UNT Libraries - Browse


Patient Family and Hospital Staff Information Needs at a Pediatric Hospital: an Analysis of Information Requests Received by the Family Resource Libraries

Description: This research explored the information needs of patient families and hospital staff at a pediatric hospital system in Dallas, Texas. Library statistics recorded in four hospital libraries from 2011 - 2013 were used to analyze the information requests from patient families and hospital staff. Crosstabulations revealed the extent to which patient families and hospital staff used the libraries to satisfy their information needs. The data showed that patient families used the libraries very differently than hospital staff. Chi-square tests for independence were performed to identify the relationships between the Classification (Patient Family, Hospital Staff) and two descriptors of information needs (Request Type, Resources Used). There were a total of 1,406 information requests analyzed. The data showed that patient families and hospital staff information requests differed greatly in the number of information requests, the type of information requested, the resources used and the time the library staff spent on the requests. Chi-square analyses revealed relationships statistically significant at the p < .05 level; however, the strength of the relationships varied.
Date: May 2015
Creator: Rutledge, M. Hannah

Automatic Language Identification for Metadata Records: Measuring the Effectiveness of Various Approaches

Description: Automatic language identification has been applied to short texts such as queries in information retrieval, but it has not yet been applied to metadata records. Applying this technology to metadata records, particularly their title elements, would enable creators of metadata records to obtain a value for the language element, which is often left blank due to a lack of linguistic expertise. It would also enable the addition of the language value to existing metadata records that currently lack a language value. Titles lend themselves to the problem of language identification mainly due to their shortness, a factor which increases the difficulty of accurately identifying a language. This study implemented four proven approaches to language identification as well as one open-source approach on a collection of multilingual titles of books and movies. Of the five approaches considered, a reduced N-gram frequency profile and distance measure approach outperformed all others, accurately identifying over 83% of all titles in the collection. Future plans are to offer this technology to curators of digital collections for use.
Date: May 2015
Creator: Knudson, Ryan Charles

Information Seeking Behaviors in a Population of Assistive Mobility Device Users

Description: The author explores the current state of information exchange and access in the procurement process for mobility assistive equipment. While the idealized model is of a linear process starting with a need and ending with the purchase, in practice the procedures for acquiring a device such as a wheelchair or electric scooter can be a time consuming task that involves client, family, medical care specialists, vendors, manufacturers, insurance companies and possibly alternate sources of funding. This study utilized Participatory Action Research (PAR) to collect both qualitative and quantitative data about information sources such as the Internet, the medical community, and vendors. The findings of this study suggest that in spite of the presence of the Internet, overall primary sources are similar to the traditional model and that for most there is no one source that could be easily accessed for information. A brief examination is made of the “Information landscape” utilized in the process and a brief discussion of two relatively unmentioned information sources: expos and the wheelchair sports community.
Date: May 2014
Creator: White, Mel

Assessing Terrorist Cyber Threats: Engineering a Functional Construct

Description: Terrorist organizations and individuals make use of the Internet for supportive activities such as communication, recruiting, financing, training, and planning operations. However, little is known about the level of computer-based (“cyber”) threat such terrorist organizations and individuals pose. One step in facilitating the examination and assessment of the level of cyber threat posed by terrorist organizations and individuals is development of an assessment tool or methodology. This tool would guide intelligence collection efforts and would support and facilitate comparative assessment of the cyber threat posed by terrorist organizations and individuals through the provision of a consistent method of assessment across time, amongst organizations and individuals, and between analysts. This study leveraged the professional experience of experts to engineer a new functional construct – a structured analytical technique designed to assess the cyber threat posed by terrorist entities and individuals. The resultant instrument was a novel structured analytical construct that uses defined indicators of a terrorist organization/individual’s intent to carry out cyber attacks, and their capability to actually do so as measures of an organization/individual’s overall level of cyber threat.
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: December 2014
Creator: Morgan, Deanne

Convenience to the Cataloger or Convenience to the User?: An Exploratory Study of Catalogers’ Judgment

Description: This mixed-method study explored cataloger’s judgment through the presence of text as entered by catalogers for the 11 electronic resource items during the National Libraries test for Resource Description and Access (RDA). Although the literature discusses cataloger’s judgment and suggests that cataloging practice based on new cataloging code RDA will more heavily rely on cataloger’s judgment, the topic of cataloger’s judgment in RDA cataloging was not formally studied. The purpose of this study was to study the differences and similarities in the MARC records created as a part of the RDA National Test and to determine if the theory of bounded rationality could explain cataloger’s judgment based on the constructs of cognitive and temporal limits. This goal was addressed through a content analysis of the MARC records and various statistical tests (Pearson’s Chi-square, Fisher’s Exact, and Cramer’s V). Analysis of 217 MARC records was performed on seven elements of the bibliographic record. This study found that there were both similarities and differences among the various groups of participants, and there are indications that both support and refute the assertion that catalogers make decisions based on the constructs of time and cognitive ability. Future research is needed to be able to determine if bounded rationality is able to explain cataloger’s judgment; however, there are indicators that both support and refute this assertion. The findings from this research have implications for the cataloging community through the provision of training opportunities for catalogers, evaluating workflows, ensuring the proper indexing of bibliographic records for discovery, and recommended edits to RDA.
Date: May 2015
Creator: Hasenyager, Richard Lee, Jr.

Exploring Factors That Lead to Perceived Instructional Immediacy in Online Learning Environments

Description: Instructional communication research clearly indicates that instructor immediacy contributes significantly to effective instruction. However, the majority of immediacy studies have been conducted in traditional (face-to-face) classroom environments. More recently, instructional communication research has focused on assessing the impact of immediacy in online classroom environments. Again, immediacy appears to significantly contribute to effective instruction. The challenge is that most recent immediacy studies use immediacy measurements developed to test immediacy behaviors in face-to-face settings. Considering the lack of nonverbal communication and limited or absent synchronous or verbal communication in online instructional settings, the behaviors contributing most significantly to perceived immediacy, researchers need to reassess the immediacy construct in online environments. The present research explores and identifies behaviors reported by instructors to establish psychological closeness (i.e., immediacy) in online learning environments and assesses to what extent these behaviors are similar to or different from face-to-face immediacy-producing behaviors.
Date: December 2014
Creator: Spiker, Chance W.

Exploring Naming Behavior in Personal Digital Image Collections: the Iconology and Language Games of Pinterest

Description: As non-institutional digital image collections expand into social media, independent non-professional image curators are emerging, actively constructing alternative naming conventions to suit their needs in a social collecting environment. This project considers how independent user-curators are developing particular sense-making behaviors as they actively contribute names to large, unstructured social image collections. In order to capture and explore this evolving language adaptation, Pinterest names are analyzed using a matrix composed of Panofsky’s three strata of subject matter, Rosch’s levels of categorical abstraction, Shatford Layne’s image attributes and Wittgenstein’s language game constructions. Analyzing Pinterest image names illuminates previously unnoticed behaviors by independent user-curators as they create shared collections. Exploring the various language choices which user-curators select as they apply this new curating vocabulary helps identify underlying user needs not apparent in traditionally curated collections restricted to traditional naming conventions.
Date: December 2014
Creator: Sutcliffe, Tami

Identifying Key Success Factors for the Implementation of Enterprise Content Management Systems

Description: Enterprise content management (ECM) is an emerging research area that is beginning to find attention in academia. While the private sector has a growing industry and community for ECM, academia is starting to address this with direct links to the better-established areas of information systems and enterprise resource planning systems. ECM has been viewed as a higher-level concept of methods and strategies pertaining to content management in the context of the enterprise. Like many other organizational wide systems, ECM systems are complex, difficult to implement and risk failing to meet expected success measures. Definitions for what exactly constitutes an ECM system are still evolving. The major issues with ECM systems are that they are increasingly being implemented by organizations in an attempt to address the unmanageable amount of unstructured content over its lifecycle, compliance pressures, collaboration needs, content integrity and continuity, and controlling costs. However, the implementation problems are many and diverse, such as determining content and business processes to be included, determining technologies to fit the organizational needs, how to integrate with existing systems, and managing organizational culture and change for acceptance. There is currently little academic research in the area of ECM, and research determining the key factors that contribute to successful implementations of these systems is absent. This research addressed the existing gap in ECM research and investigated the key success factors for the implementations of ECM systems with the objectives of identifying a set of success factors. Guided by research in related areas and through developing a theoretical framework and the resulting research model, the study used a qualitative case study method to identify ECM implementation factors and their relationship to organizational culture and people, business processes, technology and organizational content. The results of this research were twofold, first by contributing needed research in the ECM ...
Date: August 2014
Creator: Horne, Stephanie Burnett

The Adoption of Open Source Software in Uganda: a Pragmatist Approach to the Formation of a National Information Policy for a New Technology

Description: This exploratory research examined an information policy formation process for the adoption of open source software (OSS) in Uganda. Grounded in a pragmatist tradition, this theoretical and empirical study pursued a qualitative research approach with a triangulation of theoretical concepts, data collection, and analysis techniques in an iterative and interactive process. The design provided a powerful context to develop and conduct field activities in Kampala with a purposeful sample of 22 participants, 20 in interviews and 5 in a focus group discussion. The research design enhanced consistency in the evidence from the data, increased robustness in the results, and confidence in the findings. The results highlighted a vibrant ICT sector in Uganda, underlined the multiple stakeholders and their competing interests in the policy, revealed a lack of consensus between the government and OSS promoters on the meaning of OSS, and illuminated the benefits in the OSS model over proprietary software. The stakeholders' conflicting perceptions appear to be too far apart to allow meaningful progress and are derailing the policy. Unless their conflicting perceptions are resolved, the OSS policy will continue stagnating. The study fills critical information gaps in Uganda’s policy formation processes, provides timely and relevant information to holistically understand a complex policy formation stage to enable stakeholders to resolve their impasse and enact a law to embrace OSS. It breaks ground in information policy research in framing policy formation processes for new ICTs, such as OSS, as ideologically-oriented. The findings offer ideas to scholars and African countries to draw applicable lessons.
Date: May 2014
Creator: Muwanguzi, Samuel

Development and Validation of an Instrument to Operationalize Information System Requirements Capabilities

Description: As a discipline, information systems (IS) has struggled with the challenge of alignment of product (primarily software and the infrastructure needed to run it) with the needs of the organization it supports. This has been characterized as the pursuit of alignment of information technology (IT) with the business or organization, which begins with the gathering of the requirements of the organization, which then guide the creation of the IS requirements, which in turn guide the creation of the IT solution itself. This research is primarily focused on developing and validating an instrument to operationalize such requirements capabilities. Requirements capabilities at the development of software or the implementation of a specific IT solution are referred to as capabilities for software requirements or more commonly systems analysis and design (SA&D) capabilities. This research describes and validates an instrument for SA&D capabilities for content validity, construct validity, internal consistency, and an exploratory factor analysis. SA&D capabilities were expected to coalesce strongly around a single dimension. Yet in validating the SA&D capabilities instrument, it became apparent that SA&D capabilities are not the unidimensional construct traditionally perceived. Instead it appears that four dimensions underlie SA&D capabilities, and these are associated with alignment maturity (governance, partnership, communications, and value). These sub factors of requirements capabilities are described in this research and represent distinct capabilities critical to the successful alignment of IT with the business.
Date: May 2014
Creator: Pettit, Alex Z.

Implications of Punctuation Mark Normalization on Text Retrieval

Description: This research investigated issues related to normalizing punctuation marks from a text retrieval perspective. A punctuated-centric approach was undertaken by exploring changes in meanings, whitespaces, words retrievability, and other issues related to normalizing punctuation marks. To investigate punctuation normalization issues, various frequency counts of punctuation marks and punctuation patterns were conducted using the text drawn from the Gutenberg Project archive and the Usenet Newsgroup archive. A number of useful punctuation mark types that could aid in analyzing punctuation marks were discovered. This study identified two types of punctuation normalization procedures: (1) lexical independent (LI) punctuation normalization and (2) lexical oriented (LO) punctuation normalization. Using these two types of punctuation normalization procedures, this study discovered various effects of punctuation normalization in terms of different search query types. By analyzing the punctuation normalization problem in this manner, a wide range of issues were discovered such as: the need to define different types of searching, to disambiguate the role of punctuation marks, to normalize whitespaces, and indexing of punctuated terms. This study concluded that to achieve the most positive effect in a text retrieval environment, normalizing punctuation marks should be based on an extensive systematic analysis of punctuation marks and punctuation patterns and their related factors. The results of this study indicate that there were many challenges due to complexity of language. Further, this study recommends avoiding a simplistic approach to punctuation normalization.
Date: August 2013
Creator: Kim, Eungi

Toward a Grounded Theory of Community Networking

Description: This dissertation presents a preliminary grounded theory of community networking based on 63 evaluations of community networking projects funded by the National Telecommunications and Information Administration’s Technology Opportunities Program (TOP) between 1994 and 2007. The substantive grounded theory developed is that TOP projects differed in their contribution to positive outcomes for intended disadvantaged community beneficiaries based on the extent and manner in which they involved the disadvantaged community during four grant process phases: partnership building, project execution, evaluation, and close-out. Positive outcomes for the community were facilitated by using existing communication channels, such as schools, to connect with intended beneficiaries; local financial institutions to provide infrastructure to support local trade; and training to connect community members to jobs. Theoretical contributions include situating outcomes for disadvantaged communities within the context of the grant process; introducing the “vulnerable community” concept; and identifying other concepts and properties that may be useful in further theoretical explorations. Methodological contributions include demonstrating grounded theory as a viable method for exploring large text-based datasets; paving the way for machine learning approaches to analyzing qualitative data; and illustrating how project evaluations can be used in a similar fashion as interview data. Practical contributions include providing information to guide community networking-related policies and initiatives from the perspectives of stakeholders at all levels, including establishing funded projects as local employment opportunities and re-conceptualizing sustainability in terms of human networks rather than technological networks.
Date: May 2014
Creator: Masten-Cain, Kathryn

The Information Politics Assessment Scale (Ipas): Developing and Testing an Instrument to Measure and Identify the Information Politics of Organizations

Description: Information politics is a concept widely acknowledged in several disciplines. However, scant empirical evidence exists in the literature that codifies or measures information politics as a construct. This exploratory study developed and tested the Information Politics Assessment Scale (IPAS), a survey instrument that measured individual perceptions of organizational information artifacts as indictors of its information politics. Data collected with the IPAS was examined to investigate the latent structure of the information politics variable, determine information politics models, and explore the relationship between information politics, strategy, and organization effectiveness. A purposive sample of 240 participants from a cross-section of organizations completed the IPAS in an online administration. Exploratory factor analysis generated three factors, labeled Behavioral Flexibility (BF), Environmental Sensitivity (ES), and Structural Autonomy (SA), suggesting three dimensions of the information politics variable. Cluster analysis of aggregate scores on the BF, ES, and SA factors together resulted in determining four distinct information politics models. Crosstab and ANOVA, respectively, enabled explaining the relationship between strategy and information politics, and how it influenced organization effectiveness. This study breaks ground by broadening the theoretical and empirical understanding of information politics in confirming the proposition that an organization’s information artifacts are measureable and reliable indicators of its information politics. Further, it supports the efficacy of the IPAS to identify the information politics model operating in a given organization.
Date: May 2014
Creator: Reed, Richard

The Use of Social Media in Informal Scientific Communication Among Scholars: Modeling the Modern Invisible College

Description: The concept of the invisible college is a key focus of scientific communication research with many studies on this topic in the literature. However, while such studies have contributed to an understanding of the invisible college, they have not adequately explained the interaction of social and structural processes in this phenomenon. As a consequence, past research has described the invisible college differently based on researchers’ perspectives, resulting in misinterpretations or inconsistent definitions of the relevant social and structural processes. Information science and related disciplines have focused on the structural processes that lead to scholarly products or works while placing less emphasis on the social processes. To advance understanding of the invisible college and its dimensions (including both social processes and structural processes), a proposed model (Modern Invisible College Model, MICM) has been built based on the history of the invisible college and Lievrouw’s (1989) distinction between social and structural processes. The present study focuses on the social processes of informal communication between scholars via social media, rather than on the structural processes that lead to scholarly products or works. A developed survey and an employed quantitative research method were applied for data collection. The research population involved 77 scholars from the Institute of Public Administration (IPA), in Saudi Arabia. Descriptive statistics, frequency and percentage were conducted for each statement. Means and standard deviations were calculated. The results indicate that the majority of participants heavily use social media for scientific communication purposes. Also, the results confirm that scholars consider social media to be an effective and appropriate tool for scientific communication. Seven factors were found in the findings to have positive correlations with uses and gratifications theory and the use of social media. This research contributes to and benefits scholars, reference groups (i.e., the invisible college itself), and institutions, and provides ...
Date: May 2014
Creator: Algarni, Mohammed Ayedh

Adolescent Task Management: Multitasking and Social Media in the Student Search Process

Description: This study examines adolescent students at an American international school and observes student use of social networking programs as well as physical actions in the search process. The study specifically observed multitasking behavior and organizational skills among students, as well as linkages made through social networking sites. Student observations, student interviews, analysis of Facebook entries, and a survey on multitasking yielded rich data. Students appear to be far more organized than previously suggested in the literature, and in this study, the organization proved to be largely self-taught. Students used their social networks to build a kind of group expertise that compensated for their youthful naivety. Students exhibited self-control within the search to the degree that they could focus on what they wanted to find, and they used heuristics—mental shortcuts—to achieve what they needed. Searches also suggest creativity in that students were flexible in their search methods and used a number of tools to gather information. Students could balance the needs of the academic or imposed search with their own online lives, meaning that they made compensations for social media and media multitasking when it was deemed necessary.
Date: August 2013
Creator: Kurtenbach, John

Organizational Justice Perception and Its Effects on Knowledge Sharing: a Case Study of Forensics in the Turkish National Police

Description: In today’s economy, organizational knowledge is a fundamental factor for remaining competitive and managing intellectual capital. Knowledge Management aims to improve organizational performance by designing the work environment with necessary tools. Yet, significant amount of knowledge resides within the people in different forms such as experience or abilities. Transferring individual knowledge within members or into organizational repositories is so difficult. Knowledge sharing only occurs under certain circumstances: People share knowledge when they believe it is beneficial for them, when they feel safe and secure, and when they trust. Since knowledge is power, and brings respect to its bearer, knowledge sharing needs suitable environment. In this context, this study investigates intention to knowledge sharing among forensics in the Turkish National Police (TNP) and the factors -such as perceived organizational justice, organizational citizenship behaviors, subjective norms, and attitudes toward knowledge sharing- affecting their intentions. The researcher utilized a model developed from Ajzen and Fishbein’s (1975; 1980) theory of reasoned action (TRA). To test this model, a self-administered questionnaire survey was administered in Turkey In order to analyze the quantitative data; SPSS version 19 was used for all preliminary analyses and LISREL 8.8 was used for Regression Analysis and Path Analysis The fit of the data to this proposed model was not adequate. However, 7 of the 8 hypotheses supported.
Date: August 2013
Creator: Can, Ahmet

Social Media in Policing: a Study of Dallas-fort Worth Area City Police Departments

Description: Social media offers numerous opportunities to companies, organizations and government agencies to communicate with people outside their organization, to promote their interests and to better serve their customers, or as in the case with government agencies, to better serve their citizens. However, little is known about how police departments in particular use social media. This research study explores why police departments use social media, how they manage their social media tools, and the problems and challenges experienced as they use social media. This qualitative study is largely guided by grounded theory. The data were collected from a study population using local police departments in the Dallas-Fort worth (DFW) area principal cities using both individual interviews with police departments’ social media officers and observations of these departments’ online social media tools (in particular, Facebook and Twitter). This study has shown that the DFW area city police departments are using social media quite extensively to keep the public informed and often for investigative purposes. There are some success factors to adopting and using these tools, such as the motivation of department staff and their benefits, successful implementation of the tools, the simplicity of using tools and that it is absolutely free.
Date: August 2013
Creator: Altunbas, Fuat

Web Information Behaviors of Users Interacting with a Metadata Navigator

Description: The web information behaviors of users as they interacted with a metadata navigator, the Personal Information (PI) Agent, and reflected upon their interaction experiences were studied. The process included studying the complete iterative (repeated) cycle of information needs, information seeking, and information use of users interacting with an internet-based prototype metadata PI Agent tool. Detlor’s theory of web information behaviors of organizational users was utilized as a theoretical foundation for studying human-information interactions via the PI Agent tool. The qualitative research design allowed for the use of triangulation within the context of a one-group pretest-posttest design. Triangulation occurred in three phases: (a) observe, (b) collect, and (c) reflect. Observations were made as participants solved three problem situations. Participants’ computer log and print screen data were collected, and follow-up interviews were conducted once all posttest sessions ended to enable users to reflect on their experiences. The three triangulation phases ensured saturation of data and greater depth regarding the participants’ information behaviors. Content analysis occurred via exploratory pattern analysis using the posttest Problem Steps Recorder (PSR) log data and on the six interviewees’ follow-up interview data. Users engaged in iterative cycles of information needs, information seeking, and information use to resolve the presented problem situations. The participants utilized the PI Agent tool iteratively to eliminate their knowledge gaps regarding the presented problem situations. This study was the first to use PSR log data for capturing evidence of the iterative search process as defined by Detlor. The implications for best practices were inspired by participant feedback, and recommendations for further study are made.
Date: December 2013
Creator: McMillan, Tyson DeShaun

Seeking Information After the 2010 Haiti Earthquake: a Case Study in Mass-fatality Management

Description: The 2010 earthquake in Haiti, which killed an estimated 316,000 people, offered many lessons in mass-fatality management (MFM). The dissertation defined MFM in seeking information and in recovery, preservation, identification, and disposition of human remains. Specifically, it examined how mass fatalities were managed in Haiti, how affected individuals sought information about fatalities, and what needs motivated them. Data from 28 in-depth, partially structured interviews, conducted during two field visits ending 21 weeks after the earthquake, were included in a case study. The data analysis revealed the MFM was severely inadequate. One interviewee, a senior UN official, stated, "There was no fatality management." The analysis also indicated a need to learn whereabouts of the deceased motivated individuals to visit spots the deceased were last seen at. It sought to illumine information-seeking practices, as discussed in the works of J. David Johnson and others, by developing a new model of information flow in MFM. In addition, it reaffirmed Donald Case and Thomas Wilson's theoretical proposition – that need guides any seeking of information – in the case of Haiti. Finally, it produced recommendations regarding future directions in MFM for emergency managers and information scientists, including possible use of unidentified body parts in organ transplants. Overall, the dissertation, which was supported by two grants of the National Science Foundation, attempted to add to relatively scanty literature in information seeking in MFM.
Date: May 2013
Creator: Gupta, Kailash

Knowledge-sharing Practices Among Turkish Peacekeeping Officers

Description: The Turkish National Police (TNP) peacekeeping officers experience poor knowledge-sharing practices before, during, and after their tours of duty at the United Nations (UN) field missions, thus causing knowledge loss. The study aims to reveal the current knowledge-sharing practices of the TNP peacekeeping officers and proposes a knowledge-sharing system to share knowledge effectively. It also examines how applicable the knowledge management models are for their knowledge-sharing practices. In order to gain a better understanding about the knowledge-sharing practices of TNP officers, the researcher used a qualitative research method in this study. The researcher used semi-structured interviews in data collection. The participants were selected based on the non-probability and purposive sampling method. Content analysis and constant comparison was performed in the data analysis process. The most important knowledge sources of the peacekeeping officers are their colleagues, the Internet, and email groups. The peacekeepers recommend writing reports, organizing training programs, conducting exit interviews, adopting best practices, and creating a knowledge depository. The study uncovers that organizational culture, hierarchy, and physical proximity are significant factors that have a vital impact on knowledge sharing. Knowledge Conversion Model is substantially applicable for the knowledge-sharing practices of the TNP peacekeeping officer.
Date: August 2012
Creator: Eren, Murat Erkan

Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications

Description: Information privacy is a major concern for consumers adopting emerging technologies dependent on location-based services. This study sought to determine whether a relationship exists among factors of personalization, locatability, perceived playfulness, privacy concern and behavioral intention to disclose personal information for individuals using location-based, geosocial networking applications. Questionnaire responses from undergraduate students at a 4-year university provide insight into these relationships. Multiple regression results indicated that there was a statistically significant relationship between the four significant predictor variables and the dependent variable. Analysis of beta weights, structure coefficients, and commonality analysis shed light on the variance attributable to the predictor variables of the study. Findings provide understanding of the specific factors examined in the study and have implications for consumers, businesses, application designers, and policymakers. The results from this study contribute to an understanding of technology acceptance theory and offer insight into competing beliefs that may affect an individual’s behavioral intention to disclose personal information. Knowledge gained form the study may be useful for overcoming challenges related to consumer adoption of location-based services that require disclosure of personal information.
Date: May 2012
Creator: Cox, Trissa

In Pursuit of Image: How We Think About Photographs We Seek

Description: The user perspective of image search remains poorly understood. the purpose of this study is to identify and investigate the key issues relevant to a user’s interaction with images and the user’s approach to image search. a deeper understanding of these issues will serve to inform the design of image retrieval systems and in turn better serve the user. Previous research explores areas of information seeking behavior, representation in information science, query formulation, and image retrieval. the theoretical framework for this study includes an articulation of image search scenarios as adapted from Yoon and O’Connor’s taxonomy of image query types, Copeland’s Engineering Design Approach for rigorous qualitative research, and Anderson’s Functional Ontology Construction Model for building robust models of human behavior. a series of semi-structured interviews were conducted with expert-level image users. Interviewees discussed their motivations for image search, types of image searches they pursue, and varied approaches to image search, as well as how they decide that an information need has been met and which factors influence their experience of search. a content analysis revealed themes repeated across responses, including a collection of 23 emergent concepts and 6 emergent categories. a functional analysis revealed further insight into these themes. Results from both analyses may be used as a framework for future exploration of this topic. Implications are discussed and future research directions are indicated. Among possibilities for future research are investigations into collaborative search and ubiquitous image search.
Date: May 2012
Creator: Oyarce, Sara

The Role of Tasks in the Internet Health Information Searching of Chinese Graduate Students

Description: The purpose of the study was to examine the relationships between types of health information tasks and the Internet information search processes of Chinese graduate students at the University of North Texas. the participants' Internet information search processes were examined by looking at the source used to start the search, language selection, use of online translation tools, and time spent. in a computer classroom, 45 Chinese graduate students searched the Internet and completed three health information search tasks: factual task, interpretative task, and exploratory task. Data of the Chinese graduate students’ health information search processes were gathered from Web browser history files, answer sheets, and questionnaires. Parametric and non-parametric statistical analyses were conducted to test the relationships between the types of tasks and variables identified in the search process. Results showed that task types only had a statistically significant impact on the time spent. for the three tasks, the majority of Chinese graduate students used search engines as major sources for the search starting point, utilized English as the primary language, and did not use online translation tools. the participants also reported difficulties in locating relevant answers and recommended ways to be assisted in the future when searching the Internet for health information. the study provided an understanding of Chinese graduate students' health information seeking behavior with an aim to enrich health information user studies. the results of this study contribute to the areas of academic library services, multilingual health information system design, and task-based health information searching.
Date: May 2012
Creator: Pan, Xuequn

A Study Of The Perception Of Cataloging Quality Among Catalogers In Academic Libraries

Description: This study explores the concept of "quality" in library cataloging and examines the perception of quality cataloging among catalogers who work in academic libraries. An examination of the concept of "quality cataloging" in library science literature revealed that even though there is some general agreement on how this concept is defined, the level of detail and focus of these definitions often vary. These various perceptions were dissected in order to develop a framework for evaluating quality cataloging definitions; this framework was used to evaluate study participants' definitions of quality cataloging. Studying cataloger perceptions of quality cataloging is important because it is catalogers (particularly original catalogers) who are largely responsible for what is included in bibliographic records. Survey participants (n = 296) provided their personal definition of quality cataloging as well as their opinions on their department's cataloging, their influence upon their department's policies and procedures, and the specific data that should be included in a quality bibliographic record. Interview participants (n = 20) provided insight on how their opinions of quality cataloging were formed and the influences that shaped these opinions.
Date: December 2011
Creator: Snow, Karen