This system will be undergoing maintenance April 18th between 9:00AM and 12:00PM CDT.

Search Results

Cyber Addiction and Information Overload and Their Impact on Workplace Productivity

Description: The research examines the relationship between cyber addiction (excessive use of the Internet, CA), information overload (IO), and assesses their impact on workplace productivity. A multi-methods approach is used employing the Internet Addiction Test (IAT) and a quantitative survey design to assess and test the stated hypothesis. The study used random sampling methods targeting 150 respondents from different information technology departments of various organizations. The study hypothesizes tha… more
This item is restricted from view until January 1, 2025.
Date: December 2023
Creator: Alboulayan, Moneerah Abdulhameed M.

Social Exchange Theory in the Context of X (Twitter) and Facebook Social Media Platforms with a Focus on Privacy Concerns among Saudi Students

Description: The current research examines the use of social media and its security settings using the Social Exchange Theory (SET) within a Saudi student environment. This research includes an introduction, literature review, methodology, results, and conclusion with the results section presenting the findings from the three essays. The first essay employs the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) methodology of SET. PRISMA's systematic and exhaustive approach to liter… more
This item is restricted from view until January 1, 2026.
Date: December 2023
Creator: Alqahtani, Sameer Mohammed S.

Countering Hate Speech: Modeling User-Generated Web Content Using Natural Language Processing

Description: Social media is considered a particularly conducive arena for hate speech. Counter speech, which is a "direct response that counters hate speech" is a remedy to address hate speech. Unlike content moderation, counter speech does not interfere with the principle of free and open public spaces for debate. This dissertation focuses on the (a) automatic detection and (b) analyses of the effectiveness of counter speech and its fine-grained strategies in user-generated web content. The first goal is … more
This item is restricted from view until August 1, 2025.
Date: July 2023
Creator: Yu, Xinchen
open access

An Examination of the Metaverse Technology Acceptance Model in Tourism

Description: The traditional definition of tourism has been transformed by significant advancements in communication and information technology. The concept of Metaverse, derived from the words "meta" (meaning beyond) and "verse" (meaning universe), has redefined how people experience travel. This innovative concept combines virtual reality, augmented reality, and artificial intelligence to create virtually augmented spaces. However, the tourism industry should clarify and narrow down the definition of Meta… more
Date: July 2023
Creator: Lee, Sangyung

Exposure to Trauma and Its Effect on Information-Seeking Behaviors and Decision-Making Processes

Description: This dissertation examines the impact of trauma on information-seeking behaviors and decision-making processes. Essay 1 includes a qualitative analysis of the transcripts obtained from interviews with four military service members diagnosed with PTSD. The results showed that 75% of this small sample population exhibited addictive behavior that was presented in their information behaviors. All four members indicated that the excessive extent to which they seek information is related to the perce… more
This item is restricted from view until August 1, 2025.
Date: July 2023
Creator: Fantasia, Anthony Thomas
open access

A Factor Analytic Evaluation of the Private Club Members' Benefits Scale

Description: This study's first goal is to investigate whether a 23-item multidimensional scale is a valid and reliable measure of benefits private club members perceive to be important. Seven theoretically plausible model structures are empirically tested: a unidimensional model, a two oblique first-order factors model, a four oblique first-order factors model, a two oblique second-order factors model, a bifactor model with two domain-specific factors, a bifactor model with four domain-specific factors, an… more
Date: July 2023
Creator: Njeri, Millicent

The Role of Social Media Influencers in Saudis' Domestic Destination Choice

Description: This study aims to find out the impact of the credibility and content quality of social media influencers on the various stages of the customer's journey and the intention to choose a destination for the Saudi tourist. The target segment was Saudis in general, who are 18 years or above. To conduct this study, 618 usable questionnaires were collected. This study tested twenty-two hypotheses. The result of this study showed that the relationship between content quality, expertise, and similarity … more
This item is restricted from view until August 1, 2025.
Date: July 2023
Creator: Alamer, Mohammed Abdullah I

Antecedents to Reliance on Artificial Intelligence and Predictive Modeling

Description: Artificial intelligence (AI) and predictive modeling are tools used to diagnose a disease, determine how much a home is worth, estimate insurance risks, and detect fraud. AI and predictive modeling are so ubiquitous that they can be why one gets spam and why spam is automatically deleted. Information science integrates interdisciplinary elements of data-driven, behavioral, design, interpretive, and analytical research methodologies to design and understand interactions between digital media, in… more
This item is restricted from view until June 1, 2028.
Date: May 2023
Creator: Randall, William Vincent, II
open access

Designing Archival Collections to Support Language Revitalization: Case Study of the Boro Language Resource

Description: Indigenous communities around the world are losing their languages at accelerating rates to the effects of the climate crisis and global capitalism. To preserve samples of these languages facing endangerment and extinction, samples of language use (e.g., audio-video recordings, photographs, textual transcriptions, translations, and analyses) are created and stored in language archives: repositories intended to provide long-term preservation of and access to language materials. In recent years, … more
Date: May 2023
Creator: Burke, Mary

Development and Utilization of Big Bridge Data for Predicting Deck Condition Rating Using Machine Learning Algorithms

Description: Accurately predicting the deck condition rating of a bridge is crucial for effective maintenance and repair planning. Despite significant research efforts to develop deterioration models, a nationwide model has not been developed. This study aims to identify an appropriate machine learning (ML) algorithm that can accurately predict the deck condition ratings of the nation's bridges. To achieve this, the study collected big bridge data (BBD), which includes NBI, traffic, climate, and hazard data… more
This item is restricted from view until June 1, 2025.
Date: May 2023
Creator: Fard, Fariba

Diversity, Equity, and Inclusive Behaviors of School Librarians: Perceptions during Times of Crisis

Description: School librarians create an atmosphere where learners feel empowered. Moreover, school library programming should support diversity, equity, and inclusive learning opportunities to facilitate student success. Thus, school librarians are expected to model and advocate for equitable learning spaces while considering the universal design for learning approach to improving accessibility, utilization, and relevance for all library patrons. Although it has been established that school library standar… more
This item is restricted from view until June 1, 2025.
Date: May 2023
Creator: Gill, Diane
open access

Information Receptivity: The Information-Seeking Behavior and Networking Activity of Women in a Rural Texas County Judicial System

Description: This study identified the information seeking behavior and networking practices used by members of a specific marginalized population, that of adult female probationers (AFPs) in a rural county in Texas. The study focused on how they seek out information when faced with a self-identified need in their lives. Beyond the basic "food, shelter and clothing" that comes to mind, the respondents find themselves faced with questions not only about the judicial system but also ones involving health care… more
Date: May 2023
Creator: Livingston, Jo Ann

Information-Seeking Behaviors of Rural Community-Based Hospice Social Workers during a Pandemic: Challenges and Opportunities

Description: When it comes to hospice care, patients and their families residing in rural counties need competent rural community-based hospice social workers on their team. The study of information seeking behaviors of rural community-based hospice social workers during the global COVID-19 pandemic is significant as there is a need to fill gaps regarding how this specific medical discipline performs their job responsibilities when duties become more complicated due to evolving infection control protocols, … more
This item is restricted from view until June 1, 2025.
Date: May 2023
Creator: Alvarado, Angela
open access

Relevance Criteria when Searching and Evaluating Online Video for Informational Use

Description: Relevance is a core concept in the field of Information Science and a common term in everyday vernacular that generally refers to the usefulness of information. However, relevance has not been sufficiently or consistently defined or explored in the information science literature. Relevance criteria are the factors that information users employ when determining whether information they encounter is relevant. Identifying relevance criteria is a crucial step to understanding relevance. Relevance c… more
Date: May 2023
Creator: Dewitt-Miller, Erin

Security Aspects of Users' Information Sharing on Social Media

Description: This study aims to investigate college students' security awareness of using social media in sharing information. The two theories that have guided this study are the theory of planned behavior (TPB) and the technology acceptance model (TAM). Data was collected from both undergraduate and graduate students from the University of North Texas (UNT) in Denton. The total responses included 380 students from different majors with 291 valid responses for data analysis; The structural equation model (… more
This item is restricted from view until June 1, 2025.
Date: May 2023
Creator: Alharbi, Mohannad Abdulltef

Study of Information Behavior of Opportunistic Insiders with Malicious Intent

Description: Enterprises have focused on mechanisms to track insiders who may intentionally exceed and misuse their authorized access. However, there is an opportunity to understand why a trusted individual would want to exploit the trust and seek information with the intent of a malicious outcome. The detection of insider rogue or nefarious activities with information to which a user is already authorized is extremely difficult. Such insider threats require more deliberation than just considering it to be … more
This item is restricted from view until June 1, 2028.
Date: May 2023
Creator: Sinha, Vikas

Transdisciplinary Information Flow and Key Challenges of Effective Knowledge Transfer between Expert and Novice

Description: When the need arises to transmute complex and theoretical ideas into practice or communicate them to the uninitiated, there often exists a gap in the levels of understanding between the parties involved. This research examined knowledge transfer between practitioners within the information technology (IT) domain of interest by asking the following questions: what is the relationship between knowledge spaces for IT experts and novices; and what factors impact knowledge transfer among knowledge s… more
Date: May 2023
Creator: Upchurch, Eric Conrad
open access

Understanding Sociotechnical Factors Impacting Cybersecurity Controls on Mobile Devices and Smartphones at the Individual Level

Description: Technological advances such as mobile technology, big data, and machine learning allow businesses to associate advertisements with consumer behaviors to maximize sales. Thus, information about consumer behavior became the central resource of businesses. Recent discussions and concerns about the emerging economic order centered around capturing consumers' data suggest that more research efforts be allocated to address new challenges in different domains, such as health, education, smart cities, … more
Date: May 2023
Creator: Gadi, Abdullah Mohamed Y.
open access

Electronic Health Record Systems and Cyber Hygiene: Awareness, Knowledge, and Practices among Physicians in Kuwait

Description: This study explored issues related to the adoption and implementation of electronic health record (EHR) systems including building the awareness, knowledge, and experience of physicians toward cyber hygiene. This study used a qualitative research method to assess (a) the barriers to EHR systems adoption and implementation in Kuwait and (b) the level of awareness, knowledge and experiences related to cyber hygiene practices in Kuwait. The findings of the study supported the conceptual framework… more
Date: December 2022
Creator: Alkhaledi, Reem

Factors Impacting Physician Patient Interaction Time: Knowledge Transfer and Use of Technology

Description: In this study we explore the factors impacting physician patient interaction time and how these factors can be used to improve health knowledge transfer from physicians to patients. We also investigate how technology tools can be used to improve this interaction time. Physician patient interaction time is important because this is the time when both sides engage with each other, exchange information so that physicians understand their patients' health issues. Given the increasing health care… more
This item is restricted from view until January 1, 2025.
Date: December 2022
Creator: Gurol, Neslihan
open access

Factors Influencing User Experience and Consumer Behavioral Intention to Use Visual Analytics Technology

Description: The purpose of this study was to assess visual analytics technology acceptance and user experience among in vitro fertilization (IVF) consumers. The research aimed to show how visual analytics tools and technologies can be applied in the consumer space to enhance how users interpret healthcare success rate data. This exploratory user evaluation study utilized a quantitative dominant, mixed-methods approach with a convergent parallel design based on the data-validation variant. Survey data were … more
Date: December 2022
Creator: Lewis, Paulette Benika

Personalized Recommendation Using Aspect-Aware Knowledge Graph Learning

Description: This study aims to apply user reviews and numerical ratings toward items to create an aspect-aware high-order representation for a recommendation system. We propose a novel aspect-aware knowledge graph recommendation model (AKGR) with the deep learning method to predict users' ratings on non-interacted items, from which more personalized recommendations can be made. First, we create a sequence-to-sequence encoder and decoder model by exploiting contextual and syntactic information in user revie… more
This item is restricted from view until January 1, 2028.
Date: December 2022
Creator: Zhou, Jinfeng
open access

A Comparison of Plaintiff and Defense Expert Witness H-Index Scores in Mild Traumatic Brain Injury Civil Litigation

Description: This study examines the background and qualifications of plaintiff and defense experts using the H-Index score as quantification of expert background and qualifications. The goal is to better understand the similarities and differences among the professionals offering paid expert witness testimony in mild traumatic brain injury (mTBI) civil litigation. In this quantitative study, descriptive statistics include the mean and standard deviation scores for the data to support examining measures of … more
Date: August 2022
Creator: Victor, Elise C
open access

Understanding the Relationship between Critical Literacy, Cultural Literacy, and Religious Literacy for Second-Generation Immigrants

Description: This study explores information seeking behavior of second-generation Muslim immigrants utilizing factors such as critical, cultural, and religious literacy skills. The study examined the second-generation immigrants' ability to balance their parents' and grandparents' native culture and traditions with the culture and traditions of their country. The interview questions were designed using the cognitive authority theory and the figured worlds theory that provides an explanation for the mentali… more
Date: August 2022
Creator: Khader, Malak M
Back to Top of Screen