This master thesis focused on reading interest and information behavior of prisoners as a socially excluded group that faces complex and varied obstacles when accessing information and reading material. The study conducted as a part of the thesis sought to answer the following research questions: What are the information needs of prisoners? How do prisoners obtain the required information? What obstacles do they meet in that process? What are the prisoners’ reading interests and habits? How do prisoners perceive and use prison libraries? Data was collected by means of a questionnaire distributed to male and female inmates in six Croatian prisons across the country. The study provided rich data which can help the administration in Croatian prisons in their efforts to provide responsive library collections and information services.
{"title":"Information Needs and Reading Interests of Prisoners","authors":"M. Bajic","doi":"10.5281/zenodo.17931","DOIUrl":"https://doi.org/10.5281/zenodo.17931","url":null,"abstract":"This master thesis focused on reading interest and information behavior of prisoners as a socially excluded group that faces complex and varied obstacles when accessing information and reading material. The study conducted as a part of the thesis sought to answer the following research questions: What are the information needs of prisoners? How do prisoners obtain the required information? What obstacles do they meet in that process? What are the prisoners’ reading interests and habits? How do prisoners perceive and use prison libraries? Data was collected by means of a questionnaire distributed to male and female inmates in six Croatian prisons across the country. The study provided rich data which can help the administration in Croatian prisons in their efforts to provide responsive library collections and information services.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"70 1","pages":"522-527"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78734389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays social network sites are present in all parts of our daily life. Nevertheless there are a lot of people who do not use them. What reasons do non-users have for their abstinence of social network sites? To answer this question six semi-structured interviews with German non-users were conducted. A qualitative analysis of the data shows that there are two main relevant aspects. Firstly, their general life situation, and secondly, different reasons for the abstinence of social network sites need to be considered. Two of these reasons which we identified have not been revealed in previous research. The concept of friendship and the communication style in social network sites as e.g. users who show a distorted presentation of themselves to show off were strong motives for abstinence.
{"title":"\"I realized that Facebook is just totally absurd\" - Reasons of Non-users for Their Abstinence from Social Network Sites","authors":"C. Klingeberg, G. Irle, Thomas Mandl","doi":"10.5281/zenodo.17935","DOIUrl":"https://doi.org/10.5281/zenodo.17935","url":null,"abstract":"Nowadays social network sites are present in all parts of our daily life. Nevertheless there are a lot of people who do not use them. What reasons do non-users have for their abstinence of social network sites? To answer this question six semi-structured interviews with German non-users were conducted. A qualitative analysis of the data shows that there are two main relevant aspects. Firstly, their general life situation, and secondly, different reasons for the abstinence of social network sites need to be considered. Two of these reasons which we identified have not been revealed in previous research. The concept of friendship and the communication style in social network sites as e.g. users who show a distorted presentation of themselves to show off were strong motives for abstinence.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"73 1","pages":"326-337"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88747553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Research Question: Should photographs of landmarks be displayed in indoor pedestrian navigation systems? At which point of the navigational task can these interfaces support the user? Approach: Two different navigation prototypes were implemented: one of them used photographs of landmarks to explain the route, whereas the other one showed a mobile map. Method: The time it took the users to orient themselves was recorded with the smartphone application and served as a depended variable. Results: Users performed significantly better with the navigation prototype using photographs, especially if the navigation instruction is given at a route point with a high branching factor and thus high complexity.
{"title":"Photographs or Mobile Maps? - Displaying Landmarks in Pedestrian Navigation Systems","authors":"Christina Ohm, Bernd Ludwig, Saskia Gerstmeier","doi":"10.5281/ZENODO.17929","DOIUrl":"https://doi.org/10.5281/ZENODO.17929","url":null,"abstract":"Research Question: Should photographs of landmarks be displayed in indoor pedestrian navigation systems? At which point of the navigational task can these interfaces support the user? Approach: Two different navigation prototypes were implemented: one of them used photographs of landmarks to explain the route, whereas the other one showed a mobile map. Method: The time it took the users to orient themselves was recorded with the smartphone application and served as a depended variable. Results: Users performed significantly better with the navigation prototype using photographs, especially if the navigation instruction is given at a route point with a high branching factor and thus high complexity.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"14 1","pages":"302-312"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87722342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Research Question: How do participants behave when asked to rate objects’ visual dimensions? Approach: Qualitative Data Analysis Method: 90 participants were asked to rate 11 objects located along a route of 1.1 km length and asked to explain their rating behaviour using a think-aloud protocol. Results: If asked to rate several objects, participants tend to stop reading the questions as a whole. Moreover, when judging objects on visual dimensions they make inconsistent use of local neighbourhoods.
{"title":"How Do Participants Deal with Questions if Asked to Rate Visual Dimensions of an Object?","authors":"Markus Kattenbeck","doi":"10.5281/ZENODO.17941","DOIUrl":"https://doi.org/10.5281/ZENODO.17941","url":null,"abstract":"Research Question: How do participants behave when asked to rate objects’ visual dimensions?\u0000Approach: Qualitative Data Analysis\u0000Method: 90 participants were asked to rate 11 objects located along a route of 1.1 km length and asked to explain their rating behaviour using a think-aloud protocol.\u0000Results: If asked to rate several objects, participants tend to stop reading the questions as a whole. Moreover, when judging objects on visual dimensions they make inconsistent use of local neighbourhoods.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"115 1","pages":"313-319"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73148867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dealing with research data as the basis of academic research is a new field for libraries. Their role and scope in this new field is still being discussed and gains importance within the changing reality of the digital academic research setting. In Anglo-American countries, the concept of information literacy has been broadened and now includes the whole academic research process as well as dealing with research data. Research data management activities, in particular with regard to information literacy, have mainly been developed and examined in the USA, Great Britain and Australia. To complete the picture, the author examined the situation at New Zealand university libraries. New Zealand has a small but well-
{"title":"Research Data Management and Information Literacy - New Developments at New Zealand University Libraries","authors":"Katrin Steiner","doi":"10.5281/zenodo.17961","DOIUrl":"https://doi.org/10.5281/zenodo.17961","url":null,"abstract":"Dealing with research data as the basis of academic research is a new field for libraries. Their role and scope in this new field is still being discussed and gains importance within the changing reality of the digital academic research setting. In Anglo-American countries, the concept of information literacy has been broadened and now includes the whole academic research process as well as dealing with research data. Research data management activities, in particular with regard to information literacy, have mainly been developed and examined in the USA, Great Britain and Australia. To complete the picture, the author examined the situation at New Zealand university libraries. New Zealand has a small but well-","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"562-568"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76713698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we discuss, under a critical point of view, the current Information Science landscape and some future prospects regarding contemporary information phenomena. We present thoughts about the process of thematic deflation of Information Science, through the analysis of the research objects currently under development in this field. In addition to this, we look at the process of absorption of these and other relevant objects in distinguished knowledge fields. We seek to challenge the emphasis and the volume of interdisciplinary research within the field, and present some comments about what might be the results of such processes for the future of Information Science. Subsequently, we analyze the impact in the Information Science field due to phenomena like information boom, the consolidation of the social networks as interactive spaces, cloud computing, as well as other key elements.
{"title":"Looking for the Identity of Information Science in the Age of Big Data, Computing Clouds and Social Networks","authors":"M. Almeida, R. R. Souza, R. B. Porto","doi":"10.5281/zenodo.17953","DOIUrl":"https://doi.org/10.5281/zenodo.17953","url":null,"abstract":"In this paper we discuss, under a critical point of view, the current Information Science landscape and some future prospects regarding contemporary information phenomena. We present thoughts about the process of thematic deflation of Information Science, through the analysis of the research objects currently under development in this field. In addition to this, we look at the process of absorption of these and other relevant objects in distinguished knowledge fields. We seek to challenge the emphasis and the volume of interdisciplinary research within the field, and present some comments about what might be the results of such processes for the future of Information Science. Subsequently, we analyze the impact in the Information Science field due to phenomena like information boom, the consolidation of the social networks as interactive spaces, cloud computing, as well as other key elements.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"42 1","pages":"55-65"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80286302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Introduction. This article introduces two methods of information need analysis to study the acceptance of so-called “ubiquitous services” (u-services) in a ubiquitous and “smart” city. Case study is New Songdo City in South Korea. Our research is motivated by questions like: (1) Do such cities really react to the information needs of people? and (2) How can one ascertain the success of a u-city in regard to the information needs? Methods . To capture both questions we applied a ServQual-like survey as well as Customer Value Research as methods of information need analysis and interviewed residents in Songdo in early 2013. Results. In regard to methodology, both methods proved to be very useful. The information needs of our residents are more or less satisfied with the offered u-services; the grade of irritation between developers and customers is rather low. Discussion. Our research in Songdo provides first results in regard to the information need of the customers and the usefulness of the u-services in Songdo. For the future work it is important to continue and expand the research.
{"title":"Customer Value Research and ServQual Surveys as Methods for Information Need Analysis - The Ubiquitous City Songdo as a Case Study","authors":"Aylin Ilhan, R. Möhlmann, Wolfgang G. Stock","doi":"10.5281/zenodo.17972","DOIUrl":"https://doi.org/10.5281/zenodo.17972","url":null,"abstract":"Introduction. This article introduces two methods of information need analysis to study the acceptance of so-called “ubiquitous services” (u-services) in a ubiquitous and “smart” city. Case study is New Songdo City in South Korea. Our research is motivated by questions like: (1) Do such cities really react to the information needs of people? and (2) How can one ascertain the success of a u-city in regard to the information needs? Methods . To capture both questions we applied a ServQual-like survey as well as Customer Value Research as methods of information need analysis and interviewed residents in Songdo in early 2013. Results. In regard to methodology, both methods proved to be very useful. The information needs of our residents are more or less satisfied with the offered u-services; the grade of irritation between developers and customers is rather low. Discussion. Our research in Songdo provides first results in regard to the information need of the customers and the usefulness of the u-services in Songdo. For the future work it is important to continue and expand the research.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"28 1","pages":"457-468"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75293925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social media services like Twitter churn out user-generated content in vast amounts. The massive availability of this kind of data demands new forms of analysis and visualization, to make it accessible and interpretable. In this article, we introduce Twista, an application that can be used to create tailored tweet collections according to specific filter criteria, such as the occurrence of certain keywords or hashtags. Once the tweet collection has been created, Twista calculates basic statistics, e.g. the average tweet length or the most active user. Furthermore, the application can perform basic sentiment analysis, analyze tweets with regard to their date of publication, and analyze the communication between different Twitter users. The results of these analyses are visualized by means of the data driven documents toolkit (d3.js) and can be viewed directly in the browser, or are available for download in PDF and JSON format. We also present three exemplary use cases that illustrate the possible use of Twista for different scenarios.
{"title":"Twista - An Application for the Analysis and Visualization of Tailored Tweet Collections","authors":"S. Spanner, M. Burghardt, Christian Wolff","doi":"10.5281/zenodo.17959","DOIUrl":"https://doi.org/10.5281/zenodo.17959","url":null,"abstract":"Social media services like Twitter churn out user-generated content in vast amounts. The massive availability of this kind of data demands new forms of analysis and visualization, to make it accessible and interpretable. In this article, we introduce Twista, an application that can be used to create tailored tweet collections according to specific filter criteria, such as the occurrence of certain keywords or hashtags. Once the tweet collection has been created, Twista calculates basic statistics, e.g. the average tweet length or the most active user. Furthermore, the application can perform basic sentiment analysis, analyze tweets with regard to their date of publication, and analyze the communication between different Twitter users. The results of these analyses are visualized by means of the data driven documents toolkit (d3.js) and can be viewed directly in the browser, or are available for download in PDF and JSON format. We also present three exemplary use cases that illustrate the possible use of Twista for different scenarios.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"70 1","pages":"191-202"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85467485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper can best be described as a report “from the trenches”. Standards for bibliographical data have changed significantly through unprecedented change processes since the turn of the century; change processes that are on-going. The new rules and standards were developed through a far reaching dialogue process. A new data model, new cataloguing principles and rules were developed as a response to the then new digital environment. The aim was to provide standards that transcend any specific data format and could be applied globally not only in libraries but in any context where bibliographic data is of relevance. Such adaptability entails that each community that im-plements these new rules and guidelines has to decide how to correlate them with what has been tradition thus far. Much has been written about the defi-ciencies and benefits of, for example, RDA. Yet, not only the results of the changes provide crucial insights but equally the continuing processes associ-ated with them. The Austrian Library Network will implement RDA by 2016 and is in the middle of a change process in the form of training the trainers; thus receiving immediate feedback on contradictions and unresolved issues. This paper, in a first section, traces the change processes that brought about new standards. It does not purport to be a concise history but aims at delinea-ting the dynamics of change. The second section focuses on issues and ques-tions that arose from the dialogue process in train the trainer sessions orga-nised by the Austrian Library Network when practitioners responded and In: Session 2: Object Description and Metadata Standards questioned the new rules and standards. These issues are reflected in regard to the respective differences in cataloguing rules, standards and traditions. This paper applies two methodologies for a critical appraisal of recent developments regarding standards for bibliographical data. A first section traces the history of the change processes by highlighting key moments and decisions to delineate the context from which these new standards originated. Furthermore, it will be possible to highlight key challenges and problems that had to be resolved. The second section, based on discussions in train the trainer sessions, evaluates datasets which followed different standards. The analysis will outline the changes and differences as well as possible redundancies. This is of interest as change entails both gains and losses in bibliographic accuracy. The question is if this is an inevitable by-product of moving across diverse standards, even more so if the new rules aimed at being compatible with a variety of different existing standards.
{"title":"Redefining Bibliographical Standards - Changes & Practical Implications","authors":"C. Ginther, Stefan Schuh","doi":"10.5281/zenodo.17954","DOIUrl":"https://doi.org/10.5281/zenodo.17954","url":null,"abstract":"This paper can best be described as a report “from the trenches”. Standards for bibliographical data have changed significantly through unprecedented change processes since the turn of the century; change processes that are on-going. The new rules and standards were developed through a far reaching dialogue process. A new data model, new cataloguing principles and rules were developed as a response to the then new digital environment. The aim was to provide standards that transcend any specific data format and could be applied globally not only in libraries but in any context where bibliographic data is of relevance. Such adaptability entails that each community that im-plements these new rules and guidelines has to decide how to correlate them with what has been tradition thus far. Much has been written about the defi-ciencies and benefits of, for example, RDA. Yet, not only the results of the changes provide crucial insights but equally the continuing processes associ-ated with them. The Austrian Library Network will implement RDA by 2016 and is in the middle of a change process in the form of training the trainers; thus receiving immediate feedback on contradictions and unresolved issues. This paper, in a first section, traces the change processes that brought about new standards. It does not purport to be a concise history but aims at delinea-ting the dynamics of change. The second section focuses on issues and ques-tions that arose from the dialogue process in train the trainer sessions orga-nised by the Austrian Library Network when practitioners responded and In: Session 2: Object Description and Metadata Standards questioned the new rules and standards. These issues are reflected in regard to the respective differences in cataloguing rules, standards and traditions. This paper applies two methodologies for a critical appraisal of recent developments regarding standards for bibliographical data. A first section traces the history of the change processes by highlighting key moments and decisions to delineate the context from which these new standards originated. Furthermore, it will be possible to highlight key challenges and problems that had to be resolved. The second section, based on discussions in train the trainer sessions, evaluates datasets which followed different standards. The analysis will outline the changes and differences as well as possible redundancies. This is of interest as change entails both gains and losses in bibliographic accuracy. The question is if this is an inevitable by-product of moving across diverse standards, even more so if the new rules aimed at being compatible with a variety of different existing standards.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"66 1","pages":"129-143"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88963098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With an increasing number of the visually impaired elderly population libraries need to adjust their services to this audience which is often under the risk of becoming library non-users. The aim of this paper is to determine the profile and reasons for non-use of library services by the visually impaired elderly basing on the case study of the Lithuanian Library for the Blind (LLB). Findings of the structured interview survey have shown that most non-users don’t use libraries due to low motivation, health and mobility issues. They have few purposes for information use, get it incidentally, and apply the sim-plest and easy-to-reach assistive technology. The findings can be used in libraries to develop targeted services for this population.
{"title":"Understanding the Elderly Non-users with Visual Impairments - The Case of the Lithuanian Library for the Blind","authors":"Zinaida Manzuch, Rasa Januseviciene","doi":"10.5281/zenodo.17943","DOIUrl":"https://doi.org/10.5281/zenodo.17943","url":null,"abstract":"With an increasing number of the visually impaired elderly population libraries need to adjust their services to this audience which is often under the risk of becoming library non-users. The aim of this paper is to determine the profile and reasons for non-use of library services by the visually impaired elderly basing on the case study of the Lithuanian Library for the Blind (LLB). Findings of the structured interview survey have shown that most non-users don’t use libraries due to low motivation, health and mobility issues. They have few purposes for information use, get it incidentally, and apply the sim-plest and easy-to-reach assistive technology. The findings can be used in libraries to develop targeted services for this population.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"119 1","pages":"338-349"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88442222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}