Therefore, the purpose of this study is to empirically classify social media services and messengers. Following this empirical approach, a total of 640 functions of selected social media services and messengers were identified.
Data Analysis
In the present research, the results of the coding step were sufficient as the initial Krippendorff's alpha values were found to be in an acceptable range (see Table 1). The resulting distribution of data points resembled clusters produced by Ward's method (compare Fig. 3 with Fig. 5, and Fig. 4 with Fig. 6) confirming that the clusters were not randomly formed.
RESULTS
Ranking of the Services with Respect to Their Functions (RQ 1)
To generate the MDS solution, the distance matrix calculated earlier for the cluster analysis was passed to the PROXSCAL module of the SPSS. The differences mostly relate to the notification settings as well as the content posting aspect of the service – the latter is basically non-existent in the mobile app, but ubiquitous in the web counterpart.
Ranking of the Most Implemented Functions (RQ 2)
Among other things, the mobile version of Mendeley lacks a large number of features that belong to the account, communication, content, and profile categories. In general it can be said that the examined web services have a higher number of individual functions with an average of 139.9 functions, compared to an average of 124.7 functions for the corresponding mobile versions.
Classification of Social Media and Instant Messaging Services according to Functions (RQ 3)
The superclass of sharing services is further subdivided into self-presentation services and information and entertainment services. On the other hand, these services are differentiated by entertainment services and professional self-presentation services.
DISCUSSION
Limitations
Finally, while the resulting clusters were not formed randomly, an automatic clustering approach does not guarantee a perfect result. Additionally, Pinterest does not have many similarities to LinkedIn or ResearchGate, leading to the assumption that it was sorted into this cluster solely due to
Further Research
Trying to understand social media users and usage: Forgotten features of social media platforms. Faloutsos (Eds.), Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (pp. 579–583).
Machine-actionable Data Management Plans Model Analysis and Improvement Direction
- INTRODUCTION
- PREVIOUS STUDIES
- RESEARCH METHODS AND LIMITATIONS The purpose of this study is to analyze a practical data
- THEORETICAL BACKGROUND 1. maDMPs
- Persistent Identifiers
- maDMPS PROPERTY ANALYSIS
- RDCS Model Analysis
- DMP Property Analysis
- Namespace Analysis
- Identifier Analysis
- CONCLUSIONS AND SUGGESTIONS
Researcher identifier Dataset > Distribution > access_url Access and Security n/a Contact > post Plan data contact n/a Dataset > Distribution > download_. Contact > name Plan data contact n/a Dataset > Distribution > data_access Access and security accessRight DMStaff (= contributor) > staff_id >.
Hermeneutic Phenomenology in Supporting Research and Information Services: Contributions to Information Science
HERMENEUTICS AND PHENOMENOLOGY: A BRIEF HISTORY
- Hermeneutic Methodology as a Research Practice
- Phenomenology in Research Methodology Husserl has been called the father of phenomenology (Giorgi,
On the other hand, instead of the subject, the researcher must meet the intentions, motivations and desires that shape human and social phenomena. Husserl saw this method as a means of access in the true sense of the word through deeper penetration into reality (VanScoy & Evenstad, 2015).
HERMENEUTIC PHENOMENOLOGY AND INFORMATION SCIENCE
- Supporting Research Services 1. Data collection
- Supporting Information Services 1. Information technology
Hermeneutic phenomenology recognizes the researcher's effect on the direction and representation of the study (Hjørland, 2003). In this process, the researcher creates information with the help of the research participant as he enters the hermeneutic cycle of understanding (Laverty, 2003). The ontology of the information system is the result of innovations achieved in the light of suspension.
More precisely, in the information environment of the library, the user, the librarian and the library each find meaning for themselves.
CONCLUSION
However, for this we must first have a clear diagnosis of the hermeneutic context, which is always present. The ontology of the information system must be foreseen with respect to stopping and designed in such a way that it allows the user to avoid stopping as much as possible (Hjørland, 2004). In fact, hermeneutic phenomenology considers the ontology of the library as prior to the study of its functions and tries to understand all the assumptions that were taken for granted in the work of the library.
When being in the world, according to Heidegger, is participation in the world, being a user of information will not be a passive phenomenon, but an experience of being part of the world.
Research Trends of ‘One Belt One Road’ in Korean Academic Circles
RESEARCH METHODOLOGY AND DATA ACQUISITION
- Study Domain
- Research Methodology
- Data Filtering
After listening to the valuable opinions of the relevant researchers about OROB, the proposed study set the KCI database in the Web of Science as the study domain of the proposed research. As mentioned in the previous section, the primary objective of the proposed research is to analyze the research trend of OBOR in KAC. Some articles could not display keywords due to system reasons and were considered invalid in the proposed research.
The statistical information (some information omitted) from the last valid 190 papers are listed in Table 1.
RESULTS CENTERED ON KEYWORDS
- The Establishment of Core-Keywords
- Co-Word Network Map
- Annual Keyword Map Analysis
- Individual Keyword Map Analysis
3 that the papers on OBOR in KAC are focused on OBOR keywords and used China, AIIB, Silk Road Economic Belt, Eurasian Initiative, Xi Jinping and the Chinese Dream and the 21st Century Maritime Silk Road as keywords. According to the ranking of the central keywords and other high-frequency keywords in the image. In the following text, the longitudinal analysis of OBOR in KAC will be carried out on the basis of
Second, the China-centric network map reflects that the KAC has some expectations from economic cooperation with China, such as cooperation with China in the Eurasia Initiative.
DISCUSSION AND CONCLUSIONS 1. Discussion
- Conclusions
Few papers discussed how the OBOR was researched in the KAC, not to mention the research trend. These papers focus on the OBOR and other keywords such as China, AIIB, Silk Road Economic Belt, Eurasia Initiative, Xi Jinping, Chinese Dream, and 21st-Century Maritime Silk Road. One of the main findings of the proposed study is that the research efforts at the OBOR in the KAC are sustainable and that research enthusiasm is gradually increasing.
The authors believe that this study can help global researchers to understand the research trend of KAC on OBOR.
Collaborative Information Seeking in Digital Libraries, Learning Styles, Users’ Experience, and Task Complexity
- LITERATURE REVIEW
- METHOD
- Participants
- Settings
- Collaborative Information Seeking Tasks
- Questionnaires
- FINDINGS
- Learning Styles and CIS
- User Experience and CIS
- DISCUSSION AND CONCLUSION
A significant portion of information seeking in today's academic information retrieval activities takes place in the digital environment. Does task complexity make a difference in the CIS and its relationship to learning styles and user experience. Another study (Parvin, Kheibar, Mihanpour, & Rafi, 2019) found no association between Kolb's learning style and students' fear of seeking information.
The impact of academic libraries on student academic achievement: The relationship between learning styles and information seeking anxiety.
Survey of Automatic Query Expansion for Arabic Text Retrieval
QUERY EXPANSION
- Automatic Query Expansion
- Automatic Query Expansion Approaches
- Automatic Query Expansion Stages
MQE is based on the skilled decision of the user, who selects the candidate terms and manually reformulates the initial query. AQE selects the words that have the highest weight, which will contribute to reformulating the original query in improving retrieval performance. A new suitable style of the data depends on this step, so that the query can be expanded.
An individual basis is used to select the top terms and the interdependencies of the candidate terms are ignored (Lin & Murray, 2005).
AUTOMATIC QUERY EXPANSION METHODS Carpineto and Romano (2012) categorize AQE methods
According to Ooi et al. 2015), AQE can be divided into four stages, i.e., data preprocessing, ranking and generation of candidate terms, selection of new terms, and query reformulation. Sorting and generating candidate terms Sorting and generating candidate terms is considered the most important stage because the selected terms will be a small number added to the original query. The process is to reconstruct the original query and add the new candidate terms that have the highest weight.
Many methods, such as the Rocchio algorithm, have been proposed to find new candidate terms correlated with query terms using different techniques that depend on different data sources.
ARABIC QUERY EXPANSION APPROACHES As mentioned earlier, Arabic has a large vocabulary. The
- Arabic Query Expansion Based on WordNet One of the linguistic QE techniques is to find the related
- Arabic Query Expansion Based on Pseudo Relevance Feedback
- Arabic Query Expansion Based on Stemming Another linguistic-based approach which expands the
- Arabic Query Expansion Based on Co-occurrence of Words
- Arabic Query Expansion Based on Word Embedding
The proposed method deals with two different datasets - the Arabic corpus and the English corpus. The connection can occur between the synonym and one of the query terms or their synonyms. Each word of the documents retrieved above will receive a score based on the co-occurrence of the query terms.
WE similarities have been incorporated into four PRF models, namely the Kullback-Leibler divergence (KLD) (Carpineto, De Mori, Romano & Bigi, 2001), the Bose-Einstein 2 (Bo2) family of divergence from randomness models (Amati & Van Rijsbergen , 2002 ) and Log-Logistic (LL), as well as the Smoothed Power-Law (SPL) family of information-based PRF models ( Clinchant & Gaussier, 2013 ).
DISCUSSION
2012) compared the AWN ontology with the English WordNet ontology, finding no real benefit in terms of Arabic development in any of the evaluation measures adopted, regardless of the use of a specialized corpus. On the other hand, the main problem of the preprocessing task for QE in Arabic is that there is no general standard list of stop words. The use of an ontology or other similar resources such as WordNet seems useful to improve search performance in some cases.
In light of the aforementioned review, one can conclude that the most cited articles are by Hammo et al.
CONCLUSION
Proceedings of the 20th Annual ACM SIGIR International Conference on Research and Development in Information Retrieval. Proceedings of the 29th Annual ACM SIGIR International Conference on Research and Development in Information Retrieval (pp. 115-122). Proceedings of the 31st Annual ACM SIGIR International Conference on Research and Development in Information Retrieval (pp. 235-242).
Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval (s. 363-372).
Originality and Copyright
The Journal of Information Science Theory and Practice (JISTaP), published quarterly by the Korea Institute of Science and Technology (KISTI), welcomes submissions that reflect a wide range of perspectives and approaches in various fields of information science theory, application, and practice. .
Peer Review
Manuscript Submission
Open Access
Manuscript Guidelines
All articles must be submitted in single column text on standard Letter Size paper cm) with normal margins. All articles must be submitted in single column text on standard letter size paper cm) with normal margins[1. The second-level subsection heading should be in 11-point italics with the first letter of each word capitalized.
All figures and tables should be placed after the bibliography at the end of the manuscript.