Seeking Information After the 2010 Haiti Earthquake: a Case Study in Mass-fatality Management (open access)

Seeking Information After the 2010 Haiti Earthquake: a Case Study in Mass-fatality Management

The 2010 earthquake in Haiti, which killed an estimated 316,000 people, offered many lessons in mass-fatality management (MFM). The dissertation defined MFM in seeking information and in recovery, preservation, identification, and disposition of human remains. Specifically, it examined how mass fatalities were managed in Haiti, how affected individuals sought information about fatalities, and what needs motivated them. Data from 28 in-depth, partially structured interviews, conducted during two field visits ending 21 weeks after the earthquake, were included in a case study. The data analysis revealed the MFM was severely inadequate. One interviewee, a senior UN official, stated, "There was no fatality management." The analysis also indicated a need to learn whereabouts of the deceased motivated individuals to visit spots the deceased were last seen at. It sought to illumine information-seeking practices, as discussed in the works of J. David Johnson and others, by developing a new model of information flow in MFM. In addition, it reaffirmed Donald Case and Thomas Wilson's theoretical proposition – that need guides any seeking of information – in the case of Haiti. Finally, it produced recommendations regarding future directions in MFM for emergency managers and information scientists, including possible use of unidentified body parts in …
Date: May 2013
Creator: Gupta, Kailash
System: The UNT Digital Library
Web Information Behaviors of Users Interacting with a Metadata Navigator (open access)

Web Information Behaviors of Users Interacting with a Metadata Navigator

The web information behaviors of users as they interacted with a metadata navigator, the Personal Information (PI) Agent, and reflected upon their interaction experiences were studied. The process included studying the complete iterative (repeated) cycle of information needs, information seeking, and information use of users interacting with an internet-based prototype metadata PI Agent tool. Detlor’s theory of web information behaviors of organizational users was utilized as a theoretical foundation for studying human-information interactions via the PI Agent tool. The qualitative research design allowed for the use of triangulation within the context of a one-group pretest-posttest design. Triangulation occurred in three phases: (a) observe, (b) collect, and (c) reflect. Observations were made as participants solved three problem situations. Participants’ computer log and print screen data were collected, and follow-up interviews were conducted once all posttest sessions ended to enable users to reflect on their experiences. The three triangulation phases ensured saturation of data and greater depth regarding the participants’ information behaviors. Content analysis occurred via exploratory pattern analysis using the posttest Problem Steps Recorder (PSR) log data and on the six interviewees’ follow-up interview data. Users engaged in iterative cycles of information needs, information seeking, and information use to resolve the …
Date: December 2013
Creator: McMillan, Tyson DeShaun
System: The UNT Digital Library
Organizational Justice Perception and Its Effects on Knowledge Sharing: a Case Study of Forensics in the Turkish National Police (open access)

Organizational Justice Perception and Its Effects on Knowledge Sharing: a Case Study of Forensics in the Turkish National Police

In today’s economy, organizational knowledge is a fundamental factor for remaining competitive and managing intellectual capital. Knowledge Management aims to improve organizational performance by designing the work environment with necessary tools. Yet, significant amount of knowledge resides within the people in different forms such as experience or abilities. Transferring individual knowledge within members or into organizational repositories is so difficult. Knowledge sharing only occurs under certain circumstances: People share knowledge when they believe it is beneficial for them, when they feel safe and secure, and when they trust. Since knowledge is power, and brings respect to its bearer, knowledge sharing needs suitable environment. In this context, this study investigates intention to knowledge sharing among forensics in the Turkish National Police (TNP) and the factors -such as perceived organizational justice, organizational citizenship behaviors, subjective norms, and attitudes toward knowledge sharing- affecting their intentions. The researcher utilized a model developed from Ajzen and Fishbein’s (1975; 1980) theory of reasoned action (TRA). To test this model, a self-administered questionnaire survey was administered in Turkey In order to analyze the quantitative data; SPSS version 19 was used for all preliminary analyses and LISREL 8.8 was used for Regression Analysis and Path Analysis The fit …
Date: August 2013
Creator: Can, Ahmet
System: The UNT Digital Library
Toward a Grounded Theory of Community Networking (open access)

Toward a Grounded Theory of Community Networking

This dissertation presents a preliminary grounded theory of community networking based on 63 evaluations of community networking projects funded by the National Telecommunications and Information Administration’s Technology Opportunities Program (TOP) between 1994 and 2007. The substantive grounded theory developed is that TOP projects differed in their contribution to positive outcomes for intended disadvantaged community beneficiaries based on the extent and manner in which they involved the disadvantaged community during four grant process phases: partnership building, project execution, evaluation, and close-out. Positive outcomes for the community were facilitated by using existing communication channels, such as schools, to connect with intended beneficiaries; local financial institutions to provide infrastructure to support local trade; and training to connect community members to jobs. Theoretical contributions include situating outcomes for disadvantaged communities within the context of the grant process; introducing the “vulnerable community” concept; and identifying other concepts and properties that may be useful in further theoretical explorations. Methodological contributions include demonstrating grounded theory as a viable method for exploring large text-based datasets; paving the way for machine learning approaches to analyzing qualitative data; and illustrating how project evaluations can be used in a similar fashion as interview data. Practical contributions include providing information to guide …
Date: May 2014
Creator: Masten-Cain, Kathryn
System: The UNT Digital Library
Implications of Punctuation Mark Normalization on Text Retrieval (open access)

Implications of Punctuation Mark Normalization on Text Retrieval

This research investigated issues related to normalizing punctuation marks from a text retrieval perspective. A punctuated-centric approach was undertaken by exploring changes in meanings, whitespaces, words retrievability, and other issues related to normalizing punctuation marks. To investigate punctuation normalization issues, various frequency counts of punctuation marks and punctuation patterns were conducted using the text drawn from the Gutenberg Project archive and the Usenet Newsgroup archive. A number of useful punctuation mark types that could aid in analyzing punctuation marks were discovered. This study identified two types of punctuation normalization procedures: (1) lexical independent (LI) punctuation normalization and (2) lexical oriented (LO) punctuation normalization. Using these two types of punctuation normalization procedures, this study discovered various effects of punctuation normalization in terms of different search query types. By analyzing the punctuation normalization problem in this manner, a wide range of issues were discovered such as: the need to define different types of searching, to disambiguate the role of punctuation marks, to normalize whitespaces, and indexing of punctuated terms. This study concluded that to achieve the most positive effect in a text retrieval environment, normalizing punctuation marks should be based on an extensive systematic analysis of punctuation marks and punctuation patterns and …
Date: August 2013
Creator: Kim, Eungi
System: The UNT Digital Library
The Information Politics Assessment Scale (Ipas): Developing and Testing an Instrument to Measure and Identify the Information Politics of Organizations (open access)

The Information Politics Assessment Scale (Ipas): Developing and Testing an Instrument to Measure and Identify the Information Politics of Organizations

Information politics is a concept widely acknowledged in several disciplines. However, scant empirical evidence exists in the literature that codifies or measures information politics as a construct. This exploratory study developed and tested the Information Politics Assessment Scale (IPAS), a survey instrument that measured individual perceptions of organizational information artifacts as indictors of its information politics. Data collected with the IPAS was examined to investigate the latent structure of the information politics variable, determine information politics models, and explore the relationship between information politics, strategy, and organization effectiveness. A purposive sample of 240 participants from a cross-section of organizations completed the IPAS in an online administration. Exploratory factor analysis generated three factors, labeled Behavioral Flexibility (BF), Environmental Sensitivity (ES), and Structural Autonomy (SA), suggesting three dimensions of the information politics variable. Cluster analysis of aggregate scores on the BF, ES, and SA factors together resulted in determining four distinct information politics models. Crosstab and ANOVA, respectively, enabled explaining the relationship between strategy and information politics, and how it influenced organization effectiveness. This study breaks ground by broadening the theoretical and empirical understanding of information politics in confirming the proposition that an organization’s information artifacts are measureable and reliable indicators of …
Date: May 2014
Creator: Reed, Richard
System: The UNT Digital Library
Development and Validation of an Instrument to Operationalize Information System Requirements Capabilities (open access)

Development and Validation of an Instrument to Operationalize Information System Requirements Capabilities

As a discipline, information systems (IS) has struggled with the challenge of alignment of product (primarily software and the infrastructure needed to run it) with the needs of the organization it supports. This has been characterized as the pursuit of alignment of information technology (IT) with the business or organization, which begins with the gathering of the requirements of the organization, which then guide the creation of the IS requirements, which in turn guide the creation of the IT solution itself. This research is primarily focused on developing and validating an instrument to operationalize such requirements capabilities. Requirements capabilities at the development of software or the implementation of a specific IT solution are referred to as capabilities for software requirements or more commonly systems analysis and design (SA&D) capabilities. This research describes and validates an instrument for SA&D capabilities for content validity, construct validity, internal consistency, and an exploratory factor analysis. SA&D capabilities were expected to coalesce strongly around a single dimension. Yet in validating the SA&D capabilities instrument, it became apparent that SA&D capabilities are not the unidimensional construct traditionally perceived. Instead it appears that four dimensions underlie SA&D capabilities, and these are associated with alignment maturity (governance, partnership, …
Date: May 2014
Creator: Pettit, Alex Z.
System: The UNT Digital Library
Readiness of Indonesian Academic Libraries for Open Access and Open Access Repositories Implementation: a Study on Indonesian Open Access Repositories Registered in OpenDOAR (open access)

Readiness of Indonesian Academic Libraries for Open Access and Open Access Repositories Implementation: a Study on Indonesian Open Access Repositories Registered in OpenDOAR

Scholarly and scientific communication has a long history, while the Open Access (OA) movement began to take part in this communication with the emergence of Internet in the late 1960s and the web that emerged in mid-1990s. OA is beneficial for sharing knowledge because the OA movement demands scholarly literature freely available on the internet and it is free of most licensing restriction copyright. OA will close the barrier of access to knowledge. The OA movement in Indonesia may be considered slow. So far, only 33 academic libraries have registered their repositories with OpenDOAR, which is still small compared to the total number of HE institutions in Indonesia. Those 33 OARs vary in the stages of development. Some have already had large size of contents, while others are still developing. Using Weiner’s theory of organizational readiness for change, this mixed method investigates the readiness of academic librarians for Open Access Repository implementation. The results show that academic librarians in Indonesia are somewhat familiar with OA and OAR. However, their understanding of OA is still limited to the technical nature of it. They also know the benefits of OA in relation to scholarly communication and are ready to implement OAR, but …
Date: August 2015
Creator: Priyanto, Ida F.
System: The UNT Digital Library
Modeling the Role of Boundary Spanners-in-Practice in the Nondeterministic Model of Engineering Design Activity (open access)

Modeling the Role of Boundary Spanners-in-Practice in the Nondeterministic Model of Engineering Design Activity

Boundary spanners-in-practice are individuals who inhabit more than one social world and bring overlapping place perspectives to bear on the function(s) performed within and across each world. Different from nominated boundary spanners, they are practitioners responsible for the 'translation' of each small world's perspectives thereby increasing collaboration effectiveness to permit the small worlds to work synergistically. The literature on Knowledge Management (KM) has emphasized the organizational importance of individuals performing boundary spanning roles by resolving cross-cultural and cross-organizational knowledge system conflicts helping teams pursue common goals through creation of "joint fields" - a third dimension that is co-jointly developed between the two fields or dimensions that the boundary spanner works to bridge. The Copeland and O'Connor Nondeterministic Model of Engineering Design Activity was utilized as the foundation to develop models of communication mechanics and dynamics when multiple simultaneous interactions of the single nondeterministic user model, the BSIP and two Subject Matter Experts (SMEs), engage during design activity in the Problem-Solving Space. The Problem-Solving Space defines the path through the volumes of plausible answers or 'solution spaces' that will satisfice the problem presented to the BSIP and SMEs. Further model refinement was performed to represent expertise seeking behaviors and the physical …
Date: December 2015
Creator: Linkins, Kathy L.
System: The UNT Digital Library
Poststructuralist Critical Rhetorical Analysis as a Problem Analysis Tool: A Case Study of Information Impact in Denton’s Hydraulic Fracturing Debate (open access)

Poststructuralist Critical Rhetorical Analysis as a Problem Analysis Tool: A Case Study of Information Impact in Denton’s Hydraulic Fracturing Debate

Energy and the natural environment are central concerns among stakeholders across the globe. Decisions on this scale often require interaction among a myriad of institutions and individuals who navigate a complex variety of challenges. In Denton, Texas in 2014, voters were asked to make such a decision when tasked with a referendum to determine whether the city would continue to allow hydraulic fracturing activity within its borders. For social scientists, this situation requires further analysis in an effort to better understand how and why individuals make the decisions they do. One possible approach for exploring this process is a method of poststructuralist critical rhetorical analysis, which is concerned with how individuals’ identities change through interaction with institutions. This study reflects upon the texts themselves through a poststructuralist critical rhetorical analysis of images employed by those in favor of and those against Denton’s ban on hydraulic fracturing in an attempt to identify images that alter the grid of intelligibility for the audience. The paper includes deliberation about the relative merits, subsequent disadvantages, and possible questions for further study as they relate to the theoretical implications of critical rhetorical analysis as information science. Ultimately, the study identifies poststructuralist critical rhetorical analysis as …
Date: May 2016
Creator: Sykes, Jason
System: The UNT Digital Library
The Information Behavior of Individual Investors in Saudi Arabia (open access)

The Information Behavior of Individual Investors in Saudi Arabia

Information plays a significant role in the success of investment strategies. Within a non-advisory context, individual investors elect to build and manage their investment portfolios to avoid the cost of hiring professional advisors. To cope with markets’ uncertainty, individual investors should acquire, understand, and use only relevant information, but that task can be affected by many factors, such as domain knowledge, cognitive and emotional biases, information overload, sources’ credibility, communication channels’ accuracy, and economic costs. Despite an increased interest in examining the financial performance of individual investors in Saudi Arabia, there has been no empirical research of the information behavior of individual investors, or the behavioral biases affecting the investment decision making process in the Saudi stock market (SSM). The purpose of this study was to examine this information behavior within a non-advisory contextualization of their investment decision-making process through the use of an online questionnaire instrument using close-ended questions. The significant intervening variables identified in this study influence the individual investors’ information behavior across many stages of the decision making process. While controlling for gender, education, and income, the optimal information behavior of individual investors in the SSM showed that the Experience factor had the greatest negative effect on …
Date: May 2016
Creator: Elwani, Nabil Mohammed
System: The UNT Digital Library
Conversational Use of Photographic Images on Facebook: Modeling Visual Thinking on Social Media (open access)

Conversational Use of Photographic Images on Facebook: Modeling Visual Thinking on Social Media

Modeling the "thick description" of photographs began at the intersection of personal and institutional descriptions. Comparing institutional descriptions of particular photos that were also used in personal online conversations was the initial phase. Analyzing conversations that started with a photographic image from the collection of the Library of Congress (LC) or the collection of the Manchester Historic Association (MHA) provided insights into how cultural heritage institutions could enrich the description of photographs by using informal descriptions such as those applied by Facebook users. Taking photos of family members, friends, places, and interesting objects is something people do often in their daily lives. Some photographic images are stored, and some are shared with others in gatherings, occasions, and holidays. Face-to-face conversations about remembering some of the details of photographs and the event they record are themselves rarely recorded. Digital cameras make it easy to share personal photos in Web conversations and to duplicate old photos and share them on the Internet. The World Wide Web even makes it simple to insert images from cultural heritage institutions in order to enhance conversations. Images have been used as tokens within conversations along with the sharing of information and background knowledge about them. The …
Date: May 2016
Creator: Albannai, Talal N.
System: The UNT Digital Library
Information Structures in Notated Music: Statistical Explorations of Composers' Performance Marks in Solo Piano Scores (open access)

Information Structures in Notated Music: Statistical Explorations of Composers' Performance Marks in Solo Piano Scores

Written notation has a long history in many musical traditions and has been particularly important in the composition and performance of Western art music. This study adopted the conceptual view that a musical score consists of two coordinated but separate communication channels: the musical text and a collection of composer-selected performance marks that serve as an interpretive gloss on that text. Structurally, these channels are defined by largely disjoint vocabularies of symbols and words. While the sound structures represented by musical texts are well studied in music theory and analysis, the stylistic patterns of performance marks and how they acquire contextual meaning in performance is an area with fewer theoretical foundations. This quantitative research explored the possibility that composers exhibit recurring patterns in their use of performance marks. Seventeen solo piano sonatas written between 1798 and 1913 by five major composers were analyzed from modern editions by tokenizing and tabulating the types and usage frequencies of their individual performance marks without regard to the associated musical texts. Using analytic methods common in information science, the results demonstrated persistent statistical similarities among the works of each composer and differences among the work groups of different composers. Although based on a small …
Date: May 2016
Creator: Buchanan, J. Paul
System: The UNT Digital Library
Impetuses for First, Second, and Third Year Law Student Information Seeking Behavior, and Perception of Common Knowledge and Citation (open access)

Impetuses for First, Second, and Third Year Law Student Information Seeking Behavior, and Perception of Common Knowledge and Citation

This dissertation examined how previous information literacy training, law student gender, age, and previously obtained education affects first, second, and third year law students selection of information sources, their understanding of common knowledge, and their decision of whether or not to give attribution to these sources. To examine these factors, this study implemented a paradigm called the principle of least effort that contended humans in general tended to complete the least amount of work possible to complete presented tasks. This study sought to discover whether law students follow this same path of completing the least amount of work possible to finish presented tasks, and whether this behavior affects information source selection, citation, and understanding of common knowledge. I performed six focus groups and crafted and disseminated an online survey to examine these factors. Via this data collection, it was discovered that law students do exhibit some differences in understanding of citation and citation behavior based on age and their year in law school. They also exhibited some differences regarding common knowledge based on their year in law school, where they received their information literacy training, and where they attend law school. Yet, no statistically significant differences were discovered regarding where …
Date: May 2016
Creator: Helge, Kris
System: The UNT Digital Library
Rated M for Monkey: An Ethnographic Study of Parental Information Behavior when Assessing Video Game Content for their Children (open access)

Rated M for Monkey: An Ethnographic Study of Parental Information Behavior when Assessing Video Game Content for their Children

Following the decision by the Supreme Court of the United States in Brown v. Entertainment Merchants Association (2011), which struck down the state of California’s appeal to restrict the sale of games deemed to have “deviant violence” to those 18 or older and the court’s recommendation that parents use the ESRB Ratings System instead, this ethnographic study sought to better understand what parents thought of laws on video games and how they used the recommended ratings system. A total of 30 interviews using semi-structured open-ended questions were conducted and analyzed to reveal what parents thought of laws on video games, how they used the ESRB Ratings System to assess video game content, and what other methods they used for video game content assessment in addition to the ratings system. This research utilized Dervin and Nilan’s (1986) sense-making methodology as a way to learn how parents bridged their knowledge gap when it came to learning about video game content and how they made sense of the knowledge gained to determine the content appropriateness for their children. Analyses of the collected data provided the foundation for a model on the effects of the parent-child relationship on parental information behavior.
Date: May 2016
Creator: Harrelson, Diana
System: The UNT Digital Library
Development of an Instrument to Measure the Level of Acceptability and Tolerability of  Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users (open access)

Development of an Instrument to Measure the Level of Acceptability and Tolerability of Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users

Cyber aggression came about as a result of advances in information communication technology and the aggressive usage of the technology in real life. Cyber aggression can take on many forms and facets. However, the main focus of this study is cyberbullying and cyberstalking through information sharing practices that might constitute digital aggressive acts. Human aggression has been extensively investigated. Studies focusing on understanding the causes and effects that can lead to physical and digital aggression have shown the prevalence of cyber aggression in different settings. Moreover, these studies have shown strong relationship between cyber aggression and the physiological and physical trauma on both perpetrators and their victims. Nevertheless, the literature shows a lack of studies that could measure the level of acceptance and tolerance of these dangerous digital acts. This study is divided into two main stages; Stage one is a qualitative pilot study carried out to explore the concept of cyber aggression and its existence in Saudi Arabia. In-depth interviews were conducted with 14 Saudi social media users to collect understanding and meanings of cyber aggression. The researcher followed the Colaizzi’s methods to analyze the descriptive data. A proposed model was generated to describe cyber aggression in social media …
Date: May 2016
Creator: Albar, Ali Aldroos
System: The UNT Digital Library
Understanding the Information Seeking of Pre-Kindergarten Students: An Ethnographic Exploration of Their Seeking Behaviors in a Preschool Setting (open access)

Understanding the Information Seeking of Pre-Kindergarten Students: An Ethnographic Exploration of Their Seeking Behaviors in a Preschool Setting

Although there has been research conducted in the area of information seeking behavior in children, the research focusing on young children, more specifically on pre-kindergarten students, is almost nonexistent. Children at this age are in the preoperational developmental stage. They tend to display curiosity about the world around them, and use other people as a means to gain the information they are seeking. Due to the insistence from President Obama to implement pre-kindergarten programs for all low and middle class children, the need to understand the cognitive, emotional, and physical needs of these children is becoming increasingly imperative. To researchers, the actions displayed by these young children on a daily basis remain vital in determining the methods by which they are categorized, studies, and even taught. This study employed Deci and Ryan's self-determination theory (SDT), Dervin's sense-making theory, Kuhlthau''s information search process model (ISP), and Shenton and Dixon's microcosmic model of information seeking via people to lay the theoretical foundational framework. This ethnographic study aimed to fill the age gap found in information seeking literature. By observing young children in the school setting, I gained insight into how these children seek information. The resulting information collected via field observations and …
Date: August 2016
Creator: Stewart, Sarah Nykole
System: The UNT Digital Library
Journalist as Information Provider: Examining the One-Voice Model of a Corporate Sports Account (open access)

Journalist as Information Provider: Examining the One-Voice Model of a Corporate Sports Account

While journalists were once viewed as gatekeepers, dispensing news and information via one-way communication channels, their role as information provider has evolved. Nowhere is this more apparent than on the social networking site Twitter, where information seekers have unprecedented access to information providers. The two-way communication that these information seekers have come to expect can be challenging for organizations such as ESPN who have multiple Twitter accounts and millions of followers. By designating one team of people as responsible for the organization's largest Twitter account, SportsCenter, ESPN has sought to establish manageable methods of interacting with this account's followers, while furthering the goals of the organization and providing sports news around the clock. This study provides a better understanding of the group responsible for ESPN's SportsCenter Twitter account: the motivation and strategies behind the group's Twitter use as well as the dynamics of this network, such as information flow and collaboration. Relying on the Information Seeking and Communication Model, this study also provides a better understanding of information exchanges with those outside the network, specifically a selection of the account's Twitter followers. Additionally, the role of journalist as information provider and certain themes that emerged from the content of the …
Date: August 2016
Creator: Norris, Tiffany D.
System: The UNT Digital Library
Controlled Vocabularies in the Digital Age: Are They Still Relevant? (open access)

Controlled Vocabularies in the Digital Age: Are They Still Relevant?

Keyword searching and controlled vocabularies such as Library of Congress subject headings (LCSH) proved to work well together in automated technologies and the two systems have been considered complimentary. When the Internet burst onto the information landscape, users embraced the simplicity of keyword searching of this resource while researchers and scholars seemed unable to agree on how best to make use of controlled vocabularies in this huge database. This research looked at a controlled vocabulary, LCSH, in the context of keyword searching of a full text database. The Internet and probably its most used search engine, Google, seemed to have set a standard that users have embraced: a keyword-searchable single search box on an uncluttered web page. Libraries have even introduced federated single search boxes to their web pages, another testimony to the influence of Google. UNT's Thesis and Dissertation digital database was used to compile quantitative data with the results input into an EXCEL spreadsheet. Both Library of Congress subject headings (LCSH) and author-assigned keywords were analyzed within selected dissertations and both systems were compared. When the LCSH terms from the dissertations were quantified, the results showed that from a total of 788 words contained in the 207 LCSH …
Date: August 2017
Creator: Baker, William
System: The UNT Digital Library
Informed Consent in Obstetric Anesthesia: The Effect of the Amount, Timing and Modality of Information on Patient Satisfaction (open access)

Informed Consent in Obstetric Anesthesia: The Effect of the Amount, Timing and Modality of Information on Patient Satisfaction

Using mainly quantitative methods of evaluation, as well as patient comment assessment, this study evaluated whether changing the current informed consent process for labor epidural analgesia to a longer, more informational process resulted in a more satisfied patient. Satisfaction with the labor epidural informed consent process was evaluated using a questionnaire that was mailed and also available online. Half of the patient population was given a written labor epidural risk/benefit document at their 36-week obstetric check up. All patients received the standard informed consent. Survey responses were evaluated based on three independent variables dealing with the modality, timing, amount of informed consent information and one dependent variable, whether the patient's expectations of the epidural were met, which is equated with satisfaction. Patients in this study clearly indicated that they want detailed risk/benefit information on epidural analgesia earlier in their pregnancy. A meaningfully larger percentage of patients who received the written risk/benefit document were satisfied with the epidural process as compared to those who did not receive the document.
Date: December 2008
Creator: Hicks, Michelle, B.
System: The UNT Digital Library
Enhancing User Search Experience in Digital Libraries with Rotated Latent Semantic Indexing (open access)

Enhancing User Search Experience in Digital Libraries with Rotated Latent Semantic Indexing

This study investigates a semi-automatic method for creation of topical labels representing the topical concepts in information objects. The method is called rotated latent semantic indexing (rLSI). rLSI has found application in text mining but has not been used for topical labels generation in digital libraries (DLs). The present study proposes a theoretical model and an evaluation framework which are based on the LSA theory of meaning and investigates rLSI in a DL environment. The proposed evaluation framework for rLSI topical labels is focused on human-information search behavior and satisfaction measures. The experimental systems that utilize those topical labels were built for the purposes of evaluating user satisfaction with the search process. A new instrument was developed for this study and the experiment showed high reliability of the measurement scales and confirmed the construct validity. Data was collected through the information search tasks performed by 122 participants using two experimental systems. A quantitative method of analysis, partial least squares structural equation modeling (PLS-SEM), was used to test a set of research hypotheses and to answer research questions. The results showed a not significant, indirect effect of topical label type on both guidance and satisfaction. The conclusion of the study is …
Date: August 2015
Creator: Polyakov, Serhiy
System: The UNT Digital Library
Adolescent Task Management: Multitasking and Social Media in the Student Search Process (open access)

Adolescent Task Management: Multitasking and Social Media in the Student Search Process

This study examines adolescent students at an American international school and observes student use of social networking programs as well as physical actions in the search process. The study specifically observed multitasking behavior and organizational skills among students, as well as linkages made through social networking sites. Student observations, student interviews, analysis of Facebook entries, and a survey on multitasking yielded rich data. Students appear to be far more organized than previously suggested in the literature, and in this study, the organization proved to be largely self-taught. Students used their social networks to build a kind of group expertise that compensated for their youthful naivety. Students exhibited self-control within the search to the degree that they could focus on what they wanted to find, and they used heuristics—mental shortcuts—to achieve what they needed. Searches also suggest creativity in that students were flexible in their search methods and used a number of tools to gather information. Students could balance the needs of the academic or imposed search with their own online lives, meaning that they made compensations for social media and media multitasking when it was deemed necessary.
Date: August 2013
Creator: Kurtenbach, John
System: The UNT Digital Library
From the Outside In: A Multivariate Correlational Analysis of Effectiveness in Communities of Practice (open access)

From the Outside In: A Multivariate Correlational Analysis of Effectiveness in Communities of Practice

Online communities of practice (CoPs) provide social spaces for people to connect, learn, and engage with one another around shared interests and passions. CoPs are innovatively employed within industry and education for their inherent knowledge management characteristics and as a means of improving professional practice. Measuring the success of a CoP is a challenge researchers are examining through various strategies. Recent literature supports measuring community effectiveness through the perceptions of its members; however, evaluating a community by means of member perception introduces complicating factors from outside the community. In order to gain insight into the importance of external factors, this quantitative study examined the influence of factors in the professional lives of educators on their perceptions of their CoP experience. Through an empirical examination of CoPs employed to connect educators and advance their professional learning, canonical correlation analysis was used to examine correlations between factors believed to be influential on the experiences of community members.
Date: August 2016
Creator: Bomar, Shannon Hulbert
System: The UNT Digital Library
Customers' Attitudes toward Mobile Banking Applications in Saudi Arabia (open access)

Customers' Attitudes toward Mobile Banking Applications in Saudi Arabia

Mobile banking services have changed the design and delivery of financial services and the whole banking sector. Financial service companies employ mobile banking applications as new alternative channels to increase customers' convenience and to reduce costs and maintain profitability. The primary focus of this study was to explore the Saudi bank customers' perceptions about the adoption of mobile banking applications and to test the relationships between the factors that influence mobile banking adoption as independent variables and the action to adopt them as the dependent variable. Saudi customers' perceptions were tested based on the extended versions of IDT, TAM and other diffusion of innovation theories and frameworks to generate a model of constructs that can be used to study the use and the adoption of mobile technology by users. Koenig-Lewis, Palmer, & Moll's (2010) model was used to test its constructs of (1) perceived usefulness, (2) perceived ease of use, (3) perceived compatibility, (4) perceived credibility, (5) perceived trust, (6) perceived risk, and (7) perceived cost, and these were the independent variables in current study. This study revealed a high level of adoption that 82.7% of Saudis had adopted mobile banking applications. Also, the findings of this study identified a …
Date: August 2016
Creator: Alshara, Mohammed Ali
System: The UNT Digital Library