Search Results

Identification of Remote Leadership Patterns in Academic and Public Libraries
Seminal works on leadership, including those in librarianship define a traditional model of interaction between leaders and followers without reference to the information technology-driven environment. In addition, remote leadership indicates a different model from the traditional model, one that is focused on the interaction of leaders and their staff through digital technology. Although leaders still use face-to-face interaction, due to varied work schedules or job responsibilities, they also recognize the need to lead employees remotely. Leadership studies in library literature have not addressed how library leaders use information technology to lead employees remotely, nor have these studies addressed remote leadership and remote employees, except for some articles on telecommuting. As a result, this research was conducted to address this gap, providing an exploratory foundation of emergent patterns of remote leadership with its associated leadership dimensions rooted in personality traits, behaviors, and skills. Quantitative and qualitative data were obtained from a small sample size of academic and public-library leaders in the United States who participated in a Web-based survey designed specifically for this study, limiting generalizations. Factor analysis was the principal methodology used to obtain findings. Its composite factor scores were also used in the t-test and chi-square analyses. This study identifies some emergent patterns of remote leadership in the library and information-science field, exploring whether library leaders use information technology to be effective remote leaders in a technology-driven environment, and whether existing leadership attributes could be identified as part of the remote-leadership model. Because this study's findings indicated that library leaders are not quite the traditional leader but are not fully integrated into remote leadership, it becomes apparent that they would function with a blend of both face-to-face and electronic interactions, due to the nature of library work. Additionally, this research revealed underlying issues and challenges faced by library leaders …
Toward an Ideal Library: A Synthesis of Wilson's Library and Information Policy and Gilbert's Performance Matrix
Inquiry about ideal library was sought by interdisciplinary approach from human competence derived from performance engineering by Gilbert (1978), and the library information policy by Wilson (1977). With Wilson's insights into the field of library and information science (LIS), this work demonstrated the synthesis of Wilson and Gilbert: engineering as common ground. One of the central concerns in LIS, utilization of knowledge, is re-conceptualized as Gilbert's view of performance, which reflected at different vantage points. Four leisurely theorems are introduced for his view of performance engineering, which produce human competence. The performance matrix is the application tool that represents Gilbert's theorems of performance engineering. It is used to clarify vantage points about the library, and constructed a model of the performance engineering system of ideal library. Based upon the model, two applications were made. One is to apply the performance matrix to the existing academic library. Another is to apply the performance matrix for building a special collection. These two applications show that the performance matrix is capable to analyze existing performance system as well as designing and building a performance system.
The Effectiveness of Using Lego Mindstorms Robotics Activities to Influence Self-regulated Learning in a University Introductory Computer Programming Course.
The research described in this dissertation examines the possible link between self-regulated learning and LEGO Mindstorms robotics activities in teaching concepts in an introductory university computer programming course. The areas of student motivation, learning strategies, and mastery of course objectives are investigated. In all three cases analysis failed to reveal any statistically significant differences between the traditional control group and the experimental LEGO Mindstorms group as measured by the Motivated Strategies for Learning Questionnaire and course exams. Possible reasons for the lack of positive results include technical problems and limitations of the LEGO Mindstorms systems, limited number and availability of robots outside of class, limited amount of time during the semester for the robotics activities, and a possible difference in effectiveness based on gender. Responses to student follow-up questions, however, suggest that at least some of the students really enjoyed the LEGO activities. As with any teaching tool or activity, there are numerous ways in which LEGO Mindstorms can be incorporated into learning. This study explores whether or not LEGO Mindstorms are an effective tool for teaching introductory computer programming at the university level and how these systems can best be utilized.
Negotiation, communication, and decision strategies used by hostage/crisis negotiators.
By conducting this theory-based empirical study, gathering data from working negotiators in the US and Canada, I have determined what primary dynamic activities, communication skills, and negotiation tools are used by hostage/crisis negotiators. Negotiators implement their negotiation and decision strategies differently depending on whether the situations they deal with are instrumental or expressive. I have determined which elements of negotiations and factors affecting negotiations differ while handling instrumental and expressive hostage situations. I found that the collected data did not reveal any significant relationship between handling instrumental/expressive hostage situations differently and belief in the elements of Brenda Dervin's and Shannon-Weaver's theories. I have also determined that the belief in the elements of the Dervin's and Shannon-Weaver's theories is workable and practical for negotiators to use. Based on the above findings, the model suggested by this research adds the elements and directives of Dervin's and Shannon-Weaver's models to the common approach used by the negotiators. This revised model suggests that the negotiators pay attention to the dynamics of the interactions presented between the two parties: the negotiators themselves and hostage takers. The revised model also recommends that the negotiators focus on not only the hostage takers behavioral characteristics, psychological conditions, and criminal history but also on the meaning of the sent message and the interaction itself as performed between the two parties. This perspective enables the negotiators to look at the negotiation process as information and communication process. We are not ignoring the fact that hostage negotiation is a format of extreme information management. By looking at such an extreme case, we can add to our understanding of Dervin's and Shannon-Weaver's perspectives in order to see the hostage negotiation process from a wider perspective. The revised model is not an alternative approach to the common approach most negotiators use. Instead, the …
Networked generation youth's information seeking process: An examination of cognitive, affective and physical behaviors and problem solving techniques.
This study investigated the information seeking process of the networked generation youth. Specifically, I examined the cognitive, affective, and physical information seeking behaviors and problem solving techniques adolescent student users of the networked environment utilize to solve information needs. Grounded in the theoretical context of the information seeking process in the networked environment, the research extended the user-centered approach to modeling the information seeking process of networked generation youth. A mixed model research design was used to address the research questions. Phase 1 used an online questionnaire to solicit information from 125 students in Grades 7-12 regarding their understanding and use of networked environments, information seeking skills, and problem solving techniques. Phase 2 observed 12 students, two from each grade level, to gain an understanding into the information seeking process of networked generation youth. Participants completed information seeking scenarios of varying levels of complexity. As the participants completed the scenario, they engaged in talk-aloud verbal protocol to describe and explain their behaviors and techniques as they advanced through their information seeking process. Semi-structured interviews were conducted which provided an opportunity for the participants to clarify their information seeking experience. A profile of students' networked environment knowledge and use in relationship to their information seeking process was created. Findings suggested that knowledge and experience influence networked generation youth's information seeking process in the networked environment. A subset of students were found to be experienced information seekers who applied various cognitive, affective, and physical information seeking behaviors and behavioral actions that guide them through their information seeking process. The study presented a preliminary model of the networked generation youth's information seeking process. The model provides a detailed map to networked generation youth's information seeking and problem solving. I bring to light experienced users successful behaviors, as well as areas where all students …
An exploratory study of factors that influence student user success in an academic digital library.
The complex nature of digital libraries calls for appropriate models to study user success. Calls have been made to incorporate into these models factors that capture the interplay between people, organizations, and technology. In order to address this, two research questions were formulated: (1) To what extent does the comprehensive digital library user success model (DLUS), based on a combination of the EUCS and flow models, describe overall user success in a prototype digital library environment; and (2) To what extent does a combined model of DeLone & McLean's reformulated information system success model and comprehensive digital library user success model (DLUS) explain digital library user success in a prototype digital library environment? Participants were asked to complete an online survey questionnaire. A total of 160 completed and useable questionnaires were obtained. Data analyses through exploratory and confirmatory factor analyses and structural equation modeling produced results that support the two models. However, some relationships between latent variables hypothesized in the model were not confirmed. A modified version of the proposed comprehensive plus user success model in a digital library environment was tested and supported through model fit statistics. This model was recommended as a possible alternative model of user success. The dissertation also makes a number of recommendations for future research.
The intersection of social networks in a public service model: A case study.
Examining human interaction networks contributes to an understanding of factors that improve and constrain collaboration. This study examined multiple network levels of information exchanges within a public service model designed to strengthen community partnerships by connecting city services to the neighborhoods. The research setting was the Neighbourhood Integrated Service Teams (NIST) program in Vancouver, B.C., Canada. A literature review related information dimensions to the municipal structure, including social network theory, social network analysis, social capital, transactive memory theory, public goods theory, and the information environment of the public administration setting. The research method involved multiple instruments and included surveys of two bounded populations. First, the membership of the NIST program received a survey asking for identification of up to 20 people they contact for NIST-related work. Second, a network component of the NIST program, 23 community centre coordinators in the Parks and Recreation Department, completed a survey designed to identify their information exchanges relating to regular work responsibilities and the infusion of NIST issues. Additionally, 25 semi-structured interviews with the coordinators and other program members, collection of organization documents, field observation, and feedback sessions provided valuable insight into the complexity of the model. This research contributes to the application of social network theory and analysis in information environments and provides insight for public administrators into the operation of the model and reasons for the program's network effectiveness.
Sanctioned and Controlled Message Propagation in a Restrictive Information Environment: The Small World of Clandestine Radio Broadcasting
This dissertation seeks to identify the elements that inform the model for competing message propagation systems in a restrictive environment. It pays attention to message propagation by sanctioned and clandestine radio stations in pre- and post-independent Zimbabwe. This dissertation uses two models of message propagation in a limiting information environment: Sturges' information model of national liberation struggle and Chatman's small world information model. All the message propagation elements in the Sturges and Chatman's models are present in the broadcast texts analyzed. However, the findings of this dissertation indicate that communication in a restrictive information environment is designed such that its participants make sense of their situation, and come up with ways to solve the challenges of their small world. Also, a restrictive information environment is situational, and message propagators operating in it are subject to tactical changes at different times, accordingly altering their cognitive maps. The two models fail to address these concerns. This dissertation focused on message propagation in Zimbabwe because there is military belligerence involved in the information warfare. It therefore provides an extreme situation, which can help our understanding of more everyday instances of communication and interference of communication. Findings of this dissertation recommend the need to emphasize that information input, output and suppression are components dependent on each other; not discrete and independent categories of information activities.
Are Online Catalogs for Children Giving Them What They Need? Children's Cognitive Development and Information Seeking and Their Impact on Design
Research shows children in an online environment often search by browsing, which relies heavily on recognition and content knowledge, so catalog systems for children must use effective symbols or pictorial representations, which correspond with children's own cognitive schema and level of recognition knowledge. This study was designed to look at the success of young children (ages 5 to 8) in searching 3 online public library catalogs designed for them, and it focused specifically on the pictorial representations and text descriptors used in the systems' browsing hierarchy. The research sought answer whether young children (ages 5 to 8) are really poor searchers because of cognitive development and lack of technology skills or if system design is the major reason for poor search results; i.e., Do current children's online catalog designs function in a manner that is compatible with information seeking by children? Although these results can not be generalized, this study indicates that there was a disconnect between the cognitive abilities of young users and catalog design. The study looked at search success on the 3 catalogs in relation to the catalog characteristics and individual user characteristics and makes 3 significant contributions to the field of library and information science. The first contribution is the modification of an existing model posed by Cooper and O'Connor and modified by Abbas (2002). The second significant contribution is the proposal of a new model, Creel's second best choice (SBC) model, that addresses the cognitive gap and design flaws that impact the choices participants made. The third significant contribution is that this study addresses and fills a gap in the literature.
A Conceptual Map for Understanding the Terrorist Recruitment Process: Observation and Analysis of Turkish Hezbollah Terrorist Organizations.
Terrorism is a historical problem; however, it becomes one of the biggest problems in 21st century. September 11 and the following Madrid, Istanbul and London attacks showed that it is the most significant problem threatening world peace and security. Governments have started to deal with terrorism by improving security measurements and making new investments to stop terrorism. Most of the governments' and scholars' focus is on immediate threats and causes of terrorism, instead of looking at long-term solutions such as root causes and underlying reasons of terrorism, and the recruitment style of terrorist organizations If terrorist recruitment does not stop, then it is safe to say terrorist activities cannot be stopped. This study focused on the recruitment process by observing two different terrorist organizations, DHKP/C and Turkish Hezbollah. The researcher brings 13 years of field experience and first-person data gathered from inside the terrorist organizations. The research questions of this study were: (i) How can an individual be prevented from joining or carrying out terrorist activities?; (ii) What factors are correlated with joining a terrorist organization?; (iii) What are the recruitment processes of the DHKP/C, PKK, and Turkish Hezbollah?; (iv) Is there any common process of being a member of these three terrorist organizations?; and (v) What are the similarities and differences these terrorist organizations? As a result of this analysis, a terrorist recruitment process map was created. With the help of this map, social organizations such as family and schools may be able to identify ways to prevent individuals from joining terrorist organizations. Also, this map will also be helpful for government organizations such as counterterrorism and intelligence to achieve the same goal.
Discovering a Descriptive Taxonomy of Attributes of Exemplary School Library Websites
This descriptive study examines effective online school library practice. A Delphi panel selected a sample of 10 exemplary sites and helped to create two research tools--taxonomies designed to analyze the features and characteristics of school library Websites. Using the expert-identified sites as a sample, a content analysis was conducted to systematically identify site features and characteristics. Anne Clyde's longitudinal content analysis of school library Websites was used as a baseline to examine trends in practice; in addition, the national guidelines document, Information Power: Building Partnerships for Learning, was examined to explore ways in which the traditional mission and roles of school library programs are currently translated online. Results indicated great variation in depth and coverage even among Websites considered exemplary. Sites in the sample are growing more interactive and student-centered, using blogs as supplemental communication strategies. Nevertheless, even these exemplary sites were slow to adopt the advances in technology to meet the learning needs and interests of young adult users. Ideally the study's findings will contribute to understanding of state-of-the-art and will serve to identify trends, as well as serving as a guide to practitioners in planning, developing, and maintaining school library Websites.
An exploration of the diffusion of a new technology from communities of practice perspective: Web services technologies in digital libraries.
This study explored and described decision factors related to technology adoption. The research used diffusion of innovations and communities of practice (CoP) theoretical frameworks and a case study of Web services technology in the digital library (DL) environment to develop an understanding of the decision-making process. A qualitative case study approach was used to investigate the research problems and data were collected through semi-structured interviews, documentary evidence (e.g., meeting minutes), and a comprehensive member check. The research conducted face-to-face and phone interviews with seven respondents with different job titles (administraive vs. technical) from five different DL programs selected based on distinctive characteristics such as size of the DL program. Findings of the research suggested that the decision-making process is a complex process in which a number of factors are considered when making technology adoption decisions. These factors are categorized as organizational, individual, and technology specific factors. Further, data showed that DL CoPs played an important role in enabling staff members of a DL program to access up-to-date and experienced-based knowledge, provided a distributed problem solving and learning environment, facilitating informal communication and collaborative activities, and informing the decision-making process.
Human concept cognition and semantic relations in the unified medical language system: A coherence analysis.
There is almost a universal agreement among scholars in information retrieval (IR) research that knowledge representation needs improvement. As core component of an IR system, improvement of the knowledge representation system has so far involved manipulation of this component based on principles such as vector space, probabilistic approach, inference network, and language modeling, yet the required improvement is still far from fruition. One promising approach that is highly touted to offer a potential solution exists in the cognitive paradigm, where knowledge representation practice should involve, or start from, modeling the human conceptual system. This study based on two related cognitive theories: the theory-based approach to concept representation and the psychological theory of semantic relations, ventured to explore the connection between the human conceptual model and the knowledge representation model (represented by samples of concepts and relations from the unified medical language system, UMLS). Guided by these cognitive theories and based on related and appropriate data-analytic tools, such as nonmetric multidimensional scaling, hierarchical clustering, and content analysis, this study aimed to conduct an exploratory investigation to answer four related questions. Divided into two groups, a total of 89 research participants took part in two sets of cognitive tasks. The first group (49 participants) sorted 60 food names into categories followed by simultaneous description of the derived categories to explain the rationale for category judgment. The second group (40 participants) performed sorting 47 semantic relations (the nonhierarchical associative types) into 5 categories known a priori. Three datasets resulted as a result of the cognitive tasks: food-sorting data, relation-sorting data, and free and unstructured text of category descriptions. Using the data analytic tools mentioned, data analysis was carried out and important results and findings were obtained that offer plausible explanations to the 4 research questions. Major results include the following: (a) through discriminant …
E-Learning and In-Service Training: An Exploration of the Beliefs and Practices of Trainers and Trainees in the Turkish National Police
This targeted research study, carried out by an officer of the Turkish National Police (TNP), investigated the perceptions and beliefs of TNP trainers and trainees towards the potential adoption and implementation of e-learning technology for in-service police training. Utilizing diffusion and innovation theory (DOI) (Rogers, 1995) and the conceptual technology integration process model (CTIM) (Nicolle, 2005), two different surveys were administered; one to the trainers and one to the trainees. The factor analyses revealed three shared trainer and trainee perceptions: A positive perception towards e-learning, personally and for the TNP; a belief in the importance of administrative support for e-learning integration; and the belief in importance of appropriate resources to facilitate integration and maintain implementation. Three major recommendations were made for the TNP. First, the research findings could be used as a road map by the TNP Education Department to provide a more flexible system to disseminate in-service training information. The second is to establish two-way channels of communication between the administration and the TNP personnel to efficiently operationalize the adoption and integration of e-learning technology. The third is the administrative provision of necessary hardware, software, and technical support.
Modeling the role of blogging in librarianship
This phenomenological study examines the motivations and experiences of librarians who author professionally-focused Weblogs. I constructed a model of librarianship based on Wilson and Buckland. The results show a close fit between librarian bloggers and the ideals of the field as expressed by two primary library and information science philosophers. A Web survey generated 239 responses to demographic and open-ended questions. Using the results of the survey, I analyzed demographic data and performed a phenomenological analysis of the open-ended questions. A list of category responses was generated from each set of answers via the coding of descriptive words and phrases. Results indicated the motivations of librarian bloggers are based around themes of sharing, participation in community, and enhanced professional development. Respondents reported feeling more connected to the profession and to colleagues across the world because of blogging. Respondents perceived the librarian blogosphere as a community with both positive aspects - feedback, discussion, and support - and negative aspects - insular voices, divides between technologists and librarians, and generational rifts. Respondents also reported an increased ability to keep current, improved writing skills, and opportunities to speak and contribute to professional journals.
Officer attitudes toward organizational change in the Turkish National Police.
This dissertation emphasizes the importance of the human factor in the organizational change process. Change - the only constant - is inevitable for organizations and no change program can be achieved without the support and acceptance of organization members. In this context, this study identifies officer attitudes toward organizational change in the Turkish National Police (TNP) and the factors affecting those attitudes. The Officer Attitude Model created by the researcher includes six main factors (receptivity to change, readiness for change, trust in management, commitment to organization, communication of change, and training for change) and five background factors (gender, age, rank, level of education, and work experience) to explain officer attitudes toward change. In order to test this model, an officer attitude survey was administered in Turkey among TNP members and the results of the gathered data validated this model.
Police officers' adoption of information technology: A case study of the Turkish POLNET system.
One of the important branches of government and vital to the community, police agencies are organizations that have high usage rates of information technology systems since they are in the intelligence sector and thus have information incentives. Not only can information technologies develop intra- and inter-relationships of law enforcement agencies, but they also improve the efficiency and effectiveness of the police officers and agencies without adding additional costs. Thus, identifying the factors that influence the police officers' adoption of information technology can help predict and determine how information technology will contribute to the social organization of policing in terms of effectiveness and efficiency gains. A research framework was developed by integrating three different models, theory of planned behavior (TPB), technology acceptance theory (TAM), and diffusion of innovation theory (DOI) while adding two other factors, facility and voluntariness, to better determine the factors affecting the implementation and adoption of the POLNET software system used by the Turkish National Police (TNP). The integrated model used in this study covers not only basic technology acceptance factors, but also the factors related to policing. It also attempts to account for the factors of cultural differences by considering the important aspects of Turkish culture. A cross sectional survey was conducted among TNP officers using the POLNET system. The LISREL 8.5® analysis for the hypothesized model resulted in a good model fit; 13 of the 15 hypotheses were supported.
Reading selection as information seeking behavior: A case study with adolescent girls.
The aim of this research, Reading Selection as Information Seeking Behavior: A Case Study with Adolescent Girls, was to explore how the experience of reading fiction affects adolescent girls aged 13 through 15, and how that experience changes based upon four activities: journaling, blogging, a personal interview, and a focus group session. Each participant reflects upon works of her own choosing that she had recently read. The data is evaluated using content analysis with the goal of developing a relational analysis tool to be used and tested with future research projects. The goal of this research is to use the insights of the field of bibliotherapy together with the insights of the adolescent girls to provide a higher, more robust model of successful information behavior. That is, relevance is a matter of impact on life rather than just a match of subject heading. This work provides a thick description of a set of real world relevancy judgments. This may serve to illuminate theories and practices for bringing each individual seeker together with appropriate documents. This research offers a new model for relevant information seeking behavior associated with selecting works of essential instructional fiction, as well as a new definition for terminology to describe the results of the therapeutic literary experience. The data from this study, as well as from previous research, suggest that literature (specifically young adult literature) brings the reader to a better understanding of herself and the world around her.
Respect for human rights and the rise of democratic policing in Turkey: Adoption and diffusion of the European Union acquis in the Turkish National Police.
This study is an exploration of the European Union acquis adoption in the Turkish National Police. The research employed the Diffusion of Innovations, Democratic Policing, and historical background check theoretical frameworks to study the decision-making of the TNP regarding reforms after 2003 as a qualitative case study which triangulated the methodology with less-dominant survey and several other analyzing methods. The data were collected from several sources including semi-structured interviews, archival records, documentary evidences and the European Commission Regular Reports on Turkey. The research interest was about the decision mechanisms of the TNP towards reforms and the rise of democratic policing in Turkey. During the study, internationally recognized human rights standards were given attention. As the data suggested, the police forces are shaped according to their ruling governments and societies. It is impossible to find a totally democratic police in a violent society and a totally violent police in a democratic society. The study findings suggested that reforming police agencies should not be a significant problem for determined governments. Human rights violations should not be directly related with the police in any country. The data suggested that democratic policing applications find common application when the democracy gets powerful and police brutality increases when authoritarian governments stays in power. Democratic policing on the other hand is an excellent tool to improve notion of democracy and to provide legitimacy to governments. However, democratic policing is not a tool to bring the democracy, but a support mechanism for it.
Visual perception in relation to levels of meaning for children: An exploratory study.
This study explores distinct levels of meaning from images of picture books perceived by 3- to 5-year-old children and investigates how the certain visual perception factors influence children's meaning making and if these factors are correlated. The literature review supports associations among visual perception, information, picture books, meaning, and children. Visual perception serves as the first channel that filters and interprets visual information, and picture books provide visual and verbal experience for children, who constantly search for meaning. Children age 3 to 5 years are potential users of picture books because pictorial information is considered useful to children's learning tasks. Previous research reveals that various factors influence visual perception, and meaning has been mostly associated with its semantic significance in information retrieval. In information science, little research has focused on young children's own way of categorizing information, especially visual information. In order to investigate the distinct levels of meaning perceived by children, the investigation employed both qualitative and quantitative methods including unobtrusive and participant observation, factor analysis, content analysis, and case study. The result of this study contributes to understanding the cognitive process of children related to visual literacy and their interpreting visual information in a digital environment.
Widening the lens: An interdisciplinary approach to examining the effect of exposure therapy on public speaking state anxiety.
This study used an interdisciplinary approach to examine an intervention for reducing public speaking state anxiety. A quasi-experiment was conducted to determine if a multiple-exposure treatment technique (TRIPLESPEAK) would help to attenuate public speaking anxiety. The treatment group reported experiencing significantly less state anxiety during their post-test presentation than did the control group. This lead to the conclusion that exposure therapy can be used to help students enrolled in basic communication classes begin to overcome their fear of speaking in front of an audience. Follow-up analysis of the treatment group's reported anxiety levels during all five presentations (pre-test, Treatment Presentation 1, Treatment Presentation 2, Treatment Presentation 3, and post-test) revealed an increase in anxiety from the last treatment presentation to the post-test presentation. In order to explore this issue, Shannon's entropy was utilized to calculate the amount of information in each speaking environment. Anderson's functional ontology construction approach served as a model to explain the role of the environment in shaping speakers' current and future behaviors and reports of anxiety. The exploratory analysis revealed a functional relationship between information and anxiety. In addition, a qualitative study was conducted to determine which environmental stimuli speakers perceived contributed to their anxiety levels. Students reported experiencing anxiety based on four categories, which included speaker concerns, audience characteristics, contextual factors and assignment criteria. Students' reports of anxiety were dependent upon their previous speaking experiences, and students suggested differences existed between the traditional presentations and the treatment presentations. Pedagogical and theoretical implications are discussed.
Assessment of a Library Learning Theory by Measuring Library Skills of Students Completing an Online Library Instruction Tutorial
This study is designed to reveal whether students acquire the domains and levels of library skills discussed in a learning library skills theory after participating in an online library instruction tutorial. The acquisition of the library skills is demonstrated through a review of the scores on online tutorial quizzes, responses to a library skills questionnaire, and bibliographies of course research papers. Additional areas to be studied are the characteristics of the participants enrolled in traditional and online courses at a community college and the possible influence of these characteristics on the demonstrated learning of library skills. Multiple measurement methods, identified through assessment of library instruction literature, are used to verify the effectiveness of the library skills theory and to strengthen the validity and reliability of the study results.
Coyote Ugly Librarian: A Participant Observer Examination of Lnowledge Construction in Reality TV.
Reality TV is the most popular genre of television programming today. The number of reality television shows has grown exponentially over the last fifteen years since the premier of The Real World in 1992. Although reality TV uses styles similar to those used in documentary film, the “reality” of the shows is questioned by critics and viewers alike. The current study focuses on the “reality” that is presented to viewers and how that “reality” is created and may differ from what the participants of the shows experience. I appeared on two reality shows, Faking It and That's Clever, and learned a great deal as a participant observer. Within the study, I outline my experience and demonstrate how editing changed the reality I experienced into what was presented to the viewers. O'Connor's (1996) representation context web serves as a model for the realities created through reality television. People derive various benefits from watching reality TV. Besides the obvious entertainment value of reality TV, viewers also gather information via this type of programming. Viewers want to see real people on television reacting to unusual circumstances without the use of scripts. By surveying reality TV show viewers and participants, this study gives insight into how real the viewers believe the shows are and how authentic they actually are. If these shows are presented as reality, viewers are probably taking what they see as historical fact. The results of the study indicate more must be done so that the “reality” of reality TV does not misinform viewers.
Perceived attributes of diffusion of innovation theory as predictors of Internet adoption among faculty members of Imam Mohammed Bin Saud University.
The Internet is the most common communication and research tool worldwide. Perusal of the World Wide Web quickly reveals the variety of information available. Internet adoption can be considered the late 20th century's most important event. In academic environments today, Internet use among faculty members has been widely expanded, with professors now integrating Internet technology into classroom activities. Imam Muhammad Bin Saud Islamic University (IMSU) is a pioneering public university in Saudi Arabia. Until recently, some faculty members at IMSU were unable to access the Internet through the university. It is important to study the effects of this delay on faculty members regarding research and academic activities. This study identified the statistically significant differences in demographic characteristics of Internet adopters and non-adopters among faculty members at IMSU, examined whether faculty members' perceptions of the Internet affected adoption, determined if the university administration's decisions impacted faulty members' decisions to adopt the Internet, identified factors motivating faculty members to adopt the Internet, identified obstacles influencing faculty members' decisions to use the Internet, and determined whether innovation characteristics as perceived by faculty members predicted Internet adoption. Using Rogers' diffusion of innovation theory, the influence of eight attributes were examined regarding Internet adoption among IMSU faculty members. Multiple regression and chi-square techniques were conducted to analyze the data and answer research questions. Statistically significant differences were identified among Internet adopters and non-adopters regarding gender, age, academic rank, discipline, and English proficiency. The data revealed 54.7% of IMSU faulty members used the Internet for research and academic activities twice a month or less, indicating a low Internet adoption rate. Statistically significant differences were noted among adopters and non-adopters relative to income level and English proficiency. Multiple regression analysis showed that all attributes of innovation individually predicted Internet adoption. The combination of all attributes indicated the …
Computer Support Interactions: Verifying a Process Model of Problem Trajectory in an Information Technology Support Environment.
Observations in the information technology (IT) support environment and generalizations from the literature regarding problem resolution behavior indicate that computer support staff seldom store reusable solution information effectively for IT problems. A comprehensive model of the processes encompassing problem arrival and assessment, expertise selection, problem resolution, and solution recording has not been available to facilitate research in this domain. This investigation employed the findings from a qualitative pilot study of IT support staff information behaviors to develop and explicate a detailed model of problem trajectory. Based on a model from clinical studies, this model encompassed a trajectory scheme that included the communication media, characteristics of the problem, decision points in the problem resolution process, and knowledge creation in the form of solution storage. The research design included the administration of an extensive scenario-based online survey to a purposive sample of IT support staff at a medium-sized state-supported university, with additional respondents from online communities of IT support managers and call-tracking software developers. The investigator analyzed 109 completed surveys and conducted email interviews of a stratified nonrandom sample of survey respondents to evaluate the suitability of the model. The investigation employed mixed methods including descriptive statistics, effects size analysis, and content analysis to interpret the results and verify the sufficiency of the problem trajectory model. The study found that expertise selection relied on the factors of credibility, responsibility, and responsiveness. Respondents referred severe new problems for resolution and recorded formal solutions more often than other types of problems, whereas they retained moderate recurring problems for resolution and seldom recorded those solutions. Work experience above and below the 5-year mark affected decisions to retain, refer, or defer problems, as well as solution storage and broadcasting behaviors. The veracity of the problem trajectory model was verified and it was found to be an …
Constraints on Adoption of Innovations: Internet Availability in the Developing World.
In a world that is increasingly united in time and distance, I examine why the world is increasingly divided socially, economically, and digitally. Using data for 35 variables from 93 countries, I separate the countries into groups of 31 each by gross domestic product per capita. These groups of developed, lesser developed and least developed countries are used in comparative analysis. Through a review of relevant literature and tests of bivariate correlation, I select eight key variables that are significantly related to information communication technology development and to human development. For this research, adoption of the Internet in the developing world is the innovation of particular interest. Thus, for comparative purposes, I chose Internet Users per 1000 persons per country and the Human Development Index as the dependent variables upon which the independent variables are regressed. Although small in numbers among the least developed countries, I find Internet Users as the most powerful influence on human development for the poorest countries. The research focuses on key obstacles as well as variables of opportunity for Internet usage in developing countries. The greatest obstacles are in fact related to Internet availability and the cost/need ratio for infrastructure expansion. However, innovations for expanded Internet usage in developing countries are expected to show positive results for increased Internet usage, as well as for greater human development and human capital. In addition to the diffusion of innovations in terms of the Internet, the diffusion of cultures through migration is also discussed in terms of the effect on social capital and the drain on human capital from developing countries.
A Framework of Automatic Subject Term Assignment: An Indexing Conception-Based Approach
The purpose of dissertation is to examine whether the understandings of subject indexing processes conducted by human indexers have a positive impact on the effectiveness of automatic subject term assignment through text categorization (TC). More specifically, human indexers' subject indexing approaches or conceptions in conjunction with semantic sources were explored in the context of a typical scientific journal article data set. Based on the premise that subject indexing approaches or conceptions with semantic sources are important for automatic subject term assignment through TC, this study proposed an indexing conception-based framework. For the purpose of this study, three hypotheses were tested: 1) the effectiveness of semantic sources, 2) the effectiveness of an indexing conception-based framework, and 3) the effectiveness of each of three indexing conception-based approaches (the content-oriented, the document-oriented, and the domain-oriented approaches). The experiments were conducted using a support vector machine implementation in WEKA (Witten, & Frank, 2000). The experiment results pointed out that cited works, source title, and title were as effective as the full text, while keyword was found more effective than the full text. In addition, the findings showed that an indexing conception-based framework was more effective than the full text. Especially, the content-oriented and the document-oriented indexing approaches were found more effective than the full text. Among three indexing conception-based approaches, the content-oriented approach and the document-oriented approach were more effective than the domain-oriented approach. In other words, in the context of a typical scientific journal article data set, the objective contents and authors' intentions were more focused that the possible users' needs. The research findings of this study support that incorporation of human indexers' indexing approaches or conception in conjunction with semantic sources has a positive impact on the effectiveness of automatic subject term assignment.
The Online and the Onsite Holocaust Museum Exhibition as an Informational Resource
Museums today provide learning-rich experiences and quality informational resources through both physical and virtual environments. This study examined a Holocaust Museum traveling exhibition, Life in Shadows: Hidden Children and the Holocaust that was on display at the Art Center of Battle Creek, Michigan in fall 2005. The purpose of this mixed methods study was to assess the informational value of a Holocaust Museum exhibition in its onsite vs. online format by converging quantitative and qualitative data. Participants in the study included six eighth grade language arts classes who viewed various combinations or scenarios of the onsite and online Life in Shadows. Using student responses to questions in an online exhibition survey, an analysis of variance was performed to determine which scenario visit promotes the greatest content learning. Using student responses to additional questions on the same survey, data were analyzed qualitatively to discover the impact on students of each scenario visit. By means of an emotional empathy test, data were analyzed to determine differences among student response according to scenario visit. A principal finding of the study (supporting Falk and Dierking's contextual model of learning) was that the use of the online exhibition provided a source of prior orientation and functioned as an advanced organizer for students who subsequently viewed the onsite exhibition. Students who viewed the online exhibition received higher topic assessment scores. Students in each scenario visit gave positive exhibition feedback and evidence of emotional empathy. Further longitudinal studies in museum informatics and Holocaust education involving a more diverse population are needed. Of particular importance would be research focusing on using museum exhibitions and Web-based technology in a compelling manner so that students can continue to hear the words of survivors who themselves bear witness and give voice to silenced victims. When perpetuity of access to informational resources …
What makes a quality Ph.D. program in library and information sciences?
The intent of this study was to establish and validate criteria for use to assess the quality of a library and information sciences (LIS) Ph.D. program. The Ph.D. student-centric topology for quality Ph.D. programs was developed from a 2001 position statement by the American Association of Colleges of Nursing (AACN) regarding the quality indicators in research-focused doctoral programs in nursing. Topology components were tested using a survey instrument to establish their importance to the community of practice and their potential use to assess a Ph.D. program. Survey participants were asked to rank terms or concepts in a balanced incomplete block (BIB) design then rate, on a Likert-type scale, statements about the applicability of these terms or concepts to assessing a quality LIS Ph.D. program. Survey participants were from the Association for Library and Information Science Education (ALISE) Open Lib/Info Sci Education Forum jESSE Listserv. Of 225 survey participants affiliated with universities or schools from North America who submitted usable surveys, slightly less than two-thirds (64.4 %) were female while 35.5 % were male. Ninety-eight participants (43.6 %) were faculty, 114 (50.7 %) were Ph.D. students or candidates, and 13 (5.8 %) were in other roles. Statistical analysis of survey responses showed consistent results between the different demographic groups. The topology was validated by the results of the statistical analysis of the research data. Every component of the topology was acknowledged as very important to assess the quality of a LIS Ph.D. program. Faculty was the highest ranked item in the BIB analysis with a statistically significant difference (p < .0001) in the mean rank order from the next highest ranked item, Ph.D. students. The rank order from the BIB analysis was as follows: faculty, Ph.D. students, programs (courses) of study, teaching, learning environment, resources, and evaluation. Faculty was also the …
Usability of a Keyphrase Browsing Tool Based on a Semantic Cloud Model
The goal of this research was to facilitate the scrutiny and utilization of Web search engine retrieval results. I used a graphical keyphrase browsing interface to visualize the conceptual information space of the results, presenting document characteristics that make document relevance determinations easier.
The Adoption and Use of Electronic Information Resources by a Non-Traditional User Group: Automotive Service Technicians.
The growing complexity of machines has led to a concomitant increase in the amount and complexity of the information needed by those charged with servicing them. This, in turn, has led to a need for more robust methods for storing and distributing information and for a workforce more sophisticated in its use of information resources. As a result, the service trades have "professionalized," adopting more rigorous academic standards and developing ongoing certification programs. The current paper deals with the acceptance of advanced electronic information technology by skilled service personnel, specifically, automotive service technicians. The theoretical basis of the study is Davis' technology acceptance model. The purpose of the study is to determine the effects of three external factors on the operation of the model: age, work experience, and education/certification level. The research design is in two parts, beginning with an onsite observation and interviews to establish the environment. During the second part of the research process a survey was administered to a sample of automotive service technicians. Results indicated significant inverse relationships between age and acceptance and between experience and acceptance. A significant positive relationship was shown between education, particularly certification, and acceptance.
Functional Ontology Construction: A Pragmatic Approach to Addressing Problems Concerning the Individual and the Informing Environment
Functional ontology construction (FOC) is an approach for modeling the relationships between a user and the informing environment by means of analysis of the user's behavior and the elements of the environment that have behavioral function. The FOC approach is an application of behavior analytic techniques and concepts to problems within information science. The FOC approach is both an alternative and a compliment to the cognitive viewpoint commonly found in models of behavior in information science. The basis for the synthesis of behavior analysis and information science is a shared tradition of pragmatism between the fields. The application of behavior analytic concepts brings with it the notion of selection by consequence. Selection is examined on the biological, behavioral, and cultural levels. Two perspicuous examples of the application of the FOC modeling approach are included. The first example looks at the document functioning as a reinforcer in a human operant experimental setting. The second example is an examination of the verbal behavior of expert film analyst, Raymond Bellour, the structure of a film he analyzed, and the elements of the film's structure that had behavioral function for Bellour. The FOC approach is examined within the ontological space of information science.
Improving Recall of Browsing Sets in Image Retrieval from a Semiotics Perspective
The purpose of dissertation is to utilize connotative messages for enhancing image retrieval and browsing. By adopting semiotics as a theoretical tool, this study explores problems of image retrieval and proposes an image retrieval model. The semiotics approach conceptually demonstrates that: 1) a fundamental reason for the dissonance between retrieved images and user needs is representation of connotative messages, and 2) the image retrieval model which makes use of denotative index terms is able to facilitate users to browse connotatively related images effectively even when the users' needs are potentially expressed in the form of denotative query. Two experiments are performed for verifying the semiotic-based image retrieval model and evaluating the effectiveness of the model. As data sources, 5,199 records are collected from Artefacts Canada: Humanities by Canadian Heritage Information Network, and the candidate terms of connotation and denotation are extracted from Art & Architecture Thesaurus. The first experiment, by applying term association measures, verifies that the connotative messages of an image can be derived from denotative messages of the image. The second experiment reveals that the association thesaurus which is constructed based on the associations between connotation and denotation facilitates assigning connotative terms to image documents. In addition, the result of relevant judgments presents that the association thesaurus improves the relative recall of retrieved image documents as well as the relative recall of browsing sets. This study concludes that the association thesaurus indicating associations between connotation and denotation is able to improve the accessibility of the connotative messages. The results of the study are hoped to contribute to the conceptual knowledge of image retrieval by providing understandings of connotative messages within an image and to the practical design of image retrieval system by proposing an association thesaurus which can supplement the limitations of the current content-based image retrieval systems …
Intangible Qualities of Rare Books: Toward a Decision-Making Framework for Preservation Management in Rare Book Collections, Based Upon the Concept of the Book as Object
For rare book collections, a considerable challenge is involved in evaluating collection materials in terms of their inherent value, which includes the textual and intangible information the materials provide for the collection's users. Preservation management in rare book collections is a complex and costly process. As digitization and other technological advances in surrogate technology have provided new forms representation, new dilemmas in weighing the rare book's inherently valuable characteristics against the possibly lesser financial costs of surrogates have arisen. No model has been in wide use to guide preservation management decisions. An initial iteration of such a model is developed, based on a Delphi-like iterative questioning of a group of experts in the field of rare books. The results are used to synthesize a preservation management framework for rare book collections, and a small-scale test of the framework has been completed through two independent analyses of five rare books in a functioning collection. Utilizing a standardized template for making preservation decisions offers a variety of benefits. Preservation decisions may include prioritizing action upon the authentic objects, or developing and maintaining surrogates in lieu of retaining costly original collection materials. The framework constructed in this study provides a method for reducing the subjectivity of preservation decision-making and facilitating the development of a standard of practice for preservation management within rare book collections.
News photography image retrieval practices: Locus of control in two contexts.
This is the first known study to explore the image retrieval preferences of news photographers and news photo editors in work contexts. Survey participants (n=102) provided opinions regarding 11 photograph searching methods. The quantitative survey data were analyzed using descriptive statistics, while content analysis was used to evaluate the qualitative survey data. In addition, news photographers and news photo editors (n=11) participated in interviews. Data from the interviews were analyzed with phenomenography. The survey data demonstrated that most participants prefer searching by events taking place in the photograph, objects that exist in the photograph, photographer-provided keywords, and relevant metadata, such as the date the picture was taken. They also prefer browsing. Respondents had mixed opinions about searching by emotions elicited in a photograph, as well as the environmental conditions represented in a photograph. Participants' lowest-rated methods included color and light, lines and shapes, and depth, shadow, or perspective. They also expressed little interest in technical information about a photograph, such as shutter speed and aperture. Interview participants' opinions about the search methods reflected the survey respondents' views. They discussed other aspects of news photography as well, including the stories told by the pictures, technical concerns about digital photography, and digital archiving and preservation issues. These stated preferences for keyword searching, browsing, and photographer-provided keywords illustrate a desire for a strong internal locus of control in digital photograph archives. Such methods allow users more control over access to their photographs, while the methods deemed less favorable by survey participants offer less control. Participants believe they can best find their photographs if they can control how they index and search for them. Therefore, it would be useful to design online photograph archives that allow users to control representation and access. Future research possibilities include determining the preferences of other image retrieval system …
Implications of the inclusion of document retrieval systems as actors in a social network.
Traditionally, social network analysis (SNA) techniques enable the examination of relationships and the flow of information within networks of human members or groups of humans. This study extended traditional social network analysis to include a nonhuman group member, specifically a document retrieval system. The importance of document retrieval systems as information sources, the changes in business environments that necessitates the use of information and communication technologies, and the attempts to make computer systems more life-like, provide the reasons for considering the information system as a group member. The review of literature for this study does not encompass a single body of knowledge. Instead, several areas combined to inform this study, including social informatics for its consideration of the intersection of people and information technology, network theory and social network analysis, organizations and information, organizational culture, and finally, storytelling in organizations as a means of transferring information. The methodology included distribution of surveys to two small businesses that used the same document retrieval system, followed by semi-structured interviews of selected group members, which allowed elaboration on the survey findings. The group members rated each other and the system on four interaction criteria relating to four social networks of interest, including awareness, access, information flow, and problem solving. Traditional measures of social networks, specifically density, degree, reciprocity, transitivity, distance, degree centrality, and closeness centrality provided insight into the positioning of the nonhuman member within the social group. The human members of the group were able to respond to the survey that included the system but were not ready to consider the system as being equivalent to other human members. SNA measures positioned the system as an average member of the group, not a star, but not isolated either. Examination of the surveys or the interviews in isolation would not have given a …
Knowledge management in times of change: Tacit and explicit knowledge transfers.
This study proposed a look at the importance and challenges of knowledge management in times of great change. In order to understand the information phenomena of interest, impacts on knowledge workers and knowledge documents in times of great organizational change, the study is positioned in a major consolidation of state agencies in Texas. It pays special attention to how the changes were perceived by the knowledge workers by interviewing those that were impacted by the changes resulting from the reorganization. The overall goal is to assess knowledge management in times of great organizational change by analyzing the impact of consolidation on knowledge management in Texas's Health and Human Services agencies. The overarching research question is what happened to the knowledge management structure during this time of great change? The first research question was what was the knowledge worker environment during the time of change? The second research question was what was the knowledge management environment of the agencies during the time of change? The last research question was did consolidation of the HHS agencies diminish the ability to transition from tacit to explicit knowledge? Additionally, the study investigates how the bill that mandated the consolidation was covered in the local media as well as the actual budget and employee loss impact of the consolidation in order to better understand the impacts on knowledge workers and knowledge documents as a result of major organizational restructuring. The findings have both theoretical and practical implications for information science, knowledge management and project management.
A multi-dimensional entropy model of jazz improvisation for music information retrieval.
Jazz improvisation provides a case context for examining information in music; entropy provides a means for representing music for retrieval. Entropy measures are shown to distinguish between different improvisations on the same theme, thus demonstrating their potential for representing jazz information for analysis and retrieval. The calculated entropy measures are calibrated against human representation by means of a case study of an advanced jazz improvisation course, in which synonyms for "entropy" are frequently used by the instructor. The data sets are examined for insights in music information retrieval, music information behavior, and music representation.
A Complex Systems Model for Understanding the Causes of Corruption: Case Study - Turkey
It is attempted with this dissertation to draw an explanatory interdisciplinary framework to clarify the causes of systemic corruption. Following an intense review of political sciences, economics, and sociology literatures on the issue, a complex systems theoretical model is constructed. A political system consists of five main components: Society, interest aggregators, legislative, executive and private sector, and the human actors in these domains. It is hypothesized that when the legitimacy level of the system is low and morality of the systemic actors is flawed, selected political, social and economic incentives and opportunities that may exist within the structure of the systemic components might -individually or as a group- trigger corrupt transactions between the actors of the system. If left untouched, corruption might spread through the system by repetition and social learning eventually becoming the source of corruption itself. By eroding the already weak legitimacy and morality, it may increase the risk of corruption even further. This theoretical explanation is used to study causes of systemic corruption in the Turkish political system. Under the guidance of the complex systems theory, initial systemic conditions, -legacy of the predecessor of Turkey Ottoman Empire-, is evaluated first, and then political, social and economic factors that are presumed to be breeding corruption in contemporary Turkey is investigated. In this section, special focus is given on the formation and operation of amoral social networks and their contribution to the entrenchment of corruption within the system. Based upon the findings of the case study, the theoretical model that is informed by the literature is reformed: Thirty five system and actor level variables are identified to be related with systemic corruption and nature of the causality between them and corruption is explained. Although results of this study can not be academically generalized for obvious reasons; the analytical framework …
Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.
Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem. Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural. Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level. "Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions. Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P). Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of terrorism. The matrix for international cooperation and vulnerability assessment is expected to be used as a model for global response to cyberterrorism and cybercrime.
Makeshift Information Constructions: Information Flow and Undercover Police
This dissertation presents the social virtual interface (SVI) model, which was born out of a need to develop a viable model of the complex interactions, information flow and information seeking behaviors among undercover officers. The SVI model was created from a combination of various philosophies and models in the literature of information seeking, communication and philosophy. The questions this research paper answers are as follows: 1. Can we make use of models and concepts familiar to or drawn from Information Science to construct a model of undercover police work that effectively represents the large number of entities and relationships? and 2. Will undercover police officers recognize this model as realistic? This study used a descriptive qualitative research method to examine the research questions. An online survey and hard copy survey were distributed to police officers who had worked in an undercover capacity. In addition groups of officers were interviewed about their opinion of the SVI model. The data gathered was analyzed and the model was validated by the results of the survey and interviews.
Terrorism as a social information entity: A model for early intervention.
This dissertation studies different social aspects of terrorists and terrorist organizations in an effort to better deal with terrorism, especially in the long run. The researcher, who also worked as a Police Captain at Turkish National Police Anti-Terrorism Department, seeks solutions to today's global problem by studying both literature and a Delphi examination of a survey of 1070 imprisoned terrorists. The research questions include questions such as "What are the reasons behind terrorism?", "Why does terrorism occur?", "What ideologies provide the framework for terrorist violence?, "Why do some individuals become terrorists and others do not?" and "Under what conditions will terrorists end their violence?" The results of the study presents the complexity of the terrorism problem as a social experience and impossibility of a single solution or remedy for the global problem of terrorism. The researcher through his examination of the findings of the data, presented that terrorism is a social phenomenon with criminal consequences that needs to be dealt by means of two dimensional approaches. The first is the social dimension of terrorism and the second is the criminal dimension of terrorism. Based on this, the researcher constructed a conceptual model which addresses both of these dimensions under the titles of long-term solutions and short-term solutions. The long-term solutions deal with the social aspects of terrorism under the title of Proactive Approach to Terrorism and the short-term solutions deal with the criminal aspects of terrorism under the title of The Immediate Fight against Terrorism. The researcher constructed this model because there seems to be a tendency of not asking the question of "Why does terrorism occur?" Instead, the focus is usually on dealing with the consequences of terrorism and future terrorist threats. While it is essential that the governments need to provide the finest security measures for their societies, …
A Comparative Analysis of Style of User Interface Look and Feel in a Synchronous Computer Supported Cooperative Work Environment
The purpose of this study is to determine whether the style of a user interface (i.e., its look and feel) has an effect on the usability of a synchronous computer supported cooperative work (CSCW) environment for delivering Internet-based collaborative content. The problem motivating this study is that people who are located in different places need to be able to communicate with one another. One way to do this is by using complex computer tools that allow users to share information, documents, programs, etc. As an increasing number of business organizations require workers to use these types of complex communication tools, it is important to determine how users regard these types of tools and whether they are perceived to be useful. If a tool, or interface, is not perceived to be useful then it is often not used, or used ineffectively. As organizations strive to improve communication with and among users by providing more Internet-based collaborative environments, the users' experience in this form of delivery may be tied to a style of user interface look and feel that could negatively affect their overall acceptance and satisfaction of the collaborative environment. The significance of this study is that it applies the technology acceptance model (TAM) as a tool for evaluating style of user interface look and feel in a collaborative environment, and attempts to predict which factors of that model, perceived ease of use and/or perceived usefulness, could lead to better acceptance of collaborative tools within an organization.
The Impact of Predisposition Towards Group Work on Intention to Use a CSCW System
Groupware packages are increasingly being used to support content delivery, class discussion, student to student and student to faculty interactions and group work on projects. This research focused on groupware packages that are used to support students who are located in different places, but who are assigned group projects as part of their coursework requirements. In many cases, students are being asked to use unfamiliar technologies that are very different from those that support personal productivity. For example, computer-assisted cooperative work (CSCW) technology is different from other more traditional, stand-alone software applications because it requires the user to interact with the computer as well as other users. However, familiarity with the technology is not the only requirement for successful completion of a group assigned project. For a group to be successful, it must also have a desire to work together on the project. If this pre-requisite is not present within the group, then the technology will only create additional communication and coordination barriers. How much of an impact does each of these factors have on the acceptance of CSCW technology? The significance of this study is threefold. First, this research contributed to how a user's predisposition toward group work affects their acceptance of CSCW technology. Second, it helped identify ways to overcome some of the obstacles associated with group work and the use of CSCW technology in an academic online environment. Finally, it helped identify early adopters of CSCW software and how these users can form the critical mass required to diffuse the technology. This dissertation reports the impact of predisposition toward group work and prior computer experience on the intention to use synchronous CSCW. It was found that predisposition toward group work was not only positively associated to perceived usefulness; it was also related to intention to use. It …
Perceived features and similarity of images: An investigation into their relationships and a test of Tversky's contrast model.
The creation, storage, manipulation, and transmission of images have become less costly and more efficient. Consequently, the numbers of images and their users are growing rapidly. This poses challenges to those who organize and provide access to them. One of these challenges is similarity matching. Most current content-based image retrieval (CBIR) systems which can extract only low-level visual features such as color, shape, and texture, use similarity measures based on geometric models of similarity. However, most human similarity judgment data violate the metric axioms of these models. Tversky's (1977) contrast model, which defines similarity as a feature contrast task and equates the degree of similarity of two stimuli to a linear combination of their common and distinctive features, explains human similarity judgments much better than the geometric models. This study tested the contrast model as a conceptual framework to investigate the nature of the relationships between features and similarity of images as perceived by human judges. Data were collected from 150 participants who performed two tasks: an image description and a similarity judgment task. Qualitative methods (content analysis) and quantitative (correlational) methods were used to seek answers to four research questions related to the relationships between common and distinctive features and similarity judgments of images as well as measures of their common and distinctive features. Structural equation modeling, correlation analysis, and regression analysis confirmed the relationships between perceived features and similarity of objects hypothesized by Tversky (1977). Tversky's (1977) contrast model based upon a combination of two methods for measuring common and distinctive features, and two methods for measuring similarity produced statistically significant structural coefficients between the independent latent variables (common and distinctive features) and the dependent latent variable (similarity). This model fit the data well for a sample of 30 (435 pairs of) images and 150 participants (&#967;2 =16.97, …
Privacy Concerns and Personality Traits Influencing Online Behavior: A Structural Model
The concept of privacy has proven difficult to analyze because of its subjective nature and susceptibility to psychological and contextual influences. This study challenges the concept of privacy as a valid construct for addressing individuals' concerns regarding online disclosure of personal information, based on the premise that underlying behavioral traits offer a more reliable and temporally stable measure of privacy-oriented behavior than do snapshots of environmentally induced emotional states typically measured by opinion polls. This study investigated the relationship of personality characteristics associated with individuals' general privacy-related behavior to their online privacy behaviors and concerns. Two latent constructs, Functional Privacy Orientation and Online Privacy Orientation, were formulated. Functional Privacy Orientation is defined as a general measure of individuals' perception of control over their privacy. It was measured using the factors General Disclosiveness, Locus of Control, Generalized Trust, Risk Orientation, and Risk Propensity as indicator variables. Online Privacy Orientation is defined as a measure of individuals' perception of control over their privacy in an online environment. It was measured using the factors Willingness to Disclose Online, Level of Privacy Concern, Information Management Privacy Concerns, and Reported Online Disclosure as indicator variables. A survey questionnaire that included two new instruments to measure online disclosure and a willingness to disclose online was used to collect data from a sample of 274 adults. Indicator variables for each of the latent constructs, Functional Privacy Orientation and Online Privacy Orientation, were evaluated using corrected item-total correlations, factor analysis, and coefficient alpha. The measurement models and relationship between Functional Privacy Orientation and Online Privacy Orientation were assessed using exploratory factor analysis and structural equation modeling respectively. The structural model supported the hypothesis that Functional Privacy Orientation significantly influences Online Privacy Orientation. Theoretical, methodological, and practical implications and suggestions for analysis of privacy concerns and behavior are presented.
Quality Management in Museum Information Systems: A Case Study of ISO 9001-2000 as an Evaluative Technique
Museums are service-oriented information systems that provide access to information bearing materials contained in the museum's collections. Within museum environments, the primary vehicle for quality assurance and public accountability is the accreditation process of the American Association of Museums (AAM). Norbert Wiener founded the field of cybernetics, employing concepts of information feedback as a mechanism for system modification and control. W. Edwards Deming applied Wiener's principles to management theory, initiating the wave of change in manufacturing industries from production-driven to quality-driven systems. Today, the principles are embodied in the ISO 9000 International Standards for quality management systems (QMS), a globally-recognized set of standards, widely employed as a vehicle of quality management in manufacturing and service industries. The International Organization for Standardization defined a process for QMS registration against ISO 9001 that is similar in purpose to accreditation. This study's goals were to determine the degree of correspondence between elements of ISO 9001 and quality-related activities within museum environments, and to ascertain the relevance of ISO 9001-2000 as a technique of museum evaluation, parallel to accreditation. A content analysis compared museum activities to requirements specified in the ISO 9001-2000 International Standard. The study examined museum environment surrogates which consisted of (a) web sites of nine museum studies programs in the United States and (b) web sites of two museum professional associations, the AAM and the International Council of Museums (ICOM). Data items consisted of terms and phrases from the web sites and the associated context of each item. Affinity grouping of the data produced high degrees of correspondence to the categories and functional subcategories of ISO 9001. Many quality-related activities were found at the operational levels of museum environments, although not integrated as a QMS. If activities were unified as a QMS, the ISO 9001 Standard has potential for application as …
Information Needs of Art Museum Visitors: Real and Virtual
Museums and libraries are considered large repositories of human knowledge and human culture. They have similar missions and goals in distributing accumulated knowledge to society. Current digitization projects allow both, museums and libraries to reach a broader audience, share their resources with a variety of users. While studies of information seeking behavior, retrieval systems and metadata in library science have a long history; such research studies in museum environments are at their early experimental stage. There are few studies concerning information seeking behavior and needs of virtual museum visitors, especially with the use of images in the museums' collections available on the Web. The current study identifies preferences of a variety of user groups about the information specifics on current exhibits, museum collections metadata information, and the use of multimedia. The study of information seeking behavior of users groups of museum digital collections or cultural collections allows examination and analysis of users' information needs, and the organization of cultural information, including descriptive metadata and the quantity of information that may be required. In addition, the study delineates information needs that different categories of users may have in common: teachers in high schools, students in colleges and universities, museum professionals, art historians and researchers, and the general public. This research also compares informational and educational needs of real visitors with the needs of virtual visitors. Educational needs of real visitors are based on various studies conducted and summarized by Falk and Dierking (2000), and an evaluation of the art museum websites previously conducted to support the current study.
Cognitive Playfulness, Innovativeness, and Belief of Essentialness: Characteristics of Educators who have the Ability to Make Enduring Changes in the Integration of Technology into the Classroom Environment.
Research on the adoption of innovation is largely limited to factors affecting immediate change with few studies focusing on enduring or lasting change. The purpose of the study was to examine the personality characteristics of cognitive playfulness, innovativeness, and essentialness beliefs in educators who were able to make an enduring change in pedagogy based on the use of technology in the curriculum within their assigned classroom settings. The study utilized teachers from 33 school districts and one private school in Texas who were first-year participants in the Intel® Teach to the Future program. The research design focused on how cognitive playfulness, innovativeness, and essentialness beliefs relate to a sustained high level of information technology use in the classroom. The research questions were: 1) Are individuals who are highly playful more likely to continue to demonstrate an ability to integrate technology use in the classroom at a high level than those who are less playful? 2) Are individuals who are highly innovative more likely to continue to demonstrate an ability to integrate technology use in the classroom at a high level than those who are less innovative? 3) Are individuals who believe information technology use is critical and indispensable to their teaching more likely to continue to demonstrate an ability to integrate technology use in the classroom at a high level than those who believe it is supplemental and not essential? The findings of the current study indicated that playfulness, innovativeness, and essentialness scores as defined by the scales used were significantly correlated to an individual's sustained ability to use technology at a high level. Playfulness was related to the educator's level of innovativeness, as well. Also, educators who believed the use of technology was critical and indispensable to their instruction were more likely to be able to demonstrate a sustained …
The Effect of Information Literacy Instruction on Library Anxiety Among International Students
This study explored what effect information literacy instruction (ILI) may have on both a generalized anxiety state and library anxiety specifically. The population studied was international students using resources in a community college. Library anxiety among international students begins with certain barriers that cause anxiety (i.e., language/communication barriers, adjusting to a new education/library system and general cultural adjustments). Library Anxiety is common among college students and is characterized by feelings of negative emotions including, ruminations, tension, fear and mental disorganization (Jiao & Onwuegbuzie, 1999a). This often occurs when a student contemplates conducting research in a library and is due to any number of perceived inabilities about using the library. In order for students to become successful in their information seeking behavior this anxiety needs to be reduced. The study used two groups of international students enrolled in the English for Speakers of other Languages (ESOL) program taking credit courses. Each student completed Bostick's Library Anxiety Scale (LAS) and Spielberger's State-Trait Anxiety Inventory (STAI) to assess anxiety level before and after treatment. Subjects were given a research assignment that required them to use library resources. Treatment: Group 1 (experimental group) attended several library instruction classes (the instruction used Kuhltau's information search process model). Group 2 (control group) was in the library working on assignment but did not receive any formal library instruction. After the treatment the researcher and ESOL program instructor(s) measured the level of anxiety between groups. ANCOVA was used to analyze Hypotheses 1 and 2, which compared pretest and posttest for each group. Research assignment grades were used to analyze Hypothesis 3 comparing outcomes among the two groups. The results of the analysis ascertained that ILI was associated with reducing state and library anxiety among international students when given an assignment using library resources.
Back to Top of Screen