Search results
1 – 10 of over 2000The article aims to give an overview of the history and the achieved status of information science in the German Democratic Republic (GDR) with an emphasis on the organisation of…
Abstract
Purpose
The article aims to give an overview of the history and the achieved status of information science in the German Democratic Republic (GDR) with an emphasis on the organisation of information science and practice in the GDR and on the theoretical foundations of information science.
Design/methodology/approach
Primarily, this article is based upon critical literature studies, especially German-language books and journal articles, but the empirical basis also includes some unpublished sources (e.g. letters from information scientists from the GDR).
Findings
There are interesting results concerning the roots of information science in cybernetics, philosophy and the practical area of documentation. The naming of this knowledge field as “informatics”, “informatics of science” or “information and documentation science” is partly very distinct from Western conceptions. We found different theoretical foundations for information science including the approaches of Bonitz, Engelbert, Koblitz and Groß and Fuchs-Kittowski. In the GDR, information science and information practice were centralised, but through the information system science and technology, they were consistently accessible at all levels of professional work. With German reunification, information practice and its institutions, as well as GDR’s information science efforts, disappeared.
Research limitations/implications
The article gives hints on the importance on and the survival of some GDR approaches in contemporary information science, but those developments should be analysed in much more detail.
Originality/value
This is the first overview article on the state and entire development of information science in the GDR.
Details
Keywords
Srumita Narzary, Upam Pushpak Makhecha, Pawan Budhwar, Ashish Malik and Satish Kumar
Research on human resource management (HRM) and technology has gained momentum recently. This review aims to create a bibliographic profile of the field of HRM and technology…
Abstract
Purpose
Research on human resource management (HRM) and technology has gained momentum recently. This review aims to create a bibliographic profile of the field of HRM and technology using bibliometric techniques, complemented by qualitative analysis, examining 239 articles published in the four key human resource (HR) journals.
Design/methodology/approach
First, using VOSviewer software, we analysed the research productivity by identifying authors, journals and influential articles, followed by insights on research themes and their evolution. Next, integrating bibliometric and qualitative approaches, we conducted a hybrid inquiry of the field to analyse current theories, methods and variables.
Findings
The bibliometric analysis highlighted the intellectual structure, key themes and distinctive developments categorised under four temporal phases that have shaped research in this field. In addition, qualitative analysis presents significant theoretical perspectives, the methods employed and the nomological framework of variables.
Originality/value
Our study advances the extant literature on HRM and technology by quantifying the leading bibliometric performance indicators complemented by qualitative evaluation of the field, which entails exploring the possible research strands and related trends that have emerged in the past two decades.
Details
Keywords
Abdus Sattar Chaudhry and Bibi M. Alajmi
To take full advantage of the unprecedented availability of information on networks and digital systems, professionals need to be comfortable finding information relevant to the…
Abstract
Purpose
To take full advantage of the unprecedented availability of information on networks and digital systems, professionals need to be comfortable finding information relevant to the tasks at hand. This study was conducted at the Kuwait Institute for Scientific Research to investigate scientists’ personal information management (PIM) practices.
Design/methodology/approach
A qualitative research approach was used. Critical incidents were collected to probe information about PIM activities. The PIM-related critical incidents were gathered through extended conversations in the form of semi-structured interviews.
Findings
Extended conversations revealed that scientists were aware of the importance of information organization and management. They collected and received information from various sources regarding their tasks and saved part of the information for future use. Scientists organized saved information into named folders using the categories of projects, clients and planning. The files were updated by regular deletion and cleaning. Different strategies were used to retrieve the information. These included searching by keywords and file names, and browsing using the folder structure. Scientists have used various PIM tools. They reported that time pressure, information overload and anxiety due to information fragmentation were major challenges in PIM.
Originality/value
This study recommends a compilation of guidelines to assist scientists in the efficient management of personal information. As there are only a few studies currently available in the literature on scientists’ PIM, this study makes a valuable contribution to the relevant professional literature.
Details
Keywords
Mustafa Saritepeci, Hatice Yildiz Durak, Gül Özüdoğru and Nilüfer Atman Uslu
Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains…
Abstract
Purpose
Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains to the protection of personal information, along with the worries or convictions concerning potential risks and unfavorable outcomes associated with its collection, utilization and distribution. With a holistic approach to these relationships, this study aims to model the relationships between digital literacy (DL), digital data security awareness (DDSA) and OPC and how these relationships vary by gender.
Design/methodology/approach
The participants of this study are 2,835 university students. Data collection tools in the study consist of personal information form and three different scales. Partial least squares (PLS), structural equation modeling (SEM) and multi-group analysis (MGA) were used to test the framework determined in the context of the research purpose and to validate the proposed hypotheses.
Findings
DL has a direct and positive effect on digital data security awareness (DDSA), and DDSA has a positive effect on OPC. According to the MGA results, the hypothesis put forward in both male and female sub-samples was supported. The effect of DDSA on OPC is higher for males.
Originality/value
This study highlights the positive role of DL and perception of data security on OPC. In addition, MGA findings by gender reveal some differences between men and women.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-03-2023-0122
Details
Keywords
Based on the theoretical predictions of media equation theory and the computers-are-social-actors (CASA) perspective, this study aims to examine the effects of performance error…
Abstract
Purpose
Based on the theoretical predictions of media equation theory and the computers-are-social-actors (CASA) perspective, this study aims to examine the effects of performance error type (i.e. logical, semantic or syntactic), task type and personality presentation (i.e. dominant/submissive and/or friendly/unfriendly) on users’ level of trust in their personal digital assistant (PDA), Siri.
Design/methodology/approach
An experimental study of human–PDA interactions was performed with two types of tasks (social vs functional) randomly assigned to participants (N = 163). While interacting with Siri in 15 task inquiries, the participants recorded Siri’s answers for each inquiry and self-rated their trust in the PDA. The answers were coded and rated by the researchers for personality presentation and error type.
Findings
Logical errors were the most detrimental to user trust. Users’ trust of Siri was significantly higher after functional tasks compared to social tasks when the effects of general usage (e.g. proficiency, length and frequency of usage) were controlled for. The perception of a friendly personality from Siri had an opposite effect on social and functional tasks in the perceived reliability dimension of trust and increased intensity of the presented personality reduced perceived reliability in functional tasks.
Originality/value
The research findings contradict predictions from media equation theory and the CASA perspective while contributing to a theoretical refinement of machine errors and their impact on user trust.
Details
Keywords
Patrick Yin Mahama, Fred Amankwah-Sarfo and Francis Gyedu
Online learning has come to stay in a technologically advancing world with increasing populations. The search for ways to make online learning more efficient and effective in some…
Abstract
Purpose
Online learning has come to stay in a technologically advancing world with increasing populations. The search for ways to make online learning more efficient and effective in some developing countries continues as the accompanying issues in developing country contexts abound. This paper explores the issues that underlie online learning management in a developing country context, focusing on the Moodle, Sakai and Zoom platforms used in some selected public universities in Ghana.
Design/methodology/approach
The study relied on the qualitative approach to data collection and a descriptive design for analysis. Using the social constructivism theory, the paper discussed the critical issues students, and to a lesser extent, instructors encounter in their engagement on these platforms for academic learning.
Findings
The study found that the inefficient use of these platforms is due to several factors including the high cost of data, poor perception of the quality of online learning compared to traditional in-person contacts, poor attitude of students, low participation in online learning, lack of computers and poor internet connectivity among others.
Research limitations/implications
It is important to mention that this study was limited to some selected public universities in Ghana. Data could have been collected from a wider sample including other Ghanaian tertiary institutions or some other developing countries. The similarity of study outcomes in other developing countries, however, suggests that similar results would have been obtained in an international sample.
Practical implications
Despite the robustness of the Learning Management systems in place, the evidence suggests that their utilisation is far less than optimal. However, with relevant policies and the provision of needed technical support, training, provision of equipment like computers for use by both students and instructors and efficient internet connectivity, the LMS platforms could be more efficient for online learning.
Originality/value
The authors conducted this research using original data from interviews in the selected public universities in Ghana. The data was meant to inform the discussion on some of the critical issues that underlie online learning in a developing country context. Although the study relied on data from selected public universities in a single country, its outcomes reflect fundamental issues of online learning in a developing country context which find relevance in available study outcomes.
Details
Keywords
Efraín Alfredo Barragán-Perea and Javier Tarango
This paper aims to identify alternatives for citizens to get out of the bubble when interacting with the information provided by the internet through search engines. This…
Abstract
Purpose
This paper aims to identify alternatives for citizens to get out of the bubble when interacting with the information provided by the internet through search engines. This situation arises because there is extensive ignorance about the way search engines operate and the way advanced search algorithms operate, both situations based on the specific segmentation of the public, which creates difficulties in obtaining vast information that allows the contrast and development of diverse perspectives, which do not necessarily lead to the use of critical thinking.
Design/methodology/approach
To achieve this contribution, a documentary-type investigation was carried out based on the review of the scientific literature on the subject, and the nature of this investigation, due to its purpose, being descriptive. The study takes as document selection criteria those original articles whose content relevance is linked to the purposes of this research proposal, published in scientific databases (SciELO, RedAlyC, Dialnet, ScienceDirect, WoS and Scopus) mostly between the years 2018 and 2023, in Spanish and English, that described the impact of bubble filters on full access to information and data privacy, for which the topics were addressed: internet search algorithms, bubble filters, search engines, privacy policies in search engines and management of personal data.
Findings
At the beginning, this paper clarifies the concepts of search algorithms on the Internet, bubble filters, search engines and privacy policies in search engines, which made it possible to identify alternatives that would allow the user to face the silent reality of the algorithms and avoid the bias in the information that the algorithm provides, in addition, the need to generate algorithmic literacy mechanisms, training in the use of metasearch engines and education in algorithms is proposed, with which citizens can exercise critical thinking in the way they interact on the internet.
Research limitations/implications
This is a theoretical proposal, in which various inferences are made from theoretical knowledge without fieldwork.
Originality/value
It is considered a document of important value in the training processes of librarians and information professionals in the training of users and in the ways of interaction with technology.
Details
Keywords
Julia Graham, Kristen Brewer Wilson and Shelly Rodrigue
In 2001, Ellis and Griffith used a multidimensional ethics scale including three subdimensions of moral equality, relativism and contractualism to examine the ethicality of IT…
Abstract
Purpose
In 2001, Ellis and Griffith used a multidimensional ethics scale including three subdimensions of moral equality, relativism and contractualism to examine the ethicality of IT scenarios. In the 20 plus years to follow, there has been an exponential growth in uses and users of technology. Therefore, the purpose of this study is to ascertain if the multi-item ethics measure remains valid in spite of the technological advances and progression of communication made possible through technology.
Design/methodology/approach
The survey consisted of technology-related ethical situations, an ethical judgment scale, an engagement scale and demographical questions. The sample size was 366, consisting of mainly white, upperclassman, American-native males having proficient experience with computers and spending an average of 20 h or less a week on a computer.
Findings
The findings reveal that both moral equity and relativism have a positive relationship with engagement across all tested scenarios, while contractualism has a positive relationship in four scenarios. Furthermore, a significant difference between the means of gender exists in four of the six scenarios. These findings indicate that indeed college students can not only recognize, but also make an ethical decision to not engage in unethical behavior and reconfirm that using a multidimensional ethics scale is warranted.
Research limitations/implications
This study is not without limitations. First, the data is cross-sectional and causal inferences are not warranted. Second, the sample consisted of students and may not be generalizable to employees. Therefore, future research may sample employees in a technology organization to provide greater insight into ethical judgment and engagement in such scenarios. Another limitation of this study is that the scenarios were generated from students discussing their concerns regarding various ethical judgment situations they anticipate encountering in the near future with technology. Although this method of developing scenarios addresses current concerns of students, some of the scenarios do not directly apply to the workplace and may appear to be limited in their applicability. Therefore, future studies should consider developing scenarios that reflect more practical situations that occur in the workplace in general and through work-life blending.
Practical implications
One of the implications of these findings is that universities and business schools who embed ethics courses in the curriculum need to incorporate moral reasoning in ethics courses, as moral reasoning is an essential component of ethical decision-making and is shown to have a positive relationship with engagement in this study. By providing students with instruction on moral reasoning, universities can equip them with the skills to make ethical decisions that align with the values of their future employers and ameliorate their engagement levels. Continuing professional education in these ethical issues areas helps bridge college edification with practical career application, and ensures that as technologies and situations change, future business professionals are equipped to navigate changing environments and ethical scenarios.
Social implications
With a brighter spotlight shining on employee ethical behavior both in and out of the workplace (Parker et al., 2019), the ability to make moral choices is vital. This study’s findings indicate that an increased focus on ethics education in universities is effective in helping future business professionals recognize and avoid ethical lapses. Therefore, it may be worthwhile for organizations to invest in ethics training programs to promote ethical decision-making skills among employees. By doing so, organizations may create a culture that values ethical behavior and provides employees with the tools and knowledge necessary to make informed and ethical decisions.
Originality/value
This study highlights the importance of ethics education and training programs and underscores the need for organizations to foster a culture of ethical behavior. Additionally, the study’s findings regarding gender differences call for greater efforts to promote diversity and inclusion in the workplace, particularly in leadership positions.
Details
Keywords
Xiao Xie, Tianci Song, Li Li, Weihan Jiang, Xinyuan Gao, Liwang Shu and Yongmei Liu
This study investigates the influence of personality traits on the personal digital hoarding behaviors of college students. Emotional attachment is included as a mediating…
Abstract
Purpose
This study investigates the influence of personality traits on the personal digital hoarding behaviors of college students. Emotional attachment is included as a mediating variable, thereby enhancing the relevant theoretical frameworks associated with such behaviors.
Design/methodology/approach
A total of 370 college students were investigated using the Big Five personality scale, the digital hoarding behaviors scale, and a self-compiled emotional attachment scale. The collected data were analyzed using SPSS26.0 software.
Findings
Personality traits exerted a significant influence on individual digital hoarding behaviors, among which neuroticism (r = 0.526**), extroversion (r = 0.232**), and agreeableness (r = 0.233**) demonstrated notable effects. However, no significant correlation was found to link conscientiousness and openness with personal digital hoarding behaviors. Emotional attachment (r = 0.665**) significantly impacted personal digital hoarding behaviors. Regression analysis further showed that personality traits also affect personal digital hoarding behaviors through the partial mediating effect of emotional attachment. Dependency security was identified as a partial mediator of the effects of agreeableness and neuroticism on personal digital hoarding behaviors. Possession attachment was observed to be another partial mediator of the relationship between neuroticism and personal digital hoarding behaviors. Furthermore, fear of missing out was observed to partially mediate the effects of agreeableness and neuroticism on personal digital hoarding behaviors.
Research limitations/implications
The generalizability of the self-compiled emotional attachment scale requires further verification in future research, as the selection of participants was relatively simplistic.
Practical implications
Our study showed the distinctive personality traits of individuals and their relationship with personal digital hoarding behaviors, along with the mediating role of emotional attachment. Our findings provide valuable insights for future personal information management and digital hoarding de-cluttering.
Originality/value
This research explores the influence of personality traits on the personal digital hoarding behaviors of college students and examines the mediating role of emotional attachment.
Details