This study examined the differences between a 3-D, VRML search interface, similar to Cone Trees, as a front-end to Yahoo on the World Wide Web and a conventional text-based, 1-Dinterface to the same database. The study sought to determine how quickly users could find information using both interfaces, their degree of satisfaction with both search interfaces, and which interface they preferred.
The identification and examination of cultural information strategies and censorship patterns used to propagate the controversial issue of the caricatures in two separate cultural contexts was the aim of this dissertation. It explored discourse used for the coverage of this topic by one newspaper in a restrictive information context and two newspapers in a liberal information context. Message propagation in a restrictive information environment was analyzed using the English daily Kuwait Times from the Middle East; the liberal information environment of the US was analyzed using two major dailies, the New York Times and the Philadelphia Inquirer. The study also concurrently identifies and elaborates on the themes and frames through which discourse was presented exposing the cultural ideologies and premises they represent. The topic was approached with an interdisciplinary position with the support and applicability testing of Chatman's insider-outsider theory within information science and Noelle-Neumann's spiral of silence theory and Herman and Chomsky's propaganda model based in the area of mass communication. The study has also presented a new model of information censorship - circle of information censorship, emphasizing conceptual issues that influence the selection and censorship of information.
Middle school student's interaction within a digital library is explored. Issues of interface features used, obstacles encountered, search strategies and search techniques used, and representation obstacles are examined. A mechanism for evaluating user's descriptors is tested and effects of augmenting the system's resource descriptions with these descriptors on retrieval is explored. Transaction log data analysis (TLA) was used, with external corroborating achievement data provided by teachers. Analysis was conducted using quantitative and qualitative methods. Coding schemes for the failure analysis, search strategies and techniques analysis, as well as extent of match analysis between terms in student's questions and their search terms, and extent of match analysis between search terms and controlled vocabulary were developed. There are five chapters with twelve supporting appendixes. Chapter One presents an introduction to the problem and reviews the pilot study. Chapter Two presents the literature review and theoretical basis for the study. Chapter Three describes the research questions, hypotheses and methods. Chapter Four presents findings. Chapter Five presents a summary of the findings and their support of the hypotheses. Unanticipated findings, limitations, speculations, and areas of further research are indicated. Findings indicate that middle school users interact with the system in various sequences of patterns. User groups' interactions and scaffold use are influenced by the teacher's objectives for using the ADL. Users preferred to use single word searches over Boolean, phrase or natural language searches. Users tended to use a strategy of repeating the same exact search, instead of using the advanced scaffolds. A high percent of users attempted at least one search that included spelling or typographical errors, punctuation, or sequentially repeated searches. Search terms matched the DQ's in some instantiation 54% of all searches. Terms used by the system to represent the resources do not adequately represent the user groups' information needs, however, ...
This purpose of this study was to develop evidence of a relationship between law libraries and private law firm profitability for law library administrators to use when making strategic decisions that influence the value of their libraries. The highest ranked administrator at each private law firm listed on the 2008 Am Law 200 was invited to complete an online benchmarking survey. The adjusted sample population totaled 179 firms. Fifty-one valid surveys were completed for a 28.5% response rate. Descriptive and statistical analyses were conducted using 26 independent variables (law library characteristics) and a single dependent variable, Revenue per Equity Partner, developed from data published for the Am Law 200. The most significant contributions of this study are: development of important law library financial and return on investment benchmarks; a listing of characteristics that have been empirically shown to impact law firm productivity; identification of optimum reporting structure for the law library administrator. Six characteristics positively impact Revenue per Equity Partner: to whom the library Administrator reports, number of library staff per library, number of Library staff per library, range in hourly bill rate for library staff time, practice areas most often supported. Two monetary measures were also established. The cost benefit of an Am Law library to its firm is $1.00 : $1.68. Each Am Law Library staff member is worth $295,000 in Revenue per Equity Partner to a firm. Law library practitioners can use the results to support evidenced-based strategic decision making in the administration of any private law firm library. Faculty and students in law librarianship programs will have a greater understanding of how to manage law libraries and collections to provide maximum value to their law firms. Benefits to library and information science research include validation of the research design and benchmarking as a theoretical framework for ...
The purpose of this research is to develop a comprehensive, IS assessment framework using existing IS assessment theory as a base and incorporating suggestions from other disciplines. To validate the framework and to begin the investigation of current IS assessment practice, a survey instrument was developed. A small group of subject matter experts evaluated and improved the instrument. The instrument was further evaluated using a small sample of IS representatives. Results of this research include a reexamination of the IS function measurement problem using new frameworks of analyses yielding (a) guidance for the IS manager or executive on which IS measures might best fit their organization, (b) a further verification of the important measures most widely used by IS executives, (c) a comprehensive, theoretically-derived, IS assessment framework, and by (d) the enhancement of IS assessment theory by incorporating ideas from actual practice. The body of knowledge gains a comprehensive, IS assessment framework that can be further tested for usefulness and applicability. Future research is recommended to substantiate and improve on these findings. Chapter 2 is a complete survey of prior research, subdivided by relevant literature divisions, such as organizational effectiveness, quality management, and IS assessment. Chapter 3 includes development of and support for the research questions, IS assessment framework, and the research model. Chapter 4 describes how the research was conducted. It includes a brief justification for the research approach, a description of how the framework was evaluated, a description of how the survey instrument was developed and evaluated, a description of the participants and how they were selected, a synopsis of the data collection procedures, a brief description of follow-up procedures, and a summary. Chapter 5 presents the results of the research. Chapter 6 is a summary and conclusion of the research. Finally, included in the appendices are definitions ...
This dissertation refines knowledge synthesis from publicly accessible databases, based on the model of D.R. Swanson. Knowledge synthesis endeavors bring together two or more non-interactive literatures to create combinatorial research data on a specific topic. In this endeavor the biomedical literature was searched on the anti-neoplastic agent nordihydroguaiaretic acid (NDGA) for its potential role as a functional food in the chemoprevention of breast cancer. Bibliometric cocitation was utilized to identify complementary but non-interactive literatures in the disciplines of biomedicine and dietary science. The continuing specialization and fragmentation of the cancer literature degenerates the potential usefulness of cross-disciplinary research and information. As the biomedical sciences become more specialized the potential increases for isolation of discoveries and for failures to connect science to the needs of the people. Within the information science discipline several techniques are available to bridge the isolation between discoveries recorded in different sets of literatures. Electronic database searching with combinatorial keyword entries, syllogistic modeling and bibliometric author cocitation analysis are the principle techniques applied in this endeavor. The research questions are addressed to the absence or presence of human in vivo research on breast cancer with the potentially chemopreventative functional food NDGA. Utilizing a syllogistic model the literatures of functional foods, nordihydroguaiaretic acid and breast cancer were searched with designated combinatorial keywords. The documents retrieved were subjected to author cocitation analysis to demonstrate disjointness or connectivity of the two complementary literatures. The results demonstrated a possible preventative relationship between breast cancer in women and nordihydroguaiaretic acid, a phytochemical antioxidant and potential functional food. The results of this study are consistent with D.R. Swanson's pioneering work in knowledge synthesis. Swanson's methods can be used to identify non-interactive, disjoint literatures. Continuing support for his techniques has been demonstrated.
The current research sought to gain in-depth insights into the information-seeking behavior of Turkish National Police digital evidence examiners (DEEs); to explore the information sources that DEEs use and the factors affecting their decisions about source selection. Factors that affect information source selection and use by DEEs are: accreditation, workload, type of information, time, cost, availability, reliability/scientific importance, up-to-date data, prior experience with the source, relevance, interactivity and importance. The Internet was the information source most commonly used by participants during the examination stage; other sources included forums, experts, colleagues, forensic tools/kits and books. During the analysis stage, the most frequently mentioned information source was the investigation file, containing information about the elements of the crime; other sources included: personal experience, experts, detectives, the Internet, clients, professional training, the prosecutor, evidence submission forms, in-lab manuals, forums and colleagues. During the report-writing stage, most DEEs used in-lab manuals and report templates as information sources, but previously written reports, editing software, and colleagues were also used to obtain information about the format, style and language of reports as legal documents.
Collaboration appears to be a magical solution for many problems when there is scarcity of resources, lack of knowledge or skills, and/or environmental threats. However, there is little knowledge about the nature of collaboration. A holistic conceptual framework was developed for the collaborative process, and the conceptualization process used systems thinking approach. The author has selectively chosen conceptualizations and/or research by a limited subset of scholars whose ideas appeared to be the most relevant and useful to explore the type of collaboration studied here. In other words, the selection of the literature was based on an eclectic selection. Multiple cases were used in this research to understand the factors that are components of collaborative effort among non-profit organizations and the relationships among those factors. This study also investigated the stages of collaborative process. Data were collected from 54 participants who were partners in collaborate projects funded by the Institute of Museum and Library Services (IMLS). Among these 54 participants, 50 answered the online questionnaire and 38 received the telephone interviews. The data collected was analyzed using cluster analysis, multidimensional scaling, internal consistency reliability, and descriptive statistics. The component factors of collaboration were grouped by the following seven concepts: trustworthiness, competence, dependency, misunderstanding and/or conflict, complexity, commitment and mechanism of coordination. This study showed twelve relationships among these factors. For instance, different points of view and partners' capacity to maintain inter-organizational relationships were found to be opposite concepts. In addition, the findings in this study indicate that 84% of participants reported the presence of the five pre-defined stages: execution, networking, definition, relationship, and common evaluation.
Handheld computers may hold the possibility for a one-to-one computer: student ratio. The impact of the use of Palm® (Palm, Inc.) handhelds on information acquisition and use by 5th grade students in a North Texas school during a class research project was investigated. Five research questions were examined using observation, interviews, surveys, and document analysis. Are there differences in information gathering and use with the Palm between gifted, dyslexic, and regular learners? What relevance criteria do students use to evaluate a web site to determine whether to download the site to the Palm and afterwards whether to use the downloaded site's information in the report? How do the Palms affect the writing process? Do the animations and concept maps produced on the Palm demonstrate understanding of the intended concepts? Are there significant differences in results (i.e., final products grade) between Palm users and non-Palm users? Three groups of learners in the class, gifted, dyslexic, and regular learners, participated in the study. The regular and dyslexic students reported using Web sites that had not been downloaded to the Palm. Students reported several factors used to decide whether to download Web sites, but the predominant deciding factor was the amount of information. The students used a combination of writing on paper and the Palm in the preparation of the report. Many students flipped between two programs, FreeWrite and Fling-It, finding information and then writing the facts into the report. The peer review process was more difficult with the Palm. Most students had more grammatical errors in this research report than in previous research projects. By creating animated drawings on the Palm handheld, the students demonstrated their understanding of the invention though sometimes the media or the student's drawing skills limited the quality of the final product. Creating the animations was motivational and ...
Information Technology (IT) is often viewed as a resource that is capable of enhancing organizational performance. However, it is difficult for organizations to measure the actual contribution of IT investments. Despite an abundance of literature, there is an insufficiency of generally applicable frameworks and instruments to help organizations definitively assess the relationship among organizational performance, IT-business alignment, and IT governance. Previous studies have emphasized IT-business alignment as an important enabler of organizational effectiveness; however, the direct and indirect effects of IT governance have not been incorporated into these studies. The purpose of this study was (1) to propose a new model that defines the relationships among IT governance, IT-business alignment, and organizational performance, (2) to develop and validate measures for the IT governance and IT-business alignment constructs, and (3) to test this IT Governance-Alignment-Performance or "IT GAP" model. This study made some novel contributions to the understanding of the factors affecting organizational performance. The quest for IT-business alignment in the MIS literature has been based on the presumption that IT contributes directly to organizational performance. However, this study found that although IT-business alignment does contribute to organizational performance, IT governance is an important antecedent of both IT-business alignment and organizational performance. The major contributions of this work are the development and validation of uni-dimensional scales for both IT-business alignment and IT governance, and the confirmation of the validity of the IT GAP model to explain the hypothesized relationships among the three constructs. Future studies may improve upon this research by using different organizations settings, industries, and stakeholders. This study indicates that in order for organizations to improve the value, contribution, and alignment of IT investments they first need to improve the ways in which they govern their IT activities and the processes and mechanisms by which IT decisions are made.
The test scores of spatial ability for women lag behind those of men in many spatial tests. On the Mental Rotations Test (MRT), a significant gender gap has existed for over 20 years and continues to exist. High spatial ability has been linked to efficiencies in typical computing tasks including Web and database searching, text editing, and computer programming. The relationships between the components of visuospatial ability and performance are complex. However, research strongly indicates that a connection exists, and further research is necessary to determine the interactions between the variables of environment, genetics, and spatial training. Spatial experience can enhance spatial skills. However, to what extent spatial skills can be enhanced in female adolescents through a spatial curriculum to reduce the gap in scores has not been fully researched, nor has the impact of spatial skill on information seeking. This research project investigated spatial skill in adolescent females by examining (1) the extent to which the intervention of teaching a spatial curriculum in a single-sex setting could improve mental rotation test scores, and (2) the impact of spatial skills on an information seeking task in a single-sex setting. The extent to which a spatial visualization curriculum can improve MRT scores from a pretest to a posttest for girls was the first factor examined using a spatial visualization curriculum. The information seeking task used 4 tasks from a doctoral study and utilized the scholarly journal database JSTOR® (JSTOR, Ann Arbor, MI, www.jstor.org).
Human auditory perception is suited to receiving and interpreting information from the environment but this knowledge has not been used extensively in designing computer-based information exploration tools. It is not known which aspects of sound are useful for accurately conveying information in an auditory display. An auditory display was created using PD, a graphical programming language used primarily to manipulate digital sound. The interface for the auditory display was a blank window. When the cursor is moved around in this window, the sound generated would changed based on the underlying data value at any given point. An experiment was conducted to determine which attribute of sound most accurately represents data values in an auditory display. The four attributes of sound tested were frequency-sine waveform, frequency-sawtooth waveform, loudness and tempo. 24 subjects were given the task of finding the highest data point using sound alone using each of the four sound treatments. Three dependent variables were measured: distance accuracy, numeric accuracy, and time on task. Repeated measures ANOVA procedures conducted on these variables did not rise to the level of statistical significance (α=.05). None of the sound treatments was more accurate than the other as representing the underlying data values. 52% of the trials were accurate within 50 pixels of the highest data point (target). An interesting finding was the tendency for the frequency-sin waveform to be used in the least accurate trial attempts (38%). Loudness, on the other hand, accounted for very few (12.5%) of the least accurate trial attempts. In completing the experimental task, four different search techniques were employed by the subjects: perimeter, parallel sweep, sector, and quadrant. The perimeter technique was the most commonly used.
Advice for Web designers often includes an admonition to use short, scannable, bullet-pointed text, reflecting the common belief that browsing the Web most often involves scanning rather than reading. Literature from several disciplines focuses on the myriad combinations of factors related to online reading but studies of the users' interests and motivations appear to offer a more promising avenue for understanding how users utilize information on Web pages. This study utilized the modified Personal Involvement Inventory (PII), a ten-item instrument used primarily in the marketing and advertising fields, to measure interest and motivation toward a topic presented on the Web. Two sites were constructed from Reader's Digest Association, Inc. online articles and a program written to track students' use of the site. Behavior was measured by the initial choice of short versus longer versions of the main page, the number of pages visited and the amount of time spent on the site. Data were gathered from students at a small, private university in the southwest part of the United States to answer six hypotheses which posited that subjects with higher involvement in a topic presented on the Web and a more positive attitude toward the Web would tend to select the longer text version, visit more pages, and spend more time on the site. While attitude toward the Web did not correlate significantly with any of the behavioral factors, the level of involvement was associated with the use of the sites in two of three hypotheses, but only partially in the manner hypothesized. Increased involvement with a Web topic did correlate with the choice of a longer, more detailed initial Web page, but was inversely related to the number of pages viewed so that the higher the involvement, the fewer pages visited. An additional indicator of usage, the average amount ...
Data warehousing (DW) in the last decade has become the technology of choice for building data management infrastructures to provide organizations the decision-making capabilities needed to effectively carry out its activities. Despite its phenomenal growth and importance to organizations the rate of DW implementation success has been less than stellar. Many DW implementation projects fail due to technical or organizational reasons. There has been limited research on organizational factors and their role in DW implementations. It is important to understand the role and impact of both technical but organizational factors in DW implementations and their relative importance to implementation performance. A research model was developed to test the significance of technical and organizational factors in the three phases of implementation with DW implementation performance. The independent variables were technical (data, technology, and expertise) and organizational (management, goals, users, organization). The dependent variable was performance (content, accuracy, format, ease of use, and timeliness). The data collection method was a Web based survey of DW implementers and DW users sampled (26) from a population of 108 identified DW implementations. Regression was used as the multivariate statistical technique to analyze the data. The results show that organization factors are significantly related to performance. Also, that some variables in the post-implementation phase have a significant relationship with performance. Based on the results of the tests the model was revised to reflect the relative impact of technical and organizational factors on DW performance. Results suggest that in some cases organizational factors have a significant relationship with DW implementation performance. The implications and interpretation of these results provide researchers and practitioners' insights and a new perspective in the area of DW implementations.
The September 11 terrorist attacks pointed out the lack of information sharing between law enforcement agencies as a potential threat to sound law enforcement in the United States. Therefore, many law enforcement agencies as well as the federal government have been initiating information sharing systems among law enforcement agencies to eradicate the information sharing problem. One of the systems established by Homeland Security is the North Central Texas Fusion Center (NCTFC). This study evaluates the NCTFC by utilizing user acceptance methodology. The unified theory of acceptance and the use of technology is used as a theoretical framework for this study. Within the study, user acceptance literature is examined and various models and theories are discussed. Furthermore, a brief information regarding the intelligence work done by law enforcement agencies are explained. In addition to the NCTFC, several major law enforcement information systems are introduced. The data for this study comes from the users of the NCTFC across the north central Texas region. Surveys and interviews are used to triangulate data. It is found in this study that performance expectancy and effort expectancy are important indicators of system use. Furthermore, outreach and needs assessment are important factors in establishing systems. The results of the study offer valuable input for NCTFC administrators, law enforcement officials, and future researchers.
Inquiry about ideal library was sought by interdisciplinary approach from human competence derived from performance engineering by Gilbert (1978), and the library information policy by Wilson (1977). With Wilson's insights into the field of library and information science (LIS), this work demonstrated the synthesis of Wilson and Gilbert: engineering as common ground. One of the central concerns in LIS, utilization of knowledge, is re-conceptualized as Gilbert's view of performance, which reflected at different vantage points. Four leisurely theorems are introduced for his view of performance engineering, which produce human competence. The performance matrix is the application tool that represents Gilbert's theorems of performance engineering. It is used to clarify vantage points about the library, and constructed a model of the performance engineering system of ideal library. Based upon the model, two applications were made. One is to apply the performance matrix to the existing academic library. Another is to apply the performance matrix for building a special collection. These two applications show that the performance matrix is capable to analyze existing performance system as well as designing and building a performance system.
Seminal works on leadership, including those in librarianship define a traditional model of interaction between leaders and followers without reference to the information technology-driven environment. In addition, remote leadership indicates a different model from the traditional model, one that is focused on the interaction of leaders and their staff through digital technology. Although leaders still use face-to-face interaction, due to varied work schedules or job responsibilities, they also recognize the need to lead employees remotely. Leadership studies in library literature have not addressed how library leaders use information technology to lead employees remotely, nor have these studies addressed remote leadership and remote employees, except for some articles on telecommuting. As a result, this research was conducted to address this gap, providing an exploratory foundation of emergent patterns of remote leadership with its associated leadership dimensions rooted in personality traits, behaviors, and skills. Quantitative and qualitative data were obtained from a small sample size of academic and public-library leaders in the United States who participated in a Web-based survey designed specifically for this study, limiting generalizations. Factor analysis was the principal methodology used to obtain findings. Its composite factor scores were also used in the t-test and chi-square analyses. This study identifies some emergent patterns of remote leadership in the library and information-science field, exploring whether library leaders use information technology to be effective remote leaders in a technology-driven environment, and whether existing leadership attributes could be identified as part of the remote-leadership model. Because this study's findings indicated that library leaders are not quite the traditional leader but are not fully integrated into remote leadership, it becomes apparent that they would function with a blend of both face-to-face and electronic interactions, due to the nature of library work. Additionally, this research revealed underlying issues and challenges faced by library leaders ...
Information literacy has become more important as more information is produced and communication has become easier. Better information skills are vital for individuals working in governmental organizations as well as in the business sector. Employees are expected to be confident and competent in interacting with information in their workplaces in order to deliver better service to customers and to the public. This study examines the differences in information literacy skills (ILS), computer literacy skills (CLS), and frequencies of use of information sources (FIS) among police officers, based on their socio-demographic characteristics, namely education, departmental affiliation, ranks, and experience. Information literacy process models developed in an educational environment are combined to explore information literacy process in the workplace. Bivariate and multivariate analyses indicated significant differences of ILS and CLS based on education, departmental affiliation, and ranks but no difference for experience. In addition, there were differences of FIS for all demographic variables except departmental affiliation. The findings of the study may guide both future researchers in the process of developing new models in understanding information literacy process and the managers in police organizations in planning better training programs by considering information and computer literacy skills and use of information sources of police officers.
The recent advances in mobile computing and distributed multimedia systems allow mobile hosts (clients) to access wireless multimedia Data at anywhere and at anytime. In accessing multimedia information on the distributed multimedia servers from wireless personal communication service systems, a channel assignment problem and synchronization problems should be solved efficiently. Recent demand for mobile telephone service have been growing rapidly while the electro-magnetic spectrum of frequencies allocated for this purpose remain limited. Any solution to the channel assignment problem is subject to this limitation, as well as the interference constraint between adjacent channels in the spectrum. Channel allocation schemes provide a flexible and efficient access to bandwidth in wireless and mobile communication systems. In this dissertation, both an efficient distributed algorithm for dynamic channel allocation based upon mutual exclusion model, and an efficient distributed synchronization algorithm using Quasi-sink for wireless and mobile multimedia systems to ensure and facilitate mobile client access to multimedia objects are proposed. Algorithm's performance with several channel systems using different types of call arrival patterns is determined analytically. A set of simulation experiments to evaluate the performance of our scheme using message complexity and buffer usage at each frame arrival time.
This study investigated the information seeking process of the networked generation youth. Specifically, I examined the cognitive, affective, and physical information seeking behaviors and problem solving techniques adolescent student users of the networked environment utilize to solve information needs. Grounded in the theoretical context of the information seeking process in the networked environment, the research extended the user-centered approach to modeling the information seeking process of networked generation youth. A mixed model research design was used to address the research questions. Phase 1 used an online questionnaire to solicit information from 125 students in Grades 7-12 regarding their understanding and use of networked environments, information seeking skills, and problem solving techniques. Phase 2 observed 12 students, two from each grade level, to gain an understanding into the information seeking process of networked generation youth. Participants completed information seeking scenarios of varying levels of complexity. As the participants completed the scenario, they engaged in talk-aloud verbal protocol to describe and explain their behaviors and techniques as they advanced through their information seeking process. Semi-structured interviews were conducted which provided an opportunity for the participants to clarify their information seeking experience. A profile of students' networked environment knowledge and use in relationship to their information seeking process was created. Findings suggested that knowledge and experience influence networked generation youth's information seeking process in the networked environment. A subset of students were found to be experienced information seekers who applied various cognitive, affective, and physical information seeking behaviors and behavioral actions that guide them through their information seeking process. The study presented a preliminary model of the networked generation youth's information seeking process. The model provides a detailed map to networked generation youth's information seeking and problem solving. I bring to light experienced users successful behaviors, as well as areas where all students ...
Computer-Support Cooperative Work (CSCW) reflects the change in emphasis from using computers to solve problems to using computers to facilitate human interactions. Most studies, however, have focused on the use of the technology rather than on the human-human interaction (HHI) in these environments due to: the varied perspectives of the investigators; and the lack of a consistent variables. Although numerous studies exist on a variety of products, only limited research has been conducted with the most prevalent of the technologies in the marketplace, Lotus Notes™. This field study, conducted using Lotus Notes™, operationalizes a model proposed, but not tested, for the study of group decision-making in CSCW environments put forth by Kraemer and Pinsonneault (1990). This study examines the use of CSCW in the group decision-making process, the participation rate for group decision-making in CSCW environments, and the criteria for determining quality in group decisions in CSCW environments. The study also proposes a new perspective for examining technology using the human context, recommends extensions for the group study framework and explores areas for future research.
The applicability of SERVPERF as a tool for judging the quality of services used by biomedical information professionals was tested using standard statistical procedures. Data was gathered nationally via a combination of electronic and non-electronic forms, from Area Health Education Center (AHEC) information professionals and the results consolidated to provide information for the study. It was determined that SERVPERF was applicable in making judgements about service quality for AHEC information professionals. Their perceptions about service quality tended to have a greater influence than did their level of actual satisfaction on whether or not they planned to use a particular service in the future. There is currently no validated tool available to ascertain the quality of services offered to these valuable members of the rural health care team. This dissertation proposes to provide such a tool, and to serve as a guide or template for other professionals seeking a means to judge service quality in their own disciplines.
It is hypothesized that useful diagnostic information can reside in the wrong answers of multiple-choice tests, and that properly designed distractors can yield indications of misinformation and missing information in algorithmic reasoning on the part of the test taker. In addition to summarizing the literature regarding diagnostic research as opposed to scoring research, this study proposes a methodology for analyzing test results and compares the findings with those from the research of Birenbaum and Tatsuoka and others. The proposed method identifies the conditions of misinformation and missing information, and it contains a statistical compensation for careless errors. Strengths and weaknesses of the method are explored, and suggestions for further research are offered.
In this study, computer human interaction factors are examined as a possible source of information to aid in the operation and management of local area computer networks. Users' perceptions of computer performance and response time are evaluated in relation to specific modifications in the information organization of a file server in a local area network configuration running in Novell 3.11.
The objective of this study was to provide information on the characteristics of a specific group of international college students from a developing country in order to assist system managers in the selection of OPACs.
This study sought to determine whether or not factors such as relative advantage, compatibility, result demonstrability, ease of use, image, visibility, and voluntariness were involved in users' adoption of a refereed Web-based journal for informational, citation, and publication purposes. In addition, the study tested whether or not exposure to a prototype of a refereed Web-based journal would change users' perceptions concerning how well they would interact with the journal.
The goal of this study was to determine if performance-based tests should be routinely administered to students in computer application courses. The purpose was to determine the most appropriate mode of testing for individuals taking a computer applications course. The study is divided into areas of assessment, personality traits, and computer attitudes.
Museums and libraries are considered large repositories of human knowledge and human culture. They have similar missions and goals in distributing accumulated knowledge to society. Current digitization projects allow both, museums and libraries to reach a broader audience, share their resources with a variety of users. While studies of information seeking behavior, retrieval systems and metadata in library science have a long history; such research studies in museum environments are at their early experimental stage. There are few studies concerning information seeking behavior and needs of virtual museum visitors, especially with the use of images in the museums' collections available on the Web. The current study identifies preferences of a variety of user groups about the information specifics on current exhibits, museum collections metadata information, and the use of multimedia. The study of information seeking behavior of users groups of museum digital collections or cultural collections allows examination and analysis of users' information needs, and the organization of cultural information, including descriptive metadata and the quantity of information that may be required. In addition, the study delineates information needs that different categories of users may have in common: teachers in high schools, students in colleges and universities, museum professionals, art historians and researchers, and the general public. This research also compares informational and educational needs of real visitors with the needs of virtual visitors. Educational needs of real visitors are based on various studies conducted and summarized by Falk and Dierking (2000), and an evaluation of the art museum websites previously conducted to support the current study.
By conducting this theory-based empirical study, gathering data from working negotiators in the US and Canada, I have determined what primary dynamic activities, communication skills, and negotiation tools are used by hostage/crisis negotiators. Negotiators implement their negotiation and decision strategies differently depending on whether the situations they deal with are instrumental or expressive. I have determined which elements of negotiations and factors affecting negotiations differ while handling instrumental and expressive hostage situations. I found that the collected data did not reveal any significant relationship between handling instrumental/expressive hostage situations differently and belief in the elements of Brenda Dervin's and Shannon-Weaver's theories. I have also determined that the belief in the elements of the Dervin's and Shannon-Weaver's theories is workable and practical for negotiators to use. Based on the above findings, the model suggested by this research adds the elements and directives of Dervin's and Shannon-Weaver's models to the common approach used by the negotiators. This revised model suggests that the negotiators pay attention to the dynamics of the interactions presented between the two parties: the negotiators themselves and hostage takers. The revised model also recommends that the negotiators focus on not only the hostage takers behavioral characteristics, psychological conditions, and criminal history but also on the meaning of the sent message and the interaction itself as performed between the two parties. This perspective enables the negotiators to look at the negotiation process as information and communication process. We are not ignoring the fact that hostage negotiation is a format of extreme information management. By looking at such an extreme case, we can add to our understanding of Dervin's and Shannon-Weaver's perspectives in order to see the hostage negotiation process from a wider perspective. The revised model is not an alternative approach to the common approach most negotiators use. Instead, the ...
This research investigated banner ads on the World Wide Web, specifically the types of messages used in those ads and the effectiveness of the ads as seen by their intended audience. The focus was on health-related banner advertisements targeting senior citizens. The study first sought to determine the frequency of appearance of those ads when classified into categories of compliance-gaining tactics provided by research scholars. Second, the study explored the relative perceived effectiveness among those categories. Two graduate students from a Central Texas university sorted text messages into predetermined compliance-gaining categories. Chi square tests looked for significant differences in the frequencies of banner ads in each category. Forty-five senior citizens from the Central Texas area completed surveys regarding the perceived effectiveness of a randomly ordered, randomly selected set of categorized banner ads. A repeated measures test attempted to determine whether some compliance-gaining strategies used in health-related banner ads were perceived as more effective than others. The hypothesis stated that there would be differences in frequencies of compliance-gaining strategies used among the compliance-gaining categories in health-related banner ads for senior citizens. The hypothesis was supported. The research question asked if some categories of compliance-gaining strategies used in health-related banner ads were perceived as more effective than others by senior citizens. There was no evidence that senior citizens perceived any compliance-gaining category as being more effective than any other. However, post hoc analyses revealed trends in the types of compliance-gaining messages senior citizens perceived as more effective. These trends provide a basis for directional predictions in future studies.
This study explores the use of the information theory entropy equation in representations of videos for children. The calculated rates of information in the videos are calibrated to the corresponding perceived rates of information as elicited from the twelve 7 to 10 year old girls who were shown video documents. Entropy measures are calculated for several video elements: set time, set incidence, verbal time, verbal incidence, set constraint, nonverbal dependence, and character appearance. As hypothesized, mechanically calculated entropy measure (CEM) was found to be sufficiently similar to perceived entropy measure (PEM) made by children so that they can be used as useful and predictive elements of representations of children’s videos. The relationships between the CEM and the PEM show that CEM could stand for PEM in order to enrich representations for video documents for this age group. Speculations on transferring the CEM to PEM calibration to different age groups and different document types are made, as well as further implications for the field of information science.
Medical educators advocate the need for medical students to acquire information management skills, including the ability to search the MEDLINE database. There has been no published validated method available to use for assessing medical students' MEDLINE information retrieval skills. This research proposes and evaluates a method, designed as the MEDLINE Metric, for assessing medical students' search skills. MEDLINE Metric consists of: (a) the development, by experts, of realistic clinical scenarios that include highly constructed search questions designed to test defined search skills; (b) timed tasks (searches) completed by subjects; (c) the evaluation of search results; and (d) instructive feedback. A goal is to offer medical educators a valid, reliable, and feasible way to judge mastery of information searching skill by measuring results (search retrieval) rather than process (search behavior) or cognition (knowledge about searching). Following a documented procedure for test development, search specialists and medical content experts formulated six clinical search scenarios and questions. One hundred and forty-five subjects completed the six-item test under timed conditions. Subjects represented a wide range of MEDLINE search expertise. One hundred twenty complete cases were used, representing 53 second-year medical students (44%), 47 fourth-year medical students (39%), and 20 medical librarians (17%). Data related to educational level, search training, search experience, confidence in retrieval, difficulty of search, and score were analyzed. Evidence supporting the validity of the method includes the agreement by experts about the skills and knowledge necessary to successfully retrieve information relevant to a clinical question from the MEDLINE database. Also, the test discriminated among different performance levels. There were statistically significant, positive relationships between test score and level of education, self-reported previous MEDLINE training, and self-reported previous search experience. The findings from this study suggest that MEDLINE Metric is a valid method for constructing and administering a performance-based test to identify ...
Digital preservation is a significant challenge for cultural heritage institutions and other repositories of digital information resources. Recognizing the critical role of metadata in any successful digital preservation strategy, the Preservation Metadata Implementation Strategies (PREMIS) has been extremely influential on providing a "core" set of preservation metadata elements that support the digital preservation process. However, there is no evidence, in the form of previous research, as to what factors explain and predict the level of adoption of PREMIS. This research focused on identifying factors that affect the adoption of PREMIS in cultural heritage institutions. This study employed a web-based survey to collect data from 123 participants in 20 country as well as a semi-structured, follow-up telephone interview with a smaller sample of the survey respondents. Roger's diffusion of innovation theory was used as a theoretical framework. The main constructs considered for the study were relative advantage, compatibility, complexity, trialability, observability, and institution readiness. The study yielded both qualitative and quantitative data, and analysis showed that all six factors influence the adoption of PREMIS in varying degrees. Results of a regression analysis of adoption level on the six factors showed a statistically significant relationship. The R2 value for the model was .528, which means that 52.8% of the variance in PREMIS adoption was explained by a combination of the six factors. Considering the complexity of issue, this study has important implications for future research on preservation metadata and provides recommendations for researchers and stakeholders engaged in metadata standards development efforts.
The purpose of this study was to explore the correlation between self-perceived information seeking skills and self-esteem in adolescents and, further, to determine whether this correlation varied according to race and gender. Tenth-grade students from three public high schools in a Midwestern city were given two instruments. Self-perceived information seeking skills were measured using a modified version of the Information Skills Checklist from High Plains Regional Technology in Education Consortium's Profiler website. Self-esteem was measured by the Tennessee Self-Concept Scale, which is designed for students 12 years of age and over. The scale has six separate measures of self-esteem: physical, moral-ethical self, personal self, family self, social self and academic self. These six measures are used to determine overall level of self-esteem. The results showed a statistically significant correlation between self-perceived information seeking skills and at least one facet of self-esteem for all groups measured, with one exception. African American males were the only adolescents to show no correlation between scores from these two instruments. It is hoped that this research will ultimately be used to develop policies regarding the development of information seeking skills in disenfranchised groups.
This study explores distinct levels of meaning from images of picture books perceived by 3- to 5-year-old children and investigates how the certain visual perception factors influence children's meaning making and if these factors are correlated. The literature review supports associations among visual perception, information, picture books, meaning, and children. Visual perception serves as the first channel that filters and interprets visual information, and picture books provide visual and verbal experience for children, who constantly search for meaning. Children age 3 to 5 years are potential users of picture books because pictorial information is considered useful to children's learning tasks. Previous research reveals that various factors influence visual perception, and meaning has been mostly associated with its semantic significance in information retrieval. In information science, little research has focused on young children's own way of categorizing information, especially visual information. In order to investigate the distinct levels of meaning perceived by children, the investigation employed both qualitative and quantitative methods including unobtrusive and participant observation, factor analysis, content analysis, and case study. The result of this study contributes to understanding the cognitive process of children related to visual literacy and their interpreting visual information in a digital environment.
This targeted research study, carried out by an officer of the Turkish National Police (TNP), investigated the perceptions and beliefs of TNP trainers and trainees towards the potential adoption and implementation of e-learning technology for in-service police training. Utilizing diffusion and innovation theory (DOI) (Rogers, 1995) and the conceptual technology integration process model (CTIM) (Nicolle, 2005), two different surveys were administered; one to the trainers and one to the trainees. The factor analyses revealed three shared trainer and trainee perceptions: A positive perception towards e-learning, personally and for the TNP; a belief in the importance of administrative support for e-learning integration; and the belief in importance of appropriate resources to facilitate integration and maintain implementation. Three major recommendations were made for the TNP. First, the research findings could be used as a road map by the TNP Education Department to provide a more flexible system to disseminate in-service training information. The second is to establish two-way channels of communication between the administration and the TNP personnel to efficiently operationalize the adoption and integration of e-learning technology. The third is the administrative provision of necessary hardware, software, and technical support.
The Internet is the most common communication and research tool worldwide. Perusal of the World Wide Web quickly reveals the variety of information available. Internet adoption can be considered the late 20th century's most important event. In academic environments today, Internet use among faculty members has been widely expanded, with professors now integrating Internet technology into classroom activities. Imam Muhammad Bin Saud Islamic University (IMSU) is a pioneering public university in Saudi Arabia. Until recently, some faculty members at IMSU were unable to access the Internet through the university. It is important to study the effects of this delay on faculty members regarding research and academic activities. This study identified the statistically significant differences in demographic characteristics of Internet adopters and non-adopters among faculty members at IMSU, examined whether faculty members' perceptions of the Internet affected adoption, determined if the university administration's decisions impacted faulty members' decisions to adopt the Internet, identified factors motivating faculty members to adopt the Internet, identified obstacles influencing faculty members' decisions to use the Internet, and determined whether innovation characteristics as perceived by faculty members predicted Internet adoption. Using Rogers' diffusion of innovation theory, the influence of eight attributes were examined regarding Internet adoption among IMSU faculty members. Multiple regression and chi-square techniques were conducted to analyze the data and answer research questions. Statistically significant differences were identified among Internet adopters and non-adopters regarding gender, age, academic rank, discipline, and English proficiency. The data revealed 54.7% of IMSU faulty members used the Internet for research and academic activities twice a month or less, indicating a low Internet adoption rate. Statistically significant differences were noted among adopters and non-adopters relative to income level and English proficiency. Multiple regression analysis showed that all attributes of innovation individually predicted Internet adoption. The combination of all attributes indicated the ...
The primary focus of this dissertation was to explore students' perceptions of adopting Web 2.0 applications at the School of Basic Education (SBE) in Kuwait. Although Web 2.0 applications are becoming more popular among the digital generation, there is still no evidence of students' perceptions of adopting the innovation of Web 2.0 technologies in Kuwait. The problem this study addresses is that the current status of Web 2.0 technologies usage by academic students has remained educationally unknown in Kuwait. Therefore, there was a need to investigate the extent to which academic students in SBE are aware of and their usage of Web 2.0 technologies, as well as the factors and obstacles that affect using these technologies. Rogers' diffusion of innovation theory (DoI) is employed in this study to specify the factors that influence student perceptions of adopting Web 2.0 applications as learning tools. Data used in this dissertation was gathered via a survey instrument from 350 students at the SBE and was statistically analyzed to find out the answers of the research questions. This study identified the low rate of Web 2.0 awareness and adoption by the students. Descriptive statistical analysis, such as mean scores and standard deviation, were used to analyze and conclude the findings. In the rates of awareness and adoption of Web 2.0, this study also identified no statistically significant differences between the groups of all the demographic variables except the academic field. The statistically significant differences were identified between the academic variables before and after recoding the academic fields into 5 groups. A t-test and one-way ANOVA were used to determine the statistical significance. Several factors were examined in the study to identify their influence on the rate of adoption. The factors included the rate of awareness, Rogers' attributes of innovations, and the obstacles to adopt ...
This exploratory research focused on a problem stated years ago by Vannevar Bush: "The problem is how creative men think, and what can be done to help them think." The study explored the scholarly work process and the use of computer tools to augment thinking. Based on a review of several related literatures, a framework of 7 major categories and 28 subcategories of scholarly thinking was proposed. The literature was used to predict problems scholars have in organizing their information, potential solutions, and specific computer tool features to augment scholarly thinking. Info Select, a personal information manager with most of these features (text and outline processing, sophisticated searching and organizing), was chosen as a potential tool for thinking. The study looked at how six scholars (faculty and doctoral students in social science fields at three universities) organized information using Info Select as a personal documentation system for scholarly work. These multiple case studies involved four in-depth, focused interviews, written evaluations, direct observation, and analysis of computer logs and files collected over a 3- to 6-month period. A content analysis of interviews and journals supported the proposed AfFORD-W taxonomy: Scholarly work activities consisted of Adding, Filing, Finding, Organizing, Reminding, and Displaying information to produce a Written product. Very few activities fell outside this framework, and activities were distributed evenly across all categories. Problems, needs, and likes mentioned by scholars, however, clustered mainly in the filing, finding, and organizing categories. All problems were related to human memory. Both predictions and research findings imply a need for tools that support information storage and retrieval in personal documentation systems, for references and notes, with fast and easy input of source material. A computer tool for thinking should support categorizing and organizing, reorganizing and transporting information. It should provide a simple search engine and support ...
This study was designed to explore the relationships between users and interactive images. Three factors were identified and provided different perspectives on how users interact with images: image utility, information-need, and images with varying levels of interactivity. The study used a mixed methodology to gain a more comprehensive understanding about the selected factors. An image survey was used to introduce the participants to the images and recorded utility values when given a specific task. The interviews allowed participants to provide details about their experiences with the interactive images and how it affected their utility values. Findings from the study showed that images offering the highest level of interactivity do not always generate the highest utility. Factors such as personal preference, specifically speed and control of the image, affect the usefulness of the image. Participant also provided a variety of uses where access to interactive images would be beneficial. Educational settings and research tools are a few examples of uses provided by participants.
The motivation for this study is to understand the factors affecting police officers’ willingness to exert extra effort for providing better service through knowledge sharing in different working environments such as riots. Since managers’ leadership styles may be important factors affecting subordinates’ willingness to exert extra effort, this study investigates which of the leadership styles -- transformational, transactional or laissezfaire leadership -- will have a positive effect on officers’ willingness to exert extra effort. In addition, the current study also examines the effect of the mentioned leadership styles on knowledge sharing, which, in turn, affects the officers’ willingness to exert extra effort in the riot unit of the Turkish National Police (TNP) in Ankara, Turkey. The sworn line police officers working in the riot unit in Ankara, Turkey, were the participants in this study. Three questionnaires --a Multifactor Leadership (MLQ), knowledge sharing, and demographic questionnaire -- were arranged as a booklet to be distributed to the respondents. The results of the study indicate that police supervisors' perceived transformational leadership behavior has a positive effect on officers' willingness to exert extra effort. In addition, the findings also reveal that although both officers' years of service in TNP and police supervisors' perceived transactional leadership behavior has no direct effect on officers' willingness to exert extra effort, they have an indirect positive effect through officers' knowledge sharing. On the other hand, police supervisors' perceive that laissez-fair leadership behavior has no effect on riot officers' willingness to exert extra effort. The findings also indicate that officers’ knowledge sharing is positively related to both their supervisors’ perceived transformational and transactional leadership behaviors. However, police supervisors’ perceived laissez-fair leadership behavior has no effect on officers’ knowledge sharing activities. This research study will provide police administrations with the data necessary to adopt the most appropriate leadership styles ...
Wayfinding is the process of using one or more tools to move from one location to another in order to accomplish a task or to achieve a goal. This qualitative study explores the process of wayfinding as it applies to locating information in a public library. A group of volunteers were asked to find a selection of items in three types of libraries-traditional, contemporary, and modern. The retrieval process was timed and the reactions of the volunteers were recorded, documented, and analyzed. The impact of various wayfinding tools-architecture, layout, color, signage, computer support, collection organization-on the retrieval process was also identified. The study revealed that many of the wayfinding tools currently available in libraries do not facilitate item retrieval. Inconsistencies, ambiguities, obstructions, disparities, and operational deficiencies all contributed to end-user frustration and retrieval failure. The study suggests that failing to address these issues may prompt library patrons-end users who are increasingly interested in finding information with minimal expenditures of time and effort-may turn to other information-retrieval strategies and abandon a system that they find confusing and frustrating.
Critical care nurses work in an environment rich in informative interactions. Although there have been post hoc self-report survey studies of nurses' information seeking, there have been no observational studies of the patterns and content of their on-duty information behavior. This study used participant observation and in-context interviews to describe 50 hours of the observable information behavior of a representative sample of critical care nurses in a 20-bed critical care hospital unit. The researcher used open, in vivo, and axial coding to develop a grounded theory model of their consistent pattern of multimedia interactions. The resulting Nurse's Patient-Chart Cycle describes nurses' activities during the shift as centering on a regular alternation with the patient and the patient's chart (various record systems), clearly bounded with nursing "report" interactions at the beginning and the end of the shift. The nurses' demeanor markedly changed between interactions with the chart and interactions with the patient. Other informative interactions were observed with other health care workers and the patient's family, friends and visitors. The nurses' information seeking was centered on the patient. They mostly sought information from people, the patient record and other digital systems. They acted on or passed on most of the information they found. Some information they recorded for their personal use during the shift. The researcher observed the nurses using mostly patient specific information, but they also used some social and logistic information. They occasionally sought knowledge based information. Barriers to information acquisition included illegible handwriting, difficult navigation of online systems, equipment failure, unavailable people, social protocols and mistakes caused by multi-tasking people working with multiple complex systems. No formal use was observed of standardized nursing diagnoses, nursing interventions, or nursing outcomes taxonomies. While the nurses expressed respect for evidence-based practice, there clearly was no time or opportunity for reading research ...
A current trend that has emerged as a result of the information age is information-seeking behavior. From individuals to large social institutions, information-seeking behavior is utilized to attain a wide variety of goals. This body of work investigates the information-seeking behaviors of police officers who work in police stations in the Turkish National Police force. The study utilizes Leckie et al.’s (1996) model of information-seeking behavior of professionals. The findings indicated that police officers initially consulted their personal knowledge and experience. Next, officers rely upon their colleagues and then official documents. These information sources were consulted in the context of both conducting tasks and staying current. However, contrary to expectation, they rarely consulted informants. In addition police officers rarely consulted printed journals, libraries, books and attendance at conferences as information sources. The results of this study show that there were significant differences in the information sources used by police officers based on their gender in the context of staying current. On the other hand, there were no significant differences in the context of conducting police station tasks, by gender. Surprisingly, there were no significant differences in the information sources used by police officers based on their educational level. There were significant differences in the use of information sources by age, service years in police stations and service years in policing in the context of conducting police station tasks. Lastly, the results of this study indicated that service years in policing and the roles in police station were significantly correlated with the information sources used by police officers regarding staying current. This body of work offers insight into the factors that guide the information-seeking behaviors of police officers.
Blogs serve multiple purposes, resulting in several types of blogs that vary greatly in terms of quality and content. It is important to evaluate the quality of blogs, which requires appropriate evaluation criteria. Unfortunately, there are minimal studies on framework and the specific criteria and indicators for evaluating the quality of blogs. Moreover, quality is related to user perception, and should therefore be evaluated by the receivers. This dissertation examines the criteria and indicators that blog users consider important for evaluating the quality of blogs, and develops a user-centered framework for evaluating quality by conducting user surveys and post-survey email interviews. The personal characteristics that affect the users’ choices of criteria to evaluate the quality of blogs are examined as well. The study’s findings include 1) the criteria that users consider important when evaluating the quality of blogs are content quality, usability, authority, and blog credibility; 2) the indicators that blog users consider most important for evaluating the quality of blogs are understandability, accuracy, believability, currency, ease of use, and navigation; and 3) gender, education level, age, profession, purpose of use, and specific interests affect the user’s choices of criteria for evaluating the quality of blogs. Future research may involve exploring and applying the framework developed in this study to build automatic quality blog identification system for the purpose of assisting web users and information specialists to identify quality blogs.
The situations and problems that police officers face are more complex in today’s society, due in part to the increase of technology and growing complexity of globalization. Accordingly, to solve these problems and deal with the complexities, law enforcement organizations develop and apply new techniques and methods such as geographic information systems (GIS). However, the successful implementation of a new technology does not just depend on providing perfect technical support, but effective and active interaction between the user and system. For this reason, research examining user acceptance of GIS technologies provides a valuable source to investors and designers to predict whether the results of the technology will meet user expectations; understanding the factors that influence user acceptance is vitally important to make the system more usable and preferable. This study attempts to explain Turkish National Police officers’ beliefs about and behaviors toward GIS applications by using the technology acceptance models. It contributes to the technology acceptance literature by testing the proposed model in a rarely studied organization: law enforcement. Regarding methodology, I distributed a survey questionnaire in Turkey; the unit of analysis was the law enforcement officers in the Turkish National Police (TNP). In order to analyze the data derived from the survey instrument, structural equation modeling (SEM), a multivariate statistical technique, was used to analyze the quantitative data by utilizing the AMOS 16.0 software. The analysis resulted in good model fit, and 6 of the 7 hypotheses were supported.
This study assessed students’ satisfaction with Ramkhamhaeng University regional library services (RURLs) and the perceived quality of information retrieved from other information sources. In particular, this study investigated factors relating to regional students’ selection of information sources to meet their information needs. The researcher applied the principle of least effort and Simon’s satisficing theory for this study. The former principle governs and predicts the selection of these students’ perceived source accessibility, whereas the latter theory explains the selection and use of the information retrieved without considering whether the information is optimal. This study employed a web-based survey to collect data from 188 respondents. The researcher found that convenience and ease of use were the top two variables relating to respondent’s selection of information sources and use. The Internet had the highest mean for convenience. Results of testing a multiple linear regression model of all four RURCs showed that these four independent variables (convenience, ease of use, availability, and familiarity) were able to explain 69% of the total variance in the frequency of use of information sources. Convenience and ease of use were able to increase respondents’ perceived source accessibility and explain the variance of the frequency of use of sources more than availability and familiarity. These findings imply that respondents’ selection of information sources at the RURCs were governed by the principle of least effort. Libraries could consider the idea of one-stop services in the design of the Web portal, making it user friendly and convenient to access. Ideally, students could have one card to check out materials from any library in the resources sharing network.
The goal of this research was to facilitate the scrutiny and utilization of Web search engine retrieval results. I used a graphical keyphrase browsing interface to visualize the conceptual information space of the results, presenting document characteristics that make document relevance determinations easier.
The creation, storage, manipulation, and transmission of images have become less costly and more efficient. Consequently, the numbers of images and their users are growing rapidly. This poses challenges to those who organize and provide access to them. One of these challenges is similarity matching. Most current content-based image retrieval (CBIR) systems which can extract only low-level visual features such as color, shape, and texture, use similarity measures based on geometric models of similarity. However, most human similarity judgment data violate the metric axioms of these models. Tversky's (1977) contrast model, which defines similarity as a feature contrast task and equates the degree of similarity of two stimuli to a linear combination of their common and distinctive features, explains human similarity judgments much better than the geometric models. This study tested the contrast model as a conceptual framework to investigate the nature of the relationships between features and similarity of images as perceived by human judges. Data were collected from 150 participants who performed two tasks: an image description and a similarity judgment task. Qualitative methods (content analysis) and quantitative (correlational) methods were used to seek answers to four research questions related to the relationships between common and distinctive features and similarity judgments of images as well as measures of their common and distinctive features. Structural equation modeling, correlation analysis, and regression analysis confirmed the relationships between perceived features and similarity of objects hypothesized by Tversky (1977). Tversky's (1977) contrast model based upon a combination of two methods for measuring common and distinctive features, and two methods for measuring similarity produced statistically significant structural coefficients between the independent latent variables (common and distinctive features) and the dependent latent variable (similarity). This model fit the data well for a sample of 30 (435 pairs of) images and 150 participants (χ2 =16.97, ...
This dialog allows you to filter your current search.
Each of the Years listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Years? Start typing and we'll update the list to show only those items that match your needs.
This dialog allows you to filter your current search.
Each of the Department listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Department? Start typing and we'll update the list to show only those items that match your needs.