Search results

1 – 10 of over 62000
Article
Publication date: 1 June 2004

Amanda Spink, Bernard J. Jansen and Jan Pedersen

The Web is a communication and information technology that is often used for the distribution and retrieval of personal information. Many people and organizations mount Web sites…

1764

Abstract

The Web is a communication and information technology that is often used for the distribution and retrieval of personal information. Many people and organizations mount Web sites containing large amounts of information on individuals, particularly about celebrities. However, limited studies have examined how people search for information on other people, using personal names, via Web search engines. Explores the nature of personal name searching on Web search engines. The specific research questions addressed in the study are: “Do personal names form a major part of queries to Web search engines?”; “What are the characteristics of personal name Web searching?”; and “How effective is personal name Web searching?”. Random samples of queries from two Web search engines were analyzed. The findings show that: personal name searching is a common but not a major part of Web searching with few people seeking information on celebrities via Web search engines; few personal name queries include double quotations or additional identifying terms; and name searches on Alta Vista included more advanced search features relative to those on AlltheWeb.com. Discusses the implications of the findings for Web searching and search engines, and further research.

Details

Journal of Documentation, vol. 60 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 14 May 2018

Anne Chardonnens, Ettore Rizza, Mathias Coeckelbergs and Seth van Hooland

Advanced usage of web analytics tools allows to capture the content of user queries. Despite their relevant nature, the manual analysis of large volumes of user queries is…

Abstract

Purpose

Advanced usage of web analytics tools allows to capture the content of user queries. Despite their relevant nature, the manual analysis of large volumes of user queries is problematic. The purpose of this paper is to address the problem of named entity recognition in digital library user queries.

Design/methodology/approach

The paper presents a large-scale case study conducted at the Royal Library of Belgium in its online historical newspapers platform BelgicaPress. The object of the study is a data set of 83,854 queries resulting from 29,812 visits over a 12-month period. By making use of information extraction methods, knowledge bases (KBs) and various authority files, this paper presents the possibilities and limits to identify what percentage of end users are looking for person and place names.

Findings

Based on a quantitative assessment, the method can successfully identify the majority of person and place names from user queries. Due to the specific character of user queries and the nature of the KBs used, a limited amount of queries remained too ambiguous to be treated in an automated manner.

Originality/value

This paper demonstrates in an empirical manner how user queries can be extracted from a web analytics tool and how named entities can then be mapped with KBs and authority files, in order to facilitate automated analysis of their content. Methods and tools used are generalisable and can be reused by other collection holders.

Details

Journal of Documentation, vol. 74 no. 5
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 1 February 1986

James E. Rush and Robert S. Tannehill

No comprehensive set of data elements for describing computer software has previously been developed. Applications determine the need for specific data elements. This article…

Abstract

No comprehensive set of data elements for describing computer software has previously been developed. Applications determine the need for specific data elements. This article presents a comprehensive profile of data elements, and identifies their probable application in library catalogs, bibliographic references, program documentation, program front matter, program packaging, software catalogs and eye‐legible labels. The data elements are correlated with existing MARC tags, providing compatibility with current usage.

Details

Library Hi Tech, vol. 4 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 18 April 2008

Sheau‐yueh J. Chao

This paper seeks to discuss the genealogical sources for Chinese immigrants as well as the settlement of Chinese in the USA and the historical evolution of Chinese names, their…

Abstract

Purpose

This paper seeks to discuss the genealogical sources for Chinese immigrants as well as the settlement of Chinese in the USA and the historical evolution of Chinese names, their origins, arrangement and development. It aims to cover the origins of various classes of Chinese surnames, followed by the content description of a traditional genealogical book for jiapu.

Design/methodology/approach

The paper researches the various ways that a Chinese person can find out about their ancestry.

Findings

The paper reveals the roles of libraries, including serving the needs of patrons interested in genealogical research, preserving and interpreting information through oral and family history projects and collaborating with other libraries through interlibrary loan, document delivery, library consortia, collection management and international resource‐sharing.

Research limitations/implications

The study provides information on where and how to locate the genealogical resources for researching the genealogy of a Chinese family.

Originality/value

The paper analyzes the value of genealogical research as a documentary source for population history, life expectancy in a clan, marriages and family connections, as well as lineage organizations and inter‐lineage relations.

Details

Collection Building, vol. 27 no. 2
Type: Research Article
ISSN: 0160-4953

Keywords

Article
Publication date: 31 March 2022

Daniel Gilhooly and Chris Mu Htoo

The purpose of this paper is to demonstrate how teachers can use their Sgaw Karen students’ names as a means to gaining awareness of their students’ home culture, language and…

Abstract

Purpose

The purpose of this paper is to demonstrate how teachers can use their Sgaw Karen students’ names as a means to gaining awareness of their students’ home culture, language and personal stories.

Design/methodology/approach

This case study uses interviews with four Karen families to explore the meanings behind the names and nicknames given to Karen individuals.

Findings

The findings of this study reveal that Karen names can provide teachers important insights into Karen culture, history and language. Moreover, Karen names can also provide important biographical information about the student.

Research limitations/implications

This study only focuses on Sgaw Karen names and does not include other Karen subgroups like the Pwo Karen, who are also resettling in the USA. This study does not include all Sgaw Karen names, but the authors have made efforts to include Karen names from various regions of Burma and of different religious backgrounds.

Practical implications

Teachers and others working with culturally and linguistically diverse students like the Karen will gain a better understanding of the various ways that names are given across cultures. While this paper focuses on one particular ethnic group, it is believed that teachers need to expand their notions about how other non-European groups name their children and how these names may reveal something about the student’s heritage culture, history, language and the unique lived experiences of their students.

Social implications

Too often teachers and others working cross-culturally do not realize that other cultures follow different naming practices than those used in the USA. Teachers often mispronounce or misunderstand students’ names when the student comes from a cultural group unfamiliar to them. This paper helps a general audience better realize the unique approach Karen culture takes to naming children and how these names are often transformed to fit American naming conventions. As the title suggests, Karen students often feel embarrassed and take on a negative opinion of their given name as a result of a lack of awareness by teachers and others.

Originality/value

This paper provides a unique perspective in the literature on the ways cultural naming conventions can serve teachers aspiring to incorporate biography-driven instruction into their classroom practices.

Details

Journal for Multicultural Education, vol. 16 no. 2
Type: Research Article
ISSN: 2053-535X

Keywords

Article
Publication date: 19 November 2003

Fengru Li and Nader H. Shooshtari

Applying brand names to international markets remains a challenge to multinational corporations. Consumers’ sociolinguistic backgrounds shape their responses to brand names. This…

Abstract

Applying brand names to international markets remains a challenge to multinational corporations. Consumers’ sociolinguistic backgrounds shape their responses to brand names. This paper uses a sociolinguistic approach as a conceptual framework in understanding brand naming and translating in the Chinese market. The approach promotes that sociolinguistics a) recognizes linguistic competence, b) advances symbolic values imbedded in linguistic forms, and c) renders attached social valence to cultural scrutiny. Three brand‐naming cases in China are presented for discussion, which may benefit multinational corporations on brand decisions involving Chinese consumers.

Details

Multinational Business Review, vol. 11 no. 3
Type: Research Article
ISSN: 1525-383X

Keywords

Article
Publication date: 9 October 2019

Brian Dobreski

Within standards for bibliographic description, common usage has served as a prominent design principle, guiding the choice and form of certain names and titles. In practice…

1013

Abstract

Purpose

Within standards for bibliographic description, common usage has served as a prominent design principle, guiding the choice and form of certain names and titles. In practice, however, the determination of common usage is difficult and lends itself to varying interpretations. The purpose of this paper is to explore the presence and role of common usage in bibliographic description through an examination of previously unexplored connections between common usage and the concept of warrant.

Design/methodology/approach

A brief historical review of the concept of common usage was conducted, followed by a case study of the current bibliographic standard Resource Description and Access (RDA) employing qualitative content analysis to examine the appearances, delineations and functions of common usage. Findings were then compared to the existing literature on warrant in knowledge organization.

Findings

Multiple interpretations of common usage coexist within RDA and its predecessors, and the current prioritization of these interpretations tends to render user perspectives secondary to those of creators, scholars and publishers. These varying common usages and their overall reliance on concrete sources of evidence reveal a mixture of underlying warrants, with literary warrant playing a more prominent role in comparison to the also present scientific/philosophical, use and autonomous warrants.

Originality/value

This paper offers new understanding of the concept of common usage, and adds to the body of work examining warrant in knowledge organization practices beyond classification. It sheds light on the design of the influential standard RDA while revealing the implications of naming and labeling in widely shared bibliographic data.

Details

Journal of Documentation, vol. 76 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 1 September 2001

Allan K.K. Chan and Yue‐Yuan Huang

This is the third of a series of studies on Chinese brand naming using content analysis from a linguistic perspective. The first study generalized the principles guiding Chinese…

3312

Abstract

This is the third of a series of studies on Chinese brand naming using content analysis from a linguistic perspective. The first study generalized the principles guiding Chinese brands in terms of syllable pattern, tone pattern, compounding structure and semantic preference. The second looked at specific branding rules, focusing on two entirely different products: cosmetic products and bicycles. The present study, following the same linguistic framework of analysis, analyzes three groups of closely related products: spirits, beers, soft drinks, to see how these brands are creatively and distinctively constructed. Finds that the brand naming patterns of the three drinks are basically in agreement with the general Chinese branding principles, and the differences among them directly reflect the development, the consumer markets and characteristics of each product.

Details

Marketing Intelligence & Planning, vol. 19 no. 5
Type: Research Article
ISSN: 0263-4503

Keywords

Article
Publication date: 10 March 2014

Maria Knoll and Jenny Bronstein

The study aimed to investigate the information disclosure behavior of women bloggers who suffer from infertility by examining their self-disclosure as it relates to the anonymity…

Abstract

Purpose

The study aimed to investigate the information disclosure behavior of women bloggers who suffer from infertility by examining their self-disclosure as it relates to the anonymity patterns they adopted.

Design/methodology/approach

A survey was distributed to approximately 300 authors of infertility blogs, 135 bloggers answered the request to take part in the study. The survey gathered basic demographic and blogging practice data, and measured different elements of the bloggers' discursive and visual anonymity as well as their patters of self-disclosure.

Findings

Findings reveal that the majority of respondents identify themselves on their blogs and only a small percentage decided to be totally anonymous, and about half of the bloggers post actual photos of themselves and their lives. The participants reported a high rate of self-disclosure, revealing sensitive information, letting their defenses down, disclosing highly intimate details about their lives, writing openly about their infertility treatments on their blog. No significant correlation was observed between visual and discursive anonymity and the perceived self-disclosure of participants. Results show that the more anonymous the bloggers are, the more afraid they become that their blog may be read by people they know offline. On the other hand, the more identifiable the bloggers are, the more willingness they show to share the content of their journal with people they know offline. The majority of participants expressed concerns that blogging could negatively impact their lives.

Originality/value

This study explores an alternate explanation through the examination of the bloggers' self-disclosure patterns as they relate to the degree of anonymity adopted.

Details

Aslib Journal of Information Management, vol. 66 no. 2
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 24 April 2007

Paul Beynon‐Davies

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers…

3434

Abstract

Purpose

The purpose of this paper is to unpack some of the socio‐technical relationships inherent in contemporary notions of personal identity management. For this purpose it considers the issue of personal identity management in terms of a framework, which distinguishes between the related processes of authentication, identification and enrolment.

Design/methodology/approach

The conceptual model described in this paper is reflected against an important recent case in which issues of personal identity management are being enacted: the introduction of a UK national identity card. Both this issue and case are particularly examined in the light of the growth of e‐Government in the UK.

Findings

The paper relates issues associated with the technical infrastructure of e‐Government with some of the costs and benefits associated with the social infrastructure of e‐Government. This device offers a useful framing for a whole range of issues surrounding individual‐organisation interaction in the Information Society that rely on elements of personal identity management.

Research limitations/implications

In the paper the issue of personal identity management is under‐represented in the Information Systems and Information Management literature. The conceptual approach adopted in the paper is used to identify areas of further research in terms of issues relevant to the technical infrastructure of e‐Government.

Practical implications

The paper identifies a number of personal identity management issues embedded in the technical infrastructure required for effective e‐Government.

Originality/value

This paper raises the importance of personal identity management to the success of the e‐Government agenda. It also links classic information management issues to the issue of personal identity management and identifies the challenges for e‐Government within this.

Details

Journal of Enterprise Information Management, vol. 20 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 10 of over 62000