ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics最新文献

筛选
英文 中文
Exploring Intergenerational Knowledge Sharing in Organizations - Potentials and Limitations of Information and Communication Technology (ICT) 探索组织中的代际知识共享——信息通信技术的潜力与局限
Helene Brinken, Helena Kock
{"title":"Exploring Intergenerational Knowledge Sharing in Organizations - Potentials and Limitations of Information and Communication Technology (ICT)","authors":"Helene Brinken, Helena Kock","doi":"10.18452/19943","DOIUrl":"https://doi.org/10.18452/19943","url":null,"abstract":"This thesis deals with an interdisciplinary approach of intergenerational knowledge sharing (IKS) from an information scientific perspective. As part of the KNOWISH project the research is embedded in an international cooperation of University of Hildesheim and the Åbo Academy in Turku, Finland. It aims at answering the questions: How does IKS unfold? Which systems are used in its context and how suitable are they? Two case studies have been conducted in two medium-sized German companies. At the same time, an additional study has been conducted by two Finnish students. Semistructured interviews and a qualitative content analysis of the data considered generational aspects, knowledge sharing as well as ICT. This study finds that experience and work environment atmosphere are important influencing factors. Both, young and old employees can be knowledge carriers who share knowledge mutually. Another important outcome shows that Organizational Generations of Knowledge exist within the companies. These are defined by chronological and professional age.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"10 1","pages":"285-289"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86542767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Facebook 脸谱网
Monika Podolecheva
{"title":"Facebook","authors":"Monika Podolecheva","doi":"10.5281/zenodo.5528904","DOIUrl":"https://doi.org/10.5281/zenodo.5528904","url":null,"abstract":"","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"52 1","pages":"573"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76829773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ResearchSherlock - Toward a Seamless Integration of Printed Books into the Digital Academic Workflow ResearchSherlock -迈向印刷书籍与数字学术工作流程的无缝集成
Maximilian Kautetzky, Ben Haas, M. Voit, M. Burghardt, Christian Wolff
{"title":"ResearchSherlock - Toward a Seamless Integration of Printed Books into the Digital Academic Workflow","authors":"Maximilian Kautetzky, Ben Haas, M. Voit, M. Burghardt, Christian Wolff","doi":"10.5281/zenodo.17930","DOIUrl":"https://doi.org/10.5281/zenodo.17930","url":null,"abstract":"With the increase of digital information practices (e.g. online search, desktop publishing, electronic reference management, etc.) in the academic context, printed books are sometimes cumbersome to integrate into the digital workflow. We present ResearchSherlock, an Android app that allows the user to quickly gather bibliographic information for a printed book by scanning its shelfmark or ISBN. The application also provides recommenddations for thematically related books, to promote the discovery of other relevant books that are available in the local library.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"102 1","pages":"581-583"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72720053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Searcher Heterogeneity in Collaborative Information Seeking within the Context of Students Work Tasks 学生工作任务背景下协同信息搜索的搜索者异质性
Stefanie Elbeshausen
{"title":"Searcher Heterogeneity in Collaborative Information Seeking within the Context of Students Work Tasks","authors":"Stefanie Elbeshausen","doi":"10.5281/zenodo.17940","DOIUrl":"https://doi.org/10.5281/zenodo.17940","url":null,"abstract":"This paper shows an overview over a doctoral thesis project which focuses on Collaborative Information Seeking (CIS) with a core interest in searcher heterogeneity. A special field of interest is the way how different personalities interact in a collaborative search scenario and if heterogeneous groups perform better or worse than homogenous groups. The goal is to provide a description of group performance in CIS, to get suggestions for the design of collaborative search tools and to create a model of CIS integrating search heterogeneity.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"13 1","pages":"494-500"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77268092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Scientometric Approach to Determine and Analyze Productivity, Impact and Topics Based upon Personal Publication Lists 基于个人出版物列表的科学计量学方法来确定和分析生产力、影响和主题
Isabelle Dorsch, Nils Frommelius
{"title":"A Scientometric Approach to Determine and Analyze Productivity, Impact and Topics Based upon Personal Publication Lists","authors":"Isabelle Dorsch, Nils Frommelius","doi":"10.5281/zenodo.17978","DOIUrl":"https://doi.org/10.5281/zenodo.17978","url":null,"abstract":"With the aim of an empirical scientometric case study of information science institutes in Graz (Austria), a publication analysis was held based on the methodological approach of Friedlander (2014) and Hilbert et al. (2015), namely the use of comprehensive (personal or institutional) publication lists instead of applying data from commercial information services (like Web of Science, Scopus or Google Scholar). We determined and analyzed the publications for three institutes in Graz in terms of their productivity (publication output), impact (coverage and citation count) and topics (based on the publication’s titles). For our study, we exclusively worked with complete (or manually completed) personal publication lists which were created from the personal websites of the authors and in consultation with the institutes. With the help of these lists as empirical data basis, it is possible to get very precise informetric results. Similar to our approach, Kirkwood (2012) used publication checklists. For the productivity it is – among other things – necessary to clarify what should be defined as a publication and as one publication (Stock, 2000). Regarding to the impact, the publications coverage in selected databases was checked. Before counting the citations in these databases, we","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"76 1","pages":"578-580"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77437527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Views and Clicks in Digital Libraries - A Comparative Usability Analysis of Eye and Mouse Tracking Data 数字图书馆中的视图和点击——眼睛和鼠标跟踪数据的比较可用性分析
Eliane Blumer, René Schneider
{"title":"Views and Clicks in Digital Libraries - A Comparative Usability Analysis of Eye and Mouse Tracking Data","authors":"Eliane Blumer, René Schneider","doi":"10.5281/zenodo.17956","DOIUrl":"https://doi.org/10.5281/zenodo.17956","url":null,"abstract":"In this study, eye tracking and mouse tracking data collected from two Swiss digital library web sites are compared, with respect to their specific areas of interest in order to answer two questions: Firstly, to know, how far the perception of the corresponding areas of interests differed from site to site and how far general recommendations can be inferred from this comparison. Secondly, the dispersion on the gaze and the mouse click plots were compared with the results of the two methods with each other to see if one method can be replaced by each other or if both methods should rather be considered as complementary. The results show that especially the choice of color and the use of contrast strongly influence gazes and clicks and that some areas of interest mainly attract views, but not clicks and vice versa, which leads to a complementary distribution pattern, and makes the question of replacing one method by the other obsolete.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"28 1","pages":"278-289"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84581667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research Fronts and New Applications of RFID Technology - A Bibliometric Analysis of the Research Literature RFID技术的研究前沿与新应用——研究文献的文献计量学分析
Armin Rombold
{"title":"Research Fronts and New Applications of RFID Technology - A Bibliometric Analysis of the Research Literature","authors":"Armin Rombold","doi":"10.5281/zenodo.17958","DOIUrl":"https://doi.org/10.5281/zenodo.17958","url":null,"abstract":"The master thesis presents an analysis of the research literature about radiofrequency identification (RFID). It consists of a theoretical part and a practical part. The theoretical part explains the technology behind RFID and shows the existing application spectrum of this diverse and prominent technology. It also discusses the norms and standards in this area. Furthermore the theoretical part contains a short introduction into scientometrics which is the basis for the following analysis. The practical part represents the analysis, which was conducted with the bibliometric visualisation software Bibliometric Technology Monitoring (BibTechMon). With this software knowledge inherent in the analysed data can be discovered. BibTechMon was developed at the Austrian Institute of Technology (AIT) which was also a cooperation partner of this master thesis. For this analysis 8,994 bibliographic records have been analysed. The data was retrieved from “Web of Science”. In the main part of the thesis the research fronts of RFID technology are identified and on this basis future application domains are derived.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"46 1","pages":"557-561"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85895767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Acceptance of Telepresence Robots During Group Work - An Experimental Study 在小组工作中接受远程呈现机器人-一项实验研究
Arbnore Berisha, Ralph Kölle, Joachim Griesbaum
{"title":"Acceptance of Telepresence Robots During Group Work - An Experimental Study","authors":"Arbnore Berisha, Ralph Kölle, Joachim Griesbaum","doi":"10.5281/zenodo.17950","DOIUrl":"https://doi.org/10.5281/zenodo.17950","url":null,"abstract":"Telepresence robots are an emerging technology that enables social interaction between physically dispersed users. In this research, an exploratory study was conducted to get first insights with regard to technical affordances, usability and user acceptance of a telepresence robot in the context of learning related group work. Results indicate that the group work was successful and that it can be worthwhile to employ a telepresence robot for such a usage scenario. Furthermore, the case study identifies technical and social issues, which should be tackled to optimize such group work.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"22 1","pages":"350-356"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84039865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling Library Linked Data in Practice - Three Swiss Case Studies 建模库关联数据在实践-三个瑞士案例研究
Nicolas Prongué, René Schneider
{"title":"Modelling Library Linked Data in Practice - Three Swiss Case Studies","authors":"Nicolas Prongué, René Schneider","doi":"10.5281/zenodo.17944","DOIUrl":"https://doi.org/10.5281/zenodo.17944","url":null,"abstract":"In this paper we present reflections and recommendations concerning the conversion of library metadata into Linked Data. We will briefly describe the different data models that exist for this purpose and argue their strengths and weaknesses with a special focus on the entification issue, before illustrating this problem with the description of three different ongoing projects. As will be outlined afterwards, it is essential to distinguish at the start of a project between data-driven or user-driven design approaches. As an alternative, the realization of a Linked Data project for bibliographical data might also lead to a hybrid approach were the design process shifts reciprocally between the analysis of the data and the user needs.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"192 1","pages":"118-128"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76949282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of Auto-Suggest on the Usability of Search in eCommerce 自动建议对电子商务搜索可用性的影响
Katharina C. Furtner, Thomas Mandl, Christa Womser-Hacker
{"title":"Effects of Auto-Suggest on the Usability of Search in eCommerce","authors":"Katharina C. Furtner, Thomas Mandl, Christa Womser-Hacker","doi":"10.5281/zenodo.17948","DOIUrl":"https://doi.org/10.5281/zenodo.17948","url":null,"abstract":"The following study analyses the effects of Auto-Suggest as implemented on mobile Websites on user’s search in m-commerce-shops. A benchmark showed that many design guidelines regarding the implementation of AutoSuggest have been fulfilled. For usability tests, different designs of AutoSuggest have been systematically selected. The results showed that the AutoSuggest function guarantees a faster interaction with the website for most of the tasks on average. For tasks which require more time, the additional interaction time is around 10% and, surprisingly, does not result from more interaction steps. Many qualitative findings explain how interacting with AutoSuggest can be troublesome for users.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"29 1","pages":"178-190"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87168550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信