The decision environment is a composition of the decision types and the way the required information is processed to aid in decision making. BI capabilities are defined as critical functionalities that help an organization improve its performance, and they are examined in terms of organizational and technological capabilities. An online survey is used to obtain the data and partial least squares path modeling (PLS) is used for analysis. The results of this dissertation suggest that all technological capabilities as well as one of the organizational capabilities, flexibility, significantly impact BI success. Results also indicate that the moderating effect of decision environment is significant for quantitative data quality. These …
Date: August 2010
Creator: Işik, Öykü
System: The UNT Digital Library
Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information (open access)

Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information

The objective of this research is the investigation of the patterns of information growth to test whether there has been an "information explosion." To tackle the main problem, there are three issues which need to be addressed: (1) the concept of information dimensionality; (2) determination of common parameters to measure the amount of information within each dimension; and (3) a working definition of "explosiveness. "
Date: August 1987
Creator: Attia, Abdel-Hameed M. (Abdel-Hameed Mohammed)
System: The UNT Digital Library
An Empirical Investigation of the Effects of Individual Differences and Data Models on the Ease-of-Use of Database Query Facilties by Casual Users (open access)

An Empirical Investigation of the Effects of Individual Differences and Data Models on the Ease-of-Use of Database Query Facilties by Casual Users

The problem motivating this study is that database query facilities are not effectively meeting the needs of casual users. A solution to this problem is especially important due to the increasing number of potential casual users. There is considerable controversy revolving around the question of which elements and/or which combination of elements within the casual users' environment are necessary to provide an effective man/machine interface. The purpose of the study is to extend the basic knowledge relating to the effect of using different data models, the effect of cognitive style differences, and the interaction effects of these two independent variables on casual users' performance and confidence in writing database queries. The data models being investigated are the relational, hierarchical, and network models. The cognitive style classifications used are two of the Jungian dimensions, Sensing/Intuition and Thinking/Feeling.
Date: August 1984
Creator: Ray, Howard N. (Howard Newton)
System: The UNT Digital Library
A Discrimination of Software Implementation Success Criteria (open access)

A Discrimination of Software Implementation Success Criteria

Software implementation projects struggle with the delicate balance of low cost, on-time delivery and quality. The methodologies and processes used to create and maintain a quality software system are expensive to deploy and result in long development cycle-time. However, without their deployment into the software implementation life-cycle, a software system will be undependable, unsuccessful. The purpose of this research is to identify a succinct set of software implementation success criteria and assess the key independent constructs, activities, carried out to ensure a successful implementation project. The research will assess the success of a software implementation project as the dependent construct of interest and use the software process model (methodology) as the independent construct. This field research involved three phases: (1) criteria development, (2) data collection, and (3) testing of hypotheses and discriminant analysis. The first phase resulted in the development of the measurement instruments for the independent and dependent constructs. The measurement instrument for the independent construct was representative of the criteria from highly regarded software implementation process models and methodologies, e.g., ISO9000, Software Engineering Institute's Capability Maturity Model (SEI CMM). The dependent construct was developed from the categories and criteria from the Delone and McLean (1992) MIS List of …
Date: August 1999
Creator: Pryor, Alan N.
System: The UNT Digital Library
Three Essays on Social Media: the Effect of Motivation, Participation, and Sentiment on Performance (open access)

Three Essays on Social Media: the Effect of Motivation, Participation, and Sentiment on Performance

In recent years, social media has experienced tremendous growth in the number of users. Facebook alone has more than 1.3 billion active users and Twitter has attracted over 600 million active users. Social media has significantly changed the way humans communicate. Many people use social media to keep in touch with family and friends and receive up-to-date information about what happens around the world. Politicians are using social media to support their campaigns. Use of social media is not restricted to individuals and politicians. Businesses are now using social media to promote their products and services. Many companies maintain Facebook and Twitter accounts to keep in touch with their customers. Consumers also use social media to receive information about products/services. Online product reviews are now an important source of information for consumers. This dissertation aims to address one fundamental research question: how do individual differences among users lead to different levels of performance on social media? More specifically, this dissertation investigates the motivations of use and the predictors of performance in the context of social media. We utilize sentiment mining to predict performance in different types of social media including information diffusion in Twitter and helpfulness and readership of online …
Date: August 2015
Creator: Salehan, Mohammad
System: The UNT Digital Library
Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals (open access)

Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals

Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), which allows employees to connect their personal devices to corporate networks. BYOD is identified as one of the top ten technology trends in 2014 that can multiply the size of mobile workforce in organizations. However, it can also serve as a vehicle that transfers cyber security threats associated with personal mobile devices to the organizations. As BYOD opens the floodgates of various device types and platforms into organizations, identifying different sources of cyber security threats becomes indispensable. So far, there are no studies that investigated how user, device and usage characteristics affect individuals’ protective and risky IT behaviors. The goal of this dissertation is to expand the current literature in IS security by accounting for the roles of user, device, and usage characteristics …
Date: August 2015
Creator: Negahban, Arash
System: The UNT Digital Library
Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications (open access)

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the consequences of mind wandering in a technological setting is imperative because mind wandering plays a vital role in influencing various outcomes associated with technology use and/or technology learning, such as technology anxiety, software self-efficacy, and task performance. This dissertation is composed of three essays which examine the determinants and consequences of mind wandering and focus of attention on a number of emotional and cognitive outcomes. A multi-method approach (i.e., online survey and laboratory experiment) across three essays is used to test the research models. Essay 1 focuses on developing the measurement items and estimating the impact of mind wandering on users' emotional outcomes (i.e., technology anxiety and users' satisfaction). Drawing upon the content regulation hypothesis of mind wandering, the content of thoughts …
Date: August 2016
Creator: Sullivan, Yulia
System: The UNT Digital Library
An Examination of the Effect of Decision Style on the Use of a Computerized Project Management Tool (open access)

An Examination of the Effect of Decision Style on the Use of a Computerized Project Management Tool

Managing a software development project presents many difficulties. Most software development projects are considered less than successful, and many are simply canceled. Ineffective project management has been cited as a major factor contributing to these failures. Project management tools can greatly assist managers in tracking and controlling their projects. However, project management tools are very structured and analytical in nature, which is not necessarily supported by decision-making styles of the managers. This research examined the influence that decision style has on a project manager's use of a project management tool.
Date: August 1997
Creator: Fox, Terry L., 1963-
System: The UNT Digital Library
Comparisons of Neural Networks, Shewhart ‾x, and CUSUM Control Charts Under the Condition of Nonnormality (open access)

Comparisons of Neural Networks, Shewhart ‾x, and CUSUM Control Charts Under the Condition of Nonnormality

In this study, neural networks are developed under conditions of nonnormality as alternatives to standard control charts, and their performance is compared with those of standard ‾x and CUSUM control charts.
Date: August 1997
Creator: Yi, Junsub
System: The UNT Digital Library
Information System Quality: An Examination of Service-Based Models and Alternatives (open access)

Information System Quality: An Examination of Service-Based Models and Alternatives

Service quality as a component of overall Information Systems quality is examined. Three related studies test the SERVQUAL and related instruments (SERVPERF and Importance-weighted SERVPERF) using Information System users. SERVPERF outperformed SERVQUAL in all three studies.
Date: August 1997
Creator: Maples, Glenn (Glenn Edward)
System: The UNT Digital Library
Longitudinal Study to Assess the Impact of Instructor-Based Training Versus Computer-Based Training on User Performance: A Field Experiment (open access)

Longitudinal Study to Assess the Impact of Instructor-Based Training Versus Computer-Based Training on User Performance: A Field Experiment

The purpose of this study is to investigate the relationships between selected end-user training programs corporations provide to their employees and subsequent employee performance based on these opportunities.
Date: August 1996
Creator: Desai, Mayur S.
System: The UNT Digital Library

A social capital perspective on IT professionals' work behavior and attitude.

Access: Use of this item is restricted to the UNT Community
Abstract Attracting and developing information technology (IT) professionals is one of the top concerns for companies. Although much research has been conducted about the job behavior and attitudes of IT professionals over the last three decades, findings are inconclusive and contradictory. This suggests that something may be missing in how we examine this phenomenon. Most of this research is drawn from theories of motivation, very little examines the effect of social relationships on IT professionals' behavior and attitude. Yet, social capital theory suggests that job behavior and attitude may be greatly influenced by these relationships. This suggests that IT professionals' social capital warrants empirical examination. The primary research question that this dissertation addresses is how social capital affects IT professionals' work attitude and behavior including job satisfaction, organizational citizenship behavior, job performance and turnover intention. The research model in this dissertation examines the influence of three aspects of social capital on IT professionals' job attitude and work behavior: tie strength, the number of ties and the structural holes. Data were collected from 129 IT professionals from a range of jobs, organizations and industries. Results indicate that tie strength in the organization of an IT professional is positively related to job …
Date: August 2006
Creator: Zhang, Lixuan
System: The UNT Digital Library

Propensity for knowledge sharing: An organizational justice perspective.

Access: Use of this item is restricted to the UNT Community
Converting individual knowledge into organizational knowledge can be difficult because individuals refuse to share knowledge for a number of different reasons. Creating an atmosphere of fairness plays an important role in the creation of a knowledge-sharing climate. This dissertation proposes that perceptions of organizational justice are crucial building blocks of that environment, leading to knowledge sharing. Data was collected using a field survey of IT managers representing a broad spectrum of the population in terms of organizational size and industry classification. The survey instrument was developed based on the adaptation of previously validated scales in addition to new items where no existing measures were found. Hypotheses regarding the influence of distributional, procedural, and interactional justice on knowledge sharing processes were tested using structural equation modeling techniques. Based on the theory of reasoned action, which states that attitudes and subjective norms are the major determinants of a person's intention, the hypotheses examining the relationship between attitude toward knowledge sharing, subjective norm and the intention to share knowledge were supported. However, results did not support the hypothesis exploring the relationship between the organizational climate and the intention to share knowledge. The results show that all three types of justice constructs are statistically …
Date: August 2006
Creator: Ibragimova, Bashorat
System: The UNT Digital Library
Organizational Competency Through Information: Business Intelligence and Analytics as a Tool for Process Dynamization (open access)

Organizational Competency Through Information: Business Intelligence and Analytics as a Tool for Process Dynamization

The data produced and collected by organizations represents both challenges and opportunities for the modern firm. Business intelligence and analytics (BI&A) comprises a wide variety of information management technologies and information seeking activities designed to exploit these information resources. As a result, BI&A has been heralded as a source of improved organizational outcomes in both the academic and practitioner literature, and these technologies are among the largest continuous IT expenditures made over the last decade.Despite the interest in BI&A, there is not enough theorizing about its role in improving firm performance. Scholarly investigations of the link between BI&A and organizational benefits are scarce and primarily exploratory in nature. Further, the majority of the extant research on BI&A is techno-centric, conceptualizing BI&A primarily an organizational technical asset. This study seeks to explicate the relationship between BI&A and improved organizational outcomes by viewing this phenomenon through the lens of dynamic capabilities, a promising theoretical perspective from the strategic management discipline. In so doing, this research reframes BI&A as an organizational capability, rather than simply a technical resource. Guided by a comprehensive review of the BI&A and dynamic capabilities literature, as well as a series of semi-structured focus groups with senior-level business practitioners …
Date: August 2015
Creator: Torres, Russell
System: The UNT Digital Library
Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace (open access)

Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organizations trying to reap potential benefits of enterprise social software (ESS) must successfully implement and maintain ESS tools. This research develops a framework for assessing knowledge sharing based on reciprocal determinism theory and augmented with technology acceptance, sociological, and psychological factors. Semi-structured interviews with IT professionals, followed by a written survey of employees using ESS are used to collect data. The hermeneutic circle methodology is used to analyze the interview transcripts and structural equation modeling is used to analyze the survey data. Results show technological advantage has no significant effect on the intention to share knowledge, but community cohesiveness and individual willingness significantly affect knowledge sharing intention and behavior. The study offers a synthesized model of variables affecting knowledge sharing as well as a better understanding of best practices for organizations to consider when implementing …
Date: August 2013
Creator: Harden, Gina
System: The UNT Digital Library
Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps (open access)

Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps

The increasing demand for mobile apps is out the current capability of mobile app developers. In addition, the growing trend in smartphone ownership and the time people spend on mobile apps has raised several opportunities and risks for users and developers. The average time everyday a user spend on smartphones to use mobile apps is more than two hours. The worldwide mobile app revenue increase is estimated to grow 33%, $19 billion. Three quarter of the time used on mobile apps is solely for using game and social networking apps. To provide more customized services and function to users, mobile apps need to access to personal information. However, 80% of mobile apps put people's information privacy at risk. There is a major gap in the literature about the privacy concerns of mobile device users in the context of mobile apps. This dissertation addresses one fundamental research question: how does individuals' privacy change in the context of mobile apps? More precisely, the focus of this dissertation is on information privacy role in individuals' and mobile app developers' protective behaviors. We investigate the information sensitivity level influence on mobile app developers' emphasis on privacy across mobile app categories. The results show information …
Date: August 2016
Creator: Koohikamali, Mehrdad
System: The UNT Digital Library
Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance (open access)

Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance

Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual decision makers, in different decision contexts, determine when to stop collecting information given the availability of virtually unlimited information. Decision makers must make an ultimate decision, but also must make a decision that he or she has enough information to make the final decision (Browne, Pitts, & Wetherbe, 2007). In determining how much information to collect, researchers found that people engage in ‘satisficing' in order to make decisions, particularly when there is more information than it is possible to manage (Simon, 1957). A more recent elucidation of information use relies on the idea of stopping rules, identifying five common stopping rules information seekers use: mental list, representational stability, difference threshold, magnitude threshold, and single criterion (Browne et al., 2007). Prior research indicates …
Date: August 2016
Creator: Gerhart, Natalie
System: The UNT Digital Library
Three Research Essays on Online Users' Concerns and Web Assurance Mechanisms (open access)

Three Research Essays on Online Users' Concerns and Web Assurance Mechanisms

Online users struggle with different concerns whenever they use information systems. According to Miyazaki and Fernandez (2001), there are three important categories of concerns for online users: privacy concern, third party fraudulent behavior concern ("system security"), and online website fraudulent behavior concern ("security"). Kim, Sivasailam, and Rao (2004) proposed a similar categorization for web assurance dimensions. They argue that online websites are supposed to address users' privacy, security, and business integrity concerns to decrease user concerns. Although several researchers tried to answer how different factors affect these concerns and how these concerns affect users' behavior, there are so many ambiguities and contradictions in this area. This Essay I in this work develops a comprehensive map of the role of online privacy concern to identify related factors and categorize them through an in-depth literature review and conducting meta-analysis on online privacy concern. Although users have concerns about their privacy and security, there is still growth in the number of internet users and electronic commerce market share. One possible reason is that websites are applying assurance mechanisms to ensure the privacy of their users. Therefore, it could be an interesting research topic to investigate how privacy assurance mechanisms affect users concern and, …
Date: August 2016
Creator: Mousavizadeh Kashipaz, Seyed Mohammadreza
System: The UNT Digital Library
Information systems success and technology acceptance within a government organization. (open access)

Information systems success and technology acceptance within a government organization.

Numerous models of IS success and technology acceptance their extensions have been proposed and applied in empirical. This study continues this tradition and extends the body of knowledge on the topic of IS success by developing a more comprehensive model for measuring IS success and technology acceptance within a government organization. The proposed model builds upon three established IS success and technology acceptance frameworks namely the DeLone and McLean (2003), Venkatesh et al.'s (2003) unified theory of acceptance and use of technology (UTAUT), and Wixom and Todd (2005). The findings from this study provide not only a comprehensive IS success assessment model but also insights into whether and how IS success models are influenced by application variables as applied within a government organization. Exploratory factor analysis and confirmatory factor analysis were performed for instrument refinement and validity test of the existing and proposed models. Using data from employees of a local government municipal, the comprehensive model explained 32 percent variance. Four of the hypothesis were fully supported five were not supported, and four were partially supported. In addition, the results suggest that behavioral intention may not be the best predictor of technology acceptance in a mandatory environment.
Date: August 2008
Creator: Thomas, Patricia
System: The UNT Digital Library
IT Offshoring Success: A Social Exchange Perspective (open access)

IT Offshoring Success: A Social Exchange Perspective

Spending by U.S. companies in offshore IT services continues at unprecedented levels despite a high failure rate. This study fills a gap in the existing literature by examining the client-vendor offshoring relationship through the theoretical lens of social exchange theory at the organizational level of analysis from the client's perspective. Social exchange theory focuses on the exchange of activities between two parties, whether they are individuals or companies and was used as a basis for examining the client and vendor relationship. Variables were identified by a review of the literature primarily from IT outsourcing and offshoring but also from general IT, marketing, sociology and organizational science literature. Data was collected using a field survey of Fortune 500 CIOs representing a population of organizations at the forefront of the offshoring phenomenon. The survey instrument was developed based on the adaptation of previously validated scales. Hypotheses regarding the correlations between social variables such as trust, communication, dependence, power, shared values and offshoring success were tested using Spearman's rho correlation. Seven of the hypotheses were supported, four hypotheses were not supported and one hypothesis was deemed not testable due to lack of information.
Date: August 2008
Creator: St. John, Jeremy
System: The UNT Digital Library