The Emergence of Libyan Networked Publics: Social Media Use during and after the Libyan Uprising
University of Sheffield, United Kingdom
It is often claimed that social media sites such as Facebook played a key role during the so-called ‘Arab Spring’. Yet there have been few attempts to track what happened during and after the Libyan uprising, and how social media are – and are not - contributing to the development of revolutionary and post-revolutionary public sphere in the Libyan context. In Libya, there was an explosive growth in social media use during the post-uprising period. This rapid growth could be seen to potentially form the basis for the emergence of a new democratic, networked public sphere. By engaging with different conceptualizations and various critiques of Habermas’ public sphere concept, this study aims to explore the nature of emergent Libyan digital publics, and their possible role in transforming the Libyan public sphere.
Respectful Reuse of Digital Records of Practice
Rutgers University, United States of America
Records of practice in the field of education, often take the form of digital video of teachers and students engaged in learning. Understanding reuser opinions, particularly regarding respect for the teacher and student subjects of the videos, can facilitate data sharing while ensuring mitigation of harm to all involved in the lifecycle of digital records of practice.
In this ongoing research project, Caswell and Cifor’s theoretical model for radical empathy in the archives is applied to qualitative data repositories in education and expanded to include additional relationships that arise. This updated framework argues that repository managers, like archivists, have responsibilities due to the affective nature of relationships between repository managers, data producers, data reusers, subjects, and communities. All parties ensure this responsibility when they handle data production, curation, and reuse with respect.
This poster focuses on results related to data reuser attitudes regarding potential harms to data producers, data reusers, and subjects represented in the data. Findings suggest that reusers are concerned with potential reputational harm to the subjects in the data, and that these concerns affect their data sharing and data reuse practices. Respondent QDR_012 argued, “We don’t want to condemn our teachers like, ‘They are an example of bad teaching.’ So I think that is a risk.” Reusers of video data for the purposes of professional development and teacher training often discussed framing video records to reduce possible reputational harm to teachers in the videos.
Charities’ perceptions of open access to medical research: a situational analysis
University of Sheffield, United Kingdom
This poster outlines the methodology and preliminary results of a study exploring medical charities’ perceptions of open access to scholarly research. It is part of a wider project investigating the use of OA research in different non-academic contexts, and it is based on analysis of eight semi-structured interviews conducted with staff members in medical charities. Interviews were analyzed using Situational Analysis, a form of constructivist grounded theory developed by Adele Clarke. Preliminary results are presented, including the expertise and insider knowledge which medical charity staff use to get access to paywalled research, the values and risks (to different social groups) perceived in making research open access, and the different discursive constructions of the ‘non-academic’ user who wishes to access research. The study contributes to a small, but growing body of research exploring the potential value of open access outside academia.
Perceptions and Experiences of Qualitative Open Data (PEQOD): Exploratory Pilot
Florida State University, United States of America
This study examines open qualitative human subjects research data and the experiences with open data policies of researchers who use this type of data. The goal of the overall project will be to generate empirical findings and use them to develop a conceptual and practical framework to help researchers and institutions frame their open data practices for qualitative human subjects data within existing technical systems and in accordance with legal, institutional, funding agency, and publisher requirements. This poster frames the problem of qualitative open data in the context of existing literature and policies and reports the findings of an exploratory pilot study comprising semi-structured interviews undertaken with six qualitative researchers from six disciplines. As the participants considered their own qualitative human subjects data in the context of open data policies, the concepts that emerged include: the situated, co-constructed, non-neutral nature of qualitative human subjects data; ethical obligations and logistical arguments for and against re-use of these data; the “stakes” or implications of the content of the data and its confidentiality; and metadata to support ethical and effective data re-use.
ICT, Aspirations, and Career Decisions: Does Access to Information Change How Nigerian Students Make Career Decisions?
1University of Washington, United States of America; 2Baze University, Nigeria
In this poster we introduce our work in progress examining
the relationship between ICTD and Nigerian users' career aspirations.
We propose that an Internet information resource can in
uence a per-
son's aspirations both through its informational content and through
other psychological processes. We summarize work performed to date,
particularly interviews and a focus group conducted at two urban uni-
versities in January, 2017. Although analysis of the data has just begun,
we can identify preliminary trends in the qualitative data that point the
way to how we might augment our approach in future phases.
Understanding Self-Trackers’ Information Behavior from their Debates about Health and Fitness
1the University of Texas at Austin, United States of America; 2Ulsan National Institute of Science and Technology
Most studies on self-tracking look at it as a standalone activity, failing to place it within the broader context of people’s overall health interests and goals as well as their other information behaviors. This study intends to fill this gap by examining self-trackers’ debates as a way to understand how self-tracking fits within this broad-er ecosystem. We collected posts from the debate forum on the MyFitnessPal com-munity, randomly chose 59 posts, and analyzed them using the qualitative content analysis method. We found that the use of self-tracking apps constitutes only part of people’s effort to achieve their health and fitness goals. Beyond self-tracking, they also use online and offline sources to try to build up their perspectives on the science about nutrition and exercise and use such knowledge to inform their diet and exercise practice. The researchers argue that this information behavior constitutes part of the context against which self-tracking is taking place, the knowledge of which, therefore, is valuable for a better understanding of self-tracking activities and for the design of “good” self-tracking systems that can work smoothly with the user and the user’s technology environment.
Beyond the Scope: Using Motion Capture Data from Bronchoscopy Simulations to Build Feedback Models
1University of Pittsburgh, United States of America; 2University of Maryland, Baltimore County; 3University of Michigan; 4University of Louisiana at Monroe
Mannequin simulators and task trainers are commonly used in health sciences training programs to teach techniques performed during medical procedures. However, there are drawbacks to their deployment. First and foremost, the cost of high-fidelity task trainers is prohibitively expensive for many programs. Additionally, the combination of mannequin-to-learner and teacher-to-learner ratios often makes it difficult to efficiently teach procedures to a large number of students. This project aims to create a low-cost, game-based, easily portable task trainer to assist learners in building skills and expertise in performing bronchoscopies. This preliminary report focuses on designing a motion capture device to record hand, wrist, and thumb motions performed by experts and learners during simulated bronchoscopy procedures and then using this captured data to construct computational feedback models.
Affinity Spaces and Gamers: Time Online and Associated Emotion
University of Arizona, United States of America
Scholars in information science often take interest in a wide variety of questions and dilemmas relative to games and gamers, technology and users. With this project, we focus on affinity space confessions. Our focus addresses video-game players’ perceptions of their time spent gaming in a time-scarce world. Though exploratory in nature, this study raises powerful questions around user perception of time spent in leisure activities. Indeed, this project raises many important issues between the time players devote to entertainment and the privilege of being able to play “too much.” We provide a discussion of what our findings can mean for information scientists, game developers, and other scholars across disciplines interested in the relationship between game playing, psychology, and behavior.
Removing all barriers in the way of Science: A case study on Sci – Hub’s usage in Europe
The University of Sheffield, United Kingdom
Sci- Hub is the world’s largest pirate academic library. This case study explores its usage in Europe based on the website’s log data for the 6-month period between September 2015 and February 2016. A quantitative analysis of the log data was conducted followed by a qualitative interpretation of the results. The analysis revealed the European countries with the largest number of download requests, emerging download trends across disciplines and academic publishers. Financial crises impact, academic publisher regimes and user behavior studies are used to explain the results. In addition, hacktivism and Open Access are explored and suggest Sci-Hub’s alignment with hacktivism and the formation of a unique digital social movement.
Women’s Contributions to Living Fully in a Tseltal Indigenous Information System
1University of Washington, United States of America; 2One Equal Heart Foundation, United States of America; 3Universidad Iberoamericana, Mexico; 4Universidad Icesi, Colombia
We discuss the role of women in endogenous community development among the Tseltal indigenous communities in Chiapas, Mexico. This is part of a Tseltal integrated information system that ties community radio, library, and evaluation system to support community development activities that promote the notion of living fully, or in Tseltal language, “Lekil Cuxlejalil.” We identify key themes based on the testimonies of women working in Tseltal community development and discuss how they support the integrated information systems.
Data Citation Practices among Taiwan Social Scientists: Some Preliminary Findings
National Taiwan University, Taiwan
This poster describes some preliminary findings from a larger study that investigates the characteristics of social sciences papers that have used externally acquired datasets in the empirical analyses. Specifically, this poster will focus the characteristics of data reporting and data citation behaviors. Using 511 sample articles published within 2011 and 2015, the distributions of data reporting and data citation as well as paper locations where data were mentioned will be described and discussed.
Exploring Russian Information Troops Using Geography and Google Trends
University of Arizona, United States of America
With this project, we focus on Russian information-based global influences or “hacks” in order to generate new ideas about disruptive digital activities that can emanate from any country and bring effects that are potentially global in their impact. Russia as both a site and political actor exemplifies a case of global, digital, and democratic disruption, and this research points to potential locations housing Russian information troops. The findings provide a way to see patterns in media-related tactics contributing overall to the existing evidence of ‘hybrid’ or information warfare identified in recent literature.
Power Up: Exploring Gaming in LIS Curricula
1Texas Woman's University; 2Pusan National University
Given their educational potential, increasing accessibility, and growing, diverse user base, games are fast becoming integral parts of library collections and programming. Previous research has found that few ALA-accredited programs offer courses specifically on gaming in libraries, potentially leaving pre-service librarians unprepared to implement games in their libraries. This research study will survey LIS educators to identify factors that promote or inhibit the inclusion or exclusion of content related to games and gaming in their courses and curricula. The findings will be used to provide recommendations for curricula and best practices to better prepare LIS educators and, ultimately, pre-service librarians to engage with games and other new interactive media as part of the transforming universe of LIS education.
Contexts, Connections, and Clovis: Opportunities for collaboration between information scientists and archaeologists
1Roger Williams University; 2Simmons College, United States of America
Our poster discusses the potential for collaboration between information scientists and archaeologists. In particular, this poster uses a case study of Clovis spear points to illustrate the importance of collaboration between the two disciplines in order to better understand the management of archaeological data. These artifacts are rare and are curated at widespread utilities across North America. We argue that the focus of collaboration between information scientists and archaeologists should be shifted from field methods to understanding data management practices along with digital metadata acquisition and maintenance. Research in this area should also focus on understanding the innovative data creation and curation approaches archaeologists taken given time and resource constraints. In addition, we will also use the preliminary results of a survey of archaeologists’ research data management practices to help support the potential avenues for collaboration. While the Clovis dataset is informative, many other archaeological datasets could benefit from the attention of information scientists.
“The Great Data Revolution”: Breaking Barriers to Opening Government Data in China
Wuhan University, China, People's Republic of
This poster reports on a research study that aims to identify and overcome barriers that hinder the release of open government data (OGD) in China. Specifically, this poster demonstrates initial findings drawn from a critical literature review. 15 barriers were identified and emerged in three themes: institutional barriers, data integrity and quality barriers, and user participation barriers. This poster presents one of the early research efforts investigating the problems of releasing OGD in China.
Children’s Film as Design Fiction: Ethics, Data, and Technology in Big Hero 6 and Zootopia
The University of British Columbia, Canada
This poster explores how technologies and information are represented in recent children’s cinema, seeing these works as diegetic prototypes. We assert that contemporary “kidult” film can serve as a kind of design fiction to explore the ethical and technical tensions of information systems. This approach is supported through close readings of two Disney films, Big Hero 6 and Zootopia, both of which offer uncritical assessments of data aggregation and use in the effort to resolve a crime-adventure story. We sound a note of caution regarding how these films reinforce contemporary cultural concerns about data, privacy, and role of information in society.
Detecting Train Delays using Railway Network Topology in Twitter
1Yamaguchi University, Japan; 2Kyoto Sangyo University, Japan
This paper presents a novel train delay detection method based on topic propagation analysis of geo-tagged tweets between railway stations. Our goal is to detect traffic accidents and to predict train delays in railway network topology by tracing how relevant tweets propagate in real space and cyberspace. In our method, we utilize railway network as the topology of real space, and extract the topology of social network that is mapped on the railway network. This permits observing the influence of delays on stations with a few tweets, or predicting related tweets of affected stations even if the tweets contain indirect topics about delays.
Data protection management in UK library and information services
University of Sheffield, United Kingdom
Against a backdrop of increasing data security and privacy concerns, current data protection law will soon be overhauled by the General Data Protection Regulation (GDPR). Previous research has found comparable results of a lack of data protection management in libraries. However, it has been nine years since the latest study. This survey aims to provide an updated study into the extent of data protection management in UK library and information services and gauge preparation of the incoming GDPR. The survey was open for a month and received 162 responses. Quantitative data was analysed SPSS statistics software package and compared to previous research. This revealed largely higher percentages for respondents aware of data protection legislation, training, policies and protection officers than recorded in previous studies. This might suggest that data protection management in libraries has improved, however respondents were not confident about GDPR.
The Integrated Platform of Digital Cultural Heritage in China: a Proposed Model Based on Public’s Expectations
1School of Information Management Wuhan University, China, People's Republic of; 2Wuhan University School of Health Sciences , China, People's Republic of
This poster attempts to propose an integrated platform of digital cultural heritage in China based on the public’s expectations and provide specific suggestions for policy makers. A questionnaire was designed and disseminated through online survey service website. From 6 October to November 2016, a total of 1,076 responses were collected. The data showed that the Chinese users expected a comprehensive, convenient, and unified one-stop online accessible portal to all types of digital cultural heritage from China. Based on user need analysis, an integrated platform model of digital cultural heritage has been proposed. Also the China’s digital cultural heritage integration management system has been proposed. In this system, the corporation between the Ministry of Culture and the State Archives Administration of China can be realized.
Information Serendipity, Pseudo-Serendipity, Zemblanity, Disruptive Discovery and Nemorinity: Revisiting Donizetti's and Romani's Opera Buffa L'elisir d'Amore
Bar Ilan University, Israel
We report on an investigation designed to identify human information behaviour in Gaetano Donizetti’s and Felice Romani’s nineteenth-century opera buffa ‘L'elisir d'amore’ (‘Elixir of Love’). An intrinsic study was utilised using a hermeneutic reading of the opera libretto, through a human information-behavioural perspective. This research presents an original and novel layer of analysis to the operatic work and provides valuable insight into information behaviour in a past time and context. In particular, the study shows that the libretto holds evidence of information serendipity, pseudo-serendipity, zemblanity, disruptive discovery, and a novel information behaviour that we designated ‘nemorinity’, in the temporal culture of the early nineteenth-century Italian countryside. Opera is hence found to be a meaningful scholastic resource for information researchers.
Digital Video Curation: Adding to a User-Centered Understanding
1University at Buffalo, The State University of New York, United States of America; 2University of West Georgia
Different concepts of added value and digital video curation are examined from a user-centered approach. Findings contribute toward a user-centered understanding and construct of digital video curation and different functions of added value which can be used as a baseline for future work.
Do Digital Mediators Create Relationships between Museum Visitors and Museum Collections?
Kent State University, United States of America
Digital mediators have been present for some time in museums. Often lumped in with other kinds of “interactives,” digital mediators have become ever-present in exhibition galleries. But what effects do they have on the relationships made between the visitors and the objects (and exhibits) they come to see? This poster presents an early stage of a qualitative visitor experience study on the role of digital mediators in museums. Specifically, I ask: In a museum setting, how does interacting with digital mediators affect a visitor’s experience with the mediated objects. Two museums will be the sites of the study, the the Cleveland Museum of Art and an, as yet, unselected, Scandinavian museum. The study is a part of a larger project with the Norwegian Research Council KULMEDIA that seeks to generate new knowledge about the connections between the role of cultural life and media in society and the economic and technological framework underlying them.
Everyday mathematics of university students
University of Sheffield, United Kingdom
In this poster abstract we highlight the preliminary results of an exploratory study investigating the ways in which university students use mathematics in their everyday lives. The study is part of wider research investigating the impact of mathematics computer games on mathematics anxiety in university students. A survey was distributed to 125 students across the University of Sheffield asking participants about the most common activities they take part in that involves mathematics, as well as any mathematics concepts involved. Responses predominantly came from undergraduates (49.6%). The most common activities included counting, measuring, and predicting. Future work would require the inclusion of students across different universities to increase the generalisability of the results
Learning through virtual reality: Virtual Bethel case study
Indiana University, Indianapolis, IN, United States of America
Focusing on the challenges of teaching virtual reality creation and preservation, our paper will present a case study involving the virtual recreation of the Bethel AME Church sanctuary. We were particularly interested in students’ skills, the technology, and costs associated with teaching and learning virtual reality, and how these factors influence overall student learning experiences. Two courses are explored: 3D Production and Digital Preservation. We have learned that teaching and learning in this space is technology and skill intensive. By assessing the skills and technology needed as well as the costs and student experiences, we are better able to communicate the needs of these projects to potential funders and collaborators. We’ve determined that without external funding, we are currently at capacity and will need funding for additional collaborative projects. The level of technical ability of the students influenced their level of satisfaction as well as their capacity to learn.
Saudi Women Online Practices on Social Media Platforms: A Qualitative Multi-Method Study
Sheffield Hallam University, United Kingdom
This study is a part of an ongoing PhD research into Saudi women’s online practices across a number of social media platforms (SMP) (e.g., Twitter, Facebook, and Instagram). The focus of this thesis is first to discover Saudi women’s online practices across different SMP, and second, to explore the relationship between these practices and Saudi women’s identities. A qualitative multi-method approach is adopted, including online observations and semi-structured interviews. Following purposive and snowballing sampling, twelve Saudi women from different cities in Saudi Arabia (Jeddah, Riyadh, and Dammam) participated. Initial findings indicate that (a) Saudi women’s online practices vary across SMP by appropriating platforms’ features and affordances, (b) SMP are used as spaces where Saudi women cautiously manage contexts’ collapse and divide with different audiences across SMP, and (c) Saudi women’s online practices have reshaped their offline identity and vice versa, and Saudi women’s offline identities are represented online as a part of their online identities. Though there is a growing body of literature in HCI, CHI, and CSCW in social media studies within the Arab and Gulf regions (GCC), there is little research addressing Saudi women’s online practices on SMP in particular. Therefore, this study aims to make a novel contribution to the field of socio-technological integration, and particularly how cultural contexts shape technology adoption, to help form a greater understanding of the challenges involved.
The viral diffusion of campaign messages about political issues during the 2016 U.S. presidential election
Syracuse University, United States of America
With candidates using social media sites like Facebook and Twitter as part of their campaign strategies, social scientists are trying to understand the diffusion of political messages. Viral events can spread messages fast and far from the source, bringing candidate’s messages to new audiences and bringing new followers to candidates. To date, no studies have focused on understanding specifically what kinds of political issues the public spreads into their own networks. While the kinds of issues that spread will likely change from election to election, this work provides a comparison point for future work and is the first step in more real-time analysis that could be useful for researchers, journalists, and politicians.
For this poster abstract we highlight part of our analysis, specifically, the frequency with which presidential candidates tweeted about specific issues and how the public responded by retweeting. To accomplish this, we use data visualization for exploratory data analysis. We find that that candidates and the public are most interested in different topics, but that both the public and candidates are more interested in advocacy messages than attack messages for every topic. For the final poster we will present analysis of both Facebook and Twitter, as well as confirmatory statistical analysis using regression modeling.
Recommendation Seeking Behavior: Empirical Study of Recommendation Needs in Everyday Life
Rutgers University, United States of America
This study explores why recommendation seekers look for recommendations, and how they interact with recommendations through their social milieu. This study utilizes qualitative one-week diary recordings and post-diary interviews to collect rich data that reflect recommendation seekers’ interaction and evaluation strategies in real life issues. The results show that respondents needed recommendations when they are new to situation, wish for changes from a routine behavior, seek trustworthy options or better solutions, and need inspiration. Degree of recommenders’ understanding participants’ situation is more significant than that of sharing interest and similarity with recommenders.
Types of Scientific Collaborators: A Perspective of Author Contribution Network
1Nanjing University of Science and Technology, Nanjing, Jiangsu 210094, China; 2Indiana University, Bloomington, IN 47408, USA
The purpose of this study is to investigate interaction between collaborators within individual studies by measuring how they made contributions to their studies. Author contribution network is constructed based on the author contribution statements of 140,000 full-text articles in PloS by viewing every collaborator as a node and a shared contribution as an edge. Three types of contributors are identified: general team-players, factotums, and mavericks. The preliminary result suggests that division of labor widely exists in scientific re-search and the latter two types of collaborators are common in small teams.
The Role of Online Support Groups in Empowering People with Type 2 Diabetes
The University of Sheffield, United Kingdom
Online health support groups and forums provide the opportunity for patients to share information, knowledge and experiences and through this becomes more empowered. Empowering patients has been a desirable goal for multiple health organisations around the globe: it enables patients to gain greater control over their health and, as a result, achieve better health outcomes. Since patients are more aware about their health status and daily activities, they are more realistic in setting health goals and determining about best ways to achieve them. This is especially important in chronic illnesses, such as diabetes, where patients make decisions that affect their illness on a daily basis. In order to be empowered, patients need to understand their roles and be knowledgeable about their illnesses and its consequence. Online support groups can provide different types of support for patients which helps them to better understand their illness, compare their health situation and progress to other peers and break their isolation by communicating other patients who have the same illness. The study primarily seeks to answer questions regarding the role that online support groups play in empowering people with Type 2 diabetes and shifting the focus of healthcare from doctor-centred to patient-centred care.
Navigating the PDF/A Standard: A Case Study of Theses in Oxford's Institutional Repository
1University of Illinois at Urbana-Champaign, United States of America; 2University of Oxford, Oxford OX1 2JD, UK
The PDF/A (Portable Document Format–Archival) was established by the International Organization of Standardization as the ISO 19005 standard for long-term preservation of electronic documents. In a case study of the Oxford institutional repository theses collection, PDF/A was evaluated as a possible format for standardizing theses disseminated online. While the ISO requirements of a well-formed PDF/A promises sustainability and easy recovery of content, the case study uncovered that the standard restricts some document features from being incorporated into a well-formed PDF/A. Non-conformances to the standard are found across electronic theses and dissertations, from non-Latin glyphs used in scientific and language papers to embedded content, such as images. A further complication for achieving ISO 19005 compliance is that, despite non-conformance to the ISO standard, validation tools do not always catch non-conformance errors in documents which claim to conform to PDF/A. While PDF/A is a logical solution for long-term digital preservation, the stringent standard prevents some content which is frequently used in academic research from conforming to the ISO 19005 standard.
Individual Behavior Change under Smart City Environment—A Proposal of Smart Citizen Concept with Four Dimensions
1Tsinghua University, Beijing, China; 2Northumbria University, UK
This study proposed a new concept Smart Citizen under smart city environment that has not been noticed before. Smart city has introduced the opportunity for massive information acquisition, digitalization of many life activities, virtual social networking, and consequently, many work has been designed or shifted to be completed through self-service with digital devices such as desktop, laptop, mobile phones etc. Yet we know little about how the life process is being changed by this wave of new technology innovation. Most smart city research focused on either the technology infrastructure or the policy but neglect the most important element of the smart city, the person who lives in the city. This study aims to fill in this research gap by firstly proposing the concept of smart citizen defined in four dimensions of individual behavior, followed by several relevant research questions of each dimension respectively. The four dimensions are (1) slacktivism and knowledge bubble, (2) personal digitalization，(3) virtual social relationship, and (4) digital life process burden. We expect to arouse discussions on how an individual under smart city environment shall respond to these four challenging perspectives.
Accuracy of Bilingual Chinese-speakers using search systems
Kent State University, United States of America
Internet users have substantial trust in search engine’s ability to rank the re-sults by the relevance to the query. This paper is seeking to understand how three factors affect the accuracy for native bilingual Chinese-speaking inter-net users. The factors are proficiency of English, the position of relevant in-formation on search engine result page (SERP) and system language. Sub-jects in this research interacted with simulated search engines and they were asked to identify the best results on SERP. The results show that the system language or English ability alone do not affect subjects’ performance, only if those two factors work together effect on subjects’ performance on finding results on SERP. Rank basis exists in bilingual Chinese-speakers and they tent to click on the results on higher locations. Target location in different system language only matters in the group of subjects within average Eng-lish ability, not in the group of low or high English ability subjects. But the accuracy performances are reversed in low English ability compare to high English ability.
Tasker: Safely Serving Verifiable Micro-tasks for Researchers
1University of Maryland Baltimore County , UMBC; 2Stanford University; 3SUNY College at Oneonta
Paid crowdsourcing removes many traditional boundaries in conducting participant based research, however with this new tool, new instrumentation challenges have arisen for researchers. Three common challenges include: the difficulty in creating large numbers of high quality and novel tasks, verifying results of the tasks without relying on manual cheat mitigation techniques, and ensuring that the tasks adhere to the latest visual and instructional design to get high quality results. These circumstances endanger current and future research on Amazon Mechanical Turk and can result in compromised data. We introduce Tasker, a secure system architecture for serving unique tasks supported by usability principles to workers, and providing verification information concerning their completion and accuracy to researchers. This poster discusses insights from our pilot study and explorations toward methods that demonstrate a marked improvement for speed, security and robustness in developing tasks for research leveraging Amazon Mechanical Turk.
The Impact of Byline Order of Corresponding Author -A Preliminary Study
1Nanjing University of Science and Technology, China, People's Republic of; 2School of Informatics, Computing, and Engineering, Indiana University
Corresponding author (C-Au) holds an important position in byline order. Some papers have analyzed the contribution of C-Au, but they do not consider the variation in different byline order. Furthermore, some studies use ques-tionnaire and found that people perception on other authors’ contribution would be influence by the byline order of C-Au, but the real situation remains unclear. Thus, this poster aims to analyze two questions: (1) What kind of byline order do C-Au have and are their contribution influenced by their by-line order? (2) Are other authors contributions influenced by the byline order of C-Au? Three main findings emerge: firstly, the last author are not always to be C-Au; following with the decline of byline order of C-Au, the contribution of C-Au deceases; finally, as the byline order of C-Au changes, other authors’ contribution change significantly. For instance, second author has the lowest contribution when the last author is C-Au.
Evolving information practices in news media content moderation
Uppsala University, Sweden
This study explores the set of practices that news journalists who are dealing with user-generated content moderation apply when assigned with the task of conducting content moderation on news forums online. It focuses on how aggressive user behavior occurring in comments sections plays a role in shaping such practices. The findings of the study indicate that journalists respond to hate speech by enacting certain practices which have evolved within a collective setting. However, the practices that the journalists enact are also the product of social arrangements in a shared information landscape. The practices that the studied news outlets apply when moderating comments sections manifest a balancing act between the ideal of maintaining an open discussion that enables free speech and democracy and attracting readers and reaching a wider audience with their articles.
Toward an Understanding of Data Literacy
University of North Texas, United States of America
As the interest in data grows, much attention has been paid to data literacy, and multiple perspectives and understandings to define data literacy have emerged from varying conceptual contexts. However, there remains a lack of agreement regarding the scope of data literacy across disciplines. This study attempts to define data literacy holistically through a meta-synthesis approach. The study found three distinct themes for data literacy: as skills required for data-driven decision making, as activities for research data services, and a set of practices for data lifecycle.
Crowdsourcing in the Digital Humanities: An Action Research on the Shengxuanhuai Manuscript Transcription
Nanjing University of Science and Technology, China, People's Republic of
In recent years, there has been an emerging trend in the GLAMs (Galleries, Libraries, Archives and Museums) to leverage crowdsourcing to improve the collection, organization, and evaluation of valuable resources. Although a se-ries of notable crowdsourcing projects in the digital humanities have been launched worldwide, there are few academic studies on investigating the im-plementation and evaluation of such cases. To fill up the research gap, this study aims at conducting a field exploration on the real case called the Shengxuanhuai Manuscript Transcription Initiative (Transcribe Sheng for short). In this poster, action research will be carried out to explore the vari-ous stages of Transcribe Sheng project. Our attempts may shed light on the design and evaluation principles of the crowdsourcing in the digital humani-ties.
Disclosure of Information in Chinese Juridical Field: Information & Information Technology?
Renmin University of China, China, People's Republic of
As Chinese government has invested a lot in information technology within judicial field, authorities in the justice system made great efforts to improve their platforms to provide information to public. Information disclosed online serves as an important way for the public to know the government’s movements. This study aims to find out if there are any improvements to disclosure of information with such heavy investment on information technology, by analyzing data collected from 3 representative authorities within a quantitative and qualitative framework, which is specified by literature review and Core Index Evaluation System of Government Website Development issued by Ministry of Industry and Information Technology.
An Implementation of Performance-Based Funding System At Individual Level: An Explorative Study
University College Dublin, Ireland
Performance-based funding systems are designed to encourage research and innovation. These systems have been implemented in many countries at aggregated level. A university in the Republic of Ireland has recently adopted the Norwegian/Danish model and implemented it at individual level. This study aims to understand the impact of this implementation on research practices, including, but not limited to, choice of publication channels and local and international collaboration, as well as the perception and evaluation of the funding scheme with regard to transparency and objectivity.
Towards incorporating the notion of feature shape in music and text retrieval
1School of Information Sciences, University of Illinois at Urbana-Champaign; 2Oxford e-Research Centre, University of Oxford
Extracted feature data augment information resources with concrete characterizations of their content, but only approximate to the meaningful high-level descriptions typically expected by digital musicology scholars (domain experts with some technological affinity, but with no expertise in signal processing or feature data). Feature shapes provide abstract aggregations of feature types which share common characteristics when applied in extraction workflows. We explore the feasibility of feature shape-based filtering and querying within a large audio dataset of live music performances, employing operation sequences as specified by the Audio Feature Ontology and Vocabulary. We further implement analogous semantic structures for the HathiTrust Extracted Feature Dataset to demonstrate the general applicability of feature shapes in music and text retrieval.
A case study on viziometrics: What’s the role of western blots in Alzheimer’s Disease literature?
1School of Informatics, Computing, and Engineering, Indiana University, USA; 2Department of Neurology, Tenth People’s Hospital, Tongji University, Shanghai, China; 3Department of Information Management, Nanjing University of Science and Technology, China.; 4School of Information Management, Wuhan University, Wuhan, China
The visual information in scientific could play an important role, but few bibliometric studies investigate it. In order to emphasize the importance of the visual aspect of scholarly communication, a new field called viziometrics is recently proposed. This paper presents an ongoing project for a case study of viziometrics where we focus on western blots within Alzheimer's Disease (AD) literature. We first develop a computer vision method to detect western blots from the images of figures. Then we extract thousands of western blots from AD papers and show a preliminary analysis.
The impact of privatization in Japanese public libraries
University of Tsukuba, Japan
The management of public libraries in Japan faced a big change in 2003. Public institutions had been privatized in the world from the 1970s, but privatization of public institutions was late in Japan. Public institutions came to be privatized in Japan in the 1980s, and the public library finally became a target of the privatization in the 2000s. The numbers of libraries which introduced the privatization increases year by year. Research in the arena of library information science had been accomplished about arguments of privatization in Japanese public libraries. However, most of studies were sets of opinions to object to privatization. Therefore, the purpose of this research was to examine opinions of various stakeholders about privatization of public libraries by content analysis. The authors succeeded in collecting opinions of stakeholders from newspapers. They clarified characteristics of privatization and present arguments in Japan.
Finding a Future Beyond the Field: Exploring ICT-Mediated Practices of Student Athletes
1Clemson University, United States of America; 2Suffolk University, United States of America; 3University Of Maryland College Park, United States of America; 4Syracuse University, United States of America
Our preliminary research design explores the life of college student athletes and their use of information and communication technologies (ICTs) as they plan their transition beyond graduation. While ICTs such as social media, smartphones, and the internet are becoming more ubiquitous in college campuses, student athletes contend with finding ways to seek information in determining the optimal time to transition into professional play. To expand the literature on ICT use among student athletes, our exploratory study seeks to uncover factors that affect ICT use in both their athletic and academic environments. In collecting qualitative data through semi-structured interviews, our work aims to inform future design implications for ICTs used by student athletes.
Creating A Disability Corpus for Literary Analysis: Pilot Classification Experiments
University of Illinois at Urbana-Champaign, United States of America
As literary text opens to researchers for distant reading, the computational analysis of large corpora of text for literary scholarship, problems beyond typical data science roadblocks, such as data scale and statistical significance of findings have emerged. For scholars studying character and social representation in literature, the identification of characters within the given classes of study is crucial, painstaking, and often a manual process. However, for characters with disabilities, manual identification is prohibitively difficult to undertake at scale, and especially challenging given the coded textual markers that can be used to refer to disability. There currently exists no corpus of characters in fiction with disabilities, which is the first step to at-scale computational study of this topic. This project seeks to pilot a classification process using manually assigned ground truth on a subset of volumes from the HathiTrust. Having successfully built and evaluated a Naïve Bayes classifier, we suggest full-scale deployment of a statistical classifier on a large corpus of literature in order to assemble a disability corpus. This project also covers preliminary exploratory textual analysis of characters with disabilities to yield potential research questions for further exploration.
Exacerbating the Vulnerabilities of Undocumented Migrants: The Risks Involved in the Humanitarian Information Activities of Migrant-Aid Organizations
1University of Kentucky, United States of America; 2University of Washington, United States of America
The information practices and use of information and communication technologies (ICTs) by humanitarian migrant-aid organizations, including activities that encompass collecting, storing, processing, analyzing, using, transmitting, and releasing data about migrants to the public can help humanitarian and migrant-aid organizations be more effective in their work. However, the use of ICTs and certain information practices in these contexts may also increase or exacerbate significant risks to the people these organizations intend to help. In this project, we examine and compare HIA-related activities in two distinct con-texts: 1) humanitarian organizations working to provide lifesaving assistance to undocumented migrants crossing clandestinely into the United States from Mexico, and 2) humanitarian organizations and colleges working to provide assistance and support to undocumented migrants already in the United States. We argue that humanitarian organizations need to develop an extraordinary and sophisticated awareness of the limits of information technologies regarding ethics, security, privacy, and permanence of digital information to truly help vulnerable populations rather than inadvertently increase their vulnerabilities.
A citation-based review of study on image retrieval
University of Wisconsin-Milwaukee, United States of America
Driven by the development of the information retrieval technologies, image retrieval has been studied for more than several decades. This study centers on revealing the current status and future directions of image retrieval based on reviewing previous related studies. The citation-based analysis was applied to 2243 articles retrieved from Web of Science database. The time series plots of the citation relationships between the retrieved articles reveal a fundamental research article that lay the foundation for the image retrieval field. Co-citation analysis identifies that the existing studies formed two clusters. Each cluster represents one of the two major areas in the field of image retrieval: the text-based image retrieval and the content-based image retrieval. The visualization map shows that the research of content-based image retrieval has received more attention than the area of text-based image retrieval. Relevance feedback was identified as a promising research direction for the future study.
On-Demand Labor: Tactics of Flexibility and Control
1Texas State University; 2Florida Atlantic University; 3Virginia Tech University; 4University of Pittsburgh; 5The College of Westchester; 6Florida International University
This poster explores the perspectives of workers in on-demand positions man-aged through online platforms. Our interview-based study considers how Uber drivers perceive their employment status, how they view Uber’s management tactics and how they modify their work practices in order to control their schedules and wages. We found that workers tended to view themselves as independent contractors and had strong understandings of the tactics used by Uber to manage the supply of drivers. However, we also found that they do not view their responses to these tactics as a form of resistance. Instead of seeing their employment status as a problem that calls for collective action, drivers were primarily interested in increasing their own wages.
Towards the Creation of Cognitively Salient Wayfinding Aids for Emergency First Responders
1Vanderbilt University, United States of America; 2Cal Poly Pamona, United States of America; 3University of Pittsburgh, United States of America; 4College of Westchester, United States of America; 5Oakwood University, United States of America; 6Indiana Unversity, United States of America; 7La Roche College, United States of America; 8iSchool Inclusion Institute
This work presents a literature review on the creation of a cognitively salient wayfinding aid for emergency first responders. The importance of the topic as well as the contributing areas are discussed. Areas include indoor naviga-tion, cognitive aspects of wayfinding, and representations of space. A study focused on determining the interactions of first responders with spatial in-formation is proposed to help fill the gaps in the literature.
Searching through Videos: Scholarly Information Search of Native and Non-Native English Speakers on YouTube
Rutgers University, United States of America
Living in a visually rich environment, university students seek and con-sume information through videos to complete their academic tasks. This exploratory pilot study examines if and how students’ interaction with the YouTube search engine will generate particular search experiences and out-comes on their search tasks, and how native and non-native English-speaking students may interact with the search system and the videos. It aims to explore possible patterns in the search behaviors and experiences of the two groups. One general exploratory information task and the partici-pants’ self-selected academic-oriented tasks were used for this study, both of which have been observed and analyzed along with follow-up interviews. Initial patterns have been observed in their behaviors within the search en-gine on their academic-oriented tasks. Limitations and suggestions for fur-ther development of the design of the research are discussed.
Perceptions of the Privacy and Security of Virtual Reality
1University of Maryland; 2University of Maryland Baltimore County; 3The College of Westchester; 4James Madison University
Virtual Reality (VR) is projected to grow into a $100B industry in the next five years. While a preliminary body of research has begun to explore security vulnerabilities and privacy threats in VR, little prior work has explored how users of VR systems perceive these threats or how developers are coping with them. By understanding users' and developers' perceptions early in the VR adoption life-cycle, we have a unique opportunity to inform the development of policies, educational materials, and corporate best-practices to ensure the protection of VR users. In this poster, we present preliminary findings from semi-structured interviews with home VR users focused on their use of VR, their awareness of data collection and privacy/security threats, and potential tensions between users' and developers' understandings and mitigations of these threats.
Resolving Taxonomic Names using Evidence Extracted from Text
1University of Arizona, United States of America; 2Arizona State University, United States of America; 3Agriculture Agri-Food Canada, Canada
Biological taxonomy is established on organism relationships with scientific names as the primary identifiers; however, resolving various taxonomic names remains one of the greatest challenges in taxonomy and systematic biology overall. We proposed an evidence-based approach that extracts trait (character) evidence from published literature to facilitate the comparison of taxonomic concepts. In this poster, we report an initial set of results from our first case study using the plant genus Rubus. The case study tested the entire pipeline of the Explorer of Taxon Concepts toolkit we have developed and revealed challenging phenomena to be solved in the near future.
Should We Care How Long to Publish? Investigating the Correlation between Publishing Delay and Journal Impact Factor
1School of Information Management, Wuhan University, China; 2The College of Literature and Journalism of Sichuan University,China
This poster presents a research that examines the correlation between publishing delay and impact factor of academic journals.Data of 9,028 articles in 91 library and information sciences (LIS) and biology journals were collected from WoS Journal Citation Report (JCR 2016), and then analyzed and compared. The data analysis shows that LIS journals have greater publishing delay than biology journals. The study result shows that there is no correlation between publishing delay and journal impact factor, although, a small negative correlation for biology journals and a small positive correlation for information science journals can be seen.
Exploring Browsing Behavior of Product Information in an M-commerce Application: a Transaction Log Analysis
Peking University, China, People's Republic of
This research aims to describe the information browsing and merchandise purchasing behaviors of the users in an M-commerce application. Data used in this research comes from the transaction logs of 290 heavy users in March 2015. We established the mapping between the request parameters in the log and the user information behavior to future analyze the pattern of user behavior. People are most concerned about the details of items, and actively share their favorite items and shops to others. The times of view is power-law distribution. We also find that the items which are viewed 9 times and are included in the submitted order are most likely to be bought. There is a positive correlation between the purchase of items and the numbers of browsing and sharing behaviors.
Administrative Innovation in Human Resource Information Systems: Exploring Post-Adoption Usage in Kuwait’s Public Sector
The University of Sheffield, United Kingdom
Human resource information systems (HRIS) have a prominent role in organizational success and have been used to support various HR goals. Previous research on HRIS focuses on its adoption as a form of innovation per se, and limited studies examine innovation emerging in the context of HRIS post-adoption usage. This study will focus on post-adoption usage from the perspective of administrative innovation, which is related to improvements in work processes and tasks following the adoption of HRIS. Although innovation has gained more interest in the public sector as a way to improve efficiency, there is a lack of studies regarding HRIS and administrative innovation in this sector. Therefore, this research aims to investigate the development of administrative innovation in the public sector of Kuwait where HRIS has been adopted and integrated into various HR practices. This poster presents the preliminary findings of the research in progress.
I’ve only been here for two days, how do you…?: WhatsApp group as a social and collaborative information seeking virtual platform for women living abroad in the Middle East
1University College London - Qatar; 2University of North Carolina Chapel Hill, United States of America
Drawing on the unified framework of Social and Collaborative Information Seeking (SCIS) and situated in the context of everyday life information seeking (ELIS), this study explores the information seeking behaviour of expatriate women acclimating to life in the Middle East. Using the communication and information exchanges among an existing, user-initiated WhatsApp group with the sole purpose of supporting women moving into the capital city of Qatar, Doha, this research examines the unique information needs expressed through group chat as well as the dynamic roles members play alternating between information seekers, providers, collaborators, and supporters. Computational analysis, qualitative coding, and questionnaire data help us understand how the group functions as a tool for women as they seek information and make sense of their new environment with the help and support of virtual strangers.
Remediating Civic Tech
University of Washington, United States of America
Civic technologies are designed to mediate government and citizen interactions, but often fall short of this goal. In this poster, we present our on-going work of remediating civic tech applications in order to connect citizens to government services, and to one another. We describe the development of an open-source transcription engine that transforms video into searchable archives of government legislative meetings. By exploring the process of re- mediation, we argue that civic tech designers can better achieve their goals of brokering relationships between people, information, and governance.
An Investigation of Cyberinfrastructure Adoption in University Libraries
1University of North Texas, United States of America; 2Virginia Polytechnic Institute and State University
This study aims to understand factors that affect university libraries’ adoption of cyberinfrastructure for big data sharing and reuse. A cyberinfrastructure adoption model which contains 10 factors has been developed based on the technology-organization-environment (TOE) framework and the literature regarding tradeoffs of applying cyberinfrastructure. This paper describes the proposed cyberinfrastructure adoption model and explains the survey in-struments. The next steps of the study are also presented.
Using Twitter for insights into the 2009 Swine Flu and 2014 Ebola outbreaks
1Information School, University of Sheffield; 2School of Information Technology and Electrical Engineering, University of Queensland
Infectious disease outbreaks are a global public health risk that have the potential to take many lives in a short amount of time. It is, therefore, important to under-stand the views and thought-processes of the general public when they occur. Social media platforms, originally intended for personal use, have recently been used in academic research for gaining public views and opinions as well as for disease mapping and tracking. Twitter, a widely-used microblogging platform, provides a unique opportunity to study the instant reactions of the public during disease outbreaks. This is because news of such epidemics on Twitter typically generate bursts of tweets. This abstract describes a study that is investigating user views during the peak of the 2009 Swine Flu and the 2014 Ebola outbreaks. Based on Google Trends data, tweets were retrieved from Twitter during a peak in Web search queries. Data were retrieved from a two-day period corresponding to the 2009 Swine Flu and 2014 Ebola outbreaks. A total of 214,784 tweets were retrieved from the two-day period of April 28th and April 29th 2009 for Swine Flu and 181,110 tweets were retrieved from the 29th and 30th September 2014 for Ebola. The study then utilised the data analysis technique of thematic analysis in order to uncover potential similarities and differences between the cases. The re-sults of this study will allow for the creation of guidance that can be disseminated by health authorities during an outbreak.
Understanding the lived experiences of Mexican informal caregivers with Ambient Assisted Living Technologies
University of Sheffield, United Kingdom
Ambient Assisted Living (AAL) Technologies, have the potential to support the people with dementia living in their homes for longer. Dementia is a major public health concern. It currently affects approximately 46.8 million people worldwide and by 2050 this figure will increase to 131.5 million. Low-and-middle income countries (LMIC) will be particularly affected by this situation as their poor health infrastructures and governmental support will mean that they have to rely on the informal caregiver (IC) sector. ICs are people who care for a dependent or disabled family member, commonly spouses or daughters. Mexico was the first Spanish speaking country in the world to recognise dementia as a public health priority. In-home technologies, such as AAL Technologies, are used in dementia care in order to improve patients’ and caregivers’ quality of life. This paper explores the way in which Mexican ICs of people with dementia (PWD) make sense of their lived experiences with AAL technologies.
How many keywords do authors assign to research articles – a multi-disciplinary analysis?
1Wuhan University, China, People's Republic of; 2University of Oklahoma, USA
Author keywords are one important data source for co-word analysis. The distri-bution of author keywords in papers has not been investigated at the discipline level. We analyzed six research fields from soft science to hard science to reveal the underlying quantitative patterns of author keywords. Normal distribution, Poisson distribution, and Weibull distribution were fitted by applying Maximum Likelihood Estimation. Chi-Square tests and Kolmogorov-Smirnov tests were used to evaluate the goodness of fit. The results show that a large portion of pa-pers have no keyword or only one keyword in all these fields. The author key-word distributions of the six fields are represented. It’s shown that Weibull dis-tribution is the best fitted. This study provides practical implications for keyword selection in co-word analysis.
Four Case Studies on Information Activities of the Czech Non-profit Organizations through the Lenses of Information Science
Charles University, Faculty of Arts, Institute of Information Studies and Librarianship, Czech Republic
The poster will present research on the activities of the Czech non-profit organizations on social networks. Research is a part of my dissertation named Internet Activism as a Tool to Promote Women's Rights through the Optics of Information Science. The thesis will be defended in 2018.
The goal of the research is to verify the hypothesis that there are more activities in the online world and that they have a more intense impact than actions taken in the offline world.
Research consists of four case studies focused on four Czech non-profit organizations dealing with important topics of the feminist movement. It is the Forum 50% dealing with the political participation of women, the Public for Natural Childbirth – with the theme of women's health, the ProFem organization, which deals with cases of violence against women and social issues are a topic for the Homelike organization.
Primarily, I am monitoring their information actions and their information channels (for the old way of communication - leaflets, printed media; and channels using recent technologies - Facebook, videos or the Web). The aim of these actions is to change society, change legislation or opening a new topic in public debate. I analyzed these information flows and their channels.
I used the Gephi analytics tool to measure Facebook activities. I used traditional sociological methods (interview, questionnaire, observation) to get and analyze data in an offline environment.
I present the results of four case studies in graphic form (from SW Gephi) and in written form on my poster.
Understanding User’s Switching Intention on Mobile Payment Platforms
1School of Information Management, Nanjing University; 2School of Economics and Management, Nanjing University of Science and Technology
With the development of mobile payment (m-payment) service, the competition accordingly increases among m-payment market. Users face multiple choices when adopting m-payment services. It is critical for both scholars and m-payments providers to understand what the underlying factors can influence user’s switching from one incumbent m-payment platform to another. To solve this question, we employ a push-pull-mooring (PPM) framework to build the research model. We propose that user’s dissatisfaction on incumbent m-payment provider is the main push factor for user’s switching. The attractiveness of alternative and peer influence are the pull factors influencing user’s switching. Cognitive lock-in, as the mooring factor, could influence switching intention directly. Additionally, we posit that cognitive lock-in can moderate the effects of both push and pull factors on user’s switching intention. This study will use survey methodology and structural equation modelling approach to test the hypotheses.
Yes, You Can Touch This: Designing Prototypes for Interactive Museum Spaces
1University of Michigan, United States of America; 2College of Westchester, United States of America; 3University of Maryland Baltimore County, United States of America; 4Pennsylvania State University, United States of America
Traditionally, museums have been spaces where visitors are asked to look but not touch items on display. Currently, professionals in museums, particularly in the United States, are trying to improve visitor experience by using interactive displays and technologies. Interactive media allows visitors to be immersed in the information displayed rather than simply reading a block of text that would more than likely be overlooked.While interactive media is a great way to engage visitors in an exhibit, this study looks at the use of interactive media in preserving culture, specifically American indigenous cultures. Our goal is to study how culture can be preserved and shared through interactive prototypes in a museum space.
The Evolution of Reading Activities for Teenagers in Japanese Public Libraries
University of Tsukuba, Japan
The Japanese government has focused on reading activities for teenagers throughout a long period. Due to the reason, even within the current trend of digital media and digital literacy, many Japanese library services for teenagers have evolved in distinct ways and the introduction of these services has created personal, close knit relationships between schools, teachers, and local librarians. From the perspective of local communities and activities, Japanese public librarians actively visit schools and usage of the library among teenagers is quite high. The purpose of this research is to describe and reveal the distinct and advanced reading activities for teenagers in Japanese public libraries in order to learn about affluent engagement activities that may also benefit the digital world. We used case analysis for investigations about reading activities and identified 10 advanced cases and deeply analyzed these cases. In the article we highlight three cases and explain them within the details describing the particular development of booklists and book talks for teenagers and their evolution within the library system in Japan.
A Study of ELL Adult’s Use of Mobile Communication Applications: an Examination of Tie Strength
1University of Washington, United States of America; 2University of Guam, United States of America; 3Carleton College, United States of America; 4Vanderbilt University, United States of America; 5Syracuse University, United States of America; 6La Roche College, United States of America; 7iSchool Inclusion Institute (i3)
This study begins to examine the problems that surround the usability and design of mobile communication applications for E.L.L (English Language Learner) im-migrant adults in the United States by looking at the intent of this population when using phones. A user study was conducted where ELL immigrant adults answered questions about their mobile phone use. The results show that ELL immigrant adults use their smart phones daily and communicate with their friends and family, showing that maintenance of strong ties is important to this community. We hope this study moves towards an inclusive application that takes into ac-count the relationship maintenance needs of this community.
A Study of the Intellectual Structure of Community Archives
University of North Texas, United States of America
Community archives have gained renewed attention as an emerging archival movement. The goal of this study is to map the intellectual structure of community-centric archival research during the 2000-2017 period. To identify and visualize the relationships between topics within the subject areas, we analyzed the co-occurrence index and network structures of keywords derived from titles, abstracts, and author-provided keywords in peer-reviewed journal articles and conference proceedings in the field of community archives.
User-centered Evaluation of Metadata Schema for Murals: Preliminary Results from A Survey Study
1University of Hong Kong, Hong Kong S.A.R. (China); 2Dunhuang Research Academy, China
There has not been a well-accepted metadata schema for murals as an important type of cultural heritage. This paper reports an ongoing study and preliminary results on evaluating a draft metadata schema of murals from the end-user perspective. Based on the results of an earlier interview-based evaluation, a questionnaire was designed and 185 effective responses were collected from potential users. “Work type”, “Title”, and “Creation date” were identified as the most important metadata elements, and the most useful elements for supporting the searching, browsing, and organizing information about murals. In summary, findings of this study contribute to polishing the design of the metadata schema for murals.
Privacy Issues on Social Media: A Risky Trade Off of Personal Information
University of Washington, United States of America
Personal information on the web must be handled very delicately for its exposure can leave the victim with their identity stolen and destitute. Although security measures are normally implemented to prevent such breaches, targeted hacks continuously occur. However, the authors noticed that among 36 of the Facebook groups they frequent, 70% in aggregate willingly exposed their emails and other identifying details in exchange for detailed job recruitment reports and other related resources. First, we created a search engine that returned all the public posts where an individual commented their email. We segmented these commenters into three groups each with different treatment. We conducted a pre-post study over the course of five months that incorporated clickstream analysis and quantitative records for all groups using the search engine to determine whether both it and the survey in tandem measurably reduced the number of times the user submitted personal information after being confronted with the grave ramifications such behavior could have on their social, mental, and monetary wellbeing. From this, we determined how best to persuade commenters to reduce the number of posts they make in the future through evaluating the cogency of our search engine.
Users’ Emotional Experiences during Interaction with Information Products: A Diary Study
Peking University, China, People's Republic of
Emotional experience is a very important aspect of users’ interaction with information products. Previous research has agreed that emotion is an important ingredient which could enhance the interaction between human and computer. In this paper, we explored users’ emotional experience in relationships with other factors such as product types, product features, interaction results, and user behaviors. We analyzed 162 dairy entries from 36 users in 2 weeks. Results show that: (1) users recorded more negative emotions than positive emotions; (2) mobile apps were related to more positive emotions while desktop software was related to more negative emotions; (3) there is no significant correlation between user behaviors and emotions. The results provide exploratory understanding of the relationships between emotional experience and other factors. We propose that users’ expectation might play a key role in this process.