Information Censorship: A Comparative Analysis of Newspaper Coverage of the Jyllands-Posten Editorial Caricatures in Cross-Cultural Settings

Information Censorship: A Comparative Analysis of Newspaper Coverage of the Jyllands-Posten Editorial Caricatures in Cross-Cultural Settings

Date: August 2010
Creator: Thomas, Julie George
Description: The identification and examination of cultural information strategies and censorship patterns used to propagate the controversial issue of the caricatures in two separate cultural contexts was the aim of this dissertation. It explored discourse used for the coverage of this topic by one newspaper in a restrictive information context and two newspapers in a liberal information context. Message propagation in a restrictive information environment was analyzed using the English daily Kuwait Times from the Middle East; the liberal information environment of the US was analyzed using two major dailies, the New York Times and the Philadelphia Inquirer. The study also concurrently identifies and elaborates on the themes and frames through which discourse was presented exposing the cultural ideologies and premises they represent. The topic was approached with an interdisciplinary position with the support and applicability testing of Chatman's insider-outsider theory within information science and Noelle-Neumann's spiral of silence theory and Herman and Chomsky's propaganda model based in the area of mass communication. The study has also presented a new model of information censorship - circle of information censorship, emphasizing conceptual issues that influence the selection and censorship of information.
Contributing Partner: UNT Libraries
Faculty Members' Readiness for E-learning in the College of Basic Education in Kuwait

Faculty Members' Readiness for E-learning in the College of Basic Education in Kuwait

Date: August 2010
Creator: Alajmi, Mohammed
Description: E-learning exposes students and instructors to different learning models such as constructivism rather than the traditional learning. E-learning as a part of today's technology has proven that it is appropriate for most students' mentalities and is a mind tool which promotes different learning models, such as problem solving strategy, collaborative learning, and critical thinking. The Public Authority for Applied Education and Training (PAAET) in Kuwait consists of more than 10 academic colleges with a total number of 120 faculty members. The College of Basic Education (CBE) is one of them. The implementation of e-learning at the College of Basic Education requires that all the learning community members, instructors and students, understand that an e-learning course is like a learning community with the privilege of sharing knowledge, opinions, experiences related to class subject, and productive outcomes that are beneficial to this learning community. This study indentified the statistically significant differences in demographic characteristics of e-learning adopters and non-adopters among faculty members at CBE, examining faculty members' attitudes and skills toward e-learning readiness. The study will explore perceived barriers that face e-learning at CBE. Applying the Rogers diffusion of innovation theory, the influence of 4 factors was examined regarding faculty readiness for ...
Contributing Partner: UNT Libraries
Information systems assessment: development of a comprehensive framework and contingency theory to assess the effectiveness of the information systems function.

Information systems assessment: development of a comprehensive framework and contingency theory to assess the effectiveness of the information systems function.

Date: August 2003
Creator: Myers, Barry L.
Description: The purpose of this research is to develop a comprehensive, IS assessment framework using existing IS assessment theory as a base and incorporating suggestions from other disciplines. To validate the framework and to begin the investigation of current IS assessment practice, a survey instrument was developed. A small group of subject matter experts evaluated and improved the instrument. The instrument was further evaluated using a small sample of IS representatives. Results of this research include a reexamination of the IS function measurement problem using new frameworks of analyses yielding (a) guidance for the IS manager or executive on which IS measures might best fit their organization, (b) a further verification of the important measures most widely used by IS executives, (c) a comprehensive, theoretically-derived, IS assessment framework, and by (d) the enhancement of IS assessment theory by incorporating ideas from actual practice. The body of knowledge gains a comprehensive, IS assessment framework that can be further tested for usefulness and applicability. Future research is recommended to substantiate and improve on these findings. Chapter 2 is a complete survey of prior research, subdivided by relevant literature divisions, such as organizational effectiveness, quality management, and IS assessment. Chapter 3 includes development of ...
Contributing Partner: UNT Libraries
The Information-Seeking Behavior of Digital Evidence Examiners

The Information-Seeking Behavior of Digital Evidence Examiners

Date: May 2011
Creator: Yildirim, Idris
Description: The current research sought to gain in-depth insights into the information-seeking behavior of Turkish National Police digital evidence examiners (DEEs); to explore the information sources that DEEs use and the factors affecting their decisions about source selection. Factors that affect information source selection and use by DEEs are: accreditation, workload, type of information, time, cost, availability, reliability/scientific importance, up-to-date data, prior experience with the source, relevance, interactivity and importance. The Internet was the information source most commonly used by participants during the examination stage; other sources included forums, experts, colleagues, forensic tools/kits and books. During the analysis stage, the most frequently mentioned information source was the investigation file, containing information about the elements of the crime; other sources included: personal experience, experts, detectives, the Internet, clients, professional training, the prosecutor, evidence submission forms, in-lab manuals, forums and colleagues. During the report-writing stage, most DEEs used in-lab manuals and report templates as information sources, but previously written reports, editing software, and colleagues were also used to obtain information about the format, style and language of reports as legal documents.
Contributing Partner: UNT Libraries
The gathering and use of information by fifth grade students with access to Palm® handhelds.

The gathering and use of information by fifth grade students with access to Palm® handhelds.

Date: December 2003
Creator: Peet, Martha Stuart Williamson
Description: Handheld computers may hold the possibility for a one-to-one computer: student ratio. The impact of the use of Palm® (Palm, Inc.) handhelds on information acquisition and use by 5th grade students in a North Texas school during a class research project was investigated. Five research questions were examined using observation, interviews, surveys, and document analysis. Are there differences in information gathering and use with the Palm between gifted, dyslexic, and regular learners? What relevance criteria do students use to evaluate a web site to determine whether to download the site to the Palm and afterwards whether to use the downloaded site's information in the report? How do the Palms affect the writing process? Do the animations and concept maps produced on the Palm demonstrate understanding of the intended concepts? Are there significant differences in results (i.e., final products grade) between Palm users and non-Palm users? Three groups of learners in the class, gifted, dyslexic, and regular learners, participated in the study. The regular and dyslexic students reported using Web sites that had not been downloaded to the Palm. Students reported several factors used to decide whether to download Web sites, but the predominant deciding factor was the amount of information. ...
Contributing Partner: UNT Libraries
Enhancement of spatial ability in girls in a single-sex environment through spatial experience and the impact on information seeking.

Enhancement of spatial ability in girls in a single-sex environment through spatial experience and the impact on information seeking.

Date: December 2008
Creator: Swarlis, Linda L.
Description: The test scores of spatial ability for women lag behind those of men in many spatial tests. On the Mental Rotations Test (MRT), a significant gender gap has existed for over 20 years and continues to exist. High spatial ability has been linked to efficiencies in typical computing tasks including Web and database searching, text editing, and computer programming. The relationships between the components of visuospatial ability and performance are complex. However, research strongly indicates that a connection exists, and further research is necessary to determine the interactions between the variables of environment, genetics, and spatial training. Spatial experience can enhance spatial skills. However, to what extent spatial skills can be enhanced in female adolescents through a spatial curriculum to reduce the gap in scores has not been fully researched, nor has the impact of spatial skill on information seeking. This research project investigated spatial skill in adolescent females by examining (1) the extent to which the intervention of teaching a spatial curriculum in a single-sex setting could improve mental rotation test scores, and (2) the impact of spatial skills on an information seeking task in a single-sex setting. The extent to which a spatial visualization curriculum can improve MRT ...
Contributing Partner: UNT Libraries
Measuring the accuracy of four attributes of sound for conveying changes in a large data set.

Measuring the accuracy of four attributes of sound for conveying changes in a large data set.

Access: Use of this item is restricted to the UNT Community.
Date: May 2003
Creator: Holmes, Jason
Description: Human auditory perception is suited to receiving and interpreting information from the environment but this knowledge has not been used extensively in designing computer-based information exploration tools. It is not known which aspects of sound are useful for accurately conveying information in an auditory display. An auditory display was created using PD, a graphical programming language used primarily to manipulate digital sound. The interface for the auditory display was a blank window. When the cursor is moved around in this window, the sound generated would changed based on the underlying data value at any given point. An experiment was conducted to determine which attribute of sound most accurately represents data values in an auditory display. The four attributes of sound tested were frequency-sine waveform, frequency-sawtooth waveform, loudness and tempo. 24 subjects were given the task of finding the highest data point using sound alone using each of the four sound treatments. Three dependent variables were measured: distance accuracy, numeric accuracy, and time on task. Repeated measures ANOVA procedures conducted on these variables did not rise to the level of statistical significance (α=.05). None of the sound treatments was more accurate than the other as representing the underlying data values. 52% ...
Contributing Partner: UNT Libraries
Accessing Information on the World Wide Web: Predicting Usage Based on Involvement

Accessing Information on the World Wide Web: Predicting Usage Based on Involvement

Date: May 2003
Creator: Langford, James David
Description: Advice for Web designers often includes an admonition to use short, scannable, bullet-pointed text, reflecting the common belief that browsing the Web most often involves scanning rather than reading. Literature from several disciplines focuses on the myriad combinations of factors related to online reading but studies of the users' interests and motivations appear to offer a more promising avenue for understanding how users utilize information on Web pages. This study utilized the modified Personal Involvement Inventory (PII), a ten-item instrument used primarily in the marketing and advertising fields, to measure interest and motivation toward a topic presented on the Web. Two sites were constructed from Reader's Digest Association, Inc. online articles and a program written to track students' use of the site. Behavior was measured by the initial choice of short versus longer versions of the main page, the number of pages visited and the amount of time spent on the site. Data were gathered from students at a small, private university in the southwest part of the United States to answer six hypotheses which posited that subjects with higher involvement in a topic presented on the Web and a more positive attitude toward the Web would tend to select ...
Contributing Partner: UNT Libraries
User Acceptance of North Central Texas Fusion Center System by Law Enforcement Officers

User Acceptance of North Central Texas Fusion Center System by Law Enforcement Officers

Date: December 2010
Creator: Odabasi, Mehmet
Description: The September 11 terrorist attacks pointed out the lack of information sharing between law enforcement agencies as a potential threat to sound law enforcement in the United States. Therefore, many law enforcement agencies as well as the federal government have been initiating information sharing systems among law enforcement agencies to eradicate the information sharing problem. One of the systems established by Homeland Security is the North Central Texas Fusion Center (NCTFC). This study evaluates the NCTFC by utilizing user acceptance methodology. The unified theory of acceptance and the use of technology is used as a theoretical framework for this study. Within the study, user acceptance literature is examined and various models and theories are discussed. Furthermore, a brief information regarding the intelligence work done by law enforcement agencies are explained. In addition to the NCTFC, several major law enforcement information systems are introduced. The data for this study comes from the users of the NCTFC across the north central Texas region. Surveys and interviews are used to triangulate data. It is found in this study that performance expectancy and effort expectancy are important indicators of system use. Furthermore, outreach and needs assessment are important factors in establishing systems. The results ...
Contributing Partner: UNT Libraries
Solutions for Dynamic Channel Assignment and Synchronization Problem for Distributed Wireless Multimedia System

Solutions for Dynamic Channel Assignment and Synchronization Problem for Distributed Wireless Multimedia System

Date: August 2002
Creator: Hong, SungBum
Description: The recent advances in mobile computing and distributed multimedia systems allow mobile hosts (clients) to access wireless multimedia Data at anywhere and at anytime. In accessing multimedia information on the distributed multimedia servers from wireless personal communication service systems, a channel assignment problem and synchronization problems should be solved efficiently. Recent demand for mobile telephone service have been growing rapidly while the electro-magnetic spectrum of frequencies allocated for this purpose remain limited. Any solution to the channel assignment problem is subject to this limitation, as well as the interference constraint between adjacent channels in the spectrum. Channel allocation schemes provide a flexible and efficient access to bandwidth in wireless and mobile communication systems. In this dissertation, both an efficient distributed algorithm for dynamic channel allocation based upon mutual exclusion model, and an efficient distributed synchronization algorithm using Quasi-sink for wireless and mobile multimedia systems to ensure and facilitate mobile client access to multimedia objects are proposed. Algorithm's performance with several channel systems using different types of call arrival patterns is determined analytically. A set of simulation experiments to evaluate the performance of our scheme using message complexity and buffer usage at each frame arrival time.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 4 5 NEXT LAST