Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
One of the problems with insider threat research is the lack of a complete 360° view of an insider threat dataset due to inadequate experimental design. This has prevented us from modeling a computational system to protect against...
This investigation uses interview data on student conceptions of and experiences with interacting with information. In addition, student scores on the Information Literacy Test (ILT) provide data that allow for comparison of student...
Museum information professionals meet the needs of the producers and consumers of museum information resources, yet little is known of how their own needs are met or what benefits they obtain from being part of a broader professional...
The impact of COVID-19 pandemic to our society may be unprecedented. While an effective cure or vaccine is under development, maintaining social distance is an essential step in defending personal as well as public health. This study...
Researchers' participation in online RIMSs This article examined how researchers participated in research information management systems (RIMSs), their motivations for participation, and their priorities for those motivations. Profile...
This paper explores the origins of the 1:1 Principle within Dublin Core Metadata Initiative (DCMI). It finds that the need for the 1:1 Principle emerged from prior work among cultural heritage professionals responsible for describing...
Words symbolically represent communicative and behavioral intent, and can provide clues to a communicator’s future actions in online communication. This paper describes a sociotechnical study conducted from 2008 through 2015 to identify...
This article presents themes emerging from semistructured interviews with dementia family caregivers in rural communities who participated in an integrative, cognitive-behavioral and spiritual counseling intervention, and with faith...
Contemporary literature on the divergence of libraries, archives, and museums over the course of the twentieth century credits the rise of distinct professional practices required to handle different physical forms. This paper explores...
Language as a symbolic medium plays an important role in virtual communications. In a primarily linguistic environment such as cyberspace, words are an expressed form of intent and actions. This paper intends to investigate the functions...
Ensuring the quality of information is a critical ethical issue for any information system. Research Information Management Systems (RIMSs) need to engage researchers in sharing research information and knowledge, and ensuring its...
Education for school librarians traditionally blends elements from the fields of LIS and education. A thorough preparation in both professions is necessary since school librarians hold state teaching certification in K-12 library media....
Introduction. This study explores the extent to which an institutional repository (IR) makes papers available and accessible on the open web by using 170 journal articles housed in DigiNole Commons, the IR at Florida State University....
The Role Of Inter-professional Collaboration To Support Science Learning: An Exploratory Study Of The Perceptions And Experiences Of Science Teachers, Public Librarians, And School Librarians
This cross-disciplinary, cross-institutional exploratory study looks at school librarians', public librarians', and high school science teachers' perceptions of and experiences with inter-professional collaboration to support science...
Nearly twenty years ago, W. Boyd Rayward became one of the first academics to examine how electronic information and the functional integration of libraries, archives, and museums has affected, and will affect, the information profession...
The ability to discover cyberbullying "hotspots" on social media is vitally important for purposes of preventing victimization. This study attempts to develop a prediction model for identifying cyberbullying "hotspots" by analyzing the...
Digital textbooks will soon be part of every classroom in the United States. This trend accompanies an imperative for schools to facilitate 21st century learning in which educators prepare students to learn and live productively in a...
In the second half of the 20th century, scientific research in physics, chemistry, and engineering began to focus on the use of large government-funded laboratories. This shift toward so-called big science also brought about a...
This study examined how researchers used research information systems (RIMSs) and the relationships among researchers’ seniority, discipline, and types and extent of RIMS use. Most researchers used RIMSs to discover research content....
Insider threat is a “wicked” contemporary organizational problem. It poses significant threats to organizational operations and information security. This paper reviews insider threat research and outlines key propositions to...
For Americans to engage in a global information society, it is critical that they have access to high-speed, high-bandwidth Internet, meaning broadband. Network connectivity opens up a wealth of possibilities to K-12 educators. While it...
CV19 SelfDefense is an mHealth approach to providing mobile phone users with situational awareness during the coronavirus pandemic, with the goal of protecting and defending personal health. Several individual risk reduction measures...
The paper is an extension of a previous study, which examined student perceptions of a unique freshman seminar offered to Criminology and Criminal Justice students at Florida State University. The seminar is characterized by a heavy...
Introduction. Little is known about the quality of health information in social contexts or how socio-emotional factors impact users' evaluations of quality. We explored how librarians, nurses and users assessed the quality of health...
One perspective not often brought to the study of detective fiction is that from the field of information science. Among other topics, information science is concerned with information behavior, or how people behave with respect to...
The disengaging process is an important aspect of the lifecycle of distributed collaborative pursuits such as virtual groups, online social networking, and e-learning. To explore the disengaging process in online learning, this research...
People spend an increasing amount of time using social media systems to network, share information, learn, or engage in leisure activities (e.g., gaming). Libraries too are establishing a social media presence to promote the library and...
Leadership is an often-misunderstood word, especially in the context of libraries. With multiple definitions for the word 'leadership' and vast numbers of leadership styles, it can be difficult to identity what exactly is meant when...
Caregivers of older adults with dementia face significant challenges associated with their care recipients' condition and with their own mental and physical well-being. Qualitative research data were collected via interviews with...
Within the peer-reviewed literature, there is a shortage of experimental and quasi-experimental studies examining libraries' impact on children's early literacy development. Therefore, Project VIEWS2 (Valuable Initiatives in Early...
The widely known vocabulary gap between health consumers and healthcare professionals hinders information seeking and health dialogue of consumers on end-user health applications. The Open Access and Collaborative Consumer Health...
Exploring digital divides: An examination of eHealth technology use in health information seeking, communication and personal health information management in the USA
Recent government initiatives to deploy health information technology in the USA, coupled with a growing body of scholarly evidence linking online heath information and positive health-related behaviors, indicate a widespread belief that...
Young adults are becoming more and more engaged with social media for a variety of reasons. Social networking sites—such as Facebook, Instagram, and Twitter—provide them with free and open space for exchanges of ideas, collaboration, and...
Creating a successful produsage environment for a required course taught via e-learning requires analyzing various factors: the learning context, learner-led education in required classes, the structure of the class, and reflections and...
The peritextual literacy framework (PLF) is a tool for accessing, evaluating, and comprehending the content of media using elements that frame the body of a work and mediate its content for the user. Paratextual elements are the focus of...
The universe of available cultural heritage metadata schemas grows more complex every day. Existing schemas are optimized for use in the library, archive, or museum domains and to fit the needs of shared services and applications....
Gender is a salient feature of identity that is rarely questioned in our physical encounters. We are usually not confused about a person’s gender—generally it’s male or female. However, as the adoption of computer-mediated communication...
An Abstraction Network is a compact summary of an ontology's structure and content. In previous research, we showed that Abstraction Networks support quality assurance (QA) of biomedical ontologies. The development of an Abstraction...
This study examined the Twitter streams and websites of 36 university innovation centers and identified 14 service categories the centers offered. Exploring the present Twitter use practices of innovation centers and the services the...
The Collections Cubed Survey Instrument (2015) will inquire about organizations' current and/or planned future use of 3D technologies (digitization, publication, and printing). It is intended to be answered by individuals who are...
With social media a normal part of the daily lives of young adults, librarians are using these sites to promote library services. This article investigates the perceptions and attitudes of librarians toward social media as a tool for...
Across the nation, librarians work with caregivers and children to encourage engagement in their early literacy programs. However, these early literacy programs that libraries provide have been left mostly undocumented by research, ...
Cloud computing has become a popular alternative information curation solution for organizations. As more corporate proprietary information is stored in the Cloud, concerns about Cloud information security have also increased. This study...
An online survey sent to the community of professional librarians in the U.S. who provide information literacy instruction in academic libraries provided insights into their practices and the challenges they face. Data include current...
Computer-mediated deception threatens the security of online users’ private and personal information. Previous research confirms that humans are bad lie detectors, while demonstrating that certain observable linguistic features can...
This article presents results from an IMLS-funded project to evaluate the current state of collections in Florida's libraries, archives, and museums, current practices to preserve and conserve these collections, and perceived needs to...
Researchers’ participation in online RIMSs This article examined how researchers participated in research information management systems (RIMSs), their motivations for participation, and their priorities for those motivations. Profile...
The Attaining Information Literacy Project has focused on identifying first-year college students with below-proficient information literacy skills, gaining an understanding of those students' self-views and perceptions of information...
Social media users have the freedom to propagate information, but this freedom has come with a price as social media has also become a channel to disseminate false information. It is thus vitally important to detect fake news in social...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.