Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Library and Information Science

Social Network Analysis On Wisconsin Archival Facebook Community, Jennifer Stevenson Aug 2017

Social Network Analysis On Wisconsin Archival Facebook Community, Jennifer Stevenson

Theses and Dissertations

The purpose of this study was to understand how Wisconsin archives are using Facebook (Wisconson archives Facebook community, WAFC). Few archive studies use quantitative measurements to draw conclusions from social media application use. Quantitative data is needed in order to identify the various ways that social media is being used in an archive. Without the data behind the assumptions, it is impossible to improve service and outreach to the archive users. This study proposed a mixed methods approach to aid in the process, using social network analysis, inferential statistics and thematic analysis. This study measured the effects of implementation of …


Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley Jan 2017

Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley

Walden Dissertations and Doctoral Studies

The cost of resolving user requests for IT assistance rises annually. Researchers have demonstrated that data warehouse analytic techniques can improve service, but they have not established the benefit of using global organizational data to reduce reported IT incidents. The purpose of this quantitative, quasi-experimental study was to examine the extent to which IT staff use of organizational knowledge generated from data warehouse analytical measures reduces the number of IT incidents over a 30-day period, as reported by global users of IT within an international pharmaceutical company headquartered in Germany. Organizational learning theory was used to approach the theorized relationship …


Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin Jan 2017

Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin

Walden Dissertations and Doctoral Studies

Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government …


Statistics-Bierce Library Study, Tyler J. Hushour Jan 2017

Statistics-Bierce Library Study, Tyler J. Hushour

Williams Honors College, Honors Research Projects

This is a report from two surveys that I created and administered to students and faculty at Bierce library who came to the Circulation Desk or the Tech Desk, as well as some of my other findings when periodically looking around the library to see where students like to study or hang-out. There was a written survey given at the Circulation Desk, and a different survey given at the Tech Check-Out Desk. The project is for Melanie Smith-Farrell, the head of Access Services, and is based on a similar study Ian McCullough did in the science library. While this is …