首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 578 毫秒
1.
Recent privacy-related incidents of mobile services have shown that app stores and providers face the challenge of mobile users’ information privacy concerns, which can prevent users from installing mobile apps or induce them to uninstall an app. In this paper, we investigate the role of app permission requests and compare the impact on privacy concerns with other antecedents of information privacy concerns, i.e., prior privacy experience, computer anxiety, and perceived control. To test these effects empirically, we conducted an online survey with 775 participants. Results of our structural equation modeling show that prior privacy experience, computer anxiety, and perceived control have significant effects on privacy concerns. However, concerns for app permission requests have approximately twice as much predictive value than the other factors put together to explain mobile users’ overall information privacy concerns. We expect that our findings can provide a theoretical contribution for future mobile privacy research as well as practical implications for app stores and providers.  相似文献   

2.
When reporting health risks, the news media are often criticized for omitting "mobilizing" information that allows readers to act on existing attitudes. Using American and British newspaper coverage of the autism-vaccine controversy as a case study, this article takes a "behind the scenes" look at normative pressures that may influence whether such information appears in coverage. In particular, can holding health officials accountable for their actions potentially "crowd out" mobilizing information? A content analysis suggests that mobilizing information (at least one of four examples) was present in only 16% of articles, compared to 38% that mentioned accountability messages (at least one of two examples). US newspapers were significantly more likely to mention at least one mobilization example. Finally, although only 11% discussed both, articles were more likely to discuss certain mobilizing and accountability examples together. Implications for journalism ethics and vaccine risk communication are discussed.  相似文献   

3.
In our paper we present an experimental study which investigated the possibility to project the need for information specialists serving knowledge workers in knowledge industries on the basis of an average university library serving their counterparts at a university. Information management functions, i.e. functions and processes related to information evaluation, acquisition, metadata creation, etc., performed in an average university library are the starting point of this investigation. The fundamental assumption is that these functions do not only occur in libraries but also in other contexts like, for instance, in knowledge industries. As a consequence, we try to estimate the need for information professionals in knowledge industries by means of quantitative methods from library and information science (Library Planning Model) and economics (input output analysis, occupational analysis). Our study confirms the validity of our assumption. Accordingly, the number of information specialists projected on the basis of university libraries is consistent with their actual number reported in national statistics. However, in order to attain a close fit, we had to revise the original research model by dismissing the split-up of information specialists into reader services and technical services staff.  相似文献   

4.
As a core organizational resource, business processes are vital for organizational teams. To deal with today’s volatile business environment, organizations need to be ambidextrous in terms of process capabilities. However, little is known about how process ambidexterity, process standardization, and process agility, are enabled by information technology (IT) and related to team-level activities. To fill this gap in the literature, we conducted a field study based on 160 teams of 1081 individuals from seven companies in South Korea. Our results show that IT enables both process standardization and agility, and that a team’s process ambidexterity has a positive effect on inter-team coordination and team innovation, which in turn have a direct impact on team performance. Our findings highlight the importance of process ambidexterity by investigating the enabling role of IT and its outcomes in a team. Our results offer theoretical and practical implications from the perspective of team process ambidexterity.  相似文献   

5.
Abstract

Computer science in the United States is hard pressed to show broad utility to help justify billion dollar research programs and the value of educating well over 40,000 bachelor of science and master of science specialists annually in the United States. The Computer Science and Telecommunications Board of the U.S. National Research Council recently has issued a report, “Computing the Future” (Hartmanis &; Lin 1992), which sets a new agenda for computer science. The report recommended that computer scientists broaden their conceptions of the discipline to include computing applications and domains to help understand them. This article argues that many computer science graduates need some skills in analyzing human organizations to help develop appropriate systems requirements, because they are trying to develop high‐performance computing applications that effectively support higher performance human organizations. It is time for academic computer science to embrace organizational analysis (the field of Organizational Informatics) as a key area of research and instruction.  相似文献   

6.
Amartya Sen’s capability approach has become increasingly popular in development studies. This paper identifies controllability and operationalisability as two key stumbling blocks which prevent the capability approach from being used even more widely in development practice. It discusses the origins and application of the Choice Framework, a conceptual tool designed to help operationalise the approach. The framework can be used to deconstruct embedded ideologies and analyse the appropriateness of development goals, to map development as a systemic process, and to plan interventions which can result in increased freedom of choice for people. Three examples of the application of the Choice Framework in the field of information and communication for development (ICT4D) are given. The three technologies which are examined, telecentres (Infocentros), Chilecompra and Fair Tracing, can be placed at different places of a determinism continuum, some reducing the spectrum of choices a user has. The paper argues that while frameworks such as the Choice Framework can be developed further to increase the operationalisability of the capability approach, it is up to development funders to accept the fact that people’s choices are never fully predictable and thus Sen’s ‘development as freedom’ will inevitably be a dynamic and open-ended process.  相似文献   

7.
Nussbaum’s version of the capability approach is not only a helpful approach to development problems but can also be employed as a general ethical-anthropological framework in ‘advanced’ societies. This paper explores its normative force for evaluating information technologies, with a particular focus on the issue of human enhancement. It suggests that the capability approach can be a useful way of to specify a workable and adequate level of analysis in human enhancement discussions, but argues that any interpretation of what these capabilities mean is itself dependent on (interpretations of) the techno-human practices under discussion. This challenges the capability approach’s means-end dualism concerning the relation between on the one hand technology and on the other hand humans and capabilities. It is argued that instead of facing a choice between development and enhancement, we better reflect on how we want to shape human-technological practices, for instance by using the language of capabilities. For this purpose, we have to engage in a cumbersome hermeneutics that interprets dynamic relations between unstable capabilities, technologies, practices, and values. This requires us to modify the capability approach by highlighting and interpreting its interpretative dimension.  相似文献   

8.
Cyberchondria is conceptualized as excessive online searches for medical information, which is typically accompanied by feelings of emotional distress or anxiety. While previous studies in this nascent area have identified various psychological predictors of cyberchondria, a relative dearth of research has explored the role of different online information sources in its development. Informed by the stimulus-organism-response (SOR) model and the literature on cyberchondria, this study proposes a theoretical framework to explain why people develop cyberchondria when seeking medical information via different online sources. Based on a three-wave panel survey (N = 654), our findings suggest that health information seeking via online search engines increases online information overload (β = 0.11, p = .02), while health information seeking via social media platforms and health-specific websites increases online information trust (β = 0.13, p = .005; β = 0.25, p < .001). Additionally, online information overload is negatively related to online information trust (β = -0.39, p < .001). Subsequently, both online information overload and online information trust trigger cyberchondria (β = 0.73, p < .001; β = 0.15, p < .001). This study can contribute to the literature by expanding and deepening our understanding of cyberchondria developmental trajectory as well as emphasizing the pivotal role of online information sources in this complicated and dynamic process.  相似文献   

9.
10.
I.TheTragediesofShakespeare1.1.AnAnalysisoftherolesinShakespeare’stragediesTake“Hamlet”asexamples:Hamletisaboutanemotionallyscarredyoungmantryingtoavengethemurderofhisfather,theking.TheghostofHamlet'sfatherappearstoHamlet,tellinghimthathewasmurderedbyhisbrother,Claudius,whohasnowbecometheking.ClaudiushasalsomarriedGertrude,theoldking'swidowandHamlet'smother.Hamletisappalledbyhismother'sactionsandbywhattheghosttellshimaboutClaudius'scold-bloodedmurderofhisownbrother.Tobuytimetoplothisr…  相似文献   

11.
Social networks provide individuals with diverse or redundant information depending on the network structure. Both types of information offer advantages for generating new ideas. At the same time, network structure and network content are independent. As a result, two individuals with the same network position can access diverse or redundant content from their social peers. In this study, we investigate the function of social networks in innovative endeavors given individuals’ different kinds of information accessing behavior. In accordance with previous research, we argue that individuals with a broker status access more diverse information through non-redundant network structures and develop, on average, more novel ideas. We further propose that redundancy in content complements brokers’ structural non-redundancy by providing familiar knowledge elements and therefore interpretability, while non-redundancy in both content and structure leads to information overload. Thus, we hypothesize that brokers accessing more information depth, and independently, less information breadth generate newer ideas. To test our hypotheses, we collected data from a popular online maker community containing 18,146 ideas, 19,919 profiles, and 52,663 comments. We used topic modeling (Latent Dirichlet Allocation) to extract hidden knowledge elements and social network analysis to identify brokers. In line with our hypotheses, we find that information depth (breadth) strengthens (weakens) a favorable broker position. These findings have implications for the literature on idea generation in social networks and household sector innovation.  相似文献   

12.
Children of today have been surrounded by digital technology since their birth. However, children of today are not equally equipped for their technology rich future: various kinds of digital divides still prevail in the society and affect the young generation and their digital futures. Schools and education of children should undergo an extensive digital transformation to be able to meet the needs of the young generation and their digitalized future. The COVID-19 pandemic has suddenly and abruptly forced schools and education indeed to engage in such a transformation. In this study we examine the digital transformation initiated by the COVID-19 pandemic in the basic education of the young generation, the variety of digital divides emerging and reinforced, and the possible barriers reported along the way. We argue that information management research should better acknowledge children, their digitalized everyday life and their basic education as significant areas of concern. We should understand them as well as allow them to shape the education we offer in the context of higher education, but we should also aim at influencing the basic education of the young generation – for the purpose of equipping them with important skills and competencies for their digital futures but also for the purpose of arousing their interest in this important field, maybe even as a career option.  相似文献   

13.
Organisations increasingly realise that they must transform into true digital enterprises to create competitive advantage and ensure corporate survival. However, many organisations do not realise that successful digital transformation (DT) requires much more than technology; it can only succeed if they manage their data, information and knowledge as true business assets. This paper describes collaborative research conducted by academic and industry partners, a mutually beneficial journey spanning the past ten years. The aim was to develop a Holistic Information Asset Management (HIAM) model indicating the important areas of information asset management (IAM) that support the DT journey. Interviews were conducted with C-level executives in organisations from all industries on three continents to investigate their IAM practices, the barriers to good IAM and the benefits of managing information assets (IAs) well. This paper proposes that organisations should focus on ten domains in their quest for effective IAM: i) business benefits, ii) business environment, iii) executive awareness, iv) leadership and management, v) information environment, vi) information systems, vii) information behaviour, viii) information attributes/quality, ix) information performance and x) justification.  相似文献   

14.
Expanding computer network technologies have emerged as a popular communication channel for millions of people. Contemporary literature abounds with ideologically biased accounts of on-line interaction that hinder the emergence of a coherent analytical framework. Scholarly work on computer-mediated communicative play remains underdeveloped. Through an empirically grounded theoretical orientation, this study aims to identify and illustrate processes and elements central to the emergence of self in on-line chat environments. By use of an e-mail survey, participant observation, content analysis, and open-ended interviews, the social nature of on-line interaction is illustrated and identified as significantly more than the technological sum of the medium. Findings indicate that through on-line chat-interaction a ''cyberself'' emerges, rooted in a unique form of communication that is disembodied, dislocated, anonymous, multiple-simultaneous, and faceless. Each of these elements introduces new possibilities to the dramatic nature of on-line interaction, which represents a kind of communication ''self-game'' where participants enact a multiplicity of selves.  相似文献   

15.

Community of practice theory is inherently a social theory. As such it is distinct from more individualist accounts of human behavior, such as mainstream economics. Consequently, community of practice theory and economics favor different accounts of knowledge. Taking a community of practice perspective, this article challenges economists' attempts to reduce knowledge to information held by individuals and to reject tacit knowledge as mere uncodified explicit knowledge. The essay argues that Polanyi's notion of a tacit dimension affected numerous disciplines (including economics) because it addressed aspects of learning and identity that conventional social sciences overlooked. The article situates knowledge, identity, and learning within communities and points to ethical and epistemic entailments of community practice. In so doing it attempts to limit, rather than expand, the scope of community of practice analysis and to stress the difference, rather than the commonalities, between this and other apparently congenial forms of social analysis.  相似文献   

16.
Whether the Internet Protocol address should be seen as personal data or not remains a contested issue with regard to information privacy. This article explores the question by looking at the technical attributes of the Internet Protocol address, European Union (EU) and U.S. case law, and how the EU's advisory data protection body, the Article 29 Working Party, and some of the world's most influential information and communication technology (ICT) companies consider the IP address. The notion of contextual integrity is then used to show that information privacy regulation must stipulate concrete technical mandates instead of guiding principles, contrary to the ideal of technology neutrality in Internet regulation.  相似文献   

17.
One of the best known and best loved of the ancientChinese novels to have come down through the ages, ShiNai’an’s Outlaws of the Marsh is based on a peasant up-rising which took place in the reign of Hui Zong, a SongDynasty emperor who ruled from 1101 t…  相似文献   

18.
Emotions are an integral component of all human activities, including human–computer interactions. This article reviews literature on the theories of emotions, methods for studying emotions, and their role in human information behaviour. It also examines current research on emotions in library and information science, information retrieval and human–computer interaction, and outlines some of the challenges and directions for future work.  相似文献   

19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号