WWW.DISSERTATION.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Dissertations, online materials
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 2 | 3 ||

«“Plz RT”: A Social Diffusion Model of Misinformation and Disinformation for Understanding Human Information Behaviour Natascha A. Karlova and ...»

-- [ Page 4 ] --

Association of College & Research Libraries. (2010). Introduction to information literacy. ww.ala.org/ala/mgrps/divs/acrl/issues/infolit/overview/intro/index.cfm Association of College & Research Libraries. (2008). Information literacy competency standards for higher education. www.ala.org/acrl/ilcomstan.html.

AASL/AECT. (1998). Information power: Building parternships for learning. Chicago:

American Library Association.

ACRL. (2008). Information literacy competency standards for higher education.

Retrieved 20120205, from http://www.ala.org/acrl/standards/informationliteracycompetency Bednar, P., & Welch, C. (2008). Bias, misinformation and the paradox of neutrality.

Informing Science, 11, 85-106.

Belkin, N. J., & Robertson, S. E. (1976). Information science and the phenomenon of information. Journal of the American Society for Information Science, 27(4), 197-204.

Bruce, C. S. (1997). The seven faces of information literacy. Adelaide, Australia: Auslib Press.

Buckland, M. K. (1991). Information as Thing. Journal of the American Society for Information Science, 42(5), 351-360.

Buller, D., & Burgoon, J. (1996). Interpersonal deception theory. Communication Theory, 6(3), 203-242.

Burt, R. S. (1992). Structural holes : the social structure of competition. Cambridge, Mass.: Harvard University Press.

Burt, R. S. (2004). Structural holes and good ideas. American Journal of Sociology, 110(2), 349-399.

Chatman, E. A. (1986). Diffusion theory: A review and test of a conceptual model in information diffusion. Journal of the American Society for Information Science, 37(6), 377-386.

Courtright, C. (2008). Context in information behavior research. Annual Review of Information Science and Technology, 41(1), 273-306.

Coward, C. T., & Fisher, K. E. (2010). Measuring indirect access: Indicators of the impacts of lay information mediary behavior. Paper presented at the 2010 IFLA World Library and Information Congress.

DePaulo, B. M., Lindsay, J., Malone, B., Muhlenbreck, L., Charlton, K., & Cooper, H.

(2003). Cues to deception. Psychology Bulletin, 129(1), 74-112.

Dervin, B., & Nilan, M. (1986). Information needs and uses. ARIST, 21(1), 3-33.

Dresang, E. T. (2005). Radical change. In K. E. Fisher, S. Erdelez & L. E. F.

McKechnie (Eds.), Theories of Information Behavior (pp. 298-302). Medford, New Jersey: Information Today, Inc.

Fallis, D. (2009). A conceptual analysis of disinformation. Paper presented at the iConference 2009.

Fisher, K. E., Erdelez, S., & McKechnie, L. E. F. (Eds.). (2005). Theories of information behavior. Medford, NJ: Information Today, Inc.

Proceedings of the ISIC2012 (Tokyo) 16 of 17 Fox, C. J. (1983). Information and misinformation: An investigation of the notions of

information, misinformation, informing, and misinforming. Westport, CT:

Greenwood.

Garner, S. D. (2006). High-level colloquium on information literacy and lifelong learning. Retrieved from http://unesdoc.unesco.org/images/0014/001448/144820e.pdf Harding, J. (2008). Information literacy and the public library: We've talked the talk, but are we walking the walk? Australian Library Journal, 57(3), 274-294.

Hjørland, B. (2007). Information: Objective or Subjective/Situational? Journal of the American Society for Information Science and Technology, 58(10), 1448-1456.

Karlova, N. A., & Lee, J. H. (2011). Notes from the underground city of disinformation:

A conceptual investigation. Paper presented at the ASIST 2011.

Kuhlthau, C. C. (2005). Kuhlthau's information search process. In K. E. Fisher, S.

Erdelez & L. E. F. McKechnie (Eds.), Theories of Information Behavior (pp.

230-234). Medford, N.J.: Information Today, Inc.

Lau, J. (2006). Guidelines on information literacy for lifelong learning. Retrieved from http://archive.ifla.org/archive/VII/s42/pub/IL-Guidelines2006.pdf Lloyd, A., & Williamson, K. (2008). Towards an understanding of information literacy in context. Journal of Librarianship and Information Science, 40(1), 3-12.

Losee, R. M. (1997). A discipline independent definition of information. Journal of the American Society for Information Science, 48(3), 254-269.

Lowe, C. A., & Eisenberg, M. B. (2005). Big6 skills for information literacy. In K. E.

Fisher, S. Erdelez & L. E. F. McKechnie (Eds.), Theories of Information Behavior (pp. 63-68). Medford, N.J.: Information Today, Inc.

Rubin, V. L. (2010). On deception and deception detection: Content analysis of computer-mediated stated beliefs. Paper presented at the ASIST 2010.

Sayers, R. (2006). Principles of awareness-raising for information literacy: a case study.

Retrieved from http://www.unesdoc.unesco.org/images/0014/001476/147637e.pdf SCONUL. (2011). The seven pillars of information literacy. Retrieved 20120205, from http://www.sconul.ac.uk/groups/information_literacy/seven_pillars.html Shannon, C. E., & Weaver, W. (1949). The mathematical theory of communication.

Urbana, Illinois: University of Illinois Press.

Shibutani, T. (1955). Reference groups as perspectives. American Journal of Sociology, 60(6), 562-569.

Stahl, B. (2006). On the difference or equality of information, misinformation, and disinformation: A critical research perspective. Informing Science Journal, 9, 83-96.

Taylor, R. S. (1962). The process of asking questions. American Documentation, 13(4), 391-396.

Tuominen, K., & Savolainen, R. (1997). A social constructionist approach to the study of information use as discursive action. Paper presented at the ISIC 1996.

Tuominen, K., Savolainen, R., & Talja, S. (2005). Information literacy as a sociotechnical practice. Library Quarterly, 75(3), 329-345.

Walczyk, J., Runco, M., Tripp, S., & Smith, C. (2008). The creativity of lying:

Divergent thinking and ideational correlates of the resolution of social dilemmas. Creativity Research Journal, 20(3), 328-342.

Proceedings of the ISIC2012 (Tokyo) 17 of 17 Walter, V. (2007). Information literacy: A new role for public libraries? In S. C. Curzon & L. D. Lampert (Eds.), Proven strategies for building an information literacy program (pp. 297-307). New York City: Neal-Schuman.

Wijetunge, P., & Alahakoon, U. P. (2005). Empowering 8: The information literacy model developed in Sri Lanka to underpin changing education paradigms of Sri Lanka. Sri Lanka Journal of Librarianship and Information Management, 1(1), 31-41.

Zhou, L., Burgoon, J., Nunamaker, J., & Twitchell, D. (2004). Automated linguistics based cues for detecting deception in text-based asynchronous computermediated communication: A empirical investigation. Group Decision Negotiation, 13(1), 81-106.

Zhou, L., & Zhang, D. (2007). An Ontology-supported misinformation model: Toward a digital misinformation library. IEEE Transactions on Systems, Man, and Cybernetics--Part A: Systems and Humans, 37(5), 804-813.

Zurkowski, P. G. (1974). The information service environment relationships and priorities. Related paper no. 5. Retrieved from http://www.eric.ed.gov/PDFS/ED100391.pdf.

i http://www.japantimes.co.jp/text/nn20111109f1.html; Accessed 20111208 ii http://www.nytimes.com/2011/12/07/world/asia/japans-huge-nuclear-cleanup-makes-returning-home-agoal.html; Accessed 20111208 iii http://www.spiegel.de/international/europe/0,1518,801982,00.html; Accessed 20111208 iv http://www.presseurop.eu/en/content/article/1108051-we-are-all-germany-s-mercy; Accessed 20111208 v http://en.wikipedia.org/wiki/Phishing; Accessed 20111213 vi http://biz.heraldm.com/common/Detail.jsp?newsMLId=20110316000089; Accessed 20111213 vii http://www.reuters.com/article/2011/12/11/swedbank-latvia-idUSL6E7NB0L920111211; Accessed 20120113.

viii http://bits.blogs.nytimes.com/2011/04/04/the-growing-business-of-online-reputation-management/;

Accessed 20120120.

Pages:     | 1 |   ...   | 2 | 3 ||


Similar works:

«D O U G L A S A. F. VA N D E N B E R G H E Working Across Borders: Multinational Enterprises and the Internationalization of Employment WORKING ACROSS BORDERS: MULTINATIONAL ENTERPRISES AND THE INTERNATIONALIZATION OF EMPLOYMENT Grensoverschrijdend werken: Multinationale ondernemingen en de internationalisering van werkgelegenheid Proefschrift ter verkrijging van de graad van doctor aan de Erasmus Universiteit Rotterdam op gezag van de Rector Magnificus Prof.dr.ir. J.H. van Bemmel en volgens...»

«UNIVERSITA’ DEGLI STUDI DI CAGLIARI DIPARTIMENTO DI LINGUISTICA E STILISTICA MASTER IN LINGUISTICA, FILOLOGIA E LETTERATURA DELLA SARDEGNA SA LIMBA DE ELIANORA Contributo alla pianificazione linguistica del sardo Tesi di Mauro Podda La magnifique et somptueuse pompe funebre faite aus obseques et funerailles du tres grande et tres victorieus empereur Charles cinquieme, celebrees en la ville de Bruxelles le 29e jour du mois de Dicembre 1558 par Philippes roy catholique d’Espaigne son fils...»

«Official User Guide Linux Mint 17.2 MATE Edition Page 1 of 48 Table of Contents INTRODUCTION TO LINUX MINT HISTORY PURPOSE VERSION NUMBERS AND CODENAMES EDITIONS WHERE TO FIND HELP INSTALLATION OF LINUX MINT DOWNLOAD THE ISO VIA TORRENT Install a Torrent client VIA A DOWNLOAD MIRROR READ THE RELEASE NOTES CHECK THE MD5 BURN THE ISO TO DVD BOOT THE LIVEDVD INSTALL LINUX MINT ON YOUR HARD DRIVE THE BOOT SEQUENCE INTRODUCTION TO THE LINUX MINT DESKTOP THE WELCOME SCREEN THE MATE DESKTOP DESKTOP...»

«CONFERENCE OF PERIPHERAL MARITIME REGIONS BALTIC SEA COMMISSION 6, rue Saint-Martin 35700 RENNES – FRANCE Tel. + 33 2 99 35 40 50 Email: asa.bjering@crpm.org Website: www.balticseacommission.eu GENERAL ASSEMBLY OF THE CPMR BALTIC SEA COMMISSION 25-27 May 2016 –Sandviken, Region Gävleborg (SE) MINUTES THURSDAY 26 MAY 2016 The assessment of pan-Baltic cooperation. Current state of play in the South Baltic, Central Baltic, BotniaAtlantica and Baltic Sea Region Interreg Programmes The meeting...»

«Uitvoeringsregeling zelfstandige toegang meterruimtes netbeheerders 1. Inleiding Deze uitvoeringsregeling beschrijft de wijze waarop praktische invulling wordt gegeven aan de afspraken uit het “Convenant zelfstandige toegang tot meterruimtes netbeheerders”. Deze regeling is opgesteld en bekrachtigd door de Werkgroep Sleutelverstrekking Derden, waarin vertegenwoordigers van VMNED en van Netbeheer Nederland zitting hebben. Deze werkgroep is inhoudelijk verantwoordelijk voor deze...»

«Doctoral Thesis Q. 0n eè [¹ ‰• SÊ0s [é gû}Pgœ ‰•è 0n e Thesis Abstracts and Summaries of the Thesis Review Results {, 9 S÷ The Ninth Issue ^sb ÿ ÿ^tÿ g June, 2007 The University of Aizu 0o0W 0M 0L SZXë0n[f OM cˆ N 0W 0’ 0_0n0g0 [f OM RG TŒ ÿ ^tÿ g ÿ eåe‡•èw Nä ÿ ‰• ÿfÿ {, S÷ÿ{, ÿ ga0n‰• 0kWúe0M0]0nŠÖ [š 00 e‡0nQ. 0n‰•èSÊ [¹ e 0sŠÖe‡[é gû0n}Pgœ0n ‰•è0’ 0S 0kQlˆh0Y e 0S 0‹0 [f OM uj S÷0kNØ 0_ÿb2ÿc o[f OM RG ÿ ga{,...»

«Sophos Anti-Virus for Linux startup guide Product version: 9 Document date: August 2016 Contents 1 Is this the right guide? 2 About Sophos Anti-Virus for Linux 2.1 What Sophos Anti-Virus does 2.2 How Sophos Anti-Virus protects your computer 3 System requirements 4 Install Sophos Anti-Virus across a network 4.1 Create the CID on the server 4.2 Install Sophos Anti-Virus from the CID 5 Install Sophos Anti-Virus on a standalone computer 6 Check on-access scanning 6.1 Start on-access scanning 7 Run...»

«Beautiful and Innocent Female Same-Sex Intimacy in the Japanese Yuri Genre Verena Maser Dissertation aus dem Fachbereich II: Sprach-, Literaturund Medienwissenschaften der Universität Trier (überarbeitete Fassung) Fach: Japanologie Datum der Disputatio: 27.9.2013 ii In memory of my grandfather Gottlob Maser iii Table of Contents List of Illustrations and Tables iv Acknowledgments v Note on Language vii Introduction. A Lily Is a Lily Is. No Lily? 1 Chapter 1. The Yuri Genre as Site of a...»

«GridWorld ® AP Computer Science Case Study Solutions Manual The AP® Program wishes to acknowledge and to thank Judith Hromcik of Arlington High School in Arlington, Texas. © 2007 The College Board. All rights reserved. Visit apcentral.collegeboard.com (for AP professionals) and www.collegeboard.com/apstudents (for AP students and parents). 2 Part 1 Part 1 Answers: Do You Know? Set 1 1. Does the bug always move to a new location? Explain. No. A bug will only move to the location in front of...»

«PHD IN MANAGEMENT XXXIII° CYCLE THESIS INTERNATIONAL KNOWLEDGE TRANSFER: AN INTEGRATED ANALYSIS OF ANTECEDENTS, CONSEQUENCES AND TIME PATTERNS OF THE FDI KNOWLEDGE SPILLOVER EFFECT Candidate: Tutor: Alessandra Perri Prof. Matteo G. Caroli Prof. Raffaele Oriani LUISS GUIDO CARLI UNIVERSITY OF ROME INTERNATIONAL KNOWLEDGE TRANSFER: AN INTEGRATED ANALYSIS OF ANTECEDENTS, CONSEQUENCES AND TIME PATTERNS OF THE FDI KNOWLEDGE SPILLOVER EFFECT Abstract This thesis is concerned with the process of...»

«Volume 17, Number 1 Print ISSN: 1096-3685 Online ISSN: 1528-2635 ACADEMY OF ACCOUNTING AND FINANCIAL STUDIES JOURNAL Mahmut Yardimcioglu Kahramanmaras Sutcu Imam University Editor The Academy of Accounting and Financial Studies Journal is owned and published by Jordan Whitney Enterprises, Inc. Editorial content is under the control of the Allied Academies, Inc., a non-profit association of scholars, whose purpose is to support and encourage research and the sharing and exchange of ideas and...»

«-WARNINGS AND PRECAUTIONS HIGHLIGHTS OF PRESCRIBING INFORMATION • Serious These highlights do not include all the information needed to use and potentially fatal cardiovascular thrombotic events, myocardial PENNSAID® Topical Solution safely and effectively. See full prescribing infarction, and stroke can occur with NSAID treatment. Use the lowest information for PENNSAID Topical Solution. effective dose of PENNSAID Topical Solution in patients with known CV disease or risk factors for CV...»





 
<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.