Integrating information literacy in IT courses: Information technology students’ perceptions of embedded librarians

Scott C. Spangler
{"title":"Integrating information literacy in IT courses: Information technology students’ perceptions of embedded librarians","authors":"Scott C. Spangler","doi":"10.36965/ojakm.2019.7(2)29-40","DOIUrl":null,"url":null,"abstract":"The purpose of this pilot study is to assess undergraduate Information Technology (IT) students’ perception of benefits from having an embedded librarian in an online learning management system. The pilot research data were collected through a random sample of volunteer focus group members after course completion. Similarly, to the literature methodology, the researcher shadowed a post-course focus group interview session to seek congruent literature themes: perception of comfort in experience, the perception of assignment confidence, and enhanced perception in research abilities. The data were first spiraled down using Quirkos qualitative analysis software and discussed to form a grounded theory. The pilot study concurs with prior literature’s three main constructs: comfort, confidence, and recognition. Additionally, this study recognizes four additional themes: helpful, recognition of embedded librarians, interpersonal growth, and self-efficacy. Finally, this study acknowledges its limitations and recommendations for future research.","PeriodicalId":325473,"journal":{"name":"Online Journal of Applied Knowledge Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Online Journal of Applied Knowledge Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36965/ojakm.2019.7(2)29-40","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The purpose of this pilot study is to assess undergraduate Information Technology (IT) students’ perception of benefits from having an embedded librarian in an online learning management system. The pilot research data were collected through a random sample of volunteer focus group members after course completion. Similarly, to the literature methodology, the researcher shadowed a post-course focus group interview session to seek congruent literature themes: perception of comfort in experience, the perception of assignment confidence, and enhanced perception in research abilities. The data were first spiraled down using Quirkos qualitative analysis software and discussed to form a grounded theory. The pilot study concurs with prior literature’s three main constructs: comfort, confidence, and recognition. Additionally, this study recognizes four additional themes: helpful, recognition of embedded librarians, interpersonal growth, and self-efficacy. Finally, this study acknowledges its limitations and recommendations for future research.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
资讯科技课程整合资讯素养:资讯科技学生对嵌入式图书馆的看法
本初步研究的目的是评估资讯科技(IT)本科学生对在线上学习管理系统中加入嵌入式图书管理员的感受。试点研究数据是在课程结束后通过随机抽样的志愿者焦点小组成员收集的。同样,对于文献方法论,研究人员跟踪课程后焦点小组访谈会议,以寻求一致的文献主题:体验舒适感,作业信心感和研究能力增强感。首先使用Quirkos定性分析软件对数据进行螺旋式分析,并进行讨论,形成一个有根据的理论。该初步研究与先前文献的三个主要结构一致:舒适,信心和识别。此外,本研究还发现了四个额外的主题:乐于助人、嵌入式图书馆员的认可、人际成长和自我效能感。最后,本研究承认其局限性和对未来研究的建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Understanding knowledge hiding behaviors in the workplace using a serious game data collection approach Special issue editorial: Knowledge hiding and knowledge hoarding in different environments Knowledge hiding and knowledge hoarding: Using grounded theory for conceptual development The impact of knowledge hiding and toxic leadership on knowledge worker productivity – Evidence from IT sector of Pakistan Pilot testing of experimental procedures to measure user's judgment errors in simulated social engineering attacks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1