Reading selection as information seeking behavior: A case study with adolescent girls. (open access)

Reading selection as information seeking behavior: A case study with adolescent girls.

The aim of this research, Reading Selection as Information Seeking Behavior: A Case Study with Adolescent Girls, was to explore how the experience of reading fiction affects adolescent girls aged 13 through 15, and how that experience changes based upon four activities: journaling, blogging, a personal interview, and a focus group session. Each participant reflects upon works of her own choosing that she had recently read. The data is evaluated using content analysis with the goal of developing a relational analysis tool to be used and tested with future research projects. The goal of this research is to use the insights of the field of bibliotherapy together with the insights of the adolescent girls to provide a higher, more robust model of successful information behavior. That is, relevance is a matter of impact on life rather than just a match of subject heading. This work provides a thick description of a set of real world relevancy judgments. This may serve to illuminate theories and practices for bringing each individual seeker together with appropriate documents. This research offers a new model for relevant information seeking behavior associated with selecting works of essential instructional fiction, as well as a new definition for …
Date: August 2007
Creator: Reynolds, Stephanie D.
System: The UNT Digital Library
Take the Trouble to Compile a Whole New World: The Role of Event-Based Participatory Projects in Institutional Archives (open access)

Take the Trouble to Compile a Whole New World: The Role of Event-Based Participatory Projects in Institutional Archives

Event-based mediated participatory archives, in which communities of ordinary people contribute their records to archives during collection day events represent a paradigm shift within the archival field. Applying a qualitative approach, this study investigates event-based mediated participatory archives using Bastian's communities of records and memory as a guiding framework. Using the Mass. Memories Road Show as a case study, data collection and analysis took place over three phases. In Phase I, archive supporting documents were collected and analyzed using "against the grain" historical analysis methods. In Phase II, data from the Mass. Memories Road Show digital collections were collected and analyzed using grounded theory analysis methods. In Phase III, ethnographic research data, including a direct observation and semi-structured interviews, was collected and analyzed using ethnographic analysis methods. The results of this study suggest that community participants' motivations to contribute to participatory archives are rooted in self-fulfillment while institutional archives personnel members' intentions are based in inclusive community-building. Furthermore, the contribution of records to the archives allows community participants to share personal stories that serve as evidence of their historical legacies and as affirmation of their roles in their communities. Throughout the findings, moments of connection which enable the sharing of …
Date: December 2021
Creator: Roeschley, Ana Knezevic
System: The UNT Digital Library
Sanctioned and Controlled Message Propagation in a Restrictive Information Environment: The Small World of Clandestine Radio Broadcasting (open access)

Sanctioned and Controlled Message Propagation in a Restrictive Information Environment: The Small World of Clandestine Radio Broadcasting

This dissertation seeks to identify the elements that inform the model for competing message propagation systems in a restrictive environment. It pays attention to message propagation by sanctioned and clandestine radio stations in pre- and post-independent Zimbabwe. This dissertation uses two models of message propagation in a limiting information environment: Sturges' information model of national liberation struggle and Chatman's small world information model. All the message propagation elements in the Sturges and Chatman's models are present in the broadcast texts analyzed. However, the findings of this dissertation indicate that communication in a restrictive information environment is designed such that its participants make sense of their situation, and come up with ways to solve the challenges of their small world. Also, a restrictive information environment is situational, and message propagators operating in it are subject to tactical changes at different times, accordingly altering their cognitive maps. The two models fail to address these concerns. This dissertation focused on message propagation in Zimbabwe because there is military belligerence involved in the information warfare. It therefore provides an extreme situation, which can help our understanding of more everyday instances of communication and interference of communication. Findings of this dissertation recommend the need to …
Date: December 2007
Creator: Wachanga, David Ndirangu
System: The UNT Digital Library
A Conceptual Map for Understanding the Terrorist Recruitment Process: Observation and Analysis of Turkish Hezbollah Terrorist Organizations. (open access)

A Conceptual Map for Understanding the Terrorist Recruitment Process: Observation and Analysis of Turkish Hezbollah Terrorist Organizations.

Terrorism is a historical problem; however, it becomes one of the biggest problems in 21st century. September 11 and the following Madrid, Istanbul and London attacks showed that it is the most significant problem threatening world peace and security. Governments have started to deal with terrorism by improving security measurements and making new investments to stop terrorism. Most of the governments' and scholars' focus is on immediate threats and causes of terrorism, instead of looking at long-term solutions such as root causes and underlying reasons of terrorism, and the recruitment style of terrorist organizations If terrorist recruitment does not stop, then it is safe to say terrorist activities cannot be stopped. This study focused on the recruitment process by observing two different terrorist organizations, DHKP/C and Turkish Hezbollah. The researcher brings 13 years of field experience and first-person data gathered from inside the terrorist organizations. The research questions of this study were: (i) How can an individual be prevented from joining or carrying out terrorist activities?; (ii) What factors are correlated with joining a terrorist organization?; (iii) What are the recruitment processes of the DHKP/C, PKK, and Turkish Hezbollah?; (iv) Is there any common process of being a member of …
Date: August 2007
Creator: Teymur, Samih
System: The UNT Digital Library
A Complex Systems Model for Understanding the Causes of Corruption: Case Study - Turkey (open access)

A Complex Systems Model for Understanding the Causes of Corruption: Case Study - Turkey

It is attempted with this dissertation to draw an explanatory interdisciplinary framework to clarify the causes of systemic corruption. Following an intense review of political sciences, economics, and sociology literatures on the issue, a complex systems theoretical model is constructed. A political system consists of five main components: Society, interest aggregators, legislative, executive and private sector, and the human actors in these domains. It is hypothesized that when the legitimacy level of the system is low and morality of the systemic actors is flawed, selected political, social and economic incentives and opportunities that may exist within the structure of the systemic components might -individually or as a group- trigger corrupt transactions between the actors of the system. If left untouched, corruption might spread through the system by repetition and social learning eventually becoming the source of corruption itself. By eroding the already weak legitimacy and morality, it may increase the risk of corruption even further. This theoretical explanation is used to study causes of systemic corruption in the Turkish political system. Under the guidance of the complex systems theory, initial systemic conditions, -legacy of the predecessor of Turkey Ottoman Empire-, is evaluated first, and then political, social and economic factors …
Date: August 2005
Creator: Yasar, Muhammet Murat
System: The UNT Digital Library
Development of an Instrument to Measure the Level of Acceptability and Tolerability of  Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users (open access)

Development of an Instrument to Measure the Level of Acceptability and Tolerability of Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users

Cyber aggression came about as a result of advances in information communication technology and the aggressive usage of the technology in real life. Cyber aggression can take on many forms and facets. However, the main focus of this study is cyberbullying and cyberstalking through information sharing practices that might constitute digital aggressive acts. Human aggression has been extensively investigated. Studies focusing on understanding the causes and effects that can lead to physical and digital aggression have shown the prevalence of cyber aggression in different settings. Moreover, these studies have shown strong relationship between cyber aggression and the physiological and physical trauma on both perpetrators and their victims. Nevertheless, the literature shows a lack of studies that could measure the level of acceptance and tolerance of these dangerous digital acts. This study is divided into two main stages; Stage one is a qualitative pilot study carried out to explore the concept of cyber aggression and its existence in Saudi Arabia. In-depth interviews were conducted with 14 Saudi social media users to collect understanding and meanings of cyber aggression. The researcher followed the Colaizzi’s methods to analyze the descriptive data. A proposed model was generated to describe cyber aggression in social media …
Date: May 2016
Creator: Albar, Ali Aldroos
System: The UNT Digital Library