• Title/Summary/Keyword: information theory

Search Result 7,269, Processing Time 0.038 seconds

A Systematic Review on the Application of the Theory of Information Worlds

  • Park, Sungjae;Lee, Jisue;Hollister, Jonathan M.
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.4
    • /
    • pp.87-109
    • /
    • 2022
  • Previous studies have found that the use or development of theory in library and information science (LIS) research is comparatively low and may be trending downward. LIS has also been criticized for relying on theories imported from other disciplines rather than applying or developing theories from within. The theory of information worlds, a social information behavior theory originally introduced in 2008, represents a newer LIS theory whose level of adoption is understudied. This study features a systematic literature review of peer-reviewed research articles which cited or used the theory of information worlds from 2008 to early 2022 to identify trends related to levels of theory use, publication venues, author affiliations, countries, and collaborations, as well as research methods, topics, and populations. Findings suggest that both awareness and use of the theory of information worlds are positively trending, though at slower rates for higher levels of theory use, such as full applications of the theory to guide the collection and analysis of empirical data. The theory has also been used by researchers from around the world and across disciplines, most often with mixed and qualitative methods. While the growth of a new LIS theory is promising, the authors echo calls for increased use and development of the theory of information worlds, and other LIS theories more broadly, and as more interdisciplinary collaboration.

Developing a Theory in Academic Research: A Review of Experts’ Advice

  • Dankasa, Jacob
    • Journal of Information Science Theory and Practice
    • /
    • v.3 no.3
    • /
    • pp.64-74
    • /
    • 2015
  • Despite the number of developed theories, it still remains a difficult task for some established and emerging scholars in various academic fields to clearly articulate new theories from research studies. This paper reviews and collates the views of scholars on what a theory is and how a good theory can be developed. It explains the concept of a theory, and the different components that make up a theory. The paper discusses the different processes of theory development by emphasizing what theory is and what theory is not. This review found that scholars differ in their definition of a theory, which leads to using terms such as model, paradigm, framework, and theory interchangeably. It found the lack of theoretical constructs in a study to be one of the factors which explains why articles are rejected for publication. This paper may be of benefit to established researchers who may be struggling with theory development, and especially younger academics who are the future of scholarship in various academic fields, particularly in information science.

ISRI - Information Systems Research Constructs and Indicators: A Web Tool for Information Systems Researchers

  • Varajao, Joao;Trigo, Antonio;Silva, Tiago
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.1
    • /
    • pp.54-67
    • /
    • 2021
  • This paper presents the ISRI (Information Systems Research Indicators) Web tool, publicly and freely available at isri.sciencesphere.org. Targeting Information Systems (IS) researchers, it compiles and organizes IS adoption and use theories/models, constructs, and indicators (measuring variables) available in the scientific literature. Aiming to support the IS theory development process, the purpose of ISRI is to gather and systematize information on research indicators to help researchers and practitioners' work. The tool currently covers eleven theories/models: DeLone and McLean's IS Success Model (D&M ISS); Diffusion of Innovations Theory (DOI); Motivational Model (MM); Social Cognitive Theory (SCT); Task-Technology Fit (TTF); Technology Acceptance Model (TAM); Technology-Organization-Environment Framework (TOE); Theory of Planned Behavior (TPB); Decomposed Theory of Planned Behavior (DTPB); Theory of Reasoned Action (TRA); and Unified Theory of Acceptance and Use of Technology (UTAUT). It also includes currently over 400 constructs, nearly 2,500 indicators, and about 60 application contexts related to the models. For the creation of the tool's database, nearly 580 references were used.

Developing the online reviews based recommender models for multi-attributes using deep learning (딥러닝을 이용한 온라인 리뷰 기반 다속성별 추천 모형 개발)

  • Lee, Ryun-Kyoung;Chung, Namho;Hong, Taeho
    • The Journal of Information Systems
    • /
    • v.28 no.1
    • /
    • pp.97-114
    • /
    • 2019
  • Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.

A Study on the Internet User's Economic Behavior of Provision of Personal Information: Focused on the Privacy Calculus, CPM Theory (개인정보 제공에 대한 인터넷 사용자의 경제적 행동에 관한 연구: Privacy Calculus, CPM 이론을 중심으로)

  • Kim, Jinsung;Kim, Jongki
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.93-123
    • /
    • 2017
  • Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. In addition, this study, did empirical analysis of the path difference between groups by dividing Internet users into a group having experience in personal information spill and another group having no experience. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.

A Study on Improving Information Security Compliance of Organization Insider (조직 내부자의 정보보안 준수 향상에 대한 연구)

  • Hwang, In-Ho
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.4_2
    • /
    • pp.421-434
    • /
    • 2021
  • The expansion of information sharing activities using online can increase the threat of information exposure by increasing the diversity of approaches to information within an organization. The purpose of this study is to present conditions for improving the information security compliance intention of insiders to improve the level of information security within the organization. In detail, the study applies the theory of planned behavior that clearly explains the cause of an individual's behavior and proposes a way to increase the compliance intention by integrating the social control theory and goal-setting theory. The study presented research models and hypotheses based on previous studies, collected samples by applying a questionnaire technique, and tested hypotheses through structural equation modeling. As a result, information security attitude, subjective norms, and self-efficacy had a positive influence on the intention to comply. Also, attachment, commitment, and involvement, which are the factors of social control theory, formed a positive attitude toward information security. Goal difficulty and goal specificity, which are the factors of goal setting theory, formed a positive self-efficacy. The study presents academic and practical implications in terms of suggesting a method of improving the information security compliance intention of employees.

An Analysis of Current State of Grounded Theory Methodology in Korean Information Systems Research with Suggestion of its Application Guidelines (우리나라 정보시스템 연구에서 근거이론방법론 현황 분석과 적용 지침 제시)

  • Lee, Woong-Kyu
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.181-199
    • /
    • 2020
  • Purpose The purpose of this study is to analyze the current state of grounded theory methodology in Korea information systems studies and to suggest its application strategies. Design/methodology/approach After reviewing previous studies, this study reviewed 16 papers which adopted grounded theory methodology and analyzed these papers by two ways, research contents and methods adopted from grounded theory methodology: Main characteristics in grounded theory methodology are selected as main criteria in analysis such as data collection method, constant comparison, software use, coding ways, suggested model, proposition suggestion etc., while subject, theory/practice orientation, and role of prior knowledge are included in research contents. Findings Based on the review and analysis, this paper suggested four guidelines for adopting grounded theory methodology to information systems research in Korea: First, division of research methodology into stages. Second, explicit documentation of research process. Third, pursuit of diversity in research topics. Fourth, strengthening scale up and theoretical integration.

A Critical Reinterpretation of Dervin's Sense-Making Theory as Communication Theory (소통 이론으로서 Dervin의 의미형성 이론의 비판적 재해석)

  • Park, Seongwoo;Hong, Soram
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.3
    • /
    • pp.193-214
    • /
    • 2022
  • Sense-Making Theory gives persuasive power to information seeking behavior while acknowledging the diversity of subjects. It is being used as a theory and methodology to explain the phenomenon of information seeking in various temporal and spatial contexts related to the communication of individuals' inner realms, face-to-face, organization, and mass communication. However, it is not to be a theory to explain the information seeking behavior of a group in that it explains the individual epistemological interpretation of the subjects. Also, the purpose of the theory was to establish a receiver-centered communication theory that constructs sense-making by itself, away from the receiver who unilaterally accepts the sender's information from the perspective of communication theory. However, Dervin accepted the existence of object information without explaining the relationship between the recipient's external information and the receiver. Owing to the establishing his concept of information following the Popper(1972)'s world concept, its object of observation is not World III(objective content of thought), but the process of sense making in which World II(psychological world) receives information generated in World III. In this context, Dervin's theory is not to explain the communication behavior at a group level.

User-centered information service and a n.0, pplication of sense-making theory (이용자 중심 정보서비스와 Sense-making 이론의 적용)

  • ;Noh, Jin-Goo
    • Journal of Korean Library and Information Science Society
    • /
    • v.28
    • /
    • pp.447-475
    • /
    • 1998
  • We are seeing a shift of the focus of information service from system-centered(data-centered or intermediary-centered) a n.0, pproach to user-centered a n.0, pproach. Sense-making theory is one of the user- centered a n.0, pproaches. This study focused on user-centered information service paradigm concepts of Dervin's sense-making theory and interpreting sense-making theory in the practical context of library services. The sense-making theory is basically a cognitive a n.0, pproach to information-seeking, in that it recognizes information as something that involves internal cognitive processes. The user of information becomes the focus in this sense-making model. The sense-making theory sees information as subjective, situational, and cognitive. It focuses on understanding information within specific contexts and on understanding how information needs develop and how they are satisfied. It regards the user not as a passive receive of external information but as the center in a active, ongoing process of change. It related to the information needs of users. Dervin's method for studying information needs employs the 'situation-gap-use' metaphor. All information needs stem from a discontinuity or 'gap! in one's knowledge. Dervin believes that information needs can be addressed by understanding the process that each individual goes through in experiencing a gap, in trying to resolve it, and in gaining something (especially new knowledge) from the experience. Sense-making is a process; 'sense' is the product of this process. Sense includes 'knowledge'. However, it includes a host of other subjective factors that reflect an individual's interpretations of a situation including intuitions, opinions, hunches, effective responses, evaluations, questions, etc. For several reasons, however, difficulties are encountered if one attempts a more substantial assessment of the theory. First, it has not yet crystallized into a well-defined theory. Secondly, though the theory has aroused general interest, e.g. within LIS, detailed discussion of its strong and weak points is still lacking. A third source of difficulty is that the basic assumptions of the theory have been explicated metaphorically. If sense-making theory is to be really useful, it needs to be interpreted for library settings. But we have found no attempt to construct an information service based on the theory. Because the research tradition is still relatively young, there are many unanswered questions connected, e.g. with the design of information systems. In any case, e.g. intermediary access systems would be more efficient and effective it their planning could be founded on the user-centered a n.0, pproach.

  • PDF

An Analysis of Theory Use in the Library and information Science Research (문헌정보연구의 이론 활용성 분석)

  • 정동열;김성진
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.165-198
    • /
    • 2003
  • This study analyzed authors' use of theory in 654 articles that appeared in two core library and information science journals during last three decades. In order to analyze degree of theory use of LIS, such as, publication productivity, growth and distribution of theory in subfields. name and origin of theory, usability of each theory, subfields and journals, and so on, content analysis of LIS theories was performed through conceptual and empirical study. For the purpose of this study, we suggested a couple of new analytical methods, so called, ‘Subfield Classification Scheme’ within LIS, and ‘5 Degrees of Theory Use’ model for the first time.