Keyword searching and controlled vocabularies such as Library of Congress subject headings (LCSH) proved to work well together in automated technologies and the two systems have been considered complimentary. When the Internet burst onto the information landscape, users embraced the simplicity of keyword searching of this resource while researchers and scholars seemed unable to agree on how best to make use of controlled vocabularies in this huge database. This research looked at a controlled vocabulary, LCSH, in the context of keyword searching of a full text database. The Internet and probably its most used search engine, Google, seemed to have set a standard that users have embraced: a keyword-searchable single search box on an uncluttered web page. Libraries have even introduced federated single search boxes to their web pages, another testimony to the influence of Google. UNT's Thesis and Dissertation digital database was used to compile quantitative data with the results input into an EXCEL spreadsheet. Both Library of Congress subject headings (LCSH) and author-assigned keywords were analyzed within selected dissertations and both systems were compared. When the LCSH terms from the dissertations were quantified, the results showed that from a total of 788 words contained in the 207 LCSH terms assigned to 70 dissertations, 246 of 31% did not appear in the title or abstract while only 8, or about 1% from the total of 788, did not appear in the full text. When the author-assigned keywords were quantified, the results showed that from a total of 552 words from304 author-assigned keywords in 86 dissertations, 50 or 9% did not appear in the title or abstract while only one word from the total of 552 or .18% did not appear in the full text. Qualitatively, the LCSH terms showed a hierarchical construction that was clearly designed for a print ...
Institutional repositories have been introduced as an innovative and alternative technology for scholarly communication and have received considerable attention from scholars across disciplines and around the globe. While some universities in Thailand have developed and implemented institutional repositories for nearly a decade, knowledge of the acceptance and use of institutional repositories on the individual level in the country remains limited. As an insufficient knowledge of technology acceptance and adoption at the individual level is considered partially responsible for the underutilization of innovation or of information system implementation, this study seeks to uncover knowledge regarding the level of institutional repository acceptance and use. This study applied the unified theory of acceptance and use of technology (UTAUT) model and the model of faculty members' self-archiving behavior to investigate factors affecting faculty acceptance and use of university-based institutional repositories. The study employed a mixed methods approach involving a survey followed by semi-structured, one-to-one interview. This study confirms that the success of university-based institutional repositories depends not on a single factor but on multiple factors. The results of the study show that performance expectancy, social influence, and resistance to change were direct determinants of faculty members' intention to use institutional repositories. Additionally, behavioral intention and altruism were found to be the main determinants of actual usage behavior. The findings of this study imply that education in and promotion of open access and institutional repositories are essential and can play an important role in the adoption of institutional repositories. Finally, this study suggests that sustained dialogue and collaborative efforts among faculty members (as contributors and users), libraries/librarians (as institutional repository developers and managers), and other stakeholders within communities are essential for the adoption and success of university-based institutional repositories.
The National Center for Complementary and Integrated Health, National Institutes of Health, U.S. Department of Health and Human Services, has highlighted a need for research to better understand the usage of complementary and alternative medicine practices. The purpose of this study was to investigate the flow of complementary and alternative medicine information among yoga practitioners. The study consisted of 51 yoga practitioners from 7 yoga studio locations. This mixed-methods study used interviews, surveys, and field notes to collect data. Content and social network analyses provided supporting evidence for Rogers' diffusion of innovations theory and Granovetter's strength of weak ties theory. Key findings included a preference for face-to-face communications, students having both strong and weak relationship ties to directors and instructors, and yoga being the top recommended practice. The study suggested that yoga practitioners related to complementary and alternative medicine information through the lens of their friends and relatives, sought information from trusted sources, and used this information to determine which practices were right for them to pursue.
This study explored the acceptance of cloud computing (CC) services by small and medium enterprises (SMEs) in Lagos, Nigeria, which has been missing from CC services literature. It aimed to understand the motivations for adoption, the uses of the services, and the benefits they derive from it. The uses and gratification theory was applied as the theoretic framework for this endeavor. An online survey with close-ended and open-ended questions was distributed to 1200 randomly selected participants through email. In total, 392 valid responses were collected and analyzed using descriptive statistics and categories. The results found that SMEs in Lagos, Nigeria had a low level of awareness and appreciation of CC services. The adoption rate was also low. Unlike their counterparts in other regions, SMEs primary concerns were service downtime, stable power supply, and better internet access. The study found that SMEs were not taking full advantage of the capabilities of CC services. Some sections, however, were doing better than others, such as the information and communications sub-sector. This study suggested that targeted interventions should be conducted to raise the awareness of CC services in SMEs, and to improve their efficient and effective use of CC services. The uses and gratification theory was appropriate for guiding this study to understand the acceptance and use of CC services by SMEs in Lagos, Nigeria.
Job centers aid businesses seeking qualified employees and assist job seekers to select and contact employment and training services. Job seekers are also offered the opportunity to assess their skills, abilities, qualifications, and readiness. Furthermore, job centers ensure that job seekers are complying with requirements that they must meet to benefit from job assistance programs such as unemployment insurance. Yet, claimants often procrastinate and/or suspend their job search efforts even though such actions can make them lose their free time and entitlements, and more importantly they may lose the opportunity to take advantage of free information, services, training, and financial assistance for getting a job to which they have already made a claim. The current work looks to Chatman's "small worlds" work, Johnson's comprehensive model of information seeking, and Wilson's "costly ignorance" construct for contributions to understanding such behavior. Identification of a particular trait or set of traits of job seekers during periods of unemployment will inform a new Job Seeking Activities Model (JSAM). This study purposely examines job seeker information behavior and the factors which influence job seekers' behavior, in particular, family tangible support as a social norm effect. A mixed method, using questionnaires for job hunting completers and non-completers and interviews for experts, was employed for data collection. Quantitative data analysis was conducted to provide the Cronbach α coefficient, Pearson's product moment correlation, an independent-sample t-test, effect size, and binary Logit regression. The qualitative data generated from the interview transcript for each section of the themes and subthemes were color coded. Finally, simultaneous triangulation was carried out to confirm or contradict the results from each method. The findings show that social norms, particularly uncontrolled social support provided by their families, are more likely to make job seekers ignore the relevant information about jobs available to them in favor ...
From the very beginning, library education has been a mixture of theory and practice. Dewey required apprenticeships to be part of the first library school at the University of Chicago as a method to indoctrinate new professional. Today, acculturation is incorporated into the professional education through a large variety of experiential learning techniques, including internships, practicum, field work, and service learning projects, all of which are designed to develop some level of professional skills within an information organization. But, what is done for understanding library culture? It is said that one cannot truly recognize the extent of one's own cultural assumptions, until they have experienced another. This study followed a group of LIS graduate students that took that next step – going to Russia. By employing a critical hermeneutic methodology, this study sought to understand what value students gain by from working on an assessment project in an international school library. Using a horizon analysis, the researcher established the worldview of participants prior to their departure, analyzed their experience through post-experience interviews, and constructed an understanding of value. Among other concepts, the researcher looked specifically to see whether "library cultural competency", understanding library culture in global context, was developed through working on a service learning project within an international school library. This dissertation provides feedback for the program leaders and ideas for future research.
Information-seeking behavior is a mixture of activities and attitudes, oftentimes motivated by an individual's need to make a decision. One underlying element of this mixture is cognitive authority - which sources (e.g., individuals, institutions, texts, etc.) can be trusted to fulfil the information needs? In order to gain insight into the dynamics of cognitive authority selection behavior which is an information seeking behavior, this study explored primary source text data (316 text records) that reflected selection in the mundaneness of life (advice column submissions and responses). Linguistic analysis was performed on the data using the Linguistic Inquiry Word Count (LIWC2015) software package. Pearson correlation and 1-sample T tests revealed the same 45 statistically significant relationships (SSRs) in the word usage behavior of all subgroups. As a result of the study, the gap in research formed from the lack of quantitative models of cognitive authority relationships was addressed via the development of the Wordprint Classification System which was used to generate a cognitive authority relationship model in the form of a cognitive authority intra-segment wordprint. The findings and implications of this study may provide a contribution to the body of work in the area of information literacy and information seeker behavior by revealing factors that information scientists can address to help meet information seekers' needs. Additionally, the Wordprint Classification System may be used in such disciplines as psychology, marketing, and forensic linguistics to create to create models of various relationships or individuals through the use of written or spoken word usage patterns.
In their studies on student motivation in th4e 1990s, Gorham & Christophel and Christophel & Gorham found that students perceived their own demotivation to be caused by instructor behaviors. While there are studies that explore the topic of student demotivation and other studies that illustrate the great influence instructors have on student information seeking behaviors, research focusing on the connection between these two concepts is almost nonexistent. Using Gorham & Christophel's concept of instructor-owned student demotivation, this mixed-methods study sought to identify which instructor behaviors doctoral computer science and information science students found demotivating and to what extent their perceptions of these demotivating instructor behaviors influenced their information seeking behaviors in a face-to-face classroom. Demographic and student-perceived demotivating instructor behavior surveys along with semi-structured interviews and follow-up questions were used to collect data. The surveys will be analyzed using descriptive statistics in Excel, and the semi-structured interviews and follow up questions were analyzed using content analysis and Colaizzi's method of phenomenological enquiry in NVivo. The findings showed that instructor demotivating behaviors not only influence student information seeking behaviors in the classroom, but they also can lead to lasting effects on the student. In addition, the participants have expectations of instructor behaviors, which come from their own experiences. These expectations also influence the level of demotivation they feel in a face-to-face classroom.
Mobile banking services have changed the design and delivery of financial services and the whole banking sector. Financial service companies employ mobile banking applications as new alternative channels to increase customers' convenience and to reduce costs and maintain profitability. The primary focus of this study was to explore the Saudi bank customers' perceptions about the adoption of mobile banking applications and to test the relationships between the factors that influence mobile banking adoption as independent variables and the action to adopt them as the dependent variable. Saudi customers' perceptions were tested based on the extended versions of IDT, TAM and other diffusion of innovation theories and frameworks to generate a model of constructs that can be used to study the use and the adoption of mobile technology by users. Koenig-Lewis, Palmer, & Moll's (2010) model was used to test its constructs of (1) perceived usefulness, (2) perceived ease of use, (3) perceived compatibility, (4) perceived credibility, (5) perceived trust, (6) perceived risk, and (7) perceived cost, and these were the independent variables in current study. This study revealed a high level of adoption that 82.7% of Saudis had adopted mobile banking applications. Also, the findings of this study identified a statistically significant relationship between all of demographic differences: gender, education level, monthly income, and profession and mobile banking services among adopters and non-adopters. Seven attributes relating to the adoption of mobile banking applications were evaluated in this study to assess which variables affected Saudi banks customers in their adoption of mobile banking services. The findings indicated that the attributes that significantly affected the adoption of mobile banking applications among Saudis were perceived trust, perceived cost, and perceived risk. These three predictors, as a result, explained more than 60% of variance in intention to adopt mobile banking technology in Saudi Arabia. ...
Although there has been research conducted in the area of information seeking behavior in children, the research focusing on young children, more specifically on pre-kindergarten students, is almost nonexistent. Children at this age are in the preoperational developmental stage. They tend to display curiosity about the world around them, and use other people as a means to gain the information they are seeking. Due to the insistence from President Obama to implement pre-kindergarten programs for all low and middle class children, the need to understand the cognitive, emotional, and physical needs of these children is becoming increasingly imperative. To researchers, the actions displayed by these young children on a daily basis remain vital in determining the methods by which they are categorized, studies, and even taught. This study employed Deci and Ryan's self-determination theory (SDT), Dervin's sense-making theory, Kuhlthau''s information search process model (ISP), and Shenton and Dixon's microcosmic model of information seeking via people to lay the theoretical foundational framework. This ethnographic study aimed to fill the age gap found in information seeking literature. By observing young children in the school setting, I gained insight into how these children seek information. The resulting information collected via field observations and semi-structured interviews were coded based on Shenton and Dixon's model of information seeking via people. The findings, in Chapter 5, revealed emerging codes and trends in the information seeking behaviors of pre-kindergarten students.
Online communities of practice (CoPs) provide social spaces for people to connect, learn, and engage with one another around shared interests and passions. CoPs are innovatively employed within industry and education for their inherent knowledge management characteristics and as a means of improving professional practice. Measuring the success of a CoP is a challenge researchers are examining through various strategies. Recent literature supports measuring community effectiveness through the perceptions of its members; however, evaluating a community by means of member perception introduces complicating factors from outside the community. In order to gain insight into the importance of external factors, this quantitative study examined the influence of factors in the professional lives of educators on their perceptions of their CoP experience. Through an empirical examination of CoPs employed to connect educators and advance their professional learning, canonical correlation analysis was used to examine correlations between factors believed to be influential on the experiences of community members.
While journalists were once viewed as gatekeepers, dispensing news and information via one-way communication channels, their role as information provider has evolved. Nowhere is this more apparent than on the social networking site Twitter, where information seekers have unprecedented access to information providers. The two-way communication that these information seekers have come to expect can be challenging for organizations such as ESPN who have multiple Twitter accounts and millions of followers. By designating one team of people as responsible for the organization's largest Twitter account, SportsCenter, ESPN has sought to establish manageable methods of interacting with this account's followers, while furthering the goals of the organization and providing sports news around the clock. This study provides a better understanding of the group responsible for ESPN's SportsCenter Twitter account: the motivation and strategies behind the group's Twitter use as well as the dynamics of this network, such as information flow and collaboration. Relying on the Information Seeking and Communication Model, this study also provides a better understanding of information exchanges with those outside the network, specifically a selection of the account's Twitter followers. Additionally, the role of journalist as information provider and certain themes that emerged from the content of the tweets are discussed. The research employed social network analysis and exploratory, descriptive case study methods. The results of this study contribute to social network and information theory as well as to journalistic and information science practice.
Written notation has a long history in many musical traditions and has been particularly important in the composition and performance of Western art music. This study adopted the conceptual view that a musical score consists of two coordinated but separate communication channels: the musical text and a collection of composer-selected performance marks that serve as an interpretive gloss on that text. Structurally, these channels are defined by largely disjoint vocabularies of symbols and words. While the sound structures represented by musical texts are well studied in music theory and analysis, the stylistic patterns of performance marks and how they acquire contextual meaning in performance is an area with fewer theoretical foundations. This quantitative research explored the possibility that composers exhibit recurring patterns in their use of performance marks. Seventeen solo piano sonatas written between 1798 and 1913 by five major composers were analyzed from modern editions by tokenizing and tabulating the types and usage frequencies of their individual performance marks without regard to the associated musical texts. Using analytic methods common in information science, the results demonstrated persistent statistical similarities among the works of each composer and differences among the work groups of different composers. Although based on a small sample, the results still offered statistical support for the existence of recurring stylistic patterns in composers' use of performance marks across their works.
This dissertation examined how previous information literacy training, law student gender, age, and previously obtained education affects first, second, and third year law students selection of information sources, their understanding of common knowledge, and their decision of whether or not to give attribution to these sources. To examine these factors, this study implemented a paradigm called the principle of least effort that contended humans in general tended to complete the least amount of work possible to complete presented tasks. This study sought to discover whether law students follow this same path of completing the least amount of work possible to finish presented tasks, and whether this behavior affects information source selection, citation, and understanding of common knowledge. I performed six focus groups and crafted and disseminated an online survey to examine these factors. Via this data collection, it was discovered that law students do exhibit some differences in understanding of citation and citation behavior based on age and their year in law school. They also exhibited some differences regarding common knowledge based on their year in law school, where they received their information literacy training, and where they attend law school. Yet, no statistically significant differences were discovered regarding where one attends law school and citation and source selection. Further this study revealed law students do follow this paradigm and seek the path of least resistance to accomplish law school assignments.
Cyber aggression came about as a result of advances in information communication technology and the aggressive usage of the technology in real life. Cyber aggression can take on many forms and facets. However, the main focus of this study is cyberbullying and cyberstalking through information sharing practices that might constitute digital aggressive acts. Human aggression has been extensively investigated. Studies focusing on understanding the causes and effects that can lead to physical and digital aggression have shown the prevalence of cyber aggression in different settings. Moreover, these studies have shown strong relationship between cyber aggression and the physiological and physical trauma on both perpetrators and their victims. Nevertheless, the literature shows a lack of studies that could measure the level of acceptance and tolerance of these dangerous digital acts. This study is divided into two main stages; Stage one is a qualitative pilot study carried out to explore the concept of cyber aggression and its existence in Saudi Arabia. In-depth interviews were conducted with 14 Saudi social media users to collect understanding and meanings of cyber aggression. The researcher followed the Colaizzi’s methods to analyze the descriptive data. A proposed model was generated to describe cyber aggression in social media applications. The results showed that there is a level of acceptance to some cyber aggression acts due to a number of factors. The second stage of the study is focused on developing scales with reliable items that could determine acceptability and tolerability of cyber aggression. In this second stage, the researcher used the factors discovered during the first stage as source to create the scales’ items. The proposed methods and scales were analyzed and tested to increase reliability as indicated by the Cronbach’s Alpha value. The scales were designed to measure how acceptable and tolerable is cyber-bullying, cyber-stalking in Saudi ...
Energy and the natural environment are central concerns among stakeholders across the globe. Decisions on this scale often require interaction among a myriad of institutions and individuals who navigate a complex variety of challenges. In Denton, Texas in 2014, voters were asked to make such a decision when tasked with a referendum to determine whether the city would continue to allow hydraulic fracturing activity within its borders. For social scientists, this situation requires further analysis in an effort to better understand how and why individuals make the decisions they do. One possible approach for exploring this process is a method of poststructuralist critical rhetorical analysis, which is concerned with how individuals’ identities change through interaction with institutions. This study reflects upon the texts themselves through a poststructuralist critical rhetorical analysis of images employed by those in favor of and those against Denton’s ban on hydraulic fracturing in an attempt to identify images that alter the grid of intelligibility for the audience. The paper includes deliberation about the relative merits, subsequent disadvantages, and possible questions for further study as they relate to the theoretical implications of critical rhetorical analysis as information science. Ultimately, the study identifies poststructuralist critical rhetorical analysis as a method for solving information science problems in a way that considers closely the way identity is shaped through engagement with institutions.
Modeling the "thick description" of photographs began at the intersection of personal and institutional descriptions. Comparing institutional descriptions of particular photos that were also used in personal online conversations was the initial phase. Analyzing conversations that started with a photographic image from the collection of the Library of Congress (LC) or the collection of the Manchester Historic Association (MHA) provided insights into how cultural heritage institutions could enrich the description of photographs by using informal descriptions such as those applied by Facebook users. Taking photos of family members, friends, places, and interesting objects is something people do often in their daily lives. Some photographic images are stored, and some are shared with others in gatherings, occasions, and holidays. Face-to-face conversations about remembering some of the details of photographs and the event they record are themselves rarely recorded. Digital cameras make it easy to share personal photos in Web conversations and to duplicate old photos and share them on the Internet. The World Wide Web even makes it simple to insert images from cultural heritage institutions in order to enhance conversations. Images have been used as tokens within conversations along with the sharing of information and background knowledge about them. The recorded knowledge from conversations using photographic images on Social Media (SM) has resulted in a repository of rich descriptions of photographs that often include information of a type that does not result from standard archival practices. Closed group conversations on Facebook among members of a community of interest/practice often involve the use of photographs to start conversations, convey details, and initiate story-telling about objets, events, and people. Modeling of the conversational use of photographic images on SM developed from the exploratory analyses of the historical photographic images of the Manchester, NH group on Facebook. The model was influenced by the ...
Following the decision by the Supreme Court of the United States in Brown v. Entertainment Merchants Association (2011), which struck down the state of California’s appeal to restrict the sale of games deemed to have “deviant violence” to those 18 or older and the court’s recommendation that parents use the ESRB Ratings System instead, this ethnographic study sought to better understand what parents thought of laws on video games and how they used the recommended ratings system. A total of 30 interviews using semi-structured open-ended questions were conducted and analyzed to reveal what parents thought of laws on video games, how they used the ESRB Ratings System to assess video game content, and what other methods they used for video game content assessment in addition to the ratings system. This research utilized Dervin and Nilan’s (1986) sense-making methodology as a way to learn how parents bridged their knowledge gap when it came to learning about video game content and how they made sense of the knowledge gained to determine the content appropriateness for their children. Analyses of the collected data provided the foundation for a model on the effects of the parent-child relationship on parental information behavior.
Information plays a significant role in the success of investment strategies. Within a non-advisory context, individual investors elect to build and manage their investment portfolios to avoid the cost of hiring professional advisors. To cope with markets’ uncertainty, individual investors should acquire, understand, and use only relevant information, but that task can be affected by many factors, such as domain knowledge, cognitive and emotional biases, information overload, sources’ credibility, communication channels’ accuracy, and economic costs. Despite an increased interest in examining the financial performance of individual investors in Saudi Arabia, there has been no empirical research of the information behavior of individual investors, or the behavioral biases affecting the investment decision making process in the Saudi stock market (SSM). The purpose of this study was to examine this information behavior within a non-advisory contextualization of their investment decision-making process through the use of an online questionnaire instrument using close-ended questions. The significant intervening variables identified in this study influence the individual investors’ information behavior across many stages of the decision making process. While controlling for gender, education, and income, the optimal information behavior of individual investors in the SSM showed that the Experience factor had the greatest negative effect on the Information Seeking Behavior of individual investors. This was followed by Risk Tolerance, Financial Self-Efficacy, Emotional Biases, Education Level, Formal Information Access, Regret Aversion Bias, and Subjective Financial Knowledge. The Information Acquisition and Information Searching Behavior was influenced by the Acquisition Skepticism, Regret Aversion Bias, Formal Information Access, Overconfidence, and Information Seeking Behavior. Furthermore, the findings indicate that Formal Information Sources have a statistically significant positive effect on the Information Seeking Behavior, and on the Information Acquisition and Information Searching of individual investors in Saudi Arabia. Finally, the Socioeconomic Status (SES) of individual investors in Saudi Arabia was significantly influenced ...
Boundary spanners-in-practice are individuals who inhabit more than one social world and bring overlapping place perspectives to bear on the function(s) performed within and across each world. Different from nominated boundary spanners, they are practitioners responsible for the 'translation' of each small world's perspectives thereby increasing collaboration effectiveness to permit the small worlds to work synergistically. The literature on Knowledge Management (KM) has emphasized the organizational importance of individuals performing boundary spanning roles by resolving cross-cultural and cross-organizational knowledge system conflicts helping teams pursue common goals through creation of "joint fields" - a third dimension that is co-jointly developed between the two fields or dimensions that the boundary spanner works to bridge. The Copeland and O'Connor Nondeterministic Model of Engineering Design Activity was utilized as the foundation to develop models of communication mechanics and dynamics when multiple simultaneous interactions of the single nondeterministic user model, the BSIP and two Subject Matter Experts (SMEs), engage during design activity in the Problem-Solving Space. The Problem-Solving Space defines the path through the volumes of plausible answers or 'solution spaces' that will satisfice the problem presented to the BSIP and SMEs. Further model refinement was performed to represent expertise seeking behaviors and the physical and mental models constructed by boundary spanners-in-practice during knowledge domain mapping. This was performed by mapping the three levels of communication complexity (transfer, translation and transformation) to each knowledge boundary (syntactic, semantic and pragmatic) that must be bridged during knowledge domain mapping.
This study investigates a semi-automatic method for creation of topical labels representing the topical concepts in information objects. The method is called rotated latent semantic indexing (rLSI). rLSI has found application in text mining but has not been used for topical labels generation in digital libraries (DLs). The present study proposes a theoretical model and an evaluation framework which are based on the LSA theory of meaning and investigates rLSI in a DL environment. The proposed evaluation framework for rLSI topical labels is focused on human-information search behavior and satisfaction measures. The experimental systems that utilize those topical labels were built for the purposes of evaluating user satisfaction with the search process. A new instrument was developed for this study and the experiment showed high reliability of the measurement scales and confirmed the construct validity. Data was collected through the information search tasks performed by 122 participants using two experimental systems. A quantitative method of analysis, partial least squares structural equation modeling (PLS-SEM), was used to test a set of research hypotheses and to answer research questions. The results showed a not significant, indirect effect of topical label type on both guidance and satisfaction. The conclusion of the study is that topical labels generated using rLSI provide the same levels of alignment, guidance, and satisfaction with the search process as topical labels created by the professional indexers using best practices.
Enterprise resource planning (ERP) systems are regarded as among the most innovative information technology products developed over the past two decades. Thus, they have become the backbone of management information systems in the organizations that have implemented them. The difficulties associated with their high failure rate, however, have been the subject of extensive studies. To expand on this knowledge, this study has two research objectives: to examine the relationship between corporate governance structures and implementation results and to investigate whether implementation outcomes vary by country. This study focuses on the project steering committee’s involvement, internal auditors’ participation, and the change management plan implementation. The results demonstrate that steering committee involvement is a primary factor that influenced the success of ERP implementation; and that institutional factors in country of deployment are important determinants of ERP project outcome.
Scholarly and scientific communication has a long history, while the Open Access (OA) movement began to take part in this communication with the emergence of Internet in the late 1960s and the web that emerged in mid-1990s. OA is beneficial for sharing knowledge because the OA movement demands scholarly literature freely available on the internet and it is free of most licensing restriction copyright. OA will close the barrier of access to knowledge. The OA movement in Indonesia may be considered slow. So far, only 33 academic libraries have registered their repositories with OpenDOAR, which is still small compared to the total number of HE institutions in Indonesia. Those 33 OARs vary in the stages of development. Some have already had large size of contents, while others are still developing. Using Weiner’s theory of organizational readiness for change, this mixed method investigates the readiness of academic librarians for Open Access Repository implementation. The results show that academic librarians in Indonesia are somewhat familiar with OA and OAR. However, their understanding of OA is still limited to the technical nature of it. They also know the benefits of OA in relation to scholarly communication and are ready to implement OAR, but the implementation was mostly based on the goal of achieving a specific rank in the world-class university ranking and Webometrics. They implemented Open Access Repositories with limited technological infrastructure, skills, and limited knowledge of OA.
This study explores the everyday life information seeking (ELIS) behavior of Catholic clergy in Northern Nigeria and describes their information use environment (IUE). It employed a mixed-method case study using survey and episodic interview techniques of data collection. The ELIS of Savolainen, the IUE of Taylor and the small world of Chatman were theoretical frameworks that guided this study. Findings showed that the IUE of these Catholic clergy is shaped by four elements: (1) geographical location and culture, (2) the celibate clergy, (3) their information needs, and (4) the information sources used to resolve these needs. Three types of information needs were identified: essential needs, circumstantial needs and intermittent needs. There was a high interrelatedness between the effects of culture and celibacy on the information seeking of these clergy. They are not likely to cross boundaries of their world to seek particularly essential information about their ministry or private lives. The findings of this study align with Chatman’s proposition that members who live in the round will not cross the boundaries of their world to seek information. The study found problems with access and availability of information, which included lack of familiarity with electronic/online library databases among the clergy, and the lack of archives and documentation of records and historical materials. It recommended the development of an archiving and documentation plan that digitizes paper documents for electronic management, including policies on data curation for the Catholic religious institutions in Nigeria.
This study began with an interest in corporate libraries and a genuine curiosity in the information preferences and resources valued by executive leaders at JET Aircraft Co. Executive information preferences and the downward trend in special libraries initiated the investigation of information seeking among executive leaders and yielded the inquiry: What resources do JET Aircraft Co. executives value when they need information? Employing an ethnographic approach, this study investigated what JET Aircraft Co. executives know about information resources, what they believe about information resources, and how they act when they require information. While JET Aircraft Co. maintained a special corporate library called the Company Research Library (CRL), the purpose of this study was to determine what resources were of value to executives at JET Aircraft Co., understanding that the CRL may or may not be a resource executives’ value. As a byproduct, this study also sought to establish executive information preferences and perceptions of the CRL. Information seeking at the executive level, studied through an ethnographic lens, provided insight into how executives at JET Aircraft Co. work and what they prefer, and it established a baseline for the Company Research Library’s position among the resources valued by executives.
Automatic language identification has been applied to short texts such as queries in information retrieval, but it has not yet been applied to metadata records. Applying this technology to metadata records, particularly their title elements, would enable creators of metadata records to obtain a value for the language element, which is often left blank due to a lack of linguistic expertise. It would also enable the addition of the language value to existing metadata records that currently lack a language value. Titles lend themselves to the problem of language identification mainly due to their shortness, a factor which increases the difficulty of accurately identifying a language. This study implemented four proven approaches to language identification as well as one open-source approach on a collection of multilingual titles of books and movies. Of the five approaches considered, a reduced N-gram frequency profile and distance measure approach outperformed all others, accurately identifying over 83% of all titles in the collection. Future plans are to offer this technology to curators of digital collections for use.
This research explored the information needs of patient families and hospital staff at a pediatric hospital system in Dallas, Texas. Library statistics recorded in four hospital libraries from 2011 - 2013 were used to analyze the information requests from patient families and hospital staff. Crosstabulations revealed the extent to which patient families and hospital staff used the libraries to satisfy their information needs. The data showed that patient families used the libraries very differently than hospital staff. Chi-square tests for independence were performed to identify the relationships between the Classification (Patient Family, Hospital Staff) and two descriptors of information needs (Request Type, Resources Used). There were a total of 1,406 information requests analyzed. The data showed that patient families and hospital staff information requests differed greatly in the number of information requests, the type of information requested, the resources used and the time the library staff spent on the requests. Chi-square analyses revealed relationships statistically significant at the p < .05 level; however, the strength of the relationships varied.
Terrorist organizations and individuals make use of the Internet for supportive activities such as communication, recruiting, financing, training, and planning operations. However, little is known about the level of computer-based (“cyber”) threat such terrorist organizations and individuals pose. One step in facilitating the examination and assessment of the level of cyber threat posed by terrorist organizations and individuals is development of an assessment tool or methodology. This tool would guide intelligence collection efforts and would support and facilitate comparative assessment of the cyber threat posed by terrorist organizations and individuals through the provision of a consistent method of assessment across time, amongst organizations and individuals, and between analysts. This study leveraged the professional experience of experts to engineer a new functional construct – a structured analytical technique designed to assess the cyber threat posed by terrorist entities and individuals. The resultant instrument was a novel structured analytical construct that uses defined indicators of a terrorist organization/individual’s intent to carry out cyber attacks, and their capability to actually do so as measures of an organization/individual’s overall level of cyber threat.
The author explores the current state of information exchange and access in the procurement process for mobility assistive equipment. While the idealized model is of a linear process starting with a need and ending with the purchase, in practice the procedures for acquiring a device such as a wheelchair or electric scooter can be a time consuming task that involves client, family, medical care specialists, vendors, manufacturers, insurance companies and possibly alternate sources of funding. This study utilized Participatory Action Research (PAR) to collect both qualitative and quantitative data about information sources such as the Internet, the medical community, and vendors. The findings of this study suggest that in spite of the presence of the Internet, overall primary sources are similar to the traditional model and that for most there is no one source that could be easily accessed for information. A brief examination is made of the “Information landscape” utilized in the process and a brief discussion of two relatively unmentioned information sources: expos and the wheelchair sports community.
This mixed-method study explored cataloger’s judgment through the presence of text as entered by catalogers for the 11 electronic resource items during the National Libraries test for Resource Description and Access (RDA). Although the literature discusses cataloger’s judgment and suggests that cataloging practice based on new cataloging code RDA will more heavily rely on cataloger’s judgment, the topic of cataloger’s judgment in RDA cataloging was not formally studied. The purpose of this study was to study the differences and similarities in the MARC records created as a part of the RDA National Test and to determine if the theory of bounded rationality could explain cataloger’s judgment based on the constructs of cognitive and temporal limits. This goal was addressed through a content analysis of the MARC records and various statistical tests (Pearson’s Chi-square, Fisher’s Exact, and Cramer’s V). Analysis of 217 MARC records was performed on seven elements of the bibliographic record. This study found that there were both similarities and differences among the various groups of participants, and there are indications that both support and refute the assertion that catalogers make decisions based on the constructs of time and cognitive ability. Future research is needed to be able to determine if bounded rationality is able to explain cataloger’s judgment; however, there are indicators that both support and refute this assertion. The findings from this research have implications for the cataloging community through the provision of training opportunities for catalogers, evaluating workflows, ensuring the proper indexing of bibliographic records for discovery, and recommended edits to RDA.
Early research on just why it might be the case that “the mass of men lead lives of quiet desperation” suggested that denial of relevance was a significant factor. Asking why denial of relevance would be significant and how it might be resolved began to raise issues of the very nature of questions. Pursuing the nature of questions, in light of denial of relevance and Thoreau’s “quiet desperation” provoked a journey of modeling questions and constructing a biography of the initial question of this research and its evolution. Engaging literature from philosophy, neuroscience, and retrieval then combined with deep interviews of successful lawyers to render a thick, biographical model of questioning.
eHealth is commonly defined as health services and information provided through the Internet and related technologies. Health educators have taken advantage of Internet and social media venues to disseminate health information essential to health risk management, disease prevention, and disease management and did not have a validated theoretical model to explain their experiences. The goal of this study was to create and test an integrated model of eHealth communication specific to 18-30 year old college students based on five research questions that identified and confirmed the factors most highly correlated with the presentation of health information on Internet or social media venues that improve eHealth literacy and provoke eHealth behavioral intention among college students. A sample of over 1400 18-30 year old college students was surveyed about their general and health information related use of the Internet and social media. As a result of exploratory factor analysis and subsequent structural equation modeling, the proposed theoretical model was revised and tested for statistical power. Two revised integrative models of eHealth communication, one for Internet and one for social media, were developed and validated. The model for social media shows statistically significant paths throughout the model; however, the model for the Internet reveals that the path between two constructs and Online Health Behavior are not statistically significant and is worthy of further examination. This study has important practical implications for eHealth educators, organizations dedicated to informing the public about specific diseases or health promotion techniques, health practitioners seeking improved strategies for effective eHealth message design, and to health information professionals.
The purpose of the study was to explore faculty attitudes towards institutional repositories in order to better understand their research habits and preferences. A better understanding of faculty needs and attitudes will enable academic libraries to improve institutional repository services and policies. A phenomenological approach was used to interview fourteen participants and conduct eight observations to determine how tenure-track faculty want to disseminate their research as well as their attitudes towards sharing research data. Interviews were transcribed and coded into emerging themes. Participants reported that they want their research to be read, used, and to have an impact. While almost all faculty see institutional repositories as something that would be useful for increasing the impact and accessibility of their research, they would consider publishers’ rights before depositing work in a repository. Researchers with quantitative data, and researchers in the humanities are more likely to share data than with qualitative or mixed data, which is more open to interpretation and inference. Senior faculty members are more likely than junior faculty members to be concerned about the context of their research data. Junior faculty members’ perception’ of requirements for tenure will inhibit their inclination to publish in open access journals, or share data. The study used a novel approach to provide an understanding of faculty attitudes and the structural functionalism of scholarly communication.
Comics, graphic novels, and manga differ appreciably from textual narrative formats, and materials with increasingly visual elements have found their way into progressive and student-centered library collections. But many educators and librarians still resist inclusion of graphic narratives in school libraries and devalue the reading practice of students who prefer more visual texts. Using the framework of radical change, which posits that both text conventions and reader expectations for text are increasingly multimodal as they possess characteristics of evolving digital media, this study considered the relationship of the characteristics of text individual students prefer, particularly those they select from the school library, and their attitudes towards aspects of reading practice as evidenced through the Adolescent Motivation to Read Profile instrument. Survey data was supplemented with circulation history from the library management system to inform a correlational study punctuating attitudinal differences based on reader preferences. Findings include high school students who engage with graphic narrative text formats reporting more favorable views of libraries and reading. There is a demonstrable distinction in attitudes between students who prefer more visual text when compared with peers with more traditional print affinities. Student engaging with graphic narrative texts also report more frequent engagement with text overall. These demonstrated relationships should help to legitimize the inclusion of more graphic narrative text formats in school library collections.
Student satisfaction and service quality are interrelated constructs that are associated with improving student retention. This research investigated the relationships between these constructs in the context of an institution of higher education as an information system and sought to reduce the dimensionality of what have traditionally been considered orthogonal factors of these constructs in order to produce a parsimonious model and survey instrument that may be useful in assessing and predicting overall student satisfaction and overall service quality. The methods of analysis used in this study are quantitative in nature and included the use of descriptive univariate, bivariate, and multivariate analyses; exploratory factor analysis to examine latent dimensions within the data; and multiple linear regressions to measure the predictive efficacy of combinations of variables with respect to overall student satisfaction and overall service quality. It was hypothesized that the statistical treatment of the data would show that some dimensions routinely collapse, leading to possible valuable theoretical implications.
Enterprise content management (ECM) is an emerging research area that is beginning to find attention in academia. While the private sector has a growing industry and community for ECM, academia is starting to address this with direct links to the better-established areas of information systems and enterprise resource planning systems. ECM has been viewed as a higher-level concept of methods and strategies pertaining to content management in the context of the enterprise. Like many other organizational wide systems, ECM systems are complex, difficult to implement and risk failing to meet expected success measures. Definitions for what exactly constitutes an ECM system are still evolving. The major issues with ECM systems are that they are increasingly being implemented by organizations in an attempt to address the unmanageable amount of unstructured content over its lifecycle, compliance pressures, collaboration needs, content integrity and continuity, and controlling costs. However, the implementation problems are many and diverse, such as determining content and business processes to be included, determining technologies to fit the organizational needs, how to integrate with existing systems, and managing organizational culture and change for acceptance. There is currently little academic research in the area of ECM, and research determining the key factors that contribute to successful implementations of these systems is absent. This research addressed the existing gap in ECM research and investigated the key success factors for the implementations of ECM systems with the objectives of identifying a set of success factors. Guided by research in related areas and through developing a theoretical framework and the resulting research model, the study used a qualitative case study method to identify ECM implementation factors and their relationship to organizational culture and people, business processes, technology and organizational content. The results of this research were twofold, first by contributing needed research in the ECM ...
Instructional communication research clearly indicates that instructor immediacy contributes significantly to effective instruction. However, the majority of immediacy studies have been conducted in traditional (face-to-face) classroom environments. More recently, instructional communication research has focused on assessing the impact of immediacy in online classroom environments. Again, immediacy appears to significantly contribute to effective instruction. The challenge is that most recent immediacy studies use immediacy measurements developed to test immediacy behaviors in face-to-face settings. Considering the lack of nonverbal communication and limited or absent synchronous or verbal communication in online instructional settings, the behaviors contributing most significantly to perceived immediacy, researchers need to reassess the immediacy construct in online environments. The present research explores and identifies behaviors reported by instructors to establish psychological closeness (i.e., immediacy) in online learning environments and assesses to what extent these behaviors are similar to or different from face-to-face immediacy-producing behaviors.
As non-institutional digital image collections expand into social media, independent non-professional image curators are emerging, actively constructing alternative naming conventions to suit their needs in a social collecting environment. This project considers how independent user-curators are developing particular sense-making behaviors as they actively contribute names to large, unstructured social image collections. In order to capture and explore this evolving language adaptation, Pinterest names are analyzed using a matrix composed of Panofsky’s three strata of subject matter, Rosch’s levels of categorical abstraction, Shatford Layne’s image attributes and Wittgenstein’s language game constructions. Analyzing Pinterest image names illuminates previously unnoticed behaviors by independent user-curators as they create shared collections. Exploring the various language choices which user-curators select as they apply this new curating vocabulary helps identify underlying user needs not apparent in traditionally curated collections restricted to traditional naming conventions.
Humans are very effective at evaluating information visually. Scientific visualization is concerned with the process of presenting complex data in visual form to exploit this capability. A large array of tools is currently available for visual presentation. This research attempts to evaluate the effectiveness of three different presentation models that could be used for scientific visualization. The presentation models studied were, two-dimensional perspective rendering, field sequential stereoscopic three dimensional rendering and immersive virtual reality rendering. A large section of a three dimensional sub surface seismic survey was modeled as four-dimensional data by including a value for seismic reflectivity at each point in the survey. An artificial structure was randomly inserted into this data model and subjects were asked to locate and identify the structures. A group of seventeen volunteers from the University of Houston student body served as subjects for the study. Detection time, discrimination time and discrimination accuracy were recorded. The results showed large inter subject variation in presentation model preference. In addition the data suggest a possible gender effect. Female subjects had better overall performance on the task as well as better task acquisition.
This exploratory research examined an information policy formation process for the adoption of open source software (OSS) in Uganda. Grounded in a pragmatist tradition, this theoretical and empirical study pursued a qualitative research approach with a triangulation of theoretical concepts, data collection, and analysis techniques in an iterative and interactive process. The design provided a powerful context to develop and conduct field activities in Kampala with a purposeful sample of 22 participants, 20 in interviews and 5 in a focus group discussion. The research design enhanced consistency in the evidence from the data, increased robustness in the results, and confidence in the findings. The results highlighted a vibrant ICT sector in Uganda, underlined the multiple stakeholders and their competing interests in the policy, revealed a lack of consensus between the government and OSS promoters on the meaning of OSS, and illuminated the benefits in the OSS model over proprietary software. The stakeholders' conflicting perceptions appear to be too far apart to allow meaningful progress and are derailing the policy. Unless their conflicting perceptions are resolved, the OSS policy will continue stagnating. The study fills critical information gaps in Uganda’s policy formation processes, provides timely and relevant information to holistically understand a complex policy formation stage to enable stakeholders to resolve their impasse and enact a law to embrace OSS. It breaks ground in information policy research in framing policy formation processes for new ICTs, such as OSS, as ideologically-oriented. The findings offer ideas to scholars and African countries to draw applicable lessons.
As a discipline, information systems (IS) has struggled with the challenge of alignment of product (primarily software and the infrastructure needed to run it) with the needs of the organization it supports. This has been characterized as the pursuit of alignment of information technology (IT) with the business or organization, which begins with the gathering of the requirements of the organization, which then guide the creation of the IS requirements, which in turn guide the creation of the IT solution itself. This research is primarily focused on developing and validating an instrument to operationalize such requirements capabilities. Requirements capabilities at the development of software or the implementation of a specific IT solution are referred to as capabilities for software requirements or more commonly systems analysis and design (SA&D) capabilities. This research describes and validates an instrument for SA&D capabilities for content validity, construct validity, internal consistency, and an exploratory factor analysis. SA&D capabilities were expected to coalesce strongly around a single dimension. Yet in validating the SA&D capabilities instrument, it became apparent that SA&D capabilities are not the unidimensional construct traditionally perceived. Instead it appears that four dimensions underlie SA&D capabilities, and these are associated with alignment maturity (governance, partnership, communications, and value). These sub factors of requirements capabilities are described in this research and represent distinct capabilities critical to the successful alignment of IT with the business.
This research investigated issues related to normalizing punctuation marks from a text retrieval perspective. A punctuated-centric approach was undertaken by exploring changes in meanings, whitespaces, words retrievability, and other issues related to normalizing punctuation marks. To investigate punctuation normalization issues, various frequency counts of punctuation marks and punctuation patterns were conducted using the text drawn from the Gutenberg Project archive and the Usenet Newsgroup archive. A number of useful punctuation mark types that could aid in analyzing punctuation marks were discovered. This study identified two types of punctuation normalization procedures: (1) lexical independent (LI) punctuation normalization and (2) lexical oriented (LO) punctuation normalization. Using these two types of punctuation normalization procedures, this study discovered various effects of punctuation normalization in terms of different search query types. By analyzing the punctuation normalization problem in this manner, a wide range of issues were discovered such as: the need to define different types of searching, to disambiguate the role of punctuation marks, to normalize whitespaces, and indexing of punctuated terms. This study concluded that to achieve the most positive effect in a text retrieval environment, normalizing punctuation marks should be based on an extensive systematic analysis of punctuation marks and punctuation patterns and their related factors. The results of this study indicate that there were many challenges due to complexity of language. Further, this study recommends avoiding a simplistic approach to punctuation normalization.
This dissertation presents a preliminary grounded theory of community networking based on 63 evaluations of community networking projects funded by the National Telecommunications and Information Administration’s Technology Opportunities Program (TOP) between 1994 and 2007. The substantive grounded theory developed is that TOP projects differed in their contribution to positive outcomes for intended disadvantaged community beneficiaries based on the extent and manner in which they involved the disadvantaged community during four grant process phases: partnership building, project execution, evaluation, and close-out. Positive outcomes for the community were facilitated by using existing communication channels, such as schools, to connect with intended beneficiaries; local financial institutions to provide infrastructure to support local trade; and training to connect community members to jobs. Theoretical contributions include situating outcomes for disadvantaged communities within the context of the grant process; introducing the “vulnerable community” concept; and identifying other concepts and properties that may be useful in further theoretical explorations. Methodological contributions include demonstrating grounded theory as a viable method for exploring large text-based datasets; paving the way for machine learning approaches to analyzing qualitative data; and illustrating how project evaluations can be used in a similar fashion as interview data. Practical contributions include providing information to guide community networking-related policies and initiatives from the perspectives of stakeholders at all levels, including establishing funded projects as local employment opportunities and re-conceptualizing sustainability in terms of human networks rather than technological networks.
Information politics is a concept widely acknowledged in several disciplines. However, scant empirical evidence exists in the literature that codifies or measures information politics as a construct. This exploratory study developed and tested the Information Politics Assessment Scale (IPAS), a survey instrument that measured individual perceptions of organizational information artifacts as indictors of its information politics. Data collected with the IPAS was examined to investigate the latent structure of the information politics variable, determine information politics models, and explore the relationship between information politics, strategy, and organization effectiveness. A purposive sample of 240 participants from a cross-section of organizations completed the IPAS in an online administration. Exploratory factor analysis generated three factors, labeled Behavioral Flexibility (BF), Environmental Sensitivity (ES), and Structural Autonomy (SA), suggesting three dimensions of the information politics variable. Cluster analysis of aggregate scores on the BF, ES, and SA factors together resulted in determining four distinct information politics models. Crosstab and ANOVA, respectively, enabled explaining the relationship between strategy and information politics, and how it influenced organization effectiveness. This study breaks ground by broadening the theoretical and empirical understanding of information politics in confirming the proposition that an organization’s information artifacts are measureable and reliable indicators of its information politics. Further, it supports the efficacy of the IPAS to identify the information politics model operating in a given organization.
This study examines adolescent students at an American international school and observes student use of social networking programs as well as physical actions in the search process. The study specifically observed multitasking behavior and organizational skills among students, as well as linkages made through social networking sites. Student observations, student interviews, analysis of Facebook entries, and a survey on multitasking yielded rich data. Students appear to be far more organized than previously suggested in the literature, and in this study, the organization proved to be largely self-taught. Students used their social networks to build a kind of group expertise that compensated for their youthful naivety. Students exhibited self-control within the search to the degree that they could focus on what they wanted to find, and they used heuristics—mental shortcuts—to achieve what they needed. Searches also suggest creativity in that students were flexible in their search methods and used a number of tools to gather information. Students could balance the needs of the academic or imposed search with their own online lives, meaning that they made compensations for social media and media multitasking when it was deemed necessary.
In today’s economy, organizational knowledge is a fundamental factor for remaining competitive and managing intellectual capital. Knowledge Management aims to improve organizational performance by designing the work environment with necessary tools. Yet, significant amount of knowledge resides within the people in different forms such as experience or abilities. Transferring individual knowledge within members or into organizational repositories is so difficult. Knowledge sharing only occurs under certain circumstances: People share knowledge when they believe it is beneficial for them, when they feel safe and secure, and when they trust. Since knowledge is power, and brings respect to its bearer, knowledge sharing needs suitable environment. In this context, this study investigates intention to knowledge sharing among forensics in the Turkish National Police (TNP) and the factors -such as perceived organizational justice, organizational citizenship behaviors, subjective norms, and attitudes toward knowledge sharing- affecting their intentions. The researcher utilized a model developed from Ajzen and Fishbein’s (1975; 1980) theory of reasoned action (TRA). To test this model, a self-administered questionnaire survey was administered in Turkey In order to analyze the quantitative data; SPSS version 19 was used for all preliminary analyses and LISREL 8.8 was used for Regression Analysis and Path Analysis The fit of the data to this proposed model was not adequate. However, 7 of the 8 hypotheses supported.
Social media offers numerous opportunities to companies, organizations and government agencies to communicate with people outside their organization, to promote their interests and to better serve their customers, or as in the case with government agencies, to better serve their citizens. However, little is known about how police departments in particular use social media. This research study explores why police departments use social media, how they manage their social media tools, and the problems and challenges experienced as they use social media. This qualitative study is largely guided by grounded theory. The data were collected from a study population using local police departments in the Dallas-Fort worth (DFW) area principal cities using both individual interviews with police departments’ social media officers and observations of these departments’ online social media tools (in particular, Facebook and Twitter). This study has shown that the DFW area city police departments are using social media quite extensively to keep the public informed and often for investigative purposes. There are some success factors to adopting and using these tools, such as the motivation of department staff and their benefits, successful implementation of the tools, the simplicity of using tools and that it is absolutely free.
The concept of the invisible college is a key focus of scientific communication research with many studies on this topic in the literature. However, while such studies have contributed to an understanding of the invisible college, they have not adequately explained the interaction of social and structural processes in this phenomenon. As a consequence, past research has described the invisible college differently based on researchers’ perspectives, resulting in misinterpretations or inconsistent definitions of the relevant social and structural processes. Information science and related disciplines have focused on the structural processes that lead to scholarly products or works while placing less emphasis on the social processes. To advance understanding of the invisible college and its dimensions (including both social processes and structural processes), a proposed model (Modern Invisible College Model, MICM) has been built based on the history of the invisible college and Lievrouw’s (1989) distinction between social and structural processes. The present study focuses on the social processes of informal communication between scholars via social media, rather than on the structural processes that lead to scholarly products or works. A developed survey and an employed quantitative research method were applied for data collection. The research population involved 77 scholars from the Institute of Public Administration (IPA), in Saudi Arabia. Descriptive statistics, frequency and percentage were conducted for each statement. Means and standard deviations were calculated. The results indicate that the majority of participants heavily use social media for scientific communication purposes. Also, the results confirm that scholars consider social media to be an effective and appropriate tool for scientific communication. Seven factors were found in the findings to have positive correlations with uses and gratifications theory and the use of social media. This research contributes to and benefits scholars, reference groups (i.e., the invisible college itself), and institutions, and provides ...
The web information behaviors of users as they interacted with a metadata navigator, the Personal Information (PI) Agent, and reflected upon their interaction experiences were studied. The process included studying the complete iterative (repeated) cycle of information needs, information seeking, and information use of users interacting with an internet-based prototype metadata PI Agent tool. Detlor’s theory of web information behaviors of organizational users was utilized as a theoretical foundation for studying human-information interactions via the PI Agent tool. The qualitative research design allowed for the use of triangulation within the context of a one-group pretest-posttest design. Triangulation occurred in three phases: (a) observe, (b) collect, and (c) reflect. Observations were made as participants solved three problem situations. Participants’ computer log and print screen data were collected, and follow-up interviews were conducted once all posttest sessions ended to enable users to reflect on their experiences. The three triangulation phases ensured saturation of data and greater depth regarding the participants’ information behaviors. Content analysis occurred via exploratory pattern analysis using the posttest Problem Steps Recorder (PSR) log data and on the six interviewees’ follow-up interview data. Users engaged in iterative cycles of information needs, information seeking, and information use to resolve the presented problem situations. The participants utilized the PI Agent tool iteratively to eliminate their knowledge gaps regarding the presented problem situations. This study was the first to use PSR log data for capturing evidence of the iterative search process as defined by Detlor. The implications for best practices were inspired by participant feedback, and recommendations for further study are made.
In this multivariate correlational study, the researcher examined the course culture of an online graduate course whose environment exhibited characteristics of a Community of practice (CoP). An online survey captured data used to explore the relationships among variables shown to describe a CoP in field environments and among student perceptions of their experience in the course culture. A canonical correlation analysis (CCA) and commonality analysis (CA) were conducted using five predictor variables and three criterion variables to evaluate the degree and direction of the relationships. The CCA revealed that the full model was significant, explaining approximately 74% of the variance among the two synthetic variates. Impact, faculty leadership, and connection were the largest contributors to the predictor variate. The criterion variate was primarily explained by value and perceived CoP, with exposure to the profession providing a smaller contribution. The CA confirmed these findings. Results from this study indicate that a CoP could be fostered in an online graduate course. The overall significance of the model indicates teachers can nurture an environment wherein graduate students will take the initiative to work with others to create and acquire knowledge that creates a sense of professional connection with each other and with the profession overall. The results of this study suggest further empirical research in implementing and assessing CoPs in online graduate courses is warranted.
This dialog allows you to filter your current search.
Each of the Years listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Years? Start typing and we'll update the list to show only those items that match your needs.
This dialog allows you to filter your current search.
Each of the Department listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.
Having trouble finding an option within the list of Department? Start typing and we'll update the list to show only those items that match your needs.