Current Search: School of Information Faculty Scholarship (x) » School of Information Faculty Scholarship (x)
Search results
Pages
- Title
- Survey of Information Literacy Instructional Practices in U.S. Academic Libraries.
- Creator
-
Julian, Heidi, Gross, Melissa, Latham, Don
- Abstract/Description
-
An online survey sent to the community of professional librarians in the U.S. who provide information literacy instruction in academic libraries provided insights into their practices and the challenges they face. Data include current pedagogical methods, client groups of focus, assessment and evaluation, marketing, instructional objectives, incorporating the new Framework for Information Literacy for Higher Education into instruction, the role of technology in instruction, the importance of...
Show moreAn online survey sent to the community of professional librarians in the U.S. who provide information literacy instruction in academic libraries provided insights into their practices and the challenges they face. Data include current pedagogical methods, client groups of focus, assessment and evaluation, marketing, instructional objectives, incorporating the new Framework for Information Literacy for Higher Education into instruction, the role of technology in instruction, the importance of relationships with faculty and administrators, and a range of common challenges faced by instructional librarians. The survey results can help to identify best practices, to improve current practice, to compare practices across different contexts, and to inform pre-professional preparation of librarians who will become providers of instruction.
Show less - Date Issued
- 2018-03-01
- Identifier
- FSU_libsubv1_scholarship_submission_1522260283_a1afe644, 10.5860/crl.79.2.179
- Format
- Citation
- Title
- Systematic Marketing Facilitates Optimal Customer Service: The Marketing Audit of a Rural Public Library System.
- Creator
-
Phillips, Abigail
- Abstract/Description
-
This article presents a case study of a marketing audit of the Lee County Library System, a rural public library system located in southwest Georgia. Marketing audits are an underutilized but needed tool for public libraries. In this audit, the library system's mission, goals, environments, community and employee demographics, and a SWOT analysis were evaluated, resulting in several recommendations. These recommendations include a new mission statement, regular SWOT analyses, and potential...
Show moreThis article presents a case study of a marketing audit of the Lee County Library System, a rural public library system located in southwest Georgia. Marketing audits are an underutilized but needed tool for public libraries. In this audit, the library system's mission, goals, environments, community and employee demographics, and a SWOT analysis were evaluated, resulting in several recommendations. These recommendations include a new mission statement, regular SWOT analyses, and potential market segments for targeted library services. Through this case study, the complexities, challenges, and opportunities unique to rural public libraries can be understood.
Show less - Date Issued
- 2014
- Identifier
- FSU_migr_slis_faculty_publications-0022, 10.1080/01616846.2014.937212
- Format
- Citation
- Title
- The 1:1 Principle in the Age of Linked Data.
- Creator
-
Urban, Richard
- Abstract/Description
-
This paper explores the origins of the 1:1 Principle within Dublin Core Metadata Initiative (DCMI). It finds that the need for the 1:1 Principle emerged from prior work among cultural heritage professionals responsible for describing reproductions and surrogate resources using traditional cataloging methods. As the solutions to these problems encountered new ways to model semantic data that emerged outside of libraries, archives, and museums, tensions arose within DCMI community. This paper...
Show moreThis paper explores the origins of the 1:1 Principle within Dublin Core Metadata Initiative (DCMI). It finds that the need for the 1:1 Principle emerged from prior work among cultural heritage professionals responsible for describing reproductions and surrogate resources using traditional cataloging methods. As the solutions to these problems encountered new ways to model semantic data that emerged outside of libraries, archives, and museums, tensions arose within DCMI community. This paper aims to fill the gaps in our understanding of the 1:1 Principle by outlining the conceptual foundations that led to its inclusion in DCMI documentation, how the Principle has been (mis)understood in practice, how violations of the Principle have been operationalized, and how the fundamental issues raised by the Principle continue to challenge us today. This discussion situates the 1:1 Principle within larger discussions about cataloging practice and emerging Linked Data approaches.
Show less - Date Issued
- 2014
- Identifier
- FSU_migr_slis_faculty_publications-0025X
- Format
- Citation
- Title
- Trust or Consequences? Causal Effects of Perceived Risk and Subjective Norms on Cloud Technology Adoption.
- Creator
-
Ho, Shuyuan Mary, Ocasio Velazquez, Mónica, Booth, Cheryl
- Abstract/Description
-
Cloud computing has become a popular alternative information curation solution for organizations. As more corporate proprietary information is stored in the Cloud, concerns about Cloud information security have also increased. This study investigates the causal effect of perceived risk and subjective norms on users’ trust intention to adopt Cloud technology. A partial least squares structural equation modeling (PLS-SEM) analysis was performed to assess latent variables and examine moderating...
Show moreCloud computing has become a popular alternative information curation solution for organizations. As more corporate proprietary information is stored in the Cloud, concerns about Cloud information security have also increased. This study investigates the causal effect of perceived risk and subjective norms on users’ trust intention to adopt Cloud technology. A partial least squares structural equation modeling (PLS-SEM) analysis was performed to assess latent variables and examine moderating effects to Cloud technology adoption. Our findings suggest that a user’s perceived risk and subjective norms have a significant effect on their trust intention vis-a-vis Cloud adoption, which leads to their decision on whether to adopt the Cloud technology. While a user’s attitudes do influence their intention to trust the Cloud, their attitude is not moderated by either perceived risk or subjective norms. On the other hand, a user’s perceived risk of the Cloud environment predominately moderates their knowledge and perceived behavioral control, which results in their knowledge and perceived behavioral control not having a direct effect on their intention to trust the Cloud. Moreover, a user’s subjective norms predicate their trust intention, which further moderates their knowledge and perceived behavioral control to trust and to adopt Cloud technology.
Show less - Date Issued
- 2017-08-12
- Identifier
- FSU_libsubv1_scholarship_submission_1521646741_8cd25886, 10.1016/j.cose.2017.08.004
- Format
- Citation
- Title
- Trustworthiness Attribution: Inquiry into Insider Threat Detection.
- Creator
-
Ho, Shuyuan Mary, Kaarst-Brown, Michelle, Benbasat, Izak
- Abstract/Description
-
Insider threat is a “wicked” contemporary organizational problem. It poses significant threats to organizational operations and information security. This paper reviews insider threat research and outlines key propositions to conceptualize the interpretation of dynamic human information behavior in an organizational setting, which represent an integration of trustworthiness and human sensors’ attribution in close relationships. These propositions posit that when a focal individual violates...
Show moreInsider threat is a “wicked” contemporary organizational problem. It poses significant threats to organizational operations and information security. This paper reviews insider threat research and outlines key propositions to conceptualize the interpretation of dynamic human information behavior in an organizational setting, which represent an integration of trustworthiness and human sensors’ attribution in close relationships. These propositions posit that when a focal individual violates integrity-based trust, the group can collectively attribute a shift in trustworthiness, triggering a natural peer attribution process that assigns cause to observed behavior. Group communication can thus reflect subtle changes in a focal individual’s perceived trustworthiness. The ability to understand group-based computer-mediated communication patterns over time may become essential in safeguarding information assets and the “digital well-being” of today’s organizations. This paper contributes a novel theoretical lens to examine dynamic insights on insider threat detection.
Show less - Date Issued
- 2017-09-22
- Identifier
- FSU_libsubv1_scholarship_submission_1521648889_a36573e1, 10.1002/asi.23938
- Format
- Citation
- Title
- Undergraduate Perceptions of Information Literacy: Defining, Attaining, and Self-Assessing Skills.
- Creator
-
Gross, Melissa, Latham, Don
- Abstract/Description
-
This investigation uses interview data on student conceptions of and experiences with interacting with information. In addition, student scores on the Information Literacy Test (ILT) provide data that allow for comparison of student perceptions to their level of information literacy as measured by a standardized test. A relational approach, informed by competency theory and the imposed query model, provide the framework for the study design and interpretation of the data. Findings reveal a...
Show moreThis investigation uses interview data on student conceptions of and experiences with interacting with information. In addition, student scores on the Information Literacy Test (ILT) provide data that allow for comparison of student perceptions to their level of information literacy as measured by a standardized test. A relational approach, informed by competency theory and the imposed query model, provide the framework for the study design and interpretation of the data. Findings reveal a general view of information literacy focused on product rather than process, a perception of achieving information skills on their own, a preference for people over other information sources, and an emphasis on personal interest as key to successful information seeking.
Show less - Date Issued
- 2009
- Identifier
- FSU_migr_slis_faculty_publications-0017X
- Format
- Citation
- Title
- Utilizing A Structural Meta-ontology For Family-based Of The Bioportal Ontologies.
- Creator
-
Ochs, Christopher, He, Zhe, Zheng, Ling, Geller, James, Perl, Yehoshua, Hripcsak, George, Musen, Mark A.
- Abstract/Description
-
An Abstraction Network is a compact summary of an ontology's structure and content. In previous research, we showed that Abstraction Networks support quality assurance (QA) of biomedical ontologies. The development of an Abstraction Network and its associated QA methodologies, however, is a laborintensive process that previously was applicable only to one ontology at a time. To improve the efficiency of the Abstraction-Network-based QA methodology, we introduced a QA framework that uses...
Show moreAn Abstraction Network is a compact summary of an ontology's structure and content. In previous research, we showed that Abstraction Networks support quality assurance (QA) of biomedical ontologies. The development of an Abstraction Network and its associated QA methodologies, however, is a laborintensive process that previously was applicable only to one ontology at a time. To improve the efficiency of the Abstraction-Network-based QA methodology, we introduced a QA framework that uses uniform Abstraction Network derivation techniques and QA methodologies that are applicable to whole families of structurally similar ontologies. For the family-based framework to be successful, it is necessary to develop a method for classifying ontologies into structurally similar families. We now describe a structural meta-ontology that classifies ontologies according to certain structural features that are commonly used in the modeling of ontologies (e.g., object properties) and that are important for Abstraction Network derivation. Each class of the structural meta-ontology represents a family of ontologies with identical structural features, indicating which types of Abstraction Networks and QA methodologies are potentially applicable to all of the ontologies in the family. We derive a collection of 81 families, corresponding to classes of the structural meta-ontology, that enable a flexible, streamlined family based QA methodology, offering multiple choices for classifying an ontology. The structure of 373 ontologies from the NCBO BioPortal is analyzed and each ontology is classified into multiple families modeled by the structural meta-ontology. (C) 2016 Elsevier Inc. All rights reserved.
Show less - Date Issued
- 2016-06
- Identifier
- FSU_libsubv1_wos_000384704300008, 10.1016/j.jbi.2016.03.007
- Format
- Citation
- Title
- What do academic libraries tweet about, and what makes library tweet useful?.
- Creator
-
Stvilia, Besiki, Gibradze, Leila
- Abstract/Description
-
People spend an increasing amount of time using social media systems to network, share information, learn, or engage in leisure activities (e.g., gaming). Libraries too are establishing a social media presence to promote the library and provide services to user populations through the social media systems the users frequent. This study explores Twitter uses by six large academic libraries, and factors that make library tweets useful. 752 tweets were analyzed by topic to develop a subject...
Show morePeople spend an increasing amount of time using social media systems to network, share information, learn, or engage in leisure activities (e.g., gaming). Libraries too are establishing a social media presence to promote the library and provide services to user populations through the social media systems the users frequent. This study explores Twitter uses by six large academic libraries, and factors that make library tweets useful. 752 tweets were analyzed by topic to develop a subject typology of library tweets. In addition, tweets and Twitter user characteristics were analyzed to explore what makes library tweets useful, as measured by the number of retweets and favorites received. Content analysis of the samples of library tweets revealed nine content types, with the Event and Resource categories being the most frequent. In addition, the analysis showed that tweets related to study support services and building and maintaining connections with the library community were the most frequently retweeted and selected as favorites. The presence of a URL in the tweet was positively associated with the number of retweets, and the number of users followed was positively associated with the number of favorites received. Finally, a negative correlation was found between the account age and number of favorites.
Show less - Date Issued
- 2014-10
- Identifier
- FSU_libsubv1_scholarship_submission_1493062256, 10.1016/j.lisr.2014.07.001
- Format
- Citation
- Title
- What Do We Mean By Library Leadership?: Leadership in LIS Education.
- Creator
-
Phillips, Abigail
- Abstract/Description
-
Leadership is an often-misunderstood word, especially in the context of libraries. With multiple definitions for the word 'leadership' and vast numbers of leadership styles, it can be difficult to identity what exactly is meant when discussing library leadership. This literature review brings together 10 years of scholarly research on leadership in the library as it relates to LIS education. Through a close evaluation of this literature, a more holistic understanding of 'leadership' as a...
Show moreLeadership is an often-misunderstood word, especially in the context of libraries. With multiple definitions for the word 'leadership' and vast numbers of leadership styles, it can be difficult to identity what exactly is meant when discussing library leadership. This literature review brings together 10 years of scholarly research on leadership in the library as it relates to LIS education. Through a close evaluation of this literature, a more holistic understanding of 'leadership' as a concept in LIS education can be better understood. Several topics are highlighted and discussed including the ambiguity in definitions of 'leadership', the qualities of library leaders, leadership in LIS curriculum, library leadership and organization change, and library leadership and new librarians. For this review, the definition of LIS curriculum includes professional association leadership programs. Closing this literature review are recommendations for incorporating leadership education and mentorship opportunities into MLIS programs.
Show less - Date Issued
- 2014
- Identifier
- FSU_migr_slis_faculty_publications-0026
- Format
- Citation