{"title":"Awareness and Perception of Students Toward Execution of Internet of Things in Library Services: A study of Indian Institute Technologies of Northern India","authors":"Priyanka Sinha, Khushpreet Singh Brar","doi":"10.1515/opis-2022-0167","DOIUrl":"https://doi.org/10.1515/opis-2022-0167","url":null,"abstract":"\u0000 This study aimed to investigate students’ awareness and perception toward the execution of Internet of Things (IoT) in library services of Indian Institute Technologies (IITs) of Northern India. This study consists of a quantitative research design in which a survey was conducted utilizing a stratified random sampling technique to survey 813 students from five IITs. A total of 780 correctly filled-out surveys were received, yielding a response rate of 95.94%. Statistical tools, including Microsoft Excel and the Statistical Package for the Social Sciences, were used to analyze the data. To assess the significance of the results at the 0.05% level, statistical analysis was carried out utilizing percentages and analysis of variance. This study will communicate the attitude, awareness, and perception of students regarding the implementation of IoT in libraries of IITs. It is conducted to understand the motive behind new technology acceptance in academic libraries. The findings reveal that most of the students got familiar with IoT from browsing on the Web/Internet, social networking sites, research projects, conferences, workshops, webinars and faculty development programs, professional discussions, and meetings, as part of the curriculum. Respondents were in favor of implementing IoT in library services. They believed that IoT will ensure better and more efficient utilization of library resources, followed by real-time information accessibility, recommend IoT-based library services, system content quality will be updated, and will increase the quality of the library; the efficiency of library services will increase with implementation of IoT. It will increase the productivity of library services, be useful in an emergency, and promote information literacy. The study’s findings would be beneficial to libraries and academic institutions interested in implementing IoT applications in their libraries.","PeriodicalId":32626,"journal":{"name":"Open Information Science","volume":"15 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140525733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abid Fakhre Alam, A. Subaveerapandiyan, Dalitso Mvula, Neelam Tiwary
{"title":"AI Literacy and Zambian Librarians: A Study of Perceptions and Applications","authors":"Abid Fakhre Alam, A. Subaveerapandiyan, Dalitso Mvula, Neelam Tiwary","doi":"10.1515/opis-2022-0166","DOIUrl":"https://doi.org/10.1515/opis-2022-0166","url":null,"abstract":"\u0000 This study delves into artificial intelligence (AI) literacy within Zambian academic libraries, focusing on librarians’ perceptions and applications of AI. The research aims to gauge the AI literacy level among Library and Information Science Professionals in Zambia, identify their awareness and knowledge of AI applications in libraries, and explore their perceptions regarding the advantages and challenges of implementing AI technologies in library services. Data from 82 diverse participants were gathered using purposive and convenience sampling methods. The findings indicate a solid understanding of AI fundamentals among Zambian librarians and positive attitudes towards AI’s potential benefits in library services. However, challenges such as the need for enhanced AI expertise, resistance to change, and budgetary constraints are acknowledged.","PeriodicalId":32626,"journal":{"name":"Open Information Science","volume":"168 1-2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140516626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. S. A. Belkhira, M. Belkheir, M. Rouissat, A. Mokaddem, Pascal Lorenz, Mohamed Achraf Boukhobza, Abdelhamid Salmi, Ahmed Kouar
{"title":"Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion","authors":"H. S. A. Belkhira, M. Belkheir, M. Rouissat, A. Mokaddem, Pascal Lorenz, Mohamed Achraf Boukhobza, Abdelhamid Salmi, Ahmed Kouar","doi":"10.1515/opis-2022-0165","DOIUrl":"https://doi.org/10.1515/opis-2022-0165","url":null,"abstract":"\u0000 The security landscape of Internet of Things (IoT) networks continues to draw significant attention from recent networks; the Version Number Attack (VNA) stands out as a prominent threat to IoT network resources. Routing Protocol for Low-Power and Lossy Network structures low-power and lossy networks through one or more Destination Oriented Directed Acyclic Graphs (DODAGs). Each DODAG is assigned a version number, serving the purpose of ensuring the existence of loop-free paths to the root node. In the event of any inconsistency detected by the root node, the version number is incremented, triggering a global repair process and the reconstruction of the Directed Acyclic Graph. A potential security concern arises when a malicious node advertises a false version number in its control message, compelling the initiation of a global repair process. This study conducts a comprehensive analysis of the VNA’s impact, considering various parameters that have not been explored in previous research articles. These parameters include an examination of the additional forwarding tasks introduced by the attack and an exploration of factors contributing to node hyperactivity (such as loops, local and global repairs, etc.). The article delves into the specific control messages that result in the detrimental effects of the attack, offering a detailed analysis of control overhead, energy consumption, Packet Delivery Ratio, and latency. The obtained results show that the DAO (Destination Advertisement Object) messages dominate the total control overhead and are the main contributor to the total consumer energy, where the closest the malicious node to the sink the more damaging is the attack.","PeriodicalId":32626,"journal":{"name":"Open Information Science","volume":"38 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140518075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid RSA–AES-Based Software-Defined Network to Improve the Security of MANET","authors":"Y. Walle","doi":"10.1515/opis-2024-0001","DOIUrl":"https://doi.org/10.1515/opis-2024-0001","url":null,"abstract":"\u0000 Software-defined networking offers a flexible and programmatically efficient network design. Security in today’s ad hoc mobile wireless network is paramount and incredibly challenging. Software-defined network is used to automatically and dynamically manage and control large network devices, network services, traffic paths, network topology, and packet management (quality of service). Recently different attackers are attacking our data when forwarding from one device to another. Therefore, software-defined networking and a Hybrid Rivest, Shamir, and Adelman (RSA)–Advanced Encryption Standard (AES) cryptography algorithm are needed to establish the concept of software-defined networking in mobile ad hoc networks to improve security and routing efficiency. The proposed Hybrid Cryptography Algorithm (HCA)-Based SDN mainly creates strong detection, prevention, and authentication mechanisms for MANET. The proposed secure data channel throughput increased by 0.4%, and the suggested system latency was 3.6% lower than the Normal MANET. It is already proved that the Hybrid cryptography algorithm also generates a key for security faster than RSA (Rivest, Shamir, and Adelman). The performance of the RSA–AES (hybrid) approach for encrypting and decrypting broad data significantly beats the RSA-Blowfish algorithm. In decrypting files, the hybrid approach (RSA–AES) outperforms the RSA-Blowfish method 11.2 times more efficiently when the file size is 32 kB; however, efficiency is increased by 77.1 times when the file size exceeds 4,096 kB. The experimental result shows that as the file size increases the hybrid RSA–AES solution outperforms RSA when the file is only 145 bytes; however, when the file is 6,460 bytes in size, the efficiency is multiplied by 61.3. As file size increases, RSA is less efficient than the hybrid encryption method. This is more preferred to be implemented for different parts of wireless networks like MANET.","PeriodicalId":32626,"journal":{"name":"Open Information Science","volume":"10 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140518524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI in Indian Libraries: Prospects and Perceptions from Library Professionals","authors":"A. Subaveerapandiyan, A. A. Gozali","doi":"10.1515/opis-2022-0164","DOIUrl":"https://doi.org/10.1515/opis-2022-0164","url":null,"abstract":"\u0000 This study explores the perspectives of Indian library professionals on the use of artificial intelligence (AI) in libraries. It aims to understand their knowledge, awareness, and views on AI and its challenges and opportunities. The research adopts a quantitative approach, using a closed-ended survey to collect data from 386 library professionals in academic institutions across India. The survey covers various aspects, including socio-demographic information, AI knowledge, perspectives on AI in libraries, ethical considerations, and adopting AI tools and services. The findings indicate that Indian library professionals are generally aware of AI and its potential benefits in libraries. They believe that AI can enhance library activities, improve accessibility, and support decision-making. However, there are concerns about AI replacing human intelligence within libraries. Factors such as user privacy, funding, staff expertise, and alignment with institutional goals are essential when implementing AI applications. Ethical considerations, including bias and discrimination, intellectual freedom, and transparency, are also significant concerns. AI tools like smart shelving and optical character recognition are among the technologies already adopted in Indian libraries.","PeriodicalId":32626,"journal":{"name":"Open Information Science","volume":"53 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139639104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FSLSM-Based Analysis of Student Performance Information in a Blended Learning Course Using Moodle LMS","authors":"Mohammed Ait Daoud, A. Namir, Mohammed Talbi","doi":"10.1515/opis-2022-0163","DOIUrl":"https://doi.org/10.1515/opis-2022-0163","url":null,"abstract":"\u0000 Over the past decades, blended learning using a flipped classroom approach has become an increasingly important part of global learning development and has gradually revolutionized educational environments. However, in the online part, individual differences of learners are often not considered and treated in an equipollent way, neglecting their needs and personal characteristics, which results in a poor quality of the learning service. Thus the need to improve both the content of e-learning systems and their adaptability requires a careful examination of the direct behavior of students in distance learning platforms. Our study is based on a dataset from the FOAD_FSBM e-learning platform involved in the learning of Moroccan university students. This work is motivated by the fact that professors seek to better understand students’ learning styles, which are founded on the Felder and Silverman Learning Style Model (FSLSM) so that they can offer them adaptive and personalized courses. In this article, we first describe the basic environment of this study and the reasons that led us to choose the Moodle e-learning platform. We also present the format of the courses created to conduct our experiments, and its advantage in e-learning. Then, we highlight the development tools that we used to conduct our studies. Finally, we present the results of our statistical analyses in relation to the performance of the students.","PeriodicalId":32626,"journal":{"name":"Open Information Science","volume":"8 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140526952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Twitter Interactions in the Era of the Virtual Academic Conference: A Comparison Between Years","authors":"Dan E. Albertson, M. Rogers","doi":"10.1515/opis-2022-0139","DOIUrl":"https://doi.org/10.1515/opis-2022-0139","url":null,"abstract":"Abstract The goal of this study is to assess variations in interactions over social media at academic conferences when held onsite versus online. Here, Twitter activities from different years of the Annual Meeting of the Association for Information Science and Technology (ASIS&T AM) are analyzed and reported. Data elements of individual tweets were examined using both primary- and second-level analyses, showing overall participation levels and the number of actions across different variables. The activity level and relative impact on the overall results of users who appeared in both years emerged as a key finding. Twitter activities during both the 2018 (Vancouver) and 2020 (online) ASIS&T AM were collected and compared.","PeriodicalId":32626,"journal":{"name":"Open Information Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44149722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research Image Management Practices Reported by Scientific Literature: An Analysis by Research Domain","authors":"Joana Rodrigues, C. Lopes","doi":"10.1515/opis-2022-0147","DOIUrl":"https://doi.org/10.1515/opis-2022-0147","url":null,"abstract":"Abstract Research data management is essential for safeguarding and prospecting data generated in a scientific context. Specific issues arise regarding data in image format, as this data typology poses particular challenges and opportunities; however, not much attention has been given to data as images. We reviewed 109 articles from several research domains where images were used either as data or metadata to understand how researchers specifically deal with this data format, and what are your habits and behaviors. We use the Web of Science (WoS), considering its five main areas of research. We included in the initial corpus the most relevant articles by research domain, selecting the ten most cited articles in WoS, by year, between 2010 and 2021. The selected articles should be in English and in open access. The results found that images have been used in scientific works numerous times, but, unfortunately, few are those in which they are the central element of the study. Photography is the type of image most used in most domains. In terms of the instruments used, the Technology and Life Sciences and Biomedicine domains use the microscope more, while the Arts and Humanities and Physical Sciences domains use the camera more. We found that the images are mostly produced in the context of the project, rather than reused by third parties. As for their collection scenario, these are mostly produced/used in a laboratory context. The overwhelming majority of the images present in the articles are digital, and only a small part is analog. We verify that Arts and Humanities are more likely to perform qualitative types of analyses, while Life Sciences and Biomedicine overwhelmingly use quantitative analyses. As for the issues of sharing and depositing, Life Sciences and Biomedicine is the domain that stands out the most in the tasks of depositing and sharing images. It was found that the licenses of a project are intrinsically related to the motivations for sharing results with third parties. Description, a fundamental step in the data management process, is neglected by a large number of researchers. The images are mostly not described or annotated and when this happens, researchers don’t provide much detail about this.","PeriodicalId":32626,"journal":{"name":"Open Information Science","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67235685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements of Digital Archiving in Saudi Libraries in the Light of International Standards: King Fahad National Library as a Model","authors":"Alia Alhaif","doi":"10.1515/opis-2022-0160","DOIUrl":"https://doi.org/10.1515/opis-2022-0160","url":null,"abstract":"Abstract This research aimed to measure the availability of digital requirements needed for digital archiving of King Fahad National Library in the light of international standards from the perspective of information specialists, determine the differences in their responses on the compatibility of these requirements with international standards due to (academic qualification, years of experience, and training courses) variables, identify the challenges, and make suggestions for providing those requirements. The researcher adopted the descriptive approach and applied a questionnaire to a sample of information specialists at King Fahad National Library. The results revealed that the participants had an intermediate agreement on the availability of digital requirements for digital archiving of the King Fahd National Library in the light of international standards. There were no statistically significant differences in the participants’ responses according to (academic qualification, years of experience, and training courses) variables. Moreover, the participants had a high agreement on the challenges and suggestions for providing those requirements. This research recommends holding training courses and workshops for information specialists in King Fahd National Library to determine and resolve the challenges they face in the digital age while carrying out the digital archiving of documents to comply with international standards for document management and digitization.","PeriodicalId":32626,"journal":{"name":"Open Information Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135211056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Studies on Information Users and Non-Users: An Alternative Proposal","authors":"Rodrigo Rabello","doi":"10.1515/opis-2022-0153","DOIUrl":"https://doi.org/10.1515/opis-2022-0153","url":null,"abstract":"Abstract Studies on non-users are often neglected in the area of information. Such research studies face challenges to obtain diagnostics. This article defends the realization of studies comprehending both information users and non-users, approaching different focuses and conceptions. The theoretical frameworks approached contributions and limitations of these concepts. The term “information non-user” can be employed to approach subjects ignored or out of interest in the area of information. Public policies on information, education, and culture seek to convert such non-users into users, as they promote the “socially” valued culture. However, mediating institutions may also acknowledge the culture of non-users and appreciate their informational needs and situations in context. Considering the studies on users and non-users bring benefits for the field and the society, working with a wide, inclusive conception. Yet, such studies may not include other processes, such as information reading and appropriation in certain contexts, or even disregard informational behaviors and practices in everyday life. It is important to reflect on epistemological and theoretical–methodological choices to perform such studies. These decisions reflect, politically and ethically, a worldview from professors, researchers, and professionals in the field of information, which can give voice and a leading role for such, while rendering others silent and invisible.","PeriodicalId":32626,"journal":{"name":"Open Information Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44301030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}