Library café or elsewhere: usage of study space by different majors under contemporary technological environment

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jiafeng Zhou ◽  
Ernest Lam ◽  
Cheuk Hang Au ◽  
Patrick Lo ◽  
Dickson K.W. Chiu

PurposeAs current university students may access information for their study anytime, anywhere with ubiquitous mobile technologies, this research re-examines the roles of study space in students' learning and campus life.Design/methodology/approachA survey was conducted to collect students' opinions and habits regarding the usage of different study spaces. Results in three different academic majors (science and engineering, arts and business) of a comprehensive international university were compared.FindingsThe authors’ findings showed a more diversified space usage among students, with the library café increasingly important in students' learning and life while learning commons remain important. However, there were only minor differences among these three study majors towards the learning and entertaining spaces, as these students generally apply inquiry-based learning.Originality/valueWhile some researches have investigated students' usage of university and library learning spaces, few studies have focused on the study space issue in Hong Kong or other metropolises in the East under the current mobile learning environment. This study's insights could help libraries and universities improve the management of their physical spaces to meet student needs.

2015 ◽  
Vol 36 (8/9) ◽  
pp. 570-583 ◽  
Author(s):  
Colin Storey

Purpose – Constructing academic library learning spaces involves ad hoc groups of agents often with fuzzy inter-relationships. Librarians and their user communities are initially hailed within these groups as prime-movers in realizing projects. Librarians bring to the table contagious ideas generated from their own profession in the hope of securing appropriate funding and planning pre-requisites. All other agents, be they internal community representatives or external architects, assist them in making sense of each other’s standpoints to co-create dynamic learning spaces in “commons consent”. The paper aims to discuss these issues. Design/methodology/approach – Using the community culture in The Chinese University of Hong Kong as existed in 2012 as a case study, this paper examines the reality of this process in terms of a new library for learning, teaching and research. Findings – Can librarians hold sway over the priorities of other individual agents, particularly architects, to gain consent to build their initial concept of the commons which they are vigorously promoting as professionally valid and educationally potent? In the co-creation of a building, individual preferences and organizational power structures in ad hoc groups drawn from the university’s distinct cultural environment fuel compromise and even tension around the librarians’ and architects’ original visions. Research limitations/implications – Many other case studies of library building learning commons projects would be useful to add to these findings in sensemaking, co-creation and community cultures. Practical implications – Assists library managers in their management of large buildings projects. Originality/value – An original case study of a major Asian academic library learning commons project which involves sensemaking, co-creation and community cultures ideas imported from construction science.


2016 ◽  
Vol 17 (2) ◽  
pp. 175-187 ◽  
Author(s):  
Katie Burn ◽  
Matthew Cunningham ◽  
Liz Waller ◽  
Emma Walton ◽  
Graham Walton

Purpose – In higher education libraries, the concept of the user experience has increased in profile and importance. The concept of the “student as customer” has generated much debate but there is general agreement that universities need to be more successful in meeting student expectations. A key strategic area for university libraries has been to adapt and improve their physical spaces to ensure that they are still relevant for today’s students. York and Loughborough University Libraries have both undergone building refurbishments and both are committed to monitoring and reviewing services and spaces. The paper aims to discuss these issues. Design/methodology/approach – There were various constraints which very much influenced the methodology. These included: avoiding survey overload no resource allocation an acknowledgement that the methodology employed needed to combine rigour and validity with a pragmatic approach to data collection. A joint project team was established of representatives from each university. A questionnaire created on Google Forms was administered by staff with individuals in the library and entering the data onto a iPad. Findings – Findings provide evidence of use across a range of users along with valuable information on who is using our library spaces and for what purpose. Originality/value – This research is a rich contribution to the evidence based around student’s learning in universities. It benefits from the expertise and knowledge of two university libraries. As university’s continue to develop learning spaces, this work will enable further investigation around what makes a successful learning space and what makes the library a destination of choice.


2019 ◽  
Vol 36 (2) ◽  
pp. 21-22
Author(s):  
Ray Harper

Purpose The purpose of this paper is to summarise a number of presentations at Day 1 of the Internet Librarian International conference, London, UK (16 October 2018). This was the 20th conference in the series, and the three key themes included were the next-gen library and librarian; understanding users, usage and user experience; and inclusion and inspiration: libraries making a difference. Design/methodology/approach This paper reports from the viewpoint of a first-time attendee of the conference. This summarises the main issues raised by each presentation and draws out the key learning points for practical situations. Findings The conference covered a variety of practical ways in which libraries can use technology to support users and make decisions about services. These include developing interactive physical spaces which include augmented reality; introducing “chat-bots” to support users; using new techniques to analyse data; and piloting new ways to engage users (such as coding clubs). A key theme was how we use and harness data in a way that is ethical, effective and relevant to library services. Originality/value This conference focussed on practical examples of how library and information services across sectors and countries are innovating in a period of huge change. The conference gave delegates numerous useful ideas and examples of best practice and demonstrated the strength of the profession in adapting to new technologies and developments.


2016 ◽  
Vol 37 (4/5) ◽  
pp. 265-274 ◽  
Author(s):  
Jennifer Gunter King

Purpose – The purpose of this paper is to share a compelling example of a library’s willingness to develop and design itself as an open-ended process. Design/methodology/approach – The case study provides a historical review of the library’s founding design, and an overview of the process and approach to redesign. The study contextualizes the library within current academic library research and literature. Findings – This paper explores the research, engagement and planning process behind the library’s exploration of new models and service configurations. The project was an engaged, inclusive, transparent, library-led process. The commons reestablishes the library as the “nerve center” of the campus. Originality/value – The paper offers an update to a 1969 report, and later book by Robert Taylor on the Harold F. Johnson Library at Hampshire College, designed as a prototype of an academic library. This paper will be of value to academic librarians, administrators, and historians.


2017 ◽  
Vol 21 (5) ◽  
pp. 1053-1076 ◽  
Author(s):  
Michal Kuciapski

Purpose Although mobile devices are ubiquitous among employees, their awareness and readiness to use mobile technologies for competence development is still not widespread and therefore requires further exploration. The purpose of this study is to propose a conceptual model based on the unified theory of acceptance and use of technology (UTAUT) to explain the determinants that affect employees’ intention to use mobile devices and software for knowledge transfer during the process of knowledge management. Design/methodology/approach A conceptual model based on the UTAUT with new variables concerning relative usability (RU) and user autonomy (UA) and new connections between the determinants was developed as a result of a subject matter literature review. A structural equation modelling approach was used to validate the model on the basis of data collected via a survey collected from 371 employees from 21 sectors, both public and private. Findings The UTAUT model extended by new variables like RU and UA explains employee acceptance of mobile technologies for knowledge transfer reasonably well. New proposed variables highlighted that the usability of technology compared to other solutions and user autonomy in the selection and the use of applications have the strongest impact on the employees’ intention to use mobile devices and software for knowledge transfer. Research limitations/implications This model explains the 55 per cent behavioral intention of employees to use mobile technologies for knowledge transfer. Even though it is quite high in terms of acceptance theories, some new variables should be explored. Furthermore, study does not verify whether m-learning acceptance for knowledge transfer is sector-specific. Practical implications Mobile technologies used for knowledge transfer by employees should allow for high UA through their ability to select solutions that they find convenient, use of preferred platforms, personalize applications and utilize devices and software in various environments. They should not be simplified and should have the same functionality and efficiency of use as alternative solutions like web and desktop applications, even if additional effort to learn them would be required. Mobile technologies that take into account UA and RU support the process of employees capturing, distributing and effectively using knowledge. Originality/value The elaborated model provides a valuable solution with practical implications for increasing mobile technologies acceptance for knowledge transfer. The study results contribute both to knowledge management and technology acceptance research fields by introducing two new determinants for the acceptance of technologies in knowledge transfer, such as UA and RU with several additional connections between existing UTAUT variables.


2015 ◽  
Vol 28 (1/2) ◽  
pp. 34-43 ◽  
Author(s):  
Katarina Michnik

Purpose – The purpose of this paper is to study how Swedish local politicians perceive the impact of public library digital services on public libraries and to discuss how this can affect the sustainable development of public libraries. Design/methodology/approach – Empirical data were collected through semi-structured interviews with local politicians from 19 different Swedish municipalities. Data were treated to qualitative content analysis and discussed based on the concept of sustainable organization. Findings – According to local politicians, public library digital services may affect public libraries through changes to libraries’ physical spaces, librarians’ tasks and competencies and libraries’ economic situations. Based on these findings, public library digital services can both strengthen and weaken public library sustainability through, for example, increased access and expenditures, the latter of which may threaten public library sustainability. Research limitations/implications – Interviews did not focus specifically on the politicians’ views on public library digital services but dealt generally with their views on public libraries. To identify reasons for variations in views on this topic, follow-up interviews should be done. Data on views from public library managers would also be of use to determine the degree to which they are shared with local politicians. Originality/value – When sustainability and public libraries are discussed, the focus is generally on the library’s contribution to a sustainable society. Here, the focus is instead on the sustainability of the public library itself.


2017 ◽  
Vol 35 (4) ◽  
pp. 348-363 ◽  
Author(s):  
Rand H.M. Agha ◽  
John M. Kamara

Purpose The purpose of this paper is to investigate the adaptations that have been made to traditional courtyard houses (TCHs) in Baghdad, Iraq. The aim is to develop an understanding of various factors in the adaptation of these buildings to suit contemporary lifestyles, which will contribute to the wider field of building adaptability. Design/methodology/approach Empirical evidence was collected through case studies of 12 TCHs in the Al-Kadhimiya area of Baghdad, which involved a physical survey of buildings and semi-structured interviews with 24 occupants. Findings Case study analysis show that building adaptability involves both a change to physical spaces and also to lifestyles; with the latter being more likely when there are limitations in how much change can be made to the physical structure. Research limitations/implications The focus of this research is mainly on users’ adaptation of spaces and therefore does not consider the full range of stakeholders involved in the adaptation process. The findings also only apply to the cases considered and may not be applicable to other house types or locations. Originality/value Studies on building adaptability mostly focus on the ease of change to the building fabric, although the role of users is acknowledged. This study provides insights into the complexity and variety of changes that users can make, which are influenced by lifestyles and driven by the need for comfort. These insights are represented in an adaptation model, which can serve as a basis for further research.


2016 ◽  
Vol 10 (4) ◽  
pp. 288-304 ◽  
Author(s):  
Syagnik Banerjee ◽  
Phil Longstreet

Purpose With the ubiquitous diffusion of mobile-enabled internet, individuals are constantly immersed in both virtual and physical environments. While this causes distractions, lower attention spans and disasters such as texting while driving and walking, it also creates synergies and smoother navigational experiences. Technology developers, marketers and policy-makers are both concerned and intrigued to understand how to deploy these mobile technologies so as to optimize their disruptive impact. In this paper, the authors aim to develop a framework of dual consciousness to understand the potential causes and outcomes of individual’s simultaneous presence in physical and virtual worlds. Design/methodology/approach A careful review of past academic literature on behavior, as well as media reports of incidents of disruptions, led the authors to construct a 2 × 2 framework depicting behaviors that indicated high-low consciousness in physical, as well as virtual worlds. Findings In dual environments, individuals either dissociate from one of the environments or integrate both environments. While the former is driven by the multiplicity of irrelevant roles and goals, oblivion of relevant roles, perception of group norms and performance of practiced routine tasks, the latter is driven by strong executive control processes, focused singular goals and usage of the virtual environment to reinforce their physical tasks. The most affected parties are retailers, service providers, digital marketers and social media marketers. Originality/value Most prior research in interactive marketing examine effects of online stimuli on online behavior. This paper identifies the noise created by physical context on clicks as well as the interference created by virtual stimuli on physical purchases and service experiences.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Yang Wu

Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility? Design/methodology/approach These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables. Findings The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues. Research limitations/implications The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems. Practical implications The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES. Social implications Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES. Originality/value This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.


2016 ◽  
pp. 110-114

Welcome to issue 7(2) of SiSAL Journal, which is a special issue on virtual and other learning spaces. The idea for putting together this special issue arose for two reasons. Firstly, we were inspired by the of submissions for the Self-Access Stories project edited by Katherine Thornton whose aim was to “highlight specific experiences of various areas of self-access management in practice, with a view to providing multiple perspectives on each issue” (Thornton, 2015). Some of the submissions and the ensuing discussion on the topic of virtual and other learning spaces prompted the editorial team to do a further call for papers for this special issue. The second reason for putting together this issue reason is that our own institution is currently preparing for a move to a larger, brand new purpose-built facility and this has inevitably resulted in our reevaluating interpretations of self-access for our own context. We wanted the opportunity to learn from others and invite them to the conversation. Environmental factors play a role in students’ learning both inside and outside the classroom and through this special issue we hoped to explore physical spaces, virtual spaces, and even metaphorical spaces in learning, e.g. Vygotsky’s Zone of Proximal Development – ZPD, or Murphey’s Zones of Proximal Adjusting – ZPA (Murphey, 1996; 2013) from both the practical and theoretical perspectives. This issue contains four full papers, one discussion article edited by Hisako Yamashita, and three papers that form the fifth part of the language learning spaces column edited by Katherine Thornton.


Sign in / Sign up

Export Citation Format

Share Document