293 Matching Results

Results open in a new window/tab.

Smoothing the information seeking path: Removing representational obstacles in the middle-school digital library. (open access)

Smoothing the information seeking path: Removing representational obstacles in the middle-school digital library.

Middle school student's interaction within a digital library is explored. Issues of interface features used, obstacles encountered, search strategies and search techniques used, and representation obstacles are examined. A mechanism for evaluating user's descriptors is tested and effects of augmenting the system's resource descriptions with these descriptors on retrieval is explored. Transaction log data analysis (TLA) was used, with external corroborating achievement data provided by teachers. Analysis was conducted using quantitative and qualitative methods. Coding schemes for the failure analysis, search strategies and techniques analysis, as well as extent of match analysis between terms in student's questions and their search terms, and extent of match analysis between search terms and controlled vocabulary were developed. There are five chapters with twelve supporting appendixes. Chapter One presents an introduction to the problem and reviews the pilot study. Chapter Two presents the literature review and theoretical basis for the study. Chapter Three describes the research questions, hypotheses and methods. Chapter Four presents findings. Chapter Five presents a summary of the findings and their support of the hypotheses. Unanticipated findings, limitations, speculations, and areas of further research are indicated. Findings indicate that middle school users interact with the system in various sequences of patterns. …
Date: May 2002
Creator: Abbas, June M.
System: The UNT Digital Library
The Impact of Computer Instruction on the Near Transfer and Far Transfer of a General Problem Solving Strategy (open access)

The Impact of Computer Instruction on the Near Transfer and Far Transfer of a General Problem Solving Strategy

The purpose of this study was to examine the impact of computer instruction on the near transfer and far transfer of a means-end analysis problem solving strategy.
Date: August 1992
Creator: Abbey, Beverly G. (Beverly Gene)
System: The UNT Digital Library
Haves, Halves, and Have-Nots: School Libraries and Student Achievement in California (open access)

Haves, Halves, and Have-Nots: School Libraries and Student Achievement in California

This descriptive, non-experimental study examines the strength of the relationship between California school library media programs and student achievement, using data from California criterion-referenced state-wide tests, publically available school and community demographic data, and a state survey of school library programs. Results indicate a substantial discrepancy in library staffing levels from the elementary grades through the high schools. Nevertheless, statistically significant correlations were found between certificated staffing levels and student achievement at each grade. Significant correlations persisted at the elementary and middle school when controlling for five of six school and community variables, and at the high school when controlling for all six of those variables. Bivariate correlations between total staffing and student achievement were significant at both the middle school and high school level when controlling for all school and community variables. Generally, the strength of the correlations between both certificated and total staffing tended to increase with grade level; at the high school level, correlations were among the strongest reported in any statewide study to date. There was a significant positive relationship between a majority of the 21 library services regularly provided and student achievement at all levels. Total library services were significantly related to student achievement at …
Date: December 2008
Creator: Achterman, Douglas L.
System: The UNT Digital Library
Makeshift Information Constructions: Information Flow and Undercover Police (open access)

Makeshift Information Constructions: Information Flow and Undercover Police

This dissertation presents the social virtual interface (SVI) model, which was born out of a need to develop a viable model of the complex interactions, information flow and information seeking behaviors among undercover officers. The SVI model was created from a combination of various philosophies and models in the literature of information seeking, communication and philosophy. The questions this research paper answers are as follows: 1. Can we make use of models and concepts familiar to or drawn from Information Science to construct a model of undercover police work that effectively represents the large number of entities and relationships? and 2. Will undercover police officers recognize this model as realistic? This study used a descriptive qualitative research method to examine the research questions. An online survey and hard copy survey were distributed to police officers who had worked in an undercover capacity. In addition groups of officers were interviewed about their opinion of the SVI model. The data gathered was analyzed and the model was validated by the results of the survey and interviews.
Date: August 2005
Creator: Aksakal, Baris
System: The UNT Digital Library

Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust

Access: Use of this item is restricted to the UNT Community
This research contributes to the cloud computing (CC) literature and information science research by addressing the reality of information sharing and storage behavior (ISSB) of the users' personal information via CC. Gathering information about usage also allows this research to address the paradox between the research and practice. Additionally, this research explores the concept of trust and its role in the behavioral change relative to CC. The findings help reconcile the paradox between the two realms. Essay1 develops and tests cloud computing usage model (CCUM) that assesses ISSB. This model considers the main adoption determinants and the main drawbacks of CC. The study measures the main concerns of users found in the literature, perceived security and perceived privacy. The findings prove surprising on these concerns. Using multiple regression to analyze 129 valid survey responses, the results find that CC users are less concerned about the major issues of security and privacy and will use the technology based on peer usage. Essay 2 examines why users ignore the technology issues and elect to replace the traditional mechanisms for handling their personal information. The results of an interview-based study conducted on 11 normal users and 11 IT professionals clarify their perceptions about …
Date: May 2019
Creator: Al Smadi, Duha
System: The UNT Digital Library
Costly Ignorance: The Denial of Relevance by Job Seekers: A Case Study in Saudi Arabia (open access)

Costly Ignorance: The Denial of Relevance by Job Seekers: A Case Study in Saudi Arabia

Job centers aid businesses seeking qualified employees and assist job seekers to select and contact employment and training services. Job seekers are also offered the opportunity to assess their skills, abilities, qualifications, and readiness. Furthermore, job centers ensure that job seekers are complying with requirements that they must meet to benefit from job assistance programs such as unemployment insurance. Yet, claimants often procrastinate and/or suspend their job search efforts even though such actions can make them lose their free time and entitlements, and more importantly they may lose the opportunity to take advantage of free information, services, training, and financial assistance for getting a job to which they have already made a claim. The current work looks to Chatman's "small worlds" work, Johnson's comprehensive model of information seeking, and Wilson's "costly ignorance" construct for contributions to understanding such behavior. Identification of a particular trait or set of traits of job seekers during periods of unemployment will inform a new Job Seeking Activities Model (JSAM). This study purposely examines job seeker information behavior and the factors which influence job seekers' behavior, in particular, family tangible support as a social norm effect. A mixed method, using questionnaires for job hunting completers and …
Date: December 2016
Creator: Alahmad, Badr Suleman
System: The UNT Digital Library
Modeling Student Perception of Web 2.0 Technologies Adoption in Kuwait (open access)

Modeling Student Perception of Web 2.0 Technologies Adoption in Kuwait

The primary focus of this dissertation was to explore students' perceptions of adopting Web 2.0 applications at the School of Basic Education (SBE) in Kuwait. Although Web 2.0 applications are becoming more popular among the digital generation, there is still no evidence of students' perceptions of adopting the innovation of Web 2.0 technologies in Kuwait. The problem this study addresses is that the current status of Web 2.0 technologies usage by academic students has remained educationally unknown in Kuwait. Therefore, there was a need to investigate the extent to which academic students in SBE are aware of and their usage of Web 2.0 technologies, as well as the factors and obstacles that affect using these technologies. Rogers' diffusion of innovation theory (DoI) is employed in this study to specify the factors that influence student perceptions of adopting Web 2.0 applications as learning tools. Data used in this dissertation was gathered via a survey instrument from 350 students at the SBE and was statistically analyzed to find out the answers of the research questions. This study identified the low rate of Web 2.0 awareness and adoption by the students. Descriptive statistical analysis, such as mean scores and standard deviation, were used …
Date: May 2011
Creator: Alajmi, Mohammad
System: The UNT Digital Library

The Role of Social Media Influencers in Saudis' Domestic Destination Choice

This study aims to find out the impact of the credibility and content quality of social media influencers on the various stages of the customer's journey and the intention to choose a destination for the Saudi tourist. The target segment was Saudis in general, who are 18 years or above. To conduct this study, 618 usable questionnaires were collected. This study tested twenty-two hypotheses. The result of this study showed that the relationship between content quality, expertise, and similarity was significantly positive with the tourist's desire and information searching. As well, the relationship between the tourist's desire and information searching was significantly positive with the intention of choosing a destination. Conservatism, engagement, and gender were tested as moderators. Conservatism was not significant while the engagement was significant. Gender was only significant in the relationship between content quality and the tourist's desire. This study contributes to information and knowledge in the fields of tourism, hospitality, travel, marketing, tourist behavior, information science, and social media. Researchers and those interested in tourist and customer behavior can benefit from the results of this study. In the industrial field, this study will be very useful to the Saudi government, which has recently begun to rely …
Date: July 2023
Creator: Alamer, Mohammed Abdullah I
System: The UNT Digital Library

Understanding the Diffusion of COVID-19-Related Information on Social Media

Very few studies have examined information sentiment and explored other factors that contribute to health information dissemination and sharing. In particular, there is a lack of studies that performed these combined analyses in the modern social network environment during the disease outbreaks, such as with zika, ebola, SARS, or COVID-19. This study aimed to fill the gap in the literature by investigating what drives social media users to widely disseminate health-related information during a pandemic. Diffusion of innovation theory and theory of planned behavior were the basis of the theoretical approach utilized to answer the research questions. The two theories identified antecedents of sharing online health information. Data was collected through an online survey distributed to students in a higher education institution in the United States of America. The study revealed the extent of the relationships between the four major factors derived from the previous literature—attitudes toward sharing, beliefs toward source, peer influence, and information sentiment—and the behavioral intention to share information. The results would support the information science literature by offering and testing a new model that identifies the factors that affect users' intentions to share health information in the social network environment. This study will further the understanding …
Date: August 2021
Creator: Alasmari, Hanan Mohammed
System: The UNT Digital Library
Conversational Use of Photographic Images on Facebook: Modeling Visual Thinking on Social Media (open access)

Conversational Use of Photographic Images on Facebook: Modeling Visual Thinking on Social Media

Modeling the "thick description" of photographs began at the intersection of personal and institutional descriptions. Comparing institutional descriptions of particular photos that were also used in personal online conversations was the initial phase. Analyzing conversations that started with a photographic image from the collection of the Library of Congress (LC) or the collection of the Manchester Historic Association (MHA) provided insights into how cultural heritage institutions could enrich the description of photographs by using informal descriptions such as those applied by Facebook users. Taking photos of family members, friends, places, and interesting objects is something people do often in their daily lives. Some photographic images are stored, and some are shared with others in gatherings, occasions, and holidays. Face-to-face conversations about remembering some of the details of photographs and the event they record are themselves rarely recorded. Digital cameras make it easy to share personal photos in Web conversations and to duplicate old photos and share them on the Internet. The World Wide Web even makes it simple to insert images from cultural heritage institutions in order to enhance conversations. Images have been used as tokens within conversations along with the sharing of information and background knowledge about them. The …
Date: May 2016
Creator: Albannai, Talal N.
System: The UNT Digital Library
Development of an Instrument to Measure the Level of Acceptability and Tolerability of  Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users (open access)

Development of an Instrument to Measure the Level of Acceptability and Tolerability of Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users

Cyber aggression came about as a result of advances in information communication technology and the aggressive usage of the technology in real life. Cyber aggression can take on many forms and facets. However, the main focus of this study is cyberbullying and cyberstalking through information sharing practices that might constitute digital aggressive acts. Human aggression has been extensively investigated. Studies focusing on understanding the causes and effects that can lead to physical and digital aggression have shown the prevalence of cyber aggression in different settings. Moreover, these studies have shown strong relationship between cyber aggression and the physiological and physical trauma on both perpetrators and their victims. Nevertheless, the literature shows a lack of studies that could measure the level of acceptance and tolerance of these dangerous digital acts. This study is divided into two main stages; Stage one is a qualitative pilot study carried out to explore the concept of cyber aggression and its existence in Saudi Arabia. In-depth interviews were conducted with 14 Saudi social media users to collect understanding and meanings of cyber aggression. The researcher followed the Colaizzi’s methods to analyze the descriptive data. A proposed model was generated to describe cyber aggression in social media …
Date: May 2016
Creator: Albar, Ali Aldroos
System: The UNT Digital Library

Cyber Addiction and Information Overload and Their Impact on Workplace Productivity

The research examines the relationship between cyber addiction (excessive use of the Internet, CA), information overload (IO), and assesses their impact on workplace productivity. A multi-methods approach is used employing the Internet Addiction Test (IAT) and a quantitative survey design to assess and test the stated hypothesis. The study used random sampling methods targeting 150 respondents from different information technology departments of various organizations. The study hypothesizes that CA and IO have a reciprocal association, which adversely affects workplace productivity and employee performance. From the findings, IAT scores increase with an associated possibility of reporting burnout, fatigue, and other components associated with CA and IO. Also, CA and IO were significantly correlated, as evaluated by the chi-square test, although the same approach did not yield significant associations between CA and perceived internet dependence. Other findings CA components, such as social media use, significantly associated with task postponement and burnout. As well, CA affected IO with substantial impacts on workplace productivity. The paper highlights managerial aspects that organizations should consider in optimizing the output of their staff. Recommendations include wellness programs, altering the leadership and management styles, and sensitizing the employees on the adverse effects caused by the two variables.
Date: December 2023
Creator: Alboulayan, Moneerah Abdulhameed M.
System: The UNT Digital Library
An Examination of the Adoption of Preservation Metadata in Cultural Heritage Institutions: An Exploratory Study Using Diffusion of Innovations Theory (open access)

An Examination of the Adoption of Preservation Metadata in Cultural Heritage Institutions: An Exploratory Study Using Diffusion of Innovations Theory

Digital preservation is a significant challenge for cultural heritage institutions and other repositories of digital information resources. Recognizing the critical role of metadata in any successful digital preservation strategy, the Preservation Metadata Implementation Strategies (PREMIS) has been extremely influential on providing a "core" set of preservation metadata elements that support the digital preservation process. However, there is no evidence, in the form of previous research, as to what factors explain and predict the level of adoption of PREMIS. This research focused on identifying factors that affect the adoption of PREMIS in cultural heritage institutions. This study employed a web-based survey to collect data from 123 participants in 20 country as well as a semi-structured, follow-up telephone interview with a smaller sample of the survey respondents. Roger's diffusion of innovation theory was used as a theoretical framework. The main constructs considered for the study were relative advantage, compatibility, complexity, trialability, observability, and institution readiness. The study yielded both qualitative and quantitative data, and analysis showed that all six factors influence the adoption of PREMIS in varying degrees. Results of a regression analysis of adoption level on the six factors showed a statistically significant relationship. The R2 value for the model was …
Date: May 2009
Creator: Alemneh, Daniel Gelaw
System: The UNT Digital Library
Influence of Social Media on Decision Making of the Kuwait National Assembly Members: Case Study (open access)

Influence of Social Media on Decision Making of the Kuwait National Assembly Members: Case Study

In Kuwait, an increase in the use of social media by the Kuwait National Assembly (KNA) has allowed it members to reach out to the public and so advance their political agenda. This study examines social media influences on the decision making process; addresses the lack of academic research in relation to KNA members; and seeks to understand the extent to which public political engagement using social media might affect the outcome of their decision making. The proposed social media influence model (SMIM) was used to explore the relationships and relative importance of variables influencing legislator decision making in a social media environment. The second decade of the twenty-first century saw a number of major issues emerging in Kuwait. A core mixed method design known as explanatory sequential was applied to multiple sets of data generated during KNA members' 14th (2013-2016) and 15th (2016-2018) terms. These data included Twitter messages (tweets), the KNA Information Center Parliamentary Information System legislation documents, and the news media articles. The sample was drawn from KNA membership, some of which used Twitter to comment on major events with specific hashtags and the Kuwaiti news media articles related to the same. Study results confirm and support …
Date: December 2018
Creator: Alfarhoud, Yousef T.
System: The UNT Digital Library
The Use of Social Media in Informal Scientific Communication Among Scholars: Modeling the Modern Invisible College (open access)

The Use of Social Media in Informal Scientific Communication Among Scholars: Modeling the Modern Invisible College

The concept of the invisible college is a key focus of scientific communication research with many studies on this topic in the literature. However, while such studies have contributed to an understanding of the invisible college, they have not adequately explained the interaction of social and structural processes in this phenomenon. As a consequence, past research has described the invisible college differently based on researchers’ perspectives, resulting in misinterpretations or inconsistent definitions of the relevant social and structural processes. Information science and related disciplines have focused on the structural processes that lead to scholarly products or works while placing less emphasis on the social processes. To advance understanding of the invisible college and its dimensions (including both social processes and structural processes), a proposed model (Modern Invisible College Model, MICM) has been built based on the history of the invisible college and Lievrouw’s (1989) distinction between social and structural processes. The present study focuses on the social processes of informal communication between scholars via social media, rather than on the structural processes that lead to scholarly products or works. A developed survey and an employed quantitative research method were applied for data collection. The research population involved 77 scholars from …
Date: May 2014
Creator: Algarni, Mohammed Ayedh
System: The UNT Digital Library

Security Aspects of Users' Information Sharing on Social Media

This study aims to investigate college students' security awareness of using social media in sharing information. The two theories that have guided this study are the theory of planned behavior (TPB) and the technology acceptance model (TAM). Data was collected from both undergraduate and graduate students from the University of North Texas (UNT) in Denton. The total responses included 380 students from different majors with 291 valid responses for data analysis; The structural equation model (SEM) Lavaan package was used to find out the best fit of the model. A diagonally weighted least squares (DWLS) was used to model the variables as ordinal in this study's analysis as ordinal data made the model fit substantially. The study found that 6 factors: attitude (AB), subjective norm (SN), perceived behavior control (PBC), perceived usefulness (PU), perceived risks (PR), and security awareness (SA) influenced behavior intention (BI). Also, I found that AB was influenced by PR and SA, as well as SN influenced by SA. Self-efficacy (SE) influenced PBC. On the other hand, the study found that controllability (C) did not influence PBC; perhaps, an individual's skills do not interact with social media security settings. Perceived ease of use (PEOU) did not influence …
Date: May 2023
Creator: Alharbi, Mohannad Abdulltef
System: The UNT Digital Library
The Status of the Organization of Knowledge in Cultural Heritage Institutions in Arabian Gulf Countries (open access)

The Status of the Organization of Knowledge in Cultural Heritage Institutions in Arabian Gulf Countries

No published studies to date examined the practices in creation or adoption of metadata in cultural heritage institutions or evaluated metadata in bibliographic databases in the Arabian Gulf counties and assessed its potential interoperability in the aggregation that would provide a central point of access to bibliographic databases of cultural heritage institutions. This exploratory study aimed to address this gap with the goal of: (1) developing understanding of the current state of information representation and knowledge organization in cultural heritage collections in Arabian Gulf countries, and (2) exploring perspectives for future developments such as creating regional large-scale portals similar to Digital Public Library of America, Europeana etc. that facilitate discovery by aggregating metadata and possible barriers to these developments.. The study is focused on a Kuwaiti, Qatari, and Omani libraries, museums, and archives. The mixed-methods research combined semi-structured interviews of the bibliographic database managers at 15 cultural heritage institutions and in-depth content analysis of a sample of 412 metadata records that represent items in these bibliographic databases for accuracy, completeness, consistency, use of knowledge organization systems, etc. This study findings make a research contribution important for evaluating the feasibility and planning of future aggregations of cultural heritage bibliographic databases. Results …
Date: August 2021
Creator: Aljalahmah, Saleh H
System: The UNT Digital Library

The Impact of Sociocultural and Information Communication Technology Adoption Factors on the Everyday Life Information Seeking Behavior of Saudi Students in the United States

Access: Use of this item is restricted to the UNT Community
This study analyzes the sociocultural factors that affect Saudi students in the U.S. as they seek information and explores to what extent these factors impact their everyday life information seeking (ELIS) behavior and their information technology behavior (ITB). The factors in this study illustrate the unique sociocultural values that distinguish Saudi students from other international student groups: gender segregation, emphasis on religion, social support, and utilization of the consultation concept. After collecting data from an online survey, the data from linear regression analyses revealed that only one culture factor (the language barrier) showed a significant impact on Saudi student ELIS in the U.S., while the other factors were not statistically significant. Also, the findings indicated that perceived usefulness (PU) and perceived ease of use (PEU) were statistically significant to the ELIS of Saudi students. Furthermore, the study showed that after academic information, food and drink, entertainment, and health were the top student needs, the top ranking sources for everyday life seeking information were social media and the Internet. The findings of the study help to shed light on a sizable user group. As the fourth largest group of international students in the U.S., Saudi students have been underrepresented in research. …
Date: May 2019
Creator: Alkahtani, Latifah M
System: The UNT Digital Library
Electronic Health Record Systems and Cyber Hygiene: Awareness, Knowledge, and Practices among Physicians in Kuwait (open access)

Electronic Health Record Systems and Cyber Hygiene: Awareness, Knowledge, and Practices among Physicians in Kuwait

This study explored issues related to the adoption and implementation of electronic health record (EHR) systems including building the awareness, knowledge, and experience of physicians toward cyber hygiene. This study used a qualitative research method to assess (a) the barriers to EHR systems adoption and implementation in Kuwait and (b) the level of awareness, knowledge and experiences related to cyber hygiene practices in Kuwait. The findings of the study supported the conceptual framework used to guide the research of the factors impacting the adoption and implementation of EHR systems in Kuwait as well as explore the level of awareness, knowledge, and experience of physicians about both EHR systems and cyber hygiene. The results from the systematic literature review analysis identified seven major barriers. These are financial barriers, time, difficulty of using technology, lack of support, negative attitude, legal and ethical (policies), and cultural barriers. The findings from the semistructured interviews supported the literature findings and provided more in-depth insights into the structural and social issues affecting the adoption and implementation of EHR systems. Given that Kuwait is a member of the Gulf Cooperation Countries (GCC), the results from the literature analysis showed that the problems in Kuwait are similar to …
Date: December 2022
Creator: Alkhaledi, Reem
System: The UNT Digital Library
Perceived attributes of diffusion of innovation theory as predictors of Internet adoption among faculty members of Imam Mohammed Bin Saud University. (open access)

Perceived attributes of diffusion of innovation theory as predictors of Internet adoption among faculty members of Imam Mohammed Bin Saud University.

The Internet is the most common communication and research tool worldwide. Perusal of the World Wide Web quickly reveals the variety of information available. Internet adoption can be considered the late 20th century's most important event. In academic environments today, Internet use among faculty members has been widely expanded, with professors now integrating Internet technology into classroom activities. Imam Muhammad Bin Saud Islamic University (IMSU) is a pioneering public university in Saudi Arabia. Until recently, some faculty members at IMSU were unable to access the Internet through the university. It is important to study the effects of this delay on faculty members regarding research and academic activities. This study identified the statistically significant differences in demographic characteristics of Internet adopters and non-adopters among faculty members at IMSU, examined whether faculty members' perceptions of the Internet affected adoption, determined if the university administration's decisions impacted faulty members' decisions to adopt the Internet, identified factors motivating faculty members to adopt the Internet, identified obstacles influencing faculty members' decisions to use the Internet, and determined whether innovation characteristics as perceived by faculty members predicted Internet adoption. Using Rogers' diffusion of innovation theory, the influence of eight attributes were examined regarding Internet adoption among …
Date: May 2007
Creator: Almobarraz, Abdullah
System: The UNT Digital Library
Modeling Email Phishing Attacks (open access)

Modeling Email Phishing Attacks

Cheating, beguiling, and misleading information exist all around us; understanding deception and its consequences is crucial in our information environment. This study investigates deception in phishing emails that successfully bypassed Microsoft 365 filtering system. We devised a model that explains why some people are deceived and how targeted individuals and organizations can prevent or counter attacks. The theoretical framework used in this study is Anderson's functional ontology construction (FOC). The methodology involves quantitative and qualitative descriptive design, where the data source is the set of phishing emails archived from a Tier 1 University. We looked for term frequency-inverse document frequency (Tf-idf) and the distribution of words over documents (topic modeling) and found the subjects of phishing emails that targeted educational organizations are related to finances, jobs, and technologies. Also, our analysis shows the phishing emails in the dataset come under six categories; reward, urgency, curiosity, fear, job, and entertainment. Results indicate that staff and students were primarily targeted, and a list of the most used verbs for deception was compiled. We uncovered the stimuli being used by scammers and types of reinforcements used to misinform the target to ensure successful trapping via phishing emails. We identified how scammers pick their …
Date: December 2021
Creator: Almoqbil, Abdullah
System: The UNT Digital Library
The Adoption and Use of Electronic Information Resources by a Non-Traditional User Group: Automotive Service Technicians. (open access)

The Adoption and Use of Electronic Information Resources by a Non-Traditional User Group: Automotive Service Technicians.

The growing complexity of machines has led to a concomitant increase in the amount and complexity of the information needed by those charged with servicing them. This, in turn, has led to a need for more robust methods for storing and distributing information and for a workforce more sophisticated in its use of information resources. As a result, the service trades have "professionalized," adopting more rigorous academic standards and developing ongoing certification programs. The current paper deals with the acceptance of advanced electronic information technology by skilled service personnel, specifically, automotive service technicians. The theoretical basis of the study is Davis' technology acceptance model. The purpose of the study is to determine the effects of three external factors on the operation of the model: age, work experience, and education/certification level. The research design is in two parts, beginning with an onsite observation and interviews to establish the environment. During the second part of the research process a survey was administered to a sample of automotive service technicians. Results indicated significant inverse relationships between age and acceptance and between experience and acceptance. A significant positive relationship was shown between education, particularly certification, and acceptance.
Date: May 2006
Creator: Almquist, Arne J.
System: The UNT Digital Library
The Use of Smartphone Applications for Learning Purposes among Saudi Students (open access)

The Use of Smartphone Applications for Learning Purposes among Saudi Students

The purpose of the current study was to confirm or dismiss Saudi students' behavioral intention with regard to using smartphone applications for learning purposes. A quantitative, non-experimental survey research design and descriptive research conducted on the determinants -performance expectancy, effort expectancy, and social influence- that predict Saudi students' intention at University of North Texas to use smartphone applications for learning purposes, based on the unified theory of acceptance and use of technology (UTAUT) as the framework. This study aims at filling gap found in understanding of students' intentions and their behaviors regarding the adoption and use of the Smartphone applications. Data was collected by means of an online questionnaire. The hypothesized model validated empirically using data collected from around 234 Saudi students who enrolled at University of North Texas. The model developed from UTAUT explained 50.1% of the variance of behavioral intention, and behavioral intentions explained 13.6% of the variance of usage behavior. The result of this study support that the determinants of performance expectancy, effort expectancy, and facilitating conditions were the highest predictors of behavioral intentions in using smartphone applications for learning purposes. The results of this study could encourage students, educators, and the Saudi Arabia Ministry of Education …
Date: August 2020
Creator: Alomran, Amal I
System: The UNT Digital Library

Social Exchange Theory in the Context of X (Twitter) and Facebook Social Media Platforms with a Focus on Privacy Concerns among Saudi Students

The current research examines the use of social media and its security settings using the Social Exchange Theory (SET) within a Saudi student environment. This research includes an introduction, literature review, methodology, results, and conclusion with the results section presenting the findings from the three essays. The first essay employs the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) methodology of SET. PRISMA's systematic and exhaustive approach to literature evaluation increases the likelihood of obtaining high-quality, reproducible findings. In the second essay, which focuses on awareness of X's (Twitter) security settings, a quantitative research approach was utilized. A sample of former and current Saudi students (graduate and undergraduate) at the University of North Texas participated in the investigation. This research provides an empirical examination of the use of X (Twitter) and its security features within this community by employing statistical analysis of the data from respondents. Likewise, the same sample of Saudi students from the University of North Texas was used for the third essay in which the use of Facebook's security settings was examined. Having a consistent sample across both studies enables a comparison and a greater understanding of the security awareness and practices of this group across …
Date: December 2023
Creator: Alqahtani, Sameer Mohammed S.
System: The UNT Digital Library