Library and Information Service >
Literature Review on Information Society by U.S. LIS Community Since 2013
Received date: 2015-09-22
Revised date: 2015-10-02
Online published: 2015-10-20
[Purpose/significance]The study on theories of information society is important for today's library and information science. And the latest development of U.S. LIS on information society research can provide a reference for Chinese scholars about related studies of Information society.[Method/process]We collected and organized all published papers on five authoritative U.S. LIS journals from January 2013 to August 2015. With the two-class classification system of the selected most representative 136 papers, we clearly revealed the distribution of literature research themes and elaborated on the direction and progress of U.S. LIS on information society research since 2013.[Result/conclusion]Here are the conclusions of this study. ①The information society research of U.S. LIS is composed of seven themes, including basic issues of the information society, information infrastructure and services, human information behavior, information hierarchy and community, information economy and employment, information ethics and the legal system and information politics. ②The three directions of U.S. LIS on information society research are practice elements change, system theory construction and development trend forecast of information society. ③The advantages of U.S. LIS on information society research lie in its wide research field and the integration of theory and practice. ④The limitations of U.S. LIS on information society research are that the majority of the studies are micro innovations and a depth study of economic perspective is lacking which results in little practical value.
Yang Zhiwei , Lang Yujie . Literature Review on Information Society by U.S. LIS Community Since 2013[J]. Library and Information Service, 2015 , 59(20) : 138 -148 . DOI: 10.13266/j.issn.0252-3116.2015.20.023
[1] 韦伯斯特.信息社会理论(第三版)[M].曹晋,梁静,李哲,等译.北京: 北京大学出版社,2001.
[2] 吴正荆,靖继鹏,孙成江. 信息社会学理论范式研究[J].情报科学,2008,26(8):1135-1139.
[3] 吴正荆. 信息社会学研究内容、理论范式与学科体系研究[D].长春:吉林大学,2007:171-181.
[4] Frické M. Big data and its epistemology[J]. Journal of the Association for Information Science and Technology, 2015, 66(4): 651-661.
[5] Hilbert M. What is the content of the world's technologically mediated information and communication capacity: How much text, image, audio, and video?[J]. The Information Society, 2014, 30(2): 127-143.
[6] Constantinides P, Barrett M. Information infrastructure development and governance as collective action[J]. Information Systems Research, 2014, 26(1): 40-56.
[7] Frieden R. Identifying best practices in financing next generation networks[J]. The Information Society, 2013, 29(4): 234-247.
[8] Jayakar K, Liu Chun, Madden G, et al. Promoting broadband and ICT access for disabled persons: Comparative analysis of initiatives in asia-pacific region[J]. The Information Society, 2015, 31(4): 299-314.
[9] Fichman R G, Dos Santos B L, Zheng Zhiqiang. Digital innovation as a fundamental and powerful concept in the information systems curriculum[J]. MIS Quarterly, 2014, 38(2): 329-353.
[10] Yaraghi N, Du A Y, Sharman R, et al. Health information exchange as a multisided platform: Adoption,usage, and practice involvement in service co-production [J]. Information Systems Research, 2014, 26(1): 1-18.
[11] Kallinikos J, Tempini N. Patient data as medical facts: Social media practices as a foundation for medical knowledge creation[J]. Information Systems Research, 2014, 25(4): 817-833.
[12] Veinot T C. Regional HIV/AIDS information environments and information acquisition success[J]. The Information Society, 2013, 29(2): 88-112.
[13] Douglass K, Allard S, Tenopir C, et al. Managing scientific data as public assets: Data sharing practices and policies among full-time government employees[J]. Journal of the Association for Information Science and Technology, 2014, 65(2): 251-262.
[14] Dougherty M, Meyer E T. Community, tools, and practices in Web archiving: The state-of-the-art in relation to social science and humanities research needs[J]. Journal of the Association for Information Science and Technology, 2014, 65(11): 2195-2209.
[15] Zhang Yin, Kudva S. E-books versus print books: Readers' choices and preferences across contexts[J]. Journal of the Association for Information Science and Technology, 2014, 65(8): 1695-1706.
[16] Kuilema J. Social workers and broadband advocacy social justice and information communications technologies[J]. Social Science Computer Review, 2013, 31(3): 291-305.
[17] Baron N S. Shall we talk? Conversing with humans and robots[J]. The Information Society, 2015, 31(3): 257-264.
[18] Jarrahi M H, Sawyer S. Theorizing on the take-up of social technologies, organizational policies and norms, and consultants' knowledge-sharing practices[J]. Journal of the Association for Information Science and Technology, 2015, 66(1): 162-179.
[19] Jin Tao, Ju Boryung.The corporate information agency: Do competitive intelligence practitioners utilize it?[J]. Journal of the Association for Information Science and Technology, 2014, 65(3): 589-608.
[20] Yuan Y C, Zhao Xuan, Liao Qinying, et al. The use of different information and communication technologies to support knowledge sharing in organizations: From e-mail to micro-blogging[J]. Journal of the American Society for Information Science and Technology, 2013, 64(8): 1659-1670.
[21] Karunakaran A, Reddy M C, Spence P R. Toward a model of collaborative information behavior in organizations[J]. Journal of the American Society for Information Science and Technology, 2013, 64(12): 2437-2451.
[22] Shen Cuihua, Williams D. The evolution of social ties online: A longitudinal study in a massively multiplayer online game[J]. Journal of the Association for Information Science and Technology, 2014, 65(10): 2127-2137.
[23] Lang A. Dynamic human-centered communication systems theory[J]. The Information Society, 2014, 30(1): 60-70.
[24] Chen Wenhong. Internet use, online communication, and ties in Americans' networks[J]. Social Science Computer Review, 2013, 31(4): 404-423.
[25] Chan J, Ghose A. Internet's dirty secret: Assessing the impact of online intermediaries on HIV transmission[J]. MIS Quarterly, 2013, 38(4): 955-976.
[26] Oh O, Agrawal M, Rao H R. Community intelligence and social media services: A rumor theoretic analysis of tweets during social crises[J]. Mis Quarterly, 2013, 37(2): 407-426.
[27] Cole S H, Hooley J M. Clinical and personality correlates of MMO gaming: Anxiety and absorption in problematic Internet use[J]. Social Science Computer Review, 2013,31(4):424-436.
[28] George J F, Carlson J R, Valacich J S. Media selection as a strategic component of communication [J].MIS Quarterly, 2013, 37(4): 1233-1251.
[29] Capra R, Khanova J, Ramdeen S. Work and personal e-mail use by university employees: PIM practices across domain boundaries[J]. Journal of the American Society for Information Science and Technology, 2013, 64(5): 1029-1044.
[30] Potnis D D. Beyond access to information: Understanding the use of information by poor female mobile users in rural India[J]. The Information Society, 2015, 31(1): 83-93.
[31] McCaughey D, Baumgardner C, Gaudes A, et al. Best practices in social media utilizing a value matrix to assess social media's impact on health care[J]. Social Science Computer Review, 2014, 32(5): 575-589.
[32] Pick J, Nishida T, Zhang Xi. Determinants of China's technology availability and utilization 2006-2009: A spatial analysis[J]. The Information Society, 2013, 29(1): 26-48.
[33] Chen Wenhong. The Implications of social capital for the digital divides in America[J]. The Information Society,2013, 29(1): 13-25.
[34] Chen Wenhong, Lee K H, Straubhaar J D, et al. Getting a second opinion: Social capital, digital inequalities, and health information repertoires[J]. Journal of the Association for Information Science and Technology, 2014, 65(12): 2552-2563.
[35] Campos-Castillo C. Revisiting the first-level digital divide in the united states gender and race/ethnicity patterns, 2007-2012[J]. Social Science Computer Review,2015, 33(4): 423-439.
[36] Park Y J. Offline status,online status reproduction of social categories in personal information skill and knowledge[J]. Social Science Computer Review, 2013, 31(6): 680-702.
[37] Rui J R, Covert J M, Stefanone M A, et al. A communication multiplexity approach to social capital on-and offline communication and self-esteem[J]. Social Science Computer Review,2015, 33(4): 498-518..
[38] Napoli P M, Obar J A. The emerging mobile internet underclass: A critique of mobile Internet access[J]. The Information Society, 2014, 30(5): 323-334.
[39] Bouchillon B C. Social ties and generalized trust, online and in person: Contact or conflict-the mediating role of bonding social capital in America[J]. Social Science Computer Review,2014, 32(4): 506-523.
[40] Monforti J L, Marichal J. The role of digital skills in the formation of generalized trust among Latinos and African Americans in the United States[J]. Social Science Computer Review, 2014, 32(1): 3-17.
[41] Lingel J. Information practices of urban newcomers: An analysis of habits and wandering[J]. Journal of the Association for Information Science and Technology, 2015, 66(6): 1239-1251.
[42] Baron L F, Neils M, Gomez R. Crossing new borders:Computers, mobile phones, transportation, and English language among Hispanic day laborers in Seattle, Washington[J]. Journal of the Association for Information Science and Technology, 2014, 65(1): 98-108.
[43] Lingel J. "Keep it secret, keep it safe": Information poverty, information norms, and stigma[J]. Journal of the American Society for Information Science and Technology, 2013, 64(5): 981-991.
[44] Lindenthal T. Valuable words: The price dynamics of Internet domain names[J]. Journal of the Association for Information Science and Technology, 2014, 65(5): 869-881.
[45] Proffitt J M, Ekbia H R, McDowell S D. Introduction to the special forum on monetization of user-generated content-marx revisited[J]. The Information Society, 2015, 31(1): 1-4.
[46] Andrejevic M. Personal Data: Blind spot of the "Affective Law of Value"?[J]. The Information Society, 2015, 31(1): 5-12.
[47] Schulzke M. The virtual culture industry: Work and play in virtual worlds[J]. The Information Society, 2014, 30(1): 20-30.
[48] Holt T J. Examining the forces shaping cybercrime markets online[J]. Social Science Computer Review, 2013, 31(2): 165-177.
[49] Levy K E C. The contexts of control: Information, power, and truck-driving work[J]. The Information Society, 2015, 31(2): 160-174.
[50] Harvey M J, Harvey M G. Privacy and security issues for mobile health platforms[J]. Journal of the Association for Information Science and Technology, 2014, 65(7): 1305-1318.
[51] Rubel A, Biava R. A framework for analyzing and comparing privacy states[J]. Journal of the Association for Information Science and Technology, 2014, 65(12): 2422-2431.
[52] Popescu M, Baruh L. Captive but mobile: Privacy concerns and remedies for the mobile environment[J]. The Information Society, 2013, 29(5): 272-286.
[53] Brubaker J R, Hayes G R, Dourish P. Beyond the grave: Facebook as a site for the expansion of death and mourning[J]. The Information Society, 2013, 29(3): 152-163.
[54] Church S H. Digital gravescapes: Digital memorializing on Facebook[J]. The Information Society, 2013, 29(3): 184-189.
[55] Lingel J. The digital remains: Social media and practices of online grief[J]. The Information Society, 2013, 29(3): 190-195.
[56] PytlikZillig L M, Wang Shiyuan, Soh L K, et al. Exploring reactions to hacktivism among STEM college students: A preliminary model of hacktivism support and resistance[J]. Social Science Computer Review,2015, 33(4): 479-497.
[57] Filas M. My dinner with stelarc: A review of techno-flesh hybridity in art[J]. The Information Society, 2013, 29(5): 287-296.
[58] Wen Wen, Forman C, Graham S J H. The impact of intellectual property rights enforcement on open source software project success[J]. Information Systems Research, 2013, 24(4):1131-1146.
[59] Tunca T I, Wu Qiong. Fighting fire with fire: Commercial piracy and the role of file sharing on copyright protection policy for digital goods[J]. Information Systems Research, 2013, 24(2): 436-453.
[60] Houston R, Westbrook L. Information-based mitigation of intimate partner violence[J]. Journal of the American Society for Information Science and Technology, 2013, 64(8): 1694-1706.
[61] Fichman P, Sanfilippo M R. The bad boys and girls of cyberspace how gender and context impact perception of and reaction to trolling[J]. Social Science Computer Review, 2015, 33(2): 163-180.
[62] Bauer J M, Obar J A. Reconciling political and economic goals in the net neutrality debate[J]. The Information Society, 2014, 30(1): 1-19.
[63] Herman B D, Kim M. The Internet defends itself: The network neutrality debate on the Web[J]. The Information Society, 2014, 30(1): 31-44.
[64] Oltmann S M. Data, censorship, and politics: Analyzing the restricted flow of information in federal scientific policy development[J]. Journal of the Association for Information Science and Technology, 2015, 66(1): 144-161.
[65] Taneja H, Wu A X. Does the Great Firewall really isolate the Chinese? Integrating access blockage with cultural factors to explain Web user behavior[J]. The Information Society, 2014, 30(5): 297-309.
[66] Towner T L. All political participation is socially networked? New media and the 2012 election[J]. Social Science Computer Review, 2013, 31(5): 527-541.
[67] Gulati G J, Williams C B. Social media and campaign 2012 developments and trends for Facebook adoption[J]. Social Science Computer Review, 2013, 31(5): 577-588.
[68] Morris D S, Morris J S. Digital inequality and participation in the political process real or imagined?[J]. Social Science Computer Review, 2013, 31(5): 589-600.
[69] Hawthorne J, Houston J B, McKinney M S. Live-tweeting a presidential primary debate:Exploring new political conversations[J]. Social Science Computer Review,2013, 31(5): 552-562.
[70] Srinivasan R. Bridges between cultural and digital worlds in revolutionary Egypt[J]. The Information Society, 2013, 29(1): 49-60.
[71] Srinivasan R. What Tahrir square has done for social media: A 2012 snapshot in the struggle for political power in Egypt[J]. The Information Society, 2014, 30(1): 71-80.
[72] Hu Guangwei, Pan Wenwen, Lin Hui, et al. Study on the Framework of e-Government services capability: An empirical investigation[J]. Social Science Computer Review,2014, 32(1): 56-73.
[73] Gable M. Efficiency, participation, and quality: Three dimensions of e-government?[J]. Social Science Computer Review, 2015, 33(4): 519-532.
[74] Pang Min-Seok, Tafti A R, Krishnan M S. Information technology and administrative efficiency in US state governments-A stochastic frontier approach[EB/OL].[2015-09-10].http://ssrn.com/abstract=1612820.
[75] Crooks A, Masad D, Croitoru A, et al. International relations state-driven and citizen-driven networks[J]. Social Science Computer Review, 2014, 32(2): 205-220.
[76] 贝尔. 后工业社会的来临——对社会预测的一项探索[M]. 高铦, 王宏周, 魏章玲,译. 北京:商务印书馆, 1986.
/
〈 | 〉 |