This thesis deals with an interdisciplinary approach of intergenerational knowledge sharing (IKS) from an information scientific perspective. As part of the KNOWISH project the research is embedded in an international cooperation of University of Hildesheim and the Åbo Academy in Turku, Finland. It aims at answering the questions: How does IKS unfold? Which systems are used in its context and how suitable are they? Two case studies have been conducted in two medium-sized German companies. At the same time, an additional study has been conducted by two Finnish students. Semistructured interviews and a qualitative content analysis of the data considered generational aspects, knowledge sharing as well as ICT. This study finds that experience and work environment atmosphere are important influencing factors. Both, young and old employees can be knowledge carriers who share knowledge mutually. Another important outcome shows that Organizational Generations of Knowledge exist within the companies. These are defined by chronological and professional age.
{"title":"Exploring Intergenerational Knowledge Sharing in Organizations - Potentials and Limitations of Information and Communication Technology (ICT)","authors":"Helene Brinken, Helena Kock","doi":"10.18452/19943","DOIUrl":"https://doi.org/10.18452/19943","url":null,"abstract":"This thesis deals with an interdisciplinary approach of intergenerational knowledge sharing (IKS) from an information scientific perspective. As part of the KNOWISH project the research is embedded in an international cooperation of University of Hildesheim and the Åbo Academy in Turku, Finland. It aims at answering the questions: How does IKS unfold? Which systems are used in its context and how suitable are they? Two case studies have been conducted in two medium-sized German companies. At the same time, an additional study has been conducted by two Finnish students. Semistructured interviews and a qualitative content analysis of the data considered generational aspects, knowledge sharing as well as ICT. This study finds that experience and work environment atmosphere are important influencing factors. Both, young and old employees can be knowledge carriers who share knowledge mutually. Another important outcome shows that Organizational Generations of Knowledge exist within the companies. These are defined by chronological and professional age.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"10 1","pages":"285-289"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86542767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facebook","authors":"Monika Podolecheva","doi":"10.5281/zenodo.5528904","DOIUrl":"https://doi.org/10.5281/zenodo.5528904","url":null,"abstract":"","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"52 1","pages":"573"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76829773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maximilian Kautetzky, Ben Haas, M. Voit, M. Burghardt, Christian Wolff
With the increase of digital information practices (e.g. online search, desktop publishing, electronic reference management, etc.) in the academic context, printed books are sometimes cumbersome to integrate into the digital workflow. We present ResearchSherlock, an Android app that allows the user to quickly gather bibliographic information for a printed book by scanning its shelfmark or ISBN. The application also provides recommenddations for thematically related books, to promote the discovery of other relevant books that are available in the local library.
{"title":"ResearchSherlock - Toward a Seamless Integration of Printed Books into the Digital Academic Workflow","authors":"Maximilian Kautetzky, Ben Haas, M. Voit, M. Burghardt, Christian Wolff","doi":"10.5281/zenodo.17930","DOIUrl":"https://doi.org/10.5281/zenodo.17930","url":null,"abstract":"With the increase of digital information practices (e.g. online search, desktop publishing, electronic reference management, etc.) in the academic context, printed books are sometimes cumbersome to integrate into the digital workflow. We present ResearchSherlock, an Android app that allows the user to quickly gather bibliographic information for a printed book by scanning its shelfmark or ISBN. The application also provides recommenddations for thematically related books, to promote the discovery of other relevant books that are available in the local library.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"102 1","pages":"581-583"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72720053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper shows an overview over a doctoral thesis project which focuses on Collaborative Information Seeking (CIS) with a core interest in searcher heterogeneity. A special field of interest is the way how different personalities interact in a collaborative search scenario and if heterogeneous groups perform better or worse than homogenous groups. The goal is to provide a description of group performance in CIS, to get suggestions for the design of collaborative search tools and to create a model of CIS integrating search heterogeneity.
{"title":"Searcher Heterogeneity in Collaborative Information Seeking within the Context of Students Work Tasks","authors":"Stefanie Elbeshausen","doi":"10.5281/zenodo.17940","DOIUrl":"https://doi.org/10.5281/zenodo.17940","url":null,"abstract":"This paper shows an overview over a doctoral thesis project which focuses on Collaborative Information Seeking (CIS) with a core interest in searcher heterogeneity. A special field of interest is the way how different personalities interact in a collaborative search scenario and if heterogeneous groups perform better or worse than homogenous groups. The goal is to provide a description of group performance in CIS, to get suggestions for the design of collaborative search tools and to create a model of CIS integrating search heterogeneity.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"13 1","pages":"494-500"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77268092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the aim of an empirical scientometric case study of information science institutes in Graz (Austria), a publication analysis was held based on the methodological approach of Friedlander (2014) and Hilbert et al. (2015), namely the use of comprehensive (personal or institutional) publication lists instead of applying data from commercial information services (like Web of Science, Scopus or Google Scholar). We determined and analyzed the publications for three institutes in Graz in terms of their productivity (publication output), impact (coverage and citation count) and topics (based on the publication’s titles). For our study, we exclusively worked with complete (or manually completed) personal publication lists which were created from the personal websites of the authors and in consultation with the institutes. With the help of these lists as empirical data basis, it is possible to get very precise informetric results. Similar to our approach, Kirkwood (2012) used publication checklists. For the productivity it is – among other things – necessary to clarify what should be defined as a publication and as one publication (Stock, 2000). Regarding to the impact, the publications coverage in selected databases was checked. Before counting the citations in these databases, we
为了对格拉茨(奥地利)的信息科学机构进行实证科学计量学案例研究,基于Friedlander(2014)和Hilbert et al.(2015)的方法论方法进行了出版物分析,即使用综合(个人或机构)出版物列表,而不是应用商业信息服务(如Web of science, Scopus或Google Scholar)的数据。我们确定并分析了格拉茨三所研究所的出版物,包括它们的生产率(出版物产出)、影响力(覆盖率和引用数)和主题(基于出版物的标题)。在我们的研究中,我们专门使用完整的(或手动完成的)个人出版列表,这些列表是从作者的个人网站上创建的,并与研究所协商。借助这些列表作为经验数据基础,可以得到非常精确的信息结果。与我们的方法类似,Kirkwood(2012)使用了出版清单。为了提高生产力,除其他事项外,有必要澄清什么应该被定义为出版物,什么应该被定义为出版物(Stock, 2000)。关于影响,对选定数据库的出版物覆盖率进行了检查。在统计这些数据库中的引用数之前,我们
{"title":"A Scientometric Approach to Determine and Analyze Productivity, Impact and Topics Based upon Personal Publication Lists","authors":"Isabelle Dorsch, Nils Frommelius","doi":"10.5281/zenodo.17978","DOIUrl":"https://doi.org/10.5281/zenodo.17978","url":null,"abstract":"With the aim of an empirical scientometric case study of information science institutes in Graz (Austria), a publication analysis was held based on the methodological approach of Friedlander (2014) and Hilbert et al. (2015), namely the use of comprehensive (personal or institutional) publication lists instead of applying data from commercial information services (like Web of Science, Scopus or Google Scholar). We determined and analyzed the publications for three institutes in Graz in terms of their productivity (publication output), impact (coverage and citation count) and topics (based on the publication’s titles). For our study, we exclusively worked with complete (or manually completed) personal publication lists which were created from the personal websites of the authors and in consultation with the institutes. With the help of these lists as empirical data basis, it is possible to get very precise informetric results. Similar to our approach, Kirkwood (2012) used publication checklists. For the productivity it is – among other things – necessary to clarify what should be defined as a publication and as one publication (Stock, 2000). Regarding to the impact, the publications coverage in selected databases was checked. Before counting the citations in these databases, we","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"76 1","pages":"578-580"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77437527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this study, eye tracking and mouse tracking data collected from two Swiss digital library web sites are compared, with respect to their specific areas of interest in order to answer two questions: Firstly, to know, how far the perception of the corresponding areas of interests differed from site to site and how far general recommendations can be inferred from this comparison. Secondly, the dispersion on the gaze and the mouse click plots were compared with the results of the two methods with each other to see if one method can be replaced by each other or if both methods should rather be considered as complementary. The results show that especially the choice of color and the use of contrast strongly influence gazes and clicks and that some areas of interest mainly attract views, but not clicks and vice versa, which leads to a complementary distribution pattern, and makes the question of replacing one method by the other obsolete.
{"title":"Views and Clicks in Digital Libraries - A Comparative Usability Analysis of Eye and Mouse Tracking Data","authors":"Eliane Blumer, René Schneider","doi":"10.5281/zenodo.17956","DOIUrl":"https://doi.org/10.5281/zenodo.17956","url":null,"abstract":"In this study, eye tracking and mouse tracking data collected from two Swiss digital library web sites are compared, with respect to their specific areas of interest in order to answer two questions: Firstly, to know, how far the perception of the corresponding areas of interests differed from site to site and how far general recommendations can be inferred from this comparison. Secondly, the dispersion on the gaze and the mouse click plots were compared with the results of the two methods with each other to see if one method can be replaced by each other or if both methods should rather be considered as complementary. The results show that especially the choice of color and the use of contrast strongly influence gazes and clicks and that some areas of interest mainly attract views, but not clicks and vice versa, which leads to a complementary distribution pattern, and makes the question of replacing one method by the other obsolete.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"28 1","pages":"278-289"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84581667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The master thesis presents an analysis of the research literature about radiofrequency identification (RFID). It consists of a theoretical part and a practical part. The theoretical part explains the technology behind RFID and shows the existing application spectrum of this diverse and prominent technology. It also discusses the norms and standards in this area. Furthermore the theoretical part contains a short introduction into scientometrics which is the basis for the following analysis. The practical part represents the analysis, which was conducted with the bibliometric visualisation software Bibliometric Technology Monitoring (BibTechMon). With this software knowledge inherent in the analysed data can be discovered. BibTechMon was developed at the Austrian Institute of Technology (AIT) which was also a cooperation partner of this master thesis. For this analysis 8,994 bibliographic records have been analysed. The data was retrieved from “Web of Science”. In the main part of the thesis the research fronts of RFID technology are identified and on this basis future application domains are derived.
硕士论文分析了有关射频识别(RFID)的研究文献。它由理论部分和实践部分组成。理论部分解释了RFID背后的技术,并展示了这种多样化和突出技术的现有应用范围。并对该领域的规范和标准进行了探讨。此外,理论部分对科学计量学进行了简要介绍,为后续分析奠定了基础。实践部分采用文献计量可视化软件“书目计量技术监测”(BibTechMon)进行分析。有了这个软件,就可以发现分析数据中固有的知识。BibTechMon是由奥地利理工学院(AIT)开发的,AIT也是本硕士论文的合作伙伴。为此分析了8,994份书目记录。数据来源于“Web of Science”。论文的主要部分是对RFID技术的研究方向进行了界定,并在此基础上对未来的应用领域进行了展望。
{"title":"Research Fronts and New Applications of RFID Technology - A Bibliometric Analysis of the Research Literature","authors":"Armin Rombold","doi":"10.5281/zenodo.17958","DOIUrl":"https://doi.org/10.5281/zenodo.17958","url":null,"abstract":"The master thesis presents an analysis of the research literature about radiofrequency identification (RFID). It consists of a theoretical part and a practical part. The theoretical part explains the technology behind RFID and shows the existing application spectrum of this diverse and prominent technology. It also discusses the norms and standards in this area. Furthermore the theoretical part contains a short introduction into scientometrics which is the basis for the following analysis. The practical part represents the analysis, which was conducted with the bibliometric visualisation software Bibliometric Technology Monitoring (BibTechMon). With this software knowledge inherent in the analysed data can be discovered. BibTechMon was developed at the Austrian Institute of Technology (AIT) which was also a cooperation partner of this master thesis. For this analysis 8,994 bibliographic records have been analysed. The data was retrieved from “Web of Science”. In the main part of the thesis the research fronts of RFID technology are identified and on this basis future application domains are derived.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"46 1","pages":"557-561"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85895767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Telepresence robots are an emerging technology that enables social interaction between physically dispersed users. In this research, an exploratory study was conducted to get first insights with regard to technical affordances, usability and user acceptance of a telepresence robot in the context of learning related group work. Results indicate that the group work was successful and that it can be worthwhile to employ a telepresence robot for such a usage scenario. Furthermore, the case study identifies technical and social issues, which should be tackled to optimize such group work.
{"title":"Acceptance of Telepresence Robots During Group Work - An Experimental Study","authors":"Arbnore Berisha, Ralph Kölle, Joachim Griesbaum","doi":"10.5281/zenodo.17950","DOIUrl":"https://doi.org/10.5281/zenodo.17950","url":null,"abstract":"Telepresence robots are an emerging technology that enables social interaction between physically dispersed users. In this research, an exploratory study was conducted to get first insights with regard to technical affordances, usability and user acceptance of a telepresence robot in the context of learning related group work. Results indicate that the group work was successful and that it can be worthwhile to employ a telepresence robot for such a usage scenario. Furthermore, the case study identifies technical and social issues, which should be tackled to optimize such group work.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"22 1","pages":"350-356"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84039865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we present reflections and recommendations concerning the conversion of library metadata into Linked Data. We will briefly describe the different data models that exist for this purpose and argue their strengths and weaknesses with a special focus on the entification issue, before illustrating this problem with the description of three different ongoing projects. As will be outlined afterwards, it is essential to distinguish at the start of a project between data-driven or user-driven design approaches. As an alternative, the realization of a Linked Data project for bibliographical data might also lead to a hybrid approach were the design process shifts reciprocally between the analysis of the data and the user needs.
{"title":"Modelling Library Linked Data in Practice - Three Swiss Case Studies","authors":"Nicolas Prongué, René Schneider","doi":"10.5281/zenodo.17944","DOIUrl":"https://doi.org/10.5281/zenodo.17944","url":null,"abstract":"In this paper we present reflections and recommendations concerning the conversion of library metadata into Linked Data. We will briefly describe the different data models that exist for this purpose and argue their strengths and weaknesses with a special focus on the entification issue, before illustrating this problem with the description of three different ongoing projects. As will be outlined afterwards, it is essential to distinguish at the start of a project between data-driven or user-driven design approaches. As an alternative, the realization of a Linked Data project for bibliographical data might also lead to a hybrid approach were the design process shifts reciprocally between the analysis of the data and the user needs.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"192 1","pages":"118-128"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76949282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Katharina C. Furtner, Thomas Mandl, Christa Womser-Hacker
The following study analyses the effects of Auto-Suggest as implemented on mobile Websites on user’s search in m-commerce-shops. A benchmark showed that many design guidelines regarding the implementation of AutoSuggest have been fulfilled. For usability tests, different designs of AutoSuggest have been systematically selected. The results showed that the AutoSuggest function guarantees a faster interaction with the website for most of the tasks on average. For tasks which require more time, the additional interaction time is around 10% and, surprisingly, does not result from more interaction steps. Many qualitative findings explain how interacting with AutoSuggest can be troublesome for users.
{"title":"Effects of Auto-Suggest on the Usability of Search in eCommerce","authors":"Katharina C. Furtner, Thomas Mandl, Christa Womser-Hacker","doi":"10.5281/zenodo.17948","DOIUrl":"https://doi.org/10.5281/zenodo.17948","url":null,"abstract":"The following study analyses the effects of Auto-Suggest as implemented on mobile Websites on user’s search in m-commerce-shops. A benchmark showed that many design guidelines regarding the implementation of AutoSuggest have been fulfilled. For usability tests, different designs of AutoSuggest have been systematically selected. The results showed that the AutoSuggest function guarantees a faster interaction with the website for most of the tasks on average. For tasks which require more time, the additional interaction time is around 10% and, surprisingly, does not result from more interaction steps. Many qualitative findings explain how interacting with AutoSuggest can be troublesome for users.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"29 1","pages":"178-190"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87168550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}