UNT Libraries - Browse

ABOUT BROWSE FEED

The Impact of Predisposition Towards Group Work on Intention to Use a CSCW System

Description: Groupware packages are increasingly being used to support content delivery, class discussion, student to student and student to faculty interactions and group work on projects. This research focused on groupware packages that are used to support students who are located in different places, but who are assigned group projects as part of their coursework requirements. In many cases, students are being asked to use unfamiliar technologies that are very different from those that support personal productivity. For example, computer-assisted cooperative work (CSCW) technology is different from other more traditional, stand-alone software applications because it requires the user to interact with the computer as well as other users. However, familiarity with the technology is not the only requirement for successful completion of a group assigned project. For a group to be successful, it must also have a desire to work together on the project. If this pre-requisite is not present within the group, then the technology will only create additional communication and coordination barriers. How much of an impact does each of these factors have on the acceptance of CSCW technology? The significance of this study is threefold. First, this research contributed to how a user's predisposition toward group work affects their acceptance of CSCW technology. Second, it helped identify ways to overcome some of the obstacles associated with group work and the use of CSCW technology in an academic online environment. Finally, it helped identify early adopters of CSCW software and how these users can form the critical mass required to diffuse the technology. This dissertation reports the impact of predisposition toward group work and prior computer experience on the intention to use synchronous CSCW. It was found that predisposition toward group work was not only positively associated to perceived usefulness; it was also related to intention to use. It ...
Date: May 2005
Creator: Reyna, Josephine

The intersection of social networks in a public service model: A case study.

Description: Examining human interaction networks contributes to an understanding of factors that improve and constrain collaboration. This study examined multiple network levels of information exchanges within a public service model designed to strengthen community partnerships by connecting city services to the neighborhoods. The research setting was the Neighbourhood Integrated Service Teams (NIST) program in Vancouver, B.C., Canada. A literature review related information dimensions to the municipal structure, including social network theory, social network analysis, social capital, transactive memory theory, public goods theory, and the information environment of the public administration setting. The research method involved multiple instruments and included surveys of two bounded populations. First, the membership of the NIST program received a survey asking for identification of up to 20 people they contact for NIST-related work. Second, a network component of the NIST program, 23 community centre coordinators in the Parks and Recreation Department, completed a survey designed to identify their information exchanges relating to regular work responsibilities and the infusion of NIST issues. Additionally, 25 semi-structured interviews with the coordinators and other program members, collection of organization documents, field observation, and feedback sessions provided valuable insight into the complexity of the model. This research contributes to the application of social network theory and analysis in information environments and provides insight for public administrators into the operation of the model and reasons for the program's network effectiveness.
Date: December 2007
Creator: Schultz-Jones, Barbara Ann

The Online and the Onsite Holocaust Museum Exhibition as an Informational Resource

Description: Museums today provide learning-rich experiences and quality informational resources through both physical and virtual environments. This study examined a Holocaust Museum traveling exhibition, Life in Shadows: Hidden Children and the Holocaust that was on display at the Art Center of Battle Creek, Michigan in fall 2005. The purpose of this mixed methods study was to assess the informational value of a Holocaust Museum exhibition in its onsite vs. online format by converging quantitative and qualitative data. Participants in the study included six eighth grade language arts classes who viewed various combinations or scenarios of the onsite and online Life in Shadows. Using student responses to questions in an online exhibition survey, an analysis of variance was performed to determine which scenario visit promotes the greatest content learning. Using student responses to additional questions on the same survey, data were analyzed qualitatively to discover the impact on students of each scenario visit. By means of an emotional empathy test, data were analyzed to determine differences among student response according to scenario visit. A principal finding of the study (supporting Falk and Dierking's contextual model of learning) was that the use of the online exhibition provided a source of prior orientation and functioned as an advanced organizer for students who subsequently viewed the onsite exhibition. Students who viewed the online exhibition received higher topic assessment scores. Students in each scenario visit gave positive exhibition feedback and evidence of emotional empathy. Further longitudinal studies in museum informatics and Holocaust education involving a more diverse population are needed. Of particular importance would be research focusing on using museum exhibitions and Web-based technology in a compelling manner so that students can continue to hear the words of survivors who themselves bear witness and give voice to silenced victims. When perpetuity of access to informational resources ...
Date: December 2006
Creator: Lincoln, Margaret L.

What makes a quality Ph.D. program in library and information sciences?

Description: The intent of this study was to establish and validate criteria for use to assess the quality of a library and information sciences (LIS) Ph.D. program. The Ph.D. student-centric topology for quality Ph.D. programs was developed from a 2001 position statement by the American Association of Colleges of Nursing (AACN) regarding the quality indicators in research-focused doctoral programs in nursing. Topology components were tested using a survey instrument to establish their importance to the community of practice and their potential use to assess a Ph.D. program. Survey participants were asked to rank terms or concepts in a balanced incomplete block (BIB) design then rate, on a Likert-type scale, statements about the applicability of these terms or concepts to assessing a quality LIS Ph.D. program. Survey participants were from the Association for Library and Information Science Education (ALISE) Open Lib/Info Sci Education Forum jESSE Listserv. Of 225 survey participants affiliated with universities or schools from North America who submitted usable surveys, slightly less than two-thirds (64.4 %) were female while 35.5 % were male. Ninety-eight participants (43.6 %) were faculty, 114 (50.7 %) were Ph.D. students or candidates, and 13 (5.8 %) were in other roles. Statistical analysis of survey responses showed consistent results between the different demographic groups. The topology was validated by the results of the statistical analysis of the research data. Every component of the topology was acknowledged as very important to assess the quality of a LIS Ph.D. program. Faculty was the highest ranked item in the BIB analysis with a statistically significant difference (p < .0001) in the mean rank order from the next highest ranked item, Ph.D. students. The rank order from the BIB analysis was as follows: faculty, Ph.D. students, programs (courses) of study, teaching, learning environment, resources, and evaluation. Faculty was also the ...
Date: December 2006
Creator: Klingler, Scott Lavell

Privacy Concerns and Personality Traits Influencing Online Behavior: A Structural Model

Description: The concept of privacy has proven difficult to analyze because of its subjective nature and susceptibility to psychological and contextual influences. This study challenges the concept of privacy as a valid construct for addressing individuals' concerns regarding online disclosure of personal information, based on the premise that underlying behavioral traits offer a more reliable and temporally stable measure of privacy-oriented behavior than do snapshots of environmentally induced emotional states typically measured by opinion polls. This study investigated the relationship of personality characteristics associated with individuals' general privacy-related behavior to their online privacy behaviors and concerns. Two latent constructs, Functional Privacy Orientation and Online Privacy Orientation, were formulated. Functional Privacy Orientation is defined as a general measure of individuals' perception of control over their privacy. It was measured using the factors General Disclosiveness, Locus of Control, Generalized Trust, Risk Orientation, and Risk Propensity as indicator variables. Online Privacy Orientation is defined as a measure of individuals' perception of control over their privacy in an online environment. It was measured using the factors Willingness to Disclose Online, Level of Privacy Concern, Information Management Privacy Concerns, and Reported Online Disclosure as indicator variables. A survey questionnaire that included two new instruments to measure online disclosure and a willingness to disclose online was used to collect data from a sample of 274 adults. Indicator variables for each of the latent constructs, Functional Privacy Orientation and Online Privacy Orientation, were evaluated using corrected item-total correlations, factor analysis, and coefficient alpha. The measurement models and relationship between Functional Privacy Orientation and Online Privacy Orientation were assessed using exploratory factor analysis and structural equation modeling respectively. The structural model supported the hypothesis that Functional Privacy Orientation significantly influences Online Privacy Orientation. Theoretical, methodological, and practical implications and suggestions for analysis of privacy concerns and behavior are presented.
Date: May 2005
Creator: Grams, Brian C.

News photography image retrieval practices: Locus of control in two contexts.

Description: This is the first known study to explore the image retrieval preferences of news photographers and news photo editors in work contexts. Survey participants (n=102) provided opinions regarding 11 photograph searching methods. The quantitative survey data were analyzed using descriptive statistics, while content analysis was used to evaluate the qualitative survey data. In addition, news photographers and news photo editors (n=11) participated in interviews. Data from the interviews were analyzed with phenomenography. The survey data demonstrated that most participants prefer searching by events taking place in the photograph, objects that exist in the photograph, photographer-provided keywords, and relevant metadata, such as the date the picture was taken. They also prefer browsing. Respondents had mixed opinions about searching by emotions elicited in a photograph, as well as the environmental conditions represented in a photograph. Participants' lowest-rated methods included color and light, lines and shapes, and depth, shadow, or perspective. They also expressed little interest in technical information about a photograph, such as shutter speed and aperture. Interview participants' opinions about the search methods reflected the survey respondents' views. They discussed other aspects of news photography as well, including the stories told by the pictures, technical concerns about digital photography, and digital archiving and preservation issues. These stated preferences for keyword searching, browsing, and photographer-provided keywords illustrate a desire for a strong internal locus of control in digital photograph archives. Such methods allow users more control over access to their photographs, while the methods deemed less favorable by survey participants offer less control. Participants believe they can best find their photographs if they can control how they index and search for them. Therefore, it would be useful to design online photograph archives that allow users to control representation and access. Future research possibilities include determining the preferences of other image retrieval system ...
Access: This item is restricted to the UNT Community Members at a UNT Libraries Location.
Date: May 2006
Creator: Neal, Diane Rasmussen

Terrorism as a social information entity: A model for early intervention.

Description: This dissertation studies different social aspects of terrorists and terrorist organizations in an effort to better deal with terrorism, especially in the long run. The researcher, who also worked as a Police Captain at Turkish National Police Anti-Terrorism Department, seeks solutions to today's global problem by studying both literature and a Delphi examination of a survey of 1070 imprisoned terrorists. The research questions include questions such as "What are the reasons behind terrorism?", "Why does terrorism occur?", "What ideologies provide the framework for terrorist violence?, "Why do some individuals become terrorists and others do not?" and "Under what conditions will terrorists end their violence?" The results of the study presents the complexity of the terrorism problem as a social experience and impossibility of a single solution or remedy for the global problem of terrorism. The researcher through his examination of the findings of the data, presented that terrorism is a social phenomenon with criminal consequences that needs to be dealt by means of two dimensional approaches. The first is the social dimension of terrorism and the second is the criminal dimension of terrorism. Based on this, the researcher constructed a conceptual model which addresses both of these dimensions under the titles of long-term solutions and short-term solutions. The long-term solutions deal with the social aspects of terrorism under the title of Proactive Approach to Terrorism and the short-term solutions deal with the criminal aspects of terrorism under the title of The Immediate Fight against Terrorism. The researcher constructed this model because there seems to be a tendency of not asking the question of "Why does terrorism occur?" Instead, the focus is usually on dealing with the consequences of terrorism and future terrorist threats. While it is essential that the governments need to provide the finest security measures for their societies, ...
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: August 2005
Creator: Yayla, Ahmet

Makeshift Information Constructions: Information Flow and Undercover Police

Description: This dissertation presents the social virtual interface (SVI) model, which was born out of a need to develop a viable model of the complex interactions, information flow and information seeking behaviors among undercover officers. The SVI model was created from a combination of various philosophies and models in the literature of information seeking, communication and philosophy. The questions this research paper answers are as follows: 1. Can we make use of models and concepts familiar to or drawn from Information Science to construct a model of undercover police work that effectively represents the large number of entities and relationships? and 2. Will undercover police officers recognize this model as realistic? This study used a descriptive qualitative research method to examine the research questions. An online survey and hard copy survey were distributed to police officers who had worked in an undercover capacity. In addition groups of officers were interviewed about their opinion of the SVI model. The data gathered was analyzed and the model was validated by the results of the survey and interviews.
Date: August 2005
Creator: Aksakal, Baris

Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.

Description: Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem. Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural. Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level. "Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions. Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P). Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of terrorism. The matrix for international cooperation and vulnerability assessment is expected to be used as a model for global response to cyberterrorism and cybercrime.
Date: August 2005
Creator: Ozeren, Suleyman

Functional Ontology Construction: A Pragmatic Approach to Addressing Problems Concerning the Individual and the Informing Environment

Description: Functional ontology construction (FOC) is an approach for modeling the relationships between a user and the informing environment by means of analysis of the user's behavior and the elements of the environment that have behavioral function. The FOC approach is an application of behavior analytic techniques and concepts to problems within information science. The FOC approach is both an alternative and a compliment to the cognitive viewpoint commonly found in models of behavior in information science. The basis for the synthesis of behavior analysis and information science is a shared tradition of pragmatism between the fields. The application of behavior analytic concepts brings with it the notion of selection by consequence. Selection is examined on the biological, behavioral, and cultural levels. Two perspicuous examples of the application of the FOC modeling approach are included. The first example looks at the document functioning as a reinforcer in a human operant experimental setting. The second example is an examination of the verbal behavior of expert film analyst, Raymond Bellour, the structure of a film he analyzed, and the elements of the film's structure that had behavioral function for Bellour. The FOC approach is examined within the ontological space of information science.
Date: May 2006
Creator: Anderson, Richard L.

Improving Recall of Browsing Sets in Image Retrieval from a Semiotics Perspective

Description: The purpose of dissertation is to utilize connotative messages for enhancing image retrieval and browsing. By adopting semiotics as a theoretical tool, this study explores problems of image retrieval and proposes an image retrieval model. The semiotics approach conceptually demonstrates that: 1) a fundamental reason for the dissonance between retrieved images and user needs is representation of connotative messages, and 2) the image retrieval model which makes use of denotative index terms is able to facilitate users to browse connotatively related images effectively even when the users' needs are potentially expressed in the form of denotative query. Two experiments are performed for verifying the semiotic-based image retrieval model and evaluating the effectiveness of the model. As data sources, 5,199 records are collected from Artefacts Canada: Humanities by Canadian Heritage Information Network, and the candidate terms of connotation and denotation are extracted from Art & Architecture Thesaurus. The first experiment, by applying term association measures, verifies that the connotative messages of an image can be derived from denotative messages of the image. The second experiment reveals that the association thesaurus which is constructed based on the associations between connotation and denotation facilitates assigning connotative terms to image documents. In addition, the result of relevant judgments presents that the association thesaurus improves the relative recall of retrieved image documents as well as the relative recall of browsing sets. This study concludes that the association thesaurus indicating associations between connotation and denotation is able to improve the accessibility of the connotative messages. The results of the study are hoped to contribute to the conceptual knowledge of image retrieval by providing understandings of connotative messages within an image and to the practical design of image retrieval system by proposing an association thesaurus which can supplement the limitations of the current content-based image retrieval systems ...
Date: May 2006
Creator: Yoon, JungWon

The Validity of Health Claims on the World Wide Web: A Case Study of the Herbal Remedy Opuntia

Description: The World Wide Web has become a significant source of medical information for the public, but there is concern that much of the information is inaccurate, misleading, and unsupported by scientific evidence. This study analyzes the validity of health claims on the World Wide Web for the herbal Opuntia using an evidence-based approach, and supports the observation that individuals must critically assess health information in this relatively new medium of communication. A systematic search by means of nine search engines and online resources of Web sites relating to herbal remedies was conducted and specific sites providing information on the cactus herbal remedy from the genus Opuntia were retrieved. Validity of therapeutic health claims on the Web sites was checked by comparison with reports in the scientific literature subjected to two established quality assessment rating instruments. 184 Web sites from a variety of sources were retrieved and evaluated, and 98 distinct health claims were identified. 53 scientific reports were retrieved to validate claims. 25 involved human subjects, and 28 involved animal or laboratory models. Only 33 (34%) of the claims were addressed in the scientific literature. For 3% of the claims, evidence from the scientific reports was conflicting or contradictory. Of the scientific reports involving human subjects, none met the predefined criteria for high quality as determined by quality assessment rating instruments. Two-thirds of the claims were unsupported by scientific evidence and were based on folklore, or indirect evidence from related sources. Information on herbal remedies such as Opuntia is well represented on the World Wide Web. Health claims on Web sites were numerous and varied widely in subject matter. The determination of the validity of information about claims made for herbals on the Web would help individuals assess their value in medical treatment. However, the Web is conducive to dubious ...
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: May 2000
Creator: Veronin, Michael A.

Intangible Qualities of Rare Books: Toward a Decision-Making Framework for Preservation Management in Rare Book Collections, Based Upon the Concept of the Book as Object

Description: For rare book collections, a considerable challenge is involved in evaluating collection materials in terms of their inherent value, which includes the textual and intangible information the materials provide for the collection's users. Preservation management in rare book collections is a complex and costly process. As digitization and other technological advances in surrogate technology have provided new forms representation, new dilemmas in weighing the rare book's inherently valuable characteristics against the possibly lesser financial costs of surrogates have arisen. No model has been in wide use to guide preservation management decisions. An initial iteration of such a model is developed, based on a Delphi-like iterative questioning of a group of experts in the field of rare books. The results are used to synthesize a preservation management framework for rare book collections, and a small-scale test of the framework has been completed through two independent analyses of five rare books in a functioning collection. Utilizing a standardized template for making preservation decisions offers a variety of benefits. Preservation decisions may include prioritizing action upon the authentic objects, or developing and maintaining surrogates in lieu of retaining costly original collection materials. The framework constructed in this study provides a method for reducing the subjectivity of preservation decision-making and facilitating the development of a standard of practice for preservation management within rare book collections.
Date: May 2006
Creator: Sheehan, Jennifer Karr

An Evaluation of the Effect of Learning Styles and Computer Competency on Students' Satisfaction on Web-Based Distance Learning Environments

Description: This study investigates the correlation between students' learning styles, computer competency and student satisfaction in Web-based distance learning. Three hundred and one graduate students participated in the current study during the Summer and Fall semesters of 2002 at the University of North Texas. Participants took the courses 100% online and came to the campus only once for software training. Computer competency and student satisfaction were measured using the Computer Skill and Use Assessment and the Student Satisfaction Survey questionnaires. Kolb's Learning Style Inventory measured students' learning styles. The study concludes that there is a significant difference among the different learning styles with respect to student satisfaction level when the subjects differ with regard to computer competency. For accommodating amd diverging styles, a higher level of computer competency results in a higher level of student satisfaction. But for converging and assimilating styles, a higher level of computer competency suggests a lower level of student satisfaction. A significant correlation was found between computer competency and student satisfaction level within Web-based courses for accommodating styles and no significant results were found in the other learning styles.
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: August 2003
Creator: Du, Yunfei

Perceived value of journals for academic prestige, general reading and classroom use: A study of journals in educational and instructional technology.

Description: Conducting research, evaluating research, and publishing scholarly works all play an extremely prominent role for university faculty members. Tenure and promotion decisions are greatly influenced by the perceived value of publications as viewed by members of faculty evaluation committees. Faculty members seeking tenure may be limited to publishing in a limited group of journals perceived to be valuable by members of an academic committee. This study attempted to determine the value of various kinds of periodicals (journals, magazines, and e-journals), based on three principal criteria, as perceived by professionals (university faculty, K-12 practitioners, and corporate trainers) in the educational/instructional technology (E/IT) field. The criteria for journal evaluation were Academic Prestige, General Reading, and Classroom Use. The perceived value of journals based on each criterion was compared to determine any significant differences. Members of the Association for Educational Communications and Technology (AECT) were asked to rate 30 journals in the E/IT field using the three criteria. Statistically significant differences were found among ratings in 63% of the journals. The statistical analyses indicated that differences in the perceived value of journals among E/IT professionals across the three criteria (Academic Prestige, General Reading, and Classroom Use) were statistically significant. It is also noted that refereed journals were rated higher than nonrefereed journals for the Academic Prestige criterion. Survey respondents indicated that individual journals were not valued for the same reasons. This finding implies that the formation of any equitable measure for determining the value of faculty members' journal article publications would be best if based on definable criteria determined by colleagues. Lists of valued journals for each area of faculty assessment would provide standards of excellence both inside and outside the E/IT field for those who serve on tenure and promotion committees in educational institutions.
Date: May 2003
Creator: Bray, Kaye Evitt

A Complex Systems Model for Understanding the Causes of Corruption: Case Study - Turkey

Description: It is attempted with this dissertation to draw an explanatory interdisciplinary framework to clarify the causes of systemic corruption. Following an intense review of political sciences, economics, and sociology literatures on the issue, a complex systems theoretical model is constructed. A political system consists of five main components: Society, interest aggregators, legislative, executive and private sector, and the human actors in these domains. It is hypothesized that when the legitimacy level of the system is low and morality of the systemic actors is flawed, selected political, social and economic incentives and opportunities that may exist within the structure of the systemic components might -individually or as a group- trigger corrupt transactions between the actors of the system. If left untouched, corruption might spread through the system by repetition and social learning eventually becoming the source of corruption itself. By eroding the already weak legitimacy and morality, it may increase the risk of corruption even further. This theoretical explanation is used to study causes of systemic corruption in the Turkish political system. Under the guidance of the complex systems theory, initial systemic conditions, -legacy of the predecessor of Turkey Ottoman Empire-, is evaluated first, and then political, social and economic factors that are presumed to be breeding corruption in contemporary Turkey is investigated. In this section, special focus is given on the formation and operation of amoral social networks and their contribution to the entrenchment of corruption within the system. Based upon the findings of the case study, the theoretical model that is informed by the literature is reformed: Thirty five system and actor level variables are identified to be related with systemic corruption and nature of the causality between them and corruption is explained. Although results of this study can not be academically generalized for obvious reasons; the analytical framework ...
Date: August 2005
Creator: Yasar, Muhammet Murat

The Information Environment of Academic Library Directors: Use of Information Resources and Communication Technologies

Description: This study focuses on the use of information resources and communication technologies, both traditional and electronic, by academic library directors. The purpose is to improve understanding of managerial behavior when using information resources and communication technologies within a shared information environment. Taylor's concept of an information use environment is used to capture the elements associated with information use and communication within the context of decision-making styles, managerial roles, organizational environments, and professional communities. This qualitative study uses interviews, observations, questionnaires, and documents. Library directors participating in the study are from doctoral-degree granting universities in the southwestern United States. Data collection involved on-site observations with a PDA (personal digital assistant), structured interviews with library directors and their administrative assistants, the Decision Style Inventory, and a questionnaire based on Mintzberg's managerial roles. Findings show the existence of a continuum in managerial activities between an Administrator and an Administrator/Academic as critical to understanding information use and communication patterns among library directors. There is a gap between self-perception of managerial activities and actual performance, a finding that would not have surfaced without the use of multiple methods. Other findings include the need for a technical ombudsman, a managerial-level position reporting to the library director; the importance of information management as an administrative responsibility; the importance of trust when evaluating information; and the importance of integrating information and communication across formats, time, and managerial activities.
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: May 2002
Creator: Koelker, Karen June

An E-government Readiness Model

Description: The purpose of this study is to develop an e-government readiness model and to test this model. Consistent with this model several instruments, IS assessment (ISA), IT governance (ITG), and Organization-IS alignment (IS-ALIGN) are examined for their ability to measure the readiness of one organization for e-government and to test the instruments fit in the proposed e-government model. The ISA instrument used is the result of adapting and combining the IS-SERVQUAL instrument proposed by Van Dyke, Kappelman, and Pybutok (1997), and the IS-SUCCESS instrument developed by Kappelman and Chong (2001) for the City of Denton (COD) project at UNT. The IS Success Model was first proposed by DeLone and McLean (1992), but they did not validate this model. The ITG instrument was based on the goals of the COD project for IT governance and was developed by Sanchez and Kappelman (2001) from UNT. The ISALIGN instrument was also developed by Sanchez and Kappelman (2001) for the COD project. It is an instrument based on the Malcolm Baldrige National Quality Award (MBNQA) that measures how effectively a government organization utilizes IT to support its various objectives. The EGOV instrument was adapted from the study of the Action-Audience Model developed by Koh and Balthazrd (1997) to measure how well a government organization is prepared to usher in e-government in terms of various success factors at planning, system and data levels. An on-line survey was conducted with employees of the City of Denton, Texas. An invitation letter to participate in the survey was sent to the 1100 employees of the City of Denton via email, 339 responses were received, yielding a response rate of 31%. About 168 responses were discarded because they were incomplete and had the missing values, leaving 171 usable surveys, for a usable set of responses that had a response ...
Date: December 2001
Creator: Liu, Shin-Ping

Widening the lens: An interdisciplinary approach to examining the effect of exposure therapy on public speaking state anxiety.

Description: This study used an interdisciplinary approach to examine an intervention for reducing public speaking state anxiety. A quasi-experiment was conducted to determine if a multiple-exposure treatment technique (TRIPLESPEAK) would help to attenuate public speaking anxiety. The treatment group reported experiencing significantly less state anxiety during their post-test presentation than did the control group. This lead to the conclusion that exposure therapy can be used to help students enrolled in basic communication classes begin to overcome their fear of speaking in front of an audience. Follow-up analysis of the treatment group's reported anxiety levels during all five presentations (pre-test, Treatment Presentation 1, Treatment Presentation 2, Treatment Presentation 3, and post-test) revealed an increase in anxiety from the last treatment presentation to the post-test presentation. In order to explore this issue, Shannon's entropy was utilized to calculate the amount of information in each speaking environment. Anderson's functional ontology construction approach served as a model to explain the role of the environment in shaping speakers' current and future behaviors and reports of anxiety. The exploratory analysis revealed a functional relationship between information and anxiety. In addition, a qualitative study was conducted to determine which environmental stimuli speakers perceived contributed to their anxiety levels. Students reported experiencing anxiety based on four categories, which included speaker concerns, audience characteristics, contextual factors and assignment criteria. Students' reports of anxiety were dependent upon their previous speaking experiences, and students suggested differences existed between the traditional presentations and the treatment presentations. Pedagogical and theoretical implications are discussed.
Date: August 2007
Creator: Finn, Amber N.

Respect for human rights and the rise of democratic policing in Turkey: Adoption and diffusion of the European Union acquis in the Turkish National Police.

Description: This study is an exploration of the European Union acquis adoption in the Turkish National Police. The research employed the Diffusion of Innovations, Democratic Policing, and historical background check theoretical frameworks to study the decision-making of the TNP regarding reforms after 2003 as a qualitative case study which triangulated the methodology with less-dominant survey and several other analyzing methods. The data were collected from several sources including semi-structured interviews, archival records, documentary evidences and the European Commission Regular Reports on Turkey. The research interest was about the decision mechanisms of the TNP towards reforms and the rise of democratic policing in Turkey. During the study, internationally recognized human rights standards were given attention. As the data suggested, the police forces are shaped according to their ruling governments and societies. It is impossible to find a totally democratic police in a violent society and a totally violent police in a democratic society. The study findings suggested that reforming police agencies should not be a significant problem for determined governments. Human rights violations should not be directly related with the police in any country. The data suggested that democratic policing applications find common application when the democracy gets powerful and police brutality increases when authoritarian governments stays in power. Democratic policing on the other hand is an excellent tool to improve notion of democracy and to provide legitimacy to governments. However, democratic policing is not a tool to bring the democracy, but a support mechanism for it.
Date: August 2007
Creator: Lofca, Izzet

Police officers' adoption of information technology: A case study of the Turkish POLNET system.

Description: One of the important branches of government and vital to the community, police agencies are organizations that have high usage rates of information technology systems since they are in the intelligence sector and thus have information incentives. Not only can information technologies develop intra- and inter-relationships of law enforcement agencies, but they also improve the efficiency and effectiveness of the police officers and agencies without adding additional costs. Thus, identifying the factors that influence the police officers' adoption of information technology can help predict and determine how information technology will contribute to the social organization of policing in terms of effectiveness and efficiency gains. A research framework was developed by integrating three different models, theory of planned behavior (TPB), technology acceptance theory (TAM), and diffusion of innovation theory (DOI) while adding two other factors, facility and voluntariness, to better determine the factors affecting the implementation and adoption of the POLNET software system used by the Turkish National Police (TNP). The integrated model used in this study covers not only basic technology acceptance factors, but also the factors related to policing. It also attempts to account for the factors of cultural differences by considering the important aspects of Turkish culture. A cross sectional survey was conducted among TNP officers using the POLNET system. The LISREL 8.5® analysis for the hypothesized model resulted in a good model fit; 13 of the 15 hypotheses were supported.
Date: August 2007
Creator: Yalcinkaya, Ramazan

Officer attitudes toward organizational change in the Turkish National Police.

Description: This dissertation emphasizes the importance of the human factor in the organizational change process. Change - the only constant - is inevitable for organizations and no change program can be achieved without the support and acceptance of organization members. In this context, this study identifies officer attitudes toward organizational change in the Turkish National Police (TNP) and the factors affecting those attitudes. The Officer Attitude Model created by the researcher includes six main factors (receptivity to change, readiness for change, trust in management, commitment to organization, communication of change, and training for change) and five background factors (gender, age, rank, level of education, and work experience) to explain officer attitudes toward change. In order to test this model, an officer attitude survey was administered in Turkey among TNP members and the results of the gathered data validated this model.
Date: August 2007
Creator: Durmaz, Huseyin

Reading selection as information seeking behavior: A case study with adolescent girls.

Description: The aim of this research, Reading Selection as Information Seeking Behavior: A Case Study with Adolescent Girls, was to explore how the experience of reading fiction affects adolescent girls aged 13 through 15, and how that experience changes based upon four activities: journaling, blogging, a personal interview, and a focus group session. Each participant reflects upon works of her own choosing that she had recently read. The data is evaluated using content analysis with the goal of developing a relational analysis tool to be used and tested with future research projects. The goal of this research is to use the insights of the field of bibliotherapy together with the insights of the adolescent girls to provide a higher, more robust model of successful information behavior. That is, relevance is a matter of impact on life rather than just a match of subject heading. This work provides a thick description of a set of real world relevancy judgments. This may serve to illuminate theories and practices for bringing each individual seeker together with appropriate documents. This research offers a new model for relevant information seeking behavior associated with selecting works of essential instructional fiction, as well as a new definition for terminology to describe the results of the therapeutic literary experience. The data from this study, as well as from previous research, suggest that literature (specifically young adult literature) brings the reader to a better understanding of herself and the world around her.
Date: August 2007
Creator: Reynolds, Stephanie D.

Modeling the role of blogging in librarianship

Description: This phenomenological study examines the motivations and experiences of librarians who author professionally-focused Weblogs. I constructed a model of librarianship based on Wilson and Buckland. The results show a close fit between librarian bloggers and the ideals of the field as expressed by two primary library and information science philosophers. A Web survey generated 239 responses to demographic and open-ended questions. Using the results of the survey, I analyzed demographic data and performed a phenomenological analysis of the open-ended questions. A list of category responses was generated from each set of answers via the coding of descriptive words and phrases. Results indicated the motivations of librarian bloggers are based around themes of sharing, participation in community, and enhanced professional development. Respondents reported feeling more connected to the profession and to colleagues across the world because of blogging. Respondents perceived the librarian blogosphere as a community with both positive aspects - feedback, discussion, and support - and negative aspects - insular voices, divides between technologists and librarians, and generational rifts. Respondents also reported an increased ability to keep current, improved writing skills, and opportunities to speak and contribute to professional journals.
Date: August 2007
Creator: Stephens, Michael