A Relationship-based Cross National Customer Decision-making Model in the Service Industry (open access)

A Relationship-based Cross National Customer Decision-making Model in the Service Industry

In 2012, the CIA World Fact Book showed that the service sector contributed about 76.6% and 51.4% of the 2010 gross national product of both the United States and Ghana, respectively. Research in the services area shows that a firm's success in today's competitive business environment is dependent upon its ability to deliver superior service quality. However, these studies have yet to address factors that influence customers to remain committed to a mass service in economically diverse countries. In addition, there is little research on established service quality measures pertaining to the mass service domain. This dissertation applies Rusbult's investment model of relationship commitment and examines its psychological impact on the commitment level of a customer towards a service in two economically diverse countries. In addition, service quality is conceptualized as a hierarchical construct in the mass service (banking) and specific dimensions are developed on which customers assess their quality evaluations. Using, PLS path modeling, a structural equation modeling approach to data analysis, service quality as a hierarchical third-order construct was found to have three primary dimensions and six sub-dimensions. The results also established that a country's national economy has a moderating effect on the relationship between service quality and …
Date: August 2013
Creator: Boakye, Kwabena G.
System: The UNT Digital Library
Factors Influencing BI Data Collection Strategies: An Empirical Investigation (open access)

Factors Influencing BI Data Collection Strategies: An Empirical Investigation

The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top level managers involved in developing and managing BI. Data was collected from a range of industries and organizations within the United States. An online survey was used to collect the data to empirically test the proposed relationships. Data was analyzed using partial least square path modeling (PLS). The results of this study suggest that there exists a positive relationship between institutional isomorphism and BI consistency. The results also indicate that there exists a positive relationship between BI consistency and BI comprehensive data collection strategy, and the organizational transformation attribute of BI and BI comprehensive data collection strategy. These findings provide a theoretical lens to better understand the motivators and the success factors related to collecting the huge amounts of data required for BI. This study also provides managers with …
Date: August 2010
Creator: Ramakrishnan, Thiagarajan
System: The UNT Digital Library
Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment (open access)

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of BI capabilities on BI success, in the presence of different decision environments. The decision environment is a composition of the decision types and the way the required information is processed to aid in decision making. BI capabilities are defined as critical functionalities that help an organization improve its performance, and they are examined in terms of organizational and technological capabilities. An online survey is used to obtain the data and partial least squares path modeling (PLS) is used for analysis. The results of this dissertation suggest that all technological capabilities as well as one of the organizational capabilities, flexibility, significantly impact BI success. Results also indicate that the moderating effect of decision environment is significant for quantitative data quality. These …
Date: August 2010
Creator: Işik, Öykü
System: The UNT Digital Library
The Impact of Culture on the Decision Making Process in Restaurants (open access)

The Impact of Culture on the Decision Making Process in Restaurants

Understanding the process of consumers during key purchasing decision points is the margin between success and failure for any business. The cultural differences between the factors that affect consumers in their decision-making process is the motivation of this research. The purpose of this research is to extend the current body of knowledge about decision-making factors by developing and testing a new theoretical model to measure how culture may affect the attitudes and behaviors of consumers in restaurants. This study has its theoretical foundation in the theory of service quality, theory of planned behavior, and rational choice theory. To understand how culture affects the decision-making process and perceived satisfaction, it is necessary to analyze the relationships among the decision factors and attitudes. The findings of this study contribute by building theory and having practical implications for restaurant owners and managers. This study employs a mixed methodology of qualitative and quantitative research. More specifically, the methodologies employed include the development of a framework and testing of that framework via collection of data using semi-structured interviews and a survey instrument. Considering this framework, we test culture as a moderating relationship by using respondents’ birth country, parents’ birth country and ethnic identity. The results …
Date: August 2015
Creator: Boonme, Kittipong
System: The UNT Digital Library
Three Essays on Social Media: the Effect of Motivation, Participation, and Sentiment on Performance (open access)

Three Essays on Social Media: the Effect of Motivation, Participation, and Sentiment on Performance

In recent years, social media has experienced tremendous growth in the number of users. Facebook alone has more than 1.3 billion active users and Twitter has attracted over 600 million active users. Social media has significantly changed the way humans communicate. Many people use social media to keep in touch with family and friends and receive up-to-date information about what happens around the world. Politicians are using social media to support their campaigns. Use of social media is not restricted to individuals and politicians. Businesses are now using social media to promote their products and services. Many companies maintain Facebook and Twitter accounts to keep in touch with their customers. Consumers also use social media to receive information about products/services. Online product reviews are now an important source of information for consumers. This dissertation aims to address one fundamental research question: how do individual differences among users lead to different levels of performance on social media? More specifically, this dissertation investigates the motivations of use and the predictors of performance in the context of social media. We utilize sentiment mining to predict performance in different types of social media including information diffusion in Twitter and helpfulness and readership of online …
Date: August 2015
Creator: Salehan, Mohammad
System: The UNT Digital Library
Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals (open access)

Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals

Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), which allows employees to connect their personal devices to corporate networks. BYOD is identified as one of the top ten technology trends in 2014 that can multiply the size of mobile workforce in organizations. However, it can also serve as a vehicle that transfers cyber security threats associated with personal mobile devices to the organizations. As BYOD opens the floodgates of various device types and platforms into organizations, identifying different sources of cyber security threats becomes indispensable. So far, there are no studies that investigated how user, device and usage characteristics affect individuals’ protective and risky IT behaviors. The goal of this dissertation is to expand the current literature in IS security by accounting for the roles of user, device, and usage characteristics …
Date: August 2015
Creator: Negahban, Arash
System: The UNT Digital Library
Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications (open access)

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the consequences of mind wandering in a technological setting is imperative because mind wandering plays a vital role in influencing various outcomes associated with technology use and/or technology learning, such as technology anxiety, software self-efficacy, and task performance. This dissertation is composed of three essays which examine the determinants and consequences of mind wandering and focus of attention on a number of emotional and cognitive outcomes. A multi-method approach (i.e., online survey and laboratory experiment) across three essays is used to test the research models. Essay 1 focuses on developing the measurement items and estimating the impact of mind wandering on users' emotional outcomes (i.e., technology anxiety and users' satisfaction). Drawing upon the content regulation hypothesis of mind wandering, the content of thoughts …
Date: August 2016
Creator: Sullivan, Yulia
System: The UNT Digital Library
Organizational Competency Through Information: Business Intelligence and Analytics as a Tool for Process Dynamization (open access)

Organizational Competency Through Information: Business Intelligence and Analytics as a Tool for Process Dynamization

The data produced and collected by organizations represents both challenges and opportunities for the modern firm. Business intelligence and analytics (BI&A) comprises a wide variety of information management technologies and information seeking activities designed to exploit these information resources. As a result, BI&A has been heralded as a source of improved organizational outcomes in both the academic and practitioner literature, and these technologies are among the largest continuous IT expenditures made over the last decade.Despite the interest in BI&A, there is not enough theorizing about its role in improving firm performance. Scholarly investigations of the link between BI&A and organizational benefits are scarce and primarily exploratory in nature. Further, the majority of the extant research on BI&A is techno-centric, conceptualizing BI&A primarily an organizational technical asset. This study seeks to explicate the relationship between BI&A and improved organizational outcomes by viewing this phenomenon through the lens of dynamic capabilities, a promising theoretical perspective from the strategic management discipline. In so doing, this research reframes BI&A as an organizational capability, rather than simply a technical resource. Guided by a comprehensive review of the BI&A and dynamic capabilities literature, as well as a series of semi-structured focus groups with senior-level business practitioners …
Date: August 2015
Creator: Torres, Russell
System: The UNT Digital Library
The Effect of Value Co-creation and Service Quality on Customer Satisfaction and Commitment in Healthcare Management (open access)

The Effect of Value Co-creation and Service Quality on Customer Satisfaction and Commitment in Healthcare Management

Despite much interest in service quality and various other service quality measures, scholars appear to have overlooked the overall concept of quality. More specifically, previous research has yet to integrate the effect of the customer network and customer knowledge into the measurement of quality. In this work, it is posited that the evaluation of quality is based on both the delivered value from the provider as well as the value developed from the relationships among customers and between customers and providers. This research examines quality as a broad and complex issue, and uses the “Big Quality” concept within the context of routine healthcare service. The last few decades have witnessed interest and activities surrounding the subject of quality and value co-creation. These are core features of Service-Dominant (S-D) logic theory. In this theory, the customer is a collaborative partner who co-creates value with the firm. Customers create value through the strength of their relations and network, and they take a central role in value actualization as value co-creator. I propose to examine the relationship between quality and the constructs of value co-creation. As well, due to the pivotal role of the decision-making process in customer satisfaction, I will also operationalize …
Date: August 2015
Creator: Kwon, Junhyuk
System: The UNT Digital Library
Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace (open access)

Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organizations trying to reap potential benefits of enterprise social software (ESS) must successfully implement and maintain ESS tools. This research develops a framework for assessing knowledge sharing based on reciprocal determinism theory and augmented with technology acceptance, sociological, and psychological factors. Semi-structured interviews with IT professionals, followed by a written survey of employees using ESS are used to collect data. The hermeneutic circle methodology is used to analyze the interview transcripts and structural equation modeling is used to analyze the survey data. Results show technological advantage has no significant effect on the intention to share knowledge, but community cohesiveness and individual willingness significantly affect knowledge sharing intention and behavior. The study offers a synthesized model of variables affecting knowledge sharing as well as a better understanding of best practices for organizations to consider when implementing …
Date: August 2013
Creator: Harden, Gina
System: The UNT Digital Library
Accuracy and Interpretability Testing of Text Mining Methods (open access)

Accuracy and Interpretability Testing of Text Mining Methods

Extracting meaningful information from large collections of text data is problematic because of the sheer size of the database. However, automated analytic methods capable of processing such data have emerged. These methods, collectively called text mining first began to appear in 1988. A number of additional text mining methods quickly developed in independent research silos with each based on unique mathematical algorithms. How good each of these methods are at analyzing text is unclear. Method development typically evolves from some research silo centric requirement with the success of the method measured by a custom requirement-based metric. Results of the new method are then compared to another method that was similarly developed. The proposed research introduces an experimentally designed testing method to text mining that eliminates research silo bias and simultaneously evaluates methods from all of the major context-region text mining method families. The proposed research method follows a random block factorial design with two treatments consisting of three and five levels (RBF-35) with repeated measures. Contribution of the research is threefold. First, the users perceived a difference in the effectiveness of the various methods. Second, while still not clear, there are characteristics with in the text collection that affect the …
Date: August 2013
Creator: Ashton, Triss A.
System: The UNT Digital Library
Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps (open access)

Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps

The increasing demand for mobile apps is out the current capability of mobile app developers. In addition, the growing trend in smartphone ownership and the time people spend on mobile apps has raised several opportunities and risks for users and developers. The average time everyday a user spend on smartphones to use mobile apps is more than two hours. The worldwide mobile app revenue increase is estimated to grow 33%, $19 billion. Three quarter of the time used on mobile apps is solely for using game and social networking apps. To provide more customized services and function to users, mobile apps need to access to personal information. However, 80% of mobile apps put people's information privacy at risk. There is a major gap in the literature about the privacy concerns of mobile device users in the context of mobile apps. This dissertation addresses one fundamental research question: how does individuals' privacy change in the context of mobile apps? More precisely, the focus of this dissertation is on information privacy role in individuals' and mobile app developers' protective behaviors. We investigate the information sensitivity level influence on mobile app developers' emphasis on privacy across mobile app categories. The results show information …
Date: August 2016
Creator: Koohikamali, Mehrdad
System: The UNT Digital Library
Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance (open access)

Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance

Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual decision makers, in different decision contexts, determine when to stop collecting information given the availability of virtually unlimited information. Decision makers must make an ultimate decision, but also must make a decision that he or she has enough information to make the final decision (Browne, Pitts, & Wetherbe, 2007). In determining how much information to collect, researchers found that people engage in ‘satisficing' in order to make decisions, particularly when there is more information than it is possible to manage (Simon, 1957). A more recent elucidation of information use relies on the idea of stopping rules, identifying five common stopping rules information seekers use: mental list, representational stability, difference threshold, magnitude threshold, and single criterion (Browne et al., 2007). Prior research indicates …
Date: August 2016
Creator: Gerhart, Natalie
System: The UNT Digital Library
Three Research Essays on Online Users' Concerns and Web Assurance Mechanisms (open access)

Three Research Essays on Online Users' Concerns and Web Assurance Mechanisms

Online users struggle with different concerns whenever they use information systems. According to Miyazaki and Fernandez (2001), there are three important categories of concerns for online users: privacy concern, third party fraudulent behavior concern ("system security"), and online website fraudulent behavior concern ("security"). Kim, Sivasailam, and Rao (2004) proposed a similar categorization for web assurance dimensions. They argue that online websites are supposed to address users' privacy, security, and business integrity concerns to decrease user concerns. Although several researchers tried to answer how different factors affect these concerns and how these concerns affect users' behavior, there are so many ambiguities and contradictions in this area. This Essay I in this work develops a comprehensive map of the role of online privacy concern to identify related factors and categorize them through an in-depth literature review and conducting meta-analysis on online privacy concern. Although users have concerns about their privacy and security, there is still growth in the number of internet users and electronic commerce market share. One possible reason is that websites are applying assurance mechanisms to ensure the privacy of their users. Therefore, it could be an interesting research topic to investigate how privacy assurance mechanisms affect users concern and, …
Date: August 2016
Creator: Mousavizadeh Kashipaz, Seyed Mohammadreza
System: The UNT Digital Library
Extensions of the General Linear Model into Methods within Partial Least Squares Structural Equation Modeling (open access)

Extensions of the General Linear Model into Methods within Partial Least Squares Structural Equation Modeling

The current generation of structural equation modeling (SEM) is loosely split in two divergent groups - covariance-based and variance-based structural equation modeling. The relative newness of variance-based SEM has limited the development of techniques that extend its applicability to non-metric data. This study focuses upon the extension of general linear model techniques within the variance-based platform of partial least squares structural equation modeling (PLS-SEM). This modeling procedure receives it name through the iterative PLS‑SEM algorithm's estimates of the coefficients for the partial ordinary least squares regression models in both the measurement model and the overall structural model. This research addresses the following research questions: (1) What are the appropriate measures for data segmentation within PLS‑SEM? (2) What are the appropriate steps for the analysis of rank-ordered path coefficients within PLS‑SEM? and (3) What is an appropriate model selection index for PLS‑SEM? The limited type of data to which PLS-SEM is applicable suggests an opportunity to extend the method for use with different data and as a result a broader number of applications. This study develops and tests several methodologies that are prevalent in the general linear model (GLM). The proposed data segmentation approaches posited and tested through post hoc analysis …
Date: August 2016
Creator: George, Benjamin Thomas
System: The UNT Digital Library

Three Essays on Artificial Intelligence Adoption and Use

Access: Use of this item is restricted to the UNT Community
Artificial intelligence (AI) is quickly transforming business operations and society, as AI capabilities are incorporated into applications ranging from mobile personal assistants to self-driving cars. The potentially disruptive nature of AI calls for an extensive investigation into all aspects of AI-human interactions at individual, group, organizational and market levels. However, there is paucity of academic information systems (IS) research in this area that goes beyond the development and testing of specific narrow AI capabilities. AI represents an important opportunity for organizational and behavioral IS researchers, but also presents challenges associated with the underlying complexity of AI technologies and the diversity of AI applications. Understanding how existing AI research and business practice relate to traditional areas of IS research is an important step towards creating a comprehensive behavioral and organizational AI research agenda. This dissertation seeks to achieve a dual purpose in a series of three essays. Essay 1 seeks to understand the current state of business AI research and practice in business through a quantitative literature review, relate the findings to traditional IS research areas, and identify potentially fruitful research areas for AI-focused IS research. Essays 2 and 3 seek to address specific research questions related to one of such …
Date: August 2019
Creator: Nguyen, Quynh
System: The UNT Digital Library

Relationship Quality in Social Commerce Decision-Making

Access: Use of this item is restricted to the UNT Community
This research study involves three essays and examines CRQ-driven decision making from the points of view of the common firm, social-commerce platform provider, and social-commerce echo-system. It addresses CRQ's progression from traditional business-to-consumer (B2C) initiatives to social platform-specific antecedents and to environment-driven factors lying outside the direct control of the platform provider, yet influencing social commerce business decisions, such as user-generated content from peers (e.g. family, friends) and expert authority (e.g. specialists, experts, professional organizations). The research method used statistical, data mining and computer science techniques. The results suggest that social platform providers should take a proactive approach to CRQ, fully leverage their online platform to improve CRQ while paying special attention to security as a potential barrier, and consider the analysis of elements of the echo-system such as the electronic word of mouth (eWOM) to further drive CRQ and determine the level of alignment between customers and experts, suppliers and products featured, that may lead to value-added managerial insights such as the prioritization, promotion and optimization of such relationships.
Date: August 2019
Creator: Dinulescu, Catalin C
System: The UNT Digital Library
Hybrid Models in Automobile Insurance: Technology Adoption and Customer Relations (open access)

Hybrid Models in Automobile Insurance: Technology Adoption and Customer Relations

Customer relationship management (CRM), a primary activity in the business value chain to relate to the customer, involves solicitation, analysis, and the use of the knowledge about the customer to provide goods and services through effective and efficient methods. It is a wise strategy and source of competitive advantage for customer behavior understanding and business performance management. The use of information technology (IT) in CRM allows companies to simplify their processes, to integrate product or service related decision making with the business strategies, and to optimize their operations by embracing analytical techniques. The insurance industry is facing unprecedented challenges and decisions in this data-driven business paradigm. It is a strategic necessity for customer-centric insurers to utilize emerging IT capability to support interactions between customers and business operations. The research in the dissertation seeks to provide insights into the application of early technology innovation and data-driven strategies by investigating the following two groups of CRM technology issues: technology adoption and data-driven technology application. Through three essays, the dissertation explores the use of information technology and data analytical tools to provide insight into how automobile insurance companies make decisions regarding their relationships with their customers. The results from these studies provide a …
Date: August 2019
Creator: Tian, Xiaoguang
System: The UNT Digital Library

Measurement of Positive Continuance Intention Drivers within a Service Domain

Access: Use of this item is restricted to the UNT Community
The contribution of this dissertation is how model measurement allows examination of the balance between what is practical in terms of consumer concerns versus what is optimal in terms of cost control. Essay 1 examines a research framework that incorporates various service recovery strategies and simultaneously evaluates their comparative influences. Essay 2 evaluates the complex interrelationships among different factors related to the post-complaint behavioral process. Essay 3 fills a research gap by examining the role of brand equity by operationalizing a reflective model using PLS in operations management (OM) research. These three essays provide insight into the quality management domain and the value that is achieved via a data driven examination of theory. Moreover, this research will provide operations management practitioners a basis to carry out future research on quality management phenomena as well as insight into how to balance cost control and service recovery strategies with the goal of achieving a competitive advantage.
Date: August 2019
Creator: Harun, Md Ahasan Uddin
System: The UNT Digital Library
The Impact of Quality on Customer Behavioral Intentions Based on the Consumer Decision Making Process As Applied in E-commerce (open access)

The Impact of Quality on Customer Behavioral Intentions Based on the Consumer Decision Making Process As Applied in E-commerce

Perceived quality in the context of e-commerce was defined and examined in numerous studies, but, to date, there are no consistent definitions and measurement scales. Instruments that measure quality in e-commerce industries primarily focus on website quality or service quality during the transaction and delivery phases. Even though some scholars have proposed instruments from different perspectives, these scales do not fully evaluate the level of quality perceived by customers during the entire decision-making process. This dissertation purports to provide five main contributions for the e-commerce, service quality, and decision science literature: (1) development of a comprehensive instrument to measure how online customers perceive the quality of the shopping channel, website, transaction and recovery based on the customer decision making process; (2) identification of the determinants of customer satisfaction and the key dimensions of customer behavioral intentions in e-commerce; (3) examination of the relationships among perceived quality, customer satisfaction and loyalty intention using empirical data; (4) application of different statistical packages (LISREL and PLS-Graph) for data analysis and comparison of how these methods impact the results; and (5) examination of the moderating effects of control variables. A survey was designed and distributed to a total of 1126 college students in a …
Date: August 2012
Creator: Wen, Chao
System: The UNT Digital Library
Enhancing the Efficacy of Predictive Analytical Modeling in Operational Management Decision Making (open access)

Enhancing the Efficacy of Predictive Analytical Modeling in Operational Management Decision Making

In this work, we focus on enhancing the efficacy of predictive modeling in operational management decision making in two different settings: Essay 1 focuses on demand forecasting for the companies and the second study utilizes longitudinal data to analyze the illicit drug seizure and overdose deaths in the United States. In Essay 1, we utilize an operational system (newsvendor model) to evaluate the forecast method outcome and provide guidelines for forecast method (the exponential smoothing model) performance assessment and judgmental adjustments. To assess the forecast outcome, we consider not only the common forecast error minimization approach but also the profit maximization at the end of the forecast horizon. Including profit in our assessment enables us to determine if error minimization always results in maximum profit. We also look at the different levels of profit margin to analyze their impact on the forecasting method performance. Our study also investigates how different demand patterns influence maximizing the forecasting method performance. Our study shows that the exponential smoothing model family has a better performance in high-profit products, and the rate of decrease in performance versus demand uncertainty is higher in a stationary demand environment.In the second essay, we focus on illicit drug overdose …
Date: August 2019
Creator: Najmizadehbaghini, Hossein
System: The UNT Digital Library

Optimizing Production System Maintenance Policies when Cyber Threats are Considered

Access: Use of this item is restricted to the UNT Community
In a production environment, physical and cyber-related failures become unavoidable because of the complexity of highly connected manufacturing systems and a finite equipment life cycle. The main purpose of this thesis is to investigate optimal maintenance outsourcing and replacement policies in the presence of cyber-threats, as well as policies to achieve channel coordination via cost subsidization. Although well-developed maintenance outsourcing literature has addressed many advanced and trending issues such as the costs and benefits of new technology adoptions, learning effects, forgetting effects, and systems with back-up machines, no study has looked at the effect of cyber threats on connected production systems. Besides filling this gap, this thesis addresses the most common replacement policies including preventive maintenance with minimal repairs and age replacement. The advent of the Internet of Things (IoT) has enabled the creation of "smart" manufacturing systems, However the resulting connected format makes these systems potential targets for cyber-attacks. Manufacturers have to face a difficult decision as to whether they should adopt costly security technologies or let the manufacturing systems be vulnerable to cyber-threats. This study develops a model addressing this dilemma by providing some insights into the effects of cost subsidization and installation of security systems on the …
Date: August 2019
Creator: Ta, Anh V
System: The UNT Digital Library
The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective (open access)

The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective

This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed in two stages. First, the participants (employees of a municipality) are exposed to a series of phishing and spear-phishing messages to assess if there are any common characteristics shared by the phishing victims. The differences between the phished and the not phished group are assessed through multiple discriminant analysis. Second, the same individuals are asked to participate in a survey designed to examine their security awareness. The research model is tested using PLS-SEM approach. The results indicate that security awareness is in fact a second-order formative construct composed of six components. There are significant differences in security awareness levels between the victims of the phishing experiment and the employees who maintain compliance with security policies. The study extends the theory by …
Date: August 2014
Creator: Hanus, Bartlomiej T.
System: The UNT Digital Library
The Importance of Construct Definition and Specification in Operations Management Structured Model Research: The Case for Quality and Sustainability Constructs in a Decision-Making Model (open access)

The Importance of Construct Definition and Specification in Operations Management Structured Model Research: The Case for Quality and Sustainability Constructs in a Decision-Making Model

In the operations management research, the inconsistent use of the same term for different concepts and the use of the similar concepts for different constructs potentially causes theoretical and statistical problems. This research addresses the importance of construct definitions and specification methodologically within the context of quality and sustainability management. It involves three essays using multiple quantitative methods such as partial least squares structural equation modeling and multiple regression in different consumer decision-making models in the automobile industry. In the first two essays, a comprehensive literature review results in definition and contextualization of the quality and sustainability constructs as applied to operations management and marketing research. The relationships of these constructs with consumer behavior are empirically tested. Building upon the first two essays, the third essay addresses the methodological issues on formative and reflective measurements by summarizing a procedure of validating formative measurements. The quality construct was used to illustrate the methodology. This research contributes to the literature, theory, and practices in the area of quality and sustainability management.
Date: August 2018
Creator: Xu, Lu
System: The UNT Digital Library