scholarly journals I give up! Five factors that contribute to the abandonment of information management strategies

Author(s):  
Elisabeth Jones ◽  
Harry Bruce ◽  
Predrag Klasnja ◽  
William Jones
2021 ◽  
Vol 12 ◽  
Author(s):  
Hyunjin Kang ◽  
Wonsun Shin

This study examines how three different motivations for using an SNS (i.e., self-expression, belonging, and memory archiving) influence multi-facets of privacy boundary management on the platform mediated by self-extension to it. In recognition of the fact that information management on SNSs often goes beyond the “disclosure-withdrawal” dichotomy, the study investigates the relationships between the three SNS motives and privacy boundary management strategies (i.e., collective boundary and boundary turbulence management). An online survey with Facebook users (N = 305) finds that the three Facebook motivations are positively correlated to users’ self-extension to Facebook. The motivations for using Facebook are positively associated with the management of different layers of privacy boundaries (i.e., basic, sensitive, and highly sensitive), when Facebook self-extension is mediated. In addition, the three motives have indirect associations with potential boundary turbulence management mediated by Facebook self-extension. Extending the classic idea that privacy is deeply rooted in the self, the study demonstrates that perceiving an SNS as part of the self-system constitutes a significant underlying psychological factor that explains the linkage between motives for using SNSs and privacy management.


2019 ◽  
Vol 37 (4) ◽  
pp. 244-249
Author(s):  
Akshay Rajaram ◽  
Trevor Morey ◽  
Sonam Shah ◽  
Naheed Dosani ◽  
Muhammad Mamdani

Background: Considerable gains are being made in data-driven efforts to advance quality improvement in health care. However, organizations providing hospice-oriented palliative care for structurally vulnerable persons with terminal illnesses may not have the enabling data infrastructure or framework to derive such benefits. Methods: We conducted a pilot cross-sectional qualitative study involving a convenience sample of hospice organizations across North America providing palliative care services for structurally vulnerable patients. Through semistructured interviews, we surveyed organizations on the types of data collected, the information systems used, and the challenges they faced. Results: We contacted 13 organizations across North America and interviewed 9. All organizations served structurally vulnerable populations, including the homeless and vulnerably housed, socially isolated, and HIV-positive patients. Common examples of collected data included the number of referrals, the number of admissions, length of stay, and diagnosis. More than half of the organizations (n = 5) used an electronic medical record, although none of the record systems were specifically designed for palliative care. All (n = 9) the organizations used the built-in reporting capacity of their information management systems and more than half (n = 6) augmented this capacity with chart reviews. Discussion: A number of themes emerged from our discussions. Present data collection is heterogeneous, and storage of these data is highly fragmented within and across organizations. Funding appeared to be a key enabler of more robust data collection and use. Future work should address these gaps and examine opportunities for innovative ways of analysis and reporting to improve care for structurally vulnerable populations.


2016 ◽  
Vol 39 (3) ◽  
pp. 602-621 ◽  
Author(s):  
Elizabeth Babskie ◽  
Aaron Metzger

The current study investigated associations among adolescents’ reports of harmfulness and family decision-making beliefs regarding potentially problematic cyber behaviors (e.g., talking to strangers online), cyber-specific information management strategies (disclosure, secrecy, concealment), and family rules regarding adolescents’ use of information and communication technology (ICT). The sample consisted of 159 adolescents aged 12 to 18 years ( M = 14.45, SD = 1.72, 59% female, 80% Caucasian). Youth were more likely to disclose their ICT behavior when they recognized the harm associated with cyber risks and viewed their family as less restrictive about ICT activities. Age differences indicated that older adolescents’ ICT beliefs were more strongly related to their information management strategies, whereas families’ ICT rules were more predictive of cyber disclosure for younger adolescents. Results demonstrate that both adolescents’ conceptualization of ICT risks and families’ ICT-specific rules contribute to adolescents’ choice of information management strategies regarding ICT behaviors.


2016 ◽  
Vol 72 (6) ◽  
pp. 1078-1113 ◽  
Author(s):  
Pauline Joseph

Purpose The purpose of this paper is to explore the leisure information behaviour of motor sport enthusiasts, examining: their information needs; their information seeking and sharing; what personal information they had; and their satisfaction with their information seeking and personal information management efforts. Design/methodology/approach This exploratory study examined participants’ information behaviour from a postpositivist and inductive research approach. An online survey was completed by 81 motor sport enthusiasts. The quantitative survey data were analysed using descriptive statistics, whilst the qualitative data were analysed using thematic coding. Findings The research findings highlighted that enthusiasts engaged in mixed serious leisure. They required information before, during and after race events, and sought this primarily from online sources, as well as from other individuals. Totally, 90 participants shared information about their interest in motor sport with family, friends and fellow enthusiasts, primarily via e-mails (69 per cent) and Facebook (49 per cent). They also gathered information about motor sport, including photographs and memorabilia. Participants were satisfied with their information management strategies for their personal collections. Research limitations/implications Participants were limited to motor sport enthusiasts in Australia, hence findings cannot be generalised more broadly. Practical implications Understandings of enthusiasts’ information behaviour provide information management professionals with insights to work with this user community. Originality/value This study fills a gap in the literature about leisure information behaviour of motor sport enthusiasts in Australia. It identifies and provides a typology of the 12 categories of information needed by enthusiasts. Provides a preliminary motor sport information behaviour model guided by the conceptual frameworks of the everyday life information seeking model; general models on information behaviour; and the information problem solving behaviour model.


2014 ◽  
Vol 18 (1) ◽  
Author(s):  
Lorna R. Kearns ◽  
Barbara A. Frey ◽  
Christinger Tomer ◽  
Susan Alman

The literature suggests that personal information management is a serious challenge for many computer users. Online faculty are especially challenged because of the large number of electronic files necessitated by teaching online. Those who have experience in this environment may offer valuable insights regarding information management challenges and practices. Faculty who teach online courses as part of the WISE (Web-based Information Science Education) Consortium responded to a survey that questioned the ways they manage email, computer desktop, Web-based information and learning management systems. The authors concluded that “filter failure” rather than information overload is the key issue in information management. The study concludes with a list of recommendations for faculty to manage their personal information.


2013 ◽  
Vol 115 (8) ◽  
pp. 1073-1089 ◽  
Author(s):  
Ruth M.W. Yeung ◽  
Wallace M.S. Yee

PurposeAdapting from the extant literature, this paper aims to present an empirical framework of risk measurement in the context of food safety risk in overseas destinations.Design/methodology/approachData were collected from 715 respondents visiting Macau in October 2008 by using intercept method. Principal component analysis followed by confirmatory factor analysis were utilised for data analysis.FindingsThe research yielded 12 factors, of which five factors, namely Dread, Framing effect, Controllable, Regulation and Past experience measure risk characteristics; two factors, namely Uncertainty and Consequence measure tourist risk perception, and five factors, namely Travel information, Safety assurance, Destination reputation, Marketing activities and Precaution measure risk reduction, especially related to food safety risk in international destinations.Practical implicationsThe tourist industry should understand more specifically what tourists want to know so as to devise appropriate communication management strategies at the international destination.Originality/valueThe risk measurement framework provides an insight for the development of an instrument to assess the social and economic impact on tourist perception of international travel risk.


Sign in / Sign up

Export Citation Format

Share Document