112 results
Search Results
2. Reference publication year spectroscopy (RPYS) of computer science papers from Eastern Europe
- Author
-
Dalibor Fiala and Lutz Bornmann
- Subjects
Web of science ,05 social sciences ,Library science ,computer science ,Eastern Europe ,Library and Information Sciences ,050905 science studies ,Field (geography) ,citační analýza ,Eastern european ,Citation analysis ,informatika ,citation analysis ,Web of Science ,východní Evropa ,referenční spektroskopie podle roku vydání (RPYS) ,0509 other social sciences ,050904 information & library sciences ,Citation ,reference publication year spectroscopy (RPYS) ,Information Systems - Abstract
Účel: Tento příspěvek přináší výsledky případové studie zabývající se historickými kořeny východoevropských počítačových vědců. Design/metodologie/přístup: Studie je založena na analýze citovaných referencí pocházejících ze souboru přibližně 80 000 odborných informatických článků východoevropských výzkumníků publikovaných od roku 1989 do roku 2014. Využitím metody nazvané „referenční spektroskopie podle roku vydání (RPYS)“ pro historické analýzy založené na bibliometrických datech analyzujeme celkem 800 000 referencí citovaných v těchto publikacích. Identifikujeme nejvýznamnější roky zahrnující nejčastěji citovaná díla ( z let 1952, 1965 a 1975) a zaměřujeme se na tyto v oboru natolik vynikající publikační výstupy. Ukazujeme, jak se tyto vlivné publikace citovaly ve východní Evropě a obecně a na jaké vědní obory měly největší dopad. Výsledky: Pozoruhodnou publikací, jež měla podle všeho enormní vliv na východoevropskou počítačovou vědu, je Zadehův článek „Fuzzy sets“ v časopise „Information and Control“ z roku 1965. Demonstrujeme, že informatici z východní Evropy jsou v citačním chování konzervativnější než jejich protějšky ze západní Evropy a mají sklon citovat a starší a zavedenější výzkum. Originalita/hodnota: Jaké jsou historické kořeny vědců pracujících v určitém oboru nebo na konkrétním tématu? Existují konkrétní publikace – přelomová díla – která jsou důležitá pro jejich výzkum? Domníváme se, že tyto otázky zajímají výzkumníky mnoha vědních disciplín. Purpose: The current article presents the results of a case study dealing with the historical roots of Eastern European researchers in computer science. Design/methodology/approach: The study is based on an analysis of cited references stemming from a collection of around 80,000 computer science papers by Eastern European researchers published from 1989 to 2014. By using a method called “reference publication year spectroscopy” (RPYS) for historical analyses based on bibliometric data, we analyze around 800,000 references cited in those papers. We identify the peak years including most frequently cited publications (from 1952, 1965, and 1975) and focus on these outstanding works for the field. We show how these influential papers were cited in Eastern Europe and in general and on which scientific fields they have the most impact. Findings: A noteworthy publication that seems to have a tremendous effect on Eastern European computer science is Zadeh’s “Fuzzy sets” article which appeared in Information and Control in 1965. We demonstrate that computer scientists from Eastern Europe are more conservative in their citation behavior and tend to refer to older and more established research than their counterparts from the West. Originality/value: Which are the historical roots of researchers working in a particular field or on a specific topic? Are there certain publications – landmark papers – which are important for their research? We guess that these are questions bothering researchers in many fields.
- Published
- 2020
3. User evaluation of a task for shortlisting papers from researcher’s reading list for citing in manuscripts
- Author
-
Aravind Sesagiri Raamkumar, Natalie Pang, Schubert Foo, Lewandowski, Dirk, and Wee Kim Wee School of Communication and Information
- Subjects
Information retrieval ,Point (typography) ,Computer science ,media_common.quotation_subject ,05 social sciences ,02 engineering and technology ,Computer-assisted web interviewing ,Manuscript preparation ,Library and Information Sciences ,Digital library ,Task (project management) ,World Wide Web ,Shortlisting citations ,Reference management software ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Quality (business) ,Relevance (information retrieval) ,0509 other social sciences ,050904 information & library sciences ,Citation ,Information Systems ,media_common - Abstract
Purpose Although many interventional approaches have been proposed to address the apparent gap between novices and experts for literature review (LR) search tasks, there have been very few approaches proposed for manuscript preparation (MP) related tasks. The purpose of this paper is to describe a task and an incumbent technique for shortlisting important and unique papers from the reading list (RL) of researchers, meant for citation in a manuscript. Design/methodology/approach A user evaluation study was conducted on the prototype system which was built for supporting the shortlisting papers (SP) task along with two other LR search tasks. A total of 119 researchers who had experience in authoring research papers participated in this study. An online questionnaire was provided to the participants for evaluating the task. Both quantitative and qualitative analyses were performed on the collected evaluation data. Findings Graduate research students prefer this task more than research and academic staff. The evaluation measures relevance, usefulness and certainty were identified as predictors for the output quality measure “good list”. The shortlisting feature and information cues were the preferred aspects while limited data set and rote steps in the study were ascertained as critical aspects from the qualitative feedback of the participants. Originality/value Findings point out that researchers are clearly interested in this novel task of SP from the final RL prepared during LR. This has implications for digital library, academic databases and reference management software where this task can be included to benefit researchers at the manuscript preparatory stage of the research lifecycle.
- Published
- 2017
4. Analysis of the structure and time-series evolution of knowledge label network from a complex perspective.
- Author
-
Wang, Xu, Feng, Xin, and Guo, Yuan
- Subjects
TIME series analysis ,NETWORK hubs ,WIRELESS Internet ,SCHOLARLY communication ,TIME-varying networks ,COMPUTER science - Abstract
Purpose: The research on social media-based academic communication has made great progress with the development of the mobile Internet era, and while a large number of research results have emerged, clarifying the topology of the knowledge label network (KLN) in this field and showing the development of its knowledge labels and related concepts is one of the issues that must be faced. This study aims to discuss the aforementioned issue. Design/methodology/approach: From a bibliometric perspective, 5,217 research papers in this field from CNKI from 2011 to 2021 are selected, and the title and abstract of each paper are subjected to subword processing and topic model analysis, and the extended labels are obtained by taking the merged set with the original keywords, so as to construct a conceptually expanded KLN. At the same time, appropriate time window slicing is performed to observe the temporal evolution of the network topology. Specifically, the basic network topological parameters and the complex modal structure are analyzed empirically to explore the evolution pattern and inner mechanism of the KLN in this domain. In addition, the ARIMA time series prediction model is used to further predict and compare the changing trend of network structure among different disciplines, so as to compare the differences among different disciplines. Findings: The results show that the degree sequence distribution of the KLN is power-law distributed during the growth process, and it performs better in the mature stage of network development, and the network shows more stable scale-free characteristics. At the same time, the network has the characteristics of "short path and high clustering" throughout the time series, which is a typical small-world network. The KLN consists of a small number of hub nodes occupying the core position of the network, while a large number of label nodes are distributed at the periphery of the network and formed around these hub nodes, and its knowledge expansion pattern has a certain retrospective nature. More knowledge label nodes expand from the center to the periphery and have a gradual and stable trend. In addition, there are certain differences between different disciplines, and the research direction or topic of library and information science (LIS) is more refined and deeper than that of journalism and media and computer science. The LIS discipline has shown better development momentum in this field. Originality/value: KLN is constructed by using extended labels and empirically analyzed by using network frontier conceptual motifs, which reflects the innovation of the study to a certain extent. In future research, the influence of larger-scale network motifs on the structural features and evolutionary mechanisms of KLNs will be further explored. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Computer science in Eastern Europe 1989-2014: a bibliometric study.
- Author
-
Fiala, Dalibor and Willett, Peter
- Subjects
COMPUTER science research ,BERLIN Wall, Berlin, Germany, 1961-1989 ,ALLIED occupation, Berlin, Germany, 1945-1990 ,BIBLIOMETRICS ,PUBLISHING - Abstract
Purpose – The purpose of this paper is to study the development of research in computer science in 15 Eastern European countries following the breaching of the Berlin Wall in 1989. Design/methodology/approach – The authors conducted a bibliometric analysis of 82,121 computer science publications indexed in the Web of Science database and investigated publication, citation, and collaboration patterns of the individual countries. Findings – Poland has been the most productive country, followed by Russia, the Czech Republic, Romania, Hungary, and Slovenia. Publication rates have increased substantially over the period, but this has not been accompanied by a corresponding increase in the quality of the publications. Hungary and Slovenia are the most influential countries in terms of citations per paper. Artificial Intelligence is the most frequently occurring computer science subject category, with Interdisciplinary Applications the category with the greatest impact. USA, Germany, UK, France, and Canada are the most frequently collaborating western nations, and papers published in collaboration with US authors accrue the most citations. Originality/value – This is the first ever bibliometric study of the whole post-communist Eastern European computer science research as indexed in the Web of Science. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
6. Guest editorial: Human–computer interactions: investigating the dark side and proposing a model based on an empirical collection of studies.
- Author
-
Behl, Abhishek, Gupta, Manish, Pereira, Vijay, and Zhang, Justin Zuopeng
- Subjects
HUMAN-computer interaction ,INTERACTION design (Human-computer interaction) ,BLOCKCHAINS ,COGNITIVE science ,COMPUTER science - Abstract
Several prior studies have extensively covered human-computer interaction (HCI). These studies examine several factors related to HCI such as psychological, physiological, business and social factors or those related to such factors affecting HCI ([39]; [2]; [35]). For example, (1) [9] emphasized the need to unify HCI and AI, (2) Ramos I et al. i [35] discussed the qualities of effective HCI, [23] discussed exploration strategies of HCI and recently (5) [37] discussed emotions in HCI ([2]; [35]; [3]; [31]). This application can help HCI designers gain an understanding of HCI aspects to consider while designing user interfaces for other cultures and using the cultural context based on the cultural distance between the HCI designers and the target end-users. [Extracted from the article]
- Published
- 2022
- Full Text
- View/download PDF
7. Characterizing and predicting the cross-app behavior in mobile search
- Author
-
Shaobo Liang
- Subjects
Human–computer interaction ,Computer science ,Information seeking behavior ,Mobile search ,Library and Information Sciences ,Information Systems - Abstract
PurposeThis paper aims to explore the users' cross-app behavior characteristics in mobile search and to predict users' cross-app behavior using multi-dimensional information.Design/methodology/approachThis paper presents a longitudinal user experiment in 15 days. This paper recruited 30 participants and collected their mobile phone log data in the whole experiment. The structured diary method was also used to collect contextual information in mobile search.FindingsThis study focused on the users' cross-app behavior in mobile search and described cross-app behavior's basic characteristics. Usage of communication app and tool apps could trigger more cross-app behavior in mobile search. The method of cross-app behavior prediction in the mobile search was proposed. Collecting users' more contextual information, such as search tasks, search motivation and other environmental information, can effectively improve the prediction accuracy of cross-app behavior in mobile search.Practical implicationsThe future research on cross-app behavior prediction should focus on context information in mobile search. Better prediction of cross-app behavior can reduce the users' interaction burden.Originality/valueThis paper contributes to research into cross-app behavior, especially in the mobile search research domain.
- Published
- 2021
8. Computer science in Eastern Europe 1989-2014: a bibliometric study
- Author
-
Dalibor Fiala and Peter Willett
- Published
- 2015
- Full Text
- View/download PDF
9. Construction over operation? A study of the usage of digital humanities databases in China
- Author
-
Dan Gao, Zhangchao Li, Jingru Liu, and Lin He
- Subjects
World Wide Web ,Digital humanities ,Computer science ,Library and Information Sciences ,China ,Information Systems - Abstract
PurposeDigital humanities database is one of the essential tools in digital humanities research area. Therefore, examining the usage of digital humanities database in academic papers is conducive to assessing the value of digital humanities database for scientific research activities and improving the construction of digital humanities infrastructure.Design/methodology/approachThis paper constructs an evaluation system of digital humanities database from the perspective of academic influence and social influence, with mention frequency, usage motivation, platform access data, usage region and usage discipline as indicators and takes China Biographical Database Project as the empirical object to explore the usage of digital humanities database in China.FindingsThe data analysis result demonstrates that digital humanities databases are widely used and recognized in China. However, the problem of low actual usage remains.Originality/valueThis paper constructs the digital humanistic database's evaluation system and discusses applying the digital humanistic database in China, which provides a new perspective and method for the influence evaluation study of the digital humanistic database.
- Published
- 2021
10. Information modeling and system realization for supporting engineering education accreditation process based on polychromatic graph
- Author
-
Xueping Wang and Xinqin Gao
- Subjects
Computer science ,business.industry ,Process (engineering) ,Principal (computer security) ,Information technology ,Library and Information Sciences ,User requirements document ,Management information systems ,Information model ,Software engineering ,business ,Information Systems ,Accreditation ,Network model - Abstract
PurposeThe engineering education accreditation (EEA) is a principal quality assurance mechanism. However, at many education institutions, the most labor-intensive work of EEA process is accomplished manually. Without the support of computer and information technology, the EEA process leads to high labor intensity, low work efficiency and poor management level. The purpose of this paper is to build a complex network model and realize an information management system of talent training program for supporting the EEA process.Design/methodology/approachBased on polychromatic graph (PG), this paper builds a network model of talent training program for engineering specialty. The related information and data are organized and processed in this network model. From the bidirections of top-down and bottom-up, the user requirements are retrieved automatically in logic layer. Together with the specialty of mechanical engineering, the proposed PG-based network modeling method is applied and the corresponding information management system is realized.FindingsThe study results show that the PG-based network modeling method takes full advantages of the strong simulation ability of PG to model the complex network system and has some unique merits in formal expression of problem, efficient processing of information and lightweight realization of system. Further, the information management system of talent training program can reduce the tedious human labor and improve the management level of EEA process dramatically.Originality/valueThis paper proposes a PG-based network modeling method, in which the nodes and the edges can be painted by some unified colors to describe the different kinds of activities and the various types of interactions. Theoretically, this modeling method does not distinguish the activities, the interactions and their properties in graphic symbol and the problem size is diminished about a half. Furthermore, this paper provides an effective experience and idea to the education institutions for implementing the engineering education accreditation, increasing the education management efficiency and promoting the talent training quality.
- Published
- 2021
11. Dark side of instant messaging: an empirical investigation from technology and society perspective
- Author
-
Demetris Vrontis, Sheshadri Chatterjee, and Ranjan Chaudhuri
- Subjects
Computer science ,business.industry ,05 social sciences ,Internet privacy ,Perspective (graphical) ,Library and Information Sciences ,Great Rift ,0502 economics and business ,Technology and society ,050211 marketing ,Instant messaging ,business ,050203 business & management ,Information Systems - Abstract
PurposeThe purpose of this study is to examine the dark side of instant messaging from the technological and societal perspectives.Design/methodology/approachWith the help of literature review and different theories, a model has been developed conceptually. Later the model has been validated using statistical method. The authors have used 304 responses from the survey method, and this sample has been used to statistically validate the conceptual model.FindingsThis paper has been able to explicitly investigate and identify how different instant messaging platforms such as WhatsApp, WeChat in the form of electronic word of mouth (e-WOM) are contributing toward increase of mob lynching cases. The paper also highlights the important to have effective and enforceable regulation to regulate instant messaging services to the citizens.Research limitations/implicationsThe findings cannot be generalized as the data is collected from India only. Moreover, the study is cross-sectional in nature. To get the comprehensive results, a longitudinal study needs to be conducted. This study considered seven constructs with one moderator. Having more predictors with other boundary conditions might have increased the explanative power of the model.Practical implicationsInstant messaging platforms such as WhatsApp, WeChat and so on are disseminating quick unverified information to the common people. This information sometimes is disseminated in inappropriate and exaggerated forms. This makes the instant messaging (WhatsApp) users' sentiment readily heated in some cases. They take such an action as mob lynching. This study determines the predictors of mob lynching along with the moderator impact of instant messaging in the society.Originality/valueThere are only a few studies those have explored the dark side of instant messaging. The proposed theoretical model is a unique model, which shows the predictors of mob lynching along with the negative consequences of the instant messaging (WhatsApp) in the society. From this perspective, this study can be considered as a unique study.
- Published
- 2021
12. Understanding verified users' posting behavior from the perspective of human dynamics: a case study of Sina micro-blog
- Author
-
Lu Kun, Weihua Deng, Zhanhao Zhang, Ming Yi, and Yingying Lu
- Subjects
Empirical data ,Information retrieval ,Process (engineering) ,Computer science ,Microblogging ,Perspective (graphical) ,02 engineering and technology ,Library and Information Sciences ,01 natural sciences ,010305 fluids & plasmas ,Information behavior ,020204 information systems ,0103 physical sciences ,Human dynamics ,0202 electrical engineering, electronic engineering, information engineering ,Social media ,Information Systems ,Research method - Abstract
PurposeThe purpose of this paper is to present a new human dynamics model to explain the process of verified users' (VUs) posting on Sina micro-blog.Design/methodology/approachA common human dynamics research method with three steps is applied. Firstly, a large-scale behavioral dataset is collected involving 495 VUs and five topics on Sina micro-blog. Second, five important indicators that reveal the characteristics of posting behavior are analyzed. Then, a quantitative model is constructed to describe the process of posting behavior, and its validity is verified by simulations.FindingsThree important characteristics of VUs' micro-blog posting behavior are observed: fat-tailed distribution, fluctuation and periodicity. These characteristics do not fit the assumption of interest-driven models proposed by previous literature. An optimized task-driven model is introduced to describe this complex phenomenon mathematically. The model is verified on empirical data, confirming that task-driven models can be optimized to explore information behavior on social media.Originality/valueBeing different from previous studies that mainly describe common users' posting behavior on social media by applying interest-driven models, this paper customizes an optimized task-driven model for VUs, who mainly treat social media as a platform for work and play a crucial role in information creation on social media.
- Published
- 2020
13. Understanding the information needs and information-seeking behaviours of new-generation engineering designers for effective knowledge management
- Author
-
Hongwei Wang, Hao Qin, and Aylmer Johnson
- Subjects
Knowledge management ,business.industry ,Computer science ,Information seeking ,05 social sciences ,0211 other engineering and technologies ,Information technology ,Information needs ,02 engineering and technology ,Library and Information Sciences ,Order (exchange) ,0502 economics and business ,Key (cryptography) ,Design process ,Collaborative working environment ,Engineering design process ,business ,050203 business & management ,021106 design practice & management ,Information Systems - Abstract
PurposeThis paper aims to explore the information needs and information-seeking behaviours of the new generation of engineering designers. A survey study is used to approach what their information needs are, how these needs change during an engineering design project and how their information-seeking behaviours have been influenced by the newly developed information technologies (ITs). Through an in-depth analysis of the survey results, the key functions have been identified for the next-generation management systems.Design/methodology/approachThe paper first proposed four hypotheses on the information needs and information-seeking behaviours of young engineers. Then, a survey study was undertaken to understand their information usage in terms of the information needs and information-seeking behaviours during a complete engineering design process. Through analysing the survey results, several findings were obtained and on this basis, further comparisons were made to discuss and evaluate the hypotheses.FindingsThe paper has revealed that the engineering designers' information needs will evolve throughout the engineering design project; thus, they should be assisted at several different levels. Although they intend to search information and knowledge on know-what and know-how, what they really require is the know-why knowledge in order to help them complete design tasks. Also, the paper has shown how the newly developed ITs and web-based applications have influenced the engineers' information-seeking practices.Research limitations/implicationsThe research subjects chosen in this study are engineering students in universities who, although not as experienced as engineers in companies, do go through a complete design process with the tasks similar to industrial scenarios. In addition, the focus of this study is to understand the information-seeking behaviours of a new generation of design engineers, so that the development of next-generation information and knowledge management systems can be well informed. In this sense, the results obtained do reveal some new knowledge about the information-seeking behaviours during a general design process.Practical implicationsThis paper first identifies the information needs and information-seeking behaviours of the new generation of engineering designers. On this basis, the varied ways to meet these needs and behaviours are discussed and elaborated. This intends to provide the key characteristics for the development of the next-generation knowledge management system for engineering design projects.Originality/valueThis paper proposes a novel means of exploring the future engineers' information needs and information-seeking behaviours in a collaborative working environment. It also characterises the key features and functions for the next generation of knowledge management systems for engineering design.
- Published
- 2020
14. Task design and assignment of full-text generation on mass Chinese historical archives in digital humanities
- Author
-
Hao Wang, Jihong Liang, and Xiaojing Li
- Subjects
Information retrieval ,business.industry ,Computer science ,media_common.quotation_subject ,05 social sciences ,Text annotation ,Library and Information Sciences ,050905 science studies ,Crowdsourcing ,Punctuation ,Metadata ,Annotation ,Archival science ,Transcription (linguistics) ,0509 other social sciences ,050904 information & library sciences ,business ,Digitization ,Information Systems ,media_common - Abstract
PurposeThe purpose of this paper is to explore the task design and assignment of full-text generation on mass Chinese historical archives (CHAs) by crowdsourcing, with special attention paid to how to best divide full-text generation tasks into smaller ones assigned to crowdsourced volunteers and to improve the digitization of mass CHAs and the data-oriented processing of the digital humanities.Design/methodology/approachThis paper starts from the complexities of character recognition of mass CHAs, takes Sheng Xuanhuai archives crowdsourcing project of Shanghai Library as a case study, and makes use of the theories of archival science, including diplomatics of Chinese archival documents, and the historical approach of Chinese archival traditions as the theoretical basis and analysis methods. The results are generated through the comprehensive research.FindingsThis paper points out that volunteer tasks of full-text generation include transcription, punctuation, proofreading, metadata description, segmentation, and attribute annotation in digital humanities and provides a metadata element set for volunteers to use in creating or revising metadata descriptions and also provides an attribute tag set. The two sets can be used across the humanities to construct overall observations about texts and the archives of which they are a part. Along these lines, this paper presents significant insights for application in outlining the principles, methods, activities, and procedures of crowdsourced full-text generation for mass CHAs.Originality/valueThis study is the first to explore and identify the effective design and allocation of tasks for crowdsourced volunteers completing full-text generation on CHAs in digital humanities.
- Published
- 2020
15. Evaluating physicians’ serendipitous knowledge discovery in online discovery systems
- Author
-
Mark E. Hopkins and Oksana L. Zavalina
- Subjects
Computer science ,Serendipity ,05 social sciences ,050401 social sciences methods ,Library and Information Sciences ,Data science ,Confirmatory factor analysis ,0504 sociology ,Knowledge extraction ,Information system ,Survey data collection ,Systems design ,Imputation (statistics) ,0509 other social sciences ,050904 information & library sciences ,Reliability (statistics) ,Information Systems - Abstract
Purpose A new approach to investigate serendipitous knowledge discovery (SKD) of health information is developed and tested to evaluate the information flow-serendipitous knowledge discovery (IF-SKD) model. The purpose of this paper is to determine the degree to which IF-SKD reflects physicians’ information behaviour in a clinical setting and explore how the information system, Spark, designed to support physicians’ SKD, meets its goals. Design/methodology/approach The proposed pre-experimental study design employs an adapted version of the McCay-Peet’s (2013) and McCay-Peet et al.’s (2015) serendipitous digital environment (SDE) questionnaire research tool to address the complexity associated with defining the way in which SKD is understood and applied in system design. To test the IF-SKD model, the new data analysis approach combining confirmatory factor analysis, data imputation and Monte Carlo simulations was developed. Findings The piloting of the proposed novel analysis approach demonstrated that small sample information behaviour survey data can be meaningfully examined using a confirmatory factor analysis technique. Research limitations/implications This method allows to improve the reliability in measuring SKD and the generalisability of findings. Originality/value This paper makes an original contribution to developing and refining methods and tools of research into information-system-supported serendipitous discovery of information by health providers.
- Published
- 2019
16. Using the eye-tracking method to study consumer online health information search behaviour
- Author
-
Jacek Gwizdka, Andrew Dillon, and Yan Zhang
- Subjects
Data collection ,020205 medical informatics ,Computer science ,media_common.quotation_subject ,Context (language use) ,02 engineering and technology ,Library and Information Sciences ,Gaze ,Data science ,03 medical and health sciences ,0302 clinical medicine ,medicine.anatomical_structure ,Reading (process) ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,medicine ,Eye tracking ,Relevance (information retrieval) ,Human eye ,030212 general & internal medicine ,Information Systems ,media_common - Abstract
Purpose The purpose of this paper is to introduce eye tracking as a method for capturing direct and indirect measures of online human information search behaviour. The unique contribution of eye-tracking data in studying information behaviour is examined in the context of health information research. Design/methodology/approach The need for multiple methods of data collection when examining human online health information behaviour is described and summarised. The nature of human eye movements in information use and reading is outlined and the emergence and application of contemporary eye-tracking technology are explained. Findings The paper summarises key contributions and insights that eye tracking has provided across multiple studies, with examples of both direct data on fixations and gaze durations as well as theoretical assessments of relevance and knowledge gain. Originality/value The paper provides a basic introduction to the application of a unique method for information research in general and online health information search in particular and provides readers with an awareness of how such data are captured and interpreted.
- Published
- 2019
17. Data-driven decision making in graduate students’ research topic selection
- Author
-
Qiao Li, Yinglong Zhang, Yifan Sun, Ping Wang, and Chuanfu Chen
- Subjects
Computer science ,business.industry ,05 social sciences ,Cognition ,02 engineering and technology ,Data literacy ,Library and Information Sciences ,Experiential learning ,Data science ,Data-driven ,Visualization ,Data visualization ,Knowledge extraction ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,0509 other social sciences ,050904 information & library sciences ,business ,Information Systems ,Cognitive style - Abstract
Purpose With the advent of the intelligent environment, as novice researchers, graduate students face digital challenges in their research topic selection (RTS). The purpose of this paper is to explore their cognitive processes during data-driven decision making (DDDM) in RTS, thus developing technical and instructional strategies to facilitate their research tasks. Design/methodology/approach This study developes a theoretical model that considers data-driven RTS as a second-order factor comprising both rational and experiential modes. Additionally, data literacy and visual data presentation were proposed as an antecedent and a consequence of data-driven RTS, respectively. The proposed model was examined by employing structural equation modeling based on a sample of 931 graduate students. Findings The results indicate that data-driven RTS is a second-order factor that positively affects the level of support of visual data presentation and that data literacy has a positive impact on DDDM in RTS. Furthermore, data literacy indirectly affects the level of support of visual data presentation. Practical implications These findings provide support for developers of knowledge discovery systems, data scientists, universities and libraries on the optimization of data visualization and data literacy instruction that conform to students’ cognitive styles to inform RTS. Originality/value This paper reveals the cognitive mechanisms underlying the effects of data literacy and data-driven RTS under rational and experiential modes on the level of support of the tabular or graphical presentations. It provides insights into the match between the visualization formats and cognitive modes.
- Published
- 2019
18. Understanding credibility judgements for web search snippets
- Author
-
David Elsweiler and Markus Kattenbeck
- Subjects
Information retrieval ,Information behaviour ,Computer science ,05 social sciences ,Perspective (graphical) ,Library and Information Sciences ,Search engine ,Credibility ,0501 psychology and cognitive sciences ,0509 other social sciences ,050904 information & library sciences ,050107 human factors ,Information Systems ,Qualitative research - Abstract
Purpose It is well known that information behaviour can be biased in countless ways and that users of web search engines have difficulty in assessing the credibility of results. Yet, little is known about how search engine result page (SERP) listings are used to judge credibility and in which if any way such judgements are biased. The paper aims to discuss these issues. Design/methodology/approach Two studies are presented. The first collects data by means of a controlled, web-based user study (N=105). Studying judgements for three controversial topics, the paper examines the extent to which users agree on credibility, the extent to which judgements relate to those applied by objective assessors and to what extent judgements can be predicted by the users’ position on and prior knowledge of the topic. A second, qualitative study (N=9) utilises the same setup; however, transcribed think-aloud protocols provide an understanding of the cues participants use to estimate credibility. Findings The first study reveals that users are very uncertain when assessing credibility and their impressions often diverge from objective judges who have fact checked the sources. Little evidence is found indicating that judgements are biased by prior beliefs or knowledge, but differences are observed in the accuracy of judgements across topics. Qualitatively analysing think-aloud transcripts from participants think-aloud reveals ten categories of cues, which participants used to determine the credibility of results. Despite short listings, participants utilised diverse cues for the same listings. Even when the same cues were identified and utilised, different participants often interpreted these differently. Example transcripts show how participants reach varying conclusions, illustrate common mistakes made and highlight problems with existing SERP listings. Originality/value This study offers a novel perspective on how the credibility of SERP listings is interpreted when assessing search results. Especially striking is how the same short snippets provide diverse informational cues and how these cues can be interpreted differently depending on the user and his or her background. This finding is significant in terms of how search engine results should be presented and opens up the new challenge of discovering technological solutions, which allow users to better judge the credibility of information sources on the web.
- Published
- 2019
19. From health to performance
- Author
-
Yuanyuan Feng and Denise E. Agosto
- Subjects
Information management ,Knowledge management ,Computer science ,business.industry ,05 social sciences ,Activity tracker ,020207 software engineering ,Qualitative property ,Information needs ,02 engineering and technology ,Library and Information Sciences ,Health informatics ,Information science ,0202 electrical engineering, electronic engineering, information engineering ,Personal information management ,0501 psychology and cognitive sciences ,business ,Amateur ,050107 human factors ,Information Systems - Abstract
PurposeBuilding on theoretical foundation of personal information management (PIM) in information science, this paper seeks to understand how activity tracker users manage their personal health information generated by their devices and to elucidate future activity tracking technology in support of personal health information management (PHIM). This paper aims to discuss this issue.Design/methodology/approachThe authors conducted a web survey study with a specific group of activity tracker users – amateur runners. This survey collected both quantitative and qualitative data on participants’ engagement with activity tracking technology, their PHIM practices with the information generated by the technology and how their needs were being met by their activity tracking technology use and PHIM practices.FindingsAmateur runners surveyed in this study exhibit long-term engagement and frequent interaction with activity tracking technology. They also engage in PHIM practices by using a range of PHIM tools and performing various PHIM activities. Furthermore, they use activity tracking technology and engage in PHIM practices to meet various health/fitness-related needs and information needs, while some of these needs such as performance needs and overarching needs are only partially met or unmet.Originality/valueThis research discusses amateur runners as power users of activity tracking technology, provides timely updates to PIM and PHIM research in light of a new type of personal health information, and generates design considerations for future activity tracking technology in support of PHIM. It also brings together previously disparate research regarding everyday life PHIM in information science, human–computer interaction and health informatics.
- Published
- 2019
20. User adoption of a hybrid social tagging approach in an online knowledge community
- Author
-
Yaxi Liu, Jian Mou, Jiangping Chen, and Chunxiu Qin
- Subjects
Knowledge management ,business.industry ,Computer science ,05 social sciences ,Context (language use) ,Library and Information Sciences ,Knowledge sharing ,Resource (project management) ,0502 economics and business ,Information system ,050211 marketing ,Technology acceptance model ,0509 other social sciences ,050904 information & library sciences ,Knowledge community ,business ,Social cognitive theory ,Information Systems ,Social influence - Abstract
Purpose Online knowledge communities make great contributions to global knowledge sharing and innovation. Resource tagging approaches have been widely adopted in such communities to describe, annotate and organize knowledge resources mainly through users’ participation. However, it is unclear what causes the adoption of a particular resource tagging approach. The purpose of this paper is to identify factors that drive users to use a hybrid social tagging approach. Design/methodology/approach Technology acceptance model and social cognitive theory are adopted to support an integrated model proposed in this paper. Zhihu, one of the most popular online knowledge communities in China, is taken as the survey context. A survey was conducted with a questionnaire and collected data were analyzed through structural equation model. Findings A new hybrid social resource tagging approach was refined and described. The empirical results revealed that self-efficacy, perceived usefulness (PU) and perceived ease of use exert positive effect on users’ attitude. Moreover, social influence, PU and attitude impact significantly on users’ intention to use a hybrid social resource tagging approach. Originality/value Theoretically, this study enriches the type of resource tagging approaches and recognizes factors influencing user adoption to use it. Regarding the practical parts, the results provide online information system providers and designers with referential strategies to improve the performance of the current tagging approaches and promote them.
- Published
- 2019
21. Website removal from search engines due to copyright violation
- Author
-
Artur Strzelecki
- Subjects
Country code top-level domain ,Computer science ,media_common.quotation_subject ,05 social sciences ,Library and Information Sciences ,Transparency (behavior) ,Domain (software engineering) ,World Wide Web ,Domain name ,Search engine ,Data retrieval ,Originality ,0502 economics and business ,050211 marketing ,0509 other social sciences ,Internet users ,050904 information & library sciences ,Information Systems ,media_common - Abstract
Purpose The purpose of this paper is to clarify how many removal requests are made, how often, and who makes these requests, as well as which websites are reported to search engines so they can be removed from the search results. Design/methodology/approach Undertakes a deep analysis of more than 3.2bn removed pages from Google’s search results requested by reporting organizations from 2011 to 2018 and over 460m removed pages from Bing’s search results requested by reporting organizations from 2015 to 2017. The paper focuses on pages that belong to the .pl country coded top-level domain (ccTLD). Findings Although the number of requests to remove data from search results has been growing year on year, fewer URLs have been reported in recent years. Some of the requests are, however, unjustified and are rejected by teams representing the search engines. In terms of reporting copyright violations, one company in particular stands out (AudioLock.Net), accounting for 28.1 percent of all reports sent to Google (the top ten companies combined were responsible for 61.3 percent of the total number of reports). Research limitations/implications As not every request can be published, the study is based only what is publicly available. Also, the data assigned to Poland is only based on the ccTLD domain name (.pl); other domain extensions for Polish internet users were not considered. Originality/value This is first global analysis of data from transparency reports published by search engine companies as prior research has been based on specific notices.
- Published
- 2019
22. Usability evaluation of open data portals
- Author
-
Martin Lnenicka, Miloslav Hub, and Renáta Máchová
- Subjects
Open government ,Knowledge management ,business.industry ,Computer science ,Best practice ,05 social sciences ,Usability ,02 engineering and technology ,Benchmarking ,Library and Information Sciences ,Transparency (behavior) ,Discoverability ,Open data ,Data access ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,0509 other social sciences ,050904 information & library sciences ,business ,Information Systems - Abstract
PurposeThe purpose of this paper is to conduct a usability evaluation of governmental data portals and provide a list of best practices for improving stakeholders’ ability to discover, access, and reuse of these online information sources.Design/methodology/approachThe developed methodology was based on the comprehensive literature review that resulted in a benchmarking framework of the most important criteria. A usability testing method was then applied with accordance to unique requirements of open data portals. This approach was demonstrated by using of a case study.FindingsThe main found weakness was a lack of support for active engagement of stakeholders. The list of best practices was introduced to improve the quality of these portals. This should help to improve the discoverability and facilitate the access to data sets in order to increase their reuse by stakeholders.Social implicationsThe creation of appropriate open data portals aims to fulfill the principles of open government, i.e., to promote transparency and openness through the publication of government data, enhance the accountability of public officials and encourage public participation, collaboration, and cooperation of involved stakeholders.Originality/valueThis paper proposed a new approach for the usability evaluation of open data portals on national level from an ordinary citizen’s point of view and provided important insights on improving their quality regarding data discoverability, accessibility, and reusability.
- Published
- 2018
23. A critical analysis of lifecycle models of the research process and research data management
- Author
-
Winnie Tam and Andrew Cox
- Subjects
Service (systems architecture) ,Computer science ,Metaphor ,media_common.quotation_subject ,05 social sciences ,Library and Information Sciences ,Research process ,Data science ,Visualization ,RDM ,0502 economics and business ,0509 other social sciences ,050904 information & library sciences ,Representation (mathematics) ,050203 business & management ,Strengths and weaknesses ,Information Systems ,media_common ,Research data - Abstract
Purpose Visualisations of research and research-related activities including research data management (RDM) as a lifecycle have proliferated in the last decade. The purpose of this paper is to offer a systematic analysis and critique of such models. Design/methodology/approach A framework for analysis synthesised from the literature presented and applied to nine examples. Findings The strengths of the lifecycle representation are to clarify stages in research and to capture key features of project-based research. Nevertheless, their weakness is that they typically mask various aspects of the complexity of research, constructing it as highly purposive, serial, uni-directional and occurring in a somewhat closed system. Other types of models such as spiral of knowledge creation or the data journey reveal other stories about research. It is suggested that we need to develop other metaphors and visualisations around research. Research limitations/implications The paper explores the strengths and weaknesses of the popular lifecycle model for research and RDM, and also considers alternative ways of representing them. Practical implications Librarians use lifecycle models to explain service offerings to users so the analysis will help them identify clearly the best type of representation for particular cases. The critique offered by the paper also reveals that because researchers do not necessarily identify with a lifecycle representation, alternative ways of representing research need to be developed. Originality/value The paper offers a systematic analysis of visualisations of research and RDM current in the Library and Information Studies literature revealing the strengths and weaknesses of the lifecycle metaphor.
- Published
- 2018
24. A document expansion framework for tag-based image retrieval
- Author
-
Wei Lu, Jiepu Jiang, and Heng Ding
- Subjects
Matching (statistics) ,Web search query ,Similarity (geometry) ,Computer science ,Rank (computer programming) ,02 engineering and technology ,Library and Information Sciences ,computer.software_genre ,k-nearest neighbors algorithm ,Image (mathematics) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Vocabulary mismatch ,020201 artificial intelligence & image processing ,Data mining ,computer ,Image retrieval ,Information Systems - Abstract
Purpose The purpose of this paper is to utilize document expansion techniques for improving image representation and retrieval. This paper proposes a concise framework for tag-based image retrieval (TBIR). Design/methodology/approach The proposed approach includes three core components: a strategy of selecting expansion (similar) images from the whole corpus (e.g. cluster-based or nearest neighbor-based); a technique for assessing image similarity, which is adopted for selecting expansion images (text, image, or mixed); and a model for matching the expanded image representation with the search query (merging or separate). Findings The results show that applying the proposed method yields significant improvements in effectiveness, and the method obtains better performance on the top of the rank and makes a great improvement on some topics with zero score in baseline. Moreover, nearest neighbor-based expansion strategy outperforms the cluster-based expansion strategy, and using image features for selecting expansion images is better than using text features in most cases, and the separate method for calculating the augmented probability P(q|RD) is able to erase the negative influences of error images in RD. Research limitations/implications Despite these methods only outperform on the top of the rank instead of the entire rank list, TBIR on mobile platforms still can benefit from this approach. Originality/value Unlike former studies addressing the sparsity, vocabulary mismatch, and tag relatedness in TBIR individually, the approach proposed by this paper addresses all these issues with a single document expansion framework. It is a comprehensive investigation of document expansion techniques in TBIR.
- Published
- 2018
25. Effective use of human physiological metrics to evaluate website usability
- Author
-
Vincent G. Duffy, Fu Guo, and Qing-Xing Qu
- Subjects
Pluralistic walkthrough ,Computer science ,business.industry ,05 social sciences ,Usability ,Library and Information Sciences ,Data science ,World Wide Web ,User experience design ,Heuristic evaluation ,0502 economics and business ,Eye tracking ,050211 marketing ,0501 psychology and cognitive sciences ,Generalizability theory ,Empirical evidence ,business ,Web usability ,050107 human factors ,Information Systems - Abstract
Purpose The evaluation of website usability is the precondition and a critical step for website design and optimization. The purpose of this paper is to investigate and provide empirical evidence of the interrelationships between human physiological metrics and website usability. This study examines how eye-movement metrics and heart rate variability (HRV) evaluate website usability, and then affect users’ online surfing behavior. Design/methodology/approach A physiological measurement experiment is designed to collect participants’ physiological metrics. This paper proposes an objective measurement model for website usability, and partial least squares is used to analyze the measurement and structural models, based on data collected from 200 participants who had experienced online surfing at least four times. Findings The analysis supports partially or fully 28 of the 31 hypotheses formulated. The study reveals that human physiological metrics (i.e. fixation duration, fixation count, blink count, HRV) have a strong explanatory ability for website usability. Research limitations/implications Data for this study were collected only from mainland China. Therefore, participants may have been influenced by Chinese cultures. The generalizability of this study may be enhanced by collecting data from more diverse samples and validating the model on different cultures. Originality/value This study contributes significantly to the industry by providing empirical evidence of the interrelationship between human physiological metrics and website usability. The findings also provide managers with valuable insight into better understanding of the nature of these interrelationships.
- Published
- 2017
26. An integrated model highlighting information literacy and knowledge formation in information behaviour
- Author
-
Janet Harrison, Samuel Kelechukwu Ibenne, Mark Hepworth, and Boyka Simeonova
- Subjects
Knowledge management ,Computer science ,business.industry ,Information literacy ,05 social sciences ,Information Processes and Technology ,Information quality ,Information needs ,02 engineering and technology ,Library and Information Sciences ,Information mapping ,Group information management ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Personal information management ,0509 other social sciences ,050904 information & library sciences ,business ,Information Systems ,Information integration - Abstract
Purpose The purpose of this paper is to review key models of people’s information behaviour (IB) exploring the integration of the concepts of information literacy (IL) and knowledge in their designs. Scholarly perspectives portray IL as providing individuals with capacity for good information practices that result in generating new knowledge. It is surprising that this important perspective is not reflected in the reviewed IB models. This paper contributes to the literature base by proposing a new model highlighting IL and knowledge as important concepts within the IB discourse. Design/methodology/approach A discourse of the integration of IL and knowledge, which are integral factors, associated with IB, in selected IB models. Findings Identifying a need for information and understanding its context is an IL attribute. IL underpins IB in providing awareness of information sources; how to search and use information appropriately for solving information needs and leveraging generated new knowledge. The generation of new knowledge results from using information, in a process that combines with sense-making and adaption. Correspondingly, the knowledge that develops, increases capability for sense-making and adaptation of information to suit various contexts of need, iteratively. Originality/value A new model of IB; the causative and outcome factors of information behaviour (COFIB) is proposed. COFIB stresses that IL and knowledge are prominent factors within the general framework of people’s IB. The model emphasises knowledge generation as the outcome of IB, applied in solving problems within specific contexts.
- Published
- 2017
27. Information systems security practices in social software applications
- Author
-
Suraya Hamid, Suraya Ika Tamrin, and Azah Anir Norman
- Subjects
Knowledge management ,Cloud computing security ,business.industry ,Computer science ,Standard of Good Practice ,Social software ,020206 networking & telecommunications ,02 engineering and technology ,Information security ,Library and Information Sciences ,Security policy ,Computer security ,computer.software_genre ,Publish or perish ,Security service ,Software security assurance ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,Information Systems - Abstract
Purpose The purpose of this paper to investigate the current information systems security (ISS) practices of the social software application (SSA) users via the internet. Design/methodology/approach The paper opted for a systematic literature review survey on ISS and its practices in SSAs between 2010 and 2015. The study includes a set of 39 papers from among 1,990 retrieved papers published in 35 high-impact journals. The selected papers were filtered using the Publish or Perish software by Harzing and Journal Citation Report (JCR) with an inclusion criterion of least one citation per article. Findings The practice of ISS is driven by the need to protect the confidentiality, integrity, and availability of the data from being tampered. It is coherent with the current practice as reported by many researchers in this study. Four important factors lead to the ISS practice in SSA: protection tools offered, ownership, user behaviour, and security policy. Practical implications The paper highlights the implication of successful ISS practices is having clear security purpose and security supported environment (user behaviour and security protection tools) and governance (security policy and ownership) protection tools offered, ownership, user behaviour, and security policy towards ISS practice by the users. Originality/value This paper fulfils an identified need to study how to enable ISS practice.
- Published
- 2017
28. Discovery of repost patterns by topic analysis in enterprise social networking
- Author
-
Jianhong Luo, Xiyong Zhu, and Xuwei Pan
- Subjects
Information management ,Social network ,Online presence management ,business.industry ,Computer science ,media_common.quotation_subject ,05 social sciences ,02 engineering and technology ,Library and Information Sciences ,computer.software_genre ,Information behavior ,World Wide Web ,Content analysis ,Originality ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Social media ,business ,computer ,050203 business & management ,Information Systems ,Diversity (politics) ,media_common - Abstract
Purpose An increasing number of users are inspired by enterprises to repost social media messages, which greatly contributes to the dissemination of such messages in an online social network. The purpose of this paper is to discover the repost patterns of users regarding enterprise social media messages to help enterprises improve information management abilities for social media. Design/methodology/approach This paper proposes a novel method to discover the repost patterns of users in enterprise social networking (ESN) at the macro-level through topic analysis. Specifically, it proposes the message-diversity metric to measure the latent topic diversity degree of the social media messages. Through this technique, the paper analyzes the message-diversity characteristics of the enterprise social media messages and then explores the repost patterns of users. Findings The experimental results show that a high repost rate is more prominent for the messages with diverse latent topics, where message-diversity is as high as 0.5. Practical implications The findings have great potential in several management areas, such as employing social media marketing, predicting popular messages, helping enterprises strengthen their online presence, and gathering more potential customers. Originality/value This study explores how the repost patterns of users in ESN can be determined through general macro-level behavior of users instead of their micro-level processes. The patterns can also lead to a deeper understanding of which contents can drive people to diffuse information. This study gives an important insight into the information behavior of social media users for enterprise management researchers.
- Published
- 2017
29. Canadian public libraries and search engines: barriers to visibility
- Author
-
Michael Smit and Zoe Dickinson
- Subjects
Computer science ,05 social sciences ,Visibility (geometry) ,050801 communication & media studies ,Library and Information Sciences ,Original research ,Discoverability ,World Wide Web ,Search engine ,0508 media and communications ,Library classification ,Organizational structure ,0509 other social sciences ,Thematic analysis ,050904 information & library sciences ,Information Systems - Abstract
Purpose The purpose of this paper is to examine the challenges presented by search engine visibility for public libraries. The paper outlines the results of a pilot study investigating search engine visibility in two Canadian public libraries. Design/methodology/approach The study consists of semi-structured interviews with librarians from two multi-branch Canadian public library systems, combined with quantitative data provided by each library, as well as data obtained through site-specific searches in Google and Bing. Possible barriers to visibility are identified through thematic analysis of the interviews. Findings The initial findings of this pilot study identify a complex combination of barriers to visibility on search engines, in the form of attitudes, policies, organizational structures, and technological difficulties. Research limitations/implications This paper describes a small, preliminary pilot study. More research is needed before any firm conclusions can be reached. Practical implications A review of the literature shows the increasing importance of search engine visibility for public libraries. By delving into the underlying issues which may be affecting libraries’ progress on the issue, this paper may help inform libraries’ decision-making processes and practices. Originality/value There has been little original research investigating the reasons behind libraries’ lack of visibility in search engine results pages. This paper provides insight into a previously unexplored area by exploring public libraries’ relationships with search engines.
- Published
- 2016
30. A study of user profile representation for personalized cross-language information retrieval
- Author
-
Jianxun Liu, Séamus Lawless, Dong Zhou, Xuan Wu, and Wenyu Zhao
- Subjects
Topic model ,Information retrieval ,User profile ,Computer science ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,05 social sciences ,02 engineering and technology ,Library and Information Sciences ,Personalization ,Query expansion ,020204 information systems ,Evaluation methods ,0202 electrical engineering, electronic engineering, information engineering ,0509 other social sciences ,050904 information & library sciences ,Representation (mathematics) ,Cross-language information retrieval ,Information Systems - Abstract
Purpose– With an increase in the amount of multilingual content on the World Wide Web, users are often striving to access information provided in a language of which they are non-native speakers. The purpose of this paper is to present a comprehensive study of user profile representation techniques and investigate their use in personalized cross-language information retrieval (CLIR) systems through the means of personalized query expansion.Design/methodology/approach– The user profiles consist of weighted terms computed by using frequency-based methods such as tf-idf and BM25, as well as various latent semantic models trained on monolingual documents and cross-lingual comparable documents. This paper also proposes an automatic evaluation method for comparing various user profile generation techniques and query expansion methods.Findings– Experimental results suggest that latent semantic-weighted user profile representation techniques are superior to frequency-based methods, and are particularly suitable for users with a sufficient amount of historical data. The study also confirmed that user profiles represented by latent semantic models trained on a cross-lingual level gained better performance than the models trained on a monolingual level.Originality/value– Previous studies on personalized information retrieval systems have primarily investigated user profiles and personalization strategies on a monolingual level. The effect of utilizing such monolingual profiles for personalized CLIR remains unclear. The current study fills the gap by a comprehensive study of user profile representation for personalized CLIR and a novel personalized CLIR evaluation methodology to ensure repeatable and controlled experiments can be conducted.
- Published
- 2016
31. Alternative metric indicators for funding scheme evaluations
- Author
-
Kayvan Kousha, Mike Thelwall, Adam Dinsmore, and Kevin Dolby
- Subjects
Scheme (programming language) ,Actuarial science ,Computer science ,media_common.quotation_subject ,05 social sciences ,Webometrics ,Library and Information Sciences ,Single-subject design ,050905 science studies ,Originality ,Added value ,Altmetrics ,Metric (unit) ,0509 other social sciences ,050904 information & library sciences ,Citation data ,computer ,Information Systems ,media_common ,computer.programming_language - Abstract
Purpose – The purpose of this paper is to investigate the potential of altmetric and webometric indicators to aid with funding agencies’ evaluations of their funding schemes. Design/methodology/approach – This paper analyses a range of altmetric and webometric indicators in terms of suitability for funding scheme evaluations, compares them to traditional indicators and reports some statistics derived from a pilot study with Wellcome Trust-associated publications. Findings – Some alternative indicators have advantages to usefully complement scientometric data by reflecting a different type of impact or through being available before citation data. Research limitations/implications – The empirical part of the results is based on a single case study and does not give statistical evidence for the added value of any of the indicators. Practical implications – A few selected alternative indicators can be used by funding agencies as part of their funding scheme evaluations if they are processed in ways that enable comparisons between data sets. Their evidence value is only weak, however. Originality/value – This is the first analysis of altmetrics or webometrics from a funding scheme evaluation perspective.
- Published
- 2015
32. A tracking and summarization system for online Chinese news topics
- Author
-
Hsien-Tsung Chang, Nilamadhab Mishra, and Shu-Wei Liu
- Subjects
Set (abstract data type) ,Word lists by frequency ,Information retrieval ,Computer science ,Multi-document summarization ,Context (language use) ,Timestamp ,Library and Information Sciences ,tf–idf ,Automatic summarization ,Information Systems ,Term (time) - Abstract
Purpose – The purpose of this paper is to design and implement new tracking and summarization algorithms for Chinese news content. Based on the proposed methods and algorithms, the authors extract the important sentences that are contained in topic stories and list those sentences according to timestamp order to ensure ease of understanding and to visualize multiple news stories on a single screen. Design/methodology/approach – This paper encompasses an investigational approach that implements a new Dynamic Centroid Summarization algorithm in addition to a Term Frequency (TF)-Density algorithm to empirically compute three target parameters, i.e., recall, precision, and F-measure. Findings – The proposed TF-Density algorithm is implemented and compared with the well-known algorithms Term Frequency-Inverse Word Frequency (TF-IWF) and Term Frequency-Inverse Document Frequency (TF-IDF). Three test data sets are configured from Chinese news web sites for use during the investigation, and two important findings are obtained that help the authors provide more precision and efficiency when recognizing the important words in the text. First, the authors evaluate three topic tracking algorithms, i.e., TF-Density, TF-IDF, and TF-IWF, with the said target parameters and find that the recall, precision, and F-measure of the proposed TF-Density algorithm is better than those of the TF-IWF and TF-IDF algorithms. In the context of the second finding, the authors implement a blind test approach to obtain the results of topic summarizations and find that the proposed Dynamic Centroid Summarization process can more accurately select topic sentences than the LexRank process. Research limitations/implications – The results show that the tracking and summarization algorithms for news topics can provide more precise and convenient results for users tracking the news. The analysis and implications are limited to Chinese news content from Chinese news web sites such as Apple Library, UDN, and well-known portals like Yahoo and Google. Originality/value – The research provides an empirical analysis of Chinese news content through the proposed TF-Density and Dynamic Centroid Summarization algorithms. It focusses on improving the means of summarizing a set of news stories to appear for browsing on a single screen and carries implications for innovative word measurements in practice.
- Published
- 2015
33. The role of arXiv, RePEc, SSRN and PMC in formal scholarly communication
- Author
-
Xuemei Li, Kayvan Kousha, and Mike Thelwall
- Subjects
World Wide Web ,Computer science ,Scopus ,Subject areas ,Library science ,Subject (documents) ,Library and Information Sciences ,Social science research ,Scholarly communication ,Information Systems - Abstract
Purpose– The four major Subject Repositories (SRs), arXiv, Research Papers in Economics (RePEc), Social Science Research Network (SSRN) and PubMed Central (PMC), are all important within their disciplines but no previous study has systematically compared how often they are cited in academic publications. In response, the purpose of this paper is to report an analysis of citations to SRs from Scopus publications, 2000-2013.Design/methodology/approach– Scopus searches were used to count the number of documents citing the four SRs in each year. A random sample of 384 documents citing the four SRs was then visited to investigate the nature of the citations.Findings– Each SR was most cited within its own subject area but attracted substantial citations from other subject areas, suggesting that they are open to interdisciplinary uses. The proportion of documents citing each SR is continuing to increase rapidly, and the SRs all seem to attract substantial numbers of citations from more than one discipline.Research limitations/implications– Scopus does not cover all publications, and most citations to documents found in the four SRs presumably cite the published version, when one exists, rather than the repository version.Practical implications– SRs are continuing to grow and do not seem to be threatened by institutional repositories and so research managers should encourage their continued use within their core disciplines, including for research that aims at an audience in other disciplines.Originality/value– This is the first simultaneous analysis of Scopus citations to the four most popular SRs.
- Published
- 2015
34. Authors self-citation behaviour in the field of Library and Information Science
- Author
-
Tariq Ahmad Shah, Ramesh C. Gaur, and Sumeer Gul
- Subjects
Set (abstract data type) ,SciELO ,Computer science ,Citation analysis ,Citation index ,Library science ,Subject (documents) ,Library and Information Sciences ,Citation ,Field (geography) ,Information science ,Information Systems - Abstract
Purpose – The purpose of this paper is to analyse the author self-citation behavior in the field of Library and Information Science. Various factors governing the author self-citation behavior have also been studied. Design/methodology/approach – The 2012 edition of Social Science Citation Index was consulted for the selection of LIS journals. Under the subject heading “Information Science and Library Science” there were 84 journals and out of these 12 journals were selected for the study based on systematic sampling. The study was confined to original research and review articles that were published in select journals in the year 2009. The main reason to choose 2009 was to get at least five years (2009-2013) citation data from Web of Science Core Collection (excluding Book Citation Index) and SciELO Citation Index. A citation was treated as self-citation whenever one of the authors of citing and cited paper was common, i.e., the set of co-authors of the citing paper and that of the cited one are not disjoint. To minimize the risk of homonyms, spelling variances and misspelling in authors’ names, the authors compared full author names in citing and cited articles. Findings – A positive correlation between number of authors and total number of citations exists with no correlation between number of authors and number/share of self-citations, i.e., self-citations are not affected by the number of co-authors in a paper. Articles which are produced in collaboration attract more self-citations than articles produced by only one author. There is no statistically significant variation in citations counts (total and self-citations) in works that are result of different types of collaboration. A strong and statistically significant positive correlation exists between total citation count and frequency of self-citations. No relation could be ascertained between total citation count and proportion of self-citations. Authors tend to cite more of their recent works than the work of other authors. Total citation count and number of self-citations are positively correlated with the impact factor of source publication and correlation coefficient for total citations is much higher than that for self-citations. A negative correlation exhibits between impact factor and the share of self-citations. Of particular note is that the correlation in all the cases is of weak nature. Research limitations/implications – The research provides an understanding of the author self-citations in the field of LIS. readers are encouraged to further the study by taking into account large sample, tracing citations also from Book Citation Index (WoS) and comparing results with other allied subjects so as to validate the robustness of the findings of this study. Originality/value – Readers are encouraged to further the study by taking into account large sample, tracing citations also from Book Citation Index (WoS) and comparing results with other allied subjects so as to validate the robustness of the findings of this study.
- Published
- 2015
35. User studies and user education programmes in archival institutions
- Author
-
Shadrack Katuu
- Subjects
Value (ethics) ,Underpinning ,Data collection ,Knowledge management ,business.industry ,Computer science ,media_common.quotation_subject ,Context (language use) ,Library and Information Sciences ,Structuring ,User experience design ,Originality ,Key (cryptography) ,business ,Information Systems ,media_common - Abstract
Purpose – The purpose of this paper is to examine user studies as well as user education within the context of public services offered by archival institutions. It highlighted some of the key aspects that constitute both concepts drawing from history in order to provide a better understanding in the context of current professional discussions. Design/methodology/approach – The review analysed peer-reviewed articles ranging from the late 1970s to the present time to illuminate debates in the archival professional underpinning the current understanding of user studies and user education. Findings – The paper outlined the different paths used in user studies to ensure data collection is exhaustive and provides a nuanced assessment of user needs. It also outlined the two related paradigms of structuring user education programmes, highlighted the points at which they differ and the rich discussions resulting from comparative analysis. Originality/value – The paper demonstrated that there is a rich corpus of professional literature on both user studies and user education, expounding on different aspects that would ensure both are designed and implemented effectively.
- Published
- 2015
36. Public science communication on Twitter: a visual analytic approach
- Author
-
Aba-Sah Dadzie and Victoria Uren
- Subjects
Visual analytics ,Point (typography) ,Computer science ,Microblogging ,Library and Information Sciences ,Data science ,Visualization ,Test (assessment) ,World Wide Web ,Science communication ,Social media ,Pattern matching ,Information Systems ,Coding (social sciences) - Abstract
Purpose – The purpose of this paper is to assess high-dimensional visualisation, combined with pattern matching, as an approach to observing dynamic changes in the ways people tweet about science topics. Design/methodology/approach – The high-dimensional visualisation approach was applied to three science topics to test its effectiveness for longitudinal analysis of message framing on Twitter over two disjoint periods in time. The paper uses coding frames to drive categorisation and visual analytics of tweets discussing the science topics. Findings – The findings point to the potential of this mixed methods approach, as it allows sufficiently high sensitivity to recognise and support the analysis of non-trending as well as trending topics on Twitter. Research limitations/implications – Three topics are studied, these illustrate a range of frames, but results may not be representative of all science topics. Social implications – Funding bodies increasingly encourage scientists to participate in public enga...
- Published
- 2015
37. Usefulness of altmetrics for measuring the broader impact of research
- Author
-
Bornmann, Lutz
- Subjects
World Wide Web ,Computer science ,Regression analysis ,Data set (IBM mainframe) ,Sample (statistics) ,Altmetrics ,Library and Information Sciences ,Data science ,Information Systems - Abstract
Purpose: The present case study investigates the usefulness of altmetrics for measuring the broad impact of research. Methods: This case study is based on a sample of 1,082 PLOS (the Public Library of Science) journal articles recommended in F1000. The dataset includes altmetrics which were provided by PLOS. The F1000 dataset contains tags on papers which were assigned by experts to characterise them. Findings: Results from the Facebook and Twitter models show higher predicted numbers of counts for "good for teaching" papers than for those papers where the tag is not set. Further model estimations show that saves by Mendeley users are particularly to be expected when a paper introduces a new practical/ theoretical technique (tag: "technical advance"). The tag "New finding" is statistically significant in the model with which the Facebook counts are evaluated. Conclusions: The "good for teaching" is assigned to papers which could be of interest to a wider circle of readers than the peers in a specialized area. Thus, the results of the current study indicate that Facebook and Twitter, but not Figshare or Mendeley, might provide an indication of which papers are of interest to a broader circle of readers (and not only for the peers in a specialist area), and could therefore be useful for the measurement of the social impact of research.
- Published
- 2015
38. Presenting social media information on mobile devices using multiple contexts
- Author
-
Esther Meng-Yoke Tan, Dion Hoe-Lian Goh, Wee Kim Wee School of Communication and Information, and Institute of Systems Science, National University of Singapore
- Subjects
World Wide Web ,Multiple context ,Computer science ,Identity (social science) ,Social media ,Context (language use) ,Library and Information Sciences ,User interface ,Engineering::Computer science and engineering::Information systems::Information interfaces and presentation [DRNTU] ,Mobile device ,Tourism ,Information Systems ,User interface design - Abstract
Purpose – Research has shown that when presenting large amounts of social media information on small devices, design should consider multiple contexts which include user preferences, time, location, environment and so on. It should also take into account the purpose of use, for example, the kind of tasks undertaken by users. However, little research has been done on the organization of social media information by multiple context and tasks. The paper aims to discuss these issues. Design/methodology/approach – Using tourism as a domain, the authors conducted a user evaluation study with a prototype to investigate users’ preferred ways of organizing different types of social media information based on multiple contexts. Findings – In this paper, the authors present a sequence of context types for organizing four types of social media information (recommendations, events, friends and media elements). The study revealed that users preferred to view recommendations by location and environment context, events by location and temporal context, contacts by location and identity context and finally, list of media elements by environment and identity context. Research limitations/implications – There may be different sequences of context types for organizing social media information in domains other than tourism. Researchers are encouraged to analyze users’ needs in other domains so as to find their preferred ways of organizing social media information. Practical implications – This paper includes implications for the design and development of user interface, in particular, for mobile applications presenting large amount of social media information. Originality/value – It presents a new way of organizing social media information using multiple context types and with consideration of users’ needs.
- Published
- 2015
39. Delineating knowledge management through lexical analysis – a retrospective
- Author
-
Roy D. Johnson, Cornelius Johannes Kruger, and Jacobus Philippus van Deventer
- Subjects
Information management ,Body of knowledge ,Knowledge management ,Knowledge extraction ,Computer science ,business.industry ,Lexical analysis ,Personal knowledge management ,Library and Information Sciences ,business ,Lexicon ,Information Systems ,Lexicography - Abstract
Purpose – Academic authors tend to define terms that meet their own needs. Knowledge Management (KM) is a term that comes to mind and is examined in this study. Lexicographical research identified KM terms used by authors from 1996 to 2006 in academic outlets to define KM. Data were collected based on strict criteria which included that definitions should be unique instances. From 2006 onwards, these authors could not identify new unique instances of definitions with repetitive usage of such definition instances. Analysis revealed that KM is directly defined by People (Person and Organisation), Processes (Codify, Share, Leverage, and Process) and Contextualised Content (Information). The paper aims to discuss these issues. Design/methodology/approach – The aim of this paper is to add to the body of knowledge in the KM discipline and supply KM practitioners and scholars with insight into what is commonly regarded to be KM so as to reignite the debate on what one could consider as KM. The lexicon used by KM scholars was evaluated though the application of lexicographical research methods as extended though Knowledge Discovery and Text Analysis methods. Findings – By simplifying term relationships through the application of lexicographical research methods, as extended though Knowledge Discovery and Text Analysis methods, it was found that KM is directly defined by People (Person and Organisation), Processes (Codify, Share, Leverage, Process) and Contextualised Content (Information). One would therefore be able to indicate that KM, from an academic point of view, refers to people processing contextualised content. Research limitations/implications – In total, 42 definitions were identified spanning a period of 11 years. This represented the first use of KM through the estimated apex of terms used. From 2006 onwards definitions were used in repetition, and all definitions that were considered to repeat were therefore subsequently excluded as not being unique instances. All definitions listed are by no means complete and exhaustive. The definitions are viewed outside the scope and context in which they were originally formulated and then used to review the key concepts in the definitions themselves. Social implications – When the authors refer to the aforementioned discussion of KM content as well as the presentation of the method followed in this paper, the authors may have a few implications for future research in KM. First the research validates ideas presented by the OECD in 2005 pertaining to KM. It also validates that through the evolution of KM, the authors ended with a description of KM that may be seen as a standardised description. If the authors as academics and practitioners, for example, refer to KM as the same construct and/or idea, it has the potential to speculatively, distinguish between what KM may or may not be. Originality/value – By simplifying the term used to define KM, by focusing on the most common definitions, the paper assist in refocusing KM by reconsidering the dimensions that is the most common in how it has been defined over time. This would hopefully assist in reigniting discussions about KM and how it may be used to the benefit of an organisation.
- Published
- 2015
40. Web service for connecting visually impaired people with libraries
- Author
-
Danijela Boberic Krsticev and Danijela Tešendić
- Subjects
medicine.medical_specialty ,Point (typography) ,Multimedia ,business.industry ,Computer science ,Library and Information Sciences ,computer.software_genre ,World Wide Web ,Software ,Library management ,Web page ,medicine ,Library classification ,Web service ,Software architecture ,business ,computer ,Web modeling ,Information Systems - Abstract
Purpose – The purpose of this paper is to describe a case study of developing a web service that will act as an intermediary between the Audio Library system for the visually impaired and the library management systems. The Audio Library is based on speech recognition and text-to-speech engines and it produces synthesized speech from various electronic materials. It has its own database with a limited number of books and textual materials. Web services described in this paper should enable access to a larger number of electronic resources provided by libraries. Design/methodology/approach – In this paper, the author specified software architecture of a web service analyzing different approaches for search and retrieval. Findings – Web service described in this paper is the first software solution addressing the problem of lending e-books in Serbia. It aggregates collections of different libraries in a single access point for the Audio Library system. In this way, users of the Audio Library system are provided with larger number of electronic resources. Originality/value – Communication between the Audio Library and this web service is achieved by using standardized protocols for exchanging library data. However, those protocols did not fulfill all necessary requirements, so the authors propose some extensions to overcome those issues.
- Published
- 2015
41. Enhanced ontology-based indexing and searching
- Author
-
S. Thenmalar and T. V. Geetha
- Subjects
Query expansion ,Information retrieval ,Concept search ,Index (publishing) ,Computer science ,Ontology-based data integration ,Search engine indexing ,Ontology ,Upper ontology ,Library and Information Sciences ,Information Systems ,Ranking (information retrieval) - Abstract
Purpose – The purpose of this paper is to improve the conceptual-based search by incorporating structural ontological information such as concepts and relations. Generally, Semantic-based information retrieval aims to identify relevant information based on the meanings of the query terms or on the context of the terms and the performance of semantic information retrieval is carried out through standard measures-precision and recall. Higher precision leads to the (meaningful) relevant documents obtained and lower recall leads to the less coverage of the concepts. Design/methodology/approach – In this paper, the authors enhance the existing ontology-based indexing proposed by Kohler et al., by incorporating sibling information to the index. The index designed by Kohler et al., contains only super and sub-concepts from the ontology. In addition, in our approach, we focus on two tasks; query expansion and ranking of the expanded queries, to improve the efficiency of the ontology-based search. The aforementioned tasks make use of ontological concepts, and relations existing between those concepts so as to obtain semantically more relevant search results for a given query. Findings – The proposed ontology-based indexing technique is investigated by analysing the coverage of concepts that are being populated in the index. Here, we introduce a new measure called index enhancement measure, to estimate the coverage of ontological concepts being indexed. We have evaluated the ontology-based search for the tourism domain with the tourism documents and tourism-specific ontology. The comparison of search results based on the use of ontology “with and without query expansion” is examined to estimate the efficiency of the proposed query expansion task. The ranking is compared with the ORank system to evaluate the performance of our ontology-based search. From these analyses, the ontology-based search results shows better recall when compared to the other concept-based search systems. The mean average precision of the ontology-based search is found to be 0.79 and the recall is found to be 0.65, the ORank system has the mean average precision of 0.62 and the recall is found to be 0.51, while the concept-based search has the mean average precision of 0.56 and the recall is found to be 0.42. Practical implications – When the concept is not present in the domain-specific ontology, the concept cannot be indexed. When the given query term is not available in the ontology then the term-based results are retrieved. Originality/value – In addition to super and sub-concepts, we incorporate the concepts present in same level (siblings) to the ontological index. The structural information from the ontology is determined for the query expansion. The ranking of the documents depends on the type of the query (single concept query, multiple concept queries and concept with relation queries) and the ontological relations that exists in the query and the documents. With this ontological structural information, the search results showed us better coverage of concepts with respect to the query.
- Published
- 2014
42. Towards maximal unification of semantically diverse ontologies for controversial domains
- Author
-
Maayan Zhitomirsky-Geffet and Judit Bar-Ilan
- Subjects
Matching (statistics) ,Information retrieval ,Unification ,Computer science ,business.industry ,Semantic search ,Library and Information Sciences ,computer.software_genre ,Semantics ,Automatic summarization ,Upper ontology ,Artificial intelligence ,business ,computer ,Semantic Web ,Natural language processing ,Information Systems ,Semantic matching - Abstract
Purpose – Ontologies are prone to wide semantic variability due to subjective points of view of their composers. The purpose of this paper is to propose a new approach for maximal unification of diverse ontologies for controversial domains by their relations. Design/methodology/approach – Effective matching or unification of multiple ontologies for a specific domain is crucial for the success of many semantic web applications, such as semantic information retrieval and organization, document tagging, summarization and search. To this end, numerous automatic and semi-automatic techniques were proposed in the past decade that attempt to identify similar entities, mostly classes, in diverse ontologies for similar domains. Apparently, matching individual entities cannot result in full integration of ontologies’ semantics without matching their inter-relations with all other-related classes (and instances). However, semantic matching of ontological relations still constitutes a major research challenge. Therefore, in this paper the authors propose a new paradigm for assessment of maximal possible matching and unification of ontological relations. To this end, several unification rules for ontological relations were devised based on ontological reference rules, and lexical and textual entailment. These rules were semi-automatically implemented to extend a given ontology with semantically matching relations from another ontology for a similar domain. Then, the ontologies were unified through these similar pairs of relations. The authors observe that these rules can be also facilitated to reveal the contradictory relations in different ontologies. Findings – To assess the feasibility of the approach two experiments were conducted with different sets of multiple personal ontologies on controversial domains constructed by trained subjects. The results for about 50 distinct ontology pairs demonstrate a good potential of the methodology for increasing inter-ontology agreement. Furthermore, the authors show that the presented methodology can lead to a complete unification of multiple semantically heterogeneous ontologies. Research limitations/implications – This is a conceptual study that presents a new approach for semantic unification of ontologies by a devised set of rules along with the initial experimental evidence of its feasibility and effectiveness. However, this methodology has to be fully automatically implemented and tested on a larger dataset in future research. Practical implications – This result has implication for semantic search, since a richer ontology, comprised of multiple aspects and viewpoints of the domain of knowledge, enhances discoverability and improves search results. Originality/value – To the best of the knowledge, this is the first study to examine and assess the maximal level of semantic relation-based ontology unification.
- Published
- 2014
43. An overview of knowledge management research viewed through the web of science (1993-2012)
- Author
-
Hong Lv and Junping Qiu
- Subjects
Knowledge management ,Computer science ,business.industry ,Citation index ,Science Citation Index ,Subject (documents) ,Library and Information Sciences ,The arts ,Data science ,Field (geography) ,Social Sciences Citation Index ,World Wide Web ,Information visualization ,business ,Citation ,Information Systems - Abstract
Purpose – The purpose of this paper is to present a bibliometric analysis of scientific output of the knowledge management (KM), the aim being to offer an overview of research activity in this field and characterize its most significant aspects. In addition, this study aims to quantitatively analyze KM research trends, forecasts, and citations from 1993 to 2012 in Web of Science (WOS). Design/methodology/approach – A total of 12,925 documents related to KM research were collected from following databases: Science Citation Index Expanded, Social Sciences Citation Index, Arts & Humanities Citation Index, Conference Proceedings Citation Index-Science, and Conference Proceedings Citation Index-Social Science & Humanities. These documents were carefully reviewed and subjected to bibliometric data analysis techniques. Findings – A number of research questions pertaining to patterns in scientific outputs, subject categories and major journals, author keywords frequencies, characteristics of the international collaboration, most cited papers and significant papers distribution of KM research were proposed and answered. In addition, there are five research sights on KM research are as follows: management science, computer science, information science, business, and engineering. Based on these findings, many implications emerged that improve one's understanding of the identity of KM as a distinct multi-discipline scientific field. Research limitations/implications – Comprehensiveness and inclusiveness of the analyzed KM-related data set in WOS because of some KM-centric journals are not indexed by Thomson Reuters. Originality/value – The paper offers an overview and evaluation of research activity into the KM viewed through the WOS during 1993-2012.
- Published
- 2014
44. An integrated framework of online generative capability: interview from digital immigrants
- Author
-
Yuxiang Chris Zhao, Xiaoling Sun, Xiaojuan Xu, and Qinghua Zhu
- Subjects
Web 2.0 ,Microblogging ,Computer science ,media_common.quotation_subject ,Immigration ,Context (language use) ,Library and Information Sciences ,Social informatics ,World Wide Web ,Scale (social sciences) ,Digital native ,Social media ,Generative grammar ,Information Systems ,media_common - Abstract
Purpose– In the Web 2.0 era, more and more digital immigrants actively participate in blogging, video sharing, online rating, and micro blogging, etc. However, some may be more skilled in producing and generating online content while others still meet some barriers in doing so. Thus, it is interesting to investigate the online generative capability of digital immigrants in Web 2.0 context. This paper seeks to address this issue.Design/methodology/approach– The authors selected Shanghai as their target province in this study for its large scale of internet users. An in-depth semi-structured interview was used as their research method. They selected several community clubs as the interview settings. In addition, age was adopted as a threshold to define the Chinese digital immigrants for its convenience in sampling.Findings– Chinese digital immigrants are playing an important role in content generating, and have a great potential in the future contribution, and a number of digital immigrants regard the content generating as a pretty easy work while some others felt difficulties, even frustrated and exhausted when generating content. About the content type, digital immigrants prefer to generate that content with low granularity. About the motivation, the intrinsic motivation and the extrinsic motivation with an internalized focus play a dominant role. About the generating mode, digital immigrants prefer to generate content individually or collectively.Originality/value– This paper develops the concept of online generative capability by adapting the notion of generativity from other disciplines to the characteristics of Web 2.0. Then an integrated conceptual framework is built and evaluated. Practically, the paper puts forward some implications for the designers, managers, and information service staff from different perspectives to facilitate the digital immigrant's online generative capability.
- Published
- 2014
45. Programmed Method: Developing a Toolset for Capturing and Analyzing Tweets
- Author
-
Erik Borra, Bernhard Rieder, and ASCA (FGw)
- Subjects
Data collection ,Relation (database) ,Computer science ,Frame (artificial intelligence) ,Computational sociology ,Library and Information Sciences ,Data science ,Information Systems - Abstract
Purpose – The purpose of this paper is to introduce Digital Methods Initiative Twitter Capture and Analysis Toolset, a toolset for capturing and analyzing Twitter data. Instead of just presenting a technical paper detailing the system, however, the authors argue that the type of data used for, as well as the methods encoded in, computational systems have epistemological repercussions for research. The authors thus aim at situating the development of the toolset in relation to methodological debates in the social sciences and humanities. Design/methodology/approach – The authors review the possibilities and limitations of existing approaches to capture and analyze Twitter data in order to address the various ways in which computational systems frame research. The authors then introduce the open-source toolset and put forward an approach that embraces methodological diversity and epistemological plurality. Findings – The authors find that design decisions and more general methodological reasoning can and should go hand in hand when building tools for computational social science or digital humanities. Practical implications – Besides methodological transparency, the software provides robust and reproducible data capture and analysis, and interlinks with existing analytical software. Epistemic plurality is emphasized by taking into account how Twitter structures information, by allowing for a number of different sampling techniques, by enabling a variety of analytical approaches or paradigms, and by facilitating work at the micro, meso, and macro levels. Originality/value – The paper opens up critical debate by connecting tool design to fundamental interrogations of methodology and its repercussions for the production of knowledge. The design of the software is inspired by exchanges and debates with scholars from a variety of disciplines and the attempt to propose a flexible and extensible tool that accommodates a wide array of methodological approaches is directly motivated by the desire to keep computational work open for various epistemic sensibilities.
- Published
- 2014
46. Government data governance framework based on a data middle platform
- Author
-
Yali Qiao, Jingyi Wu, Zijun Mao, and Hong Yao
- Subjects
Value (ethics) ,Government ,Service (systems architecture) ,Knowledge management ,Computer science ,business.industry ,Audit ,Library and Information Sciences ,Data governance ,Systematic review ,Design science research ,Facilitated communication ,business ,Information Systems - Abstract
PurposeThe present paper constructed a new framework for government data governance based on the concept of a data middle platform to elicit the detailed requirements and functionalities of a government data governance framework.Design/methodology/approachFollowing a three-cycle activity, the design science research (DSR) paradigm was used to develop design propositions. The design propositions are obtained based on a systematic literature review of government data governance and data governance frameworks. Cases and experts further assessed the effectiveness of the implementation of the artifacts.FindingsThe study developed an effective framework for government data governance that supported the digital service needs of the government. The results demonstrated the advantages of the framework in adapting to organizational operations and data, realized the value of data assets, improved data auditing and oversight and facilitated communication. From the collection of data to the output of government services, the framework adapted to the new characteristics of digital government.Originality/valueKnowledge of the “data middle platforms” generated in this study provides new knowledge to the design of government data governance frameworks and helps translate design propositions into concrete capabilities. By reviewing earlier literature, the article identified the core needs and challenges of government data governance to help practitioners approach government data governance in a structured manner.
- Published
- 2021
47. Importance-performance map analysis to enhance the performance of attitude towards mobile wallet adoption among Indian consumer segments
- Author
-
Deepak Chawla and Himanshu Joshi
- Subjects
Service (systems architecture) ,Knowledge management ,Mobile banking ,Computer science ,business.industry ,Library and Information Sciences ,Unified theory of acceptance and use of technology ,SMS banking ,Respondent ,Mobile payment ,Technology acceptance model ,The Internet ,business ,Information Systems - Abstract
PurposeIndia has the second highest percentage of mobile wallet adoption driven by availability of affordable smartphones and Internet. Despite a general interest, studies on its adoption have been scarce. This research assumes that user segments exist, each with their own level of maturity, and addresses the question “Are there segments which can be profiled?” Thus, the objectives of the study are to propose a model that explains the attitude of user segments towards its adoption; identify probable user segments and profile them; examine the importance and performance of constructs which influence attitude within each cluster and recommend ways to improve performance.Design/methodology/approachThis paper employs the constructs from two popular theories on technology adoption, i.e. technology acceptance model (TAM) and Unified Theory of Acceptance and Use of Technology (UTAUT). A synthesis of review of literature on these models, besides two focus group discussions (FGDs), was used to design a pilot instrument. A nationwide survey was conducted, and 744 responses were obtained. Convenience sampling was used to select the respondents. The average scores of various constructs were computed and subjected to hierarchical clustering. Further, k-means clustering was carried out. The demographic profiling of each cluster was done through cross-tabulation and differences related to attitude and intention between clusters were tracked by one-way Analysis of Variance (ANOVA). To determine the relative importance and performance of constructs within each cluster, Importance-Performance Map Analysis (IPMA) using Smart Partial Least Squares (PLS) was carried out.FindingsThe hierarchical clustering resulted in three clusters. The result of k-means clustering was used to label the clusters as Technology Enthusiasts (TE), Technology Sceptics (TS) and Technology Pragmatists (TP). The obtained clusters were found to differ in terms of perception, attitude, intention, behavior, marital status, education, occupation and income levels. With respect to each cluster, it was seen that the top three important constructs are Perceived Usefulness (PU), Security (SEC) and Lifestyle Compatibility (LC) as indicated by the IPMA. The findings indicate that mobile wallet providers should focus on all six constructs, with special focus on PU, SEC and LC. The findings of this study will help mobile wallet providers in customizing their offerings to enhance adoption attitude in all three clusters.Research limitations/implicationsThis study examines the perception of students and working professional towards mobile wallet adoption and uses this data for segmentation. However, there could be underlying differences between these two groups, as the motive behind adopting a technology may be different. Thus, treating them as homogenous user segments could be a limitation. Therefore, exploring segments and profiles for each type of user may be an area for future research. Mobile wallet providers should also give utmost importance to perceived usefulness, security and lifestyle compatibility while designing their services. This will not only enhance user trust and compatibility with mobile wallet but also improve the outcomes associated with its usage.Practical implicationsThis study will help mobile wallet providers understand the user segments and customize their service offerings.Originality/valueThis study provides a comparison of the respondent profiles of three obtained segments of mobile wallet users. While prior studies have identified segments associated with adoption of technologies like ATM banking, SMS banking, online banking, Internet banking, mobile banking etc., not much has been reported on mobile wallet adoption. To the best of the authors' knowledge, this is a novel study in India, aimed at identifying user clusters among adopters of mobile wallets and developing cluster profiles based on demographic, attitude and intention.
- Published
- 2021
48. Evaluating the effectiveness of Farsi-English query production using ontology: a case of scientometric ontology
- Author
-
Tahere Jowkar, Sanaz Manouchehri, and Mahdieh Mirzabeigi
- Subjects
Information retrieval ,Point (typography) ,Process (engineering) ,Computer science ,05 social sciences ,Search engine results page ,02 engineering and technology ,Library and Information Sciences ,Ontology (information science) ,Field (computer science) ,Task (project management) ,0202 electrical engineering, electronic engineering, information engineering ,Domain knowledge ,020201 artificial intelligence & image processing ,Relevance (information retrieval) ,0509 other social sciences ,050904 information & library sciences ,Information Systems - Abstract
PurposeThis paper aims to discover the effectiveness of Farsi-English query using ontology.Design/methodology/approachThe present study is quasi-experimental. The sample consisted of 60 students and graduate and doctoral staff from Shiraz University and the Regional Center for Science and Technology. A researcher-made questionnaire was used to assess the level of English language proficiency of users, background knowledge and their level of satisfaction with search results before and after using ontology. Each user also evaluated the relevance of the top ten results on the Google search engine results page before and after using ontology.FindingsThe findings showed that the level of complexity of the task, the use of ontology, the interactive effect of the level of complexity of the task with the domain knowledge of the users, and the interactive effect of the level of complexity of the task with ontology, influence the effectiveness of retrieval results from the users' point of view. The results of the present study also showed that the level of complexity of the task, the use of ontology, and the interactive effect of the level of complexity of the task and the use of ontology, affect the level of user satisfaction.Originality/valueThe results of this research are significant in both theoretical and practical aspects. Theoretically, given the lack of research in which the interactive effect of the use of ontology has examined the level of complexity of tasks and domain knowledge of users, the present study can be considered as an attempt to improve information retrieval systems. From a practical point of view, the results of this research will help researchers and designers of information retrieval systems to understand that the use of ontologies can be used to retrieve information and improve the query and assess the needs of users and their satisfaction in this field, and ultimately, making the information retrieval process more effective.
- Published
- 2021
49. Data literacy and management of research data – a prerequisite for the sharing of research data
- Author
-
Agusta Palsdottir
- Subjects
Response rate (survey) ,0303 health sciences ,education.field_of_study ,Knowledge management ,Relation (database) ,Computer science ,business.industry ,Data management ,Best practice ,05 social sciences ,Population ,Sample (statistics) ,Data literacy ,Library and Information Sciences ,Metadata ,03 medical and health sciences ,0509 other social sciences ,050904 information & library sciences ,education ,business ,030304 developmental biology ,Information Systems - Abstract
PurposeThe purpose of this paper is to investigate the knowledge and attitude about research data management, the use of data management methods and the perceived need for support, in relation to participants’ field of research.Design/methodology/approachThis is a quantitative study. Data were collected by an email survey and sent to 792 academic researchers and doctoral students. Total response rate was 18% (N = 139). The measurement instrument consisted of six sets of questions: about data management plans, the assignment of additional information to research data, about metadata, standard file naming systems, training at data management methods and the storing of research data.FindingsThe main finding is that knowledge about the procedures of data management is limited, and data management is not a normal practice in the researcher's work. They were, however, in general, of the opinion that the university should take the lead by recommending and offering access to the necessary tools of data management. Taken together, the results indicate that there is an urgent need to increase the researcher's understanding of the importance of data management that is based on professional knowledge and to provide them with resources and training that enables them to make effective and productive use of data management methods.Research limitations/implicationsThe survey was sent to all members of the population but not a sample of it. Because of the response rate, the results cannot be generalized to all researchers at the university. Nevertheless, the findings may provide an important understanding about their research data procedures, in particular what characterizes their knowledge about data management and attitude towards it.Practical implicationsAwareness of these issues is essential for information specialists at academic libraries, together with other units within the universities, to be able to design infrastructures and develop services that suit the needs of the research community. The findings can be used, to develop data policies and services, based on professional knowledge of best practices and recognized standards that assist the research community at data management.Originality/valueThe study contributes to the existing literature about research data management by examining the results by participants’ field of research. Recognition of the issues is critical in order for information specialists in collaboration with universities to design relevant infrastructures and services for academics and doctoral students that can promote their research data management.
- Published
- 2021
50. Can the adoption of health information on social media be predicted by information characteristics?
- Author
-
Zhumei Sun and Zhibing Wang
- Subjects
Estimation ,Knowledge management ,business.industry ,Computer science ,Information quality ,Sample (statistics) ,02 engineering and technology ,Library and Information Sciences ,03 medical and health sciences ,0302 clinical medicine ,Work (electrical) ,Credibility ,0202 electrical engineering, electronic engineering, information engineering ,Information source ,020201 artificial intelligence & image processing ,Social media ,030212 general & internal medicine ,business ,Dissemination ,Information Systems - Abstract
PurposeThis paper aims to explore the relationship between the characteristics of social media health information and its adoption. The purpose is to identify information characteristics that can be used to estimate the level of health information adoption in advance.Design/methodology/approachAccording to the Information Adoption Model (IAM), the study extracted ten information characteristics from the aspects of information quality and information source credibility. The sample data was collected from the top ten influential health accounts based on the Impact List of Sina Weibo to test the effectiveness of these characteristics in distinguishing information at different levels of adoption. The forecasting of information adoption level is regarded as a binary classification question in the study and support vector machine (SVM) is used to do the research.FindingsThe results indicate that ten information characteristics chosen in this study are related to information adoption. Based on these information characteristics, it is feasible to estimate the level of health information adoption, and the estimation accuracy is relatively high.Originality/valueA lot of work has been done in previous researches to reveal the factors that influence information adoption. The theoretical contribution of this work is to further discuss how to use the influencing factors to do some predictive work for information adoption. In practice, it will help health information publishers to disseminate high-quality health information more effectively as well as promote the adoption of health information.
- Published
- 2020
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.