Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 301 - 330 of 1353

Full-Text Articles in Library and Information Science

Portraits Of Professional Collaboration: Faculty-Librarian Teaching Partnerships, Carrie L. Forbes Jan 2020

Portraits Of Professional Collaboration: Faculty-Librarian Teaching Partnerships, Carrie L. Forbes

Electronic Theses and Dissertations

Many regional accrediting organizations for higher education have embraced information literacy as a key component for both student success and student learning outcomes. Through embedded librarianship practices, librarians are now taking a leading role in developing and promoting users’ information literacy skills and in adopting an active classroom teaching approach. Faculty-librarian team teaching is a best practice for integrating information literacy into the higher education curricula, but the extant research has largely focused on the barriers to collaboration. Using Walsh and Kahn’s (2010) model of “collaborative working” as a conceptual framework, this dissertation explores the qualities and characteristics of four …


Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon Jan 2020

Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon

Walden Dissertations and Doctoral Studies

The cyber threat landscape has led some cybersecurity leaders to focus on a holistic approach encompassing people, processes, and technology to make their government agencies and organizations more responsive to a more diverse and inclusive cyber workforce to protect critical infrastructure from hackers or cybercriminals intent on causing harm. This qualitative multiple case study used Schein’s organizational culture theory to explore strategies used by cybersecurity leaders to attract, recruit, and retain diverse cybersecurity professionals to effectively and efficiently protect sensitive systems from rising cyber threats. The study's population consisted of cybersecurity leaders from 3 government agencies and 9 organizations in …


Effective Strategies Small Business Leaders Use To Address Ransomware, William Jason Tuttle Jan 2020

Effective Strategies Small Business Leaders Use To Address Ransomware, William Jason Tuttle

Walden Dissertations and Doctoral Studies

Small business leaders face a wide range of cybersecurity threats. Ransomware is a specific cybersecurity threat that cybercriminals can use to deny small business leaders’ access to data in exchange for a ransom payment. Grounded in routine activity conceptual framework, the purpose of this qualitative multiple case study was to explore effective strategies small business leaders use to address ransomware. Data were collected from 5 leaders of small businesses in the southeast region of the United States. Data sources included interviews and archival documents. Data were analyzed using Yin’s 5 step process. The analysis revealed 3 primary themes: ransomware strategy, …


Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu Jan 2020

Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu

Walden Dissertations and Doctoral Studies

Information technology (IT) employees of small business organizations have been the driving force for the implementation of innovative standardized IT service management and process improvement initiatives. Competitiveness amongst small business IT organizations in the market for quality IT service delivery led small business IT leaders toward the implementation of an information technology infrastructure library (ITIL) as an IT service management framework. The problem addressed in this research encompassed the needs of small business IT leaders and ITIL designers to understand the perceptions of IT operation employees following ITIL implementation. The purpose of this qualitative multiple case study was to explore …


Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove Jan 2020

Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove

Walden Dissertations and Doctoral Studies

Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …


Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham Jan 2020

Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham

Walden Dissertations and Doctoral Studies

Consumer online activities can generate massive volumes of data that private companies may collect and use for business purposes. Consumer personal data need to be protected from unauthorized access and misuse. The specific problem is that consumers have little control regarding their data being collected and used by private companies. The purpose of this qualitative archival research was to explore business practices involving collection and use of consumer data without an individual’s consent. This study used the big data ethical conceptual framework to focus on various privacy issues, including those related to ownership, transparency, ethics, and consumer privacy laws. Archival …


Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten Jan 2020

Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten

Walden Dissertations and Doctoral Studies

Cloud computing adoption rates have not grown commensurate with several well-known and substantially tangible benefits such as horizontal distribution and reduced cost, the latter both in terms of infrastructure and specialized personnel. The lack of adoption presents a challenge to both service providers from a sales perspective and service consumers from a usability focus. The purpose of this quantitative correlational study utilizing the technological, organizational, and environmental framework was to examine the relationship between shared technology (ST), malicious insiders (MI), account hijacking, data leakage, data protection, service partner trust (SP), regulatory concerns and the key decision-makers intention to adopt cloud …


Understanding Self-Managed Teams Using Biomimicking, Mohammad Nozari Jan 2020

Understanding Self-Managed Teams Using Biomimicking, Mohammad Nozari

Walden Dissertations and Doctoral Studies

AbstractThe potential high performance of self-managed teams can only materialize with implementing such teams properly and differently from traditional manager-led teams. This qualitative descriptive multiple case study presents biomimicking as a unique and untapped resource to achieve that potential by applying a biomimicking lens to help understand successful decision-making patterns for self-managed teams. The study population included team members of self-managed teams working in information technology companies in Toronto, Ontario, as the technology hub of Canada with a tendency to apply the latest approaches for teamwork performance and output. The conceptual framework of the study included teamwork, self-management, social choice, …


Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde Jan 2020

Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde

Walden Dissertations and Doctoral Studies

Some financial institutions in Nigeria have not deployed strategies that mitigate cyber exploitation risks in the financial services industry. Financial institution leaders are concerned because cyber exploitation contributed to the reduction in the adult banking population to a low 38%. Grounded in the integrated systems theory of information security management, the purpose of this multiple case study was to explore strategies some financial institution leaders in Nigeria use to prevent cyber exploitations. The participants included 6 chief information security officers of 6 financial institutions. Data were collected from semistructured interviews and company and public documents. A thematic analysis identified themes …


Public Librarians' Adoption Of Technology In Two Southeastern States, Ashley Ea Dowdy Jan 2020

Public Librarians' Adoption Of Technology In Two Southeastern States, Ashley Ea Dowdy

Walden Dissertations and Doctoral Studies

Public libraries have become community hubs of technology, changing the responsibilities of public librarians. The problem is a gap between public library technology needs, the skills librarians have with technologies, and the strategies they use to acquire skills. The purpose of this predictive, sequential, explanatory mixed method study was to examine public librarians' attitudes about learning new technology and their behavioral intention to adopt it. Two frameworks guided this study: the unified theory of acceptance and use of technology model and the diffusion of innovations theory. Quantitative data (N= 202) were collected by survey and analyzed through multiple linear regression …


Effective Pedagogical Practices In Elementary School Libraries: An Appreciative Inquiry Approach, Maureen Scanlan Jan 2020

Effective Pedagogical Practices In Elementary School Libraries: An Appreciative Inquiry Approach, Maureen Scanlan

Electronic Theses and Dissertations, 2020-

School libraries were designed to provide equitable access to reading and research materials for all students. Over the past few decades, staffing of school libraries has become a controversial topic as school leaders opt to eliminate school librarians due to budget constraints. Consequently, there is staffing variability in school libraries. Research indicates that a school librarian is a critical component of a successful school library program. Despite this, some schools with staffing variability in the school library are finding ways to implement an effective school library media program. This research study examined effective school library pedagogical practices in elementary school …


Lineamientos Para La Salvaguarda Del Patrimonio Cultural Inmaterial Representado Por La Gastronomía Autóctona De Bogotá, Ana Maria Rodriguez García Jan 2020

Lineamientos Para La Salvaguarda Del Patrimonio Cultural Inmaterial Representado Por La Gastronomía Autóctona De Bogotá, Ana Maria Rodriguez García

Sistemas de Información, Bibliotecología y Archivística

La identidad cultural establece rasgos característicos los cuales llevan a la acción de reconocer las costumbres sociales. Por ende, se debe tener en cuenta que el patrimonio hereditario y cultural va más allá de las tradiciones porque en el transcurso del tiempo la sociedad pueda no sentirse identificado atribuido a la inclusión de nuevas culturas, para este caso las gastronómicas. Así que, con la presente investigación se proyecta formular e implementar lineamientos para la salvaguarda del patrimonio cultural inmaterial representado por la gastronomía autóctona de Bogotá para llevar a cabo una posible conservación de la memoria gastronómica y la relación …


Named But Not Known: Teaching And Assessing The Research-Writing Process, Ruth Boeder Jan 2020

Named But Not Known: Teaching And Assessing The Research-Writing Process, Ruth Boeder

Wayne State University Dissertations

In lived experience, the two processes of secondary research and writing overlap and intertwine interminably, creating an overarching complex system as research becomes expressed in writing and writing generates new research. This classroom study explores the two processes as one—the research-writing process—through coding of student journal responses and assessment of student research papers. Analysis reveals students to be thoughtful but not yet as nuanced in their descriptions of their research process as much be desired. They more frequently discuss writing with weaknesses in their research process than with research strengths. Further findings indicate that although it is difficult to assess …


Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii Jan 2020

Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii

Walden Dissertations and Doctoral Studies

Many data scientists are struggling to adopt effective data governance practices as they transition from traditional data analysis to big data analytics. Data governance of big data requires new strategies to deal with the volume, variety, and velocity attributes of big data. The purpose of this qualitative multiple case study was to explore big data governance strategies employed by data scientists to provide a holistic perspective of those data for making decisions. The participants were 10 data scientists employed in multiple mid-market companies in the greater Salt Lake City, Utah area who have strategies to govern big data. This study’s …


Queer Political Organization In Israel, And Palestine: Shifting Away From Homonationalism, Tristan Blaisdell Jan 2020

Queer Political Organization In Israel, And Palestine: Shifting Away From Homonationalism, Tristan Blaisdell

Undergraduate Honors Theses

In this project, I present research I have done on the issue of pink washing queer Israeli and Palestinian citizens and homonationalism within Israel and Palestine. I also create an exhibit brief outlining a hypothetical museum exhibit on this topic to be put up at the museum of culture and environment. The first section outlines the history and theory of my exhibit, and a brief personal statement where I talk about my interest in the subject and where I’m coming from before I design this exhibit. My theory is built off concepts of diaspora, home, belonging, queer identity, and intersectionality …


Leveraging Big Data : Predicting Traffic Risk And Providing Early Warning Due To Adverse Weather Conditions, Sreekumar E. Nampoothiri Jan 2020

Leveraging Big Data : Predicting Traffic Risk And Providing Early Warning Due To Adverse Weather Conditions, Sreekumar E. Nampoothiri

Legacy Theses & Dissertations (2009 - 2024)

The proliferation of big data has allowed researchers to delve deeper into data and gain better understandings within almost every field. In the fields of transportation planning and traffic management, past research has shown direct relationships among weather conditions and traffic speed, volume, and congestion. However, these studies have mostly relied on static data that were spatially and temporally sparse or collected on a specific roadway for a specific time period for research purposes. With the need to address the impacts of climate change, including an increasing number of extreme weather events as well as an increasing intensity of such …


Improving Query Reformulation In Voice Search, Ning Sa Jan 2020

Improving Query Reformulation In Voice Search, Ning Sa

Legacy Theses & Dissertations (2009 - 2024)

Conversational search has been obtaining increasing attentions in the field of Information Retrieval (IR). However, compared with the other applications of dialogue systems, the studies on conversational search are far from being sufficient. Lot of work is needed from the input to the output of the conversational search process. On the other hand, with the improvement in the Automatic Speech Recognition (ASR) technology, voice is now an optional input method in addition to text. Compared with the text-based queries, voice-based queries are found to be longer, and use richer language. The voice-based search is also found to be more flexible …


Boundaries And Infomediaries: A Qualitative Study Of The Information Practices Of Community Health Workers, Robert M. Shapiro Ii Jan 2020

Boundaries And Infomediaries: A Qualitative Study Of The Information Practices Of Community Health Workers, Robert M. Shapiro Ii

Theses and Dissertations--Communication

Despite successful efforts to treat and manage diseases, public health officials have recently begun a campaign to refocus efforts toward initiatives to alleviate the pressures that are often referred to as social determinants of health. In eastern Kentucky, and in other geographical regions labeled as health professional shortage areas or medically underserved areas, issues stemming from social determinants are compounded with health care systems that are often lacking the human resources to meet basic medical needs. One strategy has been to utilize volunteers and paraprofessionals such as community health workers to lessen the burden on the primary care and hospital …


Modelo Metodológico Del Sistema Integrado De Gestión Para Una Pyme Del Sector Farmacéutico Estudio De Caso, Andrea Carolina Galeano Villate, Jeisson David Vargas Nuñez Jan 2020

Modelo Metodológico Del Sistema Integrado De Gestión Para Una Pyme Del Sector Farmacéutico Estudio De Caso, Andrea Carolina Galeano Villate, Jeisson David Vargas Nuñez

Sistemas de Información, Bibliotecología y Archivística

Las pymes han figurado en los diferentes contextos de la vida económica tanto de los países como de las personas, razón por la cual se constituyen en parte fundamental de la historia de estas. El trabajo de evidencia un proceso de indagación para una pyme del sector farmacéutico, para lo cual se revisaron y diagnosticaron diversos aspectos con el propósito de establecer un modelo de sistema de gestión donde se integrara la gestión del conocimiento, gestión de información, gestión de la calidad y la gestión documental, actividades con las cuales la pyme pudiese trabajar con el fin de capitalizar sus …


Evaluación Del Impacto De Los Programas De Alfabetización Informacional De La Biblioteca La Victoria, Ronald Alfonso Villalba Paramo Jan 2020

Evaluación Del Impacto De Los Programas De Alfabetización Informacional De La Biblioteca La Victoria, Ronald Alfonso Villalba Paramo

Sistemas de Información, Bibliotecología y Archivística

La presente Investigación muestra el impacto de la Alfabetización Informacional en el adulto mayor de la Biblioteca la Victoria Ubicada en Bogotá zona San Cristóbal, respondiendo a la pregunta ¿Cuál es el impacto de los programas de Alfabetización Informacional de la Biblioteca la Victoria? y como los contenidos de enseñanza de la biblioteca pública son relevantes para que el adulto mayor sea incluido en una sociedad abordada por la tecnología, donde la Biblioteca Pública tiene un papel crucial para que el adulto mayor sea una persona, Alfabetizada en tecnología y temas de actualidad académica. Los programas de Alfabetización Informacional, el …


Portafolio De Productos Y Servicios Para La Biblioteca Pública Jóse María Del Castillo Y Rada Del Ministerio De Hacienda Y Crédito Público, Angie Lorena Romero Salamanca, Daniel Antonio Useche Rivera Jan 2020

Portafolio De Productos Y Servicios Para La Biblioteca Pública Jóse María Del Castillo Y Rada Del Ministerio De Hacienda Y Crédito Público, Angie Lorena Romero Salamanca, Daniel Antonio Useche Rivera

Sistemas de Información, Bibliotecología y Archivística

El siguiente trabajo tiene como objetivo la elaboración de un portafolio de productos y servicios de información para biblioteca pública José María del Castillo y Rada del Ministerio de Hacienda. Con esto se busca mitigar la carencia de usuarios de esta biblioteca y brindar una perspectiva novedosa a través de los productos y servicios que se implementarán con el portafolio. Con esto se identificarán las necesidades de los usuarios por medio de encuesta y una serie de entrevistas al personal más influyente en la biblioteca para saber cuáles son los retos a los que se van a enfrentar a futuro. …


Metodología Para La Gestión De Archivos Fotográficos Personales, Nancy Yaneth Jiménez Díaz Jan 2020

Metodología Para La Gestión De Archivos Fotográficos Personales, Nancy Yaneth Jiménez Díaz

Sistemas de Información, Bibliotecología y Archivística

La fotografía se ha convertido en un tipo de documento con características diversas, integrándose a las actividades de las personas y de las organizaciones. En este sentido, los archivos incluyen series documentales fotográficas como parte de la evidencia de estás, razón suficiente para establecer lineamientos básicos de la gestión y organización de los documentos fotográficos. En el ámbito personal, los grupos sociales, las familias, las personas también incluyen una amplia cantidad de fotografías que se convierten en parte de la historia de vida de estos grupos y familias. La investigación pretende mostrar en un amplio panorama como la fotografía evolucionó …


Modeling An Open Data Ecosystem : The Case Of Food Service Establishments Inspection In New York State, Mahdi Mirdamadi Najafabadi Jan 2020

Modeling An Open Data Ecosystem : The Case Of Food Service Establishments Inspection In New York State, Mahdi Mirdamadi Najafabadi

Legacy Theses & Dissertations (2009 - 2024)

Open Government Data (OGD) is becoming an increasingly popular initiative around the world. OGD initiatives have a broad number of stakeholders from different sectors and are influenced by many political, societal, and technological factors. In this thesis, I used the notion of Open Government Data Ecosystem (OGDE) as a holistic perspective to the OGD phenomenon, which encompasses important actors, their reciprocal interactions, and their impacts on the OGD environment.


Self-Service Technology In A Library System: An Examination Of Potential Library Member Adoption Of Self-Service Checkout At A Southeastern County Library System, Grace Keisha Phillips-Daley Jan 2020

Self-Service Technology In A Library System: An Examination Of Potential Library Member Adoption Of Self-Service Checkout At A Southeastern County Library System, Grace Keisha Phillips-Daley

Theses and Dissertations

This applied dissertation examined potential library member adoption of self-service technology (SST) in a southeastern county library system. The research framework of this study was based on the Technology Acceptance Model (TAM). More distinctively, this study explored the significance of motivation factors, to include both intrinsic and extrinsic factors, for choosing to use SST in a library environment as the reasonable effect of familiarity in influencing the possibility of its adoption.

The researcher used a non-probability sampling method to identify participants for the study. Edmonds and Kennedy (2013) suggested that surveys were primarily utilized to observe trends, personal attitudes, or …


Measuring And Modeling Information Flow On Social Networks, Tyson Charles Pond Jan 2020

Measuring And Modeling Information Flow On Social Networks, Tyson Charles Pond

Graduate College Dissertations and Theses

With the rise of social media, researchers have become increasingly interested in understanding how individuals inform, influence, and interact with others in their social network and how the network mediates the flow of information. Previous research on information flow has primarily used models of contagion to study the adoption of a technology, propagation of purchase recommendations, or virality of online activity. Social (or "complex") contagions spread differently than biological ("simple") contagions. A limitation when researchers validate contagion models is that they neglect much of the massive amounts of data now available through online social networks. Here we model a recently …


Exploring Secondary Students’ Abilities In Judging The Credibility Of Digital Content On The Internet, Katie Dailey Jan 2020

Exploring Secondary Students’ Abilities In Judging The Credibility Of Digital Content On The Internet, Katie Dailey

Masters Theses

The shift from print to digital environments has created an opportunity and responsibility for educators to focus on instructional planning and practices that reflects the growing complexity of online texts students helping to ensure that their students are information literate. The purpose of this qualitative study is to explore the how 83 eleventh grade high school English students judge the credibility of information on the internet. The researcher used methodological triangulation to qualitatively analyze by comparing and aligning data from the survey results, observations of students during class discussions, responses to class assignments, and the quality ratings of students’ think-aloud …


Collecting Aztalan: An Analysis Of The Chipped Stone Projectile Points From The Milwaukee Public Museum’S Aztalan (Je-0001) Legacy Collections, Kevin Akemann Dec 2019

Collecting Aztalan: An Analysis Of The Chipped Stone Projectile Points From The Milwaukee Public Museum’S Aztalan (Je-0001) Legacy Collections, Kevin Akemann

Theses and Dissertations

This thesis is a qualitative analysis of chipped stone projectile points from the Milwaukee Public Museum that were obtained from private collectors who reportedly surface collected these artifacts from the site of Aztalan (47-JE-0001). Private collections like these, referred to as Legacy Collections, are the result of early collecting and excavation practices, by private and professional individuals, and in this research, have been only partially examined in relation to Aztalan and mostly overlooked in favor of materials with more reliable and scientific provenience. Through this research I developed a database from the MPM's digital inventory, handwritten catalogs, accession records, and …


Food For Thought: An Analysis Of The Robenhausen Botanicals At The Milwaukee Public Museum, Ann S. Eberwein Dec 2019

Food For Thought: An Analysis Of The Robenhausen Botanicals At The Milwaukee Public Museum, Ann S. Eberwein

Theses and Dissertations

Museum collections excavated from archaeological sites represent an intersection of disciplines and provoke innovative approaches to the study of these material aspects of culture. Botanical collections of food remains in particular, provide an opportunity to interrogate the way in which culinary practices in the past are understood. The circum-Alpine lake dwelling complex of central Europe includes hundreds of archaeological sites dating to the Neolithic, Bronze, and Iron Age; many of these sites are known for exceptional preservation of organic material due to a waterlogged, anaerobic environment. Robenhausen, located in eastern Switzerland was one of many lake dwellings discovered in the …


Consumer Health Information Needs, Seeking And Searching Behavior By Rural Residents In The Kachia Grazing Reserve, With A Focus On Vector-Borne Diseases, Musa Dauda Hassan Dec 2019

Consumer Health Information Needs, Seeking And Searching Behavior By Rural Residents In The Kachia Grazing Reserve, With A Focus On Vector-Borne Diseases, Musa Dauda Hassan

Theses and Dissertations

Information is considered the basic material for making decisions. People from all walks of life have information needs for business and personal use. Consumer Health Information (CHI) is an emerging form of information made accessible to the layperson. It is a simplified form of information from the types of information available to medical professionals. This study examines the health information behavior of the residents of one region in the Kachia Grazing Reserve (KGR) located in the North West of the six geopolitical zones of Nigeria. This dissertation explores the health information needs, seeking and searching behavior of the residents of …


Banco Terminológico De Series Y Subseries Documentales Para El Sector Judicial Colombiano, Caso. Altas Cortes Corte Suprema De Justicia, Consejo De Estado, Corte Constitucional Y Consejo Superior De La Judicatura, Victor Manuel Aponte Lopez Oct 2019

Banco Terminológico De Series Y Subseries Documentales Para El Sector Judicial Colombiano, Caso. Altas Cortes Corte Suprema De Justicia, Consejo De Estado, Corte Constitucional Y Consejo Superior De La Judicatura, Victor Manuel Aponte Lopez

Sistemas de Información, Bibliotecología y Archivística

No abstract provided.