Computer Support Interactions: Verifying a Process Model of Problem Trajectory in an Information Technology Support Environment. (open access)

Computer Support Interactions: Verifying a Process Model of Problem Trajectory in an Information Technology Support Environment.

Observations in the information technology (IT) support environment and generalizations from the literature regarding problem resolution behavior indicate that computer support staff seldom store reusable solution information effectively for IT problems. A comprehensive model of the processes encompassing problem arrival and assessment, expertise selection, problem resolution, and solution recording has not been available to facilitate research in this domain. This investigation employed the findings from a qualitative pilot study of IT support staff information behaviors to develop and explicate a detailed model of problem trajectory. Based on a model from clinical studies, this model encompassed a trajectory scheme that included the communication media, characteristics of the problem, decision points in the problem resolution process, and knowledge creation in the form of solution storage. The research design included the administration of an extensive scenario-based online survey to a purposive sample of IT support staff at a medium-sized state-supported university, with additional respondents from online communities of IT support managers and call-tracking software developers. The investigator analyzed 109 completed surveys and conducted email interviews of a stratified nonrandom sample of survey respondents to evaluate the suitability of the model. The investigation employed mixed methods including descriptive statistics, effects size analysis, and content …
Date: December 2006
Creator: Strauss, Christopher Eric
System: The UNT Digital Library

Constraints on Adoption of Innovations: Internet Availability in the Developing World.

Access: Use of this item is restricted to the UNT Community
In a world that is increasingly united in time and distance, I examine why the world is increasingly divided socially, economically, and digitally. Using data for 35 variables from 93 countries, I separate the countries into groups of 31 each by gross domestic product per capita. These groups of developed, lesser developed and least developed countries are used in comparative analysis. Through a review of relevant literature and tests of bivariate correlation, I select eight key variables that are significantly related to information communication technology development and to human development. For this research, adoption of the Internet in the developing world is the innovation of particular interest. Thus, for comparative purposes, I chose Internet Users per 1000 persons per country and the Human Development Index as the dependent variables upon which the independent variables are regressed. Although small in numbers among the least developed countries, I find Internet Users as the most powerful influence on human development for the poorest countries. The research focuses on key obstacles as well as variables of opportunity for Internet usage in developing countries. The greatest obstacles are in fact related to Internet availability and the cost/need ratio for infrastructure expansion. However, innovations for expanded …
Date: December 2006
Creator: Stedman, Joseph B.
System: The UNT Digital Library
A Framework of Automatic Subject Term Assignment: An Indexing Conception-Based Approach (open access)

A Framework of Automatic Subject Term Assignment: An Indexing Conception-Based Approach

The purpose of dissertation is to examine whether the understandings of subject indexing processes conducted by human indexers have a positive impact on the effectiveness of automatic subject term assignment through text categorization (TC). More specifically, human indexers' subject indexing approaches or conceptions in conjunction with semantic sources were explored in the context of a typical scientific journal article data set. Based on the premise that subject indexing approaches or conceptions with semantic sources are important for automatic subject term assignment through TC, this study proposed an indexing conception-based framework. For the purpose of this study, three hypotheses were tested: 1) the effectiveness of semantic sources, 2) the effectiveness of an indexing conception-based framework, and 3) the effectiveness of each of three indexing conception-based approaches (the content-oriented, the document-oriented, and the domain-oriented approaches). The experiments were conducted using a support vector machine implementation in WEKA (Witten, & Frank, 2000). The experiment results pointed out that cited works, source title, and title were as effective as the full text, while keyword was found more effective than the full text. In addition, the findings showed that an indexing conception-based framework was more effective than the full text. Especially, the content-oriented and the …
Date: December 2006
Creator: Chung, EunKyung
System: The UNT Digital Library
The Online and the Onsite Holocaust Museum Exhibition as an Informational Resource (open access)

The Online and the Onsite Holocaust Museum Exhibition as an Informational Resource

Museums today provide learning-rich experiences and quality informational resources through both physical and virtual environments. This study examined a Holocaust Museum traveling exhibition, Life in Shadows: Hidden Children and the Holocaust that was on display at the Art Center of Battle Creek, Michigan in fall 2005. The purpose of this mixed methods study was to assess the informational value of a Holocaust Museum exhibition in its onsite vs. online format by converging quantitative and qualitative data. Participants in the study included six eighth grade language arts classes who viewed various combinations or scenarios of the onsite and online Life in Shadows. Using student responses to questions in an online exhibition survey, an analysis of variance was performed to determine which scenario visit promotes the greatest content learning. Using student responses to additional questions on the same survey, data were analyzed qualitatively to discover the impact on students of each scenario visit. By means of an emotional empathy test, data were analyzed to determine differences among student response according to scenario visit. A principal finding of the study (supporting Falk and Dierking's contextual model of learning) was that the use of the online exhibition provided a source of prior orientation and …
Date: December 2006
Creator: Lincoln, Margaret L.
System: The UNT Digital Library
What makes a quality Ph.D. program in library and information sciences? (open access)

What makes a quality Ph.D. program in library and information sciences?

The intent of this study was to establish and validate criteria for use to assess the quality of a library and information sciences (LIS) Ph.D. program. The Ph.D. student-centric topology for quality Ph.D. programs was developed from a 2001 position statement by the American Association of Colleges of Nursing (AACN) regarding the quality indicators in research-focused doctoral programs in nursing. Topology components were tested using a survey instrument to establish their importance to the community of practice and their potential use to assess a Ph.D. program. Survey participants were asked to rank terms or concepts in a balanced incomplete block (BIB) design then rate, on a Likert-type scale, statements about the applicability of these terms or concepts to assessing a quality LIS Ph.D. program. Survey participants were from the Association for Library and Information Science Education (ALISE) Open Lib/Info Sci Education Forum jESSE Listserv. Of 225 survey participants affiliated with universities or schools from North America who submitted usable surveys, slightly less than two-thirds (64.4 %) were female while 35.5 % were male. Ninety-eight participants (43.6 %) were faculty, 114 (50.7 %) were Ph.D. students or candidates, and 13 (5.8 %) were in other roles. Statistical analysis of survey responses …
Date: December 2006
Creator: Klingler, Scott Lavell
System: The UNT Digital Library
Usability of a Keyphrase Browsing Tool Based on a Semantic Cloud Model (open access)

Usability of a Keyphrase Browsing Tool Based on a Semantic Cloud Model

The goal of this research was to facilitate the scrutiny and utilization of Web search engine retrieval results. I used a graphical keyphrase browsing interface to visualize the conceptual information space of the results, presenting document characteristics that make document relevance determinations easier.
Date: August 2006
Creator: Johnston, Onaje Omotola
System: The UNT Digital Library
The Adoption and Use of Electronic Information Resources by a Non-Traditional User Group: Automotive Service Technicians. (open access)

The Adoption and Use of Electronic Information Resources by a Non-Traditional User Group: Automotive Service Technicians.

The growing complexity of machines has led to a concomitant increase in the amount and complexity of the information needed by those charged with servicing them. This, in turn, has led to a need for more robust methods for storing and distributing information and for a workforce more sophisticated in its use of information resources. As a result, the service trades have "professionalized," adopting more rigorous academic standards and developing ongoing certification programs. The current paper deals with the acceptance of advanced electronic information technology by skilled service personnel, specifically, automotive service technicians. The theoretical basis of the study is Davis' technology acceptance model. The purpose of the study is to determine the effects of three external factors on the operation of the model: age, work experience, and education/certification level. The research design is in two parts, beginning with an onsite observation and interviews to establish the environment. During the second part of the research process a survey was administered to a sample of automotive service technicians. Results indicated significant inverse relationships between age and acceptance and between experience and acceptance. A significant positive relationship was shown between education, particularly certification, and acceptance.
Date: May 2006
Creator: Almquist, Arne J.
System: The UNT Digital Library
Functional Ontology Construction: A Pragmatic Approach to Addressing Problems Concerning the Individual and the Informing Environment (open access)

Functional Ontology Construction: A Pragmatic Approach to Addressing Problems Concerning the Individual and the Informing Environment

Functional ontology construction (FOC) is an approach for modeling the relationships between a user and the informing environment by means of analysis of the user's behavior and the elements of the environment that have behavioral function. The FOC approach is an application of behavior analytic techniques and concepts to problems within information science. The FOC approach is both an alternative and a compliment to the cognitive viewpoint commonly found in models of behavior in information science. The basis for the synthesis of behavior analysis and information science is a shared tradition of pragmatism between the fields. The application of behavior analytic concepts brings with it the notion of selection by consequence. Selection is examined on the biological, behavioral, and cultural levels. Two perspicuous examples of the application of the FOC modeling approach are included. The first example looks at the document functioning as a reinforcer in a human operant experimental setting. The second example is an examination of the verbal behavior of expert film analyst, Raymond Bellour, the structure of a film he analyzed, and the elements of the film's structure that had behavioral function for Bellour. The FOC approach is examined within the ontological space of information science.
Date: May 2006
Creator: Anderson, Richard L.
System: The UNT Digital Library
Improving Recall of Browsing Sets in Image Retrieval from a Semiotics Perspective (open access)

Improving Recall of Browsing Sets in Image Retrieval from a Semiotics Perspective

The purpose of dissertation is to utilize connotative messages for enhancing image retrieval and browsing. By adopting semiotics as a theoretical tool, this study explores problems of image retrieval and proposes an image retrieval model. The semiotics approach conceptually demonstrates that: 1) a fundamental reason for the dissonance between retrieved images and user needs is representation of connotative messages, and 2) the image retrieval model which makes use of denotative index terms is able to facilitate users to browse connotatively related images effectively even when the users' needs are potentially expressed in the form of denotative query. Two experiments are performed for verifying the semiotic-based image retrieval model and evaluating the effectiveness of the model. As data sources, 5,199 records are collected from Artefacts Canada: Humanities by Canadian Heritage Information Network, and the candidate terms of connotation and denotation are extracted from Art & Architecture Thesaurus. The first experiment, by applying term association measures, verifies that the connotative messages of an image can be derived from denotative messages of the image. The second experiment reveals that the association thesaurus which is constructed based on the associations between connotation and denotation facilitates assigning connotative terms to image documents. In addition, the …
Date: May 2006
Creator: Yoon, JungWon
System: The UNT Digital Library
Intangible Qualities of Rare Books: Toward a Decision-Making Framework for Preservation Management in Rare Book Collections, Based Upon the Concept of the Book as Object (open access)

Intangible Qualities of Rare Books: Toward a Decision-Making Framework for Preservation Management in Rare Book Collections, Based Upon the Concept of the Book as Object

For rare book collections, a considerable challenge is involved in evaluating collection materials in terms of their inherent value, which includes the textual and intangible information the materials provide for the collection's users. Preservation management in rare book collections is a complex and costly process. As digitization and other technological advances in surrogate technology have provided new forms representation, new dilemmas in weighing the rare book's inherently valuable characteristics against the possibly lesser financial costs of surrogates have arisen. No model has been in wide use to guide preservation management decisions. An initial iteration of such a model is developed, based on a Delphi-like iterative questioning of a group of experts in the field of rare books. The results are used to synthesize a preservation management framework for rare book collections, and a small-scale test of the framework has been completed through two independent analyses of five rare books in a functioning collection. Utilizing a standardized template for making preservation decisions offers a variety of benefits. Preservation decisions may include prioritizing action upon the authentic objects, or developing and maintaining surrogates in lieu of retaining costly original collection materials. The framework constructed in this study provides a method for reducing …
Date: May 2006
Creator: Sheehan, Jennifer Karr
System: The UNT Digital Library

News photography image retrieval practices: Locus of control in two contexts.

Access: Use of this item is restricted to the UNT Community
This is the first known study to explore the image retrieval preferences of news photographers and news photo editors in work contexts. Survey participants (n=102) provided opinions regarding 11 photograph searching methods. The quantitative survey data were analyzed using descriptive statistics, while content analysis was used to evaluate the qualitative survey data. In addition, news photographers and news photo editors (n=11) participated in interviews. Data from the interviews were analyzed with phenomenography. The survey data demonstrated that most participants prefer searching by events taking place in the photograph, objects that exist in the photograph, photographer-provided keywords, and relevant metadata, such as the date the picture was taken. They also prefer browsing. Respondents had mixed opinions about searching by emotions elicited in a photograph, as well as the environmental conditions represented in a photograph. Participants' lowest-rated methods included color and light, lines and shapes, and depth, shadow, or perspective. They also expressed little interest in technical information about a photograph, such as shutter speed and aperture. Interview participants' opinions about the search methods reflected the survey respondents' views. They discussed other aspects of news photography as well, including the stories told by the pictures, technical concerns about digital photography, and digital …
Date: May 2006
Creator: Neal, Diane Rasmussen
System: The UNT Digital Library

Implications of the inclusion of document retrieval systems as actors in a social network.

Access: Use of this item is restricted to the UNT Community
Traditionally, social network analysis (SNA) techniques enable the examination of relationships and the flow of information within networks of human members or groups of humans. This study extended traditional social network analysis to include a nonhuman group member, specifically a document retrieval system. The importance of document retrieval systems as information sources, the changes in business environments that necessitates the use of information and communication technologies, and the attempts to make computer systems more life-like, provide the reasons for considering the information system as a group member. The review of literature for this study does not encompass a single body of knowledge. Instead, several areas combined to inform this study, including social informatics for its consideration of the intersection of people and information technology, network theory and social network analysis, organizations and information, organizational culture, and finally, storytelling in organizations as a means of transferring information. The methodology included distribution of surveys to two small businesses that used the same document retrieval system, followed by semi-structured interviews of selected group members, which allowed elaboration on the survey findings. The group members rated each other and the system on four interaction criteria relating to four social networks of interest, including awareness, …
Date: December 2005
Creator: Macpherson, Janet Robertson
System: The UNT Digital Library
Knowledge management in times of change: Tacit and explicit knowledge transfers. (open access)

Knowledge management in times of change: Tacit and explicit knowledge transfers.

This study proposed a look at the importance and challenges of knowledge management in times of great change. In order to understand the information phenomena of interest, impacts on knowledge workers and knowledge documents in times of great organizational change, the study is positioned in a major consolidation of state agencies in Texas. It pays special attention to how the changes were perceived by the knowledge workers by interviewing those that were impacted by the changes resulting from the reorganization. The overall goal is to assess knowledge management in times of great organizational change by analyzing the impact of consolidation on knowledge management in Texas's Health and Human Services agencies. The overarching research question is what happened to the knowledge management structure during this time of great change? The first research question was what was the knowledge worker environment during the time of change? The second research question was what was the knowledge management environment of the agencies during the time of change? The last research question was did consolidation of the HHS agencies diminish the ability to transition from tacit to explicit knowledge? Additionally, the study investigates how the bill that mandated the consolidation was covered in the local …
Date: December 2005
Creator: Hall, Heather Leigh
System: The UNT Digital Library
A multi-dimensional entropy model of jazz improvisation for music information retrieval. (open access)

A multi-dimensional entropy model of jazz improvisation for music information retrieval.

Jazz improvisation provides a case context for examining information in music; entropy provides a means for representing music for retrieval. Entropy measures are shown to distinguish between different improvisations on the same theme, thus demonstrating their potential for representing jazz information for analysis and retrieval. The calculated entropy measures are calibrated against human representation by means of a case study of an advanced jazz improvisation course, in which synonyms for "entropy" are frequently used by the instructor. The data sets are examined for insights in music information retrieval, music information behavior, and music representation.
Date: December 2005
Creator: Simon, Scott J.
System: The UNT Digital Library
A Complex Systems Model for Understanding the Causes of Corruption: Case Study - Turkey (open access)

A Complex Systems Model for Understanding the Causes of Corruption: Case Study - Turkey

It is attempted with this dissertation to draw an explanatory interdisciplinary framework to clarify the causes of systemic corruption. Following an intense review of political sciences, economics, and sociology literatures on the issue, a complex systems theoretical model is constructed. A political system consists of five main components: Society, interest aggregators, legislative, executive and private sector, and the human actors in these domains. It is hypothesized that when the legitimacy level of the system is low and morality of the systemic actors is flawed, selected political, social and economic incentives and opportunities that may exist within the structure of the systemic components might -individually or as a group- trigger corrupt transactions between the actors of the system. If left untouched, corruption might spread through the system by repetition and social learning eventually becoming the source of corruption itself. By eroding the already weak legitimacy and morality, it may increase the risk of corruption even further. This theoretical explanation is used to study causes of systemic corruption in the Turkish political system. Under the guidance of the complex systems theory, initial systemic conditions, -legacy of the predecessor of Turkey Ottoman Empire-, is evaluated first, and then political, social and economic factors …
Date: August 2005
Creator: Yasar, Muhammet Murat
System: The UNT Digital Library
Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment. (open access)

Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.

Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem. Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural. Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level. "Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions. Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P). Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of …
Date: August 2005
Creator: Ozeren, Suleyman
System: The UNT Digital Library
Makeshift Information Constructions: Information Flow and Undercover Police (open access)

Makeshift Information Constructions: Information Flow and Undercover Police

This dissertation presents the social virtual interface (SVI) model, which was born out of a need to develop a viable model of the complex interactions, information flow and information seeking behaviors among undercover officers. The SVI model was created from a combination of various philosophies and models in the literature of information seeking, communication and philosophy. The questions this research paper answers are as follows: 1. Can we make use of models and concepts familiar to or drawn from Information Science to construct a model of undercover police work that effectively represents the large number of entities and relationships? and 2. Will undercover police officers recognize this model as realistic? This study used a descriptive qualitative research method to examine the research questions. An online survey and hard copy survey were distributed to police officers who had worked in an undercover capacity. In addition groups of officers were interviewed about their opinion of the SVI model. The data gathered was analyzed and the model was validated by the results of the survey and interviews.
Date: August 2005
Creator: Aksakal, Baris
System: The UNT Digital Library

Terrorism as a social information entity: A model for early intervention.

Access: Use of this item is restricted to the UNT Community
This dissertation studies different social aspects of terrorists and terrorist organizations in an effort to better deal with terrorism, especially in the long run. The researcher, who also worked as a Police Captain at Turkish National Police Anti-Terrorism Department, seeks solutions to today's global problem by studying both literature and a Delphi examination of a survey of 1070 imprisoned terrorists. The research questions include questions such as "What are the reasons behind terrorism?", "Why does terrorism occur?", "What ideologies provide the framework for terrorist violence?, "Why do some individuals become terrorists and others do not?" and "Under what conditions will terrorists end their violence?" The results of the study presents the complexity of the terrorism problem as a social experience and impossibility of a single solution or remedy for the global problem of terrorism. The researcher through his examination of the findings of the data, presented that terrorism is a social phenomenon with criminal consequences that needs to be dealt by means of two dimensional approaches. The first is the social dimension of terrorism and the second is the criminal dimension of terrorism. Based on this, the researcher constructed a conceptual model which addresses both of these dimensions under the …
Date: August 2005
Creator: Yayla, Ahmet
System: The UNT Digital Library
A Comparative Analysis of Style of User Interface Look and Feel in a Synchronous Computer Supported Cooperative Work Environment (open access)

A Comparative Analysis of Style of User Interface Look and Feel in a Synchronous Computer Supported Cooperative Work Environment

The purpose of this study is to determine whether the style of a user interface (i.e., its look and feel) has an effect on the usability of a synchronous computer supported cooperative work (CSCW) environment for delivering Internet-based collaborative content. The problem motivating this study is that people who are located in different places need to be able to communicate with one another. One way to do this is by using complex computer tools that allow users to share information, documents, programs, etc. As an increasing number of business organizations require workers to use these types of complex communication tools, it is important to determine how users regard these types of tools and whether they are perceived to be useful. If a tool, or interface, is not perceived to be useful then it is often not used, or used ineffectively. As organizations strive to improve communication with and among users by providing more Internet-based collaborative environments, the users' experience in this form of delivery may be tied to a style of user interface look and feel that could negatively affect their overall acceptance and satisfaction of the collaborative environment. The significance of this study is that it applies the technology …
Date: May 2005
Creator: Livingston, Alan
System: The UNT Digital Library
The Impact of Predisposition Towards Group Work on Intention to Use a CSCW System (open access)

The Impact of Predisposition Towards Group Work on Intention to Use a CSCW System

Groupware packages are increasingly being used to support content delivery, class discussion, student to student and student to faculty interactions and group work on projects. This research focused on groupware packages that are used to support students who are located in different places, but who are assigned group projects as part of their coursework requirements. In many cases, students are being asked to use unfamiliar technologies that are very different from those that support personal productivity. For example, computer-assisted cooperative work (CSCW) technology is different from other more traditional, stand-alone software applications because it requires the user to interact with the computer as well as other users. However, familiarity with the technology is not the only requirement for successful completion of a group assigned project. For a group to be successful, it must also have a desire to work together on the project. If this pre-requisite is not present within the group, then the technology will only create additional communication and coordination barriers. How much of an impact does each of these factors have on the acceptance of CSCW technology? The significance of this study is threefold. First, this research contributed to how a user's predisposition toward group work affects …
Date: May 2005
Creator: Reyna, Josephine
System: The UNT Digital Library
Perceived features and similarity of images: An investigation into their relationships and a test of Tversky's contrast model. (open access)

Perceived features and similarity of images: An investigation into their relationships and a test of Tversky's contrast model.

The creation, storage, manipulation, and transmission of images have become less costly and more efficient. Consequently, the numbers of images and their users are growing rapidly. This poses challenges to those who organize and provide access to them. One of these challenges is similarity matching. Most current content-based image retrieval (CBIR) systems which can extract only low-level visual features such as color, shape, and texture, use similarity measures based on geometric models of similarity. However, most human similarity judgment data violate the metric axioms of these models. Tversky's (1977) contrast model, which defines similarity as a feature contrast task and equates the degree of similarity of two stimuli to a linear combination of their common and distinctive features, explains human similarity judgments much better than the geometric models. This study tested the contrast model as a conceptual framework to investigate the nature of the relationships between features and similarity of images as perceived by human judges. Data were collected from 150 participants who performed two tasks: an image description and a similarity judgment task. Qualitative methods (content analysis) and quantitative (correlational) methods were used to seek answers to four research questions related to the relationships between common and distinctive features …
Date: May 2005
Creator: Rorissa, Abebe
System: The UNT Digital Library
Privacy Concerns and Personality Traits Influencing Online Behavior: A Structural Model (open access)

Privacy Concerns and Personality Traits Influencing Online Behavior: A Structural Model

The concept of privacy has proven difficult to analyze because of its subjective nature and susceptibility to psychological and contextual influences. This study challenges the concept of privacy as a valid construct for addressing individuals' concerns regarding online disclosure of personal information, based on the premise that underlying behavioral traits offer a more reliable and temporally stable measure of privacy-oriented behavior than do snapshots of environmentally induced emotional states typically measured by opinion polls. This study investigated the relationship of personality characteristics associated with individuals' general privacy-related behavior to their online privacy behaviors and concerns. Two latent constructs, Functional Privacy Orientation and Online Privacy Orientation, were formulated. Functional Privacy Orientation is defined as a general measure of individuals' perception of control over their privacy. It was measured using the factors General Disclosiveness, Locus of Control, Generalized Trust, Risk Orientation, and Risk Propensity as indicator variables. Online Privacy Orientation is defined as a measure of individuals' perception of control over their privacy in an online environment. It was measured using the factors Willingness to Disclose Online, Level of Privacy Concern, Information Management Privacy Concerns, and Reported Online Disclosure as indicator variables. A survey questionnaire that included two new instruments to measure …
Date: May 2005
Creator: Grams, Brian C.
System: The UNT Digital Library
Quality Management in Museum Information Systems: A Case Study of ISO 9001-2000 as an Evaluative Technique (open access)

Quality Management in Museum Information Systems: A Case Study of ISO 9001-2000 as an Evaluative Technique

Museums are service-oriented information systems that provide access to information bearing materials contained in the museum's collections. Within museum environments, the primary vehicle for quality assurance and public accountability is the accreditation process of the American Association of Museums (AAM). Norbert Wiener founded the field of cybernetics, employing concepts of information feedback as a mechanism for system modification and control. W. Edwards Deming applied Wiener's principles to management theory, initiating the wave of change in manufacturing industries from production-driven to quality-driven systems. Today, the principles are embodied in the ISO 9000 International Standards for quality management systems (QMS), a globally-recognized set of standards, widely employed as a vehicle of quality management in manufacturing and service industries. The International Organization for Standardization defined a process for QMS registration against ISO 9001 that is similar in purpose to accreditation. This study's goals were to determine the degree of correspondence between elements of ISO 9001 and quality-related activities within museum environments, and to ascertain the relevance of ISO 9001-2000 as a technique of museum evaluation, parallel to accreditation. A content analysis compared museum activities to requirements specified in the ISO 9001-2000 International Standard. The study examined museum environment surrogates which consisted of (a) …
Date: May 2005
Creator: Karr, Fred H.
System: The UNT Digital Library
Information Needs of Art Museum Visitors: Real and Virtual (open access)

Information Needs of Art Museum Visitors: Real and Virtual

Museums and libraries are considered large repositories of human knowledge and human culture. They have similar missions and goals in distributing accumulated knowledge to society. Current digitization projects allow both, museums and libraries to reach a broader audience, share their resources with a variety of users. While studies of information seeking behavior, retrieval systems and metadata in library science have a long history; such research studies in museum environments are at their early experimental stage. There are few studies concerning information seeking behavior and needs of virtual museum visitors, especially with the use of images in the museums' collections available on the Web. The current study identifies preferences of a variety of user groups about the information specifics on current exhibits, museum collections metadata information, and the use of multimedia. The study of information seeking behavior of users groups of museum digital collections or cultural collections allows examination and analysis of users' information needs, and the organization of cultural information, including descriptive metadata and the quantity of information that may be required. In addition, the study delineates information needs that different categories of users may have in common: teachers in high schools, students in colleges and universities, museum professionals, art …
Date: December 2004
Creator: Kravchyna, Victoria
System: The UNT Digital Library