Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Library and Information Science

Discourse, Power Dynamics, And Risk Amplification In Disaster Risk Management In Canada, Martins Oluwole Olu-Omotayo Dec 2022

Discourse, Power Dynamics, And Risk Amplification In Disaster Risk Management In Canada, Martins Oluwole Olu-Omotayo

Electronic Thesis and Dissertation Repository

The domain of disaster risk management is rife with discursive contentions, whereby dominant discourses amplify the powers of risk actors to precipitate and reinforce political, economic, and environmental inequalities that predispose different sections of the population to unequal disaster risk vulnerabilities. This thesis identified important actors (government, risk experts, media, and NGOs) that shape the power dynamics in disaster risk management in Canada and explained their roles, influences, and the dimensions in which their powers negotiate each other through risk discourses. The patterns of these power dynamics in the three aspects of power –communication, assessment, and social trust –were also …


Convivial Making: Power In Public Library Creative Places, Shannon Crawford Barniskis Aug 2022

Convivial Making: Power In Public Library Creative Places, Shannon Crawford Barniskis

Theses and Dissertations

In 2011, public libraries began to provide access to collaborative creative places, frequently called “makerspaces.” The professional literature portrays these as beneficial for communities and individuals through their support of creativity, innovation, learning, and access to high-tech tools such as 3D printers. As in longstanding “library faith” narratives, which pin the library’s existence to widely held values, makerspace rhetoric describes access to tools and skills as instrumental for a stronger economy or democracy, social justice, and/or individual happiness. The rhetoric generally frames these places as empowering. Yet the concept of power has been neither well-theorized within the library makerspace literature …


The Analysis Of User Characteristics On Twitter During Early Stage Of The Covid-19 Pandemic: A Comparison Study Before And After Declaration Of The Covid-19 Pandemic, Mutasim Alfadhel May 2022

The Analysis Of User Characteristics On Twitter During Early Stage Of The Covid-19 Pandemic: A Comparison Study Before And After Declaration Of The Covid-19 Pandemic, Mutasim Alfadhel

Theses and Dissertations

In December 2019, the coronavirus disease 2019 (Covid-19) was officially reported as an acute respiratory infection, which was first identified in Wuhan, China. On March 11th, 2020, the World Health Organization (WHO) declared that Covid-19 could be characterized as a pandemic. Governments across the world imposed or recommended various non-medical interventions to reduce transmission of Covid-19, such as washing hands, wearing face masks, social distancing, and quarantining as well as lockdown measures including banning large gatherings, issuing stay-at-home orders, closing certain businesses, and imposing travel restrictions. The increase in social, behavioral, and economic issues that the disease has generated has …


A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker Jan 2022

A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker

CCE Theses and Dissertations

The global reliance on the Internet to facilitate organizational operations necessitates further investments in organizational information security. Such investments hold the potential for protecting information assets from cybercriminals. To assist organizations with their information security, The National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF) was created. The framework referenced the cybersecurity work, knowledge, and skills required to competently complete the tasks that strengthen their information security. Organizational users’ limited cybersecurity competency contributes to the financial and information losses suffered by organizations year after year. While most organizational users may be able to respond positively to a cybersecurity threat, …


Digital Searching: A Grounded Theory Study On The Modern Search Experience, Nicolas Armando Parés Jan 2022

Digital Searching: A Grounded Theory Study On The Modern Search Experience, Nicolas Armando Parés

Electronic Theses and Dissertations

This Grounded theory study explores US adults' modern information search process as they pursue information through digital search user interfaces and tools. To study the current search process, a systematic grounded theory methodology and two data collection methods, a think-aloud protocol and semi-structured interviews, are used to develop the theory. The emerging theory addressed two tightly connected research questions that asked, “What is the process by which humans search and discover information?” and “What is the process by which search and discovery interfaces and tools support the modern search process?”

The study collects participant data from US adults who have …


Factors Affecting Customers’ Decision To Share Personal Data With Mobile Operators, Ammar Ali Qaffaf Jan 2022

Factors Affecting Customers’ Decision To Share Personal Data With Mobile Operators, Ammar Ali Qaffaf

CCE Theses and Dissertations

Companies that personalize their services based on users’ specific needs have increased sales and customer satisfaction. Personalization requires analyzing the user’s behavior and correlating the action with other pieces of information. The information available for cellular service providers has grown substantially as connectivity becomes ubiquitous. Customers are unknowingly sharing their locations, habits, activities, and preferences in real-time with their service providers. Although cellular service providers state that they share personal data with external entities in their publicly available privacy policies, users have limited control over who can access their personal information. Users have no, or suboptimal, control to manage their …


Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy Jan 2022

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy

CCE Theses and Dissertations

The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …


Examination Of Strategies To Implementing Chip-And-Personal Identification Number Credit Card Authentication Infrastructures, Neville Arthur Gallimore Jan 2022

Examination Of Strategies To Implementing Chip-And-Personal Identification Number Credit Card Authentication Infrastructures, Neville Arthur Gallimore

Walden Dissertations and Doctoral Studies

Chip-and-Personal Identification Number (PIN) technology is seen as a game changer in many e-commerce industries and a transformational technology in the 21st century. However, security concerns have made chip-and-PIN adoption relatively slow. Massive unauthorized card payment transactions in the United States (U.S.) cost victims an estimate totaling billions of dollars. Information Technology (IT) managers are concerned with credit card fraud's financial loss and liability cost. Grounded in Rogers’s diffusion of innovation theory, the purpose of this qualitative pragmatic study was to explore strategies used by IT managers to transition their e-commerce organizations to chip-and-PIN credit card authentication infrastructures. The participants …


Exploring Algorithmic Literacy For College Students: An Educator’S Roadmap, Susan Gardner Archambault Jan 2022

Exploring Algorithmic Literacy For College Students: An Educator’S Roadmap, Susan Gardner Archambault

LMU/LLS Theses and Dissertations

Research shows that college students are largely unaware of the impact of algorithms on their everyday lives. Also, most university students are not being taught about algorithms as part of the regular curriculum. This exploratory, qualitative study aimed to explore subject-matter experts’ insights and perceptions of the knowledge components, coping behaviors, and pedagogical considerations to aid faculty in teaching algorithmic literacy to college students. Eleven individual, semi-structured interviews and one focus group were conducted with scholars and teachers of critical algorithm studies and related fields. Findings suggested three sets of knowledge components that would contribute to students’ algorithmic literacy: general …


Modernization Of Legacy Information Technology Systems, Rabie Khabouze Jan 2022

Modernization Of Legacy Information Technology Systems, Rabie Khabouze

Walden Dissertations and Doctoral Studies

Large enterprises spend a large portion of their Information Technology (IT) budget on maintaining their legacy systems. Legacy systems modernization projects are a catalyst for IT architects to save cost, provide new and efficient systems that increase profitability, and create value for their organization. Grounded in sociotechnical systems theory, the purpose of this qualitative multiple case study was to explore strategies IT architects use to modernize their legacy systems. The population included IT architects in large enterprises involved in legacy systems modernization projects, one in healthcare, and one in the financial services industry in the San Antonio-New Braunfels, Texas metropolitan …