Search Results

The Acceptance and Use of Cloud Computing Services by Small and Medium Enterprises in Lagos, Nigeria
This study explored the acceptance of cloud computing (CC) services by small and medium enterprises (SMEs) in Lagos, Nigeria, which has been missing from CC services literature. It aimed to understand the motivations for adoption, the uses of the services, and the benefits they derive from it. The uses and gratification theory was applied as the theoretic framework for this endeavor. An online survey with close-ended and open-ended questions was distributed to 1200 randomly selected participants through email. In total, 392 valid responses were collected and analyzed using descriptive statistics and categories. The results found that SMEs in Lagos, Nigeria had a low level of awareness and appreciation of CC services. The adoption rate was also low. Unlike their counterparts in other regions, SMEs primary concerns were service downtime, stable power supply, and better internet access. The study found that SMEs were not taking full advantage of the capabilities of CC services. Some sections, however, were doing better than others, such as the information and communications sub-sector. This study suggested that targeted interventions should be conducted to raise the awareness of CC services in SMEs, and to improve their efficient and effective use of CC services. The uses and gratification theory was appropriate for guiding this study to understand the acceptance and use of CC services by SMEs in Lagos, Nigeria.
Adolescent Task Management: Multitasking and Social Media in the Student Search Process
This study examines adolescent students at an American international school and observes student use of social networking programs as well as physical actions in the search process. The study specifically observed multitasking behavior and organizational skills among students, as well as linkages made through social networking sites. Student observations, student interviews, analysis of Facebook entries, and a survey on multitasking yielded rich data. Students appear to be far more organized than previously suggested in the literature, and in this study, the organization proved to be largely self-taught. Students used their social networks to build a kind of group expertise that compensated for their youthful naivety. Students exhibited self-control within the search to the degree that they could focus on what they wanted to find, and they used heuristics—mental shortcuts—to achieve what they needed. Searches also suggest creativity in that students were flexible in their search methods and used a number of tools to gather information. Students could balance the needs of the academic or imposed search with their own online lives, meaning that they made compensations for social media and media multitasking when it was deemed necessary.
The Adoption of Open Source Software in Uganda: a Pragmatist Approach to the Formation of a National Information Policy for a New Technology
This exploratory research examined an information policy formation process for the adoption of open source software (OSS) in Uganda. Grounded in a pragmatist tradition, this theoretical and empirical study pursued a qualitative research approach with a triangulation of theoretical concepts, data collection, and analysis techniques in an iterative and interactive process. The design provided a powerful context to develop and conduct field activities in Kampala with a purposeful sample of 22 participants, 20 in interviews and 5 in a focus group discussion. The research design enhanced consistency in the evidence from the data, increased robustness in the results, and confidence in the findings. The results highlighted a vibrant ICT sector in Uganda, underlined the multiple stakeholders and their competing interests in the policy, revealed a lack of consensus between the government and OSS promoters on the meaning of OSS, and illuminated the benefits in the OSS model over proprietary software. The stakeholders' conflicting perceptions appear to be too far apart to allow meaningful progress and are derailing the policy. Unless their conflicting perceptions are resolved, the OSS policy will continue stagnating. The study fills critical information gaps in Uganda’s policy formation processes, provides timely and relevant information to holistically understand a complex policy formation stage to enable stakeholders to resolve their impasse and enact a law to embrace OSS. It breaks ground in information policy research in framing policy formation processes for new ICTs, such as OSS, as ideologically-oriented. The findings offer ideas to scholars and African countries to draw applicable lessons.
An Analysis of Student Perceptions of Teaching Effectiveness for Instructors Who Teach the Same Course in the Same Semester in Both Online and Face-to-Face Formats
There is an increasingly number of students taking online classes in lieu of or in addition to the traditional face-to-face format. With this trend, there are questions that naturally come to the surface. The biggest question being "is teaching in the online arena just as effective as the face-to-face arena?" This dissertation aims to pursue that line of questioning by analyzing students' perceptions of the teaching effectiveness for instructors who teach the same course in both an online and face-to-face format in the same semester. The data are analyzed through the lens of the social capital theory. Social capital has never been applied to the classroom before as its focus has traditionally been on community development. However, social capital theory addresses interpersonal relationships and their impact on knowledge sharing behavior. This theory identifies three dimensions, which appear to have a parallel track with the student evaluation components; each is analyzed against each other. These dimensions include structured, cognitive and relational and are compared to the components of the student evaluation tool, which includes organization and explanation of materials, learning environment and self-regulated learning.
Analyzing Tradeoffs between Privacy Concerns and Active Social Media Presence of 18- to 30-Year-Old College Students
This study applied the impression management theory in the context of social networking to investigate the generalized research question of this dissertation which is "Do active social media presence and various privacy concerns influence online behaviors of students on social media?" The results and conclusions are presented via the conduct of three different studies and the summary provides insights and explain the overall contribution of the research. For each study we developed a research model for which data was collected separately for each of these models. Hypotheses of each model were tested by partial least squares- structural equation modeling techniques using SmartPLS 2.0. Our findings confirm the hypotheses and showed that all the predictors positively influence online social networking behaviors. Active social media presence is operationalized as predictors such as SNS stalking awareness, Selective disclosure, desired differential persona, impression motivation, and information trustworthiness. Privacy concerns have been operationalized as SNS privacy awareness, technology awareness. Online behaviors have been operationalized as responsible image and reckless image.
Assessing Terrorist Cyber Threats: Engineering a Functional Construct
Terrorist organizations and individuals make use of the Internet for supportive activities such as communication, recruiting, financing, training, and planning operations. However, little is known about the level of computer-based (“cyber”) threat such terrorist organizations and individuals pose. One step in facilitating the examination and assessment of the level of cyber threat posed by terrorist organizations and individuals is development of an assessment tool or methodology. This tool would guide intelligence collection efforts and would support and facilitate comparative assessment of the cyber threat posed by terrorist organizations and individuals through the provision of a consistent method of assessment across time, amongst organizations and individuals, and between analysts. This study leveraged the professional experience of experts to engineer a new functional construct – a structured analytical technique designed to assess the cyber threat posed by terrorist entities and individuals. The resultant instrument was a novel structured analytical construct that uses defined indicators of a terrorist organization/individual’s intent to carry out cyber attacks, and their capability to actually do so as measures of an organization/individual’s overall level of cyber threat.
Automatic Language Identification for Metadata Records: Measuring the Effectiveness of Various Approaches
Automatic language identification has been applied to short texts such as queries in information retrieval, but it has not yet been applied to metadata records. Applying this technology to metadata records, particularly their title elements, would enable creators of metadata records to obtain a value for the language element, which is often left blank due to a lack of linguistic expertise. It would also enable the addition of the language value to existing metadata records that currently lack a language value. Titles lend themselves to the problem of language identification mainly due to their shortness, a factor which increases the difficulty of accurately identifying a language. This study implemented four proven approaches to language identification as well as one open-source approach on a collection of multilingual titles of books and movies. Of the five approaches considered, a reduced N-gram frequency profile and distance measure approach outperformed all others, accurately identifying over 83% of all titles in the collection. Future plans are to offer this technology to curators of digital collections for use.
Blogging and Tweens: Communication Portal to Reading Selection and Engagement
The ethnographic study utilized the research techniques of observations, content analysis, and semi-structured interviews with tween participants (i.e., 9 through 13 year-old youth) during an 8-week literary blog project. Twenty-six participants created individual blog pages within a member-only classroom blog site that allowed for online communication between members. the blog project incorporated social networking applications with which youth frequently engage. the research questions ensured data regarding what facets participants found appealing and motivating during the project was collected. the questions allowed for determining if participants utilized peer blogs for reading material selection or repurposed the blogs to discuss other topics. Components of self-determination theory and engagement theory underlay the project design and aided in identifying motivational aspects of the data. Frequency tables outlined the identified patterns and structures of participants’ online activity. Participants found the ability to change the colors of their blog backgrounds and to design their individual blogs and the giving and receiving of feedback to be the two most appealing features of the project. Participants chose books from peer suggestions in the online world but also selected materials from recommendations they received in face-to-face interactions with their peers, their teacher, and the school librarian. Little evidence of repurposing the blog for social topics was observed. Participants engaged in discussions predominantly based around the books they were currently reading or had read. Implications for incorporating social networking applications within the classroom environment are discussed.
Bridging the Theory-to-practice Gap: a Multivariate Correlational Study Exploring the Effects of a Graduate Online Learning Environment As a Community of Practice Framework
In this multivariate correlational study, the researcher examined the course culture of an online graduate course whose environment exhibited characteristics of a Community of practice (CoP). An online survey captured data used to explore the relationships among variables shown to describe a CoP in field environments and among student perceptions of their experience in the course culture. A canonical correlation analysis (CCA) and commonality analysis (CA) were conducted using five predictor variables and three criterion variables to evaluate the degree and direction of the relationships. The CCA revealed that the full model was significant, explaining approximately 74% of the variance among the two synthetic variates. Impact, faculty leadership, and connection were the largest contributors to the predictor variate. The criterion variate was primarily explained by value and perceived CoP, with exposure to the profession providing a smaller contribution. The CA confirmed these findings. Results from this study indicate that a CoP could be fostered in an online graduate course. The overall significance of the model indicates teachers can nurture an environment wherein graduate students will take the initiative to work with others to create and acquire knowledge that creates a sense of professional connection with each other and with the profession overall. The results of this study suggest further empirical research in implementing and assessing CoPs in online graduate courses is warranted.
Building an Understanding of International Service Learning in Librarianship
From the very beginning, library education has been a mixture of theory and practice. Dewey required apprenticeships to be part of the first library school at the University of Chicago as a method to indoctrinate new professional. Today, acculturation is incorporated into the professional education through a large variety of experiential learning techniques, including internships, practicum, field work, and service learning projects, all of which are designed to develop some level of professional skills within an information organization. But, what is done for understanding library culture? It is said that one cannot truly recognize the extent of one's own cultural assumptions, until they have experienced another. This study followed a group of LIS graduate students that took that next step – going to Russia. By employing a critical hermeneutic methodology, this study sought to understand what value students gain by from working on an assessment project in an international school library. Using a horizon analysis, the researcher established the worldview of participants prior to their departure, analyzed their experience through post-experience interviews, and constructed an understanding of value. Among other concepts, the researcher looked specifically to see whether "library cultural competency", understanding library culture in global context, was developed through working on a service learning project within an international school library. This dissertation provides feedback for the program leaders and ideas for future research.
Comparing the Readability of Text Displays on Paper, E-Book Readers, and Small Screen Devices
Science fiction has long promised the digitalization of books. Characters in films and television routinely check their palm-sized (or smaller) electronic displays for fast-scrolling information. However, this very technology, increasingly prevalent in today's world, has not been embraced universally. While the convenience of pocket-sized information pieces has the techno-savvy entranced, the general public still greets the advent of the e-book with a curious reluctance. This lack of enthusiasm seems strange in the face of the many advantages offered by the new medium - vastly superior storage capacity, searchability, portability, lower cost, and instantaneous access. This dissertation addresses the need for research examining the reading comprehension and the role emotional response plays in the perceived performance on e-document formats as compared to traditional paper format. This study compares the relative reading comprehension on three formats (Kindle, iTouch, and paper) and examines the relationship of subject's emotional response and relative technology exposure as factors that affect how the subject perceives they have performed on those formats. This study demonstrates that, for basic reading comprehension, the medium does not matter. Furthermore, it shows that, the more uncomfortable a person is with technology and expertise in the requested task (in this case, reading), the more they cling to the belief that they will do better on traditional (paper) media - regardless of how well they actually do.
A Comparison of Major Factors that Affect Hospital Formulary Decision-Making by Three Groups of Prescribers
The exponential growth in medical pharmaceuticals and related clinical trials have created a need to better understand the decision-making factors in the processes for developing hospital medication formularies. The purpose of the study was to identify, rank, and compare major factors impacting hospital formulary decision-making among three prescriber groups serving on a hospital's pharmacy and therapeutics (P&T) committee. Prescribers were selected from the University of Texas, MD Anderson Cancer Center which is a large, multi-facility, academic oncology hospital. Specifically, the prescriber groups studied were comprised of physicians, midlevel providers, and pharmacists. A self-administered online survey was disseminated to participants. Seven major hospital formulary decision-making factors were identified in the scientific literature. Study participants were asked to respond to questions about each of the hospital formulary decision-making factors and to rank the various formulary decision-making factors from the factor deemed most important to the factor deemed least important. There are five major conclusions drawn from the study including three similarities and two significant differences among the prescriber groups and factors. Similarities include: (1) the factor "pharmacy staff's evaluation of medical evidence including formulary recommendations" was ranked highest for all three prescriber groups; (2) "evaluation of medications by expert physicians" was ranked second for physicians and midlevel providers while pharmacists ranked it third; and (3) the factor, "financial impact of the treatment to the patient" was fifth in terms of hospital formulary decision-making statement and ranking by all three prescriber groups. Two significant differences include: (1) for the hospital-formulary decision making statement, "I consider the number of patients affected by adding, removing, or modifying a drug on the formulary when making hospital medication formulary decisions," midlevel providers considered this factor of significantly greater importance than did physicians; and (2) for the ranked hospital formulary decision-making factor, "financial impact of treatment to the …
Controlled Vocabularies in the Digital Age: Are They Still Relevant?
Keyword searching and controlled vocabularies such as Library of Congress subject headings (LCSH) proved to work well together in automated technologies and the two systems have been considered complimentary. When the Internet burst onto the information landscape, users embraced the simplicity of keyword searching of this resource while researchers and scholars seemed unable to agree on how best to make use of controlled vocabularies in this huge database. This research looked at a controlled vocabulary, LCSH, in the context of keyword searching of a full text database. The Internet and probably its most used search engine, Google, seemed to have set a standard that users have embraced: a keyword-searchable single search box on an uncluttered web page. Libraries have even introduced federated single search boxes to their web pages, another testimony to the influence of Google. UNT's Thesis and Dissertation digital database was used to compile quantitative data with the results input into an EXCEL spreadsheet. Both Library of Congress subject headings (LCSH) and author-assigned keywords were analyzed within selected dissertations and both systems were compared. When the LCSH terms from the dissertations were quantified, the results showed that from a total of 788 words contained in the 207 LCSH terms assigned to 70 dissertations, 246 of 31% did not appear in the title or abstract while only 8, or about 1% from the total of 788, did not appear in the full text. When the author-assigned keywords were quantified, the results showed that from a total of 552 words from304 author-assigned keywords in 86 dissertations, 50 or 9% did not appear in the title or abstract while only one word from the total of 552 or .18% did not appear in the full text. Qualitatively, the LCSH terms showed a hierarchical construction that was clearly designed for a print …
Convenience to the Cataloger or Convenience to the User?: An Exploratory Study of Catalogers’ Judgment
This mixed-method study explored cataloger’s judgment through the presence of text as entered by catalogers for the 11 electronic resource items during the National Libraries test for Resource Description and Access (RDA). Although the literature discusses cataloger’s judgment and suggests that cataloging practice based on new cataloging code RDA will more heavily rely on cataloger’s judgment, the topic of cataloger’s judgment in RDA cataloging was not formally studied. The purpose of this study was to study the differences and similarities in the MARC records created as a part of the RDA National Test and to determine if the theory of bounded rationality could explain cataloger’s judgment based on the constructs of cognitive and temporal limits. This goal was addressed through a content analysis of the MARC records and various statistical tests (Pearson’s Chi-square, Fisher’s Exact, and Cramer’s V). Analysis of 217 MARC records was performed on seven elements of the bibliographic record. This study found that there were both similarities and differences among the various groups of participants, and there are indications that both support and refute the assertion that catalogers make decisions based on the constructs of time and cognitive ability. Future research is needed to be able to determine if bounded rationality is able to explain cataloger’s judgment; however, there are indicators that both support and refute this assertion. The findings from this research have implications for the cataloging community through the provision of training opportunities for catalogers, evaluating workflows, ensuring the proper indexing of bibliographic records for discovery, and recommended edits to RDA.
Conversational Use of Photographic Images on Facebook: Modeling Visual Thinking on Social Media
Modeling the "thick description" of photographs began at the intersection of personal and institutional descriptions. Comparing institutional descriptions of particular photos that were also used in personal online conversations was the initial phase. Analyzing conversations that started with a photographic image from the collection of the Library of Congress (LC) or the collection of the Manchester Historic Association (MHA) provided insights into how cultural heritage institutions could enrich the description of photographs by using informal descriptions such as those applied by Facebook users. Taking photos of family members, friends, places, and interesting objects is something people do often in their daily lives. Some photographic images are stored, and some are shared with others in gatherings, occasions, and holidays. Face-to-face conversations about remembering some of the details of photographs and the event they record are themselves rarely recorded. Digital cameras make it easy to share personal photos in Web conversations and to duplicate old photos and share them on the Internet. The World Wide Web even makes it simple to insert images from cultural heritage institutions in order to enhance conversations. Images have been used as tokens within conversations along with the sharing of information and background knowledge about them. The recorded knowledge from conversations using photographic images on Social Media (SM) has resulted in a repository of rich descriptions of photographs that often include information of a type that does not result from standard archival practices. Closed group conversations on Facebook among members of a community of interest/practice often involve the use of photographs to start conversations, convey details, and initiate story-telling about objets, events, and people. Modeling of the conversational use of photographic images on SM developed from the exploratory analyses of the historical photographic images of the Manchester, NH group on Facebook. The model was influenced by the …
The Correlation between Information Literacy and Critical Thinking of College Students: An Exploratory Study
This exploratory, mixed-methods study investigated the relationship between information literacy and critical thinking. The research question guiding the first portion of the study was: How do information literacy and critical thinking relate in undergraduate students conducting academic research? Using two standardized assessments, the study assessed the information literacy and critical thinking skills of a small population of college students from a private, university in Texas. The correlational analysis of the scores from the two assessments showed a statistically significant, positive, moderate correlation. The study also explored the likelihood of gender differences in cognitive processing using information literacy and critical think skills assessments. The independent samples t-tests for both assessments demonstrated no statistically significant differences between female and male participants. Finally, a qualitative component comprised of a questionnaire provided context to the assessment scores through items requesting information on participant source selection priorities via the three middle stages of Kuhlthau's information search process model as well as their criteria for selecting sources of information. Though only a small number of the participants completed the questionnaire, the responses highlighted areas of interest for future research.
Costly Ignorance: The Denial of Relevance by Job Seekers: A Case Study in Saudi Arabia
Job centers aid businesses seeking qualified employees and assist job seekers to select and contact employment and training services. Job seekers are also offered the opportunity to assess their skills, abilities, qualifications, and readiness. Furthermore, job centers ensure that job seekers are complying with requirements that they must meet to benefit from job assistance programs such as unemployment insurance. Yet, claimants often procrastinate and/or suspend their job search efforts even though such actions can make them lose their free time and entitlements, and more importantly they may lose the opportunity to take advantage of free information, services, training, and financial assistance for getting a job to which they have already made a claim. The current work looks to Chatman's "small worlds" work, Johnson's comprehensive model of information seeking, and Wilson's "costly ignorance" construct for contributions to understanding such behavior. Identification of a particular trait or set of traits of job seekers during periods of unemployment will inform a new Job Seeking Activities Model (JSAM). This study purposely examines job seeker information behavior and the factors which influence job seekers' behavior, in particular, family tangible support as a social norm effect. A mixed method, using questionnaires for job hunting completers and non-completers and interviews for experts, was employed for data collection. Quantitative data analysis was conducted to provide the Cronbach α coefficient, Pearson's product moment correlation, an independent-sample t-test, effect size, and binary Logit regression. The qualitative data generated from the interview transcript for each section of the themes and subthemes were color coded. Finally, simultaneous triangulation was carried out to confirm or contradict the results from each method. The findings show that social norms, particularly uncontrolled social support provided by their families, are more likely to make job seekers ignore the relevant information about jobs available to them in favor …
Customers' Attitudes toward Mobile Banking Applications in Saudi Arabia
Mobile banking services have changed the design and delivery of financial services and the whole banking sector. Financial service companies employ mobile banking applications as new alternative channels to increase customers' convenience and to reduce costs and maintain profitability. The primary focus of this study was to explore the Saudi bank customers' perceptions about the adoption of mobile banking applications and to test the relationships between the factors that influence mobile banking adoption as independent variables and the action to adopt them as the dependent variable. Saudi customers' perceptions were tested based on the extended versions of IDT, TAM and other diffusion of innovation theories and frameworks to generate a model of constructs that can be used to study the use and the adoption of mobile technology by users. Koenig-Lewis, Palmer, & Moll's (2010) model was used to test its constructs of (1) perceived usefulness, (2) perceived ease of use, (3) perceived compatibility, (4) perceived credibility, (5) perceived trust, (6) perceived risk, and (7) perceived cost, and these were the independent variables in current study. This study revealed a high level of adoption that 82.7% of Saudis had adopted mobile banking applications. Also, the findings of this study identified a statistically significant relationship between all of demographic differences: gender, education level, monthly income, and profession and mobile banking services among adopters and non-adopters. Seven attributes relating to the adoption of mobile banking applications were evaluated in this study to assess which variables affected Saudi banks customers in their adoption of mobile banking services. The findings indicated that the attributes that significantly affected the adoption of mobile banking applications among Saudis were perceived trust, perceived cost, and perceived risk. These three predictors, as a result, explained more than 60% of variance in intention to adopt mobile banking technology in Saudi Arabia. …
The Denial of Relevance: Biography of a Quest(ion) Amidst the Min(d)fields—Groping and Stumbling
Early research on just why it might be the case that “the mass of men lead lives of quiet desperation” suggested that denial of relevance was a significant factor. Asking why denial of relevance would be significant and how it might be resolved began to raise issues of the very nature of questions. Pursuing the nature of questions, in light of denial of relevance and Thoreau’s “quiet desperation” provoked a journey of modeling questions and constructing a biography of the initial question of this research and its evolution. Engaging literature from philosophy, neuroscience, and retrieval then combined with deep interviews of successful lawyers to render a thick, biographical model of questioning.
Development and Validation of an Instrument to Operationalize Information System Requirements Capabilities
As a discipline, information systems (IS) has struggled with the challenge of alignment of product (primarily software and the infrastructure needed to run it) with the needs of the organization it supports. This has been characterized as the pursuit of alignment of information technology (IT) with the business or organization, which begins with the gathering of the requirements of the organization, which then guide the creation of the IS requirements, which in turn guide the creation of the IT solution itself. This research is primarily focused on developing and validating an instrument to operationalize such requirements capabilities. Requirements capabilities at the development of software or the implementation of a specific IT solution are referred to as capabilities for software requirements or more commonly systems analysis and design (SA&D) capabilities. This research describes and validates an instrument for SA&D capabilities for content validity, construct validity, internal consistency, and an exploratory factor analysis. SA&D capabilities were expected to coalesce strongly around a single dimension. Yet in validating the SA&D capabilities instrument, it became apparent that SA&D capabilities are not the unidimensional construct traditionally perceived. Instead it appears that four dimensions underlie SA&D capabilities, and these are associated with alignment maturity (governance, partnership, communications, and value). These sub factors of requirements capabilities are described in this research and represent distinct capabilities critical to the successful alignment of IT with the business.
Development of an Instrument to Measure the Level of Acceptability and Tolerability of Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users
Cyber aggression came about as a result of advances in information communication technology and the aggressive usage of the technology in real life. Cyber aggression can take on many forms and facets. However, the main focus of this study is cyberbullying and cyberstalking through information sharing practices that might constitute digital aggressive acts. Human aggression has been extensively investigated. Studies focusing on understanding the causes and effects that can lead to physical and digital aggression have shown the prevalence of cyber aggression in different settings. Moreover, these studies have shown strong relationship between cyber aggression and the physiological and physical trauma on both perpetrators and their victims. Nevertheless, the literature shows a lack of studies that could measure the level of acceptance and tolerance of these dangerous digital acts. This study is divided into two main stages; Stage one is a qualitative pilot study carried out to explore the concept of cyber aggression and its existence in Saudi Arabia. In-depth interviews were conducted with 14 Saudi social media users to collect understanding and meanings of cyber aggression. The researcher followed the Colaizzi’s methods to analyze the descriptive data. A proposed model was generated to describe cyber aggression in social media applications. The results showed that there is a level of acceptance to some cyber aggression acts due to a number of factors. The second stage of the study is focused on developing scales with reliable items that could determine acceptability and tolerability of cyber aggression. In this second stage, the researcher used the factors discovered during the first stage as source to create the scales’ items. The proposed methods and scales were analyzed and tested to increase reliability as indicated by the Cronbach’s Alpha value. The scales were designed to measure how acceptable and tolerable is cyber-bullying, cyber-stalking in Saudi …
The Effects of Student-Perceived Instructor Demotivating Behaviors on Doctoral Students' Information Seeking Behaviors
In their studies on student motivation in th4e 1990s, Gorham & Christophel and Christophel & Gorham found that students perceived their own demotivation to be caused by instructor behaviors. While there are studies that explore the topic of student demotivation and other studies that illustrate the great influence instructors have on student information seeking behaviors, research focusing on the connection between these two concepts is almost nonexistent. Using Gorham & Christophel's concept of instructor-owned student demotivation, this mixed-methods study sought to identify which instructor behaviors doctoral computer science and information science students found demotivating and to what extent their perceptions of these demotivating instructor behaviors influenced their information seeking behaviors in a face-to-face classroom. Demographic and student-perceived demotivating instructor behavior surveys along with semi-structured interviews and follow-up questions were used to collect data. The surveys will be analyzed using descriptive statistics in Excel, and the semi-structured interviews and follow up questions were analyzed using content analysis and Colaizzi's method of phenomenological enquiry in NVivo. The findings showed that instructor demotivating behaviors not only influence student information seeking behaviors in the classroom, but they also can lead to lasting effects on the student. In addition, the participants have expectations of instructor behaviors, which come from their own experiences. These expectations also influence the level of demotivation they feel in a face-to-face classroom.
Effects of Tasks on Information-Seeking Behavior in a Police Work Environment in the Context of Criminal Intelligence
Although dominant effects of tasks on individuals' information-seeking behavior is accepted by many scholars, a limited number of studies has been conducted to reveal the nature of the relationship between tasks and information-seeking behavior. In their studies, some earlier researchers categorized tasks according to their complexity while others did the same according to the specifications of tasks. Two of the groundbreaking researchers in this area are Katriina Byström and Kalervo Järvelin who contributed to the understanding of the relationship between task complexity and information-seeking behavior. However, their findings also need empirical support for theory growth. In response to this need, this study attempts to test Byström and Järvelin's findings through a research using different research methods and applied in a police work environment. Other than providing empirical support for theory growth, this research is also expected to contribute to the understudied area of police information-seeking behavior. Both qualitative and quantitative data were collected from the participants who came from traffic, homicide, and anti-terrorism divisions of Ankara, Eskisehir, and Kirikkale Police Departments in Turkey. The participants identified terrorism cases as the most complex cases to solve, followed by homicide and traffic accident cases. Differences in the information-seeking behavior of three groups of police officers were examined through qualitative and quantitative data analysis. Oneway ANOVA technique and post hoc comparisons were used to analyze the quantitative data. In addition to shedding light on information-seeking behavior of police officers investigating related cases in Turkey, the results provided support for Byström and Järvelin's findings. For instance, the officers investigating more complex tasks used significantly more information sources than the others, while the use of external information sources was significantly higher in more complex cases.
An Empirical Study of Quality and Satisfaction with a Focus on Creating a Parsimonious Measurement Instrument in an Information Space
Student satisfaction and service quality are interrelated constructs that are associated with improving student retention. This research investigated the relationships between these constructs in the context of an institution of higher education as an information system and sought to reduce the dimensionality of what have traditionally been considered orthogonal factors of these constructs in order to produce a parsimonious model and survey instrument that may be useful in assessing and predicting overall student satisfaction and overall service quality. The methods of analysis used in this study are quantitative in nature and included the use of descriptive univariate, bivariate, and multivariate analyses; exploratory factor analysis to examine latent dimensions within the data; and multiple linear regressions to measure the predictive efficacy of combinations of variables with respect to overall student satisfaction and overall service quality. It was hypothesized that the statistical treatment of the data would show that some dimensions routinely collapse, leading to possible valuable theoretical implications.
Enhancing User Search Experience in Digital Libraries with Rotated Latent Semantic Indexing
This study investigates a semi-automatic method for creation of topical labels representing the topical concepts in information objects. The method is called rotated latent semantic indexing (rLSI). rLSI has found application in text mining but has not been used for topical labels generation in digital libraries (DLs). The present study proposes a theoretical model and an evaluation framework which are based on the LSA theory of meaning and investigates rLSI in a DL environment. The proposed evaluation framework for rLSI topical labels is focused on human-information search behavior and satisfaction measures. The experimental systems that utilize those topical labels were built for the purposes of evaluating user satisfaction with the search process. A new instrument was developed for this study and the experiment showed high reliability of the measurement scales and confirmed the construct validity. Data was collected through the information search tasks performed by 122 participants using two experimental systems. A quantitative method of analysis, partial least squares structural equation modeling (PLS-SEM), was used to test a set of research hypotheses and to answer research questions. The results showed a not significant, indirect effect of topical label type on both guidance and satisfaction. The conclusion of the study is that topical labels generated using rLSI provide the same levels of alignment, guidance, and satisfaction with the search process as topical labels created by the professional indexers using best practices.
The Evolution of Big Data and Its Business Applications
The arrival of the Big Data era has become a major topic of discussion in many sectors because of the premises of big data utilizations and its impact on decision-making. It is an interdisciplinary issue that has captured the attention of scholars and created new research opportunities in information science, business, heath care, and many others fields. The problem is the Big Data is not well defined, so that there exists confusion in IT what jobs and skill sets are required in big data area. The problem stems from the newness of the Big Data profession. Because many aspects of the area are unknown, organizations do not yet possess the IT, human, and business resources necessary to cope with and benefit from big data. These organizations include health care, enterprise, logistics, universities, weather forecasting, oil companies, e-business, recruiting agencies etc., and are challenged to deal with high volume, high variety, and high velocity big data to facilitate better decision- making. This research proposes a new way to look at Big Data and Big Data analysis. It helps and meets the theoretical and methodological foundations of Big Data and addresses an increasing demand for more powerful Big Data analysis from the academic researches prospective. Essay 1 provides a strategic overview of the untapped potential of social media Big Data in the business world and describes its challenges and opportunities for aspiring business organizations. It also aims to offer fresh recommendations on how companies can exploit social media data analysis to make better business decisions—decisions that embrace the relevant social qualities of its customers and their related ecosystem. The goal of this research is to provide insights for businesses to make better, more informed decisions based on effective social media data analysis. Essay 2 provides a better understanding of the influence of …
An Examination of the Role of Corporate Governance Structure in the Implementation of Enterprise Resource Planning (ERP) Systems: an International Perspective
Enterprise resource planning (ERP) systems are regarded as among the most innovative information technology products developed over the past two decades. Thus, they have become the backbone of management information systems in the organizations that have implemented them. The difficulties associated with their high failure rate, however, have been the subject of extensive studies. To expand on this knowledge, this study has two research objectives: to examine the relationship between corporate governance structures and implementation results and to investigate whether implementation outcomes vary by country. This study focuses on the project steering committee’s involvement, internal auditors’ participation, and the change management plan implementation. The results demonstrate that steering committee involvement is a primary factor that influenced the success of ERP implementation; and that institutional factors in country of deployment are important determinants of ERP project outcome.
Executive Information Seeking and the Corporate Library
This study began with an interest in corporate libraries and a genuine curiosity in the information preferences and resources valued by executive leaders at JET Aircraft Co. Executive information preferences and the downward trend in special libraries initiated the investigation of information seeking among executive leaders and yielded the inquiry: What resources do JET Aircraft Co. executives value when they need information? Employing an ethnographic approach, this study investigated what JET Aircraft Co. executives know about information resources, what they believe about information resources, and how they act when they require information. While JET Aircraft Co. maintained a special corporate library called the Company Research Library (CRL), the purpose of this study was to determine what resources were of value to executives at JET Aircraft Co., understanding that the CRL may or may not be a resource executives’ value. As a byproduct, this study also sought to establish executive information preferences and perceptions of the CRL. Information seeking at the executive level, studied through an ethnographic lens, provided insight into how executives at JET Aircraft Co. work and what they prefer, and it established a baseline for the Company Research Library’s position among the resources valued by executives.
Exploration of Information Sharing Structures within Makerspaces: A Mixed Methods Case Study of Dallas Makerspace and Its Users
Makerspaces are a popular, new concept being implemented in public, academic, and school libraries, and as stand-alone spaces. The literature reflects the newness of the topic with a limited number of articles and studies and even less about the users of makerspaces themselves. This study explored information sharing behaviors in the Dallas Makerspace as an informal learning environment and described their preferred method of information transfer from one member to another. It employed a mixed methods methodology using surveys, interviews and observations. The study identified how the rules and policies in place at the makerspace influence the information seeking process and how the Dallas Makerspace exchanges information effectively. Dallas Makerspace is one of the largest non-profit work groups in its size, and this research study answers how information is exchanged in an informal environment.
Exploring Factors That Lead to Perceived Instructional Immediacy in Online Learning Environments
Instructional communication research clearly indicates that instructor immediacy contributes significantly to effective instruction. However, the majority of immediacy studies have been conducted in traditional (face-to-face) classroom environments. More recently, instructional communication research has focused on assessing the impact of immediacy in online classroom environments. Again, immediacy appears to significantly contribute to effective instruction. The challenge is that most recent immediacy studies use immediacy measurements developed to test immediacy behaviors in face-to-face settings. Considering the lack of nonverbal communication and limited or absent synchronous or verbal communication in online instructional settings, the behaviors contributing most significantly to perceived immediacy, researchers need to reassess the immediacy construct in online environments. The present research explores and identifies behaviors reported by instructors to establish psychological closeness (i.e., immediacy) in online learning environments and assesses to what extent these behaviors are similar to or different from face-to-face immediacy-producing behaviors.
Exploring Naming Behavior in Personal Digital Image Collections: the Iconology and Language Games of Pinterest
As non-institutional digital image collections expand into social media, independent non-professional image curators are emerging, actively constructing alternative naming conventions to suit their needs in a social collecting environment. This project considers how independent user-curators are developing particular sense-making behaviors as they actively contribute names to large, unstructured social image collections. In order to capture and explore this evolving language adaptation, Pinterest names are analyzed using a matrix composed of Panofsky’s three strata of subject matter, Rosch’s levels of categorical abstraction, Shatford Layne’s image attributes and Wittgenstein’s language game constructions. Analyzing Pinterest image names illuminates previously unnoticed behaviors by independent user-curators as they create shared collections. Exploring the various language choices which user-curators select as they apply this new curating vocabulary helps identify underlying user needs not apparent in traditionally curated collections restricted to traditional naming conventions.
The Fabric of Entropy: A Discussion on the Meaning of Fractional Information
Why is the term information in English an uncountable noun, whereas in information theory it is a well-defined quantity? Since the amount of information can be quantified, what is the meaning of a fraction of that amount? This dissertation introduces a quasi-entropy matrix which developed from Claude Shannon's information measure as an analytical tool for behavioral studies. Such matrix emphasizes the role of relative characteristics of individual level data across different collections. The real challenge in the big data era is never the size of the dataset, but how data lead scientists to individuals rather than arbitrarily divided statistical groups. This proposed matrix, when combining with other statistical measures, provides a new and easy-to-do method for identifying pattern in a well-defined system because it is built on the idea that uneven probability distributions lead to decrease in system entropy. Although the matrix is not superior to classical correlation techniques, it allows an interpretation not available with traditional standard statistics. Finally, this matrix connects heterogeneous datasets because it is a frequency-based method and it works on the modes of data rather than the means of values. It also visualizes clustering in data although this type of clustering is not measured by the squared Euclidean distance of the numerical attributes.
Factors Affecting Faculty Acceptance and Use of Institutional Repositories in Thailand
Institutional repositories have been introduced as an innovative and alternative technology for scholarly communication and have received considerable attention from scholars across disciplines and around the globe. While some universities in Thailand have developed and implemented institutional repositories for nearly a decade, knowledge of the acceptance and use of institutional repositories on the individual level in the country remains limited. As an insufficient knowledge of technology acceptance and adoption at the individual level is considered partially responsible for the underutilization of innovation or of information system implementation, this study seeks to uncover knowledge regarding the level of institutional repository acceptance and use. This study applied the unified theory of acceptance and use of technology (UTAUT) model and the model of faculty members' self-archiving behavior to investigate factors affecting faculty acceptance and use of university-based institutional repositories. The study employed a mixed methods approach involving a survey followed by semi-structured, one-to-one interview. This study confirms that the success of university-based institutional repositories depends not on a single factor but on multiple factors. The results of the study show that performance expectancy, social influence, and resistance to change were direct determinants of faculty members' intention to use institutional repositories. Additionally, behavioral intention and altruism were found to be the main determinants of actual usage behavior. The findings of this study imply that education in and promotion of open access and institutional repositories are essential and can play an important role in the adoption of institutional repositories. Finally, this study suggests that sustained dialogue and collaborative efforts among faculty members (as contributors and users), libraries/librarians (as institutional repository developers and managers), and other stakeholders within communities are essential for the adoption and success of university-based institutional repositories.
Factors Affecting Faculty Use Of Learning Object Repositories: An Exploratory Study Of Orange Grove And Wisc-online
The purpose of this study was to identify factors that motivate or impede faculty use of learning object repositories (LORs). The unified theory of acceptance and use of technology (UTAUT) served as the theoretical framework for this study. Both quantitative and qualitative approaches were used in the study to explore two research questions relating to factors affecting faculty use of LORs. Research subjects were faculty and instructional staff users from two LORs: Orange Grove and Wisc-Online. This study was a two-phase design study. In Phase I, I conducted 13 interviews and analyzed data by a content analysis method. Phase II of the study was designed based on the results of Phase I. I collected data by a survey instrument from 38 respondents and analyzed the data by descriptive statistics and analysis of variance in Phase II. The results of the study indicated 22 factors as motivators for faculty use of LORs and 13 factors as barriers for faculty use of LORs. The study is the first to identify factors affecting faculty use of LORs from actual faculty users’ perspectives based on UTAUT. The study’s findings contribute to understanding the reasons that faculty use or do not use LORs and provide foundations for designing strategies to increase faculty use of LORs.
Factors Affecting Police Officers' Acceptance of GIS Technologies: A study of the Turkish National Police
The situations and problems that police officers face are more complex in today’s society, due in part to the increase of technology and growing complexity of globalization. Accordingly, to solve these problems and deal with the complexities, law enforcement organizations develop and apply new techniques and methods such as geographic information systems (GIS). However, the successful implementation of a new technology does not just depend on providing perfect technical support, but effective and active interaction between the user and system. For this reason, research examining user acceptance of GIS technologies provides a valuable source to investors and designers to predict whether the results of the technology will meet user expectations; understanding the factors that influence user acceptance is vitally important to make the system more usable and preferable. This study attempts to explain Turkish National Police officers’ beliefs about and behaviors toward GIS applications by using the technology acceptance models. It contributes to the technology acceptance literature by testing the proposed model in a rarely studied organization: law enforcement. Regarding methodology, I distributed a survey questionnaire in Turkey; the unit of analysis was the law enforcement officers in the Turkish National Police (TNP). In order to analyze the data derived from the survey instrument, structural equation modeling (SEM), a multivariate statistical technique, was used to analyze the quantitative data by utilizing the AMOS 16.0 software. The analysis resulted in good model fit, and 6 of the 7 hypotheses were supported.
Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications
Information privacy is a major concern for consumers adopting emerging technologies dependent on location-based services. This study sought to determine whether a relationship exists among factors of personalization, locatability, perceived playfulness, privacy concern and behavioral intention to disclose personal information for individuals using location-based, geosocial networking applications. Questionnaire responses from undergraduate students at a 4-year university provide insight into these relationships. Multiple regression results indicated that there was a statistically significant relationship between the four significant predictor variables and the dependent variable. Analysis of beta weights, structure coefficients, and commonality analysis shed light on the variance attributable to the predictor variables of the study. Findings provide understanding of the specific factors examined in the study and have implications for consumers, businesses, application designers, and policymakers. The results from this study contribute to an understanding of technology acceptance theory and offer insight into competing beliefs that may affect an individual’s behavioral intention to disclose personal information. Knowledge gained form the study may be useful for overcoming challenges related to consumer adoption of location-based services that require disclosure of personal information.
Factors Related to the Selection of Information Sources: A Study of Ramkhamhaeng University Regional Campuses Graduate Students
This study assessed students’ satisfaction with Ramkhamhaeng University regional library services (RURLs) and the perceived quality of information retrieved from other information sources. In particular, this study investigated factors relating to regional students’ selection of information sources to meet their information needs. The researcher applied the principle of least effort and Simon’s satisficing theory for this study. The former principle governs and predicts the selection of these students’ perceived source accessibility, whereas the latter theory explains the selection and use of the information retrieved without considering whether the information is optimal. This study employed a web-based survey to collect data from 188 respondents. The researcher found that convenience and ease of use were the top two variables relating to respondent’s selection of information sources and use. The Internet had the highest mean for convenience. Results of testing a multiple linear regression model of all four RURCs showed that these four independent variables (convenience, ease of use, availability, and familiarity) were able to explain 69% of the total variance in the frequency of use of information sources. Convenience and ease of use were able to increase respondents’ perceived source accessibility and explain the variance of the frequency of use of sources more than availability and familiarity. These findings imply that respondents’ selection of information sources at the RURCs were governed by the principle of least effort. Libraries could consider the idea of one-stop services in the design of the Web portal, making it user friendly and convenient to access. Ideally, students could have one card to check out materials from any library in the resources sharing network.
Faculty Attitudes Towards Institutional Repositories
The purpose of the study was to explore faculty attitudes towards institutional repositories in order to better understand their research habits and preferences. A better understanding of faculty needs and attitudes will enable academic libraries to improve institutional repository services and policies. A phenomenological approach was used to interview fourteen participants and conduct eight observations to determine how tenure-track faculty want to disseminate their research as well as their attitudes towards sharing research data. Interviews were transcribed and coded into emerging themes. Participants reported that they want their research to be read, used, and to have an impact. While almost all faculty see institutional repositories as something that would be useful for increasing the impact and accessibility of their research, they would consider publishers’ rights before depositing work in a repository. Researchers with quantitative data, and researchers in the humanities are more likely to share data than with qualitative or mixed data, which is more open to interpretation and inference. Senior faculty members are more likely than junior faculty members to be concerned about the context of their research data. Junior faculty members’ perception’ of requirements for tenure will inhibit their inclination to publish in open access journals, or share data. The study used a novel approach to provide an understanding of faculty attitudes and the structural functionalism of scholarly communication.
From the Outside In: A Multivariate Correlational Analysis of Effectiveness in Communities of Practice
Online communities of practice (CoPs) provide social spaces for people to connect, learn, and engage with one another around shared interests and passions. CoPs are innovatively employed within industry and education for their inherent knowledge management characteristics and as a means of improving professional practice. Measuring the success of a CoP is a challenge researchers are examining through various strategies. Recent literature supports measuring community effectiveness through the perceptions of its members; however, evaluating a community by means of member perception introduces complicating factors from outside the community. In order to gain insight into the importance of external factors, this quantitative study examined the influence of factors in the professional lives of educators on their perceptions of their CoP experience. Through an empirical examination of CoPs employed to connect educators and advance their professional learning, canonical correlation analysis was used to examine correlations between factors believed to be influential on the experiences of community members.
Graduate Students' Collaborative Information Seeking in a Group-based Learning Setting
Working with others within an organization can have a variety of positive effects, and the benefits of collaboration have been discussed in various disciplines. In information science, interest in collaborative information seeking, including collaborative information seeking by students in an online learning environment is expanding. This study was aimed at understanding graduate students' collaborative information seeking behaviors through the process of a group project, including factors that affected students' perceptions of collaborative work and their difficulties during the collaborative process. The research was based on Yue and He's model, which describes information users' collaborative communication and information behaviors, and Kuhlthau's model, which describes users' individual information seeking behaviors. The participants were 43 students enrolled in a master's level course delivered primarily online. The students were required to work together in groups to complete a research project. Data were collected through a background survey, behavior survey, and online communication texts and analyzed using descriptive statistics, statistical tests, and content analyses. The results showed significant changes in collaborative and information seeking behaviors and perceptions across three stages of the project during the semester. Theoretical, practical, and methodological implications for future research are discussed.
A Grounded Theory of Information Quality in Web Archives
Web archiving is the practice of preserving websites as a historical record. It is a technologically-challenging endeavor that has as its goal the creation of a high-quality archived website that looks and behaves exactly like the original website. Despite the importance of the notion of quality, comprehensive definitions of Information Quality (IQ) in a web archive have yet to be developed. Currently, the field has no single, comprehensive theory that describes what is a high-quality or low-quality archived website. Furthermore, most of the research that has been conducted on web archives has been system-centered and not user-centered, leading to a dearth of information on how humans perceive web archives. This dissertation seeks to remedy this problem by presenting a user-centered grounded theory of IQ for web archives. It answers two research questions: 1) What is the definition of information quality (IQ) for web archives? and 2) How can IQ in a web archive be measured? The theory presented is grounded on data obtained from users of the Internet Archive's Archive-It system, the largest web-archiving subscription service in the United States. Also presented are mathematical definitions for each dimension of IQ, which can then be applied to measure the quality of a web archive.
Identifying Key Success Factors for the Implementation of Enterprise Content Management Systems
Enterprise content management (ECM) is an emerging research area that is beginning to find attention in academia. While the private sector has a growing industry and community for ECM, academia is starting to address this with direct links to the better-established areas of information systems and enterprise resource planning systems. ECM has been viewed as a higher-level concept of methods and strategies pertaining to content management in the context of the enterprise. Like many other organizational wide systems, ECM systems are complex, difficult to implement and risk failing to meet expected success measures. Definitions for what exactly constitutes an ECM system are still evolving. The major issues with ECM systems are that they are increasingly being implemented by organizations in an attempt to address the unmanageable amount of unstructured content over its lifecycle, compliance pressures, collaboration needs, content integrity and continuity, and controlling costs. However, the implementation problems are many and diverse, such as determining content and business processes to be included, determining technologies to fit the organizational needs, how to integrate with existing systems, and managing organizational culture and change for acceptance. There is currently little academic research in the area of ECM, and research determining the key factors that contribute to successful implementations of these systems is absent. This research addressed the existing gap in ECM research and investigated the key success factors for the implementations of ECM systems with the objectives of identifying a set of success factors. Guided by research in related areas and through developing a theoretical framework and the resulting research model, the study used a qualitative case study method to identify ECM implementation factors and their relationship to organizational culture and people, business processes, technology and organizational content. The results of this research were twofold, first by contributing needed research in the ECM …
Image Representation and Interactivity: An Exploration of Utility Values, Information-Needs and Image Interactivity
This study was designed to explore the relationships between users and interactive images. Three factors were identified and provided different perspectives on how users interact with images: image utility, information-need, and images with varying levels of interactivity. The study used a mixed methodology to gain a more comprehensive understanding about the selected factors. An image survey was used to introduce the participants to the images and recorded utility values when given a specific task. The interviews allowed participants to provide details about their experiences with the interactive images and how it affected their utility values. Findings from the study showed that images offering the highest level of interactivity do not always generate the highest utility. Factors such as personal preference, specifically speed and control of the image, affect the usefulness of the image. Participant also provided a variety of uses where access to interactive images would be beneficial. Educational settings and research tools are a few examples of uses provided by participants.
The Impact of Leadership Styles and Knowledge Sharing on Police Officers’ Willingness to Exert Extra Effort to Provide Better Security: A Study in the Riot Unit of the Turkish National Police
The motivation for this study is to understand the factors affecting police officers’ willingness to exert extra effort for providing better service through knowledge sharing in different working environments such as riots. Since managers’ leadership styles may be important factors affecting subordinates’ willingness to exert extra effort, this study investigates which of the leadership styles -- transformational, transactional or laissezfaire leadership -- will have a positive effect on officers’ willingness to exert extra effort. In addition, the current study also examines the effect of the mentioned leadership styles on knowledge sharing, which, in turn, affects the officers’ willingness to exert extra effort in the riot unit of the Turkish National Police (TNP) in Ankara, Turkey. The sworn line police officers working in the riot unit in Ankara, Turkey, were the participants in this study. Three questionnaires --a Multifactor Leadership (MLQ), knowledge sharing, and demographic questionnaire -- were arranged as a booklet to be distributed to the respondents. The results of the study indicate that police supervisors' perceived transformational leadership behavior has a positive effect on officers' willingness to exert extra effort. In addition, the findings also reveal that although both officers' years of service in TNP and police supervisors' perceived transactional leadership behavior has no direct effect on officers' willingness to exert extra effort, they have an indirect positive effect through officers' knowledge sharing. On the other hand, police supervisors' perceive that laissez-fair leadership behavior has no effect on riot officers' willingness to exert extra effort. The findings also indicate that officers’ knowledge sharing is positively related to both their supervisors’ perceived transformational and transactional leadership behaviors. However, police supervisors’ perceived laissez-fair leadership behavior has no effect on officers’ knowledge sharing activities. This research study will provide police administrations with the data necessary to adopt the most appropriate leadership styles …
The Impact of Sociocultural and Information Communication Technology Adoption Factors on the Everyday Life Information Seeking Behavior of Saudi Students in the United States
This study analyzes the sociocultural factors that affect Saudi students in the U.S. as they seek information and explores to what extent these factors impact their everyday life information seeking (ELIS) behavior and their information technology behavior (ITB). The factors in this study illustrate the unique sociocultural values that distinguish Saudi students from other international student groups: gender segregation, emphasis on religion, social support, and utilization of the consultation concept. After collecting data from an online survey, the data from linear regression analyses revealed that only one culture factor (the language barrier) showed a significant impact on Saudi student ELIS in the U.S., while the other factors were not statistically significant. Also, the findings indicated that perceived usefulness (PU) and perceived ease of use (PEU) were statistically significant to the ELIS of Saudi students. Furthermore, the study showed that after academic information, food and drink, entertainment, and health were the top student needs, the top ranking sources for everyday life seeking information were social media and the Internet. The findings of the study help to shed light on a sizable user group. As the fourth largest group of international students in the U.S., Saudi students have been underrepresented in research. Also, the study's findings and recommendations provide a more profound understanding of Saudi students for both the hosting American university officials and stakeholders who provide scholarships.
Impetuses for First, Second, and Third Year Law Student Information Seeking Behavior, and Perception of Common Knowledge and Citation
This dissertation examined how previous information literacy training, law student gender, age, and previously obtained education affects first, second, and third year law students selection of information sources, their understanding of common knowledge, and their decision of whether or not to give attribution to these sources. To examine these factors, this study implemented a paradigm called the principle of least effort that contended humans in general tended to complete the least amount of work possible to complete presented tasks. This study sought to discover whether law students follow this same path of completing the least amount of work possible to finish presented tasks, and whether this behavior affects information source selection, citation, and understanding of common knowledge. I performed six focus groups and crafted and disseminated an online survey to examine these factors. Via this data collection, it was discovered that law students do exhibit some differences in understanding of citation and citation behavior based on age and their year in law school. They also exhibited some differences regarding common knowledge based on their year in law school, where they received their information literacy training, and where they attend law school. Yet, no statistically significant differences were discovered regarding where one attends law school and citation and source selection. Further this study revealed law students do follow this paradigm and seek the path of least resistance to accomplish law school assignments.
Implications of Punctuation Mark Normalization on Text Retrieval
This research investigated issues related to normalizing punctuation marks from a text retrieval perspective. A punctuated-centric approach was undertaken by exploring changes in meanings, whitespaces, words retrievability, and other issues related to normalizing punctuation marks. To investigate punctuation normalization issues, various frequency counts of punctuation marks and punctuation patterns were conducted using the text drawn from the Gutenberg Project archive and the Usenet Newsgroup archive. A number of useful punctuation mark types that could aid in analyzing punctuation marks were discovered. This study identified two types of punctuation normalization procedures: (1) lexical independent (LI) punctuation normalization and (2) lexical oriented (LO) punctuation normalization. Using these two types of punctuation normalization procedures, this study discovered various effects of punctuation normalization in terms of different search query types. By analyzing the punctuation normalization problem in this manner, a wide range of issues were discovered such as: the need to define different types of searching, to disambiguate the role of punctuation marks, to normalize whitespaces, and indexing of punctuated terms. This study concluded that to achieve the most positive effect in a text retrieval environment, normalizing punctuation marks should be based on an extensive systematic analysis of punctuation marks and punctuation patterns and their related factors. The results of this study indicate that there were many challenges due to complexity of language. Further, this study recommends avoiding a simplistic approach to punctuation normalization.
In Pursuit of Image: How We Think About Photographs We Seek
The user perspective of image search remains poorly understood. the purpose of this study is to identify and investigate the key issues relevant to a user’s interaction with images and the user’s approach to image search. a deeper understanding of these issues will serve to inform the design of image retrieval systems and in turn better serve the user. Previous research explores areas of information seeking behavior, representation in information science, query formulation, and image retrieval. the theoretical framework for this study includes an articulation of image search scenarios as adapted from Yoon and O’Connor’s taxonomy of image query types, Copeland’s Engineering Design Approach for rigorous qualitative research, and Anderson’s Functional Ontology Construction Model for building robust models of human behavior. a series of semi-structured interviews were conducted with expert-level image users. Interviewees discussed their motivations for image search, types of image searches they pursue, and varied approaches to image search, as well as how they decide that an information need has been met and which factors influence their experience of search. a content analysis revealed themes repeated across responses, including a collection of 23 emergent concepts and 6 emergent categories. a functional analysis revealed further insight into these themes. Results from both analyses may be used as a framework for future exploration of this topic. Implications are discussed and future research directions are indicated. Among possibilities for future research are investigations into collaborative search and ubiquitous image search.
The Influence of Engagement with Graphic Narrative Text Formats on Student Attitudes Towards the School Library
Comics, graphic novels, and manga differ appreciably from textual narrative formats, and materials with increasingly visual elements have found their way into progressive and student-centered library collections. But many educators and librarians still resist inclusion of graphic narratives in school libraries and devalue the reading practice of students who prefer more visual texts. Using the framework of radical change, which posits that both text conventions and reader expectations for text are increasingly multimodal as they possess characteristics of evolving digital media, this study considered the relationship of the characteristics of text individual students prefer, particularly those they select from the school library, and their attitudes towards aspects of reading practice as evidenced through the Adolescent Motivation to Read Profile instrument. Survey data was supplemented with circulation history from the library management system to inform a correlational study punctuating attitudinal differences based on reader preferences. Findings include high school students who engage with graphic narrative text formats reporting more favorable views of libraries and reading. There is a demonstrable distinction in attitudes between students who prefer more visual text when compared with peers with more traditional print affinities. Student engaging with graphic narrative texts also report more frequent engagement with text overall. These demonstrated relationships should help to legitimize the inclusion of more graphic narrative text formats in school library collections.
Influence of Social Media on Decision Making of the Kuwait National Assembly Members: Case Study
In Kuwait, an increase in the use of social media by the Kuwait National Assembly (KNA) has allowed it members to reach out to the public and so advance their political agenda. This study examines social media influences on the decision making process; addresses the lack of academic research in relation to KNA members; and seeks to understand the extent to which public political engagement using social media might affect the outcome of their decision making. The proposed social media influence model (SMIM) was used to explore the relationships and relative importance of variables influencing legislator decision making in a social media environment. The second decade of the twenty-first century saw a number of major issues emerging in Kuwait. A core mixed method design known as explanatory sequential was applied to multiple sets of data generated during KNA members' 14th (2013-2016) and 15th (2016-2018) terms. These data included Twitter messages (tweets), the KNA Information Center Parliamentary Information System legislation documents, and the news media articles. The sample was drawn from KNA membership, some of which used Twitter to comment on major events with specific hashtags and the Kuwaiti news media articles related to the same. Study results confirm and support the proposed SMIM. They also suggest that a single person or a group of individuals (in this case, legislators) can be influenced and motivated to use social media for self-promotion and/or advancing their political agenda. Consequently, they can be used to devise ways for improving the use of social media by KNA members in support of legislative work, which in turn will provide citizens with access to real-time information and enhanced political interaction.
Back to Top of Screen