A Discrimination of Software Implementation Success Criteria (open access)

A Discrimination of Software Implementation Success Criteria

Software implementation projects struggle with the delicate balance of low cost, on-time delivery and quality. The methodologies and processes used to create and maintain a quality software system are expensive to deploy and result in long development cycle-time. However, without their deployment into the software implementation life-cycle, a software system will be undependable, unsuccessful. The purpose of this research is to identify a succinct set of software implementation success criteria and assess the key independent constructs, activities, carried out to ensure a successful implementation project. The research will assess the success of a software implementation project as the dependent construct of interest and use the software process model (methodology) as the independent construct. This field research involved three phases: (1) criteria development, (2) data collection, and (3) testing of hypotheses and discriminant analysis. The first phase resulted in the development of the measurement instruments for the independent and dependent constructs. The measurement instrument for the independent construct was representative of the criteria from highly regarded software implementation process models and methodologies, e.g., ISO9000, Software Engineering Institute's Capability Maturity Model (SEI CMM). The dependent construct was developed from the categories and criteria from the Delone and McLean (1992) MIS List of …
Date: August 1999
Creator: Pryor, Alan N.
System: The UNT Digital Library
An Analysis of the Effect of Environmental and Systems Complexity on Information Systems Failures (open access)

An Analysis of the Effect of Environmental and Systems Complexity on Information Systems Failures

Companies have invested large amounts of money on information systems development. Unfortunately, not all information systems developments are successful. Software project failure is frequent and lamentable. Surveys and statistical analysis results underscore the severity and scope of software project failure. Limited research relates software structure to information systems failures. Systematic study of failure provides insights into the causes of IS failure. More importantly, it contributes to better monitoring and control of projects and enhancing the likelihood of the success of management information systems. The underlining theories and literature that contribute to the construction of theoretical framework come from general systems theory, complexity theory, and failure studies. One hundred COBOL programs from a single company are used in the analysis. The program log clearly documents the date, time, and the reasons for changes to the programs. In this study the relationships among the variables of business requirements change, software complexity, program size and the error rate in each phase of software development life cycle are tested. Interpretations of the hypotheses testing are provided as well. The data shows that analysis error and design error occur more often than programming error. Measurement criteria need to be developed at each stage of the …
Date: August 2001
Creator: Zhang, Xiaoni
System: The UNT Digital Library
Critical Success Factors in Data Mining Projects. (open access)

Critical Success Factors in Data Mining Projects.

The increasing awareness of data mining technology, along with the attendant increase in the capturing, warehousing, and utilization of historical data to support evidence-based decision making, is leading many organizations to recognize that the effective use of data is the key element in the next generation of client-server enterprise information technology. The concept of data mining is gaining acceptance in business as a means of seeking higher profits and lower costs. To deploy data mining projects successfully, organizations need to know the key factors for successful data mining. Implementing emerging information systems (IS) can be risky if the critical success factors (CSFs) have been researched insufficiently or documented inadequately. While numerous studies have listed the advantages and described the data mining process, there is little research on the success factors of data mining. This dissertation identifies CSFs in data mining projects. Chapter 1 introduces the history of the data mining process and states the problems, purposes, and significances of this dissertation. Chapter 2 reviews the literature, discusses general concepts of data mining and data mining project contexts, and reviews general concepts of CSF methodologies. It also describes the identification process for the various CSFs used to develop the research framework. …
Date: August 2003
Creator: Sim, Jaesung
System: The UNT Digital Library

Propensity for knowledge sharing: An organizational justice perspective.

Access: Use of this item is restricted to the UNT Community
Converting individual knowledge into organizational knowledge can be difficult because individuals refuse to share knowledge for a number of different reasons. Creating an atmosphere of fairness plays an important role in the creation of a knowledge-sharing climate. This dissertation proposes that perceptions of organizational justice are crucial building blocks of that environment, leading to knowledge sharing. Data was collected using a field survey of IT managers representing a broad spectrum of the population in terms of organizational size and industry classification. The survey instrument was developed based on the adaptation of previously validated scales in addition to new items where no existing measures were found. Hypotheses regarding the influence of distributional, procedural, and interactional justice on knowledge sharing processes were tested using structural equation modeling techniques. Based on the theory of reasoned action, which states that attitudes and subjective norms are the major determinants of a person's intention, the hypotheses examining the relationship between attitude toward knowledge sharing, subjective norm and the intention to share knowledge were supported. However, results did not support the hypothesis exploring the relationship between the organizational climate and the intention to share knowledge. The results show that all three types of justice constructs are statistically …
Date: August 2006
Creator: Ibragimova, Bashorat
System: The UNT Digital Library

A social capital perspective on IT professionals' work behavior and attitude.

Access: Use of this item is restricted to the UNT Community
Abstract Attracting and developing information technology (IT) professionals is one of the top concerns for companies. Although much research has been conducted about the job behavior and attitudes of IT professionals over the last three decades, findings are inconclusive and contradictory. This suggests that something may be missing in how we examine this phenomenon. Most of this research is drawn from theories of motivation, very little examines the effect of social relationships on IT professionals' behavior and attitude. Yet, social capital theory suggests that job behavior and attitude may be greatly influenced by these relationships. This suggests that IT professionals' social capital warrants empirical examination. The primary research question that this dissertation addresses is how social capital affects IT professionals' work attitude and behavior including job satisfaction, organizational citizenship behavior, job performance and turnover intention. The research model in this dissertation examines the influence of three aspects of social capital on IT professionals' job attitude and work behavior: tie strength, the number of ties and the structural holes. Data were collected from 129 IT professionals from a range of jobs, organizations and industries. Results indicate that tie strength in the organization of an IT professional is positively related to job …
Date: August 2006
Creator: Zhang, Lixuan
System: The UNT Digital Library
IT Offshoring Success: A Social Exchange Perspective (open access)

IT Offshoring Success: A Social Exchange Perspective

Spending by U.S. companies in offshore IT services continues at unprecedented levels despite a high failure rate. This study fills a gap in the existing literature by examining the client-vendor offshoring relationship through the theoretical lens of social exchange theory at the organizational level of analysis from the client's perspective. Social exchange theory focuses on the exchange of activities between two parties, whether they are individuals or companies and was used as a basis for examining the client and vendor relationship. Variables were identified by a review of the literature primarily from IT outsourcing and offshoring but also from general IT, marketing, sociology and organizational science literature. Data was collected using a field survey of Fortune 500 CIOs representing a population of organizations at the forefront of the offshoring phenomenon. The survey instrument was developed based on the adaptation of previously validated scales. Hypotheses regarding the correlations between social variables such as trust, communication, dependence, power, shared values and offshoring success were tested using Spearman's rho correlation. Seven of the hypotheses were supported, four hypotheses were not supported and one hypothesis was deemed not testable due to lack of information.
Date: August 2008
Creator: St. John, Jeremy
System: The UNT Digital Library
Information systems success and technology acceptance within a government organization. (open access)

Information systems success and technology acceptance within a government organization.

Numerous models of IS success and technology acceptance their extensions have been proposed and applied in empirical. This study continues this tradition and extends the body of knowledge on the topic of IS success by developing a more comprehensive model for measuring IS success and technology acceptance within a government organization. The proposed model builds upon three established IS success and technology acceptance frameworks namely the DeLone and McLean (2003), Venkatesh et al.'s (2003) unified theory of acceptance and use of technology (UTAUT), and Wixom and Todd (2005). The findings from this study provide not only a comprehensive IS success assessment model but also insights into whether and how IS success models are influenced by application variables as applied within a government organization. Exploratory factor analysis and confirmatory factor analysis were performed for instrument refinement and validity test of the existing and proposed models. Using data from employees of a local government municipal, the comprehensive model explained 32 percent variance. Four of the hypothesis were fully supported five were not supported, and four were partially supported. In addition, the results suggest that behavioral intention may not be the best predictor of technology acceptance in a mandatory environment.
Date: August 2008
Creator: Thomas, Patricia
System: The UNT Digital Library
Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness (open access)

Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness

The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera, 2003). The little empirical research that has been conducted in this area has shown that information security management in many organizations is poor (Baskerville, 1993; Shimeall & McDermott, 1999). Several researchers have identified the need for methods to measure the organization-wide information security posture of organizations (Eloff & Von Solms, 2000; James, 1996). This dissertation attempts to measure the organization-wide information security posture by examining benchmark variables that assess role, planning orientation, and performance structure within the organization. Through this conceptualization of an organization's information security posture, a means is presented to measure overall information security and how it impacts the effective utilization of information security strategies. The presence of the dependent variable, effectiveness, gives academics and practitioners a success measure which can guide more effective decision making in …
Date: August 2008
Creator: Young, Randall Frederick
System: The UNT Digital Library
The Impact of IT Capability on Employee Capability, Customer Value, Customer Satisfaction, and Business Performance (open access)

The Impact of IT Capability on Employee Capability, Customer Value, Customer Satisfaction, and Business Performance

This study empirically examines the impact of IT capability on firms' performance and evaluates whether firms' IT capabilities play a role in improving employee capability, customer value, customer satisfaction, and ultimately business performance. The results were based on comparing the business performance of the IT leader companies with that of control companies of similar size and industry. The IT leader companies were selected from the Information Week 500 list published annually from 2001 to 2004. For a company to be selected as IT leaders, it needed to be listed at least twice during the period. Furthermore, it had to be listed in the American Customer Satisfaction Index (ACSI) so that its customer satisfaction level could be assessed. Standard & Poor's Compustat and the ACSI scores were used to test for changes in business performance. The study found that the IT leaders had a raw material cost measured by cost-of-goods-sold to sales ratio (COGS/S) than the control companies. However, it found no evidence that firms' IT capability affects employee capability, customer value, customer satisfaction, and profit. An important implication from this study is that IT becomes a commodity and an attempt to gain a competitive advantage by overinvesting in IT may …
Date: August 2009
Creator: Chae, Ho-Chang
System: The UNT Digital Library
Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment (open access)

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of BI capabilities on BI success, in the presence of different decision environments. The decision environment is a composition of the decision types and the way the required information is processed to aid in decision making. BI capabilities are defined as critical functionalities that help an organization improve its performance, and they are examined in terms of organizational and technological capabilities. An online survey is used to obtain the data and partial least squares path modeling (PLS) is used for analysis. The results of this dissertation suggest that all technological capabilities as well as one of the organizational capabilities, flexibility, significantly impact BI success. Results also indicate that the moderating effect of decision environment is significant for quantitative data quality. These …
Date: August 2010
Creator: Işik, Öykü
System: The UNT Digital Library
Factors Influencing BI Data Collection Strategies: An Empirical Investigation (open access)

Factors Influencing BI Data Collection Strategies: An Empirical Investigation

The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top level managers involved in developing and managing BI. Data was collected from a range of industries and organizations within the United States. An online survey was used to collect the data to empirically test the proposed relationships. Data was analyzed using partial least square path modeling (PLS). The results of this study suggest that there exists a positive relationship between institutional isomorphism and BI consistency. The results also indicate that there exists a positive relationship between BI consistency and BI comprehensive data collection strategy, and the organizational transformation attribute of BI and BI comprehensive data collection strategy. These findings provide a theoretical lens to better understand the motivators and the success factors related to collecting the huge amounts of data required for BI. This study also provides managers with …
Date: August 2010
Creator: Ramakrishnan, Thiagarajan
System: The UNT Digital Library
Factors Influencing Post-adoptive Enterprise Resource Planning (ERP) Utilization (open access)

Factors Influencing Post-adoptive Enterprise Resource Planning (ERP) Utilization

Organizations expend a great deal of time, effort and money on the implementation of enterprise resource planning (ERP) systems. They are considered the price of entry for large organizations to do business. Yet the success rate of ERP systems is poor. IS literature suggests that one possible reason for this is the underutilization of these systems. Existing ERP literature is replete with research to improve ERP project implementation success; however, notably absent from these streams is the research that identifies how ERP systems are utilized by individuals or organizations. This dissertation posits that increased ERP utilization can result from increased software and business process understanding gained from both formal training and experiential interventions. New dimensions of system utilization (required vs. optional) are proposed. The purpose of this dissertation is to examine how these interventions impact ERP utilization. The results of this dissertation show that while software-training interventions are important to understanding, it is the business process training interventions that seem to provide the greater effect on understanding. This increased understanding positively affects utilization scenarios where a mixture (required vs. optional) of software features and business process tasks can be leveraged by end-users. The improved understanding of post-adoptive ERP utilization gained …
Date: August 2011
Creator: McGinnis, Thomas C.
System: The UNT Digital Library
An Examination of the Effect of Decision Style on the Use of a Computerized Project Management Tool (open access)

An Examination of the Effect of Decision Style on the Use of a Computerized Project Management Tool

Managing a software development project presents many difficulties. Most software development projects are considered less than successful, and many are simply canceled. Ineffective project management has been cited as a major factor contributing to these failures. Project management tools can greatly assist managers in tracking and controlling their projects. However, project management tools are very structured and analytical in nature, which is not necessarily supported by decision-making styles of the managers. This research examined the influence that decision style has on a project manager's use of a project management tool.
Date: August 1997
Creator: Fox, Terry L., 1963-
System: The UNT Digital Library
Comparisons of Neural Networks, Shewhart ‾x, and CUSUM Control Charts Under the Condition of Nonnormality (open access)

Comparisons of Neural Networks, Shewhart ‾x, and CUSUM Control Charts Under the Condition of Nonnormality

In this study, neural networks are developed under conditions of nonnormality as alternatives to standard control charts, and their performance is compared with those of standard ‾x and CUSUM control charts.
Date: August 1997
Creator: Yi, Junsub
System: The UNT Digital Library
Information System Quality: An Examination of Service-Based Models and Alternatives (open access)

Information System Quality: An Examination of Service-Based Models and Alternatives

Service quality as a component of overall Information Systems quality is examined. Three related studies test the SERVQUAL and related instruments (SERVPERF and Importance-weighted SERVPERF) using Information System users. SERVPERF outperformed SERVQUAL in all three studies.
Date: August 1997
Creator: Maples, Glenn (Glenn Edward)
System: The UNT Digital Library
A Study of Differences Perceived by Information Systems Professionals in the Systems Development Job Environment Due to the Use of ICASE Technology (open access)

A Study of Differences Perceived by Information Systems Professionals in the Systems Development Job Environment Due to the Use of ICASE Technology

Information systems professionals now face the automation of their own work in integrated computer aided software engineering. Organizations need to achieve all the leverage possible from costly IT implementations to enhance competitiveness, profitability, and survival in a rapidly changing environment. ICASE technology is a part of the infrastructure necessary to meet this challenge but appears to present significant difficulties in implementation.
Date: August 1997
Creator: Troboy, Lori Kim
System: The UNT Digital Library
An Experimental Investigation of Information Systems Project Escalation: An Examination of Contributory Factors in a Business Environment (open access)

An Experimental Investigation of Information Systems Project Escalation: An Examination of Contributory Factors in a Business Environment

The purpose of this research is to continue examining the project management process. The management of projects is complicated. It is the complexity of the process that makes a project so difficult to control. This research examines the effect of particular facets of the project manager's skill set and operating environment on management decisions.
Date: August 1997
Creator: Huff, Richard A. (Richard Allen)
System: The UNT Digital Library
Longitudinal Study to Assess the Impact of Instructor-Based Training Versus Computer-Based Training on User Performance: A Field Experiment (open access)

Longitudinal Study to Assess the Impact of Instructor-Based Training Versus Computer-Based Training on User Performance: A Field Experiment

The purpose of this study is to investigate the relationships between selected end-user training programs corporations provide to their employees and subsequent employee performance based on these opportunities.
Date: August 1996
Creator: Desai, Mayur S.
System: The UNT Digital Library
Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace (open access)

Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organizations trying to reap potential benefits of enterprise social software (ESS) must successfully implement and maintain ESS tools. This research develops a framework for assessing knowledge sharing based on reciprocal determinism theory and augmented with technology acceptance, sociological, and psychological factors. Semi-structured interviews with IT professionals, followed by a written survey of employees using ESS are used to collect data. The hermeneutic circle methodology is used to analyze the interview transcripts and structural equation modeling is used to analyze the survey data. Results show technological advantage has no significant effect on the intention to share knowledge, but community cohesiveness and individual willingness significantly affect knowledge sharing intention and behavior. The study offers a synthesized model of variables affecting knowledge sharing as well as a better understanding of best practices for organizations to consider when implementing …
Date: August 2013
Creator: Harden, Gina
System: The UNT Digital Library
Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information (open access)

Application of Information Theory Concepts in the Investigation of the Growth Pattern of Production, Distribution and Velocity of Information

The objective of this research is the investigation of the patterns of information growth to test whether there has been an "information explosion." To tackle the main problem, there are three issues which need to be addressed: (1) the concept of information dimensionality; (2) determination of common parameters to measure the amount of information within each dimension; and (3) a working definition of "explosiveness. "
Date: August 1987
Creator: Attia, Abdel-Hameed M. (Abdel-Hameed Mohammed)
System: The UNT Digital Library
An Empirical Investigation of the Effects of Individual Differences and Data Models on the Ease-of-Use of Database Query Facilties by Casual Users (open access)

An Empirical Investigation of the Effects of Individual Differences and Data Models on the Ease-of-Use of Database Query Facilties by Casual Users

The problem motivating this study is that database query facilities are not effectively meeting the needs of casual users. A solution to this problem is especially important due to the increasing number of potential casual users. There is considerable controversy revolving around the question of which elements and/or which combination of elements within the casual users' environment are necessary to provide an effective man/machine interface. The purpose of the study is to extend the basic knowledge relating to the effect of using different data models, the effect of cognitive style differences, and the interaction effects of these two independent variables on casual users' performance and confidence in writing database queries. The data models being investigated are the relational, hierarchical, and network models. The cognitive style classifications used are two of the Jungian dimensions, Sensing/Intuition and Thinking/Feeling.
Date: August 1984
Creator: Ray, Howard N. (Howard Newton)
System: The UNT Digital Library
Accessing the Power of Aesthetics in Human-computer Interaction (open access)

Accessing the Power of Aesthetics in Human-computer Interaction

In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency characteristics, are critical concerns of designers. This view contends that visual design enhances system use. Thus, this work examines the effects of visual design on computer systems. Visual design exerts its influence on systems through two mechanisms: it evokes affective responses from IT users, such as arousal and pleasure and it influences individuals’ cognitive assessments of systems. Given that both affective and cognitive reactions are significant antecedents of user behaviors in the IT realm, it is no surprise that visual design plays a critical role in information system success. Human-computer-interaction literature indicates that visual aesthetics positively influences such information success factors as usability, online trust, user satisfaction, flow experience, and so on. Although academic research has introduced visual design into the Information Systems (IS) …
Date: August 2013
Creator: Chenyan, Xu
System: The UNT Digital Library
The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective (open access)

The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective

This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed in two stages. First, the participants (employees of a municipality) are exposed to a series of phishing and spear-phishing messages to assess if there are any common characteristics shared by the phishing victims. The differences between the phished and the not phished group are assessed through multiple discriminant analysis. Second, the same individuals are asked to participate in a survey designed to examine their security awareness. The research model is tested using PLS-SEM approach. The results indicate that security awareness is in fact a second-order formative construct composed of six components. There are significant differences in security awareness levels between the victims of the phishing experiment and the employees who maintain compliance with security policies. The study extends the theory by …
Date: August 2014
Creator: Hanus, Bartlomiej T.
System: The UNT Digital Library
Three Essays on Social Media: the Effect of Motivation, Participation, and Sentiment on Performance (open access)

Three Essays on Social Media: the Effect of Motivation, Participation, and Sentiment on Performance

In recent years, social media has experienced tremendous growth in the number of users. Facebook alone has more than 1.3 billion active users and Twitter has attracted over 600 million active users. Social media has significantly changed the way humans communicate. Many people use social media to keep in touch with family and friends and receive up-to-date information about what happens around the world. Politicians are using social media to support their campaigns. Use of social media is not restricted to individuals and politicians. Businesses are now using social media to promote their products and services. Many companies maintain Facebook and Twitter accounts to keep in touch with their customers. Consumers also use social media to receive information about products/services. Online product reviews are now an important source of information for consumers. This dissertation aims to address one fundamental research question: how do individual differences among users lead to different levels of performance on social media? More specifically, this dissertation investigates the motivations of use and the predictors of performance in the context of social media. We utilize sentiment mining to predict performance in different types of social media including information diffusion in Twitter and helpfulness and readership of online …
Date: August 2015
Creator: Salehan, Mohammad
System: The UNT Digital Library