Adolescent Task Management: Multitasking and Social Media in the Student Search Process (open access)

Adolescent Task Management: Multitasking and Social Media in the Student Search Process

This study examines adolescent students at an American international school and observes student use of social networking programs as well as physical actions in the search process. The study specifically observed multitasking behavior and organizational skills among students, as well as linkages made through social networking sites. Student observations, student interviews, analysis of Facebook entries, and a survey on multitasking yielded rich data. Students appear to be far more organized than previously suggested in the literature, and in this study, the organization proved to be largely self-taught. Students used their social networks to build a kind of group expertise that compensated for their youthful naivety. Students exhibited self-control within the search to the degree that they could focus on what they wanted to find, and they used heuristics—mental shortcuts—to achieve what they needed. Searches also suggest creativity in that students were flexible in their search methods and used a number of tools to gather information. Students could balance the needs of the academic or imposed search with their own online lives, meaning that they made compensations for social media and media multitasking when it was deemed necessary.
Date: August 2013
Creator: Kurtenbach, John
System: The UNT Digital Library
The Adoption of Open Source Software in Uganda: a Pragmatist Approach to the Formation of a National Information Policy for a New Technology (open access)

The Adoption of Open Source Software in Uganda: a Pragmatist Approach to the Formation of a National Information Policy for a New Technology

This exploratory research examined an information policy formation process for the adoption of open source software (OSS) in Uganda. Grounded in a pragmatist tradition, this theoretical and empirical study pursued a qualitative research approach with a triangulation of theoretical concepts, data collection, and analysis techniques in an iterative and interactive process. The design provided a powerful context to develop and conduct field activities in Kampala with a purposeful sample of 22 participants, 20 in interviews and 5 in a focus group discussion. The research design enhanced consistency in the evidence from the data, increased robustness in the results, and confidence in the findings. The results highlighted a vibrant ICT sector in Uganda, underlined the multiple stakeholders and their competing interests in the policy, revealed a lack of consensus between the government and OSS promoters on the meaning of OSS, and illuminated the benefits in the OSS model over proprietary software. The stakeholders' conflicting perceptions appear to be too far apart to allow meaningful progress and are derailing the policy. Unless their conflicting perceptions are resolved, the OSS policy will continue stagnating. The study fills critical information gaps in Uganda’s policy formation processes, provides timely and relevant information to holistically understand …
Date: May 2014
Creator: Muwanguzi, Samuel
System: The UNT Digital Library
Assessing Terrorist Cyber Threats: Engineering a Functional Construct (open access)

Assessing Terrorist Cyber Threats: Engineering a Functional Construct

Terrorist organizations and individuals make use of the Internet for supportive activities such as communication, recruiting, financing, training, and planning operations. However, little is known about the level of computer-based (“cyber”) threat such terrorist organizations and individuals pose. One step in facilitating the examination and assessment of the level of cyber threat posed by terrorist organizations and individuals is development of an assessment tool or methodology. This tool would guide intelligence collection efforts and would support and facilitate comparative assessment of the cyber threat posed by terrorist organizations and individuals through the provision of a consistent method of assessment across time, amongst organizations and individuals, and between analysts. This study leveraged the professional experience of experts to engineer a new functional construct – a structured analytical technique designed to assess the cyber threat posed by terrorist entities and individuals. The resultant instrument was a novel structured analytical construct that uses defined indicators of a terrorist organization/individual’s intent to carry out cyber attacks, and their capability to actually do so as measures of an organization/individual’s overall level of cyber threat.
Date: December 2014
Creator: Morgan, Deanne
System: The UNT Digital Library
Automatic Language Identification for Metadata Records: Measuring the Effectiveness of Various Approaches (open access)

Automatic Language Identification for Metadata Records: Measuring the Effectiveness of Various Approaches

Automatic language identification has been applied to short texts such as queries in information retrieval, but it has not yet been applied to metadata records. Applying this technology to metadata records, particularly their title elements, would enable creators of metadata records to obtain a value for the language element, which is often left blank due to a lack of linguistic expertise. It would also enable the addition of the language value to existing metadata records that currently lack a language value. Titles lend themselves to the problem of language identification mainly due to their shortness, a factor which increases the difficulty of accurately identifying a language. This study implemented four proven approaches to language identification as well as one open-source approach on a collection of multilingual titles of books and movies. Of the five approaches considered, a reduced N-gram frequency profile and distance measure approach outperformed all others, accurately identifying over 83% of all titles in the collection. Future plans are to offer this technology to curators of digital collections for use.
Date: May 2015
Creator: Knudson, Ryan Charles
System: The UNT Digital Library
Controlled Vocabularies in the Digital Age: Are They Still Relevant? (open access)

Controlled Vocabularies in the Digital Age: Are They Still Relevant?

Keyword searching and controlled vocabularies such as Library of Congress subject headings (LCSH) proved to work well together in automated technologies and the two systems have been considered complimentary. When the Internet burst onto the information landscape, users embraced the simplicity of keyword searching of this resource while researchers and scholars seemed unable to agree on how best to make use of controlled vocabularies in this huge database. This research looked at a controlled vocabulary, LCSH, in the context of keyword searching of a full text database. The Internet and probably its most used search engine, Google, seemed to have set a standard that users have embraced: a keyword-searchable single search box on an uncluttered web page. Libraries have even introduced federated single search boxes to their web pages, another testimony to the influence of Google. UNT's Thesis and Dissertation digital database was used to compile quantitative data with the results input into an EXCEL spreadsheet. Both Library of Congress subject headings (LCSH) and author-assigned keywords were analyzed within selected dissertations and both systems were compared. When the LCSH terms from the dissertations were quantified, the results showed that from a total of 788 words contained in the 207 LCSH …
Date: August 2017
Creator: Baker, William
System: The UNT Digital Library
Convenience to the Cataloger or Convenience to the User?: An Exploratory Study of Catalogers’ Judgment (open access)

Convenience to the Cataloger or Convenience to the User?: An Exploratory Study of Catalogers’ Judgment

This mixed-method study explored cataloger’s judgment through the presence of text as entered by catalogers for the 11 electronic resource items during the National Libraries test for Resource Description and Access (RDA). Although the literature discusses cataloger’s judgment and suggests that cataloging practice based on new cataloging code RDA will more heavily rely on cataloger’s judgment, the topic of cataloger’s judgment in RDA cataloging was not formally studied. The purpose of this study was to study the differences and similarities in the MARC records created as a part of the RDA National Test and to determine if the theory of bounded rationality could explain cataloger’s judgment based on the constructs of cognitive and temporal limits. This goal was addressed through a content analysis of the MARC records and various statistical tests (Pearson’s Chi-square, Fisher’s Exact, and Cramer’s V). Analysis of 217 MARC records was performed on seven elements of the bibliographic record. This study found that there were both similarities and differences among the various groups of participants, and there are indications that both support and refute the assertion that catalogers make decisions based on the constructs of time and cognitive ability. Future research is needed to be able to …
Date: May 2015
Creator: Hasenyager, Richard Lee, Jr.
System: The UNT Digital Library
Conversational Use of Photographic Images on Facebook: Modeling Visual Thinking on Social Media (open access)

Conversational Use of Photographic Images on Facebook: Modeling Visual Thinking on Social Media

Modeling the "thick description" of photographs began at the intersection of personal and institutional descriptions. Comparing institutional descriptions of particular photos that were also used in personal online conversations was the initial phase. Analyzing conversations that started with a photographic image from the collection of the Library of Congress (LC) or the collection of the Manchester Historic Association (MHA) provided insights into how cultural heritage institutions could enrich the description of photographs by using informal descriptions such as those applied by Facebook users. Taking photos of family members, friends, places, and interesting objects is something people do often in their daily lives. Some photographic images are stored, and some are shared with others in gatherings, occasions, and holidays. Face-to-face conversations about remembering some of the details of photographs and the event they record are themselves rarely recorded. Digital cameras make it easy to share personal photos in Web conversations and to duplicate old photos and share them on the Internet. The World Wide Web even makes it simple to insert images from cultural heritage institutions in order to enhance conversations. Images have been used as tokens within conversations along with the sharing of information and background knowledge about them. The …
Date: May 2016
Creator: Albannai, Talal N.
System: The UNT Digital Library
Customers' Attitudes toward Mobile Banking Applications in Saudi Arabia (open access)

Customers' Attitudes toward Mobile Banking Applications in Saudi Arabia

Mobile banking services have changed the design and delivery of financial services and the whole banking sector. Financial service companies employ mobile banking applications as new alternative channels to increase customers' convenience and to reduce costs and maintain profitability. The primary focus of this study was to explore the Saudi bank customers' perceptions about the adoption of mobile banking applications and to test the relationships between the factors that influence mobile banking adoption as independent variables and the action to adopt them as the dependent variable. Saudi customers' perceptions were tested based on the extended versions of IDT, TAM and other diffusion of innovation theories and frameworks to generate a model of constructs that can be used to study the use and the adoption of mobile technology by users. Koenig-Lewis, Palmer, & Moll's (2010) model was used to test its constructs of (1) perceived usefulness, (2) perceived ease of use, (3) perceived compatibility, (4) perceived credibility, (5) perceived trust, (6) perceived risk, and (7) perceived cost, and these were the independent variables in current study. This study revealed a high level of adoption that 82.7% of Saudis had adopted mobile banking applications. Also, the findings of this study identified a …
Date: August 2016
Creator: Alshara, Mohammed Ali
System: The UNT Digital Library
The Denial of Relevance: Biography of a Quest(ion) Amidst the Min(d)fields—Groping and Stumbling (open access)

The Denial of Relevance: Biography of a Quest(ion) Amidst the Min(d)fields—Groping and Stumbling

Early research on just why it might be the case that “the mass of men lead lives of quiet desperation” suggested that denial of relevance was a significant factor. Asking why denial of relevance would be significant and how it might be resolved began to raise issues of the very nature of questions. Pursuing the nature of questions, in light of denial of relevance and Thoreau’s “quiet desperation” provoked a journey of modeling questions and constructing a biography of the initial question of this research and its evolution. Engaging literature from philosophy, neuroscience, and retrieval then combined with deep interviews of successful lawyers to render a thick, biographical model of questioning.
Date: August 2014
Creator: VanBebber, Marion Turner
System: The UNT Digital Library
Development and Validation of an Instrument to Operationalize Information System Requirements Capabilities (open access)

Development and Validation of an Instrument to Operationalize Information System Requirements Capabilities

As a discipline, information systems (IS) has struggled with the challenge of alignment of product (primarily software and the infrastructure needed to run it) with the needs of the organization it supports. This has been characterized as the pursuit of alignment of information technology (IT) with the business or organization, which begins with the gathering of the requirements of the organization, which then guide the creation of the IS requirements, which in turn guide the creation of the IT solution itself. This research is primarily focused on developing and validating an instrument to operationalize such requirements capabilities. Requirements capabilities at the development of software or the implementation of a specific IT solution are referred to as capabilities for software requirements or more commonly systems analysis and design (SA&D) capabilities. This research describes and validates an instrument for SA&D capabilities for content validity, construct validity, internal consistency, and an exploratory factor analysis. SA&D capabilities were expected to coalesce strongly around a single dimension. Yet in validating the SA&D capabilities instrument, it became apparent that SA&D capabilities are not the unidimensional construct traditionally perceived. Instead it appears that four dimensions underlie SA&D capabilities, and these are associated with alignment maturity (governance, partnership, …
Date: May 2014
Creator: Pettit, Alex Z.
System: The UNT Digital Library
Development of an Instrument to Measure the Level of Acceptability and Tolerability of  Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users (open access)

Development of an Instrument to Measure the Level of Acceptability and Tolerability of Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users

Cyber aggression came about as a result of advances in information communication technology and the aggressive usage of the technology in real life. Cyber aggression can take on many forms and facets. However, the main focus of this study is cyberbullying and cyberstalking through information sharing practices that might constitute digital aggressive acts. Human aggression has been extensively investigated. Studies focusing on understanding the causes and effects that can lead to physical and digital aggression have shown the prevalence of cyber aggression in different settings. Moreover, these studies have shown strong relationship between cyber aggression and the physiological and physical trauma on both perpetrators and their victims. Nevertheless, the literature shows a lack of studies that could measure the level of acceptance and tolerance of these dangerous digital acts. This study is divided into two main stages; Stage one is a qualitative pilot study carried out to explore the concept of cyber aggression and its existence in Saudi Arabia. In-depth interviews were conducted with 14 Saudi social media users to collect understanding and meanings of cyber aggression. The researcher followed the Colaizzi’s methods to analyze the descriptive data. A proposed model was generated to describe cyber aggression in social media …
Date: May 2016
Creator: Albar, Ali Aldroos
System: The UNT Digital Library
Enhancing User Search Experience in Digital Libraries with Rotated Latent Semantic Indexing (open access)

Enhancing User Search Experience in Digital Libraries with Rotated Latent Semantic Indexing

This study investigates a semi-automatic method for creation of topical labels representing the topical concepts in information objects. The method is called rotated latent semantic indexing (rLSI). rLSI has found application in text mining but has not been used for topical labels generation in digital libraries (DLs). The present study proposes a theoretical model and an evaluation framework which are based on the LSA theory of meaning and investigates rLSI in a DL environment. The proposed evaluation framework for rLSI topical labels is focused on human-information search behavior and satisfaction measures. The experimental systems that utilize those topical labels were built for the purposes of evaluating user satisfaction with the search process. A new instrument was developed for this study and the experiment showed high reliability of the measurement scales and confirmed the construct validity. Data was collected through the information search tasks performed by 122 participants using two experimental systems. A quantitative method of analysis, partial least squares structural equation modeling (PLS-SEM), was used to test a set of research hypotheses and to answer research questions. The results showed a not significant, indirect effect of topical label type on both guidance and satisfaction. The conclusion of the study is …
Date: August 2015
Creator: Polyakov, Serhiy
System: The UNT Digital Library
Executive Information Seeking and the Corporate Library (open access)

Executive Information Seeking and the Corporate Library

This study began with an interest in corporate libraries and a genuine curiosity in the information preferences and resources valued by executive leaders at JET Aircraft Co. Executive information preferences and the downward trend in special libraries initiated the investigation of information seeking among executive leaders and yielded the inquiry: What resources do JET Aircraft Co. executives value when they need information? Employing an ethnographic approach, this study investigated what JET Aircraft Co. executives know about information resources, what they believe about information resources, and how they act when they require information. While JET Aircraft Co. maintained a special corporate library called the Company Research Library (CRL), the purpose of this study was to determine what resources were of value to executives at JET Aircraft Co., understanding that the CRL may or may not be a resource executives’ value. As a byproduct, this study also sought to establish executive information preferences and perceptions of the CRL. Information seeking at the executive level, studied through an ethnographic lens, provided insight into how executives at JET Aircraft Co. work and what they prefer, and it established a baseline for the Company Research Library’s position among the resources valued by executives.
Date: May 2015
Creator: Washburn, Adrianne J.
System: The UNT Digital Library
Exploring Factors That Lead to Perceived Instructional Immediacy in Online Learning Environments (open access)

Exploring Factors That Lead to Perceived Instructional Immediacy in Online Learning Environments

Instructional communication research clearly indicates that instructor immediacy contributes significantly to effective instruction. However, the majority of immediacy studies have been conducted in traditional (face-to-face) classroom environments. More recently, instructional communication research has focused on assessing the impact of immediacy in online classroom environments. Again, immediacy appears to significantly contribute to effective instruction. The challenge is that most recent immediacy studies use immediacy measurements developed to test immediacy behaviors in face-to-face settings. Considering the lack of nonverbal communication and limited or absent synchronous or verbal communication in online instructional settings, the behaviors contributing most significantly to perceived immediacy, researchers need to reassess the immediacy construct in online environments. The present research explores and identifies behaviors reported by instructors to establish psychological closeness (i.e., immediacy) in online learning environments and assesses to what extent these behaviors are similar to or different from face-to-face immediacy-producing behaviors.
Date: December 2014
Creator: Spiker, Chance W.
System: The UNT Digital Library
Exploring Naming Behavior in Personal Digital Image Collections: the Iconology and Language Games of Pinterest (open access)

Exploring Naming Behavior in Personal Digital Image Collections: the Iconology and Language Games of Pinterest

As non-institutional digital image collections expand into social media, independent non-professional image curators are emerging, actively constructing alternative naming conventions to suit their needs in a social collecting environment. This project considers how independent user-curators are developing particular sense-making behaviors as they actively contribute names to large, unstructured social image collections. In order to capture and explore this evolving language adaptation, Pinterest names are analyzed using a matrix composed of Panofsky’s three strata of subject matter, Rosch’s levels of categorical abstraction, Shatford Layne’s image attributes and Wittgenstein’s language game constructions. Analyzing Pinterest image names illuminates previously unnoticed behaviors by independent user-curators as they create shared collections. Exploring the various language choices which user-curators select as they apply this new curating vocabulary helps identify underlying user needs not apparent in traditionally curated collections restricted to traditional naming conventions.
Date: December 2014
Creator: Sutcliffe, Tami
System: The UNT Digital Library
Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications (open access)

Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications

Information privacy is a major concern for consumers adopting emerging technologies dependent on location-based services. This study sought to determine whether a relationship exists among factors of personalization, locatability, perceived playfulness, privacy concern and behavioral intention to disclose personal information for individuals using location-based, geosocial networking applications. Questionnaire responses from undergraduate students at a 4-year university provide insight into these relationships. Multiple regression results indicated that there was a statistically significant relationship between the four significant predictor variables and the dependent variable. Analysis of beta weights, structure coefficients, and commonality analysis shed light on the variance attributable to the predictor variables of the study. Findings provide understanding of the specific factors examined in the study and have implications for consumers, businesses, application designers, and policymakers. The results from this study contribute to an understanding of technology acceptance theory and offer insight into competing beliefs that may affect an individual’s behavioral intention to disclose personal information. Knowledge gained form the study may be useful for overcoming challenges related to consumer adoption of location-based services that require disclosure of personal information.
Date: May 2012
Creator: Cox, Trissa
System: The UNT Digital Library
Faculty Attitudes Towards Institutional Repositories (open access)

Faculty Attitudes Towards Institutional Repositories

The purpose of the study was to explore faculty attitudes towards institutional repositories in order to better understand their research habits and preferences. A better understanding of faculty needs and attitudes will enable academic libraries to improve institutional repository services and policies. A phenomenological approach was used to interview fourteen participants and conduct eight observations to determine how tenure-track faculty want to disseminate their research as well as their attitudes towards sharing research data. Interviews were transcribed and coded into emerging themes. Participants reported that they want their research to be read, used, and to have an impact. While almost all faculty see institutional repositories as something that would be useful for increasing the impact and accessibility of their research, they would consider publishers’ rights before depositing work in a repository. Researchers with quantitative data, and researchers in the humanities are more likely to share data than with qualitative or mixed data, which is more open to interpretation and inference. Senior faculty members are more likely than junior faculty members to be concerned about the context of their research data. Junior faculty members’ perception’ of requirements for tenure will inhibit their inclination to publish in open access journals, or share …
Date: December 2014
Creator: Hall, Nathan F.
System: The UNT Digital Library
From the Outside In: A Multivariate Correlational Analysis of Effectiveness in Communities of Practice (open access)

From the Outside In: A Multivariate Correlational Analysis of Effectiveness in Communities of Practice

Online communities of practice (CoPs) provide social spaces for people to connect, learn, and engage with one another around shared interests and passions. CoPs are innovatively employed within industry and education for their inherent knowledge management characteristics and as a means of improving professional practice. Measuring the success of a CoP is a challenge researchers are examining through various strategies. Recent literature supports measuring community effectiveness through the perceptions of its members; however, evaluating a community by means of member perception introduces complicating factors from outside the community. In order to gain insight into the importance of external factors, this quantitative study examined the influence of factors in the professional lives of educators on their perceptions of their CoP experience. Through an empirical examination of CoPs employed to connect educators and advance their professional learning, canonical correlation analysis was used to examine correlations between factors believed to be influential on the experiences of community members.
Date: August 2016
Creator: Bomar, Shannon Hulbert
System: The UNT Digital Library
Identifying Key Success Factors for the Implementation of Enterprise Content Management Systems (open access)

Identifying Key Success Factors for the Implementation of Enterprise Content Management Systems

Enterprise content management (ECM) is an emerging research area that is beginning to find attention in academia. While the private sector has a growing industry and community for ECM, academia is starting to address this with direct links to the better-established areas of information systems and enterprise resource planning systems. ECM has been viewed as a higher-level concept of methods and strategies pertaining to content management in the context of the enterprise. Like many other organizational wide systems, ECM systems are complex, difficult to implement and risk failing to meet expected success measures. Definitions for what exactly constitutes an ECM system are still evolving. The major issues with ECM systems are that they are increasingly being implemented by organizations in an attempt to address the unmanageable amount of unstructured content over its lifecycle, compliance pressures, collaboration needs, content integrity and continuity, and controlling costs. However, the implementation problems are many and diverse, such as determining content and business processes to be included, determining technologies to fit the organizational needs, how to integrate with existing systems, and managing organizational culture and change for acceptance. There is currently little academic research in the area of ECM, and research determining the key factors …
Date: August 2014
Creator: Horne, Stephanie Burnett
System: The UNT Digital Library
Impetuses for First, Second, and Third Year Law Student Information Seeking Behavior, and Perception of Common Knowledge and Citation (open access)

Impetuses for First, Second, and Third Year Law Student Information Seeking Behavior, and Perception of Common Knowledge and Citation

This dissertation examined how previous information literacy training, law student gender, age, and previously obtained education affects first, second, and third year law students selection of information sources, their understanding of common knowledge, and their decision of whether or not to give attribution to these sources. To examine these factors, this study implemented a paradigm called the principle of least effort that contended humans in general tended to complete the least amount of work possible to complete presented tasks. This study sought to discover whether law students follow this same path of completing the least amount of work possible to finish presented tasks, and whether this behavior affects information source selection, citation, and understanding of common knowledge. I performed six focus groups and crafted and disseminated an online survey to examine these factors. Via this data collection, it was discovered that law students do exhibit some differences in understanding of citation and citation behavior based on age and their year in law school. They also exhibited some differences regarding common knowledge based on their year in law school, where they received their information literacy training, and where they attend law school. Yet, no statistically significant differences were discovered regarding where …
Date: May 2016
Creator: Helge, Kris
System: The UNT Digital Library
Implications of Punctuation Mark Normalization on Text Retrieval (open access)

Implications of Punctuation Mark Normalization on Text Retrieval

This research investigated issues related to normalizing punctuation marks from a text retrieval perspective. A punctuated-centric approach was undertaken by exploring changes in meanings, whitespaces, words retrievability, and other issues related to normalizing punctuation marks. To investigate punctuation normalization issues, various frequency counts of punctuation marks and punctuation patterns were conducted using the text drawn from the Gutenberg Project archive and the Usenet Newsgroup archive. A number of useful punctuation mark types that could aid in analyzing punctuation marks were discovered. This study identified two types of punctuation normalization procedures: (1) lexical independent (LI) punctuation normalization and (2) lexical oriented (LO) punctuation normalization. Using these two types of punctuation normalization procedures, this study discovered various effects of punctuation normalization in terms of different search query types. By analyzing the punctuation normalization problem in this manner, a wide range of issues were discovered such as: the need to define different types of searching, to disambiguate the role of punctuation marks, to normalize whitespaces, and indexing of punctuated terms. This study concluded that to achieve the most positive effect in a text retrieval environment, normalizing punctuation marks should be based on an extensive systematic analysis of punctuation marks and punctuation patterns and …
Date: August 2013
Creator: Kim, Eungi
System: The UNT Digital Library
In Pursuit of Image: How We Think About Photographs We Seek (open access)

In Pursuit of Image: How We Think About Photographs We Seek

The user perspective of image search remains poorly understood. the purpose of this study is to identify and investigate the key issues relevant to a user’s interaction with images and the user’s approach to image search. a deeper understanding of these issues will serve to inform the design of image retrieval systems and in turn better serve the user. Previous research explores areas of information seeking behavior, representation in information science, query formulation, and image retrieval. the theoretical framework for this study includes an articulation of image search scenarios as adapted from Yoon and O’Connor’s taxonomy of image query types, Copeland’s Engineering Design Approach for rigorous qualitative research, and Anderson’s Functional Ontology Construction Model for building robust models of human behavior. a series of semi-structured interviews were conducted with expert-level image users. Interviewees discussed their motivations for image search, types of image searches they pursue, and varied approaches to image search, as well as how they decide that an information need has been met and which factors influence their experience of search. a content analysis revealed themes repeated across responses, including a collection of 23 emergent concepts and 6 emergent categories. a functional analysis revealed further insight into these themes. …
Date: May 2012
Creator: Oyarce, Sara
System: The UNT Digital Library
The Information Behavior of Individual Investors in Saudi Arabia (open access)

The Information Behavior of Individual Investors in Saudi Arabia

Information plays a significant role in the success of investment strategies. Within a non-advisory context, individual investors elect to build and manage their investment portfolios to avoid the cost of hiring professional advisors. To cope with markets’ uncertainty, individual investors should acquire, understand, and use only relevant information, but that task can be affected by many factors, such as domain knowledge, cognitive and emotional biases, information overload, sources’ credibility, communication channels’ accuracy, and economic costs. Despite an increased interest in examining the financial performance of individual investors in Saudi Arabia, there has been no empirical research of the information behavior of individual investors, or the behavioral biases affecting the investment decision making process in the Saudi stock market (SSM). The purpose of this study was to examine this information behavior within a non-advisory contextualization of their investment decision-making process through the use of an online questionnaire instrument using close-ended questions. The significant intervening variables identified in this study influence the individual investors’ information behavior across many stages of the decision making process. While controlling for gender, education, and income, the optimal information behavior of individual investors in the SSM showed that the Experience factor had the greatest negative effect on …
Date: May 2016
Creator: Elwani, Nabil Mohammed
System: The UNT Digital Library
The Information Politics Assessment Scale (Ipas): Developing and Testing an Instrument to Measure and Identify the Information Politics of Organizations (open access)

The Information Politics Assessment Scale (Ipas): Developing and Testing an Instrument to Measure and Identify the Information Politics of Organizations

Information politics is a concept widely acknowledged in several disciplines. However, scant empirical evidence exists in the literature that codifies or measures information politics as a construct. This exploratory study developed and tested the Information Politics Assessment Scale (IPAS), a survey instrument that measured individual perceptions of organizational information artifacts as indictors of its information politics. Data collected with the IPAS was examined to investigate the latent structure of the information politics variable, determine information politics models, and explore the relationship between information politics, strategy, and organization effectiveness. A purposive sample of 240 participants from a cross-section of organizations completed the IPAS in an online administration. Exploratory factor analysis generated three factors, labeled Behavioral Flexibility (BF), Environmental Sensitivity (ES), and Structural Autonomy (SA), suggesting three dimensions of the information politics variable. Cluster analysis of aggregate scores on the BF, ES, and SA factors together resulted in determining four distinct information politics models. Crosstab and ANOVA, respectively, enabled explaining the relationship between strategy and information politics, and how it influenced organization effectiveness. This study breaks ground by broadening the theoretical and empirical understanding of information politics in confirming the proposition that an organization’s information artifacts are measureable and reliable indicators of …
Date: May 2014
Creator: Reed, Richard
System: The UNT Digital Library