scholarly journals Identity in Information Behaviour Research: A Conceptual Analysis

Author(s):  
Deborah Hicks

Using a conceptual analysis approach, this study explores how identity has been conceptualized in the information behaviour literature. Findings indicate that researchers have employed three main approaches when conceptualizing identity: identity as personal project, identity and social groups, and identity as selfpresentation were the three most common conceptualizations of identity. The findings contribute to the identification of the key factors of information behaviour and suggest areas for future research.

2016 ◽  
Vol 72 (4) ◽  
pp. 648-673 ◽  
Author(s):  
Reijo Savolainen

Purpose – The purpose of this paper is to elaborate the picture of the nature of integrated models for information behaviour from the perspective of conceptual growth in this field of study. Design/methodology/approach – Conceptual analysis focusing on the ways in which the researchers have developed integrated models. The study concentrates on seven key models proposed by Bates, Choo and associates, Godbold, Robson and Robinson, and Wilson. Findings – Researchers have employed four main approaches to develop integrated models. First, such frameworks are based on the juxtaposition of individual models. Second, integrated models are built by cross-tabulating the components of diverse models. Third, such models are constructed by relating similar components of individual models. Finally, integrated models are built by incorporating components taken from diverse frameworks. The integrated models have contributed to conceptual growth in three major ways: first, by integrating formerly separate parts of knowledge; second, by generalizing and explaining lower abstraction-level knowledge through higher level constructs; and third, by expanding knowledge by identifying new characteristics of the object of study. Research limitations/implications – The findings are based on the comparison of seven models only. The integrated frameworks of information retrieval were excluded from the study. Originality/value – The study pioneers by providing an in-depth analysis the nature of integrated models for information behaviour. The findings contribute to the identification of the key factors of information behaviour.


Author(s):  
Robin Banerjee ◽  
Gail D. Heyman ◽  
Kang Lee

Children come to recognize that the impressions one makes on other people can be controlled and managed. In this chapter, the authors situate the development of such “self-presentation” in the moral context, with attention to a range of relevant social, cultural, cognitive, motivational, and emotional processes. Children’s appreciation of self-presentational tactics such as self-promotion, modesty, and ingratiation is reviewed before turning specifically to the factors involved in deception and truth-telling. The authors analyze the emergence of children’s self-presentational competencies in shaping both their own individual reputations and the reputations of the social groups with which they identify, especially in contexts where moral and social-conventional rules have been transgressed. Key goals for future research that illuminates the nature and implications of children’s moral self-presentation are identified.


Author(s):  
Adolfo G. Cuevas ◽  
David R. Williams

The Midlife in the United States (MIDUS) study was the first national health study to include a comprehensive battery to measure both major acute and chronic experiences of discrimination. Studies using MIDUS data have made significant contributions to the growing area of research on discrimination and health. This chapter provides an overview of research on discrimination and health, giving special attention to how findings from the MIDUS study have contributed to this literature. It provides a description of the discrimination instruments in MIDUS and summarizes key MIDUS findings that have examined discrimination in relation to health outcomes. This chapter outlines priority areas for future research. With growing recognition of the need to better understand the conditions under which specific aspects of discrimination are pathogenic for particular social groups, this chapter highlights the importance of using MIDUS to reach these goals.


Author(s):  
Wan Nur Syahida Wan Ismail ◽  
Mohd Zulkifli Mokhtar ◽  
Azwadi Ali ◽  
Mohd Shaari Abdul Rahman

Nowadays, competition is everywhere in the business environment. The survival of Small and medium-sized enterprises (SMEs) depend on their ability to take full advantage of the resources available. Prior research had identified that IT is an important resource to the success of the firms. However, despite the common consensus that IT influences firm’s performance, results of previous studies on the effect of IT resources on firm’s performance are often inconsistent. Given these inconsistent results, it is unclear whether any direct effect exists between IT resources in organizations and their firm’s performance. For that reason, several authors highlighted the need for more research to investigate the impact of IT adoption on the firm’s performance. In response to this, this conceptual paper attempts to analyze relevant literatures on whether IT investment would help firms gain better performance. Understanding whether and how IT has affected firm’s performance is an important research issue as it allows the firms to know the value of IT investment and whether such innovation is worth to be adopted. Grounding in RBV theory, this study concluded that the combination of IT assets and IT capabilities (IT infrastructure) provides competitive advantage to the firm. This study also suggested that SMEs that adopt IT would perform better than those that do not adopt IT. This conceptual analysis is hoped to consolidate the body of knowledge in the area and significant to the researchers as it directs to the hypotheses development for future research.


2021 ◽  
Vol 12 ◽  
Author(s):  
Nicola Döring ◽  
Nicole Krämer ◽  
Veronika Mikhailova ◽  
Matthias Brand ◽  
Tillmann H. C. Krüger ◽  
...  

Based on its prevalence, there is an urgent need to better understand the mechanisms, opportunities and risks of sexual interaction in digital contexts (SIDC) that are related with sexual arousal. While there is a growing body of literature on SIDC, there is also a lack of conceptual clarity and classification. Therefore, based on a conceptual analysis, we propose to distinguish between sexual interaction (1) through, (2) via, and (3) with digital technologies. (1) Sexual interactions through digital technologies are face-to-face sexual interactions that (a) have been started digitally (e.g., people initiating face-to-face sexual encounters through adult dating apps) or (b) are accompanied by digital technology (e.g., couples augmenting their face-to-face sexual encounters through filming themselves during the act and publishing the amateur pornography online). (2) Sexual interactions via digital technology are technology-mediated interpersonal sexual interactions (e.g., via text chat: cybersex; via smartphone: sexting; via webcam: webcam sex/camming). (3) Sexual interactions with digital technology occur when the technology itself has the role of an interaction partner (e.g., sexual interaction with a sex robot or with a media persona in pornography). The three types of SIDC and their respective subtypes are explained and backed up with empirical studies that are grouped according to two major mediators: consent and commerce. Regarding the causes and consequences of the three types of SIDC we suggest a classification that entails biological, psychological, social, economic, and technological factors. Regarding implications of SIDC we suggest to focus on both opportunities and risks for sexual health. The proposed conceptual framework of SIDC is meant to inform future research.


Author(s):  
Grandon Gill

Aim/Purpose: Labeling a journal as “predatory” can do great damage to the journal and the individuals that have contributed to it. This paper considers whether the predatory classification has outlived its usefulness and what might replace it. Background: With the advent of open access publishing, the term “predatory” has increasingly been used to identify academic journals, conferences, and publishers whose practices are driven by profit or self-interest rather than the advancement of science. Absent clear standards for determining what is predatory and what is not, concerns have been raised about the misuse of the label. Methodology: Mixed methods: A brief review of the literature, some illustrative case studies, and conceptual analysis. Contribution: The paper provides recommendations for reducing the impact of illegitimate journals. Findings: Current predatory classifications are being assigned with little or no systematic research and virtually no accountability. The predatory/not predatory distinction does not accommodate alternative journal missions. Recommendations for Researchers: The distinction between legitimate and illegitimate journals requires consideration of each journal’s mission. To serve as a useful guide, a process akin to that used for accrediting institutions needs to be put in place. Impact on Society: Avoiding unnecessary damage to the careers of researchers starting out. Future Research: Refining the initial classification scheme proposed in the paper.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Samad M.E. Sepasgozar ◽  
Mohsen Ghobadi ◽  
Sara Shirowzhan ◽  
David J. Edwards ◽  
Elham Delzendeh

PurposeThis paper aims to examine the current technology acceptance model (TAM) in the field of mixed reality and digital twin (MRDT) and identify key factors affecting users' intentions to use MRDT. The factors are used as a set of key metrics for proposing a predictive model for virtual, augmented and mixed reality (MR) acceptance by users. This model is called the extended TAM for MRDT adoption in the architecture, engineering, construction and operations (AECO) industry.Design/methodology/approachAn interpretivist philosophical lens was adopted to conduct an inductive systematic and bibliographical analysis of secondary data contained within published journal articles that focused upon MRDT acceptance modelling. The preferred reporting items for systematic reviews and meta-analyses (PRISMA) approach to meta-analysis were adopted to ensure all key investigations were included in the final database set. Quantity indicators such as path coefficients, factor ranking, Cronbach’s alpha (a) and chi-square (b) test, coupled with content analysis, were used for examining the database constructed. The database included journal papers from 2010 to 2020.FindingsThe extant literature revealed that the most commonly used constructs of the MRDT–TAM included: subjective norm; social influence; perceived ease of use (PEOU); perceived security; perceived enjoyment; satisfaction; perceived usefulness (PU); attitude; and behavioural intention (BI). Using these identified constructs, the general extended TAM for MRDT in the AECO industry is developed. Other important factors such as “perceived immersion” could be added to the obtained model.Research limitations/implicationsThe decision to utilise a new technology is difficult and high risk in the construction project context, due to the complexity of MRDT technologies and dynamic construction environment. The outcome of the decision may affect employee performance, project productivity and on-site safety. The extended acceptance model offers a set of factors that assist managers or practitioners in making effective decisions for utilising any type of MRDT technology.Practical implicationsSeveral constraints are apparent due to the limited investigation of MRDT evaluation matrices and empirical studies. For example, the research only covers technologies which have been reported in the literature, relating to virtual reality (VR), augmented reality (AR), MR, DT and sensors, so newer technologies may not be included. Moreover, the review process could span a longer time period and thus embrace a fuller spectrum of technology development in these different areas.Originality/valueThe research provides a theoretical model for measuring and evaluating MRDT acceptance at the individual level in the AECO context and signposts future research related to MRDT adoption in the AECO industry, as well as providing managerial guidance for progressive AECO professionals who seek to expand their use of MRDT in the Fourth Industrial Revolution (4IR). A set of key factors affecting MRDT acceptance is identified which will help innovators to improve their technology to achieve a wider acceptance.


Author(s):  
Andrew Silke ◽  
John Morrison ◽  
Heidi Maiberg ◽  
Chloe Slay ◽  
Rebecca Stewart

Abstract Improving our understanding of how disengagement and deradicalisation from terrorism and violent extremism occurs has critical real-world implications. A systematic review of the recent literature in this area was conducted in order to develop a more refined and empirically-derived model of the processes involved. After screening more than 83,000 documents, we found 29 research reports which met the minimum quality thresholds. Thematic analysis identified key factors associated with disengagement and deradicalisation processes. Assessing the interactions of these factors produced the Phoenix Model of Disengagement and Deradicalisation which is described in this paper. Also examined are some of the potential policy and practice implications of the Phoenix Model, as are avenues for future research in this area.


2018 ◽  
pp. 971-993
Author(s):  
Sara L. Parker ◽  
Kay Standing

This chapter discusses the complexity and challenges of exploring the impact of gender on women's ability to realise their potential in Nepal. It demonstrates the limitations of using binary divisions to exploring ‘gender' as a key factor that impacts upon women's lives. By analysing interviews with ‘inspirational' women in Nepal conducted between 2009 and 2012 the chapter highlights the importance of exploring intersectional factors that also influenced women's life experiences. Based on interviews with 34 ‘inspirational' women in Nepal the chapter explores how the term ‘inspirational' is defines and discusses the range of work being done by so many women in Nepal that is truly inspiring. Through a discourse analysis of their stories of childhood and education we can see what key factors have played a role in enabling these women to realise their potential and to overcome intersectional barriers to work in a range of diverse positions, from the first female District Development Officer to the first women to gain her doctorate from overseas, to women who have set up NGOS working towards a more equitable and just society to others who have set up their own businesses or becoming leading academics. The conclusion draws together some key recommendations for future research and policy makers as well as those seeking to promote more equitable sustainable development that truly includes women in the process as autonomous, heterogeneous actors in the development process


Author(s):  
Oarabile Sebubi

The objective of democracy is to allow people the freedom to vote at ease and according to their individual choices. Mobile Election has high potentials of transforming and improving efficiency of the current electoral process, thereby enabling convenient and ubiquitous elections, hence, revolutionizing the institution of democracy. With so much potential though, its adoption is extremely low worldwide because the barriers to adoption are extremely high as mobile election is still lacking in addressing the critical and sensitive requirements of the electoral process worldwide. This chapter explores the potential impact of mobile elections to democratic establishments such as politics and voter participation. It then adopts a comparative analysis approach in exploring the barriers to adoption and possible solutions. Lastly, it provides recommendations for future research in the areas of voter trafficking, network and data security, inter-operability issue, digital/democratic divide issue, and voter satisfaction.


Sign in / Sign up

Export Citation Format

Share Document