Language

Documenting Institutional Knowledge Through TRAC Self-Audit: A Case Study

Book chapter on the Trusted Repository Audit and Checklist (TRAC) process through the lens of contextual dimensions within knowledge management, using the case study of the University of North Texas Libraries.
Date: October 26, 2017
Creator: Krahmer, Ana; Andrews, Pamela; Tarver, Hannah; Phillips, Mark Edward & Alemneh, Daniel Gelaw
Object Type: Book Chapter
System: The UNT Digital Library

The Case for Research Collaboration and Alignment: Social Informatics and Knowledge Sciences

This presentation considers how knowledge science theories and methods might apply to the original and current Social Informatics challenges.
Date: November 10, 2018
Creator: Bedford, Denise A. D.; Garcia-Perez, Alexeis & Sallos, Mark
Object Type: Presentation
System: The UNT Digital Library

Jealousy in Cooperation – A Comparison of Two Game Based Approaches

This presentation investigates update procedures based on deterministic dynamics for populations arranged in a lattice.
Date: November 10, 2018
Creator: Barachini, Franz & Bornemann, Manfred
Object Type: Presentation
System: The UNT Digital Library

Open Science and Open Data for Sustainable Development: A Global View

Presentation for the "Open Science and Open Data for Sustainable Development: A Global View" panel that discusses the global landscape of open science.
Date: November 9, 2018
Creator: Alemneh, Daniel Gelaw; Hawamdeh, Suliman M.; Rorissa, Abebe; Assefa, Shimelis & Helge, Kris
Object Type: Presentation
System: The UNT Digital Library

Arts and Humanities Academics Information Needs in Digital Era

This presentation examines arts and humanities academics' scholarly information needs and their means of accessing scholarly e-content in today digital environment.
Date: November 9, 2018
Creator: Arshad, Alia & Ameen, Kanwal
Object Type: Presentation
System: The UNT Digital Library
Exploring Knowledge Creation from Project Management Processes using an Analytics Approach: A First Look (open access)

Exploring Knowledge Creation from Project Management Processes using an Analytics Approach: A First Look

Organizations struggle to harness tacit knowledge – the knowledge that resides in the heads of knowledge workers, whereas there are always opportunities to capture knowledge during project management activities. Using a literature review, this paper analyzes how knowledge can be captured during different project management phases. It attempts to bridge frequently ignored areas of project management, knowledge management, and analytics.
Date: December 2020
Creator: Atolagbe-Olaoye, Abidemi
Object Type: Paper
System: The UNT Digital Library
The Impact of Cyber Addiction on Information Overload and Workplace Performance (open access)

The Impact of Cyber Addiction on Information Overload and Workplace Performance

Cyber addiction refers to the excessive use of internet and cyber application leading to adverse outcomes such as stress, distractions, reduced motivation levels, and challenges in task orientation. Uncontrolled consumption of the internet leads to information overload that impact productivity and workplace performance (Griffiths, 2010). In such cases, the ubiquitous availability of information can lead to IT-related stress where users derive a reduced sense of satisfaction (Diomidous et al. 2016). People who frequently access the internet can experience various issues, which encompass anxiety, depression, and self-image challenges. Physically, affected individuals experience disrupted sleep patterns, irritability and high levels of fatigue. Social networking sites increase the risk of addiction and online dependency, aspects associated with low levels of productivity (Hoq, 2014). As illustrated in fig 1, the paper hypothesizes that there is a direct relationship between information overload and workplace performance and job satisfaction. The assumption is that cyber addiction worsens the problem of information overload, which in return, impacts information behavior and use and workplace/job performance (Riaz & Qureshi, 2019). The study addresses the following research questions: What is the impact of cyber addiction on workplace performance? What are the relationships between cyber addiction, information workload and information behavior and …
Date: December 2020
Creator: Alboulayan, Moneerah & Hawamdeh, Suliman M.
Object Type: Paper
System: The UNT Digital Library
Information Representation and Knowledge Organization in Cultural Heritage Organizations in Arab Gulf Counties: A case study of Alqabas Archive (open access)

Information Representation and Knowledge Organization in Cultural Heritage Organizations in Arab Gulf Counties: A case study of Alqabas Archive

The goal of this study is to explore how information is currently organized in digital cultural heritage collections in Arabian Gulf countries. it focused on Alqabas – a Kuwaiti institution with a strong reputation of early adopter of digital archiving and developer of major digital collections in Arab Gulf counties, accumulated experience in knowledge management. The mixed-methods study combined semi-structured interview of the Alqabas archive manager and in-depth content analysis of a sample of metadata records that represent items in Alqabas digital collections for accuracy, completeness, consistency, use of knowledge organization systems. The study reveals high metadata quality overall but lack of consistency for many metadata fields, explained in part by the absence of metadata creation guidelines and professional training for metadata creators. This indicates potential barriers to metadata interoperability in an aggregated environment for future projects similar to DPLA or Europeana.
Date: December 2020
Creator: Aljalahmah, Saleh & Zavalina, Oksana
Object Type: Paper
System: The UNT Digital Library
Knowledge Management in Cybersecurity Education Using Concept Maps (open access)

Knowledge Management in Cybersecurity Education Using Concept Maps

The purpose of this research is to explore concept maps as a viable and effective knowledge management tool for cybersecurity education. Concept maps serve as a visual representation of knowledge. They are commonly utilized to support the teaching and learning process or as a student learning evaluation tool. While the focus of education research is on tools specific to cybersecurity such as learning management systems and cyber ranges, there is little dedicated to understanding how concept maps can be applied as an effective element within the security education. This paper reviews relevant research related to the applications of concept maps in diverse knowledge domains. The aim is to leverage previous research applications to garner support for concept maps as a useful knowledge management tool in cybersecurity. This is accomplished by highlighting successful applications of concept maps in related fields. Concept maps are poised to be extremely helpful with complex subjects such as information and cyber security where understanding the subject depends on the application of disparate but interrelated concepts.
Date: December 2020
Creator: Bernot, Jordan E. F. & Chang, Hsia-Ching
Object Type: Paper
System: The UNT Digital Library
Leveraging Geographical Disparities of Socio-Economic Factors to Predict Vulnerable Teenagers to Teen Birth: Chicago as A Case Study (open access)

Leveraging Geographical Disparities of Socio-Economic Factors to Predict Vulnerable Teenagers to Teen Birth: Chicago as A Case Study

Teen birth (TB) imposes serious health and economic burdens to both individuals and government. Various attempts have been made to overcome TB such as teen pregnancy prevention evidence-based programs. However, these programs might have declined teen birth rate (TBR), most of which do not address the influencing socio-economic factors linked to areas where teenagers live. This study is aimed at investigating socio-economic factors contributing to TB and identify their geographical disparities. The methodology was developed using the vulnerability theory to examine the complex relationship between TB and socio-economic factors. Principal Component Analysis (PCA) and Geographically Weighted Regression (GWR) were employed to analyze census data. Findings suggest that socio-economically disadvantaged minorities, including unemployed black and uneducated Hispanic, are more vulnerable to TB. Additionally, geographic locations of communities where such teenager live are recognized. The outcomes verified the utility of the vulnerability theory to predict the geographical locations of vulnerable teens that can be leveraged by policymakers to allocate more health resources and perform place-specific interventions to effectively reduce TBR.
Date: December 2020
Creator: Sadeghinaeenifard, Fariba & Hawamdeh, Suliman M.
Object Type: Paper
System: The UNT Digital Library
Agile Practices in Data Science and Data Analytics Projects: A Research Agenda (open access)

Agile Practices in Data Science and Data Analytics Projects: A Research Agenda

The digital age comes with transformational activities (also referred to as digital transformation) triggered by emerging fields and technologies, such as data science and analytics, cybersecurity, cloud computing, blockchain, cryptocurrency, and nanotechnology; helping organizations stay current and competitive. This paper focuses on agile frameworks that support the delivery of data science/analytics projects to ensure organizations rapidly deliver analytics products and services to their customers.
Date: December 2020
Creator: Atolagbe-Olaoye, Abidemi
Object Type: Paper
System: The UNT Digital Library
COVID19: Mask Misinformation and Social Noise (open access)

COVID19: Mask Misinformation and Social Noise

Disinformation and misinformation are pervasive in unregulated social-media environments, which are used habitually for obtaining news. Fenn et al in 2019 stated that “Given that people tend to share interesting information to maintain social relationships or to manage their impressions, information that receives more likes may subsequently be shared more often” (Fenn, Ramsay, Kantner, Pezdek, & Abed, 2019, p.133) Recent studies also revealed that misinformation from politicians and celebrities has increased in recent years which lead to more engagement on Twitter (Brennen, et al. 2020 ). There has been a lot of misinformation pertaining to COVID-19 masks on Twitter. Due to the misinformation, many people might not believe in the effectiveness of masks. Even though studies have shown the effectiveness of wearing masks in different countries (Lyu and Wehby, 2020). Not wearing masks affects people's health and indirectly increases the spread of COVID-19. Studies of social noise and misinformation cases on social media are needed, specifically focusing on how social noise influences and contributes to the spread of misleading and possibly harmful messages.
Date: December 2020
Creator: Alsaid, Manar; Madali, Nayana Pampapura; Zimmerman, Tara & Hawamdeh, Suliman M.
Object Type: Paper
System: The UNT Digital Library
Development of Micro and Pilot Projects, Evaluation of Technologies, and Developing Data/Information Infrastructure (open access)

Development of Micro and Pilot Projects, Evaluation of Technologies, and Developing Data/Information Infrastructure

Successful organizations are continuously looking for better ways to improve efficiency. Knowledge management (KM) in institutions is essentially based on an understanding of knowledge creation and knowledge transfer. At Tarrant County College, we are currently developing a District-wide knowledge management (KM) program. This KM process is implemented via micro pilot projects and processes; and an analysis of current technology, structure, and culture. We carefully try to anticipate challenges we will encounter as the project is executed (geographical distance during a pandemic, cultural barriers, dealing with tacit knowledge…). Next, we carefully begin to create a road map for the KM process including: Establishing objectives, preparing culture change, creating a high-level process, identifying KM/communication/knowledge dissemination gaps, selecting appropriate technology, and deciphering the current status of KM throughout the District. Then, we attempt to implement our KM process via micro pilot projects. We will soon develop methods for evaluating our KM workflow. Our initial results suggest Laserfiche might be able to host 70% of or data and information, however other tools such as ITSM, Microsoft TEAMS, Team Dynamics… will also be needed to host data and information.
Date: December 2020
Creator: Helge, Kris & Alemneh, Daniel Gelaw
Object Type: Paper
System: The UNT Digital Library
An Ontology Approach to Tourism Destinations in  Ethiopia (open access)

An Ontology Approach to Tourism Destinations in Ethiopia

Knowledge is awareness or familiarity gained by experiences of facts, data, and situations. Knowledge management includes techniques and processes to represent, store, search, integrate, and analyze knowledge that is available in digital form. Ontology is a formal explicit specification of a shared conceptualization of a domain of interest and it is a building block of the semantic web and formal description of knowledge. Ontologies capture the structure and knowledge about some domain of interest by describing the concepts in the domain and also the relationships that hold between those concepts. Even though Ethiopia has potential tourist destinations, the country is not benefited from its resources due to misperception about image of the country; lack of promoting the potential tourism resources of the country to the world; problems with sharing, searching and retrieval of tourist information. Thus, the country is forced to accept smaller number of tourists and not getting the benefits it deserves. The objective of this paper is to build ontology for Ethiopian Tourism so that it makes Ethiopian tourism destinations visible to international visitors. We use OWL language implemented in Protégé with other ontology development activities proposed in METHONTOLOGY to build Ethiopian tourism ontology. We also use OWL …
Date: December 2020
Creator: Hussen, Tijani; Beyene, Melkamu & Alemneh, Daniel Gelaw
Object Type: Paper
System: The UNT Digital Library
Speaker Independent, Continuous Speech Recognizer for  Kafi Noonoo, Afro-Asiatic Language in Ethiopia (open access)

Speaker Independent, Continuous Speech Recognizer for Kafi Noonoo, Afro-Asiatic Language in Ethiopia

This paper will report on a research to develop Speaker Independent, Continuous Speech Recognizer for Kafi Noonoo (Afro-Asiatic language that belongs to North Omotic sub family in Ethiopia) using Hidden Markov Modeling technique. The portable and open source toolkit called Hidden Markov Model (HMM) Toolkit is used to perform the experiment. The development of HMM based Automatic Speech Recognition (ASR) requires both text and speech corpus for training and testing the HMM. In order to have a model that incorporates different features of the language, we included the different dialects of Kafi Noonoo in the corpus and then prepared the training and test corpus from the scratch, and after preprocessing we have sampled and performed feature extraction using Mel Frequency Cepstral Coefficients (MFCC) feature extraction technique.
Date: December 2020
Creator: Asfaw, Zelalem & Alemneh, Daniel Gelaw
Object Type: Paper
System: The UNT Digital Library
Using Operative Data Governance Roadmaps for Business Process Management Success: The Role of Leadership and the Impact of Information Technology Adoption (open access)

Using Operative Data Governance Roadmaps for Business Process Management Success: The Role of Leadership and the Impact of Information Technology Adoption

The unquestionable demand for data generation and consumption in organizations in this century prompt an increasingly notion of data as a valuable asset, provoking the urgency for reliable analysis and reporting of complex data assets towards a critical business decision making process. Computing languages like SQL, Sequential Query Language, Data Mining and Warehouse, and data visualization tools are some examples of how information technology is being applied to the problem solving strategy related to data governance and management. The objective of this article is to provide an overall framework for effective data governance, through the examination of the hierarchy data-wisdom, that can be applied to business processes improvement and business intelligence approaches. Its purpose is to present roadmaps that will lead to superior management decisions impacting the pipeline and the relationship between leaders, staffs, stakeholders, and the corporate governance in terms of data processing and consumption. This literature review work presents the argument that effective use of information technologies, the consolidation of a learning culture, and the fostering of a technological framework that is insightful and enabler of a responsible and steward data management process have decisive impact in the business processes operations and strategies in which leadership plays a …
Date: December 2020
Creator: Merlo, Tereza Raquel & Makani, Joyline
Object Type: Paper
System: The UNT Digital Library
Wisdom and Veterans: Enhance the Perspective, Experience, and Resilience of the Workforce (open access)

Wisdom and Veterans: Enhance the Perspective, Experience, and Resilience of the Workforce

Wisdom is defined as “a uniquely human quality demonstrated through an ability to apply self-insight, experience, and sound judgment in conjunction with applicable data, information, and knowledge to create a course of action leading to beneficial and productive decisions for both individuals and society” (Allen et al., 2020, p. 159). Using this definition as a foundation, this research explores how veterans use wisdom to enhance the workforce through perspective, experience, and resilience.
Date: December 2020
Creator: Allen, Jeff M., 1968-; Eaves, Tresia D.; Zimmerman, Tara; Rosellini, Amy; Njeri, Millicent & Khader, Malak
Object Type: Paper
System: The UNT Digital Library
Security and Privacy Issues with Smart Thermostats – A First Look (open access)

Security and Privacy Issues with Smart Thermostats – A First Look

Presentation paper for the 2017 International Conference on Knowledge Management. This paper uses the Brenda Dervin sense making model to explain human behavior and way of reasoning with making purchasing decisions of smart thermostats.
Date: October 26, 2017
Creator: Awojobi, Abiodun & Chang, Hsia-Ching
Object Type: Paper
System: The UNT Digital Library
Towards a Dimensional Model for Community Knowledge (open access)

Towards a Dimensional Model for Community Knowledge

Poster paper for the 2017 International Conference on Knowledge Management. This paper proposes a dimensional model with "aspects of a corpus, such as topic or opinion, as derived star schema dimensions." Focusing on a case study on Twitter the paper demonstrates how the derived dimensions, combined with transactional facts and derived facts can uncover "the collective tacit knowledge in Twitter communities."
Date: October 25, 2017
Creator: Shakeri, Shadi & Evangelopoulos, Nicholas
Object Type: Paper
System: The UNT Digital Library

The Use of Twitter as a Tool to Predict Opinion Leaders that Influence Public Opinion: Case study of the 2016 United States Presidential Elections

Presentation for the 2017 International Conference on Knowledge Management. This presentation discusses the use of Twitter as a tool to predict the opinion leaders that influence the general users in relation to the 2016 U.S. Presidential Election.
Date: October 25, 2017
Creator: Alfarhoud, Yousef
Object Type: Presentation
System: The UNT Digital Library

Visualizing the Healthcare Tweet-trails: An Information Theoretical Approach

Presentation for the 2017 International Conference on Knowledge Management. This presentation describes a study comparing the use of paired medical hashtags on Twitter and the statistical structure of the components in the hashtag trails.
Date: October 25, 2017
Creator: Zhang, Yuan & Chang, Hsia-Ching
Object Type: Presentation
System: The UNT Digital Library

From User Reviews to Theory Building: An Inductive Approach to Construct Identification Using Text Mining

Presented at the 2017 International Conference on Knowledge Management. This poster demonstrates the utility of text analytic for theory building and validation in information science.
Date: October 25, 2017
Creator: Nguyen, Quynh N. & Sidorova, Anna
Object Type: Poster
System: The UNT Digital Library
From user reviews to theory building: an inductive approach to construct identification using text mining (open access)

From user reviews to theory building: an inductive approach to construct identification using text mining

Poster paper for the 2017 International Conference on Knowledge Management. This paper demonstrates the utility of text analytic for theory building and validation in information science.
Date: October 25, 2017
Creator: Nguyen, Quynh & Sidorova, Anna
Object Type: Paper
System: The UNT Digital Library

Hidden Microphones, Open Collections: The Classification of Unofficial Concert Recordings

Presented at the 2017 International Conference on Knowledge Management. This presentation discusses unofficial music records, and how they have been classified and archived.
Date: October 26, 2017
Creator: Berg, Jeremy
Object Type: Presentation
System: The UNT Digital Library