Library Trends最新文献

筛选
英文 中文
Gathering Intelligence on Student Information Behavior Using Data Mining 利用数据挖掘收集学生信息行为的情报
IF 0.8 4区 管理学
Library Trends Pub Date : 2020-10-21 DOI: 10.1353/lib.2020.0015
Lei Pan, N. Patterson, Sophie McKenzie, Surtharshan Rajasegarar, G. Wood-Bradley, J. Rough, Wei Luo, E. Lanham, Jo Coldwell-Neilson
{"title":"Gathering Intelligence on Student Information Behavior Using Data Mining","authors":"Lei Pan, N. Patterson, Sophie McKenzie, Surtharshan Rajasegarar, G. Wood-Bradley, J. Rough, Wei Luo, E. Lanham, Jo Coldwell-Neilson","doi":"10.1353/lib.2020.0015","DOIUrl":"https://doi.org/10.1353/lib.2020.0015","url":null,"abstract":"Abstract:In this paper, we present a novel machine-learning approach that analyzes student assessment scores across a teaching period to predict their final exam performance. One challenge for many universities around the world is identifying the students who are at risk of failing a subject sufficiently early enough to provide proactive interventions that aim to minimize the risk of failure due to several reasons such as the volume of (big) data. We propose a data-driven strategy using machine learning, an application of artificial intelligence that has become popular for extracting knowledge from data by combining strategies and processes from statistics and computer science. By being able to predict what a student's exam performance is ahead of time, interventions can occur, and students can be provided with extra support from their teachers to aid them in achieving the best result possible. In this research, we collected data from a popular information-technology subject at an Australian university and applied a machine-learning algorithm to the data to predict a few hundred students' exam scores. We also developed a framework of learningsupport activities that would be of most benefit to at-risk students to achieve maximum impact before their exam would be conducted. We discovered through our approach that we can accurately predict the bottom 20–30 percent of students at risk, enabling a large cohort of students to be helped through our intervention framework, which we believe can have a positive impact on their future results.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0015","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44051155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Russian Gambit and the US Intelligence Community: Russia's Use of Kompromat and Implausible Deniability to Optimize its 2016 Information Campaign against the US Presidential Election 俄罗斯Gambit和美国情报界:俄罗斯利用Kompromat和不可否认性优化其2016年反对美国总统大选的信息活动
IF 0.8 4区 管理学
Library Trends Pub Date : 2020-10-21 DOI: 10.1353/LIB.2020.0017
Allon J. Uhlmann, S. McCombie
{"title":"The Russian Gambit and the US Intelligence Community: Russia's Use of Kompromat and Implausible Deniability to Optimize its 2016 Information Campaign against the US Presidential Election","authors":"Allon J. Uhlmann, S. McCombie","doi":"10.1353/LIB.2020.0017","DOIUrl":"https://doi.org/10.1353/LIB.2020.0017","url":null,"abstract":"Abstract:In the leadup to the 2016 US presidential election, Russia engaged in covert political action to disrupt the American political system and undermine candidate Clinton. Following Trump's shock victory, Moscow swiftly pivoted to leverage its pre-election intervention in order to degrade the coherence of the US strategic decision-making. Specifically, through seemingly feckless denial, the Kremlin sought to assert the depth and success of its meddling in the election, thereby driving a wedge between the White House on the one hand, and US intelligence community and political mainstream on the other, and keeping both sides at loggerheads. The fact that the main axis of Moscow's pre-election information campaign unfolded online helped it exploit anxieties over the unfettered circulation of information and enhance the effect of its postelection messaging.After describing the contours of this Russian gambit, we elaborate on three specific issues. We analyze the stratagem of implausible deniability—Russia's assertion of its role through seemingly feckless denial. We then ascribe the Russian intelligence community's agility to its chaotic structure and function. Finally, we account for the strategic oversight that allowed the US intelligence community to become an unwitting useful tool of Russian manipulation.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/LIB.2020.0017","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47384960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Governmental Censorship of the Internet: Spanish vs. Catalans Case Study 政府对网路的审查:西班牙与加泰隆尼亚个案研究
IF 0.8 4区 管理学
Library Trends Pub Date : 2020-10-21 DOI: 10.1353/lib.2020.0011
M. Medina
{"title":"Governmental Censorship of the Internet: Spanish vs. Catalans Case Study","authors":"M. Medina","doi":"10.1353/lib.2020.0011","DOIUrl":"https://doi.org/10.1353/lib.2020.0011","url":null,"abstract":"Abstract:This article summarizes the actions taken by the Spanish government pretending to censor information published and applications developed by the Catalan government and some independent activists in order to organize an independence referendum. It describes the goals, the technical approaches, and some countermeasures, analyzing also the level of success achieved. There is also an introduction to the legislation being deployed in the European Union and Spain that could give support to some kind of Internet censorship, and the concerns about the compliance of those regulations with the civil rights of freedom and opinion, which should be guaranteed by governments to citizens. The conclusions suggest some ideas to prevent arbitrary application of censorship practices by national authorities using criteria not widely accepted by the Internet community.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0011","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42364085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Ethics of Corporate Censorship of Information-Sharing Behavior: A Nonconsequentialist Perspective 信息共享行为的公司审查伦理:一个非结果主义的视角
IF 0.8 4区 管理学
Library Trends Pub Date : 2020-10-21 DOI: 10.1353/lib.2020.0018
H. Zhong, P. Watters
{"title":"The Ethics of Corporate Censorship of Information-Sharing Behavior: A Nonconsequentialist Perspective","authors":"H. Zhong, P. Watters","doi":"10.1353/lib.2020.0018","DOIUrl":"https://doi.org/10.1353/lib.2020.0018","url":null,"abstract":"Abstract:Recent research on information-seeking behavior (Watters and Ziegler 2016) has suggested a role for managing access to ensure consistency with local regulatory or policy requirements. However, sharing of self-generated, personal data—as facilitated by socialmedia companies—should be relatively free of information-sharing controls. While many studies have examined government censorship, the extent to which the private sector is complicit is often unclear. In this study, we examine whether censorship appears to occur on a number of social-media and related sites, including the transmission of sensitive keywords and URLs. The results indicate that some level of private-sector censorship is prevalent, often in breach of the technology companies' own terms and conditions. In some cases, apparently harmless information is overblocked. These companies need to be more transparent about their censorship mechanisms and subject their actual policies and procedures to scrutiny and public debate. Removing controls on information-sharing behavior is consistent with a nonconsequentialist perspective on privacy.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44346900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring Consumer Information-Security Awareness and Preparedness of Data-Breach Events 探讨消费者信息安全意识和数据泄露事件的防范
IF 0.8 4区 管理学
Library Trends Pub Date : 2020-10-21 DOI: 10.1353/lib.2020.0014
Jonathan Nield, J. Scanlan, E. Roehrer
{"title":"Exploring Consumer Information-Security Awareness and Preparedness of Data-Breach Events","authors":"Jonathan Nield, J. Scanlan, E. Roehrer","doi":"10.1353/lib.2020.0014","DOIUrl":"https://doi.org/10.1353/lib.2020.0014","url":null,"abstract":"Abstract:The continuous increase of digital connectivity has improved the capability that businesses have for the collection, manipulation, and distribution of data. Due to shortfalls in security, this capability has resulted in data-breach events being a weekly occurrence globally. Notification of these events is becoming commonplace, in part fueled by notification legislation in many jurisdictions. As of February 2018, mandatory reporting of data breaches came into force in Australia (Australian Notifiable Data Breaches scheme [NDB]), and this was followed by European legislation (GDPR) coming into force in May of the same year. This study aims to establish current levels of information-security awareness within typical consumers in Australia, their awareness of these legislative changes, and their ability to respond to such a notification of their personal information being leaked from a service or system. The research results suggest that consumers had a high level of information-security awareness, yet low awareness of notification legislation. The discussion revealed that expected outcomes primarily drove stakeholder behavior in relation to data-breach and legislation preparedness.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0014","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49003920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Stuffing, Sniffing, Squatting, and Stalking: Sham Activities in Affiliate Marketing 填充、嗅探、蹲下和跟踪:联盟营销中的虚假活动
IF 0.8 4区 管理学
Library Trends Pub Date : 2020-10-21 DOI: 10.1353/lib.2020.0016
B. Amarasekara, A. Mathrani, C. Scogings
{"title":"Stuffing, Sniffing, Squatting, and Stalking: Sham Activities in Affiliate Marketing","authors":"B. Amarasekara, A. Mathrani, C. Scogings","doi":"10.1353/lib.2020.0016","DOIUrl":"https://doi.org/10.1353/lib.2020.0016","url":null,"abstract":"Abstract:Businesses engage in technology partnerships to leverage web-based competencies and create competitive advantage. Affiliate marketing (AM) is a business model that enables technological cooperation between small and medium enterprises (SMEs) and affiliates (influential partners who have reach of the intended consumer market). SMEs capitalize on affiliates' consumer reach to achieve global visibility and conduct online trading activities. Based upon mutually agreed commissions, SMEs advertise their goods to consumer communities provided by affiliates. However, AM can be subjected to sham activities that could skew commissions resulting from online sales transactions to bring financial gain to undeserving rogue parties. Using a cross-domain simulation platform of a complete AM network, this study reveals four fraudulent information-seeking behaviors—stuffing, sniffing, squatting, and stalking—that could affect SMEs. These findings will support enterprises in making informed decisions when implementing new AM strategies or in reinvestigating the robustness of existing AM strategies. We further propose some managerial and technical avenues to assist enterprises in safeguarding themselves from activities that could incur considerable losses to their profit margins. The study has further implications for practitioners in establishing a foundation for technology partnerships and sharing of online competencies with partnering firms.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47538719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vocational Melancholy 职业的忧郁
IF 0.8 4区 管理学
Library Trends Pub Date : 2020-04-02 DOI: 10.1353/lib.2020.0001
Dolsy Smith
{"title":"Vocational Melancholy","authors":"Dolsy Smith","doi":"10.1353/lib.2020.0001","DOIUrl":"https://doi.org/10.1353/lib.2020.0001","url":null,"abstract":"Abstract:This essay explores the affects that circulate in and around libraries from a perspective informed by feminist cultural studies and Black feminist theory. I situate the library as an institution devoted to the cultivation of sentiment and the creation of virtual publics. Though flush with the promises of freedom and equality, this legacy remains fraught with contradiction: for those promises are implicated in the oppressive structures of capitalism and patriarchal white supremacy. And new rationalizations of old forms of state-sanctioned violence and neglect, though targeted specifically at the most vulnerable, constitute an existential threat to us all. Yet the proper subject of such promises—the liberal subject of racialized and gendered privilege—has failed, again and again, to imagine how the world might turn out otherwise than this. In the hopes of practicing forms of accountability to the wisdom of others, I situate myself, as a beneficiary of structural oppression, vis-a-vis the melancholy that troubles the profession of liberal (or library) sentiments with what haunts the present and threatens the future.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48849952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Introduction 介绍
IF 0.8 4区 管理学
Library Trends Pub Date : 2020-04-02 DOI: 10.1353/lib.2020.0006
K. Adler, Lisa Sloniowski
{"title":"Introduction","authors":"K. Adler, Lisa Sloniowski","doi":"10.1353/lib.2020.0006","DOIUrl":"https://doi.org/10.1353/lib.2020.0006","url":null,"abstract":"","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49205237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Afterword: The Strangeness of Subject Cataloging 后记:主题编目的怪异
IF 0.8 4区 管理学
Library Trends Pub Date : 2020-04-02 DOI: 10.1353/lib.2020.0005
Melissa A. Adler
{"title":"Afterword: The Strangeness of Subject Cataloging","authors":"Melissa A. Adler","doi":"10.1353/lib.2020.0005","DOIUrl":"https://doi.org/10.1353/lib.2020.0005","url":null,"abstract":"","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49364450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bodies, Brains, and Machines: An Exploration of the Relationship between the Material and Affective States of Librarians and Information Systems 身体、大脑和机器:图书馆员和信息系统的物质和情感状态之间关系的探索
IF 0.8 4区 管理学
Library Trends Pub Date : 2020-04-02 DOI: 10.1353/lib.2020.0009
Stacy Allison-Cassin
{"title":"Bodies, Brains, and Machines: An Exploration of the Relationship between the Material and Affective States of Librarians and Information Systems","authors":"Stacy Allison-Cassin","doi":"10.1353/lib.2020.0009","DOIUrl":"https://doi.org/10.1353/lib.2020.0009","url":null,"abstract":"Abstract:This paper uses the idea of information networks and the ways librarian bodies are called to serve as a relay within information systems. The founding of librarianship as a profession in the Victorian period during a period of increased bureaucracy and mechanization has had a profound and far-reaching impact on the way women’s bodies and affective states are subsumed into information systems. The history of librarianship is read alongside Kittler’s analysis of Bram Stoker’s novel Dracula as a story not about vampires but about office technology. The connection between women’s bodies and information processing is further traced through an analysis of the film Desk Set. The film is examined for the ways librarian bodies and affective states interact with computer technologies to show that women are encouraged to fully give over brains and bodies to serve as nodes along library information systems, in effect becoming cyborgs. Finally, contemporary issues around digital systems and affect are examined as a possible means to provide a bulwark against the complete surrender to capitalist information flows.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0009","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66276890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信