Accessing the Power of Aesthetics in Human-computer Interaction (open access)

Accessing the Power of Aesthetics in Human-computer Interaction

In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency characteristics, are critical concerns of designers. This view contends that visual design enhances system use. Thus, this work examines the effects of visual design on computer systems. Visual design exerts its influence on systems through two mechanisms: it evokes affective responses from IT users, such as arousal and pleasure and it influences individuals’ cognitive assessments of systems. Given that both affective and cognitive reactions are significant antecedents of user behaviors in the IT realm, it is no surprise that visual design plays a critical role in information system success. Human-computer-interaction literature indicates that visual aesthetics positively influences such information success factors as usability, online trust, user satisfaction, flow experience, and so on. Although academic research has introduced visual design into the Information Systems (IS) …
Date: August 2013
Creator: Chenyan, Xu
System: The UNT Digital Library
Accuracy and Interpretability Testing of Text Mining Methods (open access)

Accuracy and Interpretability Testing of Text Mining Methods

Extracting meaningful information from large collections of text data is problematic because of the sheer size of the database. However, automated analytic methods capable of processing such data have emerged. These methods, collectively called text mining first began to appear in 1988. A number of additional text mining methods quickly developed in independent research silos with each based on unique mathematical algorithms. How good each of these methods are at analyzing text is unclear. Method development typically evolves from some research silo centric requirement with the success of the method measured by a custom requirement-based metric. Results of the new method are then compared to another method that was similarly developed. The proposed research introduces an experimentally designed testing method to text mining that eliminates research silo bias and simultaneously evaluates methods from all of the major context-region text mining method families. The proposed research method follows a random block factorial design with two treatments consisting of three and five levels (RBF-35) with repeated measures. Contribution of the research is threefold. First, the users perceived a difference in the effectiveness of the various methods. Second, while still not clear, there are characteristics with in the text collection that affect the …
Date: August 2013
Creator: Ashton, Triss A.
System: The UNT Digital Library

An Analysis of Information Technology (IT) Post-Adoption Behavior

The primary focus of this research is explicating the role of emotion in IT post-adoption behavior. Studied in the context of intelligent personal assistants (IPA), a class of conversational artificial intelligence (AI), the first study integrates elements from computer science, communications, and IS disciplines. The research identifies two constructs vital for speech-based technologies, natural language understanding, and feedback, and examines their role in use decisions. This work provides guidance to practice on how best to allocate R&D investments in conversational AI. The second essay examines the IT continuance through the theoretical lens of the expectation-confirmation model (ECM), incorportating cognitive and emotional satisfaction into the ECM framework. Empirical testing of the model suggests that it offers additional clarity on IT continuance phenomena and provides a significant improvement to the explanatory power of ECM in the context of an emerging technology. The third essay is one of the earliest efforts to conceptualize and test a theoretical model that considers emotional attachment in IT continuance behavior. This essay develops a novel model to investigate this phenomenon based on emotional attachment theory, and empirically validates the proposed model in the context of conversational artificial intelligence systems. While the existing theories of IT continuance focus …
Date: August 2020
Creator: Mamun, Md Rasel Al
System: The UNT Digital Library

Augmented Reality Intentions in Social Networking and Retail Apps

This dissertation contributes to IS research by explaining user intentions while using AR features in mobile social networking and retail app contexts. It consists of three essays, which use partial least squares modeling to analyze different consumer behavior models. The first essay examines the influence of quality, human, and environmental factors on AR reuse intention in a mobile social networking context. The second essay introduces position relevance, a new construct essential to AR research in e-commerce, and it looks at the influence of this construct and app involvement on user purchase intention, while using view-in-room features on mobile retail apps. The third essay examines the influence of service quality and visual quality on recommendation intention of mobile retail apps while using view-in-room features compared to shopping without using these AR features.
Date: August 2020
Creator: David, Alsius
System: The UNT Digital Library
Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment (open access)

Business Intelligence Success: An Empirical Evaluation of the Role of BI Capabilities and the Decision Environment

Since the concept of business intelligence (BI) was introduced in the late 1980s, many organizations have implemented BI to improve performance but not all BI initiatives have been successful. Practitioners and academicians have discussed the reasons for success and failure, yet, a consistent picture about how to achieve BI success has not yet emerged. The purpose of this dissertation is to help fill the gap in research and provide a better understanding of BI success by examining the impact of BI capabilities on BI success, in the presence of different decision environments. The decision environment is a composition of the decision types and the way the required information is processed to aid in decision making. BI capabilities are defined as critical functionalities that help an organization improve its performance, and they are examined in terms of organizational and technological capabilities. An online survey is used to obtain the data and partial least squares path modeling (PLS) is used for analysis. The results of this dissertation suggest that all technological capabilities as well as one of the organizational capabilities, flexibility, significantly impact BI success. Results also indicate that the moderating effect of decision environment is significant for quantitative data quality. These …
Date: August 2010
Creator: Işik, Öykü
System: The UNT Digital Library
Business/it Alignment: the Impact of Incentive Plans on the Development of Shared Vision (open access)

Business/it Alignment: the Impact of Incentive Plans on the Development of Shared Vision

This study, utilizing Preston and Karahanna’s framework for shared vision development and Agency Theory, explores the impact of vision development factors and factors associated with incentive plans on shared vision and alignment. Results of the study confirm the strong relationship between shared vision and alignment, and indicate that having an effective management team is important with respect to developing and maintaining shared vision and alignment within the organization. Several vision development factors such as using the language of the business, participation on the top management team (TMT), and having knowledge of the business impact shared vision through their influence on teamwork. Also, results of this study suggest that participation on the TMT by the CIO/IT leader is more important than the individual’s position in the organizational hierarchy. In addition, attributes associated with incentive plans such as achievable and clear measures, measures linked to organizational goals, measures that align the interests of the individual with those of the organization, regular plan reviews, and using a balanced scorecard approach with respect to incentive plan design positively impact teamwork and shared vision. For practitioners, this highlights the importance of incentive plans as powerful tools that can be used to reinforce shared vision, effective …
Date: December 2014
Creator: Johnson, Vess L.
System: The UNT Digital Library
Comparing Latent Dirichlet Allocation and Latent Semantic Analysis as Classifiers (open access)

Comparing Latent Dirichlet Allocation and Latent Semantic Analysis as Classifiers

In the Information Age, a proliferation of unstructured text electronic documents exists. Processing these documents by humans is a daunting task as humans have limited cognitive abilities for processing large volumes of documents that can often be extremely lengthy. To address this problem, text data computer algorithms are being developed. Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are two text data computer algorithms that have received much attention individually in the text data literature for topic extraction studies but not for document classification nor for comparison studies. Since classification is considered an important human function and has been studied in the areas of cognitive science and information science, in this dissertation a research study was performed to compare LDA, LSA and humans as document classifiers. The research questions posed in this study are: R1: How accurate is LDA and LSA in classifying documents in a corpus of textual data over a known set of topics? R2: How accurate are humans in performing the same classification task? R3: How does LDA classification performance compare to LSA classification performance? To address these questions, a classification study involving human subjects was designed where humans were asked to generate and classify documents …
Date: December 2011
Creator: Anaya, Leticia H.
System: The UNT Digital Library
Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications (open access)

Costs and Benefits of Mind Wandering in a Technological Setting: Findings and Implications

The central purpose of this dissertation is to develop and test a theoretical model of mind wandering in a technological setting by integrating the emerging work and theory on mind wandering—a shift of attention from the primary task to the processing of internal goals. This dissertation is intended to advance our understanding on the costs and benefits of mind wandering in information systems (IS) research and in turn, contribute to the literature of cognitive IS research. Understanding the consequences of mind wandering in a technological setting is imperative because mind wandering plays a vital role in influencing various outcomes associated with technology use and/or technology learning, such as technology anxiety, software self-efficacy, and task performance. This dissertation is composed of three essays which examine the determinants and consequences of mind wandering and focus of attention on a number of emotional and cognitive outcomes. A multi-method approach (i.e., online survey and laboratory experiment) across three essays is used to test the research models. Essay 1 focuses on developing the measurement items and estimating the impact of mind wandering on users' emotional outcomes (i.e., technology anxiety and users' satisfaction). Drawing upon the content regulation hypothesis of mind wandering, the content of thoughts …
Date: August 2016
Creator: Sullivan, Yulia
System: The UNT Digital Library
Decision Makers’ Cognitive Biases in Operations Management: An Experimental Study (open access)

Decision Makers’ Cognitive Biases in Operations Management: An Experimental Study

Behavioral operations management (BOM) has gained popularity in the last two decades. The main theme in this new stream of research is to include the human behavior in Operations Management (OM) models to increase the effectiveness of such models. BOM is classified into 4 areas: cognitive psychology, social psychology, group dynamics and system dynamics (Bendoly et al. 2010). This dissertation will focus on the first class, namely cognitive psychology. Cognitive psychology is further classified into heuristics and biases. Tversky and Kahneman (1974) discussed 3 heuristics and 13 cognitive biases that usually face decision makers. This dissertation is going to study 6 cognitive biases under the representativeness heuristic. The model in this dissertation states that cognitive reflection of the individual (Frederick 2005) and training about cognitive biases in the form of warning (Kaufmann and Michel 2009) will help decisions’ makers make less biased decisions. The 6 cognitive biases investigated in this dissertation are insensitivity to prior probability, insensitivity to sample size, misconception of chance, insensitivity to predictability, the illusion of validity and misconception of regression. 6 scenarios in OM contexts have been used in this study. Each scenario corresponds to one cognitive bias. Experimental design has been used as the research …
Date: May 2016
Creator: AlKhars, Mohammed
System: The UNT Digital Library

Decision Making in Alternative Modes of Transportation: Two Essays on Ridesharing and Self-Driving Vehicles

Access: Use of this item is restricted to the UNT Community
This manuscript includes an investigation of decision making in alternative modes of transportation in order to understand consumers' decision in different contexts. In essay 1 of this study, the motives for participation in situated ridesharing is investigated. The study proposes a theoretical model that includes economic benefits, time benefits, transportation anxiety, trust, and reciprocity either as direct antecedents of ridesharing participation intention, or mediated through attitude towards ridesharing. Essay 2 of this study, focuses on self-driving vehicles as one of the recent innovations in transportation industry. Using a survey approach, the study develops a conceptual model of consumers' anticipated motives. Both essays use partial least square- structural equation modeling for assessing the proposed theoretical models.
Date: May 2019
Creator: Amirkiaee, Seyede Yasaman
System: The UNT Digital Library
Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance (open access)

Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance

Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual decision makers, in different decision contexts, determine when to stop collecting information given the availability of virtually unlimited information. Decision makers must make an ultimate decision, but also must make a decision that he or she has enough information to make the final decision (Browne, Pitts, & Wetherbe, 2007). In determining how much information to collect, researchers found that people engage in ‘satisficing' in order to make decisions, particularly when there is more information than it is possible to manage (Simon, 1957). A more recent elucidation of information use relies on the idea of stopping rules, identifying five common stopping rules information seekers use: mental list, representational stability, difference threshold, magnitude threshold, and single criterion (Browne et al., 2007). Prior research indicates …
Date: August 2016
Creator: Gerhart, Natalie
System: The UNT Digital Library
Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness (open access)

Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness

The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera, 2003). The little empirical research that has been conducted in this area has shown that information security management in many organizations is poor (Baskerville, 1993; Shimeall & McDermott, 1999). Several researchers have identified the need for methods to measure the organization-wide information security posture of organizations (Eloff & Von Solms, 2000; James, 1996). This dissertation attempts to measure the organization-wide information security posture by examining benchmark variables that assess role, planning orientation, and performance structure within the organization. Through this conceptualization of an organization's information security posture, a means is presented to measure overall information security and how it impacts the effective utilization of information security strategies. The presence of the dependent variable, effectiveness, gives academics and practitioners a success measure which can guide more effective decision making in …
Date: August 2008
Creator: Young, Randall Frederick
System: The UNT Digital Library
Developing Criteria for Extracting Principal Components and Assessing Multiple Significance Tests in Knowledge Discovery Applications (open access)

Developing Criteria for Extracting Principal Components and Assessing Multiple Significance Tests in Knowledge Discovery Applications

With advances in computer technology, organizations are able to store large amounts of data in data warehouses. There are two fundamental issues researchers must address: the dimensionality of data and the interpretation of multiple statistical tests. The first issue addressed by this research is the determination of the number of components to retain in principal components analysis. This research establishes regression, asymptotic theory, and neural network approaches for estimating mean and 95th percentile eigenvalues for implementing Horn's parallel analysis procedure for retaining components. Certain methods perform better for specific combinations of sample size and numbers of variables. The adjusted normal order statistic estimator (ANOSE), an asymptotic procedure, performs the best overall. Future research is warranted on combining methods to increase accuracy. The second issue involves interpreting multiple statistical tests. This study uses simulation to show that Parker and Rothenberg's technique using a density function with a mixture of betas to model p-values is viable for p-values from central and non-central t distributions. The simulation study shows that final estimates obtained in the proposed mixture approach reliably estimate the true proportion of the distributions associated with the null and nonnull hypotheses. Modeling the density of p-values allows for better control of …
Date: August 1999
Creator: Keeling, Kellie Bliss
System: The UNT Digital Library

Development and Exploration of End-User Healthcare Technology Acceptance Models

This dissertation consists of three studies that collectively investigate the factors influencing the consumer adoption intention towards emerging healthcare technologies. Essay 1 systematically reviews the extent literature on healthcare technology adoption and serves as the theoretical foundation of the dissertation. It investigates different models that have been previously applied to study healthcare technology acceptance. Meta-analysis method is used to quantitatively synthesize the findings from prior empirical studies. Essay 2 posits, develops, and tests a comprehensive biotechnology acceptance model from the end-user's perspective. Two new constructs, namely, perceived risk and trust in technology, are integrated into the unified theory of acceptance and use of technology. Research hypotheses are tested using survey data and partial least square – structural equation modeling (PLS-SEM). Essay 3 extends the findings from the Essay 2 and further investigates the consumer's trust initiation and its effect on behavioral adoption intention. To achieve this purpose, Essay 3 posits and develops a trust model. Survey data allows testing the model using PLS-SEM. The models developed in this dissertation reflect significant modifications specific to the healthcare context. The findings provide value for academia, practitioners, and policymakers.
Date: May 2021
Creator: Wei, Xinyu "Eddy"
System: The UNT Digital Library
Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals (open access)

Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals

Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), which allows employees to connect their personal devices to corporate networks. BYOD is identified as one of the top ten technology trends in 2014 that can multiply the size of mobile workforce in organizations. However, it can also serve as a vehicle that transfers cyber security threats associated with personal mobile devices to the organizations. As BYOD opens the floodgates of various device types and platforms into organizations, identifying different sources of cyber security threats becomes indispensable. So far, there are no studies that investigated how user, device and usage characteristics affect individuals’ protective and risky IT behaviors. The goal of this dissertation is to expand the current literature in IS security by accounting for the roles of user, device, and usage characteristics …
Date: August 2015
Creator: Negahban, Arash
System: The UNT Digital Library

Does Quality Management Practice Influence Performance in the Healthcare Industry?

This research examines the relationship between quality management (QM) practices and performance in the healthcare industry via the conduct of three studies. The results of this research contribute both to advancing QM theory as well as in developing a unique text mining method that is illustrated by examining QM in the healthcare industry. Essay 1 explains the relationship between operational performance and QM practices in the healthcare industry. This study analyzed the findings from the literature using meta-analysis. We applied confirmatory semantic analysis (CSA) to examine the Baldrige winners' applications. Essay 2 examines the benefits associated with an effective QM program in the healthcare industry. This study addressed the research question about how effective QM practice results in improved hospital performance. This study compares the performance of Baldrige Award-winning hospitals with matching hospitals, state average, and national average. The results show that the Baldrige Award can lead to an increase in patient satisfaction in certain periods. Essay 3 discusses the contribution of an online clinic appointment system (OCAS) to QM practices. An enhanced trust model was built on understanding the mechanism of patients' trust formation in the OCAS. Understanding the determinants related to patients' trust and willingness to use OCAS …
Date: August 2020
Creator: Xie, Heng
System: The UNT Digital Library
The Effect of It Process Support, Process Visualization and Process Characteristics on Process Outcomes (open access)

The Effect of It Process Support, Process Visualization and Process Characteristics on Process Outcomes

Business process re-engineering (part of the Business Process Management domain) is among the top three concerns of Information Technology (IT) leaders and is deemed to be one of many important IT leveraging opportunities. Two major challenges have been identified in relation to BPM and the use of IT. The first challenge is related to involving business process participants in process improvement initiatives using BPM systems. BPM technologies are considered to be primarily targeted for developers and not BPM users, and the need to engage process participants into process improvement initiatives is not addressed, contributing to the business-IT gap. The second challenge is related to potential de-skilling of knowledge workers when knowledge-intensive processes are automated and process knowledge resides in IT, rather than human process participants. The two identified challenges are not separate issues. Process participants need to be knowledgeable about the process in order to actively contribute to BPM initiatives, and the loss of process knowledge as a result of passive use of automated systems may further threaten their participation in process improvement. In response to the call for more research on the individual impacts of business process initiatives, the purpose of this dissertation study is to understand the relationship …
Date: December 2013
Creator: Al Beayeyz, Alaa
System: The UNT Digital Library
The Effect of Value Co-creation and Service Quality on Customer Satisfaction and Commitment in Healthcare Management (open access)

The Effect of Value Co-creation and Service Quality on Customer Satisfaction and Commitment in Healthcare Management

Despite much interest in service quality and various other service quality measures, scholars appear to have overlooked the overall concept of quality. More specifically, previous research has yet to integrate the effect of the customer network and customer knowledge into the measurement of quality. In this work, it is posited that the evaluation of quality is based on both the delivered value from the provider as well as the value developed from the relationships among customers and between customers and providers. This research examines quality as a broad and complex issue, and uses the “Big Quality” concept within the context of routine healthcare service. The last few decades have witnessed interest and activities surrounding the subject of quality and value co-creation. These are core features of Service-Dominant (S-D) logic theory. In this theory, the customer is a collaborative partner who co-creates value with the firm. Customers create value through the strength of their relations and network, and they take a central role in value actualization as value co-creator. I propose to examine the relationship between quality and the constructs of value co-creation. As well, due to the pivotal role of the decision-making process in customer satisfaction, I will also operationalize …
Date: August 2015
Creator: Kwon, Junhyuk
System: The UNT Digital Library
Enhancing the Efficacy of Predictive Analytical Modeling in Operational Management Decision Making (open access)

Enhancing the Efficacy of Predictive Analytical Modeling in Operational Management Decision Making

In this work, we focus on enhancing the efficacy of predictive modeling in operational management decision making in two different settings: Essay 1 focuses on demand forecasting for the companies and the second study utilizes longitudinal data to analyze the illicit drug seizure and overdose deaths in the United States. In Essay 1, we utilize an operational system (newsvendor model) to evaluate the forecast method outcome and provide guidelines for forecast method (the exponential smoothing model) performance assessment and judgmental adjustments. To assess the forecast outcome, we consider not only the common forecast error minimization approach but also the profit maximization at the end of the forecast horizon. Including profit in our assessment enables us to determine if error minimization always results in maximum profit. We also look at the different levels of profit margin to analyze their impact on the forecasting method performance. Our study also investigates how different demand patterns influence maximizing the forecasting method performance. Our study shows that the exponential smoothing model family has a better performance in high-profit products, and the rate of decrease in performance versus demand uncertainty is higher in a stationary demand environment.In the second essay, we focus on illicit drug overdose …
Date: August 2019
Creator: Najmizadehbaghini, Hossein
System: The UNT Digital Library
Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace (open access)

Enterprise Social Software: an Empirical Assessment of Knowledge Sharing in the Workplace

Social software has become pervasive including technologies such as blogs, wikis, and social networking sites. Interactive Web 2.0 technology is distinguished from earlier Internet channels, with content provided not only from the website host, but also and most importantly, user-generated content. These social technologies are increasingly entering the enterprise, involving complex social and psychological aspects as well as an understanding of traditional technology acceptance factors. Organizations trying to reap potential benefits of enterprise social software (ESS) must successfully implement and maintain ESS tools. This research develops a framework for assessing knowledge sharing based on reciprocal determinism theory and augmented with technology acceptance, sociological, and psychological factors. Semi-structured interviews with IT professionals, followed by a written survey of employees using ESS are used to collect data. The hermeneutic circle methodology is used to analyze the interview transcripts and structural equation modeling is used to analyze the survey data. Results show technological advantage has no significant effect on the intention to share knowledge, but community cohesiveness and individual willingness significantly affect knowledge sharing intention and behavior. The study offers a synthesized model of variables affecting knowledge sharing as well as a better understanding of best practices for organizations to consider when implementing …
Date: August 2013
Creator: Harden, Gina
System: The UNT Digital Library
Extensions of the General Linear Model into Methods within Partial Least Squares Structural Equation Modeling (open access)

Extensions of the General Linear Model into Methods within Partial Least Squares Structural Equation Modeling

The current generation of structural equation modeling (SEM) is loosely split in two divergent groups - covariance-based and variance-based structural equation modeling. The relative newness of variance-based SEM has limited the development of techniques that extend its applicability to non-metric data. This study focuses upon the extension of general linear model techniques within the variance-based platform of partial least squares structural equation modeling (PLS-SEM). This modeling procedure receives it name through the iterative PLS‑SEM algorithm's estimates of the coefficients for the partial ordinary least squares regression models in both the measurement model and the overall structural model. This research addresses the following research questions: (1) What are the appropriate measures for data segmentation within PLS‑SEM? (2) What are the appropriate steps for the analysis of rank-ordered path coefficients within PLS‑SEM? and (3) What is an appropriate model selection index for PLS‑SEM? The limited type of data to which PLS-SEM is applicable suggests an opportunity to extend the method for use with different data and as a result a broader number of applications. This study develops and tests several methodologies that are prevalent in the general linear model (GLM). The proposed data segmentation approaches posited and tested through post hoc analysis …
Date: August 2016
Creator: George, Benjamin Thomas
System: The UNT Digital Library

Extensions of the Neural Network Models into Applications and Comparisons with General Linear Models

This dissertation is designed to answer the following questions: (1) Which measurement model is better to contribute to the research model in different areas? (2) Within a given model, how does the data size influence the performance of a neural network (NN) and some other methods? (3) Compared to partial least square (PLS), ordinary least square (OLS), XGBoost, how is the performance of NN? Essay 1 systematically compares PLS-SEM to ANN and builds the hybrid vehicle purchasing intention model (HVPIM). It investigates different models that have been previously applied to study the theory of planned behavior (TPB). The methods find those factors that significantly correlated with consumer purchase intention. Essay 2 posits, develops, and tests a PNN model with healthcare data. A research survey is designed and distributed to undergraduate students from a major research school in the U.S. southwest region. Research hypotheses are tested using PLS-SEM and PNN. Essay 3 targets on testing the performance of the NN model with panel data from the soccer transfer market. To achieve this purpose, the essay posits and develops an empirical test built on game theory. The NN model is tested and compared to OLS and XGBoost. As the research compares the …
Date: August 2021
Creator: Wang, Yuchen
System: The UNT Digital Library
Factors Influencing BI Data Collection Strategies: An Empirical Investigation (open access)

Factors Influencing BI Data Collection Strategies: An Empirical Investigation

The purpose of this dissertation is to examine the external factors that influence an organizations' business intelligence (BI) data collection strategy when mediated by BI attributes. In this dissertation, data warehousing strategies are used as the basis on which to frame the exploration of BI data collection strategies. The attributes include BI insightfulness, BI consistency, and the organizational transformation attribute of BI. The research population consisted of IT professionals and top level managers involved in developing and managing BI. Data was collected from a range of industries and organizations within the United States. An online survey was used to collect the data to empirically test the proposed relationships. Data was analyzed using partial least square path modeling (PLS). The results of this study suggest that there exists a positive relationship between institutional isomorphism and BI consistency. The results also indicate that there exists a positive relationship between BI consistency and BI comprehensive data collection strategy, and the organizational transformation attribute of BI and BI comprehensive data collection strategy. These findings provide a theoretical lens to better understand the motivators and the success factors related to collecting the huge amounts of data required for BI. This study also provides managers with …
Date: August 2010
Creator: Ramakrishnan, Thiagarajan
System: The UNT Digital Library

Factors Influencing Continued Usage of Telemedicine Applications

This study addresses the antecedents of individuals' disposition to use telemedicine applications, as well as the antecedents of their usage to provide insight into creating sustained usage over time. The theoretical framework of this research is Bhattacherjee's expectation-confirmation IS continuance model. By combining a series of key factors which may influence the initial and continued usage of telemedicine applications with key constructs of Bhattacherjee's IS continuance model, this study aims to provide a deeper understanding of barriers to telemedicine app usage and how to facilitate continued use of these apps. Online survey data was collected from college students who are telemedicine application users. A total of 313 responses were gathered, and data analysis was conducted using SmartPLS 3. This dissertation contributes by looking at the IS adoption and IS continuance research simultaneously to connect these two research streams as well as suggesting the usage context of some established IS theory being different with regard to healthcare applications.
Date: August 2022
Creator: Liu, Xiaoyan
System: The UNT Digital Library