You limited your search to:

  Partner: UNT Libraries
 Department: School of Library and Information Sciences
 Decade: 2000-2009
 Collection: UNT Theses and Dissertations
Identification of Remote Leadership Patterns in Academic and Public Libraries

Identification of Remote Leadership Patterns in Academic and Public Libraries

Date: August 2008
Creator: Venetis, Mary Jo
Description: Seminal works on leadership, including those in librarianship define a traditional model of interaction between leaders and followers without reference to the information technology-driven environment. In addition, remote leadership indicates a different model from the traditional model, one that is focused on the interaction of leaders and their staff through digital technology. Although leaders still use face-to-face interaction, due to varied work schedules or job responsibilities, they also recognize the need to lead employees remotely. Leadership studies in library literature have not addressed how library leaders use information technology to lead employees remotely, nor have these studies addressed remote leadership and remote employees, except for some articles on telecommuting. As a result, this research was conducted to address this gap, providing an exploratory foundation of emergent patterns of remote leadership with its associated leadership dimensions rooted in personality traits, behaviors, and skills. Quantitative and qualitative data were obtained from a small sample size of academic and public-library leaders in the United States who participated in a Web-based survey designed specifically for this study, limiting generalizations. Factor analysis was the principal methodology used to obtain findings. Its composite factor scores were also used in the t-test and chi-square analyses. This study ...
Contributing Partner: UNT Libraries
Toward an Ideal Library: A Synthesis of Wilson's Library and Information Policy and Gilbert's Performance Matrix

Toward an Ideal Library: A Synthesis of Wilson's Library and Information Policy and Gilbert's Performance Matrix

Date: August 2008
Creator: Koremura, Yuka
Description: Inquiry about ideal library was sought by interdisciplinary approach from human competence derived from performance engineering by Gilbert (1978), and the library information policy by Wilson (1977). With Wilson's insights into the field of library and information science (LIS), this work demonstrated the synthesis of Wilson and Gilbert: engineering as common ground. One of the central concerns in LIS, utilization of knowledge, is re-conceptualized as Gilbert's view of performance, which reflected at different vantage points. Four leisurely theorems are introduced for his view of performance engineering, which produce human competence. The performance matrix is the application tool that represents Gilbert's theorems of performance engineering. It is used to clarify vantage points about the library, and constructed a model of the performance engineering system of ideal library. Based upon the model, two applications were made. One is to apply the performance matrix to the existing academic library. Another is to apply the performance matrix for building a special collection. These two applications show that the performance matrix is capable to analyze existing performance system as well as designing and building a performance system.
Contributing Partner: UNT Libraries
The effectiveness of using LEGO Mindstorms robotics activities to influence self-regulated learning in a university introductory computer programming course.

The effectiveness of using LEGO Mindstorms robotics activities to influence self-regulated learning in a university introductory computer programming course.

Date: May 2008
Creator: McWhorter, William Isaac
Description: The research described in this dissertation examines the possible link between self-regulated learning and LEGO Mindstorms robotics activities in teaching concepts in an introductory university computer programming course. The areas of student motivation, learning strategies, and mastery of course objectives are investigated. In all three cases analysis failed to reveal any statistically significant differences between the traditional control group and the experimental LEGO Mindstorms group as measured by the Motivated Strategies for Learning Questionnaire and course exams. Possible reasons for the lack of positive results include technical problems and limitations of the LEGO Mindstorms systems, limited number and availability of robots outside of class, limited amount of time during the semester for the robotics activities, and a possible difference in effectiveness based on gender. Responses to student follow-up questions, however, suggest that at least some of the students really enjoyed the LEGO activities. As with any teaching tool or activity, there are numerous ways in which LEGO Mindstorms can be incorporated into learning. This study explores whether or not LEGO Mindstorms are an effective tool for teaching introductory computer programming at the university level and how these systems can best be utilized.
Contributing Partner: UNT Libraries
Negotiation, communication, and decision strategies used by hostage/crisis negotiators.

Negotiation, communication, and decision strategies used by hostage/crisis negotiators.

Date: May 2008
Creator: Hancerli, Suleyman
Description: By conducting this theory-based empirical study, gathering data from working negotiators in the US and Canada, I have determined what primary dynamic activities, communication skills, and negotiation tools are used by hostage/crisis negotiators. Negotiators implement their negotiation and decision strategies differently depending on whether the situations they deal with are instrumental or expressive. I have determined which elements of negotiations and factors affecting negotiations differ while handling instrumental and expressive hostage situations. I found that the collected data did not reveal any significant relationship between handling instrumental/expressive hostage situations differently and belief in the elements of Brenda Dervin's and Shannon-Weaver's theories. I have also determined that the belief in the elements of the Dervin's and Shannon-Weaver's theories is workable and practical for negotiators to use. Based on the above findings, the model suggested by this research adds the elements and directives of Dervin's and Shannon-Weaver's models to the common approach used by the negotiators. This revised model suggests that the negotiators pay attention to the dynamics of the interactions presented between the two parties: the negotiators themselves and hostage takers. The revised model also recommends that the negotiators focus on not only the hostage takers behavioral characteristics, psychological conditions, and ...
Contributing Partner: UNT Libraries
Networked generation youth's information seeking process: An examination of cognitive, affective and physical behaviors and problem solving techniques.

Networked generation youth's information seeking process: An examination of cognitive, affective and physical behaviors and problem solving techniques.

Date: May 2008
Creator: Peterson, Janet Walker
Description: This study investigated the information seeking process of the networked generation youth. Specifically, I examined the cognitive, affective, and physical information seeking behaviors and problem solving techniques adolescent student users of the networked environment utilize to solve information needs. Grounded in the theoretical context of the information seeking process in the networked environment, the research extended the user-centered approach to modeling the information seeking process of networked generation youth. A mixed model research design was used to address the research questions. Phase 1 used an online questionnaire to solicit information from 125 students in Grades 7-12 regarding their understanding and use of networked environments, information seeking skills, and problem solving techniques. Phase 2 observed 12 students, two from each grade level, to gain an understanding into the information seeking process of networked generation youth. Participants completed information seeking scenarios of varying levels of complexity. As the participants completed the scenario, they engaged in talk-aloud verbal protocol to describe and explain their behaviors and techniques as they advanced through their information seeking process. Semi-structured interviews were conducted which provided an opportunity for the participants to clarify their information seeking experience. A profile of students' networked environment knowledge and use in relationship ...
Contributing Partner: UNT Libraries
An exploratory study of factors that influence student user success in an academic digital library.

An exploratory study of factors that influence student user success in an academic digital library.

Date: December 2007
Creator: Rahman, Faizur
Description: The complex nature of digital libraries calls for appropriate models to study user success. Calls have been made to incorporate into these models factors that capture the interplay between people, organizations, and technology. In order to address this, two research questions were formulated: (1) To what extent does the comprehensive digital library user success model (DLUS), based on a combination of the EUCS and flow models, describe overall user success in a prototype digital library environment; and (2) To what extent does a combined model of DeLone & McLean's reformulated information system success model and comprehensive digital library user success model (DLUS) explain digital library user success in a prototype digital library environment? Participants were asked to complete an online survey questionnaire. A total of 160 completed and useable questionnaires were obtained. Data analyses through exploratory and confirmatory factor analyses and structural equation modeling produced results that support the two models. However, some relationships between latent variables hypothesized in the model were not confirmed. A modified version of the proposed comprehensive plus user success model in a digital library environment was tested and supported through model fit statistics. This model was recommended as a possible alternative model of user success. ...
Contributing Partner: UNT Libraries
The intersection of social networks in a public service model: A case study.

The intersection of social networks in a public service model: A case study.

Date: December 2007
Creator: Schultz-Jones, Barbara Ann
Description: Examining human interaction networks contributes to an understanding of factors that improve and constrain collaboration. This study examined multiple network levels of information exchanges within a public service model designed to strengthen community partnerships by connecting city services to the neighborhoods. The research setting was the Neighbourhood Integrated Service Teams (NIST) program in Vancouver, B.C., Canada. A literature review related information dimensions to the municipal structure, including social network theory, social network analysis, social capital, transactive memory theory, public goods theory, and the information environment of the public administration setting. The research method involved multiple instruments and included surveys of two bounded populations. First, the membership of the NIST program received a survey asking for identification of up to 20 people they contact for NIST-related work. Second, a network component of the NIST program, 23 community centre coordinators in the Parks and Recreation Department, completed a survey designed to identify their information exchanges relating to regular work responsibilities and the infusion of NIST issues. Additionally, 25 semi-structured interviews with the coordinators and other program members, collection of organization documents, field observation, and feedback sessions provided valuable insight into the complexity of the model. This research contributes to the application of ...
Contributing Partner: UNT Libraries
Sanctioned and Controlled Message Propagation in a Restrictive Information Environment: The Small World of Clandestine Radio Broadcasting

Sanctioned and Controlled Message Propagation in a Restrictive Information Environment: The Small World of Clandestine Radio Broadcasting

Date: December 2007
Creator: Wachanga, David Ndirangu
Description: This dissertation seeks to identify the elements that inform the model for competing message propagation systems in a restrictive environment. It pays attention to message propagation by sanctioned and clandestine radio stations in pre- and post-independent Zimbabwe. This dissertation uses two models of message propagation in a limiting information environment: Sturges' information model of national liberation struggle and Chatman's small world information model. All the message propagation elements in the Sturges and Chatman's models are present in the broadcast texts analyzed. However, the findings of this dissertation indicate that communication in a restrictive information environment is designed such that its participants make sense of their situation, and come up with ways to solve the challenges of their small world. Also, a restrictive information environment is situational, and message propagators operating in it are subject to tactical changes at different times, accordingly altering their cognitive maps. The two models fail to address these concerns. This dissertation focused on message propagation in Zimbabwe because there is military belligerence involved in the information warfare. It therefore provides an extreme situation, which can help our understanding of more everyday instances of communication and interference of communication. Findings of this dissertation recommend the need to ...
Contributing Partner: UNT Libraries
Are online catalogs for children giving them what they need? Children's cognitive development and information seeking and their impact on design

Are online catalogs for children giving them what they need? Children's cognitive development and information seeking and their impact on design

Date: August 2007
Creator: Creel, Stacy
Description: Research shows children in an online environment often search by browsing, which relies heavily on recognition and content knowledge, so catalog systems for children must use effective symbols or pictorial representations, which correspond with children's own cognitive schema and level of recognition knowledge. This study was designed to look at the success of young children (ages 5 to 8) in searching 3 online public library catalogs designed for them, and it focused specifically on the pictorial representations and text descriptors used in the systems' browsing hierarchy. The research sought answer whether young children (ages 5 to 8) are really poor searchers because of cognitive development and lack of technology skills or if system design is the major reason for poor search results; i.e., Do current children's online catalog designs function in a manner that is compatible with information seeking by children? Although these results can not be generalized, this study indicates that there was a disconnect between the cognitive abilities of young users and catalog design. The study looked at search success on the 3 catalogs in relation to the catalog characteristics and individual user characteristics and makes 3 significant contributions to the field of library and information science. The ...
Contributing Partner: UNT Libraries
A conceptual map for understanding the terrorist recruitment process: Observation and analysis of DHKP/C, PKK, and Turkish Hezbollah terrorist organizations.

A conceptual map for understanding the terrorist recruitment process: Observation and analysis of DHKP/C, PKK, and Turkish Hezbollah terrorist organizations.

Date: August 2007
Creator: Teymur, Samih
Description: Terrorism is a historical problem; however, it becomes one of the biggest problems in 21st century. September 11 and the following Madrid, Istanbul and London attacks showed that it is the most significant problem threatening world peace and security. Governments have started to deal with terrorism by improving security measurements and making new investments to stop terrorism. Most of the governments' and scholars' focus is on immediate threats and causes of terrorism, instead of looking at long-term solutions such as root causes and underlying reasons of terrorism, and the recruitment style of terrorist organizations If terrorist recruitment does not stop, then it is safe to say terrorist activities cannot be stopped. This study focused on the recruitment process by observing two different terrorist organizations, DHKP/C and Turkish Hezbollah. The researcher brings 13 years of field experience and first-person data gathered from inside the terrorist organizations. The research questions of this study were: (i) How can an individual be prevented from joining or carrying out terrorist activities?; (ii) What factors are correlated with joining a terrorist organization?; (iii) What are the recruitment processes of the DHKP/C, PKK, and Turkish Hezbollah?; (iv) Is there any common process of being a member of ...
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 4 5 NEXT LAST