E-Learning and In-Service Training: An Exploration of the Beliefs and Practices of Trainers and Trainees in the Turkish National Police

E-Learning and In-Service Training: An Exploration of the Beliefs and Practices of Trainers and Trainees in the Turkish National Police

Date: August 2007
Creator: Zengin, Selcuk
Description: This targeted research study, carried out by an officer of the Turkish National Police (TNP), investigated the perceptions and beliefs of TNP trainers and trainees towards the potential adoption and implementation of e-learning technology for in-service police training. Utilizing diffusion and innovation theory (DOI) (Rogers, 1995) and the conceptual technology integration process model (CTIM) (Nicolle, 2005), two different surveys were administered; one to the trainers and one to the trainees. The factor analyses revealed three shared trainer and trainee perceptions: A positive perception towards e-learning, personally and for the TNP; a belief in the importance of administrative support for e-learning integration; and the belief in importance of appropriate resources to facilitate integration and maintain implementation. Three major recommendations were made for the TNP. First, the research findings could be used as a road map by the TNP Education Department to provide a more flexible system to disseminate in-service training information. The second is to establish two-way channels of communication between the administration and the TNP personnel to efficiently operationalize the adoption and integration of e-learning technology. The third is the administrative provision of necessary hardware, software, and technical support.
Contributing Partner: UNT Libraries
Needs Assessment Survey Report

Needs Assessment Survey Report

Date: January 5, 2006
Creator: Hsieh, Inga K. & Murray, Kathleen R.
Description: This report is part of the Web-at-Risk project. The Web-at-Risk project is one of eight digital preservation projects funded in 2004 by the Library of Congress. The project is a 3-year collaborative effort of the California Digital Library (CDL), the University of North Texas (UNT), and New York University (NYU). The project will develop a Web Archiving Service that enables curators to build collections of web-published materials. The content of the collections for this project will be largely from US federal and state government agencies, but will also include political policy documents, campaign literature, and information surrounding political movements and labor unions. This report includes the methods, results, discussion, and appendices related to the Web-at-Risk project.
Contributing Partner: UNT Libraries
Needs Assessment Survey Report: Abbreviated Version

Needs Assessment Survey Report: Abbreviated Version

Date: January 5, 2006
Creator: Hsieh, Inga K. & Murray, Kathleen R.
Description: This report is part of the Web-at-Risk project. The Needs Assessment Toolkit created for the Web-at-Risk project describes the project's needs assessment activities and includes data collection tools, which are designated to identify the needs and requirements of curators, web-content producers, and end users with regard to the Web Archive Service. Additionally, information gathered by some of the data collection tools will help to identify curators' requirements for the web crawler and its crawl analyzer tool, which will be developed as part of the project. Each of the assessment activities described in the Needs Assessment Toolkit was designated to follow a collection development framework for web archives. This report contains a data analysis of the survey results. Results from focus group discussions and interviews with content providers and end users are presented in separate reports.
Contributing Partner: UNT Libraries
The Impact of Predisposition Towards Group Work on Intention to Use a CSCW System

The Impact of Predisposition Towards Group Work on Intention to Use a CSCW System

Date: May 2005
Creator: Reyna, Josephine
Description: Groupware packages are increasingly being used to support content delivery, class discussion, student to student and student to faculty interactions and group work on projects. This research focused on groupware packages that are used to support students who are located in different places, but who are assigned group projects as part of their coursework requirements. In many cases, students are being asked to use unfamiliar technologies that are very different from those that support personal productivity. For example, computer-assisted cooperative work (CSCW) technology is different from other more traditional, stand-alone software applications because it requires the user to interact with the computer as well as other users. However, familiarity with the technology is not the only requirement for successful completion of a group assigned project. For a group to be successful, it must also have a desire to work together on the project. If this pre-requisite is not present within the group, then the technology will only create additional communication and coordination barriers. How much of an impact does each of these factors have on the acceptance of CSCW technology? The significance of this study is threefold. First, this research contributed to how a user's predisposition toward group work affects ...
Contributing Partner: UNT Libraries
Web Content Authorship: Academic Librarians in Web Content Management

Web Content Authorship: Academic Librarians in Web Content Management

Date: May 2012
Creator: Vassilieva, Elena
Description: An increasing number of libraries and information centers are using content management (CM) applications to develop, redesign, and maintain their websites. the purpose of this research was to provide understanding of attitudes of academic librarians about how their utilization of CM technology influences the information services they provide at the academic library’s website and to examine their perceptions of how using CM affects the creation of the web content. This research applied a qualitative research design (electronic survey and in-depth semi-structured interviews of academic subject librarians) with elements of a quantitative approach. the study discussed the concept of web authorship and supplied fundamentals for future theoretical research about authorship in web content development at academic libraries. the study provided an overview of CM at academic libraries and explored characteristics of dynamic content and semantic web applications at their websites. It discussed librarians’ opinions about issues of migration to the new content management system (CMS), factors affecting its efficient employment, and roles of librarians in web content management. Results of this study will serve to future research on management behavior of academic librarians authoring web content with the help of CM. the findings about the difficulties observed in the use of ...
Contributing Partner: UNT Libraries
What makes a quality Ph.D. program in library and information sciences?

What makes a quality Ph.D. program in library and information sciences?

Date: December 2006
Creator: Klingler, Scott Lavell
Description: The intent of this study was to establish and validate criteria for use to assess the quality of a library and information sciences (LIS) Ph.D. program. The Ph.D. student-centric topology for quality Ph.D. programs was developed from a 2001 position statement by the American Association of Colleges of Nursing (AACN) regarding the quality indicators in research-focused doctoral programs in nursing. Topology components were tested using a survey instrument to establish their importance to the community of practice and their potential use to assess a Ph.D. program. Survey participants were asked to rank terms or concepts in a balanced incomplete block (BIB) design then rate, on a Likert-type scale, statements about the applicability of these terms or concepts to assessing a quality LIS Ph.D. program. Survey participants were from the Association for Library and Information Science Education (ALISE) Open Lib/Info Sci Education Forum jESSE Listserv. Of 225 survey participants affiliated with universities or schools from North America who submitted usable surveys, slightly less than two-thirds (64.4 %) were female while 35.5 % were male. Ninety-eight participants (43.6 %) were faculty, 114 (50.7 %) were Ph.D. students or candidates, and 13 (5.8 %) were in other roles. Statistical analysis of survey responses ...
Contributing Partner: UNT Libraries
Terrorism as a social information entity: A model for early intervention.

Terrorism as a social information entity: A model for early intervention.

Access: Use of this item is restricted to the UNT Community.
Date: August 2005
Creator: Yayla, Ahmet
Description: This dissertation studies different social aspects of terrorists and terrorist organizations in an effort to better deal with terrorism, especially in the long run. The researcher, who also worked as a Police Captain at Turkish National Police Anti-Terrorism Department, seeks solutions to today's global problem by studying both literature and a Delphi examination of a survey of 1070 imprisoned terrorists. The research questions include questions such as "What are the reasons behind terrorism?", "Why does terrorism occur?", "What ideologies provide the framework for terrorist violence?, "Why do some individuals become terrorists and others do not?" and "Under what conditions will terrorists end their violence?" The results of the study presents the complexity of the terrorism problem as a social experience and impossibility of a single solution or remedy for the global problem of terrorism. The researcher through his examination of the findings of the data, presented that terrorism is a social phenomenon with criminal consequences that needs to be dealt by means of two dimensional approaches. The first is the social dimension of terrorism and the second is the criminal dimension of terrorism. Based on this, the researcher constructed a conceptual model which addresses both of these dimensions under the ...
Contributing Partner: UNT Libraries
Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.

Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.

Date: August 2005
Creator: Ozeren, Suleyman
Description: Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem. Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural. Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level. "Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions. Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P). Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of ...
Contributing Partner: UNT Libraries
Intangible Qualities of Rare Books: Toward a Decision-Making Framework for Preservation Management in Rare Book Collections, Based Upon the Concept of the Book as Object

Intangible Qualities of Rare Books: Toward a Decision-Making Framework for Preservation Management in Rare Book Collections, Based Upon the Concept of the Book as Object

Date: May 2006
Creator: Sheehan, Jennifer Karr
Description: For rare book collections, a considerable challenge is involved in evaluating collection materials in terms of their inherent value, which includes the textual and intangible information the materials provide for the collection's users. Preservation management in rare book collections is a complex and costly process. As digitization and other technological advances in surrogate technology have provided new forms representation, new dilemmas in weighing the rare book's inherently valuable characteristics against the possibly lesser financial costs of surrogates have arisen. No model has been in wide use to guide preservation management decisions. An initial iteration of such a model is developed, based on a Delphi-like iterative questioning of a group of experts in the field of rare books. The results are used to synthesize a preservation management framework for rare book collections, and a small-scale test of the framework has been completed through two independent analyses of five rare books in a functioning collection. Utilizing a standardized template for making preservation decisions offers a variety of benefits. Preservation decisions may include prioritizing action upon the authentic objects, or developing and maintaining surrogates in lieu of retaining costly original collection materials. The framework constructed in this study provides a method for reducing ...
Contributing Partner: UNT Libraries
A Conceptual Map for Understanding the Terrorist Recruitment Process: Observation and Analysis of Turkish Hezbollah Terrorist Organizations.

A Conceptual Map for Understanding the Terrorist Recruitment Process: Observation and Analysis of Turkish Hezbollah Terrorist Organizations.

Date: August 2007
Creator: Teymur, Samih
Description: Terrorism is a historical problem; however, it becomes one of the biggest problems in 21st century. September 11 and the following Madrid, Istanbul and London attacks showed that it is the most significant problem threatening world peace and security. Governments have started to deal with terrorism by improving security measurements and making new investments to stop terrorism. Most of the governments' and scholars' focus is on immediate threats and causes of terrorism, instead of looking at long-term solutions such as root causes and underlying reasons of terrorism, and the recruitment style of terrorist organizations If terrorist recruitment does not stop, then it is safe to say terrorist activities cannot be stopped. This study focused on the recruitment process by observing two different terrorist organizations, DHKP/C and Turkish Hezbollah. The researcher brings 13 years of field experience and first-person data gathered from inside the terrorist organizations. The research questions of this study were: (i) How can an individual be prevented from joining or carrying out terrorist activities?; (ii) What factors are correlated with joining a terrorist organization?; (iii) What are the recruitment processes of the DHKP/C, PKK, and Turkish Hezbollah?; (iv) Is there any common process of being a member of ...
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 4 5 NEXT LAST