Testing a model of the relationships among organizational performance, IT-business alignment and IT governance. (open access)

Testing a model of the relationships among organizational performance, IT-business alignment and IT governance.

Information Technology (IT) is often viewed as a resource that is capable of enhancing organizational performance. However, it is difficult for organizations to measure the actual contribution of IT investments. Despite an abundance of literature, there is an insufficiency of generally applicable frameworks and instruments to help organizations definitively assess the relationship among organizational performance, IT-business alignment, and IT governance. Previous studies have emphasized IT-business alignment as an important enabler of organizational effectiveness; however, the direct and indirect effects of IT governance have not been incorporated into these studies. The purpose of this study was (1) to propose a new model that defines the relationships among IT governance, IT-business alignment, and organizational performance, (2) to develop and validate measures for the IT governance and IT-business alignment constructs, and (3) to test this IT Governance-Alignment-Performance or "IT GAP" model. This study made some novel contributions to the understanding of the factors affecting organizational performance. The quest for IT-business alignment in the MIS literature has been based on the presumption that IT contributes directly to organizational performance. However, this study found that although IT-business alignment does contribute to organizational performance, IT governance is an important antecedent of both IT-business alignment and organizational …
Date: December 2003
Creator: Sanchez Ortiz, Aurora
System: The UNT Digital Library
Knowledge synthesis in the biomedical literature: Nordihydroguaiaretic acid and breast cancer. (open access)

Knowledge synthesis in the biomedical literature: Nordihydroguaiaretic acid and breast cancer.

This dissertation refines knowledge synthesis from publicly accessible databases, based on the model of D.R. Swanson. Knowledge synthesis endeavors bring together two or more non-interactive literatures to create combinatorial research data on a specific topic. In this endeavor the biomedical literature was searched on the anti-neoplastic agent nordihydroguaiaretic acid (NDGA) for its potential role as a functional food in the chemoprevention of breast cancer. Bibliometric cocitation was utilized to identify complementary but non-interactive literatures in the disciplines of biomedicine and dietary science. The continuing specialization and fragmentation of the cancer literature degenerates the potential usefulness of cross-disciplinary research and information. As the biomedical sciences become more specialized the potential increases for isolation of discoveries and for failures to connect science to the needs of the people. Within the information science discipline several techniques are available to bridge the isolation between discoveries recorded in different sets of literatures. Electronic database searching with combinatorial keyword entries, syllogistic modeling and bibliometric author cocitation analysis are the principle techniques applied in this endeavor. The research questions are addressed to the absence or presence of human in vivo research on breast cancer with the potentially chemopreventative functional food NDGA. Utilizing a syllogistic model the literatures …
Date: December 2003
Creator: Sneed, Wanda A.
System: The UNT Digital Library
Children's Color Association for Digital Image Retrieval. (open access)

Children's Color Association for Digital Image Retrieval.

In the field of information sciences, attention has been focused on developing mature information retrieval systems that abstract information automatically from the contents of information resources, such as books, images and films. As a subset of information retrieval research, content-based image retrieval systems automatically abstract elementary information from images in terms of colors, shapes, and texture. Color is the most commonly used in similarity measurement for content-based image retrieval systems. Human-computer interface design and image retrieval methods benefit from studies based on the understanding of their potential users. Today's children are exposed to digital technology at a very young age, and they will be the major technology users in five to ten years. This study focuses on children's color perception and color association with a controlled set of digital images. The method of survey research was used to gather data for this exploratory study about children's color association from a children's population, third to sixth graders. An online questionnaire with fifteen images was used to collect quantitative data of children's color selections. Face-to-face interviews investigated the rationale and factors affecting the color choices and children's interpretation of the images. The findings in this study indicate that the color children associated …
Date: August 2003
Creator: Chang, Yun-Ke
System: The UNT Digital Library
Accessing Information on the World Wide Web: Predicting Usage Based on Involvement (open access)

Accessing Information on the World Wide Web: Predicting Usage Based on Involvement

Advice for Web designers often includes an admonition to use short, scannable, bullet-pointed text, reflecting the common belief that browsing the Web most often involves scanning rather than reading. Literature from several disciplines focuses on the myriad combinations of factors related to online reading but studies of the users' interests and motivations appear to offer a more promising avenue for understanding how users utilize information on Web pages. This study utilized the modified Personal Involvement Inventory (PII), a ten-item instrument used primarily in the marketing and advertising fields, to measure interest and motivation toward a topic presented on the Web. Two sites were constructed from Reader's Digest Association, Inc. online articles and a program written to track students' use of the site. Behavior was measured by the initial choice of short versus longer versions of the main page, the number of pages visited and the amount of time spent on the site. Data were gathered from students at a small, private university in the southwest part of the United States to answer six hypotheses which posited that subjects with higher involvement in a topic presented on the Web and a more positive attitude toward the Web would tend to select …
Date: May 2003
Creator: Langford, James David
System: The UNT Digital Library
Perceived value of journals for academic prestige, general reading and classroom use: A study of journals in educational and instructional technology. (open access)

Perceived value of journals for academic prestige, general reading and classroom use: A study of journals in educational and instructional technology.

Conducting research, evaluating research, and publishing scholarly works all play an extremely prominent role for university faculty members. Tenure and promotion decisions are greatly influenced by the perceived value of publications as viewed by members of faculty evaluation committees. Faculty members seeking tenure may be limited to publishing in a limited group of journals perceived to be valuable by members of an academic committee. This study attempted to determine the value of various kinds of periodicals (journals, magazines, and e-journals), based on three principal criteria, as perceived by professionals (university faculty, K-12 practitioners, and corporate trainers) in the educational/instructional technology (E/IT) field. The criteria for journal evaluation were Academic Prestige, General Reading, and Classroom Use. The perceived value of journals based on each criterion was compared to determine any significant differences. Members of the Association for Educational Communications and Technology (AECT) were asked to rate 30 journals in the E/IT field using the three criteria. Statistically significant differences were found among ratings in 63% of the journals. The statistical analyses indicated that differences in the perceived value of journals among E/IT professionals across the three criteria (Academic Prestige, General Reading, and Classroom Use) were statistically significant. It is also noted …
Date: May 2003
Creator: Bray, Kaye Evitt
System: The UNT Digital Library
A multi-dimensional entropy model of jazz improvisation for music information retrieval. (open access)

A multi-dimensional entropy model of jazz improvisation for music information retrieval.

Jazz improvisation provides a case context for examining information in music; entropy provides a means for representing music for retrieval. Entropy measures are shown to distinguish between different improvisations on the same theme, thus demonstrating their potential for representing jazz information for analysis and retrieval. The calculated entropy measures are calibrated against human representation by means of a case study of an advanced jazz improvisation course, in which synonyms for "entropy" are frequently used by the instructor. The data sets are examined for insights in music information retrieval, music information behavior, and music representation.
Date: December 2005
Creator: Simon, Scott J.
System: The UNT Digital Library
Knowledge management in times of change: Tacit and explicit knowledge transfers. (open access)

Knowledge management in times of change: Tacit and explicit knowledge transfers.

This study proposed a look at the importance and challenges of knowledge management in times of great change. In order to understand the information phenomena of interest, impacts on knowledge workers and knowledge documents in times of great organizational change, the study is positioned in a major consolidation of state agencies in Texas. It pays special attention to how the changes were perceived by the knowledge workers by interviewing those that were impacted by the changes resulting from the reorganization. The overall goal is to assess knowledge management in times of great organizational change by analyzing the impact of consolidation on knowledge management in Texas's Health and Human Services agencies. The overarching research question is what happened to the knowledge management structure during this time of great change? The first research question was what was the knowledge worker environment during the time of change? The second research question was what was the knowledge management environment of the agencies during the time of change? The last research question was did consolidation of the HHS agencies diminish the ability to transition from tacit to explicit knowledge? Additionally, the study investigates how the bill that mandated the consolidation was covered in the local …
Date: December 2005
Creator: Hall, Heather Leigh
System: The UNT Digital Library

Terrorism as a social information entity: A model for early intervention.

Access: Use of this item is restricted to the UNT Community
This dissertation studies different social aspects of terrorists and terrorist organizations in an effort to better deal with terrorism, especially in the long run. The researcher, who also worked as a Police Captain at Turkish National Police Anti-Terrorism Department, seeks solutions to today's global problem by studying both literature and a Delphi examination of a survey of 1070 imprisoned terrorists. The research questions include questions such as "What are the reasons behind terrorism?", "Why does terrorism occur?", "What ideologies provide the framework for terrorist violence?, "Why do some individuals become terrorists and others do not?" and "Under what conditions will terrorists end their violence?" The results of the study presents the complexity of the terrorism problem as a social experience and impossibility of a single solution or remedy for the global problem of terrorism. The researcher through his examination of the findings of the data, presented that terrorism is a social phenomenon with criminal consequences that needs to be dealt by means of two dimensional approaches. The first is the social dimension of terrorism and the second is the criminal dimension of terrorism. Based on this, the researcher constructed a conceptual model which addresses both of these dimensions under the …
Date: August 2005
Creator: Yayla, Ahmet
System: The UNT Digital Library
Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment. (open access)

Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.

Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem. Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural. Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level. "Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions. Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P). Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of …
Date: August 2005
Creator: Ozeren, Suleyman
System: The UNT Digital Library
A Complex Systems Model for Understanding the Causes of Corruption: Case Study - Turkey (open access)

A Complex Systems Model for Understanding the Causes of Corruption: Case Study - Turkey

It is attempted with this dissertation to draw an explanatory interdisciplinary framework to clarify the causes of systemic corruption. Following an intense review of political sciences, economics, and sociology literatures on the issue, a complex systems theoretical model is constructed. A political system consists of five main components: Society, interest aggregators, legislative, executive and private sector, and the human actors in these domains. It is hypothesized that when the legitimacy level of the system is low and morality of the systemic actors is flawed, selected political, social and economic incentives and opportunities that may exist within the structure of the systemic components might -individually or as a group- trigger corrupt transactions between the actors of the system. If left untouched, corruption might spread through the system by repetition and social learning eventually becoming the source of corruption itself. By eroding the already weak legitimacy and morality, it may increase the risk of corruption even further. This theoretical explanation is used to study causes of systemic corruption in the Turkish political system. Under the guidance of the complex systems theory, initial systemic conditions, -legacy of the predecessor of Turkey Ottoman Empire-, is evaluated first, and then political, social and economic factors …
Date: August 2005
Creator: Yasar, Muhammet Murat
System: The UNT Digital Library
Makeshift Information Constructions: Information Flow and Undercover Police (open access)

Makeshift Information Constructions: Information Flow and Undercover Police

This dissertation presents the social virtual interface (SVI) model, which was born out of a need to develop a viable model of the complex interactions, information flow and information seeking behaviors among undercover officers. The SVI model was created from a combination of various philosophies and models in the literature of information seeking, communication and philosophy. The questions this research paper answers are as follows: 1. Can we make use of models and concepts familiar to or drawn from Information Science to construct a model of undercover police work that effectively represents the large number of entities and relationships? and 2. Will undercover police officers recognize this model as realistic? This study used a descriptive qualitative research method to examine the research questions. An online survey and hard copy survey were distributed to police officers who had worked in an undercover capacity. In addition groups of officers were interviewed about their opinion of the SVI model. The data gathered was analyzed and the model was validated by the results of the survey and interviews.
Date: August 2005
Creator: Aksakal, Baris
System: The UNT Digital Library
The Impact of Predisposition Towards Group Work on Intention to Use a CSCW System (open access)

The Impact of Predisposition Towards Group Work on Intention to Use a CSCW System

Groupware packages are increasingly being used to support content delivery, class discussion, student to student and student to faculty interactions and group work on projects. This research focused on groupware packages that are used to support students who are located in different places, but who are assigned group projects as part of their coursework requirements. In many cases, students are being asked to use unfamiliar technologies that are very different from those that support personal productivity. For example, computer-assisted cooperative work (CSCW) technology is different from other more traditional, stand-alone software applications because it requires the user to interact with the computer as well as other users. However, familiarity with the technology is not the only requirement for successful completion of a group assigned project. For a group to be successful, it must also have a desire to work together on the project. If this pre-requisite is not present within the group, then the technology will only create additional communication and coordination barriers. How much of an impact does each of these factors have on the acceptance of CSCW technology? The significance of this study is threefold. First, this research contributed to how a user's predisposition toward group work affects …
Date: May 2005
Creator: Reyna, Josephine
System: The UNT Digital Library
Discovering a Descriptive Taxonomy of Attributes of Exemplary School Library Websites (open access)

Discovering a Descriptive Taxonomy of Attributes of Exemplary School Library Websites

This descriptive study examines effective online school library practice. A Delphi panel selected a sample of 10 exemplary sites and helped to create two research tools--taxonomies designed to analyze the features and characteristics of school library Websites. Using the expert-identified sites as a sample, a content analysis was conducted to systematically identify site features and characteristics. Anne Clyde's longitudinal content analysis of school library Websites was used as a baseline to examine trends in practice; in addition, the national guidelines document, Information Power: Building Partnerships for Learning, was examined to explore ways in which the traditional mission and roles of school library programs are currently translated online. Results indicated great variation in depth and coverage even among Websites considered exemplary. Sites in the sample are growing more interactive and student-centered, using blogs as supplemental communication strategies. Nevertheless, even these exemplary sites were slow to adopt the advances in technology to meet the learning needs and interests of young adult users. Ideally the study's findings will contribute to understanding of state-of-the-art and will serve to identify trends, as well as serving as a guide to practitioners in planning, developing, and maintaining school library Websites.
Date: August 2007
Creator: Valenza, Joyce Kasman
System: The UNT Digital Library
Reading selection as information seeking behavior: A case study with adolescent girls. (open access)

Reading selection as information seeking behavior: A case study with adolescent girls.

The aim of this research, Reading Selection as Information Seeking Behavior: A Case Study with Adolescent Girls, was to explore how the experience of reading fiction affects adolescent girls aged 13 through 15, and how that experience changes based upon four activities: journaling, blogging, a personal interview, and a focus group session. Each participant reflects upon works of her own choosing that she had recently read. The data is evaluated using content analysis with the goal of developing a relational analysis tool to be used and tested with future research projects. The goal of this research is to use the insights of the field of bibliotherapy together with the insights of the adolescent girls to provide a higher, more robust model of successful information behavior. That is, relevance is a matter of impact on life rather than just a match of subject heading. This work provides a thick description of a set of real world relevancy judgments. This may serve to illuminate theories and practices for bringing each individual seeker together with appropriate documents. This research offers a new model for relevant information seeking behavior associated with selecting works of essential instructional fiction, as well as a new definition for …
Date: August 2007
Creator: Reynolds, Stephanie D.
System: The UNT Digital Library
A Conceptual Map for Understanding the Terrorist Recruitment Process: Observation and Analysis of Turkish Hezbollah Terrorist Organizations. (open access)

A Conceptual Map for Understanding the Terrorist Recruitment Process: Observation and Analysis of Turkish Hezbollah Terrorist Organizations.

Terrorism is a historical problem; however, it becomes one of the biggest problems in 21st century. September 11 and the following Madrid, Istanbul and London attacks showed that it is the most significant problem threatening world peace and security. Governments have started to deal with terrorism by improving security measurements and making new investments to stop terrorism. Most of the governments' and scholars' focus is on immediate threats and causes of terrorism, instead of looking at long-term solutions such as root causes and underlying reasons of terrorism, and the recruitment style of terrorist organizations If terrorist recruitment does not stop, then it is safe to say terrorist activities cannot be stopped. This study focused on the recruitment process by observing two different terrorist organizations, DHKP/C and Turkish Hezbollah. The researcher brings 13 years of field experience and first-person data gathered from inside the terrorist organizations. The research questions of this study were: (i) How can an individual be prevented from joining or carrying out terrorist activities?; (ii) What factors are correlated with joining a terrorist organization?; (iii) What are the recruitment processes of the DHKP/C, PKK, and Turkish Hezbollah?; (iv) Is there any common process of being a member of …
Date: August 2007
Creator: Teymur, Samih
System: The UNT Digital Library
Modeling the role of blogging in librarianship (open access)

Modeling the role of blogging in librarianship

This phenomenological study examines the motivations and experiences of librarians who author professionally-focused Weblogs. I constructed a model of librarianship based on Wilson and Buckland. The results show a close fit between librarian bloggers and the ideals of the field as expressed by two primary library and information science philosophers. A Web survey generated 239 responses to demographic and open-ended questions. Using the results of the survey, I analyzed demographic data and performed a phenomenological analysis of the open-ended questions. A list of category responses was generated from each set of answers via the coding of descriptive words and phrases. Results indicated the motivations of librarian bloggers are based around themes of sharing, participation in community, and enhanced professional development. Respondents reported feeling more connected to the profession and to colleagues across the world because of blogging. Respondents perceived the librarian blogosphere as a community with both positive aspects - feedback, discussion, and support - and negative aspects - insular voices, divides between technologists and librarians, and generational rifts. Respondents also reported an increased ability to keep current, improved writing skills, and opportunities to speak and contribute to professional journals.
Date: August 2007
Creator: Stephens, Michael
System: The UNT Digital Library

Implications of the inclusion of document retrieval systems as actors in a social network.

Access: Use of this item is restricted to the UNT Community
Traditionally, social network analysis (SNA) techniques enable the examination of relationships and the flow of information within networks of human members or groups of humans. This study extended traditional social network analysis to include a nonhuman group member, specifically a document retrieval system. The importance of document retrieval systems as information sources, the changes in business environments that necessitates the use of information and communication technologies, and the attempts to make computer systems more life-like, provide the reasons for considering the information system as a group member. The review of literature for this study does not encompass a single body of knowledge. Instead, several areas combined to inform this study, including social informatics for its consideration of the intersection of people and information technology, network theory and social network analysis, organizations and information, organizational culture, and finally, storytelling in organizations as a means of transferring information. The methodology included distribution of surveys to two small businesses that used the same document retrieval system, followed by semi-structured interviews of selected group members, which allowed elaboration on the survey findings. The group members rated each other and the system on four interaction criteria relating to four social networks of interest, including awareness, …
Date: December 2005
Creator: Macpherson, Janet Robertson
System: The UNT Digital Library