Search (7 results, page 1 of 1)

  • × author_ss:"Allen, D."
  • × type_ss:"a"
  1. Karanasios, S.; Thakker, D.; Lau, L.; Allen, D.; Dimitrova, V.; Norman, A.: Making sense of digital traces : an activity theory driven ontological approach (2013) 0.00
    0.003211426 = product of:
      0.022479981 = sum of:
        0.017435152 = weight(_text_:web in 1127) [ClassicSimilarity], result of:
          0.017435152 = score(doc=1127,freq=2.0), product of:
            0.09670874 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.029633347 = queryNorm
            0.18028519 = fieldWeight in 1127, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1127)
        0.0050448296 = weight(_text_:information in 1127) [ClassicSimilarity], result of:
          0.0050448296 = score(doc=1127,freq=2.0), product of:
            0.052020688 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.029633347 = queryNorm
            0.09697737 = fieldWeight in 1127, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1127)
      0.14285715 = coord(2/14)
    
    Abstract
    Social web content such as blogs, videos, and other user-generated content present a vast source of rich "digital-traces" of individuals' experiences. The use of digital traces to provide insight into human behavior remains underdeveloped. Recently, ontological approaches have been exploited for tagging and linking digital traces, with progress made in ontology models for well-defined domains. However, the process of conceptualization for ill-defined domains remains challenging, requiring interdisciplinary efforts to understand the main aspects and capture them in a computer processable form. The primary contribution of this article is a theory-driven approach to ontology development that supports semantic augmentation of digital traces. Specifically, we argue that (a) activity theory can be used to develop more insightful conceptual models of ill-defined activities, which (b) can be used to inform the development of an ontology, and (c) that this ontology can be used to guide the semantic augmentation of digital traces for making sense of phenomena. A case study of interpersonal communication is chosen to illustrate the applicability of the proposed multidisciplinary approach. The benefits of the approach are illustrated through an example application, demonstrating how it may be used to assemble and make sense of digital traces.
    Source
    Journal of the American Society for Information Science and Technology. 64(2013) no.12, S.2452-2467
  2. Ellis, D.; Wilson, T.; Allen, D.: Information science and information systems : conjunct subjects - disjunct disciplines (1999) 0.00
    0.0016115117 = product of:
      0.022561163 = sum of:
        0.022561163 = weight(_text_:information in 4345) [ClassicSimilarity], result of:
          0.022561163 = score(doc=4345,freq=10.0), product of:
            0.052020688 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.029633347 = queryNorm
            0.43369597 = fieldWeight in 4345, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.078125 = fieldNorm(doc=4345)
      0.071428575 = coord(1/14)
    
    Content
    Beitrag eines Themenheftes: The 50th Anniversary of the Journal of the American Society for Information Science. Pt.2: Paradigms, models, and models of information science
    Source
    Journal of the American Society for Information Science. 50(1999) no.12, S.1095-1107
  3. Allen, D.: Information behavior and decision making in time-constrained practice : a dual-processing perspective (2011) 0.00
    0.0015953153 = product of:
      0.022334414 = sum of:
        0.022334414 = weight(_text_:information in 4914) [ClassicSimilarity], result of:
          0.022334414 = score(doc=4914,freq=20.0), product of:
            0.052020688 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.029633347 = queryNorm
            0.42933714 = fieldWeight in 4914, product of:
              4.472136 = tf(freq=20.0), with freq of:
                20.0 = termFreq=20.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0546875 = fieldNorm(doc=4914)
      0.071428575 = coord(1/14)
    
    Abstract
    This article reviews results from a research project designed to understand the mediating influence of information technology on information behavior. During the analysis of the data, five modes of information behavior were uncovered. These provide us with a reconceptualization of core information-seeking and search activities, as well as a fruitful opening to redevelop, augment, or complement existing models of information behavior. The findings resonate with emerging theories of decision making and judgement and illustrate the need for information behavior researchers to undertake research in differing contexts. The work illuminates an issue of current concern for public policy: police use of information in decision making.
    Source
    Journal of the American Society for Information Science and Technology. 62(2011) no.11, S.2165-2181
    Theme
    Information
  4. Mishra, J.; Allen, D.; Pearman, A.: Information seeking, use, and decision making (2015) 0.00
    0.0012972419 = product of:
      0.018161386 = sum of:
        0.018161386 = weight(_text_:information in 1722) [ClassicSimilarity], result of:
          0.018161386 = score(doc=1722,freq=18.0), product of:
            0.052020688 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.029633347 = queryNorm
            0.34911853 = fieldWeight in 1722, product of:
              4.2426405 = tf(freq=18.0), with freq of:
                18.0 = termFreq=18.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.046875 = fieldNorm(doc=1722)
      0.071428575 = coord(1/14)
    
    Abstract
    In this paper we explored three areas: decision making and information seeking, the relationship between information seeking and uncertainty, and the role of expertise in influencing information use. This was undertaken in the context of a qualitative study into decision making in the initial stages of emergency response to major incidents. The research took an interpretive approach in which activity theory is used as an analytical framework. The research provides further evidence that the context of the activity and individual differences influence the choice of decision mode and associated information behavior. We also established that information is often not used to resolve uncertainty in decision making and indeed information is often sought and used after the decision is made to justify the decision. Finally, we point to the significance of both expertise and confidence in understanding information behavior. The contribution of the research to existing theoretical frameworks is discussed and a modified version of Wilson's problem-solving model is proposed.
    Source
    Journal of the Association for Information Science and Technology. 66(2015) no.4, S.662-673
  5. Allen, D.; Given, L.M.; Burnett, G.; Karanasios, S.: Information behavior and information practices (2019) 0.00
    0.0012482718 = product of:
      0.017475804 = sum of:
        0.017475804 = weight(_text_:information in 5428) [ClassicSimilarity], result of:
          0.017475804 = score(doc=5428,freq=6.0), product of:
            0.052020688 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.029633347 = queryNorm
            0.3359395 = fieldWeight in 5428, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.078125 = fieldNorm(doc=5428)
      0.071428575 = coord(1/14)
    
    Source
    Journal of the Association for Information Science and Technology. 70(2019) no.12, S.1299-1301
  6. Allen, D.; Karanasios, S.; Slavova, M.: Working with activity theory : context, technology, and information behavior (2011) 0.00
    0.0011395109 = product of:
      0.015953152 = sum of:
        0.015953152 = weight(_text_:information in 4374) [ClassicSimilarity], result of:
          0.015953152 = score(doc=4374,freq=20.0), product of:
            0.052020688 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.029633347 = queryNorm
            0.30666938 = fieldWeight in 4374, product of:
              4.472136 = tf(freq=20.0), with freq of:
                20.0 = termFreq=20.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0390625 = fieldNorm(doc=4374)
      0.071428575 = coord(1/14)
    
    Abstract
    Over the last 7 years, the AIMTech Research Group in the University of Leeds has used cultural-historical activity theory (CHAT) to inform a range of research activities in the fields of information behavior and information systems. In this article, we identify certain openings and theoretical challenges in the field of information behavior, which sparked our initial interest in CHAT: context, technology, and the link between practice and policy. We demonstrate the relevance of CHAT in studying information behavior and addressing the identified openings and argue that by providing a framework and hierarchy of activity-action-operation and semantic tools, CHAT is able to overcome many of the uncertainties concerning information behavior research. In particular, CHAT provides researchers a theoretical lens to account for context and activity mediation and, by doing so, can increase the significance of information behavior research to practice. In undertaking this endeavour, we have relied on literature from the fields of information science and others where CHAT is employed. We provide a detailed description of how CHAT may be applied to information behavior and account for the concepts we see as relevant to its study.
    Source
    Journal of the American Society for Information Science and Technology. 62(2011) no.4, S.776-788
  7. Hassan Ibrahim, N.; Allen, D.: Information sharing and trust during major incidents : findings from the oil industry (2012) 0.00
    0.0010192095 = product of:
      0.014268933 = sum of:
        0.014268933 = weight(_text_:information in 450) [ClassicSimilarity], result of:
          0.014268933 = score(doc=450,freq=16.0), product of:
            0.052020688 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.029633347 = queryNorm
            0.27429342 = fieldWeight in 450, product of:
              4.0 = tf(freq=16.0), with freq of:
                16.0 = termFreq=16.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0390625 = fieldNorm(doc=450)
      0.071428575 = coord(1/14)
    
    Abstract
    Communication and information sharing during the response to a major incident on oil rigs have been identified as significantly influencing capability to control, manage, and limit the effect of the incident. This article reports on one of the few studies of information sharing during such incidents. Interviews drawing on the critical incident technique were conducted with offshore emergency responders and supplemented by internal organizational reports and observations of emergency response exercises. We propose a counterintuitive relationship between trust and information sharing. We argue that better information sharing plays a crucial role in instilling or enhancing trust and that in the time-bound, uncertain, and highly volatile context of offshore emergency response, if trust collapses, then it must be rebuilt swiftly and this can be done through more effective information sharing. We explore this argument using the activity theory concept of contradictions and argue that apparent contradictions in the activity system and the behavior of emergency responders should be analyzed and interpreted by taking into account crucial contextual characteristics. The article draws on further support from relevant literature, including that of the information science, organization, and communication fields.
    Source
    Journal of the American Society for Information Science and Technology. 63(2012) no.10, S.1916-1928