首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 51 毫秒
1.
Cyberchondria is conceptualized as excessive online searches for medical information, which is typically accompanied by feelings of emotional distress or anxiety. While previous studies in this nascent area have identified various psychological predictors of cyberchondria, a relative dearth of research has explored the role of different online information sources in its development. Informed by the stimulus-organism-response (SOR) model and the literature on cyberchondria, this study proposes a theoretical framework to explain why people develop cyberchondria when seeking medical information via different online sources. Based on a three-wave panel survey (N = 654), our findings suggest that health information seeking via online search engines increases online information overload (β = 0.11, p = .02), while health information seeking via social media platforms and health-specific websites increases online information trust (β = 0.13, p = .005; β = 0.25, p < .001). Additionally, online information overload is negatively related to online information trust (β = -0.39, p < .001). Subsequently, both online information overload and online information trust trigger cyberchondria (β = 0.73, p < .001; β = 0.15, p < .001). This study can contribute to the literature by expanding and deepening our understanding of cyberchondria developmental trajectory as well as emphasizing the pivotal role of online information sources in this complicated and dynamic process.  相似文献   

2.
Continued integration of technology for the purpose of connecting and exchanging data with other devices and systems over the Internet exposes information security (IS) to growing risks. Organizations can thus achieve a strategic advantage by securing IS as a pivotal information and intelligence asset. This study examined ways of motivating IS professionals to protect information security from potential risks, drawing on the theoretical frameworks of protection motivation theory (PMT) and the theory of planned behavior (TPB) as well as work-related organizational antecedents (e.g., organizational commitment and job satisfaction). This paper proposes structural equation modeling (SEM) in R as a framework for exploring relationships among the variables and determining the overall data fit to the hypotheses. SEM is a multivariate technique which simultaneously executes both factor analysis and aspects of multiple regression in order to estimate interrelated relationships while also allowing path analytic modeling to be performed with latent, unobserved variables. Using 804 questionnaires with SEM analysis, we find support for the following predictors’ associations: (a) information security attitudes and subjective norms, as constituents of TPB, significantly influenced information security protective behaviors; (b) the coping appraisals (self-efficacy and response cost) and threat appraisals (threat susceptibility and threat severity) of PMT were significantly predictive of information security protective behaviors; and (c) organizational commitment positively impacted information security protective behaviors. However, job satisfaction and perceived behavioral control as a construct of TPB were not associated with information security behaviors. The main theoretical contribution of this research is that the addition of organizational commitment allows the behavioral science model to offer a novel understanding of IS professionals’ protection motivation and actual behaviors in the Chinese context. This study has several practical implications for organizations. In order to encourage IS professionals to follow protective security behaviors, organizations should set up the belief that a close relationship with subordinates plays a vital role in ensuring information security, improve IS employees’ perception and cognition of their importance to the organization, constantly highlight the importance of information security protection, and emphasize the severe consequences of information security threats during trainings.  相似文献   

3.
4.
The information revolution has fostered the rise of new ways of waging war, generally by means of cyberspace-based attacks on the infrastructures upon which modern societies increasingly depend. This new way of war is primarily disruptive, rather than destructive; and its low barriers to entry make it possible for individuals and groups (not just nation-states) easily to acquire very serious war-making capabilities. The less lethal appearance of information warfare and the possibility of cloaking the attacker's true identity put serious pressure on traditional just war doctrines that call for adherence to the principles of right purpose, duly constituted authority, and last resort. Age-old strictures about noncombatant immunity are also attenuated by the varied means of attack enabled by advanced information technologies. Therefore, the nations and societies leading the information revolution have a primary ethical obligation to constrain the circumstances under which information warfare may be used -- principally by means of a pledge of no first use of such means against noncombatants.  相似文献   

5.
6.
I describe the emergence of Floridi’s philosophy of information (PI) and information ethics (IE) against the larger backdrop of Information and Computer Ethics (ICE). Among their many strengths, PI and IE offer promising metaphysical and ethical frameworks for a global ICE that holds together globally shared norms with the irreducible differences that define local cultural and ethical traditions. I then review the major defenses and critiques of PI and IE offered by contributors to this special issue, and highlight Floridi’s responses to especially two central problems – the charge of relativism and the meaning of ?entropy’ in IE. These responses, conjoined with several elaborations of PI and IE offered here by diverse contributors, including important connections with the naturalistic philosophies of Spinoza and other major Western and Eastern figures, thus issue in an expanded and more refined version of PI and IE – one still facing important questions as well as possibilities for further development.  相似文献   

7.
Emotions are an integral component of all human activities, including human–computer interactions. This article reviews literature on the theories of emotions, methods for studying emotions, and their role in human information behaviour. It also examines current research on emotions in library and information science, information retrieval and human–computer interaction, and outlines some of the challenges and directions for future work.  相似文献   

8.
In spite of often compelling reasons for why people should seek information, they persistently engage in lower levels of it than might be expected, at times seeking no information at all. The idealized model reflecting dogged persistence, pursuing rational search strategies, until a high-quality answer is found is often assumed in the design of information systems. However, many people confronted with health problems engage in avoidance and denial, making a health care system dependent on proactivity problematic. This essay explores six conditions, the idealized model, avoidance, bewilderment, serendipity, ignorance is bliss, and indolence, that arise from low and high effort strategies when typed by good, contingent, and bad health outcomes. Since a substantial proportion of the population does not act in accordance with our assumptions, it may be time for policy makers, system designers and researchers to revisit their approaches to facilitating health-related information seeking.  相似文献   

9.
In this paper, a critique will be developed and an alternative proposed to Luciano Floridi’s approach to Information Ethics (IE). IE is a macroethical theory that is to both serve as a foundation for computer ethics and to guide our overall moral attitude towards the world. The central claims of IE are that everything that exists can be described as an information object, and that all information objects, qua information objects, have intrinsic value and are therefore deserving of moral respect. In my critique of IE, I will argue that Floridi has presented no convincing arguments that everything that exists has some minimal amount of intrinsic value. I will argue, however, that his theory could be salvaged in large part if it were modified from a value-based into a respect-based theory, according to which many (but not all) inanimate things in the world deserve moral respect, not because of intrinsic value, but because of their (potential) extrinsic, instrumental or emotional value for persons.  相似文献   

10.
The paper presents a critical appraisal of Floridi’s metaphysical foundation of information ecology. It highlights some of the issues raised by Floridi with regard to the axiological status of the objects in the “infosphere,” the moral status of artificial agents, and Floridi’s foundation of information ethics as information ecology. I further criticise the ontological conception of value as a first order category. I suggest that a weakening of Floridi’s demiurgic information ecology is needed in order not to forget the limitations of human actors and/or of their surrogates, digital agents. I plea for a rational theoretical and practical view of such agents beyond utopian reasoning with regard to their potential moral status.  相似文献   

11.
12.
In information retrieval (IR), the improvement of the effectiveness often sacrifices the stability of an IR system. To evaluate the stability, many risk-sensitive metrics have been proposed. Since the theoretical limitations, the current works study the effectiveness and stability separately, and have not explored the effectiveness–stability tradeoff. In this paper, we propose a Bias–Variance Tradeoff Evaluation (BV-Test) framework, based on the bias–variance decomposition of the mean squared error, to measure the overall performance (considering both effectiveness and stability) and the tradeoff between effectiveness and stability of a system. In this framework, we define generalized bias–variance metrics, based on the Cranfield-style experiment set-up where the document collection is fixed (across topics) or the set-up where document collection is a sample (per-topic). Compared with risk-sensitive evaluation methods, our work not only measures the effectiveness–stability tradeoff of a system, but also effectively tracks the source of system instability. Experiments on TREC Ad-hoc track (1993–1999) and Web track (2010–2014) show a clear effectiveness–stability tradeoff across topics and per-topic, and topic grouping and max–min normalization can effectively reduce the bias–variance tradeoff. Experimental results on TREC Session track (2010–2012) also show that the query reformulation and increase of user data are beneficial to both effectiveness and stability simultaneously.  相似文献   

13.
14.
Drawing upon elaboration likelihood model (ELM) and espoused culture, this study predicts that eWOM reader's individualism–collectivism orientation (ICO) moderates eWOM antecedent factors’ effects on the perception of information credibility. 274 data were collected from two leading electronic word-of-mouth (eWOM) forums in China, the results confirm our prediction: eWOM reader's ICO positively moderates information sidedness’ effect on the perception of information credibility, it also negatively moderates the relationships between information consistency/information rating and information credibility. These findings validate the necessity and importance to consider readers’ espoused cultural differences in eWOM context.  相似文献   

15.
Forwarding negative information on microblogs, termed reposting negative information (RNI) in this study, refers to reposting negative, non-original information publicly on microblogs, causes large-scale bad news dissemination on microblogs, which in turn has detrimental consequences for organizations and the society. However, previous research concentrated on sharing of original content (such as knowledge sharing and word-of-mouth) or focused on general information forwarding on social media without distinguishing between positive and negative information. To address this issue, this study develops a model to investigate the predictors of RNI on microblogs (negative emotions and issue involvement in this study) and explores the contingency role of personality. A scenario-based online survey was conducted to test the proposed model and hypotheses. The empirical results confirmed (1) the direct and positive effects of negative emotions and issue involvement, (2) the negative moderation effect of extraversion on the relationship between negative emotions and RNI, and (3) the positive moderation effects of conscientiousness and agreeableness on the relationship between issue involvement and RNI. The study contributes to the literature by revealing the predictors of RNI on microblogs and by investigating the contingency role of personality.  相似文献   

16.
In producing news stories, journalists depend on information obtained from sources. This paper reviews the literature on journalists’ information seeking. The 90 studies included in the review cover how journalists identify sources, interact with sources, interpret information, and manage sources. In addition to quality and accessibility, balance in the group of sources selected is an important criterion in journalists’ identification of sources. However, the importance journalists assign to balance stands in contrast to the frequent finding of bias in their source selections. In interactions with sources, the sources frequently provide ideas for new stories in addition to information for current ones. This finding shows how multiple instances of information seeking coexist and combine into a mesh of intersecting information-seeking processes. In interpreting information, journalists are acutely aware that sources may have an agenda or be misinformed. While journalists praise information checking, they regularly bypass it or replace direct checks for information quality with indirect checks, such as whether the source appears trustworthy. In managing sources, journalists engage in boundary work to regulate their relationship with sources. They also cultivate long-term relationships with selected sources. The review findings are discussed with respect to how journalism shapes journalists’ information seeking and what implications the findings have for information-behavior research in other domains.  相似文献   

17.
Smart cities employ information and communication technologies to improve: the quality of life for its citizens, the local economy, transport, traffic management, environment, and interaction with government. Due to the relevance of smart cities (also referred using other related terms such as Digital City, Information City, Intelligent City, Knowledge-based City, Ubiquitous City, Wired City) to various stakeholders and the benefits and challenges associated with its implementation, the concept of smart cities has attracted significant attention from researchers within multiple fields, including information systems. This study provides a valuable synthesis of the relevant literature by analysing and discussing the key findings from existing research on issues related to smart cities from an Information Systems perspective. The research analysed and discussed in this study focuses on number of aspects of smart cities: smart mobility, smart living, smart environment, smart citizens, smart government, and smart architecture as well as related technologies and concepts. The discussion also focusses on the alignment of smart cities with the UN sustainable development goals. This comprehensive review offers critical insight to the key underlying research themes within smart cities, highlighting the limitations of current developments and potential future directions.  相似文献   

18.
In large companies, whose business is critically dependent on the effectiveness of their R&D function, the provision of effective means to access and share all forms of technical information is an acute problem. It is often easier to repeat an activity than it is to determine whether work has been carried out before.In this paper we present experiences in implementing and evaluating the MEMOIR system. MEMOIR is an open framework, i.e., it is extensible and adaptable to an organization’s infrastructure and applications, and it provides its user interface via standard Web browsers. It uses trails, open hypermedia link services and a set of software agents to assist users in accessing and navigating vast amounts of information in Intranet environments. Additionally, MEMOIR exploits trail data to support users in finding colleagues with similar interests. The MEMOIR system has been installed and evaluated by two end-user organizations. This paper describes the results obtained in this evaluation.  相似文献   

19.
Knowledge acquisition and bilingual terminology extraction from multilingual corpora are challenging tasks for cross-language information retrieval. In this study, we propose a novel method for mining high quality translation knowledge from our constructed Persian–English comparable corpus, University of Tehran Persian–English Comparable Corpus (UTPECC). We extract translation knowledge based on Term Association Network (TAN) constructed from term co-occurrences in same language as well as term associations in different languages. We further propose a post-processing step to do term translation validity check by detecting the mistranslated terms as outliers. Evaluation results on two different data sets show that translating queries using UTPECC and using the proposed methods significantly outperform simple dictionary-based methods. Moreover, the experimental results show that our methods are especially effective in translating Out-Of-Vocabulary terms and also expanding query words based on their associated terms.  相似文献   

20.
In our paper we present an experimental study which investigated the possibility to project the need for information specialists serving knowledge workers in knowledge industries on the basis of an average university library serving their counterparts at a university. Information management functions, i.e. functions and processes related to information evaluation, acquisition, metadata creation, etc., performed in an average university library are the starting point of this investigation. The fundamental assumption is that these functions do not only occur in libraries but also in other contexts like, for instance, in knowledge industries. As a consequence, we try to estimate the need for information professionals in knowledge industries by means of quantitative methods from library and information science (Library Planning Model) and economics (input output analysis, occupational analysis). Our study confirms the validity of our assumption. Accordingly, the number of information specialists projected on the basis of university libraries is consistent with their actual number reported in national statistics. However, in order to attain a close fit, we had to revise the original research model by dismissing the split-up of information specialists into reader services and technical services staff.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号