ArticlePDF Available

Sharing information encountered for others on the Web

Authors:
... To conduct the conceptual analysis, relevant text portions (paragraphs and sentences) characterizing the main objects of the study, that is, information seeking and information sharing were identified. Second, their propertiesnamed as constituentswere identified; constituents of this kind include, for example, work-task oriented information seeking (Du, 2014), information seeking by proxy (McKenzie, 2003), information transfer (Wilson, 1999) and sharing information encountered for others (Erdelez and Rioux, 2000). Third, it was examined how researchers have defined and described such constituents. ...
... According to Erdelez (2005, p. 180), encountering can be understood as "an instance of accidental discovery of information during an active search for some other information." Erdelez and Rioux (2000) introduced other relevant categories for the characterization of the connection of information seeking and sharing, that is, sharing information encountered for others, and sharing information found for others on the Web. The elaboration of the above concepts resulted in the development of the model for Information Acquiring-and-Sharing (IA&S) (Rioux, 2004(Rioux, , 2005. ...
... − information seeking and sharing are discrete activities connected by a third factor, for example, information need or information use − information sharing appears as information transfer + information seeking and sharing are reviewed in a broader context of information behavior − the picture of the connections between information seeking and sharing remains unspecific − limited applicability in the study of information seeking and sharing occurring in the networked information environments Krikelas (1983); Wilson (1981Wilson ( , 1999 Sequential − information seeking precedes information sharing; however, the connection is not causal − the connection can be characterized by constructs such as information encountering for others, information acquisition & sharing, and information seeking by proxy − information sharing appears as information transfer or information exchange + information seeking and sharing are reviewed in a broader context of information behavior or information practice − the sequential approach results in a one-dimensional picture of the relationships between information seeking and sharing − not flexible enough to the needs of analyzing interactive information seeking and sharing occurring in the networked information environments Allen (1977); Erdelez and Rioux (2000); McKenzie (2003); Rioux (2004Rioux ( , 2005 Interactive − information seeking and sharing are activities that can occur in varying temporal order − information sharing mainly appears as information exchange − the interaction can result in several rounds or cycles of information seeking and sharing − information seeking and sharing can mutually shape each other + allows a holistic and dynamic picture of the iterative and cyclical nature of the processes of information seeking and sharing in diverse contexts, including the networked information environments − the interactive approach is difficult to model in detail, due to the complexities of the cyclical processes constitutive of information seeking and sharing Du (2014); Robinson (2013, 2015) Table I. Summary of the main findings by depicting a series of cyclic processes of information seeking and sharing mutually shaping each other. ...
Article
Purpose The purpose of this paper is to contribute to the creation of a holistic picture of information behavior by examining the connections between information seeking and sharing. Design/methodology/approach Conceptual analysis is used to focus on the ways in which the researchers have modeled the interplay of information seeking and sharing. The study draws on conceptual analysis of 27 key studies examining the above issue, with a focus on the scrutiny of six major models for information behavior. Findings Researchers have employed three main approaches to model the relationships between information seeking and sharing. The indirect approach conceptualizes information seeking and sharing as discrete activities connected by an intermediating factor, for example, information need. The sequential approach assumes that information seeking precedes information sharing. From the viewpoint of the interactive approach, information seeking and sharing appear as mutually related activities shaping each other iteratively or in a cyclical manner. The interactive approach provides the most sophisticated research perspective on the relationships of information seeking and sharing and contributes to holistic understanding of human information behavior. Research limitations/implications As the study focuses on information seeking and sharing, no attention is devoted to other activities constitutive of information behavior, for example, information use. Originality/value The study pioneers by providing an in-depth analysis of the connections of information seeking and information sharing.
... * Limberg [138] proposed an approach termed "phenomenography" and compared its potential utilities to other approaches. * Erdelez [95], Erdelez & Rioux [96] focused on accidental discovery of information. Toms [227] focused on browsing as a mode of information seeking. ...
... Given quantity of work available and the disarray and contradictions in its attentions, this would be impossible. What I am providing is my "take" on the situation based on reasonably extensive reading [3,21,22,24,45,49], (Enochsson, 2001), [96,105], (Healy, 1998), [131,136,137,141,145,156,169], (Rifkin, 1997), [197,222,246]. ...
Article
Full-text available
This paper summarizes what is known about everyday health information seeking and use, as supported by empirical research largely conducted during the 1980s and 1990’s. It draws implications for research and system design applicable to the U.S. National Library of Medicine’s (NLM) MedlinePlus web portal and data base of consumer health information. Its focus is on the two academic disciplines that bear most directly on information seeking and use, each with different perspectives. Communication (COMM) whose orientation is the study of messaging and the effective transmission of information, and Library and Information Science (LIS) whose focus is on meeting user information needs. Although there is very little overlapping literature, Dr. Dervin’s career was spent working across these two research genres. She is known most prominently for her Sense-Making Methodology. Dr. Dervin supports the view that there are more commonalities than differences between the two disciplines, and that research focusing on the commonalities provides a better opportunity for accounting for more variance in human information seeking than the highly compartmentalized approaches that dominate the study of information seeking. Dr. Dervin’s first-person review of these literatures was commissioned by NLM in 2001. It remains relevant today both for its critical insights, and as an historical resource. It is published posthumously in 2023 in tribute to Dr. Dervin on her recent passing.
... Social networks provide consumers with information channels [17]. In social networks, information sharing behavior is a common behavior, which network members share information accidentally found or needed by others [18]. Information sharing behavior is a very important social behavior, which often occurs in the network or social groups, and is not a special behavior of individual [19]. ...
Article
Full-text available
China is still facing the double challenges of over nutrition and malnutrition. One of the main reasons is the lack of residents’ understanding of the nutritional value of food. Quantified self, as a measure of consumer self-activity, has been used to analyze food consumption behavior recently. Although the research results are increasing, the conclusions are not consistent. What’s more, previous literatures did not consider food consumption behavior based on the theory of information perception and the risk perception theory. In addition to obtaining information through their own human capital for quantitative activities, consumers will also obtain information through social networks. In view of the above understanding, this study uses experimental design and field survey to obtain data, uses Heckman two-step method and PLS path modeling method to analyze the impact of consumers’ quantified self-behavior on their health food consumption, and discusses the moderating role of social networks based on the perspective of complex network. The results show that (1) consumers’ health awareness can promote their choice of quantified self-behavior, (2) consumers’ quantified self-behavior is helpful to promote their purchase intention and purchase scale of healthy food, and (3) social networks play a positive moderating role in consumers’ quantified self-influence on their healthy food consumption. Both emotional networks and instrumental networks have significant moderating effect, but the formal is stronger. This article not only considers the relationship between food consumption behavior and social network but also the enhances literature based on the theory of information perception and the risk perception theory.
... Information can be shared voluntarily in order to provide information to the people who are in need (Jarvenpaa, Staples;2001). The information is shared among the needy using the simplest and cheapest technology available such as email and face-to-face (Erdelez, Rioux, 2000). The main reasons for sharing the information in these levels are (Marshal, Bly, 2004): a. ...
Article
Information resources, spatial or non-spatial are used widely and wisely to improve the organization's operation in today's competitive environment. With the advancement of information and communication technology, information sharing is made feasible and practiced within various entities. However, information sharing can be complex. There are various factors that influence cross-boundary information sharing because each organization operates within complex information, organizational and national context. There can be differences in technology, knowledge, culture, politics, geography, resources, relationships and intentions. This paper highlights on the different factors that can influence the information sharing in different perspectives.Nepalese Journal on Geoinformatics -13, 2014, Page: 7-13
... The ability to handle effectively information that is encountered by happenstance may be essential to a person's ability to discover new material and make new connections [80]. People also keep information that they have actively sought, but do not have time to process currently. ...
Preprint
Full-text available
Personal Information Management (PIM) refers to the practice and the study of the activities a person performs in order to acquire or create, store, organize, maintain, retrieve, use, and distribute information in each of its many forms (paper and digital, in e-mails, files, Web pages, text messages, tweets, posts, etc.) as needed to meet life's many goals (everyday and long-term, work-related and not) and to fulfill life's many roles and responsibilities (as parent, spouse, friend, employee, member of community, etc.). PIM activities are an effort to establish, use, and maintain a mapping between information and need. Activities of finding (and re-finding) move from a current need toward information while activities of keeping move from encountered information toward anticipated need. Meta-level activities such as maintaining, organizing, and managing the flow of information focus on the mapping itself. Tools and techniques of PIM can promote information integration with benefits for each kind of PIM activity and across the life cycle of personal information. Understanding how best to accomplish this integration without inadvertently creating problems along the way is a key challenge of PIM.
... As described above, two variations of by proxy mode existed for the nurses. The variations were shaped by whether the nurse was asking the question (an imposed query) or being asked the question (information seeking by proxy) (Erdelez & Rioux, 2000;Gross & Saxton, 2001;McKenzie, 2003a). In both variations, proxy agents become a local bridge linking the information seeker to a trusted information source. ...
Thesis
Full-text available
As the therapeutic use of cannabis increases, Americans are turning to nurses as sources of information about the safe and effective therapeutic use of cannabis. This study uses qualitative methods to explore how 31 highly educated and experienced American nurses used information practices to connect and interact with sources of cannabis information. By answering the question “What are information practices of cannabis nurses?,” the study addresses an unexplored gap in the research conversation among information scientists, nurse educators, and medicinal cannabis researchers. The aim of this study is to better understand cognitive authority and to examine how these nurses used information practices to learn how to be cannabis nurses. The study design used the McKenzie Information Practices Model (MIP) for data collection and analysis. The MIP model helped produce a rich description of the information practices of cannabis nurses. Findings show that cannabis nurses are using their information practices to locate cognitive authorities—that is, sources of secondhand knowledge whose facts and data about cannabis the nurses believed to be true. Findings also indicate that the nurses’ information practices create serendipitous social situations where they could reveal themselves as possible cognitive authorities for other cannabis information seekers. The analysis also produced findings concerning the barriers to learning the nurses encountered and their shared interpretative repertories—especially regarding the continued stigma against cannabis use. In addition, findings indicate, the cannabis nurses are acting as boundary spanners and peripheral specialists in the adoption of cannabis as a radical innovation in mainstream healthcare. This analysis also revealed the absence of cannabis care-specific information technology and decision support systems and the development of a network of practice. The implications are that cannabis nurses may be normalizing cannabis for their colleagues, a dynamic that may be leading to the adoption of cannabis therapeutics in mainstream medicine.
... Information is often e.g. encountered while surfing on the Internet (Erdelez and Rioux, 2000). This may be related to the relaxed mode of leisurely Web surfing, which inspires divergent and lateral thinking (Campos and Figueiredo, 2001). ...
Article
Full-text available
Introduction. Individual differences have long been said to influence serendipity. Empirically, however, robust evidence is lacking for this connection. This study addressed this research gap by linking serendipity to personality traits and sense of coherence. Method. Data from 140 respondents was collected by an online survey. The survey measured the five-factor model personality traits, sense of coherence and serendipitously found useful and interesting information. Analysis. The data was analysed by a general linear model regression analysis. Results. Only 7% of variance of serendipity/usefulness and 10% of serendipity/interest could be explained by personality and sense of coherence. Usefulness was linked to sense of coherence (low comprehensibility), while interest was linked to personality (extraversion, agreeableness and low negative emotionality). Conclusions. Individual differences in serendipity was found both related to a negative cognitive experience of information chaos and a positive affective-behavioural experience of discovery. Lack of control over the information flow could lead to a sense that acquisition of useful information is governed by chance rather than conscious efforts. Activity, social connectedness and positive emotionality, in turn, would increase the likelihood to discover interesting information.
... Common design search patterns such as "See Also" panels, recent searches and viewed items are used to support serendipitous exploration on commercial sites like Amazon and eBay. In the academic field, recent systems have been designed to promote serendipitous discoveries over web search (Erdelez & Rioux, 2000). These have used standard information retrieval techniques to model interest based on previous digital experience such as email and chat archives, they then use this information to highlight terms or pages (Beale, 2007;Hangal et al., 2012). ...
Conference Paper
Full-text available
This paper presents a novel understanding of programmatic advertising and micro targeting in the context of non-profit and voluntary sector marketing. It argues that while these types of automated tactics are met with resistance in current research, they can aid effective non-profit marketing strategy. The critiques moved to these tactics are twofold: programmatic advertising cause loss of organic discovery of information (or loss of serendipity) and programmatic ads delivered to specific target audiences can be used to spread fake news and influence decision-making. The Cambridge Analytica scandal is perhaps the best example of how these tactics can be unethically employed to manipulate behaviour. The paper critically engages with these critiques and argues that, used effectively, programmatic advertising and micro-targeting can drive more effective results and advance non-profit and voluntary-sector marketing. Building upon human information behaviour the paper produces a model to unpack the logics behind these tactics and identify best practices to employ them for non-profit marketing. The model is tested through the distribution of a digital serious game and an evaluative questionnaire, which has been designed in collaboration with multiple third sector stakeholders to raise awareness about economic abuse and inform about available support in Scotland. The results demonstrate that the model accurately and effectively reflects users’ behaviours when exposed to programmatically delivered messages. Given these outcomes, the paper proposes that programmatic advertising and micro-targeting offer new opportunities for the third sector. This, however, is not to mean that concerns do not exist, rather than a strong understanding of content and the algorithmic logics of programmatic distribution are needed to maximise marketing efforts within a third sector and ethically focused context. This paper wants to contribute new understandings of programmatic advertising and micro-targeting and come to enrich literature and theoretical corpus about these in the context of non-profit and institutional marketing.
Article
Information sharing can be an enabler for generating value. An organization’s ability to disseminate accurate, complete and timely information has been related to higher levels of organizational efficiencies, in turn generating value for customers. An assumption underlying this conceptual article is that organizations capable of sharing information efficiently and effectively have created certain social–technical conditions that make the interaction of stakeholders more fluid and productive, reducing cycling time of the decision-making process. This article will propose how such an information sharing infrastructure may be conceptualized as a boundary object, providing common mechanisms and meanings for all actors involved in moving data and transforming it into knowledge. With these conditions set, we identify that an enabler of value—the human capability to transform data into information and knowledge—can be created, and organizational benefits can be realized in the form of efficient and accurate decision-making.
ResearchGate has not been able to resolve any references for this publication.