Research Question: How do participants behave when asked to rate objects’ visual dimensions? Approach: Qualitative Data Analysis Method: 90 participants were asked to rate 11 objects located along a route of 1.1 km length and asked to explain their rating behaviour using a think-aloud protocol. Results: If asked to rate several objects, participants tend to stop reading the questions as a whole. Moreover, when judging objects on visual dimensions they make inconsistent use of local neighbourhoods.
{"title":"How Do Participants Deal with Questions if Asked to Rate Visual Dimensions of an Object?","authors":"Markus Kattenbeck","doi":"10.5281/ZENODO.17941","DOIUrl":"https://doi.org/10.5281/ZENODO.17941","url":null,"abstract":"Research Question: How do participants behave when asked to rate objects’ visual dimensions?\u0000Approach: Qualitative Data Analysis\u0000Method: 90 participants were asked to rate 11 objects located along a route of 1.1 km length and asked to explain their rating behaviour using a think-aloud protocol.\u0000Results: If asked to rate several objects, participants tend to stop reading the questions as a whole. Moreover, when judging objects on visual dimensions they make inconsistent use of local neighbourhoods.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"115 1","pages":"313-319"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73148867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social media services like Twitter churn out user-generated content in vast amounts. The massive availability of this kind of data demands new forms of analysis and visualization, to make it accessible and interpretable. In this article, we introduce Twista, an application that can be used to create tailored tweet collections according to specific filter criteria, such as the occurrence of certain keywords or hashtags. Once the tweet collection has been created, Twista calculates basic statistics, e.g. the average tweet length or the most active user. Furthermore, the application can perform basic sentiment analysis, analyze tweets with regard to their date of publication, and analyze the communication between different Twitter users. The results of these analyses are visualized by means of the data driven documents toolkit (d3.js) and can be viewed directly in the browser, or are available for download in PDF and JSON format. We also present three exemplary use cases that illustrate the possible use of Twista for different scenarios.
{"title":"Twista - An Application for the Analysis and Visualization of Tailored Tweet Collections","authors":"S. Spanner, M. Burghardt, Christian Wolff","doi":"10.5281/zenodo.17959","DOIUrl":"https://doi.org/10.5281/zenodo.17959","url":null,"abstract":"Social media services like Twitter churn out user-generated content in vast amounts. The massive availability of this kind of data demands new forms of analysis and visualization, to make it accessible and interpretable. In this article, we introduce Twista, an application that can be used to create tailored tweet collections according to specific filter criteria, such as the occurrence of certain keywords or hashtags. Once the tweet collection has been created, Twista calculates basic statistics, e.g. the average tweet length or the most active user. Furthermore, the application can perform basic sentiment analysis, analyze tweets with regard to their date of publication, and analyze the communication between different Twitter users. The results of these analyses are visualized by means of the data driven documents toolkit (d3.js) and can be viewed directly in the browser, or are available for download in PDF and JSON format. We also present three exemplary use cases that illustrate the possible use of Twista for different scenarios.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"70 1","pages":"191-202"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85467485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper can best be described as a report “from the trenches”. Standards for bibliographical data have changed significantly through unprecedented change processes since the turn of the century; change processes that are on-going. The new rules and standards were developed through a far reaching dialogue process. A new data model, new cataloguing principles and rules were developed as a response to the then new digital environment. The aim was to provide standards that transcend any specific data format and could be applied globally not only in libraries but in any context where bibliographic data is of relevance. Such adaptability entails that each community that im-plements these new rules and guidelines has to decide how to correlate them with what has been tradition thus far. Much has been written about the defi-ciencies and benefits of, for example, RDA. Yet, not only the results of the changes provide crucial insights but equally the continuing processes associ-ated with them. The Austrian Library Network will implement RDA by 2016 and is in the middle of a change process in the form of training the trainers; thus receiving immediate feedback on contradictions and unresolved issues. This paper, in a first section, traces the change processes that brought about new standards. It does not purport to be a concise history but aims at delinea-ting the dynamics of change. The second section focuses on issues and ques-tions that arose from the dialogue process in train the trainer sessions orga-nised by the Austrian Library Network when practitioners responded and In: Session 2: Object Description and Metadata Standards questioned the new rules and standards. These issues are reflected in regard to the respective differences in cataloguing rules, standards and traditions. This paper applies two methodologies for a critical appraisal of recent developments regarding standards for bibliographical data. A first section traces the history of the change processes by highlighting key moments and decisions to delineate the context from which these new standards originated. Furthermore, it will be possible to highlight key challenges and problems that had to be resolved. The second section, based on discussions in train the trainer sessions, evaluates datasets which followed different standards. The analysis will outline the changes and differences as well as possible redundancies. This is of interest as change entails both gains and losses in bibliographic accuracy. The question is if this is an inevitable by-product of moving across diverse standards, even more so if the new rules aimed at being compatible with a variety of different existing standards.
{"title":"Redefining Bibliographical Standards - Changes & Practical Implications","authors":"C. Ginther, Stefan Schuh","doi":"10.5281/zenodo.17954","DOIUrl":"https://doi.org/10.5281/zenodo.17954","url":null,"abstract":"This paper can best be described as a report “from the trenches”. Standards for bibliographical data have changed significantly through unprecedented change processes since the turn of the century; change processes that are on-going. The new rules and standards were developed through a far reaching dialogue process. A new data model, new cataloguing principles and rules were developed as a response to the then new digital environment. The aim was to provide standards that transcend any specific data format and could be applied globally not only in libraries but in any context where bibliographic data is of relevance. Such adaptability entails that each community that im-plements these new rules and guidelines has to decide how to correlate them with what has been tradition thus far. Much has been written about the defi-ciencies and benefits of, for example, RDA. Yet, not only the results of the changes provide crucial insights but equally the continuing processes associ-ated with them. The Austrian Library Network will implement RDA by 2016 and is in the middle of a change process in the form of training the trainers; thus receiving immediate feedback on contradictions and unresolved issues. This paper, in a first section, traces the change processes that brought about new standards. It does not purport to be a concise history but aims at delinea-ting the dynamics of change. The second section focuses on issues and ques-tions that arose from the dialogue process in train the trainer sessions orga-nised by the Austrian Library Network when practitioners responded and In: Session 2: Object Description and Metadata Standards questioned the new rules and standards. These issues are reflected in regard to the respective differences in cataloguing rules, standards and traditions. This paper applies two methodologies for a critical appraisal of recent developments regarding standards for bibliographical data. A first section traces the history of the change processes by highlighting key moments and decisions to delineate the context from which these new standards originated. Furthermore, it will be possible to highlight key challenges and problems that had to be resolved. The second section, based on discussions in train the trainer sessions, evaluates datasets which followed different standards. The analysis will outline the changes and differences as well as possible redundancies. This is of interest as change entails both gains and losses in bibliographic accuracy. The question is if this is an inevitable by-product of moving across diverse standards, even more so if the new rules aimed at being compatible with a variety of different existing standards.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"66 1","pages":"129-143"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88963098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With an increasing number of the visually impaired elderly population libraries need to adjust their services to this audience which is often under the risk of becoming library non-users. The aim of this paper is to determine the profile and reasons for non-use of library services by the visually impaired elderly basing on the case study of the Lithuanian Library for the Blind (LLB). Findings of the structured interview survey have shown that most non-users don’t use libraries due to low motivation, health and mobility issues. They have few purposes for information use, get it incidentally, and apply the sim-plest and easy-to-reach assistive technology. The findings can be used in libraries to develop targeted services for this population.
{"title":"Understanding the Elderly Non-users with Visual Impairments - The Case of the Lithuanian Library for the Blind","authors":"Zinaida Manzuch, Rasa Januseviciene","doi":"10.5281/zenodo.17943","DOIUrl":"https://doi.org/10.5281/zenodo.17943","url":null,"abstract":"With an increasing number of the visually impaired elderly population libraries need to adjust their services to this audience which is often under the risk of becoming library non-users. The aim of this paper is to determine the profile and reasons for non-use of library services by the visually impaired elderly basing on the case study of the Lithuanian Library for the Blind (LLB). Findings of the structured interview survey have shown that most non-users don’t use libraries due to low motivation, health and mobility issues. They have few purposes for information use, get it incidentally, and apply the sim-plest and easy-to-reach assistive technology. The findings can be used in libraries to develop targeted services for this population.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"119 1","pages":"338-349"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88442222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During the BMWI granted project “Print-IT”, the need of a thesaurus based uniform and consistent language for the German printing industry became evident. In this paper we introduce a semi-automatic construction approach for such a thesaurus and present a workflow which supports users to generate thesaurus typical information structures from relevant digitalized resources with the help of common IT-tools.
{"title":"Conception of a Workflow for the Semi-automatic Construction of a Thesaurus for the German Printing Industry","authors":"Anette Siebenkäs, B. Markscheffel","doi":"10.5281/zenodo.17945","DOIUrl":"https://doi.org/10.5281/zenodo.17945","url":null,"abstract":"During the BMWI granted project “Print-IT”, the need of a thesaurus based uniform and consistent language for the German printing industry became evident. In this paper we introduce a semi-automatic construction approach for such a thesaurus and present a workflow which supports users to generate thesaurus typical information structures from relevant digitalized resources with the help of common IT-tools.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"134 1","pages":"217-229"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77369861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study examines the perception on third-party tracking of German Internet users. For that purpose, 20 users without a technical background were interviewed. Results indicate that users are not aware of online tracking. They are often surprised by the magnitude of tracking programs they are exposed to during everyday life online activities like travel planning, job or product research. While the interviewees were willing to concede the theoretical advantages of such data collection, e.g. for behavioral targeting, they considered the price as too high to compensate for the loss of privacy control. The participants showed concerns that tracking could possibly lead to disadvantages in real life. In addition, behavioral targeting is assessed fairly redundant. Asked about concepts for enhanced transparency and control, the interviewed people still emphasized their distrust toward tracking. Thus, third-party tracking is a doubled edged sword for online advertising. On the one hand, it is a central means to improve the relevancy of the often unwanted display ads. At the same time, there is a great danger of increasing ad aversion for privacy reasons.
{"title":"\"I would have never allowed it\": User Perception of Third-party Tracking and Implications for Display Advertising","authors":"Wiebke Thode, Joachim Griesbaum, Thomas Mandl","doi":"10.5281/zenodo.17971","DOIUrl":"https://doi.org/10.5281/zenodo.17971","url":null,"abstract":"This study examines the perception on third-party tracking of German Internet users. For that purpose, 20 users without a technical background were interviewed. Results indicate that users are not aware of online tracking. They are often surprised by the magnitude of tracking programs they are exposed to during everyday life online activities like travel planning, job or product research. While the interviewees were willing to concede the theoretical advantages of such data collection, e.g. for behavioral targeting, they considered the price as too high to compensate for the loss of privacy control. The participants showed concerns that tracking could possibly lead to disadvantages in real life. In addition, behavioral targeting is assessed fairly redundant. Asked about concepts for enhanced transparency and control, the interviewed people still emphasized their distrust toward tracking. Thus, third-party tracking is a doubled edged sword for online advertising. On the one hand, it is a central means to improve the relevancy of the often unwanted display ads. At the same time, there is a great danger of increasing ad aversion for privacy reasons.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"47 1","pages":"445-456"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72637664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of the research project LibRank is to identify, to implement and to systematically evaluate factors for relevance ranking in library information systems. This poster provides a short overview on the main objectives and used research methods with selected first results.
{"title":"LibRank - New Approaches for Relevance Ranking in Library Information Systems","authors":"Christiane Behnert","doi":"10.5281/zenodo.17974","DOIUrl":"https://doi.org/10.5281/zenodo.17974","url":null,"abstract":"The aim of the research project LibRank is to identify, to implement and to systematically evaluate factors for relevance ranking in library information systems. This poster provides a short overview on the main objectives and used research methods with selected first results.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"71 1","pages":"570-572"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73312616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lars Müller, Christoph Szepanski, T. Wetzel, H. Hobohm
Objective: The article contains results from a survey conducted among medical professionals regarding the way in which they handle research data in practice. The aim of the survey was to identify potential for improved data orientation and to ascertain starting points for support tools. The results were to be used to develop creativity-promoting computer-based tools. Method: The empirical basis was provided by guideline-based qualitative interviews and a quantitatively structured online survey. The interviews were partly transcribed and evaluated using content analysis. Results: Data analyses are primarily conducted in a target-oriented manner, i.e. on the basis of a hypothesis, with data centres representing an important source of reference for the surveyed medical professionals. The means used for analysing data indicate individual working practices, with the analyses often being conducted at the medical professionals’ desks and towards the end of the working day. The results of analyses are often used in publications but less used for research applications.
{"title":"Towards a More Data Oriented Medical Research Environment - Survey Results on Information and Data Practice","authors":"Lars Müller, Christoph Szepanski, T. Wetzel, H. Hobohm","doi":"10.5281/zenodo.17960","DOIUrl":"https://doi.org/10.5281/zenodo.17960","url":null,"abstract":"Objective: The article contains results from a survey conducted among medical professionals regarding the way in which they handle research data in practice. The aim of the survey was to identify potential for improved data orientation and to ascertain starting points for support tools. The results were to be used to develop creativity-promoting computer-based tools. Method: The empirical basis was provided by guideline-based qualitative interviews and a quantitatively structured online survey. The interviews were partly transcribed and evaluated using content analysis. Results: Data analyses are primarily conducted in a target-oriented manner, i.e. on the basis of a hypothesis, with data centres representing an important source of reference for the surveyed medical professionals. The means used for analysing data indicate individual working practices, with the analyses often being conducted at the medical professionals’ desks and towards the end of the working day. The results of analyses are often used in publications but less used for research applications.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"35 1","pages":"230-243"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73738616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As we move through the era of Big Data, data visualization is increasingly taking a leading role in the data presentation. Because of the disparity in the amount of data and time we have to process it, it has become extremely important to find the right way, i.e. the right picture that will convey a story our data is holding. Although not falling within Big Data type of data, a dictionary of nouns with a description of case paradigms still represents a large amount of data that needs to be understood. In this paper, the distribution of Croatian nouns and paradigms used for all singular cases existing in the NooJ linguistic environment, as well as the relations among the case endings and existing paradigms will be visually presented. Tableau software is used for the first task and Cytoscape for the second. The structure of presented data should help both those learning the language and those learning about the language.
{"title":"Visualizing Natural Language Resources","authors":"Kristina Kocijan","doi":"10.5281/zenodo.17934","DOIUrl":"https://doi.org/10.5281/zenodo.17934","url":null,"abstract":"As we move through the era of Big Data, data visualization is increasingly taking a leading role in the data presentation. Because of the disparity in the amount of data and time we have to process it, it has become extremely important to find the right way, i.e. the right picture that will convey a story our data is holding. Although not falling within Big Data type of data, a dictionary of nouns with a description of case paradigms still represents a large amount of data that needs to be understood. In this paper, the distribution of Croatian nouns and paradigms used for all singular cases existing in the NooJ linguistic environment, as well as the relations among the case endings and existing paradigms will be visually presented. Tableau software is used for the first task and Cytoscape for the second. The structure of presented data should help both those learning the language and those learning about the language.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"56 1","pages":"203-216"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75109013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study examines to what extent, within online newspapers, the user’s scan path coincides with the real information behavior found within the newspapers according to the experts. Primary research methods utilized are questionnaires, interviews and eye tracking (concerning scenarios) of user/ expert scan paths of the online newspapers. Information obtained through these methods will be compared and contrasted where appropriate to examine the primary purpose of this study.
{"title":"Analysis of the Scan Path Using Online Newspapers - Path Comparison Between User and Expert","authors":"Lea Schubart","doi":"10.5281/zenodo.17981","DOIUrl":"https://doi.org/10.5281/zenodo.17981","url":null,"abstract":"This study examines to what extent, within online newspapers, the user’s scan path coincides with the real information behavior found within the newspapers according to the experts. Primary research methods utilized are questionnaires, interviews and eye tracking (concerning scenarios) of user/ expert scan paths of the online newspapers. Information obtained through these methods will be compared and contrasted where appropriate to examine the primary purpose of this study.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"339 1","pages":"501-505"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77595996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}