Pub Date : 2021-01-01DOI: 10.1633/JISTAP.2021.9.1.5
Sutthinan Chuenchom
Political weblogs are as diverse as political viewpoints are. In the period of Prime Minister Yingluck Shinawatra, several political crises occurred, such as opposition to the Amnesty Act, the constitutional amendment, and the anti-government protests. Remarkably, during this time, social media were used as a platform for political expressions. This study employed a content analysis method to explore twenty-nine Thai political weblogs established during the period of Prime Minister Yingluck Shinawatra’s administration. At the time, the most prominent Thai political weblogger was Nidhi Eawsriwong. Not surprisingly, the Pheu Thai Party and the Democrat Party were the most frequently appearing political parties in these weblog’s posts. Most contents in these posts were related to government protesters by the People’s Democratic Reform Committee (PDRC) and the coup d’état. The purposes of writing such weblogs were to express feelings and thoughts about Thai politics and to provide political information to the general public. The findings from this investigation revealed two significant uses of Thai political weblogs: the communication media for political expressions and viewpoints (a safe online space for political engagement and participation), and vital sources for Thai political information and news (social narratives).
{"title":"The Use of Weblogs as a Tool for Thai Political Engagement","authors":"Sutthinan Chuenchom","doi":"10.1633/JISTAP.2021.9.1.5","DOIUrl":"https://doi.org/10.1633/JISTAP.2021.9.1.5","url":null,"abstract":"Political weblogs are as diverse as political viewpoints are. In the period of Prime Minister Yingluck Shinawatra, several political crises occurred, such as opposition to the Amnesty Act, the constitutional amendment, and the anti-government protests. Remarkably, during this time, social media were used as a platform for political expressions. This study employed a content analysis method to explore twenty-nine Thai political weblogs established during the period of Prime Minister Yingluck Shinawatra’s administration. At the time, the most prominent Thai political weblogger was Nidhi Eawsriwong. Not surprisingly, the Pheu Thai Party and the Democrat Party were the most frequently appearing political parties in these weblog’s posts. Most contents in these posts were related to government protesters by the People’s Democratic Reform Committee (PDRC) and the coup d’état. The purposes of writing such weblogs were to express feelings and thoughts about Thai politics and to provide political information to the general public. The findings from this investigation revealed two significant uses of Thai political weblogs: the communication media for political expressions and viewpoints (a safe online space for political engagement and participation), and vital sources for Thai political information and news (social narratives).","PeriodicalId":37582,"journal":{"name":"Journal of Information Science Theory and Practice","volume":"159 1","pages":"68-78"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85970309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1633/JISTAP.2021.9.2.4
Hyungju Ji, Mikyeong Cha
,
,
{"title":"Topic Analysis of Scholarly Communication Research","authors":"Hyungju Ji, Mikyeong Cha","doi":"10.1633/JISTAP.2021.9.2.4","DOIUrl":"https://doi.org/10.1633/JISTAP.2021.9.2.4","url":null,"abstract":",","PeriodicalId":37582,"journal":{"name":"Journal of Information Science Theory and Practice","volume":"7 1","pages":"47-65"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83611888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1633/10.1633/JISTAP.2021.9.3.3
Natalya Makhotina, E. Pshenichnaya
The growing number of threats to society through the uncontrolled distribution of information is forcing library communities in many countries to reconsider their views on free access to collections. Based on the content of numerous documents of international importance, it can be concluded that in any democratic country access to information is one of the most important human rights, along with the right to life, liberty, and security of person. However, the state has the right to restrict citizens’ access to information within the framework of existing legislation. Constantly, restrictions on access to information are established in order to protect the ethical foundations of the constitutional order, morality, health, rights, and legitimate interests of others, to ensure the country’s defense and state security. It goes without saying that each country has the right to independently decide where the boundaries lie between permitted and prohibited information, including printed information, contained in library collections. This article describes three levels of access restriction: foreign, state, and regional. The authors have analyzed the legal and regulatory documents that govern libraries, as well as the reasons and methods of limitation. A comparative analysis of the restriction of access to information in the countries of Europe and Asia is presented.
{"title":"The Features of Restricted Access to Information at European and East Asian Libraries","authors":"Natalya Makhotina, E. Pshenichnaya","doi":"10.1633/10.1633/JISTAP.2021.9.3.3","DOIUrl":"https://doi.org/10.1633/10.1633/JISTAP.2021.9.3.3","url":null,"abstract":"The growing number of threats to society through the uncontrolled distribution of information is forcing library communities in many countries to reconsider their views on free access to collections. Based on the content of numerous documents of international importance, it can be concluded that in any democratic country access to information is one of the most important human rights, along with the right to life, liberty, and security of person. However, the state has the right to restrict citizens’ access to information within the framework of existing legislation. Constantly, restrictions on access to information are established in order to protect the ethical foundations of the constitutional order, morality, health, rights, and legitimate interests of others, to ensure the country’s defense and state security. It goes without saying that each country has the right to independently decide where the boundaries lie between permitted and prohibited information, including printed information, contained in library collections. This article describes three levels of access restriction: foreign, state, and regional. The authors have analyzed the legal and regulatory documents that govern libraries, as well as the reasons and methods of limitation. A comparative analysis of the restriction of access to information in the countries of Europe and Asia is presented.","PeriodicalId":37582,"journal":{"name":"Journal of Information Science Theory and Practice","volume":"35 1","pages":"31-41"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85561915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1633/JISTAP.2021.9.1.2
Alina Wan, F. Fariza, Mohd Masnizah
The popularity of social networking sites (SNS) has facilitated communication between users. The usage of SNS helps users in their daily life in various ways such as sharing of opinions, keeping in touch with old friends, making new friends, and getting information. However, some users misuse SNS to belittle or hurt others using profanities, which is typical in cyberbullying incidents. Thus, in this study, we aim to identify profane words from the ASKfm corpus to analyze the profane word distribution across four different roles involved in cyberbullying based on lexicon dictionary. These four roles are: harasser, victim, bystander that assists the bully, and bystander that defends the victim. Evaluation in this study focused on occurrences of the profane word for each role from the corpus. The top 10 common words used in the corpus are also identified and represented in a graph. Results from the analysis show that these four roles used profane words in their conversation with different weightage and distribution, even though the profane words used are mostly similar. The harasser is the first ranked that used profane words in the conversation compared to other roles. The results can be further explored and considered as a potential feature in a cyberbullying detection model using a machine learning approach. Results in this work will contribute to formulate the suitable representation. It is also useful in modeling a cyberbullying detection model based on the identification of profane word distribution across different cyberbullying roles in social networks for future works.
{"title":"Identification of Profane Words in Cyberbullying Incidents within Social Networks","authors":"Alina Wan, F. Fariza, Mohd Masnizah","doi":"10.1633/JISTAP.2021.9.1.2","DOIUrl":"https://doi.org/10.1633/JISTAP.2021.9.1.2","url":null,"abstract":"The popularity of social networking sites (SNS) has facilitated communication between users. The usage of SNS helps users in their daily life in various ways such as sharing of opinions, keeping in touch with old friends, making new friends, and getting information. However, some users misuse SNS to belittle or hurt others using profanities, which is typical in cyberbullying incidents. Thus, in this study, we aim to identify profane words from the ASKfm corpus to analyze the profane word distribution across four different roles involved in cyberbullying based on lexicon dictionary. These four roles are: harasser, victim, bystander that assists the bully, and bystander that defends the victim. Evaluation in this study focused on occurrences of the profane word for each role from the corpus. The top 10 common words used in the corpus are also identified and represented in a graph. Results from the analysis show that these four roles used profane words in their conversation with different weightage and distribution, even though the profane words used are mostly similar. The harasser is the first ranked that used profane words in the conversation compared to other roles. The results can be further explored and considered as a potential feature in a cyberbullying detection model using a machine learning approach. Results in this work will contribute to formulate the suitable representation. It is also useful in modeling a cyberbullying detection model based on the identification of profane word distribution across different cyberbullying roles in social networks for future works.","PeriodicalId":37582,"journal":{"name":"Journal of Information Science Theory and Practice","volume":"418 1","pages":"24-34"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79509324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1633/JISTAP.2021.9.1.6
Duong Thi Phuong Chi
This study explores Facebook use in Vietnamese academic libraries by analysing libraries’ posts on their Facebook pages and library users’ interaction with those posts. A total of 260 posts on four academic libraries’ Facebook pages were examined using the content analysis method. The findings reveal that Facebook was mainly used to encourage reading and to transmit announcements. Most of the academic libraries published one post a week. The photo was the most frequent media type of libraries’ posts and gained a higher level of interaction than other posts. According to the research results, the user engagement was low, and the user interaction with libraries’ posts generally was in the form of reaction. The findings can help better understand Facebook use in Vietnamese academic libraries and may assist libraries in creating a plan for using Facebook more effectively.
{"title":"Content Analysis of the Facebook Pages of Selected Academic Libraries in Vietnam","authors":"Duong Thi Phuong Chi","doi":"10.1633/JISTAP.2021.9.1.6","DOIUrl":"https://doi.org/10.1633/JISTAP.2021.9.1.6","url":null,"abstract":"This study explores Facebook use in Vietnamese academic libraries by analysing libraries’ posts on their Facebook pages and library users’ interaction with those posts. A total of 260 posts on four academic libraries’ Facebook pages were examined using the content analysis method. The findings reveal that Facebook was mainly used to encourage reading and to transmit announcements. Most of the academic libraries published one post a week. The photo was the most frequent media type of libraries’ posts and gained a higher level of interaction than other posts. According to the research results, the user engagement was low, and the user interaction with libraries’ posts generally was in the form of reaction. The findings can help better understand Facebook use in Vietnamese academic libraries and may assist libraries in creating a plan for using Facebook more effectively.","PeriodicalId":37582,"journal":{"name":"Journal of Information Science Theory and Practice","volume":"71 1","pages":"79-89"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80026844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1633/JISTAP.2021.9.2.5
R. M. Nawi, S. A. M. Noah, L. Zakaria
Recommender Systems have gained immense popularity due to their capability of dealing with a massive amount of information in various domains. They are considered information filtering systems that make predictions or recommendations to users based on their interests and preferences. The more recent technology, Linked Open Data (LOD), has been introduced, and a vast amount of Resource Description Framework data have been published in freely accessible datasets. These datasets are connected to form the so-called LOD cloud. The need for semantic data representation has been identified as one of the next challenges in Recommender Systems. In a LOD-enabled recommendation framework where domain awareness plays a key role, the semantic information provided in the LOD can be exploited. However, dealing with a big chunk of the data from the LOD cloud and its integration with any domain datasets remains a challenge due to various issues, such as resource constraints and broken links. This paper presents the challenges of interconnecting and extracting the DBpedia data with the MovieLens 1 Million dataset. This study demonstrates how LOD can be a vital yet rich source of content knowledge that helps recommender systems address the issues of data sparsity and insufficient content analysis. Based on the challenges, we proposed a few alternatives and solutions to some of the challenges.
{"title":"Issues and Challenges in the Extraction and Mapping of Linked Open Data Resources with Recommender Systems Datasets","authors":"R. M. Nawi, S. A. M. Noah, L. Zakaria","doi":"10.1633/JISTAP.2021.9.2.5","DOIUrl":"https://doi.org/10.1633/JISTAP.2021.9.2.5","url":null,"abstract":"Recommender Systems have gained immense popularity due to their capability of dealing with a massive amount of information in various domains. They are considered information filtering systems that make predictions or recommendations to users based on their interests and preferences. The more recent technology, Linked Open Data (LOD), has been introduced, and a vast amount of Resource Description Framework data have been published in freely accessible datasets. These datasets are connected to form the so-called LOD cloud. The need for semantic data representation has been identified as one of the next challenges in Recommender Systems. In a LOD-enabled recommendation framework where domain awareness plays a key role, the semantic information provided in the LOD can be exploited. However, dealing with a big chunk of the data from the LOD cloud and its integration with any domain datasets remains a challenge due to various issues, such as resource constraints and broken links. This paper presents the challenges of interconnecting and extracting the DBpedia data with the MovieLens 1 Million dataset. This study demonstrates how LOD can be a vital yet rich source of content knowledge that helps recommender systems address the issues of data sparsity and insufficient content analysis. Based on the challenges, we proposed a few alternatives and solutions to some of the challenges.","PeriodicalId":37582,"journal":{"name":"Journal of Information Science Theory and Practice","volume":"18 1","pages":"66-82"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90640989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}