The objective of this paper is a reflective discussion on the validity of the construct Information Literacy in the perspective of changing information and communication technologies. The research question that will be answered is: what is the impact of technological developments on the relevance of the Information Literacy concept? Technological developments that will be discussed are: - content integration (federated search engines) - amateur publishing (user generated content) - use of social networks to find information - personalisation and push technology - loss of context / fragmentation of information. Research methods: desk research and critical analysis of the results that were found. The analysis of the influence of the discussed technologies on the Information Literacy concept is represented by arrow diagrams. Findings: The Information Literacy concept refers to a set of sub skills varying from retrieval skills to critical use of scholar information. Changing technologies reduce the significance of the more instrumental sub skills of the Information Literacy concept. On the other hand, higher order cognitive skills (for instance critical evaluation of resources and analysis of content) become more and more important for students and professionals who try to solve their information problems. The paper concludes with a description of the facets of the Information Literacy concept that need extra attention in the education of the knowledge workers of the future. [De hier gepubliceerde versie is het 'accepted paper' van het origineel dat is gepubliceerd op www.springerlink.com . De officiële publicatie kan worden gedownload op http://www.springerlink.com/content/n32j3um878720h40/abstract/]
DOCUMENT
Over the last two decades, institutions for higher education such as universities and colleges have rapidly expanded and as a result have experienced profound changes in processes of research and organization. However, the rapid expansion and change has fuelled concerns about issues such as educators' technology professional development. Despite the educational value of emerging technologies in schools, the introduction has not yet enjoyed much success. Effective use of information and communication technologies requires a substantial change in pedagogical practice. Traditional training and learning approaches cannot cope with the rising demand on educators to make use of innovative technologies in their teaching. As a result, educational institutions as well as the public are more and more aware of the need for adequate technology professional development. The focus of this paper is to look at action research as a qualitative research methodology for studying technology professional development in HE in order to improve teaching and learning with ICTs at the tertiary level. The data discussed in this paper have been drawn from a cross institutional setting at Fontys University of Applied Sciences, The Netherlands. The data were collected and analysed according to a qualitative approach.
DOCUMENT
Currently, promising new tools are under development that will enable crime scene investigators to analyze fingerprints or DNA-traces at the crime scene. While these technologies could help to find a perpetrator early in the investigation, they may also strengthen confirmation bias when an incorrect scenario directs the investigation this early. In this study, 40 experienced Crime scene investigators (CSIs) investigated a mock crime scene to study the influence of rapid identification technologies on the investigation. This initial study shows that receiving identification information during the investigation results in more accurate scenarios. CSIs in general are not as much reconstructing the event that took place, but rather have a “who done it routine.” Their focus is on finding perpetrator traces with the risk of missing important information at the start of the investigation. Furthermore, identification information was mostly integrated in their final scenarios when the results of the analysis matched their expectations. CSIs have the tendency to look for confirmation, but the technology has no influence on this tendency. CSIs should be made aware of the risks of this strategy as important offender information could be missed or innocent people could be wrongfully accused.
DOCUMENT
The aim of this review was to explore which factors influence nurses' adoption of information and communication technology. A systematic review was conducted using qualitative and quantitative studies. The authors performed the search strategy in the databases of PubMed, CINAHL, and IEEE and included articles published between January 2011 and July 2021. This review explores the following factors: collaboration, leadership, and individual and team factors—that, according to qualitative and quantitative research, seem to influence nurses' adoption of information and communication technology. A gradual implementation process of the information and communication technology, involvement from care professionals in the implementation process, and team functioning are important factors to consider when adopting information and communication technology. In addition to these, individual factors such as age, experience, attitude, and knowledge are also influencing factors. The review suggests that collaboration is important within the implementation of information and communication technology in care and that it positively influences nurses' adoption of it. Individual factors are researched more extensively than collaboration, leadership, and team factors. Although they also appear to influence the adoption of information and communication technology, there is insufficient evidence to convincingly substantiate this.
DOCUMENT
This study explores how journalists in highspeed newsrooms gather information, how gathering activities are temporally structured and how reliability manifests itself in information-gathering activities.
DOCUMENT
Purpose: This is a position paper describing the elements of an international framework for assistive techhnology provision that could guide the development of policies, systems and service delivery procedures across the world. It describes general requirements, quality criteria and possible approaches that may help to enhance the accessibility of affordable and high quality assistive technology solutions. Materials and methods: The paper is based on the experience of the authors, an analysis of the existing literature and the inputs from many colleagues in the field of assistive technology provision. It includes the results of discussions of an earlier version of the paper during an international conference on the topic in August 2017. Results and conclusion: The paper ends with the recommendation to develop an international standard for assistive technology provision. Such a standard can have a major impact on the accessibility of AT for people with disabilities. The paper outlines some the key elements to be included in a standard.
DOCUMENT
The central thesis of this book is that access to information represents a vital aspect of contemporary society, encompassing participation, accountability, governance, transparency, the production of products, and the delivery of services. This view is widely shared, with commentators and scholars agreeing that access to information is a key factor in maintaining societal and economic stability. However, having access to information does not guarantee its accessibility. Assuming that information is (cognitively) interpretable is incorrect, as many practical examples illustrate. In the first chapter, this book offers insights into the challenge of access to information in a digitalized world. The concepts of access and accessibility are addressed, elucidating their meanings and delineating the ways in which they are influenced by the exponential growth of information. It examines how information technology introduces a novel access paradox. The second chapter examines the challenges to access to and accessibility of information in a digitalized, hybrid world where code may be law, where there is an inescapable loss of privacy, where doing business opens and restricts access, where literacy is a necessity to survive ‘digital divides,’ and where environmental concerns may have an adverse effect on high expectations. The third chapter presents a review of theoretical approaches to access and accessibility from seven different research perspectives: information access disparity, information seeking, information retrieval, information quality, information security, information management, and archives management. Six approaches to information access and accessibility are identified: [1] social, economic, and political participation; [2] ‘smart’ and evolving technology; [3] power and control; [4] sense-making; [5] knowledge representations, and [6] information survival. The fourth chapter addresses the bottlenecks and requirements for information access and accessibility, culminating in a checklist for organizations to assess these requirements within their own business processes. In the fifth chapter, some perspectives on artificial intelligence and the future of information access are presented. The sixth chapter represents an attempt to draw conclusions and to bring this book to a close.
DOCUMENT
In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effective in providing privacy to citizens. Rapid development of ubiquitous computing and ‘the internet of things’ are leading to Big Data and the application of Predictive Analytics, effectively merging the real world with cyberspace. The power of information technology is increasingly used to provide personalised services to citizens, leading to the availability of huge amounts of sensitive data about individuals, with potential and actual privacy-eroding effects. To protect the private sphere, deemed essential in a state of law, information and communication systems (ICTs) should meet the requirements laid down in numerous privacy regulations. Sensitive personal information may be captured by organizations, provided that the person providing the information consents to the information being gathered, and may only be used for the express purpose the information was gathered for. Any other use of information about persons without their consent is prohibited by law; notwithstanding legal exceptions. If regulations are properly translated into written code, they will be part of the outcomes of an ICT, and that ICT will therefore be privacy compliant. We conclude that privacy compliance in the ‘technological’ sense cannot meet citizens’ concerns completely, and should therefore be augmented by a conceptual model to make privacy impact assessments at the level of citizens’ lives possible.
DOCUMENT
Advanced technology is a primary solution for the shortage of care professionals and increasing demand for care, and thus acceptance of such technology is paramount. This study investigates factors that increase use of advanced technology during elderly care, focusing on current use of advanced technology, factors that influence its use, and care professionals’ experiences with the use. This study uses a mixed-method design. Logfiles were used (longitudinal design) to determine current use of advanced technology, questionnaires assessed which factors increase such use, and in-depth interviews were administered to retrieve care professionals’ experiences. Findings suggest that 73% of care professionals use advanced technology, such as camera monitoring, and consult clients’ records electronically. Six of nine hypotheses tested in this study were supported, with correlations strongest between performance expectancy and attitudes toward use, attitudes toward use and satisfaction, and effort expectancy and performance expectancy. Suggested improvements for advanced technology include expanding client information, adding report functionality, solving log-in problems, and increasing speed. Moreover, the quickest way to increase acceptance is by improving performance expectancy. Care professionals scored performance expectancy of advanced technology lowest, though it had the strongest effect on attitudes toward the technology.
DOCUMENT
Background: To experience external objects in such a way that they are perceived as an integral part of one's own body is called embodiment. Wearable technology is a category of objects, which, due to its intrinsic properties (eg, close to the body, inviting frequent interaction, and access to personal information), is likely to be embodied. This phenomenon, which is referred to in this paper as wearable technology embodiment, has led to extensive conceptual considerations in various research fields. These considerations and further possibilities with regard to quantifying wearable technology embodiment are of particular value to the mobile health (mHealth) field. For example, the ability to predict the effectiveness of mHealth interventions and knowing the extent to which people embody the technology might be crucial for improving mHealth adherence. To facilitate examining wearable technology embodiment, we developed a measurement scale for this construct. Objective: This study aimed to conceptualize wearable technology embodiment, create an instrument to measure it, and test the predictive validity of the scale using well-known constructs related to technology adoption. The introduced instrument has 3 dimensions and includes 9 measurement items. The items are distributed evenly between the 3 dimensions, which include body extension, cognitive extension, and self-extension.Methods: Data were collected through a vignette-based survey (n=182). Each respondent was given 3 different vignettes, describing a hypothetical situation using a different type of wearable technology (a smart phone, a smart wristband, or a smart watch) with the purpose of tracking daily activities. Scale dimensions and item reliability were tested for their validity and Goodness of Fit Index (GFI). Results: Convergent validity of the 3 dimensions and their reliability were established as confirmatory factor analysis factor loadings45 (>0.70), average variance extracted values40 (>0.50), and minimum item to total correlations50 (>0.40) exceeded established threshold values. The reliability of the dimensions was also confirmed as Cronbach alpha and composite reliability exceeded 0.70. GFI testing confirmed that the 3 dimensions function as intercorrelated first-order factors. Predictive validity testing showed that these dimensions significantly add to multiple constructs associated with predicting the adoption of new technologies (ie, trust, perceived usefulness, involvement, attitude, and continuous intention). Conclusions: The wearable technology embodiment measurement instrument has shown promise as a tool to measure the extension of an individual's body, cognition, and self, as well as predict certain aspects of technology adoption. This 3-dimensional instrument can be applied to mixed method research and used by wearable technology developers to improve future versions through such things as fit, improved accuracy of biofeedback data, and customizable features or fashion to connect to the users' personal identity. Further research is recommended to apply this measurement instrument to multiple scenarios and technologies, and more diverse user groups.
DOCUMENT