Search published articles


Showing 3 results for sangari

Mahmood Sangari, Hamidreza Jamali, ,
Volume 5, Issue 2 (9-2018)
Abstract

Background and Aim: Understanding collaborative information seeking behaviour requires knowing about personal characteristics, differences between users, and the type of interactions occur during a collaborative behaviour. The aim of this study is to investigate dimensions of collaborative information seeking behaviour of graduate students of Kharazmi University when using a digital library based on easy and difficult task scenarios.
Methods:  this was a mixed-method study with 60 (30 pairs) participant randomly chosen from graduate students of Kharazmi University (enrolled in 2017-2018). The sampling technique was purposive random sampling. Participants participated in a test based on easy and difficult tasks of collaborative information seeking using a digital library (Tebyan).
Results: the time spent interacting with peers or librarians was relatively short. Participants in difficult tasks mostly played the role of consultant. Most of information or help requests were of the type of procedural.
Conclusion: the results confirm the important role of librarians in collaborative information seeking and the feasibility of providing human assistant in digital library environment to support users.
- Khadije Akar, - Mohammad Reza Kiani, - Mahmood Sangari,
Volume 11, Issue 2 (9-2024)
Abstract

Introduction
Online social networks are new and innovative media that have made changes in the social, cultural, economic and political structures of societies. These networks have not only changed the rules and regulations governing communication and interaction between humans, but also our thinking and attitude towards ourselves, others and the world. With the rapid development of technology, online social networks have become very popular in the current decade.
With the development of virtual space and the use of social networks, privacy is at risk more than ever, and in the meantime, social networks have a privileged status in terms of obtaining, collecting and using personal information. There are several security and privacy issues related to shared user information, especially when a user uploads personal content such as photos, videos, and audio files.

Methods and Materoal
This descriptive survey used a Researcher-made questionnaire on a sample of students of University of Birjand (375 participants). For questionnaire’s validity, the experts’ opinions was used, and Cronbach's alpha was used for questionnaire’s reliability (0.876).
Resultss and Discussion
The increasing daily use of online social networks around the world leads to more problems regarding the security and privacy behavior of users in this attractive environment. While users can enjoy many benefits by using the service, at the same time they have many concerns about the privacy of their information. Despite privacy concerns, users continue to use these platforms and continue to share or self-disclose more personal information. Now, in order to deal with these threats, it is necessary to know what factors affect the security and privacy in social networks. According to many researches that have been conducted in this field, there are many factors that influence, but the factors that the current research focused on (after examining the level of awareness and importance of users to the two categories of security and privacy), two factors are individual factors and social engineering. was Individual factors being the factors that caused users to fail to use private settings, and social engineering was actually the abuse of trust or the deception of human agents to access confidential information and then abuse this information.
The results showed that although the respondents attached great importance to topics related to security and privacy, they admitted that they were less aware of many of these topics than expected. The results of the next questions showed that the behaviors related to individual factors were less than expected among the respondents, while the behaviors related to social engineering were within the expected range and even beyond. Examining the demographic variables showed that women received a higher score than men in all the investigated variables. Also, the scores of undergraduate students from two levels higher than theirs were higher in all variables.

Conclusion
In today's interconnected world, many relationships and interactions with others are virtual and they have provided easy conditions for exchanging information, news, events with the ability to comment and share information with a wide audience and even create content. Therefore, social media has attracted more and more attention. This volume of information exchange has put the security and privacy of users in social networks at risk. To deal with these threats, users must know what factors affect security and privacy. Among the broad factors that have been mentioned in previous studies, the most important factors have been discussed in the current research, which can be called individual factors and social engineering. Now, considering the need to clarify the issue, in this research, the role of individual factors and social engineering in the behaviors related to the security and privacy of users in social networks has been discussed.
The results of the questions confirmed that students, as active members of the society, are not as aware of issues related to security and privacy as they should be, and the percentage of this awareness was less than expected, but contrary to their relatively low awareness, fortunately, security and privacy are very important. They were private in social networks. Although it was expected that students, as an informed and cultured segment of the academic community, would have acceptable knowledge in the field of security and privacy, but unfortunately, the result of the present study was the opposite, and this is an alarm for all university and government officials who think about education and to inform the students.
On the other hand, it is true that students attach great importance to their security and privacy in social networks, but certainly to realize this issue and actually its prerequisite, to be familiar with the rules of the privacy policy and how to make security and privacy settings. It is that until this important thing is not done correctly, the issue of giving importance to security and privacy cannot be given proper attention, even though this issue is important for students
Rahman Marefat, Mahmood Sangari,
Volume 12, Issue 1 (5-2025)
Abstract

Background and purpose: The present study was conducted with the aim of identifying methods of validating methods of resources among sports science students of Birjand University. In numerous classes involving students from various disciplines, a recurring challenge reported by students was their unfamiliarity with source validation methods. Students, consistently indicated a lack of knowledge on how to assess the credibility of sources. When provided with examples of valid and invalid sources, many students struggled to properly evaluate them. Some students even expressed the belief that source validation was unnecessary, emphasizing merely the importance of using sources rather than verifying their validity. The researchers focused on a specific group—sports science students at Birjand University—to investigate how these students evaluate the sources they need and what challenges they encounter in the process.
Studies suggest that students often lack the skills to assess the credibility of articles found in databases or general websites like Wikipedia and online encyclopedias (Marefat, 1401; Azarang, 1399). For printed sources, students typically consider the author's credibility, organizational affiliation, and the publisher’s reputation as indicators of source reliability (Moradi, 1384). Marefat identified ten main categories related to evaluating sources, including institutional credibility, author credibility, content accuracy, observational reliability, referential validation, publication date, information distortion, credibility doubts, recognition of source credibility, and citation rate, particularly from psychology students’ perspectives (Marefat, 1396).
Research by Keshavarz, Vasfi, and Sha'bani (1393) examined the credibility of internet health information and how personality traits like conscientiousness influence evaluation methods among health-medical professionals. They found that many struggle to assess quality, relying mainly on impartiality, timeliness, and author credibility. Similarly, Roozbahani and Riahi-nia (1395) highlighted that faculty members prioritize content accuracy, data reliability, logical consistency, and relevance in determining source credibility. Kader’s study (Kader, 2013) on nurses identified a six-stage process for evaluating online health information, depending on skills, time, and website quality. Liu and Huang’s research (2005) among Chinese students revealed that current students often base their judgments on author name, affiliation, and website reputation, whereas graduates focus more on the information’s accuracy and quality.
Despite many evaluation efforts, challenges remain: first, understanding how users process unobservable information is difficult; second, differing information needs lead to varied processing approaches; and third, establishing a universal criterion for correct information processing is often impossible outside controlled environments. These issues highlight the complexity of assessing information credibility and the ongoing need for effective evaluation strategies (Liu, 2000).The main questions of the present study are:
1. What are the challenges faced by sports science students at Birjand University in evaluating their required resources?
2. How do sports science students at Birjand University evaluate their required resources?
Method:The statistical population of the present study consisted of 67 sports science students at Birjand University at the time of the research. Given the effort to collect maximum data, all 67 individuals were considered part of the research population, and no sampling was performed. Semi-structured interviews were used for data collection. In total, twenty master's students in sports science were interviewed. The interview process continued until saturation was reached, after interviewing sixteen students. From the sixteenth to the twentieth interview, the data obtained were repetitive, and based on this, the researchers decided to stop data collection. The initial codes were placed under sub-categories and main categories. In the present study, member checking was used to determine the research's credibility. In the present study, the constructivist approach in grounded theory, as proposed by Charmaz (2014), was adopted as the basis for the work, therefore, there is no need to present a paradigmatic model. Data analysis was also performed using MAXQDA 2020 software.
Findings:  Among the 67 members of the research population, a total of 20 sports science students from Birjand University were interviewed. A totoal of 50% of the interviewees were women (10 people), and 10 (50%) were men. Categorizes and presents the concepts and codes extracted from the interviews related to the research questions. In the axial coding of the data, a total of 6 main challenges related to the validation methods of resources of sports students present in the interviews were found, such as lack of familiarity with investigating research violations, lack of familiarity with plagiarism, lack of familiarity with plagiarism software, etc. Also, 15 core codes related to the second research question, how to accredit sports students, were obtained.
Conclusion: Interviews with the research population revealed that students in the research population face certain challenges in validating sources. They highlighted "unfamiliarity with examining research misconduct, unfamiliarity with plagiarism, unfamiliarity with plagiarism software, unfamiliarity with citation styles and citation management software, disregard for the author's academic rank, and unfamiliarity with the credibility of open-access articles" in their conversations with researchers.
 These points were derived from the overall final concepts identified during the interviews, which included "unfamiliarity with how to examine research misconduct, unfamiliarity with examining research misconduct, unfamiliarity with examining plagiarism, unfamiliarity with plagiarism software, unfamiliarity with citation styles, unfamiliarity with EndNote, disregard for the author's academic rank, and unfamiliarity with the credibility of open-access articles." The findings of the present study emphasize the need for serious attention from all students, including sports science students and other students, to the issue of information credibility and quality, and the necessity of sufficient and continuous training and skills in this area. Skill training in determining the quality and credibility of sources, based on specific and strong criteria, in the form of training courses, workshops, laboratories, projects, and research, are among the immediate actions in this field.
 Especially, It is suggested that to better understand the problems and provide better solutions, other qualitative and mixed methods such as foresight and videography with highly standardized checklists be conducted in more extensive and broader research to achieve more generalizable and broader results. It seems that training in source validation methods is needed for the sports science students participating in the research, and their training can reduce the challenges of source validation among students and improve their source validation methods. It is suggested that the data from this research be measured as a quantitative study among students of Birjand University and other various universities across the country.




 


Page 1 from 1     

© 2025 CC BY-NC 4.0 | Human Information Interaction

Designed & Developed by : Yektaweb