Search results

1 – 10 of over 170000
Article
Publication date: 11 January 2013

Iris Xie and Edward Benoit

The purpose of this study is to compare the evaluation of search result lists and documents, in particular evaluation criteria, elements, association between criteria and elements

1607

Abstract

Purpose

The purpose of this study is to compare the evaluation of search result lists and documents, in particular evaluation criteria, elements, association between criteria and elements, pre/post and evaluation activities, and the time spent on evaluation.

Design/methodology/approach

The study analyzed the data collected from 31 general users through prequestionnaires, think aloud protocols and logs, and post questionnaires. Types of evaluation criteria, elements, associations between criteria and elements, evaluation activities and their associated pre/post activities, and time were analyzed based on open coding.

Findings

The study identifies the similarities and differences of list and document evaluation by analyzing 21 evaluation criteria applied, 13 evaluation elements examined, pre/post and evaluation activities performed and time spent. In addition, the authors also explored the time spent in evaluating lists and documents for different types of tasks.

Research limitations/implications

This study helps researchers understand the nature of list and document evaluation. Additionally, this study connects elements that participants examined to criteria they applied, and further reveals problems associated with the lack of integration between list and document evaluation. The findings of this study suggest more elements, especially at list level, be available to support users applying their evaluation criteria. Integration of list and document evaluation and integration of pre, evaluation and post evaluation activities for the interface design is the absolute solution for effective evaluation.

Originality/value

This study fills a gap in current research in relation to the comparison of list and document evaluation.

Article
Publication date: 28 May 2019

Frans Nel and Lynette Drevin

The purpose of this paper is to report on a study that investigated the information security culture in organisations in South Africa, with the aim of identifying key aspects of…

1774

Abstract

Purpose

The purpose of this paper is to report on a study that investigated the information security culture in organisations in South Africa, with the aim of identifying key aspects of the culture. The unique aspects for building an information security culture were examined and presented in the form of an initial framework. These efforts are necessary to address the critical human aspect of information security in organisations where risky cyber behaviour is still experienced.

Design/methodology/approach

Literature was investigated with the focus on the main keywords security culture and information security. The information security culture aspects of different studies were compared and analysed to identify key elements of information security culture after which an initial framework was constructed. An online survey was then conducted in which respondents were asked to assess the importance of the elements and to record possible missing elements/aspects regarding their organisation’s information security culture to construct an enhanced framework.

Findings

A list of 21 unique security culture elements was identified from the literature. These elements/aspects were divided into three groups based on the frequency each was mentioned or discussed in studies. The number of times an element was found was interpreted as an indication of how important that element/aspect is. A further four aspects were added to the enhanced framework based on the results that emerged from the survey.

Originality/value

The value of this research is that an initial framework of information security culture aspects was constructed that can be used to ensure that an organisation incorporates all key aspects in its own information security culture. This framework was further enhanced from the results of the survey. The framework can also assist further studies related to the information security culture in organisations for improved security awareness and safer cyber behaviour of employees.

Details

Information & Computer Security, vol. 27 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 18 October 2011

Jeanine Finn, Lynn Westbrook, Tiffany Chen and Priscilla Mensah

Working towards a broader understanding of information provision by agencies responding to crisis situations, the aim of this paper is to examine mandated information provision on…

Abstract

Purpose

Working towards a broader understanding of information provision by agencies responding to crisis situations, the aim of this paper is to examine mandated information provision on the part of law enforcement to survivors of intimate partner violence at the scene of an emergency response.

Design/methodology/approach

The authors conducted a detailed content analysis of 1,851 documents supplied by local law enforcement agencies from 755 US cities. A 29‐element coding framework was developed to identify five key content areas of information: the nature of abuse, survivor norms, police information, legal options, and community resources.

Findings

The best represented content areas related to police information, legal options, and community resources. Information on the nature of abuse and survivor hood was dramatically less well represented. Law enforcement understandably privileges that information which involves immediate, concrete action and within which the officer may have a responsibility (for example, to obtain a temporary restraining order). Correlations between city size and the presence of information elements were minimal, while several significant correlations based on region were noted.

Originality/value

This is the first nationwide study of the information that police are required to provide to survivors of intimate partner violence. Understanding the features of this seldom‐discussed yet vital interaction can help IS professionals support practices and protocols of other agencies responding to crisis situations who may be struggling with minimal preparation for information interactions.

Article
Publication date: 14 August 2017

Asif Qumer Gill, Ali Braytee and Farookh Khadeer Hussain

The aim of this paper is to report on the adaptive e-contract information management reference architecture using the systematic literature review (SLR) method. Enterprises need…

Abstract

Purpose

The aim of this paper is to report on the adaptive e-contract information management reference architecture using the systematic literature review (SLR) method. Enterprises need to effectively design and implement complex adaptive e-contract information management architecture to support dynamic service interactions or transactions.

Design/methodology/approach

The SLR method is three-fold and was adopted as follows. First, a customized literature search with relevant selection criteria was developed, which was then applied to initially identify a set of 1,573 papers. Second, 55 of 1,573 papers were selected for review based on the initial review of each identified paper title and abstract. Finally, based on the second review, 24 papers relevant to this research were selected and reviewed in detail.

Findings

This detailed review resulted in the adaptive e-contract information management reference architecture elements including structure, life cycle and supporting technology.

Research limitations/implications

The reference architecture elements could serve as a taxonomy for researchers and practitioners to develop context-specific service e-contract information management architecture to support dynamic service interactions for value co-creation. The results are limited to the number of selected databases and papers reviewed in this study.

Originality/value

This paper offers a review of the body of knowledge and novel e-contract information management reference architecture, which is important to support the emerging trends of internet of services.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 47 no. 3
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 17 March 2014

Hans Jochen Scholl and Beth Joy Patin

Disasters of catastrophic scope and scale have occurred more frequently in recent years. Governmental and non-governmental response management has struggled, and affected…

Abstract

Purpose

Disasters of catastrophic scope and scale have occurred more frequently in recent years. Governmental and non-governmental response management has struggled, and affected communities have severely suffered during extreme events. Colossal damage and loss of lives have been inflicted, and the recovery efforts require extended periods of time. In post hoc analyses, actionable information has been found a critical resource requiring resilient information infrastructures (RIIs) that do not break down even under extreme duress. RIIs encompass both tangible and less tangible (for example, social) elements. The purpose of this paper is to pave the way for empirical research on the subject and to conceptually develop a framework for the analysis of information infrastructures and their resiliency, when impacted by catastrophic incidents (also known as extreme events).

Design/methodology/approach

The authors review the literatures of disaster research and related fields. They synthesize the literatures from the information perspective and develop a framework of RII.

Findings

The synthesis revealed that extreme event-ready RIIs have to be redundant and resourceful both in terms of social, organizational, and knowledge assets as well as in the information and communication technologies. RIIs combine tangible and non-tangible elements, whose interplay is so far incompletely understood.

Research limitations/implications

Roles and criticality of RIIs under the impact of an extreme event need to be studied empirically.

Practical implications

The study holds the promise to be of great potential utility for responders and recovery managers as well as affected communities in preparedness, response, recovery, and mitigation efforts as timely and actionable information is still the scarcest and most sought resource during a catastrophic incident.

Originality/value

Disaster research so far has mostly focused on the technical, organizational, social, and socio-psychological effects of disasters. The authors are adding the information perspective as a unique and distinctive contribution to extreme event research, which connects the tangible elements of information infrastructures with its not so tangible elements, captures their interplay, and analyzes their role and criticality for the resiliency of the information infrastructures when under extreme duress.

Details

Transforming Government: People, Process and Policy, vol. 8 no. 1
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 1 February 1991

REBECCA GREEN

This study establishes three predominant cognitive models of information and the information transfer process manifest in the literature of library and information science, based…

170

Abstract

This study establishes three predominant cognitive models of information and the information transfer process manifest in the literature of library and information science, based on a linguistic analysis of phrases incorporating the word ‘information’ from a random sample of abstracts in the LISA database. The direct communication (DC) and indirect communication (IC) models (drawn from Reddy's frameworks of metalinguistic usage) adopt the perspective of the information system; the information‐seeking (IS) model takes the viewpoint of the information user. Two disturbing findings are presented: 1. core elements of the DC and IC models are more weakly supported by the data than are most of the peripheral elements; and 2. even though the IS model presents the information user's perspective, the data emphasise the role of the information system. These findings suggest respectively that the field lacks a coherent model of information transfer per se and that our model of information retrieval is mechanistic, oblivious to the cognitive models of end users.

Details

Journal of Documentation, vol. 47 no. 2
Type: Research Article
ISSN: 0022-0418

Article
Publication date: 20 May 2020

Nanlei Chen and Naiming Xie

The purpose of this paper is to propose an uncertainty representation and information measurement method for characterizing grey numbers, estimating their internal laws and…

Abstract

Purpose

The purpose of this paper is to propose an uncertainty representation and information measurement method for characterizing grey numbers, estimating their internal laws and solving how to generate them based on available information data in the real world.

Design/methodology/approach

This paper attempts to present a new mathematical methodology in the field of grey numbers. The generalized grey number is defined at first with the concept of information elements and information samples. Then, the probability function of a grey number is proposed to describe the internal law of the grey number. By finding the feasible information elements from information samples, the probability calculation method for the true value of a grey number is presented. Finally, some numerical examples and comparisons are carried out to assess the efficiency and performance.

Findings

The results show that the uncertainty representation and information measurement method is effective in characterizing and quantifying grey numbers based on available information data.

Practical implications

Uncertain information is widespread in practical applications. In this manuscript, the grey number is represented and its information is measured through some existing data in discrete or interval forms, which provides a grey information concept that utilizes information elements to represent uncertainty in the real world.

Originality/value

The proposal presents a novel data-driven method to generate a grey number representation from available data rather than the classical whitening weight function constructed from experience, and the dynamic evolution process of a grey number is measured by the increase of information samples.

Details

Grey Systems: Theory and Application, vol. 10 no. 4
Type: Research Article
ISSN: 2043-9377

Keywords

Article
Publication date: 27 March 2009

Marsha D. Loda, Karin Teichmann and Andreas H. Zins

The purpose of this research is to help tourism marketers maximize the persuasiveness of their websites toward the objective of increasing visitation to their destination.

2679

Abstract

Purpose

The purpose of this research is to help tourism marketers maximize the persuasiveness of their websites toward the objective of increasing visitation to their destination.

Design/methodology/approach

The paper describes a two‐part research project: a content analysis of websites to determine the most frequently used elements; and an experiment wherein respondents view one of ten randomly assigned websites and complete a survey about the credibility, message strength, and persuasiveness of that site.

Findings

Results support the importance of message credibility to message strength, and that both may impact on change of propensity to visit a destination. It also points out new information about website elements. While more organic website elements such as testimonials and web cams are expected to affect the most change, they do not. Rather, information on fundamental elements such as accommodations and attractions has the most effect on message credibility, and on respondents' change in propensity to visit a destination.

Originality/value

Substantial differences exist in the persuasiveness of various tourism websites. Website elements concerning basic information seem to induce the most positive changes. Therefore, funds and energy to develop and maintain novel website elements such as web cams, guest books, message boards and e‐cards may not be worth the effort when it comes to increasing visitation.

Details

International Journal of Culture, Tourism and Hospitality Research, vol. 3 no. 1
Type: Research Article
ISSN: 1750-6182

Keywords

Article
Publication date: 26 June 2019

Marjan Sadeghi, Jonathan Weston Elliott, Nick Porro and Kelly Strong

This paper aims to represent the results of a case study to establish a building information model (BIM)-enabled workflow to capture and retrieve facility information to deliver…

1622

Abstract

Purpose

This paper aims to represent the results of a case study to establish a building information model (BIM)-enabled workflow to capture and retrieve facility information to deliver integrated handover deliverables.

Design/methodology/approach

The Building Handover Information Model (BHIM) framework proposed herein is contextualized given the Construction Operation Information Exchange (COBie) and the level of development schema. The process uses Autodesk Revit as the primary BIM-authoring tool and Dynamo as an add-in for extending Revit’s parametric functionality, BHIM validation, information retrieval and documentation in generating operation and maintenance (O&M) deliverables in the end-user requested format.

Findings

Given the criticality of semantics for model elements in the BHIM and for appropriate interoperability in BIM collaboration, each discipline should establish model development and exchange protocols that define the elements, geometrical and non-geometrical information requirements and acceptable software applications early in the design phase. In this case study, five information categories (location, specifications, warranty, maintenance instructions and Construction Specifications Institute MasterFormat division) were identified as critical for model elements in the BHIM for handover purposes.

Originality/value

Design- and construction-purposed BIM is a standard platform in collaborative architecture, engineering and construction practice, and the models are available for many recently constructed facilities. However, interoperability issues drastically restrict implementation of these models in building information handover and O&M. This study provides essential input regarding BIM exchange protocols and collaborative BIM libraries for handover purposes in collaborative BIM development.

Details

Journal of Facilities Management , vol. 17 no. 3
Type: Research Article
ISSN: 1472-5967

Keywords

Article
Publication date: 1 February 2001

Magda El‐Sherbini

This article is a survey of representative metadata efforts comparing them to MARC 21 metadata in order to determine if new electronic formats require the development of a new set…

3841

Abstract

This article is a survey of representative metadata efforts comparing them to MARC 21 metadata in order to determine if new electronic formats require the development of a new set of standards. This study surveys the ongoing metadata projects in order to identify what types of metadata exist and how they are used and also compares and analyzes selected metadata elements in an attempt to illustrate how they are related to MARC 21 metadata format elements.

Details

Library Review, vol. 50 no. 1
Type: Research Article
ISSN: 0024-2535

Keywords

1 – 10 of over 170000