The research described in this paper provides insights into tools and methods which are used by professional information workers to keep and to manage their personal information. A literature study was carried out on 23 scholar papers and articles, retrieved from the ACM Digital Library and Library and Information Science Abstracts (LISA). The research questions were: - How do information workers keep and manage their information sources? - What aims do they have when building personal information collections? - What problems do they experience with the use and management of their personal collections? The main conclusion from the literature is that professional information workers use different tools and approaches for personal information management, depending on their personal style, the types of information in their collections and the devices which they use for retrieval. The main problem that they experience is that of information fragmentation over different collections and different devices. These findings can provide input for improvement of information literacy curricula in Higher Education. It has been remarked that scholar research and literature on Personal Information Management do not pay a lot of attention to the keeping and management of (bibliographic) data from external documentation. How people process the information from those sources and how this stimulates their personal learning, is completely overlooked. [The original publication is available at www.elpub.net]
In The Guardian, Alan Rushbridger compared the future of newspapers to climate change. Five years ago, many climatologists were sceptical whether climate change was a real and serious issue. Today, most scientists agree that global warm ing is a fact of life. In the world of newspapers, at present, almost everyone agrees that the traditional, particularly quality, newspapers are facing huge problems. The blog ‘Print is dead’ chose a fitting title for Rushbridger’s article: Print is dead: an inconvenient truth. Another traditional icon of the information society, the public library, is facing similar problems as the newspaper industry. The information function, the core business of the library, is under threat. People tend to use search engines at home instead of visiting and accessing the (virtual) library and ask for professional advice. It is important to note that these search engines are more and more driven by commercial interests than by a genuine concern of quality information. Ranking algorithms are more beauty contests and quality stamps. (Local) governments tend to demand more and more new social services included in the library. Commercial publishers’ concerns are understandable. In the United States and Europe the world of the press faces a real crisis, and the battle to survive is a race against the clock. Newspapers, especially the quality press, will only survive if they can persuade the audience of generation Z to read them on the Web. Failure to do this will signal their demise. We will discuss the tensions in this field by addressing the mutual relationships between the stock market driven economic business model and the traditional characteristics of quality journalism as well as the cultural changes in consuming news stories and analyses in print and on the web. The key question is: how these societal tendencies will affect the quality of information consumed by the public and hence the public quality of discourse? This paper aims to address both issues by asking whether quality is really under siege and to what extent can the new, convergent media improve the quality of the information society by fostering the interaction of the roles of journalists and librarians. In the new world of journalism and librarianship both will prove their roles and functions by engagement, enrichment, empowerment and entertainment for both readers and library users.
Information literacy is essential for the operation of a civic society in which all people may participate (Catts & Lau, 2008). The aim of the Fact Checking Factory (FCF) is to accomplish cooperation between students and local citizens. We aim to create an agenda for local decision-makers with the project objectives of fact-checking local news. http://ecil2018.ilconf.org/#
Due to societal developments, like the introduction of the ‘civil society’, policy stimulating longer living at home and the separation of housing and care, the housing situation of older citizens is a relevant and pressing issue for housing-, governance- and care organizations. The current situation of living with care already benefits from technological advancement. The wide application of technology especially in care homes brings the emergence of a new source of information that becomes invaluable in order to understand how the smart urban environment affects the health of older people. The goal of this proposal is to develop an approach for designing smart neighborhoods, in order to assist and engage older adults living there. This approach will be applied to a neighborhood in Aalst-Waalre which will be developed into a living lab. The research will involve: (1) Insight into social-spatial factors underlying a smart neighborhood; (2) Identifying governance and organizational context; (3) Identifying needs and preferences of the (future) inhabitant; (4) Matching needs & preferences to potential socio-techno-spatial solutions. A mixed methods approach fusing quantitative and qualitative methods towards understanding the impacts of smart environment will be investigated. After 12 months, employing several concepts of urban computing, such as pattern recognition and predictive modelling , using the focus groups from the different organizations as well as primary end-users, and exploring how physiological data can be embedded in data-driven strategies for the enhancement of active ageing in this neighborhood will result in design solutions and strategies for a more care-friendly neighborhood.
The overall purpose of this consultancy was to support the activities under the Environmental Monitoring and Assessment Programme of the UN Economic Commission for Europe (UNECE) in developing the 7th pan-European environmental assessment, an indicator based and thematic assessment, implemented jointly with the United Nations Environment Programme (UNEP) and in support of the 2030 Agenda for Sustainable Development. The series of environmental assessments of the pan-European region provide up to-date and policy-relevant information on the interactions between the environment and society. This consultancy was to:> Draft the input on drivers and developments to chapter 1.2 of the assessment related to the environmental theme “4.2 Applying principles of circular economy to sustainable tourism”.> Suggest to UNECE and UNEP the most policy relevant indicators from UNECE-environmental, SDG indicators and from other indicator frameworks such as EEA or OECD for the environmental theme for the sub-chapter 4.2.> Assess the current state, trends and recent developments and prepare the substantive part of sub-chapter 4.2 (summary - part I) and an annex (part II) with the detailed analysis and findings.
Despite the benefits of the widespread deployment of diverse Internet-enabled devices such as IP cameras and smart home appliances - the so-called Internet of Things (IoT) has amplified the attack surface that is being leveraged by cyber criminals. While manufacturers and vendors keep deploying new products, infected devices can be counted in the millions and spreading at an alarming rate all over consumer and business networks. The objective of this project is twofold: (i) to explain the causes behind these infections and the inherent insecurity of the IoT paradigm by exploring innovative data analytics as applied to raw cyber security data; and (ii) to promote effective remediation mechanisms that mitigate the threat of the currently vulnerable and infected IoT devices. By performing large-scale passive and active measurements, this project will allow the characterization and attribution of compromise IoT devices. Understanding the type of devices that are getting compromised and the reasons behind the attacker’s intention is essential to design effective countermeasures. This project will build on the state of the art in information theoretic data mining (e.g., using the minimum description length and maximum entropy principles), statistical pattern mining, and interactive data exploration and analytics to create a casual model that allows explaining the attacker’s tactics and techniques. The project will research formal correlation methods rooted in stochastic data assemblies between IoT-relevant measurements and IoT malware binaries as captured by an IoT-specific honeypot to aid in the attribution and thus the remediation objective. Research outcomes of this project will benefit society in addressing important IoT security problems before manufacturers saturate the market with ostensibly useful and innovative gadgets that lack sufficient security features, thus being vulnerable to attacks and malware infestations, which can turn them into rogue agents. However, the insights gained will not be limited to the attacker behavior and attribution, but also to the remediation of the infected devices. Based on a casual model and output of the correlation analyses, this project will follow an innovative approach to understand the remediation impact of malware notifications by conducting a longitudinal quasi-experimental analysis. The quasi-experimental analyses will examine remediation rates of infected/vulnerable IoT devices in order to make better inferences about the impact of the characteristics of the notification and infected user’s reaction. The research will provide new perspectives, information, insights, and approaches to vulnerability and malware notifications that differ from the previous reliance on models calibrated with cross-sectional analysis. This project will enable more robust use of longitudinal estimates based on documented remediation change. Project results and methods will enhance the capacity of Internet intermediaries (e.g., ISPs and hosting providers) to better handle abuse/vulnerability reporting which in turn will serve as a preemptive countermeasure. The data and methods will allow to investigate the behavior of infected individuals and firms at a microscopic scale and reveal the causal relations among infections, human factor and remediation.