Search results

1 – 10 of over 9000
Open Access
Article
Publication date: 18 July 2023

Anthony W. Dunbar

This paper is an extension of a panel presentation delivered in response to a joint call for panels by the Social Informatics and Information Ethics and Policy Special Interest…

1282

Abstract

Purpose

This paper is an extension of a panel presentation delivered in response to a joint call for panels by the Social Informatics and Information Ethics and Policy Special Interest Groups for the 2022 Association for Information Science and Technology conference. The purpose is to introduce critical race frameworks and tenets as a lens to develop, assess and analyze the social informatics (SI) within information science (IS) research, professional discourse, praxis and pedagogical paradigms. This paper spotlights one of the presentations from that panel, an iteration of Critical Race Theory (CRT) designed specifically for information studies: CRiTical Race information Theory (CRiT).

Design/methodology/approach

Just as importantly, using SI as part of the context, the paper also includes a discussion that illustrates research and theory building possibilities as both counter and complement to the technocratic advances that permeate society at every level (macro, mezzo and micro), which can also be reasonably framed as the information industrial complex. Thus, CRiT joins other forms of critical discourse and praxis grappling with deconstructing, decolonizing, demarginalizing and demystifying the influence and impact of information technologies. While CRiT has global intentions and implications, this specific discussion has an extensive American focus.

Findings

If we consider the rapid pace in which techno-determinism is moving toward the vise grip of techno-fatalism controlled by frameworks generated from the information industrial complex, we can reasonably consider that humanity on a global basis is living within a meta-large technocratic crisis moment. This crisis moment is both acute and chronic. That is, the technocratic crisis is continuously moving quickly while simultaneously worsening over an extended period of time with no remedies and few responses to substantively address the crisis.

Research limitations/implications

Part of the nature of information and data is measurability. Thus, identifying compatible nomenclature connecting the descriptiveness of intersectionality (a seminal CRT tool) as a qualitative research method to the measurability of data connected to quantitative research, a mixed method approach moves from possible to plausible. Additionally, within IS, there are often opportunities to measure human engagement, such as social media content, search engine use, assessing practices of categorizations, and multiple forms of surveillance data as a short list. Hence, the descriptiveness of intersectional qualitative research “mixed” with the measurability of quantitative research within information settings implies exponential methodological possibilities.

Practical implications

CRiT is multilayered, on the one hand, with the intention of being a discipline-specific, information-specific form of CRT. On the other hand, CRiT theory building is interdisciplinary and transdisciplinary based on information as omnipresent phenomena. An ongoing challenge for CRiT theory building is identifying and working within a balance between, practitioners who typically throw anything and everything at practical problems, while scholars often slice problems into such small segments that practical understanding is severely limited. Embracing and integrating the dynamic interplay between developing ideas and using them is the key to evolving CRiT within the social sciences.

Social implications

There is plenty of room as well as a need for additional narrative discussing or challenging the use or appropriation of information from a technocratic approach, a counter to the information industrial complex.

Originality/value

CRiT is emerging and cutting edge in discussion that addresses the technocratic determinism found in most scholarly discourses.

Open Access
Article
Publication date: 6 October 2023

Reijo Savolainen

To elaborate the picture of credibility assessment by examining how participants of online discussion evaluate the informational credibility of conspiracy theories.

Abstract

Purpose

To elaborate the picture of credibility assessment by examining how participants of online discussion evaluate the informational credibility of conspiracy theories.

Design/methodology/approach

Descriptive quantitative analysis and qualitative content analysis of 2,663 posts submitted to seven Reddit threads discussing a conspiracy operation, that is, the damage of the Nord Stream gas pipelines in September 2022. It was examined how the participants of online discussion assess the credibility of information constitutive of conspiracy theories speculating about (1) suspected actors responsible for the damage, (2) their motives and (3) the ways in which the damage was made. The credibility assessments focussed on diverse sources offering information about the above three factors.

Findings

The participants assessed the credibility of information by drawing on four main criteria: plausibility of arguments, honesty in argumentation, similarity to one's beliefs and provision of evidence. Most assessments were negative and indicated doubt about the informational believability of conspiracy theories about the damage. Of the information sources referred to in the discussion, the posts submitted by fellow participants, television programmes and statements provided by governmental organizations were judged most critically, due to implausible argumentation and advocacy of biased views.

Research limitations/implications

As the study focuses on a sample of posts dealing with conspiracy theories about a particular event, the findings cannot be generalized to concern the informational credibility conspiracy narratives.

Originality/value

The study pioneers by providing an in-depth analysis of the nature of credibility assessments by focussing on information constitutive of conspiracy theories.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Open Access
Article
Publication date: 5 September 2023

Vivien Petras

This paper offers a definition of the core of information science, which encompasses most research in the field. The definition provides a unique identity for information science…

2621

Abstract

Purpose

This paper offers a definition of the core of information science, which encompasses most research in the field. The definition provides a unique identity for information science and positions it in the disciplinary universe.

Design/methodology/approach

After motivating the objective, a definition of the core and an explanation of its key aspects are provided. The definition is related to other definitions of information science before controversial discourse aspects are briefly addressed: discipline vs. field, science vs. humanities, library vs. information science and application vs. theory. Interdisciplinarity as an often-assumed foundation of information science is challenged.

Findings

Information science is concerned with how information is manifested across space and time. Information is manifested to facilitate and support the representation, access, documentation and preservation of ideas, activities, or practices, and to enable different types of interactions. Research and professional practice encompass the infrastructures – institutions and technology –and phenomena and practices around manifested information across space and time as its core contribution to the scholarly landscape. Information science collaborates with other disciplines to work on complex information problems that need multi- and interdisciplinary approaches to address them.

Originality/value

The paper argues that new information problems may change the core of the field, but throughout its existence, the discipline has remained quite stable in its central focus, yet proved to be highly adaptive to the tremendous changes in the forms, practices, institutions and technologies around and for manifested information.

Details

Journal of Documentation, vol. 80 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 30 December 2022

Durga Prasad Dube and Rajendra Prasad Mohanty

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for…

1606

Abstract

Purpose

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for evaluating the efficiency of cyber security organization but what matters is how the factors of internal efficiency affect the business performance, i.e. the external effectiveness. The purpose of this research paper is to derive the factors of internal efficiency and external effectiveness of cyber security and develop impact model to identify the most and least preferred parameters of internal efficiency with respect to all the parameters of external effectiveness.

Design/methodology/approach

There are two objectives for this research: Deriving the factors of internal efficiency and external effectiveness of cyber security; Developing a model to identify the impact of internal efficiency factors on the external effectiveness of cyber security since there is not much evidence of research in defining the factors of internal efficiency and external effectiveness of cyber security, the authors have chosen grounded theory methodology (GTM) to derive the parameters. In this study emic approach of GTM is followed and an algorithm is developed for administering the grounded theory research process. For the second research objective survey methodology and rank order was used to formulate the impact model. Two different samples and questionnaires were designed for each of the objectives.

Findings

For the objective 1, 11 factors of efficiency and 10 factors of effectiveness were derived. These are used as independent and dependent variable respectively in the later part of the research for the second objective. For the objective 2 the impact models among independent and dependent variables were formulated to find out the following. Most and least preferred parameters lead to internal efficiency of cyber security organization to identify the most and least preferred parameters of internal efficiency with respect to all the parameters external effectiveness.

Research limitations/implications

The factors of internal efficiency and external effectiveness constructed by using grounded theory cannot remain constant in the long run, because of dynamism of the domain itself. Over and above this, there are inherent limitations of the tools like grounded theory, used in the research. Few important limitations of GTM are as below in grounded theory, it is comparatively difficult to maintain and demonstrate the rigors of research discipline. The sheer volume of data makes the analysis and interpretation complex, and lengthy time consuming. The researchers’ presence during data gathering, which is often unavoidable and desirable too in qualitative research, may affect the subjects’ responses. The subjectivity of the data leads to difficulties in establishing reliability and validity of approaches and information. It is difficult to detect or to prevent researcher-induced bias.

Practical implications

The internal efficiency and external effectiveness factors of cyber security can be further correlated by the future researchers to understand the correlations among all the factors and predict cyber security performance. The grounded theory algorithm developed by us can be further used for qualitative research for deriving theory through abstractions in the areas where there is no sufficient availability of data. Practitioners of cyber security can use this research to focus on relevant areas depending on their respective business objective/requirements. The models developed by us can be used by the future researchers to for various sectoral validations and correlations.

Social implications

Though the financial costs of a cyber-attack are steep, the social impact of cyber security failures is less readily apparent but can cause lasting damage to customers, employees and the company. Therefore, it is always important to be mindful of how the impact of cyber security affects society as well as the bottom line when they are calculating the potential impact of a breach. Underestimating either impact can destroy a brand. The factor of internal efficiency and external effectiveness derived by us will help stakeholder in focusing on relevant area depending on their business. The impact model developed in this research is very useful for focusing a particular business requirement and accordingly tune the efficiency factor.

Originality/value

During literature study the authors did not find any evidence of application of grounded theory approach in cyber security research. While the authors were exploring research literature to find out some insight into the factor of internal efficiency and external effectiveness of cyber security, the authors did not find concrete and objective research on this. This motivated us to use grounded theory to derive these factors. This, in the authors’ opinion is one of the pioneering and unique contribution to the research as to the authors’ knowledge no researchers have ever tried to use this methodology for the stated purpose and cyber security domain in general. In this process the authors have also developed an algorithm for administering GTM. Further developing impact models using factors of internal efficiency and external effectiveness has lots of managerial and practical implication.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 9 October 2018

Birger Hjørland

The purpose of this paper is to make a critical analysis of the views put forward by Claudio Gnoli (2018) in this paper concerning philosophical problems in library and information

3616

Abstract

Purpose

The purpose of this paper is to make a critical analysis of the views put forward by Claudio Gnoli (2018) in this paper concerning philosophical problems in library and information science (LIS).

Design/methodology/approach

The paper presents the basic ideas in Gnoli (2018) and discusses the set of basic assumptions, concepts and conclusions put forward.

Findings

It is argued that the idea of the theory of levels is basically sound, but we do not need to consider the material world, the mental world (minds) and the world of mentefacts as three different worlds. They represent different levels with different kinds of emergent properties in the world. Further, although the concepts of artifacts and mentefacts are useful, there are other terms within LIS, such as document, work and object that have been influential and should be discussed in this context. It is also argued that subjective vs objective knowledge is often confused with private vs public knowledge, which is problematic. Finally, it is claimed that the cognitive view and the “sociological view” are not about two different levels of reality but are competing views about the same reality.

Originality/value

The paper clarifies some aspects of the analytical framework of domain analysis and adds to the developments of the philosophical dimensions of information within LIS.

Details

Journal of Documentation, vol. 75 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 22 August 2023

Brijesh Sivathanu, Rajasshrie Pillai, Mahek Mahtta and Angappa Gunasekaran

This study aims to examine the tourists' visit intention by watching deepfake destination videos, using Information Manipulation and Media Richness Theory.

1070

Abstract

Purpose

This study aims to examine the tourists' visit intention by watching deepfake destination videos, using Information Manipulation and Media Richness Theory.

Design/methodology/approach

This study conducted a primary survey utilizing a structured questionnaire. In total, 1,360 tourists were surveyed, and quantitative data analysis was done using PLS-SEM.

Findings

The results indicate that the factors that affect the tourists' visit intention after watching deepfake videos include information manipulation tactics, trust and media richness. This study also found that perceived deception and cognitive load do not influence the tourists' visit intention.

Originality/value

The originality/salience of this study lies in the fact that this is possibly among the first to combine the Media Richness Theory and Information Manipulation for understanding tourists' visit intention and post-viewing deepfake destination videos.

Details

Journal of Tourism Futures, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2055-5911

Keywords

Open Access
Article
Publication date: 15 January 2020

Tim Gorichanaz, Jonathan Furner, Lai Ma, David Bawden, Lyn Robinson, Dominic Dixon, Ken Herold, Sille Obelitz Søe, Betsy Van der Veer Martens and Luciano Floridi

The purpose of this paper is to review and discuss Luciano Floridi’s 2019 book The Logic of Information: A Theory of Philosophy as Conceptual Design, the latest instalment in his…

3864

Abstract

Purpose

The purpose of this paper is to review and discuss Luciano Floridi’s 2019 book The Logic of Information: A Theory of Philosophy as Conceptual Design, the latest instalment in his philosophy of information (PI) tetralogy, particularly with respect to its implications for library and information studies (LIS).

Design/methodology/approach

Nine scholars with research interests in philosophy and LIS read and responded to the book, raising critical and heuristic questions in the spirit of scholarly dialogue. Floridi responded to these questions.

Findings

Floridi’s PI, including this latest publication, is of interest to LIS scholars, and much insight can be gained by exploring this connection. It seems also that LIS has the potential to contribute to PI’s further development in some respects.

Research limitations/implications

Floridi’s PI work is technical philosophy for which many LIS scholars do not have the training or patience to engage with, yet doing so is rewarding. This suggests a role for translational work between philosophy and LIS.

Originality/value

The book symposium format, not yet seen in LIS, provides forum for sustained, multifaceted and generative dialogue around ideas.

Details

Journal of Documentation, vol. 76 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 11 March 2022

Andrei Khrennikov

This paper aims to present the basic assumptions for creation of social Fröhlich condensate and attract attention of other researchers (both from physics and socio-political…

Abstract

Purpose

This paper aims to present the basic assumptions for creation of social Fröhlich condensate and attract attention of other researchers (both from physics and socio-political science) to the problem of modeling of stability and order preservation in highly energetic society coupled with social energy bath of high temperature.

Design/methodology/approach

The model of social Fröhlich condensation and its analysis are based on the mathematical formalism of quantum thermodynamics and field theory (applied outside of physics).

Findings

The presented quantum-like model provides the consistent operational model of such complex socio-political phenomenon as Fröhlich condensation.

Research limitations/implications

The model of social Fröhlich condensation is heavily based on theory of open quantum systems. Its consistent elaboration needs additional efforts.

Practical implications

Evidence of such phenomenon as social Fröhlich condensation is demonstrated by stability of modern informationally open societies.

Social implications

Approaching the state of Fröhlich condensation is the powerful source of social stability. Understanding its informational structure and origin may help to stabilize the modern society.

Originality/value

Application of the quantum-like model of Fröhlich condensation in social and political sciences is really the novel and original approach to mathematical modeling of social stability in society exposed to powerful information radiation from mass-media and Internet-based sources.

Open Access
Article
Publication date: 7 December 2017

Sille Obelitz Søe

With the outset of automatic detection of information, misinformation, and disinformation, the purpose of this paper is to examine and discuss various conceptions of information

13900

Abstract

Purpose

With the outset of automatic detection of information, misinformation, and disinformation, the purpose of this paper is to examine and discuss various conceptions of information, misinformation, and disinformation within philosophy of information.

Design/methodology/approach

The examinations are conducted within a Gricean framework in order to account for the communicative aspects of information, misinformation, and disinformation as well as the detection enterprise.

Findings

While there often is an exclusive focus on truth and falsity as that which distinguish information from misinformation and disinformation, this paper finds that the distinguishing features are actually intention/intentionality and non-misleadingness/misleadingness – with non-misleadingness/misleadingness as the primary feature. Further, the paper rehearses the argument in favor of a true variety of disinformation and extends this argument to include true misinformation.

Originality/value

The findings are novel and pose a challenge to the possibility of automatic detection of misinformation and disinformation. Especially the notions of true disinformation and true misinformation, as varieties of disinformation and misinformation, which force the true/false dichotomy for information vs mis-/disinformation to collapse.

Details

Journal of Documentation, vol. 74 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 6 February 2023

Assunta Di Vaio, Badar Latif, Nuwan Gunarathne, Manjul Gupta and Idiano D'Adamo

In this study, the authors examine artificial knowledge as a fundamental stream of knowledge management for sustainable and resilient business models in supply chain management…

10063

Abstract

Purpose

In this study, the authors examine artificial knowledge as a fundamental stream of knowledge management for sustainable and resilient business models in supply chain management (SCM). The study aims to provide a comprehensive overview of artificial knowledge and digitalization as key enablers of the improvement of SCM accountability and sustainable performance towards the UN 2030 Agenda.

Design/methodology/approach

Using the SCOPUS database and Google Scholar, the authors analyzed 135 English-language publications from 1990 to 2022 to chart the pattern of knowledge production and dissemination in the literature. The data were collected, reviewed and peer-reviewed before conducting bibliometric analysis and a systematic literature review to support future research agenda.

Findings

The results highlight that artificial knowledge and digitalization are linked to the UN 2030 Agenda. The analysis further identifies the main issues in achieving sustainable and resilient SCM business models. Based on the results, the authors develop a conceptual framework for artificial knowledge and digitalization in SCM to increase accountability and sustainable performance, especially in times of sudden crises when business resilience is imperative.

Research limitations/implications

The study results add to the extant literature by examining artificial knowledge and digitalization from the resilience theory perspective. The authors suggest that different strategic perspectives significantly promote resilience for SCM digitization and sustainable development. Notably, fostering diverse peer exchange relationships can help stimulate peer knowledge and act as a palliative mechanism that builds digital knowledge to strengthen and drive future possibilities.

Practical implications

This research offers valuable guidance to supply chain practitioners, managers and policymakers in re-thinking, re-formulating and re-shaping organizational processes to meet the UN 2030 Agenda, mainly by introducing artificial knowledge in digital transformation training and education programs. In doing so, firms should focus not simply on digital transformation but also on cultural transformation to enhance SCM accountability and sustainable performance in resilient business models.

Originality/value

This study is, to the authors' best knowledge, among the first to conceptualize artificial knowledge and digitalization issues in SCM. It further integrates resilience theory with institutional theory, legitimacy theory and stakeholder theory as the theoretical foundations of artificial knowledge in SCM, based on firms' responsibility to fulfill the sustainable development goals under the UN's 2030 Agenda.

Details

Journal of Enterprise Information Management, vol. 37 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 10 of over 9000