Search Results

open access

An Examination of the Metaverse Technology Acceptance Model in Tourism

Description: The traditional definition of tourism has been transformed by significant advancements in communication and information technology. The concept of Metaverse, derived from the words "meta" (meaning beyond) and "verse" (meaning universe), has redefined how people experience travel. This innovative concept combines virtual reality, augmented reality, and artificial intelligence to create virtually augmented spaces. However, the tourism industry should clarify and narrow down the definition of Meta… more
Date: July 2023
Creator: Lee, Sangyung
Partner: UNT Libraries
open access

Image Representation and Interactivity: An Exploration of Utility Values, Information-Needs and Image Interactivity

Description: This study was designed to explore the relationships between users and interactive images. Three factors were identified and provided different perspectives on how users interact with images: image utility, information-need, and images with varying levels of interactivity. The study used a mixed methodology to gain a more comprehensive understanding about the selected factors. An image survey was used to introduce the participants to the images and recorded utility values when given a specific … more
Date: August 2011
Creator: Lewis, Elise C.
Partner: UNT Libraries
open access

Factors Influencing User Experience and Consumer Behavioral Intention to Use Visual Analytics Technology

Description: The purpose of this study was to assess visual analytics technology acceptance and user experience among in vitro fertilization (IVF) consumers. The research aimed to show how visual analytics tools and technologies can be applied in the consumer space to enhance how users interpret healthcare success rate data. This exploratory user evaluation study utilized a quantitative dominant, mixed-methods approach with a convergent parallel design based on the data-validation variant. Survey data were … more
Date: December 2022
Creator: Lewis, Paulette Benika
Partner: UNT Libraries
open access

The representation of national political freedom on web interface design: A comparison of government-based and business-oriented websites.

Description: The purpose of this study is to explore the representation of national political freedom on web interface design by using power distance, one of the culture dimensions identified by Geert Hofstede, as a measurement. This study also aims to determine if there are any differences between government-based websites and business-oriented websites in representing national political freedom. A pilot study was conducted to validate ten power distance indicators identified from previous research on cul… more
Date: December 2008
Creator: Li, Rowena Liu-ping
Partner: UNT Libraries
open access

The Online and the Onsite Holocaust Museum Exhibition as an Informational Resource

Description: Museums today provide learning-rich experiences and quality informational resources through both physical and virtual environments. This study examined a Holocaust Museum traveling exhibition, Life in Shadows: Hidden Children and the Holocaust that was on display at the Art Center of Battle Creek, Michigan in fall 2005. The purpose of this mixed methods study was to assess the informational value of a Holocaust Museum exhibition in its onsite vs. online format by converging quantitative and qua… more
Date: December 2006
Creator: Lincoln, Margaret L.
Partner: UNT Libraries
open access

Modeling the Role of Boundary Spanners-in-Practice in the Nondeterministic Model of Engineering Design Activity

Description: Boundary spanners-in-practice are individuals who inhabit more than one social world and bring overlapping place perspectives to bear on the function(s) performed within and across each world. Different from nominated boundary spanners, they are practitioners responsible for the 'translation' of each small world's perspectives thereby increasing collaboration effectiveness to permit the small worlds to work synergistically. The literature on Knowledge Management (KM) has emphasized the organiza… more
Date: December 2015
Creator: Linkins, Kathy L.
Partner: UNT Libraries
open access

An E-government Readiness Model

Description: The purpose of this study is to develop an e-government readiness model and to test this model. Consistent with this model several instruments, IS assessment (ISA), IT governance (ITG), and Organization-IS alignment (IS-ALIGN) are examined for their ability to measure the readiness of one organization for e-government and to test the instruments fit in the proposed e-government model. The ISA instrument used is the result of adapting and combining the IS-SERVQUAL instrument proposed by Van Dyke… more
Date: December 2001
Creator: Liu, Shin-Ping
Partner: UNT Libraries
open access

A Comparative Analysis of Style of User Interface Look and Feel in a Synchronous Computer Supported Cooperative Work Environment

Description: The purpose of this study is to determine whether the style of a user interface (i.e., its look and feel) has an effect on the usability of a synchronous computer supported cooperative work (CSCW) environment for delivering Internet-based collaborative content. The problem motivating this study is that people who are located in different places need to be able to communicate with one another. One way to do this is by using complex computer tools that allow users to share information, document… more
Date: May 2005
Creator: Livingston, Alan
Partner: UNT Libraries
open access

Information Receptivity: The Information-Seeking Behavior and Networking Activity of Women in a Rural Texas County Judicial System

Description: This study identified the information seeking behavior and networking practices used by members of a specific marginalized population, that of adult female probationers (AFPs) in a rural county in Texas. The study focused on how they seek out information when faced with a self-identified need in their lives. Beyond the basic "food, shelter and clothing" that comes to mind, the respondents find themselves faced with questions not only about the judicial system but also ones involving health care… more
Date: May 2023
Creator: Livingston, Jo Ann
Partner: UNT Libraries
open access

Respect for human rights and the rise of democratic policing in Turkey: Adoption and diffusion of the European Union acquis in the Turkish National Police.

Description: This study is an exploration of the European Union acquis adoption in the Turkish National Police. The research employed the Diffusion of Innovations, Democratic Policing, and historical background check theoretical frameworks to study the decision-making of the TNP regarding reforms after 2003 as a qualitative case study which triangulated the methodology with less-dominant survey and several other analyzing methods. The data were collected from several sources including semi-structured interv… more
Date: August 2007
Creator: Lofca, Izzet
Partner: UNT Libraries
open access

A Theory for the Measurement of Internet Information Retrieval

Description: The purpose of this study was to develop and evaluate a measurement model for Internet information retrieval strategy performance evaluation whose theoretical basis is a modification of the classical measurement model embodied in the Cranfield studies and their progeny. Though not the first, the Cranfield studies were the most influential of the early evaluation experiments. The general problem with this model was and continues to be the subjectivity of the concept of relevance. In cyberspace, … more
Date: May 1999
Creator: MacCall, Steven Leonard
Partner: UNT Libraries

Implications of the inclusion of document retrieval systems as actors in a social network.

Description: Traditionally, social network analysis (SNA) techniques enable the examination of relationships and the flow of information within networks of human members or groups of humans. This study extended traditional social network analysis to include a nonhuman group member, specifically a document retrieval system. The importance of document retrieval systems as information sources, the changes in business environments that necessitates the use of information and communication technologies, and the … more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2005
Creator: Macpherson, Janet Robertson
Partner: UNT Libraries
open access

A Comparison of Communication Motives of On-Site and Off-Site Students in Videoconference-Based Courses

Description: The objective of this investigation is to determine whether student site location in an instructional videoconference is related to students' motives for communicating with their instructor. The study is based, in part, on the work of Martin et al. who identify five separate student-teacher communication motives. These motives, or dimensions, are termed relational, functional, excuse, participation, and sycophancy, and are measured by a 30-item questionnaire. Several communication-related theor… more
Date: August 2002
Creator: Massingill, K.B.
Partner: UNT Libraries
open access

Toward a Grounded Theory of Community Networking

Description: This dissertation presents a preliminary grounded theory of community networking based on 63 evaluations of community networking projects funded by the National Telecommunications and Information Administration’s Technology Opportunities Program (TOP) between 1994 and 2007. The substantive grounded theory developed is that TOP projects differed in their contribution to positive outcomes for intended disadvantaged community beneficiaries based on the extent and manner in which they involved the … more
Date: May 2014
Creator: Masten-Cain, Kathryn
Partner: UNT Libraries
open access

Effects of a Selective Dissemination of Information Service on the Environmental Scanning Process of an Academic Institution

Description: A case study was conducted to document the changes in the attitudes of academic administrators at Langston University with regards to the use of various types of information sources for strategic planning. Environmental scanning of external factors was accomplished for six months by the use of a selective dissemination of information (SDI) service. Pre- and post-assessments of the perceived reliance on, satisfaction with and adequacy of personal and library-type information sources were conduct… more
Date: May 1991
Creator: Mayberry, Alberta Gale Johnson
Partner: UNT Libraries
open access

Perceptions of Associates to Embrace Technology Used in Teams in the Workplace

Description: This study explores employees' desire to embrace both a legacy operating system and a new workflow engine utilized in the workplace. The goal is to better understand the partnership and relationship the users build with the technologies and how that impacts usage behavior. The research is centered on a mixed-method case study using survey and episodic interview techniques of data collection. Models and methodologies providing the foundation for this study include Venkatesh and Davis's techno… more
Date: August 2019
Creator: McGowan, Michael T.
Partner: UNT Libraries
open access

An Observational Investigation of On-Duty Critical Care Nurses' Information Behavior in a Nonteaching Community Hospital

Description: Critical care nurses work in an environment rich in informative interactions. Although there have been post hoc self-report survey studies of nurses' information seeking, there have been no observational studies of the patterns and content of their on-duty information behavior. This study used participant observation and in-context interviews to describe 50 hours of the observable information behavior of a representative sample of critical care nurses in a 20-bed critical care hospital unit. Th… more
Date: May 2004
Creator: McKnight, Michelynn
Partner: UNT Libraries
open access

Web Information Behaviors of Users Interacting with a Metadata Navigator

Description: The web information behaviors of users as they interacted with a metadata navigator, the Personal Information (PI) Agent, and reflected upon their interaction experiences were studied. The process included studying the complete iterative (repeated) cycle of information needs, information seeking, and information use of users interacting with an internet-based prototype metadata PI Agent tool. Detlor’s theory of web information behaviors of organizational users was utilized as a theoretical fo… more
Date: December 2013
Creator: McMillan, Tyson DeShaun
Partner: UNT Libraries
open access

The Correlation between Information Literacy and Critical Thinking of College Students: An Exploratory Study

Description: This exploratory, mixed-methods study investigated the relationship between information literacy and critical thinking. The research question guiding the first portion of the study was: How do information literacy and critical thinking relate in undergraduate students conducting academic research? Using two standardized assessments, the study assessed the information literacy and critical thinking skills of a small population of college students from a private, university in Texas. The correlat… more
Date: May 2018
Creator: McMullin, Shelly Lynne
Partner: UNT Libraries
open access

The Effectiveness of Using Lego Mindstorms Robotics Activities to Influence Self-regulated Learning in a University Introductory Computer Programming Course.

Description: The research described in this dissertation examines the possible link between self-regulated learning and LEGO Mindstorms robotics activities in teaching concepts in an introductory university computer programming course. The areas of student motivation, learning strategies, and mastery of course objectives are investigated. In all three cases analysis failed to reveal any statistically significant differences between the traditional control group and the experimental LEGO Mindstorms group as … more
Date: May 2008
Creator: McWhorter, William Isaac
Partner: UNT Libraries

Social Networking Sites Usage Behavior: Trust and Risk Perceptions

Description: This dissertation addresses research questions related to defining user's trust and risk perceptions associated with social networking usage behavior in relation to the repeated privacy and security breaches. The general research question is explored in the dissertation via the conduct of three related studies. The finding from these three investigations are presented in the results section as 3 essays that collectively examine the social networking sites usage behavior. Essay 1 proposes a con… more
This item is restricted from view until June 1, 2027.
Date: May 2022
Creator: Mekala, Nithin Kumar Reddy
Partner: UNT Libraries
open access

A Model of Information Therapy: Definition and Empirical Application

Description: This study involves the investigation of the basis and validity of considering health information as therapeutic, the definition of Information Therapy, and whether the therapeutic nature of information can be measured empirically. The purpose of the study is to determine if there are any significant differences in the therapeutic effect of Information Therapy through the different delivery modes of support groups communicating face-to-face and those utilizing computer-mediated communication on… more
Date: August 1999
Creator: Mitchell, Donna J.
Partner: UNT Libraries
open access

The Physiology of Collaboration: An Investigation of Library-Museum-University Partnerships

Description: Collaboration appears to be a magical solution for many problems when there is scarcity of resources, lack of knowledge or skills, and/or environmental threats. However, there is little knowledge about the nature of collaboration. A holistic conceptual framework was developed for the collaborative process, and the conceptualization process used systems thinking approach. The author has selectively chosen conceptualizations and/or research by a limited subset of scholars whose ideas appeared to … more
Date: August 2003
Creator: Morales Arroyo, Miguel Angel
Partner: UNT Libraries
open access

Assessing Terrorist Cyber Threats: Engineering a Functional Construct

Description: Terrorist organizations and individuals make use of the Internet for supportive activities such as communication, recruiting, financing, training, and planning operations. However, little is known about the level of computer-based (“cyber”) threat such terrorist organizations and individuals pose. One step in facilitating the examination and assessment of the level of cyber threat posed by terrorist organizations and individuals is development of an assessment tool or methodology. This tool w… more
Date: December 2014
Creator: Morgan, Deanne
Partner: UNT Libraries
Back to Top of Screen