Search results

1 – 10 of 770
Article
Publication date: 1 September 2001

M. Chatziarsenis, E. Makri, W. Sapouna‐Chatziarseni, M. Fioretos, T. Faresjö, E. Trell and C. Lionis

Addresses the important question of the optimal share and distribution of primary and hospital care, stating that the end‐user consensus is essential. On a classical medical…

217

Abstract

Addresses the important question of the optimal share and distribution of primary and hospital care, stating that the end‐user consensus is essential. On a classical medical ground with integrated medical services the care seeking patterns and preferences were investigated in a representative sample of the, hence reasonably unbiased, native population. In a small Cretan township hospital combining secondary and primary care, a questionnaire of habits, perceptions and expectations of health services delivery and provision was distributed to a consecutive visitor sample. Overall, primary care was well and realistically appreciated. In six of the 12 conditions, mostly with fever and/or pain, general practitioners were clearly preferred while in three, as a rule organ‐associated, specialists were the first choice. The consumer‐oriented survey brings additional support to the vital role of primary care in the ongoing health systems development.

Details

International Journal of Health Care Quality Assurance, vol. 14 no. 5
Type: Research Article
ISSN: 0952-6862

Keywords

Article
Publication date: 18 February 2020

Sanda Erdelez and Stephann Makri

In order to understand the totality, diversity and richness of human information behavior, increasing research attention has been paid to examining serendipity in the context of…

1707

Abstract

Purpose

In order to understand the totality, diversity and richness of human information behavior, increasing research attention has been paid to examining serendipity in the context of information acquisition. However, several issues have arisen as this research subfield has tried to find its feet; we have used different, inconsistent terminology to define this phenomenon (e.g. information encountering, accidental information discovery, incidental information acquisition), the scope of the phenomenon has not been clearly defined and its nature was not fully understood or fleshed-out.

Design/methodology/approach

In this paper, information encountering (IE) was proposed as the preferred term for serendipity in the context of information acquisition.

Findings

A reconceptualized definition and scope of IE was presented, a temporal model of IE and a refined model of IE that integrates the IE process with contextual factors and extends previous models of IE to include additional information acquisition activities pre- and postencounter.

Originality/value

By providing a more precise definition, clearer scope and richer theoretical description of the nature of IE, there was hope to make the phenomenon of serendipity in the context of information acquisition more accessible, encouraging future research consistency and thereby promoting deeper, more unified theoretical development.

Details

Journal of Documentation, vol. 76 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 7 October 2014

Allen Edward Foster and David Ellis

– The purpose of this paper is to explore the concept of serendipity and approaches to its study particularly in relation to information studies.

2171

Abstract

Purpose

The purpose of this paper is to explore the concept of serendipity and approaches to its study particularly in relation to information studies.

Design/methodology/approach

The origins of the term serendipity are described and its elaboration as an exploratory and explanatory concept in science and the social sciences are outlined. The distinction between serendipity and serendipity pattern is explained and theoretical and empirical studies of both serendipity and the serendipity patterns are explored. The relationship between information encountering is described. Empirical studies of serendipity using Citation Classics and other research approaches in information studies are described.

Findings

The discrepancy between occurrences of serendipity in studies using Citation Classics and reported serendipity in philosophy of science, research anecdotes, information encountering and information seeking by inter-disciplinary researchers is highlighted. A comparison between a process model of serendipity and serendipity as an emergent behavioural characteristic are indicates directions for future research.

Originality/value

The paper provides and original synthesis of the theoretical and empirical literature on serendipity with particular reference to work in information studies and an indication of the methodological difficulties involved in its study.

Details

Journal of Documentation, vol. 70 no. 6
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 16 July 2021

Yaxi Liu, Chunxiu Qin, Xubu Ma and Huigang Liang

Serendipitous information discovery has become a unique and important approach to discovering and obtaining information, which has aroused a growing interest for serendipity in…

1433

Abstract

Purpose

Serendipitous information discovery has become a unique and important approach to discovering and obtaining information, which has aroused a growing interest for serendipity in human information behavior. Despite numerous publications, few have systematically provided an overview of current state of serendipity research. Consequently, researchers and practitioners are less able to make effective use of existing achievements, which limits them from making advancements in this domain. Against this backdrop, we performed a systematic literature review to explore the world of serendipity and to recapitulate the current states of different research topics.

Design/methodology/approach

Guided by a prior designed review protocol, this paper conducted both automatic and manual search for available studies published from January 1990 to December 2020 on seven databases. A total of 207 serendipity studies closely related to human information behavior form the literature pool.

Findings

We provide an overview of distinct aspects of serendipity, that is research topics, potential benefits, related concepts, theoretical models, contextual factors and data collection methods. Based on these findings, this review reveals limitations and gaps in the current serendipity research and proposes an agenda for future research directions.

Originality/value

By analyzing current serendipity research, developing a knowledge framework and providing a research agenda, this review is of significance for researchers who want to find new research questions or re-align current work, for beginners who need to quickly understand serendipity, and for practitioners who seek to cultivate serendipity in information environments.

Article
Publication date: 30 August 2022

Annelien Smets

This article aims to gain a better understanding of the reasons why serendipity is designed for in different kinds of environments. Understanding these design intents sheds light…

Abstract

Purpose

This article aims to gain a better understanding of the reasons why serendipity is designed for in different kinds of environments. Understanding these design intents sheds light on the value such designs bring to designers, in contrast to the users of the environment. In this way, the article seeks to contribute to the literature on cultivating serendipity from a designers’ point of view.

Design/methodology/approach

An extensive review of the literature discussing designing for serendipity was conducted to elicit the different motivations to design for serendipity. Based on these findings and a thorough analysis, a typology of design intents for serendipity is presented.

Findings

The article puts forward four intents to design for serendipity: serendipity as an ideal, common good, mediator and feature. It also highlights that the current academic discourse puts a strong emphasis on two of them. It is argued that this academic abstraction could be problematic for how we deal with designs for serendipity, both in theory and practice.

Originality/value

The novelty of this article is that it addresses the question of why to design for serendipity from a designer’s point of view. By introducing the notion of directionality it opens up the opportunity to discuss serendipity from multiple perspectives, which contributes to gaining a firmer understanding of serendipity. It allows to more explicitly formulate the different functions of a design for serendipity and thereby expands our knowledge on the value of designing for serendipity. At the same time, it sheds light on the potential threats to designing for serendipity.

Details

Journal of Documentation, vol. 79 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 18 May 2020

Eleni-Laskarina Makri, Zafeiroula Georgiopoulou and Costas Lambrinoudakis

This study aims to assist organizations to protect the privacy of their users and the security of the data that they store and process. Users may be the customers of the…

Abstract

Purpose

This study aims to assist organizations to protect the privacy of their users and the security of the data that they store and process. Users may be the customers of the organization (people using the offered services) or the employees (users who operate the systems of the organization). To be more specific, this paper proposes a privacy impact assessment (PIA) method that explicitly takes into account the organizational characteristics and employs a list of well-defined metrics as input, demonstrating its applicability to two hospital information systems with different characteristics.

Design/methodology/approach

This paper presents a PIA method that employs metrics and takes into account the peculiarities and other characteristics of the organization. The applicability of the method has been demonstrated on two Hospital Information Systems with different characteristics. The aim is to assist the organizations to estimate the criticality of potential privacy breaches and, thus, to select the appropriate security measures for the protection of the data that they collect, process and store.

Findings

The results of the proposed PIA method highlight the criticality of each privacy principle for every data set maintained by the organization. The method employed for the calculation of the criticality level, takes into account the consequences that the organization may experience in case of a security or privacy violation incident on a specific data set, the weighting of each privacy principle and the unique characteristics of each organization. So, the results of the proposed PIA method offer a strong indication of the security measures and privacy enforcement mechanisms that the organization should adopt to effectively protect its data.

Originality/value

The novelty of the method is that it handles security and privacy requirements simultaneously, as it uses the results of risk analysis together with those of a PIA. A further novelty of the method is that it introduces metrics for the quantification of the requirements and also that it takes into account the specific characteristics of the organization.

Details

Information & Computer Security, vol. 28 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 14 February 2020

Tingting Jiang, Shiting Fu and Enmei Song

One of the primary challenges of conducting information encountering (IE) research is the difficulty in capturing people's IE experiences. The purpose of this paper is to develop…

Abstract

Purpose

One of the primary challenges of conducting information encountering (IE) research is the difficulty in capturing people's IE experiences. The purpose of this paper is to develop a general description framework of IE experiences as guidance for participants to record diary entries in diary studies of IE.

Design/methodology/approach

340 descriptions of IE incidents were collected from 18 previous IE studies as secondary data. A thematic analysis of the secondary data engendered a general description framework of IE experiences composed of 9 main themes and 31 sub-themes. The framework was then applied in a diary study to investigate Generation Z's online IE behavior.

Findings

The nine main themes of the framework, including “environment”, “foreground activity”, “stimulus noticed”, “reaction to stimulus”, “content examined”, “interaction with encountered information”, “value of experience”, “pre-encountering emotional state”, and “post-encountering emotional state”, were used to create a diary questionnaire for collecting IE incidents. The sub-themes were refined and organized into a coding scheme for the content analysis of the incidents collected. The diary study collected 255 valid IE incidents which were analyzed based on three phases, that is, pre-encountering, encountering, and post-encountering.

Originality/value

The value of this study consists in its methodological contributions. First, it makes creative use of secondary data accumulated in the literature and derives from the thematic analysis a general framework which people follow to describe their IE experiences. Second, it demonstrates the great potential of diaries for data collection in IE research through the successful application of the general description framework of IE experiences in a diary study. Third, the diary questionnaire created based on the framework provides sufficient guidance in eliciting complete and detailed IE incidents.

Details

Journal of Documentation, vol. 76 no. 4
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 2 February 2018

Xiaosong Zhou, Xu Sun, Qingfeng Wang and Sarah Sharples

The current understanding of serendipity is based primarily on studies employing westerners as the participants, and it remains uncertain whether or not this understanding would…

Abstract

Purpose

The current understanding of serendipity is based primarily on studies employing westerners as the participants, and it remains uncertain whether or not this understanding would be pervasive under different cultures, such as in China. In addition, there is not a sufficient systematic investigation of context during the occurrence of serendipity in current studies. The purpose of this paper is to examine the above issues by conducting a follow-up empirical study with a group of Chinese scholars.

Design/methodology/approach

The social media application “WeChat” was employed as a research tool. A diary-based study was conducted and 16 participants were required to send to the researchers any cases of serendipity they encountered during a period of two weeks, and this was followed by a post-interview.

Findings

Chinese scholars experienced serendipity in line with the three main processes of: encountering unexpectedness, connection-making and recognising the value. An updated context-based serendipity model was constructed, where the role of context during each episode of experiencing serendipity was identified, including the external context (e.g. time, location and status), the social context and the internal context (e.g. precipitating conditions, sagacity/perceptiveness and emotion).

Originality/value

The updated context model provides a further understanding of the role played by context during the different processes of serendipity. The framework for experiencing serendipity has been expanded, and this may be used to classify the categories of serendipity.

Details

Journal of Documentation, vol. 74 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 2 May 2018

Trevor Gerhardt and Linda Mackenzie-Philps

Programmes and courses integrating learning and work, captured generally in this paper as work integrated learning (WIL), usually provide flexible and innovative learning…

Abstract

Purpose

Programmes and courses integrating learning and work, captured generally in this paper as work integrated learning (WIL), usually provide flexible and innovative learning opportunities. In a digital age, information and communication technologies (ICTs) can be vital in delivering and enhancing such hybrid forms of WIL. The purpose of this paper is to explore the correlation and trajectory of ICT use among priests in the Church of England in the various forms of WIL.

Design/methodology/approach

The case study explores ICT use among a sample of Church of England priests by examining initially their use of virtual learning environments (VLEs) such as Blackboard and Moodle in work-based learning (WBL); and assessing the trajectory and correlation to work-related learning (WRL) through their use of social networking/engagement tools such as Facebook and Twitter in continuing professional development courses (CPD). The correlation and trajectory is provided through a document analysis of VLE access and a survey questionnaire.

Findings

Priests in WBL and priests engaged in WRL (i.e. CPD courses) revealed a correlation in the lack of ICT pervasiveness. With only a minority of priests engaging in further higher education (HE), the familiarity and use of ICT such as VLE platforms stagnated or declined. Correlated with social networking/engagement, priests overwhelmingly cited the “lack of time” as a reason not to engage with social media, however, ICT reluctance caused by fear was the trajectory resulting in a further lack of “ICT pervasiveness”.

Research limitations/implications

While results may be generalisable among Church of England priests and other faith communities internationally, due to its unique and distinctive parameters, it is not generalisable to the general mature student adult education population.

Practical implications

The case study highlighted that continued intentional familiarisation and use of ICT within the various forms of WIL programmes and courses among “non-digital natives” would enhance learning. Such learning in WIL would be beneficial for HE programmes addressing e-readiness as a priority.

Social implications

Specific to the sample case study, considering the importance of community engagement and WIL, this study highlights the challenges and changes required for improved social capital within the field of ICT and adult education.

Originality/value

No studies have considered the training and education of priests as a WIL case study of ICT “pervasiveness” and self-efficacy.

Details

Higher Education, Skills and Work-Based Learning, vol. 8 no. 4
Type: Research Article
ISSN: 2042-3896

Keywords

Article
Publication date: 9 May 2016

Andrea Ganzaroli, Ivan De Noni, Luigi Orsi and Fiorenza Belussi

The purpose of this paper is to investigate the combined effect of Mergers and Acquisitions (M & A) partners’ technological relatedness and the acquirer’s effective…

1077

Abstract

Purpose

The purpose of this paper is to investigate the combined effect of Mergers and Acquisitions (M & A) partners’ technological relatedness and the acquirer’s effective utilization of the target’s knowledge on explorative and exploitative invention performance post-M & A.

Design/methodology/approach

Based on the knowledge perspective of an M & A, this study measures how much of the target’s knowledge acquired in an M & A has been effectively transformed into new knowledge. A negative binomial regression on a cross-sectional data set of 152 bio-pharmaceutical firms (59 European firms and 93 North American firms) completing at least one M & A in the period between 2001 and 2005 is conducted. The effect of knowledge utilization is assessed by comparing performance six years before the M & A and six years after.

Findings

The effective assimilation and utilization of acquired knowledge positively affects both acquirers’ explorative and exploitative performance post-M & As. The combined effect with technological relatedness, measured as similarity and complementarity, further enhances the acquirer’s technological performance. However, while the utilization of similar knowledge significantly affects only exploitative invention performance, the utilization of complementary knowledge influences both, although explorative more than exploitative performance.

Originality/value

The acquirer’s ability to effectively use the target’s knowledge is crucial in order to support the transformation of the inventive potential, such as is embodied in the interaction between an internal and an external base of knowledge, into new explorative and exploitative performance.

Details

European Journal of Innovation Management, vol. 19 no. 2
Type: Research Article
ISSN: 1460-1060

Keywords

1 – 10 of 770