The document discusses the concept of filter bubbles and their potential relevance for information behavior research. It defines filter bubbles as the intellectual isolation that can occur when websites selectively present information to users based on their past behavior and location. This personalization may limit exposure to opposing viewpoints. However, some research has questioned whether strong filter bubbles actually exist or whether personalization has significant negative effects. The document also explores filter bubbles from psychological, socio-cultural, and epistemological perspectives and provides some suggestions for how to mitigate the effects of filter bubbles, such as developing critical thinking skills and using different search tools and engines.
Media Life is a course intended for undergraduate students across campus. Its goal is to make people aware of the role that media play in their everyday life. The key to understanding a "media life" is to see our lives not as lived WITH media (which would lead to a focus on media effects and media-centric theories of society), but rather IN media (where the distinction between what we do with and without media dissolves).
Gatewatching 11: Echo Chambers? Filter Bubbles? Reviewing the EvidenceAxel Bruns
Lecture 11 in the course From Gatekeeping to Gatewatching: News and Journalism in the Digital Age.
This lecture series addresses the continuing transformation of the production and consumption of journalism in the contemporary media environment. It provides a brief history of the impact of participatory online news production and engagement practices – from the first wave of citizen journalism to the social media platforms of today – on how news content is disseminated and experienced; examines reactive and proactive responses to these changes by news organisations and journalists; and explores the longer-term impact of these developments on the public sphere, touching on the power of social media platforms and their role in shaping their users’ information diets.
Readings are largely drawn from Gatewatching and News Curation: Journalism, Social Media, and the Public Sphere (Bruns, 2018), with additional readings recommended for selected lectures.
Reading for this lecture:
Bruns, A. (2022). Echo Chambers? Filter Bubbles? The Misleading Metaphors That Obscure the Real Problem. In M. Pérez-Escolar & J. M. Noguera-Vivo (Eds.), Hate Speech and Polarization in Participatory Society (pp. 33–48). Routledge. https://doi.org/10.4324/9781003109891-4
How blockchain is revolutionizing crowdfundingAhmed Banafa
According to experts, there are five key benefits of crowdfunding platforms: efficiency, reach, easier presentation, built-in PR and marketing, and near-immediate validation of concept, which explains why crowdfunding has become an extremely useful alternative to venture capital (VC), and has also allowed non-traditional projects, such as those started by in-need families or hopeful creatives, a new audience to pitch their cause.
Media Life is a course intended for undergraduate students across campus. Its goal is to make people aware of the role that media play in their everyday life. The key to understanding a "media life" is to see our lives not as lived WITH media (which would lead to a focus on media effects and media-centric theories of society), but rather IN media (where the distinction between what we do with and without media dissolves).
Gatewatching 11: Echo Chambers? Filter Bubbles? Reviewing the EvidenceAxel Bruns
Lecture 11 in the course From Gatekeeping to Gatewatching: News and Journalism in the Digital Age.
This lecture series addresses the continuing transformation of the production and consumption of journalism in the contemporary media environment. It provides a brief history of the impact of participatory online news production and engagement practices – from the first wave of citizen journalism to the social media platforms of today – on how news content is disseminated and experienced; examines reactive and proactive responses to these changes by news organisations and journalists; and explores the longer-term impact of these developments on the public sphere, touching on the power of social media platforms and their role in shaping their users’ information diets.
Readings are largely drawn from Gatewatching and News Curation: Journalism, Social Media, and the Public Sphere (Bruns, 2018), with additional readings recommended for selected lectures.
Reading for this lecture:
Bruns, A. (2022). Echo Chambers? Filter Bubbles? The Misleading Metaphors That Obscure the Real Problem. In M. Pérez-Escolar & J. M. Noguera-Vivo (Eds.), Hate Speech and Polarization in Participatory Society (pp. 33–48). Routledge. https://doi.org/10.4324/9781003109891-4
How blockchain is revolutionizing crowdfundingAhmed Banafa
According to experts, there are five key benefits of crowdfunding platforms: efficiency, reach, easier presentation, built-in PR and marketing, and near-immediate validation of concept, which explains why crowdfunding has become an extremely useful alternative to venture capital (VC), and has also allowed non-traditional projects, such as those started by in-need families or hopeful creatives, a new audience to pitch their cause.
With the covid-19 outbreak, digital transformation in industries got boosted. Organizations started relying on digital platforms to achieve their objectives during these vulnerable times. Employees are now expected to learn digital ethics in order to maintain decorum on digital platforms. Digital ethics are organizational, social, and interpersonal norms.
Second line of defense for cybersecurity : BlockchainAhmed Banafa
With the fact that cybercrime and cyber security attacks hardly seem to be out of the news these days and the threat is growing globally.
Nobody would appear immune to malicious and offensive acts targeting computer networks, infrastructures and personal computer devices.
Firms clearly must invest to stay resilient.
Gauging the exact size of cybercrime and putting a precise US dollar value on it is nonetheless tricky.
The Dark Side of Social Media: Legal Issues
Legal Aspects of Abuse and Misuse of Social Media
(Facebook, Twitter, etc.)
Final project of Legal Aspects of Information Systems courses
By mprabuw & Said Altinsik
Blockchain: the solution for transparency in product supply chainsJamie Sandhu
We live in the world we buy into. How brand and supply chain transparency will enable conscious consumerism ethical business practices to thrive and how blockchain technology can make it happen. A summary of the whitepaper by Provenance.org.
This presentation examines trends and innovations in financial services (focusing on banking, insurance, credit cards).
In the last few years, the financial services industry has undergone a digital evolution. Now, it is time for a digital revolution, due to growing disruptive "Fintech" start ups and their innovative models.
Blockchain 3.0, the Encryption of Innovation. This talk looks beyond the immediate economic benefits and risks of distributed ledgers and considers the broader societal innovations implied by blockchain technology. The possibility of innovation and creating and participating in different and multiple self-determined political and economic systems could mobilize how we create ourselves as individuals and societies. Blockchain technology invites the possibility of creating a social world that gives greater weight to the values we apparently care about: freedom, trust, and dignity
Blockchain Supply Chain : Supply Chain Blockchain Use CasesLeewayHertz
By enabling transparency across the involved parties in the supply chain blockchain, the blockchain establishes the trust level which has been challenging for the last many years.
With Supply Chain blockchain, you know who you are trading with, where the product has been originated from, who refined it and if the payment is fair or not.
This presentation is an updated and diluted version of an earlier slides deck (see http://bit.ly/2pbw2M8).
Is it really "sharing"?
Presentation of the so-called "Sharing" Economy, for a lecture about service innovation at Linköping University (LiU), during a course in Service Management and Marketing.
I talk about Unicorns; collaborative... consumption-production-finance-learning-governance; “platform cooperativism” and my research focus on shared mobility.
Web3 Security: The Blockchain is Your SIEMTal Be'ery
2021’s hottest new tech term, according to TechCrunch, was “definitely Web3”. Web3, as its name suggests, is considered by many as the future of the internet: decentralized, permissionless, and based on modern blockchain technology. While Web3 might have a bright future, it’s in the middle of growing pains: A number of Web3 apps were hacked in 2021, leading to theft of cryptoassets valued at hundreds of millions of US Dollars. In this talk we will present Web3 app technology, dissect new attack surfaces, and suggest new and exciting defense mechanisms.
First, we will dive into the technical details of Web3 applications, showing how Web3 technology opens new attack surfaces by moving app functionality onto the blockchain. We will then analyze these newly-exposed attack surfaces by reviewing a few examples we’ve discovered “in the wild.”
While Web3 exposes new attack surfaces, it also provides novel detection opportunities. Specifically, the public and transparent nature of the blockchain allows security researchers to immediately explore full details of any attack and, as a result, leads to quick and thorough discoveries. This is a paradigm shift in security research, as current practices only allow a few to learn actual attack details, only some portions of which are shared publicly. This shift in transparency allowed us to independently explore the aforementioned attacks.
Furthermore, we believe we can do even better and go beyond rapid post-mortem reports. We will show how the same raw data we had previously used for a post-mortem analysis can be analyzed in real-time (or even ante factum by “taking a peek” into the blocks that have yet to be mined) to detect and even prevent attacks. This capability is enabled by the online nature of the blockchain and its inherent block time delays. In fact, we can import, with relevant modifications, many of the principles and learnings of current web defenses, including Web Application Firewall (WAF) into the realm of blockchain. By doing so, we introduce a scheme for a Web3 Application Firewall (W3AF) which can greatly improve Web3 security and blockchain-based apps.
Blockchain and its Use in the Public Sector - OECDOECD Governance
Presentation on the OECD Working Paper "Blockchains Unchained: Blockchain Technology and its use in the Public Sector". This guide aims to equip public servants with the necessary knowledge to understand what the Blockchain architecture is, the implications it could have on government services, and the opportunities and challenges governments may face as a result. For more information see oe.cd/blockchain
Our latest white paper, “Blockchain Technology and the Financial Services Market,” covers themes around:
Distributed ledger and blockchain are about to cause major business transformations in the financial services industry
Three of the most promising fields of application are payment transactions, trade finance and over-the-counter markets
Technical challenges and legal frameworks are currently a major obstacle
Many market participants are exploring ways of using blockchain, including established institutions and start-ups firms
Read the entire research report for expert insights and the full Infosys Consulting point-of-view!
Blockchain Overview, What is Blockchain, Why Blockchain, How Blockchain will change the world, concepts of Blockchain are explained like Consensus, Distributed Ledger, Blockchain use cases and more
With the covid-19 outbreak, digital transformation in industries got boosted. Organizations started relying on digital platforms to achieve their objectives during these vulnerable times. Employees are now expected to learn digital ethics in order to maintain decorum on digital platforms. Digital ethics are organizational, social, and interpersonal norms.
Second line of defense for cybersecurity : BlockchainAhmed Banafa
With the fact that cybercrime and cyber security attacks hardly seem to be out of the news these days and the threat is growing globally.
Nobody would appear immune to malicious and offensive acts targeting computer networks, infrastructures and personal computer devices.
Firms clearly must invest to stay resilient.
Gauging the exact size of cybercrime and putting a precise US dollar value on it is nonetheless tricky.
The Dark Side of Social Media: Legal Issues
Legal Aspects of Abuse and Misuse of Social Media
(Facebook, Twitter, etc.)
Final project of Legal Aspects of Information Systems courses
By mprabuw & Said Altinsik
Blockchain: the solution for transparency in product supply chainsJamie Sandhu
We live in the world we buy into. How brand and supply chain transparency will enable conscious consumerism ethical business practices to thrive and how blockchain technology can make it happen. A summary of the whitepaper by Provenance.org.
This presentation examines trends and innovations in financial services (focusing on banking, insurance, credit cards).
In the last few years, the financial services industry has undergone a digital evolution. Now, it is time for a digital revolution, due to growing disruptive "Fintech" start ups and their innovative models.
Blockchain 3.0, the Encryption of Innovation. This talk looks beyond the immediate economic benefits and risks of distributed ledgers and considers the broader societal innovations implied by blockchain technology. The possibility of innovation and creating and participating in different and multiple self-determined political and economic systems could mobilize how we create ourselves as individuals and societies. Blockchain technology invites the possibility of creating a social world that gives greater weight to the values we apparently care about: freedom, trust, and dignity
Blockchain Supply Chain : Supply Chain Blockchain Use CasesLeewayHertz
By enabling transparency across the involved parties in the supply chain blockchain, the blockchain establishes the trust level which has been challenging for the last many years.
With Supply Chain blockchain, you know who you are trading with, where the product has been originated from, who refined it and if the payment is fair or not.
This presentation is an updated and diluted version of an earlier slides deck (see http://bit.ly/2pbw2M8).
Is it really "sharing"?
Presentation of the so-called "Sharing" Economy, for a lecture about service innovation at Linköping University (LiU), during a course in Service Management and Marketing.
I talk about Unicorns; collaborative... consumption-production-finance-learning-governance; “platform cooperativism” and my research focus on shared mobility.
Web3 Security: The Blockchain is Your SIEMTal Be'ery
2021’s hottest new tech term, according to TechCrunch, was “definitely Web3”. Web3, as its name suggests, is considered by many as the future of the internet: decentralized, permissionless, and based on modern blockchain technology. While Web3 might have a bright future, it’s in the middle of growing pains: A number of Web3 apps were hacked in 2021, leading to theft of cryptoassets valued at hundreds of millions of US Dollars. In this talk we will present Web3 app technology, dissect new attack surfaces, and suggest new and exciting defense mechanisms.
First, we will dive into the technical details of Web3 applications, showing how Web3 technology opens new attack surfaces by moving app functionality onto the blockchain. We will then analyze these newly-exposed attack surfaces by reviewing a few examples we’ve discovered “in the wild.”
While Web3 exposes new attack surfaces, it also provides novel detection opportunities. Specifically, the public and transparent nature of the blockchain allows security researchers to immediately explore full details of any attack and, as a result, leads to quick and thorough discoveries. This is a paradigm shift in security research, as current practices only allow a few to learn actual attack details, only some portions of which are shared publicly. This shift in transparency allowed us to independently explore the aforementioned attacks.
Furthermore, we believe we can do even better and go beyond rapid post-mortem reports. We will show how the same raw data we had previously used for a post-mortem analysis can be analyzed in real-time (or even ante factum by “taking a peek” into the blocks that have yet to be mined) to detect and even prevent attacks. This capability is enabled by the online nature of the blockchain and its inherent block time delays. In fact, we can import, with relevant modifications, many of the principles and learnings of current web defenses, including Web Application Firewall (WAF) into the realm of blockchain. By doing so, we introduce a scheme for a Web3 Application Firewall (W3AF) which can greatly improve Web3 security and blockchain-based apps.
Blockchain and its Use in the Public Sector - OECDOECD Governance
Presentation on the OECD Working Paper "Blockchains Unchained: Blockchain Technology and its use in the Public Sector". This guide aims to equip public servants with the necessary knowledge to understand what the Blockchain architecture is, the implications it could have on government services, and the opportunities and challenges governments may face as a result. For more information see oe.cd/blockchain
Our latest white paper, “Blockchain Technology and the Financial Services Market,” covers themes around:
Distributed ledger and blockchain are about to cause major business transformations in the financial services industry
Three of the most promising fields of application are payment transactions, trade finance and over-the-counter markets
Technical challenges and legal frameworks are currently a major obstacle
Many market participants are exploring ways of using blockchain, including established institutions and start-ups firms
Read the entire research report for expert insights and the full Infosys Consulting point-of-view!
Blockchain Overview, What is Blockchain, Why Blockchain, How Blockchain will change the world, concepts of Blockchain are explained like Consensus, Distributed Ledger, Blockchain use cases and more
Brief presentation on challenges I've found during my research on/through social media. Part of a larger panel on Digital and Social Media for Research as part of UBC's Year of Research in Education.
Respond to these two classmates’ posts. 1. After reading thi.docxdaynamckernon
Respond to these two classmates’ posts.
1. After reading this journal article regarding
ethics of internet research, I have discovered different viewpoints of research and determined some ethical concerns.
As this type of “web-based” research grows, researchers will face ethical concerns that are different from traditional research ethical issues, (Denissen, Neumann & Van Zalk, 2010)
The main attribute of internet research, as I see it, is the ability to have a global footprint; meaning almost any one that has a computer and connectivity can access all types of information and data. Along with this power, comes great responsibility. The web can be a wonderful tool which can afford individuals, organizations, communities, and others tremendous access into good and bad places. This access can afford humans into medical breakthroughs, how to guides on repairs and building, how to get from city to city, and a multitude of positive ways to learn and grow.
Internet research use is growing at a fast pace and consequently, is creating ethical dilemmas.
At the same time, it can be a way to link terrorists’ organizations, promote child pornography etc. As you can see, internet research can be used for the greater good, or to our detriment.
This is where the ethics comes into play, and guidelines are set up to monitor ethical issues which occur due to this process. Institutional Review Boards at institutions conducting this type of
research
need specific guidelines for researchers to follow in order to maintain the integrity of
research.
(Williams) 2012)
Denissen, J. J. A., Neumann, L. & van Zalk, M. (2010). How the internet is changing the implementation of
traditional research methods, people’s daily lives, and the way in which developmental scientists conduct
research.
International Journal of Behavioral Development, 34,
564-575. DOI: 10.1177/0165025410383746.
Williams, S. G. (2012). The Ethics of Internet Research.
Online Journal Of Nursing Informatics
,
16
(2), 38-48.
2.
With the rapid increase of technology has come tremendous opportunity. Information is more easily accessible than ever before, which also creates ethical concerns. This week’s lecture describes research that is ethical as one “that the researchers are protecting the privacy of the participants and any research data collected about them.” The journal article, “The Ethics of Internet Research” examines internet research and the ethical issues that arise.
The advantages of internet research over traditional methods are that it is less costly, less of a time commitment, more controlled by the researcher, higher accuracy in data collection, and the ability to easily provide follow up and feedback (Williams, 2012). In a lot of aspects, internet research can be more efficient and less costly. However, there are many disadvantages that the article addresses on internet research. One is lack of control over the test setting (Williams, 2012). It is difficul.
Respond to at least two of your classmates’ posts. 1. After .docxdaynamckernon
Respond to at least two of your classmates’ posts.
1. After reading this journal article regarding
ethics of internet research, I have discovered different viewpoints of research and determined some ethical concerns.
As this type of “web-based” research grows, researchers will face ethical concerns that are different from traditional research ethical issues, (Denissen, Neumann & Van Zalk, 2010)
The main attribute of internet research, as I see it, is the ability to have a global footprint; meaning almost any one that has a computer and connectivity can access all types of information and data. Along with this power, comes great responsibility. The web can be a wonderful tool which can afford individuals, organizations, communities, and others tremendous access into good and bad places. This access can afford humans into medical breakthroughs, how to guides on repairs and building, how to get from city to city, and a multitude of positive ways to learn and grow.
Internet research use is growing at a fast pace and consequently, is creating ethical dilemmas.
At the same time, it can be a way to link terrorists’ organizations, promote child pornography etc. As you can see, internet research can be used for the greater good, or to our detriment.
This is where the ethics comes into play, and guidelines are set up to monitor ethical issues which occur due to this process. Institutional Review Boards at institutions conducting this type of
research
need specific guidelines for researchers to follow in order to maintain the integrity of
research.
(Williams) 2012)
Denissen, J. J. A., Neumann, L. & van Zalk, M. (2010). How the internet is changing the implementation of
traditional research methods, people’s daily lives, and the way in which developmental scientists conduct
research.
International Journal of Behavioral Development, 34,
564-575. DOI: 10.1177/0165025410383746.
Williams, S. G. (2012). The Ethics of Internet Research.
Online Journal Of Nursing Informatics
,
16
(2), 38-48.
2.
With the rapid increase of technology has come tremendous opportunity. Information is more easily accessible than ever before, which also creates ethical concerns. This week’s lecture describes research that is ethical as one “that the researchers are protecting the privacy of the participants and any research data collected about them.” The journal article, “The Ethics of Internet Research” examines internet research and the ethical issues that arise.
The advantages of internet research over traditional methods are that it is less costly, less of a time commitment, more controlled by the researcher, higher accuracy in data collection, and the ability to easily provide follow up and feedback (Williams, 2012). In a lot of aspects, internet research can be more efficient and less costly. However, there are many disadvantages that the article addresses on internet research. One is lack of control over the test setting (Williams, 2012). It .
Early-stage research questions in socio-technical internet research, interest areas and possible theoretical cornerstones - in preparation for a workshop in the context of IR10 - Association of Internet Researchers, Annual Meeting 2009.
Michael Edson @ Potomac Forum: Relevance is in the Eyes of the BeholderMichael Edson
For the 10/30/09 Potomac Forum "Building Better Government Web Sites" event. This talk looks at the drivers behind the Smithsonian Web and New Media Strategy process and how the strategy defines a new relationship with audiences.
After reading this journal article regarding ethics of interne.docxrosiecabaniss
After reading this journal article regarding
ethics of internet research, I have discovered different viewpoints of research and determined some ethical concerns.
As this type of “web-based” research grows, researchers will face ethical concerns that are different from traditional research ethical issues, (Denissen, Neumann & Van Zalk, 2010)
The main attribute of internet research, as I see it, is the ability to have a global footprint; meaning almost any one that has a computer and connectivity can access all types of information and data. Along with this power, comes great responsibility. The web can be a wonderful tool which can afford individuals, organizations, communities, and others tremendous access into good and bad places. This access can afford humans into medical breakthroughs, how to guides on repairs and building, how to get from city to city, and a multitude of positive ways to learn and grow.
Internet research use is growing at a fast pace and consequently, is creating ethical dilemmas.
At the same time, it can be a way to link terrorists’ organizations, promote child pornography etc. As you can see, internet research can be used for the greater good, or to our detriment.
This is where the ethics comes into play, and guidelines are set up to monitor ethical issues which occur due to this process. Institutional Review Boards at institutions conducting this type of
research
need specific guidelines for researchers to follow in order to maintain the integrity of
research.
(Williams) 2012)
Denissen, J. J. A., Neumann, L. & van Zalk, M. (2010). How the internet is changing the implementation of
traditional research methods, people’s daily lives, and the way in which developmental scientists conduct
research.
International Journal of Behavioral Development, 34,
564-575. DOI: 10.1177/0165025410383746.
Williams, S. G. (2012). The Ethics of Internet Research.
Online Journal Of Nursing Informatics
,
16
(2), 38-48.
2.
With the rapid increase of technology has come tremendous opportunity. Information is more easily accessible than ever before, which also creates ethical concerns. This week’s lecture describes research that is ethical as one “that the researchers are protecting the privacy of the participants and any research data collected about them.” The journal article, “The Ethics of Internet Research” examines internet research and the ethical issues that arise.
The advantages of internet research over traditional methods are that it is less costly, less of a time commitment, more controlled by the researcher, higher accuracy in data collection, and the ability to easily provide follow up and feedback (Williams, 2012). In a lot of aspects, internet research can be more efficient and less costly. However, there are many disadvantages that the article addresses on internet research. One is lack of control over the test setting (Williams, 2012). It is difficult to verify if the subject is in fact who they .
- Zachowania informacyjne jako subdyscyplina informatologii (dzieje – zmiany paradygmatu, konferencje, piśmiennictwo, uczeni). Badania użytkowników informacji.
- Zachowania informacyjne – obecny stan wiedzy w informatologii – definicje, pojęcia pokrewne, konteksty i uwarunkowania, typologia itd.
- Wybrane koncepcje i modele zachowań informacyjnych – typologia, omówienie niektórych z nich (modele Toma Wilsona i Barbary Niedźwiedzkiej; przypadkowe pozyskiwanie informacji; koncepcja Davida Ellisa)
- Poszukiwanie informacji – najlepiej zbadane zachowanie informacyjne
- Dzielenie się informacją (i wiedzą)
- Potrzeby informacyjne
- Bariery informacyjne
- Jak badać zachowania informacyjne? Elementy metodologii badań użytkowników informacji.
Broker informacji (infobroker, researcher) zajmuje się wyszukiwaniem, oceną, analizą i dostarczaniem różnego typu informacji na zlecenie.
Jest to zawód o charakterze usługowym, polegający na wyszukiwaniu, weryfikacji, analizie i dostarczaniu informacji na zlecenie. Głównym zadaniem infobrokera jest zaspokojenie potrzeby informacyjnej klienta poprzez dostarczenie mu najbardziej relewantnej informacji do złożonego zapytania. Dostarczona informacja musi cechować się wysoką jakością, popartą wiarygodnymi oraz odpowiednimi źródłami. Broker informacji dysponuje wiedzą dotyczącą sposobów pozyskiwania informacji oraz oceny jej wartości. W swojej pracy kieruje się zasadami etyki zawodowej i korzysta jedynie z legalnych źródeł informacji.
Zawód brokera informacji należy zaliczyć do grupy zawodów wolnych. Osoby wykonujące go mogą pracować nie tylko jako pracownicy etatowi, ale również jako tzw. freelancerzy lub samozatrudnieni.
W tej profesji może występować specjalizacja w zależności od rodzaju dostarczanej informacji, np. broker informacji biznesowej lub informacji prawniczej.
Zachowania informacyjne naukowców: w poszukiwaniu modelu zintegrowanego Sabina Cisek
Głównym jego celem jest stworzenie wstępnej propozycji zintegrowanego modelu zachowań informacyjnych naukowców akademickich, w oparciu o wybrane koncepcje z zakresu informatologii. Zastosowano podejście jakościowe oraz metody analizy i krytyki piśmiennictwa i analizy pojęciowej.
The main goal has been to create the first, tentative version of an integrated model of academic scholars’ information behavior, basing on selected concepts from the field of information science. The qualitative approach and methods of critical literature review and conceptual analysis were used.
Teoria i metodologia informatologii, 2019/20Sabina Cisek
Theory and Methodology of Information Science, a presentation for the information management students at the Jagiellonian University in Krakow, year 2019/20
Stowarzyszenia bibliotekarskie na świecie Sabina Cisek
Referat omawia współczesną działalność wybranych zagranicznych organizacji bibliotek szkół wyższych, min. ACRL – Association of College and Research Libraries, SCONUL – Society of College, National and University Libraries oraz CAUL – Council of Australian University Librarians. Przedstawiono wiodące kierunki ich aktywności, ze szczególnym uwzględnieniem twórczych inicjatyw i dobrych praktyk, które mogą stać się inspiracją dla podobnych przedsięwzięć w Polsce. Wskazano na zadania i znaczenie akademickich organizacji bibliotekarskich dla rozwoju edukacji wyższej i nauki, a także – dla doskonalenia pracy bibliotekarzy i specjalistów informacji, w kontekście cech i wymogów dzisiejszego środowiska informacyjnego, gospodarczego i kulturowo-społecznego.
Źródła informacji o ubezpieczeniach społecznych w Polsce i Unii EuropejskiejSabina Cisek
Problematyka źródeł informacji jest istotna zarówno z punktu widzenia infobrokera (profesjonalisty informacji), jak i „przeciętnego” obywatela/użytkownika. Stanowi jednak zagadnienie wielowymiarowe, którego niektóre jedynie aspekty są poruszone w niniejszym referacie.
Opracowanie składa się z dwóch części. W pierwszej z nich zarysowano wybrane zagadnienia dotyczące źródeł informacji w ogóle, takie jak sposoby identyfikacji i dostępu do odpowiednich zasobów, typologia źródeł, a także ocena ich jakości, w tym przyjazności dla użytkownika oraz wiarygodności. W części drugiej rozważania natury ogólnej odniesiono do współczesnych źródeł informacji o ubezpieczeniach społecznych w Polsce i Unii Europejskiej. Skonstruowano ich typologię, posługując się m.in. kryteriami dysponenta (źródła oficjalne, urzędowe oraz inne), trybu dostępu (zasoby otwarte i restrykcyjne), formy/treści (źródła osobowe i dokumentalne; bazy danych, dokumenty prawne, eksperci, materiały edukacyjne i poradniki itd.) oraz potencjalnego użytkownika (zasoby adresowane do specjalistów i do „każdego”), ilustrując rozważania konkretnymi przykładami. Na tej podstawie sformułowano wnioski dotyczące możliwej oferty infobrokerskiej w zakresie informacji o ubezpieczeniach społecznych.
Analiza danych wizualnych w badaniach zachowań informacyjnych Sabina Cisek
Referat ma charakter metodologiczny, jego zasadniczym celem jest opis i dyskusja jakościowej analizy danych wizualnych jako procedury poznawczej w badaniach zachowań informacyjnych człowieka (ang. human information behavior). W interpretatywnych/rozumiejących dociekaniach informatologicznych, zwłaszcza związanych z refleksją nad człowiekiem w świecie informacji, wizualny materiał empiryczny (fotografie, nagrania wideo, rysunki i schematy wykonane przez respondentów) stanowić może – obok „klasycznych” danych werbalnych (pochodzących np. z dzienniczków albo wywiadów) – wartościowe źródło poznania. W szczególności zwraca na to uwagę Jenna Hartel, pionierka badań wizualnych w dziedzinie information behavior. Należy dodatkowo pokreślić, iż analiza danych wizualnych nie jest tożsama z wizualizacją danych, mimo podobieństwa nazw obydwu procedur.
Opracowanie niniejsze składa się z dwóch głównych części. Pierwsza z nich powstała na podstawie analizy i krytyki piśmiennictwa informatologicznego z lat 2001-2019 oraz wybranych publikacji z zakresu innych nauk społecznych. Odpowiada na następujące pytania badawcze: (1) czy wizualne dane empiryczne są w ogóle wykorzystywane w obszarze zachowań informacyjnych i – jeżeli tak – w jaki sposób i w kontekście jakich zagadnień szczegółowych, w tym – za pomocą jakich technik są gromadzone, (2) jak prowadzona jest analiza tych danych – intuicyjnie czy systematycznie, ze świadomością i eksplikacją przyjmowanych założeń teoretycznych oraz epistemologicznych i metodologicznych.
Część druga referatu ukazuje sposób wykonania, typ rezultatów oraz możliwe korzyści, wady i zalety jakościowej analizy danych wizualnych w badawczej praktyce. Stanowi studium przypadku przestrzeni informacyjnych w życiu codziennym studentów pierwszego roku zarządzania informacją w Uniwersytecie Jagiellońskim. Materiał empiryczny w postaci 63. rysunków przeanalizowano stosując kodowanie indukcyjne oraz analizę tematyczną. Perspektywę teoretyczno-metodologiczną opisywanych badań uformowały m.in. teoria horyzontów informacyjnych Diane H. Sonnewald, a także koncepcje małych światów Elfredy Chatman oraz tymczasowych miejsc informacyjnych Karen Fisher.
Analiza danych wizualnych może być bardzo owocna poznawczo, umożliwia m.in. uchwycenie „rzeczywistości informacyjnej” tak, jak ta faktycznie jest postrzegana przez użytkowników (współczynnik humanistyczny). Jest jednak czasochłonna, wymaga skrupulatności, solidnej autorefleksji badacza oraz – podobnie jak inne procedury jakościowe – pozostawienia tzw. „ścieżki sprawdzenia” w celu zapewnienia wiarygodności i intersubiektywnej sprawdzalności dociekań.
Zagadnienie rozwoju kompetencji informacyjnych (ang. information literacy) w szkole wyższej posiada co najmniej trzy wymiary, mianowicie: (1) cele i efekty uczenia się – co studenci powinni wiedzieć, umieć i akceptować w obszarze indywidualnego i grupowego zarządzania informacją; (2) organizacja kształcenia – formy, metody i środki dydaktyczne; (3) sposoby ewaluacji kompetencji informacyjnych. Referat poświęcony jest pierwszemu – z wymienionych – aspektowi. Charakterystykę oczekiwanych efektów kształcenia – także w dziedzinie information literacy – można oprzeć na tzw. koncepcjach progowych (ang. threshold concepts), czyli ideach, które – gdy zostaną pojęte – otwierają nowe pespektywy poznawcze, powodują transformację umiejętności i wiedzy, a nawet zmianę światopoglądu. Najważniejszą współczesną inicjatywą w tym zakresie jest amerykański Framework for Information Literacy for Higher Education, opracowany przez stowarzyszenie Association of College and Research Libraries w roku 2016. W referacie omówiono jego sześć „ram” i ich potencjalny wpływ na edukację informacyjną w uczelniach.
- Zachowania informacyjne jako subdyscyplina informatologii (dzieje – zmiany paradygmatu, konferencje, piśmiennictwo, uczeni). Badania użytkowników informacji.
- Zachowania informacyjne – obecny stan wiedzy w informatologii – definicje, pojęcia pokrewne, konteksty i uwarunkowania, typologia itd.
- Wybrane koncepcje i modele zachowań informacyjnych – typologia, omówienie niektórych z nich (modele Toma Wilsona i Barbary Niedźwiedzkiej; przypadkowe pozyskiwanie informacji; koncepcja Davida Ellisa)
- Poszukiwanie informacji – najlepiej zbadane zachowanie informacyjne
- Dzielenie się informacją (i wiedzą)
- Potrzeby informacyjne
- Bariery informacyjne
- Jak badać zachowania informacyjne? Elementy metodologii badań użytkowników informacji.
Jak skutecznie pozyskiwać informacje w internecie? Wykorzystanie zasobów Dee...Sabina Cisek
Ogólne zasady poszukiwania informacji w internecie
Sposoby dostępu do zasobów Deep Web
Zasoby naukowe w Deep Web
Pozyskiwanie danych, publikacji i treści (w tym naukowych) z Deep Web – przykłady, studia przypadków
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Filter bubble and information behaviour, ISIC 2018, keynote speech
1. The filter bubble: a perspective for
information behaviour research
Sabina Cisek
Monika Krakowska
Jagiellonian University in Kraków
1
2. Contents
• Why do we discuss the concept and phenomenon of filter
bubble?
• Filter bubble and information behaviour: the current state of
research
• The filter bubble – definition, genesis, characteristics and
widening of the concept
• The psychological dimension
• The socio-cultural dimension
• The epistemological/methodological dimension
• How to burst your filter/epistemic bubble?
• Conclusions and ideas
• Selected literature
2
3. Our main objectives
• To discuss the concept of filter bubble and its various
dimensions – psychological, socio-cultural, epistemological
• To show that this notion might be a fruitful
methodological/theoretical framework for the information
behaviour research, to be used for:
– disclosing unknown aspects of information behaviour
– organizing/seeing – in a new way – what we already know
about human information behavior
3
We do not cover all possible aspects of the filter bubble related issues.
We rather ask questions than provide answers.
4. WHY DO WE DISCUSS THE CONCEPT
AND PHENOMENON OF FILTER
BUBBLE?
4
5. • It concerns billions of people – has not
only cognitive/epistemic aspects but also
moral, political, social … .
• Fake news, manipulation
• Own (bad) experiences with social media
• There is not much research on that
problem – but we think it may be
interesting and scholarly fruitful.
5
6. • 1.47 billion daily active users on Facebook on average for June 2018
• 2.23 billion monthly active users on Facebook as of June 30, 2018 (Facebook Stat, 2018)
It may be assumed that over 2 billion users of social media (Facebook) are
exposed to personalised messages, manipulation, fake news.
6
https://wearesocial.com/blog/2018/01/global-digital-report-2018
7. Manipulation
Example from the scientific perspective:
Danger of the anti-vaccination movement
7
Jaret, Peter (2016). The Danger of the Anti-vaccination movement.
http://www.berkeleywellness.com/healthy-community/contagious-disease/article/danger-anti-vaccine-movement
8. Fake news
It was the Abdul Aziz Al-Otaibi’s artistic project that went viral
through many social media channels.
This also shows the political dimension of filter bubbles.
8
Hooton, 2014
Did this boy really
sleep between his
parents graves?
9. FILTER BUBBLE AND INFORMATION
BEHAVIOUR: THE CURRENT STATE
OF RESEARCH
9
10. Scholarly publications on filter bubbles [1]
• Google Scholar – about 5430 results
• Scopus (in Title-Abstract-Keywords) – 21 results, from years
2012-2018
• Web of Science (all databases) in the Topic category – 17
results, from years 2011-2018
• Wiley Online Library – 40 results, from years 2011-2018
• LISTA Library, Information Science and Technology Abstracts –
13 results, from years 2011-2018
10
Query „filter bubble” AND internet, September 2018
11. Scholarly publications on filter bubbles [2]
• Google Scholar – about 135 results
• Scopus (in Title-Abstract-Keywords) – 0 results
• Web of Science (all databases) in the Topic category – 0
results
• Wiley Online Library – 2 results, from years 2012-2018
• LISTA Library, Information Science and Technology
Abstracts – 1 result (Tran, Yerbury, 2015)
11
Query „filter bubble” AND („information behavior”
OR „information behaviour”), September 2018
12. THE FILTER BUBBLE – DEFINITION,
GENESIS, CHARACTERISTICS AND
WIDENING OF THE CONCEPT
12
13. The concept and theory of filter bubble and
related ideas/notions have to be carefully
analysed to become useful for information
behaviour research,
because – in popular conversation – they are
frequently approached emotionally, without
deeper scholarly reflection – especially in the
political context.
13
15. What is a filter bubble – in its narrow,
„algorithmic” sense? [1]
• The term „filter bubble” was coined
by Eli Pariser in his book The filter
bubble: what the internet is hiding
from you (2011), cited 2886 times
(Google Scholar)
• But – the problem itself had been
discussed earlier (e.g. Sunstein,
2001; 2007)
15
16. What is a filter bubble – in its narrow,
„algorithmic” sense? [2]
„A filter bubble is the intellectual isolation that can occur when websites make
use of algorithms to selectively assume the information a user would want to
see, and then give information to the user according to this assumption.
Websites make these assumptions based on the information related to the user,
such as former click behavior, browsing history, search history and location. For
that reason, the websites are more likely to present only information that will
abide by the user's past activity.
A filter bubble, therefore, can cause users to get significantly less contact with
contradicting viewpoints, causing the user to become intellectually isolated.
Personalized search results from Google and personalized news stream from
Facebook are two perfect examples of this phenomenon.”
https://www.techopedia.com/definition/28556/filter-bubble
16
17. 17
Websites (search
engines, social media)
need satisfied clients
Users want „nice”, easy-to-
get content – Principle of
Least Effort
Features of the contemporary information ecosystem: enormous chaos,
information overload, manipulation and fake content, rapid changes
Relevance
Filtering
algorithms
Personalisation
of content
Reinforcement, feedback-
loop between users and
algorithm
How filter bubbles are created?
18. The three main questions
1) Do filter bubbles actually exist? If yes – are
they important? Do personalising algorithms
really have deleterious effects?
2) The prevailing opinion is that filter bubbles
are bad. But – why is getting personalised,
tailored information considered wrong?
3) Is it a completely new problem/situation?
18
19. 1) Voices against the existence/importance of filter bubbles
or harmful effects of personalisation by algorithms
19
„Within the population under study here,
individuals choices (…) more than algorithms (…)
limit exposure to attitude-challenging content in
the context of Facebook. Despite the differences in
what individuals consume across ideological lines,
our work suggests that individuals are exposed to
more cross-cutting discourse in social media (…)”
(Bakshy, Messing, Adamic, 2015).
„We distinguish between self
selected personalisation, where
people actively choose which
content they see, and pre-
selected personalisation, where
algorithms personalise content
for users without any deliberate
user choice. (…) We conclude
that – in spite of the serious
concerns voiced – at present,
there is no empirical evidence
that warrants any strong worries
about filter bubbles” (Borgesius
et al. 2016).
„We conducted two exploratory studies to test the
effect of both implicit and explicit personalization
on the content and source diversity of Google
News. Except for small effects of implicit
personalization on content diversity, we found no
support for the filter-bubble hypothesis” (Haim,
Graefe, Brosius, 2018).
20. 2) Why are filter bubbles (as „products” of
personalisation) harmful?
• Algorithms are content/information gatekeepers – censors. They hinder:
– access to content – data, documents, news, resources,
– awareness that there are different/other opinions, worldviews on known issues,
– awareness of the mere existence of some issues, problems, questions.
• Personalisation is done by algorithms, not by experts. Algorithms do not
base on ethical principles.
• Filter bubbles are invisible (implicit personalisation). Users do not know that
information they get is personalised. They may assume it is complete and
neutral/objective.
• Filter bubbles are involuntary.
• Filter bubbles contribute to creation of echo chambers (and those cause
political and social problems).
20
21. 3) Is this a completely new situation?
• People have always experienced filter/epistemic
bubbles and always there were information
gatekeepers – families (parents!), political powers,
religions, social groups … . And – in many cases –
those bubbles have been invisible and
involuntary.
• In addition – we need to filter/select content – to
get relevant, reliable, useful information.
21
22. Widening of the filter bubble concept [1]
• Three „layers” of filter bubbles – users lack
knowledge about
– the existence, way of working, or effects of filtering
algorithms and personalisation (Facebook, Google,
Twitter),
– more advanced search techniques within major
websites,
– the mere existence of (1) other search services and (2)
the Deep Web.
22
23. Widening of the filter bubble concept [2]
• Filter bubbles and epistemic bubbles
• Information behaviour/seeking is not only
technology-driven and affected solely by cognitive
factors. It also has biological, political, psychological,
socio-cultural, and time-space determinants.
23
24. 24
Filter
bubbles
(Pariser, 2011)
Epistemic
bubbles
(Nguyen, 2018)
Cognitive/epistemic content
filtered by the websites’ ways of
working, in particular –by
personalising algorithms
Cognitive/epistemic
content filtered by
biology, culture, history
(authorities, paradigms,
social groups, traditions )
Attitudes, emotion, people,
social relations filtered by
the websites’ ways of
working, in particular – by
personalising algorithms
26. 26
The formation of filter/information
bubbles may be related to the
emotional interactions of internal
cognitive structures with the real
world = relationship with mental
models (Craik’s concept)
Emotions and motivations are
incentives, but also regulators of
mental processes that influence the
assessment of an event, situation,
context, object – thus imply (or not)
favourable, indifferent or unfavourable
behaviour (Lazarus, James-Lange
theories of emotions)
In biology, psychology and cognitive sciences, all human reactions to the outside
world refer to the evolutionary mechanism of coping, adapting to ecosystems
This mechanism is a combination of the endocrine system, the nervous
system, an individual phenotype that also affects the construction of the
so-called emotional brain (LeDoux’s theory)
Codification of aspirations to
regulate and control reactions and
actions in accordance with human
intention = filter bubbles deepen
the effect of self-satisfaction
Filter/information bubble as the
reaction to excessive psychological
costs, need for self-protection and
low self-efficacy
28. Negative aspects
• Creating a misleading and erroneous image of reality, an
individual mental model = closure in a limited, hermetic
circle of information, opinions, views, worldviews, limiting
the acquisition of knowledge
• Confirmation bias and cognitive bias formation
• Promoting intellectual and emotional laziness = because it
does not expose you to cognitive dissonance and
intolerance for uncertainty
• Not developing collective emotions = because it is better to
experience affective emotions (safe and often positive) of
„being in the same boat”
28
29. Positive aspects
• Filter bubble
– aims to hedge against information chaos, overload safety
– has the impact on emotional well-being, reduction of
excessive psychological costs by constructing a subjective
information space
29
According to social psychology, positive cognitive
stimulation of users, affirmative mood, beneficial
affects increases the expressiveness of cognitive
and informational activities and processes, has an
impact on the increase of creativity, understanding
of relationships, hierarchizing tasks, individual
involvement and its informational behavior.
31. 31
THE SOCIO-CULTURAL AND RELATIONSHIP FILTER BUBBLE
Echo chambers = diffused or
homogeneous user groups
duplicate, strengthen beliefs,
knowledge within the group; there
is a reluctance to consider
alternatives to preferred views
(tunnel vision)
„The strength of weak ties”
theory (Granovetter) in
information diffusion
Group polarization – the tendency
to form very extreme positions and
to adopt extreme attitudes in the
group
The concept of persuasive
argumentation – while users seek for
support and argumentation for the
opinions held, which causes
polarization and the concept of social
comparisons and adaptation of
individual views to the extreme and
image building
Can hinder rather than
facilitate „adding the diversity
to our lives”
Small worlds theory and life in the round theory
(Chatman) = striving for participation in
normative collectives due to their attractiveness
and benefits and intensification of beliefs
32. 32
• Can intensify the fear of rejection
• Lost of the ability to discuss
• May lead to the groupthink = a
psychological phenomenon wherein
groups of people experience a temporary
loss of the ability to think in a rational,
moral and realistic manner
• Petrification of attitudes and behaviours
• It is not conducive to learning something
new
• Shapes opinions and attitudes of
individuals and groups
• Positive collective reinforcement
(support of information
processes, development of
interpersonal relations -
support, help, etc.)
• Social constructivism assumes
that user perceives and
understands reality subjectively,
through its permanent
interpretation and interaction
with others
THE SOCIO-CULTURAL FILTER BUBLE
NEGATIVE ASPECTS POSITIVE ASPECTS
34. • Epistemological/methodological filter bubbles
– domains (Hjørland)
– paradigms (Kuhn)
– research frameworks
– research traditions
as filtering entities.
• Questions:
– How do they filter scholarly content and values?
– How does that influence researchers/scholars/students’
information behaviour?
34
35. Epistemological/methodological filter bubbles
POSSIBLE PROBLEMS
• Circular reasoning
• A limited repertoire of
research methods and
questions
• Imposing the researcher’s
worldview on the subjects, not
seeing worlds of others
• Unwitting acceptance of
philosophical (axiological,
epistemological, ontological)
assumptions
POSITIVE ASPECTS
• Ability to extend existing
knowledge
• Common „starting point”
• Facilitated communication
• Social acceptance/inclusion
35
36. Justificatory status of beliefs/claims
The classic, JTB definition of knowledge:
A subject S knows that a proposition P is true if and
only if:
• P is true, and
• S believes that P is true, and
• S is justified in believing that P is true
36
The problem – resulting from
epistemic/filter bubbles – is here.
37. How to escape from academic/research
filter bubbles?
• Critical self-reflection, metacognition
and
• Conferences – „breaking out” of own scholarly
milieu
• Interdisciplinarity
• Thorough critical literature review or
systematic review
37
39. Does anyone really have to burst
their filter bubbles?
• No and yes
• But there are groups that certainly should:
– librarians and information specialists –
professional responsibility
– scholars/scientist/researchers – epistemic
responsibility
39
40. General advice
• Realize that filter/epistemic bubbles exist
• Develop critical thinking
• Develop information literacy (broadly
understood)
40
41. A few pieces of advice for internet
searching (1)
• Actively seek for information – rather than
passively consume what algorithms have chosen
for you
• Benefit from different search tools offered by
Google (or other major search engines) – the
Boolean operators, commands, phrase, advanced
search, etc.
• Employ various search engines/tools, databases,
portals etc. and compare results
41
42. A few pieces of advice for internet
searching (2)
• Use search engines that do not track users and – as a
result – do not personalise, e.g. DuckDuckGo, Qwant,
StartPage
• Use software, that helps to get out of your filter
bubble, e.g. Escape Your Bubble (Chrome extension),
FleepFeed (Twitter), Pop Your Bubble (Facebook)
and
• Remember there is the Deep Web
42
44. Information behaviour concepts, models and
questions that may be seen from the perspective of
filter/epistemic bubbles
• evaluation of information quality
• information barriers
• information needs
• information sharing
• perception of relevance
• principle of least effort
• stopping behavior
• thoroughness of information seeking and filtering
• time spent on information seeking
44
45. Filter bubbles and various types of
information behaviour
• Information acquisition
– Active acquisition = seeking (searching, browsing, and
monitoring)
– Passive acquisition
– Serendipity, chance encounters
– When others share information with you
• Information evaluation and selection
• Avoiding or destroying information
• Personal and group information management
45
46. 46
Features of the contemporary information ecosystem:
enormous chaos, information overload, manipulation
and fake content, rapid changes
Different strategies users
(individuals and groups) apply to
manage their dynamic,
overwhelming and often uncertain
information environment
Offer of major content/search
providers: filtering and
personalizing algorithms.
Filter bubbles
Communities of practice, domain-
specific behaviour, gatekeeping, good
enough/satisficing, information
horizons, paradigms, principle of least
effort, sense-making, small worlds,
stopping behaviour
Epistemic bubbles
Concept map of
potential research:
filter bubbles and
information
behaviour
47. • It is most probable that every human being has one
information space, built up from multiple layers and many
epistemic/filter/information bubbles.
• Filter bubbles show distorted elements and not the context,
they strengthen the sense of unreality, misperception of
everything that surrounds the users.
• It is natural that with the growth of information resources
and development of new technologies, both the
technology, culture, and communities systems will
increasingly filter content/information.
• The filter bubble approach may become fruitful in
information behaviour research – if the original,
„algorithmic” concept is widened.
47
48. 48
Fish don’t know they are in the
water and people don’t know
they are in a filter bubble unless
they take the effort to leave the
capsule — if anyone dare.
(FS Farnam Street Media Inc., 2018)
49. Selected literature (1)
• Arfini, Selene; Bertolotti, Tommaso; Magnani, Lorenzo (2018). The diffusion of ignorance in on-line communities.
International Journal of Technoethics, Vol. 10, No. 1, p. 37-50.
• Bakshy, Eytan; Messing, Solomon; Adamic, Lada A. (2015). Exposure to ideologically diverse news and opinion on Facebook,
Science, Vol. 348, No. 6239, p. 1130-1132.
• Borgesius, Frederik J. Zuiderveen et al. (2016). Should we worry about filter bubbles? Internet Policy Review, Vol. 5,
https://doi.org/10.14763/2016.1.401
• Calero Valdez, Andre; Ziefle, Martina (2018). Human factors in the age of algorithms. Understanding the human-in-the-loop
using agent-based modeling. Lecture Notes in Computer Science, Vol. 10914 LNCS, p. 357-371.
• Chatman, Elfrieda A. (1991). Life in a small world: applicability of gratification theory to information-seeking behavior. Journal
of the American Society for Information Science, Vol. 42, p. 438-449.
• Erdelez, Sanda; Jahnke, Isa (2018). Personalized systems and illusion of serendipity: a sociotechnical lens.
https://wepir.adaptcentre.ie/papers/WEPIR_2018_paper_6.pdf
• Framework for information literacy for higher education (2016). Association of College and Research Libraries, American
Library Association. http://www.ala.org/acrl/standards/ilframework
• FS Farnam Street Media Inc. (2018). How filter bubbles distort reality: everything you need to know.
https://fs.blog/2017/07/filter-bubbles/
• Haim, Mario; Graefe, Andreas; Brosius, Hans-Bernd (2018). Burst of the filter bubble? Effects of personalization on the
diversity of Google News. Digital Journalism, Vol. 6, No. 3. https://doi.org/10.1080/21670811.2017.1338145
• Holone, Harald (2016). The filter bubble and its effect on online personal health information. Croatian Medical Journal, Vol.
57, No. 3, p. 298-301. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4937233/
• Johnson-Laird, Philip; Goodwin, Geoffrey; Khemlani, Sangeet S. (2017). Mental models and Reasoning.
http://mentalmodels.princeton.edu/papers/2017MMs&reasoning.pdf
49
50. Selected literature (2)
• Lazarus, Richard (1982). Thoughts on the relation between cognition and emotion. American Psychologist, Vol. 37, No. 9, p.
1019-1024.
• Miller, Boaz; Record, Isaac (2013). Justified belief in a digital age: on the epistemic implications of secret internet
technologies. Episteme, Vol. 10, No. 2, p. 117-134.
• Ngyen, C. Thi (2018). Echo chambers and epistemic bubbles. Episteme, p. 1-21. https://doi.org/10.1017/epi.2018.32
• Nickerson, Raymond S. (1998). Confirmation bias: a ubiquitous phenomenon in many guises. Review of General Psychology,
Vol. 2, No. 2, p. 175-220.
https://www.researchgate.net/publication/280685490_Confirmation_Bias_A_Ubiquitous_Phenomenon_in_Many_Guises
• Pariser, Eli (2015). Did Facebook’s big new study kill my filter bubble thesis? https://www.wired.com/2015/05/did-facebooks-
big-study-kill-my-filter-bubble-thesis/
• Pariser, Eli (2011). The filter bubble: what the internet is hiding from you. New York: The Penguin Press.
• Salehi, Sara; Du, Jia Tina; Ashman, Helen (2018). Use of Web search engines and personalisation in information searching for
educational purposes. Information Research, Vol. 23, No. 2, paper 788. http://www.informationr.net/ir/23-2/paper788.html
• Sonnenwald, Diane H.; Iivonen, Mirja (1999). An integrated human information behavior research framework for information
studies. Library and Information Science Research, Vol. 21, No. 4, p. 429-457.
• Spink, Amanda; Currier, James (2006). Towards an evolutionary perspective for human information behaviour. Journal of
Documentation, Vol. 62, No. 2, p. 171-193.
• Sunstein, Cass R. (2001). Republic.com. Princeton: Princeton University Press.
• Sunstein, Cass R. (2007). Republic.com 2.0. Princeton: Princeton University Press.
• The filter bubble. https://dontbubble.me/
• Tran, Theresa; Yerbury, Hilary (2015). New perspectives on personalised search results: expertise and institutionalisation.
Australian Academic and Research Libraries, Vol. 46, No. 4, p. 275-288.
50