Search results

1 – 10 of over 17000
Open Access
Article
Publication date: 18 July 2023

Anthony W. Dunbar

This paper is an extension of a panel presentation delivered in response to a joint call for panels by the Social Informatics and Information Ethics and Policy Special Interest…

1297

Abstract

Purpose

This paper is an extension of a panel presentation delivered in response to a joint call for panels by the Social Informatics and Information Ethics and Policy Special Interest Groups for the 2022 Association for Information Science and Technology conference. The purpose is to introduce critical race frameworks and tenets as a lens to develop, assess and analyze the social informatics (SI) within information science (IS) research, professional discourse, praxis and pedagogical paradigms. This paper spotlights one of the presentations from that panel, an iteration of Critical Race Theory (CRT) designed specifically for information studies: CRiTical Race information Theory (CRiT).

Design/methodology/approach

Just as importantly, using SI as part of the context, the paper also includes a discussion that illustrates research and theory building possibilities as both counter and complement to the technocratic advances that permeate society at every level (macro, mezzo and micro), which can also be reasonably framed as the information industrial complex. Thus, CRiT joins other forms of critical discourse and praxis grappling with deconstructing, decolonizing, demarginalizing and demystifying the influence and impact of information technologies. While CRiT has global intentions and implications, this specific discussion has an extensive American focus.

Findings

If we consider the rapid pace in which techno-determinism is moving toward the vise grip of techno-fatalism controlled by frameworks generated from the information industrial complex, we can reasonably consider that humanity on a global basis is living within a meta-large technocratic crisis moment. This crisis moment is both acute and chronic. That is, the technocratic crisis is continuously moving quickly while simultaneously worsening over an extended period of time with no remedies and few responses to substantively address the crisis.

Research limitations/implications

Part of the nature of information and data is measurability. Thus, identifying compatible nomenclature connecting the descriptiveness of intersectionality (a seminal CRT tool) as a qualitative research method to the measurability of data connected to quantitative research, a mixed method approach moves from possible to plausible. Additionally, within IS, there are often opportunities to measure human engagement, such as social media content, search engine use, assessing practices of categorizations, and multiple forms of surveillance data as a short list. Hence, the descriptiveness of intersectional qualitative research “mixed” with the measurability of quantitative research within information settings implies exponential methodological possibilities.

Practical implications

CRiT is multilayered, on the one hand, with the intention of being a discipline-specific, information-specific form of CRT. On the other hand, CRiT theory building is interdisciplinary and transdisciplinary based on information as omnipresent phenomena. An ongoing challenge for CRiT theory building is identifying and working within a balance between, practitioners who typically throw anything and everything at practical problems, while scholars often slice problems into such small segments that practical understanding is severely limited. Embracing and integrating the dynamic interplay between developing ideas and using them is the key to evolving CRiT within the social sciences.

Social implications

There is plenty of room as well as a need for additional narrative discussing or challenging the use or appropriation of information from a technocratic approach, a counter to the information industrial complex.

Originality/value

CRiT is emerging and cutting edge in discussion that addresses the technocratic determinism found in most scholarly discourses.

Open Access
Article
Publication date: 6 October 2023

Reijo Savolainen

To elaborate the picture of credibility assessment by examining how participants of online discussion evaluate the informational credibility of conspiracy theories.

Abstract

Purpose

To elaborate the picture of credibility assessment by examining how participants of online discussion evaluate the informational credibility of conspiracy theories.

Design/methodology/approach

Descriptive quantitative analysis and qualitative content analysis of 2,663 posts submitted to seven Reddit threads discussing a conspiracy operation, that is, the damage of the Nord Stream gas pipelines in September 2022. It was examined how the participants of online discussion assess the credibility of information constitutive of conspiracy theories speculating about (1) suspected actors responsible for the damage, (2) their motives and (3) the ways in which the damage was made. The credibility assessments focussed on diverse sources offering information about the above three factors.

Findings

The participants assessed the credibility of information by drawing on four main criteria: plausibility of arguments, honesty in argumentation, similarity to one's beliefs and provision of evidence. Most assessments were negative and indicated doubt about the informational believability of conspiracy theories about the damage. Of the information sources referred to in the discussion, the posts submitted by fellow participants, television programmes and statements provided by governmental organizations were judged most critically, due to implausible argumentation and advocacy of biased views.

Research limitations/implications

As the study focuses on a sample of posts dealing with conspiracy theories about a particular event, the findings cannot be generalized to concern the informational credibility conspiracy narratives.

Originality/value

The study pioneers by providing an in-depth analysis of the nature of credibility assessments by focussing on information constitutive of conspiracy theories.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Content available
Book part
Publication date: 30 June 2023

Lisa M. Given, Donald O. Case and Rebekah Willson

Abstract

Details

Looking for Information
Type: Book
ISBN: 978-1-80382-424-6

Content available
Book part
Publication date: 21 July 2022

Ian Ruthven

Abstract

Details

Dealing With Change Through Information Sculpting
Type: Book
ISBN: 978-1-80382-047-7

Content available
Article
Publication date: 1 May 2006

Jessica Bates

2459

Abstract

Details

Journal of Documentation, vol. 62 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Content available
Article
Publication date: 8 June 2021

Kelly Gerakoudi-Ventouri

A significant body of literature suggests that shipping companies operate in an extremely volatile and risky environment, relying on the effective use of information to remain…

1080

Abstract

Purpose

A significant body of literature suggests that shipping companies operate in an extremely volatile and risky environment, relying on the effective use of information to remain competitive. However, decision-making in this market is demanding because of the high uncertainty, market competition and significant capital investments. Moreover, the rapid spread of COVID-19 renders information uncertainty a daunting challenge for companies engaged in global trade. Hence, this study aims to explore the information behavior of managers in a time of crisis seems compelling.

Design/methodology/approach

This study provides novel insights into the information behavior of senior managers by adopting a qualitative approach. Forty-nine semi-structured face-to-face interviews with individuals from Hellenic shipping companies were conducted. Moreover, this study explores the extant theory qualitatively, using the grounded theory methodology and shows that an unprecedented event (pandemic crisis) can redefine the information behavior of managers.

Findings

This study highlights the importance of information in decision-making. Moreover, the results show that, during a pandemic, managers resort to alternative information sources, adopt collaborative information behaviors and take advantage of digital technology.

Originality/value

There is limited research in exploring the information behavior of managers in times of pandemics. This research underscores the fact that during a crisis, managers seek information from digital information resources and decision-making assumes a more decentralized form. This study concludes with a discussion of the theoretical and practical implications of these findings.

Details

Maritime Business Review, vol. 7 no. 2
Type: Research Article
ISSN: 2397-3757

Keywords

Open Access
Article
Publication date: 5 September 2023

Vivien Petras

This paper offers a definition of the core of information science, which encompasses most research in the field. The definition provides a unique identity for information science…

2656

Abstract

Purpose

This paper offers a definition of the core of information science, which encompasses most research in the field. The definition provides a unique identity for information science and positions it in the disciplinary universe.

Design/methodology/approach

After motivating the objective, a definition of the core and an explanation of its key aspects are provided. The definition is related to other definitions of information science before controversial discourse aspects are briefly addressed: discipline vs. field, science vs. humanities, library vs. information science and application vs. theory. Interdisciplinarity as an often-assumed foundation of information science is challenged.

Findings

Information science is concerned with how information is manifested across space and time. Information is manifested to facilitate and support the representation, access, documentation and preservation of ideas, activities, or practices, and to enable different types of interactions. Research and professional practice encompass the infrastructures – institutions and technology –and phenomena and practices around manifested information across space and time as its core contribution to the scholarly landscape. Information science collaborates with other disciplines to work on complex information problems that need multi- and interdisciplinary approaches to address them.

Originality/value

The paper argues that new information problems may change the core of the field, but throughout its existence, the discipline has remained quite stable in its central focus, yet proved to be highly adaptive to the tremendous changes in the forms, practices, institutions and technologies around and for manifested information.

Details

Journal of Documentation, vol. 80 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Content available
Article
Publication date: 9 March 2010

Sylvain K. Cibangu

623

Abstract

Details

Journal of Documentation, vol. 66 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 30 December 2022

Durga Prasad Dube and Rajendra Prasad Mohanty

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for…

1612

Abstract

Purpose

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for evaluating the efficiency of cyber security organization but what matters is how the factors of internal efficiency affect the business performance, i.e. the external effectiveness. The purpose of this research paper is to derive the factors of internal efficiency and external effectiveness of cyber security and develop impact model to identify the most and least preferred parameters of internal efficiency with respect to all the parameters of external effectiveness.

Design/methodology/approach

There are two objectives for this research: Deriving the factors of internal efficiency and external effectiveness of cyber security; Developing a model to identify the impact of internal efficiency factors on the external effectiveness of cyber security since there is not much evidence of research in defining the factors of internal efficiency and external effectiveness of cyber security, the authors have chosen grounded theory methodology (GTM) to derive the parameters. In this study emic approach of GTM is followed and an algorithm is developed for administering the grounded theory research process. For the second research objective survey methodology and rank order was used to formulate the impact model. Two different samples and questionnaires were designed for each of the objectives.

Findings

For the objective 1, 11 factors of efficiency and 10 factors of effectiveness were derived. These are used as independent and dependent variable respectively in the later part of the research for the second objective. For the objective 2 the impact models among independent and dependent variables were formulated to find out the following. Most and least preferred parameters lead to internal efficiency of cyber security organization to identify the most and least preferred parameters of internal efficiency with respect to all the parameters external effectiveness.

Research limitations/implications

The factors of internal efficiency and external effectiveness constructed by using grounded theory cannot remain constant in the long run, because of dynamism of the domain itself. Over and above this, there are inherent limitations of the tools like grounded theory, used in the research. Few important limitations of GTM are as below in grounded theory, it is comparatively difficult to maintain and demonstrate the rigors of research discipline. The sheer volume of data makes the analysis and interpretation complex, and lengthy time consuming. The researchers’ presence during data gathering, which is often unavoidable and desirable too in qualitative research, may affect the subjects’ responses. The subjectivity of the data leads to difficulties in establishing reliability and validity of approaches and information. It is difficult to detect or to prevent researcher-induced bias.

Practical implications

The internal efficiency and external effectiveness factors of cyber security can be further correlated by the future researchers to understand the correlations among all the factors and predict cyber security performance. The grounded theory algorithm developed by us can be further used for qualitative research for deriving theory through abstractions in the areas where there is no sufficient availability of data. Practitioners of cyber security can use this research to focus on relevant areas depending on their respective business objective/requirements. The models developed by us can be used by the future researchers to for various sectoral validations and correlations.

Social implications

Though the financial costs of a cyber-attack are steep, the social impact of cyber security failures is less readily apparent but can cause lasting damage to customers, employees and the company. Therefore, it is always important to be mindful of how the impact of cyber security affects society as well as the bottom line when they are calculating the potential impact of a breach. Underestimating either impact can destroy a brand. The factor of internal efficiency and external effectiveness derived by us will help stakeholder in focusing on relevant area depending on their business. The impact model developed in this research is very useful for focusing a particular business requirement and accordingly tune the efficiency factor.

Originality/value

During literature study the authors did not find any evidence of application of grounded theory approach in cyber security research. While the authors were exploring research literature to find out some insight into the factor of internal efficiency and external effectiveness of cyber security, the authors did not find concrete and objective research on this. This motivated us to use grounded theory to derive these factors. This, in the authors’ opinion is one of the pioneering and unique contribution to the research as to the authors’ knowledge no researchers have ever tried to use this methodology for the stated purpose and cyber security domain in general. In this process the authors have also developed an algorithm for administering GTM. Further developing impact models using factors of internal efficiency and external effectiveness has lots of managerial and practical implication.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Content available
Book part
Publication date: 19 June 2019

Michael Schandorf

Abstract

Details

Communication as Gesture
Type: Book
ISBN: 978-1-78756-515-9

1 – 10 of over 17000