41 Matching Results

Search Results

A Conceptual Map for Understanding the Terrorist Recruitment Process: Observation and Analysis of Turkish Hezbollah Terrorist Organizations.

Description: Terrorism is a historical problem; however, it becomes one of the biggest problems in 21st century. September 11 and the following Madrid, Istanbul and London attacks showed that it is the most significant problem threatening world peace and security. Governments have started to deal with terrorism by improving security measurements and making new investments to stop terrorism. Most of the governments' and scholars' focus is on immediate threats and causes of terrorism, instead of looking at long-term solutions such as root causes and underlying reasons of terrorism, and the recruitment style of terrorist organizations If terrorist recruitment does not stop, then it is safe to say terrorist activities cannot be stopped. This study focused on the recruitment process by observing two different terrorist organizations, DHKP/C and Turkish Hezbollah. The researcher brings 13 years of field experience and first-person data gathered from inside the terrorist organizations. The research questions of this study were: (i) How can an individual be prevented from joining or carrying out terrorist activities?; (ii) What factors are correlated with joining a terrorist organization?; (iii) What are the recruitment processes of the DHKP/C, PKK, and Turkish Hezbollah?; (iv) Is there any common process of being a member of these three terrorist organizations?; and (v) What are the similarities and differences these terrorist organizations? As a result of this analysis, a terrorist recruitment process map was created. With the help of this map, social organizations such as family and schools may be able to identify ways to prevent individuals from joining terrorist organizations. Also, this map will also be helpful for government organizations such as counterterrorism and intelligence to achieve the same goal.
Date: August 2007
Creator: Teymur, Samih
Partner: UNT Libraries

The Effect of Personality Type on the Use of Relevance Criteria for Purposes of Selecting Information Sources.

Description: Even though information scientists generally recognize that relevance judgments are multidimensional and dynamic, there is still discussion and debate regarding the degree to which certain internal (cognition, personality) and external (situation, social relationships) factors affect the use of criteria in reaching those judgments. Much of the debate centers on the relationship of those factors to the criteria and reliable methods for measuring those relationships. This study researched the use of relevance criteria to select an information source by undergraduate students whose task it is to create a course schedule for a semester. During registration periods, when creating their semester schedules, students filled out a two-part questionnaire. After completion of the questionnaire the students completed a Myers-Briggs Type Indicator instrument in order to determine their personality type. Data was analyzed using one-way ANOVAS and Chi-Square. A positive correlation exists between personality type as expressed by the MBTI and the information source selected as most important by the subject. A correlation also exists between personality type and relevance criteria use. The correlation is stronger for some criteria than for others. Therefore, one can expect personality type to have an effect on the use of relevance criteria while selecting information sources.
Date: December 2002
Creator: Sims, Dale B.
Partner: UNT Libraries

Quality Management in Museum Information Systems: A Case Study of ISO 9001-2000 as an Evaluative Technique

Description: Museums are service-oriented information systems that provide access to information bearing materials contained in the museum's collections. Within museum environments, the primary vehicle for quality assurance and public accountability is the accreditation process of the American Association of Museums (AAM). Norbert Wiener founded the field of cybernetics, employing concepts of information feedback as a mechanism for system modification and control. W. Edwards Deming applied Wiener's principles to management theory, initiating the wave of change in manufacturing industries from production-driven to quality-driven systems. Today, the principles are embodied in the ISO 9000 International Standards for quality management systems (QMS), a globally-recognized set of standards, widely employed as a vehicle of quality management in manufacturing and service industries. The International Organization for Standardization defined a process for QMS registration against ISO 9001 that is similar in purpose to accreditation. This study's goals were to determine the degree of correspondence between elements of ISO 9001 and quality-related activities within museum environments, and to ascertain the relevance of ISO 9001-2000 as a technique of museum evaluation, parallel to accreditation. A content analysis compared museum activities to requirements specified in the ISO 9001-2000 International Standard. The study examined museum environment surrogates which consisted of (a) web sites of nine museum studies programs in the United States and (b) web sites of two museum professional associations, the AAM and the International Council of Museums (ICOM). Data items consisted of terms and phrases from the web sites and the associated context of each item. Affinity grouping of the data produced high degrees of correspondence to the categories and functional subcategories of ISO 9001. Many quality-related activities were found at the operational levels of museum environments, although not integrated as a QMS. If activities were unified as a QMS, the ISO 9001 Standard has potential for application as ...
Date: May 2005
Creator: Karr, Fred H.
Partner: UNT Libraries

E-Learning and In-Service Training: An Exploration of the Beliefs and Practices of Trainers and Trainees in the Turkish National Police

Description: This targeted research study, carried out by an officer of the Turkish National Police (TNP), investigated the perceptions and beliefs of TNP trainers and trainees towards the potential adoption and implementation of e-learning technology for in-service police training. Utilizing diffusion and innovation theory (DOI) (Rogers, 1995) and the conceptual technology integration process model (CTIM) (Nicolle, 2005), two different surveys were administered; one to the trainers and one to the trainees. The factor analyses revealed three shared trainer and trainee perceptions: A positive perception towards e-learning, personally and for the TNP; a belief in the importance of administrative support for e-learning integration; and the belief in importance of appropriate resources to facilitate integration and maintain implementation. Three major recommendations were made for the TNP. First, the research findings could be used as a road map by the TNP Education Department to provide a more flexible system to disseminate in-service training information. The second is to establish two-way channels of communication between the administration and the TNP personnel to efficiently operationalize the adoption and integration of e-learning technology. The third is the administrative provision of necessary hardware, software, and technical support.
Date: August 2007
Creator: Zengin, Selcuk
Partner: UNT Libraries

Needs Assessment Survey Report

Description: This report is part of the Web-at-Risk project. The Web-at-Risk project is one of eight digital preservation projects funded in 2004 by the Library of Congress. The project is a 3-year collaborative effort of the California Digital Library (CDL), the University of North Texas (UNT), and New York University (NYU). The project will develop a Web Archiving Service that enables curators to build collections of web-published materials. The content of the collections for this project will be largely from US federal and state government agencies, but will also include political policy documents, campaign literature, and information surrounding political movements and labor unions. This report includes the methods, results, discussion, and appendices related to the Web-at-Risk project.
Date: January 5, 2006
Creator: Hsieh, Inga K. & Murray, Kathleen R.
Partner: UNT Libraries

Needs Assessment Survey Report: Abbreviated Version

Description: This report is part of the Web-at-Risk project. The Needs Assessment Toolkit created for the Web-at-Risk project describes the project's needs assessment activities and includes data collection tools, which are designated to identify the needs and requirements of curators, web-content producers, and end users with regard to the Web Archive Service. Additionally, information gathered by some of the data collection tools will help to identify curators' requirements for the web crawler and its crawl analyzer tool, which will be developed as part of the project. Each of the assessment activities described in the Needs Assessment Toolkit was designated to follow a collection development framework for web archives. This report contains a data analysis of the survey results. Results from focus group discussions and interviews with content providers and end users are presented in separate reports.
Date: January 5, 2006
Creator: Hsieh, Inga K. & Murray, Kathleen R.
Partner: UNT Libraries

The Impact of Predisposition Towards Group Work on Intention to Use a CSCW System

Description: Groupware packages are increasingly being used to support content delivery, class discussion, student to student and student to faculty interactions and group work on projects. This research focused on groupware packages that are used to support students who are located in different places, but who are assigned group projects as part of their coursework requirements. In many cases, students are being asked to use unfamiliar technologies that are very different from those that support personal productivity. For example, computer-assisted cooperative work (CSCW) technology is different from other more traditional, stand-alone software applications because it requires the user to interact with the computer as well as other users. However, familiarity with the technology is not the only requirement for successful completion of a group assigned project. For a group to be successful, it must also have a desire to work together on the project. If this pre-requisite is not present within the group, then the technology will only create additional communication and coordination barriers. How much of an impact does each of these factors have on the acceptance of CSCW technology? The significance of this study is threefold. First, this research contributed to how a user's predisposition toward group work affects their acceptance of CSCW technology. Second, it helped identify ways to overcome some of the obstacles associated with group work and the use of CSCW technology in an academic online environment. Finally, it helped identify early adopters of CSCW software and how these users can form the critical mass required to diffuse the technology. This dissertation reports the impact of predisposition toward group work and prior computer experience on the intention to use synchronous CSCW. It was found that predisposition toward group work was not only positively associated to perceived usefulness; it was also related to intention to use. It ...
Date: May 2005
Creator: Reyna, Josephine
Partner: UNT Libraries

What makes a quality Ph.D. program in library and information sciences?

Description: The intent of this study was to establish and validate criteria for use to assess the quality of a library and information sciences (LIS) Ph.D. program. The Ph.D. student-centric topology for quality Ph.D. programs was developed from a 2001 position statement by the American Association of Colleges of Nursing (AACN) regarding the quality indicators in research-focused doctoral programs in nursing. Topology components were tested using a survey instrument to establish their importance to the community of practice and their potential use to assess a Ph.D. program. Survey participants were asked to rank terms or concepts in a balanced incomplete block (BIB) design then rate, on a Likert-type scale, statements about the applicability of these terms or concepts to assessing a quality LIS Ph.D. program. Survey participants were from the Association for Library and Information Science Education (ALISE) Open Lib/Info Sci Education Forum jESSE Listserv. Of 225 survey participants affiliated with universities or schools from North America who submitted usable surveys, slightly less than two-thirds (64.4 %) were female while 35.5 % were male. Ninety-eight participants (43.6 %) were faculty, 114 (50.7 %) were Ph.D. students or candidates, and 13 (5.8 %) were in other roles. Statistical analysis of survey responses showed consistent results between the different demographic groups. The topology was validated by the results of the statistical analysis of the research data. Every component of the topology was acknowledged as very important to assess the quality of a LIS Ph.D. program. Faculty was the highest ranked item in the BIB analysis with a statistically significant difference (p < .0001) in the mean rank order from the next highest ranked item, Ph.D. students. The rank order from the BIB analysis was as follows: faculty, Ph.D. students, programs (courses) of study, teaching, learning environment, resources, and evaluation. Faculty was also the ...
Date: December 2006
Creator: Klingler, Scott Lavell
Partner: UNT Libraries

Terrorism as a social information entity: A model for early intervention.

Description: This dissertation studies different social aspects of terrorists and terrorist organizations in an effort to better deal with terrorism, especially in the long run. The researcher, who also worked as a Police Captain at Turkish National Police Anti-Terrorism Department, seeks solutions to today's global problem by studying both literature and a Delphi examination of a survey of 1070 imprisoned terrorists. The research questions include questions such as "What are the reasons behind terrorism?", "Why does terrorism occur?", "What ideologies provide the framework for terrorist violence?, "Why do some individuals become terrorists and others do not?" and "Under what conditions will terrorists end their violence?" The results of the study presents the complexity of the terrorism problem as a social experience and impossibility of a single solution or remedy for the global problem of terrorism. The researcher through his examination of the findings of the data, presented that terrorism is a social phenomenon with criminal consequences that needs to be dealt by means of two dimensional approaches. The first is the social dimension of terrorism and the second is the criminal dimension of terrorism. Based on this, the researcher constructed a conceptual model which addresses both of these dimensions under the titles of long-term solutions and short-term solutions. The long-term solutions deal with the social aspects of terrorism under the title of Proactive Approach to Terrorism and the short-term solutions deal with the criminal aspects of terrorism under the title of The Immediate Fight against Terrorism. The researcher constructed this model because there seems to be a tendency of not asking the question of "Why does terrorism occur?" Instead, the focus is usually on dealing with the consequences of terrorism and future terrorist threats. While it is essential that the governments need to provide the finest security measures for their societies, ...
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: August 2005
Creator: Yayla, Ahmet
Partner: UNT Libraries

Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.

Description: Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem. Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural. Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level. "Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions. Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P). Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of terrorism. The matrix for international cooperation and vulnerability assessment is expected to be used as a model for global response to cyberterrorism and cybercrime.
Date: August 2005
Creator: Ozeren, Suleyman
Partner: UNT Libraries

Intangible Qualities of Rare Books: Toward a Decision-Making Framework for Preservation Management in Rare Book Collections, Based Upon the Concept of the Book as Object

Description: For rare book collections, a considerable challenge is involved in evaluating collection materials in terms of their inherent value, which includes the textual and intangible information the materials provide for the collection's users. Preservation management in rare book collections is a complex and costly process. As digitization and other technological advances in surrogate technology have provided new forms representation, new dilemmas in weighing the rare book's inherently valuable characteristics against the possibly lesser financial costs of surrogates have arisen. No model has been in wide use to guide preservation management decisions. An initial iteration of such a model is developed, based on a Delphi-like iterative questioning of a group of experts in the field of rare books. The results are used to synthesize a preservation management framework for rare book collections, and a small-scale test of the framework has been completed through two independent analyses of five rare books in a functioning collection. Utilizing a standardized template for making preservation decisions offers a variety of benefits. Preservation decisions may include prioritizing action upon the authentic objects, or developing and maintaining surrogates in lieu of retaining costly original collection materials. The framework constructed in this study provides a method for reducing the subjectivity of preservation decision-making and facilitating the development of a standard of practice for preservation management within rare book collections.
Date: May 2006
Creator: Sheehan, Jennifer Karr
Partner: UNT Libraries

Web Content Authorship: Academic Librarians in Web Content Management

Description: An increasing number of libraries and information centers are using content management (CM) applications to develop, redesign, and maintain their websites. the purpose of this research was to provide understanding of attitudes of academic librarians about how their utilization of CM technology influences the information services they provide at the academic library’s website and to examine their perceptions of how using CM affects the creation of the web content. This research applied a qualitative research design (electronic survey and in-depth semi-structured interviews of academic subject librarians) with elements of a quantitative approach. the study discussed the concept of web authorship and supplied fundamentals for future theoretical research about authorship in web content development at academic libraries. the study provided an overview of CM at academic libraries and explored characteristics of dynamic content and semantic web applications at their websites. It discussed librarians’ opinions about issues of migration to the new content management system (CMS), factors affecting its efficient employment, and roles of librarians in web content management. Results of this study will serve to future research on management behavior of academic librarians authoring web content with the help of CM. the findings about the difficulties observed in the use of CMS and solutions, influence of training and learning, importance of cooperation and communication, adjustment of the CMS to the users’ needs, qualifications and skills needed in application of CM, distribution of responsibilities in the use of CMS, features of the CMS, and requirements to its functionality will have implications for academic and other libraries applying CM.
Date: May 2012
Creator: Vassilieva, Elena
Partner: UNT Libraries

A Framework of Automatic Subject Term Assignment: An Indexing Conception-Based Approach

Description: The purpose of dissertation is to examine whether the understandings of subject indexing processes conducted by human indexers have a positive impact on the effectiveness of automatic subject term assignment through text categorization (TC). More specifically, human indexers' subject indexing approaches or conceptions in conjunction with semantic sources were explored in the context of a typical scientific journal article data set. Based on the premise that subject indexing approaches or conceptions with semantic sources are important for automatic subject term assignment through TC, this study proposed an indexing conception-based framework. For the purpose of this study, three hypotheses were tested: 1) the effectiveness of semantic sources, 2) the effectiveness of an indexing conception-based framework, and 3) the effectiveness of each of three indexing conception-based approaches (the content-oriented, the document-oriented, and the domain-oriented approaches). The experiments were conducted using a support vector machine implementation in WEKA (Witten, & Frank, 2000). The experiment results pointed out that cited works, source title, and title were as effective as the full text, while keyword was found more effective than the full text. In addition, the findings showed that an indexing conception-based framework was more effective than the full text. Especially, the content-oriented and the document-oriented indexing approaches were found more effective than the full text. Among three indexing conception-based approaches, the content-oriented approach and the document-oriented approach were more effective than the domain-oriented approach. In other words, in the context of a typical scientific journal article data set, the objective contents and authors' intentions were more focused that the possible users' needs. The research findings of this study support that incorporation of human indexers' indexing approaches or conception in conjunction with semantic sources has a positive impact on the effectiveness of automatic subject term assignment.
Date: December 2006
Creator: Chung, EunKyung
Partner: UNT Libraries

Discovering a Descriptive Taxonomy of Attributes of Exemplary School Library Websites

Description: This descriptive study examines effective online school library practice. A Delphi panel selected a sample of 10 exemplary sites and helped to create two research tools--taxonomies designed to analyze the features and characteristics of school library Websites. Using the expert-identified sites as a sample, a content analysis was conducted to systematically identify site features and characteristics. Anne Clyde's longitudinal content analysis of school library Websites was used as a baseline to examine trends in practice; in addition, the national guidelines document, Information Power: Building Partnerships for Learning, was examined to explore ways in which the traditional mission and roles of school library programs are currently translated online. Results indicated great variation in depth and coverage even among Websites considered exemplary. Sites in the sample are growing more interactive and student-centered, using blogs as supplemental communication strategies. Nevertheless, even these exemplary sites were slow to adopt the advances in technology to meet the learning needs and interests of young adult users. Ideally the study's findings will contribute to understanding of state-of-the-art and will serve to identify trends, as well as serving as a guide to practitioners in planning, developing, and maintaining school library Websites.
Date: August 2007
Creator: Valenza, Joyce Kasman
Partner: UNT Libraries

Identifying At-Risk Students: An Assessment Instrument for Distributed Learning Courses in Higher Education

Description: The current period of rapid technological change, particularly in the area of mediated communication, has combined with new philosophies of education and market forces to bring upheaval to the realm of higher education. Technical capabilities exceed our knowledge of whether expenditures on hardware and software lead to corresponding gains in student learning. Educators do not yet possess sophisticated assessments of what we may be gaining or losing as we widen the scope of distributed learning. The purpose of this study was not to draw sweeping conclusions with respect to the costs or benefits of technology in education. The researcher focused on a single issue involved in educational quality: assessing the ability of a student to complete a course. Previous research in this area indicates that attrition rates are often higher in distributed learning environments. Educators and students may benefit from a reliable instrument to identify those students who may encounter difficulty in these learning situations. This study is aligned with research focused on the individual engaged in seeking information, assisted or hindered by the capabilities of the computer information systems that create and provide access to information. Specifically, the study focused on the indicators of completion for students enrolled in video conferencing and Web-based courses. In the final version, the Distributed Learning Survey encompassed thirteen indicators of completion. The results of this study of 396 students indicated that the Distributed Learning Survey represented a reliable and valid instrument for identifying at-risk students in video conferencing and Web-based courses where the student population is similar to the study participants. Educational level, GPA, credit hours taken in the semester, study environment, motivation, computer confidence, and the number of previous distributed learning courses accounted for most of the predictive power in the discriminant function based on student scores from the survey.
Date: May 2000
Creator: Osborn, Viola
Partner: UNT Libraries

Korean Studies in North America 1977-1996: A Bibliometric Study

Description: This research is a descriptive bibliometric study of the literature of the field of Korean studies. Its goal is to quantitatively describe the literature and serve as a model for such research in other area studies fields. This study analyzed 193 source articles and 7,166 citations in the articles in four representative Korean and Asian studies journals published in North America from 1977 to 1996. The journals included in this study were Korean Studies (KS), the Journal of Korean Studies (JKS), the Journal of Asian Studies (JAS), and the Harvard Journal of Asiatic Studies (HJAS). Subject matters and author characteristics of the source articles were examined, along with various characteristics such as the form, date, language, country of origin, subject, key authors, and key titles of the literature cited in the source articles. Research in Korean studies falls within fourteen broad disciplines, but concentrated in a few disciplines. Americans have been the most active authors in Korean studies, followed closely by authors of Korean ethnicity. Monographic literature was used most. The mean age of publications cited was 20.87 and the median age of publications cited was 12. The Price Index of Korean studies as a whole is 21.9 percent. Sources written in English were most cited (47.1%) and references to Korean language sources amounted to only 34.9% of all sources. In general, authors preferred sources published in their own countries. Sources on history were cited most by other disciplines. No significant core authors were identified. No significant core literature were identified either. This study indicates that Korean studies is still evolving. Some ways of promoting research in less studied disciplines and of facilitating formal communication between Korean scholars in Korea and Koreanists in North America need to be sought in order to promote well-balanced development in the field. This study ...
Date: December 1999
Creator: Chun, Kyungmi
Partner: UNT Libraries

The Effect of Information Literacy Instruction on Library Anxiety Among International Students

Description: This study explored what effect information literacy instruction (ILI) may have on both a generalized anxiety state and library anxiety specifically. The population studied was international students using resources in a community college. Library anxiety among international students begins with certain barriers that cause anxiety (i.e., language/communication barriers, adjusting to a new education/library system and general cultural adjustments). Library Anxiety is common among college students and is characterized by feelings of negative emotions including, ruminations, tension, fear and mental disorganization (Jiao & Onwuegbuzie, 1999a). This often occurs when a student contemplates conducting research in a library and is due to any number of perceived inabilities about using the library. In order for students to become successful in their information seeking behavior this anxiety needs to be reduced. The study used two groups of international students enrolled in the English for Speakers of other Languages (ESOL) program taking credit courses. Each student completed Bostick's Library Anxiety Scale (LAS) and Spielberger's State-Trait Anxiety Inventory (STAI) to assess anxiety level before and after treatment. Subjects were given a research assignment that required them to use library resources. Treatment: Group 1 (experimental group) attended several library instruction classes (the instruction used Kuhltau's information search process model). Group 2 (control group) was in the library working on assignment but did not receive any formal library instruction. After the treatment the researcher and ESOL program instructor(s) measured the level of anxiety between groups. ANCOVA was used to analyze Hypotheses 1 and 2, which compared pretest and posttest for each group. Research assignment grades were used to analyze Hypothesis 3 comparing outcomes among the two groups. The results of the analysis ascertained that ILI was associated with reducing state and library anxiety among international students when given an assignment using library resources.
Access: This item is restricted to the UNT Community Members at a UNT Libraries Location.
Date: May 2004
Creator: Battle, Joel C.
Partner: UNT Libraries

University Students and the Internet: Information Seeking Study

Description: This study explored university students' information needs and seeking behaviors on the Internet. A Web-based survey was administrated one time. Two hundred responses were received from the target sample within the two weeks period of the study. Data were analyzed with descriptive statistics, factor analysis, and graphical representation. The study explored various issues related to the usability, preferences, and activities of the Internet, such as searching tools, e-mail, search engines, and preferred primary sources of everyday-life information needs. The study explored the perceptions of the students toward the Internet and the traditional library. Kuhlthau's model of the information-seeking process, which includes six stages and affective components, was utilized and modified in the construction of the Web survey. A study by Presno (1998), which includes the four types of Internet anxiety, was utilized in the construction of the Web survey. With regard to the six stages of Kuhlthau model, the majority of the respondents experienced stage 5, which was about information gathering; stage 3 had the next highest number of respondents. Very few respondents experienced stages 1 and 2. There was a systematic pattern in which, the earlier the stages the respondents were in, the more negative adjectives they selected, and vice versa. The feeling adjectives section showed a difference in the behavior between males and females. The results indicated that most students had Internet time delay anxiety. In general, the study found that students have a great interest in the Internet and consider it an important source of information for their personal, educational, and communication activities.
Date: May 2001
Creator: Shamo, Esmaeel
Partner: UNT Libraries

Knowledge synthesis in the biomedical literature: Nordihydroguaiaretic acid and breast cancer.

Description: This dissertation refines knowledge synthesis from publicly accessible databases, based on the model of D.R. Swanson. Knowledge synthesis endeavors bring together two or more non-interactive literatures to create combinatorial research data on a specific topic. In this endeavor the biomedical literature was searched on the anti-neoplastic agent nordihydroguaiaretic acid (NDGA) for its potential role as a functional food in the chemoprevention of breast cancer. Bibliometric cocitation was utilized to identify complementary but non-interactive literatures in the disciplines of biomedicine and dietary science. The continuing specialization and fragmentation of the cancer literature degenerates the potential usefulness of cross-disciplinary research and information. As the biomedical sciences become more specialized the potential increases for isolation of discoveries and for failures to connect science to the needs of the people. Within the information science discipline several techniques are available to bridge the isolation between discoveries recorded in different sets of literatures. Electronic database searching with combinatorial keyword entries, syllogistic modeling and bibliometric author cocitation analysis are the principle techniques applied in this endeavor. The research questions are addressed to the absence or presence of human in vivo research on breast cancer with the potentially chemopreventative functional food NDGA. Utilizing a syllogistic model the literatures of functional foods, nordihydroguaiaretic acid and breast cancer were searched with designated combinatorial keywords. The documents retrieved were subjected to author cocitation analysis to demonstrate disjointness or connectivity of the two complementary literatures. The results demonstrated a possible preventative relationship between breast cancer in women and nordihydroguaiaretic acid, a phytochemical antioxidant and potential functional food. The results of this study are consistent with D.R. Swanson's pioneering work in knowledge synthesis. Swanson's methods can be used to identify non-interactive, disjoint literatures. Continuing support for his techniques has been demonstrated.
Date: December 2003
Creator: Sneed, Wanda A.
Partner: UNT Libraries

The physiology of collaboration: An investigation of library-museum-university partnerships.

Description: Collaboration appears to be a magical solution for many problems when there is scarcity of resources, lack of knowledge or skills, and/or environmental threats. However, there is little knowledge about the nature of collaboration. A holistic conceptual framework was developed for the collaborative process, and the conceptualization process used systems thinking approach. The author has selectively chosen conceptualizations and/or research by a limited subset of scholars whose ideas appeared to be the most relevant and useful to explore the type of collaboration studied here. In other words, the selection of the literature was based on an eclectic selection. Multiple cases were used in this research to understand the factors that are components of collaborative effort among non-profit organizations and the relationships among those factors. This study also investigated the stages of collaborative process. Data were collected from 54 participants who were partners in collaborate projects funded by the Institute of Museum and Library Services (IMLS). Among these 54 participants, 50 answered the online questionnaire and 38 received the telephone interviews. The data collected was analyzed using cluster analysis, multidimensional scaling, internal consistency reliability, and descriptive statistics. The component factors of collaboration were grouped by the following seven concepts: trustworthiness, competence, dependency, misunderstanding and/or conflict, complexity, commitment and mechanism of coordination. This study showed twelve relationships among these factors. For instance, different points of view and partners' capacity to maintain inter-organizational relationships were found to be opposite concepts. In addition, the findings in this study indicate that 84% of participants reported the presence of the five pre-defined stages: execution, networking, definition, relationship, and common evaluation.
Date: August 2003
Creator: Morales Arroyo, Miguel Angel
Partner: UNT Libraries

Information Needs of Art Museum Visitors: Real and Virtual

Description: Museums and libraries are considered large repositories of human knowledge and human culture. They have similar missions and goals in distributing accumulated knowledge to society. Current digitization projects allow both, museums and libraries to reach a broader audience, share their resources with a variety of users. While studies of information seeking behavior, retrieval systems and metadata in library science have a long history; such research studies in museum environments are at their early experimental stage. There are few studies concerning information seeking behavior and needs of virtual museum visitors, especially with the use of images in the museums' collections available on the Web. The current study identifies preferences of a variety of user groups about the information specifics on current exhibits, museum collections metadata information, and the use of multimedia. The study of information seeking behavior of users groups of museum digital collections or cultural collections allows examination and analysis of users' information needs, and the organization of cultural information, including descriptive metadata and the quantity of information that may be required. In addition, the study delineates information needs that different categories of users may have in common: teachers in high schools, students in colleges and universities, museum professionals, art historians and researchers, and the general public. This research also compares informational and educational needs of real visitors with the needs of virtual visitors. Educational needs of real visitors are based on various studies conducted and summarized by Falk and Dierking (2000), and an evaluation of the art museum websites previously conducted to support the current study.
Date: December 2004
Creator: Kravchyna, Victoria
Partner: UNT Libraries

Negotiation, communication, and decision strategies used by hostage/crisis negotiators.

Description: By conducting this theory-based empirical study, gathering data from working negotiators in the US and Canada, I have determined what primary dynamic activities, communication skills, and negotiation tools are used by hostage/crisis negotiators. Negotiators implement their negotiation and decision strategies differently depending on whether the situations they deal with are instrumental or expressive. I have determined which elements of negotiations and factors affecting negotiations differ while handling instrumental and expressive hostage situations. I found that the collected data did not reveal any significant relationship between handling instrumental/expressive hostage situations differently and belief in the elements of Brenda Dervin's and Shannon-Weaver's theories. I have also determined that the belief in the elements of the Dervin's and Shannon-Weaver's theories is workable and practical for negotiators to use. Based on the above findings, the model suggested by this research adds the elements and directives of Dervin's and Shannon-Weaver's models to the common approach used by the negotiators. This revised model suggests that the negotiators pay attention to the dynamics of the interactions presented between the two parties: the negotiators themselves and hostage takers. The revised model also recommends that the negotiators focus on not only the hostage takers behavioral characteristics, psychological conditions, and criminal history but also on the meaning of the sent message and the interaction itself as performed between the two parties. This perspective enables the negotiators to look at the negotiation process as information and communication process. We are not ignoring the fact that hostage negotiation is a format of extreme information management. By looking at such an extreme case, we can add to our understanding of Dervin's and Shannon-Weaver's perspectives in order to see the hostage negotiation process from a wider perspective. The revised model is not an alternative approach to the common approach most negotiators use. Instead, the ...
Date: May 2008
Creator: Hancerli, Suleyman
Partner: UNT Libraries

A study of on-line use and perceived effectiveness of compliance-gaining in health-related banner advertisements for senior citizens.

Description: This research investigated banner ads on the World Wide Web, specifically the types of messages used in those ads and the effectiveness of the ads as seen by their intended audience. The focus was on health-related banner advertisements targeting senior citizens. The study first sought to determine the frequency of appearance of those ads when classified into categories of compliance-gaining tactics provided by research scholars. Second, the study explored the relative perceived effectiveness among those categories. Two graduate students from a Central Texas university sorted text messages into predetermined compliance-gaining categories. Chi square tests looked for significant differences in the frequencies of banner ads in each category. Forty-five senior citizens from the Central Texas area completed surveys regarding the perceived effectiveness of a randomly ordered, randomly selected set of categorized banner ads. A repeated measures test attempted to determine whether some compliance-gaining strategies used in health-related banner ads were perceived as more effective than others. The hypothesis stated that there would be differences in frequencies of compliance-gaining strategies used among the compliance-gaining categories in health-related banner ads for senior citizens. The hypothesis was supported. The research question asked if some categories of compliance-gaining strategies used in health-related banner ads were perceived as more effective than others by senior citizens. There was no evidence that senior citizens perceived any compliance-gaining category as being more effective than any other. However, post hoc analyses revealed trends in the types of compliance-gaining messages senior citizens perceived as more effective. These trends provide a basis for directional predictions in future studies.
Date: December 2002
Creator: Toon, Michelle Anne
Partner: UNT Libraries

A mechanism for richer representation of videos for children: Calibrating calculated entropy to perceived entropy

Description: This study explores the use of the information theory entropy equation in representations of videos for children. The calculated rates of information in the videos are calibrated to the corresponding perceived rates of information as elicited from the twelve 7 to 10 year old girls who were shown video documents. Entropy measures are calculated for several video elements: set time, set incidence, verbal time, verbal incidence, set constraint, nonverbal dependence, and character appearance. As hypothesized, mechanically calculated entropy measure (CEM) was found to be sufficiently similar to perceived entropy measure (PEM) made by children so that they can be used as useful and predictive elements of representations of children’s videos. The relationships between the CEM and the PEM show that CEM could stand for PEM in order to enrich representations for video documents for this age group. Speculations on transferring the CEM to PEM calibration to different age groups and different document types are made, as well as further implications for the field of information science.
Date: August 2001
Creator: Kearns, Jodi
Partner: UNT Libraries