UNT Theses and Dissertations - 121 Matching Results

Search Results

Privacy Concerns and Personality Traits Influencing Online Behavior: A Structural Model

Description: The concept of privacy has proven difficult to analyze because of its subjective nature and susceptibility to psychological and contextual influences. This study challenges the concept of privacy as a valid construct for addressing individuals' concerns regarding online disclosure of personal information, based on the premise that underlying behavioral traits offer a more reliable and temporally stable measure of privacy-oriented behavior than do snapshots of environmentally induced emotional states typically measured by opinion polls. This study investigated the relationship of personality characteristics associated with individuals' general privacy-related behavior to their online privacy behaviors and concerns. Two latent constructs, Functional Privacy Orientation and Online Privacy Orientation, were formulated. Functional Privacy Orientation is defined as a general measure of individuals' perception of control over their privacy. It was measured using the factors General Disclosiveness, Locus of Control, Generalized Trust, Risk Orientation, and Risk Propensity as indicator variables. Online Privacy Orientation is defined as a measure of individuals' perception of control over their privacy in an online environment. It was measured using the factors Willingness to Disclose Online, Level of Privacy Concern, Information Management Privacy Concerns, and Reported Online Disclosure as indicator variables. A survey questionnaire that included two new instruments to measure online disclosure and a willingness to disclose online was used to collect data from a sample of 274 adults. Indicator variables for each of the latent constructs, Functional Privacy Orientation and Online Privacy Orientation, were evaluated using corrected item-total correlations, factor analysis, and coefficient alpha. The measurement models and relationship between Functional Privacy Orientation and Online Privacy Orientation were assessed using exploratory factor analysis and structural equation modeling respectively. The structural model supported the hypothesis that Functional Privacy Orientation significantly influences Online Privacy Orientation. Theoretical, methodological, and practical implications and suggestions for analysis of privacy concerns and behavior are presented.
Date: May 2005
Creator: Grams, Brian C.
Partner: UNT Libraries

Public School Educators' Use of Computer-Mediated Communication

Description: This study examined the uses of computer-mediated communication (CMC) by educators in selected public schools. It used Rogers' Diffusion of Innovation Theory as the underpinnings of the study. CMC refers to any exchange of information that involves the use of computers for communication between individuals or individuals and a machine. This study was an exploration of difficulties users confront, what services they access, and the tasks they accomplish when using CMC. It investigated the factors that affect the use of CMC. The sample population was drawn from registered users on TENET, the Texas Education Network as of December 1997. The educators were described with frequency and percentages analyzing the demographic data. For the research, eight indices were selected to test how strongly these user and environmental attributes were associated with the use of CMC. These variables were (1) education, (2) position, (3) place of employment, (4) geographic location, (5) district size, (6) organization vitality, (7) adopter resources, and (8) instrumentality Two dependent variables were used to test for usage: (1) depth or frequency of CMC usage and amount of time spent online and (2) breadth or variety of Internet utilities used. Additionally, the users' perception of network benefits was measured. Network benefits were correlated with social interaction and perception of CMC to investigate what tasks educators were accomplishing with CMC. Correlations, SEQ CHAPTER h r 1 crosstabulations, and ANOVAs were used to analysis the data for testing the four hypotheses. The major findings of the study, based on the hypotheses tested, were that the socioeconomic variables of education and position influenced the use of CMC. A significant finding is that teachers used e-mail and for Internet resources less frequently than those in other positions. An interesting finding was that frequency of use was more significant for usage than amount of ...
Date: December 2000
Creator: Urias-Barker, Zelina
Partner: UNT Libraries

Quality Management in Museum Information Systems: A Case Study of ISO 9001-2000 as an Evaluative Technique

Description: Museums are service-oriented information systems that provide access to information bearing materials contained in the museum's collections. Within museum environments, the primary vehicle for quality assurance and public accountability is the accreditation process of the American Association of Museums (AAM). Norbert Wiener founded the field of cybernetics, employing concepts of information feedback as a mechanism for system modification and control. W. Edwards Deming applied Wiener's principles to management theory, initiating the wave of change in manufacturing industries from production-driven to quality-driven systems. Today, the principles are embodied in the ISO 9000 International Standards for quality management systems (QMS), a globally-recognized set of standards, widely employed as a vehicle of quality management in manufacturing and service industries. The International Organization for Standardization defined a process for QMS registration against ISO 9001 that is similar in purpose to accreditation. This study's goals were to determine the degree of correspondence between elements of ISO 9001 and quality-related activities within museum environments, and to ascertain the relevance of ISO 9001-2000 as a technique of museum evaluation, parallel to accreditation. A content analysis compared museum activities to requirements specified in the ISO 9001-2000 International Standard. The study examined museum environment surrogates which consisted of (a) web sites of nine museum studies programs in the United States and (b) web sites of two museum professional associations, the AAM and the International Council of Museums (ICOM). Data items consisted of terms and phrases from the web sites and the associated context of each item. Affinity grouping of the data produced high degrees of correspondence to the categories and functional subcategories of ISO 9001. Many quality-related activities were found at the operational levels of museum environments, although not integrated as a QMS. If activities were unified as a QMS, the ISO 9001 Standard has potential for application as ...
Date: May 2005
Creator: Karr, Fred H.
Partner: UNT Libraries

Reading Interests and Activity of Older Adults and Their Sense of Life Satisfaction

Description: This study addresses the problem of reading among older adults and the relation of such reading to their sense of life satisfaction. The study also considers the relation between reading interests and activity of older adults and the availability to them of library materials and services.
Date: May 1982
Creator: Grubb, Elizabeth Ann
Partner: UNT Libraries

Reading selection as information seeking behavior: A case study with adolescent girls.

Description: The aim of this research, Reading Selection as Information Seeking Behavior: A Case Study with Adolescent Girls, was to explore how the experience of reading fiction affects adolescent girls aged 13 through 15, and how that experience changes based upon four activities: journaling, blogging, a personal interview, and a focus group session. Each participant reflects upon works of her own choosing that she had recently read. The data is evaluated using content analysis with the goal of developing a relational analysis tool to be used and tested with future research projects. The goal of this research is to use the insights of the field of bibliotherapy together with the insights of the adolescent girls to provide a higher, more robust model of successful information behavior. That is, relevance is a matter of impact on life rather than just a match of subject heading. This work provides a thick description of a set of real world relevancy judgments. This may serve to illuminate theories and practices for bringing each individual seeker together with appropriate documents. This research offers a new model for relevant information seeking behavior associated with selecting works of essential instructional fiction, as well as a new definition for terminology to describe the results of the therapeutic literary experience. The data from this study, as well as from previous research, suggest that literature (specifically young adult literature) brings the reader to a better understanding of herself and the world around her.
Date: August 2007
Creator: Reynolds, Stephanie D.
Partner: UNT Libraries

Relation of Personal Characteristics to Type of Position Among Bibliographic Network Coordinators, Ex-coordinators, and Selected Library Depeartment Heads

Description: The objectives of this investigation were two-fold. The first was to determine the personal characteristics of Bibliographic Network Coordinators, both past and present; the second was to compare these identified characteristics with those of persons working in traditional library positions at comparable levels of responsibility.
Date: August 1985
Creator: Upham, Lois Nicholson
Partner: UNT Libraries

The Relationship Between Work Roles and Information Seeking Behaviors Among Selected Protestant Ministers in Tarrant County, Texas

Description: Is there a relationship between work role and information seeking behavior? Three behaviors were examined: choice of information channel, choice of method for information retrieval, and choice of method for storing retrieved information. The Protestant clergy was selected as a profession with clearly identified work roles, including preacher and administrator. Questionnaires were mailed to 150 randomly selected ministers in Tarrant County, Texas. Sixty-four responded. Additionally, fifteen ministers selected at random were interviewed for additional data. The data collected through the questionnaires were analyzed using nonparametric statistical techniques.
Date: December 1992
Creator: Phillips, Robert L. (Robert Lloyd)
Partner: UNT Libraries

The Relationships Among a Reading Guidance Program and the Reading Attitudes, Reading Achievement, and Reading Behavior of Fifth Grade Children in a North Louisiana School

Description: The purpose of this study was to determine whether or not the introduction of a regular librarian-centered reading guidance program as an integral part of the entire school program would improve the reading attitudes and habits of elementary school students and increase the reading achievement scores on a standardized test of elementary school students. In addition, the reading attitudes of students were compared with reading achievement scores to assess any relationship between the two.
Date: August 1986
Creator: Mosley, Mattie Jacks
Partner: UNT Libraries

Relevance Thresholds: A Conjunctive/Disjunctive Model of End-User Cognition as an Evaluative Process

Description: This investigation identifies end-user cognitive heuristics that facilitate judgment and evaluation during information retrieval (IR) system interactions. The study extends previous research surrounding relevance as a key construct for representing the value end-users ascribe to items retrieved from IR systems and the perceived effectiveness of such systems. The Lens Model of user cognition serves as the foundation for design and interpretation of the study; earlier research in problem solving, decision making, and attitude formation also contribute to the model and analysis. A self reporting instrument collected evaluative responses from 32 end-users related to 1432 retrieved items in relation to five characteristics of each item: topical, pertinence, utility, systematic, and motivational levels of relevance. The nominal nature of the data collected led to non-parametric statistical analyses that indicated that end-user evaluation of retrieved items to resolve an information problem at hand is most likely a multi-stage process. That process appears to be a cognitive progression from topic to meaning (pertinence) to functionality (use). Each step in end-user evaluative processing engages a cognitive hierarchy of heuristics that includes consideration (of appropriate cues), differentiation (the positive or negative aspects of those cues considered), and aggregation (the combination of differentiated cue aspects needed to render an evaluative label of the item in relation to the information problem at hand). While individuals may differ in their judgments and evaluations of retrieved items, they appear to make those decisions by using consistent heuristic approaches.
Date: December 2000
Creator: Greisdorf, Howard F.
Partner: UNT Libraries

Respect for human rights and the rise of democratic policing in Turkey: Adoption and diffusion of the European Union acquis in the Turkish National Police.

Description: This study is an exploration of the European Union acquis adoption in the Turkish National Police. The research employed the Diffusion of Innovations, Democratic Policing, and historical background check theoretical frameworks to study the decision-making of the TNP regarding reforms after 2003 as a qualitative case study which triangulated the methodology with less-dominant survey and several other analyzing methods. The data were collected from several sources including semi-structured interviews, archival records, documentary evidences and the European Commission Regular Reports on Turkey. The research interest was about the decision mechanisms of the TNP towards reforms and the rise of democratic policing in Turkey. During the study, internationally recognized human rights standards were given attention. As the data suggested, the police forces are shaped according to their ruling governments and societies. It is impossible to find a totally democratic police in a violent society and a totally violent police in a democratic society. The study findings suggested that reforming police agencies should not be a significant problem for determined governments. Human rights violations should not be directly related with the police in any country. The data suggested that democratic policing applications find common application when the democracy gets powerful and police brutality increases when authoritarian governments stays in power. Democratic policing on the other hand is an excellent tool to improve notion of democracy and to provide legitimacy to governments. However, democratic policing is not a tool to bring the democracy, but a support mechanism for it.
Date: August 2007
Creator: Lofca, Izzet
Partner: UNT Libraries

Sanctioned and Controlled Message Propagation in a Restrictive Information Environment: The Small World of Clandestine Radio Broadcasting

Description: This dissertation seeks to identify the elements that inform the model for competing message propagation systems in a restrictive environment. It pays attention to message propagation by sanctioned and clandestine radio stations in pre- and post-independent Zimbabwe. This dissertation uses two models of message propagation in a limiting information environment: Sturges' information model of national liberation struggle and Chatman's small world information model. All the message propagation elements in the Sturges and Chatman's models are present in the broadcast texts analyzed. However, the findings of this dissertation indicate that communication in a restrictive information environment is designed such that its participants make sense of their situation, and come up with ways to solve the challenges of their small world. Also, a restrictive information environment is situational, and message propagators operating in it are subject to tactical changes at different times, accordingly altering their cognitive maps. The two models fail to address these concerns. This dissertation focused on message propagation in Zimbabwe because there is military belligerence involved in the information warfare. It therefore provides an extreme situation, which can help our understanding of more everyday instances of communication and interference of communication. Findings of this dissertation recommend the need to emphasize that information input, output and suppression are components dependent on each other; not discrete and independent categories of information activities.
Date: December 2007
Creator: Wachanga, David Ndirangu
Partner: UNT Libraries

The Second Vatican Council and American Catholic Theological Research: A Bibliometric Analysis of Theological Studies: 1940-1995

Description: A descriptive analysis was given of the characteristics of the authors and citations of the articles in the journal Theological Studies from 1940-1995. Data was gathered on the institutional affiliation, geographic location, occupation, and gender and personal characteristics of the author. The citation characteristics were examined for the cited authors, date and age of the citations, format, language, place of publication, and journal titles. These characteristics were compared to the time-period before and after the Second Vatican Council in order to detect any changes that might have occurred in the characteristics after certain recommendations by the council were made to theologians. Subject dispersion of the literature was also analyzed. Lotka's Law of author productivity and Bradford's Law of title dispersion were also performed for this literature. The profile of the characteristics of the authors showed that the articles published by women and laypersons has increased since the recommendations of the council. The data had a good fit to Lotka's Law for the pre-Vatican II time period but not for the period after Vatican II. The data was a good fit to Bradford's Law for the predicted number of journals in the nucleus and Zone 2, but the observed number of journals in Zone 3 was higher than predicted for all time-periods. Subject dispersion of research from disciplines other than theology is low but citation to works from the fields of education, psychology, social sciences, and science has increased since Vatican II. The results of the analysis of the characteristics of the citations showed that there was no significant change in the age, format and languages used, or the geographic location of the publisher of the cited works after Vatican II. Citation characteristics showed that authors prefer research from monographs published in English and in U.S. locations for all time-periods. Research ...
Date: August 2000
Creator: Phelps, Helen Stegall
Partner: UNT Libraries

Selected Factors Associated With Reading Interests of Seventh- and Eighth-grade Pupils

Description: This study sought to determine if there were differences in the types of reading interests of seventh- and eighth-grade pupils associated with their racial origins, their socioeconomic status, or their school environments. It also sought to consider the strength of reading interest scores as related to other variables and to consider the relationship between these scores and the number of hours spent in reading and the change in amount of reading since the previous school year.
Date: May 1984
Creator: Newman, Nancy Ann
Partner: UNT Libraries

Smoothing the information seeking path: Removing representational obstacles in the middle-school digital library.

Description: Middle school student's interaction within a digital library is explored. Issues of interface features used, obstacles encountered, search strategies and search techniques used, and representation obstacles are examined. A mechanism for evaluating user's descriptors is tested and effects of augmenting the system's resource descriptions with these descriptors on retrieval is explored. Transaction log data analysis (TLA) was used, with external corroborating achievement data provided by teachers. Analysis was conducted using quantitative and qualitative methods. Coding schemes for the failure analysis, search strategies and techniques analysis, as well as extent of match analysis between terms in student's questions and their search terms, and extent of match analysis between search terms and controlled vocabulary were developed. There are five chapters with twelve supporting appendixes. Chapter One presents an introduction to the problem and reviews the pilot study. Chapter Two presents the literature review and theoretical basis for the study. Chapter Three describes the research questions, hypotheses and methods. Chapter Four presents findings. Chapter Five presents a summary of the findings and their support of the hypotheses. Unanticipated findings, limitations, speculations, and areas of further research are indicated. Findings indicate that middle school users interact with the system in various sequences of patterns. User groups' interactions and scaffold use are influenced by the teacher's objectives for using the ADL. Users preferred to use single word searches over Boolean, phrase or natural language searches. Users tended to use a strategy of repeating the same exact search, instead of using the advanced scaffolds. A high percent of users attempted at least one search that included spelling or typographical errors, punctuation, or sequentially repeated searches. Search terms matched the DQ's in some instantiation 54% of all searches. Terms used by the system to represent the resources do not adequately represent the user groups' information needs, however, ...
Date: May 2002
Creator: Abbas, June M.
Partner: UNT Libraries

Solutions for Dynamic Channel Assignment and Synchronization Problem for Distributed Wireless Multimedia System

Description: The recent advances in mobile computing and distributed multimedia systems allow mobile hosts (clients) to access wireless multimedia Data at anywhere and at anytime. In accessing multimedia information on the distributed multimedia servers from wireless personal communication service systems, a channel assignment problem and synchronization problems should be solved efficiently. Recent demand for mobile telephone service have been growing rapidly while the electro-magnetic spectrum of frequencies allocated for this purpose remain limited. Any solution to the channel assignment problem is subject to this limitation, as well as the interference constraint between adjacent channels in the spectrum. Channel allocation schemes provide a flexible and efficient access to bandwidth in wireless and mobile communication systems. In this dissertation, both an efficient distributed algorithm for dynamic channel allocation based upon mutual exclusion model, and an efficient distributed synchronization algorithm using Quasi-sink for wireless and mobile multimedia systems to ensure and facilitate mobile client access to multimedia objects are proposed. Algorithm's performance with several channel systems using different types of call arrival patterns is determined analytically. A set of simulation experiments to evaluate the performance of our scheme using message complexity and buffer usage at each frame arrival time.
Date: August 2002
Creator: Hong, SungBum
Partner: UNT Libraries

A Study of Graphically Chosen Features for Representation of TREC Topic-Document Sets

Description: Document representation is important for computer-based text processing. Good document representations must include at least the most salient concepts of the document. Documents exist in a multidimensional space that difficult the identification of what concepts to include. A current problem is to measure the effectiveness of the different strategies that have been proposed to accomplish this task. As a contribution towards this goal, this dissertation studied the visual inter-document relationship in a dimensionally reduced space. The same treatment was done on full text and on three document representations. Two of the representations were based on the assumption that the salient features in a document set follow the chi-distribution in the whole document set. The third document representation identified features through a novel method. A Coefficient of Variability was calculated by normalizing the Cartesian distance of the discriminating value in the relevant and the non-relevant document subsets. Also, the local dictionary method was used. Cosine similarity values measured the inter-document distance in the information space and formed a matrix to serve as input to the Multi-Dimensional Scale (MDS) procedure. A Precision-Recall procedure was averaged across all treatments to statistically compare them. Treatments were not found to be statistically the same and the null hypotheses were rejected.
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: May 2000
Creator: Oyarce, Guillermo Alfredo
Partner: UNT Libraries

A study of on-line use and perceived effectiveness of compliance-gaining in health-related banner advertisements for senior citizens.

Description: This research investigated banner ads on the World Wide Web, specifically the types of messages used in those ads and the effectiveness of the ads as seen by their intended audience. The focus was on health-related banner advertisements targeting senior citizens. The study first sought to determine the frequency of appearance of those ads when classified into categories of compliance-gaining tactics provided by research scholars. Second, the study explored the relative perceived effectiveness among those categories. Two graduate students from a Central Texas university sorted text messages into predetermined compliance-gaining categories. Chi square tests looked for significant differences in the frequencies of banner ads in each category. Forty-five senior citizens from the Central Texas area completed surveys regarding the perceived effectiveness of a randomly ordered, randomly selected set of categorized banner ads. A repeated measures test attempted to determine whether some compliance-gaining strategies used in health-related banner ads were perceived as more effective than others. The hypothesis stated that there would be differences in frequencies of compliance-gaining strategies used among the compliance-gaining categories in health-related banner ads for senior citizens. The hypothesis was supported. The research question asked if some categories of compliance-gaining strategies used in health-related banner ads were perceived as more effective than others by senior citizens. There was no evidence that senior citizens perceived any compliance-gaining category as being more effective than any other. However, post hoc analyses revealed trends in the types of compliance-gaining messages senior citizens perceived as more effective. These trends provide a basis for directional predictions in future studies.
Date: December 2002
Creator: Toon, Michelle Anne
Partner: UNT Libraries

Supporting Computer-Mediated Collaboration through User Customized Agents

Description: This research investigated a neglected problem - interruption of groups by agent advisory systems. The question was whether interruption by the agent advisory system was beneficial. A survey of literature in four areas is included in this dissertation. The areas surveyed were Agents, Online Help, Computer Supported Cooperative Work(CSCW) and Awareness in CSCW. Based on the review, a human subject experiment was conducted. The study investigated whether the style of agent advisory interface improved the performance of group members. There were three sets of groups, a control set that did not have advisory agents, a set that had system provided advisory agents and a set that had group customized advisory agents. The groups worked together using a CSCW application developed with GroupKit, a CSCW toolkit. The groups with group customized advisory agents used an Agent Manager application to define advisory agents that would give them advice as they worked in the CSCW application. The findings showed that the type of advisory agents did not significantly influence the performance of the groups. The groups with customized agents performed slightly better than the other groups but the difference was not statistically significant. When notified that advice was issued, groups with customized agents and groups with provided agents seldom accessed the agent's advice. General design guidelines for agent interruption have not been solved. Future work is needed to finish the job. The definitive solution may be some mixture of the three known individual design solutions.
Date: December 2001
Creator: Ducksworth, Letatia Bright
Partner: UNT Libraries

Terrorism as a social information entity: A model for early intervention.

Description: This dissertation studies different social aspects of terrorists and terrorist organizations in an effort to better deal with terrorism, especially in the long run. The researcher, who also worked as a Police Captain at Turkish National Police Anti-Terrorism Department, seeks solutions to today's global problem by studying both literature and a Delphi examination of a survey of 1070 imprisoned terrorists. The research questions include questions such as "What are the reasons behind terrorism?", "Why does terrorism occur?", "What ideologies provide the framework for terrorist violence?, "Why do some individuals become terrorists and others do not?" and "Under what conditions will terrorists end their violence?" The results of the study presents the complexity of the terrorism problem as a social experience and impossibility of a single solution or remedy for the global problem of terrorism. The researcher through his examination of the findings of the data, presented that terrorism is a social phenomenon with criminal consequences that needs to be dealt by means of two dimensional approaches. The first is the social dimension of terrorism and the second is the criminal dimension of terrorism. Based on this, the researcher constructed a conceptual model which addresses both of these dimensions under the titles of long-term solutions and short-term solutions. The long-term solutions deal with the social aspects of terrorism under the title of Proactive Approach to Terrorism and the short-term solutions deal with the criminal aspects of terrorism under the title of The Immediate Fight against Terrorism. The researcher constructed this model because there seems to be a tendency of not asking the question of "Why does terrorism occur?" Instead, the focus is usually on dealing with the consequences of terrorism and future terrorist threats. While it is essential that the governments need to provide the finest security measures for their societies, ...
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: August 2005
Creator: Yayla, Ahmet
Partner: UNT Libraries

Testing a model of the relationships among organizational performance, IT-business alignment and IT governance.

Description: Information Technology (IT) is often viewed as a resource that is capable of enhancing organizational performance. However, it is difficult for organizations to measure the actual contribution of IT investments. Despite an abundance of literature, there is an insufficiency of generally applicable frameworks and instruments to help organizations definitively assess the relationship among organizational performance, IT-business alignment, and IT governance. Previous studies have emphasized IT-business alignment as an important enabler of organizational effectiveness; however, the direct and indirect effects of IT governance have not been incorporated into these studies. The purpose of this study was (1) to propose a new model that defines the relationships among IT governance, IT-business alignment, and organizational performance, (2) to develop and validate measures for the IT governance and IT-business alignment constructs, and (3) to test this IT Governance-Alignment-Performance or "IT GAP" model. This study made some novel contributions to the understanding of the factors affecting organizational performance. The quest for IT-business alignment in the MIS literature has been based on the presumption that IT contributes directly to organizational performance. However, this study found that although IT-business alignment does contribute to organizational performance, IT governance is an important antecedent of both IT-business alignment and organizational performance. The major contributions of this work are the development and validation of uni-dimensional scales for both IT-business alignment and IT governance, and the confirmation of the validity of the IT GAP model to explain the hypothesized relationships among the three constructs. Future studies may improve upon this research by using different organizations settings, industries, and stakeholders. This study indicates that in order for organizations to improve the value, contribution, and alignment of IT investments they first need to improve the ways in which they govern their IT activities and the processes and mechanisms by which IT decisions are made.
Date: December 2003
Creator: Sanchez Ortiz, Aurora
Partner: UNT Libraries

A Theory for the Measurement of Internet Information Retrieval

Description: The purpose of this study was to develop and evaluate a measurement model for Internet information retrieval strategy performance evaluation whose theoretical basis is a modification of the classical measurement model embodied in the Cranfield studies and their progeny. Though not the first, the Cranfield studies were the most influential of the early evaluation experiments. The general problem with this model was and continues to be the subjectivity of the concept of relevance. In cyberspace, information scientists are using quantitative measurement models for evaluating information retrieval performance that are based on the Cranfield model. This research modified this model by incorporating enduser relevance judgment rather than using objective relevance judgments, and by adopting a fundamental unit of measure developed for the cyberspace of Internet information retrieval rather than using recall and precision-type measures. The proposed measure, the Content-bearing Click (CBC) Ratio, was developed as a quantitative measure reflecting the performance of an Internet IR strategy. Since the hypertext "click" is common to many Internet IR strategies, it was chosen as the fundamental unit of measure rather than the "document." The CBC Ratio is a ratio of hypertext click counts that can be viewed as a false drop measure that determines the average number of irrelevant content-bearing clicks that an enduser check before retrieving relevant information. After measurement data were collected, they were used to evaluate the reliability of several methods for aggregating relevance judgments. After reliability coefficients were calculated, measurement model was used to compare web catalog and web database performance in an experimental setting. Conclusions were the reached concerning the reliability of the proposed measurement model and its ability to measure Internet IR performance, as well as implications for clinical use of the Internet and for future research in Information Science.
Date: May 1999
Creator: MacCall, Steven Leonard
Partner: UNT Libraries

Toward an Ideal Library: A Synthesis of Wilson's Library and Information Policy and Gilbert's Performance Matrix

Description: Inquiry about ideal library was sought by interdisciplinary approach from human competence derived from performance engineering by Gilbert (1978), and the library information policy by Wilson (1977). With Wilson's insights into the field of library and information science (LIS), this work demonstrated the synthesis of Wilson and Gilbert: engineering as common ground. One of the central concerns in LIS, utilization of knowledge, is re-conceptualized as Gilbert's view of performance, which reflected at different vantage points. Four leisurely theorems are introduced for his view of performance engineering, which produce human competence. The performance matrix is the application tool that represents Gilbert's theorems of performance engineering. It is used to clarify vantage points about the library, and constructed a model of the performance engineering system of ideal library. Based upon the model, two applications were made. One is to apply the performance matrix to the existing academic library. Another is to apply the performance matrix for building a special collection. These two applications show that the performance matrix is capable to analyze existing performance system as well as designing and building a performance system.
Date: August 2008
Creator: Koremura, Yuka
Partner: UNT Libraries

University Students and the Internet: Information Seeking Study

Description: This study explored university students' information needs and seeking behaviors on the Internet. A Web-based survey was administrated one time. Two hundred responses were received from the target sample within the two weeks period of the study. Data were analyzed with descriptive statistics, factor analysis, and graphical representation. The study explored various issues related to the usability, preferences, and activities of the Internet, such as searching tools, e-mail, search engines, and preferred primary sources of everyday-life information needs. The study explored the perceptions of the students toward the Internet and the traditional library. Kuhlthau's model of the information-seeking process, which includes six stages and affective components, was utilized and modified in the construction of the Web survey. A study by Presno (1998), which includes the four types of Internet anxiety, was utilized in the construction of the Web survey. With regard to the six stages of Kuhlthau model, the majority of the respondents experienced stage 5, which was about information gathering; stage 3 had the next highest number of respondents. Very few respondents experienced stages 1 and 2. There was a systematic pattern in which, the earlier the stages the respondents were in, the more negative adjectives they selected, and vice versa. The feeling adjectives section showed a difference in the behavior between males and females. The results indicated that most students had Internet time delay anxiety. In general, the study found that students have a great interest in the Internet and consider it an important source of information for their personal, educational, and communication activities.
Date: May 2001
Creator: Shamo, Esmaeel
Partner: UNT Libraries

Usability of a Keyphrase Browsing Tool Based on a Semantic Cloud Model

Description: The goal of this research was to facilitate the scrutiny and utilization of Web search engine retrieval results. I used a graphical keyphrase browsing interface to visualize the conceptual information space of the results, presenting document characteristics that make document relevance determinations easier.
Date: August 2006
Creator: Johnston, Onaje Omotola
Partner: UNT Libraries