Saudi Cultural Missions Theses & Dissertations
Permanent URI for this communityhttps://drepo.sdl.edu.sa/handle/20.500.14154/10
Browse
2 results
Search Results
Item Restricted Does Information Technology Investment Impact a Firm Financial Performance? The Value of Appropriation Pathway(University of Colorado Denver, 2024) Alharbi, Abdulaziz; Gregg, DawnThe IT productivity paradox has long been a topic of considerable interest to information systems scholars. This is because, despite decades of research, the nature of the value appropriation pathway of IT investments remains elusive. In this dissertation, we seek to clarify the nature of the relationship between IT investments and firm performance using two distinct but related analytical approaches. In our first study, we draw upon the contingency model of the resource-based view of the firm to suggest that the nature of the relationship between IT investments and the firm’s financial performance depends upon the co-investment in complementary and non-complementary resources. We identified digital vulnerability as one of the key drawbacks of IT investments. Therefore, we predict that resources such as IT security, which lessen the digital vulnerability that businesses experience as a result of their technological investment, share a complementary relationship with IT investments and, as a result, positively moderate the relationship between IT investments and a firm’s financial performance. Alternatively, resources such as cloud computing, which increase the digital vulnerability that businesses experience as a result of their technological investment, share a non-complementary relationship with IT investments and, as a result, negatively moderate the relationship between IT investments and a firm’s financial performance. Overall, we observe that the performance implications of IT investments are significantly contingent upon the presence or absence of complementary and non-complementary resources. In the second paper, we focus on evaluating the performance implications of cloud computing, a type of IT investment that has been the subject of considerable scholarly and practical attention. Drawing upon the theory of dynamic capabilities, we theorize that because cloud computing is not owned or managed by the firms who subscribe to its services, it can best be categorized as an organizational capability instead of a tangible resource. According to dynamic capabilities, capabilities influence performance by increasing the efficiency of a firm’s resource management activities. Therefore, we predict that the relationship between cloud computing and a firm’s financial performance does not occur directly. Instead, it is fully mediated by increases in a firm’s resource management activities. To further establish the performance pathway of cloud computing, we identify three important contingency factors of the relationship between cloud computing and a firm’s financial performance, cloud computing service models, vertical integration, and firm size. Overall, we find that improvements in a company's resource management efficiency are what drive the performance implications of cloud computing and that the nature of the indirect relationship between cloud computing and a firm’s financial performance depends on important organizational and technological contingency factors. We observe broad support for each of our predictions across each study. Overall, our findings help to reconcile the IT productivity paradox by identifying under what circumstances (study 1) and through what pathway (study 2) IT investments impact a firm’s financial performance5 0Item Restricted Coding Theory(Saudi Digital Library, 2023-11-09) Alharbi, Abdulaziz; Hirschfeld, JamesCoding theory is a fascinating area that has its roots in the early 20th century when telegraph communication was prevalent. Back then, Morse code was the primary mode of transmit- ting messages, but it was prone to errors due to noise and other factors. To address this problem, mathematicians formulated error-correcting codes that were created to detect and rectify errors in telegraph message transmissions. These codes were developed based on con- cepts derived from pure mathematics and highlighted the potency of algebraic principles, for more details see [2] and [3]. A redundancy code, called also an error-correcting code, is a systematic method of representing data in a manner that allows for the detection and rectifi- cation of errors. By adding extra bits to introduce redundancy, the code enhances the data’s resilience. In case some bits experience corruption during transmission, the original data can still be reconstructed or recovered. This approach safeguards the integrity and reliabil- ity of the transmitted information, preventing and ensuring the accuracy of the received data. The main objective of this theory is to achieve efficient and dependable communica- tion, even in challenging environments. Efficiency entails minimizing the time and effort required for information transfer. On the other hand, reliability demands that the received data closely resembles the transmitted data. Coding theory aims to actualize these limits by constructing models primarily using algebraic techniques. This approach allows to bridge the gap between theoretical bounds and practical implementation. There are many types of error-correcting codes, but some of the most commonly used ones are the Hamming code, the Reed-Solomon code, and the convolutional code. These codes differ in their design and performance characteristics, and the choice of code depends on the specific application and the trade-offs between factors such as error rate, data rate, and complexity, see [4] and [1]. The Hamming code is a simple, single-error-correcting code that adds parity bits to the data to detect and correct one-bit errors. The Reed-Solomon code is a more powerful code that can correct multiple errors and has been used in many applications, including CDs and DVDs. Convolutional codes are a type of error-correcting code that is often used in wireless communication networks. In modern times, coding theory emphasizes the development and analysis of error- correcting codes, which play a vital role in ensuring the accurate and reliable transmission 1 of information over noisy communication channels. However, communication channels are often characterized by noise and susceptibility to errors, underscoring the importance of re- liable information transmission. Error-correcting codes are used in various applications such as deep space communication and the design of registration numbers, (see [5] and [1] for more information). The development of this theory has led to the creation of related areas such as cryp- tography, network coding, and compressed sensing. In particular, error-correcting codes are crucial to modern communication systems. This thesis explores the fundamental principles of coding theory and their practical applications to real-world communication systems. The focus will be on designing and analyzing error-correcting codes, including linear codes, cyclic codes, and Hamming codes. By understanding these codes, we can improve the efficiency and reliability of communication systems, which is essential in our interconnected world. For instance, in order to ensure the fast and reliable transmission of binary data (a stream of 0s and 1s ) over a noisy communication channel, it is essential to address the issue of errors that may occur. This process is similar to encrypting the data, and the same concept can also be applied to information storage systems, where the storage medium is treated as a channel. Figure 1.1 depicts a general digital communication system, (see [5] for more details). Message Codeword Received vector Decoded message Message source Encoder Channel Noise Figure 1.1: General digital communication system. Example 1.1. Suppose we examine a scenario in which we aim to transmit only two mes- sages, ’YES’ and ’NO’, using the following encoding: YES=1, NO=0. If an an error occurs, such as transmitting a 1 and receiving a 0, it can go unnoticed or undetected. So, here is some redundancy: YES=11, NO=00. If message 11 is transmitted and message 01 is received instead, an error is detected but left uncorrected. To address this issue, the introduction of additional redundancy can be employed: YES = 1111, NO = 0000. If the received message is 0100 and assuming that only one error occurred during transmis- sion, we can infer that the original message sent was 0000, corresponding to ’NO’.14 0