This system will be undergoing maintenance Monday, January 23 from 8:00 AM to 12:00 PM CST.
Information Censorship: A Comparative Analysis of Newspaper Coverage of the Jyllands-Posten Editorial Caricatures in Cross-Cultural Settings

Information Censorship: A Comparative Analysis of Newspaper Coverage of the Jyllands-Posten Editorial Caricatures in Cross-Cultural Settings

Date: August 2010
Creator: Thomas, Julie George
Description: The identification and examination of cultural information strategies and censorship patterns used to propagate the controversial issue of the caricatures in two separate cultural contexts was the aim of this dissertation. It explored discourse used for the coverage of this topic by one newspaper in a restrictive information context and two newspapers in a liberal information context. Message propagation in a restrictive information environment was analyzed using the English daily Kuwait Times from the Middle East; the liberal information environment of the US was analyzed using two major dailies, the New York Times and the Philadelphia Inquirer. The study also concurrently identifies and elaborates on the themes and frames through which discourse was presented exposing the cultural ideologies and premises they represent. The topic was approached with an interdisciplinary position with the support and applicability testing of Chatman's insider-outsider theory within information science and Noelle-Neumann's spiral of silence theory and Herman and Chomsky's propaganda model based in the area of mass communication. The study has also presented a new model of information censorship - circle of information censorship, emphasizing conceptual issues that influence the selection and censorship of information.
Contributing Partner: UNT Libraries
Faculty Members' Readiness for E-learning in the College of Basic Education in Kuwait

Faculty Members' Readiness for E-learning in the College of Basic Education in Kuwait

Date: August 2010
Creator: Alajmi, Mohammed
Description: E-learning exposes students and instructors to different learning models such as constructivism rather than the traditional learning. E-learning as a part of today's technology has proven that it is appropriate for most students' mentalities and is a mind tool which promotes different learning models, such as problem solving strategy, collaborative learning, and critical thinking. The Public Authority for Applied Education and Training (PAAET) in Kuwait consists of more than 10 academic colleges with a total number of 120 faculty members. The College of Basic Education (CBE) is one of them. The implementation of e-learning at the College of Basic Education requires that all the learning community members, instructors and students, understand that an e-learning course is like a learning community with the privilege of sharing knowledge, opinions, experiences related to class subject, and productive outcomes that are beneficial to this learning community. This study indentified the statistically significant differences in demographic characteristics of e-learning adopters and non-adopters among faculty members at CBE, examining faculty members' attitudes and skills toward e-learning readiness. The study will explore perceived barriers that face e-learning at CBE. Applying the Rogers diffusion of innovation theory, the influence of 4 factors was examined regarding faculty readiness for ...
Contributing Partner: UNT Libraries
Information systems assessment: development of a comprehensive framework and contingency theory to assess the effectiveness of the information systems function.

Information systems assessment: development of a comprehensive framework and contingency theory to assess the effectiveness of the information systems function.

Date: August 2003
Creator: Myers, Barry L.
Description: The purpose of this research is to develop a comprehensive, IS assessment framework using existing IS assessment theory as a base and incorporating suggestions from other disciplines. To validate the framework and to begin the investigation of current IS assessment practice, a survey instrument was developed. A small group of subject matter experts evaluated and improved the instrument. The instrument was further evaluated using a small sample of IS representatives. Results of this research include a reexamination of the IS function measurement problem using new frameworks of analyses yielding (a) guidance for the IS manager or executive on which IS measures might best fit their organization, (b) a further verification of the important measures most widely used by IS executives, (c) a comprehensive, theoretically-derived, IS assessment framework, and by (d) the enhancement of IS assessment theory by incorporating ideas from actual practice. The body of knowledge gains a comprehensive, IS assessment framework that can be further tested for usefulness and applicability. Future research is recommended to substantiate and improve on these findings. Chapter 2 is a complete survey of prior research, subdivided by relevant literature divisions, such as organizational effectiveness, quality management, and IS assessment. Chapter 3 includes development of ...
Contributing Partner: UNT Libraries
The Information-Seeking Behavior of Digital Evidence Examiners

The Information-Seeking Behavior of Digital Evidence Examiners

Date: May 2011
Creator: Yildirim, Idris
Description: The current research sought to gain in-depth insights into the information-seeking behavior of Turkish National Police digital evidence examiners (DEEs); to explore the information sources that DEEs use and the factors affecting their decisions about source selection. Factors that affect information source selection and use by DEEs are: accreditation, workload, type of information, time, cost, availability, reliability/scientific importance, up-to-date data, prior experience with the source, relevance, interactivity and importance. The Internet was the information source most commonly used by participants during the examination stage; other sources included forums, experts, colleagues, forensic tools/kits and books. During the analysis stage, the most frequently mentioned information source was the investigation file, containing information about the elements of the crime; other sources included: personal experience, experts, detectives, the Internet, clients, professional training, the prosecutor, evidence submission forms, in-lab manuals, forums and colleagues. During the report-writing stage, most DEEs used in-lab manuals and report templates as information sources, but previously written reports, editing software, and colleagues were also used to obtain information about the format, style and language of reports as legal documents.
Contributing Partner: UNT Libraries
The gathering and use of information by fifth grade students with access to Palm® handhelds.

The gathering and use of information by fifth grade students with access to Palm® handhelds.

Date: December 2003
Creator: Peet, Martha Stuart Williamson
Description: Handheld computers may hold the possibility for a one-to-one computer: student ratio. The impact of the use of Palm® (Palm, Inc.) handhelds on information acquisition and use by 5th grade students in a North Texas school during a class research project was investigated. Five research questions were examined using observation, interviews, surveys, and document analysis. Are there differences in information gathering and use with the Palm between gifted, dyslexic, and regular learners? What relevance criteria do students use to evaluate a web site to determine whether to download the site to the Palm and afterwards whether to use the downloaded site's information in the report? How do the Palms affect the writing process? Do the animations and concept maps produced on the Palm demonstrate understanding of the intended concepts? Are there significant differences in results (i.e., final products grade) between Palm users and non-Palm users? Three groups of learners in the class, gifted, dyslexic, and regular learners, participated in the study. The regular and dyslexic students reported using Web sites that had not been downloaded to the Palm. Students reported several factors used to decide whether to download Web sites, but the predominant deciding factor was the amount of information. ...
Contributing Partner: UNT Libraries
Enhancement of spatial ability in girls in a single-sex environment through spatial experience and the impact on information seeking.

Enhancement of spatial ability in girls in a single-sex environment through spatial experience and the impact on information seeking.

Date: December 2008
Creator: Swarlis, Linda L.
Description: The test scores of spatial ability for women lag behind those of men in many spatial tests. On the Mental Rotations Test (MRT), a significant gender gap has existed for over 20 years and continues to exist. High spatial ability has been linked to efficiencies in typical computing tasks including Web and database searching, text editing, and computer programming. The relationships between the components of visuospatial ability and performance are complex. However, research strongly indicates that a connection exists, and further research is necessary to determine the interactions between the variables of environment, genetics, and spatial training. Spatial experience can enhance spatial skills. However, to what extent spatial skills can be enhanced in female adolescents through a spatial curriculum to reduce the gap in scores has not been fully researched, nor has the impact of spatial skill on information seeking. This research project investigated spatial skill in adolescent females by examining (1) the extent to which the intervention of teaching a spatial curriculum in a single-sex setting could improve mental rotation test scores, and (2) the impact of spatial skills on an information seeking task in a single-sex setting. The extent to which a spatial visualization curriculum can improve MRT ...
Contributing Partner: UNT Libraries
Measuring the accuracy of four attributes of sound for conveying changes in a large data set.

Measuring the accuracy of four attributes of sound for conveying changes in a large data set.

Access: Use of this item is restricted to the UNT Community.
Date: May 2003
Creator: Holmes, Jason
Description: Human auditory perception is suited to receiving and interpreting information from the environment but this knowledge has not been used extensively in designing computer-based information exploration tools. It is not known which aspects of sound are useful for accurately conveying information in an auditory display. An auditory display was created using PD, a graphical programming language used primarily to manipulate digital sound. The interface for the auditory display was a blank window. When the cursor is moved around in this window, the sound generated would changed based on the underlying data value at any given point. An experiment was conducted to determine which attribute of sound most accurately represents data values in an auditory display. The four attributes of sound tested were frequency-sine waveform, frequency-sawtooth waveform, loudness and tempo. 24 subjects were given the task of finding the highest data point using sound alone using each of the four sound treatments. Three dependent variables were measured: distance accuracy, numeric accuracy, and time on task. Repeated measures ANOVA procedures conducted on these variables did not rise to the level of statistical significance (α=.05). None of the sound treatments was more accurate than the other as representing the underlying data values. 52% ...
Contributing Partner: UNT Libraries
Accessing Information on the World Wide Web: Predicting Usage Based on Involvement

Accessing Information on the World Wide Web: Predicting Usage Based on Involvement

Date: May 2003
Creator: Langford, James David
Description: Advice for Web designers often includes an admonition to use short, scannable, bullet-pointed text, reflecting the common belief that browsing the Web most often involves scanning rather than reading. Literature from several disciplines focuses on the myriad combinations of factors related to online reading but studies of the users' interests and motivations appear to offer a more promising avenue for understanding how users utilize information on Web pages. This study utilized the modified Personal Involvement Inventory (PII), a ten-item instrument used primarily in the marketing and advertising fields, to measure interest and motivation toward a topic presented on the Web. Two sites were constructed from Reader's Digest Association, Inc. online articles and a program written to track students' use of the site. Behavior was measured by the initial choice of short versus longer versions of the main page, the number of pages visited and the amount of time spent on the site. Data were gathered from students at a small, private university in the southwest part of the United States to answer six hypotheses which posited that subjects with higher involvement in a topic presented on the Web and a more positive attitude toward the Web would tend to select ...
Contributing Partner: UNT Libraries
User Acceptance of North Central Texas Fusion Center System by Law Enforcement Officers

User Acceptance of North Central Texas Fusion Center System by Law Enforcement Officers

Date: December 2010
Creator: Odabasi, Mehmet
Description: The September 11 terrorist attacks pointed out the lack of information sharing between law enforcement agencies as a potential threat to sound law enforcement in the United States. Therefore, many law enforcement agencies as well as the federal government have been initiating information sharing systems among law enforcement agencies to eradicate the information sharing problem. One of the systems established by Homeland Security is the North Central Texas Fusion Center (NCTFC). This study evaluates the NCTFC by utilizing user acceptance methodology. The unified theory of acceptance and the use of technology is used as a theoretical framework for this study. Within the study, user acceptance literature is examined and various models and theories are discussed. Furthermore, a brief information regarding the intelligence work done by law enforcement agencies are explained. In addition to the NCTFC, several major law enforcement information systems are introduced. The data for this study comes from the users of the NCTFC across the north central Texas region. Surveys and interviews are used to triangulate data. It is found in this study that performance expectancy and effort expectancy are important indicators of system use. Furthermore, outreach and needs assessment are important factors in establishing systems. The results ...
Contributing Partner: UNT Libraries
Solutions for Dynamic Channel Assignment and Synchronization Problem for Distributed Wireless Multimedia System

Solutions for Dynamic Channel Assignment and Synchronization Problem for Distributed Wireless Multimedia System

Date: August 2002
Creator: Hong, SungBum
Description: The recent advances in mobile computing and distributed multimedia systems allow mobile hosts (clients) to access wireless multimedia Data at anywhere and at anytime. In accessing multimedia information on the distributed multimedia servers from wireless personal communication service systems, a channel assignment problem and synchronization problems should be solved efficiently. Recent demand for mobile telephone service have been growing rapidly while the electro-magnetic spectrum of frequencies allocated for this purpose remain limited. Any solution to the channel assignment problem is subject to this limitation, as well as the interference constraint between adjacent channels in the spectrum. Channel allocation schemes provide a flexible and efficient access to bandwidth in wireless and mobile communication systems. In this dissertation, both an efficient distributed algorithm for dynamic channel allocation based upon mutual exclusion model, and an efficient distributed synchronization algorithm using Quasi-sink for wireless and mobile multimedia systems to ensure and facilitate mobile client access to multimedia objects are proposed. Algorithm's performance with several channel systems using different types of call arrival patterns is determined analytically. A set of simulation experiments to evaluate the performance of our scheme using message complexity and buffer usage at each frame arrival time.
Contributing Partner: UNT Libraries
E-Learning and In-Service Training: An Exploration of the Beliefs and Practices of Trainers and Trainees in the Turkish National Police

E-Learning and In-Service Training: An Exploration of the Beliefs and Practices of Trainers and Trainees in the Turkish National Police

Date: August 2007
Creator: Zengin, Selcuk
Description: This targeted research study, carried out by an officer of the Turkish National Police (TNP), investigated the perceptions and beliefs of TNP trainers and trainees towards the potential adoption and implementation of e-learning technology for in-service police training. Utilizing diffusion and innovation theory (DOI) (Rogers, 1995) and the conceptual technology integration process model (CTIM) (Nicolle, 2005), two different surveys were administered; one to the trainers and one to the trainees. The factor analyses revealed three shared trainer and trainee perceptions: A positive perception towards e-learning, personally and for the TNP; a belief in the importance of administrative support for e-learning integration; and the belief in importance of appropriate resources to facilitate integration and maintain implementation. Three major recommendations were made for the TNP. First, the research findings could be used as a road map by the TNP Education Department to provide a more flexible system to disseminate in-service training information. The second is to establish two-way channels of communication between the administration and the TNP personnel to efficiently operationalize the adoption and integration of e-learning technology. The third is the administrative provision of necessary hardware, software, and technical support.
Contributing Partner: UNT Libraries
Perceived attributes of diffusion of innovation theory as predictors of Internet adoption among faculty members of Imam Mohammed Bin Saud University.

Perceived attributes of diffusion of innovation theory as predictors of Internet adoption among faculty members of Imam Mohammed Bin Saud University.

Date: May 2007
Creator: Almobarraz, Abdullah
Description: The Internet is the most common communication and research tool worldwide. Perusal of the World Wide Web quickly reveals the variety of information available. Internet adoption can be considered the late 20th century's most important event. In academic environments today, Internet use among faculty members has been widely expanded, with professors now integrating Internet technology into classroom activities. Imam Muhammad Bin Saud Islamic University (IMSU) is a pioneering public university in Saudi Arabia. Until recently, some faculty members at IMSU were unable to access the Internet through the university. It is important to study the effects of this delay on faculty members regarding research and academic activities. This study identified the statistically significant differences in demographic characteristics of Internet adopters and non-adopters among faculty members at IMSU, examined whether faculty members' perceptions of the Internet affected adoption, determined if the university administration's decisions impacted faulty members' decisions to adopt the Internet, identified factors motivating faculty members to adopt the Internet, identified obstacles influencing faculty members' decisions to use the Internet, and determined whether innovation characteristics as perceived by faculty members predicted Internet adoption. Using Rogers' diffusion of innovation theory, the influence of eight attributes were examined regarding Internet adoption among ...
Contributing Partner: UNT Libraries
Modeling Student Perception of Web 2.0 Technologies Adoption in Kuwait

Modeling Student Perception of Web 2.0 Technologies Adoption in Kuwait

Date: May 2011
Creator: Alajmi, Mohammad
Description: The primary focus of this dissertation was to explore students' perceptions of adopting Web 2.0 applications at the School of Basic Education (SBE) in Kuwait. Although Web 2.0 applications are becoming more popular among the digital generation, there is still no evidence of students' perceptions of adopting the innovation of Web 2.0 technologies in Kuwait. The problem this study addresses is that the current status of Web 2.0 technologies usage by academic students has remained educationally unknown in Kuwait. Therefore, there was a need to investigate the extent to which academic students in SBE are aware of and their usage of Web 2.0 technologies, as well as the factors and obstacles that affect using these technologies. Rogers' diffusion of innovation theory (DoI) is employed in this study to specify the factors that influence student perceptions of adopting Web 2.0 applications as learning tools. Data used in this dissertation was gathered via a survey instrument from 350 students at the SBE and was statistically analyzed to find out the answers of the research questions. This study identified the low rate of Web 2.0 awareness and adoption by the students. Descriptive statistical analysis, such as mean scores and standard deviation, were used ...
Contributing Partner: UNT Libraries
The Impact of Leadership Styles and Knowledge Sharing on Police Officers’ Willingness to Exert Extra Effort to Provide Better Security: A Study in the Riot Unit of the Turkish National Police

The Impact of Leadership Styles and Knowledge Sharing on Police Officers’ Willingness to Exert Extra Effort to Provide Better Security: A Study in the Riot Unit of the Turkish National Police

Date: August 2011
Creator: Tombul, Fatih
Description: The motivation for this study is to understand the factors affecting police officers’ willingness to exert extra effort for providing better service through knowledge sharing in different working environments such as riots. Since managers’ leadership styles may be important factors affecting subordinates’ willingness to exert extra effort, this study investigates which of the leadership styles -- transformational, transactional or laissezfaire leadership -- will have a positive effect on officers’ willingness to exert extra effort. In addition, the current study also examines the effect of the mentioned leadership styles on knowledge sharing, which, in turn, affects the officers’ willingness to exert extra effort in the riot unit of the Turkish National Police (TNP) in Ankara, Turkey. The sworn line police officers working in the riot unit in Ankara, Turkey, were the participants in this study. Three questionnaires --a Multifactor Leadership (MLQ), knowledge sharing, and demographic questionnaire -- were arranged as a booklet to be distributed to the respondents. The results of the study indicate that police supervisors' perceived transformational leadership behavior has a positive effect on officers' willingness to exert extra effort. In addition, the findings also reveal that although both officers' years of service in TNP and police supervisors' perceived ...
Contributing Partner: UNT Libraries
Usability of a Keyphrase Browsing Tool Based on a Semantic Cloud Model

Usability of a Keyphrase Browsing Tool Based on a Semantic Cloud Model

Date: August 2006
Creator: Johnston, Onaje Omotola
Description: The goal of this research was to facilitate the scrutiny and utilization of Web search engine retrieval results. I used a graphical keyphrase browsing interface to visualize the conceptual information space of the results, presenting document characteristics that make document relevance determinations easier.
Contributing Partner: UNT Libraries
Effects of Tasks on Information-Seeking Behavior in a Police Work Environment in the Context of Criminal Intelligence

Effects of Tasks on Information-Seeking Behavior in a Police Work Environment in the Context of Criminal Intelligence

Date: May 2010
Creator: Tatil, Serkan
Description: Although dominant effects of tasks on individuals' information-seeking behavior is accepted by many scholars, a limited number of studies has been conducted to reveal the nature of the relationship between tasks and information-seeking behavior. In their studies, some earlier researchers categorized tasks according to their complexity while others did the same according to the specifications of tasks. Two of the groundbreaking researchers in this area are Katriina Byström and Kalervo Järvelin who contributed to the understanding of the relationship between task complexity and information-seeking behavior. However, their findings also need empirical support for theory growth. In response to this need, this study attempts to test Byström and Järvelin's findings through a research using different research methods and applied in a police work environment. Other than providing empirical support for theory growth, this research is also expected to contribute to the understudied area of police information-seeking behavior. Both qualitative and quantitative data were collected from the participants who came from traffic, homicide, and anti-terrorism divisions of Ankara, Eskisehir, and Kirikkale Police Departments in Turkey. The participants identified terrorism cases as the most complex cases to solve, followed by homicide and traffic accident cases. Differences in the information-seeking behavior of three groups ...
Contributing Partner: UNT Libraries
An investigation of factors affecting Omani faculty members' adoption of information and computing technology.

An investigation of factors affecting Omani faculty members' adoption of information and computing technology.

Date: August 2009
Creator: Al Senaidi, Said
Description: The purpose of this study was to explore the factors influencing information and computing technology (ICT) adoption for Omani faculty members from a framework of Rogers' theory of diffusion of innovation. Three hundred Omani faculty members from Sultan Qaboos University (SQU) participated in the study. The survey consisted of five parts: (a) an 18-item questionnaire on ICT uses and skills, (b) a 1-item questionnaire on adopter category, (c) a 44-item self-constructed questionnaire on perception of barriers to adopting ICT, (d) a 50-item questionnaire on ICT attributes adapted from Moore and Benbasat, and (e) a 15-item questionnaire on demographic and job-related variables. Descriptive statistics indicated that the faculty members overall used ICT at the "Sometimes" level and had ICT skills at the "Intermediate" level. The most frequently used and skillful ICT functional areas were Website browsing, Internet search engine, and word processing. One-way ANOVAs found significant group differences of ICT uses and skills, perception of barriers, and perception of ICT attributes in the category of adopter. Early adopters used ICT more, had higher ICT skills, perceived fewer barriers in the adopting process, and recognized higher values of ICT attributes than later adopters did. Multiple regression analysis showed the level of ICT ...
Contributing Partner: UNT Libraries
Knowledge Management and Law Enforcement: An Examination of Knowledge Management Strategies of the Police Information System (POLNET) in the Turkish National Police

Knowledge Management and Law Enforcement: An Examination of Knowledge Management Strategies of the Police Information System (POLNET) in the Turkish National Police

Date: August 2009
Creator: Gultekin, Kubra
Description: This research study explores knowledge management (KM) in law enforcement, focusing on the POLNET system established by the Turkish National Police as a knowledge-sharing tool. This study employs a qualitative case study for exploratory and descriptive purposes. The qualitative data set came from semi-structured face-to-face and telephone interviews, as well as self-administered e-mail questionnaires. The sample was composed of police administrators who created POLNET, working under the Department of Information Technologies and the Department of Communication. A content analysis method is used to analyze the data. This study finds that law enforcement organizations' KM strategies have several differences from Handzic and Zhou's integrated KM model. Especially, organizational culture and structure of law enforcement agencies differently affect knowledge creation, conversion, retrieval, and sharing processes. Accordingly, this study offers a new model which is dynamic and suggests that outcomes always affect drivers.
Contributing Partner: UNT Libraries
Information Seeking Behavior of Crime Scene Investigators in the Turkish National Police

Information Seeking Behavior of Crime Scene Investigators in the Turkish National Police

Date: May 2010
Creator: Demircioglu, Mehmet
Description: This exploratory research is the first one among occupational information seeking behavior studies that focuses on information seeking behaviors of the crime scene investigators. The data used in this dissertation were gathered via a self-administrated survey instrument from 29 cities in Turkey. Findings obtained from the data analyses show that there is a strongly positive relationship between the experience of the crime scene investigators and the use of personal knowledge and experience as a primary information source (experience is operationalized with age, service years in policing, and service years in crime scene investigation units). The findings also suggest that increasing of the level of education is negatively related to relying on immediate colleagues as an information source among the crime scene investigators. These findings are consistent with related literature and theory. The data analysis shows that crime scene investigators work in cities with higher population rates have more complaint scores than those who work in cities with lower population rates across Turkey. The findings from the data analysis may suggest valuable implications to defeat the barriers between crime scene investigators and information sources. The researcher drew a proposed theoretical framework of an information behavior concept in the context of crime ...
Contributing Partner: UNT Libraries
Finding the perfect blend: A comparative study of online, face-to-face, and blended instruction.

Finding the perfect blend: A comparative study of online, face-to-face, and blended instruction.

Date: August 2009
Creator: Pearcy, Agnes Goz
Description: As distance learning evolved, course designers and teachers quickly recognized the value of integrating online features into the classroom. The result was blended learning, a combination of online and face-to-face components. This complex and dynamic new form of education has raised many questions about the role of computer-mediated communication in education and has provided new opportunities for extending research in learning and communication. The purpose of the study was to determine whether a blended class will produce different (and possibly better) results in terms of student perceptions of the overall learning experience and student satisfaction than traditional lecture-based face-to-face instruction or learning that is delivered entirely online. The main goals of this study were to compare the effectiveness of face-to-face, online, and blended instruction, and to examine the role of interactions in the effectiveness of each educational method. While each form of instruction received very positive feedback from both students and instructors and the newly introduced blended courses proved very successful in terms of overall satisfaction with the learning experience, the traditional lecture-based courses produced more positive attitudes toward the subject matter. The possible causes of these discrepancies between some of the quantitative and qualitative results point toward the role ...
Contributing Partner: UNT Libraries
Terrorism as a social information entity: A model for early intervention.

Terrorism as a social information entity: A model for early intervention.

Access: Use of this item is restricted to the UNT Community.
Date: August 2005
Creator: Yayla, Ahmet
Description: This dissertation studies different social aspects of terrorists and terrorist organizations in an effort to better deal with terrorism, especially in the long run. The researcher, who also worked as a Police Captain at Turkish National Police Anti-Terrorism Department, seeks solutions to today's global problem by studying both literature and a Delphi examination of a survey of 1070 imprisoned terrorists. The research questions include questions such as "What are the reasons behind terrorism?", "Why does terrorism occur?", "What ideologies provide the framework for terrorist violence?, "Why do some individuals become terrorists and others do not?" and "Under what conditions will terrorists end their violence?" The results of the study presents the complexity of the terrorism problem as a social experience and impossibility of a single solution or remedy for the global problem of terrorism. The researcher through his examination of the findings of the data, presented that terrorism is a social phenomenon with criminal consequences that needs to be dealt by means of two dimensional approaches. The first is the social dimension of terrorism and the second is the criminal dimension of terrorism. Based on this, the researcher constructed a conceptual model which addresses both of these dimensions under the ...
Contributing Partner: UNT Libraries
Makeshift Information Constructions: Information Flow and Undercover Police

Makeshift Information Constructions: Information Flow and Undercover Police

Date: August 2005
Creator: Aksakal, Baris
Description: This dissertation presents the social virtual interface (SVI) model, which was born out of a need to develop a viable model of the complex interactions, information flow and information seeking behaviors among undercover officers. The SVI model was created from a combination of various philosophies and models in the literature of information seeking, communication and philosophy. The questions this research paper answers are as follows: 1. Can we make use of models and concepts familiar to or drawn from Information Science to construct a model of undercover police work that effectively represents the large number of entities and relationships? and 2. Will undercover police officers recognize this model as realistic? This study used a descriptive qualitative research method to examine the research questions. An online survey and hard copy survey were distributed to police officers who had worked in an undercover capacity. In addition groups of officers were interviewed about their opinion of the SVI model. The data gathered was analyzed and the model was validated by the results of the survey and interviews.
Contributing Partner: UNT Libraries
Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.

Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.

Date: August 2005
Creator: Ozeren, Suleyman
Description: Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem. Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural. Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level. "Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions. Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P). Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of ...
Contributing Partner: UNT Libraries
Snakes Alive!

Snakes Alive!

Date: August 2008
Creator: Greer, Daniel
Description: On three days in March each year, the sleepy little town of Sweetwater, Texas transforms into the rattlesnake capital of the world. Snake hunters and curious tourists converge on the town of 12,000 for the Annual Sweetwater Rattlesnake Roundup. On the outside of the Nolan County Coliseum, the smell of funnel cakes and hot-dogs fills the air as vendors sell snacks and souvenirs. However the real action is inside where snakes collected from all over the state lay in piles by the thousands, waiting to be sexed, milked and ultimately killed. Through interviews and observational footage, "Snakes Alive!" explores the Sweetwater Rattlesnake Roundup, those that participate in the event, and the elements that make it an unabashed West Texas tradition.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 4 5 NEXT LAST