The Acceptance and Use of Cloud Computing Services by Small and Medium Enterprises in Lagos, Nigeria (open access)

The Acceptance and Use of Cloud Computing Services by Small and Medium Enterprises in Lagos, Nigeria

This study explored the acceptance of cloud computing (CC) services by small and medium enterprises (SMEs) in Lagos, Nigeria, which has been missing from CC services literature. It aimed to understand the motivations for adoption, the uses of the services, and the benefits they derive from it. The uses and gratification theory was applied as the theoretic framework for this endeavor. An online survey with close-ended and open-ended questions was distributed to 1200 randomly selected participants through email. In total, 392 valid responses were collected and analyzed using descriptive statistics and categories. The results found that SMEs in Lagos, Nigeria had a low level of awareness and appreciation of CC services. The adoption rate was also low. Unlike their counterparts in other regions, SMEs primary concerns were service downtime, stable power supply, and better internet access. The study found that SMEs were not taking full advantage of the capabilities of CC services. Some sections, however, were doing better than others, such as the information and communications sub-sector. This study suggested that targeted interventions should be conducted to raise the awareness of CC services in SMEs, and to improve their efficient and effective use of CC services. The uses and gratification …
Date: May 2017
Creator: Azogu, Olajumoke Oluwaseye
System: The UNT Digital Library
The Role of Tie Strength in the Diffusion of Complementary and Alternative Medicine Information among Yoga Practitioners (open access)

The Role of Tie Strength in the Diffusion of Complementary and Alternative Medicine Information among Yoga Practitioners

The National Center for Complementary and Integrated Health, National Institutes of Health, U.S. Department of Health and Human Services, has highlighted a need for research to better understand the usage of complementary and alternative medicine practices. The purpose of this study was to investigate the flow of complementary and alternative medicine information among yoga practitioners. The study consisted of 51 yoga practitioners from 7 yoga studio locations. This mixed-methods study used interviews, surveys, and field notes to collect data. Content and social network analyses provided supporting evidence for Rogers' diffusion of innovations theory and Granovetter's strength of weak ties theory. Key findings included a preference for face-to-face communications, students having both strong and weak relationship ties to directors and instructors, and yoga being the top recommended practice. The study suggested that yoga practitioners related to complementary and alternative medicine information through the lens of their friends and relatives, sought information from trusted sources, and used this information to determine which practices were right for them to pursue.
Date: May 2017
Creator: Weaver, Margaret Louise
System: The UNT Digital Library
Exploration of Information Sharing Structures within Makerspaces: A Mixed Methods Case Study of Dallas Makerspace and Its Users (open access)

Exploration of Information Sharing Structures within Makerspaces: A Mixed Methods Case Study of Dallas Makerspace and Its Users

Makerspaces are a popular, new concept being implemented in public, academic, and school libraries, and as stand-alone spaces. The literature reflects the newness of the topic with a limited number of articles and studies and even less about the users of makerspaces themselves. This study explored information sharing behaviors in the Dallas Makerspace as an informal learning environment and described their preferred method of information transfer from one member to another. It employed a mixed methods methodology using surveys, interviews and observations. The study identified how the rules and policies in place at the makerspace influence the information seeking process and how the Dallas Makerspace exchanges information effectively. Dallas Makerspace is one of the largest non-profit work groups in its size, and this research study answers how information is exchanged in an informal environment.
Date: May 2018
Creator: Hadidi, Rachel
System: The UNT Digital Library
The Evolution of Big Data and Its Business Applications (open access)

The Evolution of Big Data and Its Business Applications

The arrival of the Big Data era has become a major topic of discussion in many sectors because of the premises of big data utilizations and its impact on decision-making. It is an interdisciplinary issue that has captured the attention of scholars and created new research opportunities in information science, business, heath care, and many others fields. The problem is the Big Data is not well defined, so that there exists confusion in IT what jobs and skill sets are required in big data area. The problem stems from the newness of the Big Data profession. Because many aspects of the area are unknown, organizations do not yet possess the IT, human, and business resources necessary to cope with and benefit from big data. These organizations include health care, enterprise, logistics, universities, weather forecasting, oil companies, e-business, recruiting agencies etc., and are challenged to deal with high volume, high variety, and high velocity big data to facilitate better decision- making. This research proposes a new way to look at Big Data and Big Data analysis. It helps and meets the theoretical and methodological foundations of Big Data and addresses an increasing demand for more powerful Big Data analysis from the …
Date: May 2018
Creator: Halwani, Marwah Ahmed
System: The UNT Digital Library
A Comparison of Major Factors that Affect Hospital Formulary Decision-Making by Three Groups of Prescribers (open access)

A Comparison of Major Factors that Affect Hospital Formulary Decision-Making by Three Groups of Prescribers

The exponential growth in medical pharmaceuticals and related clinical trials have created a need to better understand the decision-making factors in the processes for developing hospital medication formularies. The purpose of the study was to identify, rank, and compare major factors impacting hospital formulary decision-making among three prescriber groups serving on a hospital's pharmacy and therapeutics (P&T) committee. Prescribers were selected from the University of Texas, MD Anderson Cancer Center which is a large, multi-facility, academic oncology hospital. Specifically, the prescriber groups studied were comprised of physicians, midlevel providers, and pharmacists. A self-administered online survey was disseminated to participants. Seven major hospital formulary decision-making factors were identified in the scientific literature. Study participants were asked to respond to questions about each of the hospital formulary decision-making factors and to rank the various formulary decision-making factors from the factor deemed most important to the factor deemed least important. There are five major conclusions drawn from the study including three similarities and two significant differences among the prescriber groups and factors. Similarities include: (1) the factor "pharmacy staff's evaluation of medical evidence including formulary recommendations" was ranked highest for all three prescriber groups; (2) "evaluation of medications by expert physicians" was ranked …
Date: May 2018
Creator: Spence, James Michael
System: The UNT Digital Library
A Study of Physicians' Serendipitous Knowledge Discovery: An Evaluation of Spark and the IF-SKD Model in a Clinical Setting (open access)

A Study of Physicians' Serendipitous Knowledge Discovery: An Evaluation of Spark and the IF-SKD Model in a Clinical Setting

This research study is conducted to test Workman, Fiszman, Rindflesch and Nahl's information flow-serendipitous knowledge discovery (IF-SKD) model of information behavior, in a clinical care context. To date, there have been few attempts to model the serendipitous knowledge discovery of physicians. Due to the growth and complexity of the biomedical literature, as well as the increasingly specialized nature of medicine, there is a need for advanced systems that can quickly present information and assist physicians to discover new knowledge. The National Library of Medicine's (NLM) Lister Hill Center for Biocommunication's Semantic MEDLINE project is focused on identifying and visualizing semantic relationships in the biomedical literature to support knowledge discovery. This project led to the development of a new information discovery system, Spark. The aim of Spark is to promote serendipitous knowledge discovery by assisting users in maximizing the use of their conceptual short-term memory to iteratively search for, engage, clarify and evaluate information presented from the biomedical literature. Using Spark, this study analyzes the IF- SKD model by capturing and analyzing physician feedback. The McCay-Peet, Toms and Kelloway's Perception of Serendipity and Serendipitous Digital Environment (SDE) questionnaires are used. Results are evaluated to determine whether Spark contributes to physicians' serendipitous …
Date: May 2018
Creator: Hopkins, Mark E
System: The UNT Digital Library

Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust

Access: Use of this item is restricted to the UNT Community
This research contributes to the cloud computing (CC) literature and information science research by addressing the reality of information sharing and storage behavior (ISSB) of the users' personal information via CC. Gathering information about usage also allows this research to address the paradox between the research and practice. Additionally, this research explores the concept of trust and its role in the behavioral change relative to CC. The findings help reconcile the paradox between the two realms. Essay1 develops and tests cloud computing usage model (CCUM) that assesses ISSB. This model considers the main adoption determinants and the main drawbacks of CC. The study measures the main concerns of users found in the literature, perceived security and perceived privacy. The findings prove surprising on these concerns. Using multiple regression to analyze 129 valid survey responses, the results find that CC users are less concerned about the major issues of security and privacy and will use the technology based on peer usage. Essay 2 examines why users ignore the technology issues and elect to replace the traditional mechanisms for handling their personal information. The results of an interview-based study conducted on 11 normal users and 11 IT professionals clarify their perceptions about …
Date: May 2019
Creator: Al Smadi, Duha
System: The UNT Digital Library

The Impact of Sociocultural and Information Communication Technology Adoption Factors on the Everyday Life Information Seeking Behavior of Saudi Students in the United States

Access: Use of this item is restricted to the UNT Community
This study analyzes the sociocultural factors that affect Saudi students in the U.S. as they seek information and explores to what extent these factors impact their everyday life information seeking (ELIS) behavior and their information technology behavior (ITB). The factors in this study illustrate the unique sociocultural values that distinguish Saudi students from other international student groups: gender segregation, emphasis on religion, social support, and utilization of the consultation concept. After collecting data from an online survey, the data from linear regression analyses revealed that only one culture factor (the language barrier) showed a significant impact on Saudi student ELIS in the U.S., while the other factors were not statistically significant. Also, the findings indicated that perceived usefulness (PU) and perceived ease of use (PEU) were statistically significant to the ELIS of Saudi students. Furthermore, the study showed that after academic information, food and drink, entertainment, and health were the top student needs, the top ranking sources for everyday life seeking information were social media and the Internet. The findings of the study help to shed light on a sizable user group. As the fourth largest group of international students in the U.S., Saudi students have been underrepresented in research. …
Date: May 2019
Creator: Alkahtani, Latifah M
System: The UNT Digital Library
Using Diagnostic Decision Support Systems to Reduce Diagnostic Error: A Survey of Critical Care Physicians (open access)

Using Diagnostic Decision Support Systems to Reduce Diagnostic Error: A Survey of Critical Care Physicians

The purpose of this study is to investigate the use of decisions support systems (DSS) by critical care physicians and to address the following questions: Does the use of a decision support system during diagnosis reduce diagnostic error and how are decision support systems used by critical care physicians? There are no studies that address these research questions in a clinical setting. The information assessment method (IAM) was used to guide the development of the survey questions. Critical care physicians from the University of Oklahoma Health Sciences Center were surveyed. Chi squared test for independence was used to determine the relationship between DSS use and diagnostic error rates. There were three main findings of the study: (1) use of a DSS by a critical care physician can decrease diagnostic error by up to 60%; (2) 56% of critical care physicians are using a DSS during diagnosis to learn something new, confirm something they already knew, and/or to reassure themselves; and (3) the increased use of a DSS by critical care physicians can lead to a decrease in the belief of the ability of a DSS to reduce diagnostic error.
Date: May 2020
Creator: Jones, Elizabeth Susann
System: The UNT Digital Library

Factors that Affect HIPAA Compliance: A Bibliometrics Study

According to the U.S. Department of Health and Human Services (HHS), patients and providers do not understand the Health Information Privacy and Accountability Act (HIPAA). Non-compliance with HIPAA is primarily due to confusion, along with insufficient understanding. HSS has taken measures to simplify the language they use to communicate HIPAA, however, they have not taken steps that consider if one's culture, religious and social perspectives, institutional training, credentials, and comprehension of legal terminology affects medical providers and non-clinical administrative personnel's abilities to understand HIPAA. This research uses bibliometrics to examine the literature from January 2010 – September 2020 that addresses HIPAA's use of legal terminology, literacy level, and institutional training, along with religious and social perspectives, and credentials of medical providers and non-clinical administrative personnel. A total of 107 articles were examined, 42 were assigned article influence scores with values that were less than 1.00, which is a below-average influence score for the article. There were 29 articles with values equal to or above 1.00, which translates to an equal or above-average influence score. The remaining 36 articles did not have article influence scores and were assigned values as not available. Results of the review of the literature indicate that …
Date: May 2021
Creator: Drayden, Craig M.
System: The UNT Digital Library

The Scope and Value of Healthcare Data Science Applications

Health disparities are a recognized public health concern and the need to address these disparities remains worthy of bringing new methods that assist in closing the gap. This research examined the effectiveness of data science to highlight health disparities, and to convey the value of data science applications in related health care applications. The goal of this research was accomplished by undertaking a multi-phased and multi-method approach, best represented in three individual essays. In essay one, a systematic literature review assessed the state in current academic literature of data science applications used to explore health disparities and to determine its applicability. The systematic review was guided by the Preferred Reporting Items for Systematic Review and Meta-Analyses (PRISMA) guidelines. Essay two assessed the capacity of data science software to address the effectiveness of these data science technologies in examining health disparities data. This was conducted using KDnuggets data pertaining to analytics, data science, and machine-learning software. The research in this essay demonstrated the potential utility of leading software to perform the kinds of data science operations that can achieve improved care in healthcare networks by addressing health disparities. Essay three provided an appropriate case study to showcase the value data science …
Date: May 2021
Creator: Huerta, Jose Oscar
System: The UNT Digital Library
At the Junction of Dissemination and Implementation: Facilitating Access to Behavior Analytic Research (open access)

At the Junction of Dissemination and Implementation: Facilitating Access to Behavior Analytic Research

Research in scholarly communication is usually limited to the use and dissemination of scientific material by scholars. This excludes the transfer of knowledge from research producers to service providers. Some may argue the primary function of science is to investigate the conditions in the lab so everyday interactions with the environment are more effective and efficient. This is the underlying philosophy of the science of behavior analysis. Comprised of a basic science, an applied science and a philosophy the field of behavior analysis relies on research developments to inform effective practice. Guided by dissemination processes studied in information science, this investigation revealed the content layer in behavior analysis is primarily comprised of journal articles. Ninety four percent of the research artifacts cited in the current content layer are from journal articles. Other dissemination channels used to develop the behavior analytic content layer included scientific magazine articles, oral reports, dissertations and theses, and unpublished manuscripts. The information use environment for professionals in this field is very different than that of the scholars; most professionals do not have access to a university library. Therefore, the research producers are disseminating developments via communication channels some service providers cannot access. This investigation reveals the …
Date: May 2021
Creator: Bank, Nicole L.
System: The UNT Digital Library

Digital Equity in K-12 Education: Conceptualization and Analysis of Students' Digital Opportunity

Although digital equity is a recognized challenge in our K-12 school system, there is little research in using a holistic framework to investigate pre-conditions necessary for K-12 students to participate in digital learning and online processes. A conceptual framework of students' digital opportunity (SDO) is developed to represent the essential components of digital connectivity. The four key components are broadband internet availability, broadband usage, digital device ownership, and speed quality. A composite measure of SDO was created to quantitatively represent and measure the differences across 3,138 counties in the United States. Furthermore, spatial autocorrelation was applied to evaluate if the distribution of the SDO score is associated with geographical characteristics at the county level. The result showed the presence of significant county-level clusters with concentrations of high or low SDO scores. While the spatial analysis provided evidence of where the gaps in digital opportunities are located, there are underlying factors at the micro level that would need further investigation. This study suggests a collective approach between private and public entities to address the K-12 digital equity issue. The necessary conditions presented in the SDO model must be addressed first in order to bring change to K-12 students and schools in …
Date: May 2022
Creator: Jim, Cary Ka Wai
System: The UNT Digital Library

Social Networking Sites Usage Behavior: Trust and Risk Perceptions

This dissertation addresses research questions related to defining user's trust and risk perceptions associated with social networking usage behavior in relation to the repeated privacy and security breaches. The general research question is explored in the dissertation via the conduct of three related studies. The finding from these three investigations are presented in the results section as 3 essays that collectively examine the social networking sites usage behavior. Essay 1 proposes a conceptual model based on the review of multiple breaches. The review provides a conceptual model which is further analyzed using a quantitative survey in the second essay. Essay 2 measures the trust and risk perceptions associated with different sources of information when presented with multiple breaches. This portion of the research used a quantitative method that included surveying of college students from University of North Texas (UNT) to understand the relation between user's trust and risk perceptions. Essay 3 examines the social networking usage behavior on account of repeated privacy and security breaches. This essay uses the insights from the other two essays to identify the usage behavior and how it is affected. The proposed model was tested using a survey questionnaire method. Results show a significant relationship …
Date: May 2022
Creator: Mekala, Nithin Kumar Reddy
System: The UNT Digital Library

Adoption of Wearable Devices by Older Adults

This dissertation is organized in a traditional format while including three essays that address specific research questions. Essay 1 examined the relationship between physical activity and community engagement and their effect on mental well-being among older men and women. Data from National Health and Aging Trends Study (NHATS) from 2018 to 2020 were explored and the posited relationships were tested. This essay provides empirical support that older adults who are reasonably active and involved in the community have greater mental well-being than those who isolate themselves. Essay 2 provides insight into older adults' motivation to improve their physical activity through the use of a fitness tracker. The key finding from this study is that wearables, especially fitness trackers, can significantly facilitate increased physical activity. Essay 3 is a mixed-methods study to understand older adults' perception of the usefulness of fitness trackers and interaction with such devices. Findings suggest that to increase the adoption of fitness trackers among older adults, makers could improve the esthetics and quality of the wristband in addition to the battery life of the tracker.
Date: May 2022
Creator: Enamela, Pranathy
System: The UNT Digital Library
Data Quality Evaluation and Improvement for Machine Learning (open access)

Data Quality Evaluation and Improvement for Machine Learning

In this research the focus is on data-centric AI with a specific concentration on data quality evaluation and improvement for machine learning. We first present a practical framework for data quality evaluation and improvement, using a legal domain as a case study and build a corpus for legal argument mining. We first created an initial corpus with 4,937 instances that were manually labeled. We define five data quality evaluation dimensions: comprehensiveness, correctness, variety, class imbalance, and duplication, and conducted a quantitative evaluation on these dimensions for the legal dataset and two existing datasets in the medical domain for medical concept normalization. The first group of experiments showed that class imbalance and insufficient training data are the two major data quality issues that negatively impacted the quality of the system that was built on the legal corpus. The second group of experiments showed that the overlap between the test datasets and the training datasets, which we defined as "duplication," is the major data quality issue for the two medical corpora. We explore several widely used machine learning methods for data quality improvement. Compared to pseudo-labeling, co-training, and expectation-maximization (EM), generative adversarial network (GAN) is more effective for automated data augmentation, especially …
Date: May 2022
Creator: Chen, Haihua
System: The UNT Digital Library
Life Coaches, Communities of Practice, and Everyday Life Information Seeking and Practices: An Exploratory Case Study (open access)

Life Coaches, Communities of Practice, and Everyday Life Information Seeking and Practices: An Exploratory Case Study

Life coaching is a rapidly expanding industry that focuses on client development, enhancement of life experience, and goal attainment often when clients are experiencing personal, professional, and social change. Online communities of practice (CoPs) provide opportunity for individuals to connect, share experiences, and learn from each other under the auspices of a unifying theme or subject. Since the 1990s, CoPs have spread from education to other areas of business and industry and continue to shape participant professional development. However, the everyday life information seeking and practices of life coaches remains unexplored within information science literature from the perspectives of life coach engagement in seeking information, life coach engagement in CoPs, and life coach interactions with other coaches. The purpose of this research study was to explore life coach perspectives of coaching, the diverse information needs of life coaches, the types and strength of relationships between life coaches and CoPs, the role of coaching certification and/or licensing as contributing to the professionalization of life coaching, and the means of communication exchange by life coaches through information communication technologies. This mixed method study focused on life coaches who self-identify as belonging to a CoP and those that do not. Theoretical frameworks for …
Date: May 2022
Creator: Klein, Janette Dorlene
System: The UNT Digital Library

Antecedents to Reliance on Artificial Intelligence and Predictive Modeling

Artificial intelligence (AI) and predictive modeling are tools used to diagnose a disease, determine how much a home is worth, estimate insurance risks, and detect fraud. AI and predictive modeling are so ubiquitous that they can be why one gets spam and why spam is automatically deleted. Information science integrates interdisciplinary elements of data-driven, behavioral, design, interpretive, and analytical research methodologies to design and understand interactions between digital media, information systems, and humans. This research focuses on the interaction between humans, AI, and predictive models. This research proposes a theoretical framework and a conceptual research model to understand the antecedents to reliance on AI and predictive modeling. The dissertation follows a traditional format that includes three studies. Study 1 employed a deductive quantitative research approach as a survey to model the relationship between trust in science and reliance on formal news sources. Study 2 employed a deductive quantitative research approach as a survey to understand the impact of framing questions and consider an alternative method of measuring society's reliance on science using predictive models. Study 3 employed a deductive quantitative research approach in the form of a survey to posit a new model based on the first two studies. This …
Date: May 2023
Creator: Randall, William Vincent, II
System: The UNT Digital Library
Information Receptivity: The Information-Seeking Behavior and Networking Activity of Women in a Rural Texas County Judicial System (open access)

Information Receptivity: The Information-Seeking Behavior and Networking Activity of Women in a Rural Texas County Judicial System

This study identified the information seeking behavior and networking practices used by members of a specific marginalized population, that of adult female probationers (AFPs) in a rural county in Texas. The study focused on how they seek out information when faced with a self-identified need in their lives. Beyond the basic "food, shelter and clothing" that comes to mind, the respondents find themselves faced with questions not only about the judicial system but also ones involving health care, employment, transportation, child-care, and other. The study utilized a qualitative research approach to gather data about the AFPs' information behavior and networking activities. The AFPs were asked about their information behavior during their time in the judicial system and after that involvement ended, and about their use of three points of information access: personal social network, physical resources, and electronic resources. Data was also gathered from community members (CMs) who have a role either within the judicial system or external to the judicial system. In its findings, the study determined there is no single point of access to a comprehensive listing of resources for the AFPs to utilize, and that AFPs reported seeking information via two ways as based on the type …
Date: May 2023
Creator: Livingston, Jo Ann
System: The UNT Digital Library
Understanding Sociotechnical Factors Impacting Cybersecurity Controls on Mobile Devices and Smartphones at the Individual Level (open access)

Understanding Sociotechnical Factors Impacting Cybersecurity Controls on Mobile Devices and Smartphones at the Individual Level

Technological advances such as mobile technology, big data, and machine learning allow businesses to associate advertisements with consumer behaviors to maximize sales. Thus, information about consumer behavior became the central resource of businesses. Recent discussions and concerns about the emerging economic order centered around capturing consumers' data suggest that more research efforts be allocated to address new challenges in different domains, such as health, education, smart cities, and communication. Research on individual cybersecurity behavior is relatively new and requires more attention in academic research. This study has proposed and validated a cybersecurity behavioral model to enrich our understanding of users' behavioral intention (BI) to use cybersecurity controls. An online survey was used to collect information from University of North Texas (UNT) students to explore various technology usage determinants and specific computer security practices. The instrument measured the actual cybersecurity controls behaviors (ACB) by incorporating technical and social factors. Accordingly, the construct of ACB was created and validated to test how it relates to the participants' behavioral intentions. The findings confirm a large number of the proposed relationships. Additionally, the results show that the model explained a significant amount of variance in the proposed dependent variables BI and ACB. Within the …
Date: May 2023
Creator: Gadi, Abdullah Mohamed Y.
System: The UNT Digital Library

Transdisciplinary Information Flow and Key Challenges of Effective Knowledge Transfer between Expert and Novice

When the need arises to transmute complex and theoretical ideas into practice or communicate them to the uninitiated, there often exists a gap in the levels of understanding between the parties involved. This research examined knowledge transfer between practitioners within the information technology (IT) domain of interest by asking the following questions: what is the relationship between knowledge spaces for IT experts and novices; and what factors impact knowledge transfer among knowledge spaces for IT experts and novices? This study conducted interviews with a range of IT professionals to identify knowledge states that resulted in knowledge spaces for both experts and novice practitioners. A conceptual model was developed to examine the knowledge transfer process between expert and novice practitioners and identify factors affecting both the knowledge space and the knowledge states. The model also takes in consideration external factors such as organization and culture and organizational environment. The results from the study show that leadership and executive skillsets play a major role in characterizing the expert knowledge state. The results also show that knowledge transfer between and among groups was primarily impacted by interest and awareness factors among experts. Among novices, the largest barriers were cultural in nature (e.g., no …
Date: May 2023
Creator: Upchurch, Eric Conrad
System: The UNT Digital Library

Study of Information Behavior of Opportunistic Insiders with Malicious Intent

Enterprises have focused on mechanisms to track insiders who may intentionally exceed and misuse their authorized access. However, there is an opportunity to understand why a trusted individual would want to exploit the trust and seek information with the intent of a malicious outcome. The detection of insider rogue or nefarious activities with information to which a user is already authorized is extremely difficult. Such insider threats require more deliberation than just considering it to be a problem that can be mitigated only by software or hardware enhancements. This research expects to help gain an early understanding of antecedents to such information behavior and provide an opportunity to develop approaches to address relevant character traits which could lead to a higher propensity of information misuse. This research proposes a theoretical framework and a conceptual research model to understand the antecedent factors to opportunistic information-seeking behavior of individuals. The study follows the three-essay format. Essay 1 explores the scholarly literature published about insider behavior to understand information behavior and proposes the theoretical framework for the study. PRISMA methodology was used for the thematic literature review. Essay 2 is a quantitative study of 424 university students surveyed using an online instrument for …
Date: May 2023
Creator: Sinha, Vikas
System: The UNT Digital Library
Designing Archival Collections to Support Language Revitalization: Case Study of the Boro Language Resource (open access)

Designing Archival Collections to Support Language Revitalization: Case Study of the Boro Language Resource

Indigenous communities around the world are losing their languages at accelerating rates to the effects of the climate crisis and global capitalism. To preserve samples of these languages facing endangerment and extinction, samples of language use (e.g., audio-video recordings, photographs, textual transcriptions, translations, and analyses) are created and stored in language archives: repositories intended to provide long-term preservation of and access to language materials. In recent years, archives of all kinds are considering their origins and audiences. With the emergence of the community paradigm of archiving framework, the roles of archivists, communities, and institutions are under re-examination. Language archives too are reflecting this trend, as it becomes more common for speakers of Indigenous languages (also known as language communities) to document and archive their own languages and histories. As the landscape of language archiving expands, we now see increased emphasis on the re-use of archival material, particularly to support language revitalization—efforts to increase and maintain the use of the language. There are calls for language documentation (and, by extension, language archiving) to prioritize revitalization efforts. This dissertation is a case study of one language archive collection: the Boro Language Resource in the Computational Resource for South Asian Languages (CoRSAL) archive. …
Date: May 2023
Creator: Burke, Mary
System: The UNT Digital Library

Development and Utilization of Big Bridge Data for Predicting Deck Condition Rating Using Machine Learning Algorithms

Accurately predicting the deck condition rating of a bridge is crucial for effective maintenance and repair planning. Despite significant research efforts to develop deterioration models, a nationwide model has not been developed. This study aims to identify an appropriate machine learning (ML) algorithm that can accurately predict the deck condition ratings of the nation's bridges. To achieve this, the study collected big bridge data (BBD), which includes NBI, traffic, climate, and hazard data gathered using geospatial information science (GIS) and remote sensing techniques. Two sets of data were collected: a BBD for a single year of 2020 and a historical BBD covering a five-year period from 2016 to 2020. Three ML algorithms, including random forest, eXtreme Gradient Boosting (XGBoost), and Artificial Neural Network (ANN), were trained using 319,404 and 1,246,261 bridge decks in the BBD and the historical BBD, respectively. Results showed that the use of historical BBD significantly improved the performance of the models compared to BBD. Additionally, random forest and XGBoost, trained using the historical BBD, demonstrated higher overall accuracies and average F1 scores than the ANN model. Specifically, the random forest and XGBoost models achieved overall accuracies of 83.4% and 79.4%, respectively, and average F1 scores of …
Date: May 2023
Creator: Fard, Fariba
System: The UNT Digital Library