Pub Date : 2023-12-26DOI: 10.1108/lht-07-2023-0280
Asad Ullah Khan, Zhiqiang Ma, Mingxing Li, Liangze Zhi, Weijun Hu, Xia Yang
PurposeThe evolution from emerging technologies to smart libraries is thoroughly analyzed thematically and bibliometrically in this research study, spanning 2013 through 2022. Finding and analyzing the significant changes, patterns and trends in the subject as they are represented in academic papers is the goal of this research.Design/methodology/approachUsing bibliometric methodologies, this study gathered and examined a large corpus of research papers, conference papers and related material from several academic databases.FindingsStarting with Artificial Intelligence (AI), the Internet of Things (IoT), Big Data (BD), Augmentation Reality/Virtual Reality and Blockchain Technology (BT), the study discusses the advent of new technologies and their effects on libraries. Using bibliometric analysis, this study looks at the evolution of publications over time, the geographic distribution of research and the most active institutions and writers in the area. A thematic analysis is also carried out to pinpoint the critical areas of study and trends in emerging technologies and smart libraries. Some emerging themes are information retrieval, personalized recommendations, intelligent data analytics, connected library spaces, real-time information access, augmented reality/virtual reality applications in libraries and strategies, digital literacy and inclusivity.Originality/valueThis study offers a thorough overview of the research environment by combining bibliometric and thematic analysis, illustrating the development of theories and concepts during the last ten years. The results of this study helps in understanding the trends and future research directions in emerging technologies and smart libraries. This study is an excellent source of information for academics, practitioners and policymakers involved in developing and applying cutting-edge technology in library environments.
{"title":"From traditional to emerging technologies in supporting smart libraries. A bibliometric and thematic approach from 2013 to 2022","authors":"Asad Ullah Khan, Zhiqiang Ma, Mingxing Li, Liangze Zhi, Weijun Hu, Xia Yang","doi":"10.1108/lht-07-2023-0280","DOIUrl":"https://doi.org/10.1108/lht-07-2023-0280","url":null,"abstract":"PurposeThe evolution from emerging technologies to smart libraries is thoroughly analyzed thematically and bibliometrically in this research study, spanning 2013 through 2022. Finding and analyzing the significant changes, patterns and trends in the subject as they are represented in academic papers is the goal of this research.Design/methodology/approachUsing bibliometric methodologies, this study gathered and examined a large corpus of research papers, conference papers and related material from several academic databases.FindingsStarting with Artificial Intelligence (AI), the Internet of Things (IoT), Big Data (BD), Augmentation Reality/Virtual Reality and Blockchain Technology (BT), the study discusses the advent of new technologies and their effects on libraries. Using bibliometric analysis, this study looks at the evolution of publications over time, the geographic distribution of research and the most active institutions and writers in the area. A thematic analysis is also carried out to pinpoint the critical areas of study and trends in emerging technologies and smart libraries. Some emerging themes are information retrieval, personalized recommendations, intelligent data analytics, connected library spaces, real-time information access, augmented reality/virtual reality applications in libraries and strategies, digital literacy and inclusivity.Originality/valueThis study offers a thorough overview of the research environment by combining bibliometric and thematic analysis, illustrating the development of theories and concepts during the last ten years. The results of this study helps in understanding the trends and future research directions in emerging technologies and smart libraries. This study is an excellent source of information for academics, practitioners and policymakers involved in developing and applying cutting-edge technology in library environments.","PeriodicalId":47196,"journal":{"name":"Library Hi Tech","volume":"3 8","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139155573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-25DOI: 10.1108/lht-06-2023-0240
Wenyan Yu, Yiping Jiang, Tingting Fu
PurposeThis study holistically and systematically consolidates the available research on digital reading to reveal the research trends of the past 20 years. Moreover, it explores the thematic evolution, hotspots and developmental characteristics of digital reading. This study, therefore, has the potential to serve as a research guide to researchers and educators in relevant fields.Design/methodology/approachThe authors applied a bibliometric approach using Derwent Data Analyzer and VOSviewer to retrieve 2,456 publications for 2003–2022 from the Web of Science (WoS) database.FindingsThe results revealed that most studies' participants were university students and the experimental methods and questionnaires were preferred in digital reading researches. Among the influential countries or regions, institutions, journals and authors, the United States of America, University of London, Electronic Library and Chen, respectively, accounted for the greatest number of publications. Moreover, the authors identified the developmental characteristics and research trends in the field of digital reading by analyzing the evolution of keywords from 2003–2017 to 2018–2022 and the most frequently cited papers by year. “E-books,” “reading comprehension” and “literacy” were the primary research topics. In addition, “attention,” “motivation,” “cognitive load,” “dyslexia,” “engagement,” “eye-tracking,” “eye movement,” “systematic analysis,” “meta-analysis,” “smartphone” and “mobile reading/learning” were potential new research hotspots.Originality/valueThis study provides valuable insights into the current status, research direction, thematic evolution and developmental characteristics in the field of digital reading. Therefore, it has implications for publishers, researchers, librarians, educators and teachers in the digital reading field.
{"title":"Digital reading: a bibliometric and visualization analysis","authors":"Wenyan Yu, Yiping Jiang, Tingting Fu","doi":"10.1108/lht-06-2023-0240","DOIUrl":"https://doi.org/10.1108/lht-06-2023-0240","url":null,"abstract":"PurposeThis study holistically and systematically consolidates the available research on digital reading to reveal the research trends of the past 20 years. Moreover, it explores the thematic evolution, hotspots and developmental characteristics of digital reading. This study, therefore, has the potential to serve as a research guide to researchers and educators in relevant fields.Design/methodology/approachThe authors applied a bibliometric approach using Derwent Data Analyzer and VOSviewer to retrieve 2,456 publications for 2003–2022 from the Web of Science (WoS) database.FindingsThe results revealed that most studies' participants were university students and the experimental methods and questionnaires were preferred in digital reading researches. Among the influential countries or regions, institutions, journals and authors, the United States of America, University of London, Electronic Library and Chen, respectively, accounted for the greatest number of publications. Moreover, the authors identified the developmental characteristics and research trends in the field of digital reading by analyzing the evolution of keywords from 2003–2017 to 2018–2022 and the most frequently cited papers by year. “E-books,” “reading comprehension” and “literacy” were the primary research topics. In addition, “attention,” “motivation,” “cognitive load,” “dyslexia,” “engagement,” “eye-tracking,” “eye movement,” “systematic analysis,” “meta-analysis,” “smartphone” and “mobile reading/learning” were potential new research hotspots.Originality/valueThis study provides valuable insights into the current status, research direction, thematic evolution and developmental characteristics in the field of digital reading. Therefore, it has implications for publishers, researchers, librarians, educators and teachers in the digital reading field.","PeriodicalId":47196,"journal":{"name":"Library Hi Tech","volume":"38 8","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138943779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-20DOI: 10.1108/lht-05-2023-0196
Yafei Feng, Yan Zhang, Lifu Li
PurposeThe privacy calculus based on a single stakeholder failed to explain users' co-owned information disclosure owing to the uniqueness of co-owned information. Drawing on collective privacy calculus theory and impression management theory, this study attempts to explore the co-owned information disclosure of social network platform users from a collective perspective rather than an individual perspective.Design/methodology/approachDrawing on collective privacy calculus theory and impression management theory, this study explores the co-owned information disclosure of social network platform users from a collective perspective rather than an individual perspective based on a survey of 740 respondents.FindingsThis study finds that self-presentation and others presentation directly positively affect users' co-owned information disclosure. Also, self-presentation, others presentation and relationship presentation indirectly positively affect users' co-owned information disclosure via relationship support. Furthermore, personal privacy concern, others' privacy concern and relationship privacy concern indirectly negatively affect users' co-owned information disclosure via relationship risk.Originality/valueThe findings develop the theory of collective privacy calculus and impression management, which offer insights into the design of the collective privacy protection function of social network platform service providers.
{"title":"Collective impression management and collective privacy concerns in co-owned information disclosure: the mediating role of relationship support and relationship risk","authors":"Yafei Feng, Yan Zhang, Lifu Li","doi":"10.1108/lht-05-2023-0196","DOIUrl":"https://doi.org/10.1108/lht-05-2023-0196","url":null,"abstract":"PurposeThe privacy calculus based on a single stakeholder failed to explain users' co-owned information disclosure owing to the uniqueness of co-owned information. Drawing on collective privacy calculus theory and impression management theory, this study attempts to explore the co-owned information disclosure of social network platform users from a collective perspective rather than an individual perspective.Design/methodology/approachDrawing on collective privacy calculus theory and impression management theory, this study explores the co-owned information disclosure of social network platform users from a collective perspective rather than an individual perspective based on a survey of 740 respondents.FindingsThis study finds that self-presentation and others presentation directly positively affect users' co-owned information disclosure. Also, self-presentation, others presentation and relationship presentation indirectly positively affect users' co-owned information disclosure via relationship support. Furthermore, personal privacy concern, others' privacy concern and relationship privacy concern indirectly negatively affect users' co-owned information disclosure via relationship risk.Originality/valueThe findings develop the theory of collective privacy calculus and impression management, which offer insights into the design of the collective privacy protection function of social network platform service providers.","PeriodicalId":47196,"journal":{"name":"Library Hi Tech","volume":"105 46","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138958647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-18DOI: 10.1108/lht-05-2023-0194
Mojtaba Kaffashan Kakhki, J. Malin, Farahnaz Naderbeigi, Iman Maleksadati, Hassan Behzadi
PurposeThe purpose of the present study was to identify the conditions that affect the absorptive capacity (AC) of knowledge, discover its consequences and design an AC paradigm pattern in public academic libraries. To do so, AC was investigated at the levels of individual and organizational learning.Design/methodology/approachIn this paper, to answer the three major questions of this qualitative-survey study, the views of 24 experts were examined using an in-depth semi-structured interview and grounded theory strategy. The data were collected using a nonrandom combined targeted sampling procedure (targeted and snowball) and analyzed based on Strauss and Corbin’s (1998) approach and utilizing MAX Qualitative Data Analysis (MAXQDA) software.FindingsThroughout the grounded analytic stages, 121 open codes were identified. These were distributed around the AC axial category in academic libraries in terms of individual and organizational learning. The 33 axial concepts were then categorized into 16 selective general categories. The paradigm pattern was initially designed to explore the relationships between causal, intervening, strategies, context and consequences conditions. The transition from academic libraries to learning organizations, their increased functional value and the development of their innovation were identified as the consequences of AC development.Originality/valueThis qualitative research is the first in the field of Library and Information Science (LIS) to support AC both theoretically and empirically in terms of learning in academic libraries. This study thus not only addresses a key research gap in LIS but also provides significant insights and direction to interested librarians and researchers.
目的本研究旨在确定影响知识吸收能力(AC)的条件,发现其后果并设计公共学术图书馆的 AC 范式模式。本文采用深入的半结构式访谈和基础理论策略,对 24 位专家的观点进行了研究,以回答本定性调查研究的三个主要问题。数据收集采用了非随机组合定向抽样程序(定向抽样和滚雪球抽样),并根据斯特劳斯和科尔宾(1998 年)的方法,利用 MAX 定性数据分析 (MAXQDA) 软件进行了分析。这些代码围绕着学术图书馆在个人和组织学习方面的 AC 轴向类别分布。随后,33 个轴向概念被归类为 16 个选择性一般类别。范式模式最初旨在探索因果、干预、策略、背景和结果条件之间的关系。学术图书馆向学习型组织的转型、其功能价值的提升和创新能力的发展被确定为交流发展的结果。原创性/价值这项定性研究是图书馆与信息科学(LIS)领域首次从理论和实证角度支持学术图书馆学习的交流。因此,本研究不仅填补了图书馆与信息科学领域的一个重要研究空白,还为感兴趣的图书馆员和研究人员提供了重要的见解和方向。
{"title":"Designing an axial code pattern for absorptive capacity of knowledge in academic libraries: examining the effect of individual and organizational learning","authors":"Mojtaba Kaffashan Kakhki, J. Malin, Farahnaz Naderbeigi, Iman Maleksadati, Hassan Behzadi","doi":"10.1108/lht-05-2023-0194","DOIUrl":"https://doi.org/10.1108/lht-05-2023-0194","url":null,"abstract":"PurposeThe purpose of the present study was to identify the conditions that affect the absorptive capacity (AC) of knowledge, discover its consequences and design an AC paradigm pattern in public academic libraries. To do so, AC was investigated at the levels of individual and organizational learning.Design/methodology/approachIn this paper, to answer the three major questions of this qualitative-survey study, the views of 24 experts were examined using an in-depth semi-structured interview and grounded theory strategy. The data were collected using a nonrandom combined targeted sampling procedure (targeted and snowball) and analyzed based on Strauss and Corbin’s (1998) approach and utilizing MAX Qualitative Data Analysis (MAXQDA) software.FindingsThroughout the grounded analytic stages, 121 open codes were identified. These were distributed around the AC axial category in academic libraries in terms of individual and organizational learning. The 33 axial concepts were then categorized into 16 selective general categories. The paradigm pattern was initially designed to explore the relationships between causal, intervening, strategies, context and consequences conditions. The transition from academic libraries to learning organizations, their increased functional value and the development of their innovation were identified as the consequences of AC development.Originality/valueThis qualitative research is the first in the field of Library and Information Science (LIS) to support AC both theoretically and empirically in terms of learning in academic libraries. This study thus not only addresses a key research gap in LIS but also provides significant insights and direction to interested librarians and researchers.","PeriodicalId":47196,"journal":{"name":"Library Hi Tech","volume":"83 1","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139175122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-07DOI: 10.1108/lht-02-2023-0073
Xiao Meng, Chengjun Dai, Yifei Zhao, Yuan Zhou
PurposeThis study aims to investigate the mechanism of the misinformation spread based on the elaboration likelihood model and the effects of four factors – emotion, topic, authority and richness – on the depth, breadth and structural virality of misinformation spread.Design/methodology/approachThe authors collected 2,514 misinformation microblogs and 142,006 reposts from Weibo, used deep learning methods to identify the emotions and topics of misinformation and extracted the structural characteristics of the spreading network using the network analysis method.FindingsResults show that misinformation has a smaller spread size and breadth than true news but has a similar spread depth and structural virality. The differential influence of emotions on the structural characteristics of misinformation propagation was found: sadness can promote the breadth of misinformation spread, anger can promote depth and disgust can promote depth and structural virality. In addition, the international topic, the number of followers, images and videos can significantly and positively influence the misinformation's spread size, depth, breadth and structural virality.Originality/valueThe influencing factors of the structural characteristics of misinformation propagation are clarified, which is helpful for the detection and management of misinformation.
{"title":"Depth, breadth and structural virality: the influence of emotion, topic, authority and richness on misinformation spread","authors":"Xiao Meng, Chengjun Dai, Yifei Zhao, Yuan Zhou","doi":"10.1108/lht-02-2023-0073","DOIUrl":"https://doi.org/10.1108/lht-02-2023-0073","url":null,"abstract":"PurposeThis study aims to investigate the mechanism of the misinformation spread based on the elaboration likelihood model and the effects of four factors – emotion, topic, authority and richness – on the depth, breadth and structural virality of misinformation spread.Design/methodology/approachThe authors collected 2,514 misinformation microblogs and 142,006 reposts from Weibo, used deep learning methods to identify the emotions and topics of misinformation and extracted the structural characteristics of the spreading network using the network analysis method.FindingsResults show that misinformation has a smaller spread size and breadth than true news but has a similar spread depth and structural virality. The differential influence of emotions on the structural characteristics of misinformation propagation was found: sadness can promote the breadth of misinformation spread, anger can promote depth and disgust can promote depth and structural virality. In addition, the international topic, the number of followers, images and videos can significantly and positively influence the misinformation's spread size, depth, breadth and structural virality.Originality/valueThe influencing factors of the structural characteristics of misinformation propagation are clarified, which is helpful for the detection and management of misinformation.","PeriodicalId":47196,"journal":{"name":"Library Hi Tech","volume":"47 22","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138593965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-05DOI: 10.1108/lht-11-2023-0525
Manoj Kumar Verma, M. Yuvaraj
PurposeIn recent years, instant messaging platforms like WhatsApp have gained substantial popularity in both academic and practical domains. However, despite this growth, there is a lack of a comprehensive overview of the literature in this field. The primary purpose of this study is to bridge this gap by analyzing a substantial dataset of 12,947 articles retrieved from the Dimensions.ai, database spanning from 2011 to March 2023.Design/methodology/approachTo achieve the authors' objective, the authors employ bibliometric analysis techniques. The authors delve into various bibliometric networks, including citation networks, co-citation networks, collaboration networks, keywords and bibliographic couplings. These methods allow for the uncovering of the social and conceptual structures within the academic discourse surrounding WhatsApp.FindingsThe authors' analysis reveals several significant findings. Firstly, the authors observe a remarkable and continuous growth in the number of academic studies dedicated to WhatsApp over time. Notably, two prevalent themes emerge: the impact of coronavirus disease 2019 (COVID-19) and the role of WhatsApp in the realm of social media. Furthermore, the authors' study highlights diverse applications of WhatsApp, including its utilization in education and learning, as a communication tool, in medical education, cyberpsychology, security, psychology and behavioral learning.Originality/valueThis paper contributes to the field by offering a comprehensive overview of the scholarly research landscape related to WhatsApp. The findings not only illuminate the burgeoning interest in WhatsApp among researchers but also provide insights into the diverse domains where WhatsApp is making an impact. The analysis of bibliometric networks offers a unique perspective on the social and conceptual structures within this field, shedding light on emerging trends and influential research. This study thus serves as a valuable resource for scholars, practitioners and policymakers seeking to navigate the evolving landscape of WhatsApp research. The study will also be useful for researchers interested in conducting bibliometric analysis using Dimensions.ai, a free database.
{"title":"What's up in WhatsApp research: a comprehensive analysis of 12,947 papers indexed in Dimensions.ai","authors":"Manoj Kumar Verma, M. Yuvaraj","doi":"10.1108/lht-11-2023-0525","DOIUrl":"https://doi.org/10.1108/lht-11-2023-0525","url":null,"abstract":"PurposeIn recent years, instant messaging platforms like WhatsApp have gained substantial popularity in both academic and practical domains. However, despite this growth, there is a lack of a comprehensive overview of the literature in this field. The primary purpose of this study is to bridge this gap by analyzing a substantial dataset of 12,947 articles retrieved from the Dimensions.ai, database spanning from 2011 to March 2023.Design/methodology/approachTo achieve the authors' objective, the authors employ bibliometric analysis techniques. The authors delve into various bibliometric networks, including citation networks, co-citation networks, collaboration networks, keywords and bibliographic couplings. These methods allow for the uncovering of the social and conceptual structures within the academic discourse surrounding WhatsApp.FindingsThe authors' analysis reveals several significant findings. Firstly, the authors observe a remarkable and continuous growth in the number of academic studies dedicated to WhatsApp over time. Notably, two prevalent themes emerge: the impact of coronavirus disease 2019 (COVID-19) and the role of WhatsApp in the realm of social media. Furthermore, the authors' study highlights diverse applications of WhatsApp, including its utilization in education and learning, as a communication tool, in medical education, cyberpsychology, security, psychology and behavioral learning.Originality/valueThis paper contributes to the field by offering a comprehensive overview of the scholarly research landscape related to WhatsApp. The findings not only illuminate the burgeoning interest in WhatsApp among researchers but also provide insights into the diverse domains where WhatsApp is making an impact. The analysis of bibliometric networks offers a unique perspective on the social and conceptual structures within this field, shedding light on emerging trends and influential research. This study thus serves as a valuable resource for scholars, practitioners and policymakers seeking to navigate the evolving landscape of WhatsApp research. The study will also be useful for researchers interested in conducting bibliometric analysis using Dimensions.ai, a free database.","PeriodicalId":47196,"journal":{"name":"Library Hi Tech","volume":"92 24","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138600164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-30DOI: 10.1108/lht-09-2022-0420
Mehdi Dadkhah, F. Rahimnia, A. Memon
PurposeScientific publishing has recently faced challenges in dealing with questionable (predatory and hijacked) journals. The presence of questionable journals in any field, including management science, will yield junk science. Although there are studies about questionable journals in other fields, these journals have not yet been examined in the field of business and management. This study aims to identify facilitators and barriers to dealing with questionable journals in management science.Design/methodology/approachA Delphi research method consisting of three rounds was used in this study. Data were collected from 12 experts in the first two rounds, and ten experts in the final round.FindingsThe present study shows that management science is vulnerable to questionable journals. A total of 18 barriers and eight facilitators to dealing with questionable journals in management science were found. The present study also identifies some new barriers and facilitators for avoiding questionable journals, which are specific to management science and have not been identified in previous research. Most of these barriers and facilitators were identified as “important” or “very important”. Publishers and scientific databases, government, the research community and universities and research centers were identified as critical players in overcoming challenges posed by questionable journals.Originality/valueThe number of articles that investigate predatory journals in management science is limited, and there is no research focused specifically on hijacked journals in this field. This study identifies facilitators and obstacles to dealing with predatory and hijacked journals in the field of management, by gathering opinions from experts. Thus it is the first study to examine hijacked journals in the field of management science. It is also one of the few studies that examine predatory and hijacked journals by conducting exploratory research rather than with a descriptive/conceptual approach.
{"title":"Facilitators and barriers to dealing with questionable journals in management science","authors":"Mehdi Dadkhah, F. Rahimnia, A. Memon","doi":"10.1108/lht-09-2022-0420","DOIUrl":"https://doi.org/10.1108/lht-09-2022-0420","url":null,"abstract":"PurposeScientific publishing has recently faced challenges in dealing with questionable (predatory and hijacked) journals. The presence of questionable journals in any field, including management science, will yield junk science. Although there are studies about questionable journals in other fields, these journals have not yet been examined in the field of business and management. This study aims to identify facilitators and barriers to dealing with questionable journals in management science.Design/methodology/approachA Delphi research method consisting of three rounds was used in this study. Data were collected from 12 experts in the first two rounds, and ten experts in the final round.FindingsThe present study shows that management science is vulnerable to questionable journals. A total of 18 barriers and eight facilitators to dealing with questionable journals in management science were found. The present study also identifies some new barriers and facilitators for avoiding questionable journals, which are specific to management science and have not been identified in previous research. Most of these barriers and facilitators were identified as “important” or “very important”. Publishers and scientific databases, government, the research community and universities and research centers were identified as critical players in overcoming challenges posed by questionable journals.Originality/valueThe number of articles that investigate predatory journals in management science is limited, and there is no research focused specifically on hijacked journals in this field. This study identifies facilitators and obstacles to dealing with predatory and hijacked journals in the field of management, by gathering opinions from experts. Thus it is the first study to examine hijacked journals in the field of management science. It is also one of the few studies that examine predatory and hijacked journals by conducting exploratory research rather than with a descriptive/conceptual approach.","PeriodicalId":47196,"journal":{"name":"Library Hi Tech","volume":"120 1","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139200527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Editorial: Special selection on advances in learning technologies","authors":"Kevin K. W. Ho, Dickson K. W. Chiu","doi":"10.1108/lht-12-2023-590","DOIUrl":"https://doi.org/10.1108/lht-12-2023-590","url":null,"abstract":"","PeriodicalId":47196,"journal":{"name":"Library Hi Tech","volume":"12 1 1","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139283888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-06DOI: 10.1108/lht-06-2023-0219
Hoi Ching Cheung, Yan Yin Marco Lo, Dickson K.W. Chiu, Elaine W.S. Kong
Purpose This study examines academic librarians' perceptions and attitudes toward Internet of Things (IoT) applications in Hong Kong academic libraries and the problems and possible improvements in using IoT technologies to strengthen library services. Design/methodology/approach This qualitative research used video conferencing software for semi-structured, one-on-one interviews. Participants were given introductory material about the IoT and asked to complete an interview. The data were analyzed using inductive theme clustering for this study. Findings The analysis identified three themes: perception about applying IoT technology to the library, problems and improvements in using IoT. Participants were generally optimistic about the potential benefits of IoT for improving library operations and providing personalized services. However, they also expressed concerns about privacy and security, errors and extra efforts for information literacy training. They suggested improvements such as incorporating facial recognition technology, advanced RFID technology and collections identification technology to enhance user experience. Originality/value Most studies examined users' views rather than librarians' on IoT applications, which few studies cover, especially in East Asia.
{"title":"Development of smart academic library services with Internet of Things technology: a qualitative study in Hong Kong","authors":"Hoi Ching Cheung, Yan Yin Marco Lo, Dickson K.W. Chiu, Elaine W.S. Kong","doi":"10.1108/lht-06-2023-0219","DOIUrl":"https://doi.org/10.1108/lht-06-2023-0219","url":null,"abstract":"Purpose This study examines academic librarians' perceptions and attitudes toward Internet of Things (IoT) applications in Hong Kong academic libraries and the problems and possible improvements in using IoT technologies to strengthen library services. Design/methodology/approach This qualitative research used video conferencing software for semi-structured, one-on-one interviews. Participants were given introductory material about the IoT and asked to complete an interview. The data were analyzed using inductive theme clustering for this study. Findings The analysis identified three themes: perception about applying IoT technology to the library, problems and improvements in using IoT. Participants were generally optimistic about the potential benefits of IoT for improving library operations and providing personalized services. However, they also expressed concerns about privacy and security, errors and extra efforts for information literacy training. They suggested improvements such as incorporating facial recognition technology, advanced RFID technology and collections identification technology to enhance user experience. Originality/value Most studies examined users' views rather than librarians' on IoT applications, which few studies cover, especially in East Asia.","PeriodicalId":47196,"journal":{"name":"Library Hi Tech","volume":"85 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135585247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-30DOI: 10.1108/lht-06-2023-0265
Suhans Bansal, Naval Garg, Jagvinder Singh
Purpose Cyberbullying has become one of the reasons behind the increase in psychological and medical problems. A need to prevent recurrences of cyberbullying incidents and discourage bullies from further bullying the victims has risen. This problem has attracted the attention of all stakeholders across the globe. Various researchers have developed theories and interventions to detect and stop bullying behavior. Previously, researchers focused on helping victims, but as the times have changed, so has the focus of researchers. This study aims to analyze scientific research articles and review papers to understand the development of the knowledge base on the topic. Design/methodology/approach This study analyzes the performance of literature on cyberbullying perpetration (CBP) using the widely accepted bibliometric analysis techniques: performance analysis and science mapping. The study is based on a dataset extracted from the Web of Science database. Initially, 2,792 articles between 2007 and 2022 were retrieved, which were filtered down to 441. The filter was based on various criteria, but primarily on CBP. VOSViewer and MS Excel were used to analyze the data. In addition, VOSViewer was used to create “bibliometric citations, co-citations, and co-word maps.” Findings The findings include publication and citation quantum and trends, the top 20 active countries, the most significant research articles and leading journals in this domain. Major themes or clusters identified were “Cyberbullying and victim behavior,” bullying behavior, adolescents and intervention, “cyberbullying associations,” and “cyberbullying personality associations.” Originality/value The study is unique because it analyses research articles based on cyberbullies, whereas past studies explored only the victims' side. Further, the present study used the Web of Science database, whereas most studies use the Scopus database.
网络欺凌已经成为心理和医疗问题增加的原因之一。防止网络欺凌事件再次发生和阻止欺凌者进一步欺凌受害者的必要性已经上升。这一问题已引起全球所有利益攸关方的关注。各种各样的研究人员已经开发出理论和干预措施来检测和制止欺凌行为。以前,研究人员专注于帮助受害者,但随着时代的变化,研究人员的重点也发生了变化。本研究旨在分析科研论文和综述论文,以了解该主题知识库的发展情况。本研究采用广泛接受的文献计量学分析技术:绩效分析和科学制图,分析了网络欺凌犯罪(CBP)文献的绩效。这项研究基于从Web of Science数据库中提取的数据集。最初,检索了2007年至2022年期间的2792篇文章,然后过滤到441篇。筛选基于各种标准,但主要是CBP。使用VOSViewer和MS Excel对数据进行分析。此外,VOSViewer还用于创建“文献计量引用、共引用和共词图”。调查结果包括该领域的出版物和引文数量和趋势、前20个活跃国家、最重要的研究文章和领先期刊。确定的主要主题或集群为“网络欺凌与受害者行为”、欺凌行为、青少年与干预、“网络欺凌关联”和“网络欺凌人格关联”。独创性/价值这项研究的独特之处在于,它分析了基于网络恶霸的研究文章,而过去的研究只探讨了受害者的一面。此外,本研究使用了Web of Science数据库,而大多数研究使用的是Scopus数据库。
{"title":"Perpetrators' perspective on cyberbullying: a qualitative systematic review with bibliometric analysis","authors":"Suhans Bansal, Naval Garg, Jagvinder Singh","doi":"10.1108/lht-06-2023-0265","DOIUrl":"https://doi.org/10.1108/lht-06-2023-0265","url":null,"abstract":"Purpose Cyberbullying has become one of the reasons behind the increase in psychological and medical problems. A need to prevent recurrences of cyberbullying incidents and discourage bullies from further bullying the victims has risen. This problem has attracted the attention of all stakeholders across the globe. Various researchers have developed theories and interventions to detect and stop bullying behavior. Previously, researchers focused on helping victims, but as the times have changed, so has the focus of researchers. This study aims to analyze scientific research articles and review papers to understand the development of the knowledge base on the topic. Design/methodology/approach This study analyzes the performance of literature on cyberbullying perpetration (CBP) using the widely accepted bibliometric analysis techniques: performance analysis and science mapping. The study is based on a dataset extracted from the Web of Science database. Initially, 2,792 articles between 2007 and 2022 were retrieved, which were filtered down to 441. The filter was based on various criteria, but primarily on CBP. VOSViewer and MS Excel were used to analyze the data. In addition, VOSViewer was used to create “bibliometric citations, co-citations, and co-word maps.” Findings The findings include publication and citation quantum and trends, the top 20 active countries, the most significant research articles and leading journals in this domain. Major themes or clusters identified were “Cyberbullying and victim behavior,” bullying behavior, adolescents and intervention, “cyberbullying associations,” and “cyberbullying personality associations.” Originality/value The study is unique because it analyses research articles based on cyberbullies, whereas past studies explored only the victims' side. Further, the present study used the Web of Science database, whereas most studies use the Scopus database.","PeriodicalId":47196,"journal":{"name":"Library Hi Tech","volume":"182 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136105933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}