Search results

1 – 10 of 62
Open Access
Article
Publication date: 14 March 2024

Niki Chatzipanagiotou, Anita Mirijamdotter and Christina Mörtberg

This paper aims to focus on academic library managers’ learning practices in the context of cooperative work supported by computational artefacts. Academic library managers’…

Abstract

Purpose

This paper aims to focus on academic library managers’ learning practices in the context of cooperative work supported by computational artefacts. Academic library managers’ everyday work is mainly cooperative. Their cooperation is supported predominantly by computational artefacts. Learning how to use the computational artefacts efficiently and effectively involves understanding the changes in everyday work that affect managers and, therefore, it requires deep understanding of their cooperative work practices.

Design/methodology/approach

Focused ethnography was conducted through participant observations, interviews and document analysis. Ten managers from a university library in Sweden participated in the research. A thematic method was used to analyse the empirical material. Computer supported cooperative work (CSCW) and work-integrated learning was used as the conceptual lens.

Findings

Five learning practices were identified: collaboration, communication, coordination, decision-making processes and computational artefacts’ use. The findings show that learning is embedded in managers’ cooperative work practices, which do not necessarily include sufficient training time. Furthermore, learning was intertwined with cooperating and was situational. Managers learned by reflecting together on their own experiences and through joint cooperation and information sharing while using the computational artefacts.

Originality/value

The main contribution lies in providing insights into how academic library managers learn and cooperate in their everyday work, emphasizing the role of computational artefacts, the importance of the work context and the collective nature of learning. It also highlights the need for continual workplace learning in contemporary knowledge work environments. Thus, the research generates contributions to the informatics field by extending the understanding of managers’ work-integrated learning in their everyday cooperative work practices supported by computational artefacts’ use. It also contributes to the intersection of CSCW and work-integrated learning.

Details

The Learning Organization, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-6474

Keywords

Open Access
Article
Publication date: 14 August 2017

Manuel Mühlburger, Stefan Oppl and Christian Stary

Deployment of knowledge management systems (KMSs) suffers from low adoption in organizational reality that is attributed to a lack of perceivable added value for people in actual…

1448

Abstract

Purpose

Deployment of knowledge management systems (KMSs) suffers from low adoption in organizational reality that is attributed to a lack of perceivable added value for people in actual work situations. Poor task/technology fit in the process of knowledge retrieval appears to be a major factor influencing this issue. Existing research indicates a lack of re-contextualizing stored information provided by KMSs in a particular situation. Existing research in the area of organizational memory information systems (OMISs) has thoroughly examined and widely discussed the topic of re-contextualization. The purpose of this paper, thus, is to examine how KMS design can benefit from OMIS research on approaches for re-contextualization in knowledge retrieval.

Design/methodology/approach

This paper examines OMIS literature and inductively derives a categorization scheme for KMS according to their strategy of re-contextualizing knowledge. The authors have validated the scheme validated in a multiple case study that examines the differentiatory value of the scheme for approaches with various re-contextualization strategies.

Findings

The classification scheme allows a step-by-step selection of approaches for re-contextualization of information in KMS design and development derived from OMIS research. The case study has demonstrated the applicability of the developed scheme and shows that the differentiation criteria can be applied unambiguously.

Research limitations/implications

Because of the chosen case study approach for validation, the validation results may lack generalizability.

Practical implications

The scheme enables an informed selection of KMSs appropriate for a particular OMIS use case, as the scheme’s attributes serve as design rationale for a certain architecture or constellation of components. Developers can not only select from various approaches when designing re-contextualizaton but also come up with rationales for each candidate because of structured representation. Hence, stakeholders can be supported in a more informed way and design KMSs more effectively along organizational change processes.

Originality/value

The paper addresses an identified need for systematic characterization of KMS approaches and systems intending to meet the objectives of OMISs. As such, it allows streamlining further research in this field, as approaches can be judged according to their originality and positioned relative to each other.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 47 no. 3
Type: Research Article
ISSN: 2059-5891

Keywords

Open Access
Article
Publication date: 21 September 2020

Mi Jeong Kim, Yeon Sook Hwang and Ha Sung Hwang

A variety of collaborative technologies have been developed to support design communication among members of design teams, and understanding the affordances of these technologies…

1712

Abstract

Purpose

A variety of collaborative technologies have been developed to support design communication among members of design teams, and understanding the affordances of these technologies is critical to effective design collaboration. This research explores the potential of social networking as a collective medium that encourages design communication among student designers at the conceptual stage of design in a studio course.

Design/methodology/approach

For one semester, the student participants used different social networking services to communicate with their team members, and the authors analysed how they collaborated when solving a given problem using the collaborative tools.

Findings

The results show that various social networking platforms support students' communication of design and exploration of problems differently by affecting their clarification of ideas and information sharing. Collective discussion and online support are useful for framing problems and ideation in collaborative design.

Originality/value

This research proposes that social networking services appropriate to the activities needed to be chosen and provided to enable design communication to promote students' active learning through team collaboration.

Details

Archnet-IJAR: International Journal of Architectural Research, vol. 14 no. 3
Type: Research Article
ISSN: 2631-6862

Keywords

Open Access
Article
Publication date: 25 April 2024

Marianne Thejls Ziegler and Christoph Lütge

This study aims to analyse the differences between professional interaction mediated by video conferencing and direct professional interaction. The research identifies diverging…

Abstract

Purpose

This study aims to analyse the differences between professional interaction mediated by video conferencing and direct professional interaction. The research identifies diverging interests of office workers for the purpose of addressing work ethical and business ethical issues of professional collaboration, competition, and power in future hybrid work models.

Design/methodology/approach

Based on 28 qualitative interviews conducted between November 2020 and June 2021, and through the theoretical lens of phenomenology, the study develops explanatory hypotheses conceptualising four basic intentions of professional interaction and their corresponding preferences for video conferences and working on site.

Findings

The four intentions developed on the basis of the interviews are: the need for physical proximity; the challenge of collective creativity; the will to influence; and control of communication. This conceptual framework qualifies a moral ambivalence of professional interaction. The authors identify a connectivity paradox of professional interaction where the personal dimension remains unarticulated for the purpose of maintaining professionality. This tacit human connectivity is intertwined with latent power relations. This plasticity of both connectivity and power in direct interaction can be diminished by transferring the interaction to video conferencing.

Originality/value

The application of phenomenology to a collection of qualitative interviews has enabled the identification of underlying intention structures and the system in which they affect each other. This research identifies conflicts of interests between workers relative to their different self-perceived abilities to persevere in competitive professional interaction. It is therefore able to address consequences of future hybrid work models at an existential and societal level.

Open Access
Book part
Publication date: 1 October 2018

Rune Ottosen and Steen Steensen

This chapter analyses the Norwegian authorities’ presence on Twitter during the 22 July 2011 terrorist attacks. Twitter activity by two official institutions is analysed in…

Abstract

This chapter analyses the Norwegian authorities’ presence on Twitter during the 22 July 2011 terrorist attacks. Twitter activity by two official institutions is analysed in particular, namely, the blood bank at Oslo University Hospital and the Norwegian Police Security Services (PST). Our findings show that the Norwegian authorities were almost completely absent on Twitter during the critical hours of the terrorist attack, and that there was no coordination and synchronisation of communication from the authorities. This official silence allowed the diffusion of speculation and misinformation to take place; these were neither corrected nor addressed, as the analysed PST case shows. In contrast, the blood bank used Twitter to mobilise blood donors to address an acute problem: a shortage of blood to treat casualties. The chapter concludes by offering recommendations to the authorities for future major incidents.

Details

Social Media Use in Crisis and Risk Communication
Type: Book
ISBN: 978-1-78756-269-1

Keywords

Open Access
Book part
Publication date: 4 June 2021

Pam Hrick

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…

Abstract

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.

An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.

Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 9 December 2019

Zhengfa Yang, Qian Liu, Baowen Sun and Xin Zhao

This paper aims to make it convenient for those who have only just begun their research into Community Question Answering (CQA) expert recommendation, and for those who are…

1961

Abstract

Purpose

This paper aims to make it convenient for those who have only just begun their research into Community Question Answering (CQA) expert recommendation, and for those who are already concerned with this issue, to ease the extension of our understanding with future research.

Design/methodology/approach

In this paper, keywords such as “CQA”, “Social Question Answering”, “expert recommendation”, “question routing” and “expert finding” are used to search major digital libraries. The final sample includes a list of 83 relevant articles authored in academia as well as industry that have been published from January 1, 2008 to March 1, 2019.

Findings

This study proposes a comprehensive framework to categorize extant studies into three broad areas of CQA expert recommendation research: understanding profile modeling, recommendation approaches and recommendation system impacts.

Originality/value

This paper focuses on discussing and sorting out the key research issues from these three research genres. Finally, it was found that conflicting and contradictory research results and research gaps in the existing research, and then put forward the urgent research topics.

Details

International Journal of Crowd Science, vol. 3 no. 3
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 29 September 2022

Sara Willermark and Anna Sigridur Islind

This study aims to explore virtual leadership work within educational settings in the light of social disruption. In 2020, a global pandemic changed the way we work. For school…

2120

Abstract

Purpose

This study aims to explore virtual leadership work within educational settings in the light of social disruption. In 2020, a global pandemic changed the way we work. For school leaders, that involved running a virtual school overnight. Although there is a stream of research that explores leadership in solely virtual communities, there is a gap in the literature regarding practices that transition from analog to virtual practices and the changes in leadership in those types of work practices.

Design/methodology/approach

The data gathering method constitutes a questionnaire to explore school leaders’ experiences of virtual work and virtual leadership in light of social disruption. One hundred and five Swedish school leaders answered the questionnaire covering both fixed and open questions.

Findings

The results show that school leaders’ general experiences of transition to virtual school have worked relatively well. We show how the work changes and shift the focus in the virtual workplace.

Originality/value

The author’s contributions include theorizing about leadership affordances in virtual schools and providing implications for practice. The authors summarize our main contribution in five affordances that characterize virtual leadership, including a focus on core activities, trust-based government, 1:1 communication with staff, structure and clarity and active outreach activities. The results could be interesting for understanding the radical digitalization of leadership in the digital workplace.

Details

Journal of Workplace Learning, vol. 35 no. 9
Type: Research Article
ISSN: 1366-5626

Keywords

Open Access
Book part
Publication date: 29 July 2019

Isabel Fróes

Abstract

Details

Young Children’s Play Practices with Digital Tablets
Type: Book
ISBN: 978-1-78756-705-4

1 – 10 of 62