147 results on '"SOCIAL informatics"'
Search Results
2. Adapting to online education: insights from computer science teachers.
- Author
-
Mladenović, Monika
- Subjects
SCIENCE teachers ,COMPUTER science ,ELEMENTARY school teachers ,HIGH school teachers ,TEACHER competencies ,ONLINE education ,SOCIAL informatics ,INTERNET forums - Abstract
This paper explored the attitudes and roles of computer science (CS) teachers in elementary and high schools in Croatia in the period from completely online to "normal" schooling. The research was conducted in two phases to gain insight into the adaption of online education in schools. The first part of the research was a quantitative study conducted during online education in 2019/2020 among 538 elementary and high school informatics teachers across Croatia. Data were collected from an online survey. The second part of the research was a qualitative study conducted in 2022, employing interviews for data collection. The interview questions were designed based on the survey results mentioned above. The results showed that CS teachers had a significant role in implementing online schools, acting as implementers of tools for online teaching and as helpdesk IT support to other teachers. Still, formal education nowadays is affected by online schooling, and some online practices are now adopted into regular teaching. Therefore, the findings can serve as a guideline for future education related to the digital competencies of teachers and students. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. INFROMATYKA JAKO DZIEDZINA WIEDZY WSPOMAGAJĄCA REALIZACJE LUDZKICH PRZEDSIĘWZIĘĆ.
- Author
-
Targowski, Andrzej and Krawczyk, Henryk
- Subjects
SOCIAL impact ,INFORMATION processing ,SOCIAL informatics ,EXPERTISE ,COMPUTERS - Abstract
Copyright of Filozofia i Nauka is the property of Institute of Philosophy & Sociology of the Polish Academy of Sciences and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
4. Getting Great Recommendation Letters: A Practical Guide.
- Author
-
Luchini-Colbry, Katy
- Subjects
- *
FELLOWSHIP , *JOB applications , *INFORMATION technology , *SOCIAL informatics , *COMPUTER science - Abstract
This paper describes the role and value of recommendation letters in academic contexts, such as a graduate school or fellowship application, and provides specific advice for getting recommendation letters that will enhance and support such applications. Specific strategies are offered for deciding who to ask for recommendations, and detailed advice is given on how to prepare background information that will assist letter writers in highlighting the range of applicants' skills and abilities. [ABSTRACT FROM AUTHOR]
- Published
- 2017
5. What and who with: A social approach to double-sided recommendation.
- Author
-
Lombardi, Ilaria and Vernero, Fabiana
- Subjects
- *
SOCIAL comparison , *COMPUTER science , *JUDGMENT (Psychology) , *SOCIAL informatics , *ALGORITHMS - Abstract
Double-sided recommendations (DSR) have been recently introduced for an item and a group that the item is destined for. Herein we present an algorithm which takes inspiration from the Social Comparison Theory to recommend items that had an average positive evaluation from other users on the target user's social network. Other users' judgments are weighted according to the influence these users have on the target. Moreover, for each recommended item, we propose a group that encompasses all the target users' contacts who expressed a positive opinion on it. Our data show that users consider double-sided recommendations more useful than traditional recommendations which provide equivalent information. It was observed that our “social” DSR algorithm performs better in the event recommendation domain than a content-based one which has already been recognised as providing a good performance, in terms of precision, recall, accuracy and F1. This result is strengthened by our demonstrating that the good performance DSRs provide also depends on their peculiar structure and not only on the fact that they include “social” information. The item-recommendation part also performed better than a user-based collaborative filtering algorithm. Lastly, we found that users' scores for recommended item-group packages can be better predicted by considering only the system scores for the recommended groups, at least in the domain of social and cultural events. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
6. IA: A Generic Framework for Searching Books with Social Information.
- Author
-
Yin, Xu-Cheng, Zhang, Bo-Wen, Cui, Xiao-Ping, Qu, Jiao, Geng, Bin, Zhou, Fang, Song, Li, and Hao, Hong-Wei
- Subjects
- *
RESEARCH of books , *SOCIAL informatics , *COMPUTER science , *ELECTRONIC commerce , *RECOMMENDER systems , *METADATA - Abstract
Effective book search has been discussed for decades and is still future-proof in areas as diverse as computer science, informatics, e-commerce and even culture and arts. A variety of social information contents (e.g, ratings, tags and reviews) emerge with the huge number of books on the Web, but how they are utilized for searching and finding books is seldom investigated. Here we develop an Integrated Search And Recommendation Technology (IA), which breaks new ground by providing a generic framework for searching books with rich social information. IA comprises a search engine to rank books with book contents and professional metadata, a Generalized Content-based Filtering model to thereafter rerank books with user-generated social contents, and a learning-to-rank technique to finally combine a wide range of diverse reranking results. Experiments show that this technology permits embedding social information to promote book search effectiveness, and IA, by making use of it, has the best performance on CLEF/INEX Social Book Search Evaluation datasets of all 4 years (from 2011 to 2014), compared with some other state-of-the-art methods. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
7. Social informatics of information value cocreation: A case study of xiaomi's online user community
- Author
-
Loo Geok Pee, Suling Jia, Shan L. Pan, and Mingwei Li
- Subjects
Topic model ,Information Systems and Management ,Knowledge management ,Sociotechnical system ,Computer Networks and Communications ,Computer science ,business.industry ,Information technology ,Library and Information Sciences ,Social informatics ,Triangulation (geometry) ,Product (category theory) ,business ,Web crawler ,Social network analysis ,Information Systems - Abstract
The perennial issue of information value creation needs to be understood in the contemporary era of a more networked user environment enabled by information technology (IT). This mixed‐methods study investigates information value cocreation from the social informatics perspective to surface sociotechnical implications for IT design and use, since cocreation is inherently social and technology‐mediated. Specifically, the cocreation of software as an information‐intensive product is examined. Data on the cocreation of Xiaomi's MIUI firmware were collected from two sources: 49 interviews of staff and user participants and web crawling of the cocreation platform. They were analyzed with interpretive analysis, topic modeling, and social network analysis for triangulation. Findings indicate three sociotechnical information practices co‐constituted by information, IT, people, and their activities. Each practice is instrumental in rapidly and continuously converting external information into cocreated information value. The adsorption information practice attracts new and diverse external information; the absorption practice integrates external and internal information rapidly by involving users; the desorption practice allows rapid adoption of the cocreated product so that information value can be realized and demonstrated for further cocreation. Critically analyzing these practices reveals unanticipated or paradoxical issues affecting the design and use of common cocreation technology such as discussion forums.
- Published
- 2019
8. Artificial intelligence in healthcare robots: A social informatics study of knowledge embodiment
- Author
-
Loo Geok Pee, Shan L. Pan, and Lili Cui
- Subjects
Value (ethics) ,Technological determinism ,Information Systems and Management ,Computer Networks and Communications ,business.industry ,Process (engineering) ,Computer science ,05 social sciences ,Perspective (graphical) ,Library and Information Sciences ,050905 science studies ,Social informatics ,Information science ,Health care ,Robot ,Artificial intelligence ,0509 other social sciences ,050904 information & library sciences ,business ,Information Systems - Abstract
Knowledge embodiment, taking a social informatics perspective, refers to the transformation of knowledge into a form in which its value becomes evident. Knowledge embodiment in robotic systems with artificial intelligence (AI robotic systems) actualizes the value of knowledge much more powerfully than other entities, potentially altering the connections among people or even displacing professionals. To understand the effects of knowledge embodiment in AI robotic systems on connections among people and technology, this study addresses 2 cumulative research questions: (i) What is the nature of knowledge embodiment, that is, how are knowledge and AI robots assembled for knowledge work? (ii) How does knowledge embodiment affect connections among people and technology (that is, social informatics)? A case study of a large hospital that has employed different AI robotic systems in many parts of its healthcare service provision process indicates 4 forms of knowledge embodiment, each with a distinct focus. Further, a social informatics analysis suggests four ways knowledge embodiment affects connections among people and technology and reveals related social and institutional issues that go beyond technological determinism. Implications of these findings for research on social informatics and information science are discussed.
- Published
- 2018
9. How do tutors use data to support their students?
- Author
-
Moira Dunworth, Steve Walker, Carlton Wood, Anactoria Clarke, and Tom Olney
- Subjects
Enthusiasm ,Computer science ,business.industry ,media_common.quotation_subject ,05 social sciences ,Learning analytics ,050301 education ,Information technology ,Data science ,Social informatics ,Education ,0502 economics and business ,Needs assessment ,Key (cryptography) ,Set (psychology) ,business ,0503 education ,050203 business & management ,media_common ,Utilization - Abstract
Despite widespread enthusiasm, evidence of the effectiveness of learning analytics remains mixed. One possible explanation for this is that insufficient attention has been paid to the contexts in which it is introduced. We report here on a small-scale study into the prior use of data and communications technologies by tutors, who comprise a key user group in The Open University’s tuition model. Tutors interviewed reported using a complex set of data sources and information tools, and creating local/personal tools and methods for keeping track of students and their interactions with them.
- Published
- 2018
10. Wikidata Centric Vocabularies and URIs for Linking Data in Semantic Web Driven Digital Curation
- Author
-
Shigeo Sugimoto, Mitsuharu Nagamori, Nishad Thalhath, and Tetsuo Sakaguchi
- Subjects
0303 health sciences ,Digital curation ,Vocabulary ,Computer science ,media_common.quotation_subject ,010401 analytical chemistry ,Interoperability ,Linked data ,01 natural sciences ,Social informatics ,0104 chemical sciences ,Metadata ,World Wide Web ,03 medical and health sciences ,Resource (project management) ,Semantic Web ,030304 developmental biology ,media_common - Abstract
Wikidata is evolving as the hub of Linked Open Data (LOD), with its language-neutral URIs and close adherence to Wikipedia. Well defined URIs help the data to be interoperable and linkable. This paper examines the possibilities of utilizing Wikidata as the means of a vocabulary resource for promoting the use of linkable concepts. Digital curation projects are vibrant with varying demands and purposes, which makes them less suitable for adopting any common vocabularies or ontologies. Also, developing and maintaining custom vocabularies are expensive processes for smaller projects in terms of resources and skill requirements. In general, Wikidata entities are well documented with Wikipedia entries, and Wikipedia entries express the conceptual and hierarchical relations in detail with provisions to modify or create. The authors explain the concept of using Wikidata as a vocabulary source with a proof of concept module implementation for Omeka-S, a widely adapted open source digital curation platform. This paper is expected to show some practical insights on reliable an reasonable vocabulary development for social informatics as well as cultural heritage projects, with a notion to improve the quality and quantity of linkable data from digital curation projects.
- Published
- 2021
11. Using a 360° camera as a mobile data collection method towards understanding information types and use in running
- Author
-
Lee J. Pretlove, Laura Sbaffi, Frank Hopfgartner, and Andrew Cox
- Subjects
General Computer Science ,Computer science ,05 social sciences ,Research context ,050801 communication & media studies ,Library and Information Sciences ,Virtual reality ,Social informatics ,Doctoral research ,0508 media and communications ,Action (philosophy) ,Human–computer interaction ,Augmented reality ,0509 other social sciences ,050904 information & library sciences ,Mobile data collection ,Qualitative research - Abstract
This paper presents a mobile data collection method using a 360° camera developed in an ongoing qualitative doctoral research project. The method captures audio, participant action and the running environment visuals of a situation in an immersive way compared to traditional audio‐video capture. The method contributes towards an understanding of information types, use and value amongst those who run. This paper describes the mobile method, its research context and provides an insight to how the method has contributed to developing findings about information types and use.
- Published
- 2020
12. Course Space: The Observatory of Course Selection for Interdisciplinary Departments
- Author
-
David F. Hoenigman, Yoshiaki Matsuzawa, Daiki Shiozawa, Aoyama Gakuin University (AGU), Torsten Brinda, Don Passey, Therese Keane, and TC 3
- Subjects
Computer science ,4. Education ,media_common.quotation_subject ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Space (commercial competition) ,Social informatics ,Variety (cybernetics) ,Visualization ,Visualisation ,Empirical research ,Interdisciplinary ,Network sciences ,Studies ,ComputingMilieux_COMPUTERSANDEDUCATION ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics education ,[INFO]Computer Science [cs] ,Function (engineering) ,Curriculum ,Discipline ,media_common - Abstract
Part 5: Further Aspects; International audience; University departments designed for interdisciplinary fields such as social informatics inevitably have curricula covering broad disciplinary areas. Such curricula generally allow students to choose from a wide variety of electives. In this research, we developed a system that visualises selected courses by applying methodologies from the network sciences. The proposed system includes functionality supporting user visualisation as follows: (1) a filter-by-grade function that filters out nodes on student network graphs; (2) a visualisation of student attributes function that shows student attributes by colouring nodes on student network graphs; and (3) a cross-filter function that filters out nodes on two connected networks (student and course networks). We conducted an empirical study involving approximately 100 students majoring in social informatics, with visualisations analysed by curriculum designers. We found that student network visualisations indicate that the student major affects course selection and that clusters form in course network graphs, clearly illustrating course selection in an interdisciplinary curriculum.
- Published
- 2020
13. Coverage and Evolution of Cancer and Its Risk Factors - A Quantitative Study with Social Signals and Web-Data
- Author
-
Aurobinda Routray and Saransh Khandelwal
- Subjects
050101 languages & linguistics ,Computer science ,05 social sciences ,Cancer ,02 engineering and technology ,medicine.disease ,Data science ,Social informatics ,Correlation ,Variation (linguistics) ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Information source ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Social media ,Digitization ,Big data mining - Abstract
In today’s world of digitization, information is increasing at an exponential rate due to the ubiquitous nature of social media and web sources. With the advancement in Social Signal Processing, Social Informatics & Computing, and big data mining techniques, we can use this information in the health domain to determine the trend in the spread of symptoms and risk factors of diseases temporally. In this paper, our primary focus is to study coverage and evolution of risk factors of 19 most common Cancers in the last ten years (2009–2018) from the pieces of evidence collected from Tweets (Social Signal) and Wikipedia (Web Data) and demonstrate the relevant findings. Moreover, temporal variations are also shown in coverage of each cancer and risk factors to determine their evolution over time. We try to find the answers of questions like, Do different information sources show different risk factors for the same cancer ? or Is there any visible and distinctive trend in the temporal variation of any specific cancer or its risk factors? Each of the analysis unfolds various exciting observations. The most important among these is that some risk factors have the most adverse effects according to the one information source, but they are not at all harmful according to the other. Finally, the correlation of information sources, i.e., social signals and web data, is shown concerning variation in coverage of cancers and risk factors.
- Published
- 2020
14. Forms and Modes of Apprehending Interdisciplinarity: A Socio-Computer Analysis of Sports Sciences.
- Author
-
Collinet, Cécile, Terral, Philippe, Trabal, Patrick, and Delalandre, Matthieu
- Subjects
SPORTS sciences ,SOCIOLOGICAL research ,RESEARCH methodology ,COMPUTER science ,SOCIAL informatics ,ELECTRONIC data processing - Abstract
This article considers the interdisciplinary character of sports sciences, which holds a double challenge. On one hand, demonstrating how the analysis of a corpus of scientific texts contributes – without exhausting the magnitude of the scientific work – to a better knowledge of a field of interdisciplinary research: sports sciences. On the other hand, on a methodological level, tools and computer strategies have been developed in order to analyze textual data. This article reveals how interdisciplinarity explicitly appears in scientific papers, not only as a discussion topic, but also as an organizational watchword in sports sciences. Besides, the analysis of this corpus helps to finely characterize active forms of interdisciplinary work organized around hybrid disciplines or specific research subjects. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
15. Graphene-Driven Revolutions in ICT and Beyond.
- Author
-
Kinaret, Jari, Ferrari, Andrea C., Fal’ko, Vladimir, and Kivioja, Jani
- Subjects
GRAPHENE ,COMMUNICATION & technology ,INFORMATION technology ,SOCIAL informatics ,COMPUTER science ,TECHNOLOGICAL innovations - Abstract
Abstract: This session described the FET Flagship Pilot on graphene and related two-dimensional materials. The flagship targets a revolution in information and communication technology, with impacts reaching into other areas of the society. The session featured four talks on the scientific and technological potential and open research challenges within the scope of the proposed flagship, industrial view on possibilities and challenges posed by graphene and related materials, and presentation on the implementation and structure of the flagship pilot. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
16. A Fuzzy Approach to the Linguistic Summarization of Time Series.
- Author
-
Catillo-Ortega, Rita M., Marín, Nicolás, and Sánchez, Daniel
- Subjects
TIME series analysis ,FUZZY logic ,SOCIAL informatics ,FUZZY sets ,MANAGEMENT information systems ,COMPUTER science ,OLAP technology - Abstract
In this work we introduce a new approach to linguistic summarization of time series based on the use of a fuzzy hierarchical partition of the time dimension and the evaluation of quantified sentences. The final summary consists of a collection of quantified sentences. The use of the time hierarchy allows us to accomplish the objectives of a summary, i.e., to be general, brief, and accurate. [ABSTRACT FROM AUTHOR]
- Published
- 2011
17. Learning cyber trust using a triadic functioning analysis: a qualitative approach.
- Author
-
Tsai, Yuan, Lin, Chieh-Peng, Chiu, Chou-Kang, and Joe, Sheng-Wuu
- Subjects
SOCIAL informatics ,INFORMATION technology ,ELECTRONIC commerce ,COMPUTER science ,INFORMATION science - Abstract
The issue of cyber trust has been scattered in several different fields, including computer science, information science and some social sciences. Although social informatics has been a subject of systematic analytical and critical research for more than three decades, previous research has rarely noted the importance of social informatics on cyber trust. Therefore, it is essential to establish a research framework that applies in cyber trust from a perspective of social informatics so that cyber trust may be achieved by different professionals and researchers. This study presents the factors under which cyber trust thrives from a perspective of social informatics. Social informatics research pertains to e-commerce from a perspective of both social and technical changes that shed some light on cyber trust for business professionals and researchers. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
18. Detection of Stego Anomalies in Images Exploiting the Content Independent Statistical Footprints of the Steganograms.
- Author
-
Geetha, S., Sindhu, Siva S. Sivatha, and Kamaraj, N.
- Subjects
CRYPTOGRAPHY ,INFORMATION technology ,IMAGE processing ,SOCIAL informatics ,COMPUTER science - Abstract
Steganography which facilitates covert communication creates a potential problem when misused for planning criminal activities. Its counter measure steganalysis is focused on detecting (the main goal of this research). tracking, extracting, and modifying secret messages transmitted through a subliminal channel In this paper, a feature classification technique, based on the analysis of content independent statistical properties, is proposed to blindly (i.e., without knowledge of the steganographic schemes) determine the existence of hidden messages in an image. To be effective in class separation, the genetic-X-means classifier was exploited. For performance evaluation, a database composed of 5600 plain and stego images (generated by using seven different embedding schemes) was established. Based on this database, extensive experiments were conducted to prove the feasibility and diversity of our proposed system. Our main results and findings are as follows: 1. a 80%+ positive-detection rate. (promising rate for a blind steganalyzer) 2. The removal of content dependency from features enhances the discriminator, power of the classifier. 3. Universal, blind steganalyzer. (not limited to the detection of a particular steganographic scheme) 4. Detection of stego images with an embedding rate as low as 5% of the maximum payload. [ABSTRACT FROM AUTHOR]
- Published
- 2009
19. A virtual enterprise based information system architecture for the tourism industry.
- Author
-
Shuchih Ernest Chang and Ying Chen Chou
- Subjects
- *
TOURISM , *INFORMATION technology , *ELECTRONIC commerce , *SOCIAL informatics , *INFORMATION resources management , *COMPUTER science , *COMPETITIVE advantage in business , *BUSINESS enterprises , *INFORMATION science - Abstract
As information and information systems become increasingly valuable and information technology advances at a fast pace, only creative and innovative companies will be able to survive the competition in the new millennium, by utilising the emerging information technologies and innovative management methods. We propose an Integrative Information Architecture (IIA), which provides a dynamic, flexible and innovative strategic and tactical management to the integration of business management systems by using the conceptual model of virtual enterprise (VE). In general, VE provides a comprehensive guide to the key elements of successful cross-organisational integration and collaborative e-commerce by highlighting business needs, information technologies, and management strategies. In our study, the application of VE is for integrating employees, business process and resources within the tourism industry. We also explored the potentials of applying IIA to contemporary tour companies for developing the cross-organisational tourism system. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
20. Information: Objective or subjective/situational?
- Author
-
Hjørland, Birger
- Subjects
- *
INFORMATION technology , *INFORMATION science , *ARCHIVAL research , *DOCUMENTATION , *SOCIAL informatics , *INFORMATION theory , *COMPUTER science , *INFORMATION literacy , *ELECTRONIC data processing - Abstract
This article contrasts Bates' understanding of information as an observer–independent phenomenon with an understanding of information as situational, put forward by, among others, Bateson, Yovits, Spang-Hanssen, Brier, Buckland, Goguen, and Hjørland. The conflict between objective and subjective ways of understanding information corresponds to the conflict between an understanding of information as a thing or a substance versus an understanding of it as a sign. It is a fundamental distinction that involves a whole theory of knowledge, and it has roots back to different metaphors applied in Shannon's information theory. It is argued that a subject-dependent/situation specific understanding of information is best suited to fulfill the needs in information science and that it is urgent for us to base Information Science (IS; or Library and Information Science, LIS) on this alternative theoretical frame. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
21. RELIABILITY, MINDFULNESS, AND INFORMATION SYSTEMS.
- Author
-
Butler, Brian S. and Gray, Peter H.
- Subjects
- *
INFORMATION resources management , *INFORMATION technology , *RELIABILITY (Personality trait) , *SOCIAL informatics , *MANAGEMENT information systems , *KNOWLEDGE management , *HIGH technology , *COMPUTER science , *INFORMATION resources , *INFORMATION science , *ELECTRONIC data processing , *ORGANIZATIONAL sociology - Abstract
In a world where information technology is both important and imperfect, organizations and individuals are faced with the ongoing challenge of determining how to use complex, fragile systems in dynamic contexts to achieve reliable outcomes. While reliability is a central concern of information systems practitioners at many levels, there has been limited consideration in information systems scholarship of how firms and individuals create, manage, and use technology to attain reliability. We propose that examining how individuals and organizations use information systems to reliably perform work will increase both the richness and relevance of IS research. Drawing from studies of individual and organizational cognition, we examine the concept of mindfulness as a theoretical foundation for explaining efforts to achieve individual and organizational reliability in the face of complex technologies and surprising environments. We then consider a variety of implications of mindfulness theories of reliability in the form of alternative interpretations of existing knowledge and new directions for inquiry in the areas of IS operations, design, and management. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
22. From sensors to sense‐making: Opportunities and challenges for information science
- Author
-
Chirag Shah, Jacek Gwizdka, Vivek K. Singh, Cathal Gurrin, and Hideo Joho
- Subjects
General Computer Science ,Computer science ,business.industry ,05 social sciences ,Mobile computing ,Library and Information Sciences ,Lifelog ,050905 science studies ,Data science ,Social informatics ,Information science ,Information practices ,Data analysis ,Computational sociology ,0509 other social sciences ,050904 information & library sciences ,business ,Wearable technology - Published
- 2017
23. OPERATIONALIZING THE ESSENTIAL ROLE OF THE INFORMATION TECHNOLOGY ARTIFACT IN INFORMATION SYSTEMS RESEARCH: GRAY AREA, PITFALLS, AND THE IMPORTANCE OF STRATEGIC AMBIGUITY.
- Author
-
Whinston, Andrew B. and Xianjun Geng
- Subjects
- *
INFORMATION technology research , *SOCIAL informatics , *OPERATIONS research , *OBJECTIVITY , *QUALITY standards , *MANAGEMENT information systems , *COMPUTER science , *QUALITATIVE research - Abstract
In this paper we argue that a large gray area of information systems research exists, whose relevance to the information technology artifact is subject to significant debate even among IS scholars who support the essential role of the IT artifact. As we explain, not explicitly addressing this gray area can have negative, although often inadvertent, effects on the innovative nature of IS research; we explore this danger through three pitfalls. We then propose a stance of strategic ambiguity to deal with the gray area. Strategic ambiguity calls for deliberately withholding judgment on the relevance of research in the gray area and acceptance of gray-area research provided it meets the excellence required by professional journals. We believe that strategic ambiguity benefits innovative IS research without harming the essential role of the IT artifact. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
24. Enhancing Distributed Sensor Networks for Air-Quality Monitoring: A Social Informatics Approach
- Author
-
Loo Geok Pee
- Subjects
Air quality monitoring ,Computer science ,Data analysis ,Megalopolis ,Action research ,Social informatics ,Data science ,Wireless sensor network ,Air quality index - Abstract
This research-in-progress proposes an approach that accounts for social and institutional issues in the design and implementation of sensor networks for air-quality monitoring. The proposed approach is evaluated through action research, in an initiative that seeks to enhance the air-quality sensor network of a Megalopolis based on data analytics. Preliminary findings indicate that the proposed approach improves access to resources, enhances the validity of design, and increases buy-in for implementation.
- Published
- 2019
25. Expanding Awareness: Comparing Location, Keyword, and Network Filtering Methods to Collect Hyperlocal Social Media Data
- Author
-
William Aurite, Shane E. Halse, Aurélie Montarnal, Rob Grace, and Andrea H. Tapia
- Subjects
World Wide Web ,Situation awareness ,Emergency management ,Computer science ,business.industry ,Social media ,Hyperlocal ,business ,Social informatics ,Social media analytics - Published
- 2019
26. Artificial Intelligence Technology and Social Problem Solving
- Author
-
Jaehyuk Cha and Yeunbae Kim
- Subjects
Government ,Information and Communications Technology ,business.industry ,Computer science ,Safety net ,Big data ,Cloud computing ,Social issues ,business ,Data science ,Social informatics ,Social problem-solving - Abstract
Modern societal issues occur in a broad spectrum with very high levels of complexity and challenges, many of which are becoming increasingly difficult to address without the aid of cutting-edge technology. To alleviate these social problems, the Korean government recently announced the implementation of mega-projects to solve low employment, population aging, low birth rate and social safety net problems by utilizing AI and ICBM (IoT, Cloud Computing, Big Data, Mobile) technologies. In this letter, we will present the views on how AI and ICT technologies can be applied to ease or solve social problems by sharing examples of research results from studies of social anxiety, environmental noise, mobility of the disabled, and problems in social safety. We will also describe how all these technologies, big data, methodologies and knowledge can be combined onto an open social informatics platform.
- Published
- 2019
27. You Can’t See What You Can’t See: Experimental Evidence for How Much Relevant Information May Be Missed Due to Google’s Web Search Personalisation
- Author
-
Cameron Lai and Markus Luczak-Roesch
- Subjects
050101 languages & linguistics ,Computer science ,business.industry ,Internet research ,05 social sciences ,Public sector ,Internet privacy ,02 engineering and technology ,Social informatics ,Personalization ,Work (electrical) ,0202 electrical engineering, electronic engineering, information engineering ,Web search engine ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,business ,Empirical evidence ,Dependency (project management) - Abstract
© 2019, Springer Nature Switzerland AG. The influence of Web search personalisation on professional knowledge work is an understudied area. Here we investigate how public sector officials self-assess their dependency on the Google Web search engine, whether they are aware of the potential impact of algorithmic biases on their ability to retrieve all relevant information, and how much relevant information may actually be missed due to Web search personalisation. We find that the majority of participants in our experimental study are neither aware that there is a potential problem nor do they have a strategy to mitigate the risk of missing relevant information when performing online searches. Most significantly, we provide empirical evidence that up to$$20\%$$ of relevant information may be missed due to Web search personalisation. This work has significant implications for Web research by public sector professionals, who should be provided with training about the potential algorithmic biases that may affect their judgments and decision making, as well as clear guidelines how to minimise the risk of missing relevant information.
- Published
- 2019
28. The 9th Annual Social Informatics Research Symposium.
- Author
-
Fichman, Pnina and Rosenbaum, Howard
- Subjects
- *
CONFERENCES & conventions , *COMPUTER science , *DATABASE management , *INFORMATION science , *MUSEUMS , *SOCIAL problems , *WIRELESS communications , *ACCESS to information - Abstract
At its 9th annual symposium, ASIS&T Special Interest Group/Social Informatics (SIG/SI) explored information boundaries from a social informatics perspective. William Jones' keynote address focused on dissolving boundaries around personal information and practical approaches to managing appropriate access. Contributed papers examined boundaries of big data, the diverse forces shaping information boundaries and technology use in human service and barriers preventing equal information access for native Spanish speakers. Presenters discussed location-based services' ability to overcome boundaries as convenient or creepy and museums' use of indigenous groups' artifacts as an insensitive boundary violation. Since social informatics spans many interest groups, SIG/SI looks forward to further stimulating cross-topical research. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
29. Artificial intelligence in E-commerce fulfillment: A case study of resource orchestration at Alibaba’s Smart Warehouse
- Author
-
Loo Geok Pee, Dan Zhang, and Lili Cui
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,E-commerce ,Library and Information Sciences ,Business value ,Social informatics ,GeneralLiterature_MISCELLANEOUS ,ComputingMethodologies_PATTERNRECOGNITION ,Resource (project management) ,Key (cryptography) ,Information system ,Orchestration (computing) ,Artificial intelligence ,Applications of artificial intelligence ,business ,Information Systems - Abstract
Despite heightened interest, integrating artificial intelligence (AI) into businesses remains challenging. Recent surveys show that up to 85 % of AI initiatives ultimately fail to deliver on their promises. Studies on successful AI applications that could provide invaluable lessons for organizations embarking on their AI journey are still lacking. Therefore, this study aims to understand how AI technology, people, and processes should be managed to successfully create value. Building on the resource orchestration perspective, this study analyzes the successful applications of AI at Alibaba's e-commerce fulfillment center. The findings indicate that the key AI resources include data, AI algorithms, and robots. These resources must be orchestrated (e.g., coordinated, leveraged, deployed) to work with other related resources, such as warehouse facilities and existing information systems, to generate strong AI capabilities. The key AI capabilities generated include forecasting, planning, and learning. More importantly, AI capabilities are not independent – they interact and coevolve with human capabilities to create business value in terms of efficiency (e.g., space optimization, labor productivity) and effectiveness (e.g., error reduction). The implications of understanding these social informatics of AI for research and practice are discussed.
- Published
- 2021
30. Outstanding Scientist of Our Time: to the 80th Anniversary of Academician A.D. Ursul
- Author
-
Konstantin K. Kolin
- Subjects
Global studies ,Computer science ,Philosophy of information ,Anthropology ,Social informatics ,Epistemology - Published
- 2016
31. Social informatics of data norms
- Author
-
Howard Rosenbaum, Chase McCoy, Madelyn Rose Sanfilippo, Steve Sawyer, Michael Marcinkowski, and Eric T. Meyer
- Subjects
Knowledge management ,General Computer Science ,Data curation ,business.industry ,Computer science ,Engineering informatics ,Big data ,Library and Information Sciences ,Information repository ,Social informatics ,Data science ,Business informatics ,Health Administration Informatics ,Knowledge extraction ,business - Abstract
Big data has been widely promoted across disciplines and sectors for its potential to enhance lives and promote knowledge discovery. However, challenges arise at all stages of the data lifecycle due to the complexity of interactions between data and the contexts within which they are collected and managed, which has implications for interpretations of this data and eventual use of information and the creation of knowledge products from these data. Starting from the perspective of social informatics, this panel will discuss: the reciprocal relationships between data and context; specific challenges in distinct stages of data generation, data repository implementation, data curation, data use, and data reproducibility; and the implications of these challenges and their potential solutions for both social informatics research and society in general.
- Published
- 2016
32. 2016 ASIS&T Annual Lecture at Napier University
- Author
-
Kirsty Pitkin
- Subjects
World Wide Web ,business.industry ,Computer science ,Information access ,The Internet ,General Medicine ,business ,Social informatics ,Information overload - Abstract
EDITOR'S SUMMARY In the modern age of the internet, computers and smartphones, we have access to incredible amounts of information. However, often what we seek from this information is knowledge, which can be expressed as raw information that has been reproduced and curated. Professor Steve Fuller discussed this divide at the 2016 ASIS&T Annual Lecture at Napier University on November 30. Fuller discusses the idea that raw information must be curated and edited in order to express actual knowledge, but in the act of reproducing the information for this purpose, data can become distorted and omitted. Fuller cites Wikileaks as a source of raw information that was handed to media outlets to edit and present as knowledge. Wikipedia is another domain that has become one of the most cited centers of knowledge, but allows anyone to curate information and remains unstudied as a whole.
- Published
- 2017
33. Informatics and the Challenge of Determinism
- Author
-
Philip Moore and Hai V. Pham
- Subjects
Technological determinism ,Computer science ,media_common.quotation_subject ,02 engineering and technology ,disruptive innovation ,information system design ,Determinism ,Data science ,Social informatics ,ComputingMilieux_GENERAL ,software life cycle ,Open research ,020204 information systems ,Informatics ,0202 electrical engineering, electronic engineering, information engineering ,Materials Chemistry ,Information system ,informatics ,Disruptive innovation ,020201 artificial intelligence & image processing ,information_technology_data_management ,technological determinism ,Function (engineering) ,social informatics, information systems ,media_common - Abstract
Motivation: There is a paradox at the heart of informatics where practical implementation generally fails to understand the socio-technical impact of novel technologies and disruptive innovation when adopted in `real-world&rsquo, systems. This phenomenon, termed technological determinism, is manifested in a time-lag between the adoption of novel technologies and an understanding of the underlying theory which develops following research into their adoption. Methods: We consider informatics theory as it relates to: social informatics and how humans&rsquo, function in society, the relationship between society and technology, information systems, information systems design, and human&ndash, computer interactions. The challenges posed by novel technologies and disruptive innovation are considered as they relate to information systems and information systems design. Open research questions with directions for future research are discussed with an introduction to and our proposed approach to socio-technical information system design. Significance: We conclude that the adoption of disruptive innovation presents both opportunities and threats for all stakeholders in computerised systems. However, determinism is a topic requiring research to generate a suitable level of understanding and technological determinism remains a significant challenge.
- Published
- 2020
34. Object-focused mixed reality storytelling
- Author
-
Martin Flintham, Steve Benford, and Dimitrios Darzentas
- Subjects
Computer science ,business.industry ,05 social sciences ,020207 software engineering ,02 engineering and technology ,Content creation ,Virtual reality ,Social informatics ,Mixed reality ,World Wide Web ,User experience design ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,Augmented reality ,The Internet ,business ,050107 human factors ,Storytelling - Abstract
In this paper we present the creation and deployment of a concerted set of Mixed Reality Technologies designed for creating engaging public experiences and enhanced storytelling opportunities focused on artefacts. Under the title of the Mixed Reality Storytelling (MXRS) project, we combined Internet of Things-inspired approaches and Virtual and Augmented Reality experience technologies, with 3D scanning content creation techniques, to create mobile and adaptable tools suitable for public engagements and industry partners, such as museums and galleries. We present 4 cases of public impact events where the tools were employed over a period of 2 years to create content from visitor contributions, which was then used in follow-on VR and AR engagements. We also demonstrate cases where the tools were used to create content for novel applications of cultural and social informatics.
- Published
- 2018
35. Business Intelligence using Machine Learning and Data Mining techniques - An analysis
- Author
-
Pravin Srinath and Ruchi Sharma
- Subjects
Computer science ,business.industry ,Feature extraction ,Machine learning ,computer.software_genre ,Social informatics ,Domain (software engineering) ,Task (project management) ,Taxonomy (general) ,Outlier ,Business intelligence ,Anomaly detection ,Artificial intelligence ,business ,computer - Abstract
Today's social informatics is facing the challenge of exponentially increasing data present online. However this massive amount of data is available across several heterogeneous platform making it a challenging task especially to comprehend useful information and effectively use it for business intelligence. Achieving Business intelligence through machine learning is one of the significant issues in recent era. Previously, outliers were being considered as noisy data and disregarded leading to loss of relevant information. This paper highlights the major research challenges in this mining sub domain. It provides a comprehensive taxonomy extracted for Business Intelligence methodologies along with current application sectors. Future research directions and suggestions have been pointed to address this anomaly gap to achieve effective business strategies
- Published
- 2018
36. Comparative Analysis of the Content of School Course of Informatics in Russia and Subjects of the International Competition Bebras
- Author
-
Liudmila Bosova
- Subjects
Competition (economics) ,Higher education ,Computer science ,business.industry ,Informatics ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,Information technology ,Certification ,Digital economy ,business ,Modernization theory ,Social informatics - Abstract
During of the first twenty-five years of its existence, the informatics course in Russian school was structured around following cross-cutting content lines: information and information processes; representation of information; computer; modeling and formalization; algorithmization and programming; Information Technology; computer telecommunications, social informatics. Recently thematic block Mathematical foundations of computer science has been more clearly formed in it. In addition traditional line of algorithmization and programming, which was transformed into the thematic block Algorithms and programming elements, which includes robotics and mathematical modeling, has developed significantly. In general content of the course of informatics is stable, its fundamental component is the basis of the state final certification of graduates of primary and senior schools. At the same time students, their parents as well as representatives of the higher education and IT industry express concern about content of the modern school informatics course, rightly believing that this discipline has much greater potential for mastering such key competences of the digital economy as basic programming, basics of working with data, communication in modern digital environments. Since 2012, Russian students successfully participate in the international distant competition Bebras, in the tasks of which priority is given to the issues of theoretical informatics as the basis of modern information technologies. The subject field of the competition is in many respects consonant with the content lines of Russian informatics course in school, the main differences lie in approaches to the representation of key concepts, ideas, methods and algorithms. Materials of the international competition Bebras can become a basis for the modernization of Russian informatics course in school by expanding its theoretical base as well as ensuring the unity of its theoretical and practical components.
- Published
- 2018
37. 10th Annual Social Informatics Research Symposium Connecting (Epistemic) Cultures and (Intellectual) Communities.
- Author
-
Rosenbaum, Howard and Fichman, Pnina
- Subjects
- *
COMPUTER science , *CONFERENCES & conventions , *INFORMATION science , *THEORY of knowledge , *INTELLECTUAL freedom - Abstract
At the 2014 ASIS&T Annual Meeting, the Special Interest Group/Social Informatics (SIG/SI) celebrated 10 years spearheading research on the intersection of people, information and communications technology. The SIG's pre-conference symposium attracted an international group of scholars and students demonstrating ways their work applies to the Annual Meeting's theme of Connecting Collections, Cultures, and Communities. Presented papers examined the influence of IT consultants' work by organizational and technical contexts, social and cultural barriers impeding the use of information and communication technologies (ICTs) by resource-poor individuals, genre analysis of technologically mediated workplace practices and links between social networks and ICTs. A panel discussion explored ties between epistemic cultures and intellectual communities and ways to promote social informatics research on the topic. The SIG presented awards for Best Paper and Best Student Paper, both touching on collaboration to enhance content. The importance of the annual research symposium was reinforced by SIG/SI earning the 2014 SIG Publication-of-the-Year Award for a book that emerged from its 2012 symposium. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
38. Exploring Emerging Topics in Social Informatics: An Online Real-Time Tool for Keyword Co-Occurrence Analysis
- Author
-
Florian Cech
- Subjects
Computer science ,05 social sciences ,Materials informatics ,Co-occurrence ,020207 software engineering ,02 engineering and technology ,Scientometrics ,050905 science studies ,Data science ,Social informatics ,Geographical cluster ,Informatics ,0202 electrical engineering, electronic engineering, information engineering ,0509 other social sciences ,Co-occurrence networks ,Coding (social sciences) - Abstract
In an academic field as diverse as Social Informatics, identifying current and emergent topics presents a significant challenge to individuals and institutions alike. Several approaches based on keyword assignment and visualizing co-occurrence networks have already been described with the goal of providing insight into topical and geographical clusters of publications, authors or institutions. This work identifies a few key challenges to the aforementioned methods and proposes an interdisciplinary approach based on qualitative text analysis to assign keywords to research institutions and quantitatively explore them by building interactive co-occurrence and research focus parallelship networks. The proposed technique is then applied to the field of Social Informatics by identifying more than a hundred organizations worldwide within that domain, coding them with keywords based on research group titles, online self-descriptions and affiliated publications, and creating an online tool to generate interactive co-occurrence, network neighbourhood and research focus parallelship visualizations.
- Published
- 2017
39. An integrated framework of online generative capability: interview from digital immigrants
- Author
-
Yuxiang Chris Zhao, Xiaoling Sun, Xiaojuan Xu, and Qinghua Zhu
- Subjects
Web 2.0 ,Microblogging ,Computer science ,media_common.quotation_subject ,Immigration ,Context (language use) ,Library and Information Sciences ,Social informatics ,World Wide Web ,Scale (social sciences) ,Digital native ,Social media ,Generative grammar ,Information Systems ,media_common - Abstract
Purpose– In the Web 2.0 era, more and more digital immigrants actively participate in blogging, video sharing, online rating, and micro blogging, etc. However, some may be more skilled in producing and generating online content while others still meet some barriers in doing so. Thus, it is interesting to investigate the online generative capability of digital immigrants in Web 2.0 context. This paper seeks to address this issue.Design/methodology/approach– The authors selected Shanghai as their target province in this study for its large scale of internet users. An in-depth semi-structured interview was used as their research method. They selected several community clubs as the interview settings. In addition, age was adopted as a threshold to define the Chinese digital immigrants for its convenience in sampling.Findings– Chinese digital immigrants are playing an important role in content generating, and have a great potential in the future contribution, and a number of digital immigrants regard the content generating as a pretty easy work while some others felt difficulties, even frustrated and exhausted when generating content. About the content type, digital immigrants prefer to generate that content with low granularity. About the motivation, the intrinsic motivation and the extrinsic motivation with an internalized focus play a dominant role. About the generating mode, digital immigrants prefer to generate content individually or collectively.Originality/value– This paper develops the concept of online generative capability by adapting the notion of generativity from other disciplines to the characteristics of Web 2.0. Then an integrated conceptual framework is built and evaluated. Practically, the paper puts forward some implications for the designers, managers, and information service staff from different perspectives to facilitate the digital immigrant's online generative capability.
- Published
- 2014
40. Critical informatics: New methods and practices
- Author
-
André Brock and Miriam E. Sweeney
- Subjects
Knowledge management ,Computer science ,business.industry ,Discourse analysis ,Engineering informatics ,Context (language use) ,Library and Information Sciences ,Social informatics ,Information and Communications Technology ,Informatics ,The Internet ,business ,Information Systems ,Meaning (linguistics) - Abstract
While social informatics (SI) is uniquely positioned to examine the technical and organizational properties of information and communication technology (ICT) and associated user practices, it often ignores the cultural mediation of design, use, and meaning of ICTs. Critical informatics, more so than normative and analytic orientations to ICT, offers possibilities to foreground culture as a sensitizing context for studying information and technology in society. This paper articulates a new critical informatics approach: critical technocultural discourse analysis (CTDA) as an analysis employing critical cultural frameworks (e.g. critical race or feminist theory) to jointly interrogate culture and technology. CTDA (Brock 2009) is a bifurcated approach for studying Internet phenomena integrating interface analysis with user discourse analysis. This paper outlines CTDA, providing examples of how its methodological flexibility applies to examining varied ICT artifacts, such as twitter and search engine phenomena, while maintaining a critical perspective on design and use. CTDA is an important tool for critical informaticists that contributes to building understanding of technology as culture, grounded in user perspectives and real-world practices.
- Published
- 2014
41. Comparison of Unassisted and Smart Assisted Negotiation in B2B Relationships from the Perspective of Generation Y
- Author
-
Zdenek Smutny and Nikola Šimková
- Subjects
Knowledge management ,Computer science ,media_common.quotation_subject ,02 engineering and technology ,artificial intelligence and law ,out-of-court settlement ,Social informatics ,Artificial intelligence and law ,Face-to-face ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,media_common.cataloged_instance ,European union ,computer-mediated communication ,media_common ,lcsh:T58.5-58.64 ,lcsh:Information technology ,business.industry ,05 social sciences ,Online dispute resolution ,online dispute resolution ,Negotiation ,Information and Communications Technology ,ICT ,050211 marketing ,020201 artificial intelligence & image processing ,Computer-mediated communication ,business ,social informatics ,Information Systems - Abstract
The current trend in the European Union (EU) is to support the development of online dispute resolution (ODR) that saves financial and human resources. Therefore, research articles mainly deal with the design of new ODR solutions, without researching the social aspects of using different kinds of ODR solutions. For this reason, the main aim of the article is an empirical evaluation of two kinds of ODR solutions in business-to-business (B2B) relationships from the perspective of a selected social category. The article focuses on: (1) comparing unassisted and smart assisted negotiation while using the artificial intelligence approach, (2) the satisfaction and attitudes of Generation Y members from the Czech and Slovak Republic towards different ways of negotiating. The conclusions of this study can help researchers to design or improve existing ODR solutions, and companies to choose the most suitable managers from Generation Y for B2B negotiation. The results show that Generation Y members prefer computer-mediated communication as compared to face to face negotiation, the participants were more satisfied with the negotiation process when using smart assisted negotiation. Through a computer-mediated negotiation, even sellers with lower emotional stability can maintain an advantageous position. Similarly, buyers with lower agreeableness or higher extraversion can negotiate more favorable terms and offset their loss.
- Published
- 2019
42. Large Scale Linguistic Processing of Tweets to Understand Social Interactions among Speakers of Less Resourced Languages: The Basque Case
- Author
-
Rodrigo Agerri, Iñaki Alegria, and Joseba Fernandez de Landa
- Subjects
Topic model ,social networks ,text classification ,Deep linguistic processing ,Computer science ,02 engineering and technology ,computer.software_genre ,topic modelling ,Social informatics ,Writing style ,benchmark ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,information extraction ,natural language processing ,less resourced languages ,lcsh:T58.5-58.64 ,lcsh:Information technology ,Unstructured data ,Data science ,Social relation ,Social research ,relations ,Information extraction ,020201 artificial intelligence & image processing ,computer ,social informatics ,Information Systems - Abstract
Social networks like Twitter are increasingly important in the creation of new ways of communication. They have also become useful tools for social and linguistic research due to the massive amounts of public textual data available. This is particularly important for less resourced languages, as it allows to apply current natural language processing techniques to large amounts of unstructured data. In this work, we study the linguistic and social aspects of young and adult people&rsquo, s behaviour based on their tweets&rsquo, contents and the social relations that arise from them. With this objective in mind, we have gathered over 10 million tweets from more than 8000 users. First, we classified each user in terms of its life stage (young/adult) according to the writing style of their tweets. Second, we applied topic modelling techniques to the personal tweets to find the most popular topics according to life stages. Third, we established the relations and communities that emerge based on the retweets. We conclude that using large amounts of unstructured data provided by Twitter facilitates social research using computational techniques such as natural language processing, giving the opportunity both to segment communities based on demographic characteristics and to discover how they interact or relate to them.
- Published
- 2019
43. Social information science in preparation of students to life and activity in the information society
- Author
-
Starikov, S. A.
- Subjects
ИНФОРМАТИКА ,ИНФОРМАЦИННОЕ ОБЩЕСТВО ,SOCIAL INFORMATICS ,INFORMATION SOCIETY ,COMPUTER SCIENCE ,СОЦИАЛЬНАЯ ИНФОРМАТИКА - Abstract
This article discusses social Informatics in preparing students for life and work in the information society В данной статье рассмотрена социальная информатика в подготовке студентов к жизни и деятельности в условиях информационного общества
- Published
- 2016
44. An Analysis of IETF Activities Using Mailing Lists and Social Media
- Author
-
Heiko Niedermayer, Edwin Cordeiro, Daniel Raumer, Nikolai Schwellnus, and Georg Carle
- Subjects
Standardization ,business.industry ,Process (engineering) ,Computer science ,Task force ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Media studies ,Internet Standard ,Social informatics ,World Wide Web ,The Internet ,Social media ,InformationSystems_MISCELLANEOUS ,business - Abstract
The Internet Engineering Task Force is an open organization that produces Internet Standards. In this paper we look at Twitter and IETF mailing lists to answer questions on IETF participation and social media usage and IETF reaction to societal events: Are Internet Standards discussed on Twitter? Who is involved in the process? Do external events like Snowden revelations in 2013 correlate with related IETF activities? To answer this, we look in particular at security-related activities at the IETF like in the TLS working group. With respect to the Snowden leaks, we quantify the impact in terms of increase in activity and contributors in related areas.
- Published
- 2016
45. Special issue on soft computing for big data and social informatics
- Author
-
Yusuke Nojima, Chun-Hao Chen, and Chuan-Kang Ting
- Subjects
Soft computing ,Computer science ,business.industry ,Informatics ,Engineering informatics ,Big data ,Computational intelligence ,Geometry and Topology ,business ,Data science ,Social informatics ,Software ,Theoretical Computer Science - Published
- 2017
46. Web 2.0-based e-learning: applying social informatics for tertiary teaching
- Author
-
Patrick Kelly
- Subjects
World Wide Web ,Web 2.0 ,Computer science ,Informatics ,E-learning (theory) ,Engineering informatics ,Data science ,Social informatics ,Education ,Business informatics - Published
- 2011
47. Ontology definition and construction, and epistemological adequacy for systems interoperability: A practitioner analysis
- Author
-
Jim Lumsden, Hazel Hall, and Peter Cruickshank
- Subjects
004.2 Systems analysis, design & performance ,Social informatics ,Knowledge management ,Information society ,Centre for Social Informatics ,Ontology ,business.industry ,Computer science ,QA75 Electronic computers. Computer science ,Ontology-based data integration ,Process ontology ,Information science ,Interoperability ,Suggested Upper Merged Ontology ,Library and Information Sciences ,Ontology (information science) ,AI and Technologies ,Epistemology ,Information system ,Upper ontology ,systems interoperability ,business ,Ontology alignment ,Information Systems - Abstract
Ontology development is considered to be a useful approach to the design and implementation of interoperable systems. This literature review and commentary examines the current state of knowledge in this field with particular reference to processes involved in assuring epistemological adequacy. It takes the perspective of the information systems practitioner keen to adopt a systematic approach to in-house ontology design, taking into consideration previously published work. The study arises from author involvement in an integration/interoperability project on systems that support Scottish Common Housing Registers in which, ultimately, ontological modelling was not deployed. Issues concerning the agreement of meaning, and the implications for the creation of interoperable systems, are discussed. The extent to which those theories, methods and frameworks provide practitioners with a usable set of tools is explored, and examples of practical applications of ontological modelling are noted. The findings from the review of the literature demonstrate a number of difficulties faced by information systems practitioners keen to develop and deploy domain ontologies. A major problem is deciding which broad approach to take: to rely on automatic ontology construction techniques, or to rely on keywords and domain experts to develop ontologies.
- Published
- 2011
48. Transformative use of information technology in American literary writing: A pilot survey of literary community members
- Author
-
Crystle Martin and Stephen Paling
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Information technology ,Public relations ,Social informatics ,The arts ,Human-Computer Interaction ,Underdevelopment ,Transformative learning ,Action (philosophy) ,Artificial Intelligence ,Electronic publishing ,The Conceptual Framework ,Social science ,business ,Software ,Information Systems ,Qualitative research - Abstract
Information technology (IT) provides resources with which human actors can change the patterns of social action in which they participate. Studies of genre change have been among those that have focused on such change. Those studies, though, have tended not to focus on creative genres. This study is one in a series of studies meant to examine IT use in literature and the arts. The current study mediates between smaller, qualitative studies and future, quantitative studies with larger sample sizes. The results demonstrate that the conceptual framework developed in earlier studies is essentially valid, but needs to be modified for future studies. The pilot survey approach paid off both in modifications to the conceptual framework under development and in refinement of the research questions for future iterations. © 2011 Wiley Periodicals, Inc.
- Published
- 2011
49. M. J. W. Lee, and McLoughlin, C. (eds): Web 2.0-based E-learning: applying social informatics for tertiary teaching
- Author
-
Gila Kurtz
- Subjects
Web 2.0 ,Computer science ,E-learning (theory) ,Educational technology ,Library science ,Social informatics ,Data science ,Education - Published
- 2011
50. Social informatics and social media: Theoretical reflections
- Author
-
Howard Rosenbaum, Brian S. Butler, Kenneth R. Fleischmann, Noriko Hara, Pnina Fichman, and Mohammad Hossein Jarrahi
- Subjects
Data curation ,Computer science ,business.industry ,Discourse analysis ,Library and Information Sciences ,Public relations ,Data science ,Social informatics ,Popularity ,Work (electrical) ,Ethnography ,Social media ,business ,Information Systems - Abstract
Early social informatics research focused primarily on ethnographic and site-specific observations or was based on limited discourse analysis involving smaller case studies. However, in the last decade, the rise of social media has provided access to large-scale data and made the observation of interaction between people and technologies easier. This trend has informed social informatics perspectives for examining the roles and impacts of social media in our work and social lives. For a number of years now, researchers in social informatics have been concerned about expanding the theoretical depth and richness of the discipline (Sanfilippo and Fichman, 2014; Sawyer and Tyworth, 2006). As studies of social media continue to gain in popularity and move from descriptive to more analytical approaches, researchers are likely to begin to critically reflect on what they are doing and finding and to therefore provide insights into theoretical aspects of social informatics research.
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.