Search Results

Three Essays on Collective Privacy and Information Security

Description: In Essay 1, we seek to expand the insights on an individual's decision to share group content. Social networking sites (SNS) have become a ubiquitous means of socializing in the digital age. Using a survey, we collected data from 520 respondents with corporate work experience to test our research model. Our analysis highlights the complex interplay between individual and group factors that shape users' risk-benefit analysis of sharing group content on social networking sites. Furthermore, the r… more
This item is restricted from view until August 1, 2024.
Date: July 2023
Creator: Memarian Esfahani, Sara
Partner: UNT Libraries
open access

Three Essays on Information Privacy of Mobile Users in the Context of Mobile Apps

Description: The increasing demand for mobile apps is out the current capability of mobile app developers. In addition, the growing trend in smartphone ownership and the time people spend on mobile apps has raised several opportunities and risks for users and developers. The average time everyday a user spend on smartphones to use mobile apps is more than two hours. The worldwide mobile app revenue increase is estimated to grow 33%, $19 billion. Three quarter of the time used on mobile apps is solely for us… more
Date: August 2016
Creator: Koohikamali, Mehrdad
Partner: UNT Libraries

A Heuristic Approach to Selection of Analytical Methods: Three Empirical Healthcare Studies

Description: Managers rely on analytics to make decisions and the choice of the analytical method can influence their decision-making. This dissertation considers three cases and examines how the choice of analytical methods influence interpretations and implications. These areas are communication for health-related information in social media, health information technology investment by hospitals as it relates to patient satisfaction, and health related expenditure policies of countries. These studies deve… more
Date: August 2021
Creator: Tarakci, Yasemin
Partner: UNT Libraries

Three Essays on Internet of Things Adoption and Use

Description: Internet of Things (IoT) is a promising technology with great potential for individuals, society, governments, and the economy. IoT is expected to become ubiquitous and influence every aspect of everyday experience. Thus, IoT represents an important phenomena for both organizational and behavioral information system (IS) researchers. This dissertation seeks to contribute to IS research by studying the aspects that influence IoT adoption and use at both consumer and organizational levels. This d… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: May 2019
Creator: Aldossari, Mobark
Partner: UNT Libraries

Decision Making in Alternative Modes of Transportation: Two Essays on Ridesharing and Self-Driving Vehicles

Description: This manuscript includes an investigation of decision making in alternative modes of transportation in order to understand consumers' decision in different contexts. In essay 1 of this study, the motives for participation in situated ridesharing is investigated. The study proposes a theoretical model that includes economic benefits, time benefits, transportation anxiety, trust, and reciprocity either as direct antecedents of ridesharing participation intention, or mediated through attitude towa… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: May 2019
Creator: Amirkiaee, Seyede Yasaman
Partner: UNT Libraries
open access

Three Essays on Information Security Risk Management

Description: Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that… more
Date: May 2018
Creator: Ogbanufe, Obiageli
Partner: UNT Libraries
open access

Decision-Making with Big Information: The Relationship between Decision Context, Stopping Rules, and Decision Performance

Description: Ubiquitous computing results in access to vast amounts of data, which is changing the way humans interact with each other, with computers, and with their environments. Information is literally at our fingertips with touchscreen technology, but it is not valuable until it is understood. As a result, selecting which information to use in a decision process is a challenge in the current information environment (Lu & Yuan, 2011). The purpose of this dissertation was to investigate how individual de… more
Date: August 2016
Creator: Gerhart, Natalie
Partner: UNT Libraries
open access

Three Research Essays on Online Users' Concerns and Web Assurance Mechanisms

Description: Online users struggle with different concerns whenever they use information systems. According to Miyazaki and Fernandez (2001), there are three important categories of concerns for online users: privacy concern, third party fraudulent behavior concern ("system security"), and online website fraudulent behavior concern ("security"). Kim, Sivasailam, and Rao (2004) proposed a similar categorization for web assurance dimensions. They argue that online websites are supposed to address users' priv… more
Date: August 2016
Creator: Mousavizadeh Kashipaz, Seyed Mohammadreza
Partner: UNT Libraries
open access

Extensions of the General Linear Model into Methods within Partial Least Squares Structural Equation Modeling

Description: The current generation of structural equation modeling (SEM) is loosely split in two divergent groups - covariance-based and variance-based structural equation modeling. The relative newness of variance-based SEM has limited the development of techniques that extend its applicability to non-metric data. This study focuses upon the extension of general linear model techniques within the variance-based platform of partial least squares structural equation modeling (PLS-SEM). This modeling procedu… more
Date: August 2016
Creator: George, Benjamin Thomas
Partner: UNT Libraries

Three Essays on the Role of Social, Legal and Technical Factors on Internet of Things and Smart Contracts Adoption in the Context of COVID-19 Pandemic

Description: I extended and adapted the current technology acceptance models and privacy research to the peculiar context of the COVID-19 pandemic to ascertain the effective "power" of IT in fighting such a pandemic. The research models developed for the purpose of this study contain peculiar modifications to the technological-personal-environmental (TPE) framework and privacy calculus model because of the unique technologies implemented and the peculiar pandemic scenario. I developed three studies that inv… more
This item is restricted from view until June 1, 2027.
Date: May 2022
Creator: Guerra, Katia
Partner: UNT Libraries

Factors Influencing Continued Usage of Telemedicine Applications

Description: This study addresses the antecedents of individuals' disposition to use telemedicine applications, as well as the antecedents of their usage to provide insight into creating sustained usage over time. The theoretical framework of this research is Bhattacherjee's expectation-confirmation IS continuance model. By combining a series of key factors which may influence the initial and continued usage of telemedicine applications with key constructs of Bhattacherjee's IS continuance model, this study… more
This item is restricted from view until September 1, 2024.
Date: August 2022
Creator: Liu, Xiaoyan
Partner: UNT Libraries
open access

Factors that Drive New Technology Product and Service Use and Continuance

Description: Understanding information technology and its related products and services is increasingly important because the everyday use of technology continues to expand and broaden. Despite this need for greater understanding, the extant theories that explore the dominant factors that drive intention to use a new technology are limited. The Technology Acceptancy Model (TAM) is the most popular model in explaining traditional technology adoption. The limitations of the TAM in grasping the overall evaluat… more
Date: May 2018
Creator: Liu, Xiaotong
Partner: UNT Libraries
open access

Information systems success and technology acceptance within a government organization.

Description: Numerous models of IS success and technology acceptance their extensions have been proposed and applied in empirical. This study continues this tradition and extends the body of knowledge on the topic of IS success by developing a more comprehensive model for measuring IS success and technology acceptance within a government organization. The proposed model builds upon three established IS success and technology acceptance frameworks namely the DeLone and McLean (2003), Venkatesh et al.'s (2003… more
Date: August 2008
Creator: Thomas, Patricia
Partner: UNT Libraries
open access

IT Offshoring Success: A Social Exchange Perspective

Description: Spending by U.S. companies in offshore IT services continues at unprecedented levels despite a high failure rate. This study fills a gap in the existing literature by examining the client-vendor offshoring relationship through the theoretical lens of social exchange theory at the organizational level of analysis from the client's perspective. Social exchange theory focuses on the exchange of activities between two parties, whether they are individuals or companies and was used as a basis for ex… more
Date: August 2008
Creator: St. John, Jeremy
Partner: UNT Libraries
open access

Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness

Description: The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera… more
Date: August 2008
Creator: Young, Randall Frederick
Partner: UNT Libraries
open access

General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses

Description: This research sought to shed light on information systems security (ISS) by conceptualizing an organization's use of countermeasures using general deterrence theory, positing a non-recursive relationship between threats and countermeasures, and by extending the ISS construct developed in prior research. Industry affiliation and organizational size are considered in terms of differences in threats that firms face, the different countermeasures in use by various firms, and ultimately, how a firm'… more
Date: May 2009
Creator: Schuessler, Joseph H.
Partner: UNT Libraries
open access

The Impact of IT Capability on Employee Capability, Customer Value, Customer Satisfaction, and Business Performance

Description: This study empirically examines the impact of IT capability on firms' performance and evaluates whether firms' IT capabilities play a role in improving employee capability, customer value, customer satisfaction, and ultimately business performance. The results were based on comparing the business performance of the IT leader companies with that of control companies of similar size and industry. The IT leader companies were selected from the Information Week 500 list published annually from 2001… more
Date: August 2009
Creator: Chae, Ho-Chang
Partner: UNT Libraries
open access

Impact of Forecasting Method Selection and Information Sharing on Supply Chain Performance.

Description: Effective supply chain management gains much attention from industry and academia because it helps firms across a supply chain to reduce cost and improve customer service level efficiently. Focusing on one of the key challenges of the supply chains, namely, demand uncertainty, this dissertation extends the work of Zhao, Xie, and Leung so as to examine the effects of forecasting method selection coupled with information sharing on supply chain performance in a dynamic business environment. The r… more
Date: December 2009
Creator: Pan, Youqin
Partner: UNT Libraries

An Analysis of Information Technology (IT) Post-Adoption Behavior

Description: The primary focus of this research is explicating the role of emotion in IT post-adoption behavior. Studied in the context of intelligent personal assistants (IPA), a class of conversational artificial intelligence (AI), the first study integrates elements from computer science, communications, and IS disciplines. The research identifies two constructs vital for speech-based technologies, natural language understanding, and feedback, and examines their role in use decisions. This work provides… more
Date: August 2020
Creator: Mamun, Md Rasel Al
Partner: UNT Libraries

Does Quality Management Practice Influence Performance in the Healthcare Industry?

Description: This research examines the relationship between quality management (QM) practices and performance in the healthcare industry via the conduct of three studies. The results of this research contribute both to advancing QM theory as well as in developing a unique text mining method that is illustrated by examining QM in the healthcare industry. Essay 1 explains the relationship between operational performance and QM practices in the healthcare industry. This study analyzed the findings from the li… more
Date: August 2020
Creator: Xie, Heng
Partner: UNT Libraries
open access

A Study of the Intent to Fully Utilize Electronic Personal Health Records in the Context of Privacy and Trust

Description: Government initiatives called for electronic health records for each individual healthcare consumer by 2014. the purpose of the initiatives is to provide for the common exchange of clinical information between healthcare consumers, healthcare providers, third-party payers and public healthcare officials.This exchange of healthcare information will impact the healthcare industry and enable more effective and efficient application of healthcare so that there may be a decrease in medical errors, i… more
Date: May 2012
Creator: Richards, Rhonda J.
Partner: UNT Libraries
open access

Comparing Latent Dirichlet Allocation and Latent Semantic Analysis as Classifiers

Description: In the Information Age, a proliferation of unstructured text electronic documents exists. Processing these documents by humans is a daunting task as humans have limited cognitive abilities for processing large volumes of documents that can often be extremely lengthy. To address this problem, text data computer algorithms are being developed. Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are two text data computer algorithms that have received much attention individually… more
Date: December 2011
Creator: Anaya, Leticia H.
Partner: UNT Libraries

Three Essays on Artificial Intelligence Adoption and Use

Description: Artificial intelligence (AI) is quickly transforming business operations and society, as AI capabilities are incorporated into applications ranging from mobile personal assistants to self-driving cars. The potentially disruptive nature of AI calls for an extensive investigation into all aspects of AI-human interactions at individual, group, organizational and market levels. However, there is paucity of academic information systems (IS) research in this area that goes beyond the development and … more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2019
Creator: Nguyen, Quynh
Partner: UNT Libraries

Relationship Quality in Social Commerce Decision-Making

Description: This research study involves three essays and examines CRQ-driven decision making from the points of view of the common firm, social-commerce platform provider, and social-commerce echo-system. It addresses CRQ's progression from traditional business-to-consumer (B2C) initiatives to social platform-specific antecedents and to environment-driven factors lying outside the direct control of the platform provider, yet influencing social commerce business decisions, such as user-generated content fr… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2019
Creator: Dinulescu, Catalin C
Partner: UNT Libraries
Back to Top of Screen