This system will be undergoing maintenance April 18th between 9:00AM and 12:00PM CDT.

Search Results

The Acceptance and Use of Cloud Computing Services by Small and Medium Enterprises in Lagos, Nigeria
This study explored the acceptance of cloud computing (CC) services by small and medium enterprises (SMEs) in Lagos, Nigeria, which has been missing from CC services literature. It aimed to understand the motivations for adoption, the uses of the services, and the benefits they derive from it. The uses and gratification theory was applied as the theoretic framework for this endeavor. An online survey with close-ended and open-ended questions was distributed to 1200 randomly selected participants through email. In total, 392 valid responses were collected and analyzed using descriptive statistics and categories. The results found that SMEs in Lagos, Nigeria had a low level of awareness and appreciation of CC services. The adoption rate was also low. Unlike their counterparts in other regions, SMEs primary concerns were service downtime, stable power supply, and better internet access. The study found that SMEs were not taking full advantage of the capabilities of CC services. Some sections, however, were doing better than others, such as the information and communications sub-sector. This study suggested that targeted interventions should be conducted to raise the awareness of CC services in SMEs, and to improve their efficient and effective use of CC services. The uses and gratification theory was appropriate for guiding this study to understand the acceptance and use of CC services by SMEs in Lagos, Nigeria.
Accessing Information on the World Wide Web: Predicting Usage Based on Involvement
Advice for Web designers often includes an admonition to use short, scannable, bullet-pointed text, reflecting the common belief that browsing the Web most often involves scanning rather than reading. Literature from several disciplines focuses on the myriad combinations of factors related to online reading but studies of the users' interests and motivations appear to offer a more promising avenue for understanding how users utilize information on Web pages. This study utilized the modified Personal Involvement Inventory (PII), a ten-item instrument used primarily in the marketing and advertising fields, to measure interest and motivation toward a topic presented on the Web. Two sites were constructed from Reader's Digest Association, Inc. online articles and a program written to track students' use of the site. Behavior was measured by the initial choice of short versus longer versions of the main page, the number of pages visited and the amount of time spent on the site. Data were gathered from students at a small, private university in the southwest part of the United States to answer six hypotheses which posited that subjects with higher involvement in a topic presented on the Web and a more positive attitude toward the Web would tend to select the longer text version, visit more pages, and spend more time on the site. While attitude toward the Web did not correlate significantly with any of the behavioral factors, the level of involvement was associated with the use of the sites in two of three hypotheses, but only partially in the manner hypothesized. Increased involvement with a Web topic did correlate with the choice of a longer, more detailed initial Web page, but was inversely related to the number of pages viewed so that the higher the involvement, the fewer pages visited. An additional indicator of usage, the average amount …
Adolescent Task Management: Multitasking and Social Media in the Student Search Process
This study examines adolescent students at an American international school and observes student use of social networking programs as well as physical actions in the search process. The study specifically observed multitasking behavior and organizational skills among students, as well as linkages made through social networking sites. Student observations, student interviews, analysis of Facebook entries, and a survey on multitasking yielded rich data. Students appear to be far more organized than previously suggested in the literature, and in this study, the organization proved to be largely self-taught. Students used their social networks to build a kind of group expertise that compensated for their youthful naivety. Students exhibited self-control within the search to the degree that they could focus on what they wanted to find, and they used heuristics—mental shortcuts—to achieve what they needed. Searches also suggest creativity in that students were flexible in their search methods and used a number of tools to gather information. Students could balance the needs of the academic or imposed search with their own online lives, meaning that they made compensations for social media and media multitasking when it was deemed necessary.
The Adoption and Use of Electronic Information Resources by a Non-Traditional User Group: Automotive Service Technicians.
The growing complexity of machines has led to a concomitant increase in the amount and complexity of the information needed by those charged with servicing them. This, in turn, has led to a need for more robust methods for storing and distributing information and for a workforce more sophisticated in its use of information resources. As a result, the service trades have "professionalized," adopting more rigorous academic standards and developing ongoing certification programs. The current paper deals with the acceptance of advanced electronic information technology by skilled service personnel, specifically, automotive service technicians. The theoretical basis of the study is Davis' technology acceptance model. The purpose of the study is to determine the effects of three external factors on the operation of the model: age, work experience, and education/certification level. The research design is in two parts, beginning with an onsite observation and interviews to establish the environment. During the second part of the research process a survey was administered to a sample of automotive service technicians. Results indicated significant inverse relationships between age and acceptance and between experience and acceptance. A significant positive relationship was shown between education, particularly certification, and acceptance.
The Adoption of Open Source Software in Uganda: a Pragmatist Approach to the Formation of a National Information Policy for a New Technology
This exploratory research examined an information policy formation process for the adoption of open source software (OSS) in Uganda. Grounded in a pragmatist tradition, this theoretical and empirical study pursued a qualitative research approach with a triangulation of theoretical concepts, data collection, and analysis techniques in an iterative and interactive process. The design provided a powerful context to develop and conduct field activities in Kampala with a purposeful sample of 22 participants, 20 in interviews and 5 in a focus group discussion. The research design enhanced consistency in the evidence from the data, increased robustness in the results, and confidence in the findings. The results highlighted a vibrant ICT sector in Uganda, underlined the multiple stakeholders and their competing interests in the policy, revealed a lack of consensus between the government and OSS promoters on the meaning of OSS, and illuminated the benefits in the OSS model over proprietary software. The stakeholders' conflicting perceptions appear to be too far apart to allow meaningful progress and are derailing the policy. Unless their conflicting perceptions are resolved, the OSS policy will continue stagnating. The study fills critical information gaps in Uganda’s policy formation processes, provides timely and relevant information to holistically understand a complex policy formation stage to enable stakeholders to resolve their impasse and enact a law to embrace OSS. It breaks ground in information policy research in framing policy formation processes for new ICTs, such as OSS, as ideologically-oriented. The findings offer ideas to scholars and African countries to draw applicable lessons.
Adoption of Wearable Devices by Older Adults
This dissertation is organized in a traditional format while including three essays that address specific research questions. Essay 1 examined the relationship between physical activity and community engagement and their effect on mental well-being among older men and women. Data from National Health and Aging Trends Study (NHATS) from 2018 to 2020 were explored and the posited relationships were tested. This essay provides empirical support that older adults who are reasonably active and involved in the community have greater mental well-being than those who isolate themselves. Essay 2 provides insight into older adults' motivation to improve their physical activity through the use of a fitness tracker. The key finding from this study is that wearables, especially fitness trackers, can significantly facilitate increased physical activity. Essay 3 is a mixed-methods study to understand older adults' perception of the usefulness of fitness trackers and interaction with such devices. Findings suggest that to increase the adoption of fitness trackers among older adults, makers could improve the esthetics and quality of the wristband in addition to the battery life of the tracker.
Affordances of External Representations in Instructional Design: The Effect of Narrative and Imagery in Learning.
Consisting of both theoretical and empirical inquires, this study examines the primary functions of narrative and the relationship between narrative and mental imagery. The study proposes a new framework to interpret semiotic resources. Combining this with the linguistic functional theory of Halliday (1978), a functional method to empirically investigate semiotic representations was also developed. In the empirical inquiry, the study developed a latent construct method to empirically test the effects of narrative in a real learning situation. This study is the first to investigate the functional relationship between narrative and mental imagery, and among the first to suggest a theory and empirically investigate representations of a multimodal nature. The study is also among the first to use latent constructs to investigate the learning experience in a real educational setting. Data were collected from 190 library professionals who enrolled in three sections (two in narrative and one in plain text) of an online course administered through Vista 4.0 and who completed the course and responded to several instruments. Essay data (n = 82 x 2) were analyzed using content analysis based on the narrative analysis framework developed. Quantitative data analysis methods include univariate data analysis, factor analysis, and structural equation modeling that tests the proposed model and verifies the relationships between the latent variables. Overall, the findings support the hypotheses about the functional effects of narrative identified, and narrative is found to provide a favorable and positive learning context which is tested by the proposed model of learning experience measured by several latent constructs (X2 = 31.67, df = 47, p = .9577, RMSEA = .00, SRMR = .047, NNFI = 1.05, CFI = 1.00, and GFI = .94). The results indicate that participants who enrolled in the narrative sections of the course gained higher creative scores and showed better results …
An Analysis of Student Perceptions of Teaching Effectiveness for Instructors Who Teach the Same Course in the Same Semester in Both Online and Face-to-Face Formats
There is an increasingly number of students taking online classes in lieu of or in addition to the traditional face-to-face format. With this trend, there are questions that naturally come to the surface. The biggest question being "is teaching in the online arena just as effective as the face-to-face arena?" This dissertation aims to pursue that line of questioning by analyzing students' perceptions of the teaching effectiveness for instructors who teach the same course in both an online and face-to-face format in the same semester. The data are analyzed through the lens of the social capital theory. Social capital has never been applied to the classroom before as its focus has traditionally been on community development. However, social capital theory addresses interpersonal relationships and their impact on knowledge sharing behavior. This theory identifies three dimensions, which appear to have a parallel track with the student evaluation components; each is analyzed against each other. These dimensions include structured, cognitive and relational and are compared to the components of the student evaluation tool, which includes organization and explanation of materials, learning environment and self-regulated learning.
An Analysis of the Ability of an Instrument to Measure Quality of Library Service and Library Success
This study consisted of an examination of how service quality should be measured within libraries and how library service quality relates to library success. A modified version of the SERVQUAL instrument was evaluated to determine how effectively it measures library service quality. Instruments designed to measure information center success and information system success were evaluated to determine how effectively they measure library success and how they relate to SERVQUAL. A model of library success was developed to examine how library service quality relates to other variables associated with library success. Responses from 385 end users at two U.S. Army Corps of Engineers libraries were obtained through a mail survey. Results indicate that library service quality is best measured with a performance-based version of SERVQUAL, and that measuring importance may be as critical as measuring expectations for management purposes. Results also indicate that library service quality is an important factor in library success and that library success is best measured with a combination of SERVQUAL and library success instruments. The findings have implications for the development of new instruments to more effectively measure library service quality and library success as well as for the development of new models of library service quality and library success.
Analyzing Learner Characteristics, Undergraduate Experience and Individual Teamwork Knowledge, Skills and Abilities: Toward Identifying Themes to Promote Higher Workforce Readiness
With the world amidst globalization and economic flux affecting business, industry, and communities the need to work together becomes increasingly important. Higher education serves an important role in developing the individual teaming capabilities of the workforce. This environment is the time and place - opportunity for student personnel to develop these capabilities. This multiple case study utilized the analysis phase (learner, setting and job) of an instructional design model to analyze learner characteristics, the higher education environment/undergraduate experience, and the job/skills associated with individual teamwork knowledge, skills, and abilities of students from a senior cohort of the TRiO - SSS Project at a public student-centered research institution. The results yielded themes to promote the development of target populations individual teamwork KSAs which should increase their readiness to meet the teaming demands of today's employers. With an engaging undergraduate experience, inclusive of interaction with faculty members and collaborative learning with their peers, structured opportunities to practice individual teamwork KSAs in a work setting or internship, these underrepresented students may be an asset that is needed to meet the global workforce needs and fill civic capacities in their home communities.
Analyzing Tradeoffs between Privacy Concerns and Active Social Media Presence of 18- to 30-Year-Old College Students
This study applied the impression management theory in the context of social networking to investigate the generalized research question of this dissertation which is "Do active social media presence and various privacy concerns influence online behaviors of students on social media?" The results and conclusions are presented via the conduct of three different studies and the summary provides insights and explain the overall contribution of the research. For each study we developed a research model for which data was collected separately for each of these models. Hypotheses of each model were tested by partial least squares- structural equation modeling techniques using SmartPLS 2.0. Our findings confirm the hypotheses and showed that all the predictors positively influence online social networking behaviors. Active social media presence is operationalized as predictors such as SNS stalking awareness, Selective disclosure, desired differential persona, impression motivation, and information trustworthiness. Privacy concerns have been operationalized as SNS privacy awareness, technology awareness. Online behaviors have been operationalized as responsible image and reckless image.
Antecedents to Reliance on Artificial Intelligence and Predictive Modeling
Artificial intelligence (AI) and predictive modeling are tools used to diagnose a disease, determine how much a home is worth, estimate insurance risks, and detect fraud. AI and predictive modeling are so ubiquitous that they can be why one gets spam and why spam is automatically deleted. Information science integrates interdisciplinary elements of data-driven, behavioral, design, interpretive, and analytical research methodologies to design and understand interactions between digital media, information systems, and humans. This research focuses on the interaction between humans, AI, and predictive models. This research proposes a theoretical framework and a conceptual research model to understand the antecedents to reliance on AI and predictive modeling. The dissertation follows a traditional format that includes three studies. Study 1 employed a deductive quantitative research approach as a survey to model the relationship between trust in science and reliance on formal news sources. Study 2 employed a deductive quantitative research approach as a survey to understand the impact of framing questions and consider an alternative method of measuring society's reliance on science using predictive models. Study 3 employed a deductive quantitative research approach in the form of a survey to posit a new model based on the first two studies. This study benefited from a Toulouse Graduate School grant to fund research using the crowdsourcing platform https://lucidtheorem.com/ to generate a stratified sample of the U.S. population.
The Applicability of SERVPERF in Judging Service Quality for Biomedical Information Professionals
The applicability of SERVPERF as a tool for judging the quality of services used by biomedical information professionals was tested using standard statistical procedures. Data was gathered nationally via a combination of electronic and non-electronic forms, from Area Health Education Center (AHEC) information professionals and the results consolidated to provide information for the study. It was determined that SERVPERF was applicable in making judgements about service quality for AHEC information professionals. Their perceptions about service quality tended to have a greater influence than did their level of actual satisfaction on whether or not they planned to use a particular service in the future. There is currently no validated tool available to ascertain the quality of services offered to these valuable members of the rural health care team. This dissertation proposes to provide such a tool, and to serve as a guide or template for other professionals seeking a means to judge service quality in their own disciplines.
Are Online Catalogs for Children Giving Them What They Need? Children's Cognitive Development and Information Seeking and Their Impact on Design
Research shows children in an online environment often search by browsing, which relies heavily on recognition and content knowledge, so catalog systems for children must use effective symbols or pictorial representations, which correspond with children's own cognitive schema and level of recognition knowledge. This study was designed to look at the success of young children (ages 5 to 8) in searching 3 online public library catalogs designed for them, and it focused specifically on the pictorial representations and text descriptors used in the systems' browsing hierarchy. The research sought answer whether young children (ages 5 to 8) are really poor searchers because of cognitive development and lack of technology skills or if system design is the major reason for poor search results; i.e., Do current children's online catalog designs function in a manner that is compatible with information seeking by children? Although these results can not be generalized, this study indicates that there was a disconnect between the cognitive abilities of young users and catalog design. The study looked at search success on the 3 catalogs in relation to the catalog characteristics and individual user characteristics and makes 3 significant contributions to the field of library and information science. The first contribution is the modification of an existing model posed by Cooper and O'Connor and modified by Abbas (2002). The second significant contribution is the proposal of a new model, Creel's second best choice (SBC) model, that addresses the cognitive gap and design flaws that impact the choices participants made. The third significant contribution is that this study addresses and fills a gap in the literature.
Artificial Intelligence Teammates in a Collaborative Information Seeking Environment from the Perspective of Women Engineers in the United States
The purpose of this study was to collect design requirements from women engineers on artificial intelligence teammates such as Microsoft Teams, Slack, and Trello. A mixed methods research design was used for this study with an online survey and semi-structure interviews. The study results revealed design requirements from women engineers including solutions to sociotechnical issues that could arise from artificial intelligence teammates in the workplace. The results showed various ways women engineers collaborate in the workplace with and without artificial intelligence. Additionally, women engineers' attitude towards artificial intelligence was examined to identify if there was a correlation to self-efficacy. This research study fills a previous study gap that solicited design requirements from research scientists, by soliciting practitioners. Practitioners such as women engineers are underrepresented in the workplace, and they could benefit from an artificial intelligence teammate with their design requirements. Finally, this study contributes to the information science literature on collaborative information seeking, artificial intelligence design, and engineers' information seeking behaviors.
Assessing Perceived Credibility of Web Sites in a Terrorism Context: The PFLP, Tamil Tigers, Hamas, and Hezbollah
The purpose of the study was to contribute to the overall understanding of terrorist organizations' use of the Internet and to increase researchers' knowledge of Web site effectiveness. The methodological approach was evaluation of the perceived credibility of Web sites based on existing criteria derived from information users. The Web sites of four terrorist organizations were assessed: two secular nationalist groups, the People's Front for the Liberation of Palestine (PFLP) and Liberation Tigers of Tamil Elam (LTTE or Tamil Tigers); and two religious nationalist groups, Hamas and Hezbollah. The findings of this analysis showed differences in perceived credibility factors among terrorist organizations' Web sites and positive levels of perceived credibility for the Web sites. These findings indicate the potential for positive impressions of the organizations' Web sites by information users, which would help empower the organizations with the capacity to reach their objectives. By using Web sites, these groups can effectively increase their support base through disseminating information, improving recruiting, and attracting monetary contributions, and can establish themselves as legitimate components of society.
Assessing Terrorist Cyber Threats: Engineering a Functional Construct
Terrorist organizations and individuals make use of the Internet for supportive activities such as communication, recruiting, financing, training, and planning operations. However, little is known about the level of computer-based (“cyber”) threat such terrorist organizations and individuals pose. One step in facilitating the examination and assessment of the level of cyber threat posed by terrorist organizations and individuals is development of an assessment tool or methodology. This tool would guide intelligence collection efforts and would support and facilitate comparative assessment of the cyber threat posed by terrorist organizations and individuals through the provision of a consistent method of assessment across time, amongst organizations and individuals, and between analysts. This study leveraged the professional experience of experts to engineer a new functional construct – a structured analytical technique designed to assess the cyber threat posed by terrorist entities and individuals. The resultant instrument was a novel structured analytical construct that uses defined indicators of a terrorist organization/individual’s intent to carry out cyber attacks, and their capability to actually do so as measures of an organization/individual’s overall level of cyber threat.
Assessment of a Library Learning Theory by Measuring Library Skills of Students Completing an Online Library Instruction Tutorial
This study is designed to reveal whether students acquire the domains and levels of library skills discussed in a learning library skills theory after participating in an online library instruction tutorial. The acquisition of the library skills is demonstrated through a review of the scores on online tutorial quizzes, responses to a library skills questionnaire, and bibliographies of course research papers. Additional areas to be studied are the characteristics of the participants enrolled in traditional and online courses at a community college and the possible influence of these characteristics on the demonstrated learning of library skills. Multiple measurement methods, identified through assessment of library instruction literature, are used to verify the effectiveness of the library skills theory and to strengthen the validity and reliability of the study results.
At the Junction of Dissemination and Implementation: Facilitating Access to Behavior Analytic Research
Research in scholarly communication is usually limited to the use and dissemination of scientific material by scholars. This excludes the transfer of knowledge from research producers to service providers. Some may argue the primary function of science is to investigate the conditions in the lab so everyday interactions with the environment are more effective and efficient. This is the underlying philosophy of the science of behavior analysis. Comprised of a basic science, an applied science and a philosophy the field of behavior analysis relies on research developments to inform effective practice. Guided by dissemination processes studied in information science, this investigation revealed the content layer in behavior analysis is primarily comprised of journal articles. Ninety four percent of the research artifacts cited in the current content layer are from journal articles. Other dissemination channels used to develop the behavior analytic content layer included scientific magazine articles, oral reports, dissertations and theses, and unpublished manuscripts. The information use environment for professionals in this field is very different than that of the scholars; most professionals do not have access to a university library. Therefore, the research producers are disseminating developments via communication channels some service providers cannot access. This investigation reveals the only dissemination channel that provides continuous access to the content layer is reaching out via informal communication; All other dissemination channels do not provide access to the entire content layer, do not provide the entire scholarly work, and/or include a barrier to access (often an associated cost). This is a concern for the field of behavior analysis as professional recommendations cannot be based on the best available evidence if the evidence is not accessible. This is a concern for the field of information science as the study of scholarly communication should not be limited to scholars alone. The process of …
Automatic Language Identification for Metadata Records: Measuring the Effectiveness of Various Approaches
Automatic language identification has been applied to short texts such as queries in information retrieval, but it has not yet been applied to metadata records. Applying this technology to metadata records, particularly their title elements, would enable creators of metadata records to obtain a value for the language element, which is often left blank due to a lack of linguistic expertise. It would also enable the addition of the language value to existing metadata records that currently lack a language value. Titles lend themselves to the problem of language identification mainly due to their shortness, a factor which increases the difficulty of accurately identifying a language. This study implemented four proven approaches to language identification as well as one open-source approach on a collection of multilingual titles of books and movies. Of the five approaches considered, a reduced N-gram frequency profile and distance measure approach outperformed all others, accurately identifying over 83% of all titles in the collection. Future plans are to offer this technology to curators of digital collections for use.
Blogging and Tweens: Communication Portal to Reading Selection and Engagement
The ethnographic study utilized the research techniques of observations, content analysis, and semi-structured interviews with tween participants (i.e., 9 through 13 year-old youth) during an 8-week literary blog project. Twenty-six participants created individual blog pages within a member-only classroom blog site that allowed for online communication between members. the blog project incorporated social networking applications with which youth frequently engage. the research questions ensured data regarding what facets participants found appealing and motivating during the project was collected. the questions allowed for determining if participants utilized peer blogs for reading material selection or repurposed the blogs to discuss other topics. Components of self-determination theory and engagement theory underlay the project design and aided in identifying motivational aspects of the data. Frequency tables outlined the identified patterns and structures of participants’ online activity. Participants found the ability to change the colors of their blog backgrounds and to design their individual blogs and the giving and receiving of feedback to be the two most appealing features of the project. Participants chose books from peer suggestions in the online world but also selected materials from recommendations they received in face-to-face interactions with their peers, their teacher, and the school librarian. Little evidence of repurposing the blog for social topics was observed. Participants engaged in discussions predominantly based around the books they were currently reading or had read. Implications for incorporating social networking applications within the classroom environment are discussed.
Bridging the Theory-to-practice Gap: a Multivariate Correlational Study Exploring the Effects of a Graduate Online Learning Environment As a Community of Practice Framework
In this multivariate correlational study, the researcher examined the course culture of an online graduate course whose environment exhibited characteristics of a Community of practice (CoP). An online survey captured data used to explore the relationships among variables shown to describe a CoP in field environments and among student perceptions of their experience in the course culture. A canonical correlation analysis (CCA) and commonality analysis (CA) were conducted using five predictor variables and three criterion variables to evaluate the degree and direction of the relationships. The CCA revealed that the full model was significant, explaining approximately 74% of the variance among the two synthetic variates. Impact, faculty leadership, and connection were the largest contributors to the predictor variate. The criterion variate was primarily explained by value and perceived CoP, with exposure to the profession providing a smaller contribution. The CA confirmed these findings. Results from this study indicate that a CoP could be fostered in an online graduate course. The overall significance of the model indicates teachers can nurture an environment wherein graduate students will take the initiative to work with others to create and acquire knowledge that creates a sense of professional connection with each other and with the profession overall. The results of this study suggest further empirical research in implementing and assessing CoPs in online graduate courses is warranted.
Building an Understanding of International Service Learning in Librarianship
From the very beginning, library education has been a mixture of theory and practice. Dewey required apprenticeships to be part of the first library school at the University of Chicago as a method to indoctrinate new professional. Today, acculturation is incorporated into the professional education through a large variety of experiential learning techniques, including internships, practicum, field work, and service learning projects, all of which are designed to develop some level of professional skills within an information organization. But, what is done for understanding library culture? It is said that one cannot truly recognize the extent of one's own cultural assumptions, until they have experienced another. This study followed a group of LIS graduate students that took that next step – going to Russia. By employing a critical hermeneutic methodology, this study sought to understand what value students gain by from working on an assessment project in an international school library. Using a horizon analysis, the researcher established the worldview of participants prior to their departure, analyzed their experience through post-experience interviews, and constructed an understanding of value. Among other concepts, the researcher looked specifically to see whether "library cultural competency", understanding library culture in global context, was developed through working on a service learning project within an international school library. This dissertation provides feedback for the program leaders and ideas for future research.
A Change Agent in the Use of Continuing Online Distance Learning Technology
Managers of public libraries have been presented with a new set of challenges in the day-to-day operations of public libraries. These include their ability to serve as change agents as they manage the use of continuing online distance learning (CODL) for staff. This online tool may provide staff opportunities for on-the-job learning, yet for managers and managerial staff little is known about how the tool impacts their role in light of the changes. This research investigates the perceptions of 103 Northeast Texas Library System managers and managerial staff about their role as a change agent in the use of CODL using an exploratory factor analysis (EFA) and confirmatory factor analysis (CFA) to determine the outcome. Administrators from urban, suburban, and rural public libraries were surveyed using a General Training Climate Scale to explore three constructs: extent of the manager role, manager role, and use of CODL. Data analysis was performed using exploratory and confirmatory analysis to support the theoretical model. An altered model was tested and confirmed through model fit indices.
Children's Color Association for Digital Image Retrieval.
In the field of information sciences, attention has been focused on developing mature information retrieval systems that abstract information automatically from the contents of information resources, such as books, images and films. As a subset of information retrieval research, content-based image retrieval systems automatically abstract elementary information from images in terms of colors, shapes, and texture. Color is the most commonly used in similarity measurement for content-based image retrieval systems. Human-computer interface design and image retrieval methods benefit from studies based on the understanding of their potential users. Today's children are exposed to digital technology at a very young age, and they will be the major technology users in five to ten years. This study focuses on children's color perception and color association with a controlled set of digital images. The method of survey research was used to gather data for this exploratory study about children's color association from a children's population, third to sixth graders. An online questionnaire with fifteen images was used to collect quantitative data of children's color selections. Face-to-face interviews investigated the rationale and factors affecting the color choices and children's interpretation of the images. The findings in this study indicate that the color children associated with in the images was the one that took the most space or the biggest part of an image. Another powerful factor in color selection was the vividness or saturation of the color. Colors that stood out the most generally attracted the greatest attention. Preferences of color, character, or subject matter in an image also strongly affected children's color association with images. One of the most unexpected findings was that children would choose a color to replace a color in an image. In general, children saw more things than what were actually represented in the images. However, the children's interpretation …
The Cluster Hypothesis: A Visual/Statistical Analysis
By allowing judgments based on a small number of exemplar documents to be applied to a larger number of unexamined documents, clustered presentation of search results represents an intuitively attractive possibility for reducing the cognitive resource demands on human users of information retrieval systems. However, clustered presentation of search results is sensible only to the extent that naturally occurring similarity relationships among documents correspond to topically coherent clusters. The Cluster Hypothesis posits just such a systematic relationship between document similarity and topical relevance. To date, experimental validation of the Cluster Hypothesis has proved problematic, with collection-specific results both supporting and failing to support this fundamental theoretical postulate. The present study consists of two computational information visualization experiments, representing a two-tiered test of the Cluster Hypothesis under adverse conditions. Both experiments rely on multidimensionally scaled representations of interdocument similarity matrices. Experiment 1 is a term-reduction condition, in which descriptive titles are extracted from Associated Press news stories drawn from the TREC information retrieval test collection. The clustering behavior of these titles is compared to the behavior of the corresponding full text via statistical analysis of the visual characteristics of a two-dimensional similarity map. Experiment 2 is a dimensionality reduction condition, in which inter-item similarity coefficients for full text documents are scaled into a single dimension and then rendered as a two-dimensional visualization; the clustering behavior of relevant documents within these unidimensionally scaled representations is examined via visual and statistical methods. Taken as a whole, results of both experiments lend strong though not unqualified support to the Cluster Hypothesis. In Experiment 1, semantically meaningful 6.6-word document surrogates systematically conform to the predictions of the Cluster Hypothesis. In Experiment 2, the majority of the unidimensionally scaled datasets exhibit a marked nonuniformity of distribution of relevant documents, further supporting the Cluster Hypothesis. Results of …
Cognitive Playfulness, Innovativeness, and Belief of Essentialness: Characteristics of Educators who have the Ability to Make Enduring Changes in the Integration of Technology into the Classroom Environment.
Research on the adoption of innovation is largely limited to factors affecting immediate change with few studies focusing on enduring or lasting change. The purpose of the study was to examine the personality characteristics of cognitive playfulness, innovativeness, and essentialness beliefs in educators who were able to make an enduring change in pedagogy based on the use of technology in the curriculum within their assigned classroom settings. The study utilized teachers from 33 school districts and one private school in Texas who were first-year participants in the Intel® Teach to the Future program. The research design focused on how cognitive playfulness, innovativeness, and essentialness beliefs relate to a sustained high level of information technology use in the classroom. The research questions were: 1) Are individuals who are highly playful more likely to continue to demonstrate an ability to integrate technology use in the classroom at a high level than those who are less playful? 2) Are individuals who are highly innovative more likely to continue to demonstrate an ability to integrate technology use in the classroom at a high level than those who are less innovative? 3) Are individuals who believe information technology use is critical and indispensable to their teaching more likely to continue to demonstrate an ability to integrate technology use in the classroom at a high level than those who believe it is supplemental and not essential? The findings of the current study indicated that playfulness, innovativeness, and essentialness scores as defined by the scales used were significantly correlated to an individual's sustained ability to use technology at a high level. Playfulness was related to the educator's level of innovativeness, as well. Also, educators who believed the use of technology was critical and indispensable to their instruction were more likely to be able to demonstrate a sustained …
A Common Representation Format for Multimedia Documents
Multimedia documents are composed of multiple file format combinations, such as image and text, image and sound, or image, text and sound. The type of multimedia document determines the form of analysis for knowledge architecture design and retrieval methods. Over the last few decades, theories of text analysis have been proposed and applied effectively. In recent years, theories of image and sound analysis have been proposed to work with text retrieval systems and progressed quickly due in part to rapid progress in computer processing speed. Retrieval of multimedia documents formerly was divided into the categories of image and text, and image and sound. While standard retrieval process begins from text only, methods are developing that allow the retrieval process to be accomplished simultaneously using text and image. Although image processing for feature extraction and text processing for term extractions are well understood, there are no prior methods that can combine these two features into a single data structure. This dissertation will introduce a common representation format for multimedia documents (CRFMD) composed of both images and text. For image and text analysis, two techniques are used: the Lorenz Information Measurement and the Word Code. A new process named Jeong's Transform is demonstrated for extraction of text and image features, combining the two previous measurements to form a single data structure. Finally, this single data measurements to form a single data structure. Finally, this single data structure is analyzed by using multi-dimensional scaling. This allows multimedia objects to be represented on a two-dimensional graph as vectors. The distance between vectors represents the magnitude of the difference between multimedia documents. This study shows that image classification on a given test set is dramatically improved when text features are encoded together with image features. This effect appears to hold true even when the available …
A Comparative Analysis of Style of User Interface Look and Feel in a Synchronous Computer Supported Cooperative Work Environment
The purpose of this study is to determine whether the style of a user interface (i.e., its look and feel) has an effect on the usability of a synchronous computer supported cooperative work (CSCW) environment for delivering Internet-based collaborative content. The problem motivating this study is that people who are located in different places need to be able to communicate with one another. One way to do this is by using complex computer tools that allow users to share information, documents, programs, etc. As an increasing number of business organizations require workers to use these types of complex communication tools, it is important to determine how users regard these types of tools and whether they are perceived to be useful. If a tool, or interface, is not perceived to be useful then it is often not used, or used ineffectively. As organizations strive to improve communication with and among users by providing more Internet-based collaborative environments, the users' experience in this form of delivery may be tied to a style of user interface look and feel that could negatively affect their overall acceptance and satisfaction of the collaborative environment. The significance of this study is that it applies the technology acceptance model (TAM) as a tool for evaluating style of user interface look and feel in a collaborative environment, and attempts to predict which factors of that model, perceived ease of use and/or perceived usefulness, could lead to better acceptance of collaborative tools within an organization.
Comparing the Readability of Text Displays on Paper, E-Book Readers, and Small Screen Devices
Science fiction has long promised the digitalization of books. Characters in films and television routinely check their palm-sized (or smaller) electronic displays for fast-scrolling information. However, this very technology, increasingly prevalent in today's world, has not been embraced universally. While the convenience of pocket-sized information pieces has the techno-savvy entranced, the general public still greets the advent of the e-book with a curious reluctance. This lack of enthusiasm seems strange in the face of the many advantages offered by the new medium - vastly superior storage capacity, searchability, portability, lower cost, and instantaneous access. This dissertation addresses the need for research examining the reading comprehension and the role emotional response plays in the perceived performance on e-document formats as compared to traditional paper format. This study compares the relative reading comprehension on three formats (Kindle, iTouch, and paper) and examines the relationship of subject's emotional response and relative technology exposure as factors that affect how the subject perceives they have performed on those formats. This study demonstrates that, for basic reading comprehension, the medium does not matter. Furthermore, it shows that, the more uncomfortable a person is with technology and expertise in the requested task (in this case, reading), the more they cling to the belief that they will do better on traditional (paper) media - regardless of how well they actually do.
A Comparison of Communication Motives of On-Site and Off-Site Students in Videoconference-Based Courses
The objective of this investigation is to determine whether student site location in an instructional videoconference is related to students' motives for communicating with their instructor. The study is based, in part, on the work of Martin et al. who identify five separate student-teacher communication motives. These motives, or dimensions, are termed relational, functional, excuse, participation, and sycophancy, and are measured by a 30-item questionnaire. Several communication-related theories were used to predict differences between on-site and off-site students, Media richness theory was used, foundationally, to explain differences between mediated and face-to-face communication and other theories such as uncertainty reduction theory were used in conjunction with media richness theory to predict specific differences.Two hundred eighty-one completed questionnaires were obtained from Education and Library and Information Science students in 17 separate course-sections employing interactive video at the University of North Texas during the Spring and Summer semesters of the 2001/2002 school year. This study concludes that off-site students in an instructional videoconference are more likely than their on-site peers to report being motivated to communicate with their instructor for participation reasons. If off-site students are more motivated than on-site students to communicate as a means to participate, then it may be important for instructors to watch for actual differences in participation levels, and instructors may need to be well versed in pedagogical methods that attempt to increase participation, The study also suggests that current teaching methods being employed in interactive video environments may be adequate with regard to functional, excuse-making, relational and sycophantic communication.
A Comparison of Major Factors that Affect Hospital Formulary Decision-Making by Three Groups of Prescribers
The exponential growth in medical pharmaceuticals and related clinical trials have created a need to better understand the decision-making factors in the processes for developing hospital medication formularies. The purpose of the study was to identify, rank, and compare major factors impacting hospital formulary decision-making among three prescriber groups serving on a hospital's pharmacy and therapeutics (P&T) committee. Prescribers were selected from the University of Texas, MD Anderson Cancer Center which is a large, multi-facility, academic oncology hospital. Specifically, the prescriber groups studied were comprised of physicians, midlevel providers, and pharmacists. A self-administered online survey was disseminated to participants. Seven major hospital formulary decision-making factors were identified in the scientific literature. Study participants were asked to respond to questions about each of the hospital formulary decision-making factors and to rank the various formulary decision-making factors from the factor deemed most important to the factor deemed least important. There are five major conclusions drawn from the study including three similarities and two significant differences among the prescriber groups and factors. Similarities include: (1) the factor "pharmacy staff's evaluation of medical evidence including formulary recommendations" was ranked highest for all three prescriber groups; (2) "evaluation of medications by expert physicians" was ranked second for physicians and midlevel providers while pharmacists ranked it third; and (3) the factor, "financial impact of the treatment to the patient" was fifth in terms of hospital formulary decision-making statement and ranking by all three prescriber groups. Two significant differences include: (1) for the hospital-formulary decision making statement, "I consider the number of patients affected by adding, removing, or modifying a drug on the formulary when making hospital medication formulary decisions," midlevel providers considered this factor of significantly greater importance than did physicians; and (2) for the ranked hospital formulary decision-making factor, "financial impact of treatment to the …
A Comparison of Plaintiff and Defense Expert Witness H-Index Scores in Mild Traumatic Brain Injury Civil Litigation
This study examines the background and qualifications of plaintiff and defense experts using the H-Index score as quantification of expert background and qualifications. The goal is to better understand the similarities and differences among the professionals offering paid expert witness testimony in mild traumatic brain injury (mTBI) civil litigation. In this quantitative study, descriptive statistics include the mean and standard deviation scores for the data to support examining measures of central tendency and variance, respectively. The study includes the use of logistic regression and the Wilcoxon signed-rank test, and their statistical assumptions were tested to determine whether they would be used or if it was more appropriate to use a non-parametric test. The study included two research questions: How do the qualifications of plaintiff and defense expert witnesses in mild traumatic brain injury civil litigation compare? and to what extent does a higher h-index correlate with a favorable litigation outcome in a mild traumatic brain injury case? The findings for the hypothesis tests associated with the research questions led to the acceptance of the null hypothesis in each test. There was a lack of asymptotic significance in Hypothesis 1 and a lack of significance in Hypothesis 2. The findings from these tests shall support the discussion of the implications of this research and the direction of future research.
A Complex Systems Model for Understanding the Causes of Corruption: Case Study - Turkey
It is attempted with this dissertation to draw an explanatory interdisciplinary framework to clarify the causes of systemic corruption. Following an intense review of political sciences, economics, and sociology literatures on the issue, a complex systems theoretical model is constructed. A political system consists of five main components: Society, interest aggregators, legislative, executive and private sector, and the human actors in these domains. It is hypothesized that when the legitimacy level of the system is low and morality of the systemic actors is flawed, selected political, social and economic incentives and opportunities that may exist within the structure of the systemic components might -individually or as a group- trigger corrupt transactions between the actors of the system. If left untouched, corruption might spread through the system by repetition and social learning eventually becoming the source of corruption itself. By eroding the already weak legitimacy and morality, it may increase the risk of corruption even further. This theoretical explanation is used to study causes of systemic corruption in the Turkish political system. Under the guidance of the complex systems theory, initial systemic conditions, -legacy of the predecessor of Turkey Ottoman Empire-, is evaluated first, and then political, social and economic factors that are presumed to be breeding corruption in contemporary Turkey is investigated. In this section, special focus is given on the formation and operation of amoral social networks and their contribution to the entrenchment of corruption within the system. Based upon the findings of the case study, the theoretical model that is informed by the literature is reformed: Thirty five system and actor level variables are identified to be related with systemic corruption and nature of the causality between them and corruption is explained. Although results of this study can not be academically generalized for obvious reasons; the analytical framework …
Computer Support Interactions: Verifying a Process Model of Problem Trajectory in an Information Technology Support Environment.
Observations in the information technology (IT) support environment and generalizations from the literature regarding problem resolution behavior indicate that computer support staff seldom store reusable solution information effectively for IT problems. A comprehensive model of the processes encompassing problem arrival and assessment, expertise selection, problem resolution, and solution recording has not been available to facilitate research in this domain. This investigation employed the findings from a qualitative pilot study of IT support staff information behaviors to develop and explicate a detailed model of problem trajectory. Based on a model from clinical studies, this model encompassed a trajectory scheme that included the communication media, characteristics of the problem, decision points in the problem resolution process, and knowledge creation in the form of solution storage. The research design included the administration of an extensive scenario-based online survey to a purposive sample of IT support staff at a medium-sized state-supported university, with additional respondents from online communities of IT support managers and call-tracking software developers. The investigator analyzed 109 completed surveys and conducted email interviews of a stratified nonrandom sample of survey respondents to evaluate the suitability of the model. The investigation employed mixed methods including descriptive statistics, effects size analysis, and content analysis to interpret the results and verify the sufficiency of the problem trajectory model. The study found that expertise selection relied on the factors of credibility, responsibility, and responsiveness. Respondents referred severe new problems for resolution and recorded formal solutions more often than other types of problems, whereas they retained moderate recurring problems for resolution and seldom recorded those solutions. Work experience above and below the 5-year mark affected decisions to retain, refer, or defer problems, as well as solution storage and broadcasting behaviors. The veracity of the problem trajectory model was verified and it was found to be an …
A Conceptual Map for Understanding the Terrorist Recruitment Process: Observation and Analysis of Turkish Hezbollah Terrorist Organizations.
Terrorism is a historical problem; however, it becomes one of the biggest problems in 21st century. September 11 and the following Madrid, Istanbul and London attacks showed that it is the most significant problem threatening world peace and security. Governments have started to deal with terrorism by improving security measurements and making new investments to stop terrorism. Most of the governments' and scholars' focus is on immediate threats and causes of terrorism, instead of looking at long-term solutions such as root causes and underlying reasons of terrorism, and the recruitment style of terrorist organizations If terrorist recruitment does not stop, then it is safe to say terrorist activities cannot be stopped. This study focused on the recruitment process by observing two different terrorist organizations, DHKP/C and Turkish Hezbollah. The researcher brings 13 years of field experience and first-person data gathered from inside the terrorist organizations. The research questions of this study were: (i) How can an individual be prevented from joining or carrying out terrorist activities?; (ii) What factors are correlated with joining a terrorist organization?; (iii) What are the recruitment processes of the DHKP/C, PKK, and Turkish Hezbollah?; (iv) Is there any common process of being a member of these three terrorist organizations?; and (v) What are the similarities and differences these terrorist organizations? As a result of this analysis, a terrorist recruitment process map was created. With the help of this map, social organizations such as family and schools may be able to identify ways to prevent individuals from joining terrorist organizations. Also, this map will also be helpful for government organizations such as counterterrorism and intelligence to achieve the same goal.
Constraints on Adoption of Innovations: Internet Availability in the Developing World.
In a world that is increasingly united in time and distance, I examine why the world is increasingly divided socially, economically, and digitally. Using data for 35 variables from 93 countries, I separate the countries into groups of 31 each by gross domestic product per capita. These groups of developed, lesser developed and least developed countries are used in comparative analysis. Through a review of relevant literature and tests of bivariate correlation, I select eight key variables that are significantly related to information communication technology development and to human development. For this research, adoption of the Internet in the developing world is the innovation of particular interest. Thus, for comparative purposes, I chose Internet Users per 1000 persons per country and the Human Development Index as the dependent variables upon which the independent variables are regressed. Although small in numbers among the least developed countries, I find Internet Users as the most powerful influence on human development for the poorest countries. The research focuses on key obstacles as well as variables of opportunity for Internet usage in developing countries. The greatest obstacles are in fact related to Internet availability and the cost/need ratio for infrastructure expansion. However, innovations for expanded Internet usage in developing countries are expected to show positive results for increased Internet usage, as well as for greater human development and human capital. In addition to the diffusion of innovations in terms of the Internet, the diffusion of cultures through migration is also discussed in terms of the effect on social capital and the drain on human capital from developing countries.
Controlled Vocabularies in the Digital Age: Are They Still Relevant?
Keyword searching and controlled vocabularies such as Library of Congress subject headings (LCSH) proved to work well together in automated technologies and the two systems have been considered complimentary. When the Internet burst onto the information landscape, users embraced the simplicity of keyword searching of this resource while researchers and scholars seemed unable to agree on how best to make use of controlled vocabularies in this huge database. This research looked at a controlled vocabulary, LCSH, in the context of keyword searching of a full text database. The Internet and probably its most used search engine, Google, seemed to have set a standard that users have embraced: a keyword-searchable single search box on an uncluttered web page. Libraries have even introduced federated single search boxes to their web pages, another testimony to the influence of Google. UNT's Thesis and Dissertation digital database was used to compile quantitative data with the results input into an EXCEL spreadsheet. Both Library of Congress subject headings (LCSH) and author-assigned keywords were analyzed within selected dissertations and both systems were compared. When the LCSH terms from the dissertations were quantified, the results showed that from a total of 788 words contained in the 207 LCSH terms assigned to 70 dissertations, 246 of 31% did not appear in the title or abstract while only 8, or about 1% from the total of 788, did not appear in the full text. When the author-assigned keywords were quantified, the results showed that from a total of 552 words from304 author-assigned keywords in 86 dissertations, 50 or 9% did not appear in the title or abstract while only one word from the total of 552 or .18% did not appear in the full text. Qualitatively, the LCSH terms showed a hierarchical construction that was clearly designed for a print …
Convenience to the Cataloger or Convenience to the User?: An Exploratory Study of Catalogers’ Judgment
This mixed-method study explored cataloger’s judgment through the presence of text as entered by catalogers for the 11 electronic resource items during the National Libraries test for Resource Description and Access (RDA). Although the literature discusses cataloger’s judgment and suggests that cataloging practice based on new cataloging code RDA will more heavily rely on cataloger’s judgment, the topic of cataloger’s judgment in RDA cataloging was not formally studied. The purpose of this study was to study the differences and similarities in the MARC records created as a part of the RDA National Test and to determine if the theory of bounded rationality could explain cataloger’s judgment based on the constructs of cognitive and temporal limits. This goal was addressed through a content analysis of the MARC records and various statistical tests (Pearson’s Chi-square, Fisher’s Exact, and Cramer’s V). Analysis of 217 MARC records was performed on seven elements of the bibliographic record. This study found that there were both similarities and differences among the various groups of participants, and there are indications that both support and refute the assertion that catalogers make decisions based on the constructs of time and cognitive ability. Future research is needed to be able to determine if bounded rationality is able to explain cataloger’s judgment; however, there are indicators that both support and refute this assertion. The findings from this research have implications for the cataloging community through the provision of training opportunities for catalogers, evaluating workflows, ensuring the proper indexing of bibliographic records for discovery, and recommended edits to RDA.
Conversational Use of Photographic Images on Facebook: Modeling Visual Thinking on Social Media
Modeling the "thick description" of photographs began at the intersection of personal and institutional descriptions. Comparing institutional descriptions of particular photos that were also used in personal online conversations was the initial phase. Analyzing conversations that started with a photographic image from the collection of the Library of Congress (LC) or the collection of the Manchester Historic Association (MHA) provided insights into how cultural heritage institutions could enrich the description of photographs by using informal descriptions such as those applied by Facebook users. Taking photos of family members, friends, places, and interesting objects is something people do often in their daily lives. Some photographic images are stored, and some are shared with others in gatherings, occasions, and holidays. Face-to-face conversations about remembering some of the details of photographs and the event they record are themselves rarely recorded. Digital cameras make it easy to share personal photos in Web conversations and to duplicate old photos and share them on the Internet. The World Wide Web even makes it simple to insert images from cultural heritage institutions in order to enhance conversations. Images have been used as tokens within conversations along with the sharing of information and background knowledge about them. The recorded knowledge from conversations using photographic images on Social Media (SM) has resulted in a repository of rich descriptions of photographs that often include information of a type that does not result from standard archival practices. Closed group conversations on Facebook among members of a community of interest/practice often involve the use of photographs to start conversations, convey details, and initiate story-telling about objets, events, and people. Modeling of the conversational use of photographic images on SM developed from the exploratory analyses of the historical photographic images of the Manchester, NH group on Facebook. The model was influenced by the …
The Correlation between Information Literacy and Critical Thinking of College Students: An Exploratory Study
This exploratory, mixed-methods study investigated the relationship between information literacy and critical thinking. The research question guiding the first portion of the study was: How do information literacy and critical thinking relate in undergraduate students conducting academic research? Using two standardized assessments, the study assessed the information literacy and critical thinking skills of a small population of college students from a private, university in Texas. The correlational analysis of the scores from the two assessments showed a statistically significant, positive, moderate correlation. The study also explored the likelihood of gender differences in cognitive processing using information literacy and critical think skills assessments. The independent samples t-tests for both assessments demonstrated no statistically significant differences between female and male participants. Finally, a qualitative component comprised of a questionnaire provided context to the assessment scores through items requesting information on participant source selection priorities via the three middle stages of Kuhlthau's information search process model as well as their criteria for selecting sources of information. Though only a small number of the participants completed the questionnaire, the responses highlighted areas of interest for future research.
Costly Ignorance: The Denial of Relevance by Job Seekers: A Case Study in Saudi Arabia
Job centers aid businesses seeking qualified employees and assist job seekers to select and contact employment and training services. Job seekers are also offered the opportunity to assess their skills, abilities, qualifications, and readiness. Furthermore, job centers ensure that job seekers are complying with requirements that they must meet to benefit from job assistance programs such as unemployment insurance. Yet, claimants often procrastinate and/or suspend their job search efforts even though such actions can make them lose their free time and entitlements, and more importantly they may lose the opportunity to take advantage of free information, services, training, and financial assistance for getting a job to which they have already made a claim. The current work looks to Chatman's "small worlds" work, Johnson's comprehensive model of information seeking, and Wilson's "costly ignorance" construct for contributions to understanding such behavior. Identification of a particular trait or set of traits of job seekers during periods of unemployment will inform a new Job Seeking Activities Model (JSAM). This study purposely examines job seeker information behavior and the factors which influence job seekers' behavior, in particular, family tangible support as a social norm effect. A mixed method, using questionnaires for job hunting completers and non-completers and interviews for experts, was employed for data collection. Quantitative data analysis was conducted to provide the Cronbach α coefficient, Pearson's product moment correlation, an independent-sample t-test, effect size, and binary Logit regression. The qualitative data generated from the interview transcript for each section of the themes and subthemes were color coded. Finally, simultaneous triangulation was carried out to confirm or contradict the results from each method. The findings show that social norms, particularly uncontrolled social support provided by their families, are more likely to make job seekers ignore the relevant information about jobs available to them in favor …
Countering Hate Speech: Modeling User-Generated Web Content Using Natural Language Processing
Social media is considered a particularly conducive arena for hate speech. Counter speech, which is a "direct response that counters hate speech" is a remedy to address hate speech. Unlike content moderation, counter speech does not interfere with the principle of free and open public spaces for debate. This dissertation focuses on the (a) automatic detection and (b) analyses of the effectiveness of counter speech and its fine-grained strategies in user-generated web content. The first goal is to identify counter speech. We create a corpus with 6,846 instances through crowdsourcing. We specifically investigate the role of conversational context in the annotation and detection of counter speech. The second goal is to assess and predict conversational outcomes of counter speech. We propose a new metric to measure conversation incivility based on the number of uncivil and civil comments as well as the unique authors involved in the discourse. We then use the metric to evaluate the outcomes of replies to hate speech. The third goal is to establish a fine-grained taxonomy of counter speech. We present a theoretically grounded taxonomy that differentiates counter speech addressing the author of hate speech from addressing the content. We further compare the conversational outcomes of different types of counter speech and build models to identify each type. We conclude by discussing our contributions and future research directions on using user-generated counter speech to combat online hatred.
Coyote Ugly Librarian: A Participant Observer Examination of Lnowledge Construction in Reality TV.
Reality TV is the most popular genre of television programming today. The number of reality television shows has grown exponentially over the last fifteen years since the premier of The Real World in 1992. Although reality TV uses styles similar to those used in documentary film, the “reality” of the shows is questioned by critics and viewers alike. The current study focuses on the “reality” that is presented to viewers and how that “reality” is created and may differ from what the participants of the shows experience. I appeared on two reality shows, Faking It and That's Clever, and learned a great deal as a participant observer. Within the study, I outline my experience and demonstrate how editing changed the reality I experienced into what was presented to the viewers. O'Connor's (1996) representation context web serves as a model for the realities created through reality television. People derive various benefits from watching reality TV. Besides the obvious entertainment value of reality TV, viewers also gather information via this type of programming. Viewers want to see real people on television reacting to unusual circumstances without the use of scripts. By surveying reality TV show viewers and participants, this study gives insight into how real the viewers believe the shows are and how authentic they actually are. If these shows are presented as reality, viewers are probably taking what they see as historical fact. The results of the study indicate more must be done so that the “reality” of reality TV does not misinform viewers.
Creating a Criterion-Based Information Agent Through Data Mining for Automated Identification of Scholarly Research on the World Wide Web
This dissertation creates an information agent that correctly identifies Web pages containing scholarly research approximately 96% of the time. It does this by analyzing the Web page with a set of criteria, and then uses a classification tree to arrive at a decision. The criteria were gathered from the literature on selecting print and electronic materials for academic libraries. A Delphi study was done with an international panel of librarians to expand and refine the criteria until a list of 41 operationalizable criteria was agreed upon. A Perl program was then designed to analyze a Web page and determine a numerical value for each criterion. A large collection of Web pages was gathered comprising 5,000 pages that contain the full work of scholarly research and 5,000 random pages, representative of user searches, which do not contain scholarly research. Datasets were built by running the Perl program on these Web pages. The datasets were split into model building and testing sets. Data mining was then used to create different classification models. Four techniques were used: logistic regression, nonparametric discriminant analysis, classification trees, and neural networks. The models were created with the model datasets and then tested against the test dataset. Precision and recall were used to judge the effectiveness of each model. In addition, a set of pages that were difficult to classify because of their similarity to scholarly research was gathered and classified with the models. The classification tree created the most effective classification model, with a precision ratio of 96% and a recall ratio of 95.6%. However, logistic regression created a model that was able to correctly classify more of the problematic pages. This agent can be used to create a database of scholarly research published on the Web. In addition, the technique can be used to create a …
CT3 as an Index of Knowledge Domain Structure: Distributions for Order Analysis and Information Hierarchies
The problem with which this study is concerned is articulating all possible CT3 and KR21 reliability measures for every case of a 5x5 binary matrix (32,996,500 possible matrices). The study has three purposes. The first purpose is to calculate CT3 for every matrix and compare the results to the proposed optimum range of .3 to .5. The second purpose is to compare the results from the calculation of KR21 and CT3 reliability measures. The third purpose is to calculate CT3 and KR21 on every strand of a class test whose item set has been reduced using the difficulty strata identified by Order Analysis. The study was conducted by writing a computer program to articulate all possible 5 x 5 matrices. The program also calculated CT3 and KR21 reliability measures for each matrix. The nonparametric technique of Order Analysis was applied to two sections of test items to stratify the items into difficulty levels. The difficulty levels were used to reduce the item set from 22 to 9 items. All possible strands or chains of these items were identified so that both reliability measures (CT3 and KR21) could be calculated. One major finding of this study indicates that .3 to .5 is a desirable range for CT3 (cumulative p=.86 to p=.98) if cumulative frequencies are measured. A second major finding is that the KR21 reliability measure produced an invalid result more than half the time. The last major finding is that CT3, rescaled to range between 0 and 1, supports De Vellis' guidelines for reliability measures. The major conclusion is that CT3 is a better measure of reliability since it considers both inter- and intra-item variances.
Customers' Attitudes toward Mobile Banking Applications in Saudi Arabia
Mobile banking services have changed the design and delivery of financial services and the whole banking sector. Financial service companies employ mobile banking applications as new alternative channels to increase customers' convenience and to reduce costs and maintain profitability. The primary focus of this study was to explore the Saudi bank customers' perceptions about the adoption of mobile banking applications and to test the relationships between the factors that influence mobile banking adoption as independent variables and the action to adopt them as the dependent variable. Saudi customers' perceptions were tested based on the extended versions of IDT, TAM and other diffusion of innovation theories and frameworks to generate a model of constructs that can be used to study the use and the adoption of mobile technology by users. Koenig-Lewis, Palmer, & Moll's (2010) model was used to test its constructs of (1) perceived usefulness, (2) perceived ease of use, (3) perceived compatibility, (4) perceived credibility, (5) perceived trust, (6) perceived risk, and (7) perceived cost, and these were the independent variables in current study. This study revealed a high level of adoption that 82.7% of Saudis had adopted mobile banking applications. Also, the findings of this study identified a statistically significant relationship between all of demographic differences: gender, education level, monthly income, and profession and mobile banking services among adopters and non-adopters. Seven attributes relating to the adoption of mobile banking applications were evaluated in this study to assess which variables affected Saudi banks customers in their adoption of mobile banking services. The findings indicated that the attributes that significantly affected the adoption of mobile banking applications among Saudis were perceived trust, perceived cost, and perceived risk. These three predictors, as a result, explained more than 60% of variance in intention to adopt mobile banking technology in Saudi Arabia. …
Cyber Addiction and Information Overload and Their Impact on Workplace Productivity
The research examines the relationship between cyber addiction (excessive use of the Internet, CA), information overload (IO), and assesses their impact on workplace productivity. A multi-methods approach is used employing the Internet Addiction Test (IAT) and a quantitative survey design to assess and test the stated hypothesis. The study used random sampling methods targeting 150 respondents from different information technology departments of various organizations. The study hypothesizes that CA and IO have a reciprocal association, which adversely affects workplace productivity and employee performance. From the findings, IAT scores increase with an associated possibility of reporting burnout, fatigue, and other components associated with CA and IO. Also, CA and IO were significantly correlated, as evaluated by the chi-square test, although the same approach did not yield significant associations between CA and perceived internet dependence. Other findings CA components, such as social media use, significantly associated with task postponement and burnout. As well, CA affected IO with substantial impacts on workplace productivity. The paper highlights managerial aspects that organizations should consider in optimizing the output of their staff. Recommendations include wellness programs, altering the leadership and management styles, and sensitizing the employees on the adverse effects caused by the two variables.
Data Quality Evaluation and Improvement for Machine Learning
In this research the focus is on data-centric AI with a specific concentration on data quality evaluation and improvement for machine learning. We first present a practical framework for data quality evaluation and improvement, using a legal domain as a case study and build a corpus for legal argument mining. We first created an initial corpus with 4,937 instances that were manually labeled. We define five data quality evaluation dimensions: comprehensiveness, correctness, variety, class imbalance, and duplication, and conducted a quantitative evaluation on these dimensions for the legal dataset and two existing datasets in the medical domain for medical concept normalization. The first group of experiments showed that class imbalance and insufficient training data are the two major data quality issues that negatively impacted the quality of the system that was built on the legal corpus. The second group of experiments showed that the overlap between the test datasets and the training datasets, which we defined as "duplication," is the major data quality issue for the two medical corpora. We explore several widely used machine learning methods for data quality improvement. Compared to pseudo-labeling, co-training, and expectation-maximization (EM), generative adversarial network (GAN) is more effective for automated data augmentation, especially when a small portion of labeled data and a large amount of unlabeled data is available. The data validation process, the performance improvement strategy, and the machine learning framework for data evaluation and improvement discussed in this dissertation can be used by machine learning researchers and practitioners to build high-performance machine learning systems. All the materials including the data, code, and results will be released at: https://github.com/haihua0913/dissertation-dqei.
The Denial of Relevance: Biography of a Quest(ion) Amidst the Min(d)fields—Groping and Stumbling
Early research on just why it might be the case that “the mass of men lead lives of quiet desperation” suggested that denial of relevance was a significant factor. Asking why denial of relevance would be significant and how it might be resolved began to raise issues of the very nature of questions. Pursuing the nature of questions, in light of denial of relevance and Thoreau’s “quiet desperation” provoked a journey of modeling questions and constructing a biography of the initial question of this research and its evolution. Engaging literature from philosophy, neuroscience, and retrieval then combined with deep interviews of successful lawyers to render a thick, biographical model of questioning.
Back to Top of Screen