Search results

1 – 6 of 6
Article
Publication date: 26 March 2024

Md. Nurul Islam, Guangwei Hu, Murtaza Ashiq and Shakil Ahmad

This bibliometric study aims to analyze the latest trends and patterns of big data applications in librarianship from 2000 to 2022. By conducting a comprehensive examination of…

Abstract

Purpose

This bibliometric study aims to analyze the latest trends and patterns of big data applications in librarianship from 2000 to 2022. By conducting a comprehensive examination of the existing literature, this study aims to provide valuable insights into the emerging field of big data in librarianship and its potential impact on the future of libraries.

Design/methodology/approach

This study employed a rigorous four-stage process of identification, screening, eligibility and inclusion to filter and select the most relevant documents for analysis. The Scopus database was utilized to retrieve pertinent data related to big data applications in librarianship. The dataset comprised 430 documents, including journal articles, conference papers, book chapters, reviews and books. Through bibliometric analysis, the study examined the effectiveness of different publication types and identified the main topics and themes within the field.

Findings

The study found that the field of big data in librarianship is growing rapidly, with a significant increase in publications and citations over the past few years. China is the leading country in terms of publication output, followed by the United States of America. The most influential journals in the field are Library Hi Tech and the ACM International Conference Proceeding Series. The top authors in the field are Minami T, Wu J, Fox EA and Giles CL. The most common keywords in the literature are big data, librarianship, data mining, information retrieval, machine learning and webometrics.

Originality/value

This bibliometric study contributes to the existing body of literature by comprehensively analyzing the latest trends and patterns in big data applications within librarianship. It offers a systematic approach to understanding the state of the field and highlights the unique contributions made by various types of publications. The study’s findings and insights contribute to the originality of this research, providing a foundation for further exploration and advancement in the field of big data in librarianship.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 29 August 2023

Hei-Chia Wang, Martinus Maslim and Hung-Yu Liu

A clickbait is a deceptive headline designed to boost ad revenue without presenting closely relevant content. There are numerous negative repercussions of clickbait, such as…

Abstract

Purpose

A clickbait is a deceptive headline designed to boost ad revenue without presenting closely relevant content. There are numerous negative repercussions of clickbait, such as causing viewers to feel tricked and unhappy, causing long-term confusion, and even attracting cyber criminals. Automatic detection algorithms for clickbait have been developed to address this issue. The fact that there is only one semantic representation for the same term and a limited dataset in Chinese is a need for the existing technologies for detecting clickbait. This study aims to solve the limitations of automated clickbait detection in the Chinese dataset.

Design/methodology/approach

This study combines both to train the model to capture the probable relationship between clickbait news headlines and news content. In addition, part-of-speech elements are used to generate the most appropriate semantic representation for clickbait detection, improving clickbait detection performance.

Findings

This research successfully compiled a dataset containing up to 20,896 Chinese clickbait news articles. This collection contains news headlines, articles, categories and supplementary metadata. The suggested context-aware clickbait detection (CA-CD) model outperforms existing clickbait detection approaches on many criteria, demonstrating the proposed strategy's efficacy.

Originality/value

The originality of this study resides in the newly compiled Chinese clickbait dataset and contextual semantic representation-based clickbait detection approach employing transfer learning. This method can modify the semantic representation of each word based on context and assist the model in more precisely interpreting the original meaning of news articles.

Details

Data Technologies and Applications, vol. 58 no. 2
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 14 February 2024

Yaxi Liu, Chunxiu Qin, Yulong Wang and XuBu Ma

Exploratory search activities are ubiquitous in various information systems. Much potentially useful or even serendipitous information is discovered during the exploratory search…

Abstract

Purpose

Exploratory search activities are ubiquitous in various information systems. Much potentially useful or even serendipitous information is discovered during the exploratory search process. Given its irreplaceable role in information systems, exploratory search has attracted growing attention from the information system community. Since few studies have methodically reviewed current publications, researchers and practitioners are unable to take full advantage of existing achievements, which, in turn, limits their progress in this field. Through a literature review, this study aims to recapitulate important research topics of exploratory search in information systems, providing a research landscape of exploratory search.

Design/methodology/approach

Automatic and manual searches were performed on seven reputable databases to collect relevant literature published between January 2005 and July 2023. The literature pool contains 146 primary studies on exploratory search in information system research.

Findings

This study recapitulated five important topics of exploratory search, namely, conceptual frameworks, theoretical frameworks, influencing factors, design features and evaluation metrics. Moreover, this review revealed research gaps in current studies and proposed a knowledge framework and a research agenda for future studies.

Originality/value

This study has important implications for beginners to quickly get a snapshot of exploratory search studies, for researchers to re-align current research or discover new interesting issues, and for practitioners to design information systems that support exploratory search.

Details

The Electronic Library , vol. 42 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Open Access
Article
Publication date: 23 January 2024

Luís Jacques de Sousa, João Poças Martins, Luís Sanhudo and João Santos Baptista

This study aims to review recent advances towards the implementation of ANN and NLP applications during the budgeting phase of the construction process. During this phase…

Abstract

Purpose

This study aims to review recent advances towards the implementation of ANN and NLP applications during the budgeting phase of the construction process. During this phase, construction companies must assess the scope of each task and map the client’s expectations to an internal database of tasks, resources and costs. Quantity surveyors carry out this assessment manually with little to no computer aid, within very austere time constraints, even though these results determine the company’s bid quality and are contractually binding.

Design/methodology/approach

This paper seeks to compile applications of machine learning (ML) and natural language processing in the architectural engineering and construction sector to find which methodologies can assist this assessment. The paper carries out a systematic literature review, following the preferred reporting items for systematic reviews and meta-analyses guidelines, to survey the main scientific contributions within the topic of text classification (TC) for budgeting in construction.

Findings

This work concludes that it is necessary to develop data sets that represent the variety of tasks in construction, achieve higher accuracy algorithms, widen the scope of their application and reduce the need for expert validation of the results. Although full automation is not within reach in the short term, TC algorithms can provide helpful support tools.

Originality/value

Given the increasing interest in ML for construction and recent developments, the findings disclosed in this paper contribute to the body of knowledge, provide a more automated perspective on budgeting in construction and break ground for further implementation of text-based ML in budgeting for construction.

Details

Construction Innovation , vol. 24 no. 7
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 17 June 2021

Ambica Ghai, Pradeep Kumar and Samrat Gupta

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered…

1165

Abstract

Purpose

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered with to influence public opinion. Since the consumers of online information (misinformation) tend to trust the content when the image(s) supplement the text, image manipulation software is increasingly being used to forge the images. To address the crucial problem of image manipulation, this study focusses on developing a deep-learning-based image forgery detection framework.

Design/methodology/approach

The proposed deep-learning-based framework aims to detect images forged using copy-move and splicing techniques. The image transformation technique aids the identification of relevant features for the network to train effectively. After that, the pre-trained customized convolutional neural network is used to train on the public benchmark datasets, and the performance is evaluated on the test dataset using various parameters.

Findings

The comparative analysis of image transformation techniques and experiments conducted on benchmark datasets from a variety of socio-cultural domains establishes the effectiveness and viability of the proposed framework. These findings affirm the potential applicability of proposed framework in real-time image forgery detection.

Research limitations/implications

This study bears implications for several important aspects of research on image forgery detection. First this research adds to recent discussion on feature extraction and learning for image forgery detection. While prior research on image forgery detection, hand-crafted the features, the proposed solution contributes to stream of literature that automatically learns the features and classify the images. Second, this research contributes to ongoing effort in curtailing the spread of misinformation using images. The extant literature on spread of misinformation has prominently focussed on textual data shared over social media platforms. The study addresses the call for greater emphasis on the development of robust image transformation techniques.

Practical implications

This study carries important practical implications for various domains such as forensic sciences, media and journalism where image data is increasingly being used to make inferences. The integration of image forgery detection tools can be helpful in determining the credibility of the article or post before it is shared over the Internet. The content shared over the Internet by the users has become an important component of news reporting. The framework proposed in this paper can be further extended and trained on more annotated real-world data so as to function as a tool for fact-checkers.

Social implications

In the current scenario wherein most of the image forgery detection studies attempt to assess whether the image is real or forged in an offline mode, it is crucial to identify any trending or potential forged image as early as possible. By learning from historical data, the proposed framework can aid in early prediction of forged images to detect the newly emerging forged images even before they occur. In summary, the proposed framework has a potential to mitigate physical spreading and psychological impact of forged images on social media.

Originality/value

This study focusses on copy-move and splicing techniques while integrating transfer learning concepts to classify forged images with high accuracy. The synergistic use of hitherto little explored image transformation techniques and customized convolutional neural network helps design a robust image forgery detection framework. Experiments and findings establish that the proposed framework accurately classifies forged images, thus mitigating the negative socio-cultural spread of misinformation.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 9 May 2023

Jing Chen, Hongli Chen and Yingyun Li

Cross-app interactive search has become the new normal, but the characteristics of their tactic transitions are still unclear. This study investigated the transitions of daily…

Abstract

Purpose

Cross-app interactive search has become the new normal, but the characteristics of their tactic transitions are still unclear. This study investigated the transitions of daily search tactics during the cross-app interaction search process.

Design/methodology/approach

In total, 204 young participants' impressive cross-app search experiences in real daily situations were collected. The search tactics and tactic transition sequences in their search process were obtained by open coding. Statistical analysis and sequence analysis were used to analyze the frequently applied tactics, the frequency and probability of tactic transitions and the tactic transition sequences representing characteristics of tactic transitions occurring at the beginning, middle and ending phases. 

Findings

Creating the search statement (Creat), evaluating search results (EvalR), evaluating an individual item (EvalI) and keeping a record (Rec) were the most frequently applied tactics. The frequency and probability of transitions differed significantly between different tactic types. “Creat? EvalR? EvalI? Rec” is the typical path; Initiate the search in various ways and modifying the search statement were highlighted at the beginning phase; iteratively creating the search statement is highlighted in the middle phase; Moreover, utilization and feedback of information are highlighted at the ending phase. 

Originality/value

The present study shed new light on tactic transitions in the cross-app interactive environment to explore information search behaviour. The findings of this work provide targeted suggestions for optimizing APP query, browsing and monitoring systems.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 6 of 6