Current Search: School of Information (x)
Search results
Pages
- Title
- “One Must Actually Take Facts as They Are”: Information Value and Information Behavior in the Miss Marple Novels.
- Creator
-
Kazmer, Michelle M.
- Abstract/Description
-
One perspective not often brought to the study of detective fiction is that from the field of information science. Among other topics, information science is concerned with information behavior, or how people behave with respect to information: needing, seeking, accidentally encountering, avoiding, evaluating, storing and so forth. Examining the solving of a mystery as an information behavior has potential for insights into the genre and into our twenty-first century readings of detective...
Show moreOne perspective not often brought to the study of detective fiction is that from the field of information science. Among other topics, information science is concerned with information behavior, or how people behave with respect to information: needing, seeking, accidentally encountering, avoiding, evaluating, storing and so forth. Examining the solving of a mystery as an information behavior has potential for insights into the genre and into our twenty-first century readings of detective fiction. Current audiences are accustomed to modern information technology and the information behaviors afforded by it: amateur sleuths hack computer systems or professional detectives analyze trace evidence for DNA. Highly technologized contemporary information environments leave us to ask: in what ways do the manipulation of information value, and the sophistication of the information behaviors, in novels written by Agatha Christie in the early- to mid-twentieth century, continue to enthrall readers in the twenty-first?
Show less - Date Issued
- 2016
- Identifier
- FSU_libsubv1_scholarship_submission_1457717673
- Format
- Citation
- Title
- An activity theoretic model for information quality change.
- Creator
-
Stvilia, Besiki, Gasser, Les
- Abstract/Description
-
To manage information quality (IQ) effectively, one needs to know how IQ changes over time, what causes it to change, and whether the changes can be predicted. In this paper we analyze the structure of IQ change in Wikipedia, an open, collaborative general encyclopedia. We found several patterns in Wikipedia’s IQ process trajectories and linked them to article types. Drawing on the results of our analysis, we develop a general model of IQ change that can be used for reasoning about IQ...
Show moreTo manage information quality (IQ) effectively, one needs to know how IQ changes over time, what causes it to change, and whether the changes can be predicted. In this paper we analyze the structure of IQ change in Wikipedia, an open, collaborative general encyclopedia. We found several patterns in Wikipedia’s IQ process trajectories and linked them to article types. Drawing on the results of our analysis, we develop a general model of IQ change that can be used for reasoning about IQ dynamics in many different settings, including traditional databases and information repositories.
Show less - Date Issued
- 2008-04-07
- Identifier
- FSU_libsubv1_scholarship_submission_1493896106_3601f514, 10.5210/fm.v13i4.2126
- Format
- Citation
- Title
- Analysis of Temporal Constraints in Qualitative Eligibility Criteria of Cancer Clinical Studies.
- Creator
-
He, Zhe, Chen, Zhiwei, Bian, Jiang
- Abstract/Description
-
Clinical studies, especially randomized controlled trials, generate gold-standard medical evidence. However, the lack of population representativeness of clinical studies has hampered their generalizability to the real-world population. Overly restrictive qualitative criteria are often applied to exclude patients. In this work, we develop a lexical-pattern-based tool to structure qualitative eligibility criteria with temporal constraints, with which we analyzed over 10,800 cancer clinical...
Show moreClinical studies, especially randomized controlled trials, generate gold-standard medical evidence. However, the lack of population representativeness of clinical studies has hampered their generalizability to the real-world population. Overly restrictive qualitative criteria are often applied to exclude patients. In this work, we develop a lexical-pattern-based tool to structure qualitative eligibility criteria with temporal constraints, with which we analyzed over 10,800 cancer clinical studies. Our results showed that restrictive temporal constraints are often applied on qualitative criteria in cancer studies, limiting the generalizability of their results.
Show less - Date Issued
- 2016-12-01
- Identifier
- FSU_pmch_29263940, 10.1109/BIBM.2016.7822607, PMC5733789, 29263940, 29263940
- Format
- Citation
- Title
- Assessing the Comorbidity Gap between Clinical Studies and Prevalence in Elderly Patient Populations.
- Creator
-
He, Zhe, Charness, Neil, Bian, Jiang, Hogan, William R
- Abstract/Description
-
Well-designed and well-conducted clinical studies represent gold standard approaches for generating medical evidence. However, elderly populations are systematically underrepresented in studies across major chronic medical conditions, which has hampered the generalizability (external validity) of studies to the real-world patient population. It is the norm that intervention studies often require a homogeneous cohort to test their hypotheses; therefore older adults with co-medications and...
Show moreWell-designed and well-conducted clinical studies represent gold standard approaches for generating medical evidence. However, elderly populations are systematically underrepresented in studies across major chronic medical conditions, which has hampered the generalizability (external validity) of studies to the real-world patient population. It is the norm that intervention studies often require a homogeneous cohort to test their hypotheses; therefore older adults with co-medications and comorbidities are often excluded. The purpose of this study is to assess the gap between clinical studies on comorbidities and prevalence in elderly populations derived from the National Health and Nutrition Examination Survey (NHANES) and the Multiparameter Intelligent Monitoring in Intensive Care II (MIMIC-II) dataset. A comorbidity gap between them was observed and reported in this work.
Show less - Date Issued
- 2016-02-01
- Identifier
- FSU_pmch_27738664, 10.1109/BHI.2016.7455853, PMC5058342, 27738664, 27738664
- Format
- Citation
- Title
- Auditing the Assignments of Top-Level Semantic Types in the UMLS Semantic Network to UMLS Concepts.
- Creator
-
He, Zhe, Perl, Yehoshua, Elhanan, Gai, Chen, Yan, Geller, James, Bian, Jiang
- Abstract/Description
-
The Unified Medical Language System (UMLS) is an important terminological system. By the policy of its curators, each concept of the UMLS should be assigned the most specific Semantic Types (STs) in the UMLS Semantic Network (SN). Hence, the Semantic Types of most UMLS concepts are assigned at or near the bottom (leaves) of the UMLS Semantic Network. While most ST assignments are correct, some errors do occur. Therefore, Quality Assurance efforts of UMLS curators for ST assignments should...
Show moreThe Unified Medical Language System (UMLS) is an important terminological system. By the policy of its curators, each concept of the UMLS should be assigned the most specific Semantic Types (STs) in the UMLS Semantic Network (SN). Hence, the Semantic Types of most UMLS concepts are assigned at or near the bottom (leaves) of the UMLS Semantic Network. While most ST assignments are correct, some errors do occur. Therefore, Quality Assurance efforts of UMLS curators for ST assignments should concentrate on automatically detected sets of UMLS concepts with higher error rates than random sets. In this paper, we investigate the assignments of top-level semantic types in the UMLS semantic network to concepts, identify potential erroneous assignments, define four categories of errors, and thus provide assistance to curators of the UMLS to avoid these assignments errors. Human experts analyzed samples of concepts assigned 10 of the top-level semantic types and categorized the erroneous ST assignments into these four logical categories. Two thirds of the concepts assigned these 10 top-level semantic types are erroneous. Our results demonstrate that reviewing top-level semantic type assignments to concepts provides an effective way for UMLS quality assurance, comparing to reviewing a random selection of semantic type assignments.
Show less - Date Issued
- 2017-11-01
- Identifier
- FSU_pmch_29375930, 10.1109/BIBM.2017.8217840, PMC5786167, 29375930, 29375930
- Format
- Citation
- Title
- Author Team Diversity and the Impact of Scientific Publications: Evidence from Physics Research at a National Science Lab.
- Creator
-
Hinnant, Charles, Stvilia, Besiki, Wu, Shuheng, Worrall, Adam, Burnett, Gary, Burnett, Kathleen, Kazmer, Michelle M., Marty, Paul F.
- Abstract/Description
-
In the second half of the 20th century, scientific research in physics, chemistry, and engineering began to focus on the use of large government-funded laboratories. This shift toward so-called big science also brought about a concomitant change in scientific work itself, with a sustained trend toward the use of highly specialized scientific teams, elevating the role of team characteristics on scientific outputs. The actual impact of scientific knowledge is commonly measured by how often peer...
Show moreIn the second half of the 20th century, scientific research in physics, chemistry, and engineering began to focus on the use of large government-funded laboratories. This shift toward so-called big science also brought about a concomitant change in scientific work itself, with a sustained trend toward the use of highly specialized scientific teams, elevating the role of team characteristics on scientific outputs. The actual impact of scientific knowledge is commonly measured by how often peer-reviewed publications are, in turn, cited by other researchers. Therefore, how characteristics such as author team seniority, affiliation diversity, and size affect the overall impact of team publications was examined. Citation information and author demographics were reviewed for 123 articles published in Physical Review Letters from 2004 to 2006 and written by 476 scientists who used the National High Magnetic Field Laboratory's facilities. Correlation analysis indicated that author teams that were more multi-institutional and had homogeneous seniority tended to have more senior scientists. In addition, the analysis suggests that more mixed seniority author teams were likely to be less institutionally dispersed. Quantile regression was used to examine the relationships between author-team characteristics and publication impact. The analysis indicated that both weighted average seniority and average seniority had a negative relationship with the number of citations the publication received. Furthermore, the analysis also showed a positive relationship between first-author seniority and the number of citations, and a negative relationship between the number of authors and the number of citations.
Show less - Date Issued
- 2012
- Identifier
- FSU_migr_slis_faculty_publications-0007, 10.1016/j.lisr.2012.03.001
- Format
- Citation
- Title
- Automatic Extraction Of Protein-protein Interactions Using Grammatical Relationship Graph.
- Creator
-
Yu, Kaixian, Lung, Pei-Yau, Zhao, Tingting, Zhao, Peixiang, Tseng, Yan-Yuan, Zhang, Jinfeng
- Abstract/Description
-
Background: Relationships between bio-entities (genes, proteins, diseases, etc.) constitute a significant part of our knowledge. Most of this information is documented as unstructured text in different forms, such as books, articles and on-line pages. Automatic extraction of such information and storing it in structured form could help researchers more easily access such information and also make it possible to incorporate it in advanced integrative analysis. In this study, we developed a...
Show moreBackground: Relationships between bio-entities (genes, proteins, diseases, etc.) constitute a significant part of our knowledge. Most of this information is documented as unstructured text in different forms, such as books, articles and on-line pages. Automatic extraction of such information and storing it in structured form could help researchers more easily access such information and also make it possible to incorporate it in advanced integrative analysis. In this study, we developed a novel approach to extract bio-entity relationships information using Nature Language Processing (NLP) and a graph-theoretic algorithm. Methods: Our method, called GRGT (Grammatical Relationship Graph for Triplets), not only extracts the pairs of terms that have certain relationships, but also extracts the type of relationship (the word describing the relationships). In addition, the directionality of the relationship can also be extracted. Our method is based on the assumption that a triplet exists for a pair of interactions. A triplet is defined as two terms (entities) and an interaction word describing the relationship of the two terms in a sentence. We first use a sentence parsing tool to obtain the sentence structure represented as a dependency graph where words are nodes and edges are typed dependencies. The shortest paths among the pairs of words in the triplet are then extracted, which form the basis for our information extraction method. Flexible pattern matching scheme was then used to match a triplet graph with unknown relationship to those triplet graphs with labels (True or False) in the database. Results: We applied the method on three benchmark datasets to extract the protein-protein-interactions (PPIs), and obtained better precision than the top performing methods in literature. Conclusions: We have developed a method to extract the protein-protein interactions from biomedical literature. PPIs extracted by our method have higher precision among other methods, suggesting that our method can be used to effectively extract PPIs and deposit them into databases. Beyond extracting PPIs, our method could be easily extended to extracting relationship information between other bio-entities.
Show less - Date Issued
- 2018-07-23
- Identifier
- FSU_libsubv1_wos_000439486300005, 10.1186/s12911-018-0628-4
- Format
- Citation
- Title
- Availability and accessibility in an open access institutional repository: A case study.
- Creator
-
Lee, Jongwook, Burnett, Gary, Baeg, Jung Hoon, Vandegrift, Micah, Morris, Richard Jack
- Abstract/Description
-
Introduction. This study explores the extent to which an institutional repository (IR) makes papers available and accessible on the open web by using 170 journal articles housed in DigiNole Commons, the IR at Florida State University. Method. To analyze the IR's impact on availability and accessibility, we conducted independent known-item title searches on both Google and Google Scholar (GS) to search for faculty publications housed in DigiNole Commons. Analysis. The extent to which the IR...
Show moreIntroduction. This study explores the extent to which an institutional repository (IR) makes papers available and accessible on the open web by using 170 journal articles housed in DigiNole Commons, the IR at Florida State University. Method. To analyze the IR's impact on availability and accessibility, we conducted independent known-item title searches on both Google and Google Scholar (GS) to search for faculty publications housed in DigiNole Commons. Analysis. The extent to which the IR makes articles available and accessible was measured quantitatively, and the findings that cannot be summarized with numbers were analyzed qualitatively. Results. Google and GS searches provided links to DigiNole metadata for a total of 145 (85.3%) of 170 items, and to full texts for 96 (96%) of 100 items. With one exception, access to either metadata or full text required no more than three clicks. Conclusions. Overall, the results confirm the contribution of the IR in making papers available and accessible. The results also reveal some impediments to the success of OA: including impediments linked to contractual arrangements between authors and publishers, impediments linked to policies, practices, and technologies governing the IR itself, and the low level of faculty participation in the IR.
Show less - Date Issued
- 2015
- Identifier
- FSU_migr_slis_faculty_publications-0027
- Format
- Citation
- Title
- Building Community among Museum Information Professionals: A Case Study of the Museum Computer Network.
- Creator
-
Marty, Paul F., Soren, Barbara J., Armstrong, Jackie
- Abstract/Description
-
Museum information professionals meet the needs of the producers and consumers of museum information resources, yet little is known of how their own needs are met or what benefits they obtain from being part of a broader professional community. This study presents results from a survey of 283 individuals who were asked about their relationship with the Museum Computer Network, an international professional organization dedicated to supporting the needs of museum information professionals. The...
Show moreMuseum information professionals meet the needs of the producers and consumers of museum information resources, yet little is known of how their own needs are met or what benefits they obtain from being part of a broader professional community. This study presents results from a survey of 283 individuals who were asked about their relationship with the Museum Computer Network, an international professional organization dedicated to supporting the needs of museum information professionals. The results shed light on how professional organizations can meet the needs of individuals who share a common interest in museums and information technology, particularly when those individuals are professionally diverse and geographically distributed. The results can help researchers and practitioners better understand how to build community among museum information professionals, and have implications for all organizations supporting the needs of museum professionals.
Show less - Date Issued
- 2013
- Identifier
- FSU_libsubv1_scholarship_submission_1455643786
- Format
- Citation
- Title
- Collections Cubed Survey Instrument (2015).
- Creator
-
Urban, Richard J
- Abstract/Description
-
The Collections Cubed Survey Instrument (2015) will inquire about organizations' current and/or planned future use of 3D technologies (digitization, publication, and printing). It is intended to be answered by individuals who are knowledgeable about these technologies.
- Date Issued
- 2015
- Identifier
- FSU_libsubv1_scholarship_submission_1455572164
- Format
- Citation
- Title
- Comparing and Contrasting A Priori and A Posteriori Generalizability Assessment of Clinical Trials on Type 2 Diabetes Mellitus.
- Creator
-
He, Zhe, Gonzalez-Izquierdo, Arturo, Denaxas, Spiros, Sura, Andrei, Guo, Yi, Hogan, William R, Shenkman, Elizabeth, Bian, Jiang
- Abstract/Description
-
Clinical trials are indispensable tools for evidence-based medicine. However, they are often criticized for poor generalizability. Traditional trial generalizability assessment can only be done after the trial results are published, which compares the enrolled patients with a convenience sample of real-world patients. However, the proliferation of electronic data in clinical trial registries and clinical data warehouses offer a great opportunity to assess the generalizability during the...
Show moreClinical trials are indispensable tools for evidence-based medicine. However, they are often criticized for poor generalizability. Traditional trial generalizability assessment can only be done after the trial results are published, which compares the enrolled patients with a convenience sample of real-world patients. However, the proliferation of electronic data in clinical trial registries and clinical data warehouses offer a great opportunity to assess the generalizability during the design phase of a new trial. In this work, we compared and contrasted a priori (based on eligibility criteria) and a posteriori (based on enrolled patients) generalizability of Type 2 diabetes clinical trials. Further, we showed that comparing the study population selected by the clinical trial eligibility criteria to the real-world patient population is a good indicator of the generalizability of trials. Our findings demonstrate that the a priori generalizability of a trial is comparable to its a posteriori generalizability in identifying restrictive quantitative eligibility criteria.
Show less - Date Issued
- 2018-04-16
- Identifier
- FSU_pmch_29854151, PMC5977671, 29854151, 29854151
- Format
- Citation
- Title
- Competing Standards in the Education of School Librarians.
- Creator
-
Church, Audrey P., Dickinson, Gail K., Everhart, Nancy, Howard, Jody
- Abstract/Description
-
Education for school librarians traditionally blends elements from the fields of LIS and education. A thorough preparation in both professions is necessary since school librarians hold state teaching certification in K-12 library media. A variety of standards from professional organizations guide school librarians in performing their multi-faceted roles, and accordingly inform the curricula of school librarian preparation programs. However, the plethora of standards may actually make it more...
Show moreEducation for school librarians traditionally blends elements from the fields of LIS and education. A thorough preparation in both professions is necessary since school librarians hold state teaching certification in K-12 library media. A variety of standards from professional organizations guide school librarians in performing their multi-faceted roles, and accordingly inform the curricula of school librarian preparation programs. However, the plethora of standards may actually make it more difficult to determine what standards to include in LIS curricula, and when to include them in educating future school librarians. The implications of competitive aspects of inclusion of each of these standards in school librarian education programs are discussed.
Show less - Date Issued
- 2012
- Identifier
- FSU_migr_slis_faculty_publications-0021X
- Format
- Citation
- Title
- Computer-Mediated Deception:: Strategies Revealed by Language-action Cues in Spontaneous Communication.
- Creator
-
Ho, Shuyuan Mary, Hancock, Jeffrey T., Booth, Cheryl, Liu, Xiuwen
- Abstract/Description
-
Computer-mediated deception threatens the security of online users’ private and personal information. Previous research confirms that humans are bad lie detectors, while demonstrating that certain observable linguistic features can provide crucial cues to detect deception. We designed and conducted an experiment that creates spontaneous deception scenarios in an interactive online game environment. Logistic regression, and certain classification methodologies were applied to analyzing data...
Show moreComputer-mediated deception threatens the security of online users’ private and personal information. Previous research confirms that humans are bad lie detectors, while demonstrating that certain observable linguistic features can provide crucial cues to detect deception. We designed and conducted an experiment that creates spontaneous deception scenarios in an interactive online game environment. Logistic regression, and certain classification methodologies were applied to analyzing data collected during Fall 2014 through Spring 2015. Our findings suggest that certain language-action cues (e.g., cognitive load, affective process, latency and wordiness) reveal patterns of information behavior manifested by deceivers in spontaneous online communication. Moreover, computational approaches to analyzing these language-action cues can provide significant accuracy in detecting computer-mediated deception.
Show less - Date Issued
- 2016-10-05
- Identifier
- FSU_libsubv1_scholarship_submission_1521642217_19b33a13, 10.1080/07421222.2016.1205924
- Format
- Citation
- Title
- Connecting to Collections in Florida: Current Conditions and Critical Needs in Libraries, Archives, and Museums.
- Creator
-
Jorgensen, Corinne, Marty, Paul F., Braun, Kathy
- Abstract/Description
-
This article presents results from an IMLS-funded project to evaluate the current state of collections in Florida's libraries, archives, and museums, current practices to preserve and conserve these collections, and perceived needs to maintain and improve these collections for future generations. The survey, modeled after the Heritage Health Index national survey, demonstrated that many of Florida's collections are in desperate need of conservation and preservation and indicate a clear need...
Show moreThis article presents results from an IMLS-funded project to evaluate the current state of collections in Florida's libraries, archives, and museums, current practices to preserve and conserve these collections, and perceived needs to maintain and improve these collections for future generations. The survey, modeled after the Heritage Health Index national survey, demonstrated that many of Florida's collections are in desperate need of conservation and preservation and indicate a clear need for an increased effort to guarantee the continued safety of and access to these collections. In addition to providing data on Florida's collections, the results of this study have national implications that will help researchers, professionals, administrators, government agencies, and the general public better understand the nature of collecting agencies and the long-term requirements for the continued preservation and conservation of the nation's natural and cultural heritage.
Show less - Date Issued
- 2012
- Identifier
- FSU_migr_slis_faculty_publications-0009, 10.1086/667437
- Format
- Set of related objects
- Title
- Correction to: Evaluating semantic relations in neural word embeddings with biomedical and general domain knowledge bases..
- Creator
-
Chen, Zhiwei, He, Zhe, Liu, Xiuwen, Bian, Jiang
- Abstract/Description
-
After publication of this supplement article [1], it was brought to our attention that the Results section of the abstract contained a partial sentence.
- Date Issued
- 2018-08-22
- Identifier
- FSU_pmch_30134877, 10.1186/s12911-018-0655-1, PMC6104021, 30134877, 30134877, 10.1186/s12911-018-0655-1
- Format
- Citation
- Title
- Detecting Cyberbullying "hotspots" On Twitter: A Predictive Analytics Approach.
- Creator
-
Ho, Shuyuan Mary, Kao, Dayu, Chiu-Huang, Ming-Jung, Li, Wenyi, Lai, Chung-Jui
- Abstract/Description
-
The ability to discover cyberbullying "hotspots" on social media is vitally important for purposes of preventing victimization. This study attempts to develop a prediction model for identifying cyberbullying "hotspots" by analyzing the manifestation of charged language on Twitter. A total of 140,000 tweets were collected using a Twitter API during September 2019. The study reports that certain charged language in tweets can indicate a high potential for cyberbullying incidents. Cyberbullies...
Show moreThe ability to discover cyberbullying "hotspots" on social media is vitally important for purposes of preventing victimization. This study attempts to develop a prediction model for identifying cyberbullying "hotspots" by analyzing the manifestation of charged language on Twitter. A total of 140,000 tweets were collected using a Twitter API during September 2019. The study reports that certain charged language in tweets can indicate a high potential for cyberbullying incidents. Cyberbullies tend to share negative emotion, demonstrate anger, and use abusive words to attack victims. The predictor variables related to "biology," "sexual," and "swear" can be further used to differentiate cyberbullies from non-cyberbullies. The study contributes to the detection of cyberbullying "hotspots," by providing an approach to identify a tendency for cyberbullying activity based on computational analysis of charged language. The contribution is significant for mediation agenciesdsuch as school counseling and law enforcement agencies. (C) 2020 The Authors. Published by Elsevier Ltd.
Show less - Date Issued
- 2020-04
- Identifier
- FSU_libsubv1_wos_000538088500001, 10.1016/j.fsidi.2020.300906
- Format
- Citation
- Title
- Digital Convergence and the Information Profession in Cultural Heritage Organizations: Reconciling Internal and External Demands.
- Creator
-
Marty, Paul F.
- Abstract/Description
-
Nearly twenty years ago, W. Boyd Rayward became one of the first academics to examine how electronic information and the functional integration of libraries, archives, and museums has affected, and will affect, the information profession. In doing so, he laid the groundwork for an entire research agenda on the topic of digital convergence, where the increased use of, and reliance on, digital resources in libraries, archives, and museums has increasingly blurred the traditional distinctions...
Show moreNearly twenty years ago, W. Boyd Rayward became one of the first academics to examine how electronic information and the functional integration of libraries, archives, and museums has affected, and will affect, the information profession. In doing so, he laid the groundwork for an entire research agenda on the topic of digital convergence, where the increased use of, and reliance on, digital resources in libraries, archives, and museums has increasingly blurred the traditional distinctions between these institutions. This paper explores how Rayward's early work in this area influenced the development of this topic over time, focusing on how information professionals in cultural heritage organizations can and should reconcile their internal perceptions of identity with the external expectations of their users, particularly those who do not or cannot clearly distinguish between different institutions or the information resources they manage. In a world where the traditional assumptions we take for granted about information organization and access in libraries, archives, and museums are simply not shared by our users, the future of the information profession depends on the ability of cultural heritage information professionals to transcend the traditional boundaries between libraries, archives, and museums to meet information needs in the digital age.
Show less - Date Issued
- 2014
- Identifier
- FSU_migr_slis_faculty_publications-0021, 10.1353/lib.2014.0007
- Format
- Citation
- Title
- Distributed knowledge in an online patient support community: Authority and discovery.
- Creator
-
Kazmer, Michelle M., Lustria, Mia, Cortese, Juliann, Burnett, Gary, Kim, Ji-Hyun, Ma, Jinxuan, Frost, Jeana
- Date Issued
- 2014
- Identifier
- FSU_migr_slis_faculty_publications-0012, 10.1002/asi.23064
- Format
- Citation
- Title
- Dyadic Attribution Model: A Mechanism to Assess Trustworthiness in Virtual Organizations.
- Creator
-
Ho, Shuyuan Mary, Benbasat, Izak
- Abstract/Description
-
Language as a symbolic medium plays an important role in virtual communications. In a primarily linguistic environment such as cyberspace, words are an expressed form of intent and actions. This paper intends to investigate the functions of words and actions in identifying behavioral anomalies of social actors in order to safeguard the virtual organization. Social actors are likened to “sensors” as they observe changes in a focal individual’s behavior during computer-mediated communications....
Show moreLanguage as a symbolic medium plays an important role in virtual communications. In a primarily linguistic environment such as cyberspace, words are an expressed form of intent and actions. This paper intends to investigate the functions of words and actions in identifying behavioral anomalies of social actors in order to safeguard the virtual organization. Social actors are likened to “sensors” as they observe changes in a focal individual’s behavior during computer-mediated communications. Based on social psychology theories and pragmatic views of words and actions in online communications, this paper theorizes a dyadic attribution model that helps make sense of anomalous behavior in creative online experiments. This model is then tested in an experiment. Findings show that observation of the behavioral differences between words and actions, based on either external or internal causality, can offer increased ability to detect the compromised trustworthiness of observed individuals – possibly leading to early detection of insider threat potential. The dyadic attribution model developed in this socio-technical study can function to detect behavioral anomalies in cyberspace, and protect the operations of a virtual organization.
Show less - Date Issued
- 2014-03-18
- Identifier
- FSU_libsubv1_scholarship_submission_1521649608_4198d818, 10.1002/asi.23074
- Format
- Citation
- Title
- Early Literacy in Library Storytimes: A Study of Measures of Effectiveness.
- Creator
-
Campana, Kathleen, Mills, J. Elizabeth, Capps, Janet L., Dresang, Eliza T., Carlyle, Allyson, Metoyer, Cheryl A., Urban, Ivette Bayo, Feldman, Erika N., Brouwer, Marin, Burnett,...
Show moreCampana, Kathleen, Mills, J. Elizabeth, Capps, Janet L., Dresang, Eliza T., Carlyle, Allyson, Metoyer, Cheryl A., Urban, Ivette Bayo, Feldman, Erika N., Brouwer, Marin, Burnett, Kathleen, Kotrla, Bowie
Show less - Abstract/Description
-
Across the nation, librarians work with caregivers and children to encourage engagement in their early literacy programs. However, these early literacy programs that libraries provide have been left mostly undocumented by research, especially through quantitative methods. Valuable Initiatives in Early Learning that Work Successfully (VIEWS2) was designed to test new ways to measure the effectiveness of these early literacy programs for young children (birth to kindergarten), leveraging a...
Show moreAcross the nation, librarians work with caregivers and children to encourage engagement in their early literacy programs. However, these early literacy programs that libraries provide have been left mostly undocumented by research, especially through quantitative methods. Valuable Initiatives in Early Learning that Work Successfully (VIEWS2) was designed to test new ways to measure the effectiveness of these early literacy programs for young children (birth to kindergarten), leveraging a mixed methods, quasi-experimental design. Using two innovative tools, researchers collected data at 120 public library storytimes in the first year of research, observing approximately 1,440 children ranging from birth to 60 months of age. Analysis of year-one data showed a correlation between the early literacy content of the storytime program and children's outcomes in terms of early literacy behaviors. These findings demonstrate that young children who attend public library storytimes are responding to the early literacy content in the storytime programs.
Show less - Date Issued
- 2016-10
- Identifier
- FSU_libsubv1_wos_000385655900001, 10.1086/688028
- Format
- Citation
- Title
- Early Literacy In Library Storytimes, Part 2: A Quasi-experimental Study And Intervention With Children's Storytime Providers.
- Creator
-
Mills, J. Elizabeth, Campana, Kathleen, Carlyle, Allyson, Kotrla, Bowie, Dresang, Eliza T., Urban, Ivette Bayo, Capps, Janet L., Metoyer, Cheryl, Feldman, Erika N., Brouwer,...
Show moreMills, J. Elizabeth, Campana, Kathleen, Carlyle, Allyson, Kotrla, Bowie, Dresang, Eliza T., Urban, Ivette Bayo, Capps, Janet L., Metoyer, Cheryl, Feldman, Erika N., Brouwer, Marin, Burnett, Kathleen
Show less - Abstract/Description
-
Within the peer-reviewed literature, there is a shortage of experimental and quasi-experimental studies examining libraries' impact on children's early literacy development. Therefore, Project VIEWS2 (Valuable Initiatives in Early Learning That Work Successfully 2) used a quasi-experimental design to understand whether an intervention to train public library storytime providers in early literacy principles makes a difference in children's early literacy skills. In the experimental group,...
Show moreWithin the peer-reviewed literature, there is a shortage of experimental and quasi-experimental studies examining libraries' impact on children's early literacy development. Therefore, Project VIEWS2 (Valuable Initiatives in Early Learning That Work Successfully 2) used a quasi-experimental design to understand whether an intervention to train public library storytime providers in early literacy principles makes a difference in children's early literacy skills. In the experimental group, comparisons of preintervention and postintervention data showed statistically significant increases in the early literacy behaviors of the providers and attendees in the experimental group. There were no significant changes in the early literacy behaviors of control group providers and their attendees. A purposeful focus on early literacy principles makes a difference in storytime programs and in early literacy behaviors when children attend storytime. This article examines the design and delivery of the intervention, its effects on the study population, and its implications for practice.
Show less - Date Issued
- 2018-04
- Identifier
- FSU_libsubv1_wos_000427166800005
- Format
- Citation
- Title
- Enriching Consumer Health Vocabulary Through Mining A Social Q&a Site: A Similarity-based Approach.
- Creator
-
He, Zhe, Chen, Zhiwei, Oh, Sanghee, Hou, Jinghui, Bian, Jiang
- Abstract/Description
-
The widely known vocabulary gap between health consumers and healthcare professionals hinders information seeking and health dialogue of consumers on end-user health applications. The Open Access and Collaborative Consumer Health Vocabulary (OAC CHV), which contains health-related terms used by lay consumers, has been created to bridge such a gap. Specifically, the OAC CHV facilitates consumers' health information retrieval by enabling consumer-facing health applications to translate between...
Show moreThe widely known vocabulary gap between health consumers and healthcare professionals hinders information seeking and health dialogue of consumers on end-user health applications. The Open Access and Collaborative Consumer Health Vocabulary (OAC CHV), which contains health-related terms used by lay consumers, has been created to bridge such a gap. Specifically, the OAC CHV facilitates consumers' health information retrieval by enabling consumer-facing health applications to translate between professional language and consumer friendly language. To keep up with the constantly evolving medical knowledge and language use, new terms need to be identified and added to the OAC CHV. User-generated content on social media, including social question and answer (social Q&A) sites, afford us an enormous opportunity in mining consumer health terms. Existing methods of identifying new consumer terms from text typically use ad-hoc lexical syntactic patterns and human review. Our study extends an existing method by extracting n-grams from a social Q&A textual corpus and representing them with a rich set of contextual and syntactic features. Using K-means clustering, our method, simiTerm, was able to identify terms that are both contextually and syntactically similar to the existing OAC CHV terms. We tested our method on social Q&A corpora on two disease domains: diabetes and cancer. Our method outperformed three baseline ranking methods. A post-hoc qualitative evaluation by human experts further validated that our method can effectively identify meaningful new consumer terms on social Q&A. (C) 2017 Elsevier Inc. All rights reserved.
Show less - Date Issued
- 2017-05
- Identifier
- FSU_libsubv1_wos_000409395900008, 10.1016/j.jbi.2017.03.016
- Format
- Thesis
- Title
- Ethical Dilemma: Deception Dynamics in Computer-Mediated Group Communication.
- Creator
-
Ho, Shuyuan Mary, Hancock, Jeffrey T., Booth, Cheryl
- Abstract/Description
-
Words symbolically represent communicative and behavioral intent, and can provide clues to a communicator’s future actions in online communication. This paper describes a sociotechnical study conducted from 2008 through 2015 to identify deceptive communicative intent within group context as manifested in language-action cues. Specifically, this study used an online team-based game that simulates real-world deceptive insider scenarios to examine several dimensions of group communication. First...
Show moreWords symbolically represent communicative and behavioral intent, and can provide clues to a communicator’s future actions in online communication. This paper describes a sociotechnical study conducted from 2008 through 2015 to identify deceptive communicative intent within group context as manifested in language-action cues. Specifically, this study used an online team-based game that simulates real-world deceptive insider scenarios to examine several dimensions of group communication. First, we studied how language-action cues differ between groups with and groups without a compromised actor. We also examine how these cues differ within groups in terms of the group members’ individual and collective interactions with the compromised actor. Finally, we look at how the cues of compromised actors differ from those of non-compromised actors, and how communication behavior changes after an actor is presented with an ethical dilemma. The results of the study further our understanding of language-action cues as indicators for unmasking a potential deceptive insider.
Show less - Date Issued
- 2017-09-17
- Identifier
- FSU_libsubv1_scholarship_submission_1521644031_1e9167f9, 10.1002/asi.23849
- Format
- Citation
- Title
- Evaluating Semantic Relations In Neural Word Embeddings With Biomedical And General Domain Knowledge Bases.
- Creator
-
Chen, Zhiwei, He, Zhe, Liu, Xiuwen, Bian, Jiang
- Abstract/Description
-
Background: In the past few years, neural word embeddings have been widely used in text mining. However, the vector representations of word embeddings mostly act as a black box in downstream applications using them, thereby limiting their interpretability. Even though word embeddings are able to capture semantic regularities in free text documents, it is not clear how different kinds of semantic relations are represented by word embeddings and how semantically-related terms can be retrieved...
Show moreBackground: In the past few years, neural word embeddings have been widely used in text mining. However, the vector representations of word embeddings mostly act as a black box in downstream applications using them, thereby limiting their interpretability. Even though word embeddings are able to capture semantic regularities in free text documents, it is not clear how different kinds of semantic relations are represented by word embeddings and how semantically-related terms can be retrieved from word embeddings. Methods: To improve the transparency of word embeddings and the interpretability of the applications using them, in this study, we propose a novel approach for evaluating the semantic relations in word embeddings using external knowledge bases: Wikipedia, WordNet and Unified Medical Language System (UMLS). We trained multiple word embeddings using health-related articles in Wikipedia and then evaluated their performance in the analogy and semantic relation term retrieval tasks. We also assessed if the evaluation results depend on the domain of the textual corpora by comparing the embeddings of health-related Wikipedia articles with those of general Wikipedia articles. Results: Regarding the retrieval of semantic relations, we were able to retrieve semanti. Meanwhile, the two popular word embedding approaches, Word2vec and GloVe, obtained comparable results on both the analogy retrieval task and the semantic relation retrieval task, while dependency-based word embeddings had much worse performance in both tasks. We also found that the word embeddings trained with health-related Wikipedia articles obtained better performance in the health-related relation retrieval tasks than those trained with general Wikipedia articles. Conclusion: It is evident from this study that word embeddings can group terms with diverse semantic relations together. The domain of the training corpus does have impact on the semantic relations represented by word embeddings. We thus recommend using domain-specific corpus to train word embeddings for domain-specific text mining tasks.
Show less - Date Issued
- 2018-07-23
- Identifier
- FSU_libsubv1_wos_000439486300007, 10.1186/s12911-018-0630-x
- Format
- Citation
- Title
- Evaluating semantic relations in neural word embeddings with biomedical and general domain knowledge bases.
- Creator
-
Chen, Zhiwei, He, Zhe, Liu, Xiuwen, Bian, Jiang
- Abstract/Description
-
In the past few years, neural word embeddings have been widely used in text mining. However, the vector representations of word embeddings mostly act as a black box in downstream applications using them, thereby limiting their interpretability. Even though word embeddings are able to capture semantic regularities in free text documents, it is not clear how different kinds of semantic relations are represented by word embeddings and how semantically-related terms can be retrieved from word...
Show moreIn the past few years, neural word embeddings have been widely used in text mining. However, the vector representations of word embeddings mostly act as a black box in downstream applications using them, thereby limiting their interpretability. Even though word embeddings are able to capture semantic regularities in free text documents, it is not clear how different kinds of semantic relations are represented by word embeddings and how semantically-related terms can be retrieved from word embeddings. To improve the transparency of word embeddings and the interpretability of the applications using them, in this study, we propose a novel approach for evaluating the semantic relations in word embeddings using external knowledge bases: Wikipedia, WordNet and Unified Medical Language System (UMLS). We trained multiple word embeddings using health-related articles in Wikipedia and then evaluated their performance in the analogy and semantic relation term retrieval tasks. We also assessed if the evaluation results depend on the domain of the textual corpora by comparing the embeddings of health-related Wikipedia articles with those of general Wikipedia articles. Regarding the retrieval of semantic relations, we were able to retrieve diverse semantic relations in the nearest neighbors of a given word. Meanwhile, the two popular word embedding approaches, Word2vec and GloVe, obtained comparable results on both the analogy retrieval task and the semantic relation retrieval task, while dependency-based word embeddings had much worse performance in both tasks. We also found that the word embeddings trained with health-related Wikipedia articles obtained better performance in the health-related relation retrieval tasks than those trained with general Wikipedia articles. It is evident from this study that word embeddings can group terms with diverse semantic relations together. The domain of the training corpus does have impact on the semantic relations represented by word embeddings. We thus recommend using domain-specific corpus to train word embeddings for domain-specific text mining tasks.
Show less - Date Issued
- 2018-07-23
- Identifier
- FSU_pmch_30066651, 10.1186/s12911-018-0630-x, PMC6069806, 30066651, 30066651, 10.1186/s12911-018-0630-x
- Format
- Citation
- Title
- Examining Healthcare Utilization Patterns of Elderly Middle-Aged Adults in the United States.
- Creator
-
Zayas, Cilia E, He, Zhe, Yuan, Jiawei, Maldonado-Molina, Mildred, Hogan, William, Modave, François, Guo, Yi, Bian, Jiang
- Abstract/Description
-
Elderly patients, aged 65 or older, make up 13.5% of the U.S. population, but represent 45.2% of the top 10% of healthcare utilizers, in terms of expenditures. Middle-aged Americans, aged 45 to 64 make up another 37.0% of that category. Given the high demand for healthcare services by the aforementioned population, it is important to identify high-cost users of healthcare systems and, more importantly, ineffective utilization patterns to highlight where targeted interventions could be placed...
Show moreElderly patients, aged 65 or older, make up 13.5% of the U.S. population, but represent 45.2% of the top 10% of healthcare utilizers, in terms of expenditures. Middle-aged Americans, aged 45 to 64 make up another 37.0% of that category. Given the high demand for healthcare services by the aforementioned population, it is important to identify high-cost users of healthcare systems and, more importantly, ineffective utilization patterns to highlight where targeted interventions could be placed to improve care delivery. In this work, we present a novel multi-level framework applying machine learning (ML) methods (i.e., random forest regression and hierarchical clustering) to group patients with similar utilization profiles into clusters. We use a vector space model to characterize a patient's utilization profile as the number of visits to different care providers and prescribed medications. We applied the proposed methods using the 2013 Medical Expenditures Panel Survey (MEPS) dataset. We identified clusters of healthcare utilization patterns of elderly and middle-aged adults in the United States, and assessed the general and clinical characteristics associated with these utilization patterns. Our results demonstrate the effectiveness of the proposed framework to model healthcare utilization patterns. Understanding of these patterns can be used to guide healthcare policy-making and practice.
Show less - Date Issued
- 2016-05-01
- Identifier
- FSU_pmch_27430035, PMC4946167, 27430035, 27430035
- Format
- Citation
- Title
- Examining Undergraduate Students' Priorities For Academic Library Services And Social Media Communication.
- Creator
-
Stvilia, Besiki, Gibradze, Leila
- Abstract/Description
-
Academic libraries can effectively plan and market their services by identifying the value users perceive in their services and in their social media communications about those services. This study reports on findings of a survey of 104 undergraduate students in information technology courses at a large research university. Results of an ordered logistic regression analysis indicated that students considered access to information and computer resources and study support services as the most...
Show moreAcademic libraries can effectively plan and market their services by identifying the value users perceive in their services and in their social media communications about those services. This study reports on findings of a survey of 104 undergraduate students in information technology courses at a large research university. Results of an ordered logistic regression analysis indicated that students considered access to information and computer resources and study support services as the most important library services offered. Likewise, students perceived library social media postings related to operations updates, study support services, and events as the most useful. Future related research will investigate the needs and priorities for library services of other key user populations of academic libraries, such as graduate students and online students, to assemble service repertoires that are tailored to individual user groups. In addition, future research will examine whether and how libraries can use the analysis of users' engagement with a library's social media postings to inexpensively gauge the value they perceive in library services. (C) 2017 Elsevier Inc. All rights reserved.
Show less - Date Issued
- 2017-05
- Identifier
- FSU_libsubv1_wos_000403854600013, 10.1016/j.acalib.2017.02.013
- Format
- Citation
- Title
- An Exploration of Teacher and Librarian Collaboration in the Context of Professional Preparation.
- Creator
-
Gross, Melissa, Witte, Shelbie
- Abstract/Description
-
Research has shown that collaboration between teachers and librarians has a positive effect on student learning, but can be difficult to achieve. In order to explore the incorporation of teacher and librarian collaboration into preservice education, two master’s level classes studying young adult literature, one in teacher education and one in library and information studies (LIS), were given an assignment that required them to work together to complete a week’s worth of lesson plans for a...
Show moreResearch has shown that collaboration between teachers and librarians has a positive effect on student learning, but can be difficult to achieve. In order to explore the incorporation of teacher and librarian collaboration into preservice education, two master’s level classes studying young adult literature, one in teacher education and one in library and information studies (LIS), were given an assignment that required them to work together to complete a week’s worth of lesson plans for a high school English class based on a commonly read novel. Student responses demonstrate limiting and enabling factors that affect integrating collaboration into professional preparation.
Show less - Date Issued
- 2016
- Identifier
- FSU_libsubv1_scholarship_submission_1475243595, 10.1080/13614541.2016.1223935
- Format
- Citation
- Title
- Exploring digital divides: An examination of eHealth technology use in health information seeking, communication and personal health information management in the USA.
- Creator
-
Lustria, Mia, Smith, Scott, Hinnant, Charles
- Abstract/Description
-
Recent government initiatives to deploy health information technology in the USA, coupled with a growing body of scholarly evidence linking online heath information and positive health-related behaviors, indicate a widespread belief that access to health information and health information technologies can help reduce healthcare inequalities. However, it is less clear whether the benefits of greater access to online health information and health information technologies is equitably...
Show moreRecent government initiatives to deploy health information technology in the USA, coupled with a growing body of scholarly evidence linking online heath information and positive health-related behaviors, indicate a widespread belief that access to health information and health information technologies can help reduce healthcare inequalities. However, it is less clear whether the benefits of greater access to online health information and health information technologies is equitably distributed across population groups, particularly to those who are underserved. To examine this issue, this article employs the 2007 Health Information National Trends Survey (HINTS) to investigate relationships between a variety of socio-economic variables and the use of the web-based technologies for health information seeking, personal health information management and patient-provider communication within the context of the USA. This study reveals interesting patterns in technology adoption, some of which are in line with previous studies, while others are less clear. Whether these patterns indicate early evidence of a narrowing divide in eHealth technology use across population groups as a result of the narrowing divide in Internet access and computer ownership warrants further exploration. In particular, the findings emphasize the need to explore differences in the use of eHealth tools by medically underserved and disadvantaged groups. In so doing, it will be important to explore other psychosocial variables, such as health literacy, that may be better predictors of health consumers' eHealth technology adoption.
Show less - Date Issued
- 2011
- Identifier
- FSU_migr_slis_faculty_publications-0023, 10.1177/1460458211414843
- Format
- Citation
- Title
- Exploring Twitter use and services of academic innovation centers.
- Creator
-
Stvilia, B., Gibradze, L.
- Abstract/Description
-
This study examined the Twitter streams and websites of 36 university innovation centers and identified 14 service categories the centers offered. Exploring the present Twitter use practices of innovation centers and the services the centers provide can inform the design and planning of service offerings at new innovation centers and support training for center staff in the use of this social media platform. In addition, existing innovation centers can benchmark their service offerings...
Show moreThis study examined the Twitter streams and websites of 36 university innovation centers and identified 14 service categories the centers offered. Exploring the present Twitter use practices of innovation centers and the services the centers provide can inform the design and planning of service offerings at new innovation centers and support training for center staff in the use of this social media platform. In addition, existing innovation centers can benchmark their service offerings against those services. Furthermore, mapping the services the innovation centers offer to the activities in an innovation workflow model can help center managers optimize the information architecture of their websites and resource guides. In this way, students can easily be informed about the help and resources available for each activity or phase of the innovation process. A comparison of the tweet categories identified in the present study with those of academic libraries assembled in a previous study revealed significant overlap, but some differences as well. In contrast to the Twitter accounts of academic libraries, the Twitter accounts of innovation centers did not tweet about their information services even if they offered them. Innovation centers also did not use Twitter to provide Q&A services to their users. Furthermore, innovation centers tweeted not only about the technological resources they provided, but also about the human resources they recruited to serve as student mentors and advisors. Finally, technology use was more mediated in innovation centers than in libraries, and some centers offered their users fee-based assistance from professionals with their 3D design and printing tasks.
Show less - Date Issued
- 2019-08-02
- Identifier
- FSU_libsubv1_scholarship_submission_1564755944_4516dae0, 10.1016/j.acalib.2019.1020
- Format
- Citation
- Title
- Exploring Twitter Use And Services Of Academic Innovation Centers.
- Creator
-
Stvilia, Besiki, Gibradze, Leila
- Abstract/Description
-
This study examined the Twitter streams and websites of 36 university innovation centers and identified 14 service categories the centers offered. Exploring the present Twitter use practices of innovation centers and the services the centers provide can inform the design and planning of service offerings at new innovation centers and support training for center staff in the use of this social media platform. In addition, existing innovation centers can benchmark their service offerings...
Show moreThis study examined the Twitter streams and websites of 36 university innovation centers and identified 14 service categories the centers offered. Exploring the present Twitter use practices of innovation centers and the services the centers provide can inform the design and planning of service offerings at new innovation centers and support training for center staff in the use of this social media platform. In addition, existing innovation centers can benchmark their service offerings against those services. Furthermore, mapping the services the innovation centers offer to the activities in an innovation workflow model can help center managers optimize the information architecture of their websites and resource guides. In this way, students can easily be informed about the help and resources available for each activity or phase of the innovation process. A comparison of the tweet categories identified in the present study with those of academic libraries assembled in a previous study revealed significant overlap, but some differences as well. In contrast to the Twitter accounts of academic libraries, the Twitter accounts of innovation centers did not tweet about their information services even if they offered them. Innovation centers also did not use Twitter to provide Q&A services to their users. Furthermore, innovation centers tweeted not only about the technological resources they provided, but also about the human resources they recruited to serve as student mentors and advisors. Finally, technology use was more mediated in innovation centers than in libraries, and some centers offered their users fee-based assistance from professionals with their 3D design and printing tasks.
Show less - Date Issued
- Sun Sep 01 00:00:00 ED
- Identifier
- FSU_libsubv1_wos_000487769400010, 10.1016/j.acalib.2019.102052
- Format
- Citation
- Title
- Facebooking It: Promoting Library Services to Young Adults through Social Media.
- Creator
-
Phillips, Abigail L.
- Abstract/Description
-
With social media a normal part of the daily lives of young adults, librarians are using these sites to promote library services. This article investigates the perceptions and attitudes of librarians toward social media as a tool for libraries and explores the way librarians utilize social media to portray professional roles and responsibilities to young patrons. This author focuses on the pastoral role of librarians and discusses possibilities for performing this role through social media....
Show moreWith social media a normal part of the daily lives of young adults, librarians are using these sites to promote library services. This article investigates the perceptions and attitudes of librarians toward social media as a tool for libraries and explores the way librarians utilize social media to portray professional roles and responsibilities to young patrons. This author focuses on the pastoral role of librarians and discusses possibilities for performing this role through social media. Although presently under-researched, social media provides librarians with one more avenue to advocate for, engage with, and support young adults.
Show less - Date Issued
- 2015
- Identifier
- FSU_migr_slis_faculty_publications-0028, 10.1080/01616846.2015.1036710
- Format
- Citation
- Title
- Following the Breadcrumbs: Timestamp Pattern Identification for Cloud Forensics.
- Creator
-
Ho, Shuyuan Mary, Kao, Dayu, Wu, Wen-Ying
- Abstract/Description
-
This study explores the challenges of digital forensics investigation in file access, transfer and operations, and identifies file operational and behavioral patterns based on timestamps—in both the standalone as well as interactions between Windows NTFS and Ubuntu Ext4 filesystems. File-based metadata is observed, and timestamps across different cloud access behavioral patterns are compared and validated. As critical metadata information cannot be easily observed, a rigorous iterative...
Show moreThis study explores the challenges of digital forensics investigation in file access, transfer and operations, and identifies file operational and behavioral patterns based on timestamps—in both the standalone as well as interactions between Windows NTFS and Ubuntu Ext4 filesystems. File-based metadata is observed, and timestamps across different cloud access behavioral patterns are compared and validated. As critical metadata information cannot be easily observed, a rigorous iterative approach was implemented to extract hidden, critical file attributes and timestamps. Direct observation and cross-sectional analysis were adopted to analyze timestamps, and to differentiate between patterns based on different types of cloud access operations. Fundamental observation rules and characteristics of file interaction in the cloud environment are derived as behavioral patterns for cloud operations.10.1016 This study contributes to cloud forensics investigation of data breach incidents where the crime clues, characteristics and evidence of the incidents are collected, identified and analyzed. The results demonstrate the effectiveness of pattern identification for digital forensics across various types of cloud access operations.
Show less - Date Issued
- 2018-01-31
- Identifier
- FSU_libsubv1_scholarship_submission_1521647723_b62ba381, 10.1016/j.diin.2017.12.001
- Format
- Citation
- Title
- A framework for researcher participation in research information management systems.
- Creator
-
Stvilia, B., Wu, Shuheng, Lee, Dong Joon
- Abstract/Description
-
Ensuring the quality of information is a critical ethical issue for any information system. Research Information Management Systems (RIMSs) need to engage researchers in sharing research information and knowledge, and ensuring its quality. This paper introduces a theoretical framework for researcher participation in RIMSs. The framework is grounded in empirical research and can guide the design of RIMSs by defining typologies of researcher activities in RIMSs, related motivations, levels of...
Show moreEnsuring the quality of information is a critical ethical issue for any information system. Research Information Management Systems (RIMSs) need to engage researchers in sharing research information and knowledge, and ensuring its quality. This paper introduces a theoretical framework for researcher participation in RIMSs. The framework is grounded in empirical research and can guide the design of RIMSs by defining typologies of researcher activities in RIMSs, related motivations, levels of participation, and metadata profiles. In addition, the framework defines discipline- and seniority-specific priorities for the researcher’s activities and motivations. RIMS managers and scholarly communications librarians can use the framework to assemble RIMS service and metadata profiles that are tailored to the researcher’s context. Likewise, the framework can guide the construction of communication messages personalized to the researcher’s priorities and her or his motivations for engaging in a specific activity, which will enhance the researcher’s engagement with the RIMS.
Show less - Date Issued
- 2019
- Identifier
- FSU_libsubv1_scholarship_submission_1552393970_b0c9b999, 10.1016/j.acalib.2019.02.014
- Format
- Citation
- Title
- From District to Desktop: Making the Most of Broadband in Florida Schools.
- Creator
-
Everhart, Nancy, Mardis, Marcia A., Johnston, Melissa, Smith, Daniella
- Abstract/Description
-
For Americans to engage in a global information society, it is critical that they have access to high-speed, high-bandwidth Internet, meaning broadband. Network connectivity opens up a wealth of possibilities to K-12 educators. While it has the potential to result in fundamental changes in teaching methods, it can definitely be used to enhance already effective teaching methods. However, schools must have confidence in their network infrastructure before network connectivity will be...
Show moreFor Americans to engage in a global information society, it is critical that they have access to high-speed, high-bandwidth Internet, meaning broadband. Network connectivity opens up a wealth of possibilities to K-12 educators. While it has the potential to result in fundamental changes in teaching methods, it can definitely be used to enhance already effective teaching methods. However, schools must have confidence in their network infrastructure before network connectivity will be integrated into the classroom. Networks must be reliable and quick; and, if they do not function, as expected and technical support is not readily available, then educators will not use them. Schools face challenges to the integration of broadband in teaching and learning in the areas of access, skills, policy, and motivation. Last mile support is essential and all stakeholders must work together to address the main issues facing the improvement of broadband in schools. A solution to these situations is on-site support to streamline and enable effective use of broadband-enabled technology. For most schools, the school librarian, in their roles as school leaders, can expertly direct this "last mile" implementation by providing the technology coordination, support, and leadership necessary to address access issues from desktop to district.
Show less - Date Issued
- 2009
- Identifier
- FSU_migr_slis_faculty_publications-0010
- Format
- Citation
- Title
- From Paper to Pixel: Digital Textbooks and Florida's Schools.
- Creator
-
Mardis, Marcia A., Everhart, Nancy, Smith, Daniella, Newsum, Janice, Baker, Sheila
- Abstract/Description
-
Digital textbooks will soon be part of every classroom in the United States. This trend accompanies an imperative for schools to facilitate 21st century learning in which educators prepare students to learn and live productively in a global society where accurate and current information is a meaningful part of everyday learning. As technology and the Internet have gained presence in classrooms, instructional materials and activities have become digitally rich. The use of digital textbooks is...
Show moreDigital textbooks will soon be part of every classroom in the United States. This trend accompanies an imperative for schools to facilitate 21st century learning in which educators prepare students to learn and live productively in a global society where accurate and current information is a meaningful part of everyday learning. As technology and the Internet have gained presence in classrooms, instructional materials and activities have become digitally rich. The use of digital textbooks is rapidly gaining ground in education. While colleges and universities have moved headlong into digital textbooks as a means to reduce costs for students, K-12 education is venturing cautiously, but steadily, into using digital textbooks. State laws, many of which have been rewritten to include digital content as an acceptable use of state textbook funding, will serve as catalysts that spur the transition to digital textbooks School librarians can provide school-wide leadership to assist students, teachers, and parent concerns when transitioning to digital textbooks. Working in collaboration with teachers, school librarians promote comprehension through questioning, clarifying, seeking meaning, and discussion. Digital textbooks may represent a way to continue advocacy for the importance of reading as well as for the school librarian's leadership role in technology integration.
Show less - Date Issued
- 2010
- Identifier
- FSU_migr_slis_faculty_publications-0011
- Format
- Citation
- Title
- Gender Deception in Asynchronous Online Communication: A Path Analysis.
- Creator
-
Ho, Shuyuan Mary, Lowry, Paul Benjamin, Warkentin, Merrill, Yang, Yanyun, Hollister, Jonathan M.
- Abstract/Description
-
Gender is a salient feature of identity that is rarely questioned in our physical encounters. We are usually not confused about a person’s gender—generally it’s male or female. However, as the adoption of computer-mediated communication increases, our social reliance on these technologies has made gender easily disguised online. And yet, the phenomenon of gender deception has not been fully investigated. This study adopts a path analysis to examine interconnected cognitive factors that impact...
Show moreGender is a salient feature of identity that is rarely questioned in our physical encounters. We are usually not confused about a person’s gender—generally it’s male or female. However, as the adoption of computer-mediated communication increases, our social reliance on these technologies has made gender easily disguised online. And yet, the phenomenon of gender deception has not been fully investigated. This study adopts a path analysis to examine interconnected cognitive factors that impact online users’ ability to deceive—and detect deception—regarding gender. An asynchronous online game was developed to simulate situations where males were incentivized to communicate like females, and females were incentivized to communicate like males. Twelve hypotheses were tested using path analysis, which resulted in our realization that an actor’s true gender can affect the motivation to deceive; males tend to have higher self-efficacy beliefs in gender deception, and females tend to have a higher success rate in detecting gender deception. Our research suggests that the gender of the message recipient could be a significant factor in uncovering gender deception.
Show less - Date Issued
- 2017-01-01
- Identifier
- FSU_libsubv1_scholarship_submission_1521645713_a4da1cf6, 10.1016/j.ipm.2016.06.004
- Format
- Citation
- Title
- Information Use Environments of African-American Dementia Caregivers Over the Course of Cognitive-Behavioral Therapy for Depression.
- Creator
-
Kazmer, Michelle M., Glueckauf, Robert L., Ma, Jinxuan, Burnett, Kathleen
- Abstract/Description
-
Caregivers of older adults with dementia face significant challenges associated with their care recipients' condition and with their own mental and physical well-being. Qualitative research data were collected via interviews with caregivers who participated in the African-American Alzheimer's Caregiver Training and Support (ACTS) research project. Analysis of these data with a focus on information use indicated that participating caregivers' information use environments were shaped by key...
Show moreCaregivers of older adults with dementia face significant challenges associated with their care recipients' condition and with their own mental and physical well-being. Qualitative research data were collected via interviews with caregivers who participated in the African-American Alzheimer's Caregiver Training and Support (ACTS) research project. Analysis of these data with a focus on information use indicated that participating caregivers' information use environments were shaped by key individuals, settings, and information sources. These included the ACTS counselors, ACTS intervention guidebook, fellow caregivers, use of a personal calendar/datebook, and the identification of key problems and development of goals to help ameliorate those problems. CBT groups fostered sharing, synthesizing, and validating information about dementia caregiving and dementia care resources; the ACTS CBT guidebook served as an important physical touchstone of reliable and portable information. Understanding the specific needs, behaviors, and constraints of African-American caregivers is important to the future development of information components of tailored, depression-reduction interventions.
Show less - Date Issued
- 2013
- Identifier
- FSU_migr_slis_faculty_publications-0016, 10.1016/j.lisr.2013.02.003
- Format
- Citation
- Title
- Instructional Preferences of First-Year College Students with Below-proficient Information Literacy Skills: A Focus Group Study.
- Creator
-
Latham, Don, Gross, Melissa
- Abstract/Description
-
The Attaining Information Literacy Project has focused on identifying first-year college students with below-proficient information literacy skills, gaining an understanding of those students' self-views and perceptions of information literacy, gaining an understanding of their instructional experiences and preferences, and developing an intervention that will address their instructional needs. Focus groups were conducted with students with below-proficient skills to determine their...
Show moreThe Attaining Information Literacy Project has focused on identifying first-year college students with below-proficient information literacy skills, gaining an understanding of those students' self-views and perceptions of information literacy, gaining an understanding of their instructional experiences and preferences, and developing an intervention that will address their instructional needs. Focus groups were conducted with students with below-proficient skills to determine their instructional preferences. The findings from the focus groups indicate that students place a high value on personal relevance in the knowledge and skills they are learning, and they prefer a combination of demonstration and hands-on activities, interaction with the instructor and other students, and the availability of supplemental instructional materials in the form of handouts. In addition, they feel that incentives to participate in instruction are crucial and that a number of communication strategies are needed to advertise effectively the availability of instructional sessions.
Show less - Date Issued
- 2013
- Identifier
- FSU_migr_slis_faculty_publications-0016X
- Format
- Citation
- Title
- Introduction: Selected Extended Articles From The 2nd International Workshop On Semantics-powered Data Analytics (sepda 2017).
- Creator
-
He, Zhe, Tao, Cui, Bian, Jiang, Zhang, Rui, Huang, Jingshan
- Abstract/Description
-
In this editorial, we first summarize the 2nd International Workshop on Semantics-Powered Data Analytics (SEPDA 2017) held on November 13, 2017 in Kansas City, Missouri, U.S.A., and then briefly introduce 13 research articles included in this supplement issue, covering topics such as Semantic Integration, Deep Learning, Knowledge Base Construction, and Natural Language Processing.
- Date Issued
- 2018-07-23
- Identifier
- FSU_libsubv1_wos_000439486300001, 10.1186/s12911-018-0624-8
- Format
- Citation
- Title
- Introduction: selected extended articles from the 2nd International Workshop on Semantics-Powered Data Analytics (SEPDA 2017)..
- Creator
-
He, Zhe, Tao, Cui, Bian, Jiang, Zhang, Rui, Huang, Jingshan
- Abstract/Description
-
In this editorial, we first summarize the 2nd International Workshop on Semantics-Powered Data Analytics (SEPDA 2017) held on November 13, 2017 in Kansas City, Missouri, U.S.A., and then briefly introduce 13 research articles included in this supplement issue, covering topics such as Semantic Integration, Deep Learning, Knowledge Base Construction, and Natural Language Processing.
- Date Issued
- 2018-07-23
- Identifier
- FSU_pmch_30066636, 10.1186/s12911-018-0624-8, PMC6069756, 30066636, 30066636, 10.1186/s12911-018-0624-8
- Format
- Citation
- Title
- Leader's Dilemma Game: An Experimental Design for Cyber Insider Threat Research.
- Creator
-
Ho, Shuyuan Mary, Warkentin, Merrill
- Abstract/Description
-
One of the problems with insider threat research is the lack of a complete 360° view of an insider threat dataset due to inadequate experimental design. This has prevented us from modeling a computational system to protect against insider threat situations. This paper provides a contemporary methodological approach for using online games to simulate insider betrayal for predictive behavioral research. The Leader’s Dilemma Game simulates an insider betrayal scenario for analyzing...
Show moreOne of the problems with insider threat research is the lack of a complete 360° view of an insider threat dataset due to inadequate experimental design. This has prevented us from modeling a computational system to protect against insider threat situations. This paper provides a contemporary methodological approach for using online games to simulate insider betrayal for predictive behavioral research. The Leader’s Dilemma Game simulates an insider betrayal scenario for analyzing organizational trust relationships, providing an opportunity to examine the trustworthiness of focal individuals, as measured through humans as sensors engaging in computer-mediated communication. This experimental design provides a window into trustworthiness attribution that can generate a rigorous and relevant behavioral dataset, and contributes to building a cyber laboratory that advances future insider threat study.
Show less - Date Issued
- 2015-10-21
- Identifier
- FSU_libsubv1_scholarship_submission_1521643103_f381a99b, 10.1007/s10796-015-9599-5
- Format
- Citation
- Title
- Library Influence on Museum Information Work.
- Creator
-
Urban, Richard
- Abstract/Description
-
Contemporary literature on the divergence of libraries, archives, and museums over the course of the twentieth century credits the rise of distinct professional practices required to handle different physical forms. This paper explores the extent that librarianship influenced museum information practices in a pre-digital era. Instead of divergence, I find examples where museums adapted library methods to fit their needs instead of developing their own set of professional practices. Because...
Show moreContemporary literature on the divergence of libraries, archives, and museums over the course of the twentieth century credits the rise of distinct professional practices required to handle different physical forms. This paper explores the extent that librarianship influenced museum information practices in a pre-digital era. Instead of divergence, I find examples where museums adapted library methods to fit their needs instead of developing their own set of professional practices. Because museum professionalization placed an emphasis on discipline-based university training, information work in museums has been incorporated into non-university technical education and on-the-job training programs. That this divergence of information work from academic preparation has fallen along gender lines requires additional attention.
Show less - Date Issued
- 2014
- Identifier
- FSU_migr_slis_faculty_publications-0019, 10.1353/lib.2014.0005
- Format
- Citation
- Title
- A Meta-Analysis of Web-Delivered, Tailored Health Behavior Change Interventions.
- Creator
-
Lustria, Mia, Noar, Seth M., Cortese, Juliann, Van Stee, Stephanie, Glueckauf, Robert L., Lee, Junga
- Abstract/Description
-
Background: Web-based, tailored intervention programs show considerable promise in effecting health-promoting behaviors and improving health outcomes across a variety of medical conditions and patient populations. Purpose: This meta-analysis compares the effects of tailored versus non-tailored, web-based interventions on health behaviors, and explores the influence of key moderators on treatment outcomes. Methods: Forty experimental and quasi-experimental studies (N = 20,180) met criteria for...
Show moreBackground: Web-based, tailored intervention programs show considerable promise in effecting health-promoting behaviors and improving health outcomes across a variety of medical conditions and patient populations. Purpose: This meta-analysis compares the effects of tailored versus non-tailored, web-based interventions on health behaviors, and explores the influence of key moderators on treatment outcomes. Methods: Forty experimental and quasi-experimental studies (N = 20,180) met criteria for inclusion and were analyzed using meta-analytic procedures. Results: The findings indicated that web- based, tailored interventions effected significantly greater improvement in health outcomes as compared to control conditions both at post-testing, d = .139 (95% CI = .111, .166, p<.001, k = 40) and at follow-up, d = .158 (95% CI = .124, .192, p<.001, k = 21). No evidence of publication bias was found. Conclusions: These results provided further support for the differential benefits of tailored web-based interventions over non-tailored approaches. Analysis of participant/descriptive, intervention, and methodological moderators shed some light on factors that may be important to the success of tailored interventions. Implications of these findings and directions for future research are discussed.
Show less - Date Issued
- 2013
- Identifier
- FSU_migr_slis_faculty_publications-0013, 10.1080/10810730.2013.768727
- Format
- Citation
- Title
- Mining Twitter To Assess The Public Perception Of The "internet Of Things".
- Creator
-
Bian, Jiang, Yoshigoe, Kenji, Hicks, Amanda, Yuan, Jiawei, He, Zhe, Xie, Mengjun, Guo, Yi, Prosperi, Mattia, Salloum, Ramzi, Modave, Francois
- Abstract/Description
-
Social media analysis has shown tremendous potential to understand public's opinion on a wide variety of topics. In this paper, we have mined Twitter to understand the public's perception of the Internet of Things (IoT). We first generated the discussion trends of the IoT from multiple Twitter data sources and validated these trends with Google Trends. We then performed sentiment analysis to gain insights of the public's attitude towards the IoT. As anticipated, our analysis indicates that...
Show moreSocial media analysis has shown tremendous potential to understand public's opinion on a wide variety of topics. In this paper, we have mined Twitter to understand the public's perception of the Internet of Things (IoT). We first generated the discussion trends of the IoT from multiple Twitter data sources and validated these trends with Google Trends. We then performed sentiment analysis to gain insights of the public's attitude towards the IoT. As anticipated, our analysis indicates that the public's perception of the IoT is predominantly positive. Further, through topic modeling, we learned that public tweets discussing the IoT were often focused on business and technology. However, the public has great concerns about privacy and security issues toward the IoT based on the frequent appearance of related terms. Nevertheless, no unexpected perceptions were identified through our analysis. Our analysis was challenged by the limited fraction of tweets relevant to our study. Also, the user demographics of Twitter users may not be strongly representative of the population of the general public.
Show less - Date Issued
- 2016-07-08
- Identifier
- FSU_libsubv1_wos_000380005400060, 10.1371/journal.pone.0158450
- Format
- Citation
- Title
- Mining Twitter to Assess the Public Perception of the "Internet of Things".
- Creator
-
Bian, Jiang, Yoshigoe, Kenji, Hicks, Amanda, Yuan, Jiawei, He, Zhe, Xie, Mengjun, Guo, Yi, Prosperi, Mattia, Salloum, Ramzi, Modave, François
- Abstract/Description
-
Social media analysis has shown tremendous potential to understand public's opinion on a wide variety of topics. In this paper, we have mined Twitter to understand the public's perception of the Internet of Things (IoT). We first generated the discussion trends of the IoT from multiple Twitter data sources and validated these trends with Google Trends. We then performed sentiment analysis to gain insights of the public's attitude towards the IoT. As anticipated, our analysis indicates that...
Show moreSocial media analysis has shown tremendous potential to understand public's opinion on a wide variety of topics. In this paper, we have mined Twitter to understand the public's perception of the Internet of Things (IoT). We first generated the discussion trends of the IoT from multiple Twitter data sources and validated these trends with Google Trends. We then performed sentiment analysis to gain insights of the public's attitude towards the IoT. As anticipated, our analysis indicates that the public's perception of the IoT is predominantly positive. Further, through topic modeling, we learned that public tweets discussing the IoT were often focused on business and technology. However, the public has great concerns about privacy and security issues toward the IoT based on the frequent appearance of related terms. Nevertheless, no unexpected perceptions were identified through our analysis. Our analysis was challenged by the limited fraction of tweets relevant to our study. Also, the user demographics of Twitter users may not be strongly representative of the population of the general public.
Show less - Date Issued
- 2016-07-08
- Identifier
- FSU_pmch_27391760, 10.1371/journal.pone.0158450, PMC4938510, 27391760, 27391760, PONE-D-15-54733
- Format
- Citation
- Title
- More than Just Books: Librarians as a Source of Support for Cyberbullied Young Adults.
- Creator
-
Phillips, Abigail
- Abstract/Description
-
Young adults are becoming more and more engaged with social media for a variety of reasons. Social networking sites—such as Facebook, Instagram, and Twitter—provide them with free and open space for exchanges of ideas, collaboration, and expression. For the most part, these online interactions are positive, respectful, and socially responsible. However, a significant number of young adults are using social media for a darker and more dangerous purpose: cyberbullying. While this phenomenon has...
Show moreYoung adults are becoming more and more engaged with social media for a variety of reasons. Social networking sites—such as Facebook, Instagram, and Twitter—provide them with free and open space for exchanges of ideas, collaboration, and expression. For the most part, these online interactions are positive, respectful, and socially responsible. However, a significant number of young adults are using social media for a darker and more dangerous purpose: cyberbullying. While this phenomenon has been discussed widely in the media, what is lacking is a clear and consistent understanding of cyberbullying. This literature review will synthesize the current research on cyberbullying, identify key findings that can be drawn from the research, acknowledge existing research gaps, and suggest opportunities for further research. Although the focus of this article is a review of the literature, a secondary focus is the potential for public librarians, through pastoral care, to serve as a support system for victims of cyberbullying.
Show less - Date Issued
- 2014
- Identifier
- FSU_migr_slis_faculty_publications-0020
- Format
- Set of related objects
- Title
- Normative Behavior and Information: The Social Aspects of Information Access.
- Creator
-
Burnett, Gary, Jaeger, Paul T., Thompson, Kim
- Abstract/Description
-
Information access is central to library and information science, yet explorations of its conceptual nature have been limited. Given the importance of information access to the discipline, there is a need for research to create a better understanding of the concept and its many roles in all activities and behaviors related to information. Drawing on the theoretical work of Elfreda Chatman, this article proposes that the study of information access can be facilitated through the recognition...
Show moreInformation access is central to library and information science, yet explorations of its conceptual nature have been limited. Given the importance of information access to the discipline, there is a need for research to create a better understanding of the concept and its many roles in all activities and behaviors related to information. Drawing on the theoretical work of Elfreda Chatman, this article proposes that the study of information access can be facilitated through the recognition and examination of the physical, intellectual, and social aspects of information access. These types of access are examined through three case studies in terms of different information behaviors and contexts, with a particular focus on the importance of social access. The article also discusses the future roles that considerations of social access can play in research and theory.
Show less - Date Issued
- 2008
- Identifier
- FSU_migr_slis_faculty_publications-0001, 10.1016/j.lisr.2007.07.003
- Format
- Citation