The Influence of Business Intelligence Components on the Quality of Decision Making (open access)

The Influence of Business Intelligence Components on the Quality of Decision Making

Decision makers require the right information at the right time, in the right place and in the right format so that they can make good decisions. Although business intelligence (BI) has the potential to improve decision making, there is little empirical evidence of how well this has been achieved. The purpose of this dissertation is to examine the quality of decisions made using BI. The research question it addresses is what are the key antecedents of decision quality for users of business intelligence systems? The theoretical support for the model is developed based on the literature review that draws on decision support systems (DSS), group decision support systems (GDSS), and BI. Grounded on this literature review, the antecedents of decision quality are operationalized in this dissertation through independent variables such as the problem space complexity, the level of BI usage, the BI user experience, and information quality. The dependent variable is operationalized as decision quality and it captures the self-satisfaction with a decision made by users in a BI environment. The research model was tested using a survey of BI users whose names were provided by a marketing company. This research suggests that BI user experience is a more complex …
Date: May 2013
Creator: Visinescu, Lucian L.
System: The UNT Digital Library
Supply Chain Network Planning for Humanitarian Operations During Seasonal Disasters (open access)

Supply Chain Network Planning for Humanitarian Operations During Seasonal Disasters

To prevent loss of lives during seasonal disasters, relief agencies distribute critical supplies and provide lifesaving services to the affected populations. Despite agencies' efforts, frequently occuring disasters increase the cost of relief operations. The purpose of our study is to minimize the cost of relief operations, considering that such disasters cause random demand. To achieve this, we have formulated a series of models, which are distinct from the current studies in three ways. First, to the best of our knowledge, we are the first ones to capture both perishable and durable products together. Second, we have aggregated multiple products in a different way than current studies do. This unique aggregation requires less data than that of other types of aggregation. Finally, our models are compatible with the practical data generated by FEMA. Our models offer insights on the impacts of various parameters on optimum cost and order size. The analyses of correlation of demand and quality of information offer interesting insights; for instance, under certain cases, the quality of information does not influence cost. Our study has considered both risk averse and risk neutral approaches and provided insights. The insights obtained from our models are expected to help agencies reduce …
Date: May 2013
Creator: Ponnaiyan, Subramaniam
System: The UNT Digital Library
Decision Makers’ Cognitive Biases in Operations Management: An Experimental Study (open access)

Decision Makers’ Cognitive Biases in Operations Management: An Experimental Study

Behavioral operations management (BOM) has gained popularity in the last two decades. The main theme in this new stream of research is to include the human behavior in Operations Management (OM) models to increase the effectiveness of such models. BOM is classified into 4 areas: cognitive psychology, social psychology, group dynamics and system dynamics (Bendoly et al. 2010). This dissertation will focus on the first class, namely cognitive psychology. Cognitive psychology is further classified into heuristics and biases. Tversky and Kahneman (1974) discussed 3 heuristics and 13 cognitive biases that usually face decision makers. This dissertation is going to study 6 cognitive biases under the representativeness heuristic. The model in this dissertation states that cognitive reflection of the individual (Frederick 2005) and training about cognitive biases in the form of warning (Kaufmann and Michel 2009) will help decisions’ makers make less biased decisions. The 6 cognitive biases investigated in this dissertation are insensitivity to prior probability, insensitivity to sample size, misconception of chance, insensitivity to predictability, the illusion of validity and misconception of regression. 6 scenarios in OM contexts have been used in this study. Each scenario corresponds to one cognitive bias. Experimental design has been used as the research …
Date: May 2016
Creator: AlKhars, Mohammed
System: The UNT Digital Library
Quality Management Theory Development and Investigation of the Constructs within an Organizational Framework (open access)

Quality Management Theory Development and Investigation of the Constructs within an Organizational Framework

Supply chain management (SCM) and quality management (QM) share some common literature and have overlapping domains that reinforce each other in the supplier and customer relationship management areas. Despite the recognized importance of supplier and customer relationships toward achieving quality goals, limited prior research examines whether SCM represents a distinct construct within the prominent existing quality focused organizational frameworks such as the Malcolm Baldrige National Quality Award (MBNQA). As a result of the absence of the SCM construct in the frameworks, the problem facing researchers is understanding the role of SCM in the implementation of QM practices within an organization. Such an understanding is key to QM theory development for the 21st century organizations. In order to conduct this investigation, we examine several well-studied quality focused organizational frameworks that are validated among the community of researchers, and, widely accepted among practitioners. However, which of these well-known quality management models serve as the best proxy for a quality focused organizational framework is an important area for research in order to better promote QM worldwide. This research involves three essays and uses a mixed methodology of qualitative and quantitative research. Essay 1 compares well-known national quality award frameworks such as the MBNQA, …
Date: May 2016
Creator: Peng, Xianghui
System: The UNT Digital Library

Development and Exploration of End-User Healthcare Technology Acceptance Models

This dissertation consists of three studies that collectively investigate the factors influencing the consumer adoption intention towards emerging healthcare technologies. Essay 1 systematically reviews the extent literature on healthcare technology adoption and serves as the theoretical foundation of the dissertation. It investigates different models that have been previously applied to study healthcare technology acceptance. Meta-analysis method is used to quantitatively synthesize the findings from prior empirical studies. Essay 2 posits, develops, and tests a comprehensive biotechnology acceptance model from the end-user's perspective. Two new constructs, namely, perceived risk and trust in technology, are integrated into the unified theory of acceptance and use of technology. Research hypotheses are tested using survey data and partial least square – structural equation modeling (PLS-SEM). Essay 3 extends the findings from the Essay 2 and further investigates the consumer's trust initiation and its effect on behavioral adoption intention. To achieve this purpose, Essay 3 posits and develops a trust model. Survey data allows testing the model using PLS-SEM. The models developed in this dissertation reflect significant modifications specific to the healthcare context. The findings provide value for academia, practitioners, and policymakers.
Date: May 2021
Creator: Wei, Xinyu "Eddy"
System: The UNT Digital Library

Three Essays on Internet of Things Adoption and Use

Access: Use of this item is restricted to the UNT Community
Internet of Things (IoT) is a promising technology with great potential for individuals, society, governments, and the economy. IoT is expected to become ubiquitous and influence every aspect of everyday experience. Thus, IoT represents an important phenomena for both organizational and behavioral information system (IS) researchers. This dissertation seeks to contribute to IS research by studying the aspects that influence IoT adoption and use at both consumer and organizational levels. This dissertation achieves this purpose in a series of three essays. The first essay focuses on IoT acceptance in the context of smart home. The second essay focuses on examining the effect of artificial intelligence (AI) capabilities on consumers' IoT perceptions and intentions. Finally, the third essay focuses on the organizational investment and adoption of IoT technologies.
Date: May 2019
Creator: Aldossari, Mobark
System: The UNT Digital Library

Decision Making in Alternative Modes of Transportation: Two Essays on Ridesharing and Self-Driving Vehicles

Access: Use of this item is restricted to the UNT Community
This manuscript includes an investigation of decision making in alternative modes of transportation in order to understand consumers' decision in different contexts. In essay 1 of this study, the motives for participation in situated ridesharing is investigated. The study proposes a theoretical model that includes economic benefits, time benefits, transportation anxiety, trust, and reciprocity either as direct antecedents of ridesharing participation intention, or mediated through attitude towards ridesharing. Essay 2 of this study, focuses on self-driving vehicles as one of the recent innovations in transportation industry. Using a survey approach, the study develops a conceptual model of consumers' anticipated motives. Both essays use partial least square- structural equation modeling for assessing the proposed theoretical models.
Date: May 2019
Creator: Amirkiaee, Seyede Yasaman
System: The UNT Digital Library
Three Essays on Information Security Risk Management (open access)

Three Essays on Information Security Risk Management

Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches for minimizing and recovering from cyber-attack losses and preventing further cyber-attacks are gaining more importance. Many studies exist that have increased our understanding of how individuals and organizations are motivated to reduce or avoid the risks of security breaches and cyber-attacks using safeguard mechanisms. The safeguards are sometimes technical in nature, such as intrusion detection software and anti-virus software. Other times, the safeguards are procedural in nature such as security policy adherence and security awareness and training. Many of these safeguards fall under the risk mitigation and risk avoidance aspects of risk management, and do not address other aspects of risk management, such as risk transfer. Researchers have argued that technological approaches to security risks are rarely …
Date: May 2018
Creator: Ogbanufe, Obiageli
System: The UNT Digital Library

Three Essays on the Role of Social, Legal and Technical Factors on Internet of Things and Smart Contracts Adoption in the Context of COVID-19 Pandemic

I extended and adapted the current technology acceptance models and privacy research to the peculiar context of the COVID-19 pandemic to ascertain the effective "power" of IT in fighting such a pandemic. The research models developed for the purpose of this study contain peculiar modifications to the technological-personal-environmental (TPE) framework and privacy calculus model because of the unique technologies implemented and the peculiar pandemic scenario. I developed three studies that investigate the interaction between social, legal, and technical factors that affect the adoption of IoT devices and blockchain systems implemented to fight the spread of COVID-19. Essay 1 systematically reviews existing literature on the analysis of the social, legal, and technical components in addressing phenomena related to IoT architecture and blockchain technology. The employment of a comparable coding method allows finding which of the above components is prominent in relation to the study of IoT and blockchain. Essay 2 develops a technological acceptance model by integrating the TPE framework with new constructs, i.e., regulatory environment, epidemic ecosystem, pre-epidemic ecosystem, perceived social usefulness, and technical characteristics. Essay 3 further explores the interplay between social, legal, and technical factors toward the adoption of smart contracts in the context of the COVID-19 pandemic. …
Date: May 2022
Creator: Guerra, Katia
System: The UNT Digital Library
Factors that Drive New Technology Product and Service Use and Continuance (open access)

Factors that Drive New Technology Product and Service Use and Continuance

Understanding information technology and its related products and services is increasingly important because the everyday use of technology continues to expand and broaden. Despite this need for greater understanding, the extant theories that explore the dominant factors that drive intention to use a new technology are limited. The Technology Acceptancy Model (TAM) is the most popular model in explaining traditional technology adoption. The limitations of the TAM in grasping the overall evaluation of technology or service are one of motivations for developing new models in this dissertation. The two antecedents of the TAM- perceived usefulness and perceived ease of use- only capture partial utility of a service (or product). In addition, some researchers argued that key factors used in an initial acceptance model such as perceived usefulness and perceived ease of use are not strong predictors of future continuance intention of the service because they do not consider future switching intention in the later stage. Hence, one goal of this dissertation is to develop and test new models to predict factors that drive intention and continuance intention decisions of new technology related products or services. This research involves three studies that examine different aspects of adoption and continuance intention decisions …
Date: May 2018
Creator: Liu, Xiaotong
System: The UNT Digital Library
General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses (open access)

General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses

This research sought to shed light on information systems security (ISS) by conceptualizing an organization's use of countermeasures using general deterrence theory, positing a non-recursive relationship between threats and countermeasures, and by extending the ISS construct developed in prior research. Industry affiliation and organizational size are considered in terms of differences in threats that firms face, the different countermeasures in use by various firms, and ultimately, how a firm's ISS effectiveness is affected. Six information systems professionals were interviewed in order to develop the appropriate instruments necessary to assess the research model put forth; the final instrument was further refined by pilot testing with the intent of further clarifying the wording and layout of the instrument. Finally, the Association of Information Technology Professionals was surveyed using an online survey. The model was assessed using SmartPLS and a two-stage least squares analysis. Results indicate that a non-recursive relationship does indeed exist between threats and countermeasures and that countermeasures can be used to effectively frame an organization's use of countermeasures. Implications for practitioners include the ability to target the use of certain countermeasures to have desired effects on both ISS effectiveness and future threats. Additionally, the model put forth in this research …
Date: May 2009
Creator: Schuessler, Joseph H.
System: The UNT Digital Library
A Study of the Intent to Fully Utilize Electronic Personal Health Records in the Context of Privacy and Trust (open access)

A Study of the Intent to Fully Utilize Electronic Personal Health Records in the Context of Privacy and Trust

Government initiatives called for electronic health records for each individual healthcare consumer by 2014. the purpose of the initiatives is to provide for the common exchange of clinical information between healthcare consumers, healthcare providers, third-party payers and public healthcare officials.This exchange of healthcare information will impact the healthcare industry and enable more effective and efficient application of healthcare so that there may be a decrease in medical errors, increase in access to quality of care tools, and enhancement of decision making abilities by healthcare consumers, healthcare providers and government health agencies. an electronic personal health record (ePHR) created, managed and accessed by healthcare consumers may be the answer to fulfilling the national initiative. However, since healthcare consumers potentially are in control of their own ePHR, the healthcare consumer’s concern for privacy may be a barrier for the effective implementation of a nationwide network of ePHR. a technology acceptance model, an information boundary theory model and a trust model were integrated to analyze usage intentions of healthcare consumers of ePHR. Results indicate that healthcare consumers feel there is a perceived usefulness of ePHR; however they may not see ePHR as easy to use. Results also indicate that the perceived usefulness of …
Date: May 2012
Creator: Richards, Rhonda J.
System: The UNT Digital Library

Three Essays on Social Media Use and Information Sharing Behavior

Social media platforms create rich social structures, expand users' boundaries of social networks and revolutionize traditional forms of communications, social interactions and social relationships. These platforms not only facilitate the creation and sharing of news and information, but they also drive various kinds of businesses models, processes and operations, knowledge sharing, marketing strategies for brand management and socio-political discourses essential for healthy and democratic functions. As such, social media has greater implications on organizations and society brought about by individuals' social media usage patterns, and therefore, calls for further investigations. The main objective of this dissertation is to explore and offer insights into such social media usage and information sharing behaviors via data driven examination of various theories. This dissertation involves three studies that focus on factors that explain individuals' three different social media usage behaviors. Essay 1 investigates individuals' perceived importance of online affiliation, self-esteem, self-regulation and risk-benefit structure as antecedents of users' geo-tagging behavior on social media. Essay 2 examines the role of online news quality, source credibility, individuals' perception towards online civic engagement, attitude towards news sharing and social influences to understand users' news sharing behavior on social media platforms. Essay 3 seeks to examine the individuals' …
Date: May 2021
Creator: Bhagat, Sarbottam
System: The UNT Digital Library