• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 513
  • 26
  • 21
  • 21
  • 21
  • 21
  • 21
  • 20
  • 14
  • 14
  • 12
  • 4
  • 4
  • 4
  • 3
  • Tagged with
  • 926
  • 926
  • 405
  • 147
  • 101
  • 78
  • 50
  • 48
  • 46
  • 37
  • 37
  • 37
  • 36
  • 35
  • 34
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
391

Adult Literacy Programs in Community Information Resource Centers in Florida: Comparative Case Studies

Unknown Date (has links)
This research sought to examine whether information literacy skills – being able to find and use information to resolve daily issues – are being blended into conventional literacy education; and whether low-literate adults use community information access centers, such as public libraries, to find information for conducting their everyday lives. Three adult literacy programs around the State of Florida participated in a series of case studies that explored the relationships between conventional literacy skills and information literacy skills. Multiple methods of data collection were used: 1) a program questionnaire completed by literacy program coordinators; 2) two in-depth interviews with each program coordinator; 3) document analysis of instructional materials, assessment materials, and student writings; 4) a group interview with four literacy tutors; and 5) two site observations at each of the three program sites. Results of this research suggest that adult literacy programs focus primarily on the foundations of reading, particularly those that follow the national models of literacy education, including Literacy Volunteers of America or Laubach Literacy International. The intent is to improve the reading levels of low-literate adults in order to provide them with tools to function in a text-based society. There is very little introduction to information resources or information technology. However, the participating sites recognize a need for adult learners to use the range of resources available for finding information and using it effectively to resolve everyday issues. The consensus among the three literacy programs is that most information resources are designed and written at an advanced reading level, and that the adults at the lowest reading levels are unable to use them. The findings also suggest that low-literate adults may be less likely to use community information access centers, such as public libraries, because they either do not have ready access to the information centers or do not know how to use the resources that are available. The lowliterate adults in this study were more likely to use personal networks or mass media, excluding newspapers, to find information for conducting everyday life. / A Dissertation submitted to the School of Information Studies in partial fulfillment of the requirements for the degree of Doctor of Philosophy. / Spring Semester, 2003. / December 3, 2002. / Adult Learner Resources, Literacy Program Support / Includes bibliographical references. / Jane B. Robbins, Professor Directing Dissertation; Penny Ralston, Outside Committee Member; Gary Burnett, Committee Member; F. William Summers, Committee Member.
392

Information Security Awareness: System Administrators and End-User Perspectives at Florida State University

Unknown Date (has links)
Researchers have explored the potential of using various approaches in order to reduce the number of security breaches caused by system users. The approaches can be categorized into technology and non-technology approaches. Technology approaches advocate the use of technological tools or integrating a variety of technologies during system design in order to address security issues. Non-technology approaches advocate the use of other means such as good user interface design and user education in order to reduce security breaches. The research described in this thesis considers non-technical approaches. It specifically evaluates system administrator and user perceptions of information security practices and user awareness at Florida State University. The study involves system administrators and end users. Data for this research was collected by surveying and interviewing system administrators; in addition, documents such as such security policies, training materials and email alerts were reviewed. End user data was collected by using a questionnaire. The aim of the system administrators' survey was to collect preliminary information about user awareness. Then follow up interviews were used to determine the perceptions of system administrators regarding non-technical approaches to security and their views about the user's role in security. Although interview results showed that system administrators placed more emphasis on external and technical threats than on internal and non-technical threats due to different factors including availability of resources, attitude toward users, and satisfaction with technological tools, in general results from system administrators showed that system administrators are more likely to engage effectively in user awareness if such barriers to user awareness are addressed. The second part of the study surveyed end users. The aim of the survey was to collect information about end users' general information vulnerability, awareness and practices. Findings from user surveys showed that users need user awareness education for them to be able to protect themselves against security attacks. The results of this study have increased understanding of the problems that hinder non-technical approaches to security. The fact that user practices have been shown to correlate with security awareness suggests that it is time to consider human factors. / A Dissertation submitted to the School of Library and Information Studies in partial fulfillment of the requirements for the degree of Doctor of Philosophy. / Summer Semester, 2010. / April 1, 2010. / Information Security, Non-Technical Approaches, Protection Motivation Theory, User Awareness, User Behaviors / Includes bibliographical references. / Ian Douglas, Professor Directing Dissertation; David Paradice, University Representative; Lawrence Dennis, Committee Member; Ebrahim Randeree, Committee Member.
393

Information Interaction and Behavior of Distance Education Students in Web-Based Environments

Unknown Date (has links)
This study proposed four information behavior models or frames of mind, one for each of the four information interaction styles developed by Brooks (2001). The frames of mind explain how individuals classified within each style seek, explore, construct, and interact with information in a web-based learning environment. The models were developed based on data collected from a homogenous population of graduate distance education students enrolled in web-based courses at Florida State University College of Information during the Spring 2005 semester. The study analyzed 164 graduate students' responses to two instruments in order to answer the following research questions: what channels of information do graduate students chose to resolve their information needs; what source of information do graduate students chose to resolve their information needs; how are graduate students impacted by the selection of a specific channel or source of information to resolve their information needs; what emotions do graduate students experience when they resolve their information needs; and do relationships exist between action, emotions, and information interactions styles? A quantitative descriptive survey questionnaire research method was used to obtain the data about information behavior, including actions and emotions of graduate distance education students enrolled in web-based courses. The data collection occurred in two phases: (1) the information interaction styles (IIS) inventory and (2) the information behavior questionnaire (IB). In the first phase the sample was drawn from a population of 360 graduate students enrolled in web-based courses at FSU College of Information. The response rate was 40%. IIS inventory was used to classify the sample into four categories: aware, hesitant, engaged, and preempted. The second phase explored the academic information behavior of the students. The questionnaire was administrated to the same sample of students who responded in the first phase. The response rate was 60%. The sample was homogeneous with respect to their information interaction styles, but is none the less likely to have been representative of population from which it was drawn. One-hundred twenty-six were categorized as aware, twenty-four engaged, ten hesitant, and four preempted. The findings indicate that graduate students enrolled in distance education programs preferred online channels and sources of information over more traditional channels and sources. During the research process, these students changed actions and experienced emotions in accordance with the level of exploration and construction characteristic of their information interaction style. / A Dissertation submitted to the College of Information in partial fulfillment of the requirements for the degree of Doctor of Philosophy. / Fall Semester, 2005. / October 7, 2005. / Web-based Education, In formation Behavior / Includes bibliographical references. / Kathleen Burnett, Professor Directing Dissertation; Peter P. Garretson, Outside Committee Member; Michelle. Kazmer, Committee Member; Darrell Burke, Committee Member.
394

Usability Assessment of Integrated Cataloging and Metadata Services: An Exploratory Study of the OCLC Connexion System

Unknown Date (has links)
The goal of this study was to examine the relationships between usability and the searching experience, and to uncover where an integrated cataloging and metadata system lay the usability problems of its primary users, catalogers. This study showed that the most important aspect of usability in Connexion lay in the experience of information retrieval system. Also, it showed there are seventeen usability problems to be improved in Connexion. Needless to say, it is most important to note that usability is not an exclusive goal of such an integrated cataloging and metadata system. Other goals such as quality of catalogs, and the reliability of its cataloging and metadata system are equally its concern. This study also suggested more testing on diverse cataloging systems and specific user groups, especially catalogers. Much work remains to fully understand the application of these results within integrated cataloging and metadata systems and usability testing. / A Dissertation submitted to the School of Information Studies in partial fulfillment of the requirements for the degree of Doctor of Philosophy. / Fall Semester, 2004. / November 5, 2004. / Metadata, Usability, System Evaluation, Cataloging / Includes bibliographical references. / Kathleen Burnett, Professor Directing Dissertation; Akihito Kamata, Outside Committee Member; Misook Heo, Committee Member; Wonsik Shim, Committee Member.
395

Academic Library Service Consumer (User) Motivation Study Based on Expectancy Theory

Unknown Date (has links)
The purpose of this study is to provide a preliminary theoretical foundation of academic library service consumer motivation. To achieve this purpose, the study attempts to develop and test an academic library service consumer motivation model based on expectancy theory which was introduced by Victor H. Vroom (1964) and modified by Porter & Lawler (1968) and Campbell, Dunnette, Lawler, & Weick (1970). The proposed model was verfied using chat reference service as an example. This study has the following four research questions: 1) What factors influence an academic library service consumer's motivational process to use library services?, 2) Are there relationships among the factors which influence an academic library service consumer's motivational process to use library services?, 3) What relationships exist among the factors which influence an academic library service consumer's motivational process to use library services?, and 4) Based on these relationships, can the academic library service consumer's motivational process be explained? To answer the research questions, correlational research method and confirmatory interview method were employed. The selected participants of this study were Information Studies graduate students at Florida State Unviersity who are registered in three master level online classess and General Informaiton Studies graduate students. They were asked to use the chat reference service at FSU libraries and answer to the questionnaire which was distributed through email. The collected data were analysed using correlation analysis (Kendall's tau-b) and multiple regression analysis. To support the results of statistical analysis, the collected interview data were also analysed. The findings are that academic library service consumer's motivational process can be influenced by three important factors such as 1) consumers themselves, 2) service providers, and 3) situational (environmental) factors. How well the service consumers perform the service depends on their past experience with the service. When they have much experience in using the service, consumers can perform the service very well. Service providers' role is also very critical in service delivery process. In addition to human factors (service consumers and service providers), surrounding environmental conditions are also important in service delivery process. / A Dissertation submitted to the College of Information in partial fulfillment of the requirements for the degree of Doctor of Philosophy. / Fall Semester, 2007. / October 30, 2007. / Academic Library Service Consumer, Library Services Marketing, Expectancy Theory, Motivation, Chat Reference Service / Includes bibliographical references. / John C. Bertot, Professor Directing Dissertation; Leisa R. Flynn, Outside Committee Member; Michelle Kazmer, Committee Member; Christie M. Koontz, Committee Member.
396

Assessment of Online Learners' Performance Using Effective Note-Taking in Chat in Online Learning (ENCO)

Unknown Date (has links)
The purpose of this study is to examine the effect of providing note-taking functionality to online chat logs on students enrolled in graduate online learning courses. This study provided participants in online learning courses with a new tool called Effective Note-taking in Chat in Online Learning (ENCO) that enables the participants to select any message lines in chat logs individually, save the lines, and retrieve the lines. This study examined users' test scores and time taken to complete the tests provided in order to explore user learning performance and effectiveness. The experiment was conducted across two consecutive semesters using volunteers enrolled in six online courses of master's program in library and information science. After a pilot test with a focus group interview, a main experiment was conducted successfully in the following semester. The results of the main experiments were analyzed to examine whether ENCO improved learners' performance, effectiveness, and satisfaction using chat logs in online classes. Data from a total of forty-seven online graduate students were analyzed in the main study. The data included test scores and time spent to complete the tests. The results from this study indicate that ENCO use in one course was found to have significantly improved the test scores, and to have decreased test completion time in the other course. The results from focus group interviews showed that majority of the participants in the focus group evaluated ENCO as a helpful tool. Also, four categories of the test questions were analyzed by Bloom's Taxonomy. The results of the questions analysis imply that ENCO use in the categorized question analysis could be viewed from different perspective. Overall, ENCO was found to have potential for improving students learning performance, effectiveness, and satisfaction in online learning. The results of performance testing suggest that adapting a new tool or software to online learning systems may improve online learners' performance. More in-depth research about synchronous communication tools that include textual chat and audio/video enabled chat is recommended. / A Dissertation submitted to the College of Communication and Information in partial fulfillment of the requirements for the degree of Doctor of Philosophy. / Spring Semester, 2010. / December 9, 2009. / Synchronous Chat, Interaction / Includes bibliographical references. / Kathleen Burnett, Professor Directing Dissertation; David Paradice, University Representative; Michelle Kazmer, Committee Member; Lorraine Mon, Committee Member.
397

Acculturation Motives and Use of the Internet Among Chinese and Korean International Students in the U.S.

Unknown Date (has links)
The current investigation explores how acculturation motives are reflected in Internet use among Chinese and Korean international students. The purposes of this study are two- fold. The primary goal is to help understand the way Internet activities are associated with acculturation motives. The secondary purpose is to explore how acculturation motives are fulfilled in two different type of Internet usage: English-language and native-language Internet. Acculturation motives are examined in terms of acquisition of new traits and maintenance of the heritage culture. This research employs acculturation theories and the uses and theoretical gratification perspectives to studying Internet use and acculturation motives. Following the nature of the study, in-depth interviews and observations were employed to examine the Internet use of thirteen Chinese and Korean international students in the United States. The study demonstrates that participants used the Internet the most for communication within the local communities and the home countries. Internet communication plays an important role in fulfilling acculturation motives in complementing limited interpersonal communications and in acquisition of social support. Socially active international students were more involved in the social utility of Internet activities, such as Facebook or instant messengers. Another important finding of this work revealed that there was no distinguishing difference in using English-language or native-language Internet, when it comes to acquisition of new traits and maintenance of the heritage culture. Unlike other traditional mass media, the linguistic and cultural nature of each Internet type was not closely related to fulfilling acculturation motives. / A Thesis submitted to the School of Communication in partial fulfillment of the requirements for the degree of Master of Arts. / Spring Semester, 2010. / March 30, 2010. / Information Seeking Internet Activities, Acculturation Motives, Social Utility Internet Activities, In-depth Interviews / Includes bibliographical references. / Stephen D. McDowell, Professor Directing Thesis; Ulla Bunz, Committee Member; Felecia F. Jordan-Jackson, Committee Member.
398

User Acceptance of Web-Based Subscription Databases: Extending the Technology Acceptance Model

Unknown Date (has links)
The purpose of this study was to determine the factors affecting user acceptance of Web-based subscription databases. Considering the reported underutilization of Web-based subscription databases and the importance of promoting them, this study aimed to provide a better understanding of the determinants of user acceptance based on a well-established theoretical foundation. This study tested an integrated model of the antecedents and consequents of user beliefs toward intended use by extending TAM, which is one of the most prominent models used to explain the effects of users' internal beliefs and attitudes on their system usage behavior. This study employed a cross-sectional field study using a Web survey method. The study targeted undergraduate students who have experience using the databases provided by the University Libraries. A final sample of 121 responses was analyzed. The measurement model and the structural model were tested using Partial Least Squares. Overall, the research model was found to be effective in explaining user acceptance of Web-based subscription databases. The results of the data analysis showed that perceived usefulness had a stronger effect on user acceptance than ease of use, suggesting that user acceptance of Web-based subscription databases depends primarily on the utility they offer. Job relevance and result demonstrability showed positive effects on usefulness perceptions while output quality did not. The results indicated that user training did not have a significant effect on either usefulness or ease of use, calling for the need to re-examine the effectiveness of user training in the context of Web-based subscription databases. Terminology clarity and accessibility were found to be important determinants for ease of use of the databases. The results also suggested that although subjective norm does not directly affect intended use, it exerts a positive influence on user beliefs about the utility of Web-based subscription databases. / A Dissertation submitted to the College of Information in partial fulfillment of the requirements for the degree of Doctor of Philosophy. / Spring Semester, 2005. / February 25, 2005. / Online Databases, Use, Technology Acceptance Model, User Acceptance, Web-Based Subscription Databases / Includes bibliographical references. / Kathleen Burnett, Professor Directing Dissertation; Rodney Roberts, Outside Committee Member; Darrell Burke, Committee Member; Gary Burnett, Committee Member; Paul Marty, Committee Member.
399

Career Patterns of Women Librarians Who Were Early Adopters of the Internet

Unknown Date (has links)
Librarians have not generally been viewed as valuable contributors in the information-age workplace, yet librarians have the professional training to organize and manage information in a variety of contexts and forms, a critical concern in the 21st century. How do we account for the marginalization of librarianship in today's information-driven world? Why are librarians seen as peripheral to our information-based economy? This research considers the problem by looking at career progression, undervaluation of librarianship within the context of other information professions, and professional identity of 20 women librarians who were early adopters of the Internet working in corporations and other organizational environments in which the library is not institutionalized. The research focuses on issues of expertise and gender by exploring how women with technological expertise (a male-identified skill) in a female-identified profession (librarianship) make sense of their experiences in the changing information workplace (a gendered realm). The study is positioned within the conceptual framework of Andrew Abbott's jurisdictional conflict model and interpreted from a feminist critical perspective using Joan Acker's theory of gendered organizations. Research participants were selected from a group of special librarians who were part of a study of Internet use in the early 1990s. Data were obtained through telephone interviews and web-based questionnaires. Narrative and thematic approaches were used to analyze and interpret the findings. / A Dissertation submitted to the School of Information Studies in partial fulfillment of the requirements for the degree of Doctor of Philosophy. / Spring Semester, 2004. / March 26, 2004. / Women's Studies, Information Studies, Content Management, Information Technology, Library Studies, Career Advancement, Feminist Theory, Feminized Professions, Narrative Analysis / Includes bibliographical references. / Jane B. Robbins, Professor Directing Dissertation; Patricia Yancey Martin, Outside Committee Member; Kathleen Burnett, Committee Member; Eliza Dresang, Committee Member.
400

Users' Adoption of Emergent Technologies: Towards an Acceptable Model for Safer Cyber-Assisted Olfactory Information Exchanges in Standard, Micro, and Nano Systems

Unknown Date (has links)
The potential of terrorists and other enemies to use the Internet and/or other digital information technologies as transport vehicles of weapons of mass destruction (WMD) is becoming more evident. This threat may involve cyber-assisted biochemical transactions, which can be performed through olfactory information exchanges, to attack civilian and military targets anytime. In response, this research is the product of a four-year investigation wherein the researcher went through a rich archive of declassified U.S. military reports (covering biochemical warfare and techno-terrorism)and a selective list of patent applications revealing several concepts related to users' adoption of emergent cyber-assisted olfaction and aroma-embedded information systems. And after a rigorous analysis of the findings, the researcher hypothesized that careless adoption of unsafe technologies could accelerate a cyber-WMD-nexus. Thus, the study conducted in support of this research sought to examine and explain the adoption of emergent cyber-assisted olfactory information technologies. Cyber-assisted olfaction is an emergent technology that involves the replication of the human sense of smell by computer systems. It can be manifested in the stimulation of human olfactory receptors by computer-emitted biochemical or aromatic particles. Certain olfaction-based biosensors, known as electronic noses, mimic the sense of smell to detect chemical plumes (aroma or warfare agents) in a variety of settings. Notably, the literature revealed an innovative dimension of multimodal, affective human-computer interactions involving scented emails, aroma therapy, and olfaction-based marketing. Unfortunately, the lack of security and safety persists at a potentially catastrophic cost, which is at the root of the researcher's stated research problem below. Largely supported by Everett Rogers' innovation diffusion theory (IDT) and Fred Davis' technology acceptation model (TAM), the researcher went beyond the "smell-o-vision" aphorism to offer a fertile ground for a new, comprehensive, and flexible framework to understand various aspects of cyber-assisted olfactory information systems, which may be usefully applied to a wide range of auxiliary information systems (i.e., standard, micro, and nano devices). In relation to national security and defense, the proposed Model for Safer Cyber-Assisted Olfaction (MSCAO) can be applied in subway systems, aircrafts, cruise ships, and various mixing/distribution systems (i.e., water systems and chemical plants) to automatically detect and neutralize a biological or chemical threat. Many military applications are also anticipated for emerging urban warfare and emergency rescue operations using devices such as miniature robots and nano air vehicles (NAVs). Consistent with the aim of this investigation, the researcher used a mixed-methods approach that combined (1) the content analysis of a series of declassified military reports on airborne warfare agents with that of (2) a patent search on aroma-embedded information systems to examine, with the help of a carefully designed survey instrument, the perceptions of potential adopters of the proposed MSCAO. Further, in order to collect data and obtain statistical evidence linked to the selected variables (perceived credibility, ease-of-use, and usefulness), the researcher surveyed a diverse group of students from a major Engineering School in southeastern United States, which offers degree programs in Mechanical, Electrical, Chemical and Biomedical Engineering. Based on the analysis performed, credibility, ease-of-use, and usefulness were found to be significant enough to be considered as positively influencing the acceptability of the MSCAO. In essence, the respondents expressed a significantly high level of need for harm-reduction and cyber security measures against potential threats and considered the MSCAO as meeting their need. Perceived usefulness (67%) was identified as the principal determinant of the respondents' intention to adopt the proposed model. Though less substantial than perceived usefulness, perceived ease-of-use (56%) appeared to have a greater influence on the MSCOA than perceived credibility (54%). In sum, extrapolating from the findings reported herein, the researcher concluded that potential users are more likely to accept an emergent technology that is useful, easy-to-use, and that offers credible harm-reduction measures. / A Dissertation submitted to the College of Information in partial fulfillment of the requirements for the degree of Doctor of Philosophy. / Summer Semester, 2007. / June 21, 2007. / Computers-as-Weapons, Technology Adoption by Terrorist Groups, Cyber-Assisted Olfaction, Techno-terrorism, Autonomous Biochemical Decontamination / Includes bibliographical references. / John N. Gathegi, Professor Directing Dissertation; Xiuwen Liu, Outside Committee Member; Darrell Burke, Committee Member; Mia L. Lustria, Committee Member.

Page generated in 0.0706 seconds