Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2021

Discipline
Institution
Keyword
Publication

Articles 31 - 60 of 63

Full-Text Articles in Library and Information Science

More Than A Museum: Museums' Past, Current, And Future Involvement With Racial Issues, Madeline B. Friedler May 2021

More Than A Museum: Museums' Past, Current, And Future Involvement With Racial Issues, Madeline B. Friedler

Museum Studies Theses

The year 2020 has been universally acknowledged as an extraordinary point in activist history. The Black Lives Matter organization has spearheaded a new wave of activism comparable to the Civil Rights movement of the 1960s and 70s. By evaluating how cultural learning centers such as museums have presented racial history in the past, an effective plan can be made on how museums should interpret this present-day history. Museums should not only recognize #BlackLivesMatter as an important part of history in an academic sense, but they should also actively promote positive racial change in the communities they serve. Research shows that …


The Flow Less Traveled: Documenting Independent Original Research On Fluid Flow Interactions In The Laurentian Great Lakes And Immediate Surroundings, Thomas F. Hansen May 2021

The Flow Less Traveled: Documenting Independent Original Research On Fluid Flow Interactions In The Laurentian Great Lakes And Immediate Surroundings, Thomas F. Hansen

Theses and Dissertations

This work is a compilation of several research projects undertaken by the author. Each research effort identifies a problem that has been addressed traditionally using methods that are significantly costly, to such an extent that, in general, funding, convenience, and practicality are primary limiting factors to their effective implementation. In each case, the author has been able to either build upon existing, less expensive alternatives, or even invent novel approaches. The fundamental recurring research question is, can creative, even novel, computational approaches make more efficient use of resources to interpret or present data in such a way as to make …


A Study On Mukbang User’S Consuming Behavior, Hyo Geun Song May 2021

A Study On Mukbang User’S Consuming Behavior, Hyo Geun Song

UNLV Theses, Dissertations, Professional Papers, and Capstones

The main focus of this study is to examines what factors influence the tendency towards the Mukbang, and to understand the effectiveness of Mukbang. The specific purpose of this research is to examines how do the motivation of watching Mukbang affect the gratification obtained after watching Mukbang and what is the impact of the Mukbang on the utilitarian/ hedonic shopping values among Mukbang users and how do the perceived utilitarian and hedonic shopping values influence the user’s purchase intention. To find motivations of watching Mukbang, interview was performed. Five factors were developed from a interview of the responses to the …


Adoption Of A Self-Care Therapy Mobile App: Application Of Uses And Gratification Theory, Self-Efficacy, And Response Efficacy, Sue Lim May 2021

Adoption Of A Self-Care Therapy Mobile App: Application Of Uses And Gratification Theory, Self-Efficacy, And Response Efficacy, Sue Lim

Theses and Dissertations

This study examines factors that influence people’s decision to adopt a self-care therapy chatbot utilizing the uses and gratification theory, self-efficacy, and response efficacy frameworks. Existing literature has shown a large gap between supply and demand of mental health services as well as major barriers that prevent people from seeking services. Therapy chatbots offer the potential to address the gap and the barriers. This research used Woebot, a widely used and clinical evaluated therapy bot, and examined the influence of 6 uses and obtained gratification variables, two self-efficacy scales, and response efficacy on intentions of use. Quantitative analysis of the …


Language Archive Records: Interoperability Of Referencing Practices And Metadata Models, Hugh J. Paterson Iii May 2021

Language Archive Records: Interoperability Of Referencing Practices And Metadata Models, Hugh J. Paterson Iii

Theses and Dissertations

With the rise of the digital language archive and the plethora of referenceable content, a critical question arises: “How easy is it for authors to use existing tools to cite the content they are referencing?” This is especially important as people use archived materials as evidence within published language descriptions.

Archived resource metadata is well discussed in language documentation circles; however, bibliographic metadata and its accessibility are less discussed. Discoverability metadata, a subset of archived resource metadata, serves aggregators like OLAC by declaring a resource exists. In contrast, bibliographic metadata functions within documents by declaring where to find a resource …


Reviewing The Review Process: Designing Better Review Forms For Student Editors Of Undergraduate Research Publications, Meluso Rosaria Meluso May 2021

Reviewing The Review Process: Designing Better Review Forms For Student Editors Of Undergraduate Research Publications, Meluso Rosaria Meluso

MSU Graduate Theses

In 1998, the Boyer Commission on Educating Undergraduates in the Research University suggested that undergraduate students should be involved in research to improve their learning. Undergraduate research publications arose partially as a response to this suggestion because they allow students to engage in experiential learning. They also allow students to see research as serving a larger purpose rather than simply satisfying a requirement for a grade. Students, especially undergraduates, often serve as editors on undergraduate publications, but it is unclear what they understand about research, both as it applies to their own work as well as work from different disciplines, …


An Optimization Analysis Of The Subject Directory System On The Medlineplus Portal - An Investigation Of Mental Health, Children, Teenagers, And Older Adults Related Health Topics, Yifan Zhu May 2021

An Optimization Analysis Of The Subject Directory System On The Medlineplus Portal - An Investigation Of Mental Health, Children, Teenagers, And Older Adults Related Health Topics, Yifan Zhu

Theses and Dissertations

The Internet is a common means for people to search for health information. The subject directory of MedlinePlus offers Internet searchers a browsing environment so that those seekers could start from a broad term and refine their search terms to meet their real information needs, thus resulting in a better information search. For those novice users who are not familiar with relevant domain knowledge, MedlinePlus’s directory can be of great assistance and enable the portal to adopt to a more general population. Such a subject directory system and its involved health topics in the MedlinePlus portal formed a network where …


A New Framework Of Privacy Concerns Assessment In The Context Of Facial Recognition Technology (Frt): Mixed-Methods Sequential Exploratory Analysis Of Youtube Users., Yazeed Alhumaidan May 2021

A New Framework Of Privacy Concerns Assessment In The Context Of Facial Recognition Technology (Frt): Mixed-Methods Sequential Exploratory Analysis Of Youtube Users., Yazeed Alhumaidan

Theses and Dissertations

Facial Recognition Technology (FRT) has become one of the most rapidly growing technologies. A statistical report expected that the global market size of FRT will record an increase by over 100% within five years, from $3.8 billion in 2020 to $8.5 billion in 2025 (“Facial Recognition Market Size, Share and Global Market Forecast to 2025 ,” n.d.). The proliferation of FRT is primarily related to the organizational desire to bridge integrity, credibility, and reliability vulnerabilities that are inherent in traditional identification mechanisms. The ambiguity of how information flows in this system has led to an increase in individuals' privacy concerns. …


Using Machine Learning To Predict Super-Utilizers Of Healthcare Services, Kevin Paul Buchan Jr. May 2021

Using Machine Learning To Predict Super-Utilizers Of Healthcare Services, Kevin Paul Buchan Jr.

Legacy Theses & Dissertations (2009 - 2024)

In this dissertation, I aim to forecast high utilizers of emergency care and inpatient Medicare services (i.e., healthcare visits). Through a literature review, I demonstrate that accurate and reliable prediction of these future high utilizers will not only reduce healthcare costs but will also improve the overall quality of healthcare for patients. By identifying this population at risk before manifestation, I propose that there is still time to reverse undesirable healthcare trajectories (i.e., individuals whose clinical risk increases an excessive healthcare and treatment burden) through timely attention and proper care coordination. My dissertation culminates in the delivery of state-of-the-art predictive …


Investigating Insensitivity To Prior Probabilities In Merger And Acquisition Decision Making, James A. Mcgaughan May 2021

Investigating Insensitivity To Prior Probabilities In Merger And Acquisition Decision Making, James A. Mcgaughan

Legacy Theses & Dissertations (2009 - 2024)

In this dissertation I look at the high failure rates of Mergers and Acquisitions (M&As) and why there has been no discernible change in outcomes over the last several decades. Although we have greater access to data, sophisticated business intelligence (BI) and data analytics (DA) tools, and work by industry professionals and academics to improve the process, high failure rates have persisted. I explore the possibility that the representativeness heuristic could play a role, and specifically, the possibility that prior probabilities are being ignored in M&A evaluations. I use a mixed methods approach to explore the hypothesis that decision makers …


Gao Bid Protests By Small Business: Analysis Of Perceived And Reported Outcomes In Federal Contracting, David M. Snyder Apr 2021

Gao Bid Protests By Small Business: Analysis Of Perceived And Reported Outcomes In Federal Contracting, David M. Snyder

USF Tampa Graduate Theses and Dissertations

The purpose of this research is to better understand GAO bid protest outcomes, if they are perceived as effective by stakeholders particularly small businesses, and what implications perceptions of outcomes have for small businesses. As a small business owner in the U.S. Federal government contracting space, the rationale for this research improves my business’s performance and inform other small business practitioners of the practical utility of GAO protests. The GAO protest system is well intended American innovation in accountability of government agencies’ acquisition of supplies and services.

The GAO reports protest outcome rates are reflected as moderately effective at approximately …


Impact Of Health It On Practice Of Medicine, Deepti Singh Mar 2021

Impact Of Health It On Practice Of Medicine, Deepti Singh

USF Tampa Graduate Theses and Dissertations

This dissertation focuses on three key facets of health IT impact on the practice of medicine: (1) Clinical impact on practitioner outcomes through malpractice claims, (2) Socio-economic impact on patient outcomes through the clinical treatment of social determinants of health (SDOH), and (3) Organizational impact on Long-Term Post-Acute Care (LTPAC) Facilities. The first dissertation essay (Chapter 1) investigates the impact of Health IT on the nature and severity of malpractice claims reported in Florida from 2009-2016. The essay empirically examines the treatment effect of federal initiatives, specifically the Meaningful Use program, on medical practitioners enrolled in the Medicare program and …


Self-Protection In Cyberspace: Assessing The Processual Relationship Between Thoughtfully Reflective Decision Making, Protection Motivation Theory, Cyber Hygiene, And Victimization, C. Jordan Howell Mar 2021

Self-Protection In Cyberspace: Assessing The Processual Relationship Between Thoughtfully Reflective Decision Making, Protection Motivation Theory, Cyber Hygiene, And Victimization, C. Jordan Howell

USF Tampa Graduate Theses and Dissertations

The current study, using structural equation modeling, assesses the processual relationship between thoughtfully reflective decision making (TRDM), theoretical constructs derived from protection motivation theory (PMT), cyber hygiene, and online victimization to determine the cognitive decision-making process that leads to the adoption of online self-protective behaviors, which reduces the occurrence of victimization experiences. Findings, derived from a general sample of Internet users in the United States, reveal: (1) engagement in cyber hygiene practices, as a form of target hardening, decreases Internet users’ experiences with online victimization; (2) thoughtfully reflective decision makers, in the face of cyber threats, develop higher threat appraisals …


A Reflection On The Dialectical Relationship Of Librarian | Teacher: The Need For Pedagogical Training In Core Mlis Curriculum, Melanie C. Locay Feb 2021

A Reflection On The Dialectical Relationship Of Librarian | Teacher: The Need For Pedagogical Training In Core Mlis Curriculum, Melanie C. Locay

Dissertations, Theses, and Capstone Projects

This thesis maps a shift in my understanding of knowledge production and teaching and learning. Teaching has a critical role in Librarianship, yet there is a glaring absence of teacher training across MLIS programs. Drawing from established literature on Critical Pedagogical theory, multiple logics of inquiry, and Critical Librarianship we can adopt practices of teaching and learning that elevate marginalized voices and center reflexive theory. This thesis includes a scope of applications of pedagogical theory to LIS practice and identifies an immediate need for an overhaul of the Master’s in Library and Information Sciences core curricula.


La Descripción Archivistica De Las Actas Producidas Por El Concejo Municipal Del Distrito De Cajicá. (En El Período Comprendido Entre 1887 - 1893) De La Alcaldía Municipal De Cajicá, Edgar Ricardo Chibuque Ruiz Jan 2021

La Descripción Archivistica De Las Actas Producidas Por El Concejo Municipal Del Distrito De Cajicá. (En El Período Comprendido Entre 1887 - 1893) De La Alcaldía Municipal De Cajicá, Edgar Ricardo Chibuque Ruiz

Maestría en Gestión Documental y Administración de Archivos

Los Archivos Municipales corresponden a un grupo de documentos que evidencian las actuaciones que se llevan a cabo dentro de un municipio, por lo tanto el archivo y los documentos que se originan son de dominio público y se constituyen en parte de la memoria cultural, histórica y documental de la entidad y de la misma comunidad. El trabajo pretende realizar la descripción de las actas producidas por el Concejo Municipal del Distrito de Cajicá (para el período comprendido entre 1887 - 1893) de la Alcaldía, actividad que se constituye en parte del legado y la representatividad del derecho constitucional …


Guía Metodológica De Administración De Archivos Electrónicos Como Herramienta Para La Gobernanza De La Información, Alejandra Mariana Flores Carlos, Edna Molina Pérez Jan 2021

Guía Metodológica De Administración De Archivos Electrónicos Como Herramienta Para La Gobernanza De La Información, Alejandra Mariana Flores Carlos, Edna Molina Pérez

Maestría en Gestión Documental y Administración de Archivos

Con la publicación de la Ley General de Archivos se materializa el interés real de salvaguardar la documentación que da testimonio y evidencia de los procesos de la administración pública, del ejercicio del poder, la justicia, la democracia y la defensa de los derechos humanos, sin distinción del soporte en el que se encuentren. Por un lado, se resalta la necesidad de tomar acciones sobre aquella documentación que se genera en ambientes digitales. Por otro, se hace evidente el reto de rescatar los archivos que por años se han acumulado sin control.

A raíz de la complejidad que representa tener …


The Incel Lexicon: Deciphering The Emergent Cryptolect Of A Global Misogynistic Community, Kelly Caroline Gothard Jan 2021

The Incel Lexicon: Deciphering The Emergent Cryptolect Of A Global Misogynistic Community, Kelly Caroline Gothard

Graduate College Dissertations and Theses

Evolving out of a gender-neutral framing ofan involuntary celibate identity, the concept of `incels' has come to refer to an online community of men who bear antipathy towards themselves, women, and society-at-large for their perceived inability to find and maintain sexual relationships. By exploring incel language use on Reddit, a global online message board, we contextualize the incel community's online expressions of misogyny and real-world acts of violence perpetrated against women. After assembling around three million comments from incel-themed Reddit channels, we analyze the temporal dynamics of a data driven rank ordering of the glossary of phrases belonging to an …


Quantifying Language Changes Surrounding Mental Health On Twitter, Anne Marie Stupinski Jan 2021

Quantifying Language Changes Surrounding Mental Health On Twitter, Anne Marie Stupinski

Graduate College Dissertations and Theses

Mental health challenges are thought to afflict around 10% of the global population each year, with many going untreated due to stigma and limited access to services. Here, we explore trends in words and phrases related to mental health through a collection of 1- , 2-, and 3-grams parsed from a data stream of roughly 10% of all English tweets since 2012. We examine temporal dynamics of mental health language, finding that the popularity of the phrase ‘mental health’ increased by nearly two orders of magnitude between 2012 and 2018. We observe that mentions of ‘mental health’ spike annually and …


A Museum’S Guide To Queer Inclusivity, Ashtin O. Ashbrook Jan 2021

A Museum’S Guide To Queer Inclusivity, Ashtin O. Ashbrook

Museum Studies Theses

LGBT+ (gay, lesbian, bisexual, and transgender, also called queer) people have always existed. The history of queer people has been repressed and destroyed. As culture changes and becomes more accepting of these identities, queer people are living more openly, and history is being well recorded. Museums are institutions that are responsible for representing and perpetuating cultural views, and therefore have a responsibility to include a diverse variety of people. One strategy to normalize queerness is to integrate it into museums. This guide will explore queer inclusion, with an emphasis on transgender inclusion, in all different types of museums. The following …


La Conservación Preventiva Del Patrimonio Documental En Tiempos De Pandemia, Diana Catalina Rincon Sanchez Jan 2021

La Conservación Preventiva Del Patrimonio Documental En Tiempos De Pandemia, Diana Catalina Rincon Sanchez

Sistemas de Información, Bibliotecología y Archivística

Colombia es un país que se caracteriza por identificar algunos problemas que han surgido por la pandemia Covid 19 en los documentos, archivos, materiales bibliográficos y museales en las instituciones de información de Bogotá, en donde el objetivo es analizar la conservación preventiva del patrimonio documental en tiempos de pandemia. Dadas las circunstancias de la crisis sanitaria mundial que se vive, hay ciertos riesgos que pueden producirse dentro del acceso a la información de los documentos, y de los archivos históricos que se conservan y mantienen durante la pandemia.

Así mismo, las instituciones de información extreman medidas de bioseguridad, donde …


An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones Jan 2021

An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones

CCE Theses and Dissertations

The insider threat is a global problem that impacts organizations and produces a gamut of undesired outcomes. Businesses often experience lost revenue and stolen trade secrets, which can leave a tarnished reputation. Insider threats can also cause harm to individuals and national security. Past efforts have not mitigated the problem in its entirety. Documented instances of insider threats are as recent as March 2020. Many researchers have focused on monitoring technologies and relying on human monitoring in a reactive posture. An ideal solution would scrutinize an individual’s character and ascertain whether unique traits associated with actors of insider threats are …


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes Jan 2021

Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes

CCE Theses and Dissertations

With the increased use of social network technologies in organizational environments, there is a need to understand how these technologies facilitate organizational knowledge management, particularly knowledge sharing. Prior research has focused on the relationship between knowledge management and enterprise social networking systems (ESNS), but little research has been conducted relating to how organizations implement and use ESNS for knowledge sharing. The goal was to construct and validate internally a model that offers guidance for the successful implementation and use of ESNS for knowledge sharing and building successful virtual communities of practice (vCoPs) among IT supply chain professionals in a healthcare …


Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo Jan 2021

Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo

CCE Theses and Dissertations

Information Systems (IS) are critical for employee productivity and organizational success. Data breaches are on the rise—with thousands of data breaches accounting for billions of records breached and annual global cybersecurity costs projected to reach $10.5 trillion by 2025. A data breach is the unauthorized disclosure of sensitive information—and can be achieved intentionally or unintentionally. Significant causes of data breaches are hacking and human error; in some estimates, human error accounted for about a quarter of all data breaches in 2018. Furthermore, the significance of human error on data breaches is largely underrepresented, as hackers often capitalize on organizational users’ …


Dinamización De Las Exposiciones En Los Museos De Bogotá, Greissy Sofia Garcia Celis, Jhon Alexander Monroy Gonzalez, Hernan David Orozco Zambrano Jan 2021

Dinamización De Las Exposiciones En Los Museos De Bogotá, Greissy Sofia Garcia Celis, Jhon Alexander Monroy Gonzalez, Hernan David Orozco Zambrano

Sistemas de Información, Bibliotecología y Archivística

En una era donde la tecnología se ha convertido en el centro de nuestras actividades queremos presentar en esta investigación una propuesta que permita implementar herramientas tecnologías en diferentes exposiciones de los Museos de Bogotá, con el fin de hacer más atractivas y entretenidas las visitas a los museos sin perder su misión educativa. Para lograr esta propuesta se realizó una investigación comparativa de museos del mundo que ya manejan o implementan diferentes estrategias y herramientas tecnológicas en sus instituciones, buscando identificar sus beneficios y desventajas y así deducir cuales son las estrategias que traerían un mejor resultado en los …


Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly Jan 2021

Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly

Walden Dissertations and Doctoral Studies

Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using …


The Power Of Exogenous Variables In Predicting West Nile Virus In South Carolina, Christopher Lee Glaze Jan 2021

The Power Of Exogenous Variables In Predicting West Nile Virus In South Carolina, Christopher Lee Glaze

Walden Dissertations and Doctoral Studies

Despite the availability of medical data, environmental surveillance tools, and heightened public awareness, West Nile Virus (WNv) remains a global health hazard. Reliable methods for predicting WNv outbreaks remain elusive, and environmental health managers must take preventive actions without the benefit of simple predictive tools. The purpose of this ex post facto research was to examine the accuracy and timeliness of exogenous data in predicting outbreaks of WNv in South Carolina. Decision theory, the CYNEFIN construct, and systems theory provided the theoretical framework for this study, allowing the researcher to broaden traditional decision theory concepts with powerful system-level precepts. Using …


Predictors Of Community Physicians’ Digital Information Retrieval At Point Of Care, Jumana Antoun Jan 2021

Predictors Of Community Physicians’ Digital Information Retrieval At Point Of Care, Jumana Antoun

Walden Dissertations and Doctoral Studies

Efficient digital information retrieval at the point of care is essential for better health care delivery. The problem is the lack of knowledge about the community physician’s digital information retrieval at the point of care. The purpose of this study was to examine the characteristics of the community physicians’ digital information retrieval at the point of care in eight Arab countries in the Eastern Mediterranean and whether a set of factors predicted the digital information retrieval. This study was guided by the Smith model that links professional digital practices to professional competencies, digital literacy, and technological affordances. The descriptive research …


Deterrence And Response Improvements For A Large-Scale Cyberterrorism Attack, Harrison Cunningham Jan 2021

Deterrence And Response Improvements For A Large-Scale Cyberterrorism Attack, Harrison Cunningham

Walden Dissertations and Doctoral Studies

A successful large-scale cyberterrorism attack has never been conducted against the United States, yet cyberterrorism is a real and evolving threat. The United States assumes a largely defensive posture toward the thousands of daily cyberattacks conducted against the country, allowing cyberterrorists to probe and execute cyberattacks with broad impunity. The United States would most likely respond to a successful large-scale cyberterrorism attack within a framework of regulations concerning physical acts of terrorism since no policy exists on how to respond to major cyberterrorism attacks. The purpose of this qualitative study was to explore the perceptions of U.S. terrorism and cybersecurity …