E-Learning and In-Service Training: An Exploration of the Beliefs and Practices of Trainers and Trainees in the Turkish National Police

E-Learning and In-Service Training: An Exploration of the Beliefs and Practices of Trainers and Trainees in the Turkish National Police

Date: August 2007
Creator: Zengin, Selcuk
Description: This targeted research study, carried out by an officer of the Turkish National Police (TNP), investigated the perceptions and beliefs of TNP trainers and trainees towards the potential adoption and implementation of e-learning technology for in-service police training. Utilizing diffusion and innovation theory (DOI) (Rogers, 1995) and the conceptual technology integration process model (CTIM) (Nicolle, 2005), two different surveys were administered; one to the trainers and one to the trainees. The factor analyses revealed three shared trainer and trainee perceptions: A positive perception towards e-learning, personally and for the TNP; a belief in the importance of administrative support for e-learning integration; and the belief in importance of appropriate resources to facilitate integration and maintain implementation. Three major recommendations were made for the TNP. First, the research findings could be used as a road map by the TNP Education Department to provide a more flexible system to disseminate in-service training information. The second is to establish two-way channels of communication between the administration and the TNP personnel to efficiently operationalize the adoption and integration of e-learning technology. The third is the administrative provision of necessary hardware, software, and technical support.
Contributing Partner: UNT Libraries
Needs Assessment Survey Report

Needs Assessment Survey Report

Date: January 5, 2006
Creator: Hsieh, Inga K. & Murray, Kathleen R.
Description: This report is part of the Web-at-Risk project. The Web-at-Risk project is one of eight digital preservation projects funded in 2004 by the Library of Congress. The project is a 3-year collaborative effort of the California Digital Library (CDL), the University of North Texas (UNT), and New York University (NYU). The project will develop a Web Archiving Service that enables curators to build collections of web-published materials. The content of the collections for this project will be largely from US federal and state government agencies, but will also include political policy documents, campaign literature, and information surrounding political movements and labor unions. This report includes the methods, results, discussion, and appendices related to the Web-at-Risk project.
Contributing Partner: UNT Libraries
Needs Assessment Survey Report: Abbreviated Version

Needs Assessment Survey Report: Abbreviated Version

Date: January 5, 2006
Creator: Hsieh, Inga K. & Murray, Kathleen R.
Description: This report is part of the Web-at-Risk project. The Needs Assessment Toolkit created for the Web-at-Risk project describes the project's needs assessment activities and includes data collection tools, which are designated to identify the needs and requirements of curators, web-content producers, and end users with regard to the Web Archive Service. Additionally, information gathered by some of the data collection tools will help to identify curators' requirements for the web crawler and its crawl analyzer tool, which will be developed as part of the project. Each of the assessment activities described in the Needs Assessment Toolkit was designated to follow a collection development framework for web archives. This report contains a data analysis of the survey results. Results from focus group discussions and interviews with content providers and end users are presented in separate reports.
Contributing Partner: UNT Libraries
The Impact of Predisposition Towards Group Work on Intention to Use a CSCW System

The Impact of Predisposition Towards Group Work on Intention to Use a CSCW System

Date: May 2005
Creator: Reyna, Josephine
Description: Groupware packages are increasingly being used to support content delivery, class discussion, student to student and student to faculty interactions and group work on projects. This research focused on groupware packages that are used to support students who are located in different places, but who are assigned group projects as part of their coursework requirements. In many cases, students are being asked to use unfamiliar technologies that are very different from those that support personal productivity. For example, computer-assisted cooperative work (CSCW) technology is different from other more traditional, stand-alone software applications because it requires the user to interact with the computer as well as other users. However, familiarity with the technology is not the only requirement for successful completion of a group assigned project. For a group to be successful, it must also have a desire to work together on the project. If this pre-requisite is not present within the group, then the technology will only create additional communication and coordination barriers. How much of an impact does each of these factors have on the acceptance of CSCW technology? The significance of this study is threefold. First, this research contributed to how a user's predisposition toward group work affects ...
Contributing Partner: UNT Libraries
Web Content Authorship: Academic Librarians in Web Content Management

Web Content Authorship: Academic Librarians in Web Content Management

Date: May 2012
Creator: Vassilieva, Elena
Description: An increasing number of libraries and information centers are using content management (CM) applications to develop, redesign, and maintain their websites. the purpose of this research was to provide understanding of attitudes of academic librarians about how their utilization of CM technology influences the information services they provide at the academic library’s website and to examine their perceptions of how using CM affects the creation of the web content. This research applied a qualitative research design (electronic survey and in-depth semi-structured interviews of academic subject librarians) with elements of a quantitative approach. the study discussed the concept of web authorship and supplied fundamentals for future theoretical research about authorship in web content development at academic libraries. the study provided an overview of CM at academic libraries and explored characteristics of dynamic content and semantic web applications at their websites. It discussed librarians’ opinions about issues of migration to the new content management system (CMS), factors affecting its efficient employment, and roles of librarians in web content management. Results of this study will serve to future research on management behavior of academic librarians authoring web content with the help of CM. the findings about the difficulties observed in the use of ...
Contributing Partner: UNT Libraries
What makes a quality Ph.D. program in library and information sciences?

What makes a quality Ph.D. program in library and information sciences?

Date: December 2006
Creator: Klingler, Scott Lavell
Description: The intent of this study was to establish and validate criteria for use to assess the quality of a library and information sciences (LIS) Ph.D. program. The Ph.D. student-centric topology for quality Ph.D. programs was developed from a 2001 position statement by the American Association of Colleges of Nursing (AACN) regarding the quality indicators in research-focused doctoral programs in nursing. Topology components were tested using a survey instrument to establish their importance to the community of practice and their potential use to assess a Ph.D. program. Survey participants were asked to rank terms or concepts in a balanced incomplete block (BIB) design then rate, on a Likert-type scale, statements about the applicability of these terms or concepts to assessing a quality LIS Ph.D. program. Survey participants were from the Association for Library and Information Science Education (ALISE) Open Lib/Info Sci Education Forum jESSE Listserv. Of 225 survey participants affiliated with universities or schools from North America who submitted usable surveys, slightly less than two-thirds (64.4 %) were female while 35.5 % were male. Ninety-eight participants (43.6 %) were faculty, 114 (50.7 %) were Ph.D. students or candidates, and 13 (5.8 %) were in other roles. Statistical analysis of survey responses ...
Contributing Partner: UNT Libraries
Terrorism as a social information entity: A model for early intervention.

Terrorism as a social information entity: A model for early intervention.

Access: Use of this item is restricted to the UNT Community.
Date: August 2005
Creator: Yayla, Ahmet
Description: This dissertation studies different social aspects of terrorists and terrorist organizations in an effort to better deal with terrorism, especially in the long run. The researcher, who also worked as a Police Captain at Turkish National Police Anti-Terrorism Department, seeks solutions to today's global problem by studying both literature and a Delphi examination of a survey of 1070 imprisoned terrorists. The research questions include questions such as "What are the reasons behind terrorism?", "Why does terrorism occur?", "What ideologies provide the framework for terrorist violence?, "Why do some individuals become terrorists and others do not?" and "Under what conditions will terrorists end their violence?" The results of the study presents the complexity of the terrorism problem as a social experience and impossibility of a single solution or remedy for the global problem of terrorism. The researcher through his examination of the findings of the data, presented that terrorism is a social phenomenon with criminal consequences that needs to be dealt by means of two dimensional approaches. The first is the social dimension of terrorism and the second is the criminal dimension of terrorism. Based on this, the researcher constructed a conceptual model which addresses both of these dimensions under the ...
Contributing Partner: UNT Libraries
Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.

Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.

Date: August 2005
Creator: Ozeren, Suleyman
Description: Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem. Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural. Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level. "Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions. Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P). Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of ...
Contributing Partner: UNT Libraries
Intangible Qualities of Rare Books: Toward a Decision-Making Framework for Preservation Management in Rare Book Collections, Based Upon the Concept of the Book as Object

Intangible Qualities of Rare Books: Toward a Decision-Making Framework for Preservation Management in Rare Book Collections, Based Upon the Concept of the Book as Object

Date: May 2006
Creator: Sheehan, Jennifer Karr
Description: For rare book collections, a considerable challenge is involved in evaluating collection materials in terms of their inherent value, which includes the textual and intangible information the materials provide for the collection's users. Preservation management in rare book collections is a complex and costly process. As digitization and other technological advances in surrogate technology have provided new forms representation, new dilemmas in weighing the rare book's inherently valuable characteristics against the possibly lesser financial costs of surrogates have arisen. No model has been in wide use to guide preservation management decisions. An initial iteration of such a model is developed, based on a Delphi-like iterative questioning of a group of experts in the field of rare books. The results are used to synthesize a preservation management framework for rare book collections, and a small-scale test of the framework has been completed through two independent analyses of five rare books in a functioning collection. Utilizing a standardized template for making preservation decisions offers a variety of benefits. Preservation decisions may include prioritizing action upon the authentic objects, or developing and maintaining surrogates in lieu of retaining costly original collection materials. The framework constructed in this study provides a method for reducing ...
Contributing Partner: UNT Libraries
A Conceptual Map for Understanding the Terrorist Recruitment Process: Observation and Analysis of Turkish Hezbollah Terrorist Organizations.

A Conceptual Map for Understanding the Terrorist Recruitment Process: Observation and Analysis of Turkish Hezbollah Terrorist Organizations.

Date: August 2007
Creator: Teymur, Samih
Description: Terrorism is a historical problem; however, it becomes one of the biggest problems in 21st century. September 11 and the following Madrid, Istanbul and London attacks showed that it is the most significant problem threatening world peace and security. Governments have started to deal with terrorism by improving security measurements and making new investments to stop terrorism. Most of the governments' and scholars' focus is on immediate threats and causes of terrorism, instead of looking at long-term solutions such as root causes and underlying reasons of terrorism, and the recruitment style of terrorist organizations If terrorist recruitment does not stop, then it is safe to say terrorist activities cannot be stopped. This study focused on the recruitment process by observing two different terrorist organizations, DHKP/C and Turkish Hezbollah. The researcher brings 13 years of field experience and first-person data gathered from inside the terrorist organizations. The research questions of this study were: (i) How can an individual be prevented from joining or carrying out terrorist activities?; (ii) What factors are correlated with joining a terrorist organization?; (iii) What are the recruitment processes of the DHKP/C, PKK, and Turkish Hezbollah?; (iv) Is there any common process of being a member of ...
Contributing Partner: UNT Libraries
The Effect of Personality Type on the Use of Relevance Criteria for Purposes of Selecting Information Sources.

The Effect of Personality Type on the Use of Relevance Criteria for Purposes of Selecting Information Sources.

Date: December 2002
Creator: Sims, Dale B.
Description: Even though information scientists generally recognize that relevance judgments are multidimensional and dynamic, there is still discussion and debate regarding the degree to which certain internal (cognition, personality) and external (situation, social relationships) factors affect the use of criteria in reaching those judgments. Much of the debate centers on the relationship of those factors to the criteria and reliable methods for measuring those relationships. This study researched the use of relevance criteria to select an information source by undergraduate students whose task it is to create a course schedule for a semester. During registration periods, when creating their semester schedules, students filled out a two-part questionnaire. After completion of the questionnaire the students completed a Myers-Briggs Type Indicator instrument in order to determine their personality type. Data was analyzed using one-way ANOVAS and Chi-Square. A positive correlation exists between personality type as expressed by the MBTI and the information source selected as most important by the subject. A correlation also exists between personality type and relevance criteria use. The correlation is stronger for some criteria than for others. Therefore, one can expect personality type to have an effect on the use of relevance criteria while selecting information sources.
Contributing Partner: UNT Libraries
A Framework of Automatic Subject Term Assignment: An Indexing Conception-Based Approach

A Framework of Automatic Subject Term Assignment: An Indexing Conception-Based Approach

Date: December 2006
Creator: Chung, EunKyung
Description: The purpose of dissertation is to examine whether the understandings of subject indexing processes conducted by human indexers have a positive impact on the effectiveness of automatic subject term assignment through text categorization (TC). More specifically, human indexers' subject indexing approaches or conceptions in conjunction with semantic sources were explored in the context of a typical scientific journal article data set. Based on the premise that subject indexing approaches or conceptions with semantic sources are important for automatic subject term assignment through TC, this study proposed an indexing conception-based framework. For the purpose of this study, three hypotheses were tested: 1) the effectiveness of semantic sources, 2) the effectiveness of an indexing conception-based framework, and 3) the effectiveness of each of three indexing conception-based approaches (the content-oriented, the document-oriented, and the domain-oriented approaches). The experiments were conducted using a support vector machine implementation in WEKA (Witten, & Frank, 2000). The experiment results pointed out that cited works, source title, and title were as effective as the full text, while keyword was found more effective than the full text. In addition, the findings showed that an indexing conception-based framework was more effective than the full text. Especially, the content-oriented and the ...
Contributing Partner: UNT Libraries
Quality Management in Museum Information Systems: A Case Study of ISO 9001-2000 as an Evaluative Technique

Quality Management in Museum Information Systems: A Case Study of ISO 9001-2000 as an Evaluative Technique

Date: May 2005
Creator: Karr, Fred H.
Description: Museums are service-oriented information systems that provide access to information bearing materials contained in the museum's collections. Within museum environments, the primary vehicle for quality assurance and public accountability is the accreditation process of the American Association of Museums (AAM). Norbert Wiener founded the field of cybernetics, employing concepts of information feedback as a mechanism for system modification and control. W. Edwards Deming applied Wiener's principles to management theory, initiating the wave of change in manufacturing industries from production-driven to quality-driven systems. Today, the principles are embodied in the ISO 9000 International Standards for quality management systems (QMS), a globally-recognized set of standards, widely employed as a vehicle of quality management in manufacturing and service industries. The International Organization for Standardization defined a process for QMS registration against ISO 9001 that is similar in purpose to accreditation. This study's goals were to determine the degree of correspondence between elements of ISO 9001 and quality-related activities within museum environments, and to ascertain the relevance of ISO 9001-2000 as a technique of museum evaluation, parallel to accreditation. A content analysis compared museum activities to requirements specified in the ISO 9001-2000 International Standard. The study examined museum environment surrogates which consisted of (a) ...
Contributing Partner: UNT Libraries
Knowledge synthesis in the biomedical literature: Nordihydroguaiaretic acid and breast cancer.

Knowledge synthesis in the biomedical literature: Nordihydroguaiaretic acid and breast cancer.

Date: December 2003
Creator: Sneed, Wanda A.
Description: This dissertation refines knowledge synthesis from publicly accessible databases, based on the model of D.R. Swanson. Knowledge synthesis endeavors bring together two or more non-interactive literatures to create combinatorial research data on a specific topic. In this endeavor the biomedical literature was searched on the anti-neoplastic agent nordihydroguaiaretic acid (NDGA) for its potential role as a functional food in the chemoprevention of breast cancer. Bibliometric cocitation was utilized to identify complementary but non-interactive literatures in the disciplines of biomedicine and dietary science. The continuing specialization and fragmentation of the cancer literature degenerates the potential usefulness of cross-disciplinary research and information. As the biomedical sciences become more specialized the potential increases for isolation of discoveries and for failures to connect science to the needs of the people. Within the information science discipline several techniques are available to bridge the isolation between discoveries recorded in different sets of literatures. Electronic database searching with combinatorial keyword entries, syllogistic modeling and bibliometric author cocitation analysis are the principle techniques applied in this endeavor. The research questions are addressed to the absence or presence of human in vivo research on breast cancer with the potentially chemopreventative functional food NDGA. Utilizing a syllogistic model the literatures ...
Contributing Partner: UNT Libraries
The physiology of collaboration: An investigation of library-museum-university partnerships.

The physiology of collaboration: An investigation of library-museum-university partnerships.

Date: August 2003
Creator: Morales Arroyo, Miguel Angel
Description: Collaboration appears to be a magical solution for many problems when there is scarcity of resources, lack of knowledge or skills, and/or environmental threats. However, there is little knowledge about the nature of collaboration. A holistic conceptual framework was developed for the collaborative process, and the conceptualization process used systems thinking approach. The author has selectively chosen conceptualizations and/or research by a limited subset of scholars whose ideas appeared to be the most relevant and useful to explore the type of collaboration studied here. In other words, the selection of the literature was based on an eclectic selection. Multiple cases were used in this research to understand the factors that are components of collaborative effort among non-profit organizations and the relationships among those factors. This study also investigated the stages of collaborative process. Data were collected from 54 participants who were partners in collaborate projects funded by the Institute of Museum and Library Services (IMLS). Among these 54 participants, 50 answered the online questionnaire and 38 received the telephone interviews. The data collected was analyzed using cluster analysis, multidimensional scaling, internal consistency reliability, and descriptive statistics. The component factors of collaboration were grouped by the following seven concepts: trustworthiness, competence, ...
Contributing Partner: UNT Libraries
Information Needs of Art Museum Visitors: Real and Virtual

Information Needs of Art Museum Visitors: Real and Virtual

Date: December 2004
Creator: Kravchyna, Victoria
Description: Museums and libraries are considered large repositories of human knowledge and human culture. They have similar missions and goals in distributing accumulated knowledge to society. Current digitization projects allow both, museums and libraries to reach a broader audience, share their resources with a variety of users. While studies of information seeking behavior, retrieval systems and metadata in library science have a long history; such research studies in museum environments are at their early experimental stage. There are few studies concerning information seeking behavior and needs of virtual museum visitors, especially with the use of images in the museums' collections available on the Web. The current study identifies preferences of a variety of user groups about the information specifics on current exhibits, museum collections metadata information, and the use of multimedia. The study of information seeking behavior of users groups of museum digital collections or cultural collections allows examination and analysis of users' information needs, and the organization of cultural information, including descriptive metadata and the quantity of information that may be required. In addition, the study delineates information needs that different categories of users may have in common: teachers in high schools, students in colleges and universities, museum professionals, art ...
Contributing Partner: UNT Libraries
Negotiation, communication, and decision strategies used by hostage/crisis negotiators.

Negotiation, communication, and decision strategies used by hostage/crisis negotiators.

Date: May 2008
Creator: Hancerli, Suleyman
Description: By conducting this theory-based empirical study, gathering data from working negotiators in the US and Canada, I have determined what primary dynamic activities, communication skills, and negotiation tools are used by hostage/crisis negotiators. Negotiators implement their negotiation and decision strategies differently depending on whether the situations they deal with are instrumental or expressive. I have determined which elements of negotiations and factors affecting negotiations differ while handling instrumental and expressive hostage situations. I found that the collected data did not reveal any significant relationship between handling instrumental/expressive hostage situations differently and belief in the elements of Brenda Dervin's and Shannon-Weaver's theories. I have also determined that the belief in the elements of the Dervin's and Shannon-Weaver's theories is workable and practical for negotiators to use. Based on the above findings, the model suggested by this research adds the elements and directives of Dervin's and Shannon-Weaver's models to the common approach used by the negotiators. This revised model suggests that the negotiators pay attention to the dynamics of the interactions presented between the two parties: the negotiators themselves and hostage takers. The revised model also recommends that the negotiators focus on not only the hostage takers behavioral characteristics, psychological conditions, and ...
Contributing Partner: UNT Libraries
A study of on-line use and perceived effectiveness of compliance-gaining in health-related banner advertisements for senior citizens.

A study of on-line use and perceived effectiveness of compliance-gaining in health-related banner advertisements for senior citizens.

Date: December 2002
Creator: Toon, Michelle Anne
Description: This research investigated banner ads on the World Wide Web, specifically the types of messages used in those ads and the effectiveness of the ads as seen by their intended audience. The focus was on health-related banner advertisements targeting senior citizens. The study first sought to determine the frequency of appearance of those ads when classified into categories of compliance-gaining tactics provided by research scholars. Second, the study explored the relative perceived effectiveness among those categories. Two graduate students from a Central Texas university sorted text messages into predetermined compliance-gaining categories. Chi square tests looked for significant differences in the frequencies of banner ads in each category. Forty-five senior citizens from the Central Texas area completed surveys regarding the perceived effectiveness of a randomly ordered, randomly selected set of categorized banner ads. A repeated measures test attempted to determine whether some compliance-gaining strategies used in health-related banner ads were perceived as more effective than others. The hypothesis stated that there would be differences in frequencies of compliance-gaining strategies used among the compliance-gaining categories in health-related banner ads for senior citizens. The hypothesis was supported. The research question asked if some categories of compliance-gaining strategies used in health-related banner ads were ...
Contributing Partner: UNT Libraries
A mechanism for richer representation of videos for children: Calibrating calculated entropy to perceived entropy

A mechanism for richer representation of videos for children: Calibrating calculated entropy to perceived entropy

Date: August 2001
Creator: Kearns, Jodi
Description: This study explores the use of the information theory entropy equation in representations of videos for children. The calculated rates of information in the videos are calibrated to the corresponding perceived rates of information as elicited from the twelve 7 to 10 year old girls who were shown video documents. Entropy measures are calculated for several video elements: set time, set incidence, verbal time, verbal incidence, set constraint, nonverbal dependence, and character appearance. As hypothesized, mechanically calculated entropy measure (CEM) was found to be sufficiently similar to perceived entropy measure (PEM) made by children so that they can be used as useful and predictive elements of representations of children’s videos. The relationships between the CEM and the PEM show that CEM could stand for PEM in order to enrich representations for video documents for this age group. Speculations on transferring the CEM to PEM calibration to different age groups and different document types are made, as well as further implications for the field of information science.
Contributing Partner: UNT Libraries
An Examination of the Adoption of Preservation Metadata in Cultural Heritage Institutions: An Exploratory Study Using Diffusion of Innovations Theory

An Examination of the Adoption of Preservation Metadata in Cultural Heritage Institutions: An Exploratory Study Using Diffusion of Innovations Theory

Date: May 2009
Creator: Alemneh, Daniel Gelaw
Description: Digital preservation is a significant challenge for cultural heritage institutions and other repositories of digital information resources. Recognizing the critical role of metadata in any successful digital preservation strategy, the Preservation Metadata Implementation Strategies (PREMIS) has been extremely influential on providing a "core" set of preservation metadata elements that support the digital preservation process. However, there is no evidence, in the form of previous research, as to what factors explain and predict the level of adoption of PREMIS. This research focused on identifying factors that affect the adoption of PREMIS in cultural heritage institutions. This study employed a web-based survey to collect data from 123 participants in 20 country as well as a semi-structured, follow-up telephone interview with a smaller sample of the survey respondents. Roger's diffusion of innovation theory was used as a theoretical framework. The main constructs considered for the study were relative advantage, compatibility, complexity, trialability, observability, and institution readiness. The study yielded both qualitative and quantitative data, and analysis showed that all six factors influence the adoption of PREMIS in varying degrees. Results of a regression analysis of adoption level on the six factors showed a statistically significant relationship. The R2 value for the model was ...
Contributing Partner: UNT Libraries
Visual perception in relation to levels of meaning for children: An exploratory study.

Visual perception in relation to levels of meaning for children: An exploratory study.

Date: August 2007
Creator: Yu, Xinyu
Description: This study explores distinct levels of meaning from images of picture books perceived by 3- to 5-year-old children and investigates how the certain visual perception factors influence children's meaning making and if these factors are correlated. The literature review supports associations among visual perception, information, picture books, meaning, and children. Visual perception serves as the first channel that filters and interprets visual information, and picture books provide visual and verbal experience for children, who constantly search for meaning. Children age 3 to 5 years are potential users of picture books because pictorial information is considered useful to children's learning tasks. Previous research reveals that various factors influence visual perception, and meaning has been mostly associated with its semantic significance in information retrieval. In information science, little research has focused on young children's own way of categorizing information, especially visual information. In order to investigate the distinct levels of meaning perceived by children, the investigation employed both qualitative and quantitative methods including unobtrusive and participant observation, factor analysis, content analysis, and case study. The result of this study contributes to understanding the cognitive process of children related to visual literacy and their interpreting visual information in a digital environment.
Contributing Partner: UNT Libraries
Perceived features and similarity of images: An investigation into their relationships and a test of Tversky's contrast model.

Perceived features and similarity of images: An investigation into their relationships and a test of Tversky's contrast model.

Date: May 2005
Creator: Rorissa, Abebe
Description: The creation, storage, manipulation, and transmission of images have become less costly and more efficient. Consequently, the numbers of images and their users are growing rapidly. This poses challenges to those who organize and provide access to them. One of these challenges is similarity matching. Most current content-based image retrieval (CBIR) systems which can extract only low-level visual features such as color, shape, and texture, use similarity measures based on geometric models of similarity. However, most human similarity judgment data violate the metric axioms of these models. Tversky's (1977) contrast model, which defines similarity as a feature contrast task and equates the degree of similarity of two stimuli to a linear combination of their common and distinctive features, explains human similarity judgments much better than the geometric models. This study tested the contrast model as a conceptual framework to investigate the nature of the relationships between features and similarity of images as perceived by human judges. Data were collected from 150 participants who performed two tasks: an image description and a similarity judgment task. Qualitative methods (content analysis) and quantitative (correlational) methods were used to seek answers to four research questions related to the relationships between common and distinctive features ...
Contributing Partner: UNT Libraries
The Online and the Onsite Holocaust Museum Exhibition as an Informational Resource

The Online and the Onsite Holocaust Museum Exhibition as an Informational Resource

Date: December 2006
Creator: Lincoln, Margaret L.
Description: Museums today provide learning-rich experiences and quality informational resources through both physical and virtual environments. This study examined a Holocaust Museum traveling exhibition, Life in Shadows: Hidden Children and the Holocaust that was on display at the Art Center of Battle Creek, Michigan in fall 2005. The purpose of this mixed methods study was to assess the informational value of a Holocaust Museum exhibition in its onsite vs. online format by converging quantitative and qualitative data. Participants in the study included six eighth grade language arts classes who viewed various combinations or scenarios of the onsite and online Life in Shadows. Using student responses to questions in an online exhibition survey, an analysis of variance was performed to determine which scenario visit promotes the greatest content learning. Using student responses to additional questions on the same survey, data were analyzed qualitatively to discover the impact on students of each scenario visit. By means of an emotional empathy test, data were analyzed to determine differences among student response according to scenario visit. A principal finding of the study (supporting Falk and Dierking's contextual model of learning) was that the use of the online exhibition provided a source of prior orientation and ...
Contributing Partner: UNT Libraries
News photography image retrieval practices: Locus of control in two contexts.

News photography image retrieval practices: Locus of control in two contexts.

Access: Use of this item is restricted to the UNT Community.
Date: May 2006
Creator: Neal, Diane Rasmussen
Description: This is the first known study to explore the image retrieval preferences of news photographers and news photo editors in work contexts. Survey participants (n=102) provided opinions regarding 11 photograph searching methods. The quantitative survey data were analyzed using descriptive statistics, while content analysis was used to evaluate the qualitative survey data. In addition, news photographers and news photo editors (n=11) participated in interviews. Data from the interviews were analyzed with phenomenography. The survey data demonstrated that most participants prefer searching by events taking place in the photograph, objects that exist in the photograph, photographer-provided keywords, and relevant metadata, such as the date the picture was taken. They also prefer browsing. Respondents had mixed opinions about searching by emotions elicited in a photograph, as well as the environmental conditions represented in a photograph. Participants' lowest-rated methods included color and light, lines and shapes, and depth, shadow, or perspective. They also expressed little interest in technical information about a photograph, such as shutter speed and aperture. Interview participants' opinions about the search methods reflected the survey respondents' views. They discussed other aspects of news photography as well, including the stories told by the pictures, technical concerns about digital photography, and digital ...
Contributing Partner: UNT Libraries
FIRST PREV 1 2 NEXT LAST