Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 50

Full-Text Articles in Social and Behavioral Sciences

“Okay Okay Okay, Now The Video Is On”: An Analysis Of Young Children’S Orientations To The Video Camera In Recordings Of Family Interactions, Sarah C. Barriage, Darcey K. Searles Sep 2019

“Okay Okay Okay, Now The Video Is On”: An Analysis Of Young Children’S Orientations To The Video Camera In Recordings Of Family Interactions, Sarah C. Barriage, Darcey K. Searles

Information Science Faculty Publications

This paper explores 3- to 6-year-old children’s orientations to the video camera in video recordings of everyday family interactions. Children’s orientations to the video camera in these recordings were identified and analyzed using the constant comparative method. Types of orientations to the video camera included talking about the camera, engaging in camera-directed talk and/or action, and interacting with the camera. In some cases, these orientations occurred after a parent or sibling first oriented to the video camera; however, in other cases no prior orientation was evident. Theoretical and practical implications of the results are discussed.


Search Results Outliers Among Medline Platforms, Christopher Sean Burns, Robert M. Shapiro Ii, Tyler Nix, Jeffrey T. Huber Jul 2019

Search Results Outliers Among Medline Platforms, Christopher Sean Burns, Robert M. Shapiro Ii, Tyler Nix, Jeffrey T. Huber

Information Science Faculty Publications

Objective: Hypothetically, content in MEDLINE records is consistent across multiple platforms. Though platforms have different interfaces and requirements for query syntax, results should be similar when the syntax is controlled for across the platforms. The authors investigated how search result counts varied when searching records among five MEDLINE platforms.

Methods: We created 29 sets of search queries targeting various metadata fields and operators. Within search sets, we adapted 5 distinct, compatible queries to search 5 MEDLINE platforms (PubMed, ProQuest, EBSCOhost, Web of Science, and Ovid), totaling 145 final queries. The 5 queries were designed to be logically and semantically ...


Examining Medline Search Query Reproducibility And Resulting Variation In Search Results, C. Sean Burns, Robert M. Shapiro Ii, Tyler Nix, Jeffrey T. Huber Mar 2019

Examining Medline Search Query Reproducibility And Resulting Variation In Search Results, C. Sean Burns, Robert M. Shapiro Ii, Tyler Nix, Jeffrey T. Huber

Information Science Faculty Publications

The MEDLINE database is publicly available through the National Library of Medicine’s PubMed but the data file itself is also licensed to a number of vendors, who may offer their versions to institutional and other parties as part of a database platform. These vendors provide their own interface to the MEDLINE file and offer other technologies that attempt to make their version useful to subscribers. However, little is known about how vendor platforms ingest and interact with MEDLINE data files, nor how these changes influence the construction of search queries and the results they produce. This poster presents a ...


Important Factors In Midwestern Public Librarians’ Views On Intellectual Freedom And Collection Development: Part 1, Shannon M. Oltmann Jan 2019

Important Factors In Midwestern Public Librarians’ Views On Intellectual Freedom And Collection Development: Part 1, Shannon M. Oltmann

Information Science Faculty Publications

This research project examined the beliefs and actions of US midwestern librarians concerning intellectual freedom and collection development. The results are presented in two complementary articles; this first article provides some background and the results pertaining to intellectual freedom, whereas the second article will focus on the results for collection development questions and conclude with a broader discussion. The data were obtained through an extensive survey with a 21.37% response rate. In general, high levels of support for intellectual freedom were found across most respondents and across multiple questions. Respondents with an MLS degree were more likely to be ...


Problems And Promises Of Qualitative Secondary Analysis For Research In Information Science (Paper), Amy Vanscoy, Jenny Bossaller, C. Sean Burns Jul 2018

Problems And Promises Of Qualitative Secondary Analysis For Research In Information Science (Paper), Amy Vanscoy, Jenny Bossaller, C. Sean Burns

Information Science Faculty Publications

Qualitative secondary analysis (QSA) is a method that has been applied in other disciplines even though it has rarely been explicitly used or discussed in information science. This paper discusses the epistemological and ethical issues surrounding QSA, explains the value of the method for information science research, discusses its benefits and challenges, and provides an example case study.


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources ...


Performance Evaluation Of Energy-Autonomous Sensors Using Power-Harvesting Beacons For Environmental Monitoring In Internet Of Things (Iot), George Dan Moiş, Teodora Sanislav, Silviu Corneliu Folea, Sherali Zeadally May 2018

Performance Evaluation Of Energy-Autonomous Sensors Using Power-Harvesting Beacons For Environmental Monitoring In Internet Of Things (Iot), George Dan Moiş, Teodora Sanislav, Silviu Corneliu Folea, Sherali Zeadally

Information Science Faculty Publications

Environmental conditions and air quality monitoring have become crucial today due to the undeniable changes of the climate and accelerated urbanization. To efficiently monitor environmental parameters such as temperature, humidity, and the levels of pollutants, such as fine particulate matter (PM2.5) and volatile organic compounds (VOCs) in the air, and to collect data covering vast geographical areas, the development of cheap energy-autonomous sensors for large scale deployment and fine-grained data acquisition is required. Rapid advances in electronics and communication technologies along with the emergence of paradigms such as Cyber-Physical Systems (CPSs) and the Internet of Things (IoT) have led ...


Social Responsibility, Librarianship, And The Ala: The 2015 Banned Books Week Poster Controversy, Emily J. M. Knox, Shannon M. Oltmann Jan 2018

Social Responsibility, Librarianship, And The Ala: The 2015 Banned Books Week Poster Controversy, Emily J. M. Knox, Shannon M. Oltmann

Information Science Faculty Publications

This article explores the recent controversy over the American Library Association’s poster for Banned Books Week. In particular, this article connects the 2015 controversy to broader historical issues and tensions within American librarianship concerning social responsibilities. The researchers used a qualitative approach, conducting telephone interviews with 26 individuals. The interviews were recorded, transcribed, and analyzed deductively. The interviews revealed deep continuing tensions regarding American librarianship’s relationship to responsibilities. First, there is some dissatisfaction with the American Library Association and its Office for Intellectual Freedom. Second, there are competing conceptualizations of censorship and how to apply these differing meanings ...


"Participant" Perceptions Of Twitter Research Ethics, Casey Fiesler, Nicholas Proferes Jan 2018

"Participant" Perceptions Of Twitter Research Ethics, Casey Fiesler, Nicholas Proferes

Information Science Faculty Publications

Social computing systems such as Twitter present new research sites that have provided billions of data points to researchers. However, the availability of public social media data has also presented ethical challenges. As the research community works to create ethical norms, we should be considering users’ concerns as well. With this in mind, we report on an exploratory survey of Twitter users’ perceptions of the use of tweets in research. Within our survey sample, few users were previously aware that their public tweets could be used by researchers, and the majority felt that researchers should not be able to use ...


A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song Nov 2017

A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song

Information Science Faculty Publications

No abstract provided.


Language And Socioeconomics Predict Geographic Variation In Peer Review Outcomes At An Ecology Journal, C. Sean Burns, Charles W. Fox Nov 2017

Language And Socioeconomics Predict Geographic Variation In Peer Review Outcomes At An Ecology Journal, C. Sean Burns, Charles W. Fox

Information Science Faculty Publications

Papers submitted by scientists located in western nations generally fare better in the peer review process than do papers submitted by scientists from elsewhere. This paper examines geographic variation in peer review outcomes (whether a manuscript is sent for review, review scores obtained, and final decisions by editors) for 3529 submissions over a 4.5 year period at the journal Functional Ecology. In particular, we test whether geographic variation in language and socioeconomics are adequate to explain most or are all of this variation. There was no relationship between the geographic regions of handling editors and the decisions to send ...


"When Words Become Unclear": Unmasking Ict Through Visual Methodologies In Participatory Ict4d, Caitlin M. Bentley, David Nemer, Sara Vannini Oct 2017

"When Words Become Unclear": Unmasking Ict Through Visual Methodologies In Participatory Ict4d, Caitlin M. Bentley, David Nemer, Sara Vannini

Information Science Faculty Publications

Across the globe, our work and social lives are increasingly integrated with Information and Communication Technologies (ICT), yet massive disparities in the values, uses and benefits of ICT exist. New methods are needed to shed light on unique and integrative concepts of ICT across cultures. This paper explores the use of visual methods to facilitate critical engagement with ICT—defined as situational awareness, reflexive ICT practice and power and control over ICT. This definition of critical ICT engagement is informed by a cultural identity lens, and intends to improve participatory methods in ICT for Development (ICT4D) and community technology design ...


Creating Space At The Table: Intellectual Freedom Can Bolster Diverse Voices, Shannon M. Oltmann Oct 2017

Creating Space At The Table: Intellectual Freedom Can Bolster Diverse Voices, Shannon M. Oltmann

Information Science Faculty Publications

Many of the most challenged books, year after year, feature voices from diverse communities (including those of women, racial or ethnic minorities, and LGBT people). Intellectual freedom protects these voices and protects our right to hear these voices. This essay discusses the definition of intellectual freedom, why diverse perspectives are important, and how intellectual freedom can bolster diverse voices. In turn, this can improve our relationships with one another, increasing empathy and respect, which can be reflected in numerous ways and is particularly important in a divisive political climate.


Intellectual Freedom In Academic Libraries: Surveying Deans About Its Significance, Shannon M. Oltmann Sep 2017

Intellectual Freedom In Academic Libraries: Surveying Deans About Its Significance, Shannon M. Oltmann

Information Science Faculty Publications

In this study, deans and directors of academic libraries were surveyed about intellectual freedom. The survey found that most respondents said they rarely think about intellectual freedom yet said it was “somewhat” or “very” important in their libraries. Most did not have formal intellectual freedom policies; they often relied on statements from the American Library Association or other library organizations. Copyright/intellectual property, privacy, plagiarism, and academic freedom were the most important concerns related to intellectual freedom. Although this study shed some light on intellectual freedom in academic libraries, further work remains to be done.


Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur Jun 2017

Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur

Information Science Faculty Publications

The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network paradigm which is providing various types of solutions to the community and the individual user in various sectors including environmental monitoring, entertainment, transportation, security, and healthcare. We explore and compare the features of wireless sensor networks and ubiquitous sensor networks and based on the differences between these two types of systems, we classify the security-related challenges of ubiquitous sensor networks. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges that need to be addressed ...


Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li Mar 2017

Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li

Information Science Faculty Publications

Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will ...


The Inconsistent Work Of Web Filters: Mapping Information Access In Alabama Public Schools And Libraries, Chris Peterson, Shannon M. Oltmann, Emily J. M. Knox Jan 2017

The Inconsistent Work Of Web Filters: Mapping Information Access In Alabama Public Schools And Libraries, Chris Peterson, Shannon M. Oltmann, Emily J. M. Knox

Information Science Faculty Publications

Recent popular and academic discussions regarding the Internet have raised the question of whether and how networked intermediaries have a (dis)integrating social effects. In this study, we use public records of configurations of Internet filters in Alabama public schools and libraries to show how different institutions implement nominally consistent content standards inconsistently. We argue that these varying implementations are both significant and troubling for two reasons: first, they overreach the stated goals of the legislation with which they in principle comply; second, they may contribute to a broader epistemic breakdown by fragmenting the kind of information made available through ...


U.S. Newspaper Editors’ Ratings Of Social Media As Influential News Sources, Masahiro Yamamoto, Seungahn Nah, Deborah S. Chung Jan 2017

U.S. Newspaper Editors’ Ratings Of Social Media As Influential News Sources, Masahiro Yamamoto, Seungahn Nah, Deborah S. Chung

Information Science Faculty Publications

Social media, as one key platform for citizen journalism, are becoming a useful news-gathering tool for journalists. Based on data from a nationwide probability sample of newspaper editors in the United States, this study investigates the extent to which newspaper editors consider social media an influential news source. Results show that variations in editors’ ratings of social media as a news source were related to multiple levels of influence, including professional journalistic experience, organization size, community structural pluralism, and citizen journalism credibility. Implications are discussed for the roles of social media in news production.


Advancing Research For Library And Information Science With Qualitative Secondary Analysis, Jenny Bossaller, C. Sean Burns, Amy Vanscoy Sep 2016

Advancing Research For Library And Information Science With Qualitative Secondary Analysis, Jenny Bossaller, C. Sean Burns, Amy Vanscoy

Information Science Faculty Publications

This paper presents the results of a study utilizing a seldom-used method in Library and Information Science (LIS): Qualitative Secondary Analysis. The data is drawn from two phenomenological studies about experiences of Reference and Information Services (RIS) librarians. We discuss how we repurposed the interview data in this study, and also the strengths, weaknesses, and wider applications of the method across LIS.


“For All The People”: Public Library Directors Interpret Intellectual Freedom, Shannon M. Oltmann Jul 2016

“For All The People”: Public Library Directors Interpret Intellectual Freedom, Shannon M. Oltmann

Information Science Faculty Publications

Intellectual freedom is frequently seen as a core value of librarianship, especially by the American Library Association, which has issued extensive guidance to libraries about implementing intellectual freedom. Some scholars criticize these documents, arguing that they are unrealistic and do not offer meaningful support to libraries. While scholars question the value of ALA policies, it is unclear whether practicing librarians have similar concerns about the Library Bill of Rights (LBR) and related guidelines. This article describes a study of public libraries and their interpretation of the LBR in their daily practice. To investigate the role played by ALA documents, 15 ...


Qualitative Interviews: A Methodological Discussion Of The Interviewer And Respondent Contexts, Shannon M. Oltmann May 2016

Qualitative Interviews: A Methodological Discussion Of The Interviewer And Respondent Contexts, Shannon M. Oltmann

Information Science Faculty Publications

Interviews are a staple method used in qualitative research. Many authors hold face-to-face interviews to be the gold standard, or the assumed best mode in which to conduct interviews. However, a large number of research projects are based on conducting interviews via telephone. While some scholars have addressed the advantages and disadvantages of using telephones to conduct interviews, this work is scattered across multiple disciplines and lacks a cohesive, comprehensive framework. The current article seeks to rectify this gap in the literature, by explicitly developing the constructs of the interviewer context and the respondent context. By examining key components in ...


Intellectual Freedom And Freedom Of Speech: Three Theoretical Perspectives, Shannon M. Oltmann Apr 2016

Intellectual Freedom And Freedom Of Speech: Three Theoretical Perspectives, Shannon M. Oltmann

Information Science Faculty Publications

Freedom of speech encompasses not only a right to express oneself but also a right to access information. This right is particularly pertinent to libraries, whose mission is often focused on enabling and expanding access to information. Libraries can support this activity with a theoretical background that draws upon the three predominant jurisprudential theories of freedom of speech: the marketplace of ideas, democratic ideals, and individual autonomy. In this article, each of these theories is explained and then applied to the library context, creating a starting place for further investigation and application of these judicial theories to information access.


Institutional And Individual Factors Affecting Scientists' Data-Sharing Behaviors: A Multilevel Analysis, Youngseek Kim, Jeffrey M. Stanton Apr 2016

Institutional And Individual Factors Affecting Scientists' Data-Sharing Behaviors: A Multilevel Analysis, Youngseek Kim, Jeffrey M. Stanton

Information Science Faculty Publications

The objective of this research was to investigate the institutional and individual factors that influence scientists' data-sharing behaviors across different scientific disciplines. Two theoretical perspectives, institutional theory, and theory of planned behavior, were employed in developing a research model that showed the complementary nature of the institutional and individual factors influencing scientists' data-sharing behaviors. This research used a survey method to examine to what extent those institutional and individual factors influence scientists' data-sharing behaviors in a range of scientific disciplines. A national survey (with 1,317 scientists in 43 disciplines) showed that regulative pressure by journals, normative pressure at a ...


Personal Communication Networks And Their Positive Effects On Online Collaboration And Outcome Quality On Wikipedia, Michail Tsikerdekis Apr 2016

Personal Communication Networks And Their Positive Effects On Online Collaboration And Outcome Quality On Wikipedia, Michail Tsikerdekis

Information Science Faculty Publications

Online collaborative projects have been utilized in a variety of ways over the past decade, such as bringing people together to build open source software or developing the world's largest free encyclopedia. Personal communication networks as a feature do not exist in all collaborative projects. It is currently unclear if a designer's decision to include a personal communication network in a collaborative project's structure affects outcome quality. In this study, I investigated Wikipedia's personal communication network and analyzed which Wikipedia editors are utilizing it and how they are connected to outcome quality. Evidence suggests that people ...


Examining Care Navigation: Librarian Participation In A Teambased Approach?, A. Tyler Nix, Jeffrey T. Huber, Robert M. Shapiro Ii, Andrea Pfeifle Apr 2016

Examining Care Navigation: Librarian Participation In A Teambased Approach?, A. Tyler Nix, Jeffrey T. Huber, Robert M. Shapiro Ii, Andrea Pfeifle

Information Science Faculty Publications

Objective: This study investigated responsibilities, skill sets, degrees, and certifications required of health care navigators in order to identify areas of potential overlap with health sciences librarianship.

Method: The authors conducted a content analysis of health care navigator position announcements and developed and assigned forty-eight category terms to represent the sample’s responsibilities and skill sets.

Results: Coordination of patient care and a bachelor’s degree were the most common responsibility and degree requirements, respectively. Results also suggest that managing and providing health information resources is an area of overlap between health care navigators and health sciences librarians, and that ...


“They Kind Of Rely On The Library”: School Librarians Serving Lgbt Students, Shannon M. Oltmann Mar 2016

“They Kind Of Rely On The Library”: School Librarians Serving Lgbt Students, Shannon M. Oltmann

Information Science Faculty Publications

This research examines school librarians’ perspectives on collecting LGBT materials. Based on qualitative interviews with thirty-one school librarians, this project found generally strong support for collecting LGBT materials. School librarians discussed serving their communities, having resources for all students, and meeting the needs of diverse students. In addition, they shared several ways that school libraries can counter bullying: creating a bully-free zone in the library, collecting LGBT and anti-bullying materials, collaborating with guidance counselors and teachers, suggesting particular books for certain students, being a supporter of students, and positioning the school library as a safe space.


Re-Conceiving Time In Reference And Information Services Work: A Qualitative Secondary Analysis, Jenny Bossaller, C. Sean Burns, Amy Vanscoy Jan 2016

Re-Conceiving Time In Reference And Information Services Work: A Qualitative Secondary Analysis, Jenny Bossaller, C. Sean Burns, Amy Vanscoy

Information Science Faculty Publications

Purpose

The purpose of this paper is to use the sociology of time to understand how time is perceived by academic librarians who provide reference and information service (RIS).

Design/methodology/approach

This study is a qualitative secondary analysis (QSA) of two phenomenological studies about the experience of RIS in academic libraries. The authors used QSA to re-analyze the interview transcripts to develop themes related to the perception of time.

Findings

Three themes about the experience of time in RIS work were identified. Participants experience time as discrete, bounded moments but sometimes experience threads through these moments that provide continuity ...


Exploring The Structure Of Library And Information Science Web Space Based On Multivariate Analysis Of Social Tags, Soohyung Joo, Margaret E. I. Kipp Dec 2015

Exploring The Structure Of Library And Information Science Web Space Based On Multivariate Analysis Of Social Tags, Soohyung Joo, Margaret E. I. Kipp

Information Science Faculty Publications

Introduction. This study examines the structure of Web space in the field of library and information science using multivariate analysis of social tags from the Website, Delicious.com. A few studies have examined mathematical modelling of tags, mainly examining tagging in terms of tri-partite graphs, pattern tracing and descriptive statistics. This study is one of the few studies to employ multivariate analysis in investigating dimensions of Web spaces based on social tagging data.

Method. This study examines the post data collected from a set of library and information science related Websites bookmarked on Delicious.com using a Web crawler. Post ...


Characteristics Of A Megajournal: A Bibliometric Case Study, C. Sean Burns Jun 2015

Characteristics Of A Megajournal: A Bibliometric Case Study, C. Sean Burns

Information Science Faculty Publications

The term megajournal is used to describe publication platforms, like PLOS ONE, that claim to incorporate peer review processes and web technologies that allow fast review and publishing. These platforms also publish without the constraints of periodic issues and instead publish daily. We conducted a yearlong bibliometric profile of a sample of articles published in the first several months after the launch of PeerJ, a peer reviewed, open access publishing platform in the medical and biological sciences. The profile included a study of author characteristics, peer review characteristics, usage and social metrics, and a citation analysis. We found that about ...


Using Digital Libraries Non-Visually: Understanding The Help-Seeking Situations Of Blind Users, Iris Xie, Rakesh Babu, Soohyung Joo, Paige Fuller Jun 2015

Using Digital Libraries Non-Visually: Understanding The Help-Seeking Situations Of Blind Users, Iris Xie, Rakesh Babu, Soohyung Joo, Paige Fuller

Information Science Faculty Publications

Introduction. This study explores blind users' unique help-seeking situations in interacting with digital libraries. In particular, help-seeking situations were investigated at both the physical and cognitive levels.
Method
. Fifteen blind participants performed three search tasks, including known-item search, specific information search, and exploratory search, using the selected digital library. Pre-questionnaire, pre- and post-interviews, transaction logs and think-aloud protocols were used to collect data.
Analysis
. Open coding analysis was used to identify help-seeking situations the physical and cognitive levels.
Results. The study identified seventeen help-seeking situations that blind users encountered while using digital libraries, including nine at the physical level and ...