Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust

Access: Use of this item is restricted to the UNT Community
This research contributes to the cloud computing (CC) literature and information science research by addressing the reality of information sharing and storage behavior (ISSB) of the users' personal information via CC. Gathering information about usage also allows this research to address the paradox between the research and practice. Additionally, this research explores the concept of trust and its role in the behavioral change relative to CC. The findings help reconcile the paradox between the two realms. Essay1 develops and tests cloud computing usage model (CCUM) that assesses ISSB. This model considers the main adoption determinants and the main drawbacks of CC. The study measures the main concerns of users found in the literature, perceived security and perceived privacy. The findings prove surprising on these concerns. Using multiple regression to analyze 129 valid survey responses, the results find that CC users are less concerned about the major issues of security and privacy and will use the technology based on peer usage. Essay 2 examines why users ignore the technology issues and elect to replace the traditional mechanisms for handling their personal information. The results of an interview-based study conducted on 11 normal users and 11 IT professionals clarify their perceptions about …
Date: May 2019
Creator: Al Smadi, Duha
System: The UNT Digital Library
Costly Ignorance: The Denial of Relevance by Job Seekers: A Case Study in Saudi Arabia (open access)

Costly Ignorance: The Denial of Relevance by Job Seekers: A Case Study in Saudi Arabia

Job centers aid businesses seeking qualified employees and assist job seekers to select and contact employment and training services. Job seekers are also offered the opportunity to assess their skills, abilities, qualifications, and readiness. Furthermore, job centers ensure that job seekers are complying with requirements that they must meet to benefit from job assistance programs such as unemployment insurance. Yet, claimants often procrastinate and/or suspend their job search efforts even though such actions can make them lose their free time and entitlements, and more importantly they may lose the opportunity to take advantage of free information, services, training, and financial assistance for getting a job to which they have already made a claim. The current work looks to Chatman's "small worlds" work, Johnson's comprehensive model of information seeking, and Wilson's "costly ignorance" construct for contributions to understanding such behavior. Identification of a particular trait or set of traits of job seekers during periods of unemployment will inform a new Job Seeking Activities Model (JSAM). This study purposely examines job seeker information behavior and the factors which influence job seekers' behavior, in particular, family tangible support as a social norm effect. A mixed method, using questionnaires for job hunting completers and …
Date: December 2016
Creator: Alahmad, Badr Suleman
System: The UNT Digital Library

The Role of Social Media Influencers in Saudis' Domestic Destination Choice

This study aims to find out the impact of the credibility and content quality of social media influencers on the various stages of the customer's journey and the intention to choose a destination for the Saudi tourist. The target segment was Saudis in general, who are 18 years or above. To conduct this study, 618 usable questionnaires were collected. This study tested twenty-two hypotheses. The result of this study showed that the relationship between content quality, expertise, and similarity was significantly positive with the tourist's desire and information searching. As well, the relationship between the tourist's desire and information searching was significantly positive with the intention of choosing a destination. Conservatism, engagement, and gender were tested as moderators. Conservatism was not significant while the engagement was significant. Gender was only significant in the relationship between content quality and the tourist's desire. This study contributes to information and knowledge in the fields of tourism, hospitality, travel, marketing, tourist behavior, information science, and social media. Researchers and those interested in tourist and customer behavior can benefit from the results of this study. In the industrial field, this study will be very useful to the Saudi government, which has recently begun to rely …
Date: July 2023
Creator: Alamer, Mohammed Abdullah I
System: The UNT Digital Library

Understanding the Diffusion of COVID-19-Related Information on Social Media

Very few studies have examined information sentiment and explored other factors that contribute to health information dissemination and sharing. In particular, there is a lack of studies that performed these combined analyses in the modern social network environment during the disease outbreaks, such as with zika, ebola, SARS, or COVID-19. This study aimed to fill the gap in the literature by investigating what drives social media users to widely disseminate health-related information during a pandemic. Diffusion of innovation theory and theory of planned behavior were the basis of the theoretical approach utilized to answer the research questions. The two theories identified antecedents of sharing online health information. Data was collected through an online survey distributed to students in a higher education institution in the United States of America. The study revealed the extent of the relationships between the four major factors derived from the previous literature—attitudes toward sharing, beliefs toward source, peer influence, and information sentiment—and the behavioral intention to share information. The results would support the information science literature by offering and testing a new model that identifies the factors that affect users' intentions to share health information in the social network environment. This study will further the understanding …
Date: August 2021
Creator: Alasmari, Hanan Mohammed
System: The UNT Digital Library

Cyber Addiction and Information Overload and Their Impact on Workplace Productivity

The research examines the relationship between cyber addiction (excessive use of the Internet, CA), information overload (IO), and assesses their impact on workplace productivity. A multi-methods approach is used employing the Internet Addiction Test (IAT) and a quantitative survey design to assess and test the stated hypothesis. The study used random sampling methods targeting 150 respondents from different information technology departments of various organizations. The study hypothesizes that CA and IO have a reciprocal association, which adversely affects workplace productivity and employee performance. From the findings, IAT scores increase with an associated possibility of reporting burnout, fatigue, and other components associated with CA and IO. Also, CA and IO were significantly correlated, as evaluated by the chi-square test, although the same approach did not yield significant associations between CA and perceived internet dependence. Other findings CA components, such as social media use, significantly associated with task postponement and burnout. As well, CA affected IO with substantial impacts on workplace productivity. The paper highlights managerial aspects that organizations should consider in optimizing the output of their staff. Recommendations include wellness programs, altering the leadership and management styles, and sensitizing the employees on the adverse effects caused by the two variables.
Date: December 2023
Creator: Alboulayan, Moneerah Abdulhameed M.
System: The UNT Digital Library
Influence of Social Media on Decision Making of the Kuwait National Assembly Members: Case Study (open access)

Influence of Social Media on Decision Making of the Kuwait National Assembly Members: Case Study

In Kuwait, an increase in the use of social media by the Kuwait National Assembly (KNA) has allowed it members to reach out to the public and so advance their political agenda. This study examines social media influences on the decision making process; addresses the lack of academic research in relation to KNA members; and seeks to understand the extent to which public political engagement using social media might affect the outcome of their decision making. The proposed social media influence model (SMIM) was used to explore the relationships and relative importance of variables influencing legislator decision making in a social media environment. The second decade of the twenty-first century saw a number of major issues emerging in Kuwait. A core mixed method design known as explanatory sequential was applied to multiple sets of data generated during KNA members' 14th (2013-2016) and 15th (2016-2018) terms. These data included Twitter messages (tweets), the KNA Information Center Parliamentary Information System legislation documents, and the news media articles. The sample was drawn from KNA membership, some of which used Twitter to comment on major events with specific hashtags and the Kuwaiti news media articles related to the same. Study results confirm and support …
Date: December 2018
Creator: Alfarhoud, Yousef T.
System: The UNT Digital Library

Security Aspects of Users' Information Sharing on Social Media

This study aims to investigate college students' security awareness of using social media in sharing information. The two theories that have guided this study are the theory of planned behavior (TPB) and the technology acceptance model (TAM). Data was collected from both undergraduate and graduate students from the University of North Texas (UNT) in Denton. The total responses included 380 students from different majors with 291 valid responses for data analysis; The structural equation model (SEM) Lavaan package was used to find out the best fit of the model. A diagonally weighted least squares (DWLS) was used to model the variables as ordinal in this study's analysis as ordinal data made the model fit substantially. The study found that 6 factors: attitude (AB), subjective norm (SN), perceived behavior control (PBC), perceived usefulness (PU), perceived risks (PR), and security awareness (SA) influenced behavior intention (BI). Also, I found that AB was influenced by PR and SA, as well as SN influenced by SA. Self-efficacy (SE) influenced PBC. On the other hand, the study found that controllability (C) did not influence PBC; perhaps, an individual's skills do not interact with social media security settings. Perceived ease of use (PEOU) did not influence …
Date: May 2023
Creator: Alharbi, Mohannad Abdulltef
System: The UNT Digital Library
The Status of the Organization of Knowledge in Cultural Heritage Institutions in Arabian Gulf Countries (open access)

The Status of the Organization of Knowledge in Cultural Heritage Institutions in Arabian Gulf Countries

No published studies to date examined the practices in creation or adoption of metadata in cultural heritage institutions or evaluated metadata in bibliographic databases in the Arabian Gulf counties and assessed its potential interoperability in the aggregation that would provide a central point of access to bibliographic databases of cultural heritage institutions. This exploratory study aimed to address this gap with the goal of: (1) developing understanding of the current state of information representation and knowledge organization in cultural heritage collections in Arabian Gulf countries, and (2) exploring perspectives for future developments such as creating regional large-scale portals similar to Digital Public Library of America, Europeana etc. that facilitate discovery by aggregating metadata and possible barriers to these developments.. The study is focused on a Kuwaiti, Qatari, and Omani libraries, museums, and archives. The mixed-methods research combined semi-structured interviews of the bibliographic database managers at 15 cultural heritage institutions and in-depth content analysis of a sample of 412 metadata records that represent items in these bibliographic databases for accuracy, completeness, consistency, use of knowledge organization systems, etc. This study findings make a research contribution important for evaluating the feasibility and planning of future aggregations of cultural heritage bibliographic databases. Results …
Date: August 2021
Creator: Aljalahmah, Saleh H
System: The UNT Digital Library

The Impact of Sociocultural and Information Communication Technology Adoption Factors on the Everyday Life Information Seeking Behavior of Saudi Students in the United States

Access: Use of this item is restricted to the UNT Community
This study analyzes the sociocultural factors that affect Saudi students in the U.S. as they seek information and explores to what extent these factors impact their everyday life information seeking (ELIS) behavior and their information technology behavior (ITB). The factors in this study illustrate the unique sociocultural values that distinguish Saudi students from other international student groups: gender segregation, emphasis on religion, social support, and utilization of the consultation concept. After collecting data from an online survey, the data from linear regression analyses revealed that only one culture factor (the language barrier) showed a significant impact on Saudi student ELIS in the U.S., while the other factors were not statistically significant. Also, the findings indicated that perceived usefulness (PU) and perceived ease of use (PEU) were statistically significant to the ELIS of Saudi students. Furthermore, the study showed that after academic information, food and drink, entertainment, and health were the top student needs, the top ranking sources for everyday life seeking information were social media and the Internet. The findings of the study help to shed light on a sizable user group. As the fourth largest group of international students in the U.S., Saudi students have been underrepresented in research. …
Date: May 2019
Creator: Alkahtani, Latifah M
System: The UNT Digital Library
Electronic Health Record Systems and Cyber Hygiene: Awareness, Knowledge, and Practices among Physicians in Kuwait (open access)

Electronic Health Record Systems and Cyber Hygiene: Awareness, Knowledge, and Practices among Physicians in Kuwait

This study explored issues related to the adoption and implementation of electronic health record (EHR) systems including building the awareness, knowledge, and experience of physicians toward cyber hygiene. This study used a qualitative research method to assess (a) the barriers to EHR systems adoption and implementation in Kuwait and (b) the level of awareness, knowledge and experiences related to cyber hygiene practices in Kuwait. The findings of the study supported the conceptual framework used to guide the research of the factors impacting the adoption and implementation of EHR systems in Kuwait as well as explore the level of awareness, knowledge, and experience of physicians about both EHR systems and cyber hygiene. The results from the systematic literature review analysis identified seven major barriers. These are financial barriers, time, difficulty of using technology, lack of support, negative attitude, legal and ethical (policies), and cultural barriers. The findings from the semistructured interviews supported the literature findings and provided more in-depth insights into the structural and social issues affecting the adoption and implementation of EHR systems. Given that Kuwait is a member of the Gulf Cooperation Countries (GCC), the results from the literature analysis showed that the problems in Kuwait are similar to …
Date: December 2022
Creator: Alkhaledi, Reem
System: The UNT Digital Library
Modeling Email Phishing Attacks (open access)

Modeling Email Phishing Attacks

Cheating, beguiling, and misleading information exist all around us; understanding deception and its consequences is crucial in our information environment. This study investigates deception in phishing emails that successfully bypassed Microsoft 365 filtering system. We devised a model that explains why some people are deceived and how targeted individuals and organizations can prevent or counter attacks. The theoretical framework used in this study is Anderson's functional ontology construction (FOC). The methodology involves quantitative and qualitative descriptive design, where the data source is the set of phishing emails archived from a Tier 1 University. We looked for term frequency-inverse document frequency (Tf-idf) and the distribution of words over documents (topic modeling) and found the subjects of phishing emails that targeted educational organizations are related to finances, jobs, and technologies. Also, our analysis shows the phishing emails in the dataset come under six categories; reward, urgency, curiosity, fear, job, and entertainment. Results indicate that staff and students were primarily targeted, and a list of the most used verbs for deception was compiled. We uncovered the stimuli being used by scammers and types of reinforcements used to misinform the target to ensure successful trapping via phishing emails. We identified how scammers pick their …
Date: December 2021
Creator: Almoqbil, Abdullah
System: The UNT Digital Library
The Use of Smartphone Applications for Learning Purposes among Saudi Students (open access)

The Use of Smartphone Applications for Learning Purposes among Saudi Students

The purpose of the current study was to confirm or dismiss Saudi students' behavioral intention with regard to using smartphone applications for learning purposes. A quantitative, non-experimental survey research design and descriptive research conducted on the determinants -performance expectancy, effort expectancy, and social influence- that predict Saudi students' intention at University of North Texas to use smartphone applications for learning purposes, based on the unified theory of acceptance and use of technology (UTAUT) as the framework. This study aims at filling gap found in understanding of students' intentions and their behaviors regarding the adoption and use of the Smartphone applications. Data was collected by means of an online questionnaire. The hypothesized model validated empirically using data collected from around 234 Saudi students who enrolled at University of North Texas. The model developed from UTAUT explained 50.1% of the variance of behavioral intention, and behavioral intentions explained 13.6% of the variance of usage behavior. The result of this study support that the determinants of performance expectancy, effort expectancy, and facilitating conditions were the highest predictors of behavioral intentions in using smartphone applications for learning purposes. The results of this study could encourage students, educators, and the Saudi Arabia Ministry of Education …
Date: August 2020
Creator: Alomran, Amal I
System: The UNT Digital Library

Social Exchange Theory in the Context of X (Twitter) and Facebook Social Media Platforms with a Focus on Privacy Concerns among Saudi Students

The current research examines the use of social media and its security settings using the Social Exchange Theory (SET) within a Saudi student environment. This research includes an introduction, literature review, methodology, results, and conclusion with the results section presenting the findings from the three essays. The first essay employs the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) methodology of SET. PRISMA's systematic and exhaustive approach to literature evaluation increases the likelihood of obtaining high-quality, reproducible findings. In the second essay, which focuses on awareness of X's (Twitter) security settings, a quantitative research approach was utilized. A sample of former and current Saudi students (graduate and undergraduate) at the University of North Texas participated in the investigation. This research provides an empirical examination of the use of X (Twitter) and its security features within this community by employing statistical analysis of the data from respondents. Likewise, the same sample of Saudi students from the University of North Texas was used for the third essay in which the use of Facebook's security settings was examined. Having a consistent sample across both studies enables a comparison and a greater understanding of the security awareness and practices of this group across …
Date: December 2023
Creator: Alqahtani, Sameer Mohammed S.
System: The UNT Digital Library

Information-Seeking Behaviors of Rural Community-Based Hospice Social Workers during a Pandemic: Challenges and Opportunities

When it comes to hospice care, patients and their families residing in rural counties need competent rural community-based hospice social workers on their team. The study of information seeking behaviors of rural community-based hospice social workers during the global COVID-19 pandemic is significant as there is a need to fill gaps regarding how this specific medical discipline performs their job responsibilities when duties become more complicated due to evolving infection control protocols, decreased direct access to patients, and poor internet services. Community-based rural hospice social workers rely on up-to-date information and resources when providing support services to patients and their families. This has become particularly important during the global pandemic COVID-19. Utilizing Chatman's small world theory, this research lends itself to community-based hospice social workers identifying solutions to the challenges of finding timely and accurate COVID-19 information and resources for hospice patients and their families. Purposive sampling, semi-structured interviews, and qualitative social network analysis (SNA) with ATLAS.ti comprise the methodology for this research. The purpose of this study is to investigate the information seeking behaviors of community-based hospice rural social workers in order to understand how they select their COVID-19 information resources.
Date: May 2023
Creator: Alvarado, Angela
System: The UNT Digital Library
An Analysis of Student Perceptions of Teaching Effectiveness for Instructors Who Teach the Same Course in the Same Semester in Both Online and Face-to-Face Formats (open access)

An Analysis of Student Perceptions of Teaching Effectiveness for Instructors Who Teach the Same Course in the Same Semester in Both Online and Face-to-Face Formats

There is an increasingly number of students taking online classes in lieu of or in addition to the traditional face-to-face format. With this trend, there are questions that naturally come to the surface. The biggest question being "is teaching in the online arena just as effective as the face-to-face arena?" This dissertation aims to pursue that line of questioning by analyzing students' perceptions of the teaching effectiveness for instructors who teach the same course in both an online and face-to-face format in the same semester. The data are analyzed through the lens of the social capital theory. Social capital has never been applied to the classroom before as its focus has traditionally been on community development. However, social capital theory addresses interpersonal relationships and their impact on knowledge sharing behavior. This theory identifies three dimensions, which appear to have a parallel track with the student evaluation components; each is analyzed against each other. These dimensions include structured, cognitive and relational and are compared to the components of the student evaluation tool, which includes organization and explanation of materials, learning environment and self-regulated learning.
Date: December 2019
Creator: Asher, Donna Brooks
System: The UNT Digital Library
User Privacy Perception and Concerns Regarding the Use of Cloud-Based Assistants (open access)

User Privacy Perception and Concerns Regarding the Use of Cloud-Based Assistants

Cloud-based assistants like the Google Home and the Amazon Alexa have become ubiquitous in our homes. Users can simply communicate with the devices using a smartphone application. There are privacy concerns associated with cloud-based assistants. For example, users do not know what type of information is being sent to the device manufacturer, if the device is stealthily listening to conversations, data retention, or who else has access to the data. Privacy is about perception. The goal of this study is to determine user privacy concerns regarding cloud-based assistants by adopting a quantitative research method. The study used a privacy decision framework that lists three core components, which are technology controls, understanding user privacy preference, and government regulations. The research used Dervin's sensemaking model to describe users' privacy perception using the privacy decision framework and improved on a privacy perception survey instrument from previous dissertations. An understanding of user privacy concerns with cloud-based assistants is required to provide a comprehensive privacy guidance to stakeholders. The significance of this study is in the identification of the privacy perception of users of cloud-based assistants and the extent to which the components of the theoretical framework can impact user privacy perception. The results of …
Date: December 2020
Creator: Awojobi, Abiodun
System: The UNT Digital Library
The Acceptance and Use of Cloud Computing Services by Small and Medium Enterprises in Lagos, Nigeria (open access)

The Acceptance and Use of Cloud Computing Services by Small and Medium Enterprises in Lagos, Nigeria

This study explored the acceptance of cloud computing (CC) services by small and medium enterprises (SMEs) in Lagos, Nigeria, which has been missing from CC services literature. It aimed to understand the motivations for adoption, the uses of the services, and the benefits they derive from it. The uses and gratification theory was applied as the theoretic framework for this endeavor. An online survey with close-ended and open-ended questions was distributed to 1200 randomly selected participants through email. In total, 392 valid responses were collected and analyzed using descriptive statistics and categories. The results found that SMEs in Lagos, Nigeria had a low level of awareness and appreciation of CC services. The adoption rate was also low. Unlike their counterparts in other regions, SMEs primary concerns were service downtime, stable power supply, and better internet access. The study found that SMEs were not taking full advantage of the capabilities of CC services. Some sections, however, were doing better than others, such as the information and communications sub-sector. This study suggested that targeted interventions should be conducted to raise the awareness of CC services in SMEs, and to improve their efficient and effective use of CC services. The uses and gratification …
Date: May 2017
Creator: Azogu, Olajumoke Oluwaseye
System: The UNT Digital Library
At the Junction of Dissemination and Implementation: Facilitating Access to Behavior Analytic Research (open access)

At the Junction of Dissemination and Implementation: Facilitating Access to Behavior Analytic Research

Research in scholarly communication is usually limited to the use and dissemination of scientific material by scholars. This excludes the transfer of knowledge from research producers to service providers. Some may argue the primary function of science is to investigate the conditions in the lab so everyday interactions with the environment are more effective and efficient. This is the underlying philosophy of the science of behavior analysis. Comprised of a basic science, an applied science and a philosophy the field of behavior analysis relies on research developments to inform effective practice. Guided by dissemination processes studied in information science, this investigation revealed the content layer in behavior analysis is primarily comprised of journal articles. Ninety four percent of the research artifacts cited in the current content layer are from journal articles. Other dissemination channels used to develop the behavior analytic content layer included scientific magazine articles, oral reports, dissertations and theses, and unpublished manuscripts. The information use environment for professionals in this field is very different than that of the scholars; most professionals do not have access to a university library. Therefore, the research producers are disseminating developments via communication channels some service providers cannot access. This investigation reveals the …
Date: May 2021
Creator: Bank, Nicole L.
System: The UNT Digital Library

Weight Initialization for Convolutional Neural Networks Using Unsupervised Machine Learning

The goal of this work is to improve the robustness and generalization of deep learning models, using a similar approach to the unsupervised "innate learning" strategy in visual development. A series of research studies are presented to demonstrate how an unsupervised machine learning efficient coding approach can create filters similar to the receptive fields of the primary visual cortex (V1) in the brain, and these filters are capable of pretraining convolutional neural networks (CNNs) to enable faster training times and higher accuracy with less dependency on the source data. Independent component analysis (ICA) is used for unsupervised feature extraction as it has shown success in both applied machine learning and modeling biological neural receptive fields. This pretraining applies equally well to various forms of visual input, including natural color images, black and white, binocular, and video to drive the V1-like Gabor filters in the brain. For efficient processing of typical visual scenes, the filters that ICA produces are developed by encoding natural images. These filters are then used to initialize the kernels in the first layer of a CNN to train on the CIFAR-10 dataset to perform image classification. Results show that the ICA initialization for a custom made CNN …
Date: August 2022
Creator: Behpour, Sahar
System: The UNT Digital Library
Bridging the Theory-to-practice Gap: a Multivariate Correlational Study Exploring the Effects of a Graduate Online Learning Environment As a Community of Practice Framework (open access)

Bridging the Theory-to-practice Gap: a Multivariate Correlational Study Exploring the Effects of a Graduate Online Learning Environment As a Community of Practice Framework

In this multivariate correlational study, the researcher examined the course culture of an online graduate course whose environment exhibited characteristics of a Community of practice (CoP). An online survey captured data used to explore the relationships among variables shown to describe a CoP in field environments and among student perceptions of their experience in the course culture. A canonical correlation analysis (CCA) and commonality analysis (CA) were conducted using five predictor variables and three criterion variables to evaluate the degree and direction of the relationships. The CCA revealed that the full model was significant, explaining approximately 74% of the variance among the two synthetic variates. Impact, faculty leadership, and connection were the largest contributors to the predictor variate. The criterion variate was primarily explained by value and perceived CoP, with exposure to the profession providing a smaller contribution. The CA confirmed these findings. Results from this study indicate that a CoP could be fostered in an online graduate course. The overall significance of the model indicates teachers can nurture an environment wherein graduate students will take the initiative to work with others to create and acquire knowledge that creates a sense of professional connection with each other and with the …
Date: December 2013
Creator: Bone, Tonda Jenean
System: The UNT Digital Library

Examination of Online Health Information Seeking Effectiveness: Case Studies of Online Health Communities in COPD Patients

When people access online health information, unfortunately, they have access to both clinically accurate and inaccurate information that they may then utilize to make informed personal health decisions. This research fills a gap in the literature of online health communities as they relate to chronic obstructive pulmonary disease (COPD). The conduct of this research required a multi-phased and multi-method approach, best presented in three distinct essays. In Essays 1 and 2, data gathering within two online health communities specific to COPD allowed this study to address three research questions: (1) what are the information needs of COPD patients that result in their participation in online health communities; (2) what are the information sources offered to the participants in these online communities; and (3) is the information obtained via those communities credible. Essay 1 harvested data from a moderated website hosted by a non-profit organization for patients with COPD and Essay 2 harvested data from a non-moderated Facebook group also serving this unique group. Data Miner, a Chrome extension designed to extract data, was used to collect data, key words and themes which brought an understanding of the health information needs of participants and identified what health information sources were preferred. …
Date: December 2020
Creator: Boyce, LeAnn Kendetta
System: The UNT Digital Library
Designing Archival Collections to Support Language Revitalization: Case Study of the Boro Language Resource (open access)

Designing Archival Collections to Support Language Revitalization: Case Study of the Boro Language Resource

Indigenous communities around the world are losing their languages at accelerating rates to the effects of the climate crisis and global capitalism. To preserve samples of these languages facing endangerment and extinction, samples of language use (e.g., audio-video recordings, photographs, textual transcriptions, translations, and analyses) are created and stored in language archives: repositories intended to provide long-term preservation of and access to language materials. In recent years, archives of all kinds are considering their origins and audiences. With the emergence of the community paradigm of archiving framework, the roles of archivists, communities, and institutions are under re-examination. Language archives too are reflecting this trend, as it becomes more common for speakers of Indigenous languages (also known as language communities) to document and archive their own languages and histories. As the landscape of language archiving expands, we now see increased emphasis on the re-use of archival material, particularly to support language revitalization—efforts to increase and maintain the use of the language. There are calls for language documentation (and, by extension, language archiving) to prioritize revitalization efforts. This dissertation is a case study of one language archive collection: the Boro Language Resource in the Computational Resource for South Asian Languages (CoRSAL) archive. …
Date: May 2023
Creator: Burke, Mary
System: The UNT Digital Library
The Effects of Student-Perceived Instructor Demotivating Behaviors on Doctoral Students' Information Seeking Behaviors (open access)

The Effects of Student-Perceived Instructor Demotivating Behaviors on Doctoral Students' Information Seeking Behaviors

In their studies on student motivation in th4e 1990s, Gorham & Christophel and Christophel & Gorham found that students perceived their own demotivation to be caused by instructor behaviors. While there are studies that explore the topic of student demotivation and other studies that illustrate the great influence instructors have on student information seeking behaviors, research focusing on the connection between these two concepts is almost nonexistent. Using Gorham & Christophel's concept of instructor-owned student demotivation, this mixed-methods study sought to identify which instructor behaviors doctoral computer science and information science students found demotivating and to what extent their perceptions of these demotivating instructor behaviors influenced their information seeking behaviors in a face-to-face classroom. Demographic and student-perceived demotivating instructor behavior surveys along with semi-structured interviews and follow-up questions were used to collect data. The surveys will be analyzed using descriptive statistics in Excel, and the semi-structured interviews and follow up questions were analyzed using content analysis and Colaizzi's method of phenomenological enquiry in NVivo. The findings showed that instructor demotivating behaviors not only influence student information seeking behaviors in the classroom, but they also can lead to lasting effects on the student. In addition, the participants have expectations of instructor …
Date: December 2016
Creator: Cantu, Brenda Ann
System: The UNT Digital Library
Data Quality Evaluation and Improvement for Machine Learning (open access)

Data Quality Evaluation and Improvement for Machine Learning

In this research the focus is on data-centric AI with a specific concentration on data quality evaluation and improvement for machine learning. We first present a practical framework for data quality evaluation and improvement, using a legal domain as a case study and build a corpus for legal argument mining. We first created an initial corpus with 4,937 instances that were manually labeled. We define five data quality evaluation dimensions: comprehensiveness, correctness, variety, class imbalance, and duplication, and conducted a quantitative evaluation on these dimensions for the legal dataset and two existing datasets in the medical domain for medical concept normalization. The first group of experiments showed that class imbalance and insufficient training data are the two major data quality issues that negatively impacted the quality of the system that was built on the legal corpus. The second group of experiments showed that the overlap between the test datasets and the training datasets, which we defined as "duplication," is the major data quality issue for the two medical corpora. We explore several widely used machine learning methods for data quality improvement. Compared to pseudo-labeling, co-training, and expectation-maximization (EM), generative adversarial network (GAN) is more effective for automated data augmentation, especially …
Date: May 2022
Creator: Chen, Haihua
System: The UNT Digital Library