187 resultados para Ethics of information


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose – This paper outlines research that explores the information literacy experiences of EFL (English as a Foreign Language) students. The question explored in this research was: how do EFL students experience information literacy. Design/Methodology/Approach – This study used phenomenography, a relational approach to explore the information literacy experiences of EFL students. Phenomenography studies the qualitatively different ways a phenomenon is experienced in the world around us. Findings – This research revealed that EFL students experienced information literacy in four qualitatively different ways. The four categories revealed through the data were: process, quality, language and knowledge. This research found that language impacted on EFL students’ experiences of information literacy and revealed that EFL students applied various techniques and strategies when they read, understood, organised and translated information. Research limitations/implications – This research was conducted in a specific cultural and educational context, therefore the results might not reflect the experiences of EFL students in other cultural or educational contexts. Practical implications – The findings from this research offer an important contribution to information literacy practice by providing important insights about EFL students’ experiences and perceptions of information and learning that can be used to inform curriculum development in second language learning contexts. Originality/Value - There is currently a lack of research using a relational approach to investigate EFL students’ experiences of information literacy. There is also limited research that explores the impact language has on information literary and learning in English as a foreign or second language contexts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The rate at which people move and resettle around the world is unprecedented. Mobility and resettlement is now greatly assisted by the use of inexpensive internet communication technologies (ICTs) for a wide variety of functions: to communicate locally and across territories, for localised information seeking, geo – locational mapping and for forging new social connections in host countries and cities. This article is based on a qualitative study of newly arrived migrants and mobile people from non English speaking backgrounds (NESB) to the city of Brisbane, Australia and investigates how the internet is used to assist the initial period of settling into the city. As increasing amounts of essential information is placed online, the study asks how people from NESB communities manage to negotiate the types of information they require during the early stages of resettlement, given varying levels of access to ICTs, digital and language literacy. The study finds that the internet is widely used for specific location information seeking (such as accommodation and job-seeking), but this is often supplemented with other non-mediated sources of information. The study identified implications for social policy in regard to the resourcing and access of information. While findings are specific to the study location, it is feasible that the patterns of internet use for resettlement have relevance in a broader context.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis examines, by way of phenomenographic methodology, the qualitatively different ways in which people engaged in Serious Leisure activities (within the area of 'heritage') experience information literacy. The study identified the presence of four distinct categories of information literacy experience, each with variation in regard to the serious leisure participant's experience of learning and information. In addition it also identified the existence of a further dimension of variation pertaining to the way in which individual identity is experienced during engagement with a serious leisure activity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The impact of simulation methods for social research in the Information Systems (IS) research field remains low. A concern is our field is inadequately leveraging the unique strengths of simulation methods. Although this low impact is frequently attributed to methodological complexity, we offer an alternative explanation – the poor construction of research value. We argue a more intuitive value construction, better connected to the knowledge base, will facilitate increased value and broader appreciation. Meta-analysis of studies published in IS journals over the last decade evidences the low impact. To facilitate value construction, we synthesize four common types of simulation research contribution: Analyzer, Tester, Descriptor, and Theorizer. To illustrate, we employ the proposed typology to describe how each type of value is structured in simulation research and connect each type to instances from IS literature, thereby making these value types and their construction visible and readily accessible to the general IS community.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Focus groups are a popular qualitative research method for information systems researchers. However, compared with the abundance of research articles and handbooks on planning and conducting focus groups, surprisingly, there is little research on how to analyse focus group data. Moreover, those few articles that specifically address focus group analysis are all in fields other than information systems, and offer little specific guidance for information systems researchers. Further, even the studies that exist in other fields do not provide a systematic and integrated procedure to analyse both focus group ‘content’ and ‘interaction’ data. As the focus group is a valuable method to answer the research questions of many IS studies (in the business, government and society contexts), we believe that more attention should be paid to this method in the IS research. This paper offers a systematic and integrated procedure for qualitative focus group data analysis in information systems research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article provides a general review of the literature on the nature and role of empathy in social interaction for information professionals working in a variety of information and knowledge environments. Relational agency theory (Edwards, 2005) is used asa framework to re-conceptualize education for empathic social interaction between information professionals and their clients. Past, present and future issues relevant to empathic interaction in information and knowledge management are discussed in the context of three shifts identified from the literature: (a) the continued increase in communication channels, both physical and virtual, for reference, information and re-search services, (b) the transition from the information age to the conceptual age and(c) the growing need for understanding of the affective paradigm in the information and knowledge professions. Findings from the literature review on the relationships between empathy and information behavior, social networking, knowledge management and information and knowledge services are presented. Findings are discussed in relation to the development of guidelines for the affective education and training of information and knowledge professionals and the potential use of virtual learning software such as Second Life in developing empathic communication skills

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction. Social media is becoming a vital source of information in disaster or emergency situations. While a growing number of studies have explored the use of social media in natural disasters by emergency staff, military personnel, medial and other professionals, very few studies have investigated the use of social media by members of the public. The purpose of this paper is to explore citizens’ information experiences in social media during times of natural disaster. Method. A qualitative research approach was applied. Data was collected via in-depth interviews. Twenty-five people who used social media during a natural disaster in Australia participated in the study. Analysis. Audio recordings of interviews and interview transcripts provided the empirical material for data analysis. Data was analysed using structural and focussed coding methods. Results. Eight key themes depicting various aspects of participants’ information experience during a natural disaster were uncovered by the study: connected; wellbeing; coping; help; brokerage; journalism; supplementary and characteristics. Conclusion. This study contributes insights into social media’s potential for developing community disaster resilience and promotes discussion about the value of civic participation in social media when such circumstances occur. These findings also contribute to our understanding of information experiences as a new informational research object.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An increasing amount of people seek health advice on the web using search engines; this poses challenging problems for current search technologies. In this paper we report an initial study of the effectiveness of current search engines in retrieving relevant information for diagnostic medical circumlocutory queries, i.e., queries that are issued by people seeking information about their health condition using a description of the symptoms they observes (e.g. hives all over body) rather than the medical term (e.g. urticaria). This type of queries frequently happens when people are unfamiliar with a domain or language and they are common among health information seekers attempting to self-diagnose or self-treat themselves. Our analysis reveals that current search engines are not equipped to effectively satisfy such information needs; this can have potential harmful outcomes on people’s health. Our results advocate for more research in developing information retrieval methods to support such complex information needs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper introduces a modified Kano approach to analysing and classifying quality attributes that drive student satisfaction in tertiary education. The approach provides several benefits over the traditional Kano approach. Firstly, it uses existing student evaluations of subjects in the educational institution instead of purpose-built surveys as the data source. Secondly, since the data source includes qualitative comments and feedback, it has the exploratory capability to identify emerging and unique attributes. Finally, since the quality attributes identified could be tied directly to students’ detailed feedback, the approach enables practitioners to easily translate the results into concrete action plans. In this paper, the approach is applied to analysing 26 subjects in the information systems school of an Australia university. The approach has enabled the school to uncover new quality attributes and paves the way for other institutions to use their student evaluations to continually understand and addressed students’ changing needs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.