Das moderne Bibliotheks- und Informationswesen setzt sich mit vielfältigen Anforderungen auseinander und entwickelt sich ständig weiter. Die Reihe Bibliotheks- und Informationspraxis greift neue ...Themen und Fragestellungen auf und will mit Informationen und Erfahrungen aus der Praxis dazu beitragen, Betriebsabläufe und Dienstleistungen von Bibliotheken und vergleichbaren Einrichtungen optimal zu gestalten. Die Reihe richtet sich an alle, die in Bibliotheken oder auf anderen Gebieten der Informationsvermittlung tätig sind.
Purpose - The purpose of this review is to draw out patterns of information seeking behavior of graduate students as described in the empirical research published from 1997 to the present.Design ...methodology approach - A systematic search of databases for studies on information behavior and graduate students was employed in order to retrieve studies for a systematic review. Common themes that emerged from the literature were synthesized into a discussion of behavior patterns. Additionally a study quality analysis was conducted for all retrieved studies using a critical appraisal checklist for library and information research.Findings - This review revealed that graduate students begin their research on the internet much like any other information seeker, consult their faculty advisors before other people, and use libraries in diverse ways depending on the discipline studied. Additionally differences were noted between international and home students, and doctoral and master's students.Practical implications - The findings of this review indicate that information behavior research conducted on graduate students should delineate between masters' and doctoral students. Further, the findings may inform both academic librarian and faculty practice as to how to assist students with their research by helping them to understand how students typically approach research and how other institutions address common issues with special populations, such as non-native speakers and distance learners.Originality value - No comprehensive review of information behavior studies, encompassing only the behaviors of graduate students has been conducted to date.
Based on literature from the domains of organization science, marketing, accounting, and management information systems, this review article examines the theoretical basis of the information overload ...discourse and presents an overview of the main definitions, situations, causes, effects, and countermeasures. It analyzes the contributions from the last 30 years to consolidate the existing research in a conceptual framework and to identify future research directions.
Information needs analysis Dorner, Daniel G; Gorman, G.E; Calvert, Philip J
2017., 2017, 2013, 2015., 2017-07-12
eBook, Book
If you want to provide an information service that truly fulfils your users' needs, this book is essential reading. Analysing and assessing the information needs of clients is key to the provision of ...effective service and appropriate collections in both face-to- face and virtual library services. The importance of information needs analysis is widely recognized by information professionals, but currently there is little substantive, detailed work in the professional literature devoted to this important topic. This new book is designed to fill that gap, by supporting practitioners in developing an information needs analysis strategy, and offering the necessary professional skills and techniques to do so. It will offer guidance to team leaders and senior managers in all areas of library work, especially those involved in collection management, service provision and web development, and is equally applicable to the needs of academic, public, government, commercial and other more specialized library and information services. The text adopts a hands-on, jargon-free approach, and includes relevant examples, case studies, reader activities and sources of further reading. Key areas covered include: * what is information needs analysis? * how is needs analysis conducted? * what are the varieties of needs analysis? * how are analyses evaluated and reported? Readership: The book will be essential reading for library and information practitioners, team leaders and senior managers. It will also be a core text on course reading lists in departments of library and information studies.
•The influence that risk may exert on IT adoption has received limited attention.•Internet banking adoption presents an increasing trend in Portugal.•We propose a framework which integrates UTAUT ...model and perceived risk factor.•Including perceived risk adds a stronger power to predict intention to adopt.
Understanding the main determinants of Internet banking adoption is important for banks and users; our understanding of the role of users’ perceived risk in Internet banking adoption is limited. In response, we develop a conceptual model that combines unified theory of acceptance and use of technology (UTAUT) with perceived risk to explain behaviour intention and usage behaviour of Internet banking. To test the conceptual model we collected data from Portugal (249 valid cases). Our results support some relationships of UTAUT, such as performance expectancy, effort expectancy, and social influence, and also the role of risk as a stronger predictor of intention. To explain usage behaviour of Internet banking the most important factor is behavioural intention to use Internet banking.
To date, many important threads of information privacy research have developed, but these threads have not been woven together into a cohesive fabric. This paper provides an interdisciplinary review ...of privacy-related research in order to enable a more cohesive treatment. With a sample of 320 privacy articles and 128 books and book sections, we classify previous literature in two ways: (1) using an ethics-based nomenclature of normative, purely descriptive, and empirically descriptive, and (2) based on their level of analysis: individual, group, organizational, and societal. Based upon our analyses via these two classification approaches, we identify three major areas in which previous research contributions reside: the conceptualization of information privacy, the relationship between information privacy and other constructs, and the contextual nature of these relationships. As we consider these major areas, we draw three overarching conclusions. First, there are many theoretical developments in the body of normative and purely descriptive studies that have not been addressed in empirical research on privacy. Rigorous studies that either trace processes associated with, or test implied assertions from, these value-laden arguments could add great value. Second, some of the levels of analysis have received less attention in certain contexts than have others in the research to date. Future empirical studies — both positivist and interpretive — could profitably be targeted to these under-researched levels of analysis. Third, positivist empirical studies will add the greatest value if they focus on antecedents to privacy concerns and on actual outcomes. In that light, we recommend that researchers be alert to an overarching macro model that we term APCO (Antecedents → Privacy Concerns → Outcomes).
When "metadata" became breaking news, appearing in stories about surveillance by the National Security Agency, many members of the public encountered this once-obscure term from information science ...for the first time. Should people be reassured that the NSA was "only" collecting metadata about phone calls -- information about the caller, the recipient, the time, the duration, the location -- and not recordings of the conversations themselves? Or does phone call metadata reveal more than it seems? In this book, Jeffrey Pomerantz offers an accessible and concise introduction to metadata. In the era of ubiquitous computing, metadata has become infrastructural, like the electrical grid or the highway system. We interact with it or generate it every day. It is not, Pomerantz tell us, just "data about data." It is a means by which the complexity of an object is represented in a simpler form. For example, the title, the author, and the cover art are metadata about a book. When metadata does its job well, it fades into the background; everyone (except perhaps the NSA) takes it for granted.Pomerantz explains what metadata is, and why it exists. He distinguishes among different types of metadata -- descriptive, administrative, structural, preservation, and use -- and examines different users and uses of each type. He discusses the technologies that make modern metadata possible, and he speculates about metadata's future. By the end of the book, readers will see metadata everywhere. Because, Pomerantz warns us, it's metadata's world, and we are just living in it.
This open access book provides an introduction and an overview of learning to quantify (a.k.a. “quantification”), i.e. the task of training estimators of class proportions in unlabeled data by means ...of supervised learning. In data science, learning to quantify is a task of its own related to classification yet different from it, since estimating class proportions by simply classifying all data and counting the labels assigned by the classifier is known to often return inaccurate (“biased”) class proportion estimates. The book introduces learning to quantify by looking at the supervised learning methods that can be used to perform it, at the evaluation measures and evaluation protocols that should be used for evaluating the quality of the returned predictions, at the numerous fields of human activity in which the use of quantification techniques may provide improved results with respect to the naive use of classification techniques, and at advanced topics in quantification research. The book is suitable to researchers, data scientists, or PhD students, who want to come up to speed with the state of the art in learning to quantify, but also to researchers wishing to apply data science technologies to fields of human activity (e.g., the social sciences, political science, epidemiology, market research) which focus on aggregate (“macro”) data rather than on individual (“micro”) data.
Wikipedia’s first twenty years: how what began as an experiment in collaboration became the world’s most popular reference work.
We have been looking things up in Wikipedia for twenty years. What ...began almost by accident—a wiki attached to a nascent online encyclopedia—has become the world’s most popular reference work. Regarded at first as the scholarly equivalent of a Big Mac, Wikipedia is now known for its reliable sourcing and as a bastion of (mostly) reasoned interaction. How has Wikipedia, built on a model of radical collaboration, remained true to its original mission of “free access to the sum of all human knowledge” when other tech phenomena have devolved into advertising platforms? In this book, scholars, activists, and volunteers reflect on Wikipedia’s first twenty years, revealing connections across disciplines and borders, languages and data, the professional and personal.
The contributors consider Wikipedia’s history, the richness of the connections that underpin it, and its founding vision. Their essays look at, among other things, the shift from bewilderment to respect in press coverage of Wikipedia; Wikipedia as “the most important laboratory for social scientific and computing research in history”; and the acknowledgment that “free access” includes not just access to the material but freedom to contribute—that the summation of all human knowledge is biased by who documents it.
Contributors
Phoebe Ayers, Omer Benjakob, Yochai Benkler, William Beutler, Siko Bouterse, Rebecca Thorndike-Breeze, Amy Carleton, Robert Cummings, LiAnna L. Davis, Siân Evans, Heather Ford, Stephen Harrison, Heather Hart, Benjamin Mako Hill, Dariusz Jemielniak, Brian Keegan, Jackie Koerner, Alexandria Lockett, Jacqueline Mabey, Katherine Maher, Michael Mandiberg, Stephane Coillet-Matillon, Cecelia A. Musselman, Eliza Myrie, Jake Orlowitz, Ian A. Ramjohn, Joseph Reagle, Anasuya Sengupta, Aaron Shaw, Melissa Tamani, Jina Valentine, Matthew Vetter, Adele Vrana, Denny Vrandečić
Making and taking information Huvila, Isto
Journal of the Association for Information Science and Technology,
April 2022, Volume:
73, Issue:
4
Journal Article
Peer reviewed
Open access
Information behavior theory covers different aspects of the totality of information‐related human behavior rather unevenly. The transitions or trading zones between different types of information ...activities have remained perhaps especially under‐theorized. This article interrogates and expands a conceptual apparatus of information making and information taking as a pair of substantial concepts for explaining, in part, the mobility of information in terms of doing that unfolds as a process of becoming rather than of being, and in part, what is happening when information comes into being and when something is taken up for use as information. Besides providing an apparatus to describe the nexus of information provision and acquisition, a closer consideration of the parallel doings opens opportunities to enrich the inquiry of the conditions and practice of information seeking, appropriation, discovery, and retrieval as modes taking, and learning and information use as its posterities.