You are here

School of Information Faculty Scholarship

Permalink: https://repository.lib.fsu.edu/islandora/object/fsu:school_of_information_faculty_scholarship
Collection banner image

Pages

Facebooking It
Facebooking It
With social media a normal part of the daily lives of young adults, librarians are using these sites to promote library services. This article investigates the perceptions and attitudes of librarians toward social media as a tool for libraries and explores the way librarians utilize social media to portray professional roles and responsibilities to young patrons. This author focuses on the pastoral role of librarians and discusses possibilities for performing this role through social media. Although presently under-researched, social media provides librarians with one more avenue to advocate for, engage with, and support young adults., Keywords: pastoral role of librarians, promotion to YA users, social media, advocacy through YA social media, Note: This is the peer-reviewed author's manuscript as it was accepted for publication in Public Libraries Quarterly. The final published version is available at http://www.tandfonline.com/doi/full/10.1080/01616846.2015.1036710., Citation: Phillips, Abigail L. "Facebooking It: Promoting Library Services to Young Adults through Social Media" Public Library Quarterly 34 (2), 2015. 178-197.
Following the Breadcrumbs
Following the Breadcrumbs
This study explores the challenges of digital forensics investigation in file access, transfer and operations, and identifies file operational and behavioral patterns based on timestamps—in both the standalone as well as interactions between Windows NTFS and Ubuntu Ext4 filesystems. File-based metadata is observed, and timestamps across different cloud access behavioral patterns are compared and validated. As critical metadata information cannot be easily observed, a rigorous iterative approach was implemented to extract hidden, critical file attributes and timestamps. Direct observation and cross-sectional analysis were adopted to analyze timestamps, and to differentiate between patterns based on different types of cloud access operations. Fundamental observation rules and characteristics of file interaction in the cloud environment are derived as behavioral patterns for cloud operations.10.1016 This study contributes to cloud forensics investigation of data breach incidents where the crime clues, characteristics and evidence of the incidents are collected, identified and analyzed. The results demonstrate the effectiveness of pattern identification for digital forensics across various types of cloud access operations., Keywords: Timestamp, Cloud forensics, Behavioral analysis, Pattern identification, File metadata, Publication Note: This article was accepted for publication in Digital Investigation. The publisher's version of record is available at https://doi.org/10.1016/j.diin.2017.12.001., Grant Number: MOST 103-2221-E-015-003; MOST106-2221-E-015-002
From District to Desktop
From District to Desktop
For Americans to engage in a global information society, it is critical that they have access to high-speed, high-bandwidth Internet, meaning broadband. Network connectivity opens up a wealth of possibilities to K-12 educators. While it has the potential to result in fundamental changes in teaching methods, it can definitely be used to enhance already effective teaching methods. However, schools must have confidence in their network infrastructure before network connectivity will be integrated into the classroom. Networks must be reliable and quick; and, if they do not function, as expected and technical support is not readily available, then educators will not use them. Schools face challenges to the integration of broadband in teaching and learning in the areas of access, skills, policy, and motivation. Last mile support is essential and all stakeholders must work together to address the main issues facing the improvement of broadband in schools. A solution to these situations is on-site support to streamline and enable effective use of broadband-enabled technology. For most schools, the school librarian, in their roles as school leaders, can expertly direct this "last mile" implementation by providing the technology coordination, support, and leadership necessary to address access issues from desktop to district., Keywords: Educational Opportunities, Internet, Access to Information, Computer Networks, Technology Uses in Education, Teacher Effectiveness, Educational Technology, Elementary Secondary Education, Teaching Methods, Reliability, Technical Support, Systems Approach, Educational Practices, Computer System Design, Library Role, Note: This white paper was produced by the Florida State University PALM (Partnerships Advancing Library Media) Center. Support for this paper was provided by Gale Cengage Learning.
From Paper to Pixel
From Paper to Pixel
Digital textbooks will soon be part of every classroom in the United States. This trend accompanies an imperative for schools to facilitate 21st century learning in which educators prepare students to learn and live productively in a global society where accurate and current information is a meaningful part of everyday learning. As technology and the Internet have gained presence in classrooms, instructional materials and activities have become digitally rich. The use of digital textbooks is rapidly gaining ground in education. While colleges and universities have moved headlong into digital textbooks as a means to reduce costs for students, K-12 education is venturing cautiously, but steadily, into using digital textbooks. State laws, many of which have been rewritten to include digital content as an acceptable use of state textbook funding, will serve as catalysts that spur the transition to digital textbooks School librarians can provide school-wide leadership to assist students, teachers, and parent concerns when transitioning to digital textbooks. Working in collaboration with teachers, school librarians promote comprehension through questioning, clarifying, seeking meaning, and discussion. Digital textbooks may represent a way to continue advocacy for the importance of reading as well as for the school librarian's leadership role in technology integration., Keywords: Textbooks, Electronic Publishing, Instructional Materials, Adoption (Ideas), Technology Uses in Education, Educational Technology, Technology Integration, Leadership, Elementary Secondary Education, School Libraries, Librarians, Disabilities, Access to Information, Learner Engagement, Note: This white paper was produced by the Florida State University PALM (Partnerships Advancing Library Media) Center.
Gender Deception in Asynchronous Online Communication
Gender Deception in Asynchronous Online Communication
Gender is a salient feature of identity that is rarely questioned in our physical encounters. We are usually not confused about a person’s gender—generally it’s male or female. However, as the adoption of computer-mediated communication increases, our social reliance on these technologies has made gender easily disguised online. And yet, the phenomenon of gender deception has not been fully investigated. This study adopts a path analysis to examine interconnected cognitive factors that impact online users’ ability to deceive—and detect deception—regarding gender. An asynchronous online game was developed to simulate situations where males were incentivized to communicate like females, and females were incentivized to communicate like males. Twelve hypotheses were tested using path analysis, which resulted in our realization that an actor’s true gender can affect the motivation to deceive; males tend to have higher self-efficacy beliefs in gender deception, and females tend to have a higher success rate in detecting gender deception. Our research suggests that the gender of the message recipient could be a significant factor in uncovering gender deception., Keywords: Human computer interaction, computer-mediated deception, human information behavior, gender, deception, online game, Publication Note: This is a published article of Information Processing and Management. The publisher's version is available at https://doi.org/10.1016/j.ipm.2016.06.004, Preferred Citation: Ho, S. M., Lowry, P. B., Warkentin, M., Yang, Y. Y. , Hollister, J. (2017). Gender deception in asynchronous online communication: A path analysis. Information Processing and Management, 53(1), 21-41. doi: 10.1016/j.ipm.2016.06.004, Grant Number: NSF EAGER #1347113; Florida State University Council of Research & Creativity Planning Grant PG #034138; First Year Assistant Professor grant #033114
Information Use Environments of African-American Dementia Caregivers Over the Course of          Cognitive-Behavioral Therapy for Depression
Information Use Environments of African-American Dementia Caregivers Over the Course of Cognitive-Behavioral Therapy for Depression
Caregivers of older adults with dementia face significant challenges associated with their care recipients' condition and with their own mental and physical well-being. Qualitative research data were collected via interviews with caregivers who participated in the African-American Alzheimer's Caregiver Training and Support (ACTS) research project. Analysis of these data with a focus on information use indicated that participating caregivers' information use environments were shaped by key individuals, settings, and information sources. These included the ACTS counselors, ACTS intervention guidebook, fellow caregivers, use of a personal calendar/datebook, and the identification of key problems and development of goals to help ameliorate those problems. CBT groups fostered sharing, synthesizing, and validating information about dementia caregiving and dementia care resources; the ACTS CBT guidebook served as an important physical touchstone of reliable and portable information. Understanding the specific needs, behaviors, and constraints of African-American caregivers is important to the future development of information components of tailored, depression-reduction interventions., Keywords: information use environments, dementia, caregivers, African-American dementia caregivers, cognitive-behavioral intervention, problem solving, Citation: Michelle M. Kazmer, Robert L. Glueckauf, Jinxuan Ma, Kathleen Burnett. Information use environments of African-American dementia caregivers over the course of cognitive–behavioral therapy for depression. Library & Information Science Research, Volume 35, Issue 3, July 2013, Pages 191–199 http://dx.doi.org/10.1016/j.lisr.2013.02.003
Instructional Preferences of First-Year College Students with Below-proficient          Information Literacy Skills
Instructional Preferences of First-Year College Students with Below-proficient Information Literacy Skills
The Attaining Information Literacy Project has focused on identifying first-year college students with below-proficient information literacy skills, gaining an understanding of those students' self-views and perceptions of information literacy, gaining an understanding of their instructional experiences and preferences, and developing an intervention that will address their instructional needs. Focus groups were conducted with students with below-proficient skills to determine their instructional preferences. The findings from the focus groups indicate that students place a high value on personal relevance in the knowledge and skills they are learning, and they prefer a combination of demonstration and hands-on activities, interaction with the instructor and other students, and the availability of supplemental instructional materials in the form of handouts. In addition, they feel that incentives to participate in instruction are crucial and that a number of communication strategies are needed to advertise effectively the availability of instructional sessions., Keywords: Focus groups, Academic librarians, Information literacy -- Universities & colleges, College freshmen; Self-perception; Community college students -- Attitudes; Motivation in education; Information skills, Citation: Latham, D., & Gross, M. (2013). Instructional Preferences of First-Year College Students with Below-Proficient Information Literacy Skills: A Focus Group Study. College & Research Libraries, 74(5), 430-449.
Leader's Dilemma Game
Leader's Dilemma Game
One of the problems with insider threat research is the lack of a complete 360° view of an insider threat dataset due to inadequate experimental design. This has prevented us from modeling a computational system to protect against insider threat situations. This paper provides a contemporary methodological approach for using online games to simulate insider betrayal for predictive behavioral research. The Leader’s Dilemma Game simulates an insider betrayal scenario for analyzing organizational trust relationships, providing an opportunity to examine the trustworthiness of focal individuals, as measured through humans as sensors engaging in computer-mediated communication. This experimental design provides a window into trustworthiness attribution that can generate a rigorous and relevant behavioral dataset, and contributes to building a cyber laboratory that advances future insider threat study., Keywords: Insider threats, Trusted human computer interactions, Sociotechnical systems, Online game simulation, Experimental design, Publication Note: This is a published article of Information Systems and Frontiers. Publisher's version is available at https://doi.org/10.1007/s10796-015-9599-5., Preferred Citation: Ho, S. M. & Warkentin, M. (2017). Leader's dilemma game: An experimental design for cyber insider threat research. Information Systems Frontiers, 19(2), 377-396. doi: 10.1007/s10796-015-9599-5
Library Influence on Museum Information Work
Library Influence on Museum Information Work
Contemporary literature on the divergence of libraries, archives, and museums over the course of the twentieth century credits the rise of distinct professional practices required to handle different physical forms. This paper explores the extent that librarianship influenced museum information practices in a pre-digital era. Instead of divergence, I find examples where museums adapted library methods to fit their needs instead of developing their own set of professional practices. Because museum professionalization placed an emphasis on discipline-based university training, information work in museums has been incorporated into non-university technical education and on-the-job training programs. That this divergence of information work from academic preparation has fallen along gender lines requires additional attention., Keywords: library, history, museum informatics, museums, LIS Education, Museum Studies, Citation: Urban, R. J.(2014). Library Influence on Museum Information Work. Library Trends 62(3), 596-612. The Johns Hopkins University Press. Accessible at 10.1353/lib.2014.0005
Meta-Analysis of Web-Delivered, Tailored Health Behavior Change Interventions
Meta-Analysis of Web-Delivered, Tailored Health Behavior Change Interventions
Background: Web-based, tailored intervention programs show considerable promise in effecting health-promoting behaviors and improving health outcomes across a variety of medical conditions and patient populations. Purpose: This meta-analysis compares the effects of tailored versus non-tailored, web-based interventions on health behaviors, and explores the influence of key moderators on treatment outcomes. Methods: Forty experimental and quasi-experimental studies (N = 20,180) met criteria for inclusion and were analyzed using meta-analytic procedures. Results: The findings indicated that web- based, tailored interventions effected significantly greater improvement in health outcomes as compared to control conditions both at post-testing, d = .139 (95% CI = .111, .166, p<.001, k = 40) and at follow-up, d = .158 (95% CI = .124, .192, p<.001, k = 21). No evidence of publication bias was found. Conclusions: These results provided further support for the differential benefits of tailored web-based interventions over non-tailored approaches. Analysis of participant/descriptive, intervention, and methodological moderators shed some light on factors that may be important to the success of tailored interventions. Implications of these findings and directions for future research are discussed., Keywords: Internet, web-based, tailoring, intervention, health behavior change, Note: This is an Author's Original Manuscript of an article whose final and definitive form, the Version of Record, has been published in the Journal of Health Communication 2013 © Taylor & Francis, available online at 10.1080/10810730.2013.768727., Citation: Lustria, M. L. A., Noar, S. M., Cortese, J., van Stee, S., Glueckauf, R. L., & Lee, J. (2013). A meta-analysis of web-delivered tailored health behavior change interventions. Journal of Health Communication, 18(9), 1039-1069. doi:10.1080/10810730.2013.768727
Mining Twitter to Assess the Public Perception of the "Internet of Things"
Mining Twitter to Assess the Public Perception of the "Internet of Things"
Social media analysis has shown tremendous potential to understand public's opinion on a wide variety of topics. In this paper, we have mined Twitter to understand the public's perception of the Internet of Things (IoT). We first generated the discussion trends of the IoT from multiple Twitter data sources and validated these trends with Google Trends. We then performed sentiment analysis to gain insights of the public's attitude towards the IoT. As anticipated, our analysis indicates that the public's perception of the IoT is predominantly positive. Further, through topic modeling, we learned that public tweets discussing the IoT were often focused on business and technology. However, the public has great concerns about privacy and security issues toward the IoT based on the frequent appearance of related terms. Nevertheless, no unexpected perceptions were identified through our analysis. Our analysis was challenged by the limited fraction of tweets relevant to our study. Also, the user demographics of Twitter users may not be strongly representative of the population of the general public., Keywords: big data opportunities, Publication Note: The publisher’s version of record is available at https://doi.org/10.1371/journal.pone.0158450
More than Just Books
More than Just Books
Young adults are becoming more and more engaged with social media for a variety of reasons. Social networking sites—such as Facebook, Instagram, and Twitter—provide them with free and open space for exchanges of ideas, collaboration, and expression. For the most part, these online interactions are positive, respectful, and socially responsible. However, a significant number of young adults are using social media for a darker and more dangerous purpose: cyberbullying. While this phenomenon has been discussed widely in the media, what is lacking is a clear and consistent understanding of cyberbullying. This literature review will synthesize the current research on cyberbullying, identify key findings that can be drawn from the research, acknowledge existing research gaps, and suggest opportunities for further research. Although the focus of this article is a review of the literature, a secondary focus is the potential for public librarians, through pastoral care, to serve as a support system for victims of cyberbullying., Keywords: cyberbullying, young adults, libaries, Note: This open access article was published on the website of The Journal of Research on Libraries and Young Adults and can be viewed online at this link., Citation: Phillips, Abigail L. (2014) More that Just Books: Librarians as a Source of Support for Cyberbullied Young Adults. The Journal of Research on Libraries and Young Adults, 4. Retrieved from http://www.yalsa.ala.org/jrlya/2014/05/more-than-just-books-librarians-as-a-source-of-support-for-cyberbullied-young-adults/
Normative Behavior and Information
Normative Behavior and Information
Information access is central to library and information science, yet explorations of its conceptual nature have been limited. Given the importance of information access to the discipline, there is a need for research to create a better understanding of the concept and its many roles in all activities and behaviors related to information. Drawing on the theoretical work of Elfreda Chatman, this article proposes that the study of information access can be facilitated through the recognition and examination of the physical, intellectual, and social aspects of information access. These types of access are examined through three case studies in terms of different information behaviors and contexts, with a particular focus on the importance of social access. The article also discusses the future roles that considerations of social access can play in research and theory., Keywords: Information Access, Social, Information Behavior, Note: Article published in Library and Information Science Research. Version posted here is the peer-reviewed version (post-print). Copyright owned by Elsevier, B. V., Citation: Gary Burnett, Paul T. Jaeger, Kim M. Thompson, Normative behavior and information: The social aspects of information access, Library & Information Science Research, Volume 30, Issue 1, March 2008, Pages 56-66, ISSN 0740-8188, DOI http://dx.doi.org/10.1016/j.lisr.2007.07.003
Parameterized Non-intrusive Reduced Order Model And Error Analysis For General Time-dependent Nonlinear Partial Differential Equations And Its Applications
Parameterized Non-intrusive Reduced Order Model And Error Analysis For General Time-dependent Nonlinear Partial Differential Equations And Its Applications
A novel parameterized non-intrusive reduced order model (P-NIROM) based on proper orthogonal decomposition (POD) has been developed. This P-NIROM is a generic and efficient approach for model reduction of parameterized partial differential equations (P-PDEs). Over existing parameterized reduced order models (P-ROM) (most of them are based on the reduced basis method), it is non-intrusive and independent on partial differential equations and computational codes. During the training process, the Smolyak sparse grid method is used to select a set of parameters over a specific parameterized space (ohm(p) is an element of R-P). For each selected parameter, the reduced basis functions are generated from the snapshots derived from a run of the high fidelity model. More generally, the snapshots and basis function sets for any parameters over Op can be obtained using an interpolation method. The P-NIROM can then be constructed by using our recently developed technique (Xiao et al., 2015 [ 41,42]) where either the Smolyak or radial basis function (RBF) methods are used to generate a set of hyper-surfaces representing the underlying dynamical system over the reduced space. The new P-NIROM technique has been applied to parameterized Navier-Stokes equations and implemented with an unstructured mesh finite element model. The capability of this P-NIROM has been illustrated numerically by two test cases: flow past a cylinder and lock exchange case. The prediction capabilities of the P-NIROM have been evaluated by varying the viscosity, initial and boundary conditions. The results show that this P-NIROM has captured the quasi-totality of the details of the flow with CPU speedup of three orders of magnitude. An error analysis for the P-NIROM has been carried out. (C) 2016 Elsevier B.V. All rights reserved., Keywords: empirical interpolation, finite-element methods, fluid-flow, Non-intrusive ROM, Parameterized, pde, petrov-galerkin methods, pod, proper orthogonal decomposition, rbf, reduction, shallow-water equations, Smolyak sparse grid, sparse grids, strategies, variational data assimilation, Publication Note: The publisher's version of record is available at https://doi.org/10.1016/j.cma.2016.12.033
Participatory design of a health informatics system for rural health practitioners and          disadvantaged women
Participatory design of a health informatics system for rural health practitioners and disadvantaged women
While advances in highly targeted therapies and increased use of mammogram services have contributed to the overall decline of breast cancer deaths in the United States, these benefits have not been distributed equitably. Less educated, poor, rural, non-Hispanic African American women have poorer access to cancer services and are less likely to have had a mammogram than are urban women. Lack of physician recommendations and perceived barriers in accessing diagnostic services are major factors that hinder the uptake of regular mammograms in rural communities. This article reports results of formative research conducted as part of a larger study focused on the participatory development of an electronic reminder system for breast cancer screening. The article discusses insights gained from focus groups with rural patients and clinicians about their information needs, breast cancer screening behaviors, barriers to care, and mammography referral practices., Keywords: participatory design, health informatics, breast cancer screening, rural, underserved, disadvantaged populations, technology adoption, Note: This is an Author's Original Manuscript of an article whose final and definitive form, the Version of Record, has been published in the Journal of the American Society for Information Science and Technology [2010] (copyright Wiley). Please do not distribute without the authors' permission. Citation: Lustria, M. L. A., Kazmer, M. M., Glueckauf, R. L., Hawkins, R. P., Randeree, E., Rosario, I. B., . . . Redmond, S. (2010). Participatory design of a health informatics system for rural health practitioners and disadvantaged women. Journal of the American Society for Information Science and Technology, 61(11), 2243-2255. doi: 10.1002/asi.21390, Citation: Lustria, M. L. A., Kazmer, M. M., Glueckauf, R. L., Hawkins, R. P., Randeree, E., Rosario, I. B., . . . Redmond, S. (2010). Participatory design of a health informatics system for rural health practitioners and disadvantaged women. Journal of the American Society for Information Science and Technology, 61(11), 2243-2255. doi: 10.1002/asi.21390
Perceptions and Experiences of E-learning Among On-Campus Students
Perceptions and Experiences of E-learning Among On-Campus Students
This chapter explores the experiences of on-campus graduate students in Library and Information Studies (LIS) who take online classes using the relevant literature and analyzing data from an exploratory study to begin to answer the overarching research question: What are the factors influencing the perceptions and affective experiences of on-campus graduate students who take courses taught via Web-based instruction? Specific subareas of the existing research literature addressing student perceptions of online learning and hybrid and blended learning provide direction and frame the discussion. Empirical evidence is provided via qualitative data from a study comprising face-to-face, semi-structured interviews with 20 on-campus students at the Florida State University School of Library and Information Studies (SLIS), all of whom must take online courses to complete the Master’s degree at SLIS., Keywords: E-learning, Qualitative research, Preferred Citation: Kazmer, M. M., Gibson, A. N., & Shannon, K. (2013). Perceptions and experiences of e-learning among on-campus students. In A. Sigal (Ed.), Advancing library education: Technological innovation and instructional design (pp. 45-64). Hershey, PA: IGI Global. https://doi.org/10.4018/978-1-4666-3688-0
Peritextual Literacy Framework
Peritextual Literacy Framework
The peritextual literacy framework (PLF) is a tool for accessing, evaluating, and comprehending the content of media using elements that frame the body of a work and mediate its content for the user. Paratextual elements are the focus of research in classification, bibliometrics, reader’s advisory work, and in studies of authorship and publication. However, paratextual theory is just beginning to be acknowledged in LIS. The PLF closes a gap in paratext theory by categorizing the functions of peritext into six types: production, promotional, navigational, intratextual, supplemental, and documentary. The PLF is unique in that it provides both a framework for further research on peritext, as well as a pedagogical tool that supports teaching in the areas of information literacy, media literacy and analysis, critical thinking, reading, and media design and production., Keywords: Peritext, Information literacy, Critical thinking, Media literacy, Publication Note: This article is an accepted manuscript, and the publisher's version of record is available at https://doi.org/10.1016/j.lisr.2017.03.006., Preferred Citation: Gross, Melissa, & Latham, Don. (2017). The peritextual literacy framework: Using the functions of peritext to support critical thinking. Library and Information Science Research, 39(2), 116-123. doi: 10.1016/j.lisr.2017.03.006
Place of Health Information and Socio-Emotional Support in Social Questioning and          Answering
Place of Health Information and Socio-Emotional Support in Social Questioning and Answering
Introduction. Little is known about the quality of health information in social contexts or how socio-emotional factors impact users' evaluations of quality. We explored how librarians, nurses and users assessed the quality of health answers posted on Yahoo! Answers, focusing on socio-emotional reactions displayed, advice given to users and relationships between socio-emotional support, advice and evaluation criteria.Method. Forty evaluators from each of three groups (librarians, nurses and Yahoo! Answers users) evaluated ten health answers using an online tool. Participants answered open-ended questions asking for overall impressions, suggestions and advice for users and any other comments.Analysis. Responses were analysed qualitatively using an inductive open coding approach. Emergent codes were developed for evaluation criteria, emotional reactions and advice themes.Results. Criteria matched with previous research, but greater consideration was given to style, sources and subjectivity by participants in this research. Users value social and emotional support and are accepting of the subjectivity of social questioning-and-answering Websites, but librarians and nurses are less accepting.Conclusion. Both objective and subjective strategies have a place in the seeking, sharing and evaluation of information from social questioning-and-answering sites. Implications exist for design; virtual reference and other library services; and user, patron and patient education., Keywords: information seeking, information behavior, social questioning and answering, health information, social media, qualitative research, social support, emotional support, socio-emotional support, Note: This is a preprint of a paper published in Information Research at http://informationr.net/ir/18-3/paper587.html. Paper © the authors (CC BY-NC-ND)., Citation: Worrall, A., & Oh, S. (2013). The place of health information and socio-emotional support in social questioning and answering. Information Research, 18(3). Retrieved from http://informationr.net/ir/18-3/paper587.html
Practices Of Research Data Curation In Institutional Repositories
Practices Of Research Data Curation In Institutional Repositories
The importance of managing research data has been emphasized by the government, funding agencies, and scholarly communities. Increased access to research data increases the impact and efficiency of scientific activities and funding. Thus, many research institutions have established or plan to establish research data curation services as part of their Institutional Repositories (IRs). However, in order to design effective research data curation services in IRs, and to build active research data providers and user communities around those IRs, it is essential to study current data curation practices and provide rich descriptions of the sociotechnical factors and relationships shaping those practices. Based on 13 interviews with 15 IR staff members from 13 large research universities in the United States, this paper provides a rich, qualitative description of research data curation and use practices in IRs. In particular, the paper identifies data curation and use activities in IRs, as well as their structures, roles played, skills needed, contradictions and problems present, solutions sought, and workarounds applied. The paper can inform the development of best practice guides, infrastructure and service templates, as well as education in research data curation in Library and Information Science (LIS) schools., Keywords: work, science, Publication Note: The publisher's version of record is available at https://doi.org/10.1371/journal.pone.0173987

Pages