综述述评

美国图书情报界2013年以来信息社会研究文献综述

  • 杨志维 ,
  • 郎宇洁
展开
  • 1. 北京大学信息管理系 北京 100871;
    2. 工业和信息化部电子科学技术情报研究所 北京 100040
杨志维(ORCID:0000-0002-5076-1006),高级工程师,博士研究生,E-mail:yangzhiwei@pku.edu.cn;郎宇洁(ORCID:0000-0002-7633-9276),助理工程师,硕士。

收稿日期: 2015-09-22

  修回日期: 2015-10-02

  网络出版日期: 2015-10-20

Literature Review on Information Society by U.S. LIS Community Since 2013

  • Yang Zhiwei ,
  • Lang Yujie
Expand
  • 1. Department of Information Management, Peking University, Beijing 100871;
    2. Electronic Technology Information Research Institute, MIIT, Beijing 100040

Received date: 2015-09-22

  Revised date: 2015-10-02

  Online published: 2015-10-20

摘要

[目的/意义]信息社会理论是当今图书情报学(图情)的一个重要研究领域,系统概括美国图情界信息社会研究的最新进展能够为国内学者开展相关研究提供有益参考。[方法/过程]搜集、整理美国图情界5种代表性期刊于2013年1月至2015年8月间发表的全部论文,选取其中最具代表性的136篇,利用二级主题分类体系清晰揭示文献的研究主题分布情况,详细阐释美国图情界2013年以来信息社会研究的方向和进展。[结果/结论]研究表明:①美国图情界信息社会研究由7个主题构成,包括信息社会的基本问题、信息基础设施与服务、人类信息行为、信息阶层与社群、信息经济与职业、信息伦理与法制、信息政治;②美国图情界信息社会研究主要包括3个方向,分别为信息社会实践要素变革、信息社会系统理论建构和信息社会发展趋势预测;③美国图情界信息社会研究具有研究领域较广、注重实践研究和理论融合等优势;④美国图情界信息社会研究的局限在于以微创新为主,缺少从经济视角的深入研究以及部分研究实践价值不大。

本文引用格式

杨志维 , 郎宇洁 . 美国图书情报界2013年以来信息社会研究文献综述[J]. 图书情报工作, 2015 , 59(20) : 138 -148 . DOI: 10.13266/j.issn.0252-3116.2015.20.023

Abstract

[Purpose/significance]The study on theories of information society is important for today's library and information science. And the latest development of U.S. LIS on information society research can provide a reference for Chinese scholars about related studies of Information society.[Method/process]We collected and organized all published papers on five authoritative U.S. LIS journals from January 2013 to August 2015. With the two-class classification system of the selected most representative 136 papers, we clearly revealed the distribution of literature research themes and elaborated on the direction and progress of U.S. LIS on information society research since 2013.[Result/conclusion]Here are the conclusions of this study. ①The information society research of U.S. LIS is composed of seven themes, including basic issues of the information society, information infrastructure and services, human information behavior, information hierarchy and community, information economy and employment, information ethics and the legal system and information politics. ②The three directions of U.S. LIS on information society research are practice elements change, system theory construction and development trend forecast of information society. ③The advantages of U.S. LIS on information society research lie in its wide research field and the integration of theory and practice. ④The limitations of U.S. LIS on information society research are that the majority of the studies are micro innovations and a depth study of economic perspective is lacking which results in little practical value.

参考文献

[1] 韦伯斯特.信息社会理论(第三版)[M].曹晋,梁静,李哲,等译.北京: 北京大学出版社,2001.
[2] 吴正荆,靖继鹏,孙成江. 信息社会学理论范式研究[J].情报科学,2008,26(8):1135-1139.
[3] 吴正荆. 信息社会学研究内容、理论范式与学科体系研究[D].长春:吉林大学,2007:171-181.
[4] Frické M. Big data and its epistemology[J]. Journal of the Association for Information Science and Technology, 2015, 66(4): 651-661.
[5] Hilbert M. What is the content of the world's technologically mediated information and communication capacity: How much text, image, audio, and video?[J]. The Information Society, 2014, 30(2): 127-143.
[6] Constantinides P, Barrett M. Information infrastructure development and governance as collective action[J]. Information Systems Research, 2014, 26(1): 40-56.
[7] Frieden R. Identifying best practices in financing next generation networks[J]. The Information Society, 2013, 29(4): 234-247.
[8] Jayakar K, Liu Chun, Madden G, et al. Promoting broadband and ICT access for disabled persons: Comparative analysis of initiatives in asia-pacific region[J]. The Information Society, 2015, 31(4): 299-314.
[9] Fichman R G, Dos Santos B L, Zheng Zhiqiang. Digital innovation as a fundamental and powerful concept in the information systems curriculum[J]. MIS Quarterly, 2014, 38(2): 329-353.
[10] Yaraghi N, Du A Y, Sharman R, et al. Health information exchange as a multisided platform: Adoption,usage, and practice involvement in service co-production [J]. Information Systems Research, 2014, 26(1): 1-18.
[11] Kallinikos J, Tempini N. Patient data as medical facts: Social media practices as a foundation for medical knowledge creation[J]. Information Systems Research, 2014, 25(4): 817-833.
[12] Veinot T C. Regional HIV/AIDS information environments and information acquisition success[J]. The Information Society, 2013, 29(2): 88-112.
[13] Douglass K, Allard S, Tenopir C, et al. Managing scientific data as public assets: Data sharing practices and policies among full-time government employees[J]. Journal of the Association for Information Science and Technology, 2014, 65(2): 251-262.
[14] Dougherty M, Meyer E T. Community, tools, and practices in Web archiving: The state-of-the-art in relation to social science and humanities research needs[J]. Journal of the Association for Information Science and Technology, 2014, 65(11): 2195-2209.
[15] Zhang Yin, Kudva S. E-books versus print books: Readers' choices and preferences across contexts[J]. Journal of the Association for Information Science and Technology, 2014, 65(8): 1695-1706.
[16] Kuilema J. Social workers and broadband advocacy social justice and information communications technologies[J]. Social Science Computer Review, 2013, 31(3): 291-305.
[17] Baron N S. Shall we talk? Conversing with humans and robots[J]. The Information Society, 2015, 31(3): 257-264.
[18] Jarrahi M H, Sawyer S. Theorizing on the take-up of social technologies, organizational policies and norms, and consultants' knowledge-sharing practices[J]. Journal of the Association for Information Science and Technology, 2015, 66(1): 162-179.
[19] Jin Tao, Ju Boryung.The corporate information agency: Do competitive intelligence practitioners utilize it?[J]. Journal of the Association for Information Science and Technology, 2014, 65(3): 589-608.
[20] Yuan Y C, Zhao Xuan, Liao Qinying, et al. The use of different information and communication technologies to support knowledge sharing in organizations: From e-mail to micro-blogging[J]. Journal of the American Society for Information Science and Technology, 2013, 64(8): 1659-1670.
[21] Karunakaran A, Reddy M C, Spence P R. Toward a model of collaborative information behavior in organizations[J]. Journal of the American Society for Information Science and Technology, 2013, 64(12): 2437-2451.
[22] Shen Cuihua, Williams D. The evolution of social ties online: A longitudinal study in a massively multiplayer online game[J]. Journal of the Association for Information Science and Technology, 2014, 65(10): 2127-2137.
[23] Lang A. Dynamic human-centered communication systems theory[J]. The Information Society, 2014, 30(1): 60-70.
[24] Chen Wenhong. Internet use, online communication, and ties in Americans' networks[J]. Social Science Computer Review, 2013, 31(4): 404-423.
[25] Chan J, Ghose A. Internet's dirty secret: Assessing the impact of online intermediaries on HIV transmission[J]. MIS Quarterly, 2013, 38(4): 955-976.
[26] Oh O, Agrawal M, Rao H R. Community intelligence and social media services: A rumor theoretic analysis of tweets during social crises[J]. Mis Quarterly, 2013, 37(2): 407-426.
[27] Cole S H, Hooley J M. Clinical and personality correlates of MMO gaming: Anxiety and absorption in problematic Internet use[J]. Social Science Computer Review, 2013,31(4):424-436.
[28] George J F, Carlson J R, Valacich J S. Media selection as a strategic component of communication [J].MIS Quarterly, 2013, 37(4): 1233-1251.
[29] Capra R, Khanova J, Ramdeen S. Work and personal e-mail use by university employees: PIM practices across domain boundaries[J]. Journal of the American Society for Information Science and Technology, 2013, 64(5): 1029-1044.
[30] Potnis D D. Beyond access to information: Understanding the use of information by poor female mobile users in rural India[J]. The Information Society, 2015, 31(1): 83-93.
[31] McCaughey D, Baumgardner C, Gaudes A, et al. Best practices in social media utilizing a value matrix to assess social media's impact on health care[J]. Social Science Computer Review, 2014, 32(5): 575-589.
[32] Pick J, Nishida T, Zhang Xi. Determinants of China's technology availability and utilization 2006-2009: A spatial analysis[J]. The Information Society, 2013, 29(1): 26-48.
[33] Chen Wenhong. The Implications of social capital for the digital divides in America[J]. The Information Society,2013, 29(1): 13-25.
[34] Chen Wenhong, Lee K H, Straubhaar J D, et al. Getting a second opinion: Social capital, digital inequalities, and health information repertoires[J]. Journal of the Association for Information Science and Technology, 2014, 65(12): 2552-2563.
[35] Campos-Castillo C. Revisiting the first-level digital divide in the united states gender and race/ethnicity patterns, 2007-2012[J]. Social Science Computer Review,2015, 33(4): 423-439.
[36] Park Y J. Offline status,online status reproduction of social categories in personal information skill and knowledge[J]. Social Science Computer Review, 2013, 31(6): 680-702.
[37] Rui J R, Covert J M, Stefanone M A, et al. A communication multiplexity approach to social capital on-and offline communication and self-esteem[J]. Social Science Computer Review,2015, 33(4): 498-518..
[38] Napoli P M, Obar J A. The emerging mobile internet underclass: A critique of mobile Internet access[J]. The Information Society, 2014, 30(5): 323-334.
[39] Bouchillon B C. Social ties and generalized trust, online and in person: Contact or conflict-the mediating role of bonding social capital in America[J]. Social Science Computer Review,2014, 32(4): 506-523.
[40] Monforti J L, Marichal J. The role of digital skills in the formation of generalized trust among Latinos and African Americans in the United States[J]. Social Science Computer Review, 2014, 32(1): 3-17.
[41] Lingel J. Information practices of urban newcomers: An analysis of habits and wandering[J]. Journal of the Association for Information Science and Technology, 2015, 66(6): 1239-1251.
[42] Baron L F, Neils M, Gomez R. Crossing new borders:Computers, mobile phones, transportation, and English language among Hispanic day laborers in Seattle, Washington[J]. Journal of the Association for Information Science and Technology, 2014, 65(1): 98-108.
[43] Lingel J. "Keep it secret, keep it safe": Information poverty, information norms, and stigma[J]. Journal of the American Society for Information Science and Technology, 2013, 64(5): 981-991.
[44] Lindenthal T. Valuable words: The price dynamics of Internet domain names[J]. Journal of the Association for Information Science and Technology, 2014, 65(5): 869-881.
[45] Proffitt J M, Ekbia H R, McDowell S D. Introduction to the special forum on monetization of user-generated content-marx revisited[J]. The Information Society, 2015, 31(1): 1-4.
[46] Andrejevic M. Personal Data: Blind spot of the "Affective Law of Value"?[J]. The Information Society, 2015, 31(1): 5-12.
[47] Schulzke M. The virtual culture industry: Work and play in virtual worlds[J]. The Information Society, 2014, 30(1): 20-30.
[48] Holt T J. Examining the forces shaping cybercrime markets online[J]. Social Science Computer Review, 2013, 31(2): 165-177.
[49] Levy K E C. The contexts of control: Information, power, and truck-driving work[J]. The Information Society, 2015, 31(2): 160-174.
[50] Harvey M J, Harvey M G. Privacy and security issues for mobile health platforms[J]. Journal of the Association for Information Science and Technology, 2014, 65(7): 1305-1318.
[51] Rubel A, Biava R. A framework for analyzing and comparing privacy states[J]. Journal of the Association for Information Science and Technology, 2014, 65(12): 2422-2431.
[52] Popescu M, Baruh L. Captive but mobile: Privacy concerns and remedies for the mobile environment[J]. The Information Society, 2013, 29(5): 272-286.
[53] Brubaker J R, Hayes G R, Dourish P. Beyond the grave: Facebook as a site for the expansion of death and mourning[J]. The Information Society, 2013, 29(3): 152-163.
[54] Church S H. Digital gravescapes: Digital memorializing on Facebook[J]. The Information Society, 2013, 29(3): 184-189.
[55] Lingel J. The digital remains: Social media and practices of online grief[J]. The Information Society, 2013, 29(3): 190-195.
[56] PytlikZillig L M, Wang Shiyuan, Soh L K, et al. Exploring reactions to hacktivism among STEM college students: A preliminary model of hacktivism support and resistance[J]. Social Science Computer Review,2015, 33(4): 479-497.
[57] Filas M. My dinner with stelarc: A review of techno-flesh hybridity in art[J]. The Information Society, 2013, 29(5): 287-296.
[58] Wen Wen, Forman C, Graham S J H. The impact of intellectual property rights enforcement on open source software project success[J]. Information Systems Research, 2013, 24(4):1131-1146.
[59] Tunca T I, Wu Qiong. Fighting fire with fire: Commercial piracy and the role of file sharing on copyright protection policy for digital goods[J]. Information Systems Research, 2013, 24(2): 436-453.
[60] Houston R, Westbrook L. Information-based mitigation of intimate partner violence[J]. Journal of the American Society for Information Science and Technology, 2013, 64(8): 1694-1706.
[61] Fichman P, Sanfilippo M R. The bad boys and girls of cyberspace how gender and context impact perception of and reaction to trolling[J]. Social Science Computer Review, 2015, 33(2): 163-180.
[62] Bauer J M, Obar J A. Reconciling political and economic goals in the net neutrality debate[J]. The Information Society, 2014, 30(1): 1-19.
[63] Herman B D, Kim M. The Internet defends itself: The network neutrality debate on the Web[J]. The Information Society, 2014, 30(1): 31-44.
[64] Oltmann S M. Data, censorship, and politics: Analyzing the restricted flow of information in federal scientific policy development[J]. Journal of the Association for Information Science and Technology, 2015, 66(1): 144-161.
[65] Taneja H, Wu A X. Does the Great Firewall really isolate the Chinese? Integrating access blockage with cultural factors to explain Web user behavior[J]. The Information Society, 2014, 30(5): 297-309.
[66] Towner T L. All political participation is socially networked? New media and the 2012 election[J]. Social Science Computer Review, 2013, 31(5): 527-541.
[67] Gulati G J, Williams C B. Social media and campaign 2012 developments and trends for Facebook adoption[J]. Social Science Computer Review, 2013, 31(5): 577-588.
[68] Morris D S, Morris J S. Digital inequality and participation in the political process real or imagined?[J]. Social Science Computer Review, 2013, 31(5): 589-600.
[69] Hawthorne J, Houston J B, McKinney M S. Live-tweeting a presidential primary debate:Exploring new political conversations[J]. Social Science Computer Review,2013, 31(5): 552-562.
[70] Srinivasan R. Bridges between cultural and digital worlds in revolutionary Egypt[J]. The Information Society, 2013, 29(1): 49-60.
[71] Srinivasan R. What Tahrir square has done for social media: A 2012 snapshot in the struggle for political power in Egypt[J]. The Information Society, 2014, 30(1): 71-80.
[72] Hu Guangwei, Pan Wenwen, Lin Hui, et al. Study on the Framework of e-Government services capability: An empirical investigation[J]. Social Science Computer Review,2014, 32(1): 56-73.
[73] Gable M. Efficiency, participation, and quality: Three dimensions of e-government?[J]. Social Science Computer Review, 2015, 33(4): 519-532.
[74] Pang Min-Seok, Tafti A R, Krishnan M S. Information technology and administrative efficiency in US state governments-A stochastic frontier approach[EB/OL].[2015-09-10].http://ssrn.com/abstract=1612820.
[75] Crooks A, Masad D, Croitoru A, et al. International relations state-driven and citizen-driven networks[J]. Social Science Computer Review, 2014, 32(2): 205-220.
[76] 贝尔. 后工业社会的来临——对社会预测的一项探索[M]. 高铦, 王宏周, 魏章玲,译. 北京:商务印书馆, 1986.

文章导航

/