This study presents a test of the Anxiety-Expectation Mediation (AEM) model of library anxiety. The AEM model contains variables that are directly or indirectly related to information search performance, as measured b...
详细信息
This study presents a test of the Anxiety-Expectation Mediation (AEM) model of library anxiety. The AEM model contains variables that are directly or indirectly related to information search performance, as measured by students' scores on their research proposals. This model posits that library anxiety and self-perception serve as factors that mediate the relationship between performance in writing a research proposal and other cognitive, personality, and demographic variables. The model was tested using 225 graduate students enrolled in several sections of an introductory-level course at a midsouthern university. Structural equation modeling techniques supported the AEM model. In particular, library anxiety and research achievement were reciprocally related. Furthermore, library anxiety mediated the relationship between research performance and the following variables: age, grade point average, learning style, academic procrastination, and self-perception. The path analysis also revealed a direct, positive path from self-perception to research performance. In addition, self-perception moderated the relationship between research achievement and academic procrastination, perfectionism, and hope. The AEM model of library anxiety suggests that Wine's (1980) Cognitive-Attentional-Interference theory, Onwuegbuzie, Jiao, and Bostick's (in press) ILP model of library anxiety, and Bandura's (1977) self-efficacy theory can be applied to the library and information context. Findings are discussed within the framework of current social-psychological models of educational achievement.
The ever growing popularity of the Internet as a source of information, coupled with the accompanying growth in the number of documents made available through the World Wide Web, is leading to an increasing demand for...
详细信息
The ever growing popularity of the Internet as a source of information, coupled with the accompanying growth in the number of documents made available through the World Wide Web, is leading to an increasing demand for more efficient and accurate information retrieval tools. Numerous techniques have been proposed and tried for improving the effectiveness of searching the World Wide Web for documents relevant to a given topic of interest. The specification of appropriate keywords and phrases by the user is crucial for the successful execution of a query as measured by the relevance of documents retrieved. Lack of users' knowledge on the search topic and their changing information needs often make it difficult for them to find suitable keywords or phrases for a query. This results in searches that fail to cover all likely aspects of the topic of interest. We describe a scheme that attempts to remedy this situation by automatically expanding the user query through the analysis of initially retrieved documents. Experimental results to demonstrate the effectiveness of the query expansion scheme are presented.
This article reports on the relevance and importance of being able to measure software in a variety of methods. The author asserts that as software is in itself a knowledge acquisition activity, software designers sho...
详细信息
This article reports on the relevance and importance of being able to measure software in a variety of methods. The author asserts that as software is in itself a knowledge acquisition activity, software designers should understand the building blocks of upon which it is designed even though the processes have been vastly simplified. Line of code (LOC) writing is now supported with robust languages tools and pre-built components, and the author contends this is a good decoupling of knowledge discovery from knowledge delivery, but the knowledge content of a accelerated production process is inherently diminished.
Computer documents have evolved over time. As a result, this article presents the results from a survey that redefines what a document is. The study discovered that people think a document is something that holds info...
详细信息
Computer documents have evolved over time. As a result, this article presents the results from a survey that redefines what a document is. The study discovered that people think a document is something that holds information;is manipulated by people (not the system);and is anything that can be seen, heard, or touched. Second, based on the results of the survey, we present a novel, real-time visualization tool that shows the results of nonintrusive tracking of documents and applications for a 6-month period. The tool focuses on document provenancethe history or genealogy of a document. It shows every document and application used as well as what happened to those documents (e.g., if the documents were moved, renamed, and/or deleted). These evaluations of the visualization tool are promising in that it helped with refinding documents, finding behavior workflow patterns, finding insight into general document usage, and performing forensic-type activities.
This paper develops a solution to the problem of importing existing TEI data into an existing object-oriented database schema without changing the TEI data or the database schema. The solution is based on architectura...
详细信息
This paper develops a solution to the problem of importing existing TEI data into an existing object-oriented database schema without changing the TEI data or the database schema. The solution is based on architectural processing. Two meta-DTDs are used, one to define the architectural forms for the object model and another to map the existing SGML data onto those forms. A full example using a critical text in TEI markup is developed.
Discusses the dilemma of developing electronic patient records for diabetes in primary and secondary care. Legislation in the United States that addresses the patients' right to access their own data; Principles o...
详细信息
Discusses the dilemma of developing electronic patient records for diabetes in primary and secondary care. Legislation in the United States that addresses the patients' right to access their own data; Principles of confidentiality that apply to medical records; Rules on the design and management of electronic patient data systems.
We are experimenting with the representation of a DTD and associated documents (i.e., documents conformant to the DTD) in a knowledge representation (KR) system, in order to provide more sophisticated query and retrie...
详细信息
We are experimenting with the representation of a DTD and associated documents (i.e., documents conformant to the DTD) in a knowledge representation (KR) system, in order to provide more sophisticated query and retrieval from TEI documents than current systems provide. We are using CLASSIC, a frame-based representation system developed at AT&T Bell Laboratories. Like many KR systems, CLASSIC enables the definition of structured concepts/frames, their organization into taxonomies, the creation and manipulation of individual instances of such concepts, and inference such as inheritance, relation transitivity, inverses, etc. In addition, CLASSIC provides for the key inferences of subsumption and classification. By representing a document as an individual instance of a hierarchy of concepts derived from the DTD, and by allowing the creation of additional user-defined concepts and relations, sophisticated query and retrieval operations can be performed. This paper describes CLASSIC and the formalism of description logic that underlies it, and demonstrates how it can be used for enhanced retrieval from richly encoded documents.
How do we use systems to find information? What equipment is employed? This paper reviews the basic storage modes used, some of the past developments in this area, our current status in strategies for searching, the o...
详细信息
How do we use systems to find information? What equipment is employed? This paper reviews the basic storage modes used, some of the past developments in this area, our current status in strategies for searching, the output forms for in formation, the different types of equipment in use, and presents an outline of needed developments. [ABSTRACT FROM AUTHOR]
The article offers information about the ideal design process of computer software development. A design process should be one that generates a large amount of explanatory information, in the form of arguments for cor...
详细信息
The article offers information about the ideal design process of computer software development. A design process should be one that generates a large amount of explanatory information, in the form of arguments for correctness, efficiency, and generate fitness and in the reasons for rejecting alternatives. Writing explanations as one goes along the process gives him a cascading benefit. Furthermore, explanatory technical writing uses texts as the primary mode of expression, with diagrams playing an important, but subsidiary, role of illustrating selected aspects only.
Utilizing the Hirsch index h and some of its variants for an exploratory factor analysis we discuss whether one of the most important Hirsch-type indices, namely the g-index, comprises information about not only the s...
详细信息
Utilizing the Hirsch index h and some of its variants for an exploratory factor analysis we discuss whether one of the most important Hirsch-type indices, namely the g-index, comprises information about not only the size of the productive core but also the impact of the papers in the core. We also study the effect of logarithmic and square-root transformation of the data utilized in the factor analysis. To demonstrate our approach we use a real data example analysing the citation records of 26 physicists compiled from the Web of Science.
暂无评论