• 검색 결과가 없습니다.

JISTaP Vol.8 No.4

N/A
N/A
Protected

Academic year: 2023

Share "JISTaP Vol.8 No.4"

Copied!
94
0
0

로드 중.... (전체 텍스트 보기)

전체 글

Therefore, the purpose of this study is to empirically classify social media services and messengers. Following this empirical approach, a total of 640 functions of selected social media services and messengers were identified.

Fig. 1. Research model.
Fig. 1. Research model.

Data Analysis

In the present research, the results of the coding step were sufficient as the initial Krippendorff's alpha values ​​were found to be in an acceptable range (see Table 1). The resulting distribution of data points resembled clusters produced by Ward's method (compare Fig. 3 with Fig. 5, and Fig. 4 with Fig. 6) confirming that the clusters were not randomly formed.

RESULTS

Ranking of the Services with Respect to Their Functions (RQ 1)

To generate the MDS solution, the distance matrix calculated earlier for the cluster analysis was passed to the PROXSCAL module of the SPSS. The differences mostly relate to the notification settings as well as the content posting aspect of the service – the latter is basically non-existent in the mobile app, but ubiquitous in the web counterpart.

Ranking of the Most Implemented Functions (RQ 2)

Among other things, the mobile version of Mendeley lacks a large number of features that belong to the account, communication, content, and profile categories. In general it can be said that the examined web services have a higher number of individual functions with an average of 139.9 functions, compared to an average of 124.7 functions for the corresponding mobile versions.

Classification of Social Media and Instant Messaging Services according to Functions (RQ 3)

The superclass of sharing services is further subdivided into self-presentation services and information and entertainment services. On the other hand, these services are differentiated by entertainment services and professional self-presentation services.

Fig. 5.  Dendrogram representing cluster analysis results regarding the  mobile applications of social media services and messengers.
Fig. 5. Dendrogram representing cluster analysis results regarding the mobile applications of social media services and messengers.

DISCUSSION

Limitations

Finally, while the resulting clusters were not formed randomly, an automatic clustering approach does not guarantee a perfect result. Additionally, Pinterest does not have many similarities to LinkedIn or ResearchGate, leading to the assumption that it was sorted into this cluster solely due to

Further Research

Trying to understand social media users and usage: Forgotten features of social media platforms. Faloutsos (Eds.), Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (pp. 579–583).

Machine-actionable Data Management Plans Model Analysis and Improvement Direction

  • INTRODUCTION
  • PREVIOUS STUDIES
  • RESEARCH METHODS AND LIMITATIONS The purpose of this study is to analyze a practical data
  • THEORETICAL BACKGROUND 1. maDMPs
    • Persistent Identifiers
  • maDMPS PROPERTY ANALYSIS
    • RDCS Model Analysis
    • DMP Property Analysis
    • Namespace Analysis
    • Identifier Analysis
  • CONCLUSIONS AND SUGGESTIONS

Researcher identifier Dataset > Distribution > access_url Access and Security n/a Contact > post Plan data contact n/a Dataset > Distribution > download_. Contact > name Plan data contact n/a Dataset > Distribution > data_access Access and security accessRight DMStaff (= contributor) > staff_id >.

Fig. 1 shows the research method used in this study. In this  study, the RDCS data model was analyzed in four aspects
Fig. 1 shows the research method used in this study. In this study, the RDCS data model was analyzed in four aspects

Hermeneutic Phenomenology in Supporting Research and Information Services: Contributions to Information Science

HERMENEUTICS AND PHENOMENOLOGY: A BRIEF HISTORY

  • Hermeneutic Methodology as a Research Practice
  • Phenomenology in Research Methodology Husserl has been called the father of phenomenology (Giorgi,

On the other hand, instead of the subject, the researcher must meet the intentions, motivations and desires that shape human and social phenomena. Husserl saw this method as a means of access in the true sense of the word through deeper penetration into reality (VanScoy & Evenstad, 2015).

HERMENEUTIC PHENOMENOLOGY AND INFORMATION SCIENCE

  • Supporting Research Services 1. Data collection
  • Supporting Information Services 1. Information technology

Hermeneutic phenomenology recognizes the researcher's effect on the direction and representation of the study (Hjørland, 2003). In this process, the researcher creates information with the help of the research participant as he enters the hermeneutic cycle of understanding (Laverty, 2003). The ontology of the information system is the result of innovations achieved in the light of suspension.

More precisely, in the information environment of the library, the user, the librarian and the library each find meaning for themselves.

CONCLUSION

However, for this we must first have a clear diagnosis of the hermeneutic context, which is always present. The ontology of the information system must be foreseen with respect to stopping and designed in such a way that it allows the user to avoid stopping as much as possible (Hjørland, 2004). In fact, hermeneutic phenomenology considers the ontology of the library as prior to the study of its functions and tries to understand all the assumptions that were taken for granted in the work of the library.

When being in the world, according to Heidegger, is participation in the world, being a user of information will not be a passive phenomenon, but an experience of being part of the world.

Research Trends of ‘One Belt One Road’ in Korean Academic Circles

RESEARCH METHODOLOGY AND DATA ACQUISITION

  • Study Domain
  • Research Methodology
  • Data Filtering

After listening to the valuable opinions of the relevant researchers about OROB, the proposed study set the KCI database in the Web of Science as the study domain of the proposed research. As mentioned in the previous section, the primary objective of the proposed research is to analyze the research trend of OBOR in KAC. Some articles could not display keywords due to system reasons and were considered invalid in the proposed research.

The statistical information (some information omitted) from the last valid 190 papers are listed in Table 1.

Table 1. Statistical information of retrieved literatures from 2014 to 2018 a)
Table 1. Statistical information of retrieved literatures from 2014 to 2018 a)

RESULTS CENTERED ON KEYWORDS

  • The Establishment of Core-Keywords
  • Co-Word Network Map
  • Annual Keyword Map Analysis
  • Individual Keyword Map Analysis

3 that the papers on OBOR in KAC are focused on OBOR keywords and used China, AIIB, Silk Road Economic Belt, Eurasian Initiative, Xi Jinping and the Chinese Dream and the 21st Century Maritime Silk Road as keywords. According to the ranking of the central keywords and other high-frequency keywords in the image. In the following text, the longitudinal analysis of OBOR in KAC will be carried out on the basis of

Second, the China-centric network map reflects that the KAC has some expectations from economic cooperation with China, such as cooperation with China in the Eurasia Initiative.

Table 2. Non-binarization co-word matrix of keywords (partial)
Table 2. Non-binarization co-word matrix of keywords (partial)

DISCUSSION AND CONCLUSIONS 1. Discussion

  • Conclusions

Few papers discussed how the OBOR was researched in the KAC, not to mention the research trend. These papers focus on the OBOR and other keywords such as China, AIIB, Silk Road Economic Belt, Eurasia Initiative, Xi Jinping, Chinese Dream, and 21st-Century Maritime Silk Road. One of the main findings of the proposed study is that the research efforts at the OBOR in the KAC are sustainable and that research enthusiasm is gradually increasing.

The authors believe that this study can help global researchers to understand the research trend of KAC on OBOR.

Collaborative Information Seeking in Digital Libraries, Learning Styles, Users’ Experience, and Task Complexity

  • LITERATURE REVIEW
  • METHOD
    • Participants
    • Settings
    • Collaborative Information Seeking Tasks
    • Questionnaires
  • FINDINGS
    • Learning Styles and CIS
    • User Experience and CIS
  • DISCUSSION AND CONCLUSION

A significant portion of information seeking in today's academic information retrieval activities takes place in the digital environment. Does task complexity make a difference in the CIS and its relationship to learning styles and user experience. Another study (Parvin, Kheibar, Mihanpour, & Rafi, 2019) found no association between Kolb's learning style and students' fear of seeking information.

The impact of academic libraries on student academic achievement: The relationship between learning styles and information seeking anxiety.

Table 1. Frequency distribution of respondents based on learning style
Table 1. Frequency distribution of respondents based on learning style

Survey of Automatic Query Expansion for Arabic Text Retrieval

QUERY EXPANSION

  • Automatic Query Expansion
  • Automatic Query Expansion Approaches
  • Automatic Query Expansion Stages

MQE is based on the skilled decision of the user, who selects the candidate terms and manually reformulates the initial query. AQE selects the words that have the highest weight, which will contribute to reformulating the original query in improving retrieval performance. A new suitable style of the data depends on this step, so that the query can be expanded.

An individual basis is used to select the top terms and the interdependencies of the candidate terms are ignored (Lin & Murray, 2005).

AUTOMATIC QUERY EXPANSION METHODS Carpineto and Romano (2012) categorize AQE methods

According to Ooi et al. 2015), AQE can be divided into four stages, i.e., data preprocessing, ranking and generation of candidate terms, selection of new terms, and query reformulation. Sorting and generating candidate terms Sorting and generating candidate terms is considered the most important stage because the selected terms will be a small number added to the original query. The process is to reconstruct the original query and add the new candidate terms that have the highest weight.

Many methods, such as the Rocchio algorithm, have been proposed to find new candidate terms correlated with query terms using different techniques that depend on different data sources.

ARABIC QUERY EXPANSION APPROACHES As mentioned earlier, Arabic has a large vocabulary. The

  • Arabic Query Expansion Based on WordNet One of the linguistic QE techniques is to find the related
  • Arabic Query Expansion Based on Pseudo Relevance Feedback
  • Arabic Query Expansion Based on Stemming Another linguistic-based approach which expands the
  • Arabic Query Expansion Based on Co-occurrence of Words
  • Arabic Query Expansion Based on Word Embedding

The proposed method deals with two different datasets - the Arabic corpus and the English corpus. The connection can occur between the synonym and one of the query terms or their synonyms. Each word of the documents retrieved above will receive a score based on the co-occurrence of the query terms.

WE similarities have been incorporated into four PRF models, namely the Kullback-Leibler divergence (KLD) (Carpineto, De Mori, Romano & Bigi, 2001), the Bose-Einstein 2 (Bo2) family of divergence from randomness models (Amati & Van Rijsbergen , 2002 ) and Log-Logistic (LL), as well as the Smoothed Power-Law (SPL) family of information-based PRF models ( Clinchant & Gaussier, 2013 ).

Table 1. Summary of the studies which use QE approaches for the Arabic language
Table 1. Summary of the studies which use QE approaches for the Arabic language

DISCUSSION

2012) compared the AWN ontology with the English WordNet ontology, finding no real benefit in terms of Arabic development in any of the evaluation measures adopted, regardless of the use of a specialized corpus. On the other hand, the main problem of the preprocessing task for QE in Arabic is that there is no general standard list of stop words. The use of an ontology or other similar resources such as WordNet seems useful to improve search performance in some cases.

In light of the aforementioned review, one can conclude that the most cited articles are by Hammo et al.

CONCLUSION

Proceedings of the 20th Annual ACM SIGIR International Conference on Research and Development in Information Retrieval. Proceedings of the 29th Annual ACM SIGIR International Conference on Research and Development in Information Retrieval (pp. 115-122). Proceedings of the 31st Annual ACM SIGIR International Conference on Research and Development in Information Retrieval (pp. 235-242).

Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval (s. 363-372).

Originality and Copyright

The Journal of Information Science Theory and Practice (JISTaP), published quarterly by the Korea Institute of Science and Technology (KISTI), welcomes submissions that reflect a wide range of perspectives and approaches in various fields of information science theory, application, and practice. .

Peer Review

Manuscript Submission

Open Access

Manuscript Guidelines

All articles must be submitted in single column text on standard Letter Size paper cm) with normal margins. All articles must be submitted in single column text on standard letter size paper cm) with normal margins[1. The second-level subsection heading should be in 11-point italics with the first letter of each word capitalized.

All figures and tables should be placed after the bibliography at the end of the manuscript.

Fig. 1. Distribution of authors over publication count.
Fig. 1. Distribution of authors over publication count.

수치

Table 1.  List of investigated social media services and messengers and the  initial Krippendorff’s alpha values for each coded service
Fig. 2. Excerpt of the coding table.
Fig. 3.  Results of the multidimensional scaling for the mobile applications  of social media services and messengers.
Table 2.  Ranking of mobile and web applications of social media and  instant messaging services by number of functions
+7

참조

관련 문서

제주의 유니크베뉴 관광지와 호텔의 만족도가 높은 항목에는 행사장 및 지역 사회 안전도 · 개최지의 방역에 대한 항목이 높게 조사되었으며, 관광지에서