Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

University of Nevada, Las Vegas

Discipline
Keyword
Publication Year

Articles 1 - 16 of 16

Full-Text Articles in Library and Information Science

A Study On Mukbang User’S Consuming Behavior, Hyo Geun Song May 2021

A Study On Mukbang User’S Consuming Behavior, Hyo Geun Song

UNLV Theses, Dissertations, Professional Papers, and Capstones

The main focus of this study is to examines what factors influence the tendency towards the Mukbang, and to understand the effectiveness of Mukbang. The specific purpose of this research is to examines how do the motivation of watching Mukbang affect the gratification obtained after watching Mukbang and what is the impact of the Mukbang on the utilitarian/ hedonic shopping values among Mukbang users and how do the perceived utilitarian and hedonic shopping values influence the user’s purchase intention. To find motivations of watching Mukbang, interview was performed. Five factors were developed from a interview of the responses to the …


Motivation And Online Information Literacy Instruction: A Self-Determination Theory Approach, Francesca Marineo May 2019

Motivation And Online Information Literacy Instruction: A Self-Determination Theory Approach, Francesca Marineo

UNLV Theses, Dissertations, Professional Papers, and Capstones

Information literacy skills, including critical thinking and problem-solving skills, are imperative for academic, personal, and professional success. Unfortunately, many students graduate only to be more daunted than ever by the vast amount of information available to them and increasingly rely on convenience over quality in their information-seeking behaviors. This study hoped to address this by increasing students’ motivation for engaging in an online information literacy module. Using self-determination theory (SDT) from the field of motivation, motivationally-supportive modules were designed to support students’ feelings of autonomy and competence and ultimately grades on their final research assignment. Experimental conditions included providing relevance, …


Maintaining Nurses' Currency In Informatics, Jennifer Alaine Strawn May 2017

Maintaining Nurses' Currency In Informatics, Jennifer Alaine Strawn

UNLV Theses, Dissertations, Professional Papers, and Capstones

Technology has changed how registered nurses (RNs) provide care at the bedside. As more technologies are utilized to improve quality of care, safety of care, maximize efficiencies, and decrease costs of care, one must question how well the information technologies (IT) are fully integrated and utilized by the front-line bedside nurse in his or her practice. Despite the pervasiveness of IT in healthcare, there is a paucity of literature on how Chief Nursing Officers (CNOs) assure the ongoing education and training for nurses to maintain IT competencies in the practice environment.

From this author’s lived experience as a CNO, it …


Understanding Transitions Of Trust Across Different Business Contexts: An Exploratory Sequential Mixed Methods Study, Sungsik Yoon May 2017

Understanding Transitions Of Trust Across Different Business Contexts: An Exploratory Sequential Mixed Methods Study, Sungsik Yoon

UNLV Theses, Dissertations, Professional Papers, and Capstones

Airbnb’s influence has been growing rapidly in the last few years, and hotel operators are beginning to recognize the competitive threat it poses. However, consumers may perceive Airbnb differently than hoteliers. Thus, the current study attempts to explore hotel customers’ perceptions of the sharing economy business (Airbnb). It is important to pay attention to the different business settings of the channels that currently exist in the lodging industry. Moreover, investigating the relationship between trust and perceived risk in this new channel (i.e., Airbnb) is crucial due to the inherent risk of transactions on Airbnb, especially when compared with traditional Business-to-customer. …


Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi Dec 2016

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …


The Lived Experiences Of Women In The Information Technology Field As They Transition From One Leadership Level To The Next: A Phenomenological Study, Marilyn Delmont Aug 2016

The Lived Experiences Of Women In The Information Technology Field As They Transition From One Leadership Level To The Next: A Phenomenological Study, Marilyn Delmont

UNLV Theses, Dissertations, Professional Papers, and Capstones

There is an increasing disparity of women in the IT field, when compared to men, specifically within IT executive leadership roles. The number of women in IT executive leadership lags drastically behind men IT executives and has gone down by five percent since 2008. Despite significant growth in the IT field women are not growing with it. IT jobs are expected to increase by 1.5 million in the next decade. The purpose and central question of this qualitative phenomenological study was to explore the lived experiences of women and how they develop as IT leaders. Beginning with 19 broad questions, …


Teachers + School Librarians = Student Achievement: When Will We Believe It?, Gaetana D'Agata May 2016

Teachers + School Librarians = Student Achievement: When Will We Believe It?, Gaetana D'Agata

UNLV Theses, Dissertations, Professional Papers, and Capstones

School librarians, teachers, and administrators have understood that student achievement can be enhanced when teachers and librarians collaborate. Most of the scholarly literature concerning teacher-school librarian collaboration has been written by school librarians rather than teachers and administrators. Consequently, the purpose of this study was to describe the concept of teacher-librarian collaboration from the perspectives of school librarians. Content analysis of 37 responses to a school librarians’ online discussion board revealed the barriers to and some of the supports for collaboration.


Persuasion Of Online Crowdfunding Videos, Matthew Roe May 2016

Persuasion Of Online Crowdfunding Videos, Matthew Roe

UNLV Theses, Dissertations, Professional Papers, and Capstones

Crowdfunding is a relatively new and exciting way to get investments for a business startup or other project. We use the elaboration likelihood model (ELM) to explore how individuals are persuaded by the project videos on a crowdfunding platform called Kickstarter. ELM is a psychological model used to understand how people are persuaded. Our results support most of our hypotheses and showed that the need for cognition, which reflects the personal tendency towards the central route of ELM, does increase an individual’s intent to back a project. We also discovered that intrinsic motivations and product quality have a stronger effect …


A Survey On Potential Privacy Leaks Of Gps Information In Android Applications, Srinivas Kalyan Yellanki May 2015

A Survey On Potential Privacy Leaks Of Gps Information In Android Applications, Srinivas Kalyan Yellanki

UNLV Theses, Dissertations, Professional Papers, and Capstones

Android-based smart phones are extremely common today. However, it is believed that nearly half of the Android devices are vulnerable to an attack that alters the functionality of an app with malicious software. The malware can collect users’ sensitive data from the phone. In particular, there are hundreds of location-based applications available nowadays in the Google Play store or other app stores. The very famous services called “Location Based Services” are used by many apps on mobile phones to track the geographical coordinates of the device. Such location information can be leaked to an attacker via malware.

In this thesis, …


Using The Web 1t 5-Gram Database For Attribute Selection In Formal Concept Analysis To Correct Overstemmed Clusters, Guymon Hall May 2014

Using The Web 1t 5-Gram Database For Attribute Selection In Formal Concept Analysis To Correct Overstemmed Clusters, Guymon Hall

UNLV Theses, Dissertations, Professional Papers, and Capstones

Information retrieval is the process of finding information from an unstructured collection of data. The process of information retrieval involves building an index, commonly called an inverted file. As part of the inverted file, information retrieval algorithms often stem words to a common root. Stemming involves reducing a document term to its root. There are many ways to stem a word: affix removal and successor variety are two common categories of stemmers. The Porter Stemming Algorithm is a suffix removal stemmer that operates as a rule-based process on English words. We can think of stemming as a way to cluster …


Fortifying The Pipeline: An Exploratory Study Of High School Factors Impacting The Information Literacy Of First-Year College Students, Jennifer L. Fabbi May 2012

Fortifying The Pipeline: An Exploratory Study Of High School Factors Impacting The Information Literacy Of First-Year College Students, Jennifer L. Fabbi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Information literacy—the ability "to recognize when information is needed and have the ability to locate, evaluate, and use effectively the needed information” (American Library Association [ALA], 1989, para. 3)—has been widely and increasingly cited as an essential competency for college success, for the workplace, and for life (Bruce, 1997; Eisenberg, 2008; Fitzgerald, 2004; Johnston & Webber, 2003; National Leadership Council for Liberal Education and America’s Promise, 2007; Obama, 2009; Rader, 2002). Information literacy best practice and standards state that students optimally develop this skill set through immersion in the research process—often and over time—and this proposition is also supported in …


Dynamic Indexing, Viswada Sripathi Dec 2010

Dynamic Indexing, Viswada Sripathi

UNLV Theses, Dissertations, Professional Papers, and Capstones

In this thesis, we report on index constructions for large document collections to facilitate the task of search and retrieval. We first report on classical static index construction methods and their shortcomings. We then report on dynamic index construction techniques and their effectiveness.


Study Of Stemming Algorithms, Savitha Kodimala Dec 2010

Study Of Stemming Algorithms, Savitha Kodimala

UNLV Theses, Dissertations, Professional Papers, and Capstones

Automated stemming is the process of reducing words to their roots. The stemmed words are typically used to overcome the mismatch problems associated with text searching.


In this thesis, we report on the various methods developed for stemming. In particular, we show the effectiveness of n-gram stemming methods on a collection of documents.


Cloud Storage And Online Bin Packing, Swathi Venigella Aug 2010

Cloud Storage And Online Bin Packing, Swathi Venigella

UNLV Theses, Dissertations, Professional Papers, and Capstones

Cloud storage is the service provided by some corporations (such as Mozy and Carbonite) to store and backup computer files. We study the problem of allocating memory of servers in a data center based on online requests for storage. Over-the-net data backup has become increasingly easy and cheap due to cloud storage. Given an online sequence of storage requests and a cost associated with serving the request by allocating space on a certain server one seeks to select the minimum number of servers as to minimize total cost. We use two different algorithms and propose a third algorithm; we show …


A Comparative Study On Text Categorization, Aditya Chainulu Karamcheti May 2010

A Comparative Study On Text Categorization, Aditya Chainulu Karamcheti

UNLV Theses, Dissertations, Professional Papers, and Capstones

Automated text categorization is a supervised learning task, defined as assigning category labels to new documents based on likelihood suggested by a training set of labeled documents. Two examples of methodology for text categorizations are Naive Bayes and K-Nearest Neighbor.

In this thesis, we implement two categorization engines based on Naive Bayes and K-Nearest Neighbor methodology. We then compare the effectiveness of these two engines by calculating standard precision and recall for a collection of documents. We will further report on time efficiency of these two engines.


Public Libraries: Is Independence Better?, Gayle Hornaday Apr 2004

Public Libraries: Is Independence Better?, Gayle Hornaday

UNLV Theses, Dissertations, Professional Papers, and Capstones

Since the origin of public libraries in the United States during the nineteenth century, they have been primarily supported by public taxation, due to their intended purpose of benefiting all of society, and especially the economically disadvantaged. Public libraries are provided in much the same spirit as public education, to uphold the American value that knowledge and information should be equally available to all, without regard to individual ability to pay. The dilemma of how to pay for library services has involved considerable debate in the library community about the implementation of user fees to supplement revenue, as an alternative …